Skip to comments.Bill Kristol On Fox News: 'Republicans Are Making A Huge Mistake' Conflating IRS And NSA Scandals
Posted on 06/10/2013 9:57:12 AM PDT by EveningStar
On Fox News Sunday, Weekly Standard Editor Bill Kristol cautioned against conflating the various Obama scandals with the new revelations of NSA surveillance.
"Conservatives and Republicans are making a huge mistake," Kristol predicted.
(Excerpt) Read more at mediaite.com ...
Bill Kristol is another village idiot who inherited his GOPe gig from his father.
Sounds like a threat, Bill. Are you threatening us?
Big establishment insider who would have hated the framers.
Rich dummy who dislikes Palin and tea-drinkers.
Bill Kristol is another village idiot who inherited his GOPe gig from his father.
And apparently may be using the same talking points that the White House and Democrats use. They love to use the word ‘conflating’ now.
conflating, the buzzword du jour. Kristol blah, blah, blah.
That’s what it sounds like to me!
I conflate Bill Kristol with a Bloviating Ahole
Yes, he’s right.
In his eyes.
He knows that this represents a big problem for the financial oligarchy that he reports to.
All the financial oligarchy’s misdeeds, the crime, the wars, the lies to the public, it’s all, in the minds of the oligarchs’ minions, in the interest of “national security”.
Quick, oligarchs, get Michael Moore to side with the leaker.
This will make well-trained conservatives instinctively fall into line and oppose Moore, and by association, the leaker.
Man, this globalism is easy once you get the hang of it.
Ignorant of how America feels... it’s the DC disease.
We trust the government far, far less that we did just a few years ago. And it never was much trust to begin with. Kristol and others [peter king for example] just don’t seem to get it. For crying out loud it’s people like peter king who are supposed to prevent these abuses, not allow and encourage them!
No longer are such a number of us willing to allow gov’t to use its “good judgment and discretion” in its governance.
This wave of distrust is not getting smaller.
Mary Matalin allowed James Carville to breed.
I don’t listen to anything she says.
We wouldn’t need the NSA if we barred all Muslims from immigrating or obtaining visas, and if we enforced our immigration laws. Remember, Mohammed Atta and 5 other hijackers were STOPPED with EXPIRED VISAS prior to 9/11. All 5 were RELEASED pending a hearing. Atta didn’t show up. The others killed Americans before their hearing dates. Had Arizona’s SB1070 been in effect in FL, Atta’s immigration status would have been checked and his expired visa discovered.
Byron York you are an elitist Pig period.
Bill Bennett you ought to be ashamed of yourself for challenging the status qou of the Collegiate System as it is, and yet you didn't stick up for this bright kid as he chose a different path with his brillance and made it. Hypocracy alert...
“Kristol didnt buy it. Theyre not allowed to go into that data until they have a warrant signed off on by a judge, he said.”
Elite talking points.
Yep, the reason why EVERY SINGLE GOPe type is giving a “full throated” defense of the NSA, is because it is an absolutely essential component of an open boarders policy.
NO DAMMIT, it is a big deal because of the track record of our imperial president. This isn’t some one off in the war on terror, this is a corrupt administratin pushing a socialist agenda. Why should we trust these folks?
Bill Kristol is a progressive...a stupid, non-thinking, illogical, irrational, progressive...
But I repeat myself...
It’s no wonder that Kristol can’t see things very clearly...he has his head up his @ss!!
The staff folks are remarkably honest and try to do a good job.
This Snowden thing is really helping separate the wheat from the statist chaff.
The IRS scandal is but one symptom of a government gone ammock.
Fact is, the IRS will feed your info to other agencies. Further, the other agencies are creating their own Db’s and they are sharing their information and conclusion.
Hmmmm... there’s that $25 dollar word ‘conflate’ again. Now where have I seen that before?
Bill Gates quit college too, and look what happened to him.
Even someone as dim witted as I cannot help but think, if the regime used the IRS against conservatives for political gain, what is to stop them from using the NSA? Glad Bill has set me straight.
This sort of abuse is the Obama signature...not an aberration.
What went on at the IRS is SOP...that abuse would take an exponential leap forward with access to NSA data.
And not to rant on, but clearly this administration does not consider the enemy of this country to be Islamic terrorists but its own citizens...how can any NSA program NOT go awry with that kind of foundational premise.
They wouldn’t be able to justify domestic spying if our borders were protected and we weren’t importing terrorists.
The government that abused the IRS surely will abuse the NSA.
(Why are we surrounded in the media by so many dimwits?)
“Mary Matalin allowed James Carville to breed.”
And sadly those children got the worst of both parents genetics. Matalin used to bring them to the Sunday News Shows to “show them off.”
Nevermind. Bill would like to apologize. He got conflate mixed up with NeoConFellatio, something he’s been gifting Democrat policy makers for years.
Kristol is a fool...if the shoe was on the other foot, the dems would have already started impeachment procedures.
Obama has no respect for privacy.
Any Republican who does not understand this point needs to be shouted down.
Considering the obvious hatred the GOPe feels for the tea party, its not hard to believe that they would happily use those same agencies against us.
Could it be any clearer? Seriously!
Someone, PLEASE, tell Mr. Kristol to STFU.
M EMORANDUM OF AGREEMENT
T HE D EPARTMENT OF HOMELAND SECURITY
THE DEPARTMENT OF DEFENSE
1. PARTIES. The parties to this Agreement are the Department o f Homeland Security
(DHS) and the Department o f Defense (DoD).
2. AUTHORITY. This Agreement is authorized under the provisions o f the Homeland
Security Act (2002); the Economy Act; U.S. Code Title 10; Executive Order 12333;
National Security Directive 42; Homeland Security Presidential Directive-5; Homeland
Security Presidential Directive-7; and National Security Presidential Directive
54/Homeland Security Presidential Directive-23.
3. PURPOSE. The purpose o f the Agreement is to set forth terms by which DHS and DoD
will provide personnel, equipment, and facilities in order to increase interdepartmental
collaboration in strategic planning for the Nation’s cybersecurity, mutual support for
cybersecurity capabilities development, and synchronization o f current operational
cybersecurity mission activities. Implementing this Agreement w ill focus national
cybersecuri ty efforts, increasing the overal I capacity and capabil i ty o f both DHS’ s
homeland security and D oD’s national security missions, while providing integral
protection for privacy, civil rights, and civil liberties.
4. SCOPE. DoD and DHS agree to collaborate to improve the synchronization and mutual
support o f their respective efforts in support o f U. S. cybersecurity. Departmental
relationships identified in this Agreement are intended to improve the efficiency and
effectiveness o f requirements formulation, and requests for products, services, technical
assistance, coordination,and performance assessment for cybersecurity missions
executed across a variety o f DoD and DHS elements. They do not alter existing DoD and
DHS authorities, command relationships, or privacy, civil liberties, and other oversight
relationships. In establishing a framework to provide mutually beneficial logistical and
operational support, this Agreement is not intended to replicate or aggregate
unnecessarily the diverse line organizations across technology development, operations,
and customer support that collectively execute cybersecurity missions.
A . Department o f Homeland Security.
1) Identify and assign, in coordination with the Departmenf o f Defense, a DHS
Director, Cybersecurity Coordination who will be in the National Protection and
For Open publication 1
OCT 1 3 ZOW
II - S-0/23
Office of Security Review
De artment of Defense
P rograms D irectorate and will be located at the National Security A gency ( NSA)
but will not be in the N SA c hain o f c ommand. T his i ndividual will also act as the
DHS S enior C ybersecurity Representative to U.S. C yber C ommand
2) Receive 0 00 r equests for cybersecurity s uppott a nd c onsider 0 00 r equirements,
as appropriate and consistent with applicable law and DHS m ission r equirements
and authorities, related to operational p lanning a nd m ission c oordination.
3) Identify qualified D HS p ersonnel to perfom1 DHS functions under the sole
supervision and direction o fDHS o flicials as follows:
a. A ssign D HS personnel to w ork at N SA as part o f a J oint C oordination
E lement ( JCE) performing the functions o f joint o perational planning,
coordination, synchronization, r equirement t ranslation, and o ther D HS
m ission s upport f or homeland security for cybersecurity under the direct
supervision o f the Director, Cybersecurity C oordination;
b. A ssign p ersonnel to w ork at the N SA D irectorate o f A cquisition for .
collaborative acquisition and t echnology d evelopment;
c. Assign o r d etail, as appropriate, personnel to w ork at the National Security
A gency/Central S ecurity Services ( NSA/CSS) T hreat O perations C enter
( NTOC) to p romote j oint o perational planning, coordination, synchronization,
r equirement t ranslation, and other DHS m ission suppOl1 for h omeland s ecurity
for cybersecurity; and
d. Assign representatives from the Office o f the General Counsel, Privacy
O ftice, and the Office for Civil Rights and Civil Liberties to s upport t he D HS
D irector, C ybersecurity C oordination, at N SA, a nd coordinate with the 0 00
c ountcrparts identified in p aragraph B.2.d.
4) E nsure t hat D HS p ersonnel have current security clearances (TS/SCI) upon
a ssignment to N SA, i ncluding training on the appropriate handling and
dissemination o f c lassified and sensitive information in a ccordance w ith D oD,
I ntelligence C ommunity and N SA r egulations.
5) Provide funding for DHS mission requirements, salaries, and training unique to
D HS p ersonnel for a ssignments u nder paragraph 5.A.3.
6) Provide appropriate access, administrative support, and space for an N SA
C ryptologic Services G roup ( CSO) a nd a U SCYBERCOM C yber S upport
E lement ( CSE) c ollocated with the National Cybersecurity and C ommunications
I ntegration C enter ( NCCIC), at D HS, a nd integration into D HS’s c ybersecurity
operational activities. D HS \ViII p rovide all necessary D HS e quipment a nd
connectivity to p ermit b oth C SG a nd C SE e ntities the capability to carry o ut their
respective roles and responsibilities.
7) D HS D irector, Cybersecurity Coordination.
a. P rovide r equests for cybersecurity planning, technology, and w here
a ppropriate o ther s upport to N SA a nd U SCYBERCOM a nd a dvocate for s uch
r equests based o n D HS requirements to protect Federal E xecutive b ranch,
n on-DoD, n on-national security systems, and U.S. critical infrastructure and
b. C onvey to and coordinate within D HS a ny N SA a nd U SCYBERCOM
r equests for s upport o r r equirements regarding cybersecurity operations.
c. Participate in a nd lead, as appropriate, j oint p lanning and other processes.
d. P romote and facilitatc strong c ommunications b etween D HS a nd D oD s enior
leadership, including that o f N SA, o n cybersecurity matters o f joint interest,
including engaging in j oint o perational p lanning a nd m ission c oordination.
e. Maintain cognizance o f D HS and, as appropriate, o f D oD, N SA, a nd
U SCYBERCOM c ybersecurity activities, to assist in deconfliction and
p romote s ynchronization o f t hose activities.
f. A ssist in coordinating D oD a nd D HS e fforts to improve cybersecurity threat
information s haring b etween the public and private sectors to aid in
preventing, detecting, mitigating, and/or recovering from the effects o f an
attack, interference, compromise, o r i ncapacitation related to homeland
security and national security activities in cyberspace.
B. Department o f D efense.
1) D irect the Director o fNSA ( DIRNSA) and C ommander, U SCYBERCOM, to
undertake collaborative activities and provide cybersecurity support envisioned in
this a greement and s ubsequent i mplementing a greements.
2) National Security Agency.
a. A ssign a n N SA S ES-equivalent to serve as the N SA lead to the Joint
C oordination E lement (JCE). This N SA o fticial will coordinate and work with
the D HS D irector, Cybersecurity Coordination in carrying out the activities o f
t he J oint Coordination Element. This N SA o fficial will not be in the D HS
c hain o f c ommand, and his OT h er performance ratings will be prepared by
N SA with input from the DHS Director, Cybersecurity Coordination. This
N SA official will supervise and direct all N SA p ersonnel assigned to the JCE.
b. R eceive and coordinate D HS r equests for cybersecurity support and consider
D HS r equirements, as appropriate and consistent with applicable law and
N SA m ission requirements and authorities, in operational planning and
c. Provide appropriate access, facilities, and administrative support (including
necessary e quipment and connectivity) to support the Director, Cybersecurity
Coordination and D HS p ersonnel assigned o r d etailed to the three entities
listed below. N SA will provide all necessary N SA e quipment a nd connectivity
to p ermit D HS p ersonnel with the capability to c arry o ut their roles and
i. N SA D irectorate o f A cquisition
J oint Coordination Element to be located at N SA
N SNCSS T hreat O perations Center
d. I dentify representatives from its Office o f t he General Counsel and Privacy
Office to work with counterparts at 0 00, U SCYBERCOM, a nd D HS to
support the i mplementation o f this Agreement.
e. Collocate a Cryptologic Services G roup at the N CCIC a t D HS, fOT s upport to
and operational synchronization with D HS’s c ybersecurity operations and the
National C yber I ncident Response Plan (NCIRP).
f. A ssign or detail qualified personnel in a ccordance with this A greement b oth
to serve in J CE p ositions and in C SG p ositions as mutually agreed.
g. E ngage with DHS and U SCYBERCOM i njoint o perational planning and
h. P rovide funding for N SA m ission requirements, salaries and training unique
to N SA for personnel identified in B.2.c.
3) U SCYBERCOM.
a. R eceive DHS requests for cybersecurity s upport a nd c onsider D HS
requirements, as appropriate and consistent with applicable l aw a nd
U SCYBERCOM m ission requirements and authorities, in operational
planning and mission coordination.
b. C ollocate a C yber S upport E lement a t the N CCIC at D HS, for support to a nd
operational synchronization with D HS’s c ybersecurity operations and the
c. A ssign qualified personnel to C SE p ositions.
d. As needed to implement this Agreement, provide, on a reimbursable basis,
appropriate access, administrative support and space for DHS personnel.
e. Provide funding for U SCYBERCOM m ission requirements and training
unique to its personnel during the assignment.
f. E ngage with D HS a nd N SA in j oint o perational p lanning a nd mission
C. J oint D oD-DHS.
1) S ynchronize the roles and relationships o f the proposed D oD I ntegrated C yber
C enter (ICC) and the current D BS N ational Cybersecurity and C ommunications
I ntegration Center (NCCIC).
2) D evelop a genda o f a ppropriate supporting actions, including consideration o f t he
establishment o f a J oint Program Office (JPO).
3) Develop j ointly a ppropriate agreements, including necessary funding
mechanisms, to i mplement the objectives and responsibilities o f this Agreement
pursuant to applicable authority.
6. O VERSIGHT. T o oversee the activities described in the p receding p aragraphs, the
Deputy Secretary o f H omeland S ecurity and the Deputy Secretary o f D efense will
conduct monthly oversight meetings suppo11ed by the DHS Deputy U nder S ecretary,
National Protection and Programs Direclorate ( NPPD); t he Principal Deputy U nder
S ecretary o f D efense for Policy and the Director o fNSAlCommander, U SCYBERCOM.
7. P OINTS OF C ONTACT.
P hilip Reitinger James N. Miller
Principal Deputy Under Secretary
Deputy U nder S ecretary
National Protection and o f D efense for Policy
D epartment o f D efense
2100 D efense Pentagon
Department o f H omeland S ecurity
Washington, D C 20528 W ashington, D C 2 0301-2100
(703) 2 3 5 . (703) 6 9 7 .
8. O THER P ROVISlONS. N othing in t his A greement is i ntended to conflict with law,
regulation, Presidential order o r d irective, or the directives o f D HS o r D oD. I f a t erm o f
t his Agreement is inconsistent with such authority, then that term shall be invalid, but the
remaining t erms and conditions o f this Agreement shall remain in full force and effect.
This Agreement shaH be interpreted and implemented in a m anner t hat respects and
complies with (and does not abrogate) the statutory and regulatory responsibilities o f the
Secretary o f H omeland Security and the Secretary o f D efense. T his A greement d oes not
9. E FFECTIVE D ATE. This Agreement is effective upon signature o f b oth parties.
10. M ODIFICATION A ND R EVIEW. T his A greement m ay be modified upon the mutual
written consent o f t he parties. This Agreement will be reviewed b y the parties after o ne
11. T ERMINATION. T he t erms o f this Agreement, as modified with the, consent o f b oth
parties, ,,,,ill r emain in effect untiltem1inated. Either party upon 30 days written notice to
the o ther pm1y m ay t erminate this Agreement.
A PPROVED BY:
Secretary o f D efense
Secretary o f H omeland S ecurity
A distinction without a difference - especially given who the President is.
Crystal is a colossal mistake, but then he works for Rove Media Services, Inc, aka FOX News.
As I recall Alan Keyes campaign workers were also detained by Chicago cops when Keyes stepped in to run against Obama.
What’s the bottom line of that?
God bless Bill Kristol. Praying he supports a new way forward.
DING DING DING DING !!!
WE HAVE A WINNER!
Those who want to be President are doomed to suffer from repetitive stress syndrome!.
See that 'tea pot dome' ~ like in 'tea party' ~ it's not a koinkydink that 'tea' keeps showing up in the foci of the political scandals.
I think that has to do with dimensionality ~ this one would be a dimension that works only at the size and duration of sound waves ~ so when it forces lowest energy pathways doctrines onto sound waves the same old stuff keeps coming out the end no matter what went in at the beginning!
It's like Watergate related events are attracted to Debbie WASSERMAN schulz simply because of the value of the sound of a W, as in whistling in the dark.
I"m looking for some serious resignations.
Like the mistake we would have made by electing anyone but Romney?
Pray for America to Wake Up
Obama would have probably won anyway, open records or not. That was Illinois and there were other witnesses ~ people who attended the same S&M sex club in New York