Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Bill Kristol On Fox News: 'Republicans Are Making A Huge Mistake' Conflating IRS And NSA Scandals
Mediaite ^ | June 9, 2013 | Evan McMurry

Posted on 06/10/2013 9:57:12 AM PDT by EveningStar

On Fox News Sunday, Weekly Standard Editor Bill Kristol cautioned against conflating the various Obama scandals with the new revelations of NSA surveillance.

"Conservatives and Republicans are making a huge mistake," Kristol predicted.

(Excerpt) Read more at mediaite.com ...


TOPICS: Government; News/Current Events
KEYWORDS: billkristol; evanmcmurry; foxnews; foxnewssunday; irs; kristol; marymatalin; matalin; mediaite; nsa; obamascandals; sleepingwiththeenemy; turncoat; weeklystandard
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-104 next last
To: EveningStar

This Snowden thing is really helping separate the wheat from the statist chaff.


21 posted on 06/10/2013 10:06:29 AM PDT by skeeter
[ Post Reply | Private Reply | To 1 | View Replies]

To: EveningStar

Bill:
Uhm no.

The IRS scandal is but one symptom of a government gone ammock.

Fact is, the IRS will feed your info to other agencies. Further, the other agencies are creating their own Db’s and they are sharing their information and conclusion.


22 posted on 06/10/2013 10:06:43 AM PDT by Vendome (Don't take life so seriously, you won't live through it anyway)
[ Post Reply | Private Reply | To 1 | View Replies]

To: EveningStar

Hmmmm... there’s that $25 dollar word ‘conflate’ again. Now where have I seen that before?


23 posted on 06/10/2013 10:07:02 AM PDT by Timber Rattler (Just say NO! to RINOS and the GOP-E)
[ Post Reply | Private Reply | To 1 | View Replies]

To: taildragger

Bill Gates quit college too, and look what happened to him.


24 posted on 06/10/2013 10:07:13 AM PDT by stockpirate (F. Douglass, "A man's rights rest in three boxes: ballot box, jury box, and ammo box)
[ Post Reply | Private Reply | To 13 | View Replies]

To: PieterCasparzen
Quick, oligarchs, get Michael Moore to side with the leaker.

Done
25 posted on 06/10/2013 10:07:16 AM PDT by Lucky9teen (Peace is that brief glorious moment in history when everybody stands around reloading.~Thomas Jeffer)
[ Post Reply | Private Reply | To 9 | View Replies]

To: EveningStar

Even someone as dim witted as I cannot help but think, if the regime used the IRS against conservatives for political gain, what is to stop them from using the NSA? Glad Bill has set me straight.


26 posted on 06/10/2013 10:07:41 AM PDT by JimSEA
[ Post Reply | Private Reply | To 1 | View Replies]

To: EveningStar
I am very curious why so many inside the beltway normally sensible folks don't see that potential for dangerous abuse by a clearly corrupt administration.

This sort of abuse is the Obama signature...not an aberration.

What went on at the IRS is SOP...that abuse would take an exponential leap forward with access to NSA data.

And not to rant on, but clearly this administration does not consider the enemy of this country to be Islamic terrorists but its own citizens...how can any NSA program NOT go awry with that kind of foundational premise.

27 posted on 06/10/2013 10:07:53 AM PDT by RoosterRedux (Obama is scum. Anyone in Congress who doesn't see that can be counted among the enemy!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SecondAmendment

They wouldn’t be able to justify domestic spying if our borders were protected and we weren’t importing terrorists.


28 posted on 06/10/2013 10:08:01 AM PDT by cripplecreek (REMEMBER THE RIVER RAISIN!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: EveningStar
Hey RINO Bill, I'll make it real simple for you.

The government that abused the IRS surely will abuse the NSA.

(Why are we surrounded in the media by so many dimwits?)

29 posted on 06/10/2013 10:08:48 AM PDT by FreeReign
[ Post Reply | Private Reply | To 1 | View Replies]

To: exit82

“Mary Matalin allowed James Carville to breed.”

And sadly those children got the worst of both parents genetics. Matalin used to bring them to the Sunday News Shows to “show them off.”


30 posted on 06/10/2013 10:08:51 AM PDT by vette6387
[ Post Reply | Private Reply | To 11 | View Replies]

To: EveningStar

Nevermind. Bill would like to apologize. He got conflate mixed up with NeoConFellatio, something he’s been gifting Democrat policy makers for years.


31 posted on 06/10/2013 10:09:20 AM PDT by DoughtyOne (Obama lied, four men died, and he went to hide...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: EveningStar

Kristol is a fool...if the shoe was on the other foot, the dems would have already started impeachment procedures.


32 posted on 06/10/2013 10:09:46 AM PDT by PoloSec ( Believe the Gospel: how that Christ died for our sins, was buried and rose again)
[ Post Reply | Private Reply | To 1 | View Replies]

To: EveningStar; All
Obama won his U.S. Senate seat by getting a Judge to OPEN or unseal confidential divorce records of his Republican opponent.

Obama has no respect for privacy.

Any Republican who does not understand this point needs to be shouted down.

33 posted on 06/10/2013 10:09:54 AM PDT by Kansas58
[ Post Reply | Private Reply | To 1 | View Replies]

To: JimSEA

Considering the obvious hatred the GOPe feels for the tea party, its not hard to believe that they would happily use those same agencies against us.


34 posted on 06/10/2013 10:10:12 AM PDT by cripplecreek (REMEMBER THE RIVER RAISIN!)
[ Post Reply | Private Reply | To 26 | View Replies]

To: cripplecreek
...importing terrorists...

Could it be any clearer? Seriously!

35 posted on 06/10/2013 10:10:46 AM PDT by DoughtyOne (Obama lied, four men died, and he went to hide...)
[ Post Reply | Private Reply | To 28 | View Replies]

To: EveningStar

Someone, PLEASE, tell Mr. Kristol to STFU.


36 posted on 06/10/2013 10:11:05 AM PDT by Cletus.D.Yokel (Catastrophic Anthropogenic Climate Alteration: The acronym explains the science.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: RoosterRedux

M EMORANDUM OF AGREEMENT
B ETWEEN
T HE D EPARTMENT OF HOMELAND SECURITY
AND
THE DEPARTMENT OF DEFENSE
REGARDING CYBERSECURITY
1. PARTIES. The parties to this Agreement are the Department o f Homeland Security
(DHS) and the Department o f Defense (DoD).
2. AUTHORITY. This Agreement is authorized under the provisions o f the Homeland
Security Act (2002); the Economy Act; U.S. Code Title 10; Executive Order 12333;
National Security Directive 42; Homeland Security Presidential Directive-5; Homeland
Security Presidential Directive-7; and National Security Presidential Directive­
54/Homeland Security Presidential Directive-23.
3. PURPOSE. The purpose o f the Agreement is to set forth terms by which DHS and DoD
will provide personnel, equipment, and facilities in order to increase interdepartmental
collaboration in strategic planning for the Nation’s cybersecurity, mutual support for
cybersecurity capabilities development, and synchronization o f current operational
cybersecurity mission activities. Implementing this Agreement w ill focus national
cybersecuri ty efforts, increasing the overal I capacity and capabil i ty o f both DHS’ s
homeland security and D oD’s national security missions, while providing integral
protection for privacy, civil rights, and civil liberties.
4. SCOPE. DoD and DHS agree to collaborate to improve the synchronization and mutual
support o f their respective efforts in support o f U. S. cybersecurity. Departmental
relationships identified in this Agreement are intended to improve the efficiency and
effectiveness o f requirements formulation, and requests for products, services, technical
assistance, coordination,and performance assessment for cybersecurity missions
executed across a variety o f DoD and DHS elements. They do not alter existing DoD and
DHS authorities, command relationships, or privacy, civil liberties, and other oversight
relationships. In establishing a framework to provide mutually beneficial logistical and
operational support, this Agreement is not intended to replicate or aggregate
unnecessarily the diverse line organizations across technology development, operations,
and customer support that collectively execute cybersecurity missions.
5. RESPONSIBILITIES.
A . Department o f Homeland Security.
1) Identify and assign, in coordination with the Departmenf o f Defense, a DHS
Director, Cybersecurity Coordination who will be in the National Protection and
CLEARED
For Open publication 1
10
OCT 1 3 ZOW
II - S-0/23
Office of Security Review
De artment of Defense
P rograms D irectorate and will be located at the National Security A gency ( NSA)
but will not be in the N SA c hain o f c ommand. T his i ndividual will also act as the
DHS S enior C ybersecurity Representative to U.S. C yber C ommand
( USCYBERCOM).
2) Receive 0 00 r equests for cybersecurity s uppott a nd c onsider 0 00 r equirements,
as appropriate and consistent with applicable law and DHS m ission r equirements
and authorities, related to operational p lanning a nd m ission c oordination.
3) Identify qualified D HS p ersonnel to perfom1 DHS functions under the sole
supervision and direction o fDHS o flicials as follows:
a. A ssign D HS personnel to w ork at N SA as part o f a J oint C oordination
E lement ( JCE) performing the functions o f joint o perational planning,
coordination, synchronization, r equirement t ranslation, and o ther D HS
m ission s upport f or homeland security for cybersecurity under the direct
supervision o f the Director, Cybersecurity C oordination;
b. A ssign p ersonnel to w ork at the N SA D irectorate o f A cquisition for .

collaborative acquisition and t echnology d evelopment;

c. Assign o r d etail, as appropriate, personnel to w ork at the National Security
A gency/Central S ecurity Services ( NSA/CSS) T hreat O perations C enter
( NTOC) to p romote j oint o perational planning, coordination, synchronization,
r equirement t ranslation, and other DHS m ission suppOl1 for h omeland s ecurity
for cybersecurity; and
d. Assign representatives from the Office o f the General Counsel, Privacy
O ftice, and the Office for Civil Rights and Civil Liberties to s upport t he D HS
D irector, C ybersecurity C oordination, at N SA, a nd coordinate with the 0 00
c ountcrparts identified in p aragraph B.2.d.
4) E nsure t hat D HS p ersonnel have current security clearances (TS/SCI) upon
a ssignment to N SA, i ncluding training on the appropriate handling and
dissemination o f c lassified and sensitive information in a ccordance w ith D oD,
I ntelligence C ommunity and N SA r egulations.
5) Provide funding for DHS mission requirements, salaries, and training unique to
D HS p ersonnel for a ssignments u nder paragraph 5.A.3.
6) Provide appropriate access, administrative support, and space for an N SA
C ryptologic Services G roup ( CSO) a nd a U SCYBERCOM C yber S upport
E lement ( CSE) c ollocated with the National Cybersecurity and C ommunications
I ntegration C enter ( NCCIC), at D HS, a nd integration into D HS’s c ybersecurity
operational activities. D HS \ViII p rovide all necessary D HS e quipment a nd
connectivity to p ermit b oth C SG a nd C SE e ntities the capability to carry o ut their
respective roles and responsibilities.
7) D HS D irector, Cybersecurity Coordination.
a. P rovide r equests for cybersecurity planning, technology, and w here
a ppropriate o ther s upport to N SA a nd U SCYBERCOM a nd a dvocate for s uch
r equests based o n D HS requirements to protect Federal E xecutive b ranch,
n on-DoD, n on-national security systems, and U.S. critical infrastructure and
key resources.
b. C onvey to and coordinate within D HS a ny N SA a nd U SCYBERCOM
r equests for s upport o r r equirements regarding cybersecurity operations.
2
c. Participate in a nd lead, as appropriate, j oint p lanning and other processes.
d. P romote and facilitatc strong c ommunications b etween D HS a nd D oD s enior
leadership, including that o f N SA, o n cybersecurity matters o f joint interest,
including engaging in j oint o perational p lanning a nd m ission c oordination.
e. Maintain cognizance o f D HS and, as appropriate, o f D oD, N SA, a nd
U SCYBERCOM c ybersecurity activities, to assist in deconfliction and
p romote s ynchronization o f t hose activities.
f. A ssist in coordinating D oD a nd D HS e fforts to improve cybersecurity threat
information s haring b etween the public and private sectors to aid in
preventing, detecting, mitigating, and/or recovering from the effects o f an
attack, interference, compromise, o r i ncapacitation related to homeland
security and national security activities in cyberspace.
B. Department o f D efense.
1) D irect the Director o fNSA ( DIRNSA) and C ommander, U SCYBERCOM, to
undertake collaborative activities and provide cybersecurity support envisioned in
this a greement and s ubsequent i mplementing a greements.
2) National Security Agency.
a. A ssign a n N SA S ES-equivalent to serve as the N SA lead to the Joint
C oordination E lement (JCE). This N SA o fticial will coordinate and work with
the D HS D irector, Cybersecurity Coordination in carrying out the activities o f
t he J oint Coordination Element. This N SA o fficial will not be in the D HS
c hain o f c ommand, and his OT h er performance ratings will be prepared by
N SA with input from the DHS Director, Cybersecurity Coordination. This
N SA official will supervise and direct all N SA p ersonnel assigned to the JCE.
b. R eceive and coordinate D HS r equests for cybersecurity support and consider
D HS r equirements, as appropriate and consistent with applicable law and
N SA m ission requirements and authorities, in operational planning and
mission coordination.
c. Provide appropriate access, facilities, and administrative support (including
necessary e quipment and connectivity) to support the Director, Cybersecurity
Coordination and D HS p ersonnel assigned o r d etailed to the three entities
listed below. N SA will provide all necessary N SA e quipment a nd connectivity
to p ermit D HS p ersonnel with the capability to c arry o ut their roles and
responsibilities.
i. N SA D irectorate o f A cquisition
J oint Coordination Element to be located at N SA
11.
N SNCSS T hreat O perations Center
111.
d. I dentify representatives from its Office o f t he General Counsel and Privacy
Office to work with counterparts at 0 00, U SCYBERCOM, a nd D HS to
support the i mplementation o f this Agreement.
e. Collocate a Cryptologic Services G roup at the N CCIC a t D HS, fOT s upport to
and operational synchronization with D HS’s c ybersecurity operations and the
National C yber I ncident Response Plan (NCIRP).
f. A ssign or detail qualified personnel in a ccordance with this A greement b oth
to serve in J CE p ositions and in C SG p ositions as mutually agreed.
3
g. E ngage with DHS and U SCYBERCOM i njoint o perational planning and
mission coordination.
h. P rovide funding for N SA m ission requirements, salaries and training unique
to N SA for personnel identified in B.2.c.

3) U SCYBERCOM.

a. R eceive DHS requests for cybersecurity s upport a nd c onsider D HS
requirements, as appropriate and consistent with applicable l aw a nd
U SCYBERCOM m ission requirements and authorities, in operational
planning and mission coordination.
b. C ollocate a C yber S upport E lement a t the N CCIC at D HS, for support to a nd
operational synchronization with D HS’s c ybersecurity operations and the
N CIRP.
c. A ssign qualified personnel to C SE p ositions.
d. As needed to implement this Agreement, provide, on a reimbursable basis,
appropriate access, administrative support and space for DHS personnel.
e. Provide funding for U SCYBERCOM m ission requirements and training
unique to its personnel during the assignment.
f. E ngage with D HS a nd N SA in j oint o perational p lanning a nd mission
coordination.
C. J oint D oD-DHS.
1) S ynchronize the roles and relationships o f the proposed D oD I ntegrated C yber
C enter (ICC) and the current D BS N ational Cybersecurity and C ommunications
I ntegration Center (NCCIC).
2) D evelop a genda o f a ppropriate supporting actions, including consideration o f t he
establishment o f a J oint Program Office (JPO).
3) Develop j ointly a ppropriate agreements, including necessary funding
mechanisms, to i mplement the objectives and responsibilities o f this Agreement
pursuant to applicable authority.
6. O VERSIGHT. T o oversee the activities described in the p receding p aragraphs, the
Deputy Secretary o f H omeland S ecurity and the Deputy Secretary o f D efense will
conduct monthly oversight meetings suppo11ed by the DHS Deputy U nder S ecretary,
National Protection and Programs Direclorate ( NPPD); t he Principal Deputy U nder
S ecretary o f D efense for Policy and the Director o fNSAlCommander, U SCYBERCOM.
7. P OINTS OF C ONTACT.
P hilip Reitinger James N. Miller
Principal Deputy Under Secretary
Deputy U nder S ecretary
National Protection and o f D efense for Policy
D epartment o f D efense
Programs Direclorate
2100 D efense Pentagon
Department o f H omeland S ecurity
Washington, D C 20528 W ashington, D C 2 0301-2100
(703) 2 3 5 . (703) 6 9 7 .
4
8. O THER P ROVISlONS. N othing in t his A greement is i ntended to conflict with law,
regulation, Presidential order o r d irective, or the directives o f D HS o r D oD. I f a t erm o f
t his Agreement is inconsistent with such authority, then that term shall be invalid, but the
remaining t erms and conditions o f this Agreement shall remain in full force and effect.
This Agreement shaH be interpreted and implemented in a m anner t hat respects and
complies with (and does not abrogate) the statutory and regulatory responsibilities o f the
Secretary o f H omeland Security and the Secretary o f D efense. T his A greement d oes not
obligate funds.
9. E FFECTIVE D ATE. This Agreement is effective upon signature o f b oth parties.
10. M ODIFICATION A ND R EVIEW. T his A greement m ay be modified upon the mutual
written consent o f t he parties. This Agreement will be reviewed b y the parties after o ne
year.
11. T ERMINATION. T he t erms o f this Agreement, as modified with the, consent o f b oth
parties, ,,,,ill r emain in effect untiltem1inated. Either party upon 30 days written notice to
the o ther pm1y m ay t erminate this Agreement.
A PPROVED BY:
Robert Gates
Janet Napolitano
Secretary o f D efense
Secretary o f H omeland S ecurity
5


37 posted on 06/10/2013 10:11:07 AM PDT by PieterCasparzen (We have to fix things ourselves)
[ Post Reply | Private Reply | To 27 | View Replies]

To: EveningStar
“National security is different from internal matters of the government,” Kristol said. “We’re dealing with foreign threats here.”

A distinction without a difference - especially given who the President is.

38 posted on 06/10/2013 10:12:06 AM PDT by Mr. Jeeves (CTRL-GALT-DELETE)
[ Post Reply | Private Reply | To 1 | View Replies]

To: peyton randolph

Crystal is a colossal mistake, but then he works for Rove Media Services, Inc, aka FOX News.


39 posted on 06/10/2013 10:12:11 AM PDT by ZULU ((See: http://gatesofvienna.net/))
[ Post Reply | Private Reply | To 2 | View Replies]

To: EveningStar
Ha! He's for Obama’s snooping. He won't defend the 4th Amendment. Probably enjoyed the Tea Party being investigated by Obama’s IRS. Why do people follow this logic. He's what is wrong with the insiders/look what the Patriot Act has become/snooping and they must be trusted not to use that data against anyone of us. He should be pushing back on this abuse and out of control Obama.
40 posted on 06/10/2013 10:12:19 AM PDT by Christie at the beach
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-104 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson