The Long road back.

And so it begins, after coming out with guns blazing last week, both the Washington Post and the New York Slimes have already started backtracking on their firey rhetoric.

The New Your Slimes… Before…

Within hours of the disclosure that the federal authorities routinely collect data on phone calls Americans make, regardless of whether they have any bearing on a counterterrorism investigation, the Obama administration issued the same platitude it has offered every time President Obama has been caught overreaching in the use of his powers: Terrorists are a real menace and you should just trust us to deal with them because we have internal mechanisms (that we are not going to tell you about) to make sure we do not violate your rights.

Those reassurances have never been persuasive — whether on secret warrants to scoop up a news agency’s phone records or secret orders to kill an American suspected of terrorism — especially coming from a president who once promised transparency and accountability. The administration has now lost all credibility. Mr. Obama is proving the truism that the executive will use any power it is given and very likely abuse it. That is one reason we have long argued that the Patriot Act, enacted in the heat of fear after the 9/11 attacks by members of Congress who mostly had not even read it, was reckless in its assignment of unnecessary and overbroad surveillance powers…

Mr. Obama clearly had no intention of revealing this eavesdropping, just as he would not have acknowledged the killing of Anwar al-Awlaki, an American citizen, had it not been reported in the press. Even then, it took him more than a year and a half to acknowledge the killing, and he is still keeping secret the protocol by which he makes such decisions.

We are not questioning the legality under the Patriot Act of the court order disclosed by The Guardian. But we strongly object to using that power in this manner. It is the very sort of thing against which Mr. Obama once railed, when he said in 2007 that the Bush administration’s surveillance policy “puts forward a false choice between the liberties we cherish and the security we provide.”

And then…

The New York Times edited its damning editorial condemning the Obama administration for collecting phone call data from Americans to make it less stinging shortly after the editorial was published online Thursday afternoon.

The editorial originally declared that the Obama “administration has lost all credibility” as a result of the recently revealed news that the National Security Agency and the Federal Bureau of Investigation have been secretly collecting call data from American users of Verizon under the authority of the Patriot Act.

But hours later the stinging sentence had been modified to read the Obama “administration has now lost all credibility on this issue.” [Emphasis added]

According to, a website which tracks changes to online articles, at 3:34 p.m. ET the editorial damned the Obama administration generally and by 7:09 p.m. ET it had been edited to damn the Obama administration more narrowly over its collection of call data.

NewsDiffs also showed that several other modifications had been made to the editorial, but none as significant as its change to the originally broad condemnation of the Obama administration.

The new version of the article contains no indication that it has been changed.

Then their was the Washington Post… Which went from this.

U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.

The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.

Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.”

To this…

WaPost backtracks on claim tech companies ‘participate knowingly’ in PRISM data collection

The Washington Post published an investigative report uncovering the government-run PRISM program, which allegedly monitored US citizen’s Internet activity illegally, but now the paper is stepping away from its initial claim that nine tech firms knowingly provided data to the government.

Early reports of PRISM left two key allegations unanswered: Did the US government illegally monitor its citizens online, and did the tech companies involved work with authorities complicity. Predictably the government denied the first question. For the second, the initial answer seemed to be yes.

The Post previously claimed that Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL and Apple ”participate knowingly”. The phrase that stood out in the report (it has been repurposed by numerous tech blogs and news sites across the Web) since it suggested that US firms willingly agreed to a process that — at best — could violate the rights of millions in the US if their data is accidentally monitored by the NSA.

Hours after the news broke, and every company bar PalTalk and AOL denied any knowledge of the program and allegations of their involvement, the Post has changed its stance. The phrase ”participate knowingly” has been removed from the article, a new passage suggests the firms were unaware of PRISM:

It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing “collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,” rather than directly to company servers.

This new text, added to the denials from Google, Apple, Microsoft, Yahoo and others, suggests that the NSA did not have direct access to the data systems. That initial suggestion was an assumption that the Post made based on the contents of the leaked slides.

Nonetheless, the paper’s new stance is a huge admission. For one thing, it adds to the growing claim that the agency instead accessed the information indirectly. In such a case, the most likely method would be via ISPs or mobile operators, but that remains unconfirmed.

Coming hot on the heels of another leak, showing that the NSA collected phone records belonging to Verizon customers, it would cast US service providers in a very poor light.

The move is an embarrassing one for the Post, particularly given that its new update appears driven by the responses of the companies, the very same companies that it says it got responses from before publishing its story.

The Post story says that “several companies [that it] contacted” denied knowledge of the program, and “asserted that they responded only to targeted requests for information”, but it cites only quotes from Google and Facebook.

Honestly, we really cannot blame them, both the Washington Post and the New York Slimes are after all charter members of the Fifth Column Treasonous Media. Lying and pushing propaganda is as much in their genetic make-up as ink is in their business model. Simple put, they can no more stop themselves from lying and spreading propaganda then a healthy person can stop breathing.

Once in awhile, totally on accident mind you, they occasionally find themselves engaging in random acts of journalism, which as you can see the moment that they actually notice, they correct. Though the frequency of such acts of random journalism are indeed growing further and further apart, somehow they still manage to take place. The funny (as in ironic, not humorous) part is, that these Fifth Column Treasonous Media bastards still don’t seem to understand that thanks to the internet, when they do accidentally engage in random acts of journalism, those random acts of journalism cannot be buried on page C-22.

This is why these Marxist fellow travelers managed to lose 90 percent of their creditability, why only their fellow travelers and the useless imbeciles actually consider them trustworthy anymore. The internet was designed from the ground up, not as a vehicle for entertainment, but to be a tool for research. Every single function of the internet is grounded upon a technology specifically for the storage, transmission and retrieval of information. It was specifically designed for scientist doing research.

Every single one of your favorite World Wide Web applications is based on a protocol designed to allow scientists to generate, and share data. Yes, really, everything. Buried under layers and layers of protocol and programming are the origins of everything you love about the internet, protocols like Archie, Veronica, Jughead, Gopher, IRC, Wais, whois, and Finger.

What that means is that once something is one the internet, it’s there forever. More importantly, once there, finding it again goes from trying to find a single article hidden on page C-22, to a few words typed into Bing, Yahoo or Google. When everything you write is just a few keystrokes away, the walk back on anything that you have published becomes a very long walk.

When you have sold your soul to the devil and embraced the Marxist political moral and ethical standard that “The End Justifies the Means” that walk back not only get longer, it goes right straight through the gates of Hell. Because every single lie, distortion, obfuscation and omission, all of the political rationalizations and propaganda are right there at your heels, biting you in your ass.

So, yea, those of us watching knew that the Washington Post and the New York Slimes would eventually walk back their stories, it was only a question of how long it would take. It was just a few days ago that I wrote this story, wherein I mocked propaganda meisters from both the New York Slimes and the Washington Post because they were wailing and gnashing their teeth over the loss respect and prestige.

Hell hath no fury…

How much longer will the Fifth Column Treasonous Media faithful like Frank Bruni and Chris Cillizza continue casting about desperately, frantically attempting to find a scapegoat to blame for the destruction of their industry? One can only speculate, but I honestly and profoundly doubt that anyone in the Fifth Column Treasonous Media is going to be having an epiphany or suddenly need to clear their conscious any time soon.

The wailing, gnashing of teeth, crying and blaming any and everyone else for their woes will continue for quite some time because, quite honestly, these tools lack the intelligence, integrity or capacity for honest self introspection necessary for them to understand why the American People would rather have a child molester or starving cannibal renting a room in their house from them then one of their ilk.

This is it guys, this is a perfect example of why you are becoming social pariah’s, because you keep lying, and you keep getting caught, and they you try lying your way out of having been caught. Everyone knows that you are Marxist Fellow Travelers, Obamanation Administration sycophants. You cannot redeem your souls with the occasional accidental random act of journalism, which you instantly attempt to redact.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s