TwitterFacebook

Bush Strikes Back

• Views: 1,028

At the Corner, Byron York has posted the text of President Bush’s radio address, directly responding to the latest incident of New York Times perfidy:

In the weeks following the terrorist attacks on our nation, I authorized the National Security Agency, consistent with U.S. law and the Constitution, to intercept the international communications of people with known links to al Qaeda and related terrorist organizations. Before we intercept these communications, the government must have information that establishes a clear link to these terrorist networks.

This is a highly classified program that is crucial to our national security. Its purpose is to detect and prevent terrorist attacks against the United States, our friends and allies. Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk. Revealing classified information is illegal, alerts our enemies, and endangers our country.

As the 9/11 Commission pointed out, it was clear that terrorists inside the United States were communicating with terrorists abroad before the September the 11th attacks, and the commission criticized our nation’s inability to uncover links between terrorists here at home and terrorists abroad. Two of the terrorist hijackers who flew a jet into the Pentagon, Nawaf al Hamzi and Khalid al Mihdhar, communicated while they were in the United States to other members of al Qaeda who were overseas. But we didn’t know they were here, until it was too late.

The authorization I gave the National Security Agency after September the 11th helped address that problem in a way that is fully consistent with my constitutional responsibilities and authorities. The activities I have authorized make it more likely that killers like these 9/11 hijackers will be identified and located in time. And the activities conducted under this authorization have helped detect and prevent possible terrorist attacks in the United States and abroad.

The activities I authorized are reviewed approximately every 45 days. Each review is based on a fresh intelligence assessment of terrorist threats to the continuity of our government and the threat of catastrophic damage to our homeland. During each assessment, previous activities under the authorization are reviewed. The review includes approval by our nation’s top legal officials, including the Attorney General and the Counsel to the President. I have reauthorized this program more than 30 times since the September the 11th attacks, and I intend to do so for as long as our nation faces a continuing threat from al Qaeda and related groups.

The NSA’s activities under this authorization are thoroughly reviewed by the Justice Department and NSA’s top legal officials, including NSA’s general counsel and inspector general. Leaders in Congress have been briefed more than a dozen times on this authorization and the activities conducted under it. Intelligence officials involved in this activity also receive extensive training to ensure they perform their duties consistent with the letter and intent of the authorization.

This authorization is a vital tool in our war against the terrorists. It is critical to saving American lives. The American people expect me to do everything in my power under our laws and Constitution to protect them and their civil liberties. And that is exactly what I will continue to do, so long as I’m the President of the United States.

^ back to top ^

TwitterFacebook

Turn off all ads for a full year by subscribing!
For about 33 cents a day (per month) or 22 cents a day (per year), our subscription option turns off all advertisements at LGF!
Read more...

► LGF Headlines

  • Loading...

► Tweeted Articles

  • Loading...

► Tweeted Pages

  • Loading...

► Top 10 Comments

  • Loading...

► Bottom Comments

  • Loading...

► Recent Comments

  • Loading...

► Tools/Info

► Tag Cloud

► Contact

You must have Javascript enabled to use the contact form.
Your email:

Subject:

Message:


Messages may be published unless you request otherwise.
Tech Note:
Using the Contact Form
LGF Pages

This button leads to the main index of LGF Pages, our user-submitted articles. You can post your own LGF Pages simply by registering a free account with us.

Create a Page

This is the LGF Pages posting bookmarklet. To use it, drag this button to your browser's bookmark bar, and title it 'LGF Pages' (or whatever you like). Then browse to a site you want to post, select some text on the page to use for a quote, click the bookmarklet, and the Pages posting window will appear with the title, text, and any embedded video or audio files already filled in, ready to go.

Or... you can just click this button to open the Pages posting window right away.

Last updated: 2014-03-07 2:19 pm PST

LGF User's Guide
Recent Pages
Rightwingconspirator
An Insightful and Human View Of Why To Disdain The NFL
I ran across this and just had to share a clip. I have been a frequent critic of the NFL for quite a long time now much to some friends slight dismay. We throw an anti super owl party every ...

1 hour, 1 minute ago
Views: 77 • Comments: 0
Tweets: 1 • Rating: 0
FemNaziBitch
This Is What an Abortion Looks Like -NYT
This is how it really is, abortion: You do things you regret or don't understand and then you make other choices because life keeps going forward. Or you do something out of love and then, through biology or accident, ...

5 hours, 28 minutes ago
Views: 106 • Comments: 0
Tweets: 0 • Rating: 1
Randall Gross
Looking for the Key to Security in the Internet of Things
As the number of Internet connected-devices in any home skyrockets from a few, to a few dozen, to perhaps even a few hundred--including interconnecting thermostats, appliances, health and fitness monitors and personal accessories like smart watches--security concerns for this ...

6 hours, 33 minutes ago
Views: 80 • Comments: 0
Tweets: 0 • Rating: 0
Lumberhead
Angry Letters to the One Member of Congress Who Voted Against the War on Terror - the Atlantic
My first attempt at a page - so here we go: The article is a little long but well worth while. I found it to be nicely balanced with interesting excerpts from supporters as well as detractors. Barbara Lee was ...

23 hours, 10 minutes ago
Views: 239 • Comments: 2
Tweets: 1 • Rating: 5
The War TARDIS
Doctor Who “Listen” Open Thread
I'm back. Last week, I couldn't do this thread, as something more important was going on. One of my best friends, a sweet, and very devout Christian, is going to the UK to help a Christian Group in Oxford, and ...

2 days, 21 hours ago
Views: 251 • Comments: 41
Tweets: 0 • Rating: 2
Slap
For guitar fans…
I suppose one needs to be a guitar freak of a certain age to recognize both of these guys. Gabrels' work might be familiar to fans of Bowie/Tin Machine. Nelson's work? I believe him to be one of the most ...

4 days, 2 hours ago
Views: 275 • Comments: 2
Tweets: 0 • Rating: 1
GlutenFreeJesus
Check your gmail accounts!
Here's the link to the tool. One of mine was on that list, so I changed the password. Good luck! isleaked.com

5 days, 18 hours ago
Views: 501 • Comments: 2
Tweets: 0 • Rating: 7
I Stand With Big Sodomy!
French speaking tourists wanted for luring, kicking squirrel into Grand Canyon
Needless to say the little guy didn't make it. The tourists are described as two French-speaking men, wearing only cowboy hats and boxer shorts. Story

5 days, 23 hours ago
Views: 626 • Comments: 6
Tweets: 1 • Rating: 5
CriticalDragon1177
Ars Technica - Tasmanian depths may have been hiding unknown animal phylum
As John Timmer at Ars Technica points out, we may have found not only a new species, but a brand new type of animal! This is big news for the science of biology, and zoology in particular! Over the past ...

6 days, 21 hours ago
Views: 438 • Comments: 2
Tweets: 3 • Rating: 0
danarchy
Mysterious Phony Cell Towers Could Be Intercepting Your Calls
Weird stuff. Interceptors vary widely in expense and sophistication - but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. Whether your phone uses Android or iOS, it ...

6 days, 23 hours ago
Views: 338 • Comments: 0
Tweets: 0 • Rating: 3
 Frank says:

Get yer ass out there and register to VOTE!