Media Search:



The Scandalous History of the Last Rotor Cipher Machine – IEEE Spectrum

Growing up in New York City, I always wanted to be a spy. But when I graduated from college in January 1968, the Cold War and Vietnam War were raging, and spying seemed like a risky career choice. So I became an electrical engineer, working on real-time spectrum analyzers for a U.S. defense contractor.

In 1976, during a visit to the Polish Army Museum in Warsaw, I saw an Enigma, the famous German World War II cipher machine. I was fascinated. Some years later, I had the good fortune of visiting the huge headquarters of the cipher machine company Crypto AG (CAG), in Steinhausen, Switzerland, and befriending a high-level cryptographer there. My friend gave me an internal history of the company written by its founder, Boris Hagelin. It mentioned a 1963 cipher machine, the HX-63.

Like the Enigma, the HX-63 was an electromechanical cipher system known as a rotor machine. It was the only electromechanical rotor machine ever built by CAG, and it was much more advanced and secure than even the famous Enigmas. In fact, it was arguably the most secure rotor machine ever built. I longed to get my hands on one, but I doubted I ever would.

Fast forward to 2010. I'm in a dingy third subbasement at a French military communications base. Accompanied by two-star generals and communications officers, I enter a secured room filled with ancient military radios and cipher machines. Voil! I am amazed to see a Crypto AG HX-63, unrecognized for decades and consigned to a dusty, dimly lit shelf.

I carefully extract the 16-kilogram (35-pound) machine. There's a hand crank on the right side, enabling the machine to operate away from mains power. As I cautiously turn it, while typing on the mechanical keyboard, the nine rotors advance, and embossed printing wheels feebly strike a paper tape. I decided on the spot to do everything in my power to find an HX-63 that I could restore to working order.

If you've never heard of the HX-63 until just now, don't feel bad. Most professional cryptographers have never heard of it. Yet it was so secure that its invention alarmed William Friedman, one of the greatest cryptanalysts ever and, in the early 1950s, the first chief cryptologist of the U.S. National Security Agency (NSA). After reading a 1957 Hagelin patent (more on that later), Friedman realized that the HX-63, then under development, was, if anything, more secure than the NSA's own KL-7, then considered unbreakable. During the Cold War, the NSA built thousands of KL-7s, which were used by every U.S. military, diplomatic, and intelligence agency from 1952 to 1968.

The reasons for Friedman's anxiety are easy enough to understand. The HX-63 had about 10600 possible key combinations; in modern terms, that's equivalent to a 2,000-bit binary key. For comparison, the Advanced Encryption Standard, which is used today to protect sensitive information in government, banking, and many other sectors, typically uses a 128- or a 256-bit key.

In the center of the cast-aluminum base of the HX-63 cipher machine is a precision Swiss-made direct-current gear motor. Also visible is the power supply [lower right] and the function switch [left], which is used to select the operating modefor example, encryption or decryption.Peter Adams

A total of 12 different rotors are available for the HX-63, of which nine are used at any one time. Current flows into one of 41 gold-plated contacts on the smaller-diameter side of the rotor, through a conductor inside the rotor, out through a gold-plated contact on the other side, and then into the next rotor. The incrementing of each rotor is programmed by setting pins, which are just visible in the horizontal rotor.Peter Adams

Just as worrisome was that CAG was a privately owned Swiss company, selling to any government, business, or individual. At the NSA, Friedman's job was to ensure that the U.S. government had access to the sensitive, encrypted communications of all governments and threats worldwide. But traffic encrypted by the HX-63 would be unbreakable.

Friedman and Hagelin were good friends. During World War II, Friedman had helped make Hagelin a very wealthy man by suggesting changes to one of Hagelin's cipher machines, which paved the way for the U.S. Army to license Hagelin's patents. The resulting machine, the M-209-B, became a workhorse during the war, with some 140,000 units fielded. During the 1950s, Friedman and Hagelin's close relationship led to a series of understandings collectively known as a gentleman's agreement" between U.S. intelligence and the Swiss company. Hagelin agreed not to sell his most secure machines to countries specified by U.S. intelligence, which also got secret access to Crypto's machines, plans, sales records, and other data.

But in 1963, CAG started to market the HX-63, and Friedman became even more alarmed. He convinced Hagelin not to manufacture the new device, even though the machine had taken more than a decade to design and only about 15 had been built, most of them for the French army. However, 1963 was an interesting year in cryptography. Machine encryption was approaching a crossroads; it was starting to become clear that the future belonged to electronic encipherment. Even a great rotor machine like the HX-63 would soon be obsolete.

That was a challenge for CAG, which had never built an electronic cipher machine. Perhaps partly because of this, in 1966, the relationship among CAG, the NSA, and the CIA went to the next level. That year, the NSA delivered to its Swiss partner an electronic enciphering system that became the basis of a CAG machine called the H-460. Introduced in 1970, the machine was a failure. However, there were bigger changes afoot at CAG: That same year, the CIA and the German Federal Intelligence Service secretly acquired CAG for US $5.75 million. (Also in 1970, Hagelin's son Bo, who was the company's sales manager for the Americas and who had opposed the transaction, died in a car crash near Washington, D.C.)

Although the H-460 was a failure, it was succeeded by a machine called the H-4605, of which thousands were sold. The H-4605 was designed with NSA assistance. To generate random numbers, it used multiple shift registers based on the then-emerging technology of CMOS electronics. These numbers were not true random numbers, which never repeat, but rather pseudorandom numbers, which are generated by a mathematical algorithm from an initial seed."

This mathematical algorithm was created by the NSA, which could therefore decrypt any messages enciphered by the machine. In common parlance, the machines were backdoored." This was the start of a new era for CAG. From then on, its electronic machines, such as the HC-500 series, were secretly designed by the NSA, sometimes with the help of corporate partners such as Motorola. This U.S.-Swiss operation was code-named Rubicon. The backdooring of all CAG machines continued until 2018, when the company was liquidated.

Parts of this story emerged in leaks by CAG employees before 2018 and, especially, in a subsequent investigation by the Washington Post and a pair of European broadcasters, Zweites Deutsches Fernsehen, in Germany, and Schweizer Radio und Fernsehen, in Switzerland. The Post's article, published on 11 February 2020, touched off firestorms in the fields of cryptology, information security, and intelligence.

The revelations badly damaged the Swiss reputation for discretion and dependability. They triggered civil and criminal litigation and an investigation by the Swiss government and, just this past May, led to the resignation of the Swiss intelligence chief Jean-Philippe Gaudin, who had fallen out with the defense minister over how the revelations had been handled. In fact, there's an interesting parallel to our modern era, in which backdoors are increasingly common and the FBI and other U.S. intelligence and law-enforcement agencies sporadically tussle with smartphone manufacturers over access to encrypted data on the phones.

Even before these revelations, I was deeply fascinated by the HX-63, the last of the great rotor machines. So I could scarcely believe my good fortune in 2020 when, after years of negotiations, I took possession of an HX-63 for my research for the Association des Rservistes du Chiffre et de la Scurit de l'Information, a Paris-based professional organization of cryptographers and information-security specialists. This particular unit, different from the one I had seen a decade before, had been untouched since 1963. I immediately began to plan the restoration of this historically resonant machine.

People have been using codes and ciphers to protect sensitive information for a couple of thousand years. The first ciphers were based on hand calculations and tables. In 1467, a mechanical device that became known as the Alberti cipher wheel was introduced. Then, just after World War I, an enormous breakthrough occurred, one of the greatest in cryptographic history: Edward Hebern in the United States, Hugo Koch in the Netherlands, and Arthur Scherbius in Germany, within months of one another, patented electromechanical machines that used rotors to encipher messages. Thus began the era of the rotor machine. Scherbius's machine became the basis for the famous Enigma used by the German military from the 1930s until the end of WW II.

To understand how a rotor machine works, first recall the basic goal of cryptography: substituting each of the letters in a message, called plaintext, with other letters in order to produce an unreadable message, called ciphertext. It's not enough to make the same substitution every timereplacing every F with a Q, for example, and every K with an H. Such a monoalphabetic cipher would be easily solved.

A rotor machine gets around that problem usingyou guessed itrotors. Start with a round disk that's roughly the diameter of a hockey puck, but thinner. On both sides of the disk, spaced evenly around the edge, are 26 metal contacts, each corresponding to a letter of the English alphabet. Inside the disk are wires connecting a contact on one side of the disk to a different one on the other side. The disk is connected electrically to a typewriter-like keyboard. When a user hits a key on the keyboard, say W, electric current flows to the W position on one side of the rotor. The current goes through a wire in the rotor and comes out at another position, say L. However, after that keystroke, the rotor rotates one or more positions. So the next time the user hits the W key, the letter will be encrypted not as L but rather as some other letter.

Though more challenging than simple substitution, such a basic, one-rotor machine would be child's play for a trained cryptanalyst to solve. So rotor machines used multiple rotors. Versions of the Enigma, for example, had either three rotors or four. In operation, each rotor moved at varying intervals with respect to the others: A keystroke could move one rotor or two, or all of them. Operators further complicated the encryption scheme by choosing from an assortment of rotors, each wired differently, to insert in their machine. Military Enigma machines also had a plugboard, which swapped specific pairs of letters both at the keyboard input and at the output lamps.

The rotor-machine era finally ended around 1970, with the advent of electronic and software encryption, although a Soviet rotor machine called Fialka was deployed well into the 1980s.

The HX-63 pushed the envelope of cryptography. For starters it has a bank of nine removable rotors. There's also a modificator," an array of 41 rotary switches, each with 41 positions, that, like the plugboard on the Enigma, add another layer, an unchanging scramble, to the encryption. The unit I acquired has a cast-aluminum base, a power supply, a motor drive, a mechanical keyboard, and a paper-tape printer designed to display both the input text and either the enciphered or deciphered text. A function-control switch on the base switches among four modes: off, clear" (test), encryption, and decryption.

In encryption mode, the operator types in the plaintext, and the encrypted message is printed out on the paper tape. Each plaintext letter typed into the keyboard is scrambled according to the many permutations of the rotor bank and modificator to yield the ciphertext letter. In decryption mode, the process is reversed. The user types in the encrypted message, and both the original and decrypted message are printed, character by character and side by side, on the paper tape.

While encrypting or decrypting a message, the HX-63 prints both the original and the encrypted message on paper tape. The blue wheels are made of an absorbent foam that soaks up ink and applies it to the embossed print wheels.Peter Adams

Beneath the nine rotors on the HX-63 are nine keys that unlock each rotor to set the initial rotor position before starting a message. That initial position is an important component of the cryptographic key.Peter Adams

To begin encrypting a message, you select nine rotors (out of 12) and set up the rotor pins that determine the stepping motion of the rotors relative to one another. Then you place the rotors in the machine in a specific order from right to left, and set each rotor in a specific starting position. Finally, you set each of the 41 modificator switches to a previously determined position. To decrypt the message, those same rotors and settings, along with those of the modificator, must be re-created in the receiver's identical machine. All of these positions, wirings, and settings of the rotors and of the modificator are collectively known as the key.

The HX-63 includes, in addition to the hand crank, a nickel-cadmium battery to run the rotor circuit and printer if no mains power is available. A 12-volt DC linear power supply runs the motor and printer and charges the battery. The precision 12-volt motor runs continuously, driving the rotors and the printer shaft through a reduction gear and a clutch. Pressing a key on the keyboard releases a mechanical stop, so the gear drive propels the machine through a single cycle, turning the shaft, which advances the rotors and prints a character.

The printer has two embossed alphabet wheels, which rotate on each keystroke and are stopped at the desired letter by four solenoids and ratchet mechanisms. Fed by output from the rotor bank and keyboard, mechanical shaft encoders sense the position of the alphabet printing wheels and stop the rotation at the required letter. Each alphabet wheel has its own encoder. One set prints the input on the left half of the paper tape; the other prints the output on the right side of the tape. After an alphabet wheel is stopped, a cam releases a print hammer, which strikes the paper tape against the embossed letter. At the last step the motor advances the paper tape, completing the cycle, and the machine is ready for the next letter.

As I began restoring the HX-63, I quickly realized the scope of the challenge. The plastic gears and rubber parts had deteriorated, to the point where the mechanical stress of motor-driven operation could easily destroy them. Replacement parts don't exist, so I had to build such parts myself.

After cleaning and lubricating the machine, I struck a few keys on the keyboard. I was delighted to see that all nine cipher rotors turned and the machine printed a few characters on the paper tape. But the printout was intermittently blank and distorted. I replaced the corroded nickel-cadmium battery and rewired the power transformer, then gradually applied AC power. To my amazement, the motor, rotors, and the printer worked for a few keystrokes. But suddenly there was a crash of gnashing gears, and broken plastic bits flew out of the machine. Printing stopped altogether, and my heartbeat nearly did too.

I decided to disassemble the HX-63 into modules: The rotor bank lifted off, then the printer. The base contains the keyboard, power supply, and controls. Deep inside the printer were four plastic snubbers," which cushion and position the levers that stop the ratchet wheels at the indicated letter. These snubbers had disintegrated. Also, the foam disks that ink the alphabet wheels were decomposing, and gooey bits were clogging the alphabet wheels.

I made some happy, serendipitous finds. To rebuild the broken printer parts, I needed a dense rubber tube. I discovered that a widely available neoprene vacuum hose worked perfectly. Using a drill press and a steel rod as a mandrel, I cut the hose into precise, 10-millimeter sections. But the space deep within the printer, where the plastic snubbers are supposed to be, was blocked by many shafts and levers, which seemed too risky to remove and replace. So I used right-angle long-nosed pliers and dental tools to maneuver the new snubbers under the mechanism. After hours of deft surgery, I managed to install the snubbers.

The ink wheels were made of an unusual porous foam. I tested many replacement materials, settling finally on a dense blue foam cylinder. Alas, it had a smooth, closed-cell surface that would not absorb ink, so I abraded the surface with rough sandpaper.

After a few more such fixes, I faced just one more snafu: a bad paper-tape jam. I had loaded a new roll of paper tape, but I did not realize that this roll had a slightly smaller core. The tape seized, tore, and jammed under the alphabet wheels, deeply buried and inaccessible. I was stymiedbut then made a wonderful discovery. The HX-63 came with thin stainless-steel strips with serrated edges designed specifically to extract jammed paper tape. I finally cleared the jam, and the restoration was complete.

One of the reasons why the HX-63 was so fiendishly secure was a technique called reinjection, which increased its security exponentially. Rotors typically have a position for each letter of the alphabet they're designed to encrypt. So a typical rotor for English would have 26 positions. But the HX-63's rotors have 41 positions. That's because reinjection (also called reentry) uses extra circuit paths beyond those for the letters of the alphabet. In the HX-63, there are 15 additional paths.

Here's how reinjection worked in the HX-63. In encryption mode, current travels in one direction through all the rotors, each introducing a unique permutation. After exiting the last rotor, the current loops back through that same rotor to travel back through all the rotors in the opposite direction. However, as the current travels back through the rotors, it follows a different route, through the 15 additional circuit paths set aside for this purpose. The exact path depends not only on the wiring of the rotors but also on the positions of the 41 modificators. So the total number of possible circuit configurations is 26! x 15!, which equals about 5.2 x 1038. And each of the nine rotors' internal connections can be rewired in 26! different ways. In addition, the incrementing of the rotors is controlled by a series of 41 mechanical pins. Put it all together and the total number of different key combinations is around 10600.

Such a complex cipher was not only unbreakable in the 1960s, it would be extremely difficult to crack even today. Reinjection was first used on the NSA's KL-7 rotor machine. The technique was invented during WW II by Albert W. Small, at the U.S. Army's Signal Intelligence Service. It was the subject of a secret patent that Small filed in 1944 and that was finally granted in 1961 (No. 2,984,700).

Meanwhile, in 1953, Hagelin applied for a U.S. patent for the technique, which he intended to use in what became the HX-63. Perhaps surprisingly, given that the technique was already the subject of a patent application by Small, Hagelin was granted his patent in 1957 (No. 2,802,047). Friedman, for his part, had been alarmed all along by Hagelin's use of reinjection, because the technique had been used in a whole series of vitally important U.S. cipher machines, and because it was a great threat to the NSA's ability to listen to government and military message traffic at will.

The series of meetings between Friedman and Hagelin that resulted in the cancellation of the HX-63 was mentioned in a 1977 biography of Friedman, The Man Who Broke Purple, by Ronald Clark, and it was further detailed in 2014 through a disclosure by the NSA's William F. Friedman Collection.

After a career as an electrical engineer and inventor, author Jon D. Paul now researches, writes, and lectures on the history of digital technology, especially encryption. In the 1970s he began collecting vintage electronic instruments, such as the Tektronix oscilloscopes and Hewlett-Packard spectrum analyzers seen here. Peter Adams

The revelation of Crypto AG's secret deals with U.S. intelligence may have caused a bitter scandal, but viewed from another angle, Rubicon was also one of the most successful espionage operations in historyand a forerunner of modern backdoors. Nowadays, it's not just intelligence agencies that are exploiting backdoors and eavesdropping on secure" messages and transactions. Windows 10's telemetry" function continuously monitors a user's activity and data. Nor are Apple Macs safe. Malware that allowed attackers to take control of a Mac has circulated from time to time; a notable example was Backdoor.MAC.Eleanor, around 2016. And in late 2020, the cybersecurity company FireEye disclosed that malware had opened up a backdoor in the SolarWinds Orion platform, used in supply-chain and government servers. The malware, called SUNBURST, was the first of a series of malware attacks on Orion. The full extent of the damage is still unknown.

The HX-63 machine I restored now works about as well as it did in 1963. I have yet to tire of the teletype-like motor sound and the clack-clack of the keyboard. Although I never realized my adolescent dream of being a secret agent, I am delighted by this little glimmer of that long-ago, glamorous world.

And there's even a postscript. I recently discovered that my contact at Crypto AG, whom I'll call C," was also a security officer at the Swiss intelligence agencies. And so for decades, while working at the top levels of Crypto AG, C" was a back channel to the CIA and Swiss intelligence agencies, and even had a CIA code name. My wry old Swiss friend had known everything all along!

This article appears in the September 2021 print issue as The Last Rotor Machine."

The Crypto AG affair was described in a pair of Swedish books. One of them was Borisprojektet : rhundradets strsta spionkupp : NSA och ett svensk snille lurade en hel vrld [translation: The Boris Project: The Biggest Spy Coup of the Century: NSA and a Swedish genius cheated an entire world], 2016, Sixten Svensson, Vaktelfrlag, ISBN 978-91-982180-8-4.

Also, in 2020, Swiss editor and author Res Strehle published Verschlsselt: Der Fall Hans Bhler [translation: Encrypted: The Hans Bhler Case], and later Operation Crypto. Die Schweiz im Dienst von CIA und BND [Operation Crypto: Switzerland in the Service of the CIA and BND].

Read the original post:
The Scandalous History of the Last Rotor Cipher Machine - IEEE Spectrum

Jordan Peterson should be the 2022 commencement speaker – Hillsdale Collegian

Jordan Peterson. Courtesy | GoogleCommons.

The senior class should invite Jordan Peterson to deliver the colleges commencement address inMay.

For a school that studies the classic tradition while fighting for freedom in modern politics, Peterson is an excellentfit.

A public intellectual and clinical psychologist, he speaks on eternal truths and classic texts, and applies their lessons to todays controversies. A New Yorker article called Peterson the most influentialand polarizingpublic intellectuals in the English-speaking world.

Peterson came to public attention in 2016 when he opposed an amendment to Canadas criminal code that added gender identity as a protected category. Peterson argued that the change would criminalize a persons refusal to use they/them pronouns and ultimately push Canada toward tyrannya concept he has studied foryears.

Ive studied authoritarianism for a very long timefor 40 yearsand theyre started by peoples attempts to control the ideological and linguistic territory, he told the BBC in2016.

He stands strongly against cultural insanity while not becoming an ordinary talking head on a nightly shout show. He has spoken out against the sexual revolution and transgender radicalism while defending family values andtradition.

Since entering the spotlight, Peterson has captivated audiences everywhere. He has written two best-selling books on life improvement and traveled across the world speaking to thousands of people on ideas like responsibility anddiscipline.

Adopt responsibility for your own well-being, Peterson said in a video. Try to put your family together, try to serve your community, try to seek for eternal truth thats the sort of thing that can ground you in your life, enough so that you can withstand the difficulty oflife.

Self-responsibility is a core theme of Petersons messagepractically identical to the principle of self-government this college holdsclosely.

Almost all the meaning that you will need to get you through the hard times of your life is going to be a consequence of adopting responsibility, he said in onelecture.

But theres another reason to invite Peterson to campus. We have the unique opportunity to teach one of the worlds leading intellectuals alesson.

Peterson has spoken out about the decline of the university countless times. The crackdowns on free speech, the decreased diversity of thought, and increased reliance on feelings and identity are among hiscomplaints.

At a 2019 Heritage Foundation event, Peterson said what universities fundamentally manage to achieve is leaving studentsdefeated.

What people are being taught, Peterson said referring to the modern university, is of no utility as a guiding light to anyone. And its a catastrophe to take young people in their formative yearsand to tear the substructure out from underneaththem.

Peterson spends hours on podcasts lamenting the failure of modern education. On his Aug. 2 podcast he talks to seven guests about their experiences on American campuses, including a North Korean defector who said her time at Columbia University made her very pessimistic about the Westernworld.

Hillsdale College should show him an example of a successful collegeone that pursues truth, encourages diversity of thought, and stands firmly against the race-obsessed and emotionally-charged curriculums ruining most institutions.

He will see, in Hillsdale, an example of education done right. He will finally have an example to point to of an intellectually serious and open-minded college.

What he says matters and when he talks, millionslisten.

In a time of disillusionment and turmoil, Peterson speaks to the sanity and truth we crave. We should invite him to send us off into theworld.

Follow this link:
Jordan Peterson should be the 2022 commencement speaker - Hillsdale Collegian

Candace Owens debates Russell Brand – The Global Herald – The Global Herald

Russell Brand published this video item, entitled Candace Owens debates Russell Brand below is their description.

Candace Owens and I go head to head here in this excerpt from my Under the Skin Episode (Will It Go Left Or Right? Candace Owens & Russell Brand). In this Candace Owens Interview, we debate the pros & cons of The Left and The Right and an attempt to negotiate when utopia might look like.

If you want to watch the full Candace Owens podcast then click the link below I highly suggest you watch the full interview:

This is a short excerpt from my podcast Under the Skin. Click below to listen to my luminary original podcast and hear from guests including Candace Owens, Jordan Peterson, Edward Snowden, Jonathan Haidt, Naomi Klein, Kehinde Andrews, Adam Curtis and Vandana Shiva.

Subscribe to Luminary at http://apple.co/russell

Watch the #UnderTheSkin Youtube Playlist:

______________________________________________________________

Elites are taking over! Our only hope is to form our own. To learn more, join my cartel below and get weekly bulletins too incendiary for anything but your private inbox.

*not a euphemism

https://www.russellbrand.com/join

Are you interested in more video like this? I release videos EVERYDAY on Youtube (admit it, you enjoyed watching this one).

Click the link below to subscribe below to my Youtube Channel dont forget to turn on that notification bell

http://www.youtube.com/c/RussellBrand?sub_confirmation=1

______________________________________________________________

SEE ME LIVE! Check out my live events and buy tickets here:

Live Dates – Current

My Audible Original, Revelation, is out NOW!

US: http://adbl.co/revelation

UK: http://adbl.co/revelationuk

AU: http://adbl.co/revelationau

CA: http://adbl.co/revelationca

For meditation and breath work, subscribe to my side-channel:

http://www.youtube.com/c/AwakeningWithRussell?sub_confirmation=1

______________________________________________________________

Follow me here:

Instagram:

http://instagram.com/russellbrand/

Twitter:

Youtube:

http://www.youtube.com/c/RussellBrand?sub_confirmation=1

Facebook:

https://www.facebook.com/RussellBrand/

My Website:

Home

Join the Community:

https://www.russellbrand.com/join

#CandaceOwens #RussellBrand #UnderTheSkin

Got a comment? Leave your thoughts in the comments section, below. Please note comments are moderated before publication.

See original here:
Candace Owens debates Russell Brand - The Global Herald - The Global Herald

Bias, theocracy and lies: Inside the secretive organization behind the National Prayer Breakfast – Salon

For nearly 70 years, and even in this moment of surging Christian nationalism, Democrats and Republicans have set aside their differences once a year to join in an event for fellowship and reconciliation: The National Prayer Breakfast.

The breakfast and the secretive religious group behind the scenes, popularly known as The Family, have been the subject of scandal over the years. Most notably, journalist Jeff Sharlet exposed the group's theocratic, anti-labor origins, and revealed The Family's role in Ugandan capital punishment legislation for gay people. More recently, the FBI caught Russian operatives using the breakfast to pursue back-channel connections with U.S. politicians.

But despite its dealings with international powers, The Family still enjoys the invisibility to which it attributes its influence. We've never had a full accounting of who works for The Family or even just who gets to attend the National Prayer Breakfast, let alone who decides. Until now.

Earlier this year, The Young Turks obtained a list of the 4,465 people invited to the 2016 National Prayer Breakfast. The document identifies guest connections to The Family and names virtually everyone who works for The Family, as well as numerous volunteers and allies. It also identifies which Family insiders submitted each invitee's name.

Since then, TYT has been researching individuals named in that document and in others (including a list of 2018 breakfast attendees obtained last month). With assistance from organizations including the international journalism collective Bellingcat, the Military Religious Freedom Foundationand the Global Network of Rainbow Catholics, TYT is assembling what amounts to an X-ray of The Family, and a map of its connections and endeavors around the world.

Although more remains to be learned, we can now draw some conclusions and begin reporting on what we are finding. (This is an ongoing project and we invite journalists and advocacy groups to contact us if they are interested in conducting research of their own.)

The prayer breakfast is, we've been told, an ecumenical, nonpartisan event for leaders of every stripe, run by prayer groups in the House and Senate. None of that is true.

Want a daily wrap-up of all the news and commentary Salon has to offer? Subscribe to our morning newsletter, Crash Course.

The National Prayer Breakfast (NPB) is not run by Congress. The Family controls it, uses the breakfast for its own ends, and can do so thanks to the bipartisan fiction maintained by its remaining Democratic allies. (Democratic protectiveness of the breakfast may have its roots in the weekly congressional prayer meetings, which appear, like the breakfast, to offer members moments of genuine bonding and connection.)

Only a few congressional Democrats are even tangentially involved in the NPB. A handful of congressional Republicans play significant roles. But the breakfast itself is overwhelmingly a production of The Family. The event's only significant financial backer is a well-knownright-wing theocrat.

The Family's congressional defenders have served up portraits of the NPB that could never be refuted because they wouldn't release the invitation list. (It has never been clear why an event ostensibly produced by Congress would be shrouded in such profound secrecy.)

Sen. Chris Coons, D-Del., The Family's most prominent Democrat, said earlier this year that the breakfast "has brought together religious, politicaland cultural leaders from all over the world." But many attendees are not leaders at all; they are fellow travelers and friends of The Family. Others springboard off the breakfast to build anti-LGBTQ, anti-democratic networks in their home countries. International media portray the breakfast invitations as coming from Congress or the president, boosting the standing of the Family-allied politicians who get invited.

It's not just Democrats who perpetuate this. The Family operates in a penumbra of secrecy formed by the overlap of lax IRS disclosure laws and law enforcement squeamishness about scrutinizing organizations that appear evenremotely religious.

And the diversity implied by Coons' roledoesn't apply to the delegations of guests from multiple countries. The breakfast is neither nonpartisannor ecumenical.

The politics of the breakfast its attendees and those who choose them are a far cry from Coons' claim. For instance, of the 20 individuals who invited the most guests in 2016, TYT was able to assess the politics of 13,using voter registrations and political donations as gauges. Of those 13, only one was a Democrat: Grace Nelson, a former Family board member and wife of former Sen. Bill Nelson, D-Fla. The top five inviters whose politics could be ascertained were all Republicans.

The Republicans who got to pick the most attendees are overwhelmingly Trump supporters. Their ranks range from a Chick-fil-A franchisee (who invited 38 guests) to former South Carolina governorDavid Beasley, a Republican andTrump supporterwhom Trump later appointedto run the UNWorld Food Programme. Many Family insiders are now actively supporting Trump's election lies, the Christian nationalist movement undergirding those liesand the movement's leaders.

Two of the top inviters had no U.S. political footprint because they don't live in America. One of them has ties to theocratic, anti-LGBTQ organizations. Heinvited 30 people to the 2016 breakfast.

The invitation list categorizes 253 invitees as "non-entertainment media." Thoseinclude a lot of local Washington-area on-air people including traffic and weather reporters.But the political media are overwhelmingly conservative: The Daily Caller, The Blaze, the Washington Times, Newsmax, the Weekly Standard, the Washington Examiner CEO's assistant, Rush and David Limbaugh, Stephen Hayes, Laura Ingraham, etc.

Five media people are specifically noted on the list as Fox News (TYT identified at least 22 others connected to Fox News). Democratic media figures invited are likely to have appeared on Fox. CNN is mentioned in connection to one guest; MSNBC not at all.

Invited writers from mainstream outlets are often conservative pundits or cover a religion beat. Liberal and progressive names seldom appear, even from major outlets, let alone progressive media counterparts to the Daily Caller or the Blaze.

Sitting members of Congress are automatically invited, but of former members, The Family invited 20 Democrats and 38 Republicans, almost twice as many, plus former Democrat Joe Lieberman.

The invitation list reflects recurring religious discrimination, too. In nations TYT has looked at, a clear pattern emerges among who gets to choose the guests and, not surprisingly, among the guests they invite.

Christianity is favored over non-Christianity, Protestantism over Catholicism, and evangelicalism over non-evangelicalism. Non-evangelical leaders are vastly outnumbered by evangelical non-leaders.

What the documents do not show is intentional discrimination. If anything, The Family appears un-strategic in its operations, at times to its own detriment. The autonomy its associates enjoy mirrors the laissez-faire economic philosophies that helped give rise to The Family.

This makes it difficult to infer intent or to apply sweeping generalities to The Family or the breakfast. The organization is relational; if you're friends with a Family insider, you might get an invite. Disparities in who gets invited arise less from a conscious plan and more from the vagaries of who becomes friends with someone inside The Family. Which, of course, is a textbook recipe for systemic bias. In some cases, invitations also appear to be tied to whether invitees might provide financial support for Family associates (who raise their own funds that are then administered by The Family).

It can be startling at times to come across the online ministries of Family associates. In blog posts and videos, they project inclusivity, joyand distinctly un-Trumpian gentleness, humorand even vulnerability.

They seldom resemble servants of an angry God or the cartoons of televangelism. The modest fundraising conducted by Family associates appears largely untouched by modern marketing. By any measure, they appear genuine in their compassion and desire to do good. They "have a heart for Africa," many say. Some literally spend their lives overseas in conditions materially wanting but spiritually rewarding. They dedicate themselves to helping others.

But their compassion is intuitive, not strategic. Few are experts or rely on experts to determine the best way to do the most good. God leads them.

As it turns out, God seldom leads them to assist the elderly or the sick. More often, Family missionaries are led to help those whose responses happen to be the most rewarding.

So you will find Family associates working with impoverished children or remote villages in Africa, southeast Asiaor Latin America. They build schools and they teach. Typically they teach lessons premised on belief in Jesus. If you believe Jesus is the answer to all problems, after all, what solution would not include Jesus?

Kids are taught English, for instance, by learning songs about how Jesus loves them. They learn the language, but also the love as The Family sees it. It's a love based on surrender, accepting God's will and Biblical authority including condemnation of homosexuality and even, for some, the subordination of women. The Family's students learn to speak that language, too, overseas and at Christian schools in the U.S. where scholarships bring them.

Because how unsatisfying would it be to make the world a better place by doing volunteer accounting in the back office of some bureaucratic (but effective and professionally run) monolith with exacting, quantitative standards? Family associates can be found instead at the low-profile, sometimes one-person nonprofits that proliferate on the IRS website like weeds in a vast orchard of Christian charities.

Some Family members have anonymous benefactors, wealthy enough to support mission work that jibes with their political inclinations. The politics matter, because The Family tasks its missionaries to bond with the leaders of their host nations leaders who know full well, as Sharlet documented, that these bright-eyed missionaries have the ears of the Americans who hold the wallets and bombs of the U.S. government. These missionaries use their access to local leaders to help stand up miniature versions of both the prayer breakfast and The Family iterations that share or even exceed the homophobic or theocratic leanings of their model.

Ironically, one could argue that The Family does not use its influence enough. In accordance with their famous slogan of "Jesus Plus Nothing," The Family asks little of the leaders they minister. As we'll report, The Family enjoys proximity to local and national leaders that entails virtually no accountability for their political decisions and accepts virtually any policy that can be seen as Jesus-based.

To The Family, accountability starts with Jesus; they seldom champion the checks-and-balances accountability that transparency brings. As one source close to The Family told me, its leaders might counsel a senator to work on his marriage, but remain silent on matters such as encouraging violent upheaval of American democracy. During a conversation with notorious Republican operative Lee Atwater, Doug Coe, the late Family leader, reportedly condemned adultery only when pressed.

And so these smiling missionaries, even those preaching inclusivity and love for sinners and enemies, end up arm in arm with unsmiling politicians feverish to squeeze voting rightsor reproductive rights. A smaller group inside the ranks of The Family flares with anger when LGBTQ rights are framed as an affront to religious freedom.

Historically, The Family's rationale for serving leaders unconditionally is that reducing evil means engaging with it. Who needs prayer more, after all, than the worst among us?

As Rep. Thomas Suozzi, D-N.Y., another Family ally, said this year, "the Prayer Breakfast reminds us to both love our neighbors and even the more challenging love our enemies." It was an irrefutable defense, right up until we could check whether The Family engages its own enemies as fervently as it engages the enemies of others.

Now, however, Suozzi's high-minded aspirations are hard to reconcile with the 2016 invitation list. The names present, and those omitted, suggest that enemies of human rights may come and break bread, but enemies of Republicans get left out in the cold.

The Revs. Al Sharpton, Jesse Jacksonand William J. Barber II some of America's top religious leaders on the left are all absent from the 2016 invitation list. Business leaders, however, appear in abundance (although yesteryear's captains of industry have been replaced by today's regional managers of industry).

Non-religious leaders who advocate for the disenfranchised are hard to come by. The late AFL-CIO chief Richard Trumka, invited by Beasley, was one of the rare labor leaders on the list.

Still, participating Democrats claim the breakfast somehow can foster reconciliation, regardless of the short supply there of LGBTQ people, socialistsand baby-killers with whom to reconcile. "After a very divisive time in our nation's history," Coons said in February, "it's my hope that this year's breakfast offers Americans of all faiths and backgrounds the strength and courage to unite as a nation and tackle the challenges we face together."

Except now we know that Americans of all faiths and backgrounds aren't at the breakfast. In fact, as our first report will show, the breakfast and some Family leaders helped fuel our current divisions. And their secret work today is at the heart of the challenges we now face.

With additional research and reporting by TYT Investigates News Assistant Zoltan Lucas and Intern Jamia Zarzuella, and assistance from members of the TYT Army.

Read the original:
Bias, theocracy and lies: Inside the secretive organization behind the National Prayer Breakfast - Salon

Conservatives thrive, Liberals dive in new polls | City News | thesuburban.com – The Suburban Newspaper

The Conservatives under leader Erin O'Toole thrived and the Liberals under Justin Trudeau lost ground in new polls conducted by Nanos Research for CTV News and The Globe and Mail.

In the first poll, released Sept. 3, the Conservatives had 35.7 per cent, and the Liberals are at 30.7 per cent. The poll has a margin of error of 2.8 percentage points, 19 times out of 20. Before the election was called, polls showed the Liberals had the potential for a majority government.

O'Toole is also doing well when it comes to who Canadians prefer as Prime Minister. After previously trailing the incumbent, OToole is now at 31.1 per cent support, Trudeau is at 27.3 per cent, and NDP leader Jagmeet Singh is at 19.6 per cent.

Looking at the trend, Erin O'Toole is shaping up to be a political freight train, pollster Nik Nanos told CTVNews.ca's Trend Line podcast. It's been a game changer of an election and Erin O'Toole definitely has momentum.... I think we have to say, factoring the ballot numbers, that O'Toole has been the top performer in this campaign, and O'Toole's performance on a day-to-day basis had been driving that incremental increase.

Tick tock for the Liberals because time is running out in this election," he added.

Another Nanos poll conducted in late August indicated 76 percent of Canadians felt holding an election this year, during a fourth wave of COVID, was not necessary.

The Liberals also fare poorly in the second recent Nanos poll, with 45 percent of Canadians feeling the current government did not do a good job in evacuating Canadians and Afghan nationals who helped the Canadian Armed Forces as the Taliban took over Afghanistan. Only 20 percent rated the efforts as good (16 percent) or very good (four percent). About 25 percent said the government did an "average " job.

Visit link:
Conservatives thrive, Liberals dive in new polls | City News | thesuburban.com - The Suburban Newspaper