Big Brother Media Articles
Excerpts of Key Big Brother Media Articles from Major Media
Below are many highly revealing excerpts of important big brother articles reported in the mainstream media suggesting a cover-up.
Links are provided to the full articles on major media websites. If any link should fail to function, click here
. These big brother articles are listed by article date. For the same list by order of importance, click here
. For the list by date posted, click here
. By choosing to educate ourselves on these important issues and to spread the word
, we can and will build a brighter future
For an index to revealing excerpts of media articles on several dozen engaging topics, click here
Same Agencies to Run, Oversee Surveillance Program
2007-08-07, Washington Post
The Bush administration plans to leave oversight of its expanded foreign eavesdropping program to the same government officials who supervise the surveillance activities and to the intelligence personnel who carry them out, senior government officials said yesterday. The law, which permits intercepting Americans' calls and e-mails without a warrant if the communications involve overseas transmission, gives Director of National Intelligence Mike McConnell and Attorney General Alberto R. Gonzales responsibility for creating the broad procedures determining whose telephone calls and e-mails are collected. It also gives McConnell and Gonzales the role of assessing compliance with those procedures. The law ... does not contain provisions for outside oversight -- unlike an earlier House measure that called for audits every 60 days by the Justice Department's inspector general. The controversial changes to the 1978 Foreign Intelligence Surveillance Act were approved by both chambers of the Democratic-controlled Congress despite privacy concerns raised by Democratic leaders and civil liberties advocacy groups. Central to the new program is the collection of foreign intelligence from "communication service providers," which the officials declined to identify, citing secrecy concerns. Under the new law, the attorney general is required to draw up the governing procedures for surveillance activity, for approval by the Foreign Intelligence Surveillance Court. Once the procedures are established, the attorney general and director of national intelligence will formally certify that the collection of data is authorized. But the certification will be placed under seal "unless the certification is necessary to determine the legality of the acquisition," according to the law signed by Bush.
Bush administration defends spy law
2007-08-07, Los Angeles Times
The Bush administration rushed to defend new espionage legislation Monday amid growing concern that the changes could lead to increased spying by U.S. intelligence agencies on American citizens. But officials declined to provide details about how the new capabilities might be used by the National Security Agency and other spy services. And in many cases, they could point only to internal monitoring mechanisms to prevent abuse of the new rules that appear to give the government greater authority to tap into the traffic flowing across U.S. telecommunications networks. Officials rejected assertions that the new capabilities would enable the government to cast electronic "drift nets" that might ensnare U.S. citizens [and] that the new legislation would amount to the expansion of a controversial — and critics contend unconstitutional — warrantless wiretapping program that President Bush authorized after the 9/11 attacks. Intelligence experts said there were an array of provisions in the new legislation that appeared to make it possible for the government to engage in intelligence-collection activities that the Bush administration officials were discounting. "They are trying to shift the terms of the debate to their intentions and away from the meaning of the new law," said Steven Aftergood, an intelligence policy analyst at the Federation of American Scientists. "The new law gives them authority to do far more than simply surveil foreign communications abroad," he said. "It expands the surveillance program beyond terrorism to encompass foreign intelligence. It permits the monitoring of communications of a U.S. person as long as he or she is not the primary target. And it effectively removes judicial supervision of the surveillance process."
The Fear of Fear Itself
2007-08-07, New York Times
It was appalling to watch over the last few days as Congress — now led by Democrats — caved in to yet another unnecessary and dangerous expansion of President Bush’s powers, this time to spy on Americans in violation of basic constitutional rights. Many of the 16 Democrats in the Senate and 41 in the House who voted for the bill said that they had acted in the name of national security, but the only security at play was their job security. What [do] the Democrats ... plan to do with their majority in Congress if they are too scared of Republican campaign ads to use it to protect the Constitution and restrain an out-of-control president[?] The White House and its allies on Capitol Hill railroaded Congress into voting a vast expansion of the president’s powers. They gave the director of national intelligence and the attorney general authority to intercept — without warrant, court supervision or accountability — any telephone call or e-mail message that moves in, out of or through the United States as long as there is a “reasonable belief” that one party is not in the United States. While serving little purpose, the new law has real dangers. It would allow the government to intercept, without a warrant, every communication into or out of any country, including the United States. The Democratic majority has made strides on other issues like children’s health insurance against White House opposition. As important as these measures are, they do not excuse the Democrats from remedying the damage Mr. Bush has done to civil liberties and the Bill of Rights. That is their most important duty.
Bush Signs Law to Widen Legal Reach for Wiretapping
2007-08-06, New York Times
President Bush signed into law ... legislation that broadly [expands] the government’s authority to eavesdrop on the international telephone calls and e-mail messages of American citizens without warrants. The law [goes] far beyond the small fixes that administration officials had said were needed to gather information about foreign terrorists [and will] sharply alter the legal limits on the government’s ability to monitor millions of phone calls and e-mail messages going in and out of the United States. The new law for the first time [provides] a legal framework for much of the surveillance without warrants that was being conducted in secret by the National Security Agency and outside the Foreign Intelligence Surveillance Act, the 1978 law that is supposed to regulate the way the government can listen to the private communications of American citizens. “This more or less legalizes the N.S.A. program,” said Kate Martin, director of the Center for National Security Studies in Washington. Previously, the government needed search warrants approved by a special intelligence court to eavesdrop on ... electronic communications between individuals inside the United States and people overseas. The new law gives the attorney general and the director of national intelligence the power to approve the international surveillance, rather than the special intelligence court. The law also gave the administration greater power to force telecommunications companies to cooperate with such spying operations. The companies can now be compelled to cooperate by orders from the attorney general and the director of national intelligence.
In Bush we trust - or else
2007-08-05, San Francisco Chronicle (San Francisco's leading newspaper)
President Bush's latest affront to the U.S. Constitution [is] in plain view on the White House Web site: "Executive Order: Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq." This far-reaching order ... is a frontal assault on the Fifth Amendment, which decrees that the government cannot seize an individual's property without due process. [The order asserts] the authority to freeze the American assets of anyone who directly or indirectly assists someone who poses "a significant risk" [to] the "peace and stability" of [Iraq] or the reconstruction effort. "On its face, this is the greatest encroachment on civil liberties since the internment of Japanese Americans in World War II," said Bruce Fein, a constitutional lawyer who was a deputy attorney general in the Reagan administration. Fein said the sanctions against suspected violators would amount to "a financial death penalty. King George III really would have been jealous of this power." The executive order not only calls for the freezing of assets of anyone who directly or indirectly [opposes US policy in Iraq,] it prohibits anyone else from providing "funds, goods or services" to a blacklisted individual. In other words, a friend or relative could have his or her assets seized for trying to help someone whose bank account is suddenly frozen. An attorney who offered legal help could risk losing everything he or she owned. Then again, there's not much need for lawyers in the world of this executive order. The blacklist would be drawn up by the "secretary of treasury, in consultation with the secretary of state and the secretary of defense." The Fifth Amendment was written for good reason: It's dangerous to give the government unchecked authority to seize private property without judicial review.
The White House Coup
2007-07-23, BBC Radio
[BBC Radio] uncovers details of a planned coup in the USA in 1933 by right-wing American businessmen. The coup was aimed at toppling President Franklin D Roosevelt with the help of half-a-million war veterans. The plotters, who were alleged to involve some of the most famous families in America (owners of Heinz, Birds Eye, Goodtea, Maxwell [House] and George Bush’s grandfather, Prescott [Bush]) believed that their country should adopt the policies of Hitler and Mussolini to beat the great depression. Why [is] so little ... known about this biggest ever peacetime threat to American democracy?
Note: The highly decorated General Smedley Butler, author of the landmark book War is a Racket, was approached by the plotters for assistance in carrying out this coup. He at first played along, but then eventually exposed the coup plot in Congressional testimony. Yet news of this huge plot was squelched by both the government and media. To understand why, read a two-page summary of General Butler's book by clicking here and listen to the gripping, 30-minute BBC broadcast at the link above.
Chips: High Tech Aids or Tracking Tools?
2007-07-22, ABC News/Associated Press
CityWatcher.com, a provider of surveillance equipment, attracted little notice itself until a year ago, when two of its employees had glass-encapsulated microchips with miniature antennas embedded in their forearms. The "chipping" of two workers with RFIDs radio frequency identification tags ... was merely a way of restricting access to ... sensitive data and images ... the company said. Innocuous? Maybe. But the news that Americans had, for the first time, been injected with electronic identifiers to perform their jobs fired up a debate over the proliferation of ever-more-precise tracking technologies and their ability to erode privacy in the digital age. To some, the ... notion of tagging people was Orwellian. Chipping, these critics said, might start with Alzheimer's patients or Army Rangers, but would eventually be suggested for convicts, then parolees, then sex offenders, then illegal aliens until one day, a majority of Americans, falling into one category or another, would find themselves electronically tagged. "It was scary that a government contractor that specialized in putting surveillance cameras on city streets was the first to incorporate this technology in the workplace," says Liz McIntyre, co-author of Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID. Within days of the company's announcement, civil libertarians and Christian conservatives joined to excoriate the microchip's implantation in people.
Note: For educated speculation on how certain powerful people might like to have everyone implanted with microchips for security and control purposes, click here.
FBI Plans Initiative To Profile Terrorists
2007-07-11, Washington Post
The Federal Bureau of Investigation is developing a computer-profiling system that would enable investigators to target possible terror suspects. The System to Assess Risk, or STAR, assigns risk scores to possible suspects based on a variety of information, similar to the way a credit bureau assigns a rating based on a consumer's spending behavior and debt. The program focuses on foreign suspects but also includes data about some U.S. residents. Some lawmakers said ... that the report raises new questions about the government's power to use personal information and intelligence without accountability. "The Bush administration has expanded the use of this technology, often in secret, to collect and sift through Americans' most sensitive personal information," said Sen. Patrick J. Leahy (D-Vt.), chairman of the Senate Judiciary Committee. The use of data mining in the war on terror has sparked criticism. An airplane-passenger screening program called CAPPS II was revamped and renamed because of civil liberty concerns. An effort to collect Americans' personal and financial data called Total Information Awareness was killed. Law enforcement and national security officials have continued working on other programs to use computers to sift through information for signs of threats. The Department of Homeland Security, for example, flags travelers entering and leaving the United States who may be potential suspects through a risk-assessment program called the Automated Targeting System.
FBI Would Skirt the Law With Proposed Phone Record Program, Experts Say
2007-07-10, ABC News blog
A proposed new FBI program would skirt federal laws by paying private companies to hold millions of phone and Internet records which the bureau is barred from keeping itself, experts say. The $5 million project would apparently pay private firms to store at least two years' worth of telephone and Internet activity by millions of Americans, few of whom would ever be considered a suspect in any terrorism, intelligence or criminal matter. The FBI is barred by law from collecting and storing such data if it has no connection to a specific investigation or intelligence matter. In recent years the bureau has tried to encourage telecommunications firms to voluntarily store such information, but corporations have balked at the cost of keeping records they don't need. "The government isn't allowed to warehouse the information, and the companies don't want to, so this creates a business incentive for the companies to warehouse it, so the government can access it later," said Mike German, a policy expert on national security and privacy issues for the American Civil Liberties Union (ACLU). "It's a public-private partnership that puts civil liberties to the test." In March, an FBI official identified the companies as Verizon, MCI and AT&T. Even the bureau's own top lawyer said she found the [FBI's] behavior "disturbing," noting that when requesting access to phone company records, it repeatedly referenced "emergency" situations that did not exist, falsely claimed grand juries had subpoenaed information and failed to keep records on much of its own activity.
Judges OK warrantless monitoring of Web use
2007-07-07, San Francisco Chronicle (San Francisco's leading newspaper)
Federal agents do not need a search warrant to monitor a suspect's computer use and determine the e-mail addresses and Web pages the suspect is contacting, a federal appeals court ruled Friday. In a drug case from San Diego County, the Ninth U.S. Circuit Court of Appeals in San Francisco likened computer surveillance to the "pen register" devices that officers use to pinpoint the phone numbers a suspect dials, without listening to the phone calls themselves. In Friday's ruling, the court said computer users should know that they lose privacy protections with e-mail and Web site addresses when they are communicated to the company whose equipment carries the messages. The search is no more intrusive than officers' examination of a list of phone numbers or the outside of a mailed package, neither of which requires a warrant, Judge Raymond Fisher said in the 3-0 ruling. Defense lawyer Michael Crowley disagreed. His client, Dennis Alba, was sentenced to 30 years in prison after being convicted of operating a laboratory in Escondido that manufactured the drug ecstasy. Some of the evidence against Alba came from agents' tracking of his computer use. The court upheld his conviction and sentence. Expert evidence in Alba's case showed that the Web addresses obtained by federal agents included page numbers that allowed the agents to determine what someone read online, Crowley said. The ruling "further erodes our privacy," the attorney said. "The great political marketplace of ideas is the Internet, and the government has unbridled access to it."
Note: So now every email you send and read can be monitored legally. Why didn't this make news headlines?
Files on Illegal Spying Show C.I.A. Skeletons From Cold War
2007-06-26, New York Times
Long-secret documents released Tuesday provide new details about how the Central Intelligence Agency illegally spied on Americans decades ago. Known inside the agency as the “family jewels,” the 702 pages of documents released Tuesday catalog domestic wiretapping operations, failed assassination plots, mind-control experiments and spying on journalists from the early years of the C.I.A. The papers provide evidence of paranoia and occasional incompetence as the agency began a string of illegal spying operations in the 1960s and 1970s, often to hunt links between Communist governments and the domestic protests that roiled the nation in that period. Yet the long-awaited documents leave out a great deal. Large sections are censored, showing that the C.I.A. still cannot bring itself to expose all the skeletons in its closet. And many activities about overseas operations disclosed years ago by journalists, Congressional investigators and a presidential commission — which led to reforms of the nation’s intelligence agencies — are not detailed in the papers. The 60-year-old agency has been under fire ... by critics [of] the secret prisons and harsh interrogation practices it has adopted since the Sept. 11 attacks. Some intelligence experts suggested ... that the release of the documents was intended to distract from the current controversies. And they and historians expressed disappointment that the documents were so heavily censored. Tom Blanton of the National Security Archive, the research group that filed the Freedom of Information request in 1992 that led to the documents’ becoming public, said he was initially underwhelmed by them because they contained little about the agency’s foreign operations. But Mr. Blanton said what was striking was the scope of the C.I.A’s domestic spying efforts.
Note: The entire body of the CIA's "Family Jewels" documents have been posted online by the National Security Archives, and can be read by clicking here.
Special Operations Prepared for Domestic Missions
The U.S. Northern Command, the military command responsible for "homeland defense," has asked the Pentagon if it can establish its own special operations command for domestic missions. The request ... would establish a permanent sub-command for responses to incidents of domestic terrorism as well as other occasions where special operators may be necessary on American soil. The establishment of a domestic special operations mission, and the preparation of contingency plans to employ commandos in the United States, would upend decades of tradition. Military actions within the United States are the responsibility of state militias (the National Guard), and federal law enforcement is a function of the FBI. Employing special operations for domestic missions sounds very ominous, and NORTHCOM's request earlier this year should receive the closest possible Pentagon and congressional scrutiny. There's only one problem: NORTHCOM is already doing what it has requested permission to do. When NORTHCOM was established after 9/11 to be the military counterpart to the Department of Homeland Security, within its headquarters staff it established a Compartmented Planning and Operations Cell (CPOC) responsible for planning and directing a set of "compartmented" and "sensitive" operations on U.S., Canadian and Mexican soil. In other words, these are the very special operations that NORTHCOM is now formally asking the Pentagon to beef up into a public and acknowledged sub-command.
CIA to Air Decades of Its Dirty Laundry
2007-06-22, Washington Post
The CIA will declassify hundreds of pages of long-secret records detailing some of the intelligence agency's worst illegal abuses -- the so-called "family jewels" documenting a quarter-century of overseas assassination attempts, domestic spying, kidnapping and infiltration of leftist groups ... CIA Director Michael V. Hayden said yesterday. The documents ... also include accounts of break-ins and theft, the agency's opening of private mail to and from China and the Soviet Union, wiretaps and surveillance of journalists, and a series of "unwitting" tests on U.S. civilians, including the use of drugs. The documents have been sought for decades by historians, journalists and conspiracy theorists and have been the subject of many fruitless Freedom of Information Act requests. In anticipation of the CIA's release, the National Security Archive at George Washington University yesterday published a separate set of documents from January 1975 detailing internal government discussions of the abuses. Those documents portray a rising sense of panic within the administration of President Gerald R. Ford that what then-CIA Director William E. Colby called "skeletons" in the CIA's closet had begun to be revealed in news accounts. "It's surely part of [Hayden's] program now to draw a bright line with the past," said National Security Archive Director Thomas S. Blanton. "But it's uncanny how the government keeps dipping into the black bag." Newly revealed details of ancient CIA operations, Blanton said, "are pretty resonant today."
C.I.A. Chief Tries Preaching a Culture of More Openness
2007-06-22, New York Times
William E. Colby faced an uneasy decision in late 1973 when he took over the Central Intelligence Agency: whether to make public the agency’s internal accounting, then being compiled, of its domestic spying, assassination plots and other misdeeds since its founding nearly three decades earlier. Mr. Colby decided to keep the so-called family jewels a secret, and wrote in his memoir in 1978 that he believed the agency’s already sullied reputation ... could not have withstood a public airing of all its dirty laundry. So why, at a time when the agency has again been besieged by criticism, this time for its program of secret detentions and interrogations since the Sept. 11 attacks, would the current director, Gen. Michael V. Hayden, decide to declassify the same documents that Mr. Colby chose to keep secret? General Hayden said it was essential for the C.I.A. ... to be as open as possible in order to build public trust and dispel myths surrounding its operations. The more that the agency can tell the public, he said, the less chance that misinformation among the public will “fill the vacuum.” It was this outlook that General Hayden, whose public relations skills are well known in Washington, brought to an earlier job. There, as director of the National Security Agency, he tried to overhaul the N.S.A.’s public image — that of the shadowy, menacing organization portrayed in the movie “Enemy of the State” — by inviting reporters to briefings and authorizing its officials to speak to the author James Bamford for his book on the agency, “Body of Secrets.”
Note: For a brief summary of and links to further information about James Bamford's important book on the NSA, Body of Secrets, click here.
FBI Finds It Frequently Overstepped in Collecting Data
2007-06-14, Washington Post
An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.
FBI Terror Watch List
2007-06-13, ABC News
A terrorist watch list compiled by the FBI has apparently swelled to include more than half a million names. Privacy and civil liberties advocates say the list is growing uncontrollably, threatening its usefulness in the war on terror. The bureau says the number of names on its terrorist watch list is classified. A portion of the FBI's unclassified 2008 budget request posted to the Department of Justice Web site, however, refers to "the entire watch list of 509,000 names." A spokesman for the interagency National Counterterrorism Center (NCTC), which maintains the government's list of all suspected terrorists with links to international organizations, said they had 465,000 names covering 350,000 individuals. Many names are different versions of the same identity. In addition to the NCTC list, the FBI keeps a list of U.S. persons who are believed to be domestic terrorists - abortion clinic bombers, for example, or firebombing environmental extremists, who have no known tie to an international terrorist group. Combined, the NCTC and FBI compendia comprise the watch list used by federal security screening personnel on the lookout for terrorists. While the NCTC has made no secret of its terrorist tally, the FBI has consistently declined to tell the public how many names are on its list. "It grows seemingly without control or limitation," said ACLU senior legislative counsel Tim Sparapani of the terrorism watch list. Sparapani called the 509,000 figure "stunning. If we have 509,000 names on that list, the watch list is virtually useless," he told ABC News. "You'll be capturing innocent individuals with no connection to crime or terror." U.S. lawmakers and their spouses have been detained because their names were on the watch list.
White House revises post-disaster protocol
2007-06-02, Boston Globe
The Bush administration is writing a new plan to maintain governmental control in the wake of an apocalyptic terrorist attack or overwhelming natural disaster, moving such doomsday planning for the first time from the Federal Emergency Management Agency to officials inside the White House. Discussion among legal specialists, homeland security experts and Internet commentators [includes] concerns that the policy may [make] it too easy to invoke emergency presidential powers such as martial law. The ... new "National Continuity Policy" contains few details about how surviving officials would invoke emergency powers, or when emergency powers should be deemed to be no longer necessary. The unanswered questions have provoked anxiety across ideological lines. The conservative commentator Jerome Corsi [wrote] that the directive looked like a recipe for allowing the office of the presidency to seize "dictatorial powers" because the policy does not discuss consulting Congress about when to invoke emergency powers -- or when to turn them off. Some specialists say that the White House should be more specific about its worst-case scenario plans, pointing out two unanswered questions: what circumstances would trigger implementation of the plan and what legal limits the White House recognizes on its own emergency powers. The policy ... does not contain a direct reference to statutes in which Congress has imposed checks and balances on the president's power to impose martial law or other extraordinary measures, [nor does it] explicitly acknowledge the National Emergencies Act, [a] law that gives Congress the right to override the president's determination that a national emergency still exists.
Claims of 9/11 conspiracy have suspect running scared
2007-05-25, Rocky Mountain News (One of Denver's two leading newspapers)
A former Federal Emergency Management Agency videographer accused of killing his wife in Denver is seeking political asylum in Argentina, claiming the U.S. government wants him silenced for what he saw in the smoldering ruins of the Twin Towers after 9/11. Kurt Sonnenfeld's efforts to avoid extradition have gained interest from human rights organizations in South America and broad attention from conspiracy theorists on the Internet. Sonnenfeld, 44, is charged with first-degree murder in the New Year's Day 2002 shooting death of his 36-year-old wife, Nancy. Sonnenfeld is quoted by the Argentine newspaper el Pais as saying, "I realized that they were after something else: the tapes of Ground Zero in my possession." Sonnenfeld said he was arrested by Interpol agents on the new Denver charges a week after delivering a demo video of 9/11 footage to a TV producer in Argentina. "I find that extremely coincidental," he said. In other interviews with Argentine media, Sonnenfeld is quoted as saying, "What I saw (at 9/11) leads me to the terrible conclusion that there was foreknowledge of what was going to happen — the precautions that were taken to save certain things that the authorities there considered irreplaceable or invaluable. For example, certain things were missing that could only have been removed with a truck. Yet after the first plane hit one of the towers, everything in Manhattan collapsed and no one could have gotten near the towers to do that." Sonnenfeld is quoted as saying documentation was removed from U.S. intelligence agencies in the World Trade Center, including the CIA, prior to the attacks.
Note: To read a more recent, powerful Voltaire Network interview with Kurt Sonnenfeld, click here. The truth is coming out more all the time!
Contingencies for nuclear terrorist attack
2007-05-11, San Francisco Chronicle (San Francisco's leading newspaper)
Senior government and military officials and other experts, organized by a joint Stanford-Harvard program called the Preventive Defense Project, met behind closed doors in Washington for a day-long workshop called "The Day After." The organizers of the nonpartisan project, Stanford's William Perry, a secretary of defense in the Clinton administration, and Harvard's Ashton Carter, a senior Defense Department official during the Clinton years, assumed the detonation of a bomb similar in size to the weapon that destroyed Hiroshima in World War II. A paper [they] are writing ... urges local governments and individuals to build underground bomb shelters; encourages authorities who survive to prevent evacuation of at least some of the areas attacked for three days ... and proposes suspending regulations on radiation exposure so that first responders would be able to act, even if that caused higher cancer rates. "The public at large will expect that their government had thought through this possibility and to have planned for it," Carter said in an interview. "This kind of an event would be unprecedented. We have had glimpses of something like this with Hiroshima, and glimpses with 9/11 and with Katrina. But those are only glimpses. If one bomb goes off, there are likely to be more to follow," Carter said. "This fact, that nuclear terrorism will appear as a syndrome rather than a single episode, has major consequences." It would, he added, require powerful government intervention to force people to do something many may resist -- staying put.
Note: Ashton Carter was co-author, with Philip Zelikow (later Executive Director of the 9/11 Commission) and John Deutch (former CIA Director), of a 1998 Foreign Affairs article, "Catastrophic Terrorism: Tackling the New Danger," which warned of a possible catastrophic attack on the World Trade Center and accurately described the governmental aftermath of 9/11.
Pentagon restricting testimony in Congress
2007-05-10, Boston Globe
The Pentagon has placed unprecedented restrictions on who can testify before Congress, reserving the right to bar lower-ranking officers, enlisted soldiers, and career bureaucrats from appearing before oversight committees or having their remarks transcribed. The guidelines, described in an April 19 memo to the staff director of the House Armed Services Committee, adds that all field-level officers and enlisted personnel must be "deemed appropriate" by the Department of Defense before they can participate in personal briefings for members of Congress or their staffs. In addition, according to the memo, the proceedings must not be recorded. Any officers who are allowed to testify must be accompanied by an official from the administration. Veterans of the legislative process -- who say they have never heard of such guidelines before -- maintain that the Pentagon has no authority to set such ground rules. A Pentagon spokesman confirmed that the guidelines are new. The memo has fueled complaints that the Bush administration is trying to restrict access to information about the war in Iraq. [A] special House oversight panel, according to aides, has written at least 10 letters to the Pentagon since February seeking information and has received only one official reply. Nor has the Pentagon fully complied with repeated requests for all the monthly assessments of Iraqi security forces.
Note: When the military begins to control the legislative, democracy begins to shift towards dictatorship. And for reliable information how the Pentagon cannot account for hundreds of billions of dollars, click here.