Big Brother Media Articles
Excerpts of Key Big Brother Media Articles from Major Media
Below are many highly revealing excerpts of important big brother articles reported in the mainstream media suggesting a cover-up.
Links are provided to the full articles on major media websites. If any link fails to function, read this webpage
. These big brother articles are listed by article date. You can also explore the articles listed by order of importance
or by date posted
. By choosing to educate ourselves on these important issues and to spread the word
, we can and will build a brighter future
Explore our full index
to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Inside Norway's 'Doomsday Vault'
2010-03-11, Fox News
In a remote mountainside on the Norwegian tundra sits the "doomsday vault," a backup against disaster -- manmade or otherwise. Inside lives the last hope should the unthinkable occur: a global seedbank that could be used to replant the world. It's a modern day Noah's Ark, in other words, full not of animals but of plantlife. The Svalbard "doomsday" Global Seed Vault [stores] a half-million seed varieties. The arctic permafrost offers natural freezing for the seeds, while additional cooling brings the temperatures down to minus 0.4 degrees Fahrenheit. Should disaster wipe out a species -- or in the case of a large-scale global crisis -- its stockers hope the seeds stored there could be used to restore life. The preciousness of the seeds there is also reflected in the inaccessible nature of the vault. Anyone seeking access to the seeds themselves will have to pass through four locked doors: the heavy steel entrance doors, a second door approximately 115 meters down the tunnel and finally the two keyed air-locked doors. Keys are coded to allow access to different levels of the facility. Not all keys unlock all doors.
Note: Should a major disaster or armageddon happen, the designers of this vault assume that the keyholders will survive. Why such a high level of security when this is by no means certain?
Daniel Ellsberg on the Limits of Knowledge
2010-02-27, Mother Jones
[Here's a story] from Ellsberg's book Secrets. The setting is a meeting with Henry Kissinger in late 1968. In 1968 Ellsberg was a highly respected analyst ... who had worked for both the Pentagon and Rand, and Kissinger was just entering the government. Ellsberg told him, "Henry, there's something I would like to tell you. You've dealt a great deal with top secret information. But you're about to receive a whole slew of special clearances, maybe fifteen or twenty of them, that are higher than top secret. First, you'll be exhilarated by some of this new information. But second, ... you will feel like a fool for having studied, written, talked about these subjects, criticized and analyzed decisions made by presidents for years without having known of the existence of all this information. In particular, you'll feel foolish for having literally rubbed shoulders for over a decade with some officials and consultants who did have access to all this ... and you'll be stunned that they kept that secret from you so well. You will feel like a fool. Then, after you've ... become used to using what amounts to whole libraries of hidden information, ... you will forget there ever was a time when you didn't have it. You'll be aware only of the fact that you have it now and most others don't ... and that all those other people are fools. [In] a matter of two or three years — you'll eventually become aware of the limitations of this information. It's often inaccurate, and it can lead you astray. But that takes a while to learn. In the meantime ... you will deal with a person who doesn't have those clearances only from the point of view of what you want him to believe and what impression you want him to go away with. You'll have to lie carefully to him about what you know. In effect, you will have to manipulate him.
Note: Don't miss the entire fascinating, highly revealing article at the link above. To see this quote from Ellsberg's book on Google books, click here. For more on government secrets, see the deeply revealing reports from reliable major media sources available here.
Head of IMF Proposes New Reserve Currency
2010-02-26, ABC News/Associated Press
Dominique Strauss-Kahn, the head of the International Monetary Fund, suggested [that] the organization might one day be called on to provide countries with a global reserve currency that would serve as an alternative to the U.S. dollar. "That day has not yet come, but I think it is intellectually healthy to explore these kinds of ideas now," he said in a speech on the future mandate of the 186-nation Washington-based lending organization. Strauss-Kahn said such an asset could be similar to but distinctly different from the IMF's special drawing rights, or SDRs, the accounting unit that countries use to hold funds within the IMF. It is based on a basket of major currencies. He said having other alternatives to the dollar "would limit the extent to which the international monetary system as a whole depends on the policies and conditions of a single, albeit dominant, country." Several countries, including China and Russia, have called for an alternative to the dollar as a reserve currency.
Note: For a treasure trove of reports from reliable sources on the hidden realities behind the world financial and economic crisis, click here.
What Microsoft knows and keeps about you
2010-02-25, San Francisco Chronicle (San Francisco's leading newspaper)
It's time to reflect on the immense powers Americans have ceded to the government and [the] potential for abuse by federal, state and local authorities. The global Internet and telecommunications infrastructure provides massive information on almost ... every person on the planet. One power truly stands out --- the all-encompassing reach and technological capabilities of the US National Security Agency. If you want to be secure, don't use a phone, a computer, credit card or any other technologically linked system because it guarantees that Big Brother will find you. Big Brother is not just the government. Most consumer "spying" comes from subpoenas and requests from non-terrorist-related federal, state, local agency requests and non-governmental private litigation and discovery. Simply put, a subpoena issued by a court in support of private litigation and discovery may have the same impact on an individual as the full force of the NSA. What information is typically requested from a company by say a plaintiff's lawyer during some discovery phase? Well, it's everything. In fact, it's generally a fishing expedition for every log file, every uploaded video, photo, chat session and anything else they can get their hands on.
Note: For lots more from major media sources on the continuing development of a global society under Big Brother's constant gaze, click here.
Greece to Make All Large Cash Transactions Illegal
2010-02-16, Christian Science Monitor
Embroiled in its debt crisis and looking for any avenue to bolster tax receipts [Greece] has done the unthinkable – it has made [cash, in euros] illegal for transactions over 1,500 euros. Of course, larger credit- or debit-based electronic transactions over 1,500 will still be denominated in euros. However, electronic transactions clearly require infrastructure and limit personal freedom. From Reuters: “From 1. Jan. 2011, every transaction above 1,500 euros between natural persons and businesses, or between businesses, will not be considered legal if it is done in cash. Transactions will have to be done through debit or credit cards.” It seems wrong for the Greek state to dictate how cash euros can be used. In fact, it’s surprising that the EU-endorsed plan would allow Greece to control euro usage at that level. Despite the fact that the reform bill is a piece of an approved EU plan to help improve Greek tax revenue and reduce deficit, it seems to go too far in curtailing personal liberty. How much is a government willing to punish its own citizens for using “too much” of their own legal tender in an otherwise legal transaction?
Note: What gives any government the right to limit cash transactions? And why is the EU approving this unusual measure? Could this be part of a hidden agenda to push the public towards a cashless society?
Battle Over the Bailout
2010-02-14, New York Times
Mark Pittman, an investigative reporter for Bloomberg News ... filed a Freedom of Information Act request with the Federal Reserve Board, seeking the details of its unprecedented efforts to funnel money to the collapsing banks of Wall Street. That was in September 2008. Just more than a year later, Mr. Pittman ... died unexpectedly at age 52. But his cause has persevered. It is now known as Bloomberg L.P. v. Board of Governors of the Federal Reserve, an attempt to unlock the vault of the largest Wall Street rescue plan in decades — or, as the legal briefs put it, to “break down a wall of secrecy” that the Fed has kept in place for nearly two years in its “controversial use of public money to prop up financial institutions.” The Federal Reserve has wrapped itself in secrecy since the turn of the 20th century, when a select group of financiers met at the private Jekyll Island Club off the eastern coast of Georgia and, forgoing last names to preserve their anonymity among the staff, drafted legislation to create a central bank. Its secrecy, of course, persists today, with Ben S. Bernanke, the Federal Reserve chairman, refusing to tell even Congress which banks received government money under the bailout. There is also a heated battle to force the Fed to disclose its role in the controversial attempt to save the insurance giant American International Group.
Note: Isn't it interesting that Pittman died at age 52 while trying to expose manipulations of the big bankers? For a one-minute video proving the existence of a secret weapon which can cause an undetectable heart attack, click here. For a concise, excellent background on the hidden role of the Federal Reserve, click here.
US aid tied to purchase of arms
2010-01-02, Sydney Mountain Herald
Just before Christmas, the US President, Barack Obama, signed into law one of his country's biggest aid pledges of the year. It was bound not for Africa or any of the many struggling countries on the World Bank's list. It was a deal for $US2.77 billion ($3 billion) to go to Israel in 2010 and a total of $US30 billion over the next decade. Israel is bound by the agreement to use 75 per cent of the aid to buy military hardware made in the US. For the first time the US is also providing $US500 million to the Palestinian Authority, including $US100 million to train security forces, under the strict proviso that the authority's leadership recognises Israel. For many years Israel has been the largest recipient of US foreign aid, followed by Egypt ($US1.75 billion), which also receives most of its assistance in tied military aid. The Congressional Research Service says that the US spent 17 per cent of its total aid budget - or $US5.1 billion - on military aid in 2008, of which $US4.7 billion was grants to enable governments to receive equipment from the US.
Note: Israel's population is 7.5 million. If you do the math, the US is providing the equivalent of $4,000 in aid to every man, woman and child in Israel over the next decade, with $3,000 of that to buy US military hardware. For lots more on government-facilitated profiteering in the arms industry, click here and here.
Drug money saved banks in global crisis, claims UN advisor
2009-12-13, The Guardian (One of the UK's leading newspapers)
Drugs money worth billions of dollars kept the financial system afloat at the height of the global crisis, the United Nations' drugs and crime tsar has told the Observer.
Antonio Maria Costa, head of the UN Office on Drugs and Crime, said he has seen evidence that the proceeds of organised crime were "the only liquid investment capital" available to some banks on the brink of collapse last year. He said that a majority of the $352bn (£216bn) of drugs profits was absorbed into the economic system as a result. This will raise questions about crime's influence on the economic system at times of crisis. It will also prompt further examination of the banking sector as world leaders, including Barack Obama and Gordon Brown, call for new International Monetary Fund regulations. Speaking from his office in Vienna, Costa said evidence that illegal money was being absorbed into the financial system was first drawn to his attention by intelligence agencies and prosecutors around 18 months ago. "In many instances, the money from drugs was the only liquid investment capital. In the second half of 2008, liquidity was the banking system's main problem and hence liquid capital became an important factor," he said. Some of the evidence put before his office indicated that gang money was used to save some banks from collapse when lending seized up, he said. "Inter-bank loans were funded by money that originated from the drugs trade and other illegal activities... There were signs that some banks were rescued that way."
Note: For many revealing reports from major media sources on the hidden realities behind the global financial crisis, click here.
G30, Ripe for Conspiracy Theorists
2009-12-04, Wall Street Journal blog
If you want to encourage the kind of conspiracy theories that have prospered in the wake of last year’s financial crisis — those that describe a secret cabal of elites running the world — try doing the following: Have a group of 30 high-powered economists, government officials and bankers meet under the auspices of an international group that shares ideas on how to run the global financial architecture. Have your Board of Trustees led by an influential former Federal Reserve chairman who’s now working as a senior advisor to the president of the United States. Name the former vice chairman of bailout behemoth AIG as the group’s Chairman and CEO (It helps that he [is] former governor of the Bank of Israel). Ensure that membership includes the likes of these: A former Treasury Secretary and president of Harvard who also now works as a top presidential economic advisor; Citigroup’s senior vice chairman; a former IMF deputy managing director and the current governor of the Bank of Israel; and top representatives of the world’s four most important central banks. Hold two days of closed-door meetings at the New York Fed. Do not publicize a list of attendees and leave everyone guessing about the agenda. These were the circumstances surrounding Friday’s start to the 62nd plenary meetings of the Group of 30, whose formal name is “The Consultative Group on International Economic and Monetary Affairs, Inc.”
Note: The article interestingly then goes on to claim that this secret meeting of the world's top bankers is not really anything to worry about, that they are really working for the public good. If so, why not have the meeting open and widely covered by the press? For many other revealing articles from major media reports on secret societies and secret meetings of the most rich and powerful people in our world, click here.
Ventura Turns Investigator for 'Conspiracy Theory'
2009-12-01, ABC News/Associated Press
Jesse Ventura is back for another stab at TV stardom, this time hosting a program that digs into conspiracy theories, including alternate views of what was behind the attacks of Sept. 11, 2001, and the purpose of a sprawling research center in remote Alaska.
The former Minnesota governor, professional wrestler and Navy SEAL stars in "Conspiracy Theory With Jesse Ventura," ... on truTV. The cable network, part of Turner Broadcasting System Inc., has ordered seven episodes of the hourlong weekly series. Marc Juris, executive vide president and general manager of truTV, said Ventura is passionate about the show and brings "knowledge from the inside" of government. "He's not doing this as an act or a gimmick. It's true to his heart. He's really looking for the answers," Juris told the AP. The premiere episode deals with the High Frequency Active Auroral Research Program, or HAARP, a 35-acre compound of 180 antennas near Gakona, Alaska, that is used to study the Earth's ionosphere. Ventura and those he interviews question whether the government is using the site to manipulate the weather or to bombard people with mind-controlling radio waves. Future "Conspiracy Theory" shows explore alleged cover-ups surrounding the Sept. 11 attacks and whether there are real "Manchurian Candidate" assassins who are programmed to kill, said Juris.
Note: Ventura was also a Navy Seal, where he personally was involved in top secret activities and learned how what is presented to the public is very different from the deeper realities. Don't miss the highly educational episode on the vitally important topic of HAARP by clicking here. And watch the excellent episode on 9/11 by clicking here. You'll be surprised by the new angles presented.
Skull and Bones members include some of America's most powerful
What really happens behind the padlocked doors of this windowless building, [the home] of Skull and Bones, Yale's oldest secret society? Its members include some of America's most powerful and privileged elite all sworn to secrecy. [CAMPBELL] BROWN: Alexandra Robbins broke through the wall of silence to write Secrets of the Tomb based on clandestine interviews with dozens of bonesmen. Only 15 [Yale students] get picked each year. The society includes at least three U.S. presidents, Supreme Court justices, and too many senators and CEOs to name. In 2004, Bush versus Kerry was the first all-bonesmen presidential election. ALEXANDRA ROBBINS: Skull and Bones' only purpose is to get its members into positions of prominence around the world so that they can elevate other members to similar positions. One of the first activities they participate in is called connubial bliss, where ... each member must spend an evening standing in front of the other 14 bonesmen and recount his or her entire sexual and romantic history. BROWN: According to one ... story, Prescott Bush, George W. Bush's grandfather, was part of a group that broke into the Oklahoma burial place of the Apache chief Geronimo and made off with his skull. Geronimo's grave was disturbed back in 1918, there are photos of skulls inside the "Skull and Bones" tomb. They have their own private retreat. Deer Island off the coast of New York. And a world of ready investors and political contacts in the highest echelons of American society. What has kept the secret society alive for all these years? Good old fashioned networking for the super elite.
Note: To watch the CNN video clip on this Yale secret society, click here. For lots more powerful information on Skull and Bones and other secret societies reported in major media articles, click here.
State to 'spy' on every phone call, email and web search
2009-11-10, The Telegraph (One of the UK's leading newspapers)
Every phone call, text message, email and website visit made by private citizens is to be stored for a year and will be available for monitoring by government bodies. All telecoms companies and internet service providers will be required by law to keep a record of every customer's personal communications, showing who they have contacted, when and where, as well as the websites they have visited. Despite widespread opposition to the increasing amount of surveillance in Britain, 653 public bodies will be given access to the information, including police, local councils, the Financial Services Authority, the ambulance service, fire authorities and even prison governors. They will not require the permission of a judge or a magistrate to obtain the information, but simply the authorisation of a senior police officer or the equivalent of a deputy head of department at a local authority. The Government announced yesterday it was pressing ahead with privately held "Big Brother" databases that opposition leaders said amounted to "state-spying" and a form of "covert surveillance" on the public. It is doing so despite its own consultation showing that it has little public support. The new rules ... will not only force communications companies to keep their records for longer, but to expand the type of data they keep to include details of every website their customers visit.
Note: For many more reports from major media sources on the disturbing trend toward increasing government and corporate surveillance and loss of privacy, click here.
Who's in Big Brother's Database?
2009-11-05, New York Review of Books
On a remote edge of Utah's dry and arid high desert ... hard-hatted construction workers with top-secret clearances are preparing to build [a] mammoth $2 billion structure. It's being built by the ultra-secret National Security Agency ... to house trillions of phone calls, e-mail messages, and [electronic data trails of all kinds]. The NSA is also completing work on another data archive, this one in San Antonio, Texas, which will be nearly the size of the Alamodome. Just how much information will be stored in these windowless cybertemples? A recent report prepared by the MITRE Corporation, a Pentagon think tank, [states] "Sensor data volume could potentially increase to the level of Yottabytes [10-to-the-24th-power bytes] by 2015." Once vacuumed up and stored in these near-infinite "libraries," the data are then analyzed by powerful infoweapons, supercomputers running complex algorithmic programs, to determine who among us may be — or may one day become — a terrorist. Emerging [after 9/11] as the most powerful chief the spy world has ever known was the director of the NSA. He is in charge of an organization three times the size of the CIA and empowered in 2008 by Congress to spy on Americans to an unprecedented degree. These new centers in Utah, Texas, and possibly elsewhere will likely become the centralized repositories for the data intercepted by the NSA in America's version of the "big brother database."
Note: James Bamford, the author of this review of a new book on the history of the NSA, has himself written three important books on the agency. For many revealing reports from reliable sources on the developing capacity by government and corporate surveillance to construct a "Big Brother" states, click here.
How Goldman secretly bet on the housing crash
2009-11-01, Kansas City Star/McClatchy Newspapers
In 2006 and 2007, Goldman Sachs Group peddled more than $40 billion in securities backed by at least 200,000 risky home mortgages, but never told the buyers it was secretly betting that a sharp drop in U.S. housing prices would send the value of those securities plummeting. Goldman's sales and its clandestine wagers, completed at the brink of the housing market meltdown, enabled one of the nation's premier investment banks to pass most of its potential losses to others before a flood of mortgage loan defaults staggered the U.S. and global economies. Only later did investors discover that what Goldman promoted as triple-A investments were closer to junk. Now, pension funds, insurance companies, labor unions and foreign financial institutions that bought those dicey mortgage securities are facing large losses, and a five-month McClatchy Newspapers investigation has found that Goldman's failure to disclose that it made secret, exotic bets on an imminent housing crash may have violated securities laws. "The Securities and Exchange Commission should be very interested in any financial company that secretly decides a financial product is a loser and then goes out and actively markets that product or very similar products to unsuspecting customers without disclosing its true opinion," said Laurence Kotlikoff, a Boston University economics professor who's proposed a massive overhaul of the nation's big banks. "This is fraud and should be prosecuted."
Note: For an eye-opening, powerful PBS video which reveals how the economic crisis was conscously allowed to happen, click here. It reveals that Fed chairman Alan Greenspan was against investigating any fraud. For many reports from reliable sources on corruption at the core of the Wall Street collapse and bailout, click here.
Loosening of F.B.I. Rules Stirs Privacy Concerns
2009-10-29, New York Times
After a Somali-American teenager from Minneapolis committed a suicide bombing in Africa in October 2008, the Federal Bureau of Investigation began investigating whether a Somali Islamist group had recruited him on United States soil. Instead of collecting information only on people about whom they had a tip or links to the teenager, agents fanned out to scrutinize Somali communities. The operation unfolded as the Bush administration was relaxing some domestic intelligence-gathering rules. The F.B.I.’s interpretation of those rules was recently made public when it released, in response to a Freedom of Information lawsuit, its “Domestic Investigations and Operations Guide.” The disclosure of the manual has opened the widest window yet onto how agents have been given greater power in the post-Sept. 11 era. But the manual’s details have alarmed privacy advocates. “It raises fundamental questions about whether a domestic intelligence agency can protect civil liberties if they feel they have a right to collect broad personal information about people they don’t even suspect of wrongdoing,” said Mike German, a former F.B.I. agent who now works for the American Civil Liberties Union.
The manual authorizes agents to open an “assessment” to “proactively” seek information about whether people or organizations are involved in national security threats. Assessments permit agents to use potentially intrusive techniques, like sending confidential informants to infiltrate organizations and following and photographing targets in public. When selecting targets, agents are permitted to consider political speech or religion as one criterion.
Note: To read the FBI's recently-released and redacted new "Domestic Investigations and Operation Guide", described by the New York Times as giving "F.B.I. agents the most power in national security matters that they have had since the post-Watergate era," click here.
Police in £9m scheme to log 'domestic extremists'
2009-10-25, The Guardian (One of the UK's leading newspapers)
Police are gathering the personal details of thousands of activists who attend political meetings and protests, and storing their data on a network of nationwide intelligence databases. The hidden apparatus has been constructed to monitor "domestic extremists". Detailed information about the political activities of campaigners is being stored on a number of overlapping IT systems, even if they have not committed a crime. Senior officers say domestic extremism, a term coined by police that has no legal basis, can include activists suspected of minor public order offences such as peaceful direct action and civil disobedience. Three national police units responsible for combating domestic extremism are run by the "terrorism and allied matters" committee of the Association of Chief Police Officers (Acpo). In total, it receives £9m in public funding, from police forces and the Home Office, and employs a staff of 100. The main unit, the National Public Order Intelligence Unit (NPOIU), runs a central database which lists thousands of so-called domestic extremists. It filters intelligence supplied by police forces across England and Wales, which routinely deploy surveillance teams at protests, rallies and public meetings. Vehicles associated with protesters are being tracked via a nationwide system of automatic number plate recognition (ANPR) cameras. Police surveillance units, known as Forward Intelligence Teams (FIT) and Evidence Gatherers, record footage and take photographs of campaigners as they enter and leave openly advertised public meetings. Surveillance officers are provided with "spotter cards" used to identify the faces of target individuals who police believe are at risk of becoming involved in domestic extremism. Targets include high-profile activists regularly seen taking part in protests.
Note: This important article should be read in its entirety. For further revelations of the magnitude of this surveillance and "rebranding protest as extremism " program, click here.
Officers accused of inciting violence to testify before police ethics panel
2009-10-23, Globe and Mail (One of Canada's leading newspapers)
Three undercover officers accused of inciting protesters to attack riot police at the 2007 North American leaders summit in Montebello are being summoned to testify before Quebec's independent police ethics committee. The decision from the committee released this week overrules an independent review that exonerated the officers. It also comes more than two years after the black-clad trio were first exposed on YouTube. Dave Coles, the union leader who confronted the men at the time and filed a complaint against the police ... said he suspects an inquiry would find there was political involvement. “This is the big question: Who sent them in?” asked Mr. Coles. “And don't give me some lame excuse that it was a low-level officer.” Video images of the incident posted on YouTube showed three officers disguised as protesters wearing black tops and camouflage pants. Their faces were covered by black and white bandanas. One of them, wearing a sideways ball cap marked with graffiti, held a large stone in his hand. Mr. Coles yelled at them to show their faces and the officer carrying the rock responded with a two-handed shove.
Note: Click on the link above to watch the astonishing YouTube video of this police provocation. This is just one case that happened to be caught on film. Why are undercover police infiltrating activist groups and inciting violence at demonstrations around the world?
Arrest Puts Focus on Protesters’ Texting
2009-10-05, New York Times
As demonstrations have evolved with the help of text messages and online social networks, so too has the response of law enforcement. On Thursday, F.B.I. agents descended on a house in Jackson Heights, Queens [NY], and spent 16 hours searching it. The most likely reason for the raid: a man who lived there had helped coordinate communications among protesters at the Group of 20 summit in Pittsburgh. The man, Elliot Madison, 41, a social worker who has described himself as an anarchist, had been arrested in Pittsburgh on Sept. 24 and charged with hindering apprehension or prosecution, criminal use of a communication facility and possession of instruments of crime. The Pennsylvania State Police said he was found in a hotel room with computers and police scanners while using the social-networking site Twitter to spread information about police movements. He has denied wrongdoing. American protesters first made widespread use of mass text messages in New York, during the 2004 Republican National Convention. Messages, sent as events unfolded, allowed demonstrators and others to react quickly to word of arrests, police mobilizations and roving rallies. Mass texting has since become a valued tool among protesters, particularly at large-scale demonstrations. Mr. Madison [may be] the first to be charged criminally while sending information electronically to protesters about the police. “He and a friend were part of a communications network among people protesting the G-20,” Mr. Madison’s lawyer, Martin Stolar, said on Saturday. “There’s absolutely nothing that he’s done that should subject him to any criminal liability.”
Note: For many reports from reliable sources on increasing government erosion of civil liberties, click here.
'Hitler skull' revealed as female
2009-09-29, BBC News
A bone fragment believed to be part of Adolf Hitler's skull has been revealed as being that of an unidentified woman, US scientists have said. The section of bone - marked with a bullet hole - was used to support the theory that Hitler shot himself. Russian scientists said the skull piece was found alongside Hitler's jawbone and had put it on display in Moscow. But US scientists said DNA tests revealed it actually belonged to a woman aged between 20 and 40. An archaeologist from the University of Connecticut travelled to Moscow, where the fragment has been on show in the city's federal archive since 2000, to take a sample. Nick Bellantoni said he had suspected even before the bone was tested that the fragment did not come from an adult male. DNA tests confirmed that the bone fragment came from a female. Doubts about exactly how Hitler died have persisted for decades. Russian officials said that the bodies of Hitler and Eva Braun - who reportedly committed suicide in a Berlin bunker in 1945 - were removed from a shell crater shortly after they died. The piece of skull forms part of a collection that also includes a section of a bloodstained sofa where Hitler is believed to have shot himself after swallowing a cyanide pill.
Material missing from Oklahoma bombing tapes, lawyer says
2009-09-27, USA Today/Associated Press
Long-secret security tapes showing the chaos immediately after the 1995 bombing of the Oklahoma City federal building are blank in the minutes before the blast and appear to have been edited, an attorney who obtained the recordings said Sunday. "The real story is what's missing," said Jesse Trentadue, a Salt Lake City attorney who obtained the recordings through the federal Freedom of Information Act as part of an unofficial inquiry he is conducting into the April 19, 1995, bombing that killed 168 people and injured hundreds more. The tapes turned over by the FBI came from security cameras various companies had mounted outside office buildings near the Alfred P. Murrah Federal Building. They are blank at points before 9:02 a.m., when a truck bomb carrying a 4,000-pound fertilizer-and-fuel-oil bomb detonated in front of the building, Trentadue said. "Four cameras in four different locations going blank at basically the same time on the morning of April 19, 1995. There ain't no such thing as a coincidence," Trentadue said. He said government officials claim the security cameras did not record the minutes before the bombing because "they had run out of tape" or "the tape was being replaced." "The absence of footage from these crucial time intervals is evidence that there is something there that the FBI doesn't want anybody to see." Trentadue said he is seeking more tapes along with a variety of bombing-related documents from the FBI and the CIA. An FOIA request by Trentadue for 26 CIA documents was rejected in June. A letter from the National Geospatial-Intelligence Agency, which reviewed the documents, said their release "could cause grave damage to our national security."
Note: This revealing article also tells how Trentadue's brother was murdered by FBI agents who mistakenly thought his brother was the bomber. For more valuable information on this and other evidence challenging the official story of the Oklahoma City bombing, click here.
Explore our full index
to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.