As of Mar. 29th, we're $1,900 in the red for 2017. Please donate here to support this vital work.
Subscribe here to our free email list

Big Brother News Stories
Excerpts of Key Big Brother News Stories in Major Media


Below are highly revealing excerpts of important big brother news stories reported in the media that suggest a major cover-up. Links are provided to the full stories on their major media websites. If any link fails to function, read this webpage. These big brother news stories are listed by date posted to this webpage. You can explore the same articles listed by order of importance or by article date. By choosing to educate ourselves on these important issues and to spread the word, we can and will build a brighter future.

Note: This comprehensive list of big brother news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


Forget the FBI cache; the Podesta emails show how America is run
2016-10-31, The Guardian (One of the UK's leading newspapers)
Posted: 2016-11-14 18:34:49
https://www.theguardian.com/commentisfree/2016/oct/31/the-podesta-emails-show...

WikiLeaks’ dump of messages to and from Clinton’s campaign chief offer an unprecedented view into the workings of the elite, and how it looks after itself. The emails [are] being slowly released ... from the hacked account of Hillary Clinton’s campaign chair John Podesta. Their significance goes far beyond mere scandal: they ... furnish us with an opportunity to observe the upper reaches of the American status hierarchy. In one now-famous email chain, for example, the reader can watch current US trade representative Michael Froman, writing from a Citibank email address in 2008, appear to name President Obama’s cabinet even before the great hope-and-change election was decided. This genre of Podesta email, in which people try to arrange jobs for themselves or their kids, points us toward the most fundamental thing we know about the people at the top of this class: their loyalty to one another and the way it overrides everything else. Of course Hillary Clinton staffed her state department with investment bankers and then did speaking engagements for investment banks as soon as she was done at the state department. Of course she appears to think that any kind of bank reform should “come from the industry itself”. And of course no elite bankers were ever prosecuted by the Obama administration. Read these emails and you understand, with a start, that the people at the top tier of American life all know each other. They are all engaged in promoting one another’s careers, constantly.

Note: For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


The FDA is stockpiling military weapons — and it’s not alone
2016-06-26, Boston Globe
Posted: 2016-07-03 14:53:39
http://www.bostonglobe.com/opinion/2016/06/25/the-fda-stockpiling-military-we...

The [FDA] amassed a stockpile of pistols, shotguns, and semiautomatic rifles, along with ample supplies of ammunition, liquid explosives, gun scopes, and suppressors. Between 2006 and 2014, [the Animal and Plant Health Inspection Service, an agency of the USDA] spent nearly $4.8 million to arm itself. And far from being an outlier, it is one of dozens of federal agencies that spends lavishly on guns, ammunition, and military-style equipment. A report issued this month by American Transparency ... chronicles the explosive - and expensive - trend toward militarizing federal agencies, most of which have no military responsibilities. Between 2006 and 2014, the report shows, 67 federal bureaus, departments, offices, and services spent at least $1.48 billion on ammunition and material one might expect to find in the hands of SWAT teams, Special Forces soldiers - or terrorists. The Internal Revenue Service, for example, now spends more than $1 million annually on firearms, ammunition, and military gear. Since 2006, the Department of Veterans Affairs ... has poured nearly $11.7 million into guns and ammo. Even the Smithsonian Institution and the Social Security Administration have each devoted hundreds of thousands of dollars to weaponry. There are now fewer US Marines than there are officers at federal administrative agencies with the authority to carry weapons and make arrests.

Note: The Washington Post in 2009 reported that military influence over US civilian authorities was quietly increasing, and the militarization of US police has been well-documented. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of civil liberties.


‘Eyewash’: How the CIA deceives its own workforce about operations
2016-01-31, Washington Post
Posted: 2016-02-14 10:05:42
https://www.washingtonpost.com/world/national-security/eyewash-how-the-cia-de...

Senior CIA officials have for years intentionally deceived parts of the agency workforce by transmitting internal memos that contain false information. The practice is known by the term “eyewash.” Officials said there is no clear mechanism for labeling eyewash cables or distinguishing them from legitimate records being examined by the CIA’s inspector general, turned over to Congress or declassified for historians. Senate investigators uncovered apparent cases of eyewashing as part of a multi-year probe of the CIA’s interrogation program, according to officials who said that the Senate Intelligence Committee found glaring inconsistencies in CIA communications about classified operations, including drone strikes. Former CIA officials ... acknowledged that the internal mechanisms for managing eyewash cables were largely informal. Skeptics described the safeguards as inadequate. “When you introduce falsehoods into the communications stream then you can destabilize the whole system of intelligence oversight and compliance with the law,” said Steven Aftergood, a government secrecy expert at the Federation of American Scientists. “It wasn’t that long ago that we had a CIA executive director who was engaged in criminal activity - you don’t want someone like him preparing eyewash cables,” Aftergood said, referring to Kyle “Dusty” Foggo, the former No. 3 executive at the agency.

Note: Read more about the strange case of Kyle "Dusty" Foggo, the CIA executive convicted of fraud in connection with secret CIA prisons. For more along these lines, see concise summaries of deeply revealing Intelligence agency corruption news articles from reliable major media sources.


Overt and Covert: ‘The Brothers,’ by Stephen Kinzer
2013-11-08, New York Times
Posted: 2016-02-14 09:42:26
http://www.nytimes.com/2013/11/10/books/review/the-brothers-by-stephen-kinzer...

The Brothers” is a riveting chronicle of government-sanctioned murder, casual elimination of “inconvenient” regimes, relentless prioritization of American corporate interests and cynical arrogance on the part of two men. John Foster Dulles and his brother, Allen, were ... lawyers, partners in the immensely powerful firm of Sullivan & Cromwell. John Foster Dulles served as secretary of state from 1953 to 1959; his brother ran the C.I.A. from 1953 to 1961. In his detailed, well­constructed and highly readable book, Stephen Kinzer ... shows how the brothers drove America’s interventionist foreign policy. Kinzer highlights John Foster Dulles’s central role in channeling funds from the United States to Nazi Germany in the 1930s. Sullivan & Cromwell floated bonds for Krupp A. G., the arms manufacturer, and also worked for I. G. Farben, the chemicals conglomerate that later manufactured Zyklon B, the gas used to murder millions of Jews. For the Dulles brothers, and for much of the American government, threats to corporate interests were categorized as support for communism. There are also reminders in Kinzer’s book of dark events in the history of American intelligence. Sixty years ago, Frank Olson, a C.I.A. officer, was reported to have jumped to his death during mind-control experiments “in which psychoactive drugs were administered to unknowing victims.” But last year, Kinzer reports, Olson’s family filed suit, claiming he had actually been murdered after visiting secret C.I.A. prisons in Europe.

Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


Meet Executive Order 12333: The Reagan rule that lets the NSA spy on Americans
2014-07-18, Washington Post
Posted: 2016-01-10 18:46:32
https://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan...

In March I received a call from the White House counsel’s office regarding a speech I had prepared for my boss at the State Department. The speech was about the impact ... of National Security Agency surveillance practices. The draft stated that “if U.S. citizens disagree with congressional and executive branch determinations about the proper scope of signals intelligence activities, they have the opportunity to change the policy through our democratic process.” But the White House counsel’s office told me that no, that wasn’t true. I was instructed to amend the line. Some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them. Public debate about the bulk collection of U.S. citizens’ data by the NSA has focused largely on Section 215 of the Patriot Act. Based in part on classified facts that I am prohibited by law from publishing, I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215. Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained. None of the reforms that Obama announced earlier this year will affect such collection.

Note: The above was written by John Napier Tye, former section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor. A 2014 Washington Post investigation sheds more light on the NSA's legally dubious domestic mass surveillance program. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


After Paris, there will be no stopping the surveillance state now
2015-11-19, CBC (Canada's public broadcasting system)
Posted: 2015-11-23 13:55:17
http://www.cbc.ca/news/world/surveillance-state-neil-macdonald-1.3325327

The tools European security agencies now have at their disposal ... would make any American or Canadian intelligence officer drool. Britain has literally created a surveillance state. The British Security Industry Authority estimated three years ago the government has installed about six million closed-circuit TV cameras in the public square; one for every 10 citizens. The French, too, have vastly expanded public video surveillance in recent years. And it's all been done with overwhelming support from the general public, which feels safer for the presence of the surveillance, never mind the lack of objective proof that they are more protected against outrages, which keep on occurring. Both England and France are former colonial powers that ... long ago subordinated individual rights to collective security. Canada and America more dearly cherish individual rights. Still, a surveillance state is growing here, too. David Lyon, a professor of surveillance studies at Queen's University, has identified several public surveillance trends, all of which he says are "increasing at an accelerating rate." Canada is not about to become Western Europe, he says, but "it is incumbent upon us as a society to think about the ethical consequences" of mass surveillance. [Some] would argue that the cameras are desperately needed tools, and that anyone who isn't doing anything wrong has nothing to worry about. That of course is the police state justification. They hate us because we are free, we are told. The fact that we've responded by giving up ever more freedom doesn't seem to matter.

Note: Many of the politicians publicly defending the surveillance state receive huge sums of money from private security companies. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


Bush-Era NSA Whistleblower Makes Most Explosive Allegations Yet About Extent of Gov’t Surveillance — and You Won’t Believe Who He Says They Spied On
2013-06-20, The Blaze
Posted: 2015-11-15 21:45:19
http://www.theblaze.com/stories/2013/06/20/bush-era-nsa-whistleblower-makes-m...

Russ Tice, a former intelligence analyst and Bush-era NSA whistleblower, claimed Wednesday that the intelligence community has ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats. “They went after – and I know this because I had my hands literally on the paperwork for these sort of things – they went after high-ranking military officers. They went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees," [said] Tice. “But they went after other ones, too. They went after lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House.” Then Tice dropped the bombshell about Obama. "In summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois ... that’s the president of the United States now.” FBI whistleblower Sibel Edmonds and Tice agreed that such wide-ranging surveillance of officials could provide the intelligence agencies with unthinkable power to blackmail their opponents. “I was worried that the intelligence community now has sway over what is going on,” Tice said. Tice first blew the whistle on ... domestic spying across multiple agencies in 2005.

Note: Listen to Tice's shocking revelations in this interview. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.


Reagan Advisers Ran 'Secret' Government
1987-07-05, Miami Herald
Posted: 2015-11-15 21:42:37
http://nl.newsbank.com/nl-search/we/Archives?p_product=MH&p_theme=mh&p_action...

Some of President Reagan’s top advisers have operated a virtual parallel government outside the traditional Cabinet departments and agencies almost from the day Reagan took office, congressional investigators and administration officials have concluded. Investigators believe that the advisers’ activities extended well beyond the secret arms sales to Iran and aid to the contras now under investigation. Lt. Col. Oliver North, for example, helped draw up a controversial plan to suspend the Constitution in the event of a national crisis, such as nuclear war, violent and widespread internal dissent or national opposition to a U.S. military invasion abroad. The advisers conducted their activities through secret contacts throughout the government with persons who acted at their direction but did not officially report to them. The activities of those contacts were coordinated by the National Security Council, the officials and investigators said. There appears to have been no formal directive for the advisers’ activities, which knowledgeable sources described as a parallel government. In a secret assessment of the activities, the lead counsel for the Senate Iran-contra committee called it a “secret government-within-a-government.” The arrangement permitted Reagan administration officials to claim that they were not involved in controversial or illegal activities, the officials said. “It was the ultimate plausible deniability,” said a well-briefed official who has served the Reagan administration since 1982 and who often collaborated on covert assistance to the Nicaraguan contras.

Note: See a downloaded copy of this article and the amazing full text. A recent Boston Globe article suggests that US national security policy continues to be made by concealed, unaccountable institutions within a corrupt government.


Jade Helm 15, heavily scrutinized military exercise, to open without media access
2015-07-08, Washington Post
Posted: 2015-07-20 16:05:00
https://www.washingtonpost.com/news/checkpoint/wp/2015/07/08/jade-helm-15-hea...

Jade Helm 15, the controversial Special Operations exercise that spawned a wave of conspiracy theories about a government takeover, will open next week without any media allowed to observe it, a military spokesman said. Embedded reporters won’t be permitted at any point during the exercise, in which military officials say that secretive Special Operations troops will maneuver through private and publicly owned land in several southern states. The exercise is scheduled for July 15 through September 15 and is expected to include more than 1,200 troops. Army Special Operations Command announced the exercise in March, saying its size and scope would set it apart from most training exercises. For months, some protesters have said Jade Helm is setting the stage for future martial law. Texas Gov. Greg Abbott, a Republican, called in April for the Texas State Guard to monitor the exercise [to] improve communication between Special Operations forces and civilians in Texas. The Washington Post has several times requested access to observe the exercise, making the case to the military that first-hand media coverage would help explain the mission. [Army spokesman Lt. Col. Mark] Lastoria said it is not possible to allow a journalist to travel with Special Operations forces in the field. The military has granted access to Special Operations in the past, however. In one recent example, a journalist observed the exercise Robin Sage in North Carolina.

Note: See interesting information on Jade Helm 15 based on government documents concluding that it is largely an artificial intelligence operation.


Why Operation Jade Helm 15 is freaking out the Internet
2015-03-31, Washington Post
Posted: 2015-05-04 21:56:37
http://www.washingtonpost.com/news/checkpoint/wp/2015/03/31/why-the-new-speci...

Elite service members from four branches of the U.S. military will launch an operation this summer in which they will operate covertly among the U.S. public and travel from state to state in military aircraft. Texas, Utah and a section of southern California are labelled as hostile territory, and New Mexico isn’t much friendlier. That’s the scheme for Jade Helm 15, a new Special Operations exercise that runs from July 15 to Sept. 15. Army Special Operations Command announced it last week, saying the size and scope of the mission sets it apart from many other training exercises. The exercise has prompted widespread conspiracy theories that the United States is preparing to hatch martial law. In particular, some have expressed alarm about this map, which outlines events for the exercise in unclassified documents posted online last week. The Washington Post verified them to be legitimate by speaking to Army sources. They appear to have been prepared for local authorities. It’s also worth noting that the military has routinely launched exercises in the past in which regions of the United States are identified as hostile for the purpose of training.

Note: This Washington Post article is clearly playing down some important facts and developments. Why is the US military spending so much time and money preparing for scenarios where US soil and citizens are considered enemies? Read and educate yourself with this excellent article on Operation Jade Helm 15, one in a string of US exercises planning for mass civilian arrests under a variety of scenarios.


Navy Plans Electromagnetic War Games Over National Park and Forest in Washington State
2014-11-10, Truthout
Posted: 2014-11-16 21:49:12
http://www.truth-out.org/news/item/27339-navy-plans-electromagnetic-war-games...

Olympic National Park and Olympic National Forest in Washington State are ... where the US Navy aims to conduct its Northwest Electromagnetic Radiation Warfare training program. It will fly ... 2,900 training exercises over wilderness, communities and cities across the Olympic Peninsula for 260 days per year, with exercises lasting up to 16 hours per day. No public notices for the Navy's plans were published in any media that directly serve the Olympic Peninsula. But word spread. Public outcry forced the Navy to extend the public comment period until November 28 and schedule more public meetings. According to the US Navy's Information Dominance Roadmap 2013-2028, the Navy states it "will require new capabilities to fully employ integrated information in warfare by expanding the use of advanced electronic warfare." The purpose of these war games is to train to deny the enemy "all possible frequencies of electromagnetic radiation (i.e. electromagnetic energy) for use in such applications as communication systems..." David King, the mayor of Port Townsend, a town on the Northeast corner of the Olympic Peninsula, has voiced his opposition to the plan, along with numerous other public officials. Mike Welding, the Naval Air Station at Whidbey Island spokesman, recently admitted to reporters, "If someone is in the exclusion area for more than 15 minutes, that's a ballpark estimate for when there would be some concern for potential to injure, to receive burns."

Note: We don't generally use truth-out.org as a reliable source, but as no major media are covering this most important development, we're including this article here. To verify this information, please click on some of the links in the article and see the U.S. Navy's "Information Dominance Roadmap".


Assange: Google Is Not What It Seems
2014-10-23, Newsweek
Posted: 2014-11-03 02:05:07
http://www.newsweek.com/assange-google-not-what-it-seems-279447

In June 2011, (WikiLeaks’ founder) Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt. The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas. Cohen had moved to Google from the U.S. State Department. Schmidt arrived first, accompanied by his then partner, Lisa Shields ... a vice president of the Council on Foreign Relations. Two months later, WikiLeaks’ release of State Department cables was coming to an abrupt end. Two years later, in the wake of his early 2013 visits to China, North Korea and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, “back-channel diplomacy” for Washington. In 1999 ... Schmidt joined the New America Foundation. The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place hundreds of articles and op-eds per year. In 2003, the U.S. National Security Agency (NSA) had already started systematically violating the Foreign Intelligence Surveillance Act (FISA). During the same period, Google ... was accepting NSA money to the tune of $2 million to provide the agency with search tools. In 2012, Google arrived on the list of top-spending Washington, D.C., lobbyists. Whether it is being just a company or “more than just a company,” Google’s geopolitical aspirations are firmly enmeshed within the foreign-policy agenda of the world’s largest superpower.

Note: Read the complete Newsweek article summarized above for Julian Assange's detailed accounting of the connections between Washington D.C. insiders, Google and related technology companies, intelligence agencies, and civil society organizations. For more about Wikileaks, read this news article summary. For more on the geopolitical big picture, see these concise summaries of deeply revealing news articles from reliable major media sources.


Nigeria Launches Electronic ID Cards
2014-08-28, BBC News
Posted: 2014-10-27 21:00:26
http://www.bbc.com/news/world-africa-28970411

Nigeria's president has formally launched a national electronic identity card, which all Nigerians will have to have by 2019 if they want to vote ... the first biometric card which can also be used to make electronic payments. MasterCard is providing the prepaid payment element and it hopes millions of Nigerians without bank accounts will now gain access to financial services. An attempt to introduce national ID cards in Nigeria 10 years ago failed. Analysts blame corruption for its failure. MasterCard said combining an identity card with a payment card for those aged 16 and over was a significant move. "It breaks down one of the most significant barriers to financial inclusion - proof of identity," MasterCard's Daniel Monehin said in a statement. The new cards show a person's photograph, name, age and unique ID number - and 10 fingerprints and an iris are scanned during enrolment. These details are intended to ensure that there are no duplicates on the system. During the pilot phase, which began registering names last October, 13 million MasterCard-branded ID cards will be issued. There are enrolment centres in all 36 states and there is no fee to get the card, though people will be charged in the event that it needs to be replaced. The Nigerian Identity Management Commission (NIMC), which is behind the rollout, is trying to integrate several government databases including those for driving licences, voter registration, health insurance, taxes and pensions.

Note: This identification scheme is underwritten by a major financial services company, and directly connects a citizen's political identity, financial identity, and biological identity to a centralized electronic database. To understand some of the dangers of this, see concise summaries of deeply revealing microchip implant news articles from reliable major media sources.


The NSA and Me: By Former ABC Producer James Bamford
2014-10-02, The Intercept
Posted: 2014-10-13 16:18:09
https://firstlook.org/theintercept/2014/10/02/the-nsa-and-me/

My biggest battle with the NSA came before my book [The Puzzle Palace] was even published. I had obtained the criminal file that the Justice Department had opened on the NSA. Marked as Top Secret, the file was so sensitive that only two original copies existed. Never before or since has an entire agency been the subject of a criminal investigation. Senior officials at the NSA were even read their Miranda rights. Issued on June 6, 1975, the report noted that both the NSA and CIA had engaged in questionable and possibly illegal electronic surveillance. As a result, Attorney General Edward Levi established a secret internal task force to look into the potential for criminal prosecution. Focusing particularly on NSA, the task force probed more deeply into domestic eavesdropping than any part of the executive branch had ever done before. The report’s prosecutive summary also pointed to the NSA’s top-secret “charter” issued by the Executive Branch, which exempts the agency from legal restraints placed on the rest of the government. This ... meant the NSA did not have to follow any restrictions placed on electronic surveillance “unless it was expressly directed to do so.” In short, the report asked, how can you prosecute an agency that is above the law? More than three decades later, the NSA, like a mom-and-pop operation that has exploded into a global industry, now employs sweeping powers of surveillance that Frank Church could scarcely have imagined in the days of wired phones and clunky typewriters. At the same time, the Senate intelligence committee he once chaired has done an about face, protecting the agencies from the public rather than the public from the agencies. Without adequate oversight, or penalties for abuse, the only protection that citizens have comes not from Congress or the courts, but from whistleblowers.

Note: James Bamford is the courageous ABC producer and investigative reporter who first exposed the declassified Operation Northwoods files in the May of 2001. These files showed beyond a shadow of a doubt that the top Pentagon generals were willing to carry out false flag terrorism activities which would kill innocent civilians in order to foment war fever against Cuba. Yet only ABC News out of all the major media outlets was willing to report this most shocking news. Don't miss the entire, highly revealing article by Bamford at the link above.


Key Democrats, Led by Hillary Clinton, Leave No doubt that Endless War is Official U.S. Doctrine
2014-10-07, The Intercept with Glenn Greenwald
Posted: 2014-10-13 16:14:11
https://firstlook.org/theintercept/2014/10/07/key-democrats-led-hillary-clint...

Any doubts about whether Endless War ... is official American doctrine should be permanently erased by this week’s comments from two leading Democrats, both former top national security officials in the Obama administration. Leon Panetta, the long-time Democratic Party operative who served as Obama’s Defense Secretary and CIA Director, said this week of Obama’s new bombing campaign: “I think we’re looking at kind of a 30-year war.” He criticized Obama ... for being insufficiently militaristic. Then we have Hillary Clinton [who] at an event in Ottawa yesterday ... proclaimed that the fight against these “militants” will “be a long-term struggle” that should entail an “information war” as “well as an air war.” The new war, she said, is “essential” and the U.S. shies away from fighting it “at our peril.” Like Panetta (and most establishment Republicans), Clinton made clear ... that virtually all of her disagreements with Obama’s foreign policy were the by-product of her view of Obama as insufficiently hawkish, militaristic and confrontational. “Endless War” is not dramatic rhetorical license but a precise description of America’s foreign policy. It’s not hard to see why. A state of endless war justifies ever-increasing state power and secrecy and a further erosion of rights. It also entails a massive transfer of public wealth to the “homeland security” and weapons industry (which the US media deceptively calls the “defense sector”). The War on Terror ... was designed from the start to be endless. This war ... thus enables an endless supply of power and profit to flow to those political and economic factions that control the government regardless of election outcomes.

Note: Read the prophetic writings of one of the most highly decorated US generals ever describing how he discovered after retirement that war is created by bankers and mega-corporations to funnel ever more tax-payer money into their coffers. For more along these lines, see the excellent, reliable resources provided in our War Information Center.


Modern art was CIA 'weapon'
1995-10-22, The Independent (One of the UK's leading newspapers)
Posted: 2014-10-13 15:49:27
http://www.independent.co.uk/news/world/modern-art-was-cia-weapon-1578808.html

For decades in art circles it was either a rumour or a joke, but now it is confirmed as a fact. The Central Intelligence Agency used American modern art - including the works of such artists as Jackson Pollock, Robert Motherwell, Willem de Kooning and Mark Rothko - as a weapon in the Cold War. The CIA fostered and promoted American Abstract Expressionist painting around the world for more than 20 years. This was a period, in the 1950s and 1960s, when the great majority of Americans disliked or even despised modern art. Why did the CIA support them? Because in the propaganda war with the Soviet Union, this new artistic movement could be held up as proof of the creativity, the intellectual freedom, and the cultural power of the US. Russian art, strapped into the communist ideological straitjacket, could not compete. The existence of this policy, rumoured and disputed for many years, has now been confirmed for the first time by former CIA officials. The decision to include culture and art in the US Cold War arsenal was taken as soon as the CIA was founded in 1947. Dismayed at the appeal communism still had for many intellectuals and artists in the West, the new agency set up a division, the Propaganda Assets Inventory, which at its peak could influence more than 800 newspapers, magazines and public information organisations. They joked that it was like a Wurlitzer jukebox: when the CIA pushed a button it could hear whatever tune it wanted playing across the world. Unknown to the artists, the new American art was secretly promoted under a policy known as the "long leash." [This] centrepiece of the CIA campaign ... a vast jamboree of intellectuals, writers, historians, poets, and artists ... was set up with CIA funds in 1950 and run by a CIA agent. At its height, it had offices in 35 countries and published more than two dozen magazines.

Note: Read the entire article at the link above to learn how the CIA secretly funnels money through cooperative millionaires. To this day, the CIA has agents in key press positions to stop stories they don't want or to promote their own pieces widely in the media. For more along these lines, see concise summaries of deeply revealing media corruption news articles and intelligence agency news articles, all from reliable major media sources.


George Brandis has silently swept away your freedoms
2014-09-29, Sydney Morning Herald (Australia's leading newspaper)
Posted: 2014-10-08 20:59:04
http://www.smh.com.au/comment/george-brandis-has-silently-swept-away-your-fre...

Australia has changed radically since last week though it might not look like it on the surface. Late Thursday night the Senate passed the National Security Amendment Bill (No.1) 2014 giving unlimited power to spies and secret police. Now officials can break the law with immunity from prosecution - and without having to answer to a court. They can act in total secrecy. They will decide what they do and to whom and when. They do not have to ask permission. They will choose when to interfere in your life and when they won't. They can dip into your most private communications and they don't need a warrant to do so. Sometimes they will do it because it is necessary to fight crime. Sometimes because they enjoy it. If they mess up your life and you tell anybody, you will get 10 years' jail – even if it doesn't harm security. When a Special Intelligence Operation (SIO) is declared then any participant can break the law on you with no consequences, according to Schedule 3 section 35k. There are broad limits. They cannot kill or torture you, or cause significant physical injury. Minor injury or mental torment is fine. Anyone involved in an SIO will have these powers – but who are they? ASIO, with 1778 staff. The Australian Federal Police, with more than 6900 staff. NSW Police with about 16,370 officers and a spy database called COPS which has more than 30 million entries on the people of NSW. But not just them. Anyone involved in an SIO enjoys legal immunity, including affiliates and subcontractors – whoever they are. Many Senators clearly hadn't read the 128 pages of major legal changes in the NSA Bill. The citizen needs protection from the state built into the laws and that is what they smashed on Thursday.

Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


U.S. threatened massive fine to force Yahoo to release data
2014-09-11, Washington Post
Posted: 2014-09-23 19:36:18
http://www.washingtonpost.com/business/technology/us-threatened-massive-fine-...

The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Snowden: New Zealand’s Prime Minister Isn’t Telling the Truth About Mass Surveillance
2014-09-15, The Intercept
Posted: 2014-09-23 19:34:44
https://firstlook.org/theintercept/2014/09/15/snowden-new-zealand-surveillance

Prime Minister John Key ... has denied that New Zealand’s spy agency GCSB engages in mass surveillance, mostly as a means of convincing the country to enact a new law vesting the agency with greater powers. Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. If you live in New Zealand, you are being watched. At the NSA I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called “XKEYSCORE.” It allows total, granular access to the database of communications collected in the course of mass surveillance. It is not limited to or even used largely for the purposes of cybersecurity, as has been claimed, but is instead used primarily for reading individuals’ private email, text messages, and internet traffic. I know this because it was my full-time job in Hawaii, where I worked every day in an NSA facility with a top secret clearance. The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks. It means they have the ability see every website you visit, every text message you send, every call you make, every ticket you purchase, every donation you make, and every book you order online. From “I’m headed to church” to “I hate my boss” to “She’s in the hospital,” the GCSB is there. Your words are intercepted, stored, and analyzed by algorithms long before they’re ever read by your intended recipient.

Note: New Zealand's prime minister has acknowledged that Snowden may be right, as reported in this article. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


The U.S. Government’s Secret Plans to Spy for American Corporations
2014-09-05, The Intercept
Posted: 2014-09-15 07:09:21
https://firstlook.org/theintercept/2014/09/05/us-governments-plans-use-econom...

Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. [But] the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations. But a secret 2009 report issued by [Director of National Intelligence James Clapper's] office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies. One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence”.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Mysterious Phony Cell Towers Could Be Intercepting Your Calls
2014-08-27, Popular Science
Posted: 2014-09-09 06:51:43
http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-b...

Les Goldsmith, the CEO of ESD America [marketers of the Crytophone 500], points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device. “Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.” Who is running these interceptors and what are they doing with the calls? Goldsmith says we can’t be sure, but he has his suspicions. “Are some of them U.S. government interceptors?” [asks] Goldsmith. Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. For governments or other entities able to afford a price tag of “less than $100,000,” says Goldsmith, high-quality interceptors are quite realistic. Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example.

Note: Do you think the government might have put up fake cell towers to nab more data? For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


The US government can brand you a terrorist based on a Facebook post
2014-08-30, The Guardian (One of the UK's leading newspapers)
Posted: 2014-09-09 06:48:20
http://www.theguardian.com/commentisfree/2014/aug/30/terrorist-watch-list-rul...

The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.

Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.


The Surveillance Engine: How the NSA Built Its Own Secret Google
2014-08-25, The Intercept
Posted: 2014-09-02 11:09:41
https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-c...

The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. ICREACH [as the search engine is called] contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy. ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Embracing flag, Snowden says he hopes to return to U.S.
2014-08-13, USA Today
Posted: 2014-08-18 07:39:42
http://www.usatoday.com/story/news/world/2014/08/13/snowden-wired-flag/13995013/

Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."

Note: Read the cover story from Wired magazine with a deep inside report on Snowden.


For some firms, NSA eavesdropping means business
2014-08-12, San Francisco Chronicle (SF's leading newspaper)
Posted: 2014-08-18 07:38:16
http://www.sfgate.com/technology/article/For-some-firms-NSA-eavesdropping-mea...

To many Americans, online eavesdropping by the U.S. National Security Agency is an outrage, a threat to privacy and freedom. To some, it's a business opportunity. A small but growing number of companies have introduced Internet and communications services designed to shield users from the government's eyes. A few even advertise their products as "NSA-proof." Many of the companies have been offering encrypted online services for years, scrambling their customers' data and communications in ways that require the right computer-generated "key" to decode. They are at least as concerned with thwarting private hackers and corporate spies as they are with blocking federal agents. But some entrepreneurs in the field found motivation in the NSA, after learning that the agency has been collecting troves of Internet and phone data on ordinary citizens for years. "Privacy and democracy go hand in hand - that's why this is so important," said Jason Stockman, one of the creators of ProtonMail, which began offering an encrypted e-mail service in May. "Our goal is to protect people against mass surveillance." But most companies will quickly admit that if the NSA - or some foreign intelligence service - really wants your data, they can't guarantee protection. Since the NSA conducts its business in secret, its full capabilities remain a matter of speculation. Most companies that invoke the NSA in their marketing focus on encryption.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Before Snowden: The Whistleblowers Who Tried To Lift The Veil
2014-07-22, NPR
Posted: 2014-07-29 06:16:22
http://www.npr.org/2014/07/22/333741495/before-snowden-the-whistleblowers-who...

Bill Binney worked at the National Security Agency [for] nearly three decades as one of its leading crypto-mathematicians. He then became one of its leading whistleblowers. The NSA is overseen by Congress, the courts and other government departments. It's also supposed to be watched from the inside by its own workers. But over the past dozen years, whistleblowers like Binney have had a rough track record. Those who tried unsuccessfully to work within the system say Edward Snowden — the former National Security Agency contractor who shared top-secret documents with reporters — learned from their bitter experience. For Binney, the decision to quit the NSA and become a whistleblower began a few weeks after the terrorist attacks of Sept. 11, 2001, when he says he discovered the spy agency had begun using software he'd created to scoop up information on Americans — all without a court order. "I had to get out of there, because they were using the program I built to do domestic spying, and I didn't want any part of it, I didn't want to be associated with it," he says. "I look at it as basically treason. They were subverting the Constitution." Binney says he and two other NSA colleagues who also quit tried sounding the alarm with congressional committees. But because they did not have documents to prove their charges, nobody believed them. Snowden, he says, did not repeat that mistake. "He recognized right away, it was very clear to me, that if he wanted anybody to believe him, he'd have to take a lot of documentation with him — which is what he did," Binney says.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Racy Photos Were Often Shared at N.S.A., Snowden Says
2014-07-21, New York Times
Posted: 2014-07-29 06:14:48
http://www.nytimes.com/2014/07/21/us/politics/edward-snowden-at-nsa-sexually-...

The former National Security Agency contractor Edward J. Snowden said in a wide-ranging interview ... that the oversight of surveillance programs was so weak that members of the United States military working at the spy agency sometimes shared sexually explicit photos they intercepted. He also said the British government often pioneered the most invasive surveillance programs because its intelligence services operate with fewer restrictions intended to protect individual privacy than its counterparts in the United States and other allies. “In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive,” he said. “So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: ‘Oh, hey, that’s great. Send that to Bill down the way.’ ” Mr. Snowden said that type of sharing ... was “seen as the fringe benefits of surveillance positions.” He said that this was never reported and that the system for auditing surveillance programs was “incredibly weak.” Mr. Snowden had particularly stark criticism for the British government’s surveillance programs, because in Britain the respect for individual privacy, he said, “is not strongly encoded in law or policy.” Because it has fewer restrictions, British intelligence platforms “are used as a testing ground” for programs of all five intelligence partners, a group referred to as “Five Eyes,” which includes Britain, Canada, Australia, New Zealand and the United States.”

Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


Edward Snowden urges professionals to encrypt client communications
2014-07-17, The Guardian (One of the UK's leading newspapers)
Posted: 2014-07-22 10:20:50
http://www.theguardian.com/world/2014/jul/17/edward-snowden-professionals-enc...

The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations. Snowden said professionals were failing in their obligations to their clients, sources, patients and parishioners in what he described as a new and challenging world. "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe. Any communications should be encrypted by default," he said. Snowden's plea for the professions to tighten security came during an extensive and revealing interview with the Guardian in Moscow. During the seven hours of interview, Snowden: • Said if he ended up in US detention in Guantánamo Bay he could live with it. • Does not have any regrets. • Said that ... he was independently secure, living on savings, and money from awards and speeches he has delivered online round the world. • Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in "sexually compromising" situations are routinely passed around. He works online late into the night; a solitary, digital existence not that dissimilar to his earlier life. He said he was using part of that time to work on the new focus for his technical skills, designing encryption tools to help professionals such as journalists protect sources and data. He is negotiating foundation funding for the project, a contribution to addressing the problem of professions wanting to protect client or patient data, and in this case journalistic sources.

Note: Read the transcript of the Guardian's new interview of Edward Snowden. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


In NSA-intercepted data, those not targeted far outnumber the foreigners who are
2014-07-05, Washington Post
Posted: 2014-07-14 16:30:59
http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data...

Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. [90% of] account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. [Many] files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year. The files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


The ultimate goal of the NSA is total population control
2014-07-11, The Guardian (One of the UK's leading newspapers)
Posted: 2014-07-14 16:29:31
http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the...

William Binney is one of the highest-level whistleblowers [to] emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance. On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations. “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.” Binney ... described a future where surveillance is ubiquitous and government intrusion unlimited. “The ultimate goal of the NSA is total population control”, Binney said. He praised the revelations and bravery of former NSA contractor Edward Snowden. Unlike Snowden, Binney didn’t take any documents with him when he left the NSA. He now says that hard evidence of illegal spying would have been invaluable. The latest Snowden leaks, featured in the Washington Post, detail private conversations of average Americans with no connection to extremism. It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Court gave NSA broad leeway in surveillance, documents show
2014-06-30, Washington Post
Posted: 2014-07-07 08:25:08
http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-le...

A classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well. The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency. The documents underscore the remarkable breadth of potential “foreign intelligence” collection. An affidavit in support of the 2010 foreign-government certification said the NSA believes that foreigners who will be targeted for collection “possess, are expected to receive and/or are likely to communicate foreign intelligence information concerning these foreign powers.” That language could allow for surveillance of academics, journalists and human rights researchers. A Swiss academic who has information on the German government’s position in the run-up to an international trade negotiation, for instance, could be targeted if the government has determined there is a foreign-intelligence need for that information. If a U.S. college professor e-mails the Swiss professor’s e-mail address or phone number to a colleague, the American’s e-mail could be collected as well, under the program’s court-approved rules.

Note: For more on this, see concise summaries of deeply revealing intelligence agency news articles from reliable major media sources.


US Pushing Local Cops to Stay Mum on Surveillance
2014-06-12, ABC News/Associated Press
Posted: 2014-06-16 16:42:57
http://abcnews.go.com/Politics/wireStory/us-pushing-local-cops-stay-mum-surve...

The Obama administration has been quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods. Citing security reasons, the U.S. has intervened in routine state public records cases and criminal trials regarding use of the technology. This has resulted in police departments withholding materials or heavily censoring documents in rare instances when they disclose any [information] about the purchase and use of such powerful surveillance equipment. One well-known type of this surveillance equipment is known as a Stingray. The equipment tricks cellphones into identifying some of their owners' account information, like a unique subscriber number, and transmitting data to police as if it were a phone company's tower. That allows police to obtain cellphone information without having to ask for help from service providers ... and can locate a phone without the user even making a call or sending a text message. The Obama administration is asking agencies to withhold common information about the equipment, such as how the technology is used and how to turn it on. "These extreme secrecy efforts are in relation to very controversial, local government surveillance practices using highly invasive technology," said Nathan Freed Wessler, a staff attorney with the American Civil Liberties Union, which has fought for the release of these types of records. "People should have the facts about what the government is doing to them."

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Internet Giants Erect Barriers to Spy Agencies
2014-06-07, New York Times
Posted: 2014-06-16 16:39:51
http://www.nytimes.com/2014/06/07/technology/internet-giants-erect-barriers-t...

[Google engineers] are making it far more difficult — and far more expensive — for the National Security Agency and the intelligence arms of other governments around the world to pierce their systems. As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps. After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant. But governments are fighting back, harder than ever. The cellphone giant Vodafone reported ... that a “small number” of governments around the world have demanded the ability to tap directly into its communication networks [and] noted that some countries did not issue warrants to obtain phone, email or web-searching traffic, because “the relevant agencies and authorities already have permanent access to customer communications via their own direct link.”

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Encouraging Words of Regret From Dean Baquet
2014-06-06, The Intercept
Posted: 2014-06-16 16:38:23
https://firstlook.org/theintercept/2014/06/06/encouraging-words-dean-baquet-w...

NPR’s David Folkenflik has a revealing new look at ... one of the most important journalistic stories of the last decade: The New York Times‘ 2004 decision ... to suppress for 15 months (through Bush’s re-election) its reporters’ discovery that the NSA was illegally eavesdropping on Americans without warrants. This episode was one significant reason Edward Snowden purposely excluded the Times from his massive trove of documents. In an interview with Folkenflik, the paper’s new executive editor, Dean Baquet, describes the paper’s exclusion from the Snowden story as “really painful.” But ... Baquet has his own checkered history in suppressing plainly newsworthy stories at the government’s request, including a particularly inexcusable 2007 decision, when he was the managing editor of The Los Angeles Times, to kill a story based on AT&T whistleblower Mark Klein’s revelations that the NSA had built secret rooms at AT&T to siphon massive amounts of domestic telephone traffic. In his NPR interview, Baquet insists that he has had a serious change of heart on such questions as a result of the last year of NSA revelations: "[Baquet] says the experience has proved that news executives are often unduly deferential to seemingly authoritative warnings unaccompanied by hard evidence." Dean Baquet’s epiphany about the U.S. government and the American media ... is long overdue, but better late than never. Let us hope that it signals an actual change in behavior.

Note: For more on this, see concise summaries of deeply revealing media corruption news articles from reliable major media sources.


N.S.A. Collecting Millions of Faces From Web Images
2014-06-01, New York Times
Posted: 2014-06-09 08:19:10
http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-we...

The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents. The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed. The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. It is not clear how many people around the world, and how many Americans, might have been caught up in the effort. Neither federal privacy laws nor the nation’s surveillance laws provide specific protections for facial images. Civil-liberties advocates and other critics are concerned that the power of the improving technology, used by government and industry, could erode privacy. “Facial recognition can be very invasive,” said Alessandro Acquisti, a researcher on facial recognition technology at Carnegie Mellon University.

Note: For another New York Times article showing how the NSA is using mobile phone apps to "snatch data revealing the player’s location, age, sex and other personal information," see this article.


Vodafone: governments use secret cables to tap phones
2014-06-06, The Telegraph (One of the UK's leading newspapers)
Posted: 2014-06-09 08:17:46
http://www.telegraph.co.uk/technology/internet-security/10880208/Vodafone-gov...

Government agencies are able to listen to phone conversations live and even track the location of citizens without warrants using secret cables connected directly to network equipment, admits Vodafone today. The company said that secret wires have been connected to its network and those belonging to competitors, giving government agencies the ability to tap in to phone and broadband traffic. In many countries this is mandatory for all telecoms companies, it said. Vodafone is today publishing its first Law Enforcement Disclosure Report which will describe exactly how the governments it deals with are eavesdropping on citizens. It is calling for an end to the use of “direct access” eavesdropping and transparency on the number of warrants issued giving access to private data. Gus Hosein, executive director of Privacy International, said: "Vodafone is taking a commendable step by taking this issue on at an international scale. And they are trying to identify the legal basis for governments' claimed powers. Governments around the world are unashamedly abusing privacy by demanding access to communications and data, and alarmingly, sometimes granting themselves direct access to the networks. Now that Vodafone has been more open, the entire industry has cover to take the necessary next step of pushing back. Pushing back against bad requests is a start, pushing back against bad laws is the next step. The usefulness of transparency reports hinges on governments abiding by the rule of law. We now know that these reports only provide a limited picture of what is going on.”

Note: For more on government surveillance of the world's population, see the deeply revealing reports from reliable major media sources available here.


Everyone should know just how much the government lied to defend the NSA
2014-05-17, The Guardian (One of the UK's leading newspapers)
Posted: 2014-05-26 10:24:23
http://www.theguardian.com/commentisfree/2014/may/17/government-lies-nsa-just...

Just before Edward Snowden became a household name, the ACLU argued before the supreme court that the FISA Amendments Act – one of the two main laws used by the NSA to conduct mass surveillance – was unconstitutional. In a sharply divided opinion, the Supreme Court ruled, 5-4, that the case should be dismissed because the plaintiffs didn't have "standing". The court relied on two claims by the Justice Department to support their ruling: 1) that the NSA would only get the content of Americans' communications without a warrant when they are targeting a foreigner abroad for surveillance, and 2) that the Justice Department would notify criminal defendants who have been spied on under the Fisa Amendments Act, so there exists some way to challenge the law in court. It turns out that neither of those statements were true. One of the most explosive Snowden revelations exposed a then-secret technique known as "about" surveillance. As the New York Times first reported, the NSA "is searching the contents of vast amounts of Americans' e-mail and text communications into and out of the country, hunting for people who mention information about foreigners under surveillance." In other words, the NSA doesn't just target a contact overseas – it sweeps up everyone's international communications into a dragnet and searches them for keywords. The Snowden leaks also pushed the Justice Department to admit ... that the government hadn't been notifying any defendants they were being charged based on NSA surveillance.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas
2014-05-19, The Intercept
Posted: 2014-05-26 10:22:44
https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-...

The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. SOMALGET is part of a broader NSA program called MYSTIC, which ... is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


United States Of Secrets
2014-05-12, KPBS.org
Posted: 2014-05-19 07:37:03
http://www.kpbs.org/news/2014/may/12/frontline-united-states-secrets/

When NSA contractor Edward Snowden downloaded tens of thousands of top-secret documents from a highly secure government network, it led to the largest leak of classified information in history — and sparked a fierce debate over privacy, technology and democracy in the post-9/11 world. Now, in "United States Of Secrets," FRONTLINE goes behind the headlines to reveal the dramatic inside story of how the U.S. government came to monitor and collect the communications of millions of people around the world—including ordinary Americans—and the lengths they went to trying to hide the massive surveillance program from the public. “This is as close to the complete picture as anyone has yet put together — and it’s bigger and more pervasive than we thought,” says veteran FRONTLINE filmmaker Michael Kirk. In part one ... Kirk [pieces] together the secret history of the unprecedented surveillance program that began in the wake of September 11 and continues today – even after the revelations of its existence by Edward Snowden. Then, in part two, premiering Tuesday, May 20 ..., veteran FRONTLINE filmmaker Martin Smith continues the story, exploring the secret relationship between Silicon Valley and the National Security Agency, and investigating how the government and tech companies have worked together to gather and warehouse your data. “Through in-depth interviews with more than 60 whistleblowers, elected officials, journalists, intelligence insiders and cabinet officials, we have woven together the secret narrative that reveals the scale and scope of the government’s spying program,” says Kirk.

Note: Don't miss this engaging program, available at this link. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Glenn Greenwald: the explosive day we revealed Edward Snowden's identity to the world
2014-05-11, The Guardian (One of the UK's leading newspapers)
Posted: 2014-05-19 07:35:35
http://www.theguardian.com/world/2014/may/11/glenn-greenwald-nsa-whistleblowe...

On Sunday 9 June 2013, the Guardian published the story that revealed [Edward] Snowden to the world. The article told Snowden's story, conveyed his motives, and proclaimed that "Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley [now Chelsea] Manning." We quoted [a note from Snowden that said:] "I understand that I will be made to suffer for my actions … but I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant." The reaction to the article and the video was more intense than anything I had experienced as a writer. Ellsberg himself, writing the following day in the Guardian, proclaimed that "there has not been in American history a more important leak than Edward Snowden's release of NSA material – and that definitely includes the Pentagon Papers 40 years ago". Several hundred thousand people posted the link to their Facebook accounts in the first several days alone. Almost three million people watched the interview on YouTube. Many more saw it on the Guardian's website. The overwhelming response was shock and inspiration at Snowden's courage.

Note: Don't miss the full, exciting story of how Snowden originally came to leak his stunning information at the link above. This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Glenn Greenwald: from Martin Luther King to Anonymous, the state targets dissenters not just "bad guys"
2014-05-13, The Guardian (One of the UK's leading newspapers)
Posted: 2014-05-19 07:33:34
http://www.theguardian.com/world/2014/may/13/glenn-greenwald-anonymous-mass-s...

The opportunity those in power have to characterise political opponents as "national security threats" or even "terrorists" has repeatedly proven irresistible. In the past decade, the government ... has formally so designated environmental activists, broad swaths of anti-government rightwing groups, anti-war activists, and associations organised around Palestinian rights. One document from the Snowden files, dated 3 October 2012, chillingly underscores the point. It revealed that the agency has been monitoring the online activities of individuals it believes express "radical" ideas and who have a "radicalising" influence on others. Among the information collected about the individuals, at least one of whom is a "US person", are details of their online sex activities and "online promiscuity." The agency discusses ways to exploit this information to destroy their reputations and credibility. The record is suffused with examples of groups and individuals being placed under government surveillance by virtue of their dissenting views and activism – Martin Luther King, the civil rights movement, anti-war activists, environmentalists. The NSA's treatment of Anonymous ... is especially troubling and extreme. Gabriella Coleman, a specialist on Anonymous at McGill University, said that [Anonymous] "is not a defined" entity but rather "an idea that mobilises activists to take collective action and voice political discontent. It is a broad-based global social movement with no centralised or official organised leadership structure. Some have rallied around the name to engage in digital civil disobedience, but nothing remotely resembling terrorism."

Note: This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Snowden: Why hasn’t the Director of National Intelligence been punished for lying to Congress
2014-05-01, Washington Post blog
Posted: 2014-05-05 11:28:37
http://www.washingtonpost.com/blogs/the-switch/wp/2014/05/01/snowden-why-hasn...

Former National Security Agency contractor Edward Snowden, and one of the reporters who first broke the news of Snowden's documents, Laura Poitras, received a Ridenhour Truth-Teller prize [on April 30] to a standing ovation at the National Press Club. Snowden leaked classified documents that exposed the NSA's massive global surveillance programs. Snowden ... compared his actions with that of Director of National Intelligence James R. Clapper, who denied that the NSA was "wittingly" collecting data on millions of Americans in a Senate Intelligence Committee hearing last spring -- a claim at odds with revelations about domestic phone records collection as a result of documents provided by Snowden. "The oath that I remember is James Clapper raising his hand, swearing to tell the truth and then lying to the American public," Snowden said. "I also swore an oath, but that oath was not to secrecy, but to defend the American Constitution." While Clapper has accused Snowden of perpetrating the most "massive and damaging theft of intelligence" in U.S. history, Snowden argues his actions were serving a larger public interest that superseded the national intelligence need for secrecy. Later in the speech, he described Clapper as having "committed a crime by lying under oath to the American people," and questioned why charges were never brought against the director. By contrast, Snowden said, charges were brought against him soon after he revealed himself as the source of the leaks.

Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.


British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools
2014-04-30, The Intercept
Posted: 2014-05-05 11:27:04
https://firstlook.org/theintercept/article/2014/04/30/gchq-prism-nsa-fisa-uns...

Britain’s electronic surveillance agency, Government Communications Headquarters [GCHQ], has long presented its collaboration with the National Security Agency’s massive electronic spying efforts as proportionate, carefully monitored, and well within the bounds of privacy laws. But according to a top-secret document in the archive of material provided to The Intercept by NSA whistleblower Edward Snowden, GCHQ secretly coveted the NSA’s vast troves of private communications and sought “unsupervised access” to its data as recently as last year. The document, dated April 2013, reveals that GCHQ requested broad new authority to tap into data collected under a law that authorizes a variety of controversial NSA surveillance initiatives, including the PRISM program. PRISM is a system used by the NSA and the FBI to obtain the content of personal emails, chats, photos, videos, and other data processed by nine of the world’s largest internet companies, including Google, Yahoo!, Microsoft, Apple, Facebook, and Skype. The arrangement GCHQ proposed would also have provided the British agency with greater access to millions of international phone calls and emails that the NSA siphons directly from phone networks and the internet. The Snowden files do not indicate whether NSA granted GCHQ’s request, but they do show that the NSA was “supportive” of the idea, and that GCHQ was permitted extensive access to PRISM during the London Olympics in 2012. The request for the broad access was communicated at “leadership” level.

Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.


Stories about NSA surveillance, Snowden leaks win Pulitzers for two news groups
2014-04-14, CNN
Posted: 2014-04-21 08:17:39
http://www.cnn.com/2014/04/14/us/pulitzer-prizes-journalism

Two news organizations' stories about National Security Agency surveillance, based upon documents leaked by Edward Snowden, have been awarded the Pulitzer Prize for public service, often described as the highest prize in American journalism. The Washington Post and ... The Guardian each received the prize on [April 14]. The recognition of the NSA reporting was most significant because of the questions raised by Snowden's leaks and the reaction to them. Snowden, who has been living in Russia while seeking asylum from U.S. prosecution, said in a statement that the Pulitzer board's recognition of the coverage was "vindication for everyone who believes that the public has a role in government." "We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance." While Snowden provided a trove of documents, reporters including Glenn Greenwald, working for the Guardian; Barton Gellman, working for The Post; and Laura Poitras, who worked with both, pored over the raw information, decided with their editors what parts were ethical to publish, and turned the information into stories that stunned readers around the world.

Note: For more on the historic Snowden revelations, see the deeply revealing reports from reliable major media sources available here.


How the NSA Plans to Infect ‘Millions’ of Computers with Malware
2014-03-12, The Intercept
Posted: 2014-03-31 08:17:30
https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millio...

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic. In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls
2014-03-18, Washington Post
Posted: 2014-03-25 10:35:54
http://www.washingtonpost.com/world/national-security/nsa-surveillance-progra...

The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage. At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

Note: Though technically it is illegal for the NSA to snoop on Americans without good cause, all they have to do is to share this technology with another country like the UK, and then ask the UK to do the snooping and send the results back to them, thereby circumventing the law. For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.


NSA posed as Facebook to infect computers with malware, report says
2014-03-12, Los Angeles Times
Posted: 2014-03-25 10:34:06
http://www.latimes.com/business/technology/la-fi-tn-nsa-posing-facebook-malwa...

The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.

Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.


Report: CIA spied on Senate committee staff
2014-03-05, CBS News
Posted: 2014-03-10 15:38:55
http://www.cbsnews.com/news/report-cia-spied-on-senate-committee-staff/

As staff for the Senate Intelligence Committee gathered information to conduct oversight of the CIA, the CIA was secretly monitoring them, according to reports from McClatchy [News] and the New York Times. The committee staff was reviewing documents in a secure room at CIA headquarters as part of its investigation into the CIA's now-defunct detention and interrogation program, but the agency was secretly monitoring their work, according to reports. Complaints about the spying have reportedly prompted the CIA inspector general -- the agency's internal watchdog -- to look into the agency's behavior. Sen. Mark Udall, D-Colo., seemed to reference the surveillance in a letter to President Obama ... in which he urged the president to support the fullest declassification of the committee's CIA report. "As you are aware, the C.I.A. has recently taken unprecedented action against the committee in relation to the internal C.I.A. review, and I find these actions to be incredibly troubling for the committee's oversight responsibilities and for our democracy," Udall wrote. "It is essential that the Committee be able to do its oversight work -- consistent with our constitutional principle of the separation of powers -- without the CIA posing impediments or obstacles as it is today." Sen. Martin Heinrich, D-N.M., another member of the intelligence committee, declared in a statement Wednesday, "The Senate Intelligence Committee oversees the CIA, not the other way around."

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ
2014-02-27, The Guardian (One of the UK's leading newspapers)
Posted: 2014-03-04 07:42:51
http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-...

Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal. GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not. In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally. Yahoo ... denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy". Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012. The system, eerily reminiscent of the telescreens evoked in George Orwell's Nineteen Eighty-Four, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs. Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds ... to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


New surveillance technology can track everyone in an area for several hours at a time
2014-02-05, Washington Post
Posted: 2014-02-11 08:45:17
http://www.washingtonpost.com/business/technology/new-surveillance-technology...

From 10,000 feet up, tracking an entire city at one glance: Ohio-based Persistent Surveillance Systems is trying to convince cities across the country that its surveillance technology can help reduce crime. Its new generation of camera technology is far more powerful than the police cameras to which America has grown accustomed. But these newer cameras have sparked some privacy concerns. A new, far more powerful generation is being quietly deployed [from small aircraft] that can track every vehicle and person across an area the size of a small city, for several hours at a time. Although these cameras can’t read license plates or see faces, they provide such a wealth of data that police, businesses and even private individuals can use them to help identify people and track their movements. Already, the cameras have been flown above major public events such as the Ohio political rally where Sen. John McCain named Sarah Palin as his running mate in 2008. They’ve been flown above Baltimore; Philadelphia; Compton, Calif.; and Dayton [OH] in demonstrations for police. They’ve also been used for traffic impact studies, [and] for security at NASCAR races. Defense contractors are developing similar technology for the military, but its potential for civilian use is raising novel civil liberties concerns. In Dayton, where Persistent Surveillance Systems is based, city officials balked last year when police considered paying for 200 hours of flights, in part because of privacy complaints. The Supreme Court generally has given wide latitude to police using aerial surveillance as long as the photography captures images visible to the naked eye.

Note: For more on surveillance by government agencies and corporations, see the deeply revealing reports from reliable major media sources available here.


Intel officials believe Snowden has 'doomsday' cache
2013-11-26, MSN/Reuters
Posted: 2014-02-11 08:44:00
http://news.msn.com/us/intel-officials-believe-snowden-has-doomsday-cache

British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said. One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm. U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories. "The worst is yet to come," said one former U.S. official who follows the investigation closely. Snowden ... is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents. [It is] estimated that the total number of Snowden documents made public so far is over 500. Glenn Greenwald, who met with Snowden in Hong Kong and was among the first to report on the leaked documents for the Guardian newspaper, said the former NSA contractor had "taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published."

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Watchdog Report Says N.S.A. Program Is Illegal and Should End
2014-01-23, New York Times
Posted: 2014-01-28 10:19:03
http://www.nytimes.com/2014/01/23/us/politics/watchdog-report-says-nsa-progra...

An independent federal privacy watchdog has concluded that the National Security Agency’s program to collect bulk phone call records has provided only “minimal” benefits in counterterrorism efforts, is illegal and should be shut down. The findings are laid out in a 238-page report [that represents] the first major public statement by the Privacy and Civil Liberties Oversight Board, which Congress made an independent agency in 2007 and only recently became fully operational. The Obama administration has portrayed the bulk collection program as useful and lawful. But in its report, the board lays out what may be the most detailed critique of the government’s once-secret legal theory behind the program: that a law known as Section 215 of the Patriot Act, which allows the F.B.I. to obtain business records deemed “relevant” to an investigation, can be legitimately interpreted as authorizing the N.S.A. to collect all calling records in the country. The program “lacks a viable legal foundation under Section 215, implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value,” the report said. “As a result, the board recommends that the government end the program.” The report also sheds light on the history of the once-secret bulk collection program. It contains the first official acknowledgment that the Foreign Intelligence Surveillance Court produced no judicial opinion detailing its legal rationale for the program until last August, even though it had been issuing orders to phone companies for the records and to the N.S.A. for how it could handle them since May 2006.

Note: The PCLOB report is titled "Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court," and is available here. For more on government attacks to privacy, see the deeply revealing reports from reliable major media sources available here.


NSA collects millions of text messages daily in 'untargeted' global sweep
2014-01-16, The Guardian (One of the UK's leading newspapers)
Posted: 2014-01-20 10:36:45
http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messa...

The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. On average, each day the NSA was able to extract: • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images. • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


N.S.A. Devises Radio Pathway Into Computers
2014-01-15, New York Times
Posted: 2014-01-20 10:31:58
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-conn...

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Keep the focus on facts about NSA spying
2014-01-16, San Francisco Chronicle (SF's leading newspaper)
Posted: 2014-01-20 10:30:26
http://www.sfgate.com/opinion/article/Keep-the-focus-on-facts-about-NSA-spyin...

To have a genuinely constructive debate, data must be compiled, evidence must be amassed and verifiable truths must be presented. This truism is particularly significant when it comes to debates about security and liberty. Without facts, we get the counterproductive discourse we are being treated to right now - the one hijacked by National Security Administration defenders throwing temper tantrums, tossing out fear-mongering platitudes and trying to prevent any scrutiny of the agency. Tune into a national news program and you inevitably will hear pundits who have spent the last decade mindlessly cheering on wars and warrantless wiretapping now echoing the talking points emanating from surveillance-state apparatchiks like Reps. Mike Rogers, R-Mich., and Dutch Ruppersberger, D-Md. This week, these two lawmakers, who head the House Intelligence Committee, summarized all the bluster in a press release that should be enshrined for posterity. In an attempt to defend the NSA, the bipartisan duo breathlessly claimed that whistle-blower Edward Snowden ended up "endangering each and every American" by exposing the government's mass surveillance (i.e., metadata) programs. They indicted Snowden's patriotism and said his disclosures of the NSA's unlawful and unconstitutional programs "aligned him with our enemy." But the facts now leaking out of the government's national security apparatus are doing the opposite. They are debunking - rather than confirming - the NSA defenders' platitudes.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Stealth Surprises in NSA Report Take on Non-NSA Spying
2013-12-20, ABC News
Posted: 2013-12-30 16:31:41
http://abcnews.go.com/Blotter/stealth-surprises-nsa-report-nsa-spying/story?i...

The White House's expert NSA panel may have made headlines ... for telling President Barack Obama to knock off the collection of Americans' meta-data, but surveillance experts said they were surprised that the panel also took to task some controversial non-NSA-related spy tactics as well. One recommendation was to impose much stricter oversight on the FBI's ability to issue National Security Letters (NSLs), which have been used to obtain telephone call records and credit reports in terrorism and espionage cases. Another even more peculiar recommendation by the five national security experts ... was their advice that "governments" shouldn't hack into bank accounts and drain funds. "Governments should not use their offensive cyber capabilities to change the amounts held in financial accounts or otherwise manipulate the financial systems," the unanimous Review Group on Intelligence and Communications Technologies report warned Obama. "That was a strangely specific recommendation for something nobody was talking about," Kel McClanahan, executive director of government transparency group National Security Counselors, told ABC News. Michelle Richardson, the American Civil Liberties Union's legislative council in Washington, also said the findings on "NSLs" and government hacking were unexpected -- but welcomed.

Note: The fact that this expert panel would even mention governments manipulating financial accounts suggests that if it hasn't already happened, some were seriously considering this. For lots more on this strange news, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Edward Snowden, after months of NSA revelations, says his mission’s accomplished
2013-12-23, Washington Post
Posted: 2013-12-30 16:25:36
http://www.washingtonpost.com/world/national-security/edward-snowden-after-mo...

Taken together, the [Edward Snowden] revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations. Six months after the first revelations ... Snowden agreed to reflect at length on the roots and repercussions of his choice. He was relaxed and animated over two days of nearly unbroken conversation. Snowden offered vignettes from his intelligence career and from his recent life as “an indoor cat” in Russia. But he consistently steered the conversation back to surveillance, democracy and the meaning of the documents he exposed. “For me, in terms of personal satisfaction, the mission’s already accomplished,” he said. “I already won. As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn’t want to change society. I wanted to give society a chance to determine if it should change itself. All I wanted was for the public to be able to have a say in how they are governed,” he said. Snowden ... had come to believe that a dangerous machine of mass surveillance was growing unchecked. Closed-door oversight by Congress and the Foreign Intelligence Surveillance Court was a “graveyard of judgment,” he said, manipulated by the agency it was supposed to keep in check. The NSA’s business is “information dominance,” the use of other people’s secrets to shape events. At 29, Snowden upended the agency on its own turf.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


GCHQ and NSA targeted charities, Germans, Israeli PM and EU chief
2013-12-20, The Guardian (One of the UK's leading newspapers)
Posted: 2013-12-30 16:24:08
http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-ger...

British and American intelligence agencies had a comprehensive list of surveillance targets that included the EU's competition commissioner, German government buildings in Berlin and overseas, and the heads of institutions that provide humanitarian and financial help to Africa, top-secret documents reveal. The papers show GCHQ [and the NSA were] targeting organisations such as the United Nations development programme, the UN's children's charity Unicef and Médecins du Monde, a French organisation that provides doctors and medical volunteers to conflict zones. The head of the Economic Community of West African States (Ecowas) also appears in the documents, along with text messages he sent to colleagues. One GCHQ document, drafted in January 2009, makes clear that the agencies were targeting an email address listed as belonging to another important American ally – the "Israeli prime minister". Ehud Olmert was in office at the time. Three further Israeli targets appeared on GCHQ documents, including another email address understood to have been used to send messages between the then Israeli defence minister, Ehud Barak, and his chief of staff, Yoni Koren. The names and details are the latest revelations to come from documents leaked by the whistleblower Edward Snowden. They provoked a furious reaction. The disclosures reflect the breadth of targets sought by the agencies, which goes far beyond the desire to intercept the communications of potential terrorists and criminals, or diplomats and officials from hostile countries.

Note: Later reports revealed that GHCQ also targeted the global human rights organization Amnesty International. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Secret contract tied NSA and security industry pioneer
2013-12-20, CNBC/Reuters
Posted: 2013-12-30 16:21:15
http://www.cnbc.com/id/101290438

As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products. Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year. The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Law enforcement using methods from NSA playbook
2013-12-08, USA Today
Posted: 2013-12-17 11:00:20
http://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-ns...

The National Security Agency isn't the only government entity secretly collecting data from people's cellphones. Local police are increasingly scooping it up, too. Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information about thousands of cellphone users at a time, whether they are targets of an investigation or not. The records, from more than 125 police agencies in 33 states, reveal [that] about one in four law-enforcement agencies have used a tactic known as a "tower dump," which gives police data about the identity, activity and location of any phone that connects to the targeted cellphone towers over a set span of time, usually an hour or two. A typical dump covers multiple towers, and wireless providers, and can net information from thousands of phones. At least 25 police departments own a Stingray, a suitcase-size device that costs as much as $400,000 and acts as a fake cell tower. The system, typically installed in a vehicle so it can be moved into any neighborhood, tricks all nearby phones into connecting to it and feeding data to police. In some states, the devices are available to any local police department via state surveillance units. Organizations such as the American Civil Liberties Union and Electronic Privacy Information Center say the swelling ability by even small-town police departments to easily and quickly obtain large amounts of cellphone data raises questions about the erosion of people's privacy as well as their Fourth Amendment protections against unreasonable search and seizure.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


NSA review to leave spying programs largely unchanged, reports say
2013-12-13, The Guardian (One of the UK's leading newspapers)
Posted: 2013-12-17 10:46:57
http://www.theguardian.com/world/2013/dec/13/nsa-review-to-leave-spying-progr...

A participant in a White House-sponsored review of surveillance activities described as “shameful” an apparent decision to leave most of the National Security Agency’s controversial bulk spying intact. Sascha Meinrath, director of the Open Technology Institute, said [on December 13] that ... “The review group was searching for ways to make the most modest pivot necessary to continue business as usual.” Should the review group’s report resemble descriptions that leaked ... the report “does nothing to alter the lack of trust the global populace has for what the US is doing, and nothing to restore our reputation as an ethical internet steward,” said Meinrath, who met with the advisory panel and White House officials twice to discuss the bulk surveillance programs that have sparked international outrage. Leaks about the review group’s expected recommendations to the New York Times and Wall Street Journal strengthened Meinrath and other participants’ long-standing suspicions that much of the NSA’s sweeping spy powers would survive. The Times quoted an anonymous official familiar with the group saying its report “says we can’t dismantle these programs, but we need to change the way almost all of them operate”. According to the leaks, the review group will recommend that bulk collection of every American’s phone call data continue, possibly by the phone companies instead of the NSA, with tighter restrictions than the “reasonable, articulable suspicion” standard for searching through them that the NSA currently employs.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


Edward Snowden a 'hero' for NSA disclosures, Wikipedia founder says
2013-11-25, The Guardian (One of the UK's leading newspapers)
Posted: 2013-12-02 09:48:22
http://www.theguardian.com/world/2013/nov/25/edward-snowden-nsa-wikipedia-fou...

Jimmy Wales, the founder of Wikipedia, has called on Barack Obama to rein in the National Security Agency as he described the whistleblower Edward Snowden as "a hero" whom history will judge "very favourably". Wales called for a "major re-evaluation" of the NSA, adding that the public "would have never approved this sweeping surveillance program" had it been put to a vote. The revelations, Wales said, had been "incredibly damaging and embarrassing to the US. It makes it very difficult for someone like me to go out, as I do, [to] speak to people in authoritarian countries, and say: 'You shouldn’t be spying on activists, you shouldn’t be censoring the internet', when we [in the US] are complicit in these acts of extraordinary intrusion into people’s personal lives. [Snowden] has exposed what I believe to be criminal wrongdoing, lying to Congress, and certainly [an] affront to the Fourth Amendment. I think that history will judge him very favourably. There is a growing sense of concern in Congress about this, a growing sense in Congress that public is angry about this, that they have been misled and I think we are going to see legislation to change this."

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


FISA court order that allowed NSA surveillance is revealed for first time
2013-11-19, The Guardian (One of the UK's leading newspapers)
Posted: 2013-11-26 08:10:53
http://www.theguardian.com/world/2013/nov/19/court-order-that-allowed-nsa-sur...

A secret court order that authorised a massive trawl by the National Security Agency of Americans' email and internet data was published for the first time on [November 18], among a trove of documents that also revealed a judge's concern that the NSA "continuously" and "systematically" violated the limits placed on the program. Another later court order found that what it called "systemic overcollection" had taken place. In a heavily redacted opinion Colleen Kollar-Kotelly, the former presiding judge of the FISA court, placed legal weight on the methods of surveillance employed by the NSA, which had never before collected the internet data of “an enormous volume of communications”. The methods, known as pen registers and trap-and-trace devices, record the incoming and outgoing routing information of communications. Kollar-Kotelly ruled that acquiring the metadata, and not the content, of email and internet usage in bulk was harmonious with the “purpose” of Congress and prior court rulings – even though no surveillance statute ever authorized it and top officials at the Justice Department and the FBI threatened to resign in 2004 over what they considered its dubious legality. The type of data collected under the program included information on the "to", "from" and "bcc" lines of an email rather than the content. Metadata, wrote Kollar-Kotelly, enjoyed no protection under the fourth amendment to the US constitution, a precedent established by the Supreme Court in 1979 in a single case on which the NSA relies currently.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data
2013-11-20, The Guardian (One of the UK's leading newspapers)
Posted: 2013-11-26 08:09:12
http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-p...

The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden. In the first explicit confirmation that UK citizens have been caught up in US mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo ... says the material is being put in databases where it can be made available to other members of the US intelligence and military community. Until now, it had been generally understood that the citizens of each country were protected from surveillance by any of the others. But the Snowden material reveals that: • In 2007, the rules were changed to allow the NSA to analyse and retain any British citizens' mobile phone and fax numbers, emails and IP addresses swept up by its dragnet. • These communications were "incidentally collected" by the NSA, meaning the individuals were not the initial targets of surveillance operations and therefore were not suspected of wrongdoing. • The NSA has been using the UK data to conduct so-called "pattern of life" or "contact-chaining" analyses, under which the agency can look up to three "hops" away from a target of interest – examining the communications of a friend of a friend of a friend. Three hops for a typical Facebook user could pull the data of more than 5 million people into the dragnet.

Note: For more on government threats to privacy, see the deeply revealing reports from reliable major media sources available here.


GCHQ and European spy agencies worked together on mass surveillance
2013-11-01, The Guardian (One of the UK's leading newspapers)
Posted: 2013-11-12 08:53:10
http://www.theguardian.com/uk-news/2013/nov/01/gchq-europe-spy-agencies-mass-...

The German, French, Spanish and Swedish intelligence services have all developed methods of mass surveillance of internet and phone traffic over the past five years in close partnership with Britain's GCHQ eavesdropping agency. The bulk monitoring is carried out through direct taps into fibre optic cables and the development of covert relationships with telecommunications companies. A loose but growing eavesdropping alliance has allowed intelligence agencies from one country to cultivate ties with corporations from another to facilitate the trawling of the web, according to GCHQ documents leaked by the former US intelligence contractor Edward Snowden. The files also make clear that GCHQ played a leading role in advising its European counterparts how to work around national laws intended to restrict the surveillance power of intelligence agencies. US intelligence officials have insisted the mass monitoring was carried out by the security agencies in the countries involved and shared with the US. The Guardian revealed the existence of GCHQ's Tempora programme, in which the electronic intelligence agency tapped directly into the transatlantic fibre optic cables to carry out bulk surveillance. GCHQ officials expressed admiration for the technical capabilities of German intelligence to do the same thing, [saying] the Federal Intelligence Service (BND) had "huge technological potential and good access to the heart of the internet – they are already seeing some bearers running at 40Gbps and 100Gbps". Bearers is the GCHQ term for the fibre optic cables, and gigabits per second (Gbps) measures the speed at which data runs through them.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


No Morsel Too Minuscule for All-Consuming N.S.A.
2013-11-03, New York Times
Posted: 2013-11-12 08:46:10
http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consu...

When Ban Ki-moon, the United Nations secretary general, sat down with President Obama at the White House in April to discuss Syrian chemical weapons, Israeli-Palestinian peace talks and climate change, it was a cordial, routine exchange. The National Security Agency nonetheless went to work in advance and intercepted Mr. Ban’s talking points for the meeting, a feat the agency later reported as an “operational highlight” in a weekly internal brag sheet. It was emblematic of an agency that for decades has operated on the principle that any eavesdropping that can be done on a foreign target of any conceivable interest — now or in the future — should be done. After all, American intelligence officials reasoned, who’s going to find out? From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as foes, as has become obvious in recent weeks; the agency’s official mission list includes using its surveillance powers to achieve “diplomatic advantage” over such allies as France and Germany and “economic advantage” over Japan and Brazil, among other countries. The scale of eavesdropping by the N.S.A., with 35,000 workers and $10.8 billion a year, sets it apart.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Spain colluded in NSA spying on its citizens, Spanish newspaper reports
2013-10-30, The Guardian (One of the UK's leading newspapers)
Posted: 2013-11-05 08:42:53
http://www.theguardian.com/world/2013/oct/30/spain-colluded-nsa-spying-citize...

The widespread surveillance of Spanish citizens by the US National Security Agency, which caused outrage when it was reported this week, was the product of a collaboration with Spain's intelligence services, according to one Spanish newspaper. Spanish agents not only knew about the work of the NSA but also facilitated it, El Mundo reports. An NSA document entitled "Sharing computer network operations cryptologic information with foreign partners" reportedly shows how the US relies on the collaboration of many countries to give it access to intelligence information, including electronic metadata. According to the document seen by El Mundo, the US classifies cooperation with various countries on four different levels. In the first group – "Comprehensive Cooperation" – are the UK, Australia, Canada and New Zealand. The second group – "Focused Cooperation" – of which Spain is a member, includes 19 countries, all of them European, apart from Japan and South Korea. The third group – "Limited cooperation" – consists of countries such as France, Israel, India and Pakistan; while the fourth – "Exceptional Cooperation" – is made up of countries that the US considers to be hostile to its interests. The NSA documents [suggest] the Spanish intelligence services were working hand in hand with the NSA, as were other foreign agencies. But if there was any doubt as to who held the upper hand, the NSA documents make clear that any collaboration was always to serve the needs of protecting American interests.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


NSA monitored calls of 35 world leaders after US official handed over contacts
2013-10-24, The Guardian (One of the UK's leading newspapers)
Posted: 2013-10-29 09:11:47
http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-c...

The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden. The confidential memo reveals that the NSA encourages senior officials in its "customer" departments, such as the White House, State and the Pentagon, to share their "Rolodexes" so the agency can add the phone numbers of leading foreign politicians to their surveillance systems. The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately "tasked" for monitoring by the NSA. The revelation is set to add to mounting diplomatic tensions between the US and its allies, after the German chancellor Angela Merkel ... accused the US of tapping her mobile phone. The NSA memo obtained by the Guardian suggests that such surveillance was not isolated, as the agency routinely monitors the phone numbers of world leaders – and even asks for the assistance of other US officials to do so. The memo, dated October 2006 and which was issued to staff in the agency's Signals Intelligence Directorate (SID), was titled "Customers Can Help SID Obtain Targetable Phone Numbers". In the wake of the Merkel row, the US is facing growing international criticism that any intelligence benefit from spying on friendly governments is far outweighed by the potential diplomatic damage.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Snowden Says He Took No Secret Files to Russia
2013-10-17, New York Times
Posted: 2013-10-29 09:08:16
http://www.nytimes.com/2013/10/18/world/snowden-says-he-took-no-secret-files-...

Edward J. Snowden, the former National Security Agency contractor, said in an extensive interview this month that he did not take any secret N.S.A. documents with him to Russia when he fled there in June, assuring that Russian intelligence officials could not get access to them. He also asserted that he was able to protect the documents from China’s spies because he was familiar with that nation’s intelligence abilities, saying that as an N.S.A. contractor he had targeted Chinese operations and had taught a course on Chinese cybercounterintelligence. “There’s a zero percent chance the Russians or Chinese have received any documents,” he said. Mr. Snowden added that inside the spy agency “there’s a lot of dissent.” But he said that people were kept in line through “fear and a false image of patriotism,” which he described as “obedience to authority.” He said he believed that if he tried to question the N.S.A.’s surveillance operations as an insider, his efforts “would have been buried forever,” and he would “have been discredited and ruined.” Mr. Snowden said he finally decided to act when he discovered a copy of a classified 2009 inspector general’s report on the N.S.A.’s warrantless wiretapping program during the Bush administration. After reading about the program, which skirted the existing surveillance laws, he concluded that it had been illegal, he said. “If the highest officials in government can break the law without fearing punishment or even any repercussions at all,” he said, “secret powers become tremendously dangerous.”

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Edward Snowden is no traitor
2013-10-21, Washington Post
Posted: 2013-10-29 09:05:55
http://www.washingtonpost.com/opinions/richard-cohen-edward-snowden-is-no-tra...

What are we to make of Edward Snowden? I know what I once made of him. He was no real whistleblower, I wrote, but “ridiculously cinematic” and “narcissistic” as well. As time has proved, my judgments were just plain wrong. Whatever Snowden is, he is curiously modest and has bent over backward to ensure that the information he has divulged has done as little damage as possible. As a “traitor,” he lacks the requisite intent and menace. But traitor is what Snowden has been roundly called. Harry Reid: “I think Snowden is a traitor.” John Boehner: “He’s a traitor.” Rep. Peter King: “This guy is a traitor; he’s a defector.” And Dick Cheney not only denounced Snowden as a “traitor” but also suggested that he might have shared information with the Chinese. This innuendo, as with Saddam Hussein’s weapons of mass destruction, is more proof of Cheney’s unerring determination to be cosmically wrong. The early denunciations of Snowden now seem both over the top and beside the point. If he is a traitor, then which side did he betray and to whom does he now owe allegiance? Snowden seems to have sold out to no one. In fact, a knowledgeable source says that Snowden has not even sold his life story and has rebuffed offers of cash for interviews. Maybe his most un-American act is passing up a chance at easy money. Someone ought to look into this. Snowden’s residency in Russia has been forced upon him — he had nowhere else to go. Snowden insists that neither the Russians nor, before them, the Chinese have gotten their grubby hands on his top-secret material.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


The Snowden files: why the British public should be worried about GCHQ
2013-10-03, The Guardian (One of the UK's leading newspapers)
Posted: 2013-10-15 10:56:03
http://www.theguardian.com/world/2013/oct/03/edward-snowden-files-john-lanche...

The problem and the risk [with surveillance by GCHQ] comes in the area of mass capture of data, or strategic surveillance. This is the kind of intelligence gathering that sucks in data from everyone, everywhere: from phones, internet use from email to website visits, social networking, instant messaging and video calls, and even areas such as video gaming; in short, everything digital. In the US, the Prism programme may have given the NSA access to the servers of companies such as Google and Facebook; in the UK, GCHQ has gained a similar degree of access via its Tempora programme, and the two of them together have a cable- and network-tapping capabilities collectively called Upstream, which have the ability to intercept anything that travels over the internet. This data is fed into a database called XKeyscore, which allows analysts to extract information "in real time", ie immediately. What this adds up to is a new thing in human history: with a couple of clicks of a mouse, an agent of the state can target your home phone, or your mobile, or your email, or your passport number, or any of your credit card numbers, or your address, or any of your log-ins to a web service. Using that "selector", the state can get access to all the content of your communications, via any of those channels; can gather information about anyone you communicate with, can get a full picture of all your internet use, can track your location online and offline. It can, in essence, know everything about you, including – thanks to the ability to look at your internet searches – what's on your mind.

Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


Privacy Fears Grow as Cities Increase Surveillance
2013-10-14, New York Times
Posted: 2013-10-15 10:54:38
http://www.nytimes.com/2013/10/14/technology/privacy-fears-as-surveillance-gr...

Federal grants of $7 million, initially intended to help thwart terror attacks at the port in Oakland, Calif., are instead going to a police initiative that will collect and analyze reams of surveillance data. The new system ... is the latest example of how cities are compiling and processing large amounts of information, known as big data, for routine law enforcement. And the system underscores how technology has enabled the tracking of people in many aspects of life. Like the Oakland effort, other pushes to use new surveillance tools in law enforcement are supported with federal dollars. The New York Police Department, aided by federal financing, has a big data system that links 3,000 surveillance cameras with license plate readers, radiation sensors, criminal databases and terror suspect lists. Police in Massachusetts have used federal money to buy automated license plate scanners. And police in Texas have bought a drone with homeland security money. [Critics] of the Oakland initiative, formally known as the Domain Awareness Center, [say] the program, which will create a central repository of surveillance information, will also gather data about the everyday movements and habits of law-abiding residents. Oakland has a contract with the Science Applications International Corporation, or SAIC, to build its system. That company has earned the bulk of its $12 billion in annual revenue from military contracts.

Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


N.S.A. Gathers Data on Social Connections of U.S. Citizens
2013-09-29, New York Times
Posted: 2013-10-08 08:50:51
http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citiz...

Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials. The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor. The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners. Almost everything about the agency’s operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nation’s intelligence court or any public debate.

Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


NSA stories around the world
2013-09-23, The Guardian (One of the UK's leading newspapers)
Posted: 2013-10-01 10:13:43
http://www.theguardian.com/commentisfree/2013/sep/23/various-items-nsa-india-...

One of the most overlooked aspects of the NSA reporting in the US has been just how global of a story this has become. Last week it was revealed that Belgium's largest telecom, Belgacom, was the victim of a massive hacking attack which systematically compromised its system for as long as two years. Last week, using documents obtained from NSA whistleblower Edward Snowden, Laura Poitras and other Der Spiegel journalists reported in that paper that it was the GCHQ, Britain's intelligence agency, that was behind the attack. According to that report, the attack was carried out by targeting individual engineers at the telecom with malware that allowed GCHQ agents to "own" their computer and thus exploit their access to the telecommunications system. As the US and UK run around the world protesting the hacking activities of others and warning of the dangers of cyber-attacks, that duo is one of the most aggressive and malicious, if not the most aggressive and malicious, perpetrators of those attacks of anyone on the planet. Nobody hacks as prolifically and aggressively as the two countries who most vocally warn of the dangers of hacking. A coalition called Stop Watching Us has been formed by privacy and civil liberties groups from across the political spectrum. On October 26, the 12th anniversary of the enactment of the Patriot Act, they will hold an anti-surveillance rally in Washington DC.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


DARPA's 'Hydra' would be an undersea drone carrier
2013-07-23, NBC News
Posted: 2013-09-24 10:03:52
http://www.nbcnews.com/technology/darpas-hydra-would-be-undersea-drone-carrie...

Unmanned aerial vehicles, or UAVs, are in the news constantly, but what about unmanned underwater vehicles? They could also be important in both war and peace, which is why the Defense Department's research arm, DARPA, is looking into a mobile submarine base from which to launch drones. The project, still in the earliest stages, is called "Hydra," after the mythical beast whose heads multiplied upon being cut off. The idea is to create a sort of underwater version of an aircraft carrier. The Hydra, itself an unmanned underwater vehicle, would be stocked with drones of various kinds and capacities: circling overhead, scouting underwater for mines, or listening on the surface.

Note: For more on the US military and police use of drones both abroad and in the US, see the deeply revealing reports from reliable major media sources available here.


Revealed: how US and UK spy agencies defeat internet privacy and security
2013-09-05, The Guardian (One of the UK's leading newspapers)
Posted: 2013-09-10 08:42:44
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves. Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software. "Backdoors are fundamentally in conflict with good security," said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. "Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise."

Note: For an excellent article in the New York Times on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.


N.S.A. Able to Foil Basic Safeguards of Privacy on Web
2013-09-06, New York Times
Posted: 2013-09-10 08:41:18
http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show. Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth. The agency ... deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products [called "backdoors"].

Note: For an excellent article in the UK's respected Guardian on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.


NSA broke privacy rules thousands of times per year, audit finds
2013-08-15, Washington Post
Posted: 2013-08-19 16:21:58
http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules...

The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents. Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by statute and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls. The documents, provided earlier this summer to The Washington Post by former NSA contractor Edward Snowden, include a level of detail and analysis that is not routinely shared with Congress or the special court that oversees surveillance. In one of the documents, agency personnel are instructed to remove details and substitute more generic language in reports to the Justice Department and the Office of the Director of National Intelligence. In one instance, the NSA decided that it need not report the unintended surveillance of Americans. The NSA audit obtained by The Post, dated May 2012, counted 2,776 incidents in the preceding 12 months of unauthorized collection, storage, access to or distribution of legally protected communications. Many involved failures of due diligence or violations of standard operating procedure. The most serious incidents included a violation of a court order and unauthorized use of data about more than 3,000 Americans and green-card holders.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


XKeyscore: NSA tool collects 'nearly everything a user does on the internet'
2013-07-31, The Guardian (One of the UK's leading newspapers)
Posted: 2013-08-06 08:08:29
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


Apple, Google, Facebook and others urge government surveillance disclosure
2013-07-18, NBC News/Reuters
Posted: 2013-07-31 11:54:21
http://www.nbcnews.com/technology/apple-google-facebook-others-urge-surveilla...

Dozens of companies, non-profits and trade organizations including Apple, Google, and Facebook sent a letter [on July 18] pushing the Obama administration and Congress for more disclosures on the government's national security-related requests for user data. Together with LinkedIn, Yahoo!, Microsoft, Twitter and many others, the companies asked for more transparency of secret data gathering in the letter. Tech companies have been scrambling to assert their independence after documents leaked last month by former U.S. security contractor Edward Snowden suggested they had given the government direct access to their computers as part of the NSA's secret surveillance program called Prism. The classified nature of the data gathering has barred the participating companies from disclosing even their involvement, let alone the content of the requests. Some companies, including Facebook and Apple, in June struck an agreement with the government to release some information about the number of surveillance requests they receive. But they were limited to disclosing aggregate government requests for data without showing the split between surveillance and criminal requests, and only for a six-month period.

Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.


ACLU warns of mass tracking through license plate scanners
2013-07-18, CBS News
Posted: 2013-07-23 08:55:22
http://www.cbsnews.com/8301-201_162-57594179/aclu-warns-of-mass-tracking-thro...

The American Civil Liberties Union is warning that law enforcement officials are using license plate scanners to amass massive and unregulated databases that can be used to track law-abiding citizens as their go about their daily lives. In a new report, "You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements," the ACLU discusses the data culled from license plate scanners - cameras mounted on patrol cars, overpasses and elsewhere to record your license plate number and location at a given time. There are tens of thousands such cameras now in operation, according to the group, with the data in some cases being stored indefinitely. The ACLU report is the result of an analysis of 26,000 pages of documents from police departments around the country, obtained through nearly 600 [FOIA] requests. It finds that while some jurisdictions keep the information gleaned from the scanners for a short time ... many hold onto the data for years. The organization complains that there are "virtually no rules in place" to keep officials from tracking "everybody all the time." The ACLU also warns that the data is being fed into larger databases, with the private National Vehicle Location Service now holding more than 800 million license plate records. The group's database is used by more than 2,200 law enforcement customers. The [ACLU] report warns that the data can be used in an official capacity to spy on protesters or target communities based on their religious beliefs, or unofficially by a police officer who wants to keep an eye on a romantic rival.

Note: For more on privacy, see the deeply revealing reports from reliable major media sources available here.


How Barrett Brown shone light on the murky world of security contractors [and is now jailed]
2013-06-24, The Guardian (One of the UK's leading newspapers)
Posted: 2013-07-01 13:21:43
http://www.guardian.co.uk/commentisfree/2013/jun/24/surveillance-us-national-...

[Barrett] Brown is not a household name like Edward Snowden or Bradley Manning. But after helping expose a dirty tricks plot, he faces jail. Brown made a splash in February 2011 by helping to uncover "Team Themis", a project by intelligence contractors retained by Bank of America to demolish the hacker society known as Anonymous. The Team Themis story began in late 2010, when Julian Assange warned WikiLeaks would release documents outlining an "ecosystem of corruption [that] could take down a bank or two." Bank of America went into damage-control mode and, as the New York Times reported, assembled "a team of 15 to 20 top Bank of America officials … scouring thousands of documents in the event that they become public." Days later, Bank of America retained the well-connected law firm of Hunton & Williams [which] "proposed various schemes to attack" WikiLeaks. Its partners suggested creating false documents and fake personas to damage progressive organizations. The tech companies' emails – which Anonymous hacked and Barrett Brown helped publicize – listed planned tactics: "Feed[ing] the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error." Brown [has] been cooling his heels in a jail outside Dallas ... awaiting two separate trials that could put him on ice for more than 100 years. In contrast to the FBI's aggressive pursuit of Brown, no probe of the Team Themis project was launched – despite a call from 17 US House representatives to investigate a possible conspiracy to violate federal laws.

Note: With the wide focus on the privatized national security state by the leaks from Edward Snowden, there is renewed interest in Brown's plight and the campaign for justice in his case. For more on this and to support Barret Brown, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.


Wearing a mask at a riot is now a crime
2013-06-19, CBC (Canada's Public Broadcasting System)
Posted: 2013-07-01 13:12:36
http://www.cbc.ca/news/canada/story/2013/06/19/pol-mask-bill-royal-assent.html

A bill that bans the wearing of masks during a riot or unlawful assembly and carries a maximum 10-year prison sentence ... became law today. The bill is meant to give police an added tool to prevent lawful protests from becoming violent riots, and that it will help police identify people who engage in vandalism or other illegal acts. The bill originally proposed a penalty of up to five years, but the House of Commons justice committee amended it and doubled the penalty to up to 10 years in prison for committing the offence. The bill didn't have unanimous support, and was opposed by some who are concerned about its effect on freedom of expression and privacy. Civil liberties advocates argued the measures could create a chilling effect on free speech and that peaceful protesters can unintentionally find themselves involved in an unlawful assembly. They also noted that there are legitimate reasons for wearing masks at protests; some may be worried about reprisals at work, for example, if sighted at a political protest. "Any law that infringes upon civil liberties needs to be held to a test of absolute necessity, and I don't think that test has been met in this instance," said Michael Byers, a political scientist at the University of British Columbia.

Note: Police seem to be specifically targeting the now popular Guy Falkes masks representing opposition to oppressive authority. For more on the erosion of civil liberties, see the deeply revealing reports from reliable major media sources available here.


Daniel Ellsberg on the Limits of Knowledge
2010-02-27, Mother Jones
Posted: 2013-07-01 13:00:51
http://www.motherjones.com/kevin-drum/2010/02/daniel-ellsberg-limitations-kno...

[Here's a story] from Ellsberg's book Secrets. The setting is a meeting with Henry Kissinger in late 1968. In 1968 Ellsberg was a highly respected analyst ... who had worked for both the Pentagon and Rand, and Kissinger was just entering the government. Ellsberg told him, "Henry, there's something I would like to tell you. You've dealt a great deal with top secret information. But you're about to receive a whole slew of special clearances, maybe fifteen or twenty of them, that are higher than top secret. First, you'll be exhilarated by some of this new information. But second, ... you will feel like a fool for having studied, written, talked about these subjects, criticized and analyzed decisions made by presidents for years without having known of the existence of all this information. In particular, you'll feel foolish for having literally rubbed shoulders for over a decade with some officials and consultants who did have access to all this ... and you'll be stunned that they kept that secret from you so well. You will feel like a fool. Then, after you've ... become used to using what amounts to whole libraries of hidden information, ... you will forget there ever was a time when you didn't have it. You'll be aware only of the fact that you have it now and most others don't ... and that all those other people are fools. [In] a matter of two or three years — you'll eventually become aware of the limitations of this information. It's often inaccurate, and it can lead you astray. But that takes a while to learn. In the meantime ... you will deal with a person who doesn't have those clearances only from the point of view of what you want him to believe and what impression you want him to go away with. You'll have to lie carefully to him about what you know. In effect, you will have to manipulate him.

Note: Don't miss the entire fascinating, highly revealing article at the link above. To see this quote from Ellsberg's book on Google books, click here. For more on government secrets, see the deeply revealing reports from reliable major media sources available here.


Rothschild and Rockefeller families team up for some extra wealth creation
2012-05-30, The Telegraph (One of the UK's leading newspapers)
Posted: 2013-07-01 12:57:30
http://www.telegraph.co.uk/finance/newsbysector/banksandfinance/9300784/Roths...

The Rothschild and Rockefeller families have teamed up to buy assets from banks and other distressed sellers in a union between two of the best-known names in financial history. RIT Capital Partners, which is chaired by Lord Rothschild, has taken a 37pc stake in Rockefeller Financial Services, the family’s wealth advisory and asset management wing. It has snapped up the holding from French bank Société Générale for less than Ł100m. The transatlantic alliance cements a five-decade acquaintance between the now ennobled Jacob Rothschild, 76, and David Rockefeller, 96, the grandson of the ruthlessly acquisitive American oilman and philanthropist John D Rockefeller. The two patricians now plan to capitalise on their family names to buy other asset managers or their portfolios, using their networks of top-notch contacts to ensure they get a seat at the table for any deal. The Rockefeller group goes back to 1882, set up to invest the family money made by John D Rockefeller’s Standard Oil, the forerunner for today’s Exxon Corporation, which he built with a Darwinian aggression. “Do you know the only thing that gives me pleasure? It’s to see my dividends coming in,” he once said. The Rothschild banking dynasty has its roots in the 18th century when Mayer Amschel Rothschild set up a business in Frankfurt. That sprang to fame in 1815 when it bought government bonds in anticipation of Napoleon’s defeat at Waterloo.

Note: Why is that these two hugely wealthy families get so little press coverage? Could it be that their wealth and influence exerts control over the major media? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.


Rothschilds to merge British and French banking operations to secure control
2012-04-05, The Telegraph (One of the UK's leading newspapers)
Posted: 2013-07-01 12:52:09
http://www.telegraph.co.uk/finance/newsbysector/banksandfinance/9189053/Roths...

The Rothschild dynasty is to merge its British and French banking operations to secure long-term control of the business and to boost the firm's financial strength ahead of the introduction of tougher capital requirements for banks. The 200-year-old banks will be reunited under a single shareholding that will bring together the fortunes of the French and English sides of the renowned family as they attempt to safeguard the business against the effects of new regulation and the fallout from the global financial crisis. Paris Orleans, the Rothschild Group's Paris-based holding company, will convert into a French limited partnership, securing the families' control of the bank against potential takeovers. The new partnership will then buy out minority investors in NM Rothschild & Sons, the UK business, as well as outstanding minority interests in the French operations. Paris Orleans has a market value of more than €500m (Ł415m) and is about 30pc owned by outside investors. The Rothschild Group employs 3,000 people in 42 countries and is one of the world's leading independent investment banks, advising some of the largest international companies on capital raisings and mergers and acquisitions. The bank also remains a player in the private equity industry and operates several merchant banking operations that invest directly in business across Europe and the rest of the world.

Note: Why is that these two hugely wealthy families get so little press coverage? Could it be that their wealth and influence exerts control over the major media? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.


Western Europe: New Elan in an Old Clan
1963-12-20, Time Magazine
Posted: 2013-07-01 12:48:37
http://www.time.com/time/magazine/article/0,9171,938990,00.html

For seven generations, one European family has dominated an incredible part of all that money can buy. From its London and Paris banks, the family's millions have been sent forth to ... business enterprises on six continents. Some of its stately dwellings are the kind of mansions that mere San Simeons hoped to imitate. This ancient and unusual banking dynasty shields itself from the curious eye of the public, but the map and history of Europe have been changed by its action and etched with its name: the House of Rothschild. Seldom unimaginative in the use of their money, Rothschild gold has powered the ambitions of prime ministers, princes and popes. It has financed wars and reparations treaties, changed the course of politics and bailed out armies and nations. The Rothschilds strung railroads across the Continent, gained control of the Suez Canal [and] carved diamond mines in the African veld. The British Rothschilds [are still] the world's most important bullion dealers. No modern family ... has been so important for so long in European business. Newer dynasties such as the Rockefellers and the Fords have made more millions, but ... ledgers cannot reflect the Rothschild lands, their possessions and influence accumulated over the generations, their priceless collections of art. Today, the legend is very much alive—and being added to. The Rothschilds are striking out in many new directions behind a silver curtain of discretion. Rather than run companies by themselves, the Rothschilds often prefer to start or join syndicates, placing their men on boards to exert maximum influence with minimum investment risk. [They rely on] a far spreading network of agents, who seldom even admit that they are employed by the Rothschilds.

Note: To read the full, fascinating article, click here. The major media have very rarely exposed the power and wealth of the Rothschilds as in this article. Note that the article was written less than a month after the assassination of John F. Kennedy. Could it be because of some anger at the elite who killed Kennedy that this highly revealing article was actually published? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.


NSA surveillance played little role in foiling terror plots, experts say
2013-06-12, The Guardian (One of the UK's leading newspapers)
Posted: 2013-06-18 13:30:01
http://www.guardian.co.uk/world/2013/jun/12/nsa-surveillance-data-terror-attack

Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.

Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.


Daniel Ellsberg: ‘I’m sure that President Obama would have sought a life sentence in my case’
2013-06-05, Washington Post
Posted: 2013-06-18 13:28:28
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/05/daniel-ellsberg-im...

[Daniel] Ellsberg is one of the most outspoken critics of the Obama administration’s prosecution of leakers. Under President Obama’s tenure, the government has prosecuted six individuals for releasing classified information to media organizations. Ellsberg is particularly fierce in his support of Bradley Manning, a young soldier who released a large amount of classified information to WikiLeaks. Manning was arrested in 2010, and his military court-martial began this week. Ellsberg considers Manning a hero, and he argues that there is little difference between what Manning did in 2010 and what Ellsberg did four decades earlier. [Q.}: In a 1973 interview, you said that a “secondary objective” of releasing the Pentagon Papers was “the hope of changing the tolerance of Executive secrecy that had grown up over the last quarter of a century both in Congress and the courts and in the public at large.” How has that “tolerance of secrecy” changed over the last four decades? DE: There’s been very great tolerance that if the magic words “national security,” or the new words “homeland security” are invoked, Congress has given the president virtually a free hand in deciding what information they will know as well as the public. I wouldn’t count on the current court with its current makeup making the same ruling with the Pentagon Papers as they did 40 years ago. I’m sure that President Obama would have sought a life sentence in my case. Various things that were counted as unconstitutional then have been put in the president’s hands now. He’s become an elected monarch. Nixon’s slogan, “when the president does it, it’s not illegal,” is pretty much endorsed now.

Note: To see key quotes showing the amazing courage and dedication of Snowden, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.


Connecting the Dots on PRISM, Phone Surveillance, and the NSA’s Massive Spy Center
2013-06-12, Wired Magazine
Posted: 2013-06-18 13:26:14
http://www.wired.com/threatlevel/2013/06/nsa-prism-verizon-surveillance

Long before Edward Snowden walked out of the NSA with his trove of documents, whistleblowers there had been trying for years to bring attention to the massive turn toward domestic spying that the agency was making. Last year in my Wired cover story on the enormous new NSA data center in Utah, Bill Binney, the man who largely designed the agency’s worldwide eavesdropping system, warned of the secret, nationwide surveillance. He told how the NSA had gained access to billions of billing records not only from AT&T but also from Verizon. I also wrote about Adrienne J. Kinne, an NSA intercept operator who attempted to blow the whistle on the NSA’s illegal eavesdropping on Americans following the 9/11 attacks. She [attempted and failed] to end the illegal activity with appeals all the way up the chain of command to Major General Keith Alexander. The deception by General Alexander is especially troubling. In my new cover story for Wired’s July issue ...I show how he has become the most powerful intelligence chief in the nation’s history. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the U.S. Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

Note: James Bamford, the author of this article, was the ABC producer responsible for breaking the story on Operation Northwoods, which proved a level of deception almost beyond belief at the very highest levels of the Pentagon. For more on this, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.


Everything you need to know about the NSA’s phone records scandal
2013-06-06, Washington Post
Posted: 2013-06-11 07:31:12
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/06/everything-you-nee...

The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata — a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, it’s possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So it’s possible the NSA is using rooms like that to listen to everyone’s phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but it’s hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.

Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.


Are all telephone calls recorded and accessible to the US government?
2013-05-04, The Guardian (One of the UK's leading newspapers)
Posted: 2013-05-14 09:17:48
http://www.guardian.co.uk/commentisfree/2013/may/04/telephone-calls-recorded-...

CNN's Out Front with Erin Burnett [has been] focused on the possible involvement in the Boston Marathon attack of Katherine Russell, the 24-year-old American widow of the deceased suspect, Tamerlan Tsarnaev. Anonymous government officials are claiming that they are now focused on telephone calls between Russell and Tsarnaev that took place both before and after the attack to determine if she had prior knowledge of the plot or participated in any way. Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could: BURNETT: There's no way they actually can find out what happened, right, unless she tells them? CLEMENTE: No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. We certainly can find that out. BURNETT: So they can actually get that? People are saying, look, that is incredible. CLEMENTE: No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not. On Thursday night, Clemente again appeared on CNN. He reiterated what he said the night before but added expressly that "all digital communications in the past" are recorded and stored. All digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.

Note: All of our communications have been monitored by government computers for years. BBC News reported in this this 1999 article about the Echelon network which monitors all communications globally. For deeply revealing reports from reliable major media sources on government and corporate threats to privacy, click here.


1.6 Billion Rounds Of Ammo For Homeland Security? It's Time For A National Conversation
2013-03-11, Forbes
Posted: 2013-03-19 09:23:52
http://www.forbes.com/sites/ralphbenko/2013/03/11/1-6-billion-rounds-of-ammo-...

The Denver Post, on February 15th, ran an Associated Press article entitled "Homeland Security aims to buy 1.6b rounds of ammo". It confirmed that the Department of Homeland Security has issued an open purchase order for 1.6 billion rounds of ammunition. Some of this purchase order is for hollow-point rounds, forbidden by international law for use in war, along with a frightening amount specialized for snipers. Also reported elsewhere, at the height of the Iraq War the Army was expending less than 6 million rounds a month. Therefore 1.6 billion rounds would be enough to sustain a hot war for 20+ years. DHS now is [also] showing off its acquisition of heavily armored personnel carriers, repatriated from the Iraqi and Afghani theaters of operation. The Department of Homeland Security is apparently taking delivery (apparently through the Marine Corps Systems Command, Quantico VA, via the manufacturer – Navistar Defense LLC) of an undetermined number of [recently retrofitted] ‘Mine Resistant Protected’ MaxxPro MRAP vehicles for service on the streets of the United States.” Why would they need such over-the-top vehicles on U.S. streets to withstand IEDs, mine blasts, and 50 caliber hits to bullet-proof glass? In a war zone… yes, definitely. [But] on the streets of America?

Note: For a U.S. Army field manual titled "Internment and Resettlement Operations" (FM 3-39.40) describing how large numbers of American citizens could be sent to internment camps if involved in "terrorist" activities, click here. The introduction to this document states, "Commanders will use technology and conduct police intelligence operations to influence and control populations, evacuate detainees and, conclusively, transition rehabilitative and reconciliation operations to other functional agencies." For a disturbing report on the massive expansion of drones over US skies, click here.


U.S. to let spy agencies scour Americans' finances
2013-03-13, Chicago Tribune/Reuters
Posted: 2013-03-19 09:08:52
http://articles.chicagotribune.com/2013-03-13/business/chi-us-to-let-spy-agen...

The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document. The proposed plan represents a major step by U.S. intelligence agencies to spot and track down [targeted persons] by bringing together financial databanks, criminal records and military intelligence. Financial institutions that operate in the United States are required by law to file reports of "suspicious customer activity," such as large money transfers or unusually structured bank accounts, to Treasury's Financial Crimes Enforcement Network (FinCEN). The Federal Bureau of Investigation already has full access to the database. However, intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, currently have to make case-by-case requests for information to FinCEN. The Treasury plan would give spy agencies the ability to analyze more raw financial data than they have ever had before. Financial institutions file more than 15 million "suspicious activity reports" every year, according to Treasury. Banks, for instance, are required to report all personal cash transactions exceeding $10,000.

Note: For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.


Raytheon software trolls social networks
2013-02-12, San Francisco Chronicle (SF's leading newspaper)
Posted: 2013-02-19 10:06:09
http://www.sfgate.com/technology/article/Raytheon-software-trolls-social-netw...

Raytheon, a Massachusetts defense contractor, has built tracking software that pulls information from social networks, according to a video obtained by the Guardian newspaper in London. "[Raytheon] has acknowledged the technology was shared with U.S. government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analyzing 'trillions of entities' from cyberspace." Using public data from Facebook, Twitter, Gowalla and Foursquare, the software - called RIOT, or Rapid Information Overlay Technology - apparently gathers uploaded information and forms a profile of a person's every move that was registered with one of the websites. The video obtained by the newspaper starts with a demonstration by Raytheon's "principal investigator," Brian Urch, showing how easy it is to track an employee named Nick - a real person - based on all the places he has checked in using his smartphone. "When people take pictures and post them on the Internet using their smartphones, the phone will actually embed the latitude and longitude in the header data - so we're going to take advantage of that," Urch says. "So now we know where Nick's gone ... and now we'll predict where he'll be in the future." Urch goes on to analyze - using graphs and calendars - where Nick likes to spend his personal time and make predictions about his behavior. "If you ever wanted to get a hold of his laptop, you might want to visit the gym at 6 a.m. on Monday," Urch says with alarming casualness.

Note: To read the full Guardian article, click here.


Rented computers secretly photographed users having sex
2012-09-26, BBC News
Posted: 2012-10-02 10:06:39
http://www.bbc.co.uk/news/technology-19726954

Rented computers from seven different companies secretly took photographs of their users, US authorities have said. The companies used software made by US company Designerware which could track key strokes and other personal data. The software, called PC Rental Agent, captured people engaging in "intimate acts", including sex. It is believed that PC Rental Agent has been installed in approximately 420,000 computers worldwide. The Federal Trade Commission ruling concerned a feature in the software, called Detective Mode, which would typically become activated if the user was late in returning equipment, or failed to pay for use. Detective Mode would assist the rental store in locating the overdue computer in order to pursue its return. Part of the process involved a pop-up window designed to look like a software registration screen. It would request personal information such as email addresses and telephone numbers that could then be used to pursue the users for payment and/or the return of equipment. In addition, the FTC said the software had access to much more sensitive information, including: usernames and passwords for email accounts, social media websites, and financial institutions. Among the other data collected were social security numbers; medical records; private emails to doctors; bank and credit card statements. Webcam pictures of children, partially undressed individuals, and intimate activities at home were also found. In the FTC's formal complaint document, it said the software had captured "couples engaged in sexual activities".

Note: Do you think other companies or intelligence agencies might be conducting similar monitoring? For more on this, click here.


The Program
2012-08-23, New York Times
Posted: 2012-09-04 09:03:46
http://www.nytimes.com/2012/08/23/opinion/the-national-security-agencys-domes...

[William] Binney, a 32-year veteran of the National Security Agency turned whistle-blower, ... described details about Stellar Wind, the N.S.A.’s top-secret domestic spying program begun after 9/11, which was so controversial that it nearly caused top Justice Department officials to resign in protest, in 2004. “The decision must have been made in September 2001,” Mr. Binney told me [and] cinematographer Kirsten Johnson. “That’s when the equipment started coming in.” He resigned over this in 2001 and began speaking out publicly in the last year. [Binney] is among a group of N.S.A. whistle-blowers, including Thomas A. Drake, who have each risked everything — their freedom, livelihoods and personal relationships — to warn Americans about the dangers of N.S.A. domestic spying. The N.S.A. has technical abilities that are nearly impossible to defend against if you are targeted. The 2008 amendments to the Foreign Intelligence Surveillance Act, which oversees the N.S.A. activities, are up for renewal in December. Two members of the Senate Select Committee on Intelligence, Senators Ron Wyden of Oregon and Mark Udall of Colorado ... have been warning about “secret interpretations” of laws and backdoor “loopholes” that allow the government to collect our private communications. Thirteen senators have signed a letter expressing concern about a “loophole” in the law that permits the collection of United States data. The A.C.L.U. and other groups have also challenged the constitutionality of the law, and the Supreme Court will hear arguments in that case on Oct. 29.

Note: The video about this on the NY Times webpage at the link above is quite revealing. One potent comment of this 32-year NSA veteran in the video is "They wanted to highly classify the extreme impeachable crimes they were committing." For deeply revealing reports from reliable major media sources on government and corporate surveillance, click here.


The new totalitarianism of surveillance technology
2012-08-15, The Guardian (One of the UK's leading newspapers)
Posted: 2012-08-21 10:03:51
http://www.guardian.co.uk/commentisfree/2012/aug/15/new-totalitarianism-surve...

Last week, New York Mayor Michael Bloomberg joined NYPD Commissioner Ray Kelly to unveil a major new police surveillance infrastructure, developed by Microsoft. The Domain Awareness System links existing police databases with live video feeds, including cameras using vehicle license plate recognition software. No mention was made of whether the system plans to use – or already uses – facial recognition software. But, at present, there is no law to prevent US government and law enforcement agencies from building facial recognition databases. And we know from industry newsletters that the US military, law enforcement, and the department of homeland security are betting heavily on facial recognition technology. As PC World notes, Facebook itself is a market leader in the technology – but military and security agencies are close behind. According to Homeland Security Newswire, billions of dollars are being invested in the development and manufacture of various biometric technologies capable of detecting and identifying anyone, anywhere in the world – via iris-scanning systems, already in use; foot-scanning technology (really); voice pattern ID software, and so on. What is very obvious is that this technology will not be applied merely to people under arrest, or to people under surveillance in accordance with the fourth amendment. No, the "targets" here [include] everyone. In the name of "national security", the capacity is being built to identify, track and document any citizen constantly and continuously.

Note: For deeply revealing reports from reliable major media sources on civil liberties, click here.


Brother, Can You Spare $6 Trillion?
2012-02-18, New York Times
Posted: 2012-04-02 20:33:39
http://www.nytimes.com/2012/02/18/world/europe/italy-arrests-8-in-fake-us-tre...

The Italian police ... arrested eight people on charges related to the seizure of $6 trillion in fake United States Treasury bonds, in a mysterious scheme that stretched from Hong Kong to Switzerland to the southern Italian region of Basilicata. The value of the seized bonds is in the neighborhood of half of the United States’ entire public debt of $15.36 trillion, but only the uninitiated would have accepted them as real securities. Rather than counterfeit, they were what officials call fictitious, printed in 6,000 units of $1 billion each, a denomination that does not exist and the equivalent of $3 bills. The United States Embassy in Rome said its experts had examined the bonds, which bore the date 1934, and determined that they were fictitious and apparently part of a scheme intended to defraud Swiss banks. According to the Federal Reserve, such “fictitious instrument fraud” is increasingly common, and unwitting investors have been cheated of nearly $10 billion in recent years. In a common ploy, “criminals present fictitious financial instruments such as Federal Reserve notes, standby letters of credit, prime bank guarantees or prime bank notes in order to fraudulently collateralize loans,” the Federal Reserve says on its Web site. In 2009, Italian police seized phony United States Treasury bonds with a face value of $250 billion.

Note: There is a major problem with the claim that these are fake. If you were a counterfeiter and wanted to fake bonds, you would have to be out of your mind to fake them in denominations of $1 billion. As reported here, no one would ever dream of cashing them. For excellent research by David Wilcock suggesting that the bonds are real, and that this may be part of a huge, hidden manipulation, click here.


Holder: US can legally kill Americans in terror groups
2012-03-05, MSNBC
Posted: 2012-03-13 16:41:47
http://usnews.msnbc.msn.com/_news/2012/03/05/10585197-holder-us-can-legally-k...

The U.S. government is legally justified in killing its own citizens overseas if they are involved in plotting terror attacks against America, Attorney General Eric Holder said [on March 5], offering the Obama administration's most detailed explanation so far of its controversial targeted killing program. The Fifth Amendment provides that no one can be "deprived of life" without due process of law. But that due process, Holder said, doesn't necessarily come from a court. "Due process and judicial process are not one and the same, particularly when it comes to national security. The Constitution guarantees due process, not judicial process," the attorney general said. The ACLU called Holder's explanation "a defense of the government’s chillingly broad claimed authority to conduct targeted killings of civilians, including American citizens, far from any battlefield without judicial review or public scrutiny." "Few things are as dangerous to American liberty as the proposition that the government should be able to kill citizens anywhere in the world on the basis of legal standards and evidence that are never submitted to a court, either before or after the fact," said Hina Shamsi, director of the ACLU’s National Security Project. "Anyone willing to trust President Obama with the power to secretly declare an American citizen an enemy of the state and order his extrajudicial killing should ask whether they would be willing to trust the next president with that dangerous power,” she said. The ACLU is suing the Obama administration, seeking to have documents regarding the targeted killing program made public.

Note: Attorney General Holder's claim that US citizens can be killed by the government without judicial process clearly violates the U.S. Bill of Rights. In addition to the Fifth Amendment that states that no person shall be held to answer for a crime "without due process of law," the Sixth Amendment states that "the accused shall enjoy the right to a speedy and public trial."


Rothschild loses libel case, and reveals secret world of money and politics
2012-02-11, The Independent (One of the UK's leading newspapers)
Posted: 2012-02-21 11:26:03
http://www.independent.co.uk/news/uk/home-news/rothschild-loses-libel-case-an...

Nathaniel Rothschild, scion of the banking dynasty and friend of seemingly everyone in the spheres of finance, business and politics, ... has lost his libel case against the Daily Mail, which he sued for "substantial damages" over its account of his and [Lord] Mandelson's extraordinary trip to Russia in January 2005. Mr Rothschild claimed he was subjected to "sustained and unjustified" attacks in the May 2010 article, which portrayed him as a "puppet master", dangling his friend Lord Mandelson in front of the Russian oligarch Oleg Deripaska to ease the passage of colossal business deals. It began on Mr Rothschild's private jet from the World Economic Forum in Davos to Moscow, where they met Mr Deripaska, the aluminium plant manager who became the richest oligarch of them all, and continued on Mr Deripaska's private jet to his chalet in Siberia. The judge rejected the notion that Mr Rothschild and Mr Mandelson had flown out as friends, not business associates, and said Mr Rothschild's behaviour had in part been "inappropriate". "That conduct foreseeably brought Lord Mandelson's public office and personal integrity into disrepute," the judge said. That leading politicians, bankers and businessmen associate with each other in fashions that blur the boundaries between work and pleasure is a secret too great to be maintained with any success, but it doesn't make the details, on the rare occasions they actually emerge, any more palatable.

Note: For lots more from major media sources on corporate and government corruption, click here and here.


Bilderberg mystery: Why do people believe in cabals?
2011-06-07, BBC News
Posted: 2012-02-21 11:14:42
http://www.bbc.co.uk/news/magazine-13682082

The secretive Bilderberg Group ... is bringing together the world's financial and political elite this week. Conspiracy theories abound. It's only recently that the media has picked up on the Bilderbergers. Meetings are closed to the public and the media, and no press releases are issued. In the manner of a James Bond plot, up to 150 leading politicians and business people are to gather in a ski resort in Switzerland for four days of discussion about the future of the world. Meetings often feature future political leaders shortly before they become household names. Under the group's leadership of former US Secretary of State Henry Kissinger and one-time EU vice president, Viscount Davignon, the aim is purportedly to allow Western elites to share ideas. But conspiracy theorists have accused it of everything from deliberately engineering the credit crunch to planning to kill 80% of the world population. Denis Healey, co-founder of the group, told the journalist Jon Ronson in his book Them that ... "The confidentiality enabled people to speak honestly without fear of repercussions." Secret cabals extend beyond the Bilderberg Group. The Illuminati ... is alleged to be an all powerful secret society. The Freemasons [is another] secret fraternity society. The conspiracy theorists may get overexcited, but they have a point, says Prof Andrew Kakabadse. The group has genuine power that far outranks the World Economic Forum, which meets in Davos, he argues. And with no transparency, it is easy to see why people are worried about its influence. The theme at Bilderberg is to bolster a consensus around free market Western capitalism and its interests around the globe, he says. "There's a very strong move to have a One World government in the mould of free market Western capitalism."

Note: Why is there so little reporting on this influential group in the major media? Thankfully, the alternative media has had some good articles. And a Google search can be highly informative. For many other revealing news articles from major media sources on powerful secret societies, click here. And for reliable information covering the big picture of how and why these secret societies are using government-sponsored mind control programs to achieve their agenda, click here.


Moore Asks Inquiry Into Charges on Preparedness Campaign
1917-02-14, New York Times
Posted: 2012-01-31 15:17:52
http://query.nytimes.com/gst/abstract.html?res=9504E7DA1538EE32A25757C1A9649C...

A demand for an investigation of charges printed in the Congressional Record by Representative Oscar Callaway of Texas, a pacifist Democrat, that “the J.P. Morgan interests, the steel shipbuilding, and powder interests” had purchased control of twenty-five great newspapers to further the preparedness campaign, was made in the House today by Representative J. Hampton Moore, a Pennsylvania Republican. Mr. Callaway’s speech, as inserted in The Record charged: “In March, 1915, the J.P. Morgan interests, the steel, shipbuilding and powder interests, and their subsidiary organizations got together twelve men high up in the newspaper world and employed them to select from the most influential papers in the United States in sufficient numbers of them to control generally the policy of the daily press of the United States. They found it was only necessary to purchase the control of twenty-five of the greatest newspapers. [An] editor was furnished for each paper to properly supervise and edit information regarding the questions of preparedness, militarism, financial policies and other things of national and international nature considered vital to the interests of the purchasers. The policy also included the suppression of everything in opposition to the wishes of the interests served."

Note: For more showing how the media is controlled by carefully selected people placed by big money and the power elite, click here and here. For a short video of Congressional testimony from the 1970s proving CIA media manipulation, click here. The full text of this revealing article is available free at this link.


Local police stockpile high-tech, combat-ready gear
2011-12-21, NPR/Center for Investigative Reporting
Posted: 2011-12-27 11:12:33
http://americaswarwithin.org/articles/2011/12/21/local-police-stockpile-high-...

If terrorists ever target Fargo, N.D., the local police will be ready. In recent years, they have bought bomb-detection robots, digital communications equipment and Kevlar helmets, like those used by soldiers in foreign wars. For local siege situations requiring real firepower, police there can use a new $256,643 armored truck, complete with a rotating turret. Until that day, however, the menacing truck is mostly used for training runs and appearances at the annual Fargo picnic, where it’s been displayed near a children’s bounce house. Fargo, like thousands of other communities in every state, has been on a gear-buying spree with the aid of more than $34 billion in federal government grants since the Sept. 11, 2001, terrorist attacks on New York and the Pentagon. The federal grant spending, awarded with little oversight from Washington, has fueled a rapid, broad transformation of police operations in Fargo and in departments across the country. More than ever before, police rely on quasi-military tactics and equipment. A review of records from 41 states obtained through open-government requests, and interviews with more than two-dozen current and former police officials and terrorism experts, shows police departments around the U.S. have transformed into small army-like forces. Many police, including beat cops, now routinely carry assault rifles.

Note: For lots more on the militarization of US police from reliable sources, click here and here.


The medieval, unaccountable Corporation of London is ripe for protest
2011-10-31, The Guardian (One of the UK's leading newspapers)
Posted: 2011-11-08 16:15:35
http://www.guardian.co.uk/commentisfree/2011/oct/31/corporation-london-city-m...

It's the dark heart of Britain, the place where democracy goes to die, immensely powerful, equally unaccountable. But I doubt that one in 10 British people has any idea of what the Corporation of the City of London is and how it works. As Nicholas Shaxson explains in his fascinating book Treasure Islands, the Corporation exists outside many of the laws and democratic controls which govern the rest of the United Kingdom. The City of London is the only part of Britain over which parliament has no authority. This is ... an official old boys' network. In one respect at least the Corporation acts as the superior body: it imposes on the House of Commons a figure called the remembrancer: an official lobbyist who sits behind the Speaker's chair and ensures that, whatever our elected representatives might think, the City's rights and privileges are protected. The mayor of London's mandate stops at the boundaries of the Square Mile. The City has exploited this remarkable position to establish itself as a kind of offshore state, a secrecy jurisdiction which controls the network of tax havens housed in the UK's crown dependencies and overseas territories. This autonomous state within our borders is in a position to launder the ill-gotten cash of oligarchs, kleptocrats, gangsters and drug barons. It has also made the effective regulation of global finance almost impossible.

Note: To understand how democracy is easily circumvented, read this full article. For lots more from reliable sources on the hidden background to the control over governments held by financial powers, click here.


Congress OKs Use of Force
2001-09-15, Los Angeles Times
Posted: 2011-08-30 10:50:07
http://articles.latimes.com/2001/sep/15/news/mn-46069

Two of them were American-trained Saudi fighter pilots. One graduated from America's foremost flight university. One drank Stoli and orange juice and one advertised for a Mexican bride. The 19 men identified by the FBI as suspects in the World Trade Center and Pentagon hijack attacks ... studied flying, lived in nondescript suburban apartments and seldom called attention to themselves. Most lived for a time in Florida. Others were scattered in Massachusetts, New Jersey, Arizona and Southern California. Then, in the last several weeks, they began disappearing from their neighborhoods. They reappeared Friday on a list of suspects in the deadliest terrorist attack in U.S. history. The FBI said it did not know for certain where most of the men came from, exactly where they lived in the United States or how old they were. Several had names so common in the Middle East that tracking them down might never be possible. A defense official said two of the [9/11] hijackers were former Saudi fighter pilots who had studied in exchange programs at the Defense Language School at Lackland Air Force Base in Texas and the Air War College at Maxwell Air Force Base in Alabama.

Note: Can you beleive that two of the alleged 9/11 hijackers trained at a US Air Force base? For other major media reports showing as many as seven of the hijackers trained at US military bases, click here.


Concentration camp doctor tops list of wanted Nazis
2008-04-30, Boston Globe/Associated Press
Posted: 2011-05-31 17:14:07
http://articles.boston.com/2008-04-30/news/29272267_1_efraim-zuroff-top-nazi-...

Karl Lotter, a prisoner who worked in the hospital at Mauthausen concentration camp, had no trouble remembering the first time he watched SS doctor Aribert Heim kill a man. It was 1941, and an 18-year-old Jew had been sent to the clinic with a foot inflammation. Heim asked him about himself and why he was so fit. The young man said he had been a soccer player and swimmer. Then, instead of treating the prisoner's foot, Heim anesthetized him, cut him open, castrated him, took apart one kidney and removed the second, Lotter said. The victim's head was removed and the flesh boiled off so that Heim could keep it on display. "He needed the head because of its perfect teeth," Lotter, a non-Jewish political prisoner, recalled in testimony eight years later that was included in an Austrian warrant for Heim's arrest. But Heim managed to avoid prosecution, his American-held file in Germany mysteriously omitting his time at Mauthausen, and today he is the most wanted Nazi war criminal on a list of hundreds who the Simon Wiesenthal Center estimates are still free.

Note: As this article shows, some Nazi concentration camp doctors had virtually no moral aversion to killing and torturing any prisoner. Some of the most infamous doctors were tasked with perfecting mind control by any means. And many, like Heim, were allowed to escape. For reliable information on this, and how some of these doctors were then secretly brought to the US to train the CIA in mind control techniques, click here.


'We've Hit The Targets'
2001-09-13, Newsweek
Posted: 2011-05-03 11:47:59
http://www.newsweek.com/2001/09/12/we-ve-hit-the-targets.html

Could the [9/11] bombers have been stopped? NEWSWEEK has learned that while U.S. intelligence received no specific warning, the state of alert had been high during the past two weeks, and a particularly urgent warning may have been received the night before the [9/11] attacks, causing some top Pentagon brass to cancel a trip. Why that same information was not available to the 266 people who died aboard the four hijacked commercial aircraft may become a hot topic on the Hill.

Note: This most astounding information is buried in this long article. Yet it is repeated in a Newsweek article 11 days later (9/24/2001), which states, "On Sept. 10, NEWSWEEK has learned, a group of top Pentagon officials suddenly canceled travel plans for the next morning, apparently because of security concerns." It was again buried in a longer article, yet the author felt it important enough to include. Why was there no follow up? WantToKnow.info's Fred Burks has a reliable deep cover CIA contact who says he was informed just hours before the attacks that there was going to be a major attack on Washington on 9/11. For an abundance of reliable verifiable information suggesting a major cover-up around 9/11, click here and here.


Declassified Memorandum to FBI Director: Flying Saucers
1950-03-22, Website of FBI
Posted: 2011-04-12 10:06:37
http://vault.fbi.gov/hottel_guy/Guy%20Hottel%20Part%201%20of%201/view

An investigator for the Air Forces stated that three so-called flying saucers had been recovered in New Mexico. They were described as being circular in shape with raised centers, approximately 50 feet in diameter. Each one was occupied by three bodies of human shape but only three feet tall, dressed in metallic cloth of a very fine texture. Each body was bandaged in a manner similar to the blackout suits used by speed fliers and test pilots. The saucers were found in New Mexico due to the fact that the Government has a very high powered radar set-up in that area and it is believed the radar interferes with the controlling mechanism of the saucers.

Note: Download this amazing document and view it on our website at this link. For an ABC news article discussing this, click here. Another FBI document shows FBI chief J. Edgar Hoover wanted "full access to discs recovered" at Roswell. For numerous highly revealing major media reports presenting strong evidence on UFOs, click here. For other reliable and inspiring information on this topic, visit our UFO Information Center.


Shock Doctrine, U.S.A.
2011-02-24, New York Times
Posted: 2011-03-08 11:36:25
http://www.nytimes.com/2011/02/25/opinion/25krugman.html

The story of the privatization-obsessed Coalition Provisional Authority [created by Bush in Iraq in 2003] was the centerpiece of Naomi Klein’s best-selling book “The Shock Doctrine,” which argued that it was part of a broader pattern. From Chile in the 1970s onward, she suggested, right-wing ideologues have exploited crises to push through an agenda that has nothing to do with resolving those crises, and everything to do with imposing their vision of a harsher, more unequal, less democratic society. Which brings us to Wisconsin 2011, where the shock doctrine is on full display. In recent weeks, Madison has been the scene of large demonstrations against the governor’s budget bill, which would deny collective-bargaining rights to public-sector workers. Gov. Scott Walker claims that he needs to pass his bill to deal with the state’s fiscal problems. But his attack on unions has nothing to do with the budget. What’s happening in Wisconsin is, instead, a power grab — an attempt to exploit the fiscal crisis to destroy the last major counterweight to the political power of corporations and the wealthy. And the power grab goes beyond union-busting. The bill in question is 144 pages long, and there are some extraordinary things hidden deep inside. For example, the bill includes language that would allow officials appointed by the governor to make sweeping cuts in health coverage for low-income families without having to go through the normal legislative process. The state of Wisconsin owns a number of plants supplying heating, cooling, and electricity to state-run facilities. The language in the budget bill would ... let the governor privatize any or all of these facilities. Not only that, he could sell them, without taking bids, to anyone he chooses. And note that any such sale would, by definition, be “considered to be in the public interest.”

Note: For an abundance of major media articles revealing rampant government corruption, click here.


History in black and white
1997-01-26, The Telegraph (One of the UK's leading newspapers)
Posted: 2011-03-07 23:44:56
http://www.independent.co.uk/arts-entertainment/history-in-black-and-white-12...

[Review of] RHODES: The Race for Africa by Antony Thomas, BBC Books. The book is ... intelligent, detailed, well-researched and credibly nuanced. The book's aim is to kill off once and for all the public-schoolboy perception of [Cecil] Rhodes as the model Englishman who selflessly deployed his vast diamond wealth to the task of civilising Southern Africa while adding, virtually single-handedly, a chunk of territory the size of Europe to Her Majesty's imperial possessions. The picture that persuasively emerges in the book [is] of a man of immense charm and demonic single-mindedness. Rhodes ... tailored his rhetoric to suit an age when lust for acquisition had to be dressed in the garb of moral rectitude. Thus the famous lines from his precocious personal credo, drafted at the age of 23: "I contend that we are the finest race in the world, and the more of the world we inhabit, the better it is for the human race." Business ... was the medium he employed to pursue personal power. He beat his rivals not by fighting them but by seducing them. By bribery (Rhodes coined the expression "every man has his price") or sheer force of personality, or more often both, he submitted members of the British cabinet, Kruger's Boers and proud African chieftains to his colossal will. Such were his powers of persuasion that after a smallpox epidemic struck Kimberley in 1883, he prevailed upon local doctors to sign false documents declaring the outbreak to be a rare skin disease. Thus did he prevent the temporary closure of his diamond mines and thus did at least 751 people needlessly, hideously die. By the end of the book Thomas leaves us in no doubt as to Rhodes' greatness, but he concludes that it was a misdirected greatness, a story of talents squandered and opportunities lost.

Note: Often portrayed in history books as one of the most influential men of the 19th century, Rhodes not only believed his was the superior race, in his will he advocated "for the establishment, promotion and development of a Secret Society, the true aim and object whereof shall be for the extension of British rule throughout the world." For major media reports revealing other secret societies with similar aims, click here. For more information on Rhodes and secret societies from Caroll Quigley's epic Tragedy and Hope, click here.


Google Comes Under Fire for 'Secret' Relationship with NSA
2011-01-25, Yahoo News/PC World
Posted: 2011-02-21 16:24:08
http://news.yahoo.com/s/pcworld/20110125/tc_pcworld/googlecomesunderfireforse...

Consumer Watchdog, an advocacy group largely focused in recent years on Google's privacy practices, has called [for] a congressional investigation into the Internet giant's "cozy" relationship with U.S. President Barack Obama's administration. In a letter sent [on January 24], Consumer Watchdog asked Representative Darrell Issa, the new chairman of the House Oversight and Government Reform Committee, to investigate the relationship between Google and several government agencies. "We believe Google has inappropriately benefited from close ties to the administration," the letter said. "It should not get special treatment and access because of a special relationship with the administration." Consumer Watchdog's latest complaints about the relationship of Google and the Obama administration are outlined in a 32-page report [which] questions Google's relationship with the U.S. National Security Agency and calls for the company to be more open about what consumer information it shares with the spy agency.


CIA Director Leon Panetta Warns of Possible Cyber-Pearl Harbor
2011-02-11, ABC News
Posted: 2011-02-21 16:20:10
http://abcnews.go.com/News/cia-director-leon-panetta-warns-cyber-pearl-harbor...

Top U.S. intelligence officials have raised concerns about the growing vulnerability the United States faces from cyberwarfare threats and malicious computer activity that CIA Director Leon Panetta said "represents the battleground for the future." "The potential for the next Pearl Harbor could very well be a cyber-attack," he testified on Capitol Hill [on February 10] before the House Permanent Select Committee on Intelligence. Panetta provided a stark assessment for the intelligence committee. "If you have a cyber-attack that brings down our power-grid system, brings down our financial system, brings down our government systems, you could paralyze this country," he said. U.S officials from the National Security Agency, Department of Homeland Security and the FBI have actively been working the emerging cybersecurity threats. The military activated U.S. Cyber Command last year to coordinate the military's cyberspace resources.

Note: For more articles from reliable sources on the construction of a total surveillance state, click here.


At CIA, Grave Mistakes, Then Promotions
2011-02-11, ABC News/AP
Posted: 2011-02-13 00:32:00
http://abcnews.go.com/Politics/wireStory?id=12874101

In December 2003, security forces boarded a bus in Macedonia and snatched a German citizen named Khaled el-Masri. For the next five months, el-Masri was a ghost. Only a select group of CIA officers knew he had been whisked to a secret prison for interrogation in Afghanistan. But he was the wrong guy. In the years since the Sept. 11, 2001, terrorist attacks, officers who committed serious mistakes that left people wrongly imprisoned or even dead have received only minor admonishments or no punishment at all. Many officers who made significant missteps are now the senior managers fighting the president's spy wars. The AP investigation of the CIA's actions revealed a disciplinary system that takes years to make decisions, hands down reprimands inconsistently and is viewed inside the agency as prone to favoritism and manipulation. When people are disciplined, the punishment seems to roll downhill, sparing senior managers even when they were directly involved in operations that go awry. Two officers involved in the death of a prisoner in Afghanistan, for instance, received no discipline and have advanced into Middle East leadership positions. Other officers were punished after participating in a mock execution in Poland and playing a role in the death of a prisoner in Iraq. Those officers retired, then rejoined the intelligence community as contractors. Since 9/11, retired CIA officers have published a variety of books opining on what ails the CIA. Their conclusions differ, but they are in nearly unanimous agreement that the system of accountability is broken.

Note: It is great news that the media is now revealing some of the craziness at the CIA, a topic that was almost taboo for the press in the past.


Critics question billions in aid routed back to US contractors
2011-02-03, Boston Globe
Posted: 2011-02-13 00:26:53
http://www.boston.com/news/nation/articles/2011/02/03/critics_question_billio...

United States taxpayers have funneled more than $60 billion of aid into Egypt since President Hosni Mubarak came to power in 1981, but more than half of the money has been spent supplying weapons to the country’s military. About $34 billion of the aid to Egypt has come in the form of grants that Congress requires Egypt to spend on American military hardware. In recent years the large amount of aid earmarked for the military, and the relatively low sums supporting civilian aid, have attracted scathing criticism from Egyptians, some of whom argue that US aid has gone to entrench a military dictator at the expense of the fledgling democracy activists. During the early turmoil, protesters were the target of tear gas canisters that read "made in the USA," fueling debate about the aid. Last year, Egypt was the fifth-largest recipient of US aid, getting $1.6 billion. Congress ... authorized major aid packages to both [Egypt and Israel in 1979], using an informal formula — not enshrined in the peace treaty — that gave Egypt $2 for every $3 that Israel received. Israel quickly became the largest recipient of US aid, and Egypt the second-largest — rankings that were only recently overtaken by wars in Afghanistan and Iraq, and last year, the disaster in Haiti. The strong interest of US companies could help explain why US military assistance to Egypt has remained at $1.3 billion a year, while its civilian economic assistance has steadily shrunk, from $815 million a decade ago to $250 million requested for 2011. The decline began in 1998, when Israel arranged for a reduction in economic support and an increase military aid. As Israeli’s economic aid shrunk, so too did Egypt’s.

Note: Israel receives about $3 billion a year from the US, yet the population of the country is 8 million. If you do the math, the US is providing the equivalent of nearly $4,000 in aid per year to every man, woman and child in Israel, with $3,000 of that to buy US military hardware. For lots more reliable information on how the military/industrial complex manipulates world politics to support the war machine, click here and here.


Your life at your fingertips — courtesy of the Pentagon
2003-06-02, USA Today/Associated Press
Posted: 2011-01-31 12:33:27
http://www.usatoday.com/tech/news/techinnovations/2003-06-02-lifelog_x.htm

Coming to you soon from the Pentagon: the diary to end all diaries — a multimedia, digital record of everywhere you go and everything you see, hear, read, say and touch. Known as LifeLog, the project has been put out for contractor bids by the Defense Advanced Research Projects Agency, or DARPA, the agency that helped build the Internet and that is now developing the next generation of [surveillance] tools. The agency ... [considers] LifeLog ... a tool to capture "one person's experience in and interactions with the world" through a camera, microphone and sensors worn by the user. Everything from heartbeats to travel to Internet chatting would be recorded. The goal is to create breakthrough software that helps analyze behavior, habits and routines, according to Pentagon documents reviewed by The Associated Press. The products of the unclassified project would be available to both the private sector and other government agencies — a concern to privacy advocates. John Pike of Global Security.org, a defense analysis group, is dubious the project has military application. "I have a much easier time understanding how Big Brother would want this than how (Defense Secretary Donald) Rumsfeld would use it," Pike said. "They have not identified a military application."

Note: For more on this at Wired, click here.


Monitoring America
2010-12-20, Washington Post
Posted: 2010-12-28 18:15:34
http://projects.washingtonpost.com/top-secret-america/articles/monitoring-ame...

Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators. The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing. The months-long investigation [by The Washington Post], based on nearly 100 interviews and 1,000 documents, found that: * Technologies and techniques honed for use on the battlefields of Iraq and Afghanistan have migrated into the hands of law enforcement agencies in America. * The FBI is building a database with the names and certain personal information, such as employment history, of thousands of U.S. citizens and residents whom a local police officer or a fellow citizen believed to be acting suspiciously. * Law enforcement agencies have hired as trainers self-described experts whose extremist views on Islam and terrorism are considered inaccurate and counterproductive by the FBI and U.S. intelligence agencies. * The Department of Homeland Security sends its state and local partners intelligence reports with little meaningful guidance, and state reports have sometimes inappropriately reported on lawful meetings.

Note: This report is part of a series, "Top Secret America," by The Washington Post. For more, click here.


A Secretive Banking Elite Rules Trading in Derivatives
2010-12-12, New York Times
Posted: 2010-12-20 17:57:28
http://www.nytimes.com/2010/12/12/business/12advantage.html

On the third Wednesday of every month, the nine members of an elite Wall Street society gather in Midtown Manhattan. The men share a common goal: to protect the interests of big banks in the vast market for derivatives, one of the most profitable — and controversial — fields in finance. They also share a common secret: The details of their meetings, even their identities, have been strictly confidential. Drawn from giants like JPMorgan Chase, Goldman Sachs and Morgan Stanley, the bankers form a powerful committee that helps oversee trading in derivatives, instruments which, like insurance, are used to hedge risk. In theory, this group exists to safeguard the integrity of the multitrillion-dollar market. In practice, it also defends the dominance of the big banks. The banks in this group ... have fought to block other banks from entering the market, and they are also trying to thwart efforts to make full information on prices and fees freely available. Banks’ influence over this market, and over clearinghouses like the one this select group advises, has costly implications for businesses large and small. The size and reach of this market has grown rapidly over the past two decades. Pension funds today use derivatives to hedge investments. States and cities use them to try to hold down borrowing costs. Airlines use them to secure steady fuel prices. Food companies use them to lock in prices of commodities like wheat or beef.

Note: To explore highly revealing news articles on the powerful secret societies which without doubt back these top bankers, click here. For a treasure trove of reports from reliable sources detailing the amazing control of major banks over government and society, click here.


Houston Police Drone Aircraft
2007-11-23, CNN
Posted: 2010-12-20 17:26:28
http://edition.cnn.com/TRANSCRIPTS/0711/23/sitroom.02.html

Transcript: [Suzanne] MALVEAUX: A Texas mystery solved -- at least partially. We now know Houston police are going to start using unmanned drone aircraft. But the question remains, well, for what? Stephen Dean of CNN affiliate KPRC has got an exclusive look. STEPHEN DEAN, KPRC CORRESPONDENT (voice-over): HPD [Houston Police Dept.], the federal Department of Homeland Security and other invited guests all watching to see how this drone could be used for police work in and around Houston. We tracked that drone from News Chopper 2. And that drone was able to use a high-powered camera to track us. Those cameras can actually look into people's homes or even follow them in moving cars -- which raises all sorts of new questions. HPD quickly hustled together a news conference when it realized our cameras were there for the entire secret test. Executive Assistant Chief Martha Mantabo admits that could mean covert police action. But she says it's too early to tell what else HPD will do with the aircraft. We asked, are these drones headed for ticketing speeders from the sky? MONTALVO: I'm not ruling anything out. DEAN: Back at the secret test site, police helicopter pilots claimed the entire air space was restricted and even threatened our local 2 Investigates pilot with action from the FAA if we didn't leave. But we checked with FAA several times and there never was a flight restriction. That leaves some to wonder whether the police are now ready to use terrorism fears since 911 to push the envelope further into our private lives.

Note: To watch the video of secret police work in action, click here.


Every email and website to be stored
2010-10-20, The Telegraph (One of the UK's leading newspapers)
Posted: 2010-12-06 11:40:46
http://www.telegraph.co.uk/technology/news/8075563/Every-email-and-website-to...

Every email, phone call and website visit is to be recorded and stored after the Coalition Government revived controversial Big Brother snooping plans. It will allow security services and the police to spy on the activities of every Briton who uses a phone or the internet. Moves to make every communications provider store details for at least a year will be unveiled later this year sparking fresh fears over a return of the surveillance state. It comes despite the Coalition Agreement promised to "end the storage of internet and email records without good reason". The plans are expected to involve service providers storing all users details for a set period of time. That will allow the security and police authorities to track every phone call, email, text message and website visit made by the public if they argue it is needed to tackle crime or terrorism. The information will include who is contacting whom, when and where and which websites are visited, but not the content of the conversations or messages. The move was buried in the Government's Strategic Defence and Security Review.

Note: For lots more from major media sources on increasing government and corporate threats to privacy, click here.


GPS tracker in car inflames privacy debate
2010-10-16, Seattle Times/Associated Press
Posted: 2010-10-24 20:36:10
http://seattletimes.nwsource.com/html/nationworld/2013181658_gpstracking17.html

Yasir Afifi, a 20-year-old computer salesman and community-college student, took his car in for an oil change earlier this month and his mechanic spotted an odd wire hanging from the undercarriage. The wire was attached to a strange magnetic device that puzzled Afifi and the mechanic. They freed it from the car and posted images of it online, asking for help in identifying it. Two days later, FBI agents arrived at Afifi's Santa Clara apartment and demanded the return of their property — a global-positioning-system tracking device now at the center of a raging legal debate over privacy rights. One federal judge wrote that the widespread use of the device was straight out of George Orwell's novel Nineteen Eighty-Four." By holding that this kind of surveillance doesn't impair an individual's reasonable expectation of privacy, the panel hands the government the power to track the movements of every one of us, every day of our lives," wrote Alex Kozinski, the chief judge of the 9th U.S. Circuit Court of Appeals, in a blistering dissent in which a three-judge panel from his court ruled that search warrants weren't necessary for GPS tracking. In his dissent, Chief Judge Kozinski noted that GPS technology is far different from tailing a suspect on a public road, which requires the active participation of investigators. "The devices create a permanent electronic record that can be compared, contrasted and coordinated to deduce all manner of private information about individuals," Kozinksi wrote.

Note: For an AP photo of this device, click here.


Secrets by the thousands
1946-10-01, Harper's magazine
Posted: 2010-10-17 17:48:53
http://www.harpers.org/archive/1946/10/0032777

Someone wrote to Wright Field recently, saying he understood this country had got together quite a collection of enemy war secrets, that many were now on public sale, and could he, please, be sent everything on German jet engines. 'The Army Air Forces' answered: "Sorry – but that would be fifty tons." Moreover, that fifty tons was just a small portion. Wright Field is working from a documents "mother lode" of fifteen hundred tons. It is estimated that over a million separate items ... very likely contain practically all the scientific, industrial, and military secrets of Germany. What did we find? The head of the communications unit ... showed me then what had been two of the most closely-guarded technical secrets of the war: the infra-red device which the Germans invented for seeing at night, and the remarkable diminutive generator which operated it. The diminutive generator – five inches across – stepped up current from an ordinary flashlight battery to 15,000 volts. It had a walnut-sized motor which spun a rotor at 10,000 rpm. The generator then ran 3,000 hours! "As for medical secrets in this collection," one Army-surgeon has remarked, "some of them will save American medicine years of research; some of them are revolutionary – like, for instance, the German technique for treatment after prolonged and usually fatal exposure to cold." This discovery ... reversed everything medical science thought about the subject. And in aeronautics and guided missiles [the secrets] proved to be downright alarming. Army Air Force experts declare publicly that in rocket power and guided missiles the Nazis were ahead of us by at least ten years.

Note: To read the entire fascinating article, click here. To verify this article on the Harper's Magazine website, click here. How can the Nazi technology have been so far superior to that of the allies? For the riveting testimony of numerous military officers on the back engineering of UFO technologies, click here.


U.S. Tries to Make It Easier to Wiretap the Internet
2010-09-27, New York Times
Posted: 2010-10-04 11:31:09
http://www.nytimes.com/2010/09/27/us/27wiretap.html

Federal law enforcement and national security officials are preparing to seek sweeping new regulations for the Internet, arguing that their ability to wiretap criminal and terrorism suspects is “going dark” as people increasingly communicate online instead of by telephone. Essentially, officials want Congress to require all services that enable communications — including encrypted e-mail transmitters like BlackBerry, social networking Web sites like Facebook and software that allows direct “peer to peer” messaging like Skype — to be technically capable of complying if served with a wiretap order. The mandate would include being able to intercept and unscramble encrypted messages. James X. Dempsey, vice president of the Center for Democracy and Technology, an Internet policy group, said the proposal had “huge implications” and challenged “fundamental elements of the Internet revolution” — including its decentralized design. “They are really asking for the authority to redesign services that take advantage of the unique, and now pervasive, architecture of the Internet,” he said. “They basically want to turn back the clock and make Internet services function the way that the telephone system used to function.”

Note: For an analysis of this new government move to spy on US citizens, click here. For lots more from reliable sources on disturbing government threats to privacy and civil liberties, click here and here.


U.S. drones to watch entire Mexico border from September 1
2010-08-30, MSNBC/Reuters
Posted: 2010-09-06 11:30:00
http://www.msnbc.msn.com/id/38923040

The U.S. government will have unmanned surveillance aircraft monitoring the whole southwest border with Mexico from September 1, as it ramps up border security in this election year. Homeland Security Secretary Janet Napolitano said U.S. Customs and Border Protection would begin flying a Predator B drone out of Corpus Christi, Texas, on [that date], extending the reach of the agency's unmanned surveillance aircraft across the length of the nearly 2,000 mile border with Mexico. "With the deployment of the Predator in Texas, we will now be able to cover the southwest border from the El Centro sector in California all the way to the Gulf of Mexico in Texas, providing critical aerial surveillance assistance to personnel on the ground," Napolitano said during a conference call. Earlier this month, President Barack Obama signed a $600 million bill that would fund some 1,500 new Border Patrol agents, customs inspectors and other law enforcement officials along the border, as well as paying for two more unmanned drones. The Predator B drones are made by defense contractor General Atomics. They carry equipment including sophisticated day and night vision cameras that operators use to detect drug and human smugglers, and can stay aloft for up to 30 hours at a time.

Note: How long will it be before aerial surveillance drones, now positioned over the southern border of the US, are deployed in other parts of the country?


Big Brother: Eye-scanners being installed across one Mexican city
2010-08-19, USA Today
Posted: 2010-08-31 10:11:59
http://content.usatoday.com/communities/ondeadline/post/2010/08/big-brother-e...

Mexico's sixth-largest city, Leon, is on the road to ... a future in which everyone is tracked wherever they go. Fast Company reports that U.S. biometrics firm Global Rainmakers and its Mexican partner announced yesterday that they have begun installing iris-scanning technology in the city of more than 1 million in Guanajuato state. The companies aim ... to create "the most secure city in the world." The first phase concentrates on law enforcement and security checkpoints. Then the iris scanners, which the firms say can "identify humans in motion and at a distance while ensuring liveness," will fill malls, pharmacies, mass transit, medical centers and banks, "among other public and private locations," Fast Company writes. "In the future, whether it's entering your home, opening your car, entering your workspace, getting a pharmacy prescription refilled, or having your medical records pulled up, everything will come off that unique key that is your iris," says Jeff Carter, CDO of Global Rainmakers. Before coming to GRI, Carter headed a think tank partnership between Bank of America, Harvard, and MIT. "Every person, place, and thing on this planet will be connected [to the iris system] within the next 10 years," he says.

Note: For lots more from reliable sources on threats to privacy, click here.


IMF blueprint for a global currency – yes really
2010-08-04, Financial Times
Posted: 2010-08-09 10:15:52
http://ftalphaville.ft.com/blog/2010/08/04/306346/imf-blueprint-for-a-global-...

[An] IMF paper [that] first came out in April, 2010, [a]uthored by Reza Moghadam, director of the IMF’s strategy, policy and review department, ... discusses how the IMF sees the International Monetary System evolving after the financial crisis. In the eyes of the IMF ... the best way to ensure the stability of the international monetary system (post crisis) is actually by launching a global currency. And that, the IMF says, is largely because [sovereign nations] cannot be trusted to redistribute surplus reserves, or battle their deficits, themselves. The ongoing buildup of such imbalances, meanwhile, only makes the system increasingly vulnerable to shocks. It’s also a process that’s ultimately unsustainable for all, says the IMF. All in all, the IMF believes there has simply been too much reserve hoarding going on. A global currency makes the most sense, the paper concludes — especially since the SDR [Special Drawing Rights] is currently just an accounting tool that draws on the freely usable currencies of member states, not an actual currency itself.

Note: For key news articles on the global financial crisis to which this IMF report is responding, click here.


Raw-food raid highlights a hunger
2010-07-25, Los Angeles Times
Posted: 2010-08-03 08:40:55
http://www.latimes.com/news/la-fi-raw-food-raid-20100725,0,4350641,full.story

With no warning one weekday morning, investigators entered an organic grocery with a search warrant and ordered the hemp-clad workers to put down their buckets of mashed coconut cream and to step away from the nuts. Then, guns drawn, four officers fanned out across Rawesome Foods in Venice. Skirting past the arugula and peering under crates of zucchini, they found the raid's target inside a walk-in refrigerator: unmarked jugs of raw milk. Cartons of raw goat and cow milk and blocks of unpasteurized goat cheese were among the groceries seized in the June 30 raid by federal, state and local authorities — the latest salvo in the heated food fight over what people can put in their mouths. On one side are government regulators, who say they are enforcing rules designed to protect consumers from unsafe foods and to provide a level playing field for producers. On the other side are " healthy food" consumers [who] seek food in its most pure form. "This is about control and profit, not our health," said Aajonus Vonderplanitz, co-founder of Rawesome Foods. "How can we not have the freedom to choose what we eat?" Demand for all manner of raw foods — including honey, nuts and meat — has been growing, spurred by heightened interest in the way food is produced. But raw milk in particular has drawn a lot of regulatory scrutiny, largely because the politically powerful dairy industry has pressed the government to act.

Note: For lots more on government corruption from reliable sources, click here.


America locks up too many people, some for acts that should not even be criminal
2010-07-22, The Economist magazine
Posted: 2010-07-27 08:48:46
http://economist.com/node/16640389

America is different from the rest of the world in lots of ways, many of them good. One of the bad ones is its willingness to lock up its citizens. One American adult in 100 festers behind bars (with the rate rising to one in nine for young black men). Its imprisoned population, at 2.3m, exceeds that of 15 of its states. No other rich country is nearly as punitive as the Land of the Free. The rate of incarceration is a fifth of America’s level in Britain, a ninth in Germany and a twelfth in Japan. America’s incarceration rate has quadrupled since 1970. Similar things have happened elsewhere. The incarceration rate in Britain has more than doubled, and that in Japan increased by half, over the period. But the trend has been sharper in America than in most of the rich world, and the disparity has grown. It is explained neither by a difference in criminality (the English are slightly more criminal than Americans, though less murderous), nor by the success of the policy: America’s violent-crime rate is higher than it was 40 years ago. Many states have mandatory minimum sentences, which remove judges’ discretion to show mercy, even when the circumstances of a case cry out for it. “Three strikes” laws, which were at first used to put away persistently violent criminals for life, have in several states been applied to lesser offenders.

Note: For a recent report on the size of the US prison population in comparison with other countries, click here.


U.S. Plans Cyber Shield for Utilities, Companies
2010-07-08, Wall Street Journal
Posted: 2010-07-12 10:52:28
http://online.wsj.com/article/SB10001424052748704545004575352983850463108.html

The federal government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants. The surveillance by the National Security Agency, the government's chief eavesdropping agency, would rely on a set of sensors deployed in computer networks for critical infrastructure that would be triggered by unusual activity suggesting an impending cyber attack. Defense contractor Raytheon Corp. recently won a classified contract for the initial phase of the surveillance effort valued at up to $100 million. Some industry and government officials familiar with the program see Perfect Citizen as an intrusion by the NSA into domestic affairs. One internal Raytheon email, the text of which was seen by The Wall Street Journal [said,] "Perfect Citizen is Big Brother." Raytheon declined to comment on this email. The information gathered by Perfect Citizen could also have applications beyond the critical infrastructure sector, officials said, serving as a data bank that would also help companies and agencies who call upon NSA for help with investigations of cyber attacks, as Google did when it sustained a major attack late last year.

Note: For key reports of government and corporate surveillance from reliable sources, click here.


WikiLeaks founder drops 'mass spying' hint
2010-06-22, ABC News (Australian Broadcasting Corporation)
Posted: 2010-06-28 10:50:45
http://www.abc.net.au/news/stories/2010/06/22/2933892.htm

WikiLeaks co-founder Julian Assange has given his strongest indication yet about the next big leak from his whistleblower organisation. In an interview with the ABC's Foreign Correspondent, Mr Assange said cryptically of WikiLeaks' current project: "I can give an analogy. If there had been mass spying that had affected many, many people and organisations and the details of that mass spying were released then that is something that would reveal that the interests of many people had been abused." He agreed it would be of the "calibre" of publishing information about the way the top secret Echelon system - the US-UK electronic spying network which eavesdrops on worldwide communications traffic - had been used. Mr Assange also confirmed that WikiLeaks has a copy of a video showing a US military bombing of a western Afghan township which killed dozens of people, including children. During the course of the past month, Mr Assange has been talking to [ABC's] Foreign Correspondent for [an upcoming] program examining the efficacy of the WikiLeaks model. "What we want to create is a system where there is guaranteed free press across the world, the entire world, that every individual in the world has the ability to publish materials that is meaningful," he said.

Note: For more on government surveillance from major media sources, click here.


Eugenics and the Nazis -- the California connection
2003-11-09, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2010-06-14 20:18:41
http://articles.sfgate.com/2003-11-09/opinion/17517477_1_eugenics-ethnic-clea...

Hitler and his henchmen victimized an entire continent and exterminated millions in his quest for a so-called Master Race. But the concept of a white, blond-haired, blue-eyed master Nordic race didn't originate with Hitler. The idea was created in the United States, and cultivated in California, decades before Hitler came to power. Eugenics would have been so much bizarre parlor talk had it not been for extensive financing by corporate philanthropies, specifically the Carnegie Institution, the Rockefeller Foundation and the Harriman railroad fortune. They were all in league with some of America's most respected scientists from such prestigious universities as Stanford, Yale, Harvard and Princeton. These academicians espoused race theory and race science, and then faked and twisted data to serve eugenics' racist aims. Stanford President David Starr Jordan originated the notion of "race and blood" in his 1902 racial epistle "Blood of a Nation," in which the university scholar declared that human qualities and conditions such as talent and poverty were passed through the blood. The Rockefeller Foundation helped found the German eugenics program and even funded the program that Josef Mengele worked in before he went to Auschwitz.

Note: Josef Mengele's US-funded eugenics research laid the foundation for his experimentation on human subjects before and during World War II. He went on to participate in CIA-funded mind-control experimentation after that war. For more on Mengele, click here.


Gaza flotilla activists were shot in head at close range
2010-06-04, The Guardian (One of the UK's leading newspapers)
Posted: 2010-06-09 20:55:56
http://www.guardian.co.uk/world/2010/jun/04/gaza-flotilla-activists-autopsy-r...

Israel was tonight under pressure to allow an independent inquiry into its assault on the Gaza aid flotilla after autopsy results on the bodies of those killed, obtained by the Guardian, revealed they were peppered with 9mm bullets, many fired at close range. Nine Turkish men on board the Mavi Marmara were shot a total of 30 times and five were killed by gunshot wounds to the head, according to the vice-chairman of the Turkish council of forensic medicine, [Yalcin Buyuk]. The results revealed that a 60-year-old man, Ibrahim Bilgen, was shot four times in the temple, chest, hip and back. A 19-year-old, named as Fulkan Dogan, who also has US citizenship, was shot five times from less that 45cm, in the face, in the back of the head, twice in the leg and once in the back. Two other men were shot four times, and five of the victims were shot either in the back of the head or in the back. The new information about the manner and intensity of the killings undermines Israel's insistence that its soldiers opened fire only in self defence and in response to attacks by the activists. "Given the very disturbing evidence which contradicts the line from the Israeli media and suggests that Israelis have been very selective in the way they have addressed this, there is now an overwhelming need for an international inquiry," said Andrew Slaughter MP, a member of the all party group on Britain and Palestine.


Report: Revolving Door Spins Quickly Between Congress, Wall Street
2010-06-03, Center for Responsive Politics/Public Citizen
Posted: 2010-06-09 20:39:14
http://www.opensecrets.org/news/2010/06/report-revolving-door-spins-quickly.html

Organizations in the financial services sector have deployed at least 1,447 former federal employees to lobby Congress and federal agencies since the beginning of 2009, according to a joint analysis of federal disclosure records and other data released today by Public Citizen and the Center for Responsive Politics. This small army of registered financial services sector lobbyists includes at least 73 former members of Congress, of whom 17 served on the banking committees of either the U.S. House of Representatives or the Senate. At least 66 industry lobbyists worked for these committees as staffers, while 82 additional lobbyists once worked for congressional members who currently serve on these key committees. Further, at least 42 financial services lobbyists formerly served in some capacity in the U.S. Treasury Department. At least seven served in the Office of the Comptroller of the Currency, including two former comptrollers. “Wall Street hires former members of Congress and their staff for a reason," said David Arkush, director of Public Citizen’s Congress Watch division. "These people are influential because they have personal relationships with current members and staff. It’s hard to say no to your friends."

Note: To read the full report, click here. The nonprofit, nonpartisan Center for Responsive Politics is the nation's premier research group tracking money in federal politics and its effect on elections and public policy. Public Citizen is a national, nonprofit consumer advocacy organization based in Washington, D.C.


Iran-Contra Hearing; North's Testimony: 'Fall Guy' and Foreign Policy
1987-07-14, New York Times
Posted: 2010-05-24 20:26:22
http://www.nytimes.com/1987/07/14/world/iran-contra-hearings-north-s-testimon...

REPRESENTATIVE JACK BROOKS, Democrat of Texas. Colonel North, in your work at the N.S.C., were you not assigned, at one time, to work on plans for the continuity of government in the event of a major disaster? SENATOR DANIEL K. INOUYE, Democrat of Hawaii. I believe that question touches upon a highly sensitive and classified area so may I request that you not touch upon that. MR. BROOKS. I was particularly concerned, Mr. Chairman, because I read in Miami papers, and several others, that there had been a plan developed, by that same agency, a contingency plan in the event of emergency, that would suspend the American Constitution. And I was deeply concerned about it and wondered if that was the area in which he had worked. I believe that it was, and I wanted to get his confirmation. MR. INOUYE. May I most respectfully request that that matter not be touched upon, at this stage. If we wish to get into this, I'm certain arrangements can be made for an executive session.

Note: Why was the chairman not allowing a discussion of the fact that plans were being made in the event of an emergency for the suspension of the U.S. Constitution? To watch a two-minute video which includes this testimony, click here.


The Pope, Eichmann and the Nazi 'Ratlines'
2010-03-17, The Telegraph (One of the UK's leading newspapers)
Posted: 2010-03-28 20:29:59
http://blogs.telegraph.co.uk/news/juliankossoff/100030163/the-pope-eichmann-a...

Germany is fighting to keep sealed the Adolf Eichmann files detailing the years the Holocaust chief logistical organiser spent on the run before he was captured by Mossad agents. Those hoping to have a 50-year secrecy order overturned believe the government is embarrassed by details within that may prove German and Vatican officials colluded in his escape and freedom. For the current papacy under the German pope, Benedict XVI, the 4,500 page Eichmann dossier could be the ’smoking gun’ that would shoot down his plans to canonize Pope Pius XII (1939-58), aka ‘Hitler’s Pope.’ The role of Pope Pius XII during World War II, his relationship with Nazism and his efforts (or lack of them) to save Jews from the gas chambers are hotly disputed. Even within the Jewish community there are strong opinions on both sides of the debate. In fact history’s most savage mass murderers – Adolf Eichmann, Dr Josef Mengele, better known as Auschwitz’s ‘Angel of Death’, Franz Stangl, commandant of the Treblinka extermination camp – escaped justice down the ‘ratline’ that ran straight through the Vatican state in Rome. Senior members of the Roman Catholic hierarchy – marinaded in virulent Judeophobia and obsessed by Bolshevism – organised the escape of thousands of the most debauched, cruel monsters to a peaceful, prosperous retirement in Catholic South America.

Note: As mentioned by the initiator of the lawsuit to open the documents in this Associated Press story, "I think it's impossible that in Germany we are hiding documents about a convicted Nazi mass murderer today." Evidence suggests that these Nazis were purposely allowed to escape with the involvement of the Vatican, the CIA, and other groups. Josef Mengele is purported to have gone on to train the CIA in powerful mind control techniques he perfected using concentration camp inmates as guinea pigs. For more on this, click here.


Inside Norway's 'Doomsday Vault'
2010-03-11, Fox News
Posted: 2010-03-28 20:03:08
http://www.foxnews.com/scitech/2010/03/11/inside-norways-doomsday-vault

In a remote mountainside on the Norwegian tundra sits the "doomsday vault," a backup against disaster -- manmade or otherwise. Inside lives the last hope should the unthinkable occur: a global seedbank that could be used to replant the world. It's a modern day Noah's Ark, in other words, full not of animals but of plantlife. The Svalbard "doomsday" Global Seed Vault [stores] a half-million seed varieties. The arctic permafrost offers natural freezing for the seeds, while additional cooling brings the temperatures down to minus 0.4 degrees Fahrenheit. Should disaster wipe out a species -- or in the case of a large-scale global crisis -- its stockers hope the seeds stored there could be used to restore life. The preciousness of the seeds there is also reflected in the inaccessible nature of the vault. Anyone seeking access to the seeds themselves will have to pass through four locked doors: the heavy steel entrance doors, a second door approximately 115 meters down the tunnel and finally the two keyed air-locked doors. Keys are coded to allow access to different levels of the facility. Not all keys unlock all doors.

Note: Should a major disaster or armageddon happen, the designers of this vault assume that the keyholders will survive. Why such a high level of security when this is by no means certain?


Learning From Lehman
2010-03-14, New York Times
Posted: 2010-03-15 23:14:42
http://www.nytimes.com/2010/03/14/opinion/14sun3.html

On top of everything Lehman Brothers did before it collapsed in 2008, nearly toppling the financial system, it now seems that it was aggressively massaging its books. A new report on the Lehman collapse, released last week ... would leave anyone dumbstruck by the firm’s audacity — and reminded of the crying need for adult supervision of Wall Street. The 2,200-page report [finds that] Lehman engaged in transactions that let it temporarily shift troubled assets off its books and in so doing, hide its reliance on borrowed money. The maneuvers ... made the firm appear healthier than it was. [The author, Anton R. Valukas, a former federal prosecutor,] wrote that Richard S. Fuld Jr., Lehman’s former chief executive, was “at least grossly negligent,” and that Lehman executives engaged in “actionable balance sheet manipulation.” According to the report, rating agencies, government regulators and Lehman’s board of directors had no clue about the gimmicks. The result is that we were all blindsided. And we could be blindsided again. Congress is not even close to passing meaningful regulatory reform. The surviving banks have only gotten bigger and more politically powerful. If the Valukas report is not a wake-up call, what would be?

Note: The Lehman report is described in detail here. For revealing information showing how the US Treasury Department continues to fight against a much-needed audit of the Federal Reserve, click here. For a great collection of revealing reports from reliable sources on the hidden realities behind the financial crisis and government bailouts of the biggest financial corporations, click here.


Head of IMF Proposes New Reserve Currency
2010-02-26, ABC News/Associated Press
Posted: 2010-03-08 04:55:32
http://abcnews.go.com/Business/wireStory?id=9958995

Dominique Strauss-Kahn, the head of the International Monetary Fund, suggested [that] the organization might one day be called on to provide countries with a global reserve currency that would serve as an alternative to the U.S. dollar. "That day has not yet come, but I think it is intellectually healthy to explore these kinds of ideas now," he said in a speech on the future mandate of the 186-nation Washington-based lending organization. Strauss-Kahn said such an asset could be similar to but distinctly different from the IMF's special drawing rights, or SDRs, the accounting unit that countries use to hold funds within the IMF. It is based on a basket of major currencies. He said having other alternatives to the dollar "would limit the extent to which the international monetary system as a whole depends on the policies and conditions of a single, albeit dominant, country." Several countries, including China and Russia, have called for an alternative to the dollar as a reserve currency.

Note: For a treasure trove of reports from reliable sources on the hidden realities behind the world financial and economic crisis, click here.


What Microsoft knows and keeps about you
2010-02-25, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2010-03-08 04:34:15
http://www.sfgate.com/cgi-bin/blogs/ybenjamin/detail??blogid=150&entry_id=57956

It's time to reflect on the immense powers Americans have ceded to the government and [the] potential for abuse by federal, state and local authorities. The global Internet and telecommunications infrastructure provides massive information on almost ... every person on the planet. One power truly stands out --- the all-encompassing reach and technological capabilities of the US National Security Agency. If you want to be secure, don't use a phone, a computer, credit card or any other technologically linked system because it guarantees that Big Brother will find you. Big Brother is not just the government. Most consumer "spying" comes from subpoenas and requests from non-terrorist-related federal, state, local agency requests and non-governmental private litigation and discovery. Simply put, a subpoena issued by a court in support of private litigation and discovery may have the same impact on an individual as the full force of the NSA. What information is typically requested from a company by say a plaintiff's lawyer during some discovery phase? Well, it's everything. In fact, it's generally a fishing expedition for every log file, every uploaded video, photo, chat session and anything else they can get their hands on.

Note: For lots more from major media sources on the continuing development of a global society under Big Brother's constant gaze, click here.


Flying Disks
1947-07-10, FBI Website, UFO Vault
Posted: 2010-02-23 15:43:13
http://vault.fbi.gov/UFO/UFO%20Part%201%20of%2016/

At request of Brigadier General George F. Schulgen, Chief of the Requirements Intelligence Branch of Army Air Corps Intelligence, Special Agent [deleted] discussed the above captioned matter with him on July 9, 1947. General Schulgen indicated to [deleted] that the Air Corps has taken the attitude that every effort must be undertaken in order to run down and ascertain whether or not the flying disks are a fact and, if so, to learn all about them. He advised that to complete the picture he desired the assistance of the Federal Bureau of Investigation in locating and questioning the individuals who first sighted the so-called flying disks in order to ascertain whether or not they are sincere in their statements that they saw these disks. [Deleted] indicated that it was his attitude that the flying disks are not the result of any Army or Navy experiments. He stated that he was of the opinion that the Bureau, if at all possible, should accede to General Schulgen's request. [FBI Director J. Edgar Hoover's handwritten response:] I would do it but before agreeing to it we must insist upon full access to discs recovered. For instance in the Sa. case the army grabbed it and would not let us have it for cursory investigation.

Note: The excerpt above is from pages 44 and 45 of the rich collection of declassified FBI documents on UFOs at the link above. If the link fails, click here. Note that this was just days after the Roswell crash. For lots more solid evidence of a major UFO cover-up, see our UFO Information Center at this link. Why hasn't this been widely reported and become public knowledge? For a possible answer, click here.


Greece to Make All Large Cash Transactions Illegal
2010-02-16, Christian Science Monitor
Posted: 2010-02-23 15:33:16
http://www.csmonitor.com/Money/The-Daily-Reckoning/2010/0216/Greece-to-Make-A...

Embroiled in its debt crisis and looking for any avenue to bolster tax receipts [Greece] has done the unthinkable – it has made [cash, in euros] illegal for transactions over 1,500 euros. Of course, larger credit- or debit-based electronic transactions over 1,500 will still be denominated in euros. However, electronic transactions clearly require infrastructure and limit personal freedom. From Reuters: “From 1. Jan. 2011, every transaction above 1,500 euros between natural persons and businesses, or between businesses, will not be considered legal if it is done in cash. Transactions will have to be done through debit or credit cards.” It seems wrong for the Greek state to dictate how cash euros can be used. In fact, it’s surprising that the EU-endorsed plan would allow Greece to control euro usage at that level. Despite the fact that the reform bill is a piece of an approved EU plan to help improve Greek tax revenue and reduce deficit, it seems to go too far in curtailing personal liberty. How much is a government willing to punish its own citizens for using “too much” of their own legal tender in an otherwise legal transaction?

Note: What gives any government the right to limit cash transactions? And why is the EU approving this unusual measure? Could this be part of a hidden agenda to push the public towards a cashless society?


Battle Over the Bailout
2010-02-14, New York Times
Posted: 2010-02-23 15:20:50
http://www.nytimes.com/2010/02/14/nyregion/14fed.html

Mark Pittman, an investigative reporter for Bloomberg News ... filed a Freedom of Information Act request with the Federal Reserve Board, seeking the details of its unprecedented efforts to funnel money to the collapsing banks of Wall Street. That was in September 2008. Just more than a year later, Mr. Pittman ... died unexpectedly at age 52. But his cause has persevered. It is now known as Bloomberg L.P. v. Board of Governors of the Federal Reserve, an attempt to unlock the vault of the largest Wall Street rescue plan in decades — or, as the legal briefs put it, to “break down a wall of secrecy” that the Fed has kept in place for nearly two years in its “controversial use of public money to prop up financial institutions.” The Federal Reserve has wrapped itself in secrecy since the turn of the 20th century, when a select group of financiers met at the private Jekyll Island Club off the eastern coast of Georgia and, forgoing last names to preserve their anonymity among the staff, drafted legislation to create a central bank. Its secrecy, of course, persists today, with Ben S. Bernanke, the Federal Reserve chairman, refusing to tell even Congress which banks received government money under the bailout. There is also a heated battle to force the Fed to disclose its role in the controversial attempt to save the insurance giant American International Group.

Note: Isn't it interesting that Pittman died at age 52 while trying to expose manipulations of the big bankers? For a one-minute video proving the existence of a secret weapon which can cause an undetectable heart attack, click here. For a concise, excellent background on the hidden role of the Federal Reserve, click here.


Weather as a Force Multiplier: Owning the Weather in 2025
1996-08-00, US Air Force Air University
Posted: 2010-02-01 19:17:31
http://csat.au.af.mil/2025/volume3/vol3ch15.pdf

In 2025, US aerospace forces can “own the weather” by capitalizing on emerging technologies and focusing development of those technologies to war-fighting applications. Such a capability offers the war fighter tools to shape the battlespace in ways never before possible. Weather-modification is a force multiplier with tremendous power that could be exploited across the full spectrum of war-fighting environments. From enhancing friendly operations or disrupting those of the enemy via small-scale tailoring of natural weather patterns complete dominance of global communications and counter-space control, weather-modification offers war fighter a wide-range of possible options to defeat or coerce an adversary. But, while offensive weather modification efforts would certainly be undertaken by US forces with great caution and trepidation, it is clear that we cannot afford to allow an adversary to obtain an exclusive weather-modification capability.

Note: The above quote is taken from pages 6 and 35, the executive summary and conclusion of the above US Air Force study. For a highly revealing article suggesting elements within government have much more control over the weather than is thought, click here.


'Hitler skull' revealed as female
2009-09-29, BBC News
Posted: 2010-01-25 13:37:57
http://news.bbc.co.uk/2/hi/8281839.stm

A bone fragment believed to be part of Adolf Hitler's skull has been revealed as being that of an unidentified woman, US scientists have said. The section of bone - marked with a bullet hole - was used to support the theory that Hitler shot himself. Russian scientists said the skull piece was found alongside Hitler's jawbone and had put it on display in Moscow. But US scientists said DNA tests revealed it actually belonged to a woman aged between 20 and 40. An archaeologist from the University of Connecticut travelled to Moscow, where the fragment has been on show in the city's federal archive since 2000, to take a sample. Nick Bellantoni said he had suspected even before the bone was tested that the fragment did not come from an adult male. DNA tests confirmed that the bone fragment came from a female. Doubts about exactly how Hitler died have persisted for decades. Russian officials said that the bodies of Hitler and Eva Braun - who reportedly committed suicide in a Berlin bunker in 1945 - were removed from a shell crater shortly after they died. The piece of skull forms part of a collection that also includes a section of a bloodstained sofa where Hitler is believed to have shot himself after swallowing a cyanide pill.


Microchip to allow wallet-free drinking
2005-01-17, The Telegraph (One of the UK's leading newspapers)
Posted: 2010-01-25 13:28:42
http://www.telegraph.co.uk/news/uknews/4194899/Microchip-to-allow-wallet-free...

A Scottish nightclub is about to become the first in Britain to offer its customers the chance to have a microchip implanted in their arm to save them carrying cash. The "digital wallet", the size of a grain of rice, guarantees entry to the club and allows customers to buy drinks on account. Brad Stevens, owner of Bar Soba in Glasgow, said his customers had responded enthusiastically to the idea. The VeriChip is inserted by a medical professional and then scanned for its unique ID number as a customer enters the bar. The scheme was criticised by a spokesman for the Scottish Executive, who said the microchip could encourage excessive drinking, and by Notags, a consumer group set up to resist the spread of radio frequency identification devices. A spokesman said: "The chip contains your name and ID number and, as this could be read remotely without your knowledge, that is already too much information."

Note: For summaries of media articles showing an agenda to promote microchip implants in humans, click here. For a well-researched essay by a caring woman whose dog died of cancer likely from a microchip, click here.


Pakistani Prime Minister Benazir Bhutto: Osama bin Laden is Dead
2007-11-02, BBC News
Posted: 2010-01-16 20:15:36
http://news.bbc.co.uk/player/nol/newsid_7070000/newsid_7075800/7075843.stm

David Frost: Does anyone know exactly who was responsible for this assassination attempt? There is one report that said that you arranged to send President Musharraf a letter ... in the event of your death by assassination, urging him to investigate certain individuals in his government. Is that true? Benazir Bhutto: Yes it is true that I wrote to General Musharraf. I feel these are the forces that really want to stop not just me, but the democratic process and the will of the people [from] triumphing. David Frost: In terms of these three people you mentioned where they members of or associated with the government? Benazir Bhutto: One of them is a very key figure in security. He is a former military officer. He is someone who has had dealings with Jaish-e-Mohammad, one of the band [of] groups of Maulana Masood Azhar, who was in an Indian jail for decapitating three British tourists and three American tourists. And he also had dealings with Omar Shiekh, who murdered Osama bin Laden.

Note: The key statement on bin Laden's murder happens at minute five in the video at the above link. If the link fails, click here. For a Jan. 9, 2010 BBC article also suggesting bin Laden may already have been dead years earlier and that his death had been covered up, click here. Bhutto was assassinated not long after this interview on Dec. 27, 2007.


US aid tied to purchase of arms
2010-01-02, Sydney Mountain Herald
Posted: 2010-01-04 14:13:56
http://www.smh.com.au/world/us-aid-tied-to-purchase-of-arms-20100101-llsb.html

Just before Christmas, the US President, Barack Obama, signed into law one of his country's biggest aid pledges of the year. It was bound not for Africa or any of the many struggling countries on the World Bank's list. It was a deal for $US2.77 billion ($3 billion) to go to Israel in 2010 and a total of $US30 billion over the next decade. Israel is bound by the agreement to use 75 per cent of the aid to buy military hardware made in the US. For the first time the US is also providing $US500 million to the Palestinian Authority, including $US100 million to train security forces, under the strict proviso that the authority's leadership recognises Israel. For many years Israel has been the largest recipient of US foreign aid, followed by Egypt ($US1.75 billion), which also receives most of its assistance in tied military aid. The Congressional Research Service says that the US spent 17 per cent of its total aid budget - or $US5.1 billion - on military aid in 2008, of which $US4.7 billion was grants to enable governments to receive equipment from the US.

Note: Israel's population is 7.5 million. If you do the math, the US is providing the equivalent of $4,000 in aid to every man, woman and child in Israel over the next decade, with $3,000 of that to buy US military hardware. For lots more on government-facilitated profiteering in the arms industry, click here and here.


Drug money saved banks in global crisis, claims UN advisor
2009-12-13, The Guardian (One of the UK's leading newspapers)
Posted: 2009-12-21 00:09:39
http://www.guardian.co.uk/global/2009/dec/13/drug-money-banks-saved-un-cfief-...

Drugs money worth billions of dollars kept the financial system afloat at the height of the global crisis, the United Nations' drugs and crime tsar has told the Observer. Antonio Maria Costa, head of the UN Office on Drugs and Crime, said he has seen evidence that the proceeds of organised crime were "the only liquid investment capital" available to some banks on the brink of collapse last year. He said that a majority of the $352bn (Ł216bn) of drugs profits was absorbed into the economic system as a result. This will raise questions about crime's influence on the economic system at times of crisis. It will also prompt further examination of the banking sector as world leaders, including Barack Obama and Gordon Brown, call for new International Monetary Fund regulations. Speaking from his office in Vienna, Costa said evidence that illegal money was being absorbed into the financial system was first drawn to his attention by intelligence agencies and prosecutors around 18 months ago. "In many instances, the money from drugs was the only liquid investment capital. In the second half of 2008, liquidity was the banking system's main problem and hence liquid capital became an important factor," he said. Some of the evidence put before his office indicated that gang money was used to save some banks from collapse when lending seized up, he said. "Inter-bank loans were funded by money that originated from the drugs trade and other illegal activities... There were signs that some banks were rescued that way."

Note: For many revealing reports from major media sources on the hidden realities behind the global financial crisis, click here.


Ventura Turns Investigator for 'Conspiracy Theory'
2009-12-01, ABC News/Associated Press
Posted: 2009-12-21 00:01:26
http://abcnews.go.com/Entertainment/wireStory?id=9219009

Jesse Ventura is back for another stab at TV stardom, this time hosting a program that digs into conspiracy theories, including alternate views of what was behind the attacks of Sept. 11, 2001, and the purpose of a sprawling research center in remote Alaska. The former Minnesota governor, professional wrestler and Navy SEAL stars in "Conspiracy Theory With Jesse Ventura," ... on truTV. The cable network, part of Turner Broadcasting System Inc., has ordered seven episodes of the hourlong weekly series. Marc Juris, executive vide president and general manager of truTV, said Ventura is passionate about the show and brings "knowledge from the inside" of government. "He's not doing this as an act or a gimmick. It's true to his heart. He's really looking for the answers," Juris told the AP. The premiere episode deals with the High Frequency Active Auroral Research Program, or HAARP, a 35-acre compound of 180 antennas near Gakona, Alaska, that is used to study the Earth's ionosphere. Ventura and those he interviews question whether the government is using the site to manipulate the weather or to bombard people with mind-controlling radio waves. Future "Conspiracy Theory" shows explore alleged cover-ups surrounding the Sept. 11 attacks and whether there are real "Manchurian Candidate" assassins who are programmed to kill, said Juris.

Note: Ventura was also a Navy Seal, where he personally was involved in top secret activities and learned how what is presented to the public is very different from the deeper realities. Don't miss the highly educational episode on the vitally important topic of HAARP by clicking here. And watch the excellent episode on 9/11 by clicking here. You'll be surprised by the new angles presented.


Weekend break for the global elite
2001-05-25, The Guardian (One of the UK's leading newspapers)
Posted: 2009-12-17 18:03:56
http://www.guardian.co.uk/world/2001/may/25/globalisation.madeleinebunting

Global power-brokers have a penchant for siting their get-togethers in inaccessible places. Since Seattle 1999, Washington and Prague 2000, the calendar of global get-togethers has attracted lively anti-globalisation demonstrations. Davos this year had unusually tight security to try and keep protestors well away, leading to allegations of unnecessary heavy-handedness by the Swiss police. This weekend, it is the turn of Bilderberg, perhaps the most secretive (or as the organisers would prefer to claim, discrete) club for the global elite. It holds its weekend on Stenungsund, an island off the Swedish west coast. The group was created by Denis (now Lord) Healey, Joseph Retinger, David Rockefeller and Prince Bernhard of the Netherlands (a former SS officer) - the group aimed to [bring] together financiers, industrialists, politicians and opinion formers; the press have never been allowed access. There is a growing perception that globalisation is a process which is being managed for the benefit of a small proportion of the planet's residents and at terrible cost to many more. There is a perception of illegitimacy about unaccountable corporate power and governments elected on low turnout: sooner or later global power-brokers will have to recognise this crisis of legitimacy, and engage with protestors rather than run away from them.

Note: For lots more reliable news on powerful secret societies, click here. And for another balanced article on the powerful Bilderberg Group, click here.


Who pulls the strings?
2001-03-10, The Guardian (One of the UK's leading newspapers)
Posted: 2009-12-17 17:59:12
http://www.guardian.co.uk/books/2001/mar/10/extract1

So this is how it works. A tiny, shoe-string central office in Holland decides each year which country will host the next meeting. Each country has two steering committee members. They call up Bilderberg-friendly global corporations, such as Xerox or Heinz or Fiat or Barclays or Nokia, which donate the hundreds of thousands of pounds needed. They do not accept unsolicited donations from non-Bilderberg corporations. Nobody can buy their way into a Bilderberg meeting, although many corporations have tried. Then they decide who to invite - who seems to be a "Bilderberg person". The notion of a Bilderberg person hasn't changed since the earliest days, back in 1954. The guests are expressly asked not to give interviews to journalists. There are two morning sessions and two afternoon sessions. While furiously denying that they secretly ruled the world, my Bilderberg interviewees did admit to me that international affairs had, from time to time, been influenced by these sessions. This is how Denis Healey described a Bilderberg person to me: "To say we were striving for a one-world government is exaggerated, but not wholly unfair. Bilderberg is a way of bringing together politicians, industrialists, financiers and journalists. Politics should involve people who aren't politicians."

Note: For lots more on the highly secretive Bilderberg meeting from two later BBC News article, click here. For many other revealing articles from major media reports on secret societies and secret meetings of the most rich and powerful people in our world, click here.


G30, Ripe for Conspiracy Theorists
2009-12-04, Wall Street Journal blog
Posted: 2009-12-09 13:19:12
http://blogs.wsj.com/economics/2009/12/04/g30-ripe-for-conspiracy-theorists

If you want to encourage the kind of conspiracy theories that have prospered in the wake of last year’s financial crisis — those that describe a secret cabal of elites running the world — try doing the following: Have a group of 30 high-powered economists, government officials and bankers meet under the auspices of an international group that shares ideas on how to run the global financial architecture. Have your Board of Trustees led by an influential former Federal Reserve chairman who’s now working as a senior advisor to the president of the United States. Name the former vice chairman of bailout behemoth AIG as the group’s Chairman and CEO (It helps that he [is] former governor of the Bank of Israel). Ensure that membership includes the likes of these: A former Treasury Secretary and president of Harvard who also now works as a top presidential economic advisor; Citigroup’s senior vice chairman; a former IMF deputy managing director and the current governor of the Bank of Israel; and top representatives of the world’s four most important central banks. Hold two days of closed-door meetings at the New York Fed. Do not publicize a list of attendees and leave everyone guessing about the agenda. These were the circumstances surrounding Friday’s start to the 62nd plenary meetings of the Group of 30, whose formal name is “The Consultative Group on International Economic and Monetary Affairs, Inc.”

Note: The article interestingly then goes on to claim that this secret meeting of the world's top bankers is not really anything to worry about, that they are really working for the public good. If so, why not have the meeting open and widely covered by the press? For many other revealing articles from major media reports on secret societies and secret meetings of the most rich and powerful people in our world, click here.


Skull and Bones members include some of America's most powerful
2009-11-12, CNN
Posted: 2009-11-21 18:39:13
http://www.edition.cnn.com/TRANSCRIPTS/0911/12/ec.01.html

What really happens behind the padlocked doors of this windowless building, [the home] of Skull and Bones, Yale's oldest secret society? Its members include some of America's most powerful and privileged elite all sworn to secrecy. [CAMPBELL] BROWN: Alexandra Robbins broke through the wall of silence to write Secrets of the Tomb based on clandestine interviews with dozens of bonesmen. Only 15 [Yale students] get picked each year. The society includes at least three U.S. presidents, Supreme Court justices, and too many senators and CEOs to name. In 2004, Bush versus Kerry was the first all-bonesmen presidential election. ALEXANDRA ROBBINS: Skull and Bones' only purpose is to get its members into positions of prominence around the world so that they can elevate other members to similar positions. One of the first activities they participate in is called connubial bliss, where ... each member must spend an evening standing in front of the other 14 bonesmen and recount his or her entire sexual and romantic history. BROWN: According to one ... story, Prescott Bush, George W. Bush's grandfather, was part of a group that broke into the Oklahoma burial place of the Apache chief Geronimo and made off with his skull. Geronimo's grave was disturbed back in 1918, there are photos of skulls inside the "Skull and Bones" tomb. They have their own private retreat. Deer Island off the coast of New York. And a world of ready investors and political contacts in the highest echelons of American society. What has kept the secret society alive for all these years? Good old fashioned networking for the super elite.

Note: To watch the CNN video clip on this Yale secret society, click here. For lots more powerful information on Skull and Bones and other secret societies reported in major media articles, click here.


State to 'spy' on every phone call, email and web search
2009-11-10, The Telegraph (One of the UK's leading newspapers)
Posted: 2009-11-21 18:23:39
http://www.telegraph.co.uk/news/newstopics/politics/lawandorder/6534319/State...

Every phone call, text message, email and website visit made by private citizens is to be stored for a year and will be available for monitoring by government bodies. All telecoms companies and internet service providers will be required by law to keep a record of every customer’s personal communications, showing who they have contacted, when and where, as well as the websites they have visited. Despite widespread opposition to the increasing amount of surveillance in Britain, 653 public bodies will be given access to the information, including police, local councils, the Financial Services Authority, the ambulance service, fire authorities and even prison governors. They will not require the permission of a judge or a magistrate to obtain the information, but simply the authorisation of a senior police officer or the equivalent of a deputy head of department at a local authority. The Government announced yesterday it was pressing ahead with privately held “Big Brother” databases that opposition leaders said amounted to “state-spying” and a form of “covert surveillance” on the public. It is doing so despite its own consultation showing that it has little public support. The new rules ... will not only force communications companies to keep their records for longer, but to expand the type of data they keep to include details of every website their customers visit.

Note: For many more reports from major media sources on the disturbing trend toward increasing government and corporate surveillance and loss of privacy, click here.


How Goldman secretly bet on the housing crash
2009-11-01, Kansas City Star/McClatchy Newspapers
Posted: 2009-11-19 02:23:30
http://www.kansascity.com/437/story/1542453.html

In 2006 and 2007, Goldman Sachs Group peddled more than $40 billion in securities backed by at least 200,000 risky home mortgages, but never told the buyers it was secretly betting that a sharp drop in U.S. housing prices would send the value of those securities plummeting. Goldman's sales and its clandestine wagers, completed at the brink of the housing market meltdown, enabled one of the nation's premier investment banks to pass most of its potential losses to others before a flood of mortgage loan defaults staggered the U.S. and global economies. Only later did investors discover that what Goldman promoted as triple-A investments were closer to junk. Now, pension funds, insurance companies, labor unions and foreign financial institutions that bought those dicey mortgage securities are facing large losses, and a five-month McClatchy Newspapers investigation has found that Goldman's failure to disclose that it made secret, exotic bets on an imminent housing crash may have violated securities laws. "The Securities and Exchange Commission should be very interested in any financial company that secretly decides a financial product is a loser and then goes out and actively markets that product or very similar products to unsuspecting customers without disclosing its true opinion," said Laurence Kotlikoff, a Boston University economics professor who's proposed a massive overhaul of the nation's big banks. "This is fraud and should be prosecuted."

Note: For an eye-opening, powerful PBS video which reveals how the economic crisis was conscously allowed to happen, click here. It reveals that Fed chairman Alan Greenspan was against investigating any fraud. For many reports from reliable sources on corruption at the core of the Wall Street collapse and bailout, click here.


Who's in Big Brother's Database?
2009-11-05, New York Review of Books
Posted: 2009-11-19 02:17:33
http://www.nybooks.com/articles/23231

On a remote edge of Utah's dry and arid high desert ... hard-hatted construction workers with top-secret clearances are preparing to build [a] mammoth $2 billion structure. It's being built by the ultra-secret National Security Agency ... to house trillions of phone calls, e-mail messages, and [electronic data trails of all kinds]. The NSA is also completing work on another data archive, this one in San Antonio, Texas, which will be nearly the size of the Alamodome. Just how much information will be stored in these windowless cybertemples? A recent report prepared by the MITRE Corporation, a Pentagon think tank, [states] "Sensor data volume could potentially increase to the level of Yottabytes [10-to-the-24th-power bytes] by 2015." Once vacuumed up and stored in these near-infinite "libraries," the data are then analyzed by powerful infoweapons, supercomputers running complex algorithmic programs, to determine who among us may be — or may one day become — a terrorist. Emerging [after 9/11] as the most powerful chief the spy world has ever known was the director of the NSA. He is in charge of an organization three times the size of the CIA and empowered in 2008 by Congress to spy on Americans to an unprecedented degree. These new centers in Utah, Texas, and possibly elsewhere will likely become the centralized repositories for the data intercepted by the NSA in America's version of the "big brother database."

Note: James Bamford, the author of this review of a new book on the history of the NSA, has himself written three important books on the agency. For many revealing reports from reliable sources on the developing capacity by government and corporate surveillance to construct a "Big Brother" states, click here.


Officers accused of inciting violence to testify before police ethics panel
2009-10-23, Globe and Mail (One of Canada's leading newspapers)
Posted: 2009-10-31 19:15:43
http://www.theglobeandmail.com/news/national/officers-accused-of-inciting-vio...

Three undercover officers accused of inciting protesters to attack riot police at the 2007 North American leaders summit in Montebello are being summoned to testify before Quebec's independent police ethics committee. The decision from the committee released this week overrules an independent review that exonerated the officers. It also comes more than two years after the black-clad trio were first exposed on YouTube. Dave Coles, the union leader who confronted the men at the time and filed a complaint against the police ... said he suspects an inquiry would find there was political involvement. “This is the big question: Who sent them in?” asked Mr. Coles. “And don't give me some lame excuse that it was a low-level officer.” Video images of the incident posted on YouTube showed three officers disguised as protesters wearing black tops and camouflage pants. Their faces were covered by black and white bandanas. One of them, wearing a sideways ball cap marked with graffiti, held a large stone in his hand. Mr. Coles yelled at them to show their faces and the officer carrying the rock responded with a two-handed shove.

Note: Click on the link above to watch the astonishing YouTube video of this police provocation. This is just one case that happened to be caught on film. Why are undercover police infiltrating activist groups and inciting violence at demonstrations around the world?


Police in Ł9m scheme to log 'domestic extremists'
2009-10-25, The Guardian (One of the UK's leading newspapers)
Posted: 2009-10-31 19:09:09
http://www.guardian.co.uk/uk/2009/oct/25/police-domestic-extremists-database

Police are gathering the personal details of thousands of activists who attend political meetings and protests, and storing their data on a network of nationwide intelligence databases. The hidden apparatus has been constructed to monitor "domestic extremists". Detailed information about the political activities of campaigners is being stored on a number of overlapping IT systems, even if they have not committed a crime. Senior officers say domestic extremism, a term coined by police that has no legal basis, can include activists suspected of minor public order offences such as peaceful direct action and civil disobedience. Three national police units responsible for combating domestic extremism are run by the "terrorism and allied matters" committee of the Association of Chief Police Officers (Acpo). In total, it receives Ł9m in public funding, from police forces and the Home Office, and employs a staff of 100. The main unit, the National Public Order Intelligence Unit (NPOIU), runs a central database which lists thousands of so-called domestic extremists. It filters intelligence supplied by police forces across England and Wales, which routinely deploy surveillance teams at protests, rallies and public meetings. Vehicles associated with protesters are being tracked via a nationwide system of automatic number plate recognition (ANPR) cameras. Police surveillance units, known as Forward Intelligence Teams (FIT) and Evidence Gatherers, record footage and take photographs of campaigners as they enter and leave openly advertised public meetings. Surveillance officers are provided with "spotter cards" used to identify the faces of target individuals who police believe are at risk of becoming involved in domestic extremism. Targets include high-profile activists regularly seen taking part in protests.

Note: This important article should be read in its entirety. For further revelations of the magnitude of this surveillance and "rebranding protest as extremism " program, click here.


Loosening of F.B.I. Rules Stirs Privacy Concerns
2009-10-29, New York Times
Posted: 2009-10-31 19:00:45
http://www.nytimes.com/2009/10/29/us/29manual.html

After a Somali-American teenager from Minneapolis committed a suicide bombing in Africa in October 2008, the Federal Bureau of Investigation began investigating whether a Somali Islamist group had recruited him on United States soil. Instead of collecting information only on people about whom they had a tip or links to the teenager, agents fanned out to scrutinize Somali communities. The operation unfolded as the Bush administration was relaxing some domestic intelligence-gathering rules. The F.B.I.’s interpretation of those rules was recently made public when it released, in response to a Freedom of Information lawsuit, its “Domestic Investigations and Operations Guide.” The disclosure of the manual has opened the widest window yet onto how agents have been given greater power in the post-Sept. 11 era. But the manual’s details have alarmed privacy advocates. “It raises fundamental questions about whether a domestic intelligence agency can protect civil liberties if they feel they have a right to collect broad personal information about people they don’t even suspect of wrongdoing,” said Mike German, a former F.B.I. agent who now works for the American Civil Liberties Union. The manual authorizes agents to open an “assessment” to “proactively” seek information about whether people or organizations are involved in national security threats. Assessments permit agents to use potentially intrusive techniques, like sending confidential informants to infiltrate organizations and following and photographing targets in public. When selecting targets, agents are permitted to consider political speech or religion as one criterion.

Note: To read the FBI's recently-released and redacted new "Domestic Investigations and Operation Guide", described by the New York Times as giving "F.B.I. agents the most power in national security matters that they have had since the post-Watergate era," click here.


Arrest Puts Focus on Protesters’ Texting
2009-10-05, New York Times
Posted: 2009-10-29 19:58:03
http://www.nytimes.com/2009/10/05/nyregion/05txt.html

As demonstrations have evolved with the help of text messages and online social networks, so too has the response of law enforcement. On Thursday, F.B.I. agents descended on a house in Jackson Heights, Queens [NY], and spent 16 hours searching it. The most likely reason for the raid: a man who lived there had helped coordinate communications among protesters at the Group of 20 summit in Pittsburgh. The man, Elliot Madison, 41, a social worker who has described himself as an anarchist, had been arrested in Pittsburgh on Sept. 24 and charged with hindering apprehension or prosecution, criminal use of a communication facility and possession of instruments of crime. The Pennsylvania State Police said he was found in a hotel room with computers and police scanners while using the social-networking site Twitter to spread information about police movements. He has denied wrongdoing. American protesters first made widespread use of mass text messages in New York, during the 2004 Republican National Convention. Messages, sent as events unfolded, allowed demonstrators and others to react quickly to word of arrests, police mobilizations and roving rallies. Mass texting has since become a valued tool among protesters, particularly at large-scale demonstrations. Mr. Madison [may be] the first to be charged criminally while sending information electronically to protesters about the police. “He and a friend were part of a communications network among people protesting the G-20,” Mr. Madison’s lawyer, Martin Stolar, said on Saturday. “There’s absolutely nothing that he’s done that should subject him to any criminal liability.”

Note: For many reports from reliable sources on increasing government erosion of civil liberties, click here.


Material missing from Oklahoma bombing tapes, lawyer says
2009-09-27, USA Today/Associated Press
Posted: 2009-10-03 22:27:23
http://www.usatoday.com/news/nation/2009-09-27-okla-city-bombing-tapes_N.htm

Long-secret security tapes showing the chaos immediately after the 1995 bombing of the Oklahoma City federal building are blank in the minutes before the blast and appear to have been edited, an attorney who obtained the recordings said Sunday. "The real story is what's missing," said Jesse Trentadue, a Salt Lake City attorney who obtained the recordings through the federal Freedom of Information Act as part of an unofficial inquiry he is conducting into the April 19, 1995, bombing that killed 168 people and injured hundreds more. The tapes turned over by the FBI came from security cameras various companies had mounted outside office buildings near the Alfred P. Murrah Federal Building. They are blank at points before 9:02 a.m., when a truck bomb carrying a 4,000-pound fertilizer-and-fuel-oil bomb detonated in front of the building, Trentadue said. "Four cameras in four different locations going blank at basically the same time on the morning of April 19, 1995. There ain't no such thing as a coincidence," Trentadue said. He said government officials claim the security cameras did not record the minutes before the bombing because "they had run out of tape" or "the tape was being replaced." "The absence of footage from these crucial time intervals is evidence that there is something there that the FBI doesn't want anybody to see." Trentadue said he is seeking more tapes along with a variety of bombing-related documents from the FBI and the CIA. An FOIA request by Trentadue for 26 CIA documents was rejected in June. A letter from the National Geospatial-Intelligence Agency, which reviewed the documents, said their release "could cause grave damage to our national security."

Note: This revealing article also tells how Trentadue's brother was murdered by FBI agents who mistakenly thought his brother was the bomber. For more valuable information on this and other evidence challenging the official story of the Oklahoma City bombing, click here.


Boston launches flu shot tracking
2008-11-21, Boston Globe
Posted: 2009-09-22 22:00:33
http://www.boston.com/news/local/massachusetts/articles/2008/11/21/boston_lau...

Using technology originally developed for mass disasters, Boston disease trackers are embarking on a novel experiment - one of the first in the country - aimed at eventually creating a citywide registry of everyone who has had a flu vaccination. The resulting vaccination map would allow swift intervention in neighborhoods left vulnerable to the fast-moving respiratory illness. The trial starts this afternoon, when several hundred people are expected to queue up for immunizations at the headquarters of the Boston Public Health Commission. Each of them will get a bracelet printed with a unique identifier code. Information about the vaccine's recipients, and the shot, will be entered into handheld devices similar to those used by delivery truck drivers. Infectious disease specialists in Boston and elsewhere predicted that the registry approach could prove even more useful if something more sinister strikes: a bioterrorism attack or the long-feared arrival of a global flu epidemic. In such crises, the registry could be used to track who received a special vaccine or antidote to a deadly germ. "Anything you can do to better pinpoint who's vaccinated and who's not, that's absolutely vital," said Michael Osterholm, director of the Center for Infectious Disease Research & Policy at the University of Minnesota. "I wish more cities were doing this kind of thing." When people arrive for their shots, they will get an ID bracelet with a barcode. Next, basic information - name, age, gender, address - will be entered into the patient tracking database. There will be electronic records, too, of who gave the vaccine and whether it was injected into the right arm or the left, and time-stamped for that day.

Note: For more on the serious risks and dangers posed by vaccines, click here and here.


US Air Force prepares drones to end era of fighter pilots
2009-08-23, The Guardian (One of the UK's leading newspapers)
Posted: 2009-08-29 22:36:51
http://www.guardian.co.uk/world/2009/aug/22/us-air-force-drones-pilots-afghan...

As part of an expanding programme of battlefield automation, the US Air Force has said it is now training more drone operators than fighter and bomber pilots and signalled the end of the era of the fighter pilot is in sight. Just three years ago, the service was able to fly just 12 drones at a time; now it can fly more than 50. At a trade conference outside Washington last week, military contractors presented a future vision in which pilotless drones serve as fighters, bombers and transports, even automatic mini-drones programmed to attack in swarms. Contractors made presentations for "nano-size" drones the size of moths that can flit into buildings to gather intelligence; drone helicopters; large aircraft that could be used as strategic bombers and new mid-sized drones could act as jet fighters. This Terminator-like vision in which future generations of fighter aces become cubicle-bound drone operators thousands of miles from conflict is already here: the deployment that began during the Bush administration has accelerated during the first seven months of Obama's term. Some 5,000 robotic vehicles and drones are now deployed in Iraq and Afghanistan. By 2015, the Pentagon's $230bn arms procurement programme Future Combat Systems expects to robotise around 15% of America's armed forces. As US domestic approval for the "Af-Pak" conflict slips (a new Washington Post poll found less than a quarter of the US public support sending more troops to Afghanistan), the reliance of drones is likely to grow, analysts say. The air force study suggests areas of warfare too critical for automation, including dogfighting and nuclear-bombing, could eventually be handled by drones.

Note: For revealing reports on Pentagon war planning from major media sources, click here.


Political ties to a secretive religious group
2008-04-03, MSNBC News
Posted: 2009-08-29 22:12:48
http://deepbackground.msnbc.msn.com/archive/2008/04/03/857959.aspx

For more than 50 years, the National Prayer Breakfast has been a Washington institution. Every president has attended the breakfast since Eisenhower. Besides the presidents ... the one constant presence at the National Prayer Breakfast has been Douglas Coe. Although he’s not an ordained minister, the 79-year-old Coe is the most important religious leader you've never seen or heard. Scores of senators in both parties ... go to small weekly Senate prayer groups that Coe attends, [including] senators John McCain, Barack Obama and Hillary Clinton. Observers who have investigated Coe’s group, called The Fellowship Foundation, [describe] a secretive organization. Coe repeatedly urges a personal commitment to Jesus Christ. It’s a commitment Coe compares to the blind devotion that Adolph Hitler demanded. "Hitler, Goebbels and Himmler. Think of the immense power these three men had.” Coe also quoted Jesus and said: “One of the things [Jesus] said is 'If any man comes to me and does not hate his father, mother, brother, sister, his own life, he can't be a disciple.’" Writer Jeff Sharlet ... lived among Coe's followers six years ago, and came out troubled by their secrecy and rhetoric. “We were being taught the leadership lessons of Hitler, Lenin and Mao. Hitler’s genocide wasn’t really an issue for them. It was the strength that he emulated,” said Sharlet, who ... has now written about The Fellowship, also known to insiders as The Family, in [a] book called The Family: The Secret Fundamentalism at the Heart of American Power.

Note: This article strangely has been removed from the MSNBC website, though you can still access it using the Internet Archive. Watch the incredible four-minute NBC video clip showing Coe praising a communist Red Guard member for cutting the head off his mother at this link. For more on Coe's powerful links to Congress and corruption, see the MSNBC article available here. And for powerful inside information from a mind programmer who claims to have escaped from "the family," and another who says he is from a very high level there, click here and here. To develop an understanding of the bigger picture behind all of this, click here.


Strange New Air Force Facility Energizes Ionosphere, Fans Conspiracy Flames
2009-07-20, Wired magazine
Posted: 2009-08-23 18:37:05
http://www.wired.com/politics/security/magazine/17-08/mf_haarp

The senior senator from Alaska, Ted Stevens, enjoyed a reputation for inserting projects into the federal budget to benefit his home state, most notoriously a $223 million bridge from the town of Ketchikan to, well, not much of anyplace. In 1988, [physics] researchers sat down with Stevens and assured him that an ionospheric heater would be a bona fide scientific marvel and a guaranteed job creator, and it could be built for a mere $30 million. Just like that, the Pentagon had $10 million for ionospheric heater research. In a series of meetings in the winter of 1989-90, the field's leading lights ... pitched the Navy and the Air Force. Haarp, they asserted, could lead to "significant operational capabilities." They'd build a giant phased antenna array that would aim a finely tuned beam of high-frequency radio waves into the sky. The beam would excite electrons in the ionosphere, altering that spot's conductivity and inducing it to emit its own extremely low frequency waves, which could theoretically penetrate the earth's surface to reveal hidden bunkers or be used to contact deeply submerged submarines. Of course, the scientists said, you'd need a brand-new, state-of-the-art ionospheric heater to see if any of this was even feasible. The Pentagon ... began using Stevens' earmarked cash to fund the appropriate studies. For more than a year, planning proceeded largely out of public view. Then, in 1993, an Anchorage teachers' union rep named Nick Begich—son of one of Alaska's most important political families—found a notice about Haarp in the Australian conspiracy magazine Nexus. In 1995, he self-published a book, Angels Don't Play This HAARP. It sold 100,000 copies. He started giving speeches on Haarp's dangers everywhere, from UFO conventions to the European Parliament.

Note: For more excellent information on HAARP, click here. There is much more than meets the eye here.


CIA Brainwashing Suit Settled
1988-10-05, Chicago Tribune
Posted: 2009-08-02 23:11:12
http://pqasb.pqarchiver.com/chicagotribune/access/24835384.html?dids=24835384...

Eight elderly Canadians who were victims of CIA-funded brainwashing experiments in the 1950s reached a tentative out-of-court settlement Tuesday in their multimillion-dollar damage suit against the U.S. spy agency. The Canadian plaintiffs, who say they suffered permanent mental and physical damage as a result of the bizarre experiments performed on them at a Montreal psychiatric hospital, will divide a $750,000 payment among them, according to their attorney, James Turner. The Canadians, all patients of the late Dr. Ewen Cameron at Montreal's Allan Memorial Institute in the late 1950s, were injected with repeated doses of mind-altering LSD, deprived of sleep, subjected to massive electroshock treatments and forced to listen to thousands of repetitions of taped messages taken from the most sensitive moments of their therapy sessions.

Note: Dr. Cameron was once President of the American and World Psychiatric Associations. For more on the severe abuses of doctors in serving the CIA's mind control programs, click here. For lots more reliable, verifiable information on CIA mind control experiments and programs, click here. The link above provides this abstract of the complete article, which can be accessed by payment of a small fee.


Pope Urges Forming New World Economic Order to Work for the ‘Common Good’
2009-07-08, New York Times
Posted: 2009-07-26 22:32:30
http://www.nytimes.com/2009/07/08/world/europe/08pope.html?partner=rss&emc=rs...

Pope Benedict XVI [has] called for a radical rethinking of the global economy, criticizing a growing divide between rich and poor and urging the establishment of a “true world political authority” to oversee the economy and work for the “common good.” He criticized the current economic system, “where the pernicious effects of sin are evident,” and urged financiers in particular to “rediscover the genuinely ethical foundation of their activity.” He also called for “greater social responsibility” on the part of business. “Once profit becomes the exclusive goal, if it is produced by improper means and without the common good as its ultimate end, it risks destroying wealth and creating poverty,” Benedict wrote in his new encyclical, which the Vatican released on [July 7]. More than two years in the making, “Caritas in Veritate,” or “Charity in Truth,” is Benedict’s third encyclical since he became pope in 2005. Filled with terms like “globalization,” “market economy,” “outsourcing,” “labor unions” and “alternative energy,” it is not surprising that the Italian media reported that the Vatican was having difficulty translating the 144-page document into Latin. In many ways, the document is a puzzling cross between an anti-globalization tract and a government white paper, another signal that the Vatican does not comfortably fit into traditional political categories of right and left. Benedict also called for a reform of the United Nations so there could be a unified “global political body” that allowed the less powerful of the earth to have a voice, and he called on rich nations to help less fortunate ones.


Claims of 9/11 conspiracy have suspect running scared
2007-05-25, Rocky Mountain News (One of Denver's two leading newspapers)
Posted: 2009-06-29 18:08:30
http://www.rockymountainnews.com/drmn/local/article/0,1299,DRMN_15_5555425,00...

A former Federal Emergency Management Agency videographer accused of killing his wife in Denver is seeking political asylum in Argentina, claiming the U.S. government wants him silenced for what he saw in the smoldering ruins of the Twin Towers after 9/11. Kurt Sonnenfeld's efforts to avoid extradition have gained interest from human rights organizations in South America and broad attention from conspiracy theorists on the Internet. Sonnenfeld, 44, is charged with first-degree murder in the New Year's Day 2002 shooting death of his 36-year-old wife, Nancy. Sonnenfeld is quoted by the Argentine newspaper el Pais as saying, "I realized that they were after something else: the tapes of Ground Zero in my possession." Sonnenfeld said he was arrested by Interpol agents on the new Denver charges a week after delivering a demo video of 9/11 footage to a TV producer in Argentina. "I find that extremely coincidental," he said. In other interviews with Argentine media, Sonnenfeld is quoted as saying, "What I saw (at 9/11) leads me to the terrible conclusion that there was foreknowledge of what was going to happen — the precautions that were taken to save certain things that the authorities there considered irreplaceable or invaluable. For example, certain things were missing that could only have been removed with a truck. Yet after the first plane hit one of the towers, everything in Manhattan collapsed and no one could have gotten near the towers to do that." Sonnenfeld is quoted as saying documentation was removed from U.S. intelligence agencies in the World Trade Center, including the CIA, prior to the attacks.

Note: To read a more recent, powerful Voltaire Network interview with Kurt Sonnenfeld, click here. The truth is coming out more all the time!


Inventory Uncovers 9,200 More Pathogens
2009-06-18, Washington Post
Posted: 2009-06-23 13:45:58
http://www.washingtonpost.com/wp-dyn/content/article/2009/06/17/AR20090617032...

An inventory of potentially deadly pathogens at Fort Detrick's infectious disease laboratory found more than 9,000 vials that had not been accounted for, Army officials said yesterday, raising concerns that officials wouldn't know whether dangerous toxins were missing. After four months of searching about 335 freezers and refrigerators at the U.S. Army Medical Research Institute of Infectious Diseases in Frederick, investigators found 9,220 samples that hadn't been included in a database of about 66,000 items listed as of February, said Col. Mark Kortepeter, the institute's deputy commander. The vials contained some dangerous pathogens, among them the Ebola virus, anthrax bacteria and botulinum toxin, and less lethal agents such as Venezuelan equine encephalitis virus and the bacterium that causes tularemia. Most of them, forgotten inside freezer drawers, hadn't been used in years or even decades. Officials said some serum samples from hemorrhagic fever patients dated to the Korean War. The overstock and the previous inaccuracy of the database raised the possibility that someone could have taken a sample outside the lab with no way for officials to know something was missing. The institute has been under pressure to tighten security in the wake of the 2001 anthrax attacks, which killed five people and sickened 17. FBI investigators say they think the anthrax strain used in the attacks originated at the Army lab, and its prime suspect, Bruce E. Ivins, researched anthrax there. Ivins committed suicide last year during an investigation into his activities.

Note: Fort Detrick is the home of the government lab which is suspected to be involved with the creation of many previously unknown lethal viruses and germs. For lots more, see the excellent work of Dr. Leonard Horowitz at this link and this one.


Swine flu shots may go to kids first, Sebelius says
2009-06-16, USA Today/Associated Press
Posted: 2009-06-23 13:39:52
http://www.usatoday.com/news/health/2009-06-16-swine-flu-vaccine_N.htm

Schoolchildren could be first in line for swine flu vaccine this fall — and schools are being put on notice that they might even be turned into shot clinics. Health and Human Services Secretary Kathleen Sebelius said Tuesday she is urging school superintendents around the country to spend the summer preparing for that possibility, if the government goes ahead with mass vaccinations. "If you think about vaccinating kids, schools are the logical place," Sebelius told The Associated Press. No decision has been made yet on whether and how to vaccinate millions of Americans against the new flu strain that the World Health Organization last week formally dubbed a pandemic, meaning it now is circulating the globe unchecked. But the U.S. is pouring money into development of a vaccine in anticipation of giving at least some people the shots. While swine flu doesn't yet seem any more lethal than the regular flu that each winter kills 36,000 people in the U.S. alone, scientists fear it may morph into a more dangerous type. Even in its current form, the WHO says about half of the more than 160 people worldwide killed by swine flu so far were previously young and healthy. If that trend continues, "the target may be school-age children as a first priority" for vaccination, Sebelius said Tuesday. "That's being watched carefully." The last mass vaccination against a different swine flu, in the U.S. in 1976, was marred by reports of a paralyzing side effect — for a feared outbreak that never happened. The secretary said: "The worst of all worlds is to have the vaccine cause more damage than the flu potential."

Note: This article admits "swine flu doesn't yet seem any more lethal than the regular flu that each winter kills 36,000 people in the U.S. alone." Be very cautious around any vaccination campaign. Vaccines are extremely poorly regulated and known to fill the wallets of rich politicians invested in them. For lots more reliable, verifiable information on this, click here.


Apocalypse now? 30 days when the world didn't end
2008-09-09, Times of London (One of the U.K.'s leading newspapers)
Posted: 2009-06-14 14:17:26
http://www.timesonline.co.uk/tol/comment/faith/article4717864.ece

The beginning of the first serious experiments using CERN’s Large Hadron Collider this week has given rise to a welter of fanciful scare stories about the obliteration of the Earth by a pocket black hole or a cascade reaction of exotic particles. Similar predictions have been made around the launch of several other particle physics experiments and even the first atomic weapons tests. Predictions of the world’s end are nothing new though. We’ve picked out 30 of the most memorable apocalypses that never, for one reason or another, quite happened. 1: 2,800BC: The oldest surviving prediction of the world’s imminent demise was found inscribed upon an Assyrian clay tablet which stated: "Our earth is degenerate in these latter days. There are signs that the world is speedily coming to an end. Bribery and corruption are common." 4: Mar 25, 970 AD. The Lotharingian computists believed they had found evidence in the Bible that a conjunction of certain feast days prefigured the end times. They were just one of a wide scattering of millennial cults springing up in advance of that first Millennium. The millennial panic endured for at least 30 years after the fateful date had come and gone, with some adjustment made to allow 1,000 years after the crucifixion, rather than the nativity. 8: 1648: Having made close study of the kabbalah, theTurkish rabbi Sabbatai Zevi predicted that the Messiah would make a miraculous return in 1648, and that his name would be Sabbatai Zevi. 9: 1666: A year packed with apocalyptic portent. With a date containing the figures commonly accepted as the biblical Number of the Beast and following a protracted period of plague in England, it was little surprise that many should believe the Great Fire of London to be a herald of the Last Days.


Pentagon Plans New Arm to Wage Cyberspace Wars
2009-05-29, New York Times
Posted: 2009-05-31 18:17:32
http://www.nytimes.com/2009/05/29/us/politics/29cyber.html

The Pentagon plans to create a new military command for cyberspace ... stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare. White House officials say Mr. Obama has not yet been formally presented with the Pentagon plan. But he is expected to sign a classified order in coming weeks that will create the military cybercommand, officials said. It is a recognition that the United States already has a growing number of computer weapons in its arsenal and must prepare strategies for their use — as a deterrent or alongside conventional weapons — in a wide variety of possible future conflicts. [A] main dispute has been over whether the Pentagon or the National Security Agency should take the lead in preparing for and fighting cyberbattles. Under one proposal still being debated, parts of the N.S.A. would be integrated into the military command so they could operate jointly. A classified set of presidential directives is expected to lay out the military’s new responsibilities and how it coordinates its mission with that of the N.S.A., where most of the expertise on digital warfare resides today. The decision to create a cybercommand is a major step beyond the actions taken by the Bush administration, which authorized several computer-based attacks but never resolved the question of how the government would prepare for a new era of warfare fought over digital networks. Officials declined to describe potential offensive operations, but said they now viewed cyberspace as comparable to more traditional battlefields.

Note: Combine this with the BBC's revealing article on US plans to fight the Internet, and there is reason for concern. For lots more on new developments in modern war planning, click here.


Four states adopt 'no-smiles' policy for driver's licenses
2009-05-25, USA Today
Posted: 2009-05-31 18:09:42
http://www.usatoday.com/news/nation/2009-05-25-licenses_N.htm

Stopping driver's license fraud is no laughing matter: Four states are ordering people to wipe the grins off their faces in their license photos. "Neutral facial expressions" are required at departments of motor vehicles (DMVs) in Arkansas, Indiana, Nevada and Virginia. That means you can't smile, or smile very much. Other states may follow. The serious poses are urged by DMVs that have installed high-tech software that compares a new license photo with others that have already been shot. When a new photo seems to match an existing one, the software sends alarms that someone may be trying to assume another driver's identity. But there's a wrinkle in the technology: a person's grin. Face-recognition software can fail to match two photos of the same person if facial expressions differ in each photo, says Carnegie Mellon University robotics professor Takeo Kanade. Dull expressions "make the comparison process more accurate," says Karen Chappell, deputy commissioner of the Virginia DMV, whose no-smile policy took effect in March. Arkansas, Indiana and Nevada allow slight smiles. "You just can't grin really large," Arkansas driver services chief Tonie Shields says. A total of 31 states do computerized matching of driver's license photos and three others are considering it, says the American Association of Motor Vehicle Administrators. Most say their software matches faces regardless of expressions. "People can smile here in Pennsylvania," state Transportation Department spokesman Craig Yetter says.

Note: For incisive commentary and a heart-warming video addressing this very topic, click here.


Hospitalization Rates Higher in Kids Who Get Flu Shots
2009-05-19, U.S. News & World Report
Posted: 2009-05-31 18:02:52
http://health.usnews.com/health-news/managing-your-healthcare/research/articl...

Children who get the annual flu vaccine, especially those who have asthma, may be more likely to be hospitalized than children who don't get the shot, a new study shows. But the researcher noted ... "This may not be a reflection of the vaccine but that these patients are the sickest, and their doctors insist they get a vaccination," said study author Dr. Avni Y. Joshi, a fellow at the Mayo Clinic in Rochester, Minn. "I would be very cautious about interpreting this," said Dr. Gurjit Khurana Hershey, director of asthma research and professor of pediatrics at Cincinnati Children's Hospital. "The bottom line is that kids with asthma who get the flu vaccine are probably a different population anyway. They may be the more severely ill children, so it may have very little to do with the vaccine." The study has too many unknowns and covers too wide an age range over too many flu seasons to indicate any change in recommendations, said Dr. Hank Bernstein, a member of the committee on infectious diseases of the American Academy of Pediatrics. The authors looked back at 263 children aged 6 months to 18 years who had visited the Mayo Clinic between 1999 and 2006 with laboratory-confirmed influenza. Children -- including children who had asthma -- who received the annual inactivated flu vaccine were almost three times more likely to be hospitalized than those who were not inoculated.

Note: With hospitalization rates nearly three times that of children who did not get vaccinated, why are these doctors downplaying this study so much? Why the focus on asthma, when the study covered a wide range of children? Why isn't anyone calling for more research on these striking results? For lots of articles raising serious questions about the safety of vaccines, click here.


Billionaire club in bid to curb overpopulation
2009-05-24, Times of London
Posted: 2009-05-31 17:59:27
http://www.timesonline.co.uk/tol/news/world/us_and_americas/article6350303.ece

Some of America’s leading billionaires have met secretly to consider how their wealth could be used to slow the growth of the world’s population. Described as the Good Club by one insider, it included David Rockefeller Jr, the patriarch of America’s wealthiest dynasty, Warren Buffett and George Soros, the financiers, Michael Bloomberg, the mayor of New York, and the media moguls Ted Turner and Oprah Winfrey. They gathered at the home of Sir Paul Nurse, a British Nobel prize biochemist and president of the private Rockefeller University, in Manhattan on May 5. The informal afternoon session was so discreet that some of the billionaires’ aides were told they were at “security briefings”. Stacy Palmer, editor of the Chronicle of Philanthropy, said the summit was unprecedented. “We only learnt about it afterwards, by accident. Normally these people are happy to talk good causes, but this is different – maybe because they don’t want to be seen as a global cabal,” he said. Some details were emerging this weekend, however. Taking their cue from Gates they agreed that overpopulation was a priority. [A] guest said there was “nothing as crude as a vote” but a consensus emerged that they would back a strategy in which population growth would be tackled as a potentially disastrous environmental, social and industrial threat. “This is something so nightmarish that everyone in this group agreed it needs big-brain answers,” said the guest. “They need to be independent of government agencies, which are unable to head off the disaster we all see looming.” Why all the secrecy? “They wanted to speak rich to rich without worrying anything they said would end up in the newspapers, painting them as an alternative world government,” he said.

Note: This very secret private meeting of billionaires planning to "solve" the world's "overpopulation" problem occurred just a few days before the latest Bilderberg meeting. For an ABC article on the same, click here. Is this a more positive twist on the Bilderberg Group of the worlds' power elite, or more of the same?


Review: 'New World Order' on Independent Film Channel
2009-05-26, Los Angeles Times
Posted: 2009-05-31 17:55:19
http://www.latimes.com/entertainment/news/la-et-new-world-order26-2009may26,0...

"New World Order," which premieres today on the Independent Film Channel, is a film about ... volunteers in an "information war" who see ... that 9/11 was an "inside job," that the military-industrial complex killed Kennedy, and that an international "power elite" is plotting to enslave us all, excepting for those it will kill outright. They are hard to pigeonhole politically, these conspiracy adepts, trusting neither the "socialist Democrats" nor the "fascist Republicans" -- Ron Paul seems to be their man, if anyone is -- yet sounding as often like '60s leftist radicals as right-wing militiamen. They take the 1st Amendment as seriously as any card-carrying member of the ACLU, styling themselves muckrakers and speakers of truth to power, often through a bullhorn. The man with the biggest bullhorn is Alex Jones, an Austin, Texas-based syndicated radio host ... and the point through which all the strands connect in this unexpectedly affecting, nonjudgmental documentary by Luke Meyer and Andrew Neel. Much of what Jones and his fellows and followers believe is, in a general way, hardly controversial. But whether 9/11 was a plot to bring on world government, or whether the government you already have has painted a red or blue dot on your mailbox to indicate whether you will be shot immediately or merely be sent to the "FEMA camps" when the American Armageddon arrives, well, that's a pale horse of a different color. (Still, you'll want to check your mailbox now.) "This is more important than how much Britney Spears' hair sold for on EBay, 'Dancing With the Stars' or who's gonna be America's next idol," says one believer. "People think this is a joke. We're not a joke."

Note: The disparaging tone of this review of the documentary is typical of mainstream media treatment of 9/11 truth activity, but it makes clear that the film itself does not share this attitude.


Tamiflu Developer: Swine Flu Could Have Come From Bio-Experiment Lab
2009-05-14, ABC News
Posted: 2009-05-17 12:05:41
http://abcnews.go.com/GMA/SwineFlu/story?id=7584420

An Australian researcher claims the swine flu, which has killed at least 64 people so far, might not be a mutation that occurred naturally but a man-made product of genetic experiments accidently leaked from a laboratory -- a theory the World Health Organization is taking very seriously. Adrian Gibbs, a scientist on the team that was behind the development of Tamiflu, says in a report he is submitting today that swine flu might have been created using eggs to grow viruses and make new vaccines, and could have been accidently leaked to the general public. "It might be some sort of simple error that's not being recognized," Gibbs said on ABC's "Good Morning America." In an interview with Bloomberg Television, Gibbs admitted there are other ways to explain swine flu's origin. "One of the simplest explanations if that it's a laboratory escape, but there are lots of others," he said. Regardless of the validity of Gibb's claims, he and several experts say that just bringing the idea of laboratory security to the public's attention is important. "There are lives at risk," Gibbs said. "The sooner this idea gets out, the better."

Note: What would cause one of the developers of Tamiflu to make such a statement? If you read between the lines, there is much more here than meets the eye. For lots more on this intriguing development, click here.


Method and Apparatus for Tunneling by Melting
1972-09-22, US Patent and Trademark Office
Posted: 2009-05-17 11:21:18
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&...

The invention described herein was made in the course of, or under, a contract with the U. S. ATOMIC ENERGY COMMISSION. It relates ... to a method and apparatus for drilling, tunneling and shaft-sinking in rock with particular advantage at hitherto inaccessible depths. The present invention uses the basic apparatus and method disclosed in U.S. Pat. No. 3,357,505 and in Los Alamos Scientific Laboratory of the University of California Report No. LA-3243 (1965) entitled "Rock Melting as a Drilling Technique." In the existing rock melting devices of the prior art, a major difficulty which limited performance was that of delivering a sufficiently large heat flux to the melting face of the drill or penetrator. The development of the heat pipe alleviates this problem in that the use of heat pipes enables the transfer of heat energy from a compact heat source to the extended melting surface of the penetrator at rates high enough to maintain the surface above the melting temperature of the rock. The extrapolation of a mechanism useful for forming large holes in the earth in accordance with the present invention uses the combination of a refractory rock-melting tool, an in situ heat source preferably a small nuclear reactor and an exceedingly efficient heat transfer mechanism such as a system of heat pipes to convey heat from the source to the walls of the drilling tool.

Note: This patent shows that government scientists at Los Alamos were using a "small nuclear reactor" to drill underground tunnels. Several of the inventors listed on the patent worked at Los Alamos National Laboratory, including: McInteer, Berthus B.; Mills, Robert L.; Potter, Robert M.; Robinson, Eugene S.; Rowley, John C.; and Smith, Morton C.. For photos and more fascinating information on this most intriguing patent, click here.


Control of Cybersecurity Becomes Divisive Issue
2009-04-17, New York Times
Posted: 2009-04-25 08:45:13
http://www.nytimes.com/2009/04/17/us/politics/17cyber.html?partner=rss&emc=rs...

The National Security Agency has been campaigning to lead the government’s rapidly growing cybersecurity programs, raising privacy and civil liberties concerns among some officials who fear that the move could give the spy agency too much control over government computer networks. The security agency’s interest in taking over the dominant role has met resistance, including the resignation of the Homeland Security Department official who was until last month in charge of coordinating cybersecurity efforts throughout the government. Rod Beckstrom, who resigned in March as director of the National Cyber Security Center at the Homeland Security Department, said ... that he feared that the N.S.A.’s push for a greater role in guarding the government’s computer systems could give it the power to collect and analyze every e-mail message, text message and Google search conducted by every employee in every federal agency. Mr. Beckstrom said he believed that an intelligence service that is supposed to focus on foreign targets should not be given so much control over the flow of information within the United States government. To detect threats against the computer infrastructure — including hackers, viruses and intrusions by foreign agents and terrorists — cybersecurity guardians must have virtually unlimited access to networks. Mr. Beckstrom argues that those responsibilities should be divided among agencies. “I have very serious concerns about the concentration of too much power in one agency,” he said. “Power over information is so important, and it is so difficult to monitor, that we need to have checks and balances.”

Note: For further disturbing reports from reliable sources on government efforts to establish total surveillance systems, click here.


Warning over 'surveillance state'
2009-02-06, BBC News
Posted: 2009-02-15 09:45:52
http://news.bbc.co.uk/2/hi/uk_news/politics/7872425.stm

Electronic surveillance and collection of personal data are "pervasive" in British society and threaten to undermine democracy, peers [in the House of Lords] have warned. CCTV cameras and the DNA database were two examples of threats to privacy, the Lords constitution committee said. It called for compensation for people subject to illegal surveillance. Civil liberties campaigners have warned about the risks of a "surveillance society" in which the state acquires ever-greater powers to track people's movements and retain personal data. In its report, the Lords constitution committee said growth in surveillance by both the state and the private sector risked threatening people's right to privacy, which it said was "an essential pre-requisite to the exercise of individual freedom". People were often unaware of the scale of personal information held and exchanged by public bodies, it said. "There can be no justification for this gradual but incessant creep towards every detail about us being recorded and pored over by the state," committee chairman and Tory peer Lord Goodlad said. "The huge rise in surveillance and data collection by the state and other organisations risks undermining the long-standing tradition of privacy and individual freedom which are vital for democracy," Lord Goodlad added. Human rights campaigners Liberty welcomed the report.

Note: For key reports from major media sources on growing threats to privacy from governments and corporations, click here.


Intelligence Agencies' Databases Set to Be Linked
2009-01-22, Wall Street Journal
Posted: 2009-02-06 09:13:56
http://online.wsj.com/article/SB123258232280204323.html

U.S. spy agencies' sensitive data should soon be linked by Google-like search systems. Director of National Intelligence Mike McConnell has launched a sweeping technology program to knit together the thousands of databases across all 16 spy agencies. After years of bureaucratic snafus, intelligence analysts will be able to search through secret intelligence files the same way they can search public data on the Internet. Linking up the 16 agencies is the challenge at the heart of the job of director of national intelligence, created after 9/11. The new information program also is designed to include Facebook-like social-networking programs and classified news feeds. It includes enhanced security measures to ensure that only appropriately cleared people can access the network. The price tag is expected to be in the billions of dollars. The impact for analysts, Mr. McConnell says, "will be staggering." Not only will analysts have vastly more data to examine, potentially inaccurate intelligence will stand out more clearly, he said. Today, an analyst's query might scan only 5% of the total intelligence data in the U.S. government, said a senior intelligence official. Even when analysts find documents, they sometimes can't read them without protracted negotiations to gain access. Under the new system, an analyst would likely search about 95% of the data, the official said.

Note: For key reports from reliable sources on the hidden realities of the War on Terror, click here.


Let's face it, soon Big Brother will have no trouble recognising you
2009-01-13, Times of London
Posted: 2009-01-24 10:01:14
http://www.timesonline.co.uk/tol/comment/columnists/guest_contributors/articl...

This is the year when automated face-recognition finally goes mainstream, and it's about time we considered its social and political implications. Researchers are developing sharply accurate scanners that monitor faces in 3D and software that analyses skin texture to turn tiny wrinkles, blemishes and spots into a numerical formula. The strongest face-recognition algorithms are now considered more accurate than most humans - and already the Home Office and the Association of Chief Police Officers have held discussions about the possibility of linking such systems with automatic car-numberplate recognition and public-transport databases. Join everything together via the internet, and voilŕ - the nation's population, down to the individual Times reader, can be conveniently and automatically monitored in real time. So let's understand this: governments and police are planning to implement increasingly accurate surveillance technologies that are unnoticeable, cheap, pervasive, ubiquitous, and searchable in real time. And private businesses, from bars to workplaces, will also operate such systems, whose data trail may well be sold on or leaked to third parties - let's say, insurance companies that have an interest in knowing about your unhealthy lifestyle, or your ex-spouse who wants evidence that you can afford higher maintenance payments.

Note: For disturbing reports on threats to privacy from major media sources, click here.


Foundations are in place for martial law in the US
2002-07-21, Sydney Morning Herald
Posted: 2009-01-16 08:42:34
http://www.smh.com.au/articles/2002/07/27/1027497418339.html

Recent pronouncements from the Bush Administration and national security initiatives put in place in the Reagan era could see internment camps and martial law in the United States. When president Ronald Reagan was considering invading Nicaragua he issued a series of executive orders that provided the Federal Emergency Management Agency (FEMA) with broad powers in the event of a "crisis" such as "violent and widespread internal dissent or national opposition against a US military invasion abroad". On July 20 the Detroit Free Press ran a story entitled "Arabs in US could be held, official warns". The story referred to a member of the US Civil Rights Commission who foresaw the possibility of internment camps for Arab Americans. FEMA has practised for such an occasion. FEMA, whose main role is disaster response, is also responsible for handling US domestic unrest. From 1982-84 Colonel Oliver North assisted FEMA in drafting its civil defence preparations. They included executive orders providing for suspension of the constitution, the imposition of martial law, internment camps, and the turning over of government to the president and FEMA. A Miami Herald article on July 5, 1987, reported that the former FEMA director Louis Guiffrida's deputy, John Brinkerhoff, handled the martial law portion of the planning. Today Mr Brinkerhoff is with the highly influential Anser Institute for Homeland Security.

Note: Most of these provisions are still in place today. Isn't it time for a change?


Bailiffs get power to use force on debtors
2008-12-21, Times of London
Posted: 2009-01-02 09:16:08
http://www.timesonline.co.uk/tol/news/politics/article5375668.ece

The [U.K.] government has been accused of trampling on individual liberties by proposing wide-ranging new powers for bailiffs to break into homes and to use “reasonable force” against householders who try to protect their valuables. Under the regulations, bailiffs for private firms would for the first time be given permission to restrain or pin down householders. They would also be able to force their way into homes to seize property to pay off debts, such as unpaid credit card bills and loans. “These laws strip away tried and tested protections that make a person’s home his castle, and which have stood for centuries,” said Paul Nicolson, chairman of the Zacchaeus 2000 Trust, a London-based welfare charity. “They could clearly lead to violent confrontations and undermine fundamental liberties.” Bailiffs have for hundreds of years been denied powers to break into homes for civil debt or to use force against debtors, except in self-defence. Ministers have now proposed bailiffs be given powers to physically remove debtors who try to defend their property, for example by draping themselves over a car or blocking the door of their home. Details of the new guidelines were obtained under freedom of information laws. Reasonable grounds for breaking down the door include the “movement of a curtain”, a radio being heard or a figure being spotted inside which “may be the offender”. In one case, an 89-year-old grandmother returned home to find a bailiff sitting in her chair having drawn up a list of her possessions. He was pursuing a parking fine owed by her son, who did not even live at the address.

Note: For many disturbing reports from reliable sources on threats to civil liberties, click here.


New York City Mayor Hylan Foresees A Revolt
1922-12-10, New York Times
Posted: 2009-01-02 09:03:53
http://query.nytimes.com/mem/archive-free/pdf?res=9F07EED6153AEF33A25753C1A96...

One of the most astounding facts about our American life is that the wealth and property of the country and the control of the machinery of government are in the hands of less than 2 per cent of the inhabitants. A small group of excessively wealthy individuals, members of the Republican and Democratic Parties alike, have, through the exercise of powerful, sinister and, too often, unlawful influence, usurped the government and seized public property on such a wholesale scale that they have become ... virtual dictators. A small group of international bankers and money lenders, public utility exploiters and tariff beneficiaries have actually dictated nominations for offices up to the Presidency. They have placed the slickest, cleverest, and most cunning manipulators in official positions, even in the minor posts, where they could be of service when called upon by the invisible power which, utterly devoid of all humanity, seeks but to wallow in riches. So absolute is the power of America's secret dynastic rulers that they have, without hindrance, written the very platforms and pledges of political parties, and because of substantial contributions to campaign chests they have arrogated to themselves the right to dictate the governmental policies of the administration elected to office regardless of party. Woe to the public officials who dare to resent their dictatorship! If there be such public officials who will not submit to their imperious dictation, then the flood-gates of lying press propaganda are released, sweeping the unhappy public servant to an earthly as well as political grave, or compelling him to compromise with his conscience and become their subservient tool to the end of his term.

Note: John F. Hylan was Mayor of New York City from 1918 to 1925. New York has long been the US banking and financial headquarters, with the mayor's office about a half-mile from the New York Stock Exchange. The rest of this important article can be accessed at this link as well as the one above. It is interesting to note that this article was published not long after the Federal Reserve was created, turning over huge amounts of control of the U.S. economy to the most powerful bankers in the country. For more on this, click here.


U.S. May Ease Police Spy Rules
2008-08-16, Washington Post
Posted: 2008-08-23 08:12:19
http://www.washingtonpost.com/wp-dyn/content/article/2008/08/15/AR20080815034...

The Justice Department has proposed a new domestic spying measure that would make it easier for state and local police to collect intelligence about Americans, share the sensitive data with federal agencies and retain it for at least 10 years. Law enforcement agencies would be allowed to target groups as well as individuals, and to launch a criminal intelligence investigation based on the suspicion that a target is engaged in terrorism or providing material support to terrorists. They also could share results with a constellation of federal law enforcement and intelligence agencies, and others in many cases. Michael German, policy counsel for the American Civil Liberties Union, said the proposed rule may [permit] police to collect intelligence even when no underlying crime is suspected. German, an FBI agent for 16 years, said easing established limits on intelligence-gathering would lead to abuses against peaceful political dissenters. He pointed to reports in the past six years that undercover New York police officers infiltrated protest groups before the 2004 Republican National Convention; that California state agents eavesdropped on peace, animal rights and labor activists; and that Denver police spied on Amnesty International and others before being discovered. "If police officers no longer see themselves as engaged in protecting their communities from criminals and instead as domestic intelligence agents working on behalf of the CIA, they will be encouraged to collect more information," German said. "It turns police officers into spies on behalf of the federal government."

Note: For many disturbing reports on increasing threats to civil liberties from reliable sources, click here.


Police Turn to Secret Weapon: GPS Device
2008-08-13, Washington Post
Posted: 2008-08-23 07:58:53
http://www.washingtonpost.com/wp-dyn/content/article/2008/08/12/AR20080812032...

Across the country, police are using GPS devices to snare [criminal suspects], often without a warrant or court order. Privacy advocates said tracking suspects electronically constitutes illegal search and seizure, violating Fourth Amendment rights of protection against unreasonable searches and seizures, and is another step toward George Orwell's Big Brother society. With the ... ever-declining cost of the technology, many analysts believe that police will increasingly rely on GPS ... and that the public will hear little about it. "I've seen them in cases from New York City to small towns -- whoever can afford to get the equipment and plant it on a car," said John Wesley Hall, president of the National Association of Criminal Defense Lawyers. "And of course, it's easy to do. You can sneak up on a car and plant it at any time." Details on how police use GPS usually become public when the use of the device is challenged in court. Leibig said GPS should be held to a different standard because it provides greater detail. "While it may be true that police can conduct surveillance of people on a public street without violating their rights, tracking a person everywhere they go and keeping a computer record of it for days and days without that person knowing is a completely different type of intrusion," he said. Barry Steinhardt, director of the American Civil Liberties Union's technology and liberty program, considers GPS monitoring, along with license plate readers, toll transponders and video cameras with face-recognition technology, part of the same trend toward "an always-on, surveillance society."

Note: For lots more on threats to privacy from major media sources, click here.


Travelers' Laptops May Be Detained At Border: No Suspicion Required
2008-08-01, Washington Post
Posted: 2008-08-08 08:04:18
http://www.washingtonpost.com/wp-dyn/content/article/2008/08/01/AR20080801030...

Federal agents may take a traveler's laptop computer or other electronic device to an off-site location for an unspecified period of time without any suspicion of wrongdoing, as part of border search policies the Department of Homeland Security recently disclosed. Also, officials may share copies of the laptop's contents with other agencies and private entities for language translation, data decryption or other reasons, according to the policies, dated July 16 and issued by two DHS agencies, U.S. Customs and Border Protection and U.S. Immigration and Customs Enforcement. "The policies . . . are truly alarming," said Sen. Russell Feingold (D-Wis.), who is probing the government's border search practices. He said he intends to introduce legislation soon that would require reasonable suspicion for border searches, as well as prohibit profiling on race, religion or national origin. DHS officials said the newly disclosed policies ... apply to anyone entering the country, including U.S. citizens. Civil liberties and business travel groups have pressed the government to disclose its procedures as an increasing number of international travelers have reported that their laptops, cellphones and other digital devices had been taken -- for months, in at least one case -- and their contents examined. The policies cover "any device capable of storing information in digital or analog form," including hard drives, flash drives, cellphones, iPods, pagers, beepers, and video and audio tapes. They also cover "all papers and other written documentation," including books, pamphlets and "written materials commonly referred to as 'pocket trash' or 'pocket litter.' "

Note: For many reports from reliable, verifiable sources on threats to privacy, click here.


Civil liberties group criticizes new FBI authority
2008-07-02, Boston Globe/Associated Press
Posted: 2008-07-10 11:00:18
http://www.boston.com/news/nation/washington/articles/2008/07/02/civil_libert...

Nearly 40 years ago, the FBI was roundly criticized for investigating Americans without evidence [that] they had broken any laws. Now, critics fear the FBI may be gearing up to do it again. Tentative Justice Department guidelines, to be released later this summer, would let agents investigate people whose backgrounds -- and potentially their race or ethnicity -- match the traits of terrorists. Such profiling ... echoes the FBI's now-defunct COINTELPRO, an operation under Director J. Edgar Hoover in the 1950s and 1960s to monitor and disrupt groups with communist and socialist ties. Before it was shut down in 1971, the domestic spying operation -- formally known as Counterintelligence Programs -- had expanded to include civil rights groups, anti-war activists, ... state legislators and journalists. Among the FBI's targets were Martin Luther King Jr., Malcolm X, and John Lennon, along with members of black [political] groups ... and student protesters. The new proposal to allow investigations of Americans with no evidence of wrongdoing is "COINTELPRO for the 21st century," said Barry Steinhardt of the American Civil Liberties Union. "But this is much more insidious because it could involve more people. In the days of COINTELPRO, they were watching only a few people. Now they could be watching everyone."

Note: For many disturbing reports on threats to civil liberties, click here.


Microchips Everywhere: a Future Vision
2008-01-29, Seattle Times/Associated Press
Posted: 2008-07-03 10:37:34
http://seattletimes.nwsource.com/html/businesstechnology/2004151388_apchippin...

Here's a vision of the not-so-distant future: Microchips with antennas will be embedded in virtually everything you buy, wear, drive and read, allowing retailers and law enforcement to track consumer items -- and, by extension, consumers -- wherever they go, from a distance. A seamless, global network of electronic "sniffers" will scan radio tags in myriad public settings, identifying people and their tastes instantly so that customized ads, "live spam," may be beamed at them. In "Smart Homes," sensors built into walls, floors and appliances will inventory possessions, record eating habits, monitor medicine cabinets -- all the while, silently reporting data to marketers eager for a peek into the occupants' private lives. Science fiction? In truth, much of the radio frequency identification [RFID] technology that enables objects and people to be tagged and tracked wirelessly already exists -- and new and potentially intrusive uses of it are being patented, perfected and deployed. Some of the world's largest corporations are vested in the success of RFID technology, which couples highly miniaturized computers with radio antennas to broadcast information about sales and buyers to company databases. Already, microchips are turning up in some computer printers, car keys and tires, on shampoo bottles and department store clothing tags. They're also in library books and "contactless" payment cards. With tags in so many objects, relaying information to databases that can be linked to credit and bank cards, almost no aspect of life may soon be safe from the prying eyes of corporations and governments, says Mark Rasch, former head of the computer-crime unit of the U.S. Justice Department.

Note: For lots more on microchip implants, click here.


The Business of Intelligence Gathering
2008-06-15, New York Times
Posted: 2008-06-18 11:01:37
http://www.nytimes.com/2008/06/15/business/15shelf.html?partner=rssuserland&e...

America is ruled by an “intelligence-industrial complex” whose allegiance is not to the taxpaying public but to a cabal of private-sector contractors. That is the central thesis of Spies for Hire: The Secret World of Intelligence Outsourcing by Tim Shorrock, ... an investigative journalist. His book [provides a] disturbing overview of the intelligence community, also known as “the I.C.” Mr. Shorrock says our government is outsourcing 70 percent of its intelligence budget, or more than $42 billion a year, to a “secret army” of corporate vendors. Because of accelerated privatization efforts after 9/11, these companies are participating in covert operations and intelligence-gathering activities that were considered “inherently governmental” functions reserved for agencies like the Central Intelligence Agency, he says. Some of the book’s most intriguing assertions concern the permeating influence of the consulting firm Booz Allen Hamilton. In 2006, Mr. Shorrock reports, Booz Allen amassed $3.7 billion in revenue, much of which came from classified government contracts exempt from public oversight. Among its more than 18,000 employees are R. James Woolsey, the former C.I.A. director, and Joan Dempsey, a former longtime United States intelligence official who declared in a 2004 speech, “I like to refer to Booz Allen as the shadow I.C.” The “revolving door” between Booz Allen and the I.C. is personified by Mike McConnell, who joined the firm after serving as head of the National Security Agency under President Bill Clinton, only to return as director of national intelligence under President Bush.

Note: For revealing reports on government corruption from reliable sources, click here.


Online warfare research outlined
2008-05-15, Washington Times
Posted: 2008-05-22 13:49:42
http://washingtontimes.com/apps/pbcs.dll/article?AID=/20080515/FOREIGN/586297...

Procurement documents released by the U.S. Air Force give a rare glimpse into Pentagon plans for developing an offensive cyber-war capacity that can infiltrate, steal data from and, if necessary, take down enemy information-technology networks. The Broad Area Announcement, posted ... by the Air Force Research Laboratory's Information Directorate, outlines a two-year, $11 million effort to develop capabilities to "access ... any remotely located open or closed computer information systems," lurk on them "completely undetected," "stealthily exfiltrate information" from them and ultimately "be able to affect computer information systems through Deceive, Deny, Disrupt, Degrade, Destroy (D5) effects." "Of interest," the announcement says, "are any and all techniques to enable user and/or root-level access to both fixed [and] mobile computing platforms ... [and] methodologies to enable access to any and all operating systems, patch levels, applications and hardware." The announcement is the latest stage in the Air Force's effort to develop a cyber-war capability and establish itself as the service that delivers U.S. military power in cyberspace. Last year, the Air Force announced it was setting up a Cyberspace Command ... and was developing military doctrine for the prosecution of cyber-war operations. The developments highlight the murky legal territory on which the cyber-wars of the future will be fought. More important, because of the difficulties in identifying attackers and immediately quantifying damage from a cyber-attack, it can be hard to determine when such attacks constitute an act of war as opposed to crime or even vandalism.


Administration Set to Use New Spy Program in U.S.
2008-04-12, Washington Post
Posted: 2008-04-17 08:10:08
http://www.washingtonpost.com/wp-dyn/content/article/2008/04/11/AR20080411036...

The Bush administration said yesterday that it plans to start using the nation's most advanced spy technology for domestic purposes soon, rebuffing challenges by House Democrats over the idea's legal authority. Homeland Security Secretary Michael Chertoff said his department will activate his department's new domestic satellite surveillance office in stages, starting as soon as possible. Sophisticated overhead sensor data will be used for law enforcement once privacy and civil rights concerns are resolved, he said. His statements marked a fresh determination to operate the department's new National Applications Office. But Congress delayed launch of the new office last October. Critics cited its potential to expand the role of military assets in domestic law enforcement, to turn new or as-yet-undeveloped technologies against Americans without adequate public debate, and to divert the existing civilian and scientific focus of some satellite work to security uses. Democrats say Chertoff has not spelled out what federal laws govern the NAO, whose funding and size are classified. Congress barred Homeland Security from funding the office until its investigators could review the office's operating procedures and safeguards. The department submitted answers on Thursday, but some lawmakers promptly said the response was inadequate. [Rep. Bennie G. Thompson (D-Miss.), chairman of the House Homeland Security Committee] said, "We still don't know whether the NAO will pass constitutional muster since no legal framework has been provided."

Note: For many more revealing stories on threats to civil liberties, click here.


Google has lots to do with intelligence
2008-03-30, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2008-04-17 07:57:15
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/03/29/BUQLUAP8L.DTL

When the nation's intelligence agencies wanted a computer network to better share information ... they turned to a big name in the technology industry to supply some of the equipment: Google Inc. The Mountain View company sold the agencies servers for searching documents. Many of the contracts are for search appliances - servers for storing and searching internal documents. Agencies can use the devices to create their own mini-Googles on intranets made up entirely of government data. Additionally, Google has had success licensing a souped-up version of its aerial mapping service, Google Earth. Spy agencies are using Google equipment as the backbone of Intellipedia, a network aimed at helping agents share intelligence. [The system] is maintained by the director of national intelligence and is accessible only to the CIA, FBI, National Security Agency and an alphabet soup of other intelligence agencies and offices. Google supplies the computer servers that support the network, as well as the search software that allows users to sift through messages and data. Because of the complexities of doing business with the government, Google uses resellers to process orders on its behalf. Google takes care of the sales, marketing and management of the accounts. Google is one of many technology vendors vying for government contracts. On occasion, Google is the target of conspiracy theories from bloggers who say it is working with spy agencies more closely than simply selling search equipment.


National Dragnet Is a Click Away
2008-03-06, Washington Post
Posted: 2008-03-11 08:44:31
http://www.washingtonpost.com/wp-dyn/content/article/2008/03/05/AR20080305036...

Several thousand law enforcement agencies are creating the foundation of a domestic intelligence system through computer networks that analyze vast amounts of police information. As federal authorities struggled to meet information-sharing mandates after the Sept. 11, 2001 terrorist attacks, police agencies from Alaska and California to the Washington region poured millions of ... records into shared digital repositories called data warehouses, giving investigators and analysts new power to discern links among people, patterns of behavior and other hidden clues. Those network efforts will begin expanding further this month, as some local and state agencies connect to a fledgling Justice Department system called the National Data Exchange, or N-DEx. The expanding police systems illustrate the prominent roles that private companies play in homeland security and counterterrorism efforts. They also underscore how the use of new data -- and data surveillance -- is evolving faster than the public's understanding or the laws intended to check government power and protect civil liberties. Three decades ago, Congress imposed limits on domestic intelligence activity after revelations that the FBI, Army, local police and others had misused their authority for years to build troves of personal dossiers and monitor political activists and other law-abiding Americans. Since those reforms, police and federal authorities have observed a wall between law enforcement information-gathering, relating to crimes and prosecutions, and more open-ended intelligence that relates to national security and [politics]. That wall is fast eroding following the passage of laws expanding surveillance authorities, the push for information-sharing networks, and the expectation that local and state police will play larger roles.

Note: For many revealing reports from reliable sources of serious threats to civil liberties, click here.


Spies' Battleground Turns Virtual
2008-02-06, Washington Post
Posted: 2008-02-17 12:17:30
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/05/AR20080205031...

U.S. intelligence officials are [now claiming] that popular Internet services that enable computer users to adopt cartoon-like personas in three-dimensional online spaces also are creating security vulnerabilities by opening novel ways ... to move money, organize and conduct corporate espionage. Over the last few years, "virtual worlds" such as Second Life and other role-playing games have become home to millions of computer-generated personas known as avatars. By directing their avatars, people can take on alternate personalities, socialize, explore and earn and spend money across uncharted online landscapes. Nascent economies have sprung to life in these 3-D worlds, complete with currency, banks and shopping malls. Corporations and government agencies have opened animated virtual offices, and a growing number of organizations hold meetings where avatars gather and converse in newly minted conference centers. Intelligence officials ... say they're convinced that the qualities that many computer users find so attractive about virtual worlds -- including anonymity, global access and the expanded ability to make financial transfers outside normal channels -- have turned them into seedbeds for transnational threats. The government's growing concern seems likely to make virtual worlds the next battlefield in the struggle over the proper limits on the government's quest to [expand] data collection and analysis and the surveillance of commercial computer systems. Virtual worlds could also become an actual battlefield. The intelligence community has begun contemplating how to use Second Life and other such communities as platforms for cyber weapons.


Rule by fear or rule by law?
2008-02-04, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2008-02-10 12:36:09
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/02/04/ED5OUPQJ7.DTL

Since 9/11, and seemingly without the notice of most Americans, the federal government has assumed the authority to institute martial law, arrest a wide swath of dissidents (citizen and noncitizen alike), and detain people without legal or constitutional recourse in the event of "an emergency influx of immigrants in the U.S., or to support the rapid development of new programs." Beginning in 1999, the government has entered into a series of single-bid contracts with Halliburton subsidiary Kellogg, Brown and Root (KBR) to build detention camps at undisclosed locations within the United States. The government has also contracted with several companies to build thousands of railcars, some reportedly equipped with shackles, ostensibly to transport detainees. According to diplomat and author Peter Dale Scott, the KBR contract is part of a Homeland Security plan titled ENDGAME, which sets as its goal the removal of "all removable aliens" and "potential terrorists." What kind of "new programs" require the construction and refurbishment of detention facilities in nearly every state of the union with the capacity to house perhaps millions of people? The 2007 National Defense Authorization Act (NDAA) ... gives the executive the power to invoke martial law. The Military Commissions Act of 2006 ... allows for the indefinite imprisonment of anyone who ... speaks out against the government's policies. The law calls for secret trials for citizens and noncitizens alike. What could the government be contemplating that leads it to make contingency plans to detain without recourse millions of its own citizens?

Note: This important warning from former U.S. Congressman Dan Hamburg and Lewis Seiler should be read in its entirety. For more chilling reports on serious threats to our civil liberties, click here.


Clarity Sought on Electronics Searches
2008-02-07, Washington Post
Posted: 2008-02-10 12:33:44
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/06/AR20080206047...

The Electronic Frontier Foundation and Asian Law Caucus, two civil liberties groups in San Francisco, [have filed] a lawsuit to force the government to disclose its policies on border searches, including which rules govern the seizing and copying of the contents of electronic devices. They also want to know the boundaries for asking travelers about their political views, religious practices and other activities potentially protected by the First Amendment. The lawsuit was inspired by two dozen cases, 15 of which involved searches of cellphones, laptops, MP3 players and other electronics. Almost all involved travelers of Muslim, Middle Eastern or South Asian background. "It's one thing to say it's reasonable for government agents to open your luggage," said David D. Cole, a law professor at Georgetown University. "It's another thing to say it's reasonable for them to read your mind and everything you have thought over the last year. What a laptop records is as personal as a diary but much more extensive. It records every Web site you have searched. Every e-mail you have sent. It's as if you're crossing the border with your home in your suitcase." Mark Rasch, a technology security expert with FTI Consulting and a former federal prosecutor, [said] "Your kid can be arrested because they can't prove the songs they downloaded to their iPod were legally downloaded," he said. "Lawyers run the risk of exposing sensitive information about their client. Trade secrets can be exposed to customs agents with no limit on what they can do with it. Journalists can expose sources, all because they have the audacity to cross an invisible line."

Note: For many recent stories on threats to our civil liberties, click here.


Bush Order Expands Network Monitoring
2008-01-26, Washington Post
Posted: 2008-02-03 11:58:32
http://www.washingtonpost.com/wp-dyn/content/article/2008/01/25/AR20080125032...

President Bush signed a directive this month that expands the intelligence community's role in monitoring Internet traffic to protect against a rising number of attacks on federal agencies' computer systems. The directive, whose content is classified, authorizes the intelligence agencies, in particular the National Security Agency, to monitor the computer networks of all federal agencies -- including ones they have not previously monitored. The NSA has particular expertise in monitoring a vast, complex array of communications systems -- traditionally overseas. The prospect of aiming that power at domestic networks is raising concerns, just as the NSA's role in the government's warrantless domestic-surveillance program has been controversial. "Agencies designed to gather intelligence on foreign entities should not be in charge of monitoring our computer systems here at home," said Rep. Bennie Thompson (D-Miss.), chairman of the House Homeland Security Committee. The classified joint directive, signed Jan. 8 and called the National Security Presidential Directive 54/Homeland Security Presidential Directive 23, has not been previously disclosed. Allowing a spy agency to monitor domestic networks is worrisome, said James X. Dempsey, policy director of the Center for Democracy and Technology. "We're concerned that the NSA is claiming such a large role over the security of unclassified systems," he said. "They are a spy agency as well as a communications security agency. They operate in total secrecy. That's not necessary and not the most effective way to protect unclassified systems."

Note: For revealing reports from major media sources on the increasing surveillance of all aspects of society by secret government programs, click here.


Microsoft seeks patent for office 'spy' software
2008-01-16, Times of London
Posted: 2008-02-03 11:46:32
http://technology.timesonline.co.uk/tol/news/tech_and_web/article3193480.ece

Microsoft is developing Big Brother-style software capable of remotely monitoring a worker’s productivity, physical wellbeing and competence. The Times has seen a patent application filed by the company for a computer system that links workers to their computers via wireless sensors that measure their metabolism. The system would allow managers to monitor employees’ performance by measuring their heart rate, body temperature, movement, facial expression and blood pressure. Unions said they fear that employees could be dismissed on the basis of a computer’s assessment of their physiological state. This is believed to be the first time a company has proposed developing such software for mainstream workplaces. Microsoft submitted a patent application in the US for a “unique monitoring system” that could link workers to their computers. Wireless sensors could read “heart rate, galvanic skin response, EMG, brain signals, respiration rate, body temperature, movement facial movements, facial expressions and blood pressure”, the application states. The system could also “automatically detect frustration or stress in the user”. Physical changes to an employee would be matched to an individual psychological profile based on a worker’s weight, age and health. If the system picked up an increase in heart rate or facial expressions suggestive of stress or frustration, it would tell management. Civil liberties groups and privacy lawyers strongly criticised the potential of the system for “taking the idea of monitoring people at work to a new level”.

Note: For revealing reports from major media sources on the increasing surveillance of all aspects of society by secret government and corporate programs, click here.


The White House Coup
2007-07-23, BBC Radio
Posted: 2007-12-10 08:25:36
http://www.bbc.co.uk/radio4/history/document/document_20070723.shtml

[BBC Radio] uncovers details of a planned coup in the USA in 1933 by right-wing American businessmen. The coup was aimed at toppling President Franklin D Roosevelt with the help of half-a-million war veterans. The plotters, who were alleged to involve some of the most famous families in America (owners of Heinz, Birds Eye, Goodtea, Maxwell [House] and George Bush’s grandfather, Prescott [Bush]) believed that their country should adopt the policies of Hitler and Mussolini to beat the great depression. Why [is] so little ... known about this biggest ever peacetime threat to American democracy?

Note: The highly decorated General Smedley Butler, author of the landmark book War is a Racket, was approached by the plotters for assistance in carrying out this coup. He at first played along, but then eventually exposed the coup plot in Congressional testimony. Yet news of this huge plot was squelched by both the government and media. To understand why, read a two-page summary of General Butler's book by clicking here and listen to the gripping, 30-minute BBC broadcast at the link above.


Here come the thought police
2007-11-19, Baltimore Sun (Baltimore's leading newspaper)
Posted: 2007-12-02 13:04:14
http://www.baltimoresun.com/news/opinion/oped/bal-op.thoughtpolice19nov19,0,2...

With overwhelming bipartisan support, Rep. Jane Harman's "Violent Radicalization and Homegrown Terrorism Prevention Act" passed the House 404-6 late last month. Swift Senate passage appears certain. Not since the "Patriot Act" of 2001 has any bill so threatened our constitutionally guaranteed rights. Diverse groups vigorously oppose Ms. Harman's effort to stifle dissent. Unfortunately, the mainstream press and leading presidential candidates remain silent. Ms. Harman ... thinks it likely that the United States will face a native brand of terrorism in the immediate future and offers a plan to deal with ideologically based violence. But her plan is a greater danger to us than the threats she fears. Her bill tramples constitutional rights by creating a commission with sweeping investigative power and a mandate to propose laws prohibiting whatever the commission labels "homegrown terrorism." The proposed commission is a menace through its power to hold hearings, take testimony and administer oaths, an authority granted to even individual members of the commission - little Joe McCarthys - who will tour the country to hold their own private hearings. Ms. Harman's proposal includes an absurd attack on the Internet ... and legalizes an insidious infiltration of targeted organizations. While Ms. Harman denies that her proposal creates "thought police," it defines "homegrown terrorism" as "planned" or "threatened" use of force to coerce the government or the people in the promotion of "political or social objectives." That means that no force need actually have occurred as long as the government charges that the individual or group thought about doing it. Any social or economic reform is fair game. The bill defines "violent radicalization" as promoting an "extremist belief system." But American governments, state and national, have a long history of interpreting radical "belief systems" as inevitably leading to violence to facilitate change.

Note: For many major media reports on serious new threats to civil liberties, click here.


Big Brother Spying on Americans' Internet Data?
2007-11-07, ABC News
Posted: 2007-11-18 10:38:02
http://abcnews.go.com/Politics/Story?id=3833172

According to a former AT&T employee, the government has warrantless access to a great deal of Internet traffic should they care to take a peek. As information is traded between users it flows also into a locked, secret room on the sixth floor of AT&T's San Francisco offices and other rooms around the country -- where the U.S. government can sift through and find the information it wants, former AT&T employee Mark Klein alleged Wednesday at a press conference on Capitol Hill. "An exact copy of all Internet traffic that flowed through critical AT&T cables -- e-mails, documents, pictures, Web browsing, voice-over-Internet phone conversations, everything -- was being diverted to equipment inside the secret room," he said. Klein ... said that as an AT&T technician overseeing Internet operations in San Francisco, he helped maintain optical splitters that diverted data en route to and from AT&T customers. One day he found that the splitters were hard-wired into a secret room on the sixth floor. Documents he obtained [from] AT&T showed that highly sophisticated data mining equipment was kept there. Conversations he had with other technicians and the AT&T documents led Klein to believe there are 15 to 20 such sites nationwide, including in Seattle, Los Angeles, San Jose, San Diego and Atlanta, he said. Brian Reid, a former Stanford electrical engineering professor who appeared with Klein, said the NSA would logically collect phone and Internet data simultaneously because of the way fiber optic cables are intertwined. He said ... the system described by Klein suggests a "wholesale, dragnet surveillance." Of the major telecom companies, only Qwest is known to have rejected government requests for access to data. Former Qwest CEO Joseph Nacchio, appealing an insider trading conviction last month, said the government was seeking access to data even before Sept. 11.


Blackwater's Owner Has Spies for Hire
2007-11-03, Washington Post
Posted: 2007-11-11 08:48:00
http://www.washingtonpost.com/wp-dyn/content/article/2007/11/02/AR20071102021...

The Prince Group, the holding company that owns Blackwater Worldwide, has been building an operation that will [develop] intelligence ... for clients in industry and government. The operation, Total Intelligence Solutions, has assembled a roster of former ... high-ranking figures from agencies such as the CIA and defense intelligence. Its chairman is Cofer Black, the former head of counterterrorism at CIA known for his leading role in many of the agency's more controversial programs, including the rendition and interrogation of ... suspects and the detention of some of them in secret prisons overseas. Its chief executive is Robert Richer, a former CIA associate deputy director of operations who was heavily involved in running the agency's role in the Iraq war. Because of its roster and its ties to owner Erik Prince, the multimillionaire former Navy SEAL, the company's thrust into this world highlights the blurring of lines between government, industry and activities formerly reserved for agents operating in the shadows. Richer, for instance, once served as the chief of the CIA's Near East division and is said to have ties to King Abdullah of Jordan. The CIA had spent millions helping train Jordan's intelligence service in exchange for information. Now Jordan has hired Blackwater to train its special forces. "Cofer can open doors," said Richer, who served 22 years at the CIA. "I can open doors. We can generally get in to see who we need to see. We ... can deal with the right minister or person." "They have the skills and background to do anything anyone wants," said RJ Hillhouse, who writes a national security blog called The Spy Who Billed Me. "There's no oversight. They're an independent company offering freelance espionage services. They're rent-a-spies."


State Department Use of Contractors Leaps in 4 Years
2007-10-19, New York Times
Posted: 2007-11-11 08:29:15
http://www.nytimes.com/2007/10/24/washington/24contractor.html?ex=1350878400&...

Over the past four years, the amount of money the State Department pays to private security and law enforcement contractors has soared to nearly $4 billion a year from $1 billion, ... but ... the department had added few new officials to oversee the contracts. Auditors and outside exerts say the results have been vast cost overruns, poor contract performance and, in some cases, violence that has so far gone unpunished. A vast majority of the money goes to companies like DynCorp International and Blackwater [Worldwide] to protect diplomats overseas, train foreign police forces and assist in drug eradication programs. There are only 17 contract compliance officers at the State Department’s management bureau overseeing spending of the billions of dollars on these programs, officials said. Two new reports have delivered harsh judgments about the State Department’s handling of the contracts, including the protective services contract that employs Blackwater guards whose involvement in a Sept. 16 shooting in Baghdad has raised questions about their role in guarding American diplomats in Iraq. The ballooning budget for outside contracts at the State Department is emblematic of a broader trend, contracting experts say. The Bush administration has doubled the amount of government money going to all types of contractors to $400 billion, creating a new and thriving class of post-9/11 corporations carrying out delicate work for the government. But the number of government employees issuing, managing and auditing contracts has barely grown. “That’s a criticism that’s true of not just State but of almost every agency,” said Jody Freeman, an expert on administrative law at Harvard Law School.


From Casinos to Counterterrorism
2007-10-22, Washington Post
Posted: 2007-10-26 08:18:02
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/21/AR20071021015...

[Las Vegas], famous for being America's playground, has also become its security lab. Like nowhere else in the United States, Las Vegas has embraced the twin trends of data mining and high-tech surveillance, with arguably more cameras per square foot than any airport or sports arena in the country. Even the city's cabs and monorail have cameras. Some privacy advocates view the city as a harbinger of things to come. In secret rooms in casinos across Las Vegas, surveillance specialists are busy analyzing information about players and employees. Relying on thousands of cameras in nearly every cranny of the casinos, they evaluate ... behavior. They ping names against databases that share information with other casinos, sometimes using facial-recognition software to validate a match. And in the marketing suites, casino staffers track players' every wager, every win or loss, the better to target high-rollers for special treatment and low- and middle-rollers for promotions. "You could almost look at Vegas as the incubator of a whole host of surveillance technologies," said James X. Dempsey, policy director for the Center for Democracy and Technology. Those technologies, he said, have spread to other commercial venues: malls, stadiums, amusement parks. After Sept. 11, 2001, several airports tested facial-recognition software, with little success. But the government is continuing to invest in biometric technologies. "We often hear of the surveillance technology du jour, but what we're seeing now in America is a collection of surveillance technologies that work together," said Barry Steinhardt, the American Civil Liberties Union's technology and liberty project director. "It isn't just video surveillance or face recognition or license plate readers or RFID chips. It's that all these technologies are converging to create a surveillance society."

Note: For revealing major media reports of privacy risks and invasions, click here.


An Opportunity for Wall St. in China’s Surveillance Boom
2007-09-07, New York Times
Posted: 2007-09-21 07:46:54
http://www.nytimes.com/2007/09/11/business/worldbusiness/11security.html?ex=1...

Li Runsen, the powerful technology director of China’s ministry of public security, is best known for leading Project Golden Shield, China’s intensive effort to strengthen police control over the Internet. But last month Mr. Li took an additional title: director for China Security and Surveillance Technology, a fast-growing company that installs and sometimes operates surveillance systems for Chinese police agencies, jails and banks, among other customers. The company has just been approved for a listing on the New York Stock Exchange. The company’s listing and Mr. Li’s membership on its board are just the latest signs of ever-closer ties among Wall Street, surveillance companies and the Chinese government’s security apparatus. Wall Street analysts now follow the growth of companies that install surveillance systems providing Chinese police stations with 24-hour video feeds from nearby Internet cafes. Hedge fund money from the United States has paid for the development of not just better video cameras, but face-recognition software and even newer behavior-recognition software designed to spot the beginnings of a street protest and notify police. Executives of Chinese surveillance companies say they are helping their government reduce street crime, preserve social stability and prevent terrorism. They note that London has a more sophisticated surveillance system, although the Chinese system will soon be far more extensive. Wall Street executives also defend the industry as necessary to keep the peace at a time of rapid change in China. They point out that New York has begun experimenting with surveillance cameras in Lower Manhattan and other areas of the city.


Spy Satellites Turned on the U.S.
2007-09-06, ABC News
Posted: 2007-09-21 07:44:35
http://abcnews.go.com/TheLaw/story?id=3567635

Traditionally, powerful spy satellites have been used to search for strategic threats overseas. But now the Department of Homeland Security has developed a new office to use the satellites to [monitor the US itself]. [DHS] officials ... faced extensive criticism [in Congress] about the privacy and civil liberty concerns of the new office, called the National Applications Office. [House Homeland Security] Committee members expressed concern about abuse of the satellite imagery, charging that Homeland Security had not informed the oversight committee about the program. "What's most disturbing is learning about it from The Wall Street Journal," said Committee Chairman Rep. Bennie Thompson, D-Miss. The lawmakers also expressed concern about using military capabilities for U.S. law enforcement and Homeland Security operations, potentially a violation of the Posse Comitatus Act, which bars the military from serving as a law enforcement body within the United States. Committee members said that in addition to not being informed about the National Applications Office program, they had not yet been provided with documents defining the limits and legal guidance about the program. [They] sent a letter to Homeland Security saying, "We are so concerned that ... we are calling for a moratorium on the program. Today's testimony made clear that there is effectively no legal framework governing the domestic use of satellite imagery for the various purposes envisioned by the department."


Lou Dobbs Tonight: Agenda to Create a North American Union
2006-11-29, CNN
Posted: 2007-09-14 19:51:33
http://transcripts.cnn.com/TRANSCRIPTS/0611/29/ldt.01.html

When Mexican president Vicente Fox leaves office this week and Felipe Calderon takes his place, President Bush will be the last of the so-called three amigos. Bush, Fox, and, of course, Canadian prime minister Paul Martin were the originators of the so-called Security and Prosperity Partnership, which critics call nothing more than a North American [U]nion. It means open borders, commerce of all [kinds] ... without the approval of either American voters or the U.S. Congress. An effort, the governments say, to harmonize regulation and increase cooperation between three very different countries. A new Canadian prime minister [is] joining the discussions as this North American partnership barrels ahead, with departments and ministries of all three governments working quickly to integrate North America by 2010. Now Mexico's new president, Felipe Calderon, [is] widely expected to keep the progress moving. Critics, though, say there's too little transparency and no congressional oversight. [Tom Fitton of Judicial Watch says] "There's nothing wrong with neighboring governments talking to each other, synchronizing their watches to make sure they're all on the same page in the cases of emergency or on trade issues or even on the flows of goods and people. But if policies are being made that the American people might oppose, or that are contrary to the law ... they're doing something a bit more nefarious." [Fitton] points to SPP documents urging the free flow of goods and people across borders and a wish list from business interests that borders remain open during a flu pandemic. Worse, critics say foreign policy elites are promoting a European-style union, erasing borders between the three countries and eventually moving to a single North American currency called the [Amero].

Note: To view the CNN broadcast of the above, click here. The Canadian TV network CNBC also carried a two-minute report on one of the supposed outcomes of the SPP, the Amero, which is a new common currency being planned for use by Canada, the U.S., and Mexico. To watch this news report, click here.


US doles out millions for street cameras
2007-08-12, Boston Globe
Posted: 2007-08-29 07:44:50
http://www.boston.com/news/nation/articles/2007/08/12/us_doles_out_millions_f...

The Department of Homeland Security is funneling millions of dollars to local governments nationwide for purchasing high-tech video camera networks, accelerating the rise of a "surveillance society" in which the sense of freedom that stems from being anonymous in public will be lost, privacy rights advocates warn. The department ... has doled out millions on surveillance cameras, transforming city streets and parks into places under constant observation. A Globe [investigation] shows that a large number of new surveillance systems, costing at least tens and probably hundreds of millions of dollars, are being simultaneously installed around the country as part of homeland security grants. Federal money is helping New York, Baltimore, and Chicago build massive surveillance systems that may also link thousands of privately owned security cameras. Boston has installed about 500 cameras in the MBTA system, funded in part with homeland security funds. Marc Rotenberg, director of the Electronic Privacy Information Center, said [the] Homeland Security Department is the primary driver in spreading surveillance cameras, making their adoption more attractive by offering federal money to city and state leaders. The proliferation of cameras could mean that Americans will feel less free because legal public behavior -- attending a political rally, entering a doctor's office, or even joking with friends in a park -- will leave a permanent record, retrievable by authorities at any time.


Concerns Raised on Wider Spying Under New Law
2007-08-19, New York Times
Posted: 2007-08-22 08:03:27
http://www.nytimes.com/2007/08/19/washington/19fisa.html?ex=1345176000&en=2e7...

Broad new surveillance powers approved by Congress this month could allow the Bush administration to conduct spy operations that go well beyond wiretapping to include — without court approval — certain types of physical searches on American soil and the collection of Americans’ business records. “This may give the administration even more authority than people thought,” said David Kris, a former senior Justice Department lawyer in the Bush and Clinton administrations. Several legal experts said that by redefining the meaning of “electronic surveillance,” the new law narrows the types of communications covered in the Foreign Intelligence Surveillance Act, known as FISA, by indirectly giving the government the power to use intelligence collection methods far beyond wiretapping that previously required court approval if conducted inside the United States. These new powers include the collection of business records, physical searches and so-called “trap and trace” operations, analyzing specific calling patterns. For instance, the legislation would allow the government, under certain circumstances, to demand the business records of an American in Chicago without a warrant if it asserts that the search concerns its surveillance of a person who is in Paris, experts said. Some civil rights advocates said they suspected that the administration made the language of the bill intentionally vague to allow it even broader discretion over wiretapping decisions. The end result ... is that the legislation may grant the government the right to collect a range of information on American citizens inside the United States without warrants, as long as the administration asserts that the spying concerns the monitoring of a person believed to be overseas.


Domestic Use of Spy Satellites To Widen
2007-08-16, Washington Post
Posted: 2007-08-22 07:59:37
http://www.washingtonpost.com/wp-dyn/content/article/2007/08/15/AR20070815024...

The Bush administration has approved a plan to expand domestic access to some of the most powerful tools of 21st-century spycraft, giving law enforcement officials and others the ability to view data obtained from satellite and aircraft sensors that can see through cloud cover and even penetrate buildings and underground bunkers. A program approved by the Office of the Director of National Intelligence and the Department of Homeland Security will allow broader domestic use of secret overhead imagery beginning as early as this fall, with the expectation that state and local law enforcement officials will eventually be able to tap into technology once largely restricted to foreign surveillance. But the program ... quickly provoked opposition from civil liberties advocates, who said the government is crossing a well-established line against the use of military assets in domestic law enforcement. The administration's decision would provide domestic authorities with unprecedented access to high-resolution, real-time satellite photos. They could also have access to much more. Civil liberties groups quickly condemned the move, which Kate Martin, director of the Center for National Security Studies, ... likened to "Big Brother in the sky. They want to turn these enormous spy capabilities ... onto Americans. They are laying the bricks one at a time for a police state." Steven Aftergood, director of the Project on Government Secrecy for the Federation of American Scientists, said that ... oversight for the program was woefully inadequate. Enhanced access "shouldn't be adopted at all costs because it comes with risk to privacy and to the integrity of our political institutions," he said.


China Enacting a High-Tech Plan to Track People
2007-08-12, New York Times
Posted: 2007-08-22 07:39:52
http://www.nytimes.com/2007/08/12/business/worldbusiness/12security.html?ex=1...

At least 20,000 police surveillance cameras are being installed along streets here [in Shenzhen] in southern China and will soon be guided by sophisticated computer software from an American-financed company to recognize automatically the faces of police suspects and detect unusual activity. Starting this month in a port neighborhood and then spreading across Shenzhen, a city of 12.4 million people, residency cards fitted with powerful computer chips programmed by the same company will be issued to most citizens. Data on the chip will include not just the citizen’s name and address but also work history, educational background, religion, ethnicity, police record, medical insurance status and landlord’s phone number. Even personal reproductive history will be included, for enforcement of China’s controversial “one child” policy. Plans are being studied to add credit histories, subway travel payments and small purchases charged to the card. Security experts describe China’s plans as the world’s largest effort to meld cutting-edge computer technology with police work to track the activities of a population. But they say the technology can be used to violate civil rights. “We have a very good relationship with U.S. companies like I.B.M., Cisco, H.P., Dell,” said Robin Huang, the chief operating officer of China Public Security. “All of these U.S. companies work with us to build our system together.” The role of American companies in helping Chinese security forces has periodically been controversial in the United States. Executives from Yahoo, Google, Microsoft and Cisco Systems testified in February 2006 at a Congressional hearing called to review whether they had deliberately designed their systems to help the Chinese state muzzle dissidents on the Internet; they denied having done so.


Same Agencies to Run, Oversee Surveillance Program
2007-08-07, Washington Post
Posted: 2007-08-14 11:41:22
http://www.washingtonpost.com/wp-dyn/content/article/2007/08/06/AR20070806013...

The Bush administration plans to leave oversight of its expanded foreign eavesdropping program to the same government officials who supervise the surveillance activities and to the intelligence personnel who carry them out, senior government officials said yesterday. The law, which permits intercepting Americans' calls and e-mails without a warrant if the communications involve overseas transmission, gives Director of National Intelligence Mike McConnell and Attorney General Alberto R. Gonzales responsibility for creating the broad procedures determining whose telephone calls and e-mails are collected. It also gives McConnell and Gonzales the role of assessing compliance with those procedures. The law ... does not contain provisions for outside oversight -- unlike an earlier House measure that called for audits every 60 days by the Justice Department's inspector general. The controversial changes to the 1978 Foreign Intelligence Surveillance Act were approved by both chambers of the Democratic-controlled Congress despite privacy concerns raised by Democratic leaders and civil liberties advocacy groups. Central to the new program is the collection of foreign intelligence from "communication service providers," which the officials declined to identify, citing secrecy concerns. Under the new law, the attorney general is required to draw up the governing procedures for surveillance activity, for approval by the Foreign Intelligence Surveillance Court. Once the procedures are established, the attorney general and director of national intelligence will formally certify that the collection of data is authorized. But the certification will be placed under seal "unless the certification is necessary to determine the legality of the acquisition," according to the law signed by Bush.


Bush administration defends spy law
2007-08-07, Los Angeles Times
Posted: 2007-08-14 11:39:32
http://www.latimes.com/news/la-na-intel7aug07,0,1631228.story

The Bush administration rushed to defend new espionage legislation Monday amid growing concern that the changes could lead to increased spying by U.S. intelligence agencies on American citizens. But officials declined to provide details about how the new capabilities might be used by the National Security Agency and other spy services. And in many cases, they could point only to internal monitoring mechanisms to prevent abuse of the new rules that appear to give the government greater authority to tap into the traffic flowing across U.S. telecommunications networks. Officials rejected assertions that the new capabilities would enable the government to cast electronic "drift nets" that might ensnare U.S. citizens [and] that the new legislation would amount to the expansion of a controversial — and critics contend unconstitutional — warrantless wiretapping program that President Bush authorized after the 9/11 attacks. Intelligence experts said there were an array of provisions in the new legislation that appeared to make it possible for the government to engage in intelligence-collection activities that the Bush administration officials were discounting. "They are trying to shift the terms of the debate to their intentions and away from the meaning of the new law," said Steven Aftergood, an intelligence policy analyst at the Federation of American Scientists. "The new law gives them authority to do far more than simply surveil foreign communications abroad," he said. "It expands the surveillance program beyond terrorism to encompass foreign intelligence. It permits the monitoring of communications of a U.S. person as long as he or she is not the primary target. And it effectively removes judicial supervision of the surveillance process."


The Fear of Fear Itself
2007-08-07, New York Times
Posted: 2007-08-14 11:30:32
http://www.nytimes.com/2007/08/07/opinion/07tue1.html?ex=1344139200&en=69538e...

It was appalling to watch over the last few days as Congress — now led by Democrats — caved in to yet another unnecessary and dangerous expansion of President Bush’s powers, this time to spy on Americans in violation of basic constitutional rights. Many of the 16 Democrats in the Senate and 41 in the House who voted for the bill said that they had acted in the name of national security, but the only security at play was their job security. What [do] the Democrats ... plan to do with their majority in Congress if they are too scared of Republican campaign ads to use it to protect the Constitution and restrain an out-of-control president[?] The White House and its allies on Capitol Hill railroaded Congress into voting a vast expansion of the president’s powers. They gave the director of national intelligence and the attorney general authority to intercept — without warrant, court supervision or accountability — any telephone call or e-mail message that moves in, out of or through the United States as long as there is a “reasonable belief” that one party is not in the United States. While serving little purpose, the new law has real dangers. It would allow the government to intercept, without a warrant, every communication into or out of any country, including the United States. The Democratic majority has made strides on other issues like children’s health insurance against White House opposition. As important as these measures are, they do not excuse the Democrats from remedying the damage Mr. Bush has done to civil liberties and the Bill of Rights. That is their most important duty.


In Bush we trust - or else
2007-08-05, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2007-08-14 11:27:43
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/08/05/EDJFRB8AF1.DTL

President Bush's latest affront to the U.S. Constitution [is] in plain view on the White House Web site: "Executive Order: Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq." This far-reaching order ... is a frontal assault on the Fifth Amendment, which decrees that the government cannot seize an individual's property without due process. [The order asserts] the authority to freeze the American assets of anyone who directly or indirectly assists someone who poses "a significant risk" [to] the "peace and stability" of [Iraq] or the reconstruction effort. "On its face, this is the greatest encroachment on civil liberties since the internment of Japanese Americans in World War II," said Bruce Fein, a constitutional lawyer who was a deputy attorney general in the Reagan administration. Fein said the sanctions against suspected violators would amount to "a financial death penalty. King George III really would have been jealous of this power." The executive order not only calls for the freezing of assets of anyone who directly or indirectly [opposes US policy in Iraq,] it prohibits anyone else from providing "funds, goods or services" to a blacklisted individual. In other words, a friend or relative could have his or her assets seized for trying to help someone whose bank account is suddenly frozen. An attorney who offered legal help could risk losing everything he or she owned. Then again, there's not much need for lawyers in the world of this executive order. The blacklist would be drawn up by the "secretary of treasury, in consultation with the secretary of state and the secretary of defense." The Fifth Amendment was written for good reason: It's dangerous to give the government unchecked authority to seize private property without judicial review.


Bush Signs Law to Widen Legal Reach for Wiretapping
2007-08-06, New York Times
Posted: 2007-08-09 08:46:41
http://www.nytimes.com/2007/08/06/washington/06nsa.html?ex=1344052800&en=5e75...

President Bush signed into law ... legislation that broadly [expands] the government’s authority to eavesdrop on the international telephone calls and e-mail messages of American citizens without warrants. The law [goes] far beyond the small fixes that administration officials had said were needed to gather information about foreign terrorists [and will] sharply alter the legal limits on the government’s ability to monitor millions of phone calls and e-mail messages going in and out of the United States. The new law for the first time [provides] a legal framework for much of the surveillance without warrants that was being conducted in secret by the National Security Agency and outside the Foreign Intelligence Surveillance Act, the 1978 law that is supposed to regulate the way the government can listen to the private communications of American citizens. “This more or less legalizes the N.S.A. program,” said Kate Martin, director of the Center for National Security Studies in Washington. Previously, the government needed search warrants approved by a special intelligence court to eavesdrop on ... electronic communications between individuals inside the United States and people overseas. The new law gives the attorney general and the director of national intelligence the power to approve the international surveillance, rather than the special intelligence court. The law also gave the administration greater power to force telecommunications companies to cooperate with such spying operations. The companies can now be compelled to cooperate by orders from the attorney general and the director of national intelligence.


Chips: High Tech Aids or Tracking Tools?
2007-07-22, ABC News/Associated Press
Posted: 2007-08-03 08:29:14
http://www.abcnews.go.com/Technology/wireStory?id=3402044

CityWatcher.com, a provider of surveillance equipment, attracted little notice itself until a year ago, when two of its employees had glass-encapsulated microchips with miniature antennas embedded in their forearms. The "chipping" of two workers with RFIDs radio frequency identification tags ... was merely a way of restricting access to ... sensitive data and images ... the company said. Innocuous? Maybe. But the news that Americans had, for the first time, been injected with electronic identifiers to perform their jobs fired up a debate over the proliferation of ever-more-precise tracking technologies and their ability to erode privacy in the digital age. To some, the ... notion of tagging people was Orwellian. Chipping, these critics said, might start with Alzheimer's patients or Army Rangers, but would eventually be suggested for convicts, then parolees, then sex offenders, then illegal aliens until one day, a majority of Americans, falling into one category or another, would find themselves electronically tagged. "It was scary that a government contractor that specialized in putting surveillance cameras on city streets was the first to incorporate this technology in the workplace," says Liz McIntyre, co-author of Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID. Within days of the company's announcement, civil libertarians and Christian conservatives joined to excoriate the microchip's implantation in people.

Note: For educated speculation on how certain powerful people might like to have everyone implanted with microchips for security and control purposes, click here.


FBI Plans Initiative To Profile Terrorists
2007-07-11, Washington Post
Posted: 2007-07-21 07:45:44
http://www.washingtonpost.com/wp-dyn/content/article/2007/07/10/AR20070710018...

The Federal Bureau of Investigation is developing a computer-profiling system that would enable investigators to target possible terror suspects. The System to Assess Risk, or STAR, assigns risk scores to possible suspects based on a variety of information, similar to the way a credit bureau assigns a rating based on a consumer's spending behavior and debt. The program focuses on foreign suspects but also includes data about some U.S. residents. Some lawmakers said ... that the report raises new questions about the government's power to use personal information and intelligence without accountability. "The Bush administration has expanded the use of this technology, often in secret, to collect and sift through Americans' most sensitive personal information," said Sen. Patrick J. Leahy (D-Vt.), chairman of the Senate Judiciary Committee. The use of data mining in the war on terror has sparked criticism. An airplane-passenger screening program called CAPPS II was revamped and renamed because of civil liberty concerns. An effort to collect Americans' personal and financial data called Total Information Awareness was killed. Law enforcement and national security officials have continued working on other programs to use computers to sift through information for signs of threats. The Department of Homeland Security, for example, flags travelers entering and leaving the United States who may be potential suspects through a risk-assessment program called the Automated Targeting System.


FBI Would Skirt the Law With Proposed Phone Record Program, Experts Say
2007-07-10, ABC News blog
Posted: 2007-07-21 07:42:01
http://blogs.abcnews.com/theblotter/2007/07/fbi-would-skirt.html

A proposed new FBI program would skirt federal laws by paying private companies to hold millions of phone and Internet records which the bureau is barred from keeping itself, experts say. The $5 million project would apparently pay private firms to store at least two years' worth of telephone and Internet activity by millions of Americans, few of whom would ever be considered a suspect in any terrorism, intelligence or criminal matter. The FBI is barred by law from collecting and storing such data if it has no connection to a specific investigation or intelligence matter. In recent years the bureau has tried to encourage telecommunications firms to voluntarily store such information, but corporations have balked at the cost of keeping records they don't need. "The government isn't allowed to warehouse the information, and the companies don't want to, so this creates a business incentive for the companies to warehouse it, so the government can access it later," said Mike German, a policy expert on national security and privacy issues for the American Civil Liberties Union (ACLU).  "It's a public-private partnership that puts civil liberties to the test." In March, an FBI official identified the companies as Verizon, MCI and AT&T. Even the bureau's own top lawyer said she found the [FBI's] behavior "disturbing," noting that when requesting access to phone company records, it repeatedly referenced "emergency" situations that did not exist, falsely claimed grand juries had subpoenaed information and failed to keep records on much of its own activity.


Judges OK warrantless monitoring of Web use
2007-07-07, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2007-07-11 11:37:16
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/07/07/BAGMNQSJDA1.DTL

Federal agents do not need a search warrant to monitor a suspect's computer use and determine the e-mail addresses and Web pages the suspect is contacting, a federal appeals court ruled Friday. In a drug case from San Diego County, the Ninth U.S. Circuit Court of Appeals in San Francisco likened computer surveillance to the "pen register" devices that officers use to pinpoint the phone numbers a suspect dials, without listening to the phone calls themselves. In Friday's ruling, the court said computer users should know that they lose privacy protections with e-mail and Web site addresses when they are communicated to the company whose equipment carries the messages. The search is no more intrusive than officers' examination of a list of phone numbers or the outside of a mailed package, neither of which requires a warrant, Judge Raymond Fisher said in the 3-0 ruling. Defense lawyer Michael Crowley disagreed. His client, Dennis Alba, was sentenced to 30 years in prison after being convicted of operating a laboratory in Escondido that manufactured the drug ecstasy. Some of the evidence against Alba came from agents' tracking of his computer use. The court upheld his conviction and sentence. Expert evidence in Alba's case showed that the Web addresses obtained by federal agents included page numbers that allowed the agents to determine what someone read online, Crowley said. The ruling "further erodes our privacy," the attorney said. "The great political marketplace of ideas is the Internet, and the government has unbridled access to it."

Note: So now every email you send and read can be monitored legally. Why didn't this make news headlines?


Files on Illegal Spying Show C.I.A. Skeletons From Cold War
2007-06-26, New York Times
Posted: 2007-07-06 08:41:10
http://www.nytimes.com/2007/06/27/washington/27cia.html?ex=1340596800&en=3fa7...

Long-secret documents released Tuesday provide new details about how the Central Intelligence Agency illegally spied on Americans decades ago. Known inside the agency as the “family jewels,” the 702 pages of documents released Tuesday catalog domestic wiretapping operations, failed assassination plots, mind-control experiments and spying on journalists from the early years of the C.I.A. The papers provide evidence of paranoia and occasional incompetence as the agency began a string of illegal spying operations in the 1960s and 1970s, often to hunt links between Communist governments and the domestic protests that roiled the nation in that period. Yet the long-awaited documents leave out a great deal. Large sections are censored, showing that the C.I.A. still cannot bring itself to expose all the skeletons in its closet. And many activities about overseas operations disclosed years ago by journalists, Congressional investigators and a presidential commission — which led to reforms of the nation’s intelligence agencies — are not detailed in the papers. The 60-year-old agency has been under fire ... by critics [of] the secret prisons and harsh interrogation practices it has adopted since the Sept. 11 attacks. Some intelligence experts suggested ... that the release of the documents was intended to distract from the current controversies. And they and historians expressed disappointment that the documents were so heavily censored. Tom Blanton of the National Security Archive, the research group that filed the Freedom of Information request in 1992 that led to the documents’ becoming public, said he was initially underwhelmed by them because they contained little about the agency’s foreign operations. But Mr. Blanton said what was striking was the scope of the C.I.A’s domestic spying efforts.

Note: The entire body of the CIA's "Family Jewels" documents have been posted online by the National Security Archives, and can be read by clicking here.


Special Operations Prepared for Domestic Missions
2007-06-22, washingtonpost.com
Posted: 2007-07-06 08:23:16
http://blog.washingtonpost.com/earlywarning/2007/06/special_operations_prepar...

The U.S. Northern Command, the military command responsible for "homeland defense," has asked the Pentagon if it can establish its own special operations command for domestic missions. The request ... would establish a permanent sub-command for responses to incidents of domestic terrorism as well as other occasions where special operators may be necessary on American soil. The establishment of a domestic special operations mission, and the preparation of contingency plans to employ commandos in the United States, would upend decades of tradition. Military actions within the United States are the responsibility of state militias (the National Guard), and federal law enforcement is a function of the FBI. Employing special operations for domestic missions sounds very ominous, and NORTHCOM's request earlier this year should receive the closest possible Pentagon and congressional scrutiny. There's only one problem: NORTHCOM is already doing what it has requested permission to do. When NORTHCOM was established after 9/11 to be the military counterpart to the Department of Homeland Security, within its headquarters staff it established a Compartmented Planning and Operations Cell (CPOC) responsible for planning and directing a set of "compartmented" and "sensitive" operations on U.S., Canadian and Mexican soil. In other words, these are the very special operations that NORTHCOM is now formally asking the Pentagon to beef up into a public and acknowledged sub-command.


CIA to Air Decades of Its Dirty Laundry
2007-06-22, Washington Post
Posted: 2007-06-27 07:51:16
http://www.washingtonpost.com/wp-dyn/content/article/2007/06/21/AR20070621024...

The CIA will declassify hundreds of pages of long-secret records detailing some of the intelligence agency's worst illegal abuses -- the so-called "family jewels" documenting a quarter-century of overseas assassination attempts, domestic spying, kidnapping and infiltration of leftist groups ... CIA Director Michael V. Hayden said yesterday. The documents ... also include accounts of break-ins and theft, the agency's opening of private mail to and from China and the Soviet Union, wiretaps and surveillance of journalists, and a series of "unwitting" tests on U.S. civilians, including the use of drugs. The documents have been sought for decades by historians, journalists and conspiracy theorists and have been the subject of many fruitless Freedom of Information Act requests. In anticipation of the CIA's release, the National Security Archive at George Washington University yesterday published a separate set of documents from January 1975 detailing internal government discussions of the abuses. Those documents portray a rising sense of panic within the administration of President Gerald R. Ford that what then-CIA Director William E. Colby called "skeletons" in the CIA's closet had begun to be revealed in news accounts. "It's surely part of [Hayden's] program now to draw a bright line with the past," said National Security Archive Director Thomas S. Blanton. "But it's uncanny how the government keeps dipping into the black bag." Newly revealed details of ancient CIA operations, Blanton said, "are pretty resonant today."


C.I.A. Chief Tries Preaching a Culture of More Openness
2007-06-22, New York Times
Posted: 2007-06-27 07:49:05
http://www.nytimes.com/2007/06/23/washington/23hayden.html?ex=1340251200&en=3...

William E. Colby faced an uneasy decision in late 1973 when he took over the Central Intelligence Agency: whether to make public the agency’s internal accounting, then being compiled, of its domestic spying, assassination plots and other misdeeds since its founding nearly three decades earlier. Mr. Colby decided to keep the so-called family jewels a secret, and wrote in his memoir in 1978 that he believed the agency’s already sullied reputation ... could not have withstood a public airing of all its dirty laundry. So why, at a time when the agency has again been besieged by criticism, this time for its program of secret detentions and interrogations since the Sept. 11 attacks, would the current director, Gen. Michael V. Hayden, decide to declassify the same documents that Mr. Colby chose to keep secret? General Hayden said it was essential for the C.I.A. ... to be as open as possible in order to build public trust and dispel myths surrounding its operations. The more that the agency can tell the public, he said, the less chance that misinformation among the public will “fill the vacuum.” It was this outlook that General Hayden, whose public relations skills are well known in Washington, brought to an earlier job. There, as director of the National Security Agency, he tried to overhaul the N.S.A.’s public image — that of the shadowy, menacing organization portrayed in the movie “Enemy of the State” — by inviting reporters to briefings and authorizing its officials to speak to the author James Bamford for his book on the agency, “Body of Secrets.”

Note: For a brief summary of and links to further information about James Bamford's important book on the NSA, Body of Secrets, click here.


FBI Finds It Frequently Overstepped in Collecting Data
2007-06-14, Washington Post
Posted: 2007-06-23 06:47:16
http://www.washingtonpost.com/wp-dyn/content/article/2007/06/13/AR20070613024...

An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.


80 Institutions Used in C.I.A. Mind Studies
1977-08-04, New York Times
Posted: 2007-06-22 08:52:36
http://select.nytimes.com/gst/abstract.html?res=F20D15F63A5B167493C6A91783D85...

Adm. Stansfield Turner, the Director of Central Intelligence, testified today that the C.I.A. had secretly supported human behavior control research at 80 institutions, including 44 colleges or universities as well as hospitals, prisons and pharmaceutical companies. He said that the main action years of MK-Ultra were from 1953 through 1963. The projects, he said, had included tests of LSD and of a "K," or "knockout drop." The agency had supported 185 nongovernment researchers in 149 separate research projects. Admiral Turner said that ... 8,000 pages of newly discovered documents do not contain the names of the subjects of the tests but do contain "leads" that might enable them to be found. Admiral Turner acknowledged under questioning that the C.I.A. had apparently planned to test drugs on terminal cancer patients at the same institution where it secretly contributed $375,000 toward the construction of a hospital building. The New York Times has independently confirmed the institution is Georgetown University Medical School here. Admiral Turner [also] said that "some unwitting testing took place on criminal sexual psychopaths confined at a state hospital." At the two-hour hearing today, Senator Kennedy, a Massachusetts Democrat, pressed Admiral Turner to let the universities, researchers and possible subjects of the tests know of the C.I.A.'s involvement. "These individuals have a right to know who they are and why they were used," he said.

Note: If the above link fails, click here. For lots more reliable, verifiable information suggesting a major cover-up of government mind control programs, click here.


FBI Terror Watch List
2007-06-13, ABC News
Posted: 2007-06-15 10:15:35
http://blogs.abcnews.com/theblotter/2007/06/fbi_terror_watc.html

A terrorist watch list compiled by the FBI has apparently swelled to include more than half a million names. Privacy and civil liberties advocates say the list is growing uncontrollably, threatening its usefulness in the war on terror. The bureau says the number of names on its terrorist watch list is classified. A portion of the FBI's unclassified 2008 budget request posted to the Department of Justice Web site, however, refers to "the entire watch list of 509,000 names." A spokesman for the interagency National Counterterrorism Center (NCTC), which maintains the government's list of all suspected terrorists with links to international organizations, said they had 465,000 names covering 350,000 individuals. Many names are different versions of the same identity. In addition to the NCTC list, the FBI keeps a list of U.S. persons who are believed to be domestic terrorists - abortion clinic bombers, for example, or firebombing environmental extremists, who have no known tie to an international terrorist group. Combined, the NCTC and FBI compendia comprise the watch list used by federal security screening personnel on the lookout for terrorists. While the NCTC has made no secret of its terrorist tally, the FBI has consistently declined to tell the public how many names are on its list. "It grows seemingly without control or limitation," said ACLU senior legislative counsel Tim Sparapani of the terrorism watch list. Sparapani called the 509,000 figure "stunning. If we have 509,000 names on that list, the watch list is virtually useless," he told ABC News. "You'll be capturing innocent individuals with no connection to crime or terror." U.S. lawmakers and their spouses have been detained because their names were on the watch list.


White House revises post-disaster protocol
2007-06-02, Boston Globe
Posted: 2007-06-08 08:21:39
http://www.boston.com/news/nation/washington/articles/2007/06/02/white_house_...

The Bush administration is writing a new plan to maintain governmental control in the wake of an apocalyptic terrorist attack or overwhelming natural disaster, moving such doomsday planning for the first time from the Federal Emergency Management Agency to officials inside the White House. Discussion among legal specialists, homeland security experts and Internet commentators [includes] concerns that the policy may [make] it too easy to invoke emergency presidential powers such as martial law. The ... new "National Continuity Policy" contains few details about how surviving officials would invoke emergency powers, or when emergency powers should be deemed to be no longer necessary. The unanswered questions have provoked anxiety across ideological lines. The conservative commentator Jerome Corsi [wrote] that the directive looked like a recipe for allowing the office of the presidency to seize "dictatorial powers" because the policy does not discuss consulting Congress about when to invoke emergency powers -- or when to turn them off. Some specialists say that the White House should be more specific about its worst-case scenario plans, pointing out two unanswered questions: what circumstances would trigger implementation of the plan and what legal limits the White House recognizes on its own emergency powers. The policy ... does not contain a direct reference to statutes in which Congress has imposed checks and balances on the president's power to impose martial law or other extraordinary measures, [nor does it] explicitly acknowledge the National Emergencies Act, [a] law that gives Congress the right to override the president's determination that a national emergency still exists.


The Armageddon Plan
2004-03-01, The Atlantic Monthly
Posted: 2007-06-02 06:43:13
http://www.theatlantic.com/doc/prem/200403/mann

At least once a year during the 1980s Dick Cheney and Donald Rumsfeld vanished. Cheney was ... a [Republican] congressman. Rumsfeld [was] the head of G. D. Searle & Co.. Yet for periods of three or four days at a time no one in Congress knew where Cheney was, nor could anyone at Searle locate Rumsfeld. Rumsfeld and Cheney were principal actors in one of the most highly classified programs of the Reagan Administration. [It] called for setting aside the legal rules for presidential succession ... in favor of a secret procedure for putting in place a new "President" and his staff. The program is of particular interest today because it helps to explain the thinking and behavior of the second Bush Administration [since] September 11, 2001. The idea was to concentrate on speed, to preserve "continuity of government," and to avoid cumbersome procedures; the speaker of the House, the president pro tempore of the Senate, and the rest of Congress would play a greatly diminished role. "One of the awkward questions we faced ... was whether to reconstitute Congress after a nuclear attack. It was decided that no, it would be easier to operate without them." [Cheney's and Rumsfeld's] participation in the extra-constitutional continuity-of-government exercises ... also demonstrates a broad, underlying truth about these two men. For three decades ... even when they were out of the executive branch of government, they were never far away. They stayed in touch with defense, military, and intelligence officials, who regularly called upon them. They were ... a part of the permanent hidden national-security apparatus of the United States.

Note: If above link fails, click here. The author, James Mann, is a former Washington correspondent for the Los Angeles Times, and senior writer-in-residence at the Center for Strategic and International Studies, in Washington, D.C. Apparently, Cheney and Rumsfeld don't find Congress to be very important.


What Did the C.I.A. Do to His Father?
2001-04-01, New York Times
Posted: 2007-06-02 06:40:10
http://query.nytimes.com/gst/fullpage.html?sec=health&res=9D02E2DE113CF932A35...

For a quarter of a century, [Eric Olson] has believed that the Central Intelligence Agency murdered his father, a United States government scientist. On Nov. 28, 1953, around 2 a.m. [the] night manager at the Statler Hotel ... in New York rushed out the front door ... to find a middle-aged man lying on the sidewalk. The man had fallen from the 10th floor -- apparently after crashing through a closed window. [In late July, 1975] the C.I.A.'s director, William Colby [provided Olson's] family ... declassified documents relating to Frank Olson's death. Olson had not been a civilian employee of the Department of the Army. He had been a C.I.A. employee working at Fort Detrick. Olson's specialty, it turned out, had been the development of aerosols for the delivery of anthrax. The Colby documents were ... full of unexplained terms like the ''Artichoke'' and ''Bluebird'' projects. These turned out to be the precursors of what became known as MK-ULTRA, a C.I.A. project, beginning in the Korean War, to explore the use of drugs like LSD as truth serums, as well as botulism and anthrax, for use in covert assassination. The documents claimed that during a meeting between the C.I.A. and Fort Detrick scientists ... on Nov. 19,1953, Sidney Gottlieb of the C.I.A. slipped LSD into Olson's glass of Cointreau. Olson, a scientist by training, would have known that he was working for a government that had put Nazi scientists on trial at Nuremberg for immoral experiments on human beings. Now, in the late summer of 1953, [Olson] faced up to the possibility that his own government was doing the same thing. Slipping LSD into Olson's Cointreau was ... designed to get him to talk ... to assess what kind of risk he posed and then eliminate him if necessary.

Note: For those interested in this vital, yet disturbing topic, the entire Times article is well worth reading. For further verifiable information on the CIA mind control programs mentioned in this article, click here.


Contingencies for nuclear terrorist attack
2007-05-11, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2007-05-25 11:30:29
http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2007/05/11/MNG2OPP22R1.DTL

Senior government and military officials and other experts, organized by a joint Stanford-Harvard program called the Preventive Defense Project, met behind closed doors in Washington for a day-long workshop called "The Day After." The organizers of the nonpartisan project, Stanford's William Perry, a secretary of defense in the Clinton administration, and Harvard's Ashton Carter, a senior Defense Department official during the Clinton years, assumed the detonation of a bomb similar in size to the weapon that destroyed Hiroshima in World War II. A paper [they] are writing ... urges local governments and individuals to build underground bomb shelters; encourages authorities who survive to prevent evacuation of at least some of the areas attacked for three days ... and proposes suspending regulations on radiation exposure so that first responders would be able to act, even if that caused higher cancer rates. "The public at large will expect that their government had thought through this possibility and to have planned for it," Carter said in an interview. "This kind of an event would be unprecedented. We have had glimpses of something like this with Hiroshima, and glimpses with 9/11 and with Katrina. But those are only glimpses. If one bomb goes off, there are likely to be more to follow," Carter said. "This fact, that nuclear terrorism will appear as a syndrome rather than a single episode, has major consequences." It would, he added, require powerful government intervention to force people to do something many may resist -- staying put.

Note: Ashton Carter was co-author, with Philip Zelikow (later Executive Director of the 9/11 Commission) and John Deutch (former CIA Director), of a 1998 Foreign Affairs article, "Catastrophic Terrorism: Tackling the New Danger," which warned of a possible catastrophic attack on the World Trade Center and accurately described the governmental aftermath of 9/11.


Bush Changes Continuity Plan
2007-05-10, The Washington Post
Posted: 2007-05-25 11:26:53
http://www.washingtonpost.com/wp-dyn/content/article/2007/05/09/AR20070509027...

President Bush issued a formal national security directive yesterday ordering agencies to prepare contingency plans for a surprise, "decapitating" attack on the federal government, and assigned responsibility for coordinating such plans to the White House. The prospect of a nuclear bomb being detonated in Washington without warning ... has been cited by many security analysts as a rising concern since the Sept. 11, 2001, attacks. The order makes explicit that the focus of federal worst-case planning involves a covert nuclear attack against the nation's capital. "Adequate warning of potential emergencies that could pose a significant risk to the homeland might not be available, and therefore all continuity planning shall be based on the assumption that no such warning will be received," states the 72-paragraph order. The statement added, "Emphasis will be placed upon geographic dispersion of leadership, staff, and infrastructure in order to increase survivability and maintain uninterrupted Government Functions." After the 2001 attacks, Bush assigned about 100 senior civilian managers to rotate secretly to locations outside of Washington for weeks or months at a time [forming] a shadow government that evolved based on long-standing "continuity of operations plans." Since then, other agencies including the Pentagon, the Office of the Director of National Intelligence and the CIA have taken steps to relocate facilities or key functions outside of Washington for their own reasons, citing factors such as economics or the importance of avoiding Beltway "group-think."

Note: Why isn't Congress making these absolutely vital decisions? What gives these organizations authority to determine what will happen in the case of a major attack?


Catastrophic Terrorism: Tackling the New Danger
1998-11-01, Foreign Affairs, (the journal of the Council on Foreign Relations)
Posted: 2007-05-25 11:20:47
http://www.foreignaffairs.org/19981101faessay1434/ashton-carter-john-deutch-%...

A successful attack with weapons of mass destruction could certainly take thousands, or tens of thousands, of lives. If the device that exploded in 1993 under the World Trade Center had been nuclear, or had effectively dispersed a deadly pathogen, the resulting horror and chaos would have exceeded our ability to describe it. Such an act of catastrophic terrorism would be a watershed event in American history. It could involve loss of life and property unprecedented in peacetime and undermine America's fundamental sense of security, as did the Soviet atomic bomb test in 1949. Like Pearl Harbor, this event would divide our past and future into a before and after. The United States might respond with draconian measures, scaling back civil liberties, allowing wider surveillance of citizens, detention of suspects, and use of deadly force.

Note: Is this not a remarkable statement? This 1998 article was written by Philip Zelikow (who later was Executive Director of the 9/11 Commission!!!), John Deutch (former CIA Director), and Ashton Carter (former deputy secretary of defense). Dr. David Ray Griffin, an esteemed WTK team member, asks in his new book, Debunking 9/11 Debunking, "Would it not be interesting if we were to learn that those who orchestrated the attacks of 9/11 were able to put one of their own -- someone who at least had foreknowledge of the attacks -- in charge of carrying out the official investigation into these attacks?" To view the full article, click here.


C.I.A. Data Show 14-Year Project On Controlling Human Behavior
1977-07-21, New York Times
Posted: 2007-05-25 08:36:44
http://select.nytimes.com/gst/abstract.html?res=F60A1FFC3E59157493C3AB178CD85...

The Central Intelligence Agency conducted a 14-year program to find ways to "control human behavior" through the use of chemical, biological and radiological material, according to agency documents made public today by John Marks. The documents ... suggested broader experimentation on unwitting humans by the intelligence agency or its paid researchers than had been publicly known before. Mr. Marks distributed 20 documents that described the following incidents, among others: In 1956, the C.I.A. contracted with a private physician to test "bulbocapnine," a drug that can cause stupor or induce a catatonic state, on monkeys and "convicts incarcerated at" an unnamed state penitentiary. A letter from an unnamed C.I.A. official in 1949 discussed ways of killing people without leaving a trace. "I believe that there are two chemical substances which would be most useful in that they would leave no characteristic pathological findings," the letter said. In 1952, two Russian agents who were "suspected of being doubled" were interrogated using "narcohypnotic" methods. The two men were given sodium pentothal and a stimulant. One interrogation produced a "remarkable" regression, the papers said, during which "the subject actually relived certain past activities of his life. The subject totally accepted Mr. [name deleted] as an old and trusted and beloved personal friend whom the subject had known in years past in Georgia, U.S.S.R." The C.I.A. conducted secret medical experiments from 1949 through 1963 under the code names Bluebird, Artichoke, MK Ultra and MK Delta.

Note: If the above link fails, click here. Watch a one-minute video clip showing Congressional testimony on a dart gun which causes a heart attack without leaving any evidence. Explore further reliable, verifiable information suggesting a major cover-up of government mind control programs. Read other revealing news articles on mind control.


Pentagon restricting testimony in Congress
2007-05-10, Boston Globe
Posted: 2007-05-14 12:19:47
http://www.boston.com/news/nation/washington/articles/2007/05/10/pentagon_res...

The Pentagon has placed unprecedented restrictions on who can testify before Congress, reserving the right to bar lower-ranking officers, enlisted soldiers, and career bureaucrats from appearing before oversight committees or having their remarks transcribed. The guidelines, described in an April 19 memo to the staff director of the House Armed Services Committee, adds that all field-level officers and enlisted personnel must be "deemed appropriate" by the Department of Defense before they can participate in personal briefings for members of Congress or their staffs. In addition, according to the memo, the proceedings must not be recorded. Any officers who are allowed to testify must be accompanied by an official from the administration. Veterans of the legislative process -- who say they have never heard of such guidelines before -- maintain that the Pentagon has no authority to set such ground rules. A Pentagon spokesman confirmed that the guidelines are new. The memo has fueled complaints that the Bush administration is trying to restrict access to information about the war in Iraq. [A] special House oversight panel, according to aides, has written at least 10 letters to the Pentagon since February seeking information and has received only one official reply. Nor has the Pentagon fully complied with repeated requests for all the monthly assessments of Iraqi security forces.

Note: When the military begins to control the legislative, democracy begins to shift towards dictatorship. And for reliable information how the Pentagon cannot account for hundreds of billions of dollars, click here.


Cosmic bolt probed in shuttle disaster
2003-02-07, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2007-04-27 12:33:29
http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2003/02/07/CAMERA.TMP

Federal scientists are looking for evidence that a bolt of electricity in the upper atmosphere might have doomed the space shuttle Columbia as it streaked over California. Investigators are combing records from a network of ultra-sensitive instruments that might have detected a faint thunderclap in the upper atmosphere at the same time a photograph taken by a San Francisco astronomer appears to show a purplish bolt of lightning striking the shuttle. Los Alamos National Laboratories physicist Mark Stanley said that "we've seen very strong ionization in sprites" indicating that there were enough air molecules ionized to cause heating and an accompanying pulse -- a celestial thunderclap, as it were. NASA administrators confirmed Thursday that the photograph ... is being evaluated by Columbia crash investigators. The astronomer, who has asked that his name not be used, has declined to release the digital image to the media. [A] family of "transient" electrical effects occup[ies] this part of the sky, including sprites, which leap from the ionosphere to the tops of thunderheads. Ironically, an experiment of Israeli astronaut Ilan Ramon, aboard the doomed Columbia, was among the last fully funded work conducted on sprites. Scientists have observed interaction between a blue jet and a meteor. And in December 1999, Los Alamos National Laboratories researcher David Suszcynsky and colleagues, including Lyons, published an account of a meteor that apparently triggered a sprite.

Note: For a second article with the subtitle "Mysterious purple streak is shown hitting Columbia 7 minutes before it disintegrated," click here. Though this most bizarre news suggested another possible reason for the crash of the shuttle Columbia, it was virtually ignored throughout the official investigation. Why?


Income tax is an old American story that just grows more taxing
2007-04-15, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2007-04-19 17:47:16
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2007/04/15/INGO8P5G3B1.DTL

Millions of us are engaging in one of life's least-enjoyable activities. We're doing our taxes. We can thank the 16th Amendment for all this unpleasantness. Much maligned, much misunderstood, this amendment, ratified in February 1913, permits Congress to "lay and collect taxes on incomes from whatever source derived." Proposed by a Republican president, William Howard Taft, but commonly blamed on -- or credited to -- his Democratic successor, Woodrow Wilson, it was promptly denounced by unhappy members of both parties. Only in 1862 did Congress, facing Civil War expenses, impose a federal income tax. There were two marvelous things about this Civil War income tax. One was that you declared your own income. The second was that it was abolished after 10 years. The main reason this Civil War income tax disappeared was not that the government felt it no longer needed the money (alas, this is never true). The tax was lifted because wealthy Northeast manufacturers, the war's major taxpayers, possessed the congressional clout to replace income taxes with protective tariffs that shielded their manufactured goods. In 1894, [a] new income tax became law, only to be declared unconstitutional one year later. When the 16th Amendment was first put into practice, it would indeed be the "rich man's tax," both sides predicted. With generous deductions and a $3,000 exemption (about $55,000 today), most people didn't feel a thing. Best of all, the instructions were only one page long. Soon, of course, all this changed, in ways that nobody, pro-tax or con, could have foreseen.

Note: Many are unaware that the U.S. functioned without income tax for much of its history. The public never would have supported the 16th Amendment in 1913 if they thought it would tax the common worker. Were we duped? The 16th Amendment coincidentally was passed in the same year that the Federal Reserve (which took over the printing of U.S. money) was established. Few know that the Federal Reserve is neither truly federal or a full reserve. For more on this very well hidden fact and other cover-ups around banking, click here.


US Justice System Is 'Broken,' Lawyers Say
2004-06-24, The Los Angeles Times
Posted: 2007-04-19 17:37:31
http://www.latimes.com/news/printedition/asection/la-na-punish24jun24,1,72496...

The American criminal justice system relies too heavily on imprisoning people and needs to consider more effective alternatives, according to a study released Wednesday by the American Bar Assn., the nation's largest lawyers' organization. "For more than 20 years, we've gotten tougher on crime," said Dennis W. Archer, a former Detroit mayor and the group's current president. "We can no longer sit by as more and more people — particularly in minority communities — are sent away for longer and longer periods of time while we make it more and more difficult for them to return to society after they serve their time. The system is broken. We need to fix it." Both the number of incarcerated Americans and the cost of locking them up are massive, the report said, and have been escalating significantly in recent years. Between 1974 and 2002, the number of inmates in federal and state prisons rose six-fold. By 2002, 476 out of every 100,000 Americans were imprisoned. In 1982, the states and federal government spent $9 billion on jails and prisons. By 1999, the figure had risen to $49 billion. Based on trends, a black male born in 2001 has a 1 in 3 chance of being imprisoned during his lifetime, while the chances for a Latino male are 1 in 6, and for a white male, 1 in 17. The report contains numerous reform proposals. Among them: the repeal of mandatory minimum sentencing laws; more funding for substance abuse and mental health programs; assistance for prisoners reentering society; [and] task forces to study racial and ethnic disparities in the criminal justice system.

Note: If above link fails, click here. The prison-industrial complex attracts huge profits and strongly supports laws like "three strikes" where third time offenders are automatically imprisoned for life, even for petty crime.


Enough evidence for trial of CIA drugging
2004-05-25, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2007-04-19 17:35:37
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2004/05/25/BAGMH6R8OU1.DTL

A San Jose man who claimed the CIA secretly had given him LSD in 1957 as part of a mind-control experiment -- causing him to try to hold up a San Francisco bar ... offered enough evidence of possible drugging to go to trial on his $12 million damages suit. The decision by Chief U.S. District Judge Marilyn Hall Patel cited what appeared to be an admission by a former operative in the CIA program ... that he had slipped LSD into one of Wayne Ritchie's drinks. "I drugged guys involved in about 10, 12 (instances)," former federal narcotics agent Ira Feldman, who worked for the CIA's Project MKULTRA, told Ritchie's lawyer. The [MKULTRA] program ... was an attempt to find chemicals or techniques that could control human consciousness. The CIA and federal narcotics agents started giving mind-altering drugs to unsuspecting government employees, private citizens and prison volunteers in the early 1950s. Ritchie believes he was drugged during an office Christmas party. He ... was overcome with depression and a feeling that everyone had turned against him. He ... drove to a Fillmore District bar, demanded money ... and was hit over the head and knocked unconscious. He pleaded guilty to attempted robbery. Ritchie quit his job in disgrace, found work as a housepainter and spent years fighting off suicidal urges. Then in 1999, he read the obituary of MKULTRA's director, Sidney Gottlieb, and began to believe he had been one of the program's guinea pigs -- especially after the diary of a now-deceased MKULTRA agent showed he might have attended the same Christmas party.

Note: Though Ritchie lost the first round in court, he plans to appeal. For an abundance of reliable, verifiable information on secret government mind control programs, click here.


FBI let innocents get death sentences
2003-11-22, Sydney Morning Herald (Australia's leading newspaper)
Posted: 2007-04-12 22:52:28
http://www.smh.com.au/articles/2003/11/21/1069027333534.html

The FBI used murderers as informants in Boston for three decades, even allowing innocent men to be sentenced to death to protect the secret operation, a government report has found. The FBI's policy "must be considered one of the greatest failures in the history of federal law enforcement" and had "disastrous consequences", the report by the House Committee on Government Reform said. More than 20 people were murdered by FBI informants in Boston from 1965, often with the help of FBI agents, it said. But no FBI agent or official has ever been disciplined. The FBI's policy of using murderers grew out of a belated effort by a former director, J. Edgar Hoover, to go after the Mafia, which Hoover had earlier denied even existed. In the early 1960s, the bureau began recruiting underworld informers in its new campaign. The report focuses heavily on one episode, the 1965 murder of Edward Deegan, a small-time hoodlum who was killed by Jimmy Flemmi and Joseph Barboza, who had just been recruited by an FBI agent in Boston. The FBI knew the two men were the killers because it had been using an unauthorised wire tap and had heard Flemmi ask the Mafia boss, Raymond Patriarca, for permission to kill Deegan. A few days later, Deegan was shot dead. Four men who had nothing to do with the killing were tried and convicted, with two sentenced to death and two to life in prison. Two of the men died in prison and two had their sentences commuted and were freed after serving 30 years behind bars. Hoover was kept fully informed about this murder and the wrongful convictions, the report said.


Tapes Depict Proposal to Thwart Bomb Used in Trade Center Blast
1993-10-28, New York Times
Posted: 2007-04-12 22:50:44
http://select.nytimes.com/search/restricted/article?res=F00617FE3A5C0C7B8EDDA...

Law-enforcement officials were told that terrorists were building a bomb that was eventually used to blow up the World Trade Center. The informer was to have helped the plotters build the bomb and supply the fake powder, but the plan was called off by an F.B.I. supervisor who had other ideas about how the informer, Emad A. Salem, should be used. The account, which is given in the transcript of hundreds of hours of tape recordings Mr. Salem secretly made of his talks with law-enforcement agents, portrays the authorities as in a far better position than previously known to foil the Feb. 26 bombing of New York City's tallest towers. The explosion left six people dead, more than 1,000 injured and damages in excess of half a billion dollars. The transcript quotes Mr. Salem as saying that he wanted to complain to F.B.I. headquarters in Washington about the bureau's failure to stop the bombing, but was dissuaded by an agent identified as John Anticev. "He said, I don't think that the New York people would like the things out of the New York office to go to Washington, D.C." Another agent ... does not dispute Mr. Salem's account, but rather, appears to agree with it. Other Salem tapes and transcripts were being withheld pending Government review, of "security and other issues." William M. Kunstler, a defense lawyer in the case, accused the Government this week of improper delay in handing over all the material. The transcripts he had seen, he said, "were filled with all sorts of Government misconduct." But citing the judge's order, he said he could not provide any details.

Note: If the above link fails, click here. For a two-minute CBS News clip the same day giving more information on this little-known story, click here.


Man with tuberculosis jailed for not wearing mask
2007-04-03, CNN/Associated Press
Posted: 2007-04-04 14:46:16
http://www.cnn.com/2007/HEALTH/conditions/04/03/tuberculosis.confinement.ap

Behind the county hospital's tall cinderblock walls, a 27-year-old tuberculosis patient ... sits in a jail cell equipped with a ventilation system that keeps germs from escaping. Robert Daniels has been locked up indefinitely, perhaps for the rest of his life, since last July. But he has not been charged with a crime. Instead, he suffers from an extensively drug-resistant strain of tuberculosis. It is considered virtually untreatable. County health authorities obtained a court order to lock him up as a danger to the public because ... he did not heed doctors' instructions to wear a mask in public. "I'm being treated worse than an inmate," Daniels said. "I'm all alone. Four walls. Even the door to my room has been locked. I haven't seen my reflection in months." He said sheriff's deputies will not let him take a shower -- he cleans himself with wet wipes -- and have taken away his television, radio, personal phone and computer. His only visitors are masked medical staff members who come in to give him his medication. Though Daniels' confinement is extremely rare, health experts say it is a situation that U.S. public health officials may have to confront more and more because of the spread of drug-resistant TB and the emergence of diseases such as SARS and avian flu.

Note: If the above link fails, click here. What possible reason is there for taking away this man's TV, radio, cell phone, and computer? Are we being prepared for mass quarantines and imprisonment due to disease? For more, click here.


Police Log Confirms FBI Role In Arrests
2007-04-03, Washington Post
Posted: 2007-04-04 14:42:37
http://www.washingtonpost.com/wp-dyn/content/article/2007/04/02/AR20070402015...

A secret FBI intelligence unit helped detain a group of war protesters in a downtown Washington parking garage in April 2002 and interrogated some of them on videotape about their political and religious beliefs. [Washington] D.C. police said authorities only recently found the logs of police responses to that day's events. That discovery came after three years of police assurances in federal court that no such records or logs existed showing the FBI's role. The FBI and D.C. police said they had no records of such an incident. And police told a federal court that no FBI agents were present when officers arrested more than 20 protesters that afternoon for trespassing; police viewed them as suspicious for milling around the parking garage entrance. Similar intelligence-gathering operations have been reported in New York, where a local police intelligence unit tried to infiltrate groups planning to protest at the Republican National Convention in 2004, and in Colorado, where records surfaced showing that the FBI collected names and license plates of people protesting timber industry practices at a 2002 industry convention.


Japan’s Textbooks Reflect Revised History
2007-04-01, New York Times
Posted: 2007-04-04 14:37:56
http://www.nytimes.com/2007/04/01/world/asia/01japan.html?ex=1333080000&en=3f...

In another sign that Japan is pressing ahead in revising its history of World War II, new high school textbooks will no longer acknowledge that the Imperial Army was responsible for a major atrocity in Okinawa, the government announced late Friday. The Ministry of Education ordered publishers to delete passages stating that the Imperial Army ordered civilians to commit mass suicide during the Battle of Okinawa, as the island was about to fall to American troops in the final months of the war. The decision was announced as part of the ministry’s annual screening of textbooks used in all public schools. The ministry also ordered changes to other delicate issues to dovetail with government assertions, though the screening is supposed to be free of political interference. The decision on the Battle of Okinawa ... came as a surprise because the ministry had never objected to the description in the past. The fresh denial of the military’s responsibility in the Battle of Okinawa and in sexual slavery — long accepted as historical facts — is likely to deepen suspicions in Asia that Tokyo is trying to whitewash its militarist past even as it tries to raise the profile of its current forces. The ministry’s new position appeared to discount overwhelming evidence of coercion, particularly the testimony of victims and survivors themselves.

Note: History many times is written -- or in this case re-written -- by those in power.


A monstrous war crime
2007-03-28, The Guardian (One of the U.K.'s leading newspapers)
Posted: 2007-04-04 14:33:20
http://www.guardian.co.uk/Iraq/Story/0,,2044345,00.html

Our collective failure has been to take our political leaders at their word. This week the BBC reported that the government's own scientists advised ministers that the Johns Hopkins study on Iraq civilian mortality was accurate and reliable. Published in the Lancet ...it estimated that 650,000 Iraqi civilians had died since the American and British led invasion in March 2003. Immediately after publication, the prime minister's official spokesman said that the Lancet's study "was not one we believe to be anywhere near accurate". The foreign secretary ... said that the Lancet figures were "extrapolated" and a "leap". President Bush said: "I don't consider it a credible report". Scientists at the UK's Department for International Development thought differently. They concluded that the study's methods were "tried and tested". Indeed, the Johns Hopkins approach would likely lead to an "underestimation of mortality". The Ministry of Defence's chief scientific adviser ... recommended "caution in publicly criticising the study". When these recommendations went to the prime minister's advisers, they were horrified. Tony Blair was advised to say: "The overriding message is that there are no accurate or reliable figures of deaths in Iraq". At a time when we are celebrating our enlightened abolition of slavery 200 years ago, we are continuing to commit one of the worst international abuses of human rights of the past half-century. Two hundred years from now, the Iraq war will be mourned as the moment when Britain violated its delicate democratic constitution and joined the ranks of nations that use extreme pre-emptive killing as a tactic of foreign policy.

Note: This article is written by Richard Horton, the editor of the highly esteemed British medical journal Lancet.


Does Maya calendar predict 2012 apocalypse?
2007-03-28, USA Today
Posted: 2007-04-04 14:30:36
http://www.usatoday.com/tech/science/2007-03-27-maya-2012_N.htm

With humanity coming up fast on 2012, publishers are helping readers gear up and count down to this mysterious — some even call it apocalyptic — date. Since November, at least three new books on 2012 have arrived in mainstream bookstores. Journalist Lawrence Joseph forecasts widespread catastrophe in Apocalypse 2012: A Scientific Investigation Into Civilization's End. Spiritual healer Andrew Smith predicts a restoration of a "true balance between Divine Feminine and Masculine" in The Revolution of 2012. In 2012, Daniel Pinchbeck anticipates a "change in the nature of consciousness." Each arrives in the wake of the 2006 success of 2012: The Return of Quetzalcoatl, which has been selling thousands of copies a month since its release in May. The books also build on popular interest in the Maya. Authors disagree about what humankind should expect on Dec. 21, 2012, when the Maya's "Long Count" calendar marks the end of a 5,126-year era. Maya civilization, known for advanced writing, mathematics and astronomy, flourished for centuries in Mesoamerica, especially between A.D. 300 and 900. Its Long Count calendar ... tracks more than 5,000 years, then resets at year zero. Publishers seem to be courting readers who believe humanity is creating its own ecological disasters and desperately needs ancient indigenous wisdom. Part of the 2012 mystique stems from the stars. On the winter solstice in 2012, the sun will be aligned with the center of the Milky Way for the first time in about 26,000 years. This means that "whatever energy typically streams to Earth from the center of the Milky Way will indeed be disrupted on 12/21/12 at 11:11 p.m. Universal Time," Joseph writes.

Note: There are many misconceptions spreading about 2012. Some say the Mayan calendar ends in 2012, when in fact the Mayan calendar never ends. The "alautun," for example is a Mayan unit of time measure equal to over 60 million years. The claim that the sun will align with the center of the Milky way is 2012 is also a misconception. Calculations of this date are not exact, with one expert giving a date of 1998 plus or minus 18 years. Many seem to want something big to happen in 2012, when perhaps the most important time on which to focus on is this moment, right now.


My National Security Letter Gag Order
2007-03-23, Washington Post
Posted: 2007-04-04 14:24:04
http://www.washingtonpost.com/wp-dyn/content/article/2007/03/22/AR20070322018...

The Justice Department's inspector general revealed on March 9 that the FBI has been systematically abusing one of the most controversial provisions of the USA Patriot Act: the expanded power to issue "national security letters." It no doubt surprised most Americans to learn that between 2003 and 2005 the FBI issued more than 140,000 specific demands under this provision. It did not, however, come as any surprise to me. Three years ago, I received a national security letter (NSL) in my capacity as the president of a small Internet access and consulting business. The letter ordered me to provide sensitive information about one of my clients. There was no indication that a judge had reviewed or approved the letter, and it turned out that none had. The letter came with a gag provision that prohibited me from telling anyone, including my client, that the FBI was seeking this information. Based on the context of the demand -- a context that the FBI still won't let me discuss publicly -- I suspected that the FBI was abusing its power. Living under the gag order has been stressful and surreal. Under the threat of criminal prosecution, I must hide all aspects of my involvement in the case -- including the mere fact that I received an NSL -- from my colleagues, my family and my friends. When I meet with my attorneys I cannot tell my girlfriend where I am going or where I have been. I hide any papers related to the case in a place where she will not look. When clients and friends ask me whether I am the one challenging the constitutionality of the NSL statute, I have no choice but to look them in the eye and lie. At some point -- a point we passed long ago -- the secrecy itself becomes a threat to our democracy.


[N.Y.] City Police Spied Broadly Before G.O.P. Convention
2007-03-25, New York Times
Posted: 2007-03-28 12:51:05
http://www.nytimes.com/2007/03/25/nyregion/25infiltrate.html?ex=1332475200&en...

For at least a year before the 2004 Republican National Convention, teams of undercover New York City police officers traveled to cities across the country, Canada and Europe to conduct covert observations of people who planned to protest at the convention, according to police records and interviews. From Albuquerque to Montreal, San Francisco to Miami, undercover New York police officers attended meetings of political groups, posing as sympathizers or fellow activists. They made friends, shared meals, swapped e-mail messages and then filed daily reports with the department’s Intelligence Division. In hundreds of reports stamped “N.Y.P.D. Secret,” the Intelligence Division chronicled the views and plans of people who had no apparent intention of breaking the law. These included members of street theater companies, church groups and antiwar organizations. Three New York City elected officials were cited in the reports. In at least some cases, intelligence on what appeared to be lawful activity was shared with police departments in other cities. In addition to sharing information with other police departments, New York undercover officers were active themselves in at least 15 places outside New York — including California, Connecticut, Florida, Georgia, Illinois, Massachusetts, Michigan, Montreal, New Hampshire, New Mexico, Oregon, Tennessee, Texas and Washington, D.C. — and in Europe. To date, as the boundaries of the department’s expanded powers continue to be debated, police officials have provided only glimpses of its intelligence-gathering.


Classified intelligence bills often are unread
2006-08-06, Boston Globe
Posted: 2007-03-28 12:29:07
http://www.boston.com/news/nation/washington/articles/2006/08/06/classified_i...

Nearly all members of the House of Representatives opted out of a chance to read this year's classified intelligence bill, and then voted on secret provisions they knew almost nothing about. The bill, which passed by 327 to 96 in April, authorized the Bush administration's plans for fighting the war on terrorism. Many members say they faced an untenable choice: Either consent to a review process so secretive that they could never mention anything about it in House debates, under the threat of prosecution, or vote on classified provisions they knew nothing about. Most chose to know nothing. A Globe survey sent to all members of the House, [revealed] the vast majority of the respondents ... said they typically don't read the classified parts of intelligence bills. The failure to read the bill, however, calls into question the vows of many House members to provide greater oversight of intelligence. The rules make open debate on intelligence policy and funding nearly impossible, lawmakers say. Revealing classified secrets has long been a crime, punishable by expulsion from the House and criminal prosecution. Operating largely in secret, the intelligence panels have a limited staff because of the security clearances involved. Further, committee members can't go to outside experts to vet policies or give advice, leaving members with no way to fact-check the administration's assertions. Democratic and Republican leaders are no longer briefed together, raising questions about whether the two leaders are being told the same things.

Note: If above link fails, click here. If you want to understand how U.S. Congressional representatives are kept in the dark and easily manipulated when it comes to intelligence matters, this article is a must read.


To Fill His Shoes, Mr. Bernanke, Learn to Dance
2005-10-30, Washington Post
Posted: 2007-03-18 09:21:38
http://www.washingtonpost.com/wp-dyn/content/article/2005/10/28/AR20051028024...

In his 18 years as chairman of the Federal Reserve, Greenspan has occasionally drawn criticism, but no one disputes his technical prowess or sniffs at his track record of low inflation and steady, almost uninterrupted growth. Enter Ben S. Bernanke, President Bush's nominee to take Greenspan's place. The former Princeton economics professor is currently the chairman of the president's Council of Economic Advisers. The following are excerpts from [a speech] by Ben S. Bernanke. "On Milton Friedman's Ninetieth Birthday," Nov. 8, 2002: "I first read 'A Monetary History of the United States' early in my graduate school years at M.I.T. I was hooked, and I have been a student of monetary economics and economic history ever since. Friedman and [his co-author Anna J.] Schwartz made the case that the economic collapse of 1929-33 was the product of the nation's monetary mechanism gone wrong. What I take from their work is the idea that monetary forces, particularly if unleashed in a destabilizing direction, can be extremely powerful. "I would like to say to Milton and Anna: Regarding the Great Depression. You're right, we did it. We're very sorry. But thanks to you, we won't do it again."

Note: The chairman of the Federal Reserve Board admits here that the Federal Reserve caused the Great Depression. The Federal Reserve is owned by powerful private banks. It was created in 1913 largely in secrecy and fought by many who understood the dangers involved. For more reliable information on this, click here.


Did LBJ Cover For Israel?
2003-10-23, CBS News/Associated Press
Posted: 2007-03-18 09:19:33
http://www.cbsnews.com/stories/2003/10/23/national/main579649.shtml

A former Navy attorney who helped lead the military investigation of the 1967 Israeli attack on the USS Liberty that killed 34 American servicemen says former President Lyndon Johnson and his defense secretary, Robert McNamara, ordered that the inquiry conclude the incident was an accident. Retired Capt. Ward Boston said Johnson and McNamara told those heading the Navy's inquiry to "conclude that the attack was a case of 'mistaken identity' despite overwhelming evidence to the contrary." Boston was senior legal counsel to the Navy's original 1967 review of the attack. He said in the sworn statement that he stayed silent for years because ... "when orders come ... I follow them." The USS Liberty was an electronic intelligence-gathering ship that was cruising international waters off the Egyptian coast on June 8, 1967. Israeli planes and torpedo boats opened fire on the Liberty. It was "one of the classic all-American cover-ups," said Ret. Adm. Thomas Moorer, a former Joint Chiefs of Staff chairman who spent a year investigating the attack as part of an independent panel he formed with other former military officials. The panel also included a former U.S. ambassador to Saudi Arabia, James Akins. David Lewis of Lemington, Vt., was on the Liberty when it was attacked. In an interview, he said Israel had to know it was targeting an American ship. He said a U.S. flag was flying that day and Israel shot it full of holes. The sailors on the ship, he said, quickly hoisted another American flag, a much bigger one, to show Israel it was a U.S. vessel.

Note: For lots more on this major cover-up by a U.S. president and top military officers, click here. ABC producer James Bamford, who exposed the Operation Northwoods cover-up, also has an excellent chapter on this event in his highly revealing book, Body of Secrets, about the National Security Agency.


Call to reopen Oklahoma bomb case
2007-03-02, BBC News
Posted: 2007-03-10 23:20:26
http://news.bbc.co.uk/2/hi/programmes/6275147.stm

The FBI man in charge of collecting evidence from the government building destroyed by the Oklahoma bomb has called for the case to be reopened. Former deputy assistant director Danny Coulson ... said a federal grand jury is now needed to find out what really happened. He argues this is the only way to prove whether other people were involved in the bombing in a wider conspiracy beyond Timothy McVeigh and Terry Nichols. Mr Coulson spent 31 years in the FBI. Between 1991 and 1997 he was the deputy assistant director of the Criminal Division of the FBI in Washington, responsible for all violent crime cases in the United States. Mr Coulson said there were some "very strong indicators" that other people were involved with Timothy McVeigh. The FBI interviewed 24 people who claimed to have seen McVeigh in Oklahoma City with someone else on the morning of the attack, yet the only known accomplice of McVeigh, Terry Nichols, was at home in Kansas over 200 miles away on that day. The FBI's investigation concluded that the eyewitnesses were unreliable. However, Danny Coulson says they were "extremely credible" and had no reason to make it up. "If only one person had seen it, or two of three, but 24?" he said. "I know FBI headquarters told [agents] to close down the investigation in Elohim City which has some very significant connections to Mr McVeigh. "Never in my career did I have FBI headquarters tell me not to investigate something." Last December a US Congressional report found no conclusive evidence of a wider conspiracy, but the report concluded that "questions remain unanswered and mysteries remain unsolved."

Note: Don't miss a highly revealing four-minute video-clip showing live media coverage of the Oklahoma City bomb available here. The official story is that one truck with a huge bomb was parked in front of the Oklahoma City federal building and only Timothy McVeigh and his partner were involved. The news footage proves that others must have been involved, as multiple unexploded bombs were recovered from points inside the building. Yet none of this was questioned in later testimony.


Going to Canada? Check your past
2007-02-23, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2007-03-02 14:16:50
http://sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/02/23/MNGCAO9NSB1.DTL

Welcome to the new world of border security. Unsuspecting Americans are turning up at the Canadian border expecting clear sailing, only to find that their past -- sometimes their distant past -- is suddenly an issue. There was a time not long ago when a trip across the border from the United States to Canada was accomplished with a wink and a wave of a driver's license. Those days are over. Take the case of 55-year-old Lake Tahoe resident Greg Felsch. Stopped at the border in Vancouver this month at the start of a planned five-day ski trip, he was sent back to the United States because of a DUI conviction seven years ago. Not that he had any idea what was going on when he was told at customs: "Your next stop is immigration." Felsch was ushered into a room. "There must have been 75 people in line," he says. "We were there for three hours. One woman was in tears. A guy was sent back for having a medical marijuana card. I felt like a felon with an ankle bracelet." Or ask the well-to-do East Bay couple who flew to British Columbia this month for an eight-day ski vacation at the famed Whistler Chateau, where rooms run to $500 a night. They'd made the trip many times, but were surprised at the border to be told that the husband would have to report to "secondary" immigration. There, in a room he estimates was filled with 60 other concerned travelers, he was told he was "a person who was inadmissible to Canada." The problem? A conviction for marijuana possession ... in 1975. This is just the beginning. Soon other nations will be able to look into your past when you want to travel there.


Merck Suspends Lobbying for Vaccine
2007-02-21, CBS News/Associated Press
Posted: 2007-02-22 23:20:43
http://www.cbsnews.com/stories/2007/02/21/ap/business/mainD8NDU4AG0.shtml

Pediatricians, gynecologists and even health insurers all call Gardasil, the first vaccine to prevent cervical cancer, a big medical advance. But medical groups, politicians and parents began rebelling after disclosure of a behind-the-scenes lobbying campaign by Gardasil's maker, Merck & Co., to get state legislatures to require 11- and 12-year-old girls to get the three-dose vaccine as a requirement for school attendance. Some parents' groups and doctors particularly objected because the vaccine protects against a sexually transmitted disease. Vaccines mandated for school attendance usually are for diseases easily spread through casual contact, such as measles and mumps. Bowing to pressure, Merck said Tuesday that it is immediately suspending its controversial campaign, which it had funded through a third party. Legislatures in roughly 20 states have introduced measures that would mandate girls have the vaccine to attend school. Texas Gov. Rick Perry on Feb. 2 issued an executive order requiring Texas girls entering the sixth grade as of 2008 get the vaccinations. Dr. Anne Francis, who chairs an American Academy of Pediatrics committee [stated] "I believe that their timing was a little bit premature," she said, "so soon after (Gardasil's) release, before we have a picture of whether there are going to be any untoward side effects." The country has been "burned" by some drugs whose serious side effects emerged only after they were in wide use, including Merck's withdrawn painkiller Vioxx. The vaccine also is controversial because of its price - $360 for the three doses required.

Note: $360 for every girl in school would amount to quite a hefty transfer of funds from taxpayers into the pockets of Merck. Could profit and campaign contributions be behind the move to make this mandatory?


Texas Governor Defends Vaccine Order
2007-02-22, MSNBC/Associated Press
Posted: 2007-02-22 23:18:37
http://news.moneycentral.msn.com/provider/providerarticle.aspx?feed=AP&Date=2...

Gov. Rick Perry on Thursday angrily defended his relationship with Merck & Co. and his executive order requiring that schoolgirls receive the drugmaker's vaccine against the sexually transmitted cervical-cancer virus. The Associated Press reported Wednesday that Perry's chief of staff had met with key aides about the vaccine on Oct. 16, the same day Merck's political action committee donated $5,000 to the governor's campaign. In issuing the order, the governor made Texas the first state to require the vaccine Gardasil for all schoolgirls. But many lawmakers have complained about his bypassing the Legislature altogether. The executive order has inflamed conservatives, who said it contradicts Texas' abstinence-only sexual education policies and intrudes into families' lives. Critics have previously questioned Perry's ties to Merck. Mike Toomey, Perry's former chief of staff, now lobbies for the drug company. And the governor accepted a total of $6,000 from Merck during his re-election campaign. Merck has waged a behind-the-scenes lobbying campaign to get state legislatures to require girls to get the three-dose vaccine to enroll in school. But on Tuesday the pharmaceutical company announced it was suspending the effort because of pressure from parents and medical groups. The Kentucky House on Thurday passed a bill that would require the vaccination for middle school girls unless their parents sign a form opposing it. Virginia lawmakers have also passed legislation requiring the vaccine, but the governor has not decided if he will sign it.

Note: The drug company lobby is the most powerful in the U.S., as reported by the former editor-in-chief of one of the most respected medical journals in the U.S. Click here for more.


An Orwellian solution to kids skipping school
2007-02-20, Atlanta Journal-Constitution (Atlanta's leading newspaper)
Posted: 2007-02-22 23:14:49
http://www.ajc.com/opinion/content/opinion/stories/2007/02/19/0220truants.html

Let's say your teenager is a habitual truant and there is nothing you can do about it. A Washington area politician thinks he might have the solution: Fit the child with a Global Positioning System chip, then have police track him down. "It allows them to get caught easier," said Maryland Delegate Doyle Niemann (D-Prince George's), who recently co-sponsored legislation in the House that would use electronic surveillance as part of a broader truancy reduction plan. "It's going to be done unobtrusively. The chips are tiny and can be put into a hospital ID band or a necklace." Niemann's legislation mirrors a bill sponsored by state Sen. Gwendolyn Britt (D-Prince George's). Both would provide truants and their parents with better access to social services, such as mental health evaluations and help with schoolwork. Electronic monitoring would be a last resort. Still, the prospect of tagging children and using them in some "catch and release" hunt by police casts a pall over everything that's good about the plan. Odd how billions and billions of dollars keep going to a war that almost nobody wants, but there's never enough to fund the educational programs that nearly everybody says are needed. Aimed solely at students in Prince George's — the only predominantly black county in the Washington area — the truancy effort is called a "pilot program," a first-of-its-kind experiment. It would cost $400,000 to keep track of about 660 students a year.

Note: For more reliable information on the push to microchip the entire population, click here.


Making Martial Law Easier
2007-02-19, New York Times
Posted: 2007-02-22 23:13:02
http://www.nytimes.com/2007/02/19/opinion/19mon3.html?ex=1329541200&en=b63c90...

A disturbing recent phenomenon in Washington is that laws that strike to the heart of American democracy have been passed in the dead of night. So it was with a provision quietly tucked into the enormous defense budget bill at the Bush administration’s behest that makes it easier for a president to override local control of law enforcement and declare martial law. The provision, signed into law in October, weakens two obscure but important bulwarks of liberty. One is the doctrine that bars military forces, including a federalized National Guard, from engaging in law enforcement. The other is the Insurrection Act of 1807, which ... essentially limits a president’s use of the military in law enforcement to putting down lawlessness, insurrection and rebellion, where a state is violating federal law or depriving people of constitutional rights. The newly enacted provisions upset this careful balance. The president may now use military troops as a domestic police force in response to a natural disaster, a disease outbreak, terrorist attack or to any “other condition.” Changes of this magnitude should be made only after a thorough public airing. But these new presidential powers were slipped into the law without hearings or public debate. The president made no mention of the changes when he signed the measure, and neither the White House nor Congress consulted in advance with the nation’s governors.


Italy indicts 31 in alleged CIA kidnapping
2007-02-16, MSNBC/Associated Press
Posted: 2007-02-22 23:02:27
http://www.msnbc.msn.com/id/17184663

A judge Friday indicted 26 Americans and five Italians in the abduction of an Egyptian terror suspect on a Milan street in what would be the first criminal trial stemming from the CIA’s extraordinary rendition program. Prosecutors allege that five Italian intelligence officials worked with the Americans to seize Muslim cleric Osama Moustafa Hassan Nasr on Feb. 17, 2003. Nasr was allegedly transferred by vehicle to the Aviano Air Force base near Venice, then by air to the Ramstein Air Base in Germany, and on to Egypt, where his lawyer says he was tortured. Nasr was freed earlier this week by an Egyptian court that found his four years of detention in Egypt “unfounded.” All but one of the Americans have been identified as CIA agents, including the former Milan station chief Robert Seldon Lady and former Rome station chief Jeffrey Castelli. Among the Italians indicted by Judge Caterina Interlandi was the former chief of military intelligence, Nicolo Pollari, and his former deputy, Marco Mancini. The CIA has refused to comment on the case, which has put an uncomfortable spotlight on its operations. Prosecutors are pressing the Italian government to seek the extradition of the Americans. In Italy, defendants can be tried in absentia. Prosecutors elsewhere in Europe are moving ahead with cases aimed at the CIA program. A Munich prosecutor recently issued arrest warrants for 13 people in another alleged CIA-orchestrated kidnapping, that of a German citizen who says he was seized in December 2003 at the Serbian-Macedonia border and flown to Afghanistan.

Note: At long last, the CIA is beginning to be held accountable for flagrantly breaking laws resulting in torture.


Carlyle Changes Its Stripes
2007-02-12, BusinessWeek
Posted: 2007-02-22 22:53:31
http://www.businessweek.com/magazine/content/07_07/b4021001.htm

In the two decades since private equity firms first stormed the business world, they've been called a lot of things, from raiders to barbarians. But only [the Carlyle Group] has been tagged in the popular imagination with warmongering, treason, and acting as cold-eyed architects of government conspiracies. Carlyle, founded 20 years ago in the shadow of Washington's power centers, long went about its business far from the public eye. Its ranks were larded with the politically connected, including former Presidents, Cabinet members, even former British Prime Minister John Major. It used its partners' collective relationships to build a lucrative business buying, transforming, and selling companies -- particularly defense companies that did business with governments. Carlyle's radical makeover has turned the firm into the biggest fund-raising juggernaut the private equity world has ever seen. By the end of this year it expects to have an unprecedented $85 billion in investor commitments under management, up sixfold from 2001 and more than any other firm. [Founder David] Rubenstein sees the total swelling to as much as $300 billion by 2012. Make no mistake -- Carlyle is already massive. It owns nearly 200 companies that generate a combined $68 billion in revenue and employ 200,000 people. Last year it bought a new company approximately once every three days and sold one almost once a week -- all while dabbling in increasingly esoteric investments. Since its founding in 1987 it has generated annualized after-fee returns of 26%, compared with the industry average in the mid-teens.

Note: With former presidents including George H.W. Bush and many other top world politicians helping to sway huge military contracts, could this be considered a form of insider trading? Those 26% yearly returns are placing our tax monies in the hands of individuals and companies that are already among the wealthiest in the world. For lots more on manipulation of your tax money, click here. And for a Washington Post article showing Osama Bin Laden's brother met with George H.W. Bush at a Carlyle meeting one day before 9/11, click here.


No Boundaries
2005-06-09, CNN News
Posted: 2007-02-22 22:50:57
http://transcripts.cnn.com/TRANSCRIPTS/0506/09/ldt.01.html

A panel sponsored by the Council on Foreign Relations wants the United States to focus not on the defense of our own borders, but rather create what effectively would be a common border that includes Mexico and Canada. CHRISTINE ROMANS, CNN CORRESPONDENT: On Capitol Hill, testimony [is] calling for Americans to start thinking like citizens of North America and treat the U.S., Mexico and Canada like one big country. That's the view in a report called "Building a North American Community." It envisions a common border around the U.S., Mexico and Canada in just five years, a border pass for residents of the three countries, and a freer flow of goods and people. [Task force member Robert] PASTOR: What we hope to accomplish by 2010 is a common external tariff which will mean that goods can move easily across the border. We want a common security perimeter around all of North America. ROMANS: Security experts say folding Mexico and Canada into the U.S. is a grave breach of that sovereignty. [The report calls for] temporary migrant worker programs expanded with full mobility of labor between the three countries in the next five years. The idea here is to make North America more like the European Union. [CNN Anchor Lou] DOBBS: Americans must think that our political and academic elites have gone utterly mad at a time when three-and-a-half years, approaching four years after September 11, we still don't have border security. And this group of elites is talking about not defending our borders, finally, but rather creating new ones. It's astonishing.

Note: This agenda is being promoted in key political forums with practically no media reporting. For one of the few media articles reporting on this important topic, click here.


Former top CIA official, contractor indicted
2007-02-13, MSNBC News/Associated Press
Posted: 2007-02-15 11:54:04
http://www.msnbc.msn.com/id/17134253

The CIA’s former No. 3 official and a defense contractor were charged Tuesday with fraud and other offenses in the corruption investigation that sent former Rep. Randy “Duke” Cunningham to prison. Federal indictments named Kyle “Dusty” Foggo, executive director of the CIA until he resigned in May, and his close friend, San Diego defense contractor Brent Wilkes, both 52, according to two government officials who spoke on condition of anonymity. One of the officials said the grand jury heard claims that Foggo joined Wilkes on trips to Hawaii and Scotland, and was introduced to Wilkes’ employees as early as 2003 as a “future executive” of Wilkes’ company, Wilkes Corp., which allegedly received $12 million in illicit contracts from various government agencies. Cunningham, an eight-term Republican, served on the House Intelligence Committee and on the defense subcommittee of the Appropriations Committee — assignments that made him a key figure in the awarding of Pentagon contracts. Cunningham pleaded guilty in November 2005 to taking $2.4 million in bribes from defense contractors and others, including mortgage payments and a yacht he named “Duke-Stir.” The indictments paint a stunning picture of corruption in Washington. The alleged crimes by Cunningham and defense contractors is, according to the U.S. Attorney in San Diego, "breathtaking in scope." Foggo was named executive director of the CIA in 2004, responsible for running the agency’s day-to-day operations. He retired in May while under investigation by the FBI, the Internal Revenue Service, the Pentagon, the CIA and the U.S. attorney’s office in San Diego.

Note: This is very encouraging news as the once "untouchable" CIA is finally being subject to some of the same laws and justice as the rest of us.


Ousted U.S. attorneys received positive job evaluations
2007-02-12, San Jose Mercury News
Posted: 2007-02-15 11:49:14
http://www.mercurynews.com/mld/mercurynews/news/politics/16683938.htm

Although the Bush administration has said that six U.S. attorneys were fired recently in part because of "performance related" issues, at least five of them received positive job evaluations before they were ordered to step down. Attorney General Alberto Gonzales, using authority he gained in March from a little-noticed provision of the Patriot Act, has appointed interim U.S. attorneys from the Bush administration's inner circle. Daniel Bogden, the U.S. attorney in Nevada, was described in his last job performance evaluation in 2003 as being a "capable" leader who was highly regarded ... said a Justice Department official. David Iglesias, the U.S. attorney in New Mexico, also received a positive evaluation last year, according to another Justice Department official. Both officials asked not to be identified. The other U.S. attorneys who received good reviews were John McKay, the former U.S. attorney in Seattle; Paul Charlton, the former U.S. attorney in Arizona; and Carol Lam, the current U.S. attorney in San Diego. The decision to fire the U.S. attorneys came under scrutiny late last month after Senate Democrats discovered a change in the Patriot Act that allowed Gonzales to appoint interim U.S. attorneys for indefinite terms without Senate approval. In testimony to the Senate Judiciary Committee last week, [Deputy Attorney General Paul] McNulty conceded that H.E. "Bud" Cummins, the former U.S. attorney in Arkansas, wasn't fired because of how he handled his job. Rather, McNulty said, administration officials wanted to make room for Timothy Griffin, a former aide of presidential adviser Karl Rove.

Note: To read a related Associated Press article on U.S. Attorney General Gonzalez, click here. The article starts with "Attorney General Alberto Gonzales criticized federal judges ... for ruling on cases that affect national-security policy. Judges, he contended, are unqualified to decide terrorism issues that he said are best settled by Congress or the president." Isn't that negating the balance of powers laid out in the U.S. Constitution?


The new Jewish question
2007-02-11, The Observer (One of the U.K.'s leading newspapers)
Posted: 2007-02-15 11:45:00
http://observer.guardian.co.uk/review/story/0,,2010212,00.html

A furious row has been raging in the international Jewish community over the rights and wrongs of criticising Israel. At its centre is a British historian [Tony Judt] who accuses his fellow Jews in the US of stifling any debate about Israel. His opponents say his views give succour to anti-Semites. In an essay written by the Holocaust scholar Alvin Rosenfeld and published by the American Jewish Committee, Judt's views - and those of other 'progressive Jews' ... were expressly linked to anti-Semitism. That row was reported in the New York Times, giving it an unprecedented prominence, and since then the story has opened the floodgates of a debate that until now has been shrouded in fear. Americans have long been in the grip of a cultural taboo that is characterised by Judt as follows: 'All Jews are silenced by the requirement to be supportive of Israel, and all non-Jews are silenced by the fear of being thought anti-Semitic, and there is no conversation on the subject.' [A] new forum for dissent ... was launched in Britain last week by an eminent group. In launching its manifesto, Independent Jewish Voices has taken the 40th anniversary of the occupation of the West Bank and Gaza Strip as an occasion to create 'a climate and a space in which Jews of different affiliations and persuasions can express their opinions about the actions of the Israeli government without being accused of disloyalty or ... self-hating.' One of its founding principles is: 'The battle against anti-Semitism is vital and is undermined whenever opposition to Israeli government policies is automatically branded as anti-Semitic.'


An explosion of disbelief - fresh doubts over 9/11
2007-02-09, The Daily Mail (The U.K.'s second most popular newspaper)
Posted: 2007-02-15 11:42:03
http://www.dailymail.co.uk/pages/live/articles/news/worldnews.html?in_article...

A recent poll by the respected New York Times revealed that three out of four Americans now suspect the U.S. government of not telling the truth about 9/11. This proportion has shot up from a year ago, when half the population said they did not believe the official story. [The] accepted version of what happened on 9/11 is being challenged by a 90-minute internet movie, [Loose Change, which is] so popular that up to 100 million viewers have watched [it]. Why were no military aircraft scrambled in time to head off the attacks? How could a rookie pilot - as one of the terrorists was - fly a Boeing 757 aircraft so precisely into the Pentagon? The movie's assertions are being explored by a number of commentators in America and Britain. Former Labour Cabinet Minister Michael Meacher ... has said of 9/11: "Never in modern history has an event of such cataclysmic significance been shrouded in such mystery." These words were written in a foreword for Professor David Ray Griffin's bestselling book, The New Pearl Harbour. Griffin ... is emeritus professor at the Claremont School of Theology in California and a respected philosopher. Together, the book and the movie have raised the question: could the attack be a carbon copy of Operation Northwoods, an aborted plan by President Kennedy to stage terror attacks in America and blame them on Communist Cuba as a pretext for a U.S. invasion to overthrow Fidel Castro? Initially ... Professor Griffin dismissed claims the attacks could have been an inside job. It was only a year later ... that the professor was sent a 'timeline' on the day's events based entirely on newspaper and television accounts. It was then that he changed his mind.

Note: The timeline which opened Prof. Griffin's eyes was the two-page 9/11 timeline from WantToKnow.info available at http://www.WantToKnow.info/9-11cover-up. This is the most supportive article yet by the mainstream media. The word is spreading. For lots more reliable, verifiable information on 9/11, click here.


Dr. Ecstasy
2005-01-30, New York Times
Posted: 2007-02-15 11:36:57
http://www.nytimes.com/2005/01/30/magazine/30ECSTASY.html?ex=1264914000&en=0b...

By [Alexander] Shulgin's own count, he has created nearly 200 psychedelic compounds, among them stimulants, depressants, aphrodisiacs, ''empathogens,'' [and] convulsants. And in 1976, Shulgin fished an obscure chemical called MDMA out of the depths of the chemical literature and introduced it to the wider world, where it came to be known as Ecstasy. Most of the scientific community considers Shulgin at best a curiosity and at worst a menace. Now, however, near the end of his career, his faith in the potential of psychedelics has at least a chance at vindication. A little more than a month ago, the [FDA] approved a Harvard Medical School study looking at whether MDMA can alleviate the fear and anxiety of terminal cancer patients. And next month will mark a year since [the start of a] study of Ecstasy-assisted therapy for post-traumatic stress disorder. Shulgin's knack for befriending the right people hasn't hurt. A week after I visited him, he was headed to Sonoma County for the annual ''summer encampment'' of the Bohemian Club, an exclusive, secretive San Francisco-based men's club that has counted every Republican president since Herbert Hoover among its members. For a long time, though, Shulgin's most helpful relationship was with the D.E.A. itself. The head of the D.E.A.'s Western Laboratory, Bob Sager, was one of his closest friends. In his office, Shulgin has several plaques awarded to him by the agency for his service. Shulgin has been credited with jump-starting today's therapeutic research.

Note: The sentence about the Bohemian Club is a very rare revelation in the major media on the influence of this secret society. For lots more reliable, verifiable information on secret societies, click here.


U.S. Issues Guidelines in Case of Flu Pandemic
2007-02-01, New York Times
Posted: 2007-02-07 20:49:21
http://www.nytimes.com/2007/02/01/health/01cnd-flu.html?ex=1327986000&en=0815...

Cities should close schools for up to three months in the event of a severe flu outbreak, ball games and movies should be canceled ... the federal government advised today in issuing new pandemic flu guidelines to states and cities. Health officials acknowledged that such measures would hugely disrupt public life, but they argued that these measure would buy the time needed to produce vaccines and would save lives. “We have to be prepared for a Category 5 pandemic,” said Dr. Martin Cetron, director of global migration and quarantine for the Centers for Disease Control and Prevention. “It’s not easy. The only thing that’s harder is facing the consequences.” The new guidelines also advocate having sick people and all their families' even apparently healthy members stay home for 7 to 10 days. Any pandemic is expected to move faster than a new vaccine can be produced. Current experimental vaccines against H5N1 avian flu are in short supply and based on strains isolated in 2004 or 2005. Although the government is creating a $4 billion stockpile of the antiviral drug Tamiflu, it is only useful when taken within the first 48 hours, and Tamiflu-resistant flu strains have already been found. The historian John Barry, author of “The Great Influenza,” a history of the 1918 flu, questioned an idea underpinning the study’s conclusions. There is evidence, he said, that some cities with low sickness and death rates in 1918 ... were hit by a milder spring wave of the virus. That would have, in effect, inoculated their citizens against the more severe fall wave and might have been more important than their public health measures.

Note: Why is it that government officials seem to want us to be afraid? Could it be that when we live in fear, we are more willing to give up our freedoms and money and allow them to be in control? For more, click here. And why would the government spend billions on stockpiling drugs of questionable use? For an answer, click here.


The people who control the world
2003-01-30, CNN
Posted: 2007-02-07 20:39:54
http://www.cnn.com/2003/SHOWBIZ/books/01/30/ronson.them

The Middle Ages had the Knights Templar. The 18th century had the Masons and the Illuminati. Our modern age has golf-playing businessmen. [Jon] Ronson, a 35-year-old British writer, humorist and documentarian, kept reading and hearing about the "tiny elite [that] rules the world from inside a secret room" -- so he decided to go in search of it. He met with extremists of many stripes: Ku Klux Klansmen with a PR bent, Muslim rabble-rousers ... and others convinced that a New World Order meant the end of the world. He sought out the industrialists of groups such as the Bilderberg Group and Bohemian Grove. He wrote about his experiences in "Them." Ronson's extremists seem rather normal. Some are very much aware of how their views marginalize them. The people of "Them" are people who are all too human -- even if they would deny others their humanity. As the saying goes, just because you're paranoid doesn't mean someone's not out to get you. Ronson doesn't deny that many of the extremists in "Them" are, well, extreme. Many have put together half-baked theories that blame the troubles of the world on wealthy businessmen, usually a code word for Jews. Ronson, who's Jewish himself, sometimes found it awkward to listen to their views. Conspiracy theorists tend to be fearful, less educated, less tied in to the power structure. Meanwhile, the leaders of corporations and countries do meet as part of conferences sponsored by organizations such as the Trilateral Commission and the Bilderberg Group. While researching a Bilderberg Group meeting, [Ronson] was chased through parts of Portugal by shadowy security men. He found out just how thin the membrane between "us" and "them" may be.

Note: Them is by far the most balanced, entertaining book you are likely to find on conspiracy theorists. It pokes a lot of fun both at the conspiracy theorists and at the powerful secret groups which he finds to be deluded almost as much as the conspiracy theorists themselves.


Rise and shine: Wake up to an enhanced life
2007-01-25, CNN News
Posted: 2007-01-31 18:17:34
http://www.cnn.com/2007/TECH/science/01/25/ft.newdrugs

A new breed of lifestyle drugs could allow us to choose how much we sleep, boost our memories and even allow us to enjoy ourselves more, without any side effects. Will they unleash human capabilities never seen before or create a dystopian 24-hour society where we are dependent on drugs to regulate our lifestyle and behavior? One drug already available is modafinil, marketed as the vaguely Orwellian-sounding Provigil. It enables those who take it to stay awake and alert for 48 hours. It is a eugeroic that delivers a feeling of wakefulness without the physical or mental jitter. There is already a market for it for those without any medical need - it is developing a cult following among workaholics and students studying for exams. The military is also very interested in eugeroic. Their reliance on amphetamines for lengthy operations have had catastrophic consequences in the past. The "friendly-fire" incidents in Afghanistan in 2002 when U.S. pilots killed Canadian troops was blamed on the "go pills" they had taken. The U.S. Defense Advanced Research Projects Agency (DARPA) tested a compound called CX717 in its quest to find a drug that can create a "metabolically dominant war-fighter of the future" able to function for seven days without sleep. CX717 is an ampakine, a compound that increases the brains computing powers. It re-writes the rules of what it takes to create a memory and just how strong those memories can be. Will cans of soda containing eugeroics or ampakines be as common as caffeine drinks on the shelves of 24-hour stores? The potential is certainly there for a brave new world of personality medication.


A New Way to Fight Cancer?
2007-01-23, Newsweek
Posted: 2007-01-31 18:00:30
http://www.newsweek.com/2007/02/22/a-new-way-to-fight-cancer.html

There are no magic bullets in the fight against cancer: that's the first thing every responsible scientist mentions when discussing a possible new treatment, no matter how promising. If there were a magic bullet, though, it might be something like dichloroacetate, or DCA, a drug that kills cancer cells by exploiting a fundamental weakness found in a wide range of solid tumors. So far, though, it kills them just in test tubes and in rats infected with human cancer cells; it has never been tested against cancer in living human beings. DCA ... is an existing drug whose side effects are well-studied and relatively tolerable. Also, it's a small molecule that might be able to cross the blood-brain barrier to reach otherwise intractable brain tumors. Within days after a technical paper on DCA appeared in the journal Cancer Cell last week, the lead author, Dr. Evangelos Michelakis of the University of Alberta, was deluged with calls and e-mails from prospective patients—to whom he can say only, “Hang in there.” DCA is a remarkably simple molecule. It acts in the body to promote the activity of the mitochondria. Researchers have assumed that the mitochondria in cancer cells were irreparably damaged. But Michelakis wondered if that was really true. With his colleagues he used DCA to turn back on the mitochondria in cancer cells—which promptly died. One of the great things about DCA is that it's a simple compound, in the public domain, and could be produced for pennies a dose. But that's also a problem, because big drug companies are unlikely to spend a billion dollars or so on large-scale clinical trials for a compound they can't patent.

Note: For a 2010 follow-up by Dr. Michelakis with promising results, click here and watch a 10-minute video at this link. For the DCA website, click here. Thank you Newsweek for this important article. Why haven't any other mass media reported this major story? Why aren't many millions of dollars being poured into research? Notice even Newsweek acknowledges the drug companies are not interested in finding a cure for cancer if they can't make a profit from it. Some suspect the drug companies have even suppressed cancer cures found in the past. For one amazing example of this, click here.


Mind Games
2007-01-14, Washington Post
Posted: 2007-01-24 22:18:45
http://www.washingtonpost.com/wp-dyn/content/article/2007/01/10/AR20070110013...

A community of people who believe the government is beaming voices into their minds ... may be crazy, but the Pentagon has pursued a weapon that can do just that. An academic paper written for the Air Force in the mid-1990s mentions the idea of [such] a weapon. "The signal can be a 'message from God' that can warn the enemy of impending doom, or encourage the enemy to surrender." In 2002, the Air Force Research Laboratory patented precisely such a technology: using microwaves to send words into someone's head. The patent was based on human experimentation in October 1994 at the Air Force lab, where scientists were able to transmit phrases into the heads of human subjects, albeit with marginal intelligibility. The official U.S. Air Force position is that there are no non-thermal effects of microwaves. Yet ... the military's use of weapons that employ electromagnetic radiation to create pain is well-known. In 2001, the Pentagon declassified one element of this research: the Active Denial System, a weapon that uses electromagnetic radiation to heat skin and create an intense burning sensation. While its exact range is classified, Doug Beason, an expert in directed-energy weapons, puts it at about 700 meters, and the beam cannot penetrate a number of materials, such as aluminum. Given the history of America's clandestine research, it's reasonable to assume that if the defense establishment could develop mind-control or long-distance ray weapons, it almost certainly would. And, once developed, the possibility that they might be tested on innocent civilians could not be categorically dismissed.

Note: For lots more reliable, verifiable information on the little-known, yet critical topic of nonlethal weapons, click here. For an excellent two-page summary of government mind control programs, click here.


A dangerous dose
2004-09-05, Boston Globe
Posted: 2007-01-06 06:05:32
http://www.boston.com/ae/books/articles/2004/09/05/a_dangerous_dose

Marcia Angell [is] a faculty member at the Harvard Medical School [and one of the] former editors of The New England Journal of Medicine. Her new book, "The Truth About the Drug Companies," is a sober, clear-eyed attack on the excesses of drug company power. How does the drug industry deceive us? It plies attending physicians with expense-paid junkets to St. Croix and Key West, Fla., where they are given honoraria and consulting fees to listen to promotional presentations. It promotes new or little-known diseases such as "social anxiety disorder" and "premenstrual dysphoric disorder" as a way of selling the drugs that treat them. It sets up phony front groups disguised as "patient advocacy organizations." It hires ghostwriters to produce misleading scientific articles and then pays academic physicians to sign on as authors. It sends paid lackeys and shills out onto the academic lecture circuit to ''educate" doctors about a drug's unapproved uses. It hires multinational PR firms to trumpet dubious studies as scientific breakthroughs while burying the studies that are likely to harm sales. It buys up the results of publicly funded research. It maintains a political chokehold on the American public by donating more money to political campaigns than any other industry in the country. For many years the drug industry has reaped the highest profit margins of any industry in America. In 2002, the top 10 American drug companies had profit margins of 17 percent; Pfizer, the largest, had profit margins of 26 percent. So staggeringly profitable is the drug industry that in 2002 the combined profits for the top 10 drug companies in the Fortune 500 were greater than those of all the other 490 companies combined.

Note: For an excellent 10-page summary of this revealing book written by the esteemed author, click here. For additional reliable information on the health cover-up, click here.


Who killed Nick Berg?
2004-05-29, Sydney Morning Herald
Posted: 2007-01-05 21:52:52
http://www.smh.com.au/articles/2004/05/28/1085641717320.html

Iraq in flames, Washington an object of disgust. What to do? At this pivotal moment, CNN and Fox News are tipped off to a clip of an American citizen being beheaded. The victim is ... Nick Berg.The vile deed is deemed the work of al-Qaeda. The timing of the video was brilliant for the West. Media pundits judged the crime a deeper evil than the systemic torture of innocent Iraqis. But some people sensed a rat. But if it was not al-Qaeda, who? While this video shows a human body having its head chopped off, it does not necessarily portray an act of murder. A month before the discovery of [his] corpse, Berg had been released from custody. But whose custody? Brigadier General Mark Kimmitt ... claimed he was in the custody of Iraqi police. However, the Iraqi police chief [stated] "the Iraqi police never arrested the slain American". Berg's family are certain his jailers were the US military. His father, Michael, had been told so by the FBI. He has produced an email from a US consular official ... confirming that his son was in the hands of the US. In his final moments on screen Berg is wearing an orange jumpsuit of the kind familiar from Guantanamo Bay. His white chair is identical to those in the photographs of the Abu Ghraib prison tortures. During the decapitation, starting at the front of the throat, there is little sign of blood. The scream is wildly out of sync, sounds female, and is obviously dubbed. Dr John Simpson, executive director for surgical affairs at the Royal Australasian College of Surgeons ... agrees with other experts who find it highly probable that Berg had died before his decapitation. There's something fishy about this video. In the end, the question is: who killed Nick Berg, and why?

Note: If the above link fails, click here. For a CNN article raising other serious questions on Berg, click here. For more reliable information on how government can control and manipulate public perception, click here.


Passports go electronic with new microchip
2004-12-09, Christian Science Monitor
Posted: 2007-01-05 21:22:32
http://www.csmonitor.com/2004/1209/p12s01-stct.html

The US passport is about to go electronic, with a tiny microchip embedded in its cover. The chip is the latest outpost in the battle to outwit tamperers. But it's also one that worries privacy advocates. The RFID (radio frequency identification) chip in each passport will contain the same personal data as now appear on the inside pages - name, date of birth, place of birth, issuing office - and a digitized version of the photo. But the 64K chip will be read remotely. And there's the rub. The scenario, privacy advocates say, could be as simple as you standing in line with your passport as someone walks by innocuously carrying a briefcase. Inside that case, a microchip reader could be skimming data from your passport to be used for identity theft. Or maybe authorities or terrorists want to see who's gathered in a crowd and surreptitiously survey your ID and track you. Why not choose a contact chip, where there would be no possibility of skimming, asks Barry Steinhardt, director of the ACLU's Technology and Liberty Project. "There was another way to go, which was to put an electronic strip in the passport that would require contact." The State Department says it's just following international standards set by the International Civil Aviation Organization (ICAO), under the umbrella of the United Nations. The ICAO specified the RFID ... at the behest of the United States. All countries that are part of the US visa-waiver program must use the new passports by Oct. 26, 2005. Mr. Steinhardt ... says the US pushed through the standards against the reservations of the Europeans. "Bush says at the G8 meeting, 'We have to adhere to the global standard,' as though we had nothing to do with it," he says in exasperation.

Note: If the above link fails, click here. For more on the risk of RFID chips, click here.


Warming Up to Cold Fusion
2004-11-21, Washington Post
Posted: 2007-01-05 20:26:16
http://www.washingtonpost.com/wp-dyn/articles/A54964-2004Nov16.html

Peter Hagelstein is trying to revive hope for a future of clean, inexhaustible, inexpensive energy. Fifteen years after the scientific embarrassment of the century ... a panel of scientists gathered. The panel's charge was simple: to determine whether [cold fusion] had even a prayer of a chance at working. The Department of Energy went to great lengths to cloak the meeting from public view. No announcement, no reporters. None of the names of the people attending that day was disclosed. Since 1989, hundreds of scientists working in dozens of labs around the world have claimed ... results. Supporters point to the written literature -- more than 3,000 papers -- as proof of the effect. But the most credible cold fusion advocates concede that the vast majority of those papers are of poor quality. "Brilliant," "genius" and "reclusive" were words used to describe [SRI scientist Peter] Hagelstein 20 years ago, when he rose to prominence as one of the young scientists behind President Ronald Reagan's plans to build a missile shield in outer space. Hagelstein [now] describes the mainstream scientific community as "mafias" that promote and publish their friends' work, unwilling to accept new ideas. As Hagelstein explains it, leading physicists came out swiftly and prematurely against cold fusion. Hagelstein says his acceptance of cold fusion was by no means immediate. It took several years before he was convinced. [Now] Hagelstein says, he has seen enough cold fusion data to convince him that the science is clearly real. The field's acceptance, he maintains, will be simply a matter of the scientific community's looking at the improved experimental results in the future and coming to understand them.

Note: If the above link fails, click here. Why all the secrecy around this important topic? To learn why the power elite don't want cheap energy, click here.


Professor Feels Himself Become Closer to the Machine
1998-09-23, ABC News
Posted: 2006-12-31 14:52:44
http://web.archive.org/web/20001109140100/http://more.abcnews.go.com/sections...

When Kevin Warwick enters his office building on the campus of Reading University, strange things happen. As Warwick heads down the main hall, lights turn on. When he turns to the right, an office door unbolts and opens. Each step is clocked and recorded. The building knows who he is, where he is, and what he expects to happen. The building [even] says, “Hello Professor Warwick.” The structure knows Warwick because of the electrical fuse-sized “smart card” implanted in his left arm. In Britain, he’s been dubbed “The Cyborg Man,” the first person known to have a microchip implanted in his body for communication with outside machines. Warwick predicts chip implants will one day replace time cards, criminal tracking devices, even credit cards. Capable of carrying huge amounts of data, they may, he says, one day be used to identify individuals by Social Security numbers, blood type, even their banking information. No one knows yet how the body will respond to this type of invasion. Warwick is not blind to the ethical questions of this technology. Implants ostensibly designed to clock workers in and out might be misused to monitor where people are at all times and who they are meeting. Governments could move to use implants instead of I.D. cards and passports, but what would stop them from using this new science to invade privacy? “I feel mentally different. When I am in the building I feel much more closely connected with the computer.

Note: Those who would like to control the public named these implants "smart cards" to encourage us to accept them. For more reliable information on important topic, click here and here.


Scientists Find Ways to Make Us Slaves
2004-10-17, WantToKnow.info/London Times
Posted: 2006-12-31 14:11:30
http://www.WantToKnow.info/monkeydrones

Scientists have discovered a way of manipulating a gene that turns animals into drones that do not become bored with repetitive tasks. The experiments, conducted on monkeys, are the first to demonstrate that animal behaviour can be permanently changed, turning the subjects from aggressive to "compliant" creatures. The genes are identical in humans and although the discovery could help to treat depression and other types of mental illness, it will raise images of the Epsilon caste from Aldous Huxley's futuristic novel Brave New World. The experiments... involved blocking the effect of a gene called D2 in a particular part of the brain. This cut off the link between the rhesus monkeys' motivation and reward. Instead of speeding up with the approach of a deadline or the prospect of a "treat," the monkeys in the experiment could be made to work just as enthusiastically for long periods. The scientists say the identical technique would apply to humans. [They] found that they could make the monkeys work their hardest and fastest all the time, without any complaint or sign of slacking, just by manipulating D2 so that they forgot about the expectation of reward. Methods of manipulating human physical and psychological traits are just around the corner, and the technology will emerge first as a lucrative add-on available from in vitro fertilization clinics. "There's no doubt we will be able to influence behaviour," said Julian Savulescu, a professor of ethics at Oxford University.

Note: For lots more reliable information on how human behavior is already being manipulated, click here.


Write More About Skull And Bones
2004-10-27, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2006-12-30 19:59:52
http://sfgate.com/cgi-bin/article.cgi?f=/g/a/2004/10/27/notes102704.DTL

I get this a lot: Hey Mark ... why don't you quit toeing the typical blasé journalism line ... and instead write about the real truths? Like for example how both Kerry and Bush are members of mega-yuppie Yale secret society/boys' club Skull & Bones. And why, furthermore, don't you talk about the real truths of 9/11? Haven't you seen that amazing [9/11] video on that Web site? And what about Building 7? Why did that 47-story tower adjacent to the WTC collapse when it had no fire and no plane crash? Why isn't the media reporting any of this? Does this make you laugh? Scoff? It is, after all, incredibly easy to dismiss conspiracy theories. But you know what? It's not that easy. These people ... have a point. They are indeed onto something quite large and ominous and it very much has to do with the media toeing the line of "safe" information. There is indeed ample evidence that the U.S. government, long before 9/11, had already discussed the quite plausible possibilities and strategic benefits of unleashing a "Pearl Harbor"-type event on America. There are plenty of strangely unanswered questions about 9/11, about the stunning inaction of NORAD and Bush's stupefying nonreaction upon hearing of the attack, not to mention his administration's incredible attempts to halt any independent 9/11 investigations. Of course, no one in any major media will touch this stuff. It is professional suicide to dare suggest an alternate truth to the one supplied by the Pentagon and regurgitated by the media. And the truth is, we don't really want such unstable questions answered. We simply cannot tolerate to have our world, our leaders, our foundations so questioned. We prefer stasis to growth, security to true knowledge.


Connections And Then Some
2003-03-14, Washington Post
Posted: 2006-12-30 18:54:30
http://www.washingtonpost.com/ac2/wp-dyn?pagename=article&node=&contentId=A25...

The Carlyle Group [is] an investment house famous as one of the most well-connected companies anywhere. Former president George H.W. Bush is a Carlyle adviser. Former British prime minister John Major heads its European arm. Former secretary of state James Baker is senior counselor, former White House budget chief Richard Darman is a partner, former SEC chairman Arthur Levitt is senior adviser -- the list goes on. Those associations have brought Carlyle enormous success. The Washington-based merchant bank controls nearly $14 billion in investments, making it the largest private equity manager in the world. It buys and sells whole companies the way some firms trade shares of stock. But the connections also have cost Carlyle. It has developed a reputation as the CIA of the business world -- omnipresent, powerful, a little sinister. Media outlets from the Village Voice to BusinessWeek have depicted Carlyle as manipulating the levers of government from shadowy back rooms. Congresswoman Cynthia McKinney (D-Ga.) even suggested that Carlyle's and Bush's ties to the Middle East made them somehow complicitous in the Sept. 11 terror attacks. It didn't help that as the World Trade Center burned on Sept. 11, 2001, the news interrupted a Carlyle business conference at the Ritz-Carlton Hotel here attended by a brother of Osama bin Laden. Former president Bush, a fellow investor, had been with him at the conference the previous day. Bush['s] primary function is to give speeches for Carlyle that attract wealthy foreigners in places where the former president is especially revered, such as Asia. The company has rewarded its faithful with a 36 percent average annual rate of return.

Note: If the above link fails, click here. To understand the amazingly powerful role of this low-profile, yet extremely wealthy and influential group, click here to view free a 48-minute documentary shown on Dutch national TV which clearly depicts the depths of corruption and deceit at the highest levels of government. You will be thankful that you watched this highly educational film.


The 9/11 Secret in the CIA's Back Pocket
2004-10-19, Los Angeles Times
Posted: 2006-12-30 18:07:39
http://articles.latimes.com/2004/oct/19/opinion/oe-scheer19

It is shocking: The Bush administration is suppressing a CIA report on 9/11 until after the election, and this one names names. "It is infuriating that a report which shows that high-level people were not doing their jobs in a satisfactory manner before 9/11 is being suppressed," an intelligence official who has read the report told me. [The] release of the report, which represents an exhaustive 17-month investigation by an 11-member team within the agency, has been "stalled." First by acting CIA Director John McLaughlin and now by Porter J. Goss, the former Republican House member (and chairman of the Intelligence Committee) who recently was appointed CIA chief. The official stressed that the report was more blunt and more specific than the earlier bipartisan reports produced by the Bush-appointed Sept. 11 commission and Congress. "The report found very senior-level officials responsible." By law, the only legitimate reason the CIA director has for holding back such a report is national security. None of this should surprise us given the Bush administration's great determination since 9/11 to resist any serious investigation. The president fought against the creation of the Sept. 11 commission, for example, agreeing only after enormous political pressure was applied by a grass-roots movement led by the families of those slain. And then Bush refused to testify to the commission under oath. Instead he deigned only to chat with the commission members, with Vice President Dick Cheney present, in a White House meeting in which commission members were not allowed to take notes.

Note: If the above link fails, click here. For other reliable information on the 9/11 cover-up, click here.


Uncovering an Israeli jail that specializes in nightmares
2004-06-16, Newsweek
Posted: 2006-12-30 17:15:38
http://msnbc.msn.com/id/5251751

What [Israeli historian Gad] Kroizer had discovered and later footnoted in an academic paper ... was the location of an ultrasecret jail where Israel has held Arabs in total seclusion for years, barred visits by the Red Cross and allegedly tortured inmates. Known as 1391, the facility is used as an interrogation center by a storied unit of Israel's military intelligence, whose members-all Arabic speakers-are trained to wring confessions from the toughest militants. Some of the methods are reminiscent of Abu Ghraib: nudity as a humiliation tactic, compromising photographs, sleep deprivation. In a few cases, at least, interrogators at 1391 appear to have gone beyond Israel's own hair-splitting distinction between torture and what a state commission referred to in 1987 as "moderate physical pressure." But the nightmare for those in 1391 is the isolation and the fear that no one knows where you are. The location of the compound is so hush-hush that a court this year banned a visit by an Israeli legislator. Prisoners describe being hooded everywhere at the facility except in their cells. Hassan Rawajbeh ... a member of the nearly disbanded Palestinian Preventive Security force ... was picked up by soldiers in Nablus 18 months ago. He was hooded, handcuffed and thrown on the floor of a van. When the hood was removed, he was in a tiny, windowless cell. The chamber contained no toilet, only a bucket in the corner, which ... his jailers would empty once every few weeks. A low buzzing droned constantly. For nearly four months, Rawajbeh saw no one but his interrogators, who kept him naked for days at a time and prevented him from going to the bathroom.


US seizes independent media sites
2004-10-11, BBC News
Posted: 2006-12-30 16:30:30
http://news.bbc.co.uk/1/hi/technology/3732718.stm

The FBI has shut down some 20 sites which were part of an alternative media network known as Indymedia. A US court order forced the firm hosting the material to hand over two servers in the UK used by the group. Indymedia says it is a news source for the anti-globalisation movement and other social justice issues. The reasons behind the seizure are unclear but the FBI has reportedly said the action was taken at the request of Italian and Swiss authorities. The servers affected were run by Rackspace, a US web hosting company with offices in London. It said it had received a court order from the US authorities last Thursday to hand over the computer equipment at its UK hosting facility. The reasons behind the action against the Indymedia websites are unclear. The group said the servers affected had hosted the sites of more then 20 local collectives and audio streams for several radio stations, as well as several other projects. The seizure has sparked off protests from journalist groups. "The constitution does not permit the government unilaterally to cut off the speech of an independent media outlet, especially without providing a reason or even allowing Indymedia the information necessary to contest the seizure," said EFF [Electronic Frontier Foundation] Staff Attorney Kurt Opsahl.

Note: This important news was not covered by any major U.S. media. Why? Is it a coincidence that these websites were taken down shortly after they started promoting a video clip showing President Bush may have been using an electronic hearing aid during the presidential election debates with John Kerry? Website founder Fred Burks had personal experience suggesting Bush may have used electronic feeds in high-level meetings while Burks worked as a language interpreter for him. For more, click here.


Conspiracy Theories Flourish on the Internet
2004-10-07, Washington Post
Posted: 2006-12-30 14:12:39
http://www.washingtonpost.com/wp-dyn/articles/A13059-2004Oct6.html

Darren Williams spent four weeks this summer making a short but startling video that raises novel questions about the 2001 attack. The video, "9/11: Pentagon Strike," suggests that it was not American Airlines Flight 77 that slammed into the Pentagon, but a missile or a small plane. The video offers flashes of photographs taken shortly after impact, interspersed with witness accounts. The pictures seem incompatible with damage caused by a jumbo jet. Firefighters stand outside a perfectly round hole in a Pentagon wall where the Boeing 757 punched through; it is less than 20 feet in diameter. Propelled by word of mouth, Internet search engines and e-mail, the video has been downloaded by millions of people around the world. Williams created a Web site for the video, www.pentagonstrike.co.uk. Then he e-mailed a copy to Laura Knight-Jadczyk [who] posted a link to the video on the group's Web site, www.Cassiopaea.org. Within 36 hours, Williams's site collapsed under the crush of tens of thousands of visitors. But there were others to fill the void. In Texas, a former casino worker who downloaded the video began drawing almost 700,000 visitors a day. In Louisiana, a young Navy specialist put the video on his personal Web page. Suddenly, the site was inundated by more than 20,000 hits. "Pentagon Strike" is just the latest and flashiest example of a growing number of Web sites, books and videos contending that something other than a commercial airliner hit the Pentagon. Knight-Jadczyk said she never imagined anyone outside her group would ever view "Pentagon Strike." "The fact everybody's been sending it to his brother and his cousin ... reflects the fact that there is a deep unease," she said.

Note: This five-minute video is well worth watching, even though it was made a few years ago. To view it free online, click here. For lots more information suggesting a major 9/11 cover-up, click here.


Camps for Citizens: Ashcroft's Hellish Vision
2004-08-14, Los Angeles Times
Posted: 2006-12-28 20:27:09
http://www.latimes.com/news/printedition/opinion/la-oe-turley14aug14.story

Atty. Gen. John Ashcroft's announced desire for camps for U.S. citizens he deems to be "enemy combatants" has moved him from merely being a political embarrassment to being a constitutional menace. Ashcroft's plan, disclosed last week but little publicized, would allow him to order the indefinite incarceration of U.S. citizens and summarily strip them of their constitutional rights and access to the courts by declaring them enemy combatants. Ashcroft hopes to use his self-made "enemy combatant" stamp for any citizen whom he deems to be part of a wider terrorist conspiracy. Aides have indicated that a "high-level committee" will recommend which citizens are to be stripped of their constitutional rights and sent to Ashcroft's new camps. Few would have imagined any attorney general seeking to reestablish such camps for citizens. We have learned from painful experience that unchecked authority, once tasted, easily becomes insatiable. We are only now getting a full vision of Ashcroft's America. Ashcroft seems to dream of a country secured from itself, neatly contained and controlled by his judgment of loyalty. For more than 200 years, security and liberty have been viewed as coexistent values. Ashcroft and his aides appear to view this relationship as lineal, where security must precede liberty. Every generation has its test of principle in which people of good faith can no longer remain silent in the face of authoritarian ambition. If we cannot join together to fight the abomination of American camps, we have already lost what we are defending.

Note: If the above link fails, click here. This aritcle was written by Jonathan Turley, a professor of constitutional law at George Washington University. Though Ashcroft resigned, the laws he crafted remain in place.


Was Use of Cell Phones on 9/11 Flights Possible?
2004-12-15, WantToKnow.info/Washington Post/SF Chronicle/Associated Press
Posted: 2006-12-28 20:10:38
http://www.WantToKnow.info/911cellphonecalls

”Once you get to a certain height, you are no longer in the range of the cellular network, because cell phone towers aren't built to project their signals that high.”

Washington Post, 12/9/04

“Today's vote by the FCC is intended to address whether technology has improved to the extent that cell phone calls now are possible above 10,000 feet -- they weren't in the past.”

San Francisco Chronicle, 12/15/04

"With television cameramen hovering, Qualcomm chief executive Irwin Jacobs sat in the front row of coach and made one of the first legal cell phone calls from a commercial jetliner. Jacobs pronounced the [brand new] technology behind the airborne phone call a success, although adding that it will be improved over the next couple years. Connections from the plane were generally good, although some calls were dropped."

USA Today/Associated Press, 7/16/04

Note: To find articles showing multiple cell phone use on Sept. 11, 2001, type "9/11" and "cell phone calls" into your favorite search engine, or click here for a Washington Post report on an alleged 30-minute uninterrupted cell phone call from Flight 93. Click here for a CNN report on another call from that flight. Tests have shown it is not possible to have an extended cell phone conversation above 10,000 feet.


Chemical Coup d'etat
2002-04-16, The Guardian (One of the U.K.'s leading newspapers)
Posted: 2006-12-27 15:39:42
http://www.guardian.co.uk/Archive/Article/0,4273,4394862,00.html

The US wants to depose the diplomat who could take away its pretext for war with Iraq. On Sunday, the US government will launch an international coup. It has been planned for a month. It will be executed quietly, and most of us won't know what is happening until it's too late. It is seeking to overthrow 60 years of multilateralism in favour of a global regime built on force. The coup begins with its attempt ... to unseat the man in charge of ridding the world of chemical weapons. If it succeeds, this will be the first time that the head of a multilateral agency will have been deposed in this manner. The coup will also shut down the peaceful options for dealing with the chemical weapons Iraq may possess, helping to ensure that war then becomes the only means of destroying them. The Organisation for the Prohibition of Chemical Weapons (OPCW) enforces the chemical weapons convention. Its director-general is a workaholic Brazilian diplomat called Jose Bustani. He has, arguably, done more in the past five years to promote world peace than anyone else on earth. His inspectors have overseen the destruction of 2 million chemical weapons and two-thirds of the world's chemical weapon facilities. In May 2000, as a tribute to his extraordinary record, Bustani was re-elected unanimously by the member states for a second five-year term. Last year Colin Powell wrote to him to thank him for his "very impressive" work. But now everything has changed. [But now] the man celebrated for his achievements has been denounced as an enemy of the people. In January, with no prior warning or explanation, the US state department asked the Brazilian government to recall him.

Note: The "coup" was successful. The New York Times, though reporting few of the details above, stated six days after the above article, "José M. Bustani ... was voted out of office today after refusing repeated demands by the United States that he step down because of his 'management style.'" For why this highly revealing story received no media coverage in the U.S., click here. For a top U.S. general's comments, click here.


Technology gets under clubbers' skin
2004-06-09, CNN News
Posted: 2006-12-27 15:19:11
http://edition.cnn.com/2004/WORLD/europe/06/09/spain.club

Queuing to get into one nightclub in Spain could soon be a thing of the past for regular customers thanks to a tiny computer chip implanted under their skin. The technology, known as a VeriChip, also means nightclubbers can leave their cash and cards at home and buy drinks using a scanner. The bill can then be paid later. Clubbers who want to join the scheme at Baja Beach Club in Barcelona pay 125 euros (about US $150) for the VeriChip -- about the size of a grain of rice -- to be implanted in their body. Then when they pass through a scanner the chip is activated and it emits a signal containing the individual's number, which is then transmitted to a secure data storage site. The club's director, Conrad Chase, said he began using the VeriChip, made by Applied Digital Solutions, in March 2004 because he needed something similar to a VIP card and wanted to provide his customers with better service. He said 10 of the club's regular customers, including himself, have been implanted with the chip, and predicted more would follow. "I know many people who want to be implanted," said Chase. "Almost everybody now has a piercing, tattoos or silicone. Why not get the chip and be original?" Chase said VeriChip could also boost security by speeding up checks at airports, for example. He denied the scheme had any drawbacks. The VeriChip is an in-house debit card and contains no personal information.

Note: Why is the media so upbeat about this? The article raises very few questions, yet seems to promote microchip implants in humans as the wave of the future for commerce.


A Real Chip On Your Shoulder
2003-07-17, CBS News/Associated Press
Posted: 2006-12-27 15:10:56
http://www.cbsnews.com/stories/2003/07/17/tech/main563819.shtml

A U.S. company launched Thursday in Mexico the sale of microchips that can be implanted under a person's skin and used to confirm everything from health history to identity. The microchips ... went on sale last year in the United States. The microchip, the size of a grain of rice, is implanted in the arm or hip and can contain information on everything from a person's blood type to their name. In a two-hour presentation, Palm Beach, Florida-based Applied Digital Solutions Inc. introduced reporters to the VeriChip and used a syringe-like device and local anesthetic to implant a sample in the right arm of employee Carlos Altamirano. “It doesn't hurt at all,” he said. “The whole process is just painless.” Antonio Aceves, the director of the Mexican company charged with distributing the chip here, said that in the first year of sales, the company hoped to implant chips in 10,000 people and ensure that at least 70 percent of all hospitals had the technology to read the devices. One chip costs $150 and has a $50 annual fee. Users can update and manage their chips' information by calling a 24-hour customer service line. The VeriChip can track subjects who are within 5 miles, but officials want to develop a new chip that can use satellite technology to track people who are farther away and may have been kidnapped. While the idea of using the chip to track people has raised privacy concerns in the United States, the idea has been popular with Mexicans. The company hopes to have the new anti-kidnapping chip developed by 2003.


FBI Chided for OKC Bomb Investigation
2006-12-25, ABC News/Associated Press
Posted: 2006-12-27 14:35:56
http://www.abcnews.go.com/Politics/wireStory?id=2749903

A two-year congressional inquiry into the Oklahoma City bombing concludes that the FBI didn't fully investigate whether other suspects may have helped Timothy McVeigh and Terry Nichols with the deadly 1995 attack, allowing questions to linger a decade later. The House International Relations investigative subcommittee [declared that] there is no conclusive evidence of a foreign connection to the attack, but that far too many unanswered questions remain. The report also sharply criticizes the FBI for failing to be curious enough to pursue credible information that foreign or U.S. citizens may have had contact with Nichols or McVeigh and could have assisted their plot. "We did our best with limited resources, and I think we moved the understanding of this issue forward a couple of notches even though important questions remain unanswered," Rep. Dana Rohrabacher, R-Calif., the subcommittee chairman, said in an interview with The Associated Press. Rohrabacher's subcommittee saved its sharpest words for the Justice Department, saying officials there exhibited a mindset of thwarting congressional oversight and did not assist the investigation fully.

Note: Should you choose to explore the deadly Oklahoma City bombing, you will find that there are many strange inconsistencies suggesting a major cover-up. If you are interested in more, you might start here.


Live rats driven by remote control
2002-05-05, The Guardian (One of the U.K.'s leading newspapers)
Posted: 2006-12-27 14:20:16
http://www.guardian.co.uk/international/story/0,3604,708454,00.html

Scientists have turned living rats into remote-controlled, pleasure-driven robots which can be guided up ladders, through ruins and into minefields at the click of a laptop key. The project ... is funded by the US military's research arm. Animals have often been used by humans in combat and in search and rescue, but not under direct computer-to-brain electronic control. The advent of surgically altered roborats marks the crossing of a new boundary in the mechanisation, and potential militarisation, of nature. In 10 sessions the rats learned that if they ran forward and turned left or right on cue, they would be "rewarded" with a buzz of electrically delivered pleasure. Once trained they would move instantaneously and accurately as directed, for up to an hour at a time. The rats could be steered up ladders, along narrow ledges and down ramps, up trees, and into collapsed piles of concrete rubble. Roborats fitted with cameras or other sensors could be used as search and rescue aids. In theory, be put to some unpleasant uses, such as assassination. [For] surveillance ... you could apply this to birds ... if you could fit birds with sensors and cameras. Michael Reiss, professor of science education at London's Institute of Education and a leading bioethics thinker ... said he was uneasy about humankind "subverting the autonomy" of animals. "There is a part of me that is not entirely happy with the idea of our subverting a sentient animal's own aspirations and wish to lead a life of its own."

Note: Remember that secret military projects are almost always at least a decade in advance of anything you read in the media. For lots more on this little-known subject, click here.


Bush Bones connected to Kerry Bones
2004-04-13, Boston Globe
Posted: 2006-12-24 17:41:42
http://www.boston.com/news/politics/president/kerry/articles/2004/04/13/bush_...

Skull and Bones is a shadowy, elite secret society that selects 15 new members each year from the senior class at Yale. It is known both for its celebrity membership - past "taps'' include William F. Buckley Jr., President William Howard Taft, and Henry Luce, the founder of Time magazine - and for its bizarre rituals. The rites - said to include a "blood''-drinking initiation and oodles of frank sex talk by the once all-male undergrads (Bones started admitting women in 1992) - are much discussed but little known. This is, after all, a secret society. In her 2002 book, "Secrets of the Tomb,'' Alexandra Robbins speculated that the 2004 presidential election might pit Bonesman George W. Bush (Yale, 1968) against Bonesman John F. Kerry (Yale, 1966.) Good call! This organization [was] once deemed to be so secretive that members had to leave the room if the society's name was ever mentioned in public. Both Bush's father and his grandfather, Senator Prescott Bush, were Bonesmen. [Bonesman John Kerry's] second wife's first husband, the late senator John Heinz, was Bones, as was his father. GWB: "My senior year I joined Skull and Bones, a secret society, so secret I can't say anything more" (from his 1999 campaign biography). JFK [John Kerry]: "There's not much I can say, Tim, because it's a secret" (to Tim Russert on "Meet the Press").

Note: If secret societies produce this many influential leaders, shouldn't the public have a right to know more about them? For lots more, click here.


'Bonesmen' for president
2004-03-10, MSNBC News
Posted: 2006-12-24 17:18:26
http://www.msnbc.msn.com/id/4500423

Pres. Bush and John Kerry were both members of the secret organization. ‘Skull and Bones’ dates to 1832. It was in fact a reaction to a secret society, the Masons. Founder William Huntington Russell thought of his little enclave as sort of anti-Masons and as a home for the wealthy and the powerful ... who would do anything for another Bonesman. Each year, 15 young undergraduate seniors are tapped for membership. Members of ‘Skull and Bones’ gather on High Street in the Yale campus at the tomb. New members, the neophytes, are expected to do things like lie in coffins, wrestle in mud, kiss a skull, and confess their sexual histories in front of the group to bond themselves together. Once you‘re in, you‘re in: ‘Skull and Bones’ is for life. There are a lot of [famous] Bonesmen ... Henry Luce, who created “TIME” magazine; Harold Stanley, founder of Morgan Stanley; William F. Buckley; Averell Harriman, long-time governor of New York. And then there are the presidents: William Howard Taft, whose father, Alphonso, had helped found the group; George Herbert Walker Bush, whose father, Prescott, was a Bonesman and a senator; the current President Bush. [And there's] John Kerry, Bonesman class of ‘66. His wife Teresa Kerry‘s first husband, John Heinz ... was ‘Skull and Bones.’ Both Bush and Kerry refused to answer ‘Meet the Press’ host Tim Russert when asked about the organization. Alexandra Robbins, author of “Secrets of the Tombs" [said] "The sole purpose of Skull and Bones is to get members into positions of power and then to have those members hire other members to prominent positions, which is something that President Bush has done."

Note: For a highly revealing, four-minute CNN News clip on Skull and Bones, click here. For other major media video clips reporting on this powerful secret society, click here. Many have claimed that secret societies have not had much influence on world politics. This article and videos raises many serious questions about this. For those interested in exploring reliable information covering the big picture of how and why these secret societies are using government-sponsored mind control programs to achieve their agenda, click here. And for other revealing media news articles on powerful secret societies, click here.


Military enforces 'Semper Fido' with microchips
2002-08-15, Christian Science Monitor
Posted: 2006-12-23 17:08:23
http://www.csmonitor.com/2002/0815/p01s04-usmi.html

Abandoned pets are a growing part of the military culture. Dogs and cats are dropped off in remote corners of the post at a rate of more than 20 a week. But the US Armed Forces are fighting back. Adopting a Big Brother approach, the military is implanting microchips in cats and dogs that live on government land – as much for animal control as for owner control. Says Fort Polk, La., Garrison Command Sgt. Maj. Ricky L. Jones of the soldier who abandons a pet, "with the chip you can't hide." Fort Polk has used the chip to track down soldiers who have abandoned their pets and forced them to pay an adoption fee. "It's a way to control our stray animal population and protect our working force, too," says Capt. Steven Baty, a veterinarian at Fort Carson, Colo., where microchipping has been mandatory since 1998. The tiny chips, the size of a grain of rice, are injected under the skin on an animal's neck and contain a bar code that can be scanned and read by humane societies and veterinary clinics nationwide. The procedure costs about $15, takes two to three seconds, and is no more painful than a typical vaccination. Microchip enforcement varies by base. At Fort Polk, La., animal controllers are part of a weekly housing patrol, joining inspectors who check to make sure lawns are cut and that soldiers aren't violating housing regulations. The animal controller carries a portable scanner and runs the wand over dogs and cats, looking for numbers to light up the small screen. If the pets don't have a microchip, soldiers are warned, and if they don't comply, their animals are taken away.

Note: The Monitor removed this article from their website. To see a copy of it on the Internet archive, click here.


'Matador' With a Radio Stops Wired Bull
1965-05-17, New York Times
Posted: 2006-12-23 16:36:20
http://select.nytimes.com/gst/abstract.html?res=F20817F9395812738DDDAE0994DD4...

The brave bull bore down on the unarmed "matador" — a scientist who had never faced a fighting bull. But the charging animal's horns never reached the man behind the heavy red cape. Moments before that could happen, Dr. Jose M. R. Delgado, the scientist, pressed a button on a small radio transmitter in his hand, and the bull braked to a halt. Then, he pressed another button on the transmitter and the bull obediently turned to the right and trotted away. The bull was obeying commands from his brain that had been called forth by electrical stimulation—by the radio signals—of certain regions in which fine wire electrodes had been painlessly implanted the day before. [Experiments] have shown, he explained, that "functions traditionally related to the psyche, such as friendliness, pleasure or verbal expression, can be induced, modified and inhibited by direct electrical stimulation of the brain." For example, he has been able to "play" monkeys and cats 'like little electronic toys" that yawn, hide, fight, play, mate and go to sleep on command. With humans under treatment for epilepsy, he has increased word output sixfold in one person, has produced severe anxiety in another, and in several others has induced feelings of profound friendliness—all by electrical stimulation of various specific regions of their brains. "I do not know why more work of this sort isn't done," he remarked recently, "because it is so economical and easy." Monkeys will learn to press a button that sends a stimulus to the brain of an enraged member of the colony and calms it down, indicating that animals can be taught to control one another's behavior.

Note: If the above link fails, click here. This article shows mind control was being developed over 50 years ago. Though this technology can be used for good purposes, it also can and secretly has been used to manipulate and control for many years. For lots of information based on released CIA documents on how mind control has been secretly used for decades to affect both individual behavior and global politics, click here and here.


Professor has nightmare vision of global positioning technology
2003-05-07, WantToKnow.info/Kansas City Star (Leading newspaper of Kansas City)
Posted: 2006-12-23 14:10:31
http://www.WantToKnow.info/030307kansascitystar

Jerome Dobson is not joking. The University of Kansas research professor, a respected leader in the field of geographic information technologies [speculates about] "geoslavery" -- a form of technological human control that could make "George Orwell's `Big Brother' nightmare ... look amateurish." He's talking about overlords electronically punishing errant workers. He's talking about the possibility of people hooked to, tracked by, and potentially shocked or burned using inexpensive electronic bracelets, manacles or implants. Dobson worked for 26 years at Tennessee's Oak Ridge National Laboratory creating, for the government, the maps used in global tracking. He is the president of the American Geographical Society. And he is not alone in his thoughts. [In] the journal published by the Institute of Electrical and Electronics Engineers, a paper titled "Geoslavery" is co-written by Dobson and Peter F. Fisher, British editor of the International Journal of Geographical Information Science. "Human tracking systems, currently sold commercially without restrictions, already empower those who would be masters. Safeguards have not yet evolved to protect those destined to be slaves," they wrote. With a laptop computer, employers can keep track of their drivers' every move. Implanted chips ... keep track of livestock or pets. Whereify Wireless Inc. sells its GPS Kids Locator for $400. The device, which also looks like a watch, can be locked to a child's wrist. Dobson said that ... none of the companies was thinking of anything nefarious. [Yet he] worries that where there is an evil will, there is an evil way. He hopes [to ] create debate and perhaps legislation or safeguards around the technology that will keep it from being misused.


Lost in Translation: How Bush Interpreter Got Through Security
2005-02-22, Wall Street Journal (Article on website founder Fred Burks)
Posted: 2006-12-22 15:40:24
http://online.wsj.com/article/0,,SB110901231065260117,00.html?mod=todays_us_p...

Frederick Burks believes in UFOs, communes with dolphins, [and] runs a Web site that promotes conspiracy theories about U.S. complicity in the 9/11 attacks. And, until last October, he had the ear of the world's most powerful man ... George W. Bush. When President Bush traveled to Bali for a meeting with President Megawati in October 2003 ... [Karen] Brooks, then the National Security Council's Indonesia expert, says she personally requested that he get the job because he was so good and "Megawati loved him." Now Mr. Burks has popped up in Jakarta as a star witness for the defense in the terrorism trial of a fundamentalist Islamic cleric. Speaking to the Jakarta court in fluent Indonesian, Mr. Burks described a secret 2002 meeting between a U.S. presidential envoy and Indonesia's then president, Megawati Sukarnoputri. Mr. Burks's testimony, delivered last month in a south Jakarta court, turned the former White House interpreter ... into a national celebrity here in Indonesia. While working as Mr. Bush's Indonesian-language interpreter, Mr. Burks set up several Web sites, including momentoflove.org, weboflove.org and WantToKnow.info. After 9/11, he began collecting and then posting documents he believes show that parts of the U.S. government knew an attack was coming and may even have been complicit in its execution. "I'm sometimes labeled a conspiracy theorist, but I'm not," he says. "I'm someone who can handle dark energy, the really ugly things that are going on behind the scenes, without getting too upset."

Note: This article surprisingly was on the front page of the Wall Street Journal. The above link requires payment to read the full article. To read it free and learn much more, click here.


Opium, thugs bloom under U.S. policies in Afghanistan war
2006-12-17, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2006-12-17 23:48:21
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/12/17/ING08MTPMB1.DTL

The Taliban ... briefly banned poppy cultivation in 2000 in an effort to gain U.S. diplomatic recognition and aid. When the Bush administration invaded Afghanistan in October 2001, poppies were grown on only 7,600 hectares. Under the American occupation ... poppy cultivation spread to every province, and overall production has increased exponentially ever since -- this year by 60 percent. Within Afghanistan, where perhaps 3 million people draw direct income from poppy, profits may reach $3 billion this year. In-country profit adds up to an estimated 60 percent of Afghanistan's gross domestic product, or more than half the country's annual income. Afghanistan provides 92 percent of the world's heroin. Through many administrations, the U.S. government has been implicated in the Afghan drug trade. Before the American and Pakistani-sponsored mujahedeen took on the Soviets in 1979, Afghanistan produced a very small amount of opium for regional markets, and no heroin at all. By the end of the jihad against the Soviet army, it was the world's top producer of both drugs. The CIA made it all possible by providing legal cover for these operations. The United States [encouraged] Islamist extremists (then "our" soldiers) and ... set the stage for the Taliban. [Currently,] President Hamid Karzai['s] strategy is to avoid confrontation, befriend potential adversaries and give them offices, often in his Cabinet. The trade penetrates even the elected Parliament. Among the 249 members of the Wolesi Jirga (lower house) are at least 17 known drug traffickers, in addition to 40 commanders of armed militias, 24 members of criminal gangs, and 19 men facing serious allegations of war crimes.

Note: Could it be that some U.S. officials are turning a blind eye, or even supporting this drug trade? For some very strong evidence of this from a former award-winning DEA agent turned journalist and author, click here.


Democrats Pray for a Senator's Health, as Senate Control Hangs in Balance
2006-12-14, ABC News
Posted: 2006-12-17 23:34:50
http://abcnews.go.com/WNT/story?id=2727431

South Dakota Sen. Tim Johnson remained in critical condition today after undergoing emergency surgery for bleeding in his brain — an illness that could have immense political implications. They say that he has a congenital arteriovenous malformation — an abnormally tangled network of arteries and veins in his brain that ruptured, causing the bleeding. He is a modest, quiet man in an institution full of egos and sharp elbows, and has a mostly liberal voting record and a moderate demeanor. Beyond praying for a friend, Democrats may also be praying to keep their narrow 51-49 Senate majority. If Johnson's Senate seat were to become vacant, South Dakota law would empower Republican Gov. Mike Rounds to appoint a replacement. He would likely pick a fellow Republican, creating a 50-50 Senate with Vice President Cheney as the tie-breaker, leaving the GOP again in control of the Senate.

Note: Yet another amazing coincidence which could give Republicans control of the Senate. Few are aware aware that the deaths of Governor Mel Carnahan and Senator Paul Wellstone just a few years ago gave the Republicans control of the Senate. For more on this and the suspicious circumstances surrounding their two plane crashes just weeks before their elections, click here. For information on "non-lethal weapons" using directed beam technology which can cause illness and even death from a distance, click here and here.


Does Israel have the bomb or not? Olmert: Yes, we do.
2006-12-13, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2006-12-17 23:31:44
http://sfgate.com/cgi-bin/blogs/sfgate/detail?blogid=15archive/&entry_id=11779

For decades, Israel coyly has refused to confirm or deny what, since 1986, the whole world has known for sure: that is that the Jewish state is the one country in the Middle East that has a well-developed, nuclear arsenal. It was 20 years ago that Mordechai Vanunu, a former technician at Israel's Dimona nuclear facility in the Negev Desert, informed Britain's Sunday Times about the weapons program, leading "defense analysts to rank the country as the [world's] sixth largest nuclear power." Vanunu was jailed for 18 years for revealing state secrets. Israel calls its refusal to deny or confirm the existence of its nuclear arms its "nuclear ambiguity" policy. Why? Explains the Times (U.K.): "For many years, Israel was the only country outside the five declared nuclear powers to have built an atomic weapon ... It wanted its enemies in the region to know that it had nuclear capability if threatened. But it also wanted to keep the existence secret so that it did not fall [a]foul of international action designed to halt the proliferation of nuclear weapons, particularly strict U.S. laws which could have jeopardized billions of dollars in annual aid." The Jerusalem Post notes that "Nuclear ambiguity was a comfortable arrangement for both Israeli and U.S. administrations, designed to allow Israel to get on with whatever it was doing ... without too much international pressure, and [to allow] the U.S. to not seem too hypocritical by not demanding its Middle East ally sign the [Non-proliferation Treaty]. Ambiguity might have worked for four decades, but ... it is now hopelessly outdated."

Note: The media has been quite reluctant to discuss these issues openly. Could it be they fear people might question the amount of U.S. aid? Israel's population is 6.5 million. Official U.S. yearly foreign aid to Israel has been about $2.5 to 3.0 billion for many years. If you do the math, U.S. taxpayers are giving every man, woman, and child in Israel about $400/year -- over ten times the per capita rate paid to any other country. That's quite a yearly gift! A Christian Science Monitor article says if all forms of aid are considered, the figures are even higher.


Fiscal mess awaits new defense chief: 'Worst-managed' federal agency
2006-12-13, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2006-12-17 23:29:28
http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/12/13/MNG96MUHPF1.DTL

Robert Gates will face ... the enormous task of cleaning up the Pentagon's tangled finances, which outside auditors lambaste as so chaotic that no one knows how much money is being spent on defense at any given time. The White House's Office of Management and Budget believes the Pentagon's financial management systems are in such a mess "that independent auditors still cannot certify the accuracy of the financial statements." David Walker, the U.S. Comptroller General, issued a devastating assessment of the Pentagon's finances, which include an annual budget of over $500 billion. The Pentagon's financial problems "are pervasive, complex, long-standing and deeply rooted in virtually all business operations throughout the department," Walker told the Senate Armed Services Committee. Financial problems like the Pentagon's "would put any civilian company out of business," said Kwai Chan, a former GAO auditor ... and author of a report entitled "Financial Management in the Department of Defense: No One is Accountable." Winslow Wheeler, a former national security expert for the Senate Budget Committee, called the Defense Department "the worst-managed agency in the federal government, (that) can't account for the half-trillion dollars it spends each year, and seeks to produce weapons that are irrelevant or ineffective, or both."

Note: For major media articles showing that more than $1 trillion of taxpayers money have gone missing at the Pentagon, click here. For the deeper reasons behind this, a top U.S. general's explanation is available here.


Congressional Testimony Reveals Four Wargames on 9/11
2005-03-11, WantToKnow.info/C-SPAN
Posted: 2006-12-16 22:44:11
http://www.wanttoknow.info/050317wargames911

CMK [Congresswoman Cythia McKinney]: Mr. Secretary, after the last Hearing, I thought that my office was promised a written response to my question regarding the four wargames on September 11th. I have not yet received that response. The question was ... whether or not the activities of the four wargames going on on September 11th actually impaired our ability to respond to the attacks. RM [Top Pentagon Chief, General Richard Myers]: The answer to the question is no, it did not impair our response, in fact General Eberhart who was in the command of the North American Aerospace Defense Command as he testified in front of the 9/11 Commission I believe - I believe he told them that it enhanced our ability to respond, given that NORAD didn't have the overall responsibility for responding to the attacks that day. That was an FAA responsibility. But they were two CPXs; there was one Department of Justice exercise that didn't have anything to do with the other three; and there was an actual operation ongoing because there was some Russian bomber activity up near Alaska. CMK: Who was in charge of managing those wargames? RM: The important thing to realize is that North American Aerospace Defense Command was responsible. These are command post exercises; what that means is that all the battle positions that are normally not filled are indeed filled; so it was an easy transition from an exercise into a real world situation. It actually enhanced the response; otherwise, it would take somewhere between 30 minutes and a couple of hours to fill those positions, those battle stations, with the right staff officers.

Note: For the full transcript of this testimony and more, click here. Why to this day have all media (other than C-SPAN) and the 9/11 Commission Report failed to inform the public that there were four wargames happening at the time of the 9/11 attacks? For possible answers, click here.


The Secret War
2002-10-27, Los Angeles Times
Posted: 2006-12-16 22:14:58
http://articles.latimes.com/2002/oct/27/opinion/op-arkin27

The Defense Department is dramatically expanding its 'black world' of covert operations. The Bush administration has turned to what the Pentagon calls the "black world" to press the war on terrorism and weapons of mass destruction. The increasingly dominant role of the military ... reflects the desire of Secretary of Defense Donald Rumsfeld to gain greater overall control of the war on terror. "Our task is to find and destroy the enemy before they strike us." Though covert action can bring quick results, because it is isolated from the normal review processes it can just as quickly bring mistakes and larger problems. The epicenter of the Pentagon's covert operations remains the North Carolina-based Joint Special Operations Command, often referred to as Delta Force. The super-secret command is still not officially acknowledged to exist. Rumsfeld's influential Defense Science Board ... recommends creation of a super-Intelligence Support Activity, an organization it dubs the Proactive, Preemptive Operations Group, (P2OG), to bring together CIA and military covert action, information warfare, intelligence, and cover and deception. This body would launch secret operations aimed at "stimulating reactions" among terrorists and states possessing weapons of mass destruction -- that is, for instance, prodding terrorist cells into action and exposing themselves to "quick-response" attacks by U.S. forces. The Air Force is designing its own Global Response Task Force ... capable of delivering a "worldwide attack within an hour."

Note: For an amazing exposé by a highly decorated U.S. general on the hidden reasons behind war, click here.


Transcript: Rice's Testimony on 9/11 (for 9/11 Commissioner Lehman)
2004-04-08, Washington Post
Posted: 2006-12-16 19:54:47
http://www.washingtonpost.com/wp-dyn/articles/A61252-2004Apr8_4.html

LEHMAN. Were you told that there were numerous young Arab males in flight training? RICE. I was not. LEHMAN. Were you told that the red team in F.A.A. for 10 years had reported ... that the U.S. airport security system never got higher than 20 percent effective. RICE. To the best of my recollection I was not told that. LEHMAN. Were you aware that I.N.S. had quietly internally halved its internal security enforcement budget? RICE. I was not made aware of that. LEHMAN. Were you aware that it was the U.S. government established policy not to question or oppose the sanctuary policies [which] prohibited the local police from cooperating at all with federal immigration authorities? RICE. I do not believe I was aware of that. LEHMAN. Were you aware of a program that was well established that allowed Saudi citizens to get visas without interviews? RICE. I learned of that after 9/11. LEHMAN. Were you aware of the extensive activities [of] the Saudi government in supporting over 300 radical teaching schools and mosques around the country, including right here in the United States? Were you aware at the time of the fact that Saudi Arabia ... had in their custody the C.F.O. [Chief Financial Officer] and the closest confidante of Al Qaeda, of Osama bin Laden, and that they refused direct access to the United States? RICE. I don't remember anything of that kind. LEHMAN. Were you aware that they would not cooperate and give us access to the perpetrators of the Cobar Towers attack? RICE. I was very involved in issues concerning Cobar Towers. LEHMAN. Were you aware that it was the policy of the Justice Department ... to fine airlines if they have more than two young Arab males in secondary questioning? RICE. No.

Note: Don't miss the full revealing transcript at the link above. Most of the quotes above are towards the bottom of the webpage. Why didn't we hear lots more about these astounding facts put forward by one of the 9/11 commissioners, yet hardly mentioned in the final report? For lots more, click here.


This war on terrorism is bogus (by past U.K. Minister of Environment)
2003-09-06, The Guardian (One of the U.K.'s leading newspapers)
Posted: 2006-12-16 19:04:26
http://www.guardian.co.uk/comment/story/0,3604,1036571,00.html

At least 11 countries provided advance warning to the US of the 9/11 attacks. Two senior Mossad experts were sent to Washington in August 2001 to alert the CIA and FBI to a cell of 200 terrorists said to be preparing a big operation. The list they provided included the names of four of the 9/11 hijackers, none of whom was arrested. In November 2001 the US airforce complained it had had al-Qaida and Taliban leaders in its sights as many as 10 times over the previous six weeks, but had been unable to attack because they did not receive permission quickly enough. The BBC reported [that] a former Pakistan foreign secretary was told by senior American officials at a meeting in Berlin in mid-July 2001 that "military action against Afghanistan would go ahead by the middle of October". Zacarias Moussaoui ... was arrested in August 2001. One agent wrote, a month before 9/11, that Moussaoui might be planning to crash into the Twin Towers. US agents ... sought a warrant to search his computer. They were turned down by the FBI. [A] PNAC blueprint supports an earlier document ... which said the US must "discourage advanced industrial nations from challenging our leadership". The document also calls for the creation of "US space forces" to dominate space, and the total control of cyberspace to prevent "enemies" using the internet. It also hints that the US may consider developing biological weapons "that can target specific genotypes [and] may transform biological warfare from the realm of terror to a politically useful tool". The conclusion of all this analysis must surely be that the "global war on terrorism" has the hallmarks of a political myth propagated to pave the way for a wholly different agenda - the US goal of world hegemony, built around securing by force command over the oil supplies required to drive the whole project.

Note: This is one of the very few articles recommended as a must read. Michael Meacher was the U.K. Minister of Environment from May 1997 to June 2003. Mr. Meacher lays out a wealth of highly revealing information backed by reliable sources. To confirm most of his statements on our 9/11 timeline, click here. Mr. Meacher's cliams were reported on BBC News, as well, though the BBC mentioned amazingly little on his claims of U.S. involvement in 9/11. To see the BBC article click here.


Economist tallies swelling cost of Israel to US
2002-12-09, Christian Science Monitor
Posted: 2006-12-13 21:00:22
http://www.csmonitor.com/2002/1209/p16s01-wmgn.html

Since 1973, Israel has cost the United States about $1.6 trillion. If divided by today's population, that is more than $5,700 per person. This is an estimate by Thomas Stauffer, a consulting economist in Washington. Mr. Stauffer has tallied the total cost to the US of its backing of Israel in its drawn-out, violent dispute with the Palestinians. The bill adds up to more than twice the cost of the Vietnam War. Israel is the largest recipient of US foreign aid. It has been getting $3 billion a year for years. Israel has been given $240 billion since 1973, Stauffer reckons. In addition, the US has given Egypt $117 billion and Jordan $22 billion in foreign aid in return for signing peace treaties with Israel. Stauffer wonders if Americans are aware of the full bill for supporting Israel since some costs, if not hidden, are little known. Other US help includes: • Israel buys discounted, serviceable "excess" US military equipment. Stauffer says these discounts amount to "several billion dollars" over recent years. • Israel uses roughly 40 percent of its $1.8 billion per year in military aid, ostensibly earmarked for purchase of US weapons, to buy Israeli-made hardware. It also has won the right to require the Defense Department or US defense contractors to buy Israeli-made equipment or subsystems, paying 50 to 60 cents on every defense dollar the US gives to Israel. US help ... has enabled Israel to become a major weapons supplier. Weapons make up almost half of Israel's manufactured exports. US defense contractors often resent the buy-Israel requirements and the extra competition subsidized by US taxpayers. Stauffer [has] been assisted in this research by a number of mostly retired military or diplomatic officials who do not go public for fear of being labeled anti-Semitic.

Note: Israel has a population of 6.5 million. Yearly foreign aid to Israel has generally varied between $2.5 to 3.0 billion for many years (it's difficult to locate these figures on U.S. government websites). If you do the math, U.S. taxpayers are giving every man, woman, and child, in Israel about $400/year -- over ten times the per capita rate paid to any other country. That's quite a tax break, especially considering they are not Americans.


Tech Watch: Forecasting Pain
2006-12-00, Popular Mechanics
Posted: 2006-12-12 19:48:44
http://www.popularmechanics.com/technology/military_law/4202262.html

No longer a gleam in the Pentagon's eye, ray guns — or radiofrequency (RF) weapons, to be exact — officially have arrived. As troops are increasingly forced to serve as an ad hoc police force, nonlethal weapons have become a priority for the military. The Department of Defense is currently testing the Active Denial System (ADS), which fires pain-inducing beams of 95-GHz radio waves, for deployment on ground vehicles. This surface heating doesn't actually burn the target, but is painful enough to force a retreat. While the military continues to investigate the safety of RF-based weapons, defense contractor Raytheon has released Silent Guardian, a stripped-down version of the ADS, marketed to law enforcement and security providers as well as to the military. Using a joystick and a targeting screen, operators can induce pain from over 250 yards away, as opposed to more than 500 yards with the ADS. Unlike its longer-ranged counterpart, Silent Guardian is available now. As futuristic — and frightening — as the ADS "pain ray" sounds, the Air Force Office of Scientific Research is funding an even more ambitious use of RF energy. Researchers at the University of Nevada are investigating the feasibility of a method that would immobilize targets without causing pain. Rather than heating the subject's skin, this approach would use microwaves at 0.75 to 6 GHz to affect skeletal muscle contractions. This project is still in the beginning stages. The ADS, on the other hand, is already a painful reality.

Note: For lots more concerning information on non-lethal weapons, click here.


Pentagon resists pleas for help in Afghan opium fight
2006-12-05, Los Angeles Times
Posted: 2006-12-12 19:46:50
http://www.latimes.com/news/nationworld/washingtondc/la-fg-afghandrugs5dec05,...

The Pentagon ... has resisted entreaties from U.S. anti-narcotics officials to play an aggressive role in the faltering campaign to curb the country's opium trade. Military units in Afghanistan largely overlook drug bazaars, rebuff some requests to take U.S. drug agents on raids and do little to counter the organized crime syndicates shipping the drug to Europe, Asia and, increasingly, the United States. Poppy cultivation has exploded, increasing by more than half this year. Afghanistan supplies about 92% of the world's opium. "It is surprising to me that we have allowed things to get to the point that they have," said ... a former top State Department counter-narcotics official. Outgoing Defense Secretary Donald H. Rumsfeld has said that Afghanistan's flourishing opium trade is a law enforcement problem, not a military one. The opium trade is one-third of the country's economy. Several dozen kingpins ... have become more brazen, richer and powerful. [They] openly run huge opium bazaars and labs that turn opium into heroin. [The] head of the United Nations Office on Drugs and Crime said ... that the location of major drug operations were "well-known to us and to the authorities." The Pentagon has balked at drug interdiction efforts even when it had the resources, said a former senior U.S. anti-drug official. "There were [drug] convoys where military people looked the other way," the former official said. "DEA would identify a lab to go hit or a storage facility and [the Pentagon] would find a reason to ground the helicopters." A recent congressional report said the DEA asked the Pentagon for airlifts on 26 occasions in 2005, and the requests were denied in all but three cases.

Note: Some observers and insiders believe the reason Afghanistan was attacked is because the Taliban had virtually stopped the opium trade in 2001. For reliable evidence supporting these allegations, click here.


Insiders' stock sale-purchase ratio widens
2006-12-07, Chicago Tribune/Bloomberg
Posted: 2006-12-12 19:42:31
http://www.chicagotribune.com/business/chi-0612070153dec07,0,3801935.story

Stock sales by America's corporate leaders exceeded purchases last month by the widest ratio in nearly 20 years. Executives sold $63.18 of shares for every $1 they bought in November, the largest ratio since at least January 1987. U.S. securities laws require company executives and directors to disclose stock purchases or sales within two business days. Insiders sold $8.4 billion in shares last month, according to data compiled from SEC filings. Buying was ... $133 million. The overall insider-selling amount was the fifth-highest since 1987. Selling peaked at $13.9 billion in March 2000. The data have "value for investors," said Wayne Reisner at Carret Asset Management in New York. "It's people who are very familiar with their company and their stock." Insiders executed 6.34 sales transactions for each purchase transaction in the eight weeks ended Dec. 1. That's up from 2.45 in the period ended Aug. 4 and above the ratio of 2.25 he considers neutral for the market. Microsoft ranked first among U.S. companies, with $594.2 million in sales by insiders in November. Seagate Technology and DreamWorks Animation SKG Inc. ranked second and third, at $311.8 million and $224.2 million, respectively. Google Inc. was fourth, at $182.1 million.

Note: Isn't it interesting that the NASDAQ stock index reached it's all-time high in March 2000, the exact month executive stock selling hit its record, and just prior to the huge NASDAQ crash. Is it possible that corporate executives knew something the rest of us didn't?


Nervous system manipulation by electromagnetic fields from monitors
2003-01-14, US Patent and Trademark Office Website
Posted: 2006-12-07 23:09:12
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&...

Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. The implementations of the invention are adapted to the source of video stream that drives the monitor, be it a computer program, a TV broadcast, a video tape or a digital video disc (DVD). The program that causes a monitor to display a pulsing image may be run on a remote computer that is connected to the user computer by a link; the latter may partly belong to a network, which may be the Internet. A live TV broadcast can be arranged to have the feature imbedded simply by slightly pulsing the illumination of the scene that is being broadcast. This method can of course also be used in making movies and recording video tapes and DVDs. Certain monitors can emit ... pulses that are so weak as to be subliminal. This is unfortunate since it opens a way for mischievous application of the invention, whereby people are exposed unknowingly to manipulation of their nervous systems for someone else's purposes.

Note: If the above link fails, click here.


The ricin ring that never was
2005-04-14, The Guardian (One of the U.K.'s leading newspapers)
Posted: 2006-12-07 21:53:44
http://politics.guardian.co.uk/attacks/comment/0,1320,1459178,00.html

Colin Powell does not need more humiliation. But yesterday a London jury brought down another section of the case he made for war - that Iraq and Osama bin Laden were supporting and directing terrorist poison cells throughout Europe, including a London ricin ring. Yesterday's verdicts on five defendants ... make clear there was no ricin ring. Nor did the "ricin ring" make or have ricin. Not that the government shared that news with us. The public record for the past three fear-inducing years has been that ricin was found in the Wood Green flat occupied by some of yesterday's acquitted defendants. It wasn't. [Found there] were the internal documents of the supposed al-Qaida cell planning the "big one" in Britain. But the recipes were untested and unoriginal, borrowed from US sources. Moreover, ricin is not a weapon of mass destruction. It is a poison which has only ever been used for one-on-one killings. All the information roads led west, not to Kabul but to California and the US midwest. The recipes for ricin now seen on the internet were invented 20 years ago by survivalist Kurt Saxon. The chemical lists found in London were an exact copy of pages on an internet site in Palo Alto, California. But it seems this information was not shared with the then home secretary, David Blunkett, who was still whipping up fear two weeks later. The most ironic twist was an attempt to introduce an "al- Qaida manual" into the case. To show that the Jihad manual was written in the 1980s ... was easy. The ricin recipe it contained was a direct translation from a 1988 US book called the Poisoner's Handbook. We have all been victims of this mass deception.

Note: As the above link no longer functions, click here for the full article. According to a post on Prof. Michel Chossudovsky's excellent Center for Research on Globalization website and other inside sources, the British government ordered the above article removed from the website within a week of its publication. Someone doesn't want us knowing how we are manipulated into fear. For more on this, click here.


Rove leak is just part of larger scandal
2005-07-15, Christian Science Monitor
Posted: 2006-12-07 14:47:22
http://www.csmonitor.com/2005/0715/p09s02-cods.html

The underlying issue in the Karl Rove controversy is not a leak, but a war and how America was misled into that war. In 2002 President Bush, having decided to invade Iraq, was casting about for a casus belli. The weapons of mass destruction theme was not yielding very much until a dubious Italian intelligence report ... provided reason to speculate that Iraq might be trying to buy so-called yellowcake uranium from the African country of Niger. the CIA sent Joseph Wilson, an old Africa hand, to Niger to investigate. Mr. Wilson spent eight days talking to everyone in Niger possibly involved and came back to report no sign of an Iraqi bid for uranium. Ignoring Wilson's report, Cheney talked on TV about Iraq's nuclear potential. And the president himself, in his 2003 State of the Union address no less, pronounced: "The British government has learned that Saddam Hussein recently sought significant quantities of uranium from Africa." Wilson directly challenged the administration with a July 6, 2003 New York Times op-ed headlined, "What I didn't find in Africa," and making clear his belief that the president deliberately manipulated intelligence in order to justify an invasion. Three days later, Bob Novak's column appeared giving Wilson's wife's name, Valerie Plame, and the fact she was an undercover CIA officer. Enough is known to surmise that the leaks of Rove, or others deputized by him, amounted to retaliation against someone who had the temerity to challenge the president of the United States. The role of Rove and associates added up to a small incident in a very large scandal - the effort to delude America into thinking it faced a threat dire enough to justify a war.


Of Mice, Men and In-Between
2004-11-20, Washington Post
Posted: 2006-12-06 01:00:17
http://www.washingtonpost.com/wp-dyn/articles/A63731-2004Nov19.html

In Minnesota, pigs are being born with human blood in their veins. In Nevada, there are sheep whose livers and hearts are largely human. In California, mice peer from their cages with human brain cells firing inside their skulls. Biologists call these hybrid animals chimeras, after the mythical Greek creature with a lion's head, a goat's body and a serpent's tail. Chimeras are allowing scientists to watch, for the first time, how nascent human cells and organs mature and interact ... inside the bodies of living creatures. But with no federal guidelines in place ... how human must a chimera be before more stringent research rules should kick in? Chimerism becomes a more sensitive topic when it involves growing entire human organs inside animals. And it becomes especially sensitive when it deals in brain cells. Imagine, said Robert Streiffer, a professor of philosophy and bioethics at the University of Wisconsin, a human-chimpanzee chimera endowed with speech ... what some have called a "humanzee." Perhaps the most ambitious efforts to make use of chimeras come from Irving Weissman, director of Stanford University's Institute of Cancer/Stem Cell Biology and Medicine. Weissman helped make the first mouse with a nearly complete human immune system. More recently his team injected human neural stem cells into mouse fetuses, creating mice whose brains are about 1 percent human. Now Weissman says he is thinking about making chimeric mice whose brains are 100 percent human.

Note: If the above link fails, click here.


C.I.A. Said to Rebuff Congress on Nazi Files
2005-01-30, New York Times
Posted: 2006-12-06 00:44:07
http://www.nytimes.com/2005/01/30/international/europe/30nazis.html?ex=126482...

The Central Intelligence Agency is refusing to provide hundreds of thousands of pages of documents sought by a government working group under a 1998 law that requires full disclosure of classified records related to Nazi war criminals. Some made public last year showed a closer relationship between the United States government and Nazi war criminals than had previously been understood, including the C.I.A.'s recruitment of war criminal suspects or Nazi collaborators. For nearly three years, the C.I.A. has interpreted the 1998 law narrowly and rebuffed requests for additional records. The dispute has not previously been made public. The American government worked closely with Nazi war criminals and collaborators, allowing many of them to live in the United States after World War II. Historians who have studied the documents made public so far have said that at least five associates of the Nazi leader Adolf Eichmann, the architect of Hitler's campaign to exterminate Jews, had worked for the CIA. The records also indicate that the CIA tried to recruit two dozen more war criminals or Nazi collaborators. Among former Nazis who were given refuge in the United States was Wernher von Braun, the German scientist who developed the V-2 rocket in World War II for the Nazis and played a major role in the development of the American space program.

Note: Operation Paperclip involved secretly importing hundreds of Nazi scientists into the U.S. and providing them with aliases and influential work in U.S. government and intelligence services. Some of them were known experts in mind control techniques. For more reliable information, click here.


Federal agency planned plane-crashing-into-building drill [on] Sept. 11
2002-08-22, USA Today/Associated Press
Posted: 2006-12-05 23:31:10
http://www.usatoday.com/news/nation/2002-08-22-sept-11-plane-drill-_x.htm

In what the government describes as a bizarre coincidence, one U.S. intelligence agency was planning an exercise last Sept. 11 in which an errant aircraft would crash into one of its buildings. But the cause wasn't terrorism — it was to be a simulated accident. Officials at the Chantilly, Va.-based National Reconnaissance Office had scheduled an exercise that morning in which a small corporate jet would crash into one of the four towers at the agency's headquarters building. The agency is about four miles from the runways of Washington Dulles International Airport. "It was just an incredible coincidence that this happened to involve an aircraft crashing into our facility," [NRO spokesman Art] Haubold said. "As soon as the real world events began, we canceled the exercise." Adding to the coincidence, American Airlines Flight 77 — the Boeing 767 that was hijacked and crashed into the Pentagon — took off from Dulles at 8:10 a.m. on Sept. 11, 50 minutes before the exercise was to begin. It struck the Pentagon around 9:40 a.m., killing 64 aboard the plane and 125 on the ground. The National Reconnaissance Office operates many of the nation's spy satellites. It draws its personnel from the military and the CIA. In a promotion for speaker John Fulton, a CIA officer assigned as chief of NRO's strategic gaming division, the announcement says, "On the morning of September 11th 2001, Mr. Fulton and his team ... were running a pre-planned simulation to explore the emergency response issues that would be created if a plane were to strike a building."

Note: For many more disturbing coincindences and outright cover-ups around 9/11, click here. And for yet another amazing "coincidence" surrounding the London bombings, click here.


John K. Vance; Uncovered LSD Project at CIA
2005-06-16, Washington Post
Posted: 2006-12-05 22:41:14
http://www.washingtonpost.com/wp-dyn/content/article/2005/06/15/AR20050615026...

John K. Vance [was] a member of the Central Intelligence Agency inspector general's staff in the early 1960s who discovered that the agency was running a research project that included administering LSD and other drugs to unwitting human subjects. Code-named MKULTRA (and pronounced m-k-ultra), the project Mr. Vance uncovered was the brainchild of CIA Director Allen Dulles, who was intrigued by reports of mind-control techniques allegedly conducted by Soviet, Chinese and North Korean agents on U.S. prisoners of war during the Korean War. The CIA wanted to use similar techniques on its own POWs and perhaps use LSD or other mind-bending substances on foreign leaders, including Cuba's Fidel Castro a few years after the project got underway in 1953. Heading MKULTRA was a CIA chemist named Sidney Gottlieb. In congressional testimony, Gottlieb, who died in 1999, acknowledged that the agency had administered LSD to as many as 40 unwitting subjects, including prison inmates and patrons of brothels set up and run by the agency. At least one participant died when he jumped out of a 10th-floor window in a hotel; others claimed to have suffered serious psychological damage. Mr. Vance learned about MKULTRA in the spring of 1963 during a wide-ranging inspector general survey of the agency's technical services division. The inspector general's report said: "The concepts involved in manipulating human behavior are found by many people both within and outside the agency to be distasteful and unethical." MKULTRA came to public light in 1977 as a result of hearings conducted by a Senate committee on intelligence chaired by Sen. Frank Church (D-Idaho).

Note: If the above link fails, click here. For an excellent two-page summary of reliable verifiable information on CIA mind control programs which clearly violated ethical and moral standards, click here.


RNC [Republican National Convention] to Feature Unusual Forms of Sound
2004-08-25, ABC News
Posted: 2006-12-05 22:26:32
http://abcnews.go.com/Technology/story?id=99472

Outside the convention hall, New York City police plan to control protesters using a device that directs sound for up to 1,500 feet in a spotlight-like beam. Meanwhile, a display of former Republican presidents inside the hall will feature campaign speeches that are funneled to listeners through highly focused audio beams. Both technologies feature unprecedented manipulation of sound, but for very different purposes. And while both technologies have unique, "gee-whiz" factors, some remain uneasy with the idea of using sound to control crowds. When in weapon mode, LRAD blasts a tightly controlled stream of caustic sound that can be turned up to high enough levels to trigger nausea or possibly fainting. LRAD ... has been used by the U.S. military in Iraq and at sea as a non-lethal force. In these settings, operators can use the device not only to convey orders, but also as a weapon. In tests, police have shown how they can convey orders in a normal voice to someone as far as four blocks away. The sound beam is even equipped with a viewfinder so the operator can precisely target the audio by finding a person in cross hairs. Rather than using pure volume to throw sound far, the LRAD reaches distant ears by focusing the audio beam. Wherever the beam makes contact with air, the air molecules interact in a way that isolates the original audible sound. So if you're standing in front of the ultrasonic sound wave, you can hear the sound. If you're a few inches away, you hear nothing. Already, some Coca-Cola machines in Japan are equipped with the technology so passers-by hear the enticing sound of soda being poured into a glass of ice.

Note: For more reliable information on these "non-lethal weapons," click here.


Hypnotic Experimentation and Research
1954-02-10, Declassified CIA Document (Verify using note below)
Posted: 2006-12-05 21:43:32
http://www.WantToKnow.info/mind_control/foia_mind_control/190691_assassins_pr...

A posthypnotic of the night before (pointed finger, you will sleep) was enacted. Misses [deleted] and [deleted] immediately progressed to a deep hypnotic state with no further suggestion. Miss [deleted] was then instructed (having previously expressed a fear of firearms in any fashion) that she would use every method at her disposal to awaken Miss [deleted] (now in a deep hypnotic sleep) and failing this, she would pick up a pistol nearby and fire it at Miss [deleted]. She was instructed that her rage would be so great that she would not hesitate to “kill” [deleted] for failing to awaken. Miss [deleted] carried out these suggestions to the letter including firing the (unloaded) gun at [deleted] and then proceeding to fall into a deep sleep. Both were awakened and expressed complete amnesia for the entire sequence. Miss [deleted] was again handed the gun, which she refused (in an awakened state) to pick up or accept from the operator. She expressed absolute denial that the foregoing sequence had happened.

Note: This text is quoted from page 1 of declassified CIA document MORI ID 190691. To verify the statement in the text, make a FOIA (Freedom of Information Act) request as described here, or directly view a scanned copy online here. To access thousands of pages of declassified CIA mind control documents online, click here. For lots more reliable information on this crucial topic, click here. For many revealing news articles on mind control, click here.


Toyota smashes fuel economy record
2002-10-20, London Times
Posted: 2006-12-05 21:20:20
http://www.timesonline.co.uk/article/0,,588-451038,00.html

Tucked away on the Toyota stand you will find a cheeky little coupé that looks sporty but whose raison d’ętre is fuel economy, the lowest exhaust emissions and ease of recycling. The ES3 — the initials stand for Eco Spirit — achieves 104mpg in the official European fuel consumption tests, a record for a four-seat car. Some months ago I drove this prototype and not only is it even more economical than the special “3 litre” (three litres of fuel for every 100km travelled, or 94mpg) versions of the Audi A2 and VW Lupo that sell in Germany, but the Toyota is more lively and responsive and would be very acceptable as an everyday car. The ES3 has a 1.4 litre turbocharged diesel engine and CVT (continuously variable transmission).

Note: So what happened to this amazing car? Why haven't we heard anything about it since the article was published in 2002? Read the revealing WantToKnow.info article at this link to learn how this amazing car, which was the talk of the fuel economy car industry in 2002, eventually disappeared. And for an excellent essay which provides key information on this topic, including a detailed list of suppressed inventions which greatly improve gasoline mileage reported over the years in respected magazines, click here.


Cloudborn Electric Wavelets To Encircle the Globe
1904-03-27, New York Times
Posted: 2006-12-05 21:03:13
http://select.nytimes.com/gst/abstract.html?res=F50716FB355F13718DDDAE0A94DB4...

To gather in the latent electricity in the clouds and with the globe itself as a medium of transmission to convey telegraphic messages, power for commercial purposes, or even the sound of the human voice to the utmost confines of the earth is the latest dream of Nikola Tesla. The transmitting station is an octagonal tower, pyramidal in shape, and some 187 feet in height. J. Pierpont Morgan [was] interested in his odd enterprise and furnished him with financial assistance. Tesla's transmitting tower as it stands in lonely grandeur and boldly silhouetted against the sky ... is a source or great satisfaction and of some mystification. No instruments have been installed as yet in the transmitter, nor has Mr. Tesla given any description of what they will be like. But in his article he announces that he will transmit from the tower an electric wave of a total maximum activity of ten million horse power. This, he says, will be possible with a plant of but 100 horse power, by the use of a magnifying transmitter of his own invention. What he expects to accomplish is summed up in the closing paragraph as follows: "When the great truth, accidentally revealed and experimentally confirmed, is fully recognized, that this planet ... is to electric currents virtually no more than a small metal ball and that by virtue of this fact many possibilities ... are rendered absolutely sure of accomplishment; when the first plant is inaugurated and it is shown that a telegraphic message ... can be transmitted to any terrestrial distance, ... the energy of a waterfall made available for supplying light, heat or motive power, anywhere ... humanity will be like an ant heap stirred up with a stick."

Note: If the above link fails, click here Claimed by some to be greater than Thomas Edison, Nikola Tesla was a brilliant inventor whose name and inventions were long suppressed after J.P. Morgan and others realized Tesla's inventions could give the public free energy, thereby taking away a major source of income for the elite. For a PBS tribute to Tesla, click here. For lots more on this energy genius, click here. For more on the energy cover-up, click here.


Tsunami bomb - NZ's devastating war secret
1999-09-25, New Zealand Herald (New Zealand's leading newspaper)
Posted: 2006-12-05 20:10:28
http://www.nzherald.co.nz/section/story.cfm?c_id=1&objectid=14727

Top-secret wartime experiments were conducted off the coast of Auckland to perfect a tidal wave bomb, declassified files reveal. United States defence chiefs said that if the project had been completed before the end of the war it could have played a role as effective as that of the atom bomb. Details of the tsunami bomb, known as Project Seal, are contained in 53-year-old documents released by the Ministry of Foreign Affairs and Trade. Papers stamped "top secret" show the US and British military were eager for Seal to be developed in the post-war years too. The experiments involved laying a pattern of explosives underwater to create a tsunami. It is unclear what happened to Project Seal once the final report was forwarded to Wellington Defence Headquarters late in the 1940s. The bomb was never tested on a full scale. "Whether it could ever be resurrected ... Under some circumstances I think it could be devastating."


Air Force pursuing antimatter weapons
2004-10-04, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2006-12-05 19:58:39
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2004/10/04/MNGM393GPK1.DTL

The U.S. Air Force is quietly spending millions of dollars investigating ways to use a radical power source -- antimatter, the eerie "mirror" of ordinary matter -- in future weapons. The most powerful potential energy source presently thought to be available to humanity, antimatter is a term normally heard in science-fiction films. But antimatter itself isn't fiction. During the Cold War, the Air Force funded numerous scientific studies of the basic physics of antimatter. Following an initial inquiry from The Chronicle this summer, the Air Force forbade its employees from publicly discussing the antimatter research program. Still, details on the program appear in numerous Air Force documents distributed over the Internet prior to the ban. It almost defies belief, the amount of explosive force available in a speck of antimatter. One millionth of a gram of positrons contain as much energy as 37.8 kilograms (83 pounds) of TNT. A simple calculation, then, shows that about 50-millionths of a gram could generate a blast equal to the explosion ... in Oklahoma City in 1995. Officials at Eglin Air Force Base initially agreed enthusiastically to try to arrange an interview with ... Kenneth Edwards, director of the "revolutionary munitions" team at the Munitions Directorate at Eglin. "We're all very excited about this technology," spokesman Rex Swenson [said] in late July. But Swenson backed out in August after he was overruled by higher officials in the Air Force and Pentagon. Reached by phone in late September, Edwards repeatedly declined to be interviewed. His superiors gave him "strict instructions not to give any interviews personally. "I'm sorry about that -- this (antimatter) project is sort of my grandchild."


Homosexual prostitution inquiry ensnares VIPs with Reagan, Bush
1989-06-29, WantToKnow.info/Washington Times
Posted: 2006-12-05 15:42:48
http://www.WantToKnow.info/890629washingtontimesfranklin

A homosexual prostitution ring is under investigation by federal and District authorities and includes among its clients key officials of the Reagan and Bush administrations, military officers, congressional aides and US and foreign businessmen with close social ties to Washington's political elite. Reporters for this newspaper examined hundreds of credit-card vouchers, drawn on both corporate and personal cards and made payable to the escort service operated by the homosexual ring. Among clients who charged homosexual prostitutes services on major credit cards over the past 18 months are Charles K. Dutcher, former associate director of presidential personnel in the Reagan administration, and Paul R. Balach, Labor Secretary Elizabeth Dole’s political personnel liaison to the White House. Members of major news organizations also procured escort services from the ring, credit card documents show. These include Stanley Mark Tapscott, who was an assistant managing editor of The Washington Times. Before joining The Times, Mr. Tapscott worked for the Office of Personnel Management in the Reagan administration. A major concern, said the former official with longtime ties to top-ranking military intelligence officers, was that hostile foreign intelligence services were using young male prostitutes to compromise top administration homosexuals, thus making them subject to blackmail.

Note: How is it possible that this major story was not covered by any major media other than the Washington Times? For answers to this question, click here. For more on this astonishing case, don't miss the excellent, reliable resources and the powerful, suppressed Discovery Channel documentary available here. For an insider's story of how prostitution was regularly used to compromise politicians, click here.


The Secret Government: The Constitution in Crisis
1987-11-04, WantToKnow.info/PBS Documentary
Posted: 2006-12-01 20:58:34
http://www.WantToKnow.info/050423secretgovernment

The Secret Government is an interlocking network of official functionaries, spies, mercenaries, ex-generals, profiteers and superpatriots, who, for a variety of motives, operate outside the legitimate institutions of government. The Russians had been our ally against the Nazis, an expedient alliance for the sake of war. Now they were our enemy. To fight them we turned to some of the very men who had inflicted on humanity the horrors of Hitler’s madness. We hired Nazis’ as American spies. Admiral Gene La Rocque: “That National Security Act of 1947 changed dramatically the direction of this great nation. It established the framework for a national security state. Never have we had a National Security Council so concerned about the nation’s security that we’re always looking for threats and looking how to orchestrate our society to oppose those threats. National Security was invented, almost, in 1947, and now it has become the prime mover of everything we do. The National Security Act also gave us the Central Intelligence Agency." In 1975 ... Congress took its first public look at the Secret Government. Senator Frank Church chaired the Select Committee to study government operations. The hearings opened the books on a string of lethal activities. From the use of electric pistols and poison pellets, to Mafia connections and drug experiments. And they gave us a detailed account of assassination plots against foreign leaders and the overthrowing of sovereign governments. This is a system easily corrupted. While freedom does have enemies in the world, it can also be undermined here at home, in the dark, by those posing as its friends.

Note: This highly revealing PBS documentary is available for free viewing on the Internet. For the link, written text, and much more on this amazingly revealing documentary, click here.


Is Al Qaeda Just a Bush Boogeyman?
2005-01-11, Los Angeles Times
Posted: 2006-12-01 20:30:58
http://articles.latimes.com/2005/jan/11/opinion/oe-scheer11

Is it conceivable that Al Qaeda, as defined by President Bush as the center of a vast and well-organized international terrorist conspiracy, does not exist? To even raise the question amid all the officially inspired hysteria is heretical. Yet a brilliant new BBC film produced by one of Britain's leading documentary filmmakers systematically challenges this. "The Power of Nightmares: The Rise of the Politics of Fear" ... argues coherently that much of what we have been told about the threat of international terrorism "is a fantasy that has been exaggerated and distorted by politicians. It is a dark illusion that has spread unquestioned ... around the world." Why have we heard so much frightening talk about "dirty bombs" when experts say it is panic rather than radioactivity that would kill people? Why did Defense Secretary Donald Rumsfeld claim on "Meet the Press" in 2001 that Al Qaeda controlled massive high-tech cave complexes in Afghanistan, when British and U.S. military forces later found no such thing? The film ... directly challenges the conventional wisdom by making a powerful case that the Bush administration, led by a tight-knit cabal of Machiavellian neoconservatives, has seized upon the false image of a unified international terrorist threat to replace the expired Soviet empire in order to push a political agenda. "The nightmare vision of a uniquely powerful hidden organization waiting to strike our societies is an illusion. Wherever one looks for this Al Qaeda organization, from the mountains of Afghanistan to the 'sleeper cells' in America, the British and Americans are chasing a phantom enemy."

Note: If above link fails, click here. This highly revealing film by one of Britain's most respected documentary makers is available for free viewing on the Internet. For the link and lots more on this amazingly revealing documentary, click here. For an excellent review of the film in one of the U.K.'s leading newspapers, click here.


Brainwash victims win cash claims
2004-10-17, Times of London
Posted: 2006-11-26 23:16:16
http://www.thesundaytimes.co.uk/sto/news/uk_news/article242309.ece

Hundreds of mentally ill patients who were subjected to barbaric CIA-funded brainwashing experiments ... could be entitled to compensation following a landmark court ruling. Doctor Ewan Cameron, who became one of the world’s leading psychiatrists, developed techniques used by Nazi scientists to wipe out the existing personalities of people in his care. Cameron ... was recruited by the CIA during the cold war while working at McGill University in Montreal, Canada. He carried out mind-control experiments using drugs such as LSD on hundreds of patients, but only 77 of them were awarded compensation. Now a landmark ruling by a Federal Court judge in Montreal will allow more than 250 former patients, whose claims were rejected, to seek compensation. Last week, Alan Stein, of Montreal law firm Stein and Stein ... confirmed he was in the process of contacting former clients who could now renew their appeal. “There are about 200 people still due compensation,” he said. Using techniques similar to those portrayed in the celebrated novel the Manchurian Candidate, it was believed that people could be brainwashed and reprogrammed to carry out specific acts. Cameron developed a range of depatterning “treatments”. Patients were woken from drug-induced stupors two or three times a day for multiple electric shocks. In a specially designed “sleep room” made famous by Anne Collins’s book of the same name, Cameron placed a speaker under the patient’s pillow and relayed negative messages for 16 hours a day. Cameron ... rose to become the first president of the World Psychiatric Association.

Note: If the above link does not work, click here. Dr. Cameron was once President of the American and World Psychiatric Associations. For more on the severe abuses of doctors in serving the CIA's mind control programs, click here. This article clearly shows that the Manchurian candidate (programmed assassin) is not just fiction. For a powerful two-page summary of 18,000 pages of declassified CIA documents on this disturbing mind control program, click here. Links to view the original top secret documents are included.


Air Force Order on Saucers Cited
1960-02-28, New York Times
Posted: 2006-11-26 19:16:35
http://select.nytimes.com/gst/abstract.html?res=F50A12F9345D1A728DDDA10A94DA4...

The Air Force has sent its commands a warning to treat sightings of unidentified flying objects as "serious business" directly related to the nation's defense, it was learned today. An Air Force spokesman confirmed issuance of the directive after portions of it were made public by a private “flying saucer” group. The new regulations were issued by the Air Force inspector general Dec. 24. Existence of the document was revealed by the National Investigations Committee on Aerial Phenomena [NICAP]. The privately financed committee accused the Air Force of deception in publicly describing reports of unidentified flying objects as delusions and hoaxes while sending the private admonition to its commands. Vice Admiral R. H. Hillenkoetter (Ret.), a committee board member and former director of the Central Intelligence Agency, said ... "It is time for the truth to be brought out in open Congressional hearings. Behind the scenes, high-ranking Air Force officers are soberly concerned about the UFOs. But through official secrecy and ridicule, many citizens are led to believe the unknown flying objects are nonsense," the retired admiral said. He charged that "to hide the facts, the Air Force has silenced its personnel.

Note: If the above link fails, click here for a free copy of this article. Why would a former head of the CIA be claiming that Air Force officers are "soberly concerned" about UFOs? For an abundance of reliable, verifiable information on this major cover-up, click here


Echelon spy network revealed
1999-11-03, BBC News
Posted: 2006-11-26 13:57:09
http://news.bbc.co.uk/1/hi/world/503224.stm

Imagine a global spying network that can eavesdrop on every single phone call, fax or e-mail, anywhere on the planet. It sounds like science fiction, but it's true. Two of the chief protagonists - Britain and America - officially deny its existence. But the BBC has confirmation from the Australian Government that such a network really does exist. The base is linked directly to the headquarters of the US National Security Agency (NSA) at Fort Mead in Maryland, and it is also linked to a series of other listening posts scattered across the world, like Britain's own GCHQ. The power of the network, codenamed Echelon, is astounding. Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. The network is so secret that the British and American Governments refuse to admit that Echelon even exists. But another ally, Australia, has decided not to be so coy. The man who oversees Australia's security services, Inspector General of Intelligence and Security Bill Blick, has confirmed to the BBC that their Defence Signals Directorate (DSD) does form part of the network. Asked if they are then passed on to countries like Britain and America, he said: "They might be in certain circumstances." They are looking for evidence of international crime, like terrorism. But the system is so widespread all sorts of private communications, often of a sensitive commercial nature, are hoovered up and analysed.

Note that this is a 1999 article. The capability to monitor all communications has existed for a long time. For a powerful, well documented 20-page paper in the Federal Communications Law Journal providing strong evidence that this program is unconstitutional, click here.


E-mail users warned over spy network
2001-05-29, BBC News
Posted: 2006-11-26 13:48:47
http://news.bbc.co.uk/1/hi/world/europe/1357264.stm

Computer users across Europe should encrypt all their e-mails, to avoid being spied on by a UK-US eavesdropping network, say Euro-MPs. The tentacles of the Echelon network stretch so far that the UK's involvement could constitute a breach of human rights, they say. The Euro-MPs have been studying Echelon for almost a year, after allegations that it has been used by the US to commit industrial espionage against European firms. They conclude that Echelon - whose existence is not officially acknowledged - is reading millions of e-mails and faxes sent every day by ordinary people. The US has denied the system even exists, and the UK refuses to give details, except to say that communications interception is a vital tool in the fight against "dangers to society". The Echelon operation is based at Fort Meade in Maryland, America, and at the UK's spy centre, GCHQ in Cheltenham.

Note: For another revealing BBC News report on Echelon, click here.


CDC Shifts Vaccine-Data Focus
2006-11-01, Washington Post
Posted: 2006-11-26 13:46:20
http://www.washingtonpost.com/wp-dyn/content/article/2006/10/31/AR20061031013...

Federal health officials have decided to forgo gathering detailed data on whether children in 22 big cities are receiving recommended immunizations and instead will survey teenagers, who are the target of several new vaccines. The decision is drawing protests from local health officials, who say the soon-to-be-lost information is essential to their efforts to make sure that infants and toddlers, many from poor families, are protected against childhood infections. Each year, the CDC contracts a polling company to get data on vaccination rates in various age, demographic and income groups nationwide. "We need to know if the new vaccine has helped, or had no change, or hurt [coverage], and we cannot really make those judgments without the NIS data," [one health official] said. CDC officials said they are redirecting about $3 million to survey adolescents. The only way to pay for the 22-city sampling would be to use money now used to help states buy vaccine, they added. The decision comes at a time when the government is spending record amounts on public health. The CDC's budget has risen 42 percent since 2001 and is now $8.73 billion.

Note: This unusual decision makes sense if you consider that the powerful pharmaceutical industry doesn't want tracking on toddler vaccinations, as it may show what they have long denied -- that there is a link between autism and childhood vaccinations. The mercury-derivative Thimerosal was largely taken out of childhood vaccinations just a few years ago. The much-awaited data needed to prove or disprove a link will now be more difficult to obtain.


Under the Radar, a Montauk Park
2006-11-24, New York Times
Posted: 2006-11-26 13:29:06
http://travel2.nytimes.com/2006/11/24/travel/escapes/24hero.html?ex=132202440...

A sprawling waterfront state park known as Camp Hero [is situated] in Montauk on Long Island. Conspiracy theorists have long claimed that the park has been the site of sci-fi worthy events, including rifts in the time-space continuum [and] mind-control experiments. Such unsubstantiated reports were in large part ignited by a 1992 book, “The Montauk Project: Experiments in Time,” by Preston B. Nichols with Peter Moon.. “All of the rumors, that’s part of why we came here,” said Patrick Wenk, 26, of Stony Brook, N.Y., who was visiting one chilly autumn afternoon. His girlfriend, Sarah Holub, 25, [said] it was her friends who piqued her initial interest in the park by telling her about the conspiracy theories and rumors of paranormal occurrences. A search on Google revealed several Web sites that elaborated on the theories and suggested that Camp Hero was the site of time-travel experiments that picked up where the Philadelphia Experiment — in which a 1940s Navy ship and crew were said to have been made invisible and teleported from Philadelphia to Norfolk, Va. — left off. when Ms. Holub shared a story about her friends being in Camp Hero at night only to have all their flashlights go dead simultaneously, we both laughed. Yet I was experiencing some technical difficulties of my own. My reliable digital camera was on the fritz. I changed the batteries. I played with the lens. It would not take a photograph. I slipped it into my coat pocket to fiddle with later and continued my hike.

Note: Though it's difficult to find reliable information on these matters, those with an open mind and a desire to know might appreciate spending some time exploring the links above.


Genetically Engineered Rice Wins USDA Approval
2006-11-25, Washington Post
Posted: 2006-11-26 13:27:02
http://www.washingtonpost.com/wp-dyn/content/article/2006/11/24/AR20061124011...

The Department of Agriculture declared safe for human consumption yesterday an experimental variety of genetically engineered rice found to have contaminated the U.S. rice supply this summer. The move ... to deregulate the special long-grain rice, LL601, was seen as a legal boon to its creator, Bayer CropScience. The company applied for approval shortly after the widespread contamination was disclosed in August and now faces a class-action lawsuit filed by hundreds of farmers in Arkansas and Missouri. The experimental rice ... escaped from Bayer's test plots after the company dropped the project in 2001. The resulting contamination, once it became public, prompted countries around the world to block rice imports from the United States, sending rice futures plummeting and farmers into fits. In approving the rice, the USDA allowed Bayer to take a regulatory shortcut and skip many of the usual safety tests. Joseph Mendelson, legal director of the nonprofit Center for Food Safety, said the quick approval shows that the USDA is more concerned about the fortunes of the biotechnology industry than about consumers' health. "USDA is telling agricultural biotechnology companies that it doesn't matter if you're negligent, if you break the rules, if you contaminate the food supply with untested genetically engineered crops, we'll bail you out," Mendelson said in a statement. Officials in Europe, where genetically altered rice is derisively dubbed "Frankenfood," made clear as recently as last week that European countries will not accept any U.S. rice, he said.

Note: For reliable information on the deception and dangers of GM (Genetically Modified) food, click here.


The War On Waste
2002-01-29, CBS News
Posted: 2006-11-24 16:46:20
http://www.cbsnews.com/stories/2002/01/29/eveningnews/main325985.shtml

On Sept. 10 [2001], Secretary of Defense Donald Rumsfeld declared war. Not on foreign terrorists, "the adversary's closer to home. It's the Pentagon bureaucracy." He said money wasted by the military poses a serious threat. Rumsfeld promised change but the next day—Sept. 11—the world changed and in the rush to fund the war on terrorism, the war on waste seems to have been forgotten. Just last week President Bush announced, "my 2003 budget calls for more than $48 billion in new defense spending." More money for the Pentagon ... while its own auditors admit the military cannot account for 25 percent of what it spends. "According to some estimates we cannot track $2.3 trillion in transactions," Rumsfeld admitted. $2.3 trillion—that's $8,000 for every man, woman and child in America. A former Marine turned whistle-blower is risking his job by speaking out ... about the millions he noticed were missing from one defense agency's balance sheets. Jim Minnery, Defense Finance and Accounting Service ... tried to follow the money trail, even crisscrossing the country looking for records. "The director looked at me and said 'Why do you care about this stuff?' It took me aback. My supervisor asking me why I care about doing a good job," said Minnery. He was reassigned and says officials then covered up the problem. The Pentagon's Inspector General "partially substantiated" several of Minnery's allegations.

Note: To see the CBS video clip of this shocking admission, click here. For another key clip, click here. For other media articles revealing major corruption, click here. Even though originally not reported because of the trauma of 9/11, why wasn't this news broadcast far and wide later? Why isn't it making media headlines now? For other revealing news articles on military corruption, click here.


Israelis unleash Scream at protest
2005-06-06, Toronto Star (One of Canada's leading newspapers)
Posted: 2006-11-24 14:55:13
http://www.torstarreports.com/NASApp/cs/ContentServer?pagename=thestar/Layout...

The knees buckle, the brain aches, the stomach turns. And suddenly, nobody feels like protesting anymore. Witnesses describe a minute-long blast of sound emanating from a white Israeli military vehicle. Within seconds, protestors began falling to their knees, unable to maintain their balance. An Israeli military source, speaking on the customary condition of anonymity, confirmed the existence of the Scream. "The intention is to disperse crowds with sound pulses that create nausea and dizziness," the Israel Defence Force spokesperson told the Toronto Star. The IDF is saying little about the science behind the Scream, citing classified information. But the technology is believed to be similar to the LRAD — Long-Range Acoustic Device — used by U.S. forces in Iraq as a means of crowd control. Hillel Pratt, a professor of neurobiology ... likens the effect of such technologies to simulated seasickness. "It doesn't necessarily have to be a loud sound. The combination of low frequencies at high intensities, for example, can create discrepancies in the inputs to the brain," said Pratt. Arik Asherman, a leader of Rabbis For Human Rights, was cautiously optimistic the Scream could make a positive difference. But Asherman said Israeli officials would be wise to use the Scream sparingly. "We need to remind ourselves the problem is not the demonstrations, but what the demonstrations are about," he said. "If this makes it any more difficult for Palestinians to express themselves in a non-violent way, that is problematic. The best way to disperse demonstrations is to deal with the actual issues.

Note: If the above link fails, click here.


Enron Schemes Caught On Tape
2005-02-03, CBS News
Posted: 2006-11-24 14:26:09
http://www.cbsnews.com/stories/2005/02/03/eveningnews/main671618.shtml

During the West Coast Power crisis homes went dark and streetlights were out ... causing injuries and accidents. But the danger didn't stop Enron's energy traders from having a good laugh. CBS ... reports on the Enron scheme, as caught on new audio tape. The traders and plant operator laugh and plot in a display that seems to prove the theory that years before the energy crisis, Enron manipulated markets. "They had to do a rolling blackout through the town and there was a red light there he didn't see," one Enron trader says on tape. "That's beautiful," a second voice responds. Enron secretly shut power plants down so they could cause, and then cash in on, the crisis. Enron also pulled power out of states like California, causing emergency conditions to worsen. "Sorry California," an Enron trader says. "I'm bringing all our power out of state today." Plant operators were coached on how to lie to officials. "We want you guys to get a little creative..." one voice says on the tape, "and come up with a reason to go down. Just call 'em, Hey guys…we're coming down." The plant operator replies, "OK, so we're just comin' down for some maintenance?" "Right," the trader says. "And that's cool?" the plant operator asks. "Hopefully," the trader responds, to which the men are heard laughing. Enron also pulled power out of states like California, causing emergency conditions to worsen. The "shut downs" and "pull outs" triggered sky high power prices. "We're just making money hand over fist!" one voice is heard saying on the tape. And when states complained, the guys at Enron seemed to have a response. "Get a f****** clue," one says. "Yeah," another chimes in. "Leave us alone. Let us make a little bit of money."

Note: For an eye-opening two-minute video clip on CBS, watch "Enron Schemers on Tape" at this link. MSNBC also published a revealing article on this. And a New York Times article states "Company officials had long denied that they illegally shut down plants to create artificial shortages. Two months after the recording showed how the Nevada plant was shut down, [Enron CEO Kenneth] Lay called any claims of market manipulation 'conspiracy theories.'" For lots more reliable information on the energy cover-up, click here.


Freezing gas prices
2005-05-25, NBC Oklahoma City
Posted: 2006-11-24 14:08:07
http://www.kfor.com/Global/story.asp?s=3390503

There is a man who fills up his tank once every two months. One tank of gas, literally, lasts him two months. He is freezing the price of gas by freezing something else. David Hutchison is a Cryogenics expert. He built this Cryo-Process himself. A few years ago he began an experiment on his hybrid Honda, freezing the engine components. The results were a fuel-efficiency dream. A hybrid Honda typically gets really great gas mileage anyway, around 50 miles to the gallon, but David Hutchison's cryogenically tempered engine has been known to get close to 120 miles a gallon. Racers have picked up on David's trick of cryogenically freezing car parts. It is now widely accepted among NASCAR and Indy-car racers.

Note: Why isn't this front-page headlines with rapid development for use by us all?


Bush Has Declared Katrina-Related Emergencies in 40 States
2005-09-15, ABC News
Posted: 2006-11-23 13:57:50
http://abcnews.go.com/US/wireStory?id=1129802

The dire conditions created by Hurricane Katrina may be confined to the Gulf Coast, but on paper the emergency is all over the country. President Bush has declared that Katrina-related emergencies exist in 40 states and the District of Columbia. Some, such as California, Massachusetts and North Dakota, are far removed from Katrina's wrath. Apparently it does not take much to qualify as an emergency.

Note: These "emergencies" also give the president extraordinary powers to curtail civil liberties.


Conference on Terrorism, Weapons of Mass Destruction, and U.S. Strategy
1997-04-28, Defense Link (Official Website of U.S. Department of Defense)
Posted: 2006-11-23 13:36:03
http://www.defenselink.mil/transcripts/1997/t042897_t0428coh.html

Some countries have been trying to construct something like an Ebola Virus, and that would be a very dangerous phenomenon, to say the least. Alvin Toeffler has written about this in terms of some scientists in their laboratories trying to devise certain types of pathogens that would be ethnic specific so that they could just eliminate certain ethnic groups and races; and others are designing some sort of engineering, some sort of insects that can destroy specific crops. Others are engaging even in an eco- type of terrorism whereby they can alter the climate, set off earthquakes, volcanoes remotely through the use of electromagnetic waves. So there are plenty of ingenious minds out there that are at work finding ways in which they can wreak terror upon other nations. It's real, and that's the reason why we have to intensify our efforts.

If terrorist organizations have the capability to set off earthquakes and other major natural disasters, do you think huge military research laboratories with vast budgets might have some of the same capabilities? For more, click here and here.


Bush Has Declared Katrina-Related Emergencies in 40 States
2005-09-15, ABC News
Posted: 2006-11-23 13:15:08
http://abcnews.go.com/US/wireStory?id=1129802

The dire conditions created by Hurricane Katrina may be confined to the Gulf Coast, but on paper the emergency is all over the country. President Bush has declared that Katrina-related emergencies exist in 40 states and the District of Columbia. Apparently it does not take much to qualify as an emergency.

Note: These "emergencies" also give the president extraordinary powers to curtail civil liberties.


New Orleans is Sinking (Hurricane predicted on 9/11!!!)
2001-09-11, Popular Mechanics (Note date of this article)
Posted: 2006-11-23 12:51:00
http://www.popularmechanics.com/science/research/1282151.html

Emergency planners believe that it is a foregone conclusion that the Big Easy someday will be hit by a scouring storm surge. This watery "big one" will produce a staggering amount of damage. Yet, this doesn't necessarily mean that there will be a massive loss of lives. The key is a new emergency warning system developed by...Louisiana State University. Within 30 minutes to an hour after raw data is collected from monitoring stations in the Gulf, an assessment of storm-surge damage would be available to emergency planners. Disaster relief agencies then would be able to mobilize resources.


Hurricane Katrina: Compilation of FEMA's Rejections of Qualified Help
2005-09-12, Chicago Tribune/New York Times/Washington Post/CNN/More
Posted: 2006-11-23 12:25:34
http://www.WantToKnow.info/femafailureskatrina

FEMA refuses hundreds of personnel, dozens of vehicles - Chicago Tribune, 9/2/05
http://www.chicagotribune.com/news/local/chi-050902daley,1,2011979.story

FEMA won't let Red Cross deliver food - Pittsburgh Post-Gazette, 9/3/05
http://www.post-gazette.com/pg/05246/565143.stm

FEMA fails to utilize Navy ship with 600-bed hospital on board - Chicago Tribune, 9/4/05
http://www.chicagotribune.com/news/nationworld/chi-0509040369sep04,1,4144825.story

FEMA turns away state-of-the-art mobile hospital from Univ. of North Carolina - CNN, 9/5/05
http://edition.cnn.com/2005/HEALTH/09/04/katrina.sick.redtape.ap/

FEMA won't accept Amtrak's help in evacuations - Financial Times, 9/5/05
http://news.ft.com/cms/s/84aa35cc-1da8-11da-b40b-00000e

FEMA turns back Wal-Mart supply trucks - New York Times, 9/6/05
http://www.nytimes.com/2005/09/05/national/nationalspecial/05blame.html

FEMA prevents Coast Guard from delivering diesel fuel - New York Times, 9/6/05
http://www.nytimes.com/2005/09/05/national/nationalspecial/05blame.html

FEMA blocks 500-boat citizen flotilla from delivering aid - News Sentinel, 9/8/05
http://www.fortwayne.com/mld/newssentinel/news/editorial/12595873.htm

FEMA asks media not to take pictures of dead - Washington Post, 9/8/05
http://www.washingtonpost.com/wp-dyn/content/article/2005/09/07/AR2005090702126.html

FEMA turns back German government plane loaded with 15 tons of food - Spiegel, 9/12/05
http://service.spiegel.de/cache/international/0,1518,374268,00.html

FEMA: "First Responders Urged Not To Respond" Unless Dispatched - FEMA's own website
http://www.fema.gov/news/newsrelease.fema?id=18470

For those who are ready to go even deeper, read about FEMA's shady beginnings by clicking here. Then, to see Online Journal's revealing analysis article "New Orleans: Dress rehearsal for lockdown of America," click here.


Ontario to build reactors
2006-06-12, Toronto Star (one of Canada's leading newspapers)
Posted: 2006-11-22 21:30:01
http://www.thestar.com/NASApp/cs/ContentServer?pagename=thestar/Layout/Articl...

The provincial government will announce tomorrow that Ontario is embracing more nuclear power plants. Premier Dalton McGuinty has privately spoken of his government's plans to confidants for days, insiders say. In an off-the-record speech on Saturday night in Ottawa to the secretive Bilderberg group, McGuinty discussed the pros and cons of more nuclear plants. The premier privately admitted the public will officially learn of the plans tomorrow. Insiders told the Star he was unequivocal in private conversations about his support for the controversial electricity source. McGuinty's staff deliberately omitted any mention of his speech Saturday to the Bilderberg session...from his public itinerary. The group, named for the Dutch hotel the organization first met at in 1954, holds its sessions behind closed doors amid tight security. Because participants in Bilderberg sessions are sworn to secrecy under threat of ex-communication from the group, politicians tend to lower their guard and speak candidly. It was the kind of power-broker audience the premier, who sat with Pataki, Reisman and Queen Beatrix, would want to reach when delivering a message about investing in Ontario — and massive investment will be required to pay for $40 billion in nuclear plants.

Note:If the above link fails, click here. If the Bilderbergers truly support the interests of all of us, why the need for so much secrecy? Why is there no website? Why until just a few years ago was there virtually no reporting on the influential Bilderberg Group at all in the major media?


Secretive group's departure as low-key as arrival
2006-06-12, Ottawa Citizen (leading newspaper of Canada's capital city)
Posted: 2006-11-22 21:26:08
http://www.canada.com/ottawacitizen/news/story.html?id=12fd4eaa-1b87-48da-9fe...

Four days after they arrived quietly at a Kanata hotel, the world's rich and powerful left just as mysteriously, in limos and SUVs with blacked-out windows. The Bilderberg Group, a secretive organization of politicians and business leaders from around the world, gave no public statements. With private security guards and metal barriers keeping outsiders on the street, the Bilderbergers met privately and then whisked themselves away in ones and twos, mostly to the airport. What they talked about at the Brookstreet Hotel is still a secret. The group meets annually, and is usually rumoured to discuss international politics and business, from Middle East crises to oil prices. They emerged singly yesterday -- Bilderberg president Etienne Davignon of Belgium, American David Rockefeller, Italian economist Mario Monti, European competition commissioner Neelie Kroes from the Netherlands, and, watchers thought, Iraqi politician Ahmed Chalabi. Protesters on the sidewalk have their own version of the agenda: world domination, a merger of Canada with the United States and Mexico, hiding the cure for cancer, suppression of cars that get 200 miles per gallon of fuel, [and] an invasion of Iran.

Note: This article lists the names and descriptions of 21 participants of this Bilderberg meeting. If you read through them, you will see that they are clearly among the most powerful and wealthy people in the world.


Secretive society's big names include Kissinger, Rockefeller, a queen
2006-06-09, Toronto Star (one of Canada's leading newspapers)
Posted: 2006-11-22 21:23:48
http://www.thestar.com/NASApp/cs/ContentServer?pagename=thestar/Layout/Articl...

Among prominent attendees at this year's conference of the Bilderberg group, a secretive society that includes some of the world's most powerful people: Jacques Aigrain, CEO of Swiss Re. Ahmad Chalabi, former deputy prime minister of Iraq and long-time opponent of Saddam Hussein. George A. David, chairman of Coca-Cola. Paul Desmarais, CEO of Power Corporation. Richard Holbrooke, key American negotiator for 1995 Bosnian peace accords. Vernon Jordan, friend and onetime presidential aide to Bill Clinton. Henry Kissinger, foreign-policy guru and secretary of state under Richard Nixon. Ed Kronenburg, director of NATO's private office. Bernardino Leon Gross, Spain's foreign minister. Ronald S. Lloyd, chairman of Credit Suisse First Boston. Queen Beatrix of The Netherlands. Gordon Nixon, Royal Bank of Canada president, CEO. George Pataki, governor of New York state. Richard Perle, senior foreign policy adviser to U.S. President George W. Bush. David Rockefeller, retired banker, heir to oil fortune. Dennis Ross, former Clinton Mideast negotiator. Giulio Tremonti, VP of Italy's chamber of deputies. James Wolfensohn, U.S. Mideast envoy, former head of the World Bank. Robert Zoellick, deputy U.S. secretary of state.

Note: If the above link fails, click here. For those who know about the pre-war manipulations involving weapons of mass destruction in Iraq, the participation of Ahmed Chalabi speaks volumes. And for a revealing three-minute video clip on CNN about this highly secretive group, click here.


VIPs' arrivals marked by a discreet 'B'
2006-06-09, Ottawa Citizen (leading newspaper of Canada's capital city) (Front page)
Posted: 2006-11-22 21:18:47
http://www.canada.com/ottawacitizen/news/story.html?id=6ac7a723-323b-497c-970...

Greeted at the airport by limousine drivers holding single-letter "B" signs, global luminaries such as Henry Kissinger, David Rockefeller and Queen Beatrix of the Netherlands began quietly slipping into Ottawa yesterday for the annual gathering of the ultra-secretive Bilderberg Group. The group's discreet approach was evident as attendees arrived yesterday at the Ottawa Airport. Outside the airport, a phalanx of limousines lined up to ferry guests to the Brookstreet. Approached by a Citizen reporter upon his arrival, former U.S. defence policy adviser Richard Perle shot down criticism about the secrecy of the group's meetings. "It's a private organization," he said. He denied the charge, advanced by Bilderberg critics, that the organization crafts public policy behind closed doors. "It discusses public policy," he stressed. Mr. Perle also dismissed suggestions that the group's heavy representation from the oil industry gives it influence over energy prices. Also seen arriving yesterday were Jorma Ollila, chairman of Royal Dutch Shell [and] World Bank president James Wolfenson. According to an unsigned press release sent by fax yesterday, presumably by Bilderberg organizers, attendees will also include New York Governor George Pataki, deputy prime minister of Iraq Ahmad Chalabi, the heads of Coca-Cola, Credit Suisse, [and] the Royal Bank of Canada. "The meeting is private to encourage frank and open discussion," said the release. "There will be no press conference."

Note: To see photos of this article on the front page of the Ottawa Citizen:
http://www.prisonplanet.com/Pictures/Jun06/110606bbg_media_ottawa_citizen.jpg
http://www.prisonplanet.com/Pictures/Jun06/110606bbg_tucker_paper_cover.jpg
For a video clip of reporters trying trying to get close, click here and go to the "Video" section on the right.


Kanata hotel hosts high-level power group
2006-06-09, CBC News (Canada's equivalent of PBS)
Posted: 2006-11-22 21:15:49
http://www.cbc.ca/ottawa/story/ot-bilderberg20060609.html

A serene setting in Ottawa's west-end Kanata suburb has been transformed into a four-day festival of black suits, black limousines, burly security guards and a bevy of conspiracy theories. The security outside the Brookstreet Hotel is much tighter than it is on Parliament Hill. Inside, the CBC was told, all guests were asked to check out at 8:30 a.m. on Thursday. The hotel appears to be hosting the annual meeting of one of the world's most secretive and powerful societies: the Bilderberg group. But, of course, no one will admit it. People who follow the Bilderberg group say it persuaded Europe to adopt a common currency, and, among other things, persuaded Bill Clinton to support the North American Free Trade Agreement. "David Rockefeller is going to be here. Henry Kissinger is going to be here. Wolfowitz, the president of the World Bank, is going to be here" says Daniel Estulin, who has written a book about the Bilderberg group. Jim Tucker, who has followed the Bilderberg group for the last 30 years, told CBC News he is troubled by all the secrecy. "Officials of the United States government [should not] have a private meeting with private citizens about public policy," Tucker says.


Bilderberg-bound filmmaker held at airport
2006-06-08, Ottawa Citizen (leading newspaper of Canada's capital city)
Posted: 2006-11-22 21:13:16
http://www.canada.com/ottawacitizen/news/story.html?id=f67cbe75-4eed-4daf-877...

Canadian authorities detained an American activist filmmaker at the Ottawa airport late Wednesday night, confiscating his passport, camera equipment and most of his belongings. Citizenship and Immigration Canada agents stopped Alex Jones, whose films include Martial Law 9/11: The Rise of the Police State, and questioned him for nearly four hours before letting him go with only one change of clothes and telling him to return Thursday morning. “It’s really chilling, like a police state,” said Mr. Jones of his detention. Mr. Jones and his crew...travelled to Canada to film a documentary about the Bilderberg group, a secretive group of former politicians and business leaders who are meeting in Ottawa this week. A Citizenship and Immigration representative said that her department was unable to comment on Mr. Jones’ detention.


VIPs set to arrive for Bilderberg meeting
2006-06-08, Ottawa Citizen (leading newspaper of Canada's capital city)
Posted: 2006-11-22 21:11:07
http://www.canada.com/ottawacitizen/news/story.html?id=11df53f7-6caf-4385-a6d...

Members of the Bilderberg Group will descend on the upscale Brookstreet Hotel for the three-day meeting, several police sources confirmed yesterday. When asked about police plans for the event, a police spokeswoman referred the Citizen to Alan Bell of Globe Risk Holdings. Reached by phone, Mr. Bell -- who is listed as president of Globe Risk Holdings in Toronto and a former SAS paratrooper commando -- said he hadn't heard of the Bilderberg Group and denied that his firm has been hired to guard this week's conference. "Never heard of that conference. What is it?" said Mr. Bell before politely cutting the conservation short. But according to the company's website, Globe Risk Holdings specializes in "strategic planning and counter-measures," recruits its consultants primarily from elite military counter-terrorist and special forces units, and has "undertaken consultancy and project work worldwide in areas of high risk". "The consultants at Globe Risk Holdings have proven backgrounds in military, special forces, law enforcement and government organizations with real life expertise in the areas of international security...close protection, sabotage prevention, and military/law enforcement," reads the company website.

Note: Denial and lying seem to be standard protocol for those involved with the Bilderberg group. What does that say about what is being discussed in their secret meetings?


Secretive power brokers meeting coming to Ottawa?
2006-05-24, Ottawa Citizen (leading newspaper of Canada's capital city)
Posted: 2006-11-22 21:07:53
http://www.canada.com/topics/news/world/story.html?id=ff614eb8-02cc-41a3-a42d...

The meetings of a secretive global think-tank would bring 100 of the world's most powerful and influential figures to Ottawa next month [for] deliberations on such weighty issues as the direction of global oil markets and potential military action against Iran. Reports circulating on the Internet say this year's Bilderberg Conference will be held June 8-11 at the Brookstreet Hotel - a rumour the hotel would not confirm. Patrice Basille, general manager of the Brookstreet Hotel, said no event associated with the Bilderberg group has been formally booked. "'What is the Bilderberg?" he asked. "This is the first I've heard about it." Journalists aren't allowed to attend the sessions, and staff at the host hotels are told not to confirm or deny any event is scheduled. But, if a gathering in Ottawa is anything like past Bilderbergs, invitees will be drawn from the pages of International Who's Who, with a emphasis on political and corporate leadership and strong representation of the oil and banking industries. The Bilderberg has been accused of being everything from a Zionist cabal building a single global government to a secret star-chamber that seeks to fix the price of oil and presidential elections. Even some rational critics suspect the Bilderberg's meetings set the economic and political agenda for much of the industrialized world without any public oversight or accountability. They denounce the Bilderberg as elitist and overly secretive, calling it an anti-democratic gathering of "the high priests of globalization."


History's Mysteries: Mind Control: America's Secret War
2001-08-01, History Channel
Posted: 2006-11-22 17:59:51
http://store.aetv.com/html/product/index.jhtml?id=73738&browseCategoryId=&loc...

It is one of the ill-kept secrets of America's intelligence agencies--for decades, they have worked virtually non-stop to perfect means of controlling the human mind. But while many have suspected the existence of these projects, the details have long been preserved. MIND CONTROL blows the lid off years of chilling experiments, drawing on documents reluctantly released through the Freedom of Information Act and interviews with some of the victims, including a woman whose past was literally taken away. Hear from John Marks, the author of In Search of the Manchurian Candidate, who broke the story of the CIA's abuses by unraveling the mysteries contained in financial records. All the other records pertaining to the experiments were destroyed by the agency in an attempt to prevent the details from ever being known.

Note: Interviews in this eye-opening documentary with top psychiatrists, lawyers, and victims send chills up the spine. A former head of the American Psychiatric Association, Dr. Ewen Cameron, is one of many highly respected doctors who erased the personalities of thousands of unsuspecting victims, while many in the profession simply turned a blind eye. To watch this powerful documentary free online, click here.


Senior Government Officials Question 9/11 Commission Report
2006-09-11, Boston Globe/Fox News/Wall Street Journal, More
Posted: 2006-11-22 16:46:31
http://www.WantToKnow.info/officialsquestion911commissionreport

Many respected senior members of the U.S. military, intelligence services, and government have expressed significant criticism of the 9/11 Commission Report. Some even allege government complicity in the terrible acts of 9/11. Below are the highly revealing statements on this vital topic of over 50 prominent public servants with links for verification and further investigation. The collective voices of these respected senior officials give credibility to the claim that the 9/11 Commission Report is tragically flawed. These dedicated individuals from both political parties cannot be simply dismissed as irresponsible believers in some 9/11 conspiracy theory. Their sincere concern, backed by decades of service to their country, demonstrate that criticism of the 9/11 Commission Report is not only reasonable and responsible, it is in fact a patriotic duty.


Skull And Bones
2004-06-13, CBS News
Posted: 2006-11-21 22:40:39
http://www.cbsnews.com/stories/2003/10/02/60minutes/main576332.shtml

As opposite as George Bush and John Kerry may seem to be, they do share a common secret - one they've shared for decades. The secret: details of their membership in Skull and Bones, the elite Yale University society whose members include some of the most powerful men of the 20th century. Bonesmen, as they're called, are forbidden to reveal what goes on in their inner sanctum. Bones has included presidents, cabinet officers, spies, Supreme Court justices, [and] captains of industry. They'd responded to questions with utter silence until an enterprising Yale graduate, Alexandra Robbins, managed to penetrate the wall of silence in her book, Secrets of the Tomb. "I spoke with about 100 members of Skull and Bones. They were members who were tired of the secrecy,” says Robbins. “But probably twice that number hung up on me, harassed me, or threatened me.” Skull and Bones, with all its ritual and macabre relics, was founded in 1832. Since then, it has chosen or "tapped" only 15 senior students a year who become ... lifetime members of the ultimate old boys' club. A lot of Bonesmen have gone on to positions of great power. President Bush ... tapped five fellow Bonesmen to join his administration. Bonesmen have [included] William Howard Taft, the 27th President; Henry Luce, the founder of Time Magazine; and W. Averell Harriman, the diplomat and confidant of U.S. presidents. Mr. Bush, like his father and grandfather before him, has refused to talk openly about Skull and Bones. But as a Bonesman, he was required to reveal his innermost secrets to his fellow Bones initiates. They're supposed to recount their entire sexual histories in ... a dimly-lit cozy room.

Note: For a highly revealing, four-minute CNN News clip on Skull and Bones, click here. For other major media news clips reporting on this powerful secret society, click here. And for lots more reliable information from major media sources on powerful, secret groups like this, click here.


Inside the secretive Bilderberg Group
2005-09-29, BBC News
Posted: 2006-11-21 21:59:44
http://news.bbc.co.uk/1/hi/world/americas/4290944.stm

How much influence do private networks of the rich and powerful have on government policies and international relations? One group, the Bilderberg, has often attracted speculation that it forms a shadowy global government. Every year since 1954 [they have brought] together about 120 leading business people and politicians. At this year's meeting in Germany, the audience included the heads of the World Bank and European Central Bank, Chairmen or Chief Executives from Nokia, BP, Unilever, DaimlerChrysler and Pepsi ... editors from five major newspapers, members of parliament, ministers, European commissioners ... and the queen of the Netherlands. The chairman ... is 73-year-old Viscount Etienne Davignon. In an extremely rare interview, he played down the importance of Bilderberg. "I don't think (we are) a global ruling class because I don't think a global ruling class exists." Will Hutton ... who attended a Bilderberg meeting in 1997, says people take part in these networks in order to influence the way the world works, to create what he calls "the international common sense". And that "common sense" is one which supports the interests of Bilderberg's main participants. For Bilderberg's critics the fact that there is almost no publicity about the annual meetings is proof that they are up to no good. Bilderberg meetings often feature future political leaders shortly before they become household names. Bill Clinton went in 1991 while still governor of Arkansas, Tony Blair was there two years later while still an opposition MP. All the recent presidents of the European Commission attended Bilderberg meetings before they were appointed. Informal and private networks like Bilderberg have helped to oil the wheels of global politics and globalisation for the past half a century.

Note: Why is this meeting of top world leaders kept so secret? Why, until a few years ago, was there virtually no reporting on this influential group in the major media? Thankfully, the alternative media has had some good articles. And a Google search can be highly informative. Explore many other revealing major media news articles on powerful secret societies. And for those interested, check out reliable, eye-opening information covering the big picture of how and why these secret societies are using government-sponsored mind control programs to achieve their agenda.


Pentagon boosts 'media war' unit
2006-10-31, BBC News
Posted: 2006-11-21 18:13:07
http://news.bbc.co.uk/2/hi/americas/6100906.stm

The US defence department has set up a new unit to better promote its message across 24-hour rolling news outlets, and particularly on the internet. The Pentagon said the move would boost its ability to counter "inaccurate" news stories and exploit new media. The newly-established unit would use "new media" channels to push its message and "set the record straight", Pentagon press secretary Eric Ruff said. A Pentagon memo seen by the Associated Press news agency said the new unit would "develop messages" for the 24-hour news cycle and aim to "correct the record". The unit would reportedly monitor media such as weblogs and would also employ "surrogates", or top politicians or lobbyists who could be interviewed on TV and radio shows.


Power is not only an aphrodisiac, it does weird things to some of us
2006-11-19, San Francisco Chronicle
Posted: 2006-11-21 17:47:34
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/11/19/INGT9MCJHJ1.DTL

Lyndon Johnson relished summoning underlings in to confer with him while he sat on the toilet. Richard Nixon authorized illegal wiretaps on perceived enemies because, as he later told an interviewer, "when the president does it, it's not illegal." Bill Clinton wantonly had sex with intern Monica Lewinsky. Why is it said that power corrupts, and absolute power corrupts absolutely? In the past few years...research has zeroed in on what an intoxicating elixir power can be. And one thing has become clear: The phrase "drunk with power" is often a dead-on description. These new studies show that power acts to lower inhibitions, much the same as alcohol does. It explains why powerful people act with great daring and sometimes behave rather like gorillas. "Disinhibition is the very root of power," said Stanford Professor Deborah Gruenfeld, a social psychologist who focuses on the study of power. "For most people, what we think of as 'power plays' aren't calculated and Machiavellian -- they happen at the subconscious level. When people feel powerful, they stop trying to 'control themselves.'" People with power...tend to be more oblivious to what others think, more likely to pursue the satisfaction of their own appetites, poorer judges of other people's reactions, more likely to hold stereotypes, overly optimistic and more likely to take risks. People who are naturally selfish grow even more selfish if they attain power, while people who are naturally selfless and giving become more so with power. Henry Kissinger discerned that power is "the ultimate aphrodisiac." "Nearly all men can stand adversity," said Abraham Lincoln, "but if you want to test a man's character, give him power."

Note: This most excellent article graphically describes the problems that can occur when a hierarchical political systems places certain individuals in positions of great authority. For more on this fascinating topic, click here.


CIA role claim in Kennedy killing
2006-11-21, BBC News
Posted: 2006-11-21 17:45:17
http://news.bbc.co.uk/1/hi/programmes/newsnight/6169006.stm

New video and photographic evidence ... puts three senior CIA operatives at the scene of Robert Kennedy's assassination. It reveals that the operatives and four unidentified associates were at the Ambassador Hotel, Los Angeles in the moments before and after the shooting on 5 June, 1968. The CIA had no domestic jurisdiction and some of the officers were based in South-East Asia at the time, with no reason to be in Los Angeles. Kennedy had just won the California Democratic primary on an anti-War ticket and was set to challenge Nixon for the White House. A 24-year-old Palestinian, Sirhan Sirhan, was arrested as the lone assassin. However, even under hypnosis, he has never been able to remember the shooting and defence psychiatrists concluded he was in a trance at the time. Witnesses placed Sirhan's gun several feet in front of Kennedy but the autopsy showed the fatal shot came from one inch behind. Dr Herbert Spiegel, a world authority on hypnosis at Columbia University, believes Sirhan may have been hypnotically programmed to act as a decoy for the real assassin. Three of these men have been positively identified as senior officers who worked together in 1963 at JMWAVE, the CIA's Miami base. David Morales was Chief of Operations and once told friends: "I was in Dallas when we got the son of a bitch and I was in Los Angeles when we got the little bastard." George Joannides was Chief of Psychological Warfare Operations. Now, we see him at the Ambassador Hotel the night a second Kennedy is assassinated.

Note: There is ample evidence that Sirhan Sirhan was a programmed Manchurian Candidate. Declassified CIA documents show that U.S. intelligence services were creating programmed assassins back as early as the 1950s. For reliable, verifiable information on this key topic, click here.


A Shocker: Partisan Thought Is Unconscious
2006-01-24, New York Times
Posted: 2006-11-20 12:23:53
http://www.nytimes.com/2006/01/24/science/24find.html

Using M.R.I. scanners, neuroscientists have now tracked what happens in the politically partisan brain when it tries to digest damning facts about favored candidates or criticisms of them. The process is almost entirely emotional and unconscious, the researchers report, and there are flares of activity in the brain's pleasure centers when unwelcome information is being rejected. Researchers have long known that political decisions are strongly influenced by unconscious emotional reactions, a fact routinely exploited by campaign consultants and advertisers. But the new research suggests that for partisans, political thinking is often predominantly emotional. It is possible to override these biases, Dr. Westen said, "but you have to engage in ruthless self reflection, to say, 'All right, I know what I want to believe, but I have to be honest.' " He added, "It speaks to the character of the discourse that this quality is rarely talked about in politics."


Smallpox vaccine 'triggered Aids virus'
1987-05-11, WantToKnow.info/London Times
Posted: 2006-11-20 11:02:21
http://www.WantToKnow.info/870511vaccineaids

The Aids epidemic may have been triggered by the mass vaccination campaign which eradicated smallpox. The World Health Organization, which masterminded the 13-year campaign, is studying new scientific evidence suggesting that immunization with the smallpox vaccine Vaccinia awakened the unsuspected, dormant human immuno defence virus infection (HIV). Doctors who accept the connection between the anti-smallpox campaign and the Aids epidemic now see answers to questions which had baffled them. How, for instance, the Aids organism, previously regarded by scientists as 'weak, slow and vulnerable,' began to behave like a type capable of creating a plague. The smallpox vaccine theory would account for the position of each of the seven Central African states which top the league table of most-affected countries; why Brazil became the most afflicted Latin American country; and how Haiti became the route for the spread of Aids to the US. The greatest spread of HIV infection coincides with the most intense immunization programmes. Although detailed figures of Aids cases in Africa are difficult to collect, the more than two million carriers, and 50,000 deaths...are concentrated in the Countries where the smallpox immunization programme was most intensive. Brazil, the only South American country covered in the eradication campaign, has the highest incidence of Aids in that region.


U.S. Military Wanted to Provoke War With Cuba
2001-05-01, ABC News
Posted: 2006-11-19 19:16:47
http://abcnews.go.com/US/story?id=92662

In the early 1960s, America's top military leaders reportedly drafted plans to kill innocent people and commit acts of terrorism in U.S. cities to create public support for a war against Cuba. Code named Operation Northwoods, the plans reportedly included the possible assassination of Cuban émigrés, sinking boats of Cuban refugees on the high seas, hijacking planes, blowing up a U.S. ship, and even orchestrating violent terrorism in U.S. cities. The plans were developed as ways to trick the American public and the international community into supporting a war to oust Cuba's ... Fidel Castro. America's top military brass even contemplated causing U.S. military casualties, writing: "We could blow up a U.S. ship in Guantanamo Bay and blame Cuba," and, "casualty lists in U.S. newspapers would cause a helpful wave of national indignation." The plans had the written approval of all of the Joint Chiefs of Staff and were presented to President Kennedy's defense secretary, Robert McNamara, in March 1962. But they apparently were rejected by the civilian leadership and have gone undisclosed for nearly 40 years. The Joint Chiefs even proposed using the potential death of astronaut John Glenn during the first attempt to put an American into orbit as a false pretext for war with Cuba. Should the rocket explode and kill Glenn, they wrote, "the objective is to provide irrevocable proof … that the fault lies with the Communists." The scary thing is none of this stuff comes out until 40 years after.

Note: Why was ABC the only major news source to report on this highly revealing story? Read the shocking declassified documents on Operation Northwoods. Many military and political leaders look at the world as a grand chessboard. Sacrificing pawns (innocent civilians) is sometimes necessary to capture the queen. Explore revealing news articles on military corruption. Then check out eye-opening 9/11 news articles.


The Disbelievers
2006-09-08, Washington Post
Posted: 2006-11-19 17:57:05
http://www.washingtonpost.com/wp-dyn/content/article/2006/09/07/AR20060907016...

A recent Scripps Howard/Ohio University poll of 1,010 Americans found that 36 percent suspect the U.S. government promoted the attacks or intentionally sat on its hands. Sixteen percent believe explosives brought down the towers. A Zogby International poll of New York City residents two years ago found 49.3 percent believed the government "consciously failed to act." The loose agglomeration known as the "9/11 Truth Movement" has stopped looking for truth from the government. The academic wing is led by [Prof. David Ray] Griffin, who founded the Center for a Postmodern World at Claremont University; James Fetzer, a tenured philosopher at the University of Minnesota; and Daniel Orr, the retired chairman of the economics department at the University of Illinois. The movement's de facto minister of engineering is Steven Jones, a tenured physics professor at Brigham Young University, who's ... concluded that the collapse of the twin towers is best explained as controlled demolition. Catherine Austin Fitts served as assistant secretary of housing in the first President Bush's administration. [Robert] Bowman was chief of advanced space programs under presidents Ford and Carter. Fitts and Bowman agree that the "most unbelievable conspiracy" theory is the one retailed by the government. It was a year before David Ray Griffin, an eminent liberal theologian and philosopher, began his stroll down the path of disbelief. He wondered why ... military jets failed to intercept even one airliner. He read the 9/11 Commission report with a swell of anger. Contradictions were ignored and no military or civilian official was reprimanded. Griffin's book, "The New Pearl Harbor" ... never reviewed in a major U.S. newspaper, sold more than 100,000 copies and became a movement founding stone.

Note: If the above link fails, click here. Explore the comments of over 100 professors who have publicly called for a new investigation of 9/11. Then explore the excellent, reliable resources provided in our 9/11 Information Center.


How Bush's grandfather helped Hitler's rise to power
2004-09-25, The Guardian (One of the UK's leading newspapers)
Posted: 2006-11-16 21:45:17
http://www.guardian.co.uk/usa/story/0,12271,1312540,00.html

George Bush's grandfather, the late US senator Prescott Bush, was a director and shareholder of companies that profited from their involvement with the financial backers of Nazi Germany. Newly discovered files in the US National Archives [confirm] that a firm of which Prescott Bush was a director was involved with the financial architects of Nazism. His business dealings...continued until his company's assets were seized in 1942 under the Trading with the Enemy Act. There has been a steady internet chatter about the "Bush/Nazi" connection, much of it inaccurate and unfair. But the new documents, many of which were only declassified last year, show that even after America had entered the war...he worked for and profited from companies closely involved with the very German businesses that financed Hitler's rise to power. Remarkably, little of Bush's dealings with Germany has received public scrutiny, partly because of the secret status of the documentation involving him. But now [a] multibillion dollar legal action for damages by two Holocaust survivors against the Bush family, and the imminent publication of three books on the subject are threatening to make Prescott Bush's business history an uncomfortable issue for his grandson. Three sets of archives spell out Prescott Bush's involvement. All three are readily available, thanks to the efficient US archive system. Like his son, George, and grandson, George W, he went to Yale where he was, again like his descendants, a member of the secretive and influential Skull and Bones student society.


Is It Disease or Delusion? U.S. Takes on a Dilemma
2006-10-24, New York Times
Posted: 2006-11-11 00:00:00
http://www.nytimes.com/2006/10/24/health/24cons.html?ex=1319342400&en=e370af4...

After an avalanche of panicked inquiries from patients across the country who claim to have been stricken with a mysterious skin disease, the federal Centers for Disease Control and Prevention is preparing to begin a full investigation. The patients ... describe symptoms that include sores that are slow to heal, a sensation of things crawling through their skin, joint pain and persistent fatigue. Many say they believe they have Morgellons disease, a diagnosis that has received wide attention on the Internet but is viewed skeptically by some doctors. Morgellons disease joins a growing list of symptom clusters that public health officials have been forced to examine closely in part because of the organizing power and unprecedented reach of the Internet. Morgellons was brought to public attention by ... Mary Leitao, who in 2001 created a Web site describing the mysterious sores and bizarre threadlike extrusions that afflicted her young son. She said she had tried for years to find a medical explanation for his illness. Ultimately, she said, doctors accused her of staging it. After creating the Web site...she was inundated with e-mail messages from people who said they also had the disease. Many of the people who visit her site have been told by doctors that their symptoms are delusional. Several mothers...told her that they had lost custody of their children after doctors decided the youngsters’ symptoms were contrived. Doctors themselves are divided over whether Morgellons is a medical or a psychiatric illness. The patients are clearly suffering from something; it is just not clear what that something is. “I think it’s a real disease,” said Dr. Rafael Stricker, a physician in San Francisco who sees many patients claiming to have Morgellons. Many patients also test positive for Lyme disease.


Privacy under attack, but does anybody care?
2006-10-16, MSNBC News
Posted: 2006-11-11 00:00:00
http://www.msnbc.msn.com/id/15221095/

Only a tiny fraction of Americans – 7 percent, according to a recent survey by The Ponemon Institute – change any behaviors in an effort to preserve their privacy. Few people turn down a discount at toll booths to avoid using the EZ-Pass system that can track automobile movements. And few turn down supermarket loyalty cards. Privacy will remain in the headlines in the months to come, as states implement the federal government’s Real ID Act, which will effectively create a national identification program by requiring new high-tech standards for driver’s licenses and ID cards. The “right to be left alone” is a decidedly conservative -- even Libertarian -- principle. People are now well aware there are video cameras and Internet cookies everywhere, [yet] there is abundant evidence that people live their lives ignorant of the monitoring. People write e-mails and type instant messages they never expect anyone to see. Just ask Mark Foley or even Bill Gates, whose e-mails were a cornerstone of the Justice Department’s antitrust case against Microsoft. It is also impossible to deny that Americans are now being watched more than at any time in history. But there is another point in the discussion about which there is little disagreement: The debate over how much privacy we are willing to give up never occurred.


The death of habeas corpus
2006-10-11, MSNBC
Posted: 2006-11-11 00:00:00
http://msnbc.msn.com/id/15220450/

The president has...managed to kill the writ of habeas corpus. Tonight, a special investigation, how that, in turn, kills nothing less than your Bill of Rights. Because the Mark Foley story began to break on the night of September 28...many people may not have noticed the bill passed by the Senate that night. Congress passed the Military Commission’s Act to give Mr. Bush the power to deal effectively with America’s enemies—those who seek to harm the country. He has been very clear on who he thinks that is. GEORGE W. BUSH: For people to leak that program and for a newspaper to publish it does great harm to the United States of America. That fact that we’re discussing this program is helping the enemy. OLBERMANN: So, the president said it was urgent that Congress send him this bill as quickly as possible, not for the politics of next month’s elections, but for America. One bit of trivia that caught our eye was the elimination of habeas corpus, which apparently used to be the right of anyone who’s tossed in prison to appear in court and say “Hey, why am I in prison?” COUNTDOWN has obtained a copy of [the] “Constitution” of the United States, and sources tell us it was originally sneaked through the constitutional convention and state ratification in order to establish America’s fundamental legal principles. There’s only one reference to habeas corpus: “The privilege of the writ of habeas corpus shall not be suspended unless when in cases of rebellion or invasion the public safety may require it.”


Bush signings called effort to expand power
2006-10-05, Boston Globe
Posted: 2006-11-11 00:00:00
http://www.boston.com/news/nation/washington/articles/2006/10/05/bush_signing...

President Bush's frequent use of signing statements to assert that he has the power to disobey newly enacted laws is "an integral part" of his "comprehensive strategy to strengthen and expand executive power" at the expense of the legislative branch, according to a report by the non partisan Congressional Research Service. The research service said the Bush administration is using signing statements as a means to slowly condition Congress into accepting the White House's broad conception of presidential power, which includes a presidential right to ignore laws he believes are unconstitutional. The administration has suggested repeatedly that the president has exclusive authority over foreign affairs and has an absolute right to withhold information from Congress. Such assertions are "generally unsupported by established legal principles," the report said. Last week...Bush signed the 2007 military budget bill, but then issued a statement challenging 16 of its provisions. Bush has used signing statements to challenge more than 800 laws that place limits or requirements on the executive branch, saying they intrude on his constitutional powers. The American Bar Association called signing statements "contrary to the rule of law and our constitutional separation of powers." It said presidents cannot sign bills and then declare parts of them unconstitutional because a president has only two choices -- to sign a bill and enforce it as written, or to veto it and give Congress a chance to override the veto.


Bush Says He Can Edit Security Reports
2006-10-05, ABC News/Associate Press
Posted: 2006-11-11 00:00:00
http://abcnews.go.com/Politics/wireStory?id=2532403

President Bush, again defying Congress, says he has the power to edit the Homeland Security Department's reports about whether it obeys privacy rules while handling background checks, ID cards and watchlists. In the law Bush signed Wednesday, Congress stated no one but the privacy officer could alter, delay or prohibit the mandatory annual report on Homeland Security department activities that affect privacy, including complaints. But Bush, in a signing statement attached to the agency's 2007 spending bill, said he will interpret that section "in a manner consistent with the President's constitutional authority to supervise the unitary executive branch." The American Bar Association and members of Congress have said Bush uses signing statements excessively as a way to expand his power. Bush's signing statement Wednesday challenges several other provisions in the Homeland Security spending bill. Bush, for example, said he'd disregard a requirement that the director of the Federal Emergency Management Agency must have at least five years experience and "demonstrated ability in and knowledge of emergency management and homeland security."


Foley's Behavior No Secret on Capitol Hill
2006-10-01, ABC News
Posted: 2006-11-11 00:00:00
http://abcnews.go.com/WNT/story?id=2514770

[Congressman] Foley's obsession with 16- and 17-year-old male pages has been known to Republicans on Capitol Hill for at least five years. But other than issue a warning, little else seems to have been done about the congressman. A former page has come forward to tell ABC News warnings were issued about Foley to the pages in 2001. Internet messages [were] sent by Foley to three different pages after that warning. Two of them were sent to pages in the 2001-2002 class, with sexually explicit messages, most too graphic to be broadcast, from Foley using the screen name Maf54. "Maf54: To be honest, I am a little to interested in you. So that's why I need to back off a little. Teen: Ya, slow things down a little im still young…like under 18. don't want to do anything illegal…im not 18. Maf54: cool..dont forget to measure for me." [This last sentence was] a reference to his request that the page provide the measurements of his sexual organ, a request he repeatedly made to another page as well. Former pages tell ABC News the pages involved with Foley were afraid to offend the powerful Republican congressman. It's possible Foley could end up being prosecuted under laws he helped to enact as the co-chairman of the House caucus on Missing and Exploited Children.

Note: If you want to know the degree of sexual corruption which reaches to the highest levels in government, see the incredibly well done Discovery Channel documentary Conspiracy of Silence available free online at http://www.WantToKnow.info/060501conspiracyofsilence


Beijing secretly fires lasers to disable US satellites
2006-09-26, The Telegraph (One of the U.K.'s top newspapers)
Posted: 2006-11-11 00:00:00
http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2006/09/26/wchina226.xml

China has secretly fired powerful laser weapons designed to disable American spy satellites by "blinding" their sensitive surveillance devices. The hitherto unreported attacks have been kept secret by the Bush administration for fear that it would damage attempts to co-opt China in diplomatic offensives against North Korea and Iran. Sources told the military affairs publication Defense News that there had been a fierce internal battle within Washington over whether to make the attacks public. In the end, the Pentagon's annual assessment of the growing Chinese military build-up barely mentioned the threat. "After a contentious debate, the White House directed the Pentagon to limit its concern to one line," Defense News said. The document said that China could blind American satellites with a ground-based laser firing a beam of light to prevent spy photography as they pass over China. According to senior American officials: "China not only has the capability, but has exercised it." American satellites like the giant Keyhole craft have come under attack "several times" in recent years.

Note: Why are so few major media picking up this important news? A Google news search shows that the New York Sun is the only major media to have reported this news in the U.S.


Voting machines put U.S. democracy at risk
2006-09-20, CNN News
Posted: 2006-11-11 00:00:00
http://www.cnn.com/2006/US/09/19/Dobbs.Sept20/index.html

There is little assurance your vote will count. As we've been reporting almost nightly...for more than a year, electronic voting machines are placing our democracy at risk. These machines time and again have been demonstrated to be extremely vulnerable to tampering and error, and many of them have no voter-verified paper trail. Only 27 states have laws requiring the use of voter-verified paper trails. 15 states [have] no mandated requirements for safeguarding your vote. During the 2004 presidential election, one voting machine...added nearly 3,900 additional votes to Bush's total. Officials caught the machine's error because only 638 voters cast presidential ballots at that precinct, but in a heavily populated district, can we really be sure the votes will be counted correctly? [In] the May primary election in Cuyahoga County, Ohio...the electronic voting machines' four sources of vote totals -- individual ballots, paper trail summary, election archives and memory cards -- didn't even match up. The report concluded that relying on the current system for Cuyahoga County's more than 1.3 million people should be viewed as "a calculated risk." Are we really willing to risk our democracy? A 2005 Government Accountability Office report on electronic voting confirmed the worst fears of watchdog groups and election officials. "There is evidence that some of these concerns have been realized and have caused problems with recent elections, resulting in the loss and miscount of votes." That is simply unacceptable. Congress and the White House need to immediately take steps to assure the integrity of electronic voting with paper trails that could be audited in any recount.

Note: For lots more reliable, verifiable information on the various aspects of the elections cover-up, see http://www.wanttoknow.info/electionsinformation


U.S. War Prisons Legal Vacuum for 14,000
2006-09-17, ABC News/Associated Press
Posted: 2006-11-11 00:00:00
http://abcnews.go.com/International/wireStory?id=2456625

The U.S. military has created a global network of overseas prisons...keeping 14,000 detainees beyond the reach of established law. Disclosures of torture and long-term arbitrary detentions have won rebuke from leading voices including the U.N. secretary-general and the U.S. Supreme Court. Tens of thousands now have passed through U.S. detention. Many say they were caught up in U.S. military sweeps, often interrogated around the clock, then released months or years later without apology, compensation or any word on why they were taken. Seventy to 90 percent of the Iraq detentions in 2003 were "mistakes," U.S. officers once told the international Red Cross. The detention system often is unjust and hurts the war on terror by inflaming anti-Americanism in Iraq and elsewhere. Human rights groups count dozens of detainee deaths for which no one has been punished or that were never explained. The new manual banning torture doesn't cover CIA interrogators. Thousands of people still languish in a limbo, deprived of one of common law's oldest rights, habeas corpus, the right to know why you are imprisoned. The U.S. government has contended it can hold detainees until the "war on terror" ends. [Inmates] have been held without charge for three to four years. [Guantanamo's] population today...stands at 455. Only 10 of the Guantanamo inmates have been charged with crimes. In only 14 of 34 cases has anyone been punished for the confirmed or suspected killings of detainees. The stiffest sentence in a torture-related death has been five months in jail. In almost half of 98 detainee deaths, the cause was either never announced or reported as undetermined.


The ID Chip You Don't Want in Your Passport
2006-09-15, Washington Post
Posted: 2006-11-11 00:00:00
http://www.washingtonpost.com/wp-dyn/content/article/2006/09/15/AR20060915009...

If you have a passport, now is the time to renew it -- even if it's not set to expire anytime soon. In many countries, including the United States, passports will soon be equipped with RFID chips. And you don't want one of these chips in your passport. RFID stands for "radio-frequency identification." Passports with RFID chips store an electronic copy of the passport information: your name, a digitized picture, etc. And in the future, the chip might store fingerprints or digital visas from various countries. By itself, this is no problem. But RFID chips don't have to be plugged in to a reader to operate. Like the chips used for automatic toll collection on roads or automatic fare collection on subways, these chips operate via proximity. The risk to you is the possibility of surreptitious access: Your passport information might be read without your knowledge or consent by a government trying to track your movements, a criminal trying to steal your identity or someone just curious about your citizenship. Security mechanisms are also vulnerable, and several security researchers have already discovered flaws. One found that he could identify individual chips via unique characteristics of the radio transmissions. Another successfully cloned a chip. The Colorado passport office is already issuing RFID passports, and the State Department expects all U.S. passport offices to be doing so by the end of the year. Many other countries are in the process of changing over. So get a passport before it's too late.

Note: For lots of reliable, verifiable information on microchip implants: www.WantToKnow.info/microchipimplants


Down for the Count
2006-09-08, PBS
Posted: 2006-11-11 00:00:00
http://www.pbs.org/now/shows/236/index.html

New election machines, as mandated and funded by federal law, may create a new election debacle instead of correcting the old one. In 2002, Congress passed the Help America Vote Act (HAVA), which allocated $3.6 billion for all 50 states to update their voting systems. Some industry analysts suggest that the government implemented the new technology too quickly to the detriment of not only security and performance of the new machines, but the integrity of our democratic process. Avi Rubin, a computer science professor at John Hopkins University...performed an analysis of voting machines produced by Diebold. But his recommendation that the machines not be used in elections fell on deaf ears. NOW traveled to Oakland County, Michigan on Primary Day, where election workers encountered more than a few frustrating snags, even when demonstrating the machines for us. In one instance, it took five attempts for the machine to accept a ballot. We also checked in on other states. What we found were alarming scenes of computer and human error, poor results validation, nonexistent contingency plans, and extreme vulnerability to tampering. In half of 37 primaries held this year, there were technical problems associated with the new HAVA-mandated technology. These included an extra 100,000 votes recorded but never cast in Texas, which was blamed on a programming error [and] ballot counting malfunctions in Iowa that declared losing candidates as winners.


Government Scare Tactics
2006-09-08, San Francisco Chronicle
Posted: 2006-11-11 00:00:00
http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2006/09/08/...

The latest "let's scare everyone" campaign is in full swing now, because the president's approval ratings go up every time the threat level reaches red. With the enthusiastic cooperation of the media, the government has managed to convince us that we are surrounded on every side by crazed bomb throwers and that we must at all times be vigilant and allow the government "to do its job," which is code for "anything it wants." Here's a headline from the Houston Chronicle: "Latest terror scares show airport threat lingers." That's like saying, "Latest false alarms show fire threat lingers." Since the object of terrorism is to spread terror, the "latest terror scares" demonstrate only that the government is abetting the work of terrorists. Here's my favorite story, as reported by the Associated Press: "A United Airlines flight...was delayed because a small boy said something inappropriate, according to a government official speaking on condition of anonymity because of the sensitivity of the information. 'He didn't want to fly,' the official said." I hope that small boys do not hear about this. Mad at Mommy? You can turn her airplane around! Listen to the people interviewed at airports. "It's worth it," they say, patiently standing in line. Is it worth it to, say, raise taxes to pay for better veterans benefits? Maybe it's easier to be afraid. Maybe it's easier to blame the shadowy forces of international terrorism for everything that's scary or evil or mean. Maybe it's easier than saying that poverty has killed more people than the terrorists have; that preventable diseases have killed more children than the terrorists have; that the rights we don't fight for are the rights we lose.


Alerts aid terror goals, study finds
2006-09-06, San Francisco Chronicle
Posted: 2006-11-11 00:00:00
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2006/09/06/MNG52L01KC1.DTL

Three things can be expected from Bush's speech, according to a new study by three Columbia University researchers: The media will repeat the president's remarks. Public fear of terrorism will increase. And the president's poll numbers will rise. Those have been the effects of presidential pronouncements on terrorism since the Sept. 11 attacks, according to political scientists. "These are interesting findings, and confirm what many of us had suspected," said Mark Juergensmeyer, director of Global and International Studies at UC Santa Barbara. "This public panic benefits the terrorists whose work is made easier by an overactive government response that magnifies their efforts. In an odd way this puts the government and the terrorists in league with one another," he said. "The main loser, alas, is the terrified public." [The study's author said terrorists] "want to intimidate, they want to spread fear and anxiety." Larry Beutler, director of the National Center on the Psychology of Terrorism in Palo Alto, who reviewed the Columbia team's research [commented] "There are findings suggesting that the administration's use of the alert system increased inordinately before the election and each time it did, Bush's numbers went up about 5 percent." The research is also a "damning indictment of the media's bloodlust," said Matthew T. Felling, media director for the Center for Media and Public Affairs in Washington.


Failures of Imagination
2006-09-01, September/October 2006 Issue Columbia Journalism Review
Posted: 2006-11-11 00:00:00
http://www.cjr.org/issues/2006/5/Umansky.asp

It was early December 2002. [Carlotta] Gall, the Afghanistan correspondent for The New York Times, had just seen a press release from the U.S. military announcing the death of a prisoner at its Bagram Air Base. Soon thereafter the military issued a second release about another detainee death at Bagram. Gall: “I just wanted to know more. And I came up against a blank wall." The body of one of the detainees had been returned, a young taxi driver known as Dilawar. Gall met with Dilawar’s family, and his brother handed Gall a death certificate...that the military had issued. “It said, ‘homicide.’ The press release announcing Dilawar’s death stated...heart attack, a conclusion repeated by the top U.S. commander in Afghanistan. But the death certificate, the authenticity of which the military later confirmed to Gall, stated that Dilawar — who was just twenty-two years old — died as a result of “blunt force injuries to lower extremities complicating coronary artery disease.” Gall filed a story. It sat for a month. “I very rarely have to wait long for a story to run.” Gall’s story...had been at the center of an editorial fight. Roger Cohen, then the Times’s foreign editor: “I pitched it, I don’t know, four times at page-one meetings, with increasing urgency and frustration. My single greatest frustration as foreign editor was my inability to get that story on page one.” The story ran on page fourteen under the headline "U.S.Military Investigating Death of Afghan in Custody." The Times also reported that officers who had overseen the Bagram prison at the time were promoted; another, who had lied to investigators, was transferred to help oversee interrogations at Abu Ghraib and awarded a Bronze Star.

Note: Why does it take a university journal to ask the hard questions? Again and again, news that should be front-page headlines is buried on insignificant pages or not reported at all. This key article from one of the most respected schools of journalism in the world tells it all about the unreported and underreported violent abuse of prisoners condoned by elements of the U.S. military. Don't miss reading this most powerful story in its entirety.


Times Blocks Article to U.K. Web Readers
2006-08-29, ABC News/Associated Press
Posted: 2006-11-11 00:00:00
http://abcnews.go.com/Technology/wireStory?id=2371151

The New York Times' Web site is blocking British readers from a news article detailing the investigation into the recent airline terror plot. "We had clear legal advice that publication in the U.K. might run afoul of their law," Times spokeswoman Diane McNulty said Tuesday. "It's a country that doesn't have the First Amendment, but it does have the free press. We felt we should respect their country's law." Visitors who click on a link to the article, published Monday, instead got a notice explaining that British law "prohibits publication of prejudicial information about the defendants prior to trial." The blocked article reveals evidence authorities have in the alleged plot to use liquid explosives to down U.S. airliners over the Atlantic. The Times also blocked U.K. access to an audio summary of the top Times stories, which included the article in question. British readers could find excerpts posted on Web journals and other unblocked sites. In fact, the Daily Mail of London published an article on the case, attributing details to the Times. The Times also is keeping the article out of printed editions published in the U.K. or mailed to U.K. subscribers.

Note: To see the blocked article, click here. The more likely reason for blocking the article is that it makes clear that the threat was significantly exaggerated by authorities and that experts on the case were unsure "whether any of the suspects was technically capable of assembling and detonating liquid explosives." Clearly, there are those who want to keep us in fear in order to gain ever greater control.


The CIA-Contra-Crack Connection, 10 Years Later
2006-08-17, Los Angeles Times
Posted: 2006-11-11 00:00:00
http://www.latimes.com/news/opinion/la-oe-schou18aug18,0,2765183.story

Ten years ago today, one of the most controversial news articles of the 1990s quietly appeared on the front page of the San Jose Mercury News. Titled "Dark Alliance"...the three-part series by reporter Gary Webb linked the CIA and Nicaragua's Contras to the crack cocaine epidemic that ripped through South Los Angeles in the 1980s. Most of the nation's elite newspapers at first ignored the story. A public uproar, especially among urban African Americans, forced them to respond. What followed was one of the most bizarre, unseemly and ultimately tragic scandals in the annals of American journalism. Top news organizations closed ranks to debunk claims Webb never made, ridicule assertions that turned out to be true and ignore corroborating evidence when it came to light. The whole shameful cycle was repeated when Webb committed suicide in December 2004. At first, the Mercury News defended the series, but after nine months, Executive Editor Jerry Ceppos wrote a half-apologetic letter to readers that defended "Dark Alliance" while acknowledging obvious mistakes. Webb privately (and accurately) predicted the mea culpa would universally be misperceived as a total retraction, and he publicly accused the paper of cowardice. He resigned a few months later. Meanwhile, spurred on by Webb's story, the CIA conducted an internal investigation that acknowledged in March 1998 that the agency had covered up Contra drug trafficking for more than a decade. History will tell if Webb receives the credit he's due for prodding the CIA to acknowledge its shameful collaboration with drug dealers.

Note: Many thanks to the Los Angeles Times for the courage to report this story. For more on this incredibly revealing, yet very tragic case which reveals corruption in both the government and media at the highest levels: http://www.WantToKnow.info/mediacover-up#webb


The Nexus of Politics and Terror
2006-08-14, MSNBC
Posted: 2006-11-11 00:00:00
http://www.msnbc.msn.com/id/9665308/#051012a

The term we employ is the 'Nexus of Politics and Terror.' It does not imply that there is no terror. But it also does not deny that there is politics, and it refuses to assume that counterterror measures in this country are not being influenced by politics. [Here are] remarks made on May 10, 2005 by [former Secretary of Homeland Security, Tom Ridge] discussing the old color-coded terror threat warning system. 'Sometimes we disagreed with the intelligence assessment. There were times when some people were really aggressive about raising it. And we said, "For that?" In the light of those remarks...it is imperative that we examine each of the coincidences of timing since 2002, including the one last week, in which excoriating comments by leading Republicans about leading Democrats just happened to precede arrests in a vast purported terror plot, arrests that we now know were carried out on a time line requested not by the British, nor necessitated by the evidence, but requested by this government. We introduce these coincidences to you exactly as we did when we first compiled this top 10 list after the revelation that the announced threats New York's subway system, last October, had been wildly overblown. [See either of the two links above for the 10 highly suspicious coincidences, or view the broadcast at the links below.]

Note: To view this highly revealing broadcast, see http://www.truthout.org/multimedia.htm or click here


Sickened Iraq Vets Cite Depleted Uranium
2006-08-13, ABC News/Associated Press
Posted: 2006-11-11 00:00:00
http://abcnews.go.com/US/wireStory?id=2307268

A shell coated with depleted uranium pierces a tank like a hot knife through butter. It also leaves behind a fine radioactive dust with a half-life of 4.5 billion years. Depleted uranium is the garbage left from producing enriched uranium for nuclear weapons and energy plants. At Walter Reed Army Medical Center in Washington, D.C., [Herbert Reed] ran into a buddy from his unit. And another, and another. They began to talk. [They] all have depleted uranium in their urine. The veterans, using their positive results as evidence, have sued the U.S. Army, claiming officials knew the hazards of depleted uranium, but concealed the risks. The Department of Defense says depleted uranium is powerful and safe. Military research on mice shows that depleted uranium can enter the bloodstream and come to rest in bones, the brain, kidneys and lymph nodes. Other research in rats shows that DU can result in cancerous tumors and genetic mutations. Fifteen years after it was first used in