Big Brother News StoriesExcerpts of Key Big Brother News Stories in Major Media
Note: This comprehensive list of big brother news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The Rothschild and Rockefeller families have teamed up to buy assets from banks and other distressed sellers in a union between two of the best-known names in financial history. RIT Capital Partners, which is chaired by Lord Rothschild, has taken a 37pc stake in Rockefeller Financial Services, the family’s wealth advisory and asset management wing. It has snapped up the holding from French bank Société Générale for less than Ł100m. The transatlantic alliance cements a five-decade acquaintance between the now ennobled Jacob Rothschild, 76, and David Rockefeller, 96, the grandson of the ruthlessly acquisitive American oilman and philanthropist John D Rockefeller. The two patricians now plan to capitalise on their family names to buy other asset managers or their portfolios, using their networks of top-notch contacts to ensure they get a seat at the table for any deal. The Rockefeller group goes back to 1882, set up to invest the family money made by John D Rockefeller’s Standard Oil, the forerunner for today’s Exxon Corporation, which he built with a Darwinian aggression. “Do you know the only thing that gives me pleasure? It’s to see my dividends coming in,” he once said. The Rothschild banking dynasty has its roots in the 18th century when Mayer Amschel Rothschild set up a business in Frankfurt. That sprang to fame in 1815 when it bought government bonds in anticipation of Napoleon’s defeat at Waterloo.
Note: Why is that these two hugely wealthy families get so little press coverage? Could it be that their wealth and influence exerts control over the major media? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.
The Rothschild dynasty is to merge its British and French banking operations to secure long-term control of the business and to boost the firm's financial strength ahead of the introduction of tougher capital requirements for banks. The 200-year-old banks will be reunited under a single shareholding that will bring together the fortunes of the French and English sides of the renowned family as they attempt to safeguard the business against the effects of new regulation and the fallout from the global financial crisis. Paris Orleans, the Rothschild Group's Paris-based holding company, will convert into a French limited partnership, securing the families' control of the bank against potential takeovers. The new partnership will then buy out minority investors in NM Rothschild & Sons, the UK business, as well as outstanding minority interests in the French operations. Paris Orleans has a market value of more than €500m (Ł415m) and is about 30pc owned by outside investors. The Rothschild Group employs 3,000 people in 42 countries and is one of the world's leading independent investment banks, advising some of the largest international companies on capital raisings and mergers and acquisitions. The bank also remains a player in the private equity industry and operates several merchant banking operations that invest directly in business across Europe and the rest of the world.
Note: Why is that these two hugely wealthy families get so little press coverage? Could it be that their wealth and influence exerts control over the major media? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.
For seven generations, one European family has dominated an incredible part of all that money can buy. From its London and Paris banks, the family's millions have been sent forth to ... business enterprises on six continents. Some of its stately dwellings are the kind of mansions that mere San Simeons hoped to imitate. This ancient and unusual banking dynasty shields itself from the curious eye of the public, but the map and history of Europe have been changed by its action and etched with its name: the House of Rothschild. Seldom unimaginative in the use of their money, Rothschild gold has powered the ambitions of prime ministers, princes and popes. It has financed wars and reparations treaties, changed the course of politics and bailed out armies and nations. The Rothschilds strung railroads across the Continent, gained control of the Suez Canal [and] carved diamond mines in the African veld. The British Rothschilds [are still] the world's most important bullion dealers. No modern family ... has been so important for so long in European business. Newer dynasties such as the Rockefellers and the Fords have made more millions, but ... ledgers cannot reflect the Rothschild lands, their possessions and influence accumulated over the generations, their priceless collections of art. Today, the legend is very much alive—and being added to. The Rothschilds are striking out in many new directions behind a silver curtain of discretion. Rather than run companies by themselves, the Rothschilds often prefer to start or join syndicates, placing their men on boards to exert maximum influence with minimum investment risk. [They rely on] a far spreading network of agents, who seldom even admit that they are employed by the Rothschilds.
Note: To read the full, fascinating article, click here. The major media have very rarely exposed the power and wealth of the Rothschilds as in this article. Note that the article was written less than a month after the assassination of John F. Kennedy. Could it be because of some anger at the elite who killed Kennedy that this highly revealing article was actually published? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.
Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.
Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
[Daniel] Ellsberg is one of the most outspoken critics of the Obama administration’s prosecution of leakers. Under President Obama’s tenure, the government has prosecuted six individuals for releasing classified information to media organizations. Ellsberg is particularly fierce in his support of Bradley Manning, a young soldier who released a large amount of classified information to WikiLeaks. Manning was arrested in 2010, and his military court-martial began this week. Ellsberg considers Manning a hero, and he argues that there is little difference between what Manning did in 2010 and what Ellsberg did four decades earlier. [Q.}: In a 1973 interview, you said that a “secondary objective” of releasing the Pentagon Papers was “the hope of changing the tolerance of Executive secrecy that had grown up over the last quarter of a century both in Congress and the courts and in the public at large.” How has that “tolerance of secrecy” changed over the last four decades? DE: There’s been very great tolerance that if the magic words “national security,” or the new words “homeland security” are invoked, Congress has given the president virtually a free hand in deciding what information they will know as well as the public. I wouldn’t count on the current court with its current makeup making the same ruling with the Pentagon Papers as they did 40 years ago. I’m sure that President Obama would have sought a life sentence in my case. Various things that were counted as unconstitutional then have been put in the president’s hands now. He’s become an elected monarch. Nixon’s slogan, “when the president does it, it’s not illegal,” is pretty much endorsed now.
Note: To see key quotes showing the amazing courage and dedication of Snowden, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
Long before Edward Snowden walked out of the NSA with his trove of documents, whistleblowers there had been trying for years to bring attention to the massive turn toward domestic spying that the agency was making. Last year in my Wired cover story on the enormous new NSA data center in Utah, Bill Binney, the man who largely designed the agency’s worldwide eavesdropping system, warned of the secret, nationwide surveillance. He told how the NSA had gained access to billions of billing records not only from AT&T but also from Verizon. I also wrote about Adrienne J. Kinne, an NSA intercept operator who attempted to blow the whistle on the NSA’s illegal eavesdropping on Americans following the 9/11 attacks. She [attempted and failed] to end the illegal activity with appeals all the way up the chain of command to Major General Keith Alexander. The deception by General Alexander is especially troubling. In my new cover story for Wired’s July issue ...I show how he has become the most powerful intelligence chief in the nation’s history. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the U.S. Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.
Note: James Bamford, the author of this article, was the ABC producer responsible for breaking the story on Operation Northwoods, which proved a level of deception almost beyond belief at the very highest levels of the Pentagon. For more on this, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata — a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, it’s possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So it’s possible the NSA is using rooms like that to listen to everyone’s phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but it’s hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.
Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.
CNN's Out Front with Erin Burnett [has been] focused on the possible involvement in the Boston Marathon attack of Katherine Russell, the 24-year-old American widow of the deceased suspect, Tamerlan Tsarnaev. Anonymous government officials are claiming that they are now focused on telephone calls between Russell and Tsarnaev that took place both before and after the attack to determine if she had prior knowledge of the plot or participated in any way. Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could: BURNETT: There's no way they actually can find out what happened, right, unless she tells them? CLEMENTE: No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. We certainly can find that out. BURNETT: So they can actually get that? People are saying, look, that is incredible. CLEMENTE: No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not. On Thursday night, Clemente again appeared on CNN. He reiterated what he said the night before but added expressly that "all digital communications in the past" are recorded and stored. All digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.
Note: All of our communications have been monitored by government computers for years. BBC News reported in this this 1999 article about the Echelon network which monitors all communications globally. For deeply revealing reports from reliable major media sources on government and corporate threats to privacy, click here.
The Denver Post, on February 15th, ran an Associated Press article entitled "Homeland Security aims to buy 1.6b rounds of ammo". It confirmed that the Department of Homeland Security has issued an open purchase order for 1.6 billion rounds of ammunition. Some of this purchase order is for hollow-point rounds, forbidden by international law for use in war, along with a frightening amount specialized for snipers. Also reported elsewhere, at the height of the Iraq War the Army was expending less than 6 million rounds a month. Therefore 1.6 billion rounds would be enough to sustain a hot war for 20+ years. DHS now is [also] showing off its acquisition of heavily armored personnel carriers, repatriated from the Iraqi and Afghani theaters of operation. The Department of Homeland Security is apparently taking delivery (apparently through the Marine Corps Systems Command, Quantico VA, via the manufacturer – Navistar Defense LLC) of an undetermined number of [recently retrofitted] ‘Mine Resistant Protected’ MaxxPro MRAP vehicles for service on the streets of the United States.” Why would they need such over-the-top vehicles on U.S. streets to withstand IEDs, mine blasts, and 50 caliber hits to bullet-proof glass? In a war zone… yes, definitely. [But] on the streets of America?
Note: For a U.S. Army field manual titled "Internment and Resettlement Operations" (FM 3-39.40) describing how large numbers of American citizens could be sent to internment camps if involved in "terrorist" activities, click here. The introduction to this document states, "Commanders will use technology and conduct police intelligence operations to influence and control populations, evacuate detainees and, conclusively, transition rehabilitative and reconciliation operations to other functional agencies." For a disturbing report on the massive expansion of drones over US skies, click here.
The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document. The proposed plan represents a major step by U.S. intelligence agencies to spot and track down [targeted persons] by bringing together financial databanks, criminal records and military intelligence. Financial institutions that operate in the United States are required by law to file reports of "suspicious customer activity," such as large money transfers or unusually structured bank accounts, to Treasury's Financial Crimes Enforcement Network (FinCEN). The Federal Bureau of Investigation already has full access to the database. However, intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, currently have to make case-by-case requests for information to FinCEN. The Treasury plan would give spy agencies the ability to analyze more raw financial data than they have ever had before. Financial institutions file more than 15 million "suspicious activity reports" every year, according to Treasury. Banks, for instance, are required to report all personal cash transactions exceeding $10,000.
Note: For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.
Raytheon, a Massachusetts defense contractor, has built tracking software that pulls information from social networks, according to a video obtained by the Guardian newspaper in London. "[Raytheon] has acknowledged the technology was shared with U.S. government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analyzing 'trillions of entities' from cyberspace." Using public data from Facebook, Twitter, Gowalla and Foursquare, the software - called RIOT, or Rapid Information Overlay Technology - apparently gathers uploaded information and forms a profile of a person's every move that was registered with one of the websites. The video obtained by the newspaper starts with a demonstration by Raytheon's "principal investigator," Brian Urch, showing how easy it is to track an employee named Nick - a real person - based on all the places he has checked in using his smartphone. "When people take pictures and post them on the Internet using their smartphones, the phone will actually embed the latitude and longitude in the header data - so we're going to take advantage of that," Urch says. "So now we know where Nick's gone ... and now we'll predict where he'll be in the future." Urch goes on to analyze - using graphs and calendars - where Nick likes to spend his personal time and make predictions about his behavior. "If you ever wanted to get a hold of his laptop, you might want to visit the gym at 6 a.m. on Monday," Urch says with alarming casualness.
Note: To read the full Guardian article, click here.
Rented computers from seven different companies secretly took photographs of their users, US authorities have said. The companies used software made by US company Designerware which could track key strokes and other personal data. The software, called PC Rental Agent, captured people engaging in "intimate acts", including sex. It is believed that PC Rental Agent has been installed in approximately 420,000 computers worldwide. The Federal Trade Commission ruling concerned a feature in the software, called Detective Mode, which would typically become activated if the user was late in returning equipment, or failed to pay for use. Detective Mode would assist the rental store in locating the overdue computer in order to pursue its return. Part of the process involved a pop-up window designed to look like a software registration screen. It would request personal information such as email addresses and telephone numbers that could then be used to pursue the users for payment and/or the return of equipment. In addition, the FTC said the software had access to much more sensitive information, including: usernames and passwords for email accounts, social media websites, and financial institutions. Among the other data collected were social security numbers; medical records; private emails to doctors; bank and credit card statements. Webcam pictures of children, partially undressed individuals, and intimate activities at home were also found. In the FTC's formal complaint document, it said the software had captured "couples engaged in sexual activities".
Note: Do you think other companies or intelligence agencies might be conducting similar monitoring? For more on this, click here.
[William] Binney, a 32-year veteran of the National Security Agency turned whistle-blower, ... described details about Stellar Wind, the N.S.A.’s top-secret domestic spying program begun after 9/11, which was so controversial that it nearly caused top Justice Department officials to resign in protest, in 2004. “The decision must have been made in September 2001,” Mr. Binney told me [and] cinematographer Kirsten Johnson. “That’s when the equipment started coming in.” He resigned over this in 2001 and began speaking out publicly in the last year. [Binney] is among a group of N.S.A. whistle-blowers, including Thomas A. Drake, who have each risked everything — their freedom, livelihoods and personal relationships — to warn Americans about the dangers of N.S.A. domestic spying. The N.S.A. has technical abilities that are nearly impossible to defend against if you are targeted. The 2008 amendments to the Foreign Intelligence Surveillance Act, which oversees the N.S.A. activities, are up for renewal in December. Two members of the Senate Select Committee on Intelligence, Senators Ron Wyden of Oregon and Mark Udall of Colorado ... have been warning about “secret interpretations” of laws and backdoor “loopholes” that allow the government to collect our private communications. Thirteen senators have signed a letter expressing concern about a “loophole” in the law that permits the collection of United States data. The A.C.L.U. and other groups have also challenged the constitutionality of the law, and the Supreme Court will hear arguments in that case on Oct. 29.
Note: The video about this on the NY Times webpage at the link above is quite revealing. One potent comment of this 32-year NSA veteran in the video is "They wanted to highly classify the extreme impeachable crimes they were committing." For deeply revealing reports from reliable major media sources on government and corporate surveillance, click here.
Last week, New York Mayor Michael Bloomberg joined NYPD Commissioner Ray Kelly to unveil a major new police surveillance infrastructure, developed by Microsoft. The Domain Awareness System links existing police databases with live video feeds, including cameras using vehicle license plate recognition software. No mention was made of whether the system plans to use – or already uses – facial recognition software. But, at present, there is no law to prevent US government and law enforcement agencies from building facial recognition databases. And we know from industry newsletters that the US military, law enforcement, and the department of homeland security are betting heavily on facial recognition technology. As PC World notes, Facebook itself is a market leader in the technology – but military and security agencies are close behind. According to Homeland Security Newswire, billions of dollars are being invested in the development and manufacture of various biometric technologies capable of detecting and identifying anyone, anywhere in the world – via iris-scanning systems, already in use; foot-scanning technology (really); voice pattern ID software, and so on. What is very obvious is that this technology will not be applied merely to people under arrest, or to people under surveillance in accordance with the fourth amendment. No, the "targets" here [include] everyone. In the name of "national security", the capacity is being built to identify, track and document any citizen constantly and continuously.
Note: For deeply revealing reports from reliable major media sources on civil liberties, click here.
The Italian police ... arrested eight people on charges related to the seizure of $6 trillion in fake United States Treasury bonds, in a mysterious scheme that stretched from Hong Kong to Switzerland to the southern Italian region of Basilicata. The value of the seized bonds is in the neighborhood of half of the United States’ entire public debt of $15.36 trillion, but only the uninitiated would have accepted them as real securities. Rather than counterfeit, they were what officials call fictitious, printed in 6,000 units of $1 billion each, a denomination that does not exist and the equivalent of $3 bills. The United States Embassy in Rome said its experts had examined the bonds, which bore the date 1934, and determined that they were fictitious and apparently part of a scheme intended to defraud Swiss banks. According to the Federal Reserve, such “fictitious instrument fraud” is increasingly common, and unwitting investors have been cheated of nearly $10 billion in recent years. In a common ploy, “criminals present fictitious financial instruments such as Federal Reserve notes, standby letters of credit, prime bank guarantees or prime bank notes in order to fraudulently collateralize loans,” the Federal Reserve says on its Web site. In 2009, Italian police seized phony United States Treasury bonds with a face value of $250 billion.
Note: There is a major problem with the claim that these are fake. If you were a counterfeiter and wanted to fake bonds, you would have to be out of your mind to fake them in denominations of $1 billion. As reported here, no one would ever dream of cashing them. For excellent research by David Wilcock suggesting that the bonds are real, and that this may be part of a huge, hidden manipulation, click here.
The U.S. government is legally justified in killing its own citizens overseas if they are involved in plotting terror attacks against America, Attorney General Eric Holder said [on March 5], offering the Obama administration's most detailed explanation so far of its controversial targeted killing program. The Fifth Amendment provides that no one can be "deprived of life" without due process of law. But that due process, Holder said, doesn't necessarily come from a court. "Due process and judicial process are not one and the same, particularly when it comes to national security. The Constitution guarantees due process, not judicial process," the attorney general said. The ACLU called Holder's explanation "a defense of the government’s chillingly broad claimed authority to conduct targeted killings of civilians, including American citizens, far from any battlefield without judicial review or public scrutiny." "Few things are as dangerous to American liberty as the proposition that the government should be able to kill citizens anywhere in the world on the basis of legal standards and evidence that are never submitted to a court, either before or after the fact," said Hina Shamsi, director of the ACLU’s National Security Project. "Anyone willing to trust President Obama with the power to secretly declare an American citizen an enemy of the state and order his extrajudicial killing should ask whether they would be willing to trust the next president with that dangerous power,” she said. The ACLU is suing the Obama administration, seeking to have documents regarding the targeted killing program made public.
Note: Attorney General Holder's claim that US citizens can be killed by the government without judicial process clearly violates the U.S. Bill of Rights. In addition to the Fifth Amendment that states that no person shall be held to answer for a crime "without due process of law," the Sixth Amendment states that "the accused shall enjoy the right to a speedy and public trial."
Nathaniel Rothschild, scion of the banking dynasty and friend of seemingly everyone in the spheres of finance, business and politics, ... has lost his libel case against the Daily Mail, which he sued for "substantial damages" over its account of his and [Lord] Mandelson's extraordinary trip to Russia in January 2005. Mr Rothschild claimed he was subjected to "sustained and unjustified" attacks in the May 2010 article, which portrayed him as a "puppet master", dangling his friend Lord Mandelson in front of the Russian oligarch Oleg Deripaska to ease the passage of colossal business deals. It began on Mr Rothschild's private jet from the World Economic Forum in Davos to Moscow, where they met Mr Deripaska, the aluminium plant manager who became the richest oligarch of them all, and continued on Mr Deripaska's private jet to his chalet in Siberia. The judge rejected the notion that Mr Rothschild and Mr Mandelson had flown out as friends, not business associates, and said Mr Rothschild's behaviour had in part been "inappropriate". "That conduct foreseeably brought Lord Mandelson's public office and personal integrity into disrepute," the judge said. That leading politicians, bankers and businessmen associate with each other in fashions that blur the boundaries between work and pleasure is a secret too great to be maintained with any success, but it doesn't make the details, on the rare occasions they actually emerge, any more palatable.
The secretive Bilderberg Group ... is bringing together the world's financial and political elite this week. Conspiracy theories abound. It's only recently that the media has picked up on the Bilderbergers. Meetings are closed to the public and the media, and no press releases are issued. In the manner of a James Bond plot, up to 150 leading politicians and business people are to gather in a ski resort in Switzerland for four days of discussion about the future of the world. Meetings often feature future political leaders shortly before they become household names. Under the group's leadership of former US Secretary of State Henry Kissinger and one-time EU vice president, Viscount Davignon, the aim is purportedly to allow Western elites to share ideas. But conspiracy theorists have accused it of everything from deliberately engineering the credit crunch to planning to kill 80% of the world population. Denis Healey, co-founder of the group, told the journalist Jon Ronson in his book Them that ... "The confidentiality enabled people to speak honestly without fear of repercussions." Secret cabals extend beyond the Bilderberg Group. The Illuminati ... is alleged to be an all powerful secret society. The Freemasons [is another] secret fraternity society. The conspiracy theorists may get overexcited, but they have a point, says Prof Andrew Kakabadse. The group has genuine power that far outranks the World Economic Forum, which meets in Davos, he argues. And with no transparency, it is easy to see why people are worried about its influence. The theme at Bilderberg is to bolster a consensus around free market Western capitalism and its interests around the globe, he says. "There's a very strong move to have a One World government in the mould of free market Western capitalism."
Note: Why is there so little reporting on this influential group in the major media? Thankfully, the alternative media has had some good articles. And a Google search can be highly informative. For many other revealing news articles from major media sources on powerful secret societies, click here. And for reliable information covering the big picture of how and why these secret societies are using government-sponsored mind control programs to achieve their agenda, click here.
A demand for an investigation of charges printed in the Congressional Record by Representative Oscar Callaway of Texas, a pacifist Democrat, that “the J.P. Morgan interests, the steel shipbuilding, and powder interests” had purchased control of twenty-five great newspapers to further the preparedness campaign, was made in the House today by Representative J. Hampton Moore, a Pennsylvania Republican. Mr. Callaway’s speech, as inserted in The Record charged: “In March, 1915, the J.P. Morgan interests, the steel, shipbuilding and powder interests, and their subsidiary organizations got together twelve men high up in the newspaper world and employed them to select from the most influential papers in the United States in sufficient numbers of them to control generally the policy of the daily press of the United States. They found it was only necessary to purchase the control of twenty-five of the greatest newspapers. [An] editor was furnished for each paper to properly supervise and edit information regarding the questions of preparedness, militarism, financial policies and other things of national and international nature considered vital to the interests of the purchasers. The policy also included the suppression of everything in opposition to the wishes of the interests served."
Note: For more showing how the media is controlled by carefully selected people placed by big money and the power elite, click here and here. For a short video of Congressional testimony from the 1970s proving CIA media manipulation, click here. The full text of this revealing article is available free at this link.
If terrorists ever target Fargo, N.D., the local police will be ready. In recent years, they have bought bomb-detection robots, digital communications equipment and Kevlar helmets, like those used by soldiers in foreign wars. For local siege situations requiring real firepower, police there can use a new $256,643 armored truck, complete with a rotating turret. Until that day, however, the menacing truck is mostly used for training runs and appearances at the annual Fargo picnic, where it’s been displayed near a children’s bounce house. Fargo, like thousands of other communities in every state, has been on a gear-buying spree with the aid of more than $34 billion in federal government grants since the Sept. 11, 2001, terrorist attacks on New York and the Pentagon. The federal grant spending, awarded with little oversight from Washington, has fueled a rapid, broad transformation of police operations in Fargo and in departments across the country. More than ever before, police rely on quasi-military tactics and equipment. A review of records from 41 states obtained through open-government requests, and interviews with more than two-dozen current and former police officials and terrorism experts, shows police departments around the U.S. have transformed into small army-like forces. Many police, including beat cops, now routinely carry assault rifles.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.