As of March 26, we're $27,100 in the red for the quarter. Donate here to support this vital work
Subscribe here and join over 13,000 subscribers to our free weekly newsletter

Terrorism Media Articles

Below are key excerpts of revealing news articles on terrorism from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.

Explore our comprehensive news index on a wide variety of fascinating topics.
Explore the top 20 most revealing news media articles we've summarized.
Check out 10 useful approaches for making sense of the media landscape.

Sort articles by: Article Date | Date Posted on WantToKnow.info | Importance

U.S. Postal Service Logging All Mail for Law Enforcement
2013-07-04, New York Times
http://www.nytimes.com/2013/07/04/us/monitoring-of-snail-mail.html?pagewanted...

Leslie James Pickering noticed something odd in his mail last September: a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home. Show all mail to supv supervisor for copying prior to going out on the street, read the card. It included Mr. Pickerings name, address and the type of mail that needed to be monitored. The word confidential was highlighted in green. It was a bit of a shock to see it, said Mr. Pickering, who with his wife owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service. Mr. Pickering was targeted by a longtime surveillance system called mail covers, a forerunner of a vastly more expansive effort, the Mail Isolation Control and Tracking program, in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States about 160 billion pieces last year. It is not known how long the government saves the images. The Mail Isolation Control and Tracking program was created after the anthrax attacks in late 2001. It enables the Postal Service to retrace the path of mail at the request of law enforcement. No one disputes that it is sweeping.

Note: The exposure by whistleblower Edward Snowden of the NSA's massive domestic and global spying operations seems to have triggered a series of other revelations about surveillance of the US population, like this report on the US Postal Service's photographing all mail. Hardly a week goes by without another major revelation, such as a new digital photo-ID database utilized by the FBI and police forces, and the development by US police of a national DNA database on all "potential suspects". Since very few US citizens are terrorists, what is the real purpose behind this total surveillance?


How cash rules surveillance policy
2013-07-04, San Francisco Chronicle (SF's leading newspaper)
http://www.sfchronicle.com/opinion/article/How-cash-rules-surveillance-policy...

Have you noticed anything missing in the political discourse about the National Security Administration's unprecedented mass surveillance? There's at least been some conversation about the intelligence community's potential criminality and constitutional violations. But there have only been veiled references to how cash undoubtedly tilts the debate against those who challenge the national security state. Those indirect references have come in stories about Booz Allen Hamilton, the security contractor that employed Edward Snowden. CNN/Money notes that 99 percent of the firm's multibillion-dollar annual revenues now come from the federal government. Those revenues are part of a larger and growing economic sector within the military-industrial complex - a sector that, according to author Tim Shorrock, is "a $56 billion-a-year industry." Yet few in the Washington press corps mention that politicians' attacks on surveillance critics may have nothing to do with principle and everything to do with shilling for campaign donors. For a taste of what that kind of institutionalized corruption looks like, peruse the Influence Explorer site to see how much Booz Allen Hamilton and its parent company, the Carlyle Group, spend. As you'll see, from Barack Obama to John McCain, many of the politicians publicly defending the surveillance state have taken huge sums of money from the firms. Simply put, there are corporate forces with a vested financial interest in making sure the debate over security is tilted toward the surveillance state and against critics of that surveillance state.

Note: Tim Shorrock, quoted above, is the author of Spies for Hire: The Secret World of Intelligence Outsourcing.


The Real War on Reality
2013-06-14, New York Times
http://opinionator.blogs.nytimes.com/2013/06/14/the-real-war-on-reality/

The modern American surveillance state is not really the stuff of paranoid fantasies; it has arrived. The revelations about the National Security Agencys PRISM data collection program have raised awareness ... about the reach and power of secret intelligence gatherers operating behind the facades of government and business. But those revelations ... have been partial they primarily focus on one government agency and on the surveillance end of intelligence work, purportedly done in the interest of national security. What has received less attention is the fact that most intelligence work today is not carried out by government agencies but by private intelligence firms and that much of that work involves another common aspect of intelligence work: deception. That is, it is involved not just with the concealment of reality, but with the manufacture of it. Important insight into the world [of] these companies came from a 2010 hack by a group best known as LulzSec ... which targeted the private intelligence firm HBGary Federal. That hack yielded 75,000 e-mails. Team Themis (a group that included HBGary and the private intelligence and security firms Palantir Technologies, Berico Technologies and Endgame Systems) was effectively brought in to find a way to undermine the credibility of WikiLeaks and the journalist Glenn Greenwald (who recently broke the story of Edward Snowdens leak of the N.S.A.s Prism program), because of Greenwalds support for WikiLeaks. The plan called for actions to sabotage or discredit the opposing organization including a plan to submit fake documents and then call out the error.

Note: For more on the games intelligence agencies play, see the deeply revealing reports from reliable major media sources available here.


NSA surveillance played little role in foiling terror plots, experts say
2013-06-12, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2013/jun/12/nsa-surveillance-data-terror-attack

Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.

Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.


This is how to deal with armed forces' brutality
2013-06-09, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/jun/09/armed-forces-brutality-i...

Baha Mousa was tortured to death in September 2003 while in the custody of the British armed forces in Iraq. The subsequent inquiry led to a report, published in September 2011, that leaves no doubt about the ... brutal illegality of the UK's current approach to the detention and interrogation of suspected insurgents. The training of interrogators used in Iraq involved blatant illegality: forced nakedness, screaming foul abuse into detainees' faces, sensory deprivation and [other forms of torture]. The list of unlawful killings is endless. And there are hundreds of Iraqis' cases before British courts in which allegations are made of egregious acts of torture and cruel, inhuman and degrading treatment. A high court judgment in late May ... involves more than 1,000 Iraqi cases of unlawful killings and acts of torture. It establishes that whenever UK personnel abroad have authority and control over others and commit what might be acts of unlawful killing and torture there must be an "inquisitorial process" in public into each case. There must also be public scrutiny of the systemic issues arising from these cases. Take, for example, the case of Huda, an eight-year-old girl in a yellow dress playing with her friends one sunlit morning in Basra. A British rifleman in a tank, apparently perceiving her to be a threat to force security, shot her dead without warning at close range. Before this new judgment, the Ministry of Defence successfully shut the door on any accountability. Under the new system, the commanding officer would have to suspend the soldier and send in the military police to forensically examine the scene, interview witnesses and family, and send the results of a full investigation back to London to be examined independently and publicly.

Note: For more on atrocities committed by the US and UK military forces in their wars of aggression in Iraq and Afghanistan, see the deeply revealing reports from reliable major media sources available here.


U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program
2013-06-07, Washington Post
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from...

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs. The program, code-named PRISM, has not been made public until now. It may be the first of its kind. Equally unusual is the way the NSA extracts what it wants, according to the document: Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple. GCHQ, Britains equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. PRISM was launched from the ashes of President George W. Bushs secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority. Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISMs most sensitive secret, fearing that the companies would withdraw from the program if exposed. 98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we dont harm these sources, the briefings author wrote in his speakers notes.

Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.


Everything you need to know about the NSAs phone records scandal
2013-06-06, Washington Post
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/06/everything-you-nee...

The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, its possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So its possible the NSA is using rooms like that to listen to everyones phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but its hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.

Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.


What if laws applied to everyone?
2013-06-06, Fox News
http://www.foxnews.com/opinion/2013/06/06/what-if-laws-applied-to-everyone/

What if government officials have written laws that apply only to us and not to them? What if we gave them the power to protect our freedoms and our safety and they used that power to trick and trap some of us? What if government officials broke the laws we hired them to enforce? What if they prosecuted others for breaking the same laws they broke? What if the government enacted a law making it a crime to provide material assistance to terrorist organizations? What if the government looked at that law and claimed it applied to a dentist or a shopkeeper who sold services or goods to a terrorist organization, and not just to financiers and bomb makers? What if the Supreme Court ruled that the law is so broad that it covers backslapping, advocacy and free speech? What if the law is so broad that it punishes ideas and the free expression of those ideas, even if no one is harmed thereby? What if FBI agents pretended to be members of these terrorist organizations and set out to find people in America who were willing to join? What if the FBI arrested the people it found and encouraged just as they were about to leave the U.S. and then charged them with providing material assistance to terrorist organizations? What if the president boasted that in his mind these duped dopes were really terrorists and their arrests kept us all safer? What if offensive wars are illegal and morally wrong? What if killing is evil when not done in self-defense? What if those who kill not in self-defense are prosecuted and punished, except when they do so in large numbers and to the sounds of trumpets blaring? What do we do about a government that breaks the laws we have hired it to enforce?

Note: Andrew P. Napolitano, author of this opinion, is the senior judicial analyst at Fox News Channel. Judge Napolitano has written seven books on the U.S. Constitution. His latest is Theodore and Woodrow: How Two American Presidents Destroyed Constitutional Freedom.


Graham: FBI hindered Congresss 9/11 inquiry, withheld reports about Sarasota Saudis
2013-06-05, Miami Herald
http://www.miamiherald.com/2013/06/05/3434487/graham-fbi-hindered-congresss.html

Former U.S. Sen. Bob Graham has accused the FBI in court papers of having impeded Congresss Joint Inquiry into 9/11 by withholding information about a Florida connection to the ... attacks that killed nearly 3,000 people. The information ... includes a recently declassified FBI report that ties a Saudi family who once lived in Sarasota to individuals associated with the terrorist attacks on 9/11/2001. The FBIs failure to call (to the Joint Inquirys attention) documents finding many connections between Saudis living in the United States and individuals associated with the terrorist attack(s) interfered with the Inquirys ability to complete its mission, said Graham, co-chairman of the Joint Inquiry. Graham said the FBI kept the 9/11 Commission in the dark, too. He said co-chairmen Thomas Kean and Lee Hamilton and executive director Philip Zelikow all told him they were unaware of the FBIs Sarasota investigation. Moreover, Graham stated that Deputy FBI Director Sean Joyce, the Bureaus second in command, personally intervened to block him from speaking with the special agent-in-charge of the Sarasota investigation. I am troubled by what appears to me to be a persistent effort by the FBI to conceal from the American people information concerning possible Saudi support of the Sept. 11 attacks, Floridas former governor said.

Note: For deeply revealing reports from reliable major media sources on the 9/11 attacks, click here.


Bilderberg 2013: welcome to 1984
2013-06-05, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2013/jun/05/bilderberg-2013-goldman-sachs-wat...

The auditorium grew hushed as a senior Watford borough councillor took to his feet. Now it was the turn of the people of Watford to speak. What would they make of this international three-day policy summit, with its heavyweight delegate list bulging with billionaire financiers, party leaders and media moguls, protected by the biggest security operation Watford has ever seen? At one point in the meeting, during a tense exchange about contingency plans for dog-walkers, [Chief Inspector] Rhodes let slip that Operation Discuss (the codename for the Bilderberg security operation) had been up and running for 18 months. Residents and journalists shared an intake of breath. "Eighteen months?" The reason for all the secrecy? "Terrorism". After 59 years of Bilderberg guests scuttling about in the shadows, ducking lenses and dodging the news, that's the rationale we're given? The same rationale, presumably, is behind the Great Wall of Watford, a concrete-and-wire security fence encircling the hotel. As ugly as it is unnecessary, it looks like the kind of thing you throw yourself against in a stalag before being machine-gunned from a watchtower. Appropriately fascistic, you might say, if you regard fascism as "the merger of corporate and government power", as Mussolini put it. The same threat of "terrorism" was used to justify the no-pedestrian, no-stopping zones near the venue. The police laid out their logic: they had "no specific intelligence" regarding a terror threat. However, in recent incidents, such as Boston and Woolwich, there had been no intelligence prior to the attack. Therefore the lack of any threat of a terror attack fitted exactly the profile of a terror attack. The lack of a threat was a threat. Welcome to 1984.

Note: For a list of this year's Bilderberg participants, which include 90-year-old Henry Kissinger, click here. For lots more on secret societies from reliable sources, click here.


The Signature Strikes Program
2013-05-29, New York Times
http://takingnote.blogs.nytimes.com/2013/05/29/the-signature-strikes-program/...

Toward the end of a May 27 article in The Times about President Obamas speech in which, among other things, he mentioned setting new standards for ordering drone strikes against non-Americans, there was this rather disturbing paragraph: Even as he set new standards, a debate broke out about what they actually meant and what would actually change. For now, officials said, signature strikes targeting groups of unidentified armed men presumed to be extremists will continue in the Pakistani tribal areas. As Glenn Greenwald has pointed out, those two sentences seem to contradict the entire tenor of Mr. Obamas speech, and of a letter to Congress from Attorney General Eric Holder. Both men seemed to be saying that the administration would stop using unmanned drones to kill targets merely suspected, due to their location or their actions, of a link to Al Qaeda or another terrorist organization. Those strikes have resulted in untold civilian casualties that have poisoned Americas relationship with Yemen and Pakistan. Mr. Obama talked at some length about civilian casualties, and also said that the need to use drone strikes against forces that are massing to support attacks on coalition forces will disappear once American forces withdraw from Afghanistan at the end of 2014. But so what to make of that paragraph in the May 27 article? I asked the White House. What I got in response was part of a background briefing given after the presidents speech that repeated the language about how the need for signature strikes will fade.

Note: Drone strikes often miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


U.S. acknowledges killing of four U.S. citizens in counterterrorism operations
2013-05-22, Washington Post
http://www.washingtonpost.com/world/national-security/us-acknowledges-killing...

The Obama administration acknowledged [on May 22] that it has killed four Americans in overseas counterterrorism operations since 2009, the first time it has publicly taken responsibility for the deaths. Three are known to have died in CIA drone strikes in Yemen in 2011: Anwar al-Awlaki, his 16-year-old son and Samir Khan. The fourth Jude Kennan Mohammad, a Florida native indicted in North Carolina in 2009 was killed in Pakistan, where the CIA has operated a drone campaign against terrorism suspects for nearly a decade. His death was previously unreported. In addition to disclosure of the four killings, Holder wrote that Obama has approved classified briefings for Congress on an overall policy document, informally called the playbook. The document, more than a year in the making, codifies the administrations standards and processes for its unprecedented program of targeted killing and capture of terrorism suspects outside of war zones. Nearly 400 drone strikes, in Pakistan, Yemen and Somalia, have been launched by the CIA and U.S. military forces during Obamas presidency. According to Holders letter, Awlaki was the only U.S. citizen the administration has specifically targeted and killed. Two weeks after Awlakis death, his 16-year-old son, Abdulrahman who had gone to the Yemeni desert in search of his father was killed in a drone strike meant for someone else. That strike was similarly unacknowledged, although a senior administration official privately characterized it as a mistake.

Note: So an American citizen, Awlaki's son, was killed by a drone by "mistake"? What happened to the Fifth Amendment of the U.S. Constitution, which states no citizen shall "be deprived of life, liberty, or property, without due process of law"? For deeply revealing reports from reliable major media sources on the atrocities carried out by the US and UK in their global wars of aggression, click here.


Washington gets explicit: its 'war on terror' is permanent
2013-05-17, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/may/17/endless-war-on-terror-obama

On [May 16], the Senate Armed Services Committee held a hearing on whether the statutory basis for [the "Global War on Terror"] - the 2001 Authorization to Use Military Force (AUMF) - should be revised (meaning: expanded). Asked at a Senate hearing today how long the war on terrorism will last, Michael Sheehan, the assistant secretary of defense for special operations and low-intensity conflict, answered, 'At least 10 to 20 years.' The military historian Andrew Bacevich has spent years warning that US policy planners have adopted an explicit doctrine of "endless war". Obama officials, despite repeatedly boasting that they have delivered permanently crippling blows to al-Qaida, are now, as clearly as the English language permits, openly declaring this to be so. It is hard to resist the conclusion that this war has no purpose other than its own eternal perpetuation. This war is not a means to any end but rather is the end in itself. The "war on terror" cannot and will not end on its own [because] the nation's most powerful political and economic factions reap a bonanza of benefits from its continuation. The genius of America's endless war machine is that, learning from the unpleasantness of the Vietnam war protests, it has rendered the costs of war largely invisible.

Note: A top US general long ago exposed the corrupt roots of war in his penetrating book War is a Racket. For a concise, two-page summary of this revealing book, click here. For deeply revealing reports from reliable major media sources on the atrocities carried out by the US and UK in their global wars of aggression, click here.


The 9/11 Phone Calls: Disturbing Irregularities Uncovered in the Calls that Flashed around the World
2013-05-16, Wall Street Journal/PRNewswire
http://online.wsj.com/article/PR-CO-20130516-909978.html

The 9/11 Consensus Panel now offers four evidence-based points about the alleged phone calls from the 9/11 flights. The famous "let's roll" drama of the passenger revolt on UA 93 was relayed by passenger Todd Beamer's 13-minute unrecorded seat-back call to GTE telephone supervisor Lisa Jefferson, who reported Beamer as strangely tranquil, declining to speak to his wife. Eerily, Beamer's line remained open for 15 minutes after the crash. Oddly, the Verizon wireless record shows that 19 calls were made from Beamer's cell phone long after the crash of UA 93. Initial media reports and FBI interviews detailed more than a dozen cell phone calls from the planes at high elevation. Yet in 2001, a telephone spokesperson stated that sustained mobile calls were not possible above 10,000 feet. During the 2006 Moussaoui Trial, the FBI (under oath) reduced the number of cell phone calls to two calls made from 5,000 feet, and presented evidence of only one (not two) "unconnected" call from Barbara Olson, lasting "0 seconds." In another twist, two other women reported that Caller-ID showed their husband's cell numbers on their answering machines, which while lasting several minutes, had been made from elevations of 25,000 and 35,000 feet. Although the FBI conducted a massive investigation into the calls, none of the telephone billing, nor any of the cell phone location data stored in standard phone company records has been publicly released.

Note: The 9/11 Consensus Panel, consisting of scientists, pilots, professors, attorneys, and journalists, has developed 32 Points of evidence contradicting specific claims made by the official account of 9/11. For many unanswered questions about 9/11 raised by highly credible former government officials and professors, click here and here. For our 9/11 Information Center filled with reliable, verifiable 9/11 resources, click here.


Boston chief: Wasn't told FBI got Tsarnaev warning
2013-05-09, Houston Chronicle/Associated Press
http://www.chron.com/news/crime/article/Boston-chief-Wasn-t-told-FBI-got-Tsar...

The FBI did not initially share with Boston police the warnings it had received from Russia about one suspect in last month's marathon bombings, despite the work of four city police representatives on a federal terrorism task force, Boston's police commissioner told Congress on [May 9]. Boston police learned about the Russian security service warnings only later. The congressional hearing was the first in a series to review the government's initial response to the attacks, ask what information authorities received about Tsarnaev and his brother before the bombings and consider whether everything was handled correctly. Some lawmakers questioned whether Boston police could have more thoroughly investigated Tsarnaev after 2011, based on Russia's vague warnings then to the FBI and CIA or the discovery by the Homeland Security Department in 2012 that he was traveling to Russia for six months, and whether Justice Department rules intended to protect civil liberties constrained the FBI's own inquiry. Led by the FBI, Joint Terrorism Task Forces operate in many cities as a way to bring federal, state and local officials together to share information. The model has existed for decades but, after 9/11, task forces sprouted up in cities nationwide to ensure that police were not out of the loop on investigations like the one the FBI conducted into Tsarnaev.

Note: For a powerful 11-minute video presenting undeniable evidence that the Boston bombers' uncle was closely linked to both the CIA and terrorist organizations, click here. Many are questioning whether the recent Boston bombing was a false flag operation. Though it is not conclusive, you can find some very reliable evidence that this might be the case at this link and this one. For deeply revealing reports from reliable major media sources on the deceptions of intelligence agencies, click here.


Are all telephone calls recorded and accessible to the US government?
2013-05-04, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/may/04/telephone-calls-recorded-...

CNN's Out Front with Erin Burnett [has been] focused on the possible involvement in the Boston Marathon attack of Katherine Russell, the 24-year-old American widow of the deceased suspect, Tamerlan Tsarnaev. Anonymous government officials are claiming that they are now focused on telephone calls between Russell and Tsarnaev that took place both before and after the attack to determine if she had prior knowledge of the plot or participated in any way. Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could: BURNETT: There's no way they actually can find out what happened, right, unless she tells them? CLEMENTE: No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. We certainly can find that out. BURNETT: So they can actually get that? People are saying, look, that is incredible. CLEMENTE: No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not. On Thursday night, Clemente again appeared on CNN. He reiterated what he said the night before but added expressly that "all digital communications in the past" are recorded and stored. All digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.

Note: All of our communications have been monitored by government computers for years. BBC News reported in this this 1999 article about the Echelon network which monitors all communications globally. For deeply revealing reports from reliable major media sources on government and corporate threats to privacy, click here.


Report: Dzhokhar Tsarnaev's repeated requests for a lawyer were ignored
2013-04-29, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/apr/29/tsarnaev-right-to-counsel...

The initial debate over the treatment of Dzhokhar Tsarnaev focused on whether he should be advised of his Miranda rights or whether the "public safety exception" justified delaying it. Now, the Los Angeles Times ... reports something which, if true, would be a much more serious violation of core rights than delaying Miranda warnings - namely, that ... Tsarnaev had repeatedly asked for a lawyer, but the FBI simply ignored those requests, instead allowing the interagency High Value Detainee Interrogation Group to continue to interrogate him alone: "Tsarnaev has not answered any questions since he was given a lawyer and told he has the right to remain silent by Magistrate Judge Marianne B. Bowler on Monday, officials said. Until that point, Tsarnaev had been responding to the interagency High Value Detainee Interrogation Group, including admitting his role in the bombing, authorities said. A senior congressional aide said Tsarnaev had asked several times for a lawyer, but that request was ignored since he was being questioned under the public safety exemption to the Miranda rule." Denying him the right to a lawyer after he repeatedly requests one is ... as fundamental a violation of crucial guaranteed rights as can be imagined. To ignore the repeated requests of someone in police custody for a lawyer, for hours and hours, is just inexcusable and legally baseless. If the LA Times report is true, then it means that the DOJ did not merely fail to advise him of his right to a lawyer but actively blocked him from exercising that right.

Note: The government appears to be setting a precedent in seeing how far they can go with taking away our constitutionally guaranteed rights. For deeply revealing reports from reliable major media sources on civil liberties, click here.


Despair Drives Guantnamo Detainees to Revolt
2013-04-25, New York Times
http://www.nytimes.com/2013/04/25/us/guantanamo-prison-revolt-driven-by-inmat...

A hunger strike is now in its third month [at Guantnamo prison], with 93 prisoners considered to be participating more than half the inmates. Both military officials and lawyers for the detainees agree about the underlying cause of the turmoil: a growing sense among many prisoners, some of whom have been held without trial for more than 11 years, that they will never go home. While President Obama made closing the prison a top priority when he entered the White House, he put that effort on the back burner in the face of Congressional opposition to his plan to move the detainees to a Supermax facility inside the United States. The prisoners had great optimism that Guantnamo would be closed, Gen. John F. Kelly, who oversees the prison as head of the United States Southern Command, recently told Congress. They were devastated when the president backed off ... of closing the facility. That disappointment was heightened by Mr. Obamas decision in January 2011 to sign legislation to restrict the transfers of prisoners. More than half the inmates were designated three years ago for transfer to another country if security conditions could be met, but the transfers dried up. President Obama has publicly and privately abandoned his promise to close Guantnamo, said Carlos Warner, a lawyer who represents one of 17 hunger strikers being kept alive by force-feeding through nasal tubes. His tragic political decision has caused the men to lose all hope. Thus, many innocent men have chosen death over a life of unjust indefinite detention.

Note: For deeply revealing reports from reliable major media sources on civil liberties, click here.


Congressman: Boston bombs triggered by remote control
2013-04-24, CBS News
http://www.cbsnews.com/8301-201_162-57581244/boston-marathon-bombs-possibly-t...

Two U.S. officials say Dzhokhar Tsarnaev, the surviving suspect [in the Boston Marathon bombings], was unarmed when police captured him hiding inside a boat in a neighborhood back yard. Authorities originally said they had exchanged gunfire with Dzhokhar for more than one hour Friday evening before they were able to subdue him. The officials tell The Associated Press that no gun was found in the boat. Boston Police Commissioner Ed Davis said earlier that shots were fired from inside the boat. Investigators also believe the brothers helped finance their plot through drug sales. Sources say Tamerlan Tsarnaev, who was unemployed, made money selling marijuana. Police think the brothers killed a Massachusetts Institute of Technology campus police officer for his weapon while they were the subjects of last week's massive manhunt. The brothers only had one real gun and one pellet gun when they were on the run Thursday. Investigators now believe that Officer Sean Collier was killed Thursday because the two bombing suspects wanted to take his gun. Investigators believe because the officer's holster had a locking system, they apparently couldn't get the gun out. Collier was shot in the head execution-style while sitting in his patrol car. In his questioning in the hospital, Dzhokhar Tsarnaev said they were self-taught and self-radicalized.

Note: Don't these details released by investigators sound odd? If Dzhokhar was not armed, why did authorities say they exchanged gunfire for an hour? And previous reports claimed Dzhokhar was shot in the throat, so that he could not speak about his version of what happened. High strangeness here. For powerful evidence from a respected researcher that the uncle of the Boston bombers was a top CIA official, click here. This is evidence supporting the theory that the brothers may have been CIA-controlled Manchurian Candidates. For more on this, click here.


Russia alerted US repeatedly about suspect, senators say
2013-04-24, Boston Globe
http://www.bostonglobe.com/metro/2013/04/23/brothers-suspected-marathon-bombi...

Russian authorities contacted the US government with concerns about Tamerlan Tsarnaev not once but "multiple" times, including an alert it sent after he was first investigated by FBI agents in Boston, raising new questions about whether the FBI should have paid more attention to the suspected Boston Marathon bomber. The FBI has previously said it interviewed Tsarnaev in early 2011 after it was initially contacted by the Russians. Following a closed briefing of the Senate Intelligence Committee Tuesday, Senator Richard Burr, a North Carolina Republican, said he believed that Russia alerted the United States about Tsarnaev in multiple contacts, including at least once since October 2011. Warnings raised by Russia have loomed large in the investigation of how Tsarnaev, a Kyrgyzstan national, and his younger brother, Dzhokhar, a naturalized US citizen, allegedly prepared for the bombing. US officials have faced tough questions for not tracking the older brothers travels to the Russian provinces of Dagestan and Chechnya, where he spent more than half of 2012 and may have interacted with militant groups or individuals. Senator Lindsey Graham, Republican of South Carolina, said ... that the FBI told him it was not aware of the older Tsarnaevs travels because his name had been misspelled on an airliner passenger list. US Secretary of Homeland Security Janet Napolitano confirmed the misspelling during a hearing before the Senate Judiciary Committee ... but she said Homeland Security nonetheless was aware of his trip.

Note: For powerful evidence from a respected researcher that the uncle of the Boston bombers was a top CIA official, click here.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.