As a 501(c)(3) nonprofit, we depend almost entirely on donations from people like you.
We really need your help to continue this work! Please consider making a donation.
Subscribe here and join over 13,000 subscribers to our free weekly newsletter

Big Brother Media Articles

Below are key excerpts of revealing news articles on Big Brother from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

Explore our comprehensive news index on a wide variety of fascinating topics.
Explore the top 20 most revealing news media articles we've summarized.
Check out 10 useful approaches for making sense of the media landscape.

Sort articles by: Article Date | Date Posted on WantToKnow.info | Importance

The Business of Intelligence Gathering
2008-06-15, New York Times
http://www.nytimes.com/2008/06/15/business/15shelf.html?partner=rssuserland&e...

America is ruled by an intelligence-industrial complex whose allegiance is not to the taxpaying public but to a cabal of private-sector contractors. That is the central thesis of Spies for Hire: The Secret World of Intelligence Outsourcing by Tim Shorrock, ... an investigative journalist. His book [provides a] disturbing overview of the intelligence community, also known as the I.C. Mr. Shorrock says our government is outsourcing 70 percent of its intelligence budget, or more than $42 billion a year, to a secret army of corporate vendors. Because of accelerated privatization efforts after 9/11, these companies are participating in covert operations and intelligence-gathering activities that were considered inherently governmental functions reserved for agencies like the Central Intelligence Agency, he says. Some of the books most intriguing assertions concern the permeating influence of the consulting firm Booz Allen Hamilton. In 2006, Mr. Shorrock reports, Booz Allen amassed $3.7 billion in revenue, much of which came from classified government contracts exempt from public oversight. Among its more than 18,000 employees are R. James Woolsey, the former C.I.A. director, and Joan Dempsey, a former longtime United States intelligence official who declared in a 2004 speech, I like to refer to Booz Allen as the shadow I.C. The revolving door between Booz Allen and the I.C. is personified by Mike McConnell, who joined the firm after serving as head of the National Security Agency under President Bill Clinton, only to return as director of national intelligence under President Bush.

Note: For revealing reports on government corruption from reliable sources, click here.


Online warfare research outlined
2008-05-15, Washington Times
http://washingtontimes.com/apps/pbcs.dll/article?AID=/20080515/FOREIGN/586297...

Procurement documents released by the U.S. Air Force give a rare glimpse into Pentagon plans for developing an offensive cyber-war capacity that can infiltrate, steal data from and, if necessary, take down enemy information-technology networks. The Broad Area Announcement, posted ... by the Air Force Research Laboratory's Information Directorate, outlines a two-year, $11 million effort to develop capabilities to "access ... any remotely located open or closed computer information systems," lurk on them "completely undetected," "stealthily exfiltrate information" from them and ultimately "be able to affect computer information systems through Deceive, Deny, Disrupt, Degrade, Destroy (D5) effects." "Of interest," the announcement says, "are any and all techniques to enable user and/or root-level access to both fixed [and] mobile computing platforms ... [and] methodologies to enable access to any and all operating systems, patch levels, applications and hardware." The announcement is the latest stage in the Air Force's effort to develop a cyber-war capability and establish itself as the service that delivers U.S. military power in cyberspace. Last year, the Air Force announced it was setting up a Cyberspace Command ... and was developing military doctrine for the prosecution of cyber-war operations. The developments highlight the murky legal territory on which the cyber-wars of the future will be fought. More important, because of the difficulties in identifying attackers and immediately quantifying damage from a cyber-attack, it can be hard to determine when such attacks constitute an act of war as opposed to crime or even vandalism.


Concentration camp doctor tops list of wanted Nazis
2008-04-30, Boston Globe/Associated Press
https://web.archive.org/web/20110917134939/http://articles.boston.com/2008-04...

Karl Lotter, a prisoner who worked in the hospital at Mauthausen concentration camp, had no trouble remembering the first time he watched SS doctor Aribert Heim kill a man. It was 1941, and an 18-year-old Jew had been sent to the clinic with a foot inflammation. Heim asked him about himself and why he was so fit. The young man said he had been a soccer player and swimmer. Then, instead of treating the prisoner's foot, Heim anesthetized him, cut him open, castrated him, took apart one kidney and removed the second, Lotter said. The victim's head was removed and the flesh boiled off so that Heim could keep it on display. "He needed the head because of its perfect teeth," Lotter, a non-Jewish political prisoner, recalled in testimony eight years later that was included in an Austrian warrant for Heim's arrest. But Heim managed to avoid prosecution, his American-held file in Germany mysteriously omitting his time at Mauthausen, and today he is the most wanted Nazi war criminal on a list of hundreds who the Simon Wiesenthal Center estimates are still free.

Note: As this article shows, some Nazi concentration camp doctors had virtually no moral aversion to killing and torturing any prisoner. Some of the most infamous doctors were tasked with perfecting mind control by any means. And many, like Heim, were allowed to escape. For reliable information on this, and how some of these doctors were then secretly brought to the US to train the CIA in mind control techniques, click here.


Administration Set to Use New Spy Program in U.S.
2008-04-12, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/04/11/AR20080411036...

The Bush administration said yesterday that it plans to start using the nation's most advanced spy technology for domestic purposes soon, rebuffing challenges by House Democrats over the idea's legal authority. Homeland Security Secretary Michael Chertoff said his department will activate his department's new domestic satellite surveillance office in stages, starting as soon as possible. Sophisticated overhead sensor data will be used for law enforcement once privacy and civil rights concerns are resolved, he said. His statements marked a fresh determination to operate the department's new National Applications Office. But Congress delayed launch of the new office last October. Critics cited its potential to expand the role of military assets in domestic law enforcement, to turn new or as-yet-undeveloped technologies against Americans without adequate public debate, and to divert the existing civilian and scientific focus of some satellite work to security uses. Democrats say Chertoff has not spelled out what federal laws govern the NAO, whose funding and size are classified. Congress barred Homeland Security from funding the office until its investigators could review the office's operating procedures and safeguards. The department submitted answers on Thursday, but some lawmakers promptly said the response was inadequate. [Rep. Bennie G. Thompson (D-Miss.), chairman of the House Homeland Security Committee] said, "We still don't know whether the NAO will pass constitutional muster since no legal framework has been provided."

Note: For many more revealing stories on threats to civil liberties, click here.


Political ties to a secretive religious group
2008-04-03, MSNBC News
http://deepbackground.msnbc.msn.com/archive/2008/04/03/857959.aspx

For more than 50 years, the National Prayer Breakfast has been a Washington institution. Every president has attended the breakfast since Eisenhower. Besides the presidents ... the one constant presence at the National Prayer Breakfast has been Douglas Coe. Although hes not an ordained minister, the 79-year-old Coe is the most important religious leader you've never seen or heard. Scores of senators in both parties ... go to small weekly Senate prayer groups that Coe attends, [including] senators John McCain, Barack Obama and Hillary Clinton. Observers who have investigated Coes group, called The Fellowship Foundation, [describe] a secretive organization. Coe repeatedly urges a personal commitment to Jesus Christ. Its a commitment Coe compares to the blind devotion that Adolph Hitler demanded. "Hitler, Goebbels and Himmler. Think of the immense power these three men had. Coe also quoted Jesus and said: One of the things [Jesus] said is 'If any man comes to me and does not hate his father, mother, brother, sister, his own life, he can't be a disciple." Writer Jeff Sharlet ... lived among Coe's followers six years ago, and came out troubled by their secrecy and rhetoric. We were being taught the leadership lessons of Hitler, Lenin and Mao. Hitlers genocide wasnt really an issue for them. It was the strength that he emulated, said Sharlet, who ... has now written about The Fellowship, also known to insiders as The Family, in [a] book called The Family: The Secret Fundamentalism at the Heart of American Power.

Note: This article strangely has been removed from the MSNBC website, though you can still access it using the Internet Archive. Watch the incredible four-minute NBC video clip showing Coe praising a communist Red Guard member for cutting the head off his mother at this link. For more on Coe's powerful links to Congress and corruption, see the MSNBC article available here. And for powerful inside information from a mind programmer who claims to have escaped from "the family," and another who says he is from a very high level there, click here and here. To develop an understanding of the bigger picture behind all of this, click here.


Google has lots to do with intelligence
2008-03-30, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/03/29/BUQLUAP8L.DTL

When the nation's intelligence agencies wanted a computer network to better share information ... they turned to a big name in the technology industry to supply some of the equipment: Google Inc. The Mountain View company sold the agencies servers for searching documents. Many of the contracts are for search appliances - servers for storing and searching internal documents. Agencies can use the devices to create their own mini-Googles on intranets made up entirely of government data. Additionally, Google has had success licensing a souped-up version of its aerial mapping service, Google Earth. Spy agencies are using Google equipment as the backbone of Intellipedia, a network aimed at helping agents share intelligence. [The system] is maintained by the director of national intelligence and is accessible only to the CIA, FBI, National Security Agency and an alphabet soup of other intelligence agencies and offices. Google supplies the computer servers that support the network, as well as the search software that allows users to sift through messages and data. Because of the complexities of doing business with the government, Google uses resellers to process orders on its behalf. Google takes care of the sales, marketing and management of the accounts. Google is one of many technology vendors vying for government contracts. On occasion, Google is the target of conspiracy theories from bloggers who say it is working with spy agencies more closely than simply selling search equipment.


National Dragnet Is a Click Away
2008-03-06, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/03/05/AR20080305036...

Several thousand law enforcement agencies are creating the foundation of a domestic intelligence system through computer networks that analyze vast amounts of police information. As federal authorities struggled to meet information-sharing mandates after the Sept. 11, 2001 terrorist attacks, police agencies from Alaska and California to the Washington region poured millions of ... records into shared digital repositories called data warehouses, giving investigators and analysts new power to discern links among people, patterns of behavior and other hidden clues. Those network efforts will begin expanding further this month, as some local and state agencies connect to a fledgling Justice Department system called the National Data Exchange, or N-DEx. The expanding police systems illustrate the prominent roles that private companies play in homeland security and counterterrorism efforts. They also underscore how the use of new data -- and data surveillance -- is evolving faster than the public's understanding or the laws intended to check government power and protect civil liberties. Three decades ago, Congress imposed limits on domestic intelligence activity after revelations that the FBI, Army, local police and others had misused their authority for years to build troves of personal dossiers and monitor political activists and other law-abiding Americans. Since those reforms, police and federal authorities have observed a wall between law enforcement information-gathering, relating to crimes and prosecutions, and more open-ended intelligence that relates to national security and [politics]. That wall is fast eroding following the passage of laws expanding surveillance authorities, the push for information-sharing networks, and the expectation that local and state police will play larger roles.

Note: For many revealing reports from reliable sources of serious threats to civil liberties, click here.


Clarity Sought on Electronics Searches
2008-02-07, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/06/AR20080206047...

The Electronic Frontier Foundation and Asian Law Caucus, two civil liberties groups in San Francisco, [have filed] a lawsuit to force the government to disclose its policies on border searches, including which rules govern the seizing and copying of the contents of electronic devices. They also want to know the boundaries for asking travelers about their political views, religious practices and other activities potentially protected by the First Amendment. The lawsuit was inspired by two dozen cases, 15 of which involved searches of cellphones, laptops, MP3 players and other electronics. Almost all involved travelers of Muslim, Middle Eastern or South Asian background. "It's one thing to say it's reasonable for government agents to open your luggage," said David D. Cole, a law professor at Georgetown University. "It's another thing to say it's reasonable for them to read your mind and everything you have thought over the last year. What a laptop records is as personal as a diary but much more extensive. It records every Web site you have searched. Every e-mail you have sent. It's as if you're crossing the border with your home in your suitcase." Mark Rasch, a technology security expert with FTI Consulting and a former federal prosecutor, [said] "Your kid can be arrested because they can't prove the songs they downloaded to their iPod were legally downloaded," he said. "Lawyers run the risk of exposing sensitive information about their client. Trade secrets can be exposed to customs agents with no limit on what they can do with it. Journalists can expose sources, all because they have the audacity to cross an invisible line."

Note: For many recent stories on threats to our civil liberties, click here.


Spies' Battleground Turns Virtual
2008-02-06, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/05/AR20080205031...

U.S. intelligence officials are [now claiming] that popular Internet services that enable computer users to adopt cartoon-like personas in three-dimensional online spaces also are creating security vulnerabilities by opening novel ways ... to move money, organize and conduct corporate espionage. Over the last few years, "virtual worlds" such as Second Life and other role-playing games have become home to millions of computer-generated personas known as avatars. By directing their avatars, people can take on alternate personalities, socialize, explore and earn and spend money across uncharted online landscapes. Nascent economies have sprung to life in these 3-D worlds, complete with currency, banks and shopping malls. Corporations and government agencies have opened animated virtual offices, and a growing number of organizations hold meetings where avatars gather and converse in newly minted conference centers. Intelligence officials ... say they're convinced that the qualities that many computer users find so attractive about virtual worlds -- including anonymity, global access and the expanded ability to make financial transfers outside normal channels -- have turned them into seedbeds for transnational threats. The government's growing concern seems likely to make virtual worlds the next battlefield in the struggle over the proper limits on the government's quest to [expand] data collection and analysis and the surveillance of commercial computer systems. Virtual worlds could also become an actual battlefield. The intelligence community has begun contemplating how to use Second Life and other such communities as platforms for cyber weapons.


Rule by fear or rule by law?
2008-02-04, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/02/04/ED5OUPQJ7.DTL

Since 9/11, and seemingly without the notice of most Americans, the federal government has assumed the authority to institute martial law, arrest a wide swath of dissidents (citizen and noncitizen alike), and detain people without legal or constitutional recourse in the event of "an emergency influx of immigrants in the U.S., or to support the rapid development of new programs." Beginning in 1999, the government has entered into a series of single-bid contracts with Halliburton subsidiary Kellogg, Brown and Root (KBR) to build detention camps at undisclosed locations within the United States. The government has also contracted with several companies to build thousands of railcars, some reportedly equipped with shackles, ostensibly to transport detainees. According to diplomat and author Peter Dale Scott, the KBR contract is part of a Homeland Security plan titled ENDGAME, which sets as its goal the removal of "all removable aliens" and "potential terrorists." What kind of "new programs" require the construction and refurbishment of detention facilities in nearly every state of the union with the capacity to house perhaps millions of people? The 2007 National Defense Authorization Act (NDAA) ... gives the executive the power to invoke martial law. The Military Commissions Act of 2006 ... allows for the indefinite imprisonment of anyone who ... speaks out against the government's policies. The law calls for secret trials for citizens and noncitizens alike. What could the government be contemplating that leads it to make contingency plans to detain without recourse millions of its own citizens?

Note: This important warning from former U.S. Congressman Dan Hamburg and Lewis Seiler should be read in its entirety. For more chilling reports on serious threats to our civil liberties, click here.


Microchips Everywhere: a Future Vision
2008-01-29, Seattle Times/Associated Press
http://seattletimes.nwsource.com/html/businesstechnology/2004151388_apchippin...

Here's a vision of the not-so-distant future: Microchips with antennas will be embedded in virtually everything you buy, wear, drive and read, allowing retailers and law enforcement to track consumer items -- and, by extension, consumers -- wherever they go, from a distance. A seamless, global network of electronic "sniffers" will scan radio tags in myriad public settings, identifying people and their tastes instantly so that customized ads, "live spam," may be beamed at them. In "Smart Homes," sensors built into walls, floors and appliances will inventory possessions, record eating habits, monitor medicine cabinets -- all the while, silently reporting data to marketers eager for a peek into the occupants' private lives. Science fiction? In truth, much of the radio frequency identification [RFID] technology that enables objects and people to be tagged and tracked wirelessly already exists -- and new and potentially intrusive uses of it are being patented, perfected and deployed. Some of the world's largest corporations are vested in the success of RFID technology, which couples highly miniaturized computers with radio antennas to broadcast information about sales and buyers to company databases. Already, microchips are turning up in some computer printers, car keys and tires, on shampoo bottles and department store clothing tags. They're also in library books and "contactless" payment cards. With tags in so many objects, relaying information to databases that can be linked to credit and bank cards, almost no aspect of life may soon be safe from the prying eyes of corporations and governments, says Mark Rasch, former head of the computer-crime unit of the U.S. Justice Department.

Note: For lots more on microchip implants, click here.


Bush Order Expands Network Monitoring
2008-01-26, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/01/25/AR20080125032...

President Bush signed a directive this month that expands the intelligence community's role in monitoring Internet traffic to protect against a rising number of attacks on federal agencies' computer systems. The directive, whose content is classified, authorizes the intelligence agencies, in particular the National Security Agency, to monitor the computer networks of all federal agencies -- including ones they have not previously monitored. The NSA has particular expertise in monitoring a vast, complex array of communications systems -- traditionally overseas. The prospect of aiming that power at domestic networks is raising concerns, just as the NSA's role in the government's warrantless domestic-surveillance program has been controversial. "Agencies designed to gather intelligence on foreign entities should not be in charge of monitoring our computer systems here at home," said Rep. Bennie Thompson (D-Miss.), chairman of the House Homeland Security Committee. The classified joint directive, signed Jan. 8 and called the National Security Presidential Directive 54/Homeland Security Presidential Directive 23, has not been previously disclosed. Allowing a spy agency to monitor domestic networks is worrisome, said James X. Dempsey, policy director of the Center for Democracy and Technology. "We're concerned that the NSA is claiming such a large role over the security of unclassified systems," he said. "They are a spy agency as well as a communications security agency. They operate in total secrecy. That's not necessary and not the most effective way to protect unclassified systems."

Note: For revealing reports from major media sources on the increasing surveillance of all aspects of society by secret government programs, click here.


Microsoft seeks patent for office 'spy' software
2008-01-16, Times of London
http://technology.timesonline.co.uk/tol/news/tech_and_web/article3193480.ece

Microsoft is developing Big Brother-style software capable of remotely monitoring a workers productivity, physical wellbeing and competence. The Times has seen a patent application filed by the company for a computer system that links workers to their computers via wireless sensors that measure their metabolism. The system would allow managers to monitor employees performance by measuring their heart rate, body temperature, movement, facial expression and blood pressure. Unions said they fear that employees could be dismissed on the basis of a computers assessment of their physiological state. This is believed to be the first time a company has proposed developing such software for mainstream workplaces. Microsoft submitted a patent application in the US for a unique monitoring system that could link workers to their computers. Wireless sensors could read heart rate, galvanic skin response, EMG, brain signals, respiration rate, body temperature, movement facial movements, facial expressions and blood pressure, the application states. The system could also automatically detect frustration or stress in the user. Physical changes to an employee would be matched to an individual psychological profile based on a workers weight, age and health. If the system picked up an increase in heart rate or facial expressions suggestive of stress or frustration, it would tell management. Civil liberties groups and privacy lawyers strongly criticised the potential of the system for taking the idea of monitoring people at work to a new level.

Note: For revealing reports from major media sources on the increasing surveillance of all aspects of society by secret government and corporate programs, click here.


Houston Police Drone Aircraft
2007-11-23, CNN
http://edition.cnn.com/TRANSCRIPTS/0711/23/sitroom.02.html

Transcript: [Suzanne] MALVEAUX: A Texas mystery solved -- at least partially. We now know Houston police are going to start using unmanned drone aircraft. But the question remains, well, for what? Stephen Dean of CNN affiliate KPRC has got an exclusive look. STEPHEN DEAN, KPRC CORRESPONDENT (voice-over): HPD [Houston Police Dept.], the federal Department of Homeland Security and other invited guests all watching to see how this drone could be used for police work in and around Houston. We tracked that drone from News Chopper 2. And that drone was able to use a high-powered camera to track us. Those cameras can actually look into people's homes or even follow them in moving cars -- which raises all sorts of new questions. HPD quickly hustled together a news conference when it realized our cameras were there for the entire secret test. Executive Assistant Chief Martha Mantabo admits that could mean covert police action. But she says it's too early to tell what else HPD will do with the aircraft. We asked, are these drones headed for ticketing speeders from the sky? MONTALVO: I'm not ruling anything out. DEAN: Back at the secret test site, police helicopter pilots claimed the entire air space was restricted and even threatened our local 2 Investigates pilot with action from the FAA if we didn't leave. But we checked with FAA several times and there never was a flight restriction. That leaves some to wonder whether the police are now ready to use terrorism fears since 911 to push the envelope further into our private lives.

Note: To watch the video of secret police work in action, click here.


Here come the thought police
2007-11-19, Baltimore Sun (Baltimore's leading newspaper)
http://www.baltimoresun.com/news/opinion/oped/bal-op.thoughtpolice19nov19,0,2...

With overwhelming bipartisan support, Rep. Jane Harman's "Violent Radicalization and Homegrown Terrorism Prevention Act" passed the House 404-6 late last month. Swift Senate passage appears certain. Not since the "Patriot Act" of 2001 has any bill so threatened our constitutionally guaranteed rights. Diverse groups vigorously oppose Ms. Harman's effort to stifle dissent. Unfortunately, the mainstream press and leading presidential candidates remain silent. Ms. Harman ... thinks it likely that the United States will face a native brand of terrorism in the immediate future and offers a plan to deal with ideologically based violence. But her plan is a greater danger to us than the threats she fears. Her bill tramples constitutional rights by creating a commission with sweeping investigative power and a mandate to propose laws prohibiting whatever the commission labels "homegrown terrorism." The proposed commission is a menace through its power to hold hearings, take testimony and administer oaths, an authority granted to even individual members of the commission - little Joe McCarthys - who will tour the country to hold their own private hearings. Ms. Harman's proposal includes an absurd attack on the Internet ... and legalizes an insidious infiltration of targeted organizations. While Ms. Harman denies that her proposal creates "thought police," it defines "homegrown terrorism" as "planned" or "threatened" use of force to coerce the government or the people in the promotion of "political or social objectives." That means that no force need actually have occurred as long as the government charges that the individual or group thought about doing it. Any social or economic reform is fair game. The bill defines "violent radicalization" as promoting an "extremist belief system." But American governments, state and national, have a long history of interpreting radical "belief systems" as inevitably leading to violence to facilitate change.

Note: For many major media reports on serious new threats to civil liberties, click here.


Big Brother Spying on Americans' Internet Data?
2007-11-07, ABC News
http://abcnews.go.com/Politics/Story?id=3833172

According to a former AT&T employee, the government has warrantless access to a great deal of Internet traffic should they care to take a peek. As information is traded between users it flows also into a locked, secret room on the sixth floor of AT&T's San Francisco offices and other rooms around the country -- where the U.S. government can sift through and find the information it wants, former AT&T employee Mark Klein alleged Wednesday at a press conference on Capitol Hill. "An exact copy of all Internet traffic that flowed through critical AT&T cables -- e-mails, documents, pictures, Web browsing, voice-over-Internet phone conversations, everything -- was being diverted to equipment inside the secret room," he said. Klein ... said that as an AT&T technician overseeing Internet operations in San Francisco, he helped maintain optical splitters that diverted data en route to and from AT&T customers. One day he found that the splitters were hard-wired into a secret room on the sixth floor. Documents he obtained [from] AT&T showed that highly sophisticated data mining equipment was kept there. Conversations he had with other technicians and the AT&T documents led Klein to believe there are 15 to 20 such sites nationwide, including in Seattle, Los Angeles, San Jose, San Diego and Atlanta, he said. Brian Reid, a former Stanford electrical engineering professor who appeared with Klein, said the NSA would logically collect phone and Internet data simultaneously because of the way fiber optic cables are intertwined. He said ... the system described by Klein suggests a "wholesale, dragnet surveillance." Of the major telecom companies, only Qwest is known to have rejected government requests for access to data. Former Qwest CEO Joseph Nacchio, appealing an insider trading conviction last month, said the government was seeking access to data even before Sept. 11.


Blackwater's Owner Has Spies for Hire
2007-11-03, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/11/02/AR20071102021...

The Prince Group, the holding company that owns Blackwater Worldwide, has been building an operation that will [develop] intelligence ... for clients in industry and government. The operation, Total Intelligence Solutions, has assembled a roster of former ... high-ranking figures from agencies such as the CIA and defense intelligence. Its chairman is Cofer Black, the former head of counterterrorism at CIA known for his leading role in many of the agency's more controversial programs, including the rendition and interrogation of ... suspects and the detention of some of them in secret prisons overseas. Its chief executive is Robert Richer, a former CIA associate deputy director of operations who was heavily involved in running the agency's role in the Iraq war. Because of its roster and its ties to owner Erik Prince, the multimillionaire former Navy SEAL, the company's thrust into this world highlights the blurring of lines between government, industry and activities formerly reserved for agents operating in the shadows. Richer, for instance, once served as the chief of the CIA's Near East division and is said to have ties to King Abdullah of Jordan. The CIA had spent millions helping train Jordan's intelligence service in exchange for information. Now Jordan has hired Blackwater to train its special forces. "Cofer can open doors," said Richer, who served 22 years at the CIA. "I can open doors. We can generally get in to see who we need to see. We ... can deal with the right minister or person." "They have the skills and background to do anything anyone wants," said RJ Hillhouse, who writes a national security blog called The Spy Who Billed Me. "There's no oversight. They're an independent company offering freelance espionage services. They're rent-a-spies."


Pakistani Prime Minister Benazir Bhutto: Osama bin Laden is Dead
2007-11-02, BBC News
http://news.bbc.co.uk/player/nol/newsid_7070000/newsid_7075800/7075843.stm

David Frost: Does anyone know exactly who was responsible for this assassination attempt? There is one report that said that you arranged to send President Musharraf a letter ... in the event of your death by assassination, urging him to investigate certain individuals in his government. Is that true? Benazir Bhutto: Yes it is true that I wrote to General Musharraf. I feel these are the forces that really want to stop not just me, but the democratic process and the will of the people [from] triumphing. David Frost: In terms of these three people you mentioned where they members of or associated with the government? Benazir Bhutto: One of them is a very key figure in security. He is a former military officer. He is someone who has had dealings with Jaish-e-Mohammad, one of the band [of] groups of Maulana Masood Azhar, who was in an Indian jail for decapitating three British tourists and three American tourists. And he also had dealings with Omar Shiekh, who murdered Osama bin Laden.

Note: The key statement on bin Laden's murder happens at minute five in the video at the above link. If the link fails, click here. For a Jan. 9, 2010 BBC article also suggesting bin Laden may already have been dead years earlier and that his death had been covered up, click here. Bhutto was assassinated not long after this interview on Dec. 27, 2007.


From Casinos to Counterterrorism
2007-10-22, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/21/AR20071021015...

[Las Vegas], famous for being America's playground, has also become its security lab. Like nowhere else in the United States, Las Vegas has embraced the twin trends of data mining and high-tech surveillance, with arguably more cameras per square foot than any airport or sports arena in the country. Even the city's cabs and monorail have cameras. Some privacy advocates view the city as a harbinger of things to come. In secret rooms in casinos across Las Vegas, surveillance specialists are busy analyzing information about players and employees. Relying on thousands of cameras in nearly every cranny of the casinos, they evaluate ... behavior. They ping names against databases that share information with other casinos, sometimes using facial-recognition software to validate a match. And in the marketing suites, casino staffers track players' every wager, every win or loss, the better to target high-rollers for special treatment and low- and middle-rollers for promotions. "You could almost look at Vegas as the incubator of a whole host of surveillance technologies," said James X. Dempsey, policy director for the Center for Democracy and Technology. Those technologies, he said, have spread to other commercial venues: malls, stadiums, amusement parks. After Sept. 11, 2001, several airports tested facial-recognition software, with little success. But the government is continuing to invest in biometric technologies. "We often hear of the surveillance technology du jour, but what we're seeing now in America is a collection of surveillance technologies that work together," said Barry Steinhardt, the American Civil Liberties Union's technology and liberty project director. "It isn't just video surveillance or face recognition or license plate readers or RFID chips. It's that all these technologies are converging to create a surveillance society."

Note: For revealing major media reports of privacy risks and invasions, click here.


State Department Use of Contractors Leaps in 4 Years
2007-10-19, New York Times
http://www.nytimes.com/2007/10/24/washington/24contractor.html?ex=1350878400&...

Over the past four years, the amount of money the State Department pays to private security and law enforcement contractors has soared to nearly $4 billion a year from $1 billion, ... but ... the department had added few new officials to oversee the contracts. Auditors and outside exerts say the results have been vast cost overruns, poor contract performance and, in some cases, violence that has so far gone unpunished. A vast majority of the money goes to companies like DynCorp International and Blackwater [Worldwide] to protect diplomats overseas, train foreign police forces and assist in drug eradication programs. There are only 17 contract compliance officers at the State Departments management bureau overseeing spending of the billions of dollars on these programs, officials said. Two new reports have delivered harsh judgments about the State Departments handling of the contracts, including the protective services contract that employs Blackwater guards whose involvement in a Sept. 16 shooting in Baghdad has raised questions about their role in guarding American diplomats in Iraq. The ballooning budget for outside contracts at the State Department is emblematic of a broader trend, contracting experts say. The Bush administration has doubled the amount of government money going to all types of contractors to $400 billion, creating a new and thriving class of post-9/11 corporations carrying out delicate work for the government. But the number of government employees issuing, managing and auditing contracts has barely grown. Thats a criticism thats true of not just State but of almost every agency, said Jody Freeman, an expert on administrative law at Harvard Law School.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.