Please donate here to support this vital work.
Subscribe here to our free email list

Big Brother News Articles
Excerpts of Key Big Brother News Articles in Media


Below are highly revealing excerpts of important big brother news articles from the major media suggesting a cover-up. Links are provided to the full news articles for verification. If any link fails to function, read this webpage. These big brother news articles are listed by order of importance. You can also explore the articles listed by order of the date of the news article or by the date posted. By choosing to educate ourselves and to spread the word, we can and will build a brighter future.

Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


U.S. Military Wanted to Provoke War With Cuba
2001-05-01, ABC News
http://abcnews.go.com/US/story?id=92662

In the early 1960s, America's top military leaders reportedly drafted plans to kill innocent people and commit acts of terrorism in U.S. cities to create public support for a war against Cuba. Code named Operation Northwoods, the plans reportedly included the possible assassination of Cuban émigrés, sinking boats of Cuban refugees on the high seas, hijacking planes, blowing up a U.S. ship, and even orchestrating violent terrorism in U.S. cities. The plans were developed as ways to trick the American public and the international community into supporting a war to oust Cuba's ... Fidel Castro. America's top military brass even contemplated causing U.S. military casualties, writing: "We could blow up a U.S. ship in Guantanamo Bay and blame Cuba," and, "casualty lists in U.S. newspapers would cause a helpful wave of national indignation." The plans had the written approval of all of the Joint Chiefs of Staff and were presented to President Kennedy's defense secretary, Robert McNamara, in March 1962. But they apparently were rejected by the civilian leadership and have gone undisclosed for nearly 40 years. The Joint Chiefs even proposed using the potential death of astronaut John Glenn during the first attempt to put an American into orbit as a false pretext for war with Cuba. Should the rocket explode and kill Glenn, they wrote, "the objective is to provide irrevocable proof … that the fault lies with the Communists." The scary thing is none of this stuff comes out until 40 years after.

Note: Why was ABC the only major news source to report on this highly revealing story? Read the shocking declassified documents on Operation Northwoods. Many military and political leaders look at the world as a grand chessboard. Sacrificing pawns (innocent civilians) is sometimes necessary to capture the queen. Explore revealing news articles on military corruption. Then check out eye-opening 9/11 news articles.


Inside the secretive Bilderberg Group
2005-09-29, BBC News
http://news.bbc.co.uk/1/hi/world/americas/4290944.stm

How much influence do private networks of the rich and powerful have on government policies and international relations? One group, the Bilderberg, has often attracted speculation that it forms a shadowy global government. Every year since 1954 [they have brought] together about 120 leading business people and politicians. At this year's meeting in Germany, the audience included the heads of the World Bank and European Central Bank, Chairmen or Chief Executives from Nokia, BP, Unilever, DaimlerChrysler and Pepsi ... editors from five major newspapers, members of parliament, ministers, European commissioners ... and the queen of the Netherlands. The chairman ... is 73-year-old Viscount Etienne Davignon. In an extremely rare interview, he played down the importance of Bilderberg. "I don't think (we are) a global ruling class because I don't think a global ruling class exists." Will Hutton ... who attended a Bilderberg meeting in 1997, says people take part in these networks in order to influence the way the world works, to create what he calls "the international common sense". And that "common sense" is one which supports the interests of Bilderberg's main participants. For Bilderberg's critics the fact that there is almost no publicity about the annual meetings is proof that they are up to no good. Bilderberg meetings often feature future political leaders shortly before they become household names. Bill Clinton went in 1991 while still governor of Arkansas, Tony Blair was there two years later while still an opposition MP. All the recent presidents of the European Commission attended Bilderberg meetings before they were appointed. Informal and private networks like Bilderberg have helped to oil the wheels of global politics and globalisation for the past half a century.

Note: Why is this meeting of top world leaders kept so secret? Why, until a few years ago, was there virtually no reporting on this influential group in the major media? Thankfully, the alternative media has had some good articles. And a Google search can be highly informative. Explore many other revealing major media news articles on powerful secret societies. And for those interested, check out reliable, eye-opening information covering the big picture of how and why these secret societies are using government-sponsored mind control programs to achieve their agenda.


The War On Waste
2002-01-29, CBS News
http://www.cbsnews.com/stories/2002/01/29/eveningnews/main325985.shtml

On Sept. 10 [2001], Secretary of Defense Donald Rumsfeld declared war. Not on foreign terrorists, "the adversary's closer to home. It's the Pentagon bureaucracy." He said money wasted by the military poses a serious threat. Rumsfeld promised change but the next day—Sept. 11—the world changed and in the rush to fund the war on terrorism, the war on waste seems to have been forgotten. Just last week President Bush announced, "my 2003 budget calls for more than $48 billion in new defense spending." More money for the Pentagon ... while its own auditors admit the military cannot account for 25 percent of what it spends. "According to some estimates we cannot track $2.3 trillion in transactions," Rumsfeld admitted. $2.3 trillion—that's $8,000 for every man, woman and child in America. A former Marine turned whistle-blower is risking his job by speaking out ... about the millions he noticed were missing from one defense agency's balance sheets. Jim Minnery, Defense Finance and Accounting Service ... tried to follow the money trail, even crisscrossing the country looking for records. "The director looked at me and said 'Why do you care about this stuff?' It took me aback. My supervisor asking me why I care about doing a good job," said Minnery. He was reassigned and says officials then covered up the problem. The Pentagon's Inspector General "partially substantiated" several of Minnery's allegations.

Note: To see the CBS video clip of this shocking admission, click here. For another key clip, click here. For other media articles revealing major corruption, click here. Even though originally not reported because of the trauma of 9/11, why wasn't this news broadcast far and wide later? Why isn't it making media headlines now? For other revealing news articles on military corruption, click here.


Political ties to a secretive religious group
2008-04-03, MSNBC News
http://deepbackground.msnbc.msn.com/archive/2008/04/03/857959.aspx

For more than 50 years, the National Prayer Breakfast has been a Washington institution. Every president has attended the breakfast since Eisenhower. Besides the presidents ... the one constant presence at the National Prayer Breakfast has been Douglas Coe. Although he’s not an ordained minister, the 79-year-old Coe is the most important religious leader you've never seen or heard. Scores of senators in both parties ... go to small weekly Senate prayer groups that Coe attends, [including] senators John McCain, Barack Obama and Hillary Clinton. Observers who have investigated Coe’s group, called The Fellowship Foundation, [describe] a secretive organization. Coe repeatedly urges a personal commitment to Jesus Christ. It’s a commitment Coe compares to the blind devotion that Adolph Hitler demanded. "Hitler, Goebbels and Himmler. Think of the immense power these three men had.” Coe also quoted Jesus and said: “One of the things [Jesus] said is 'If any man comes to me and does not hate his father, mother, brother, sister, his own life, he can't be a disciple.’" Writer Jeff Sharlet ... lived among Coe's followers six years ago, and came out troubled by their secrecy and rhetoric. “We were being taught the leadership lessons of Hitler, Lenin and Mao. Hitler’s genocide wasn’t really an issue for them. It was the strength that he emulated,” said Sharlet, who ... has now written about The Fellowship, also known to insiders as The Family, in [a] book called The Family: The Secret Fundamentalism at the Heart of American Power.

Note: This article strangely has been removed from the MSNBC website, though you can still access it using the Internet Archive. Watch the incredible four-minute NBC video clip showing Coe praising a communist Red Guard member for cutting the head off his mother at this link. For more on Coe's powerful links to Congress and corruption, see the MSNBC article available here. And for powerful inside information from a mind programmer who claims to have escaped from "the family," and another who says he is from a very high level there, click here and here. To develop an understanding of the bigger picture behind all of this, click here.


A New Way to Fight Cancer?
2007-01-23, Newsweek
http://www.newsweek.com/2007/02/22/a-new-way-to-fight-cancer.html

There are no magic bullets in the fight against cancer: that's the first thing every responsible scientist mentions when discussing a possible new treatment, no matter how promising. If there were a magic bullet, though, it might be something like dichloroacetate, or DCA, a drug that kills cancer cells by exploiting a fundamental weakness found in a wide range of solid tumors. So far, though, it kills them just in test tubes and in rats infected with human cancer cells; it has never been tested against cancer in living human beings. DCA ... is an existing drug whose side effects are well-studied and relatively tolerable. Also, it's a small molecule that might be able to cross the blood-brain barrier to reach otherwise intractable brain tumors. Within days after a technical paper on DCA appeared in the journal Cancer Cell last week, the lead author, Dr. Evangelos Michelakis of the University of Alberta, was deluged with calls and e-mails from prospective patients—to whom he can say only, “Hang in there.” DCA is a remarkably simple molecule. It acts in the body to promote the activity of the mitochondria. Researchers have assumed that the mitochondria in cancer cells were irreparably damaged. But Michelakis wondered if that was really true. With his colleagues he used DCA to turn back on the mitochondria in cancer cells—which promptly died. One of the great things about DCA is that it's a simple compound, in the public domain, and could be produced for pennies a dose. But that's also a problem, because big drug companies are unlikely to spend a billion dollars or so on large-scale clinical trials for a compound they can't patent.

Note: For a 2010 follow-up by Dr. Michelakis with promising results, click here and watch a 10-minute video at this link. For the DCA website, click here. Thank you Newsweek for this important article. Why haven't any other mass media reported this major story? Why aren't many millions of dollars being poured into research? Notice even Newsweek acknowledges the drug companies are not interested in finding a cure for cancer if they can't make a profit from it. Some suspect the drug companies have even suppressed cancer cures found in the past. For one amazing example of this, click here.


US plans to fight the net revealed
2006-01-27, BBC News
http://news.bbc.co.uk/1/hi/world/americas/4655196.stm

A newly declassified document gives a fascinating glimpse into the US military's plans for "information operations". The declassified document is called "Information Operations Roadmap". It was obtained by the National Security Archive at George Washington University using the Freedom of Information Act. Officials in the Pentagon wrote it in 2003. The Secretary of Defense, Donald Rumsfeld, signed it. The operations described in the document include a surprising range of military activities: public affairs officers who brief journalists, psychological operations troops who try to manipulate the thoughts and beliefs of an enemy, computer network attack specialists who seek to destroy enemy networks. The military's psychological operations, or Psyops, is finding its way onto the computer and television screens of ordinary Americans. "Psyops messages will often be replayed by the news media for much larger audiences, including the American public. Strategy should be based on the premise that the Department [of Defense] will 'fight the net' as it would an enemy weapons system," it reads. The document recommends that the United States should seek the ability to "provide maximum control of the entire electromagnetic spectrum". US forces should be able to "disrupt or destroy the full spectrum of globally emerging communications systems, sensors, and weapons systems dependent on the electromagnetic spectrum". The fact that the "Information Operations Roadmap" is approved by the Secretary of Defense suggests that these plans are taken very seriously indeed in the Pentagon.

Note: For other revealing news articles on military corruption, click here. For other revealing news articles on government corruption, click here.


'Bonesmen' for president
2004-03-10, MSNBC News
http://www.msnbc.msn.com/id/4500423

Pres. Bush and John Kerry were both members of the secret organization. ‘Skull and Bones’ dates to 1832. It was in fact a reaction to a secret society, the Masons. Founder William Huntington Russell thought of his little enclave as sort of anti-Masons and as a home for the wealthy and the powerful ... who would do anything for another Bonesman. Each year, 15 young undergraduate seniors are tapped for membership. Members of ‘Skull and Bones’ gather on High Street in the Yale campus at the tomb. New members, the neophytes, are expected to do things like lie in coffins, wrestle in mud, kiss a skull, and confess their sexual histories in front of the group to bond themselves together. Once you‘re in, you‘re in: ‘Skull and Bones’ is for life. There are a lot of [famous] Bonesmen ... Henry Luce, who created “TIME” magazine; Harold Stanley, founder of Morgan Stanley; William F. Buckley; Averell Harriman, long-time governor of New York. And then there are the presidents: William Howard Taft, whose father, Alphonso, had helped found the group; George Herbert Walker Bush, whose father, Prescott, was a Bonesman and a senator; the current President Bush. [And there's] John Kerry, Bonesman class of ‘66. His wife Teresa Kerry‘s first husband, John Heinz ... was ‘Skull and Bones.’ Both Bush and Kerry refused to answer ‘Meet the Press’ host Tim Russert when asked about the organization. Alexandra Robbins, author of “Secrets of the Tombs" [said] "The sole purpose of Skull and Bones is to get members into positions of power and then to have those members hire other members to prominent positions, which is something that President Bush has done."

Note: For a highly revealing, four-minute CNN News clip on Skull and Bones, click here. For other major media video clips reporting on this powerful secret society, click here. Many have claimed that secret societies have not had much influence on world politics. This article and videos raises many serious questions about this. For those interested in exploring reliable information covering the big picture of how and why these secret societies are using government-sponsored mind control programs to achieve their agenda, click here. And for other revealing media news articles on powerful secret societies, click here.


When Seeing and Hearing Isn't Believing
1999-02-01, Washington Post
http://www.washingtonpost.com/wp-srv/national/dotmil/arkin020199.htm

"Gentlemen! We have called you together to inform you that we are going to overthrow the United States government." So begins a statement being delivered by Gen. Carl W. Steiner. At least the voice sounds amazingly like him. But it is not Steiner. It is the result of voice "morphing" technology developed at the Los Alamos National Laboratory in New Mexico. Psychological operations ... PSYOPS, as the military calls it, seek to exploit human vulnerabilities in enemy governments, militaries and populations to pursue national and battlefield objectives. Covert operators kicked around the idea of creating a computer-faked videotape of Saddam Hussein crying or showing other such manly weaknesses, or in some sexually compromising situation. The nascent plan was for the tapes to be flooded into Iraq and the Arab world. The tape war never proceeded ... but the "strategic" PSYOPS scheming didn't die. What if the U.S. projected a holographic image of Allah floating over Baghdad urging the Iraqi people and Army to rise up against Saddam? According to a military physicist given the task of looking into the hologram idea, the feasibility had been established of projecting large, three-dimensional objects that appeared to float in the air. A super secret program was established in 1994 to pursue the very technology for PSYOPS application. The "Holographic Projector" is described in a classified Air Force document as a system to "project information power from space ... for special operations deception missions."

Note: If the above link fails, click here. If you want to understand some of the many hidden capabilities of the U.S. military, this article is a must read. Watch this video to see how easily faces can be manipulated on video. For other revealing news articles on the use of these "nonlethal" weapons, click here.


C.I.A. Data Show 14-Year Project On Controlling Human Behavior
1977-07-21, New York Times
http://select.nytimes.com/gst/abstract.html?res=F60A1FFC3E59157493C3AB178CD85...

The Central Intelligence Agency conducted a 14-year program to find ways to "control human behavior" through the use of chemical, biological and radiological material, according to agency documents made public today by John Marks. The documents ... suggested broader experimentation on unwitting humans by the intelligence agency or its paid researchers than had been publicly known before. Mr. Marks distributed 20 documents that described the following incidents, among others: In 1956, the C.I.A. contracted with a private physician to test "bulbocapnine," a drug that can cause stupor or induce a catatonic state, on monkeys and "convicts incarcerated at" an unnamed state penitentiary. A letter from an unnamed C.I.A. official in 1949 discussed ways of killing people without leaving a trace. "I believe that there are two chemical substances which would be most useful in that they would leave no characteristic pathological findings," the letter said. In 1952, two Russian agents who were "suspected of being doubled" were interrogated using "narcohypnotic" methods. The two men were given sodium pentothal and a stimulant. One interrogation produced a "remarkable" regression, the papers said, during which "the subject actually relived certain past activities of his life. The subject totally accepted Mr. [name deleted] as an old and trusted and beloved personal friend whom the subject had known in years past in Georgia, U.S.S.R." The C.I.A. conducted secret medical experiments from 1949 through 1963 under the code names Bluebird, Artichoke, MK Ultra and MK Delta.

Note: If the above link fails, click here. Watch a one-minute video clip showing Congressional testimony on a dart gun which causes a heart attack without leaving any evidence. Explore further reliable, verifiable information suggesting a major cover-up of government mind control programs. Read other revealing news articles on mind control.


Hypnotic Experimentation and Research
1954-02-10, Declassified CIA Document (Verify using note below)
http://www.WantToKnow.info/mind_control/foia_mind_control/190691_assassins_pr...

A posthypnotic of the night before (pointed finger, you will sleep) was enacted. Misses [deleted] and [deleted] immediately progressed to a deep hypnotic state with no further suggestion. Miss [deleted] was then instructed (having previously expressed a fear of firearms in any fashion) that she would use every method at her disposal to awaken Miss [deleted] (now in a deep hypnotic sleep) and failing this, she would pick up a pistol nearby and fire it at Miss [deleted]. She was instructed that her rage would be so great that she would not hesitate to “kill” [deleted] for failing to awaken. Miss [deleted] carried out these suggestions to the letter including firing the (unloaded) gun at [deleted] and then proceeding to fall into a deep sleep. Both were awakened and expressed complete amnesia for the entire sequence. Miss [deleted] was again handed the gun, which she refused (in an awakened state) to pick up or accept from the operator. She expressed absolute denial that the foregoing sequence had happened.

Note: This text is quoted from page 1 of declassified CIA document MORI ID 190691. To verify the statement in the text, make a FOIA (Freedom of Information Act) request as described here, or directly view a scanned copy online here. To access thousands of pages of declassified CIA mind control documents online, click here. For lots more reliable information on this crucial topic, click here. For many revealing news articles on mind control, click here.


Has Our Government Spent $21 Trillion Of Our Money Without Telling Us?
2017-12-08, Forbes
https://www.forbes.com/sites/kotlikoff/2017/12/08/has-our-government-spent-21...

On July 26, 2016, the Office of the Inspector General (OIG) issued a report “Army General Fund Adjustments Not Adequately Documented or Supported”. The report indicates that for fiscal year 2015 the Army failed to provide adequate support for $6.5 trillion. Given that the entire Army budget in fiscal year 2015 was $120 billion, unsupported adjustments were 54 times the level of spending authorized by Congress. An appendix to the July 2016 report shows $2 trillion in changes to the Army General Fund balance sheet due to unsupported adjustments. On the asset side, there is $794 billion increase in the Army's Fund Balance with the U.S. Treasury. There is also an increase of $929 billion in the Army's Accounts Payable. What is the source of the additional $794 billion in the Army's Fund Balance? The July 2016 report is not the only such report of unsubstantiated adjustments. Mark Skidmore and Catherine Austin Fitts, former Assistant Secretary of Housing and Urban Development, conducted a search of government websites and found similar reports dating back to 1998. While the documents are incomplete, original government sources indicate $21 trillion in unsupported adjustments have been reported for the Department of Defense and the Department of Housing and Urban Development for the years 1998-2015. [And why] after Mark Skidmore began inquiring about OIG-reported unsubstantiated adjustments, [was] the OIG's webpage, which documented, albeit in a highly incomplete manner, these unsupported "accounting adjustments," ... mysteriously taken down?

Note: Explore this webpage for a brief background to this astounding news. See also a detailed analysis of these missing trillions, which amount to $65,000 per man, woman, and child in the US. And don't miss this highly revealing interview with Prof. Mark Skidmore of Michigan State with even more startling news.


The Disbelievers
2006-09-08, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2006/09/07/AR20060907016...

A recent Scripps Howard/Ohio University poll of 1,010 Americans found that 36 percent suspect the U.S. government promoted the attacks or intentionally sat on its hands. Sixteen percent believe explosives brought down the towers. A Zogby International poll of New York City residents two years ago found 49.3 percent believed the government "consciously failed to act." The loose agglomeration known as the "9/11 Truth Movement" has stopped looking for truth from the government. The academic wing is led by [Prof. David Ray] Griffin, who founded the Center for a Postmodern World at Claremont University; James Fetzer, a tenured philosopher at the University of Minnesota; and Daniel Orr, the retired chairman of the economics department at the University of Illinois. The movement's de facto minister of engineering is Steven Jones, a tenured physics professor at Brigham Young University, who's ... concluded that the collapse of the twin towers is best explained as controlled demolition. Catherine Austin Fitts served as assistant secretary of housing in the first President Bush's administration. [Robert] Bowman was chief of advanced space programs under presidents Ford and Carter. Fitts and Bowman agree that the "most unbelievable conspiracy" theory is the one retailed by the government. It was a year before David Ray Griffin, an eminent liberal theologian and philosopher, began his stroll down the path of disbelief. He wondered why ... military jets failed to intercept even one airliner. He read the 9/11 Commission report with a swell of anger. Contradictions were ignored and no military or civilian official was reprimanded. Griffin's book, "The New Pearl Harbor" ... never reviewed in a major U.S. newspaper, sold more than 100,000 copies and became a movement founding stone.

Note: If the above link fails, click here. Explore the comments of over 100 professors who have publicly called for a new investigation of 9/11. Then explore the excellent, reliable resources provided in our 9/11 Information Center.


The Lowdown on Sweet?
2006-02-12, New York Times
http://www.nytimes.com/2006/02/12/business/yourmoney/12sweet.html?ex=12974004...

When Dr. Morando Soffritti ... saw the results of his team's seven-year study on aspartame, he knew he was about to be injected into a bitter controversy over this sweetener. Aspartame is sold under the brand names Nutra-Sweet and Equal and is found in such popular products as Diet Coke, Diet Pepsi, Diet Snapple and Sugar Free Kool-Aid. Hundreds of millions of people consume it worldwide. Dr. Soffritti ... oversees 180 scientists and researchers in 30 countries. Dr. Soffritti's study concluded that [aspartame] was associated with unusually high rates of lymphomas, leukemias and other cancers. The study ... involved 1,900 laboratory rats and cost $1 million. Soffritti said he was inspired to look at aspartame because of what he calls "inadequacies" in the cancer studies done by Searle in the 1970's. Others have also challenged Searle's studies. Years before the F.D.A. approved aspartame, the agency had serious concerns about the accuracy and credibility of Searle's aspartame studies. From 1977 to 1985 -- during much of the approval process -- Searle was headed by Donald H. Rumsfeld, who is now the secretary of defense. Searle was acquired by Monsanto in 1985. Dr. Soffritti said ... more research and open debate were needed on whether aspartame was a carcinogen. "It is very important to have scientists who are independent and not funded by industry looking at this."

Note: If you want to understand the influence of big money on your health, this article is well worth reading. Our Health Information Center Health Information Center has lots more. And for an excellent, incredibly eye-opening documentary on aspartame that will raise more questions about diet soft drinks, click here.


U.S. Suppressed Footage of Hiroshima for Decades
2005-08-03, New York Times/Reuters
http://www.nytimes.com/reuters/news/news-media-anniversary.html

In the weeks following the atomic attacks on Hiroshima and Nagasaki, U.S. authorities seized and suppressed film shot in the bombed cities by U.S. military crews and Japanese newsreel teams to prevent Americans from seeing the full extent of devastation wrought by the new weapons. It remained hidden until the early 1980s and has never been fully aired. "Although there are clearly huge differences with Iraq, there are also some similarities," said Mitchell, co-author of "Hiroshima in America" and editor of Editor & Publisher. "The chief similarity is that Americans are still being kept at a distance from images of death, whether of their own soldiers or Iraqi civilians." The Los Angeles Times released a survey of six months of media coverage of the Iraq war in six prominent U.S. newspapers and two news magazines -- a period during which 559 coalition forces, the vast majority American, were killed. It found they had run almost no photographs of Americans killed in action. "So much of the media is owned by big corporations and they would much rather focus on making money than setting themselves up for criticism from the White House and Congress," said Ralph Begleiter, a former CNN correspondent. In 1945, U.S. policymakers wanted to be able to continue to develop and test atomic and eventually nuclear weapons without an outcry of public opinion. "They succeeded but the subject is still a raw nerve."

Note: As this highly revealing Reuters article was removed from both the New York Times and the Reuters websites, click here to view it in its entirely on one of the few alternative news websites to report it. And to go much deeper into how the devastating effects of the bomb were covered up by various entities within government, click here.


Is Al Qaeda Just a Bush Boogeyman?
2005-01-11, Los Angeles Times
http://articles.latimes.com/2005/jan/11/opinion/oe-scheer11

Is it conceivable that Al Qaeda, as defined by President Bush as the center of a vast and well-organized international terrorist conspiracy, does not exist? To even raise the question amid all the officially inspired hysteria is heretical. Yet a brilliant new BBC film produced by one of Britain's leading documentary filmmakers systematically challenges this. "The Power of Nightmares: The Rise of the Politics of Fear" ... argues coherently that much of what we have been told about the threat of international terrorism "is a fantasy that has been exaggerated and distorted by politicians. It is a dark illusion that has spread unquestioned ... around the world." Why have we heard so much frightening talk about "dirty bombs" when experts say it is panic rather than radioactivity that would kill people? Why did Defense Secretary Donald Rumsfeld claim on "Meet the Press" in 2001 that Al Qaeda controlled massive high-tech cave complexes in Afghanistan, when British and U.S. military forces later found no such thing? The film ... directly challenges the conventional wisdom by making a powerful case that the Bush administration, led by a tight-knit cabal of Machiavellian neoconservatives, has seized upon the false image of a unified international terrorist threat to replace the expired Soviet empire in order to push a political agenda. "The nightmare vision of a uniquely powerful hidden organization waiting to strike our societies is an illusion. Wherever one looks for this Al Qaeda organization, from the mountains of Afghanistan to the 'sleeper cells' in America, the British and Americans are chasing a phantom enemy."

Note: If above link fails, click here. This highly revealing film by one of Britain's most respected documentary makers is available for free viewing on the Internet. For the link and lots more on this amazingly revealing documentary, click here. For an excellent review of the film in one of the U.K.'s leading newspapers, click here.


The 9/11 Secret in the CIA's Back Pocket
2004-10-19, Los Angeles Times
http://articles.latimes.com/2004/oct/19/opinion/oe-scheer19

It is shocking: The Bush administration is suppressing a CIA report on 9/11 until after the election, and this one names names. "It is infuriating that a report which shows that high-level people were not doing their jobs in a satisfactory manner before 9/11 is being suppressed," an intelligence official who has read the report told me. [The] release of the report, which represents an exhaustive 17-month investigation by an 11-member team within the agency, has been "stalled." First by acting CIA Director John McLaughlin and now by Porter J. Goss, the former Republican House member (and chairman of the Intelligence Committee) who recently was appointed CIA chief. The official stressed that the report was more blunt and more specific than the earlier bipartisan reports produced by the Bush-appointed Sept. 11 commission and Congress. "The report found very senior-level officials responsible." By law, the only legitimate reason the CIA director has for holding back such a report is national security. None of this should surprise us given the Bush administration's great determination since 9/11 to resist any serious investigation. The president fought against the creation of the Sept. 11 commission, for example, agreeing only after enormous political pressure was applied by a grass-roots movement led by the families of those slain. And then Bush refused to testify to the commission under oath. Instead he deigned only to chat with the commission members, with Vice President Dick Cheney present, in a White House meeting in which commission members were not allowed to take notes.

Note: If the above link fails, click here. For other reliable information on the 9/11 cover-up, click here.


A dangerous dose
2004-09-05, Boston Globe
http://www.boston.com/ae/books/articles/2004/09/05/a_dangerous_dose

Marcia Angell [is] a faculty member at the Harvard Medical School [and one of the] former editors of The New England Journal of Medicine. Her new book, "The Truth About the Drug Companies," is a sober, clear-eyed attack on the excesses of drug company power. How does the drug industry deceive us? It plies attending physicians with expense-paid junkets to St. Croix and Key West, Fla., where they are given honoraria and consulting fees to listen to promotional presentations. It promotes new or little-known diseases such as "social anxiety disorder" and "premenstrual dysphoric disorder" as a way of selling the drugs that treat them. It sets up phony front groups disguised as "patient advocacy organizations." It hires ghostwriters to produce misleading scientific articles and then pays academic physicians to sign on as authors. It sends paid lackeys and shills out onto the academic lecture circuit to ''educate" doctors about a drug's unapproved uses. It hires multinational PR firms to trumpet dubious studies as scientific breakthroughs while burying the studies that are likely to harm sales. It buys up the results of publicly funded research. It maintains a political chokehold on the American public by donating more money to political campaigns than any other industry in the country. For many years the drug industry has reaped the highest profit margins of any industry in America. In 2002, the top 10 American drug companies had profit margins of 17 percent; Pfizer, the largest, had profit margins of 26 percent. So staggeringly profitable is the drug industry that in 2002 the combined profits for the top 10 drug companies in the Fortune 500 were greater than those of all the other 490 companies combined.

Note: For an excellent 10-page summary of this revealing book written by the esteemed author, click here. For additional reliable information on the health cover-up, click here.


Connections And Then Some
2003-03-14, Washington Post
http://www.washingtonpost.com/ac2/wp-dyn?pagename=article&node=&contentId=A25...

The Carlyle Group [is] an investment house famous as one of the most well-connected companies anywhere. Former president George H.W. Bush is a Carlyle adviser. Former British prime minister John Major heads its European arm. Former secretary of state James Baker is senior counselor, former White House budget chief Richard Darman is a partner, former SEC chairman Arthur Levitt is senior adviser -- the list goes on. Those associations have brought Carlyle enormous success. The Washington-based merchant bank controls nearly $14 billion in investments, making it the largest private equity manager in the world. It buys and sells whole companies the way some firms trade shares of stock. But the connections also have cost Carlyle. It has developed a reputation as the CIA of the business world -- omnipresent, powerful, a little sinister. Media outlets from the Village Voice to BusinessWeek have depicted Carlyle as manipulating the levers of government from shadowy back rooms. Congresswoman Cynthia McKinney (D-Ga.) even suggested that Carlyle's and Bush's ties to the Middle East made them somehow complicitous in the Sept. 11 terror attacks. It didn't help that as the World Trade Center burned on Sept. 11, 2001, the news interrupted a Carlyle business conference at the Ritz-Carlton Hotel here attended by a brother of Osama bin Laden. Former president Bush, a fellow investor, had been with him at the conference the previous day. Bush['s] primary function is to give speeches for Carlyle that attract wealthy foreigners in places where the former president is especially revered, such as Asia. The company has rewarded its faithful with a 36 percent average annual rate of return.

Note: If the above link fails, click here. To understand the amazingly powerful role of this low-profile, yet extremely wealthy and influential group, click here to view free a 48-minute documentary shown on Dutch national TV which clearly depicts the depths of corruption and deceit at the highest levels of government. You will be thankful that you watched this highly educational film.


'We've Hit The Targets'
2001-09-13, Newsweek
http://www.newsweek.com/2001/09/12/we-ve-hit-the-targets.html

Could the [9/11] bombers have been stopped? NEWSWEEK has learned that while U.S. intelligence received no specific warning, the state of alert had been high during the past two weeks, and a particularly urgent warning may have been received the night before the [9/11] attacks, causing some top Pentagon brass to cancel a trip. Why that same information was not available to the 266 people who died aboard the four hijacked commercial aircraft may become a hot topic on the Hill.

Note: This most astounding information is buried in this long article. Yet it is repeated in a Newsweek article 11 days later (9/24/2001), which states, "On Sept. 10, NEWSWEEK has learned, a group of top Pentagon officials suddenly canceled travel plans for the next morning, apparently because of security concerns." It was again buried in a longer article, yet the author felt it important enough to include. Why was there no follow up? WantToKnow.info's Fred Burks has a reliable deep cover CIA contact who says he was informed just hours before the attacks that there was going to be a major attack on Washington on 9/11. For an abundance of reliable verifiable information suggesting a major cover-up around 9/11, click here and here.


Echelon spy network revealed
1999-11-03, BBC News
http://news.bbc.co.uk/1/hi/world/503224.stm

Imagine a global spying network that can eavesdrop on every single phone call, fax or e-mail, anywhere on the planet. It sounds like science fiction, but it's true. Two of the chief protagonists - Britain and America - officially deny its existence. But the BBC has confirmation from the Australian Government that such a network really does exist. The base is linked directly to the headquarters of the US National Security Agency (NSA) at Fort Mead in Maryland, and it is also linked to a series of other listening posts scattered across the world, like Britain's own GCHQ. The power of the network, codenamed Echelon, is astounding. Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. The network is so secret that the British and American Governments refuse to admit that Echelon even exists. But another ally, Australia, has decided not to be so coy. The man who oversees Australia's security services, Inspector General of Intelligence and Security Bill Blick, has confirmed to the BBC that their Defence Signals Directorate (DSD) does form part of the network. Asked if they are then passed on to countries like Britain and America, he said: "They might be in certain circumstances." They are looking for evidence of international crime, like terrorism. But the system is so widespread all sorts of private communications, often of a sensitive commercial nature, are hoovered up and analysed.

Note that this is a 1999 article. The capability to monitor all communications has existed for a long time. For a powerful, well documented 20-page paper in the Federal Communications Law Journal providing strong evidence that this program is unconstitutional, click here.


U.S. Government Planned False Flag Attacks to Start War With Soviet Union, JFK Documents Show
2017-11-20, Newsweek
http://www.newsweek.com/us-soviet-aircraft-jfk-docs-cover-operations-717460

The U.S. government [planned] false flag attacks with Soviet aircraft to justify war with the USSR or its allies, newly declassified documents surrounding the assassination of President John F. Kennedy show. In a three-page memo, members of the National Security Council wrote, "There is a possibility that such aircraft could be used in a ... provocation operation in which Soviet aircraft would appear to attack US or friendly installations to provide an excuse for U.S. intervention." The memo shows that the department, along with the CIA, considered buying Soviet aircraft to stage the attacks, even getting estimates from the Air Force on how long it would take and how much it would cost to produce the planes domestically and covertly. The document also outlined the possibility of purchasing such aircraft from non-Soviet Bloc countries that had received planes from the USSR, or from pilots that had defected, instead of building them domestically. The CIA deemed those plans too risky. It is unclear when the memo was written or circulated. The NSC staff mention a meeting on March 22, 1962, when a "Special Group" discussed the attorney general's questions about acquiring Soviet aircraft. The document was last reviewed by the CIA in February 1998, and a stamp shows it was declassified in March 2016. But, strangely, the document's cover letter shows a date of "00/00/00."

Note: ABC News back in 2001 was the only major media to report on Operation Northwoods, which is the code name for a very similar plan, when the first documents on this were declassified. As these earlier documents show, the plan was approved by the top Pentagon chiefs to create a pretext for war with Cuba by sinking an American ship in the Havana harbor or creating a "terror campaign" in cities like Miami and Washington D.C. Why was this stunning news only reported by ABC? For a possible reason, see this excellent summary of testimony by major media whistleblowers.


The FDA is stockpiling military weapons — and it’s not alone
2016-06-26, Boston Globe
http://www.bostonglobe.com/opinion/2016/06/25/the-fda-stockpiling-military-we...

The [FDA] amassed a stockpile of pistols, shotguns, and semiautomatic rifles, along with ample supplies of ammunition, liquid explosives, gun scopes, and suppressors. Between 2006 and 2014, [the Animal and Plant Health Inspection Service, an agency of the USDA] spent nearly $4.8 million to arm itself. And far from being an outlier, it is one of dozens of federal agencies that spends lavishly on guns, ammunition, and military-style equipment. A report issued this month by American Transparency ... chronicles the explosive - and expensive - trend toward militarizing federal agencies, most of which have no military responsibilities. Between 2006 and 2014, the report shows, 67 federal bureaus, departments, offices, and services spent at least $1.48 billion on ammunition and material one might expect to find in the hands of SWAT teams, Special Forces soldiers - or terrorists. The Internal Revenue Service, for example, now spends more than $1 million annually on firearms, ammunition, and military gear. Since 2006, the Department of Veterans Affairs ... has poured nearly $11.7 million into guns and ammo. Even the Smithsonian Institution and the Social Security Administration have each devoted hundreds of thousands of dollars to weaponry. There are now fewer US Marines than there are officers at federal administrative agencies with the authority to carry weapons and make arrests.

Note: The Washington Post in 2009 reported that military influence over US civilian authorities was quietly increasing, and the militarization of US police has been well-documented. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of civil liberties.


‘Eyewash’: How the CIA deceives its own workforce about operations
2016-01-31, Washington Post
https://www.washingtonpost.com/world/national-security/eyewash-how-the-cia-de...

Senior CIA officials have for years intentionally deceived parts of the agency workforce by transmitting internal memos that contain false information. The practice is known by the term “eyewash.” Officials said there is no clear mechanism for labeling eyewash cables or distinguishing them from legitimate records being examined by the CIA’s inspector general, turned over to Congress or declassified for historians. Senate investigators uncovered apparent cases of eyewashing as part of a multi-year probe of the CIA’s interrogation program, according to officials who said that the Senate Intelligence Committee found glaring inconsistencies in CIA communications about classified operations, including drone strikes. Former CIA officials ... acknowledged that the internal mechanisms for managing eyewash cables were largely informal. Skeptics described the safeguards as inadequate. “When you introduce falsehoods into the communications stream then you can destabilize the whole system of intelligence oversight and compliance with the law,” said Steven Aftergood, a government secrecy expert at the Federation of American Scientists. “It wasn’t that long ago that we had a CIA executive director who was engaged in criminal activity - you don’t want someone like him preparing eyewash cables,” Aftergood said, referring to Kyle “Dusty” Foggo, the former No. 3 executive at the agency.

Note: Read more about the strange case of Kyle "Dusty" Foggo, the CIA executive convicted of fraud in connection with secret CIA prisons. For more along these lines, see concise summaries of deeply revealing Intelligence agency corruption news articles from reliable major media sources.


Meet Executive Order 12333: The Reagan rule that lets the NSA spy on Americans
2014-07-18, Washington Post
https://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan...

In March I received a call from the White House counsel’s office regarding a speech I had prepared for my boss at the State Department. The speech was about the impact ... of National Security Agency surveillance practices. The draft stated that “if U.S. citizens disagree with congressional and executive branch determinations about the proper scope of signals intelligence activities, they have the opportunity to change the policy through our democratic process.” But the White House counsel’s office told me that no, that wasn’t true. I was instructed to amend the line. Some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them. Public debate about the bulk collection of U.S. citizens’ data by the NSA has focused largely on Section 215 of the Patriot Act. Based in part on classified facts that I am prohibited by law from publishing, I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215. Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained. None of the reforms that Obama announced earlier this year will affect such collection.

Note: The above was written by John Napier Tye, former section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor. A 2014 Washington Post investigation sheds more light on the NSA's legally dubious domestic mass surveillance program. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


HSBC 'sorry' for aiding Mexican drugs lords, rogue states and terrorists
2012-07-17, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/business/2012/jul/17/hsbc-executive-resigns-senate

Executives with Europe's biggest bank, HSBC, were subjected to a humiliating onslaught from US senators on Tuesday over revelations that staff at its global subsidiaries laundered billions of dollars for drug cartels, terrorists and pariah states. HSBC's subsidiaries transported billions of dollars of cash in armoured vehicles, cleared suspicious travellers' cheques worth billions, and allowed Mexican drug lords buy to planes with money laundered through Cayman Islands accounts. Other subsidiaries moved money from Iran, Syria and other countries on US sanctions lists, and helped a Saudi bank linked to al-Qaida to shift money to the US. The committee had released a damning report on Monday, which detailed a collapse in HSBC's compliance standards. Executives at the bank [were] consistently warned of problems. HSBC's Mexican operations moved $7bn into the bank's US operations, and according to its own staff, much of that money was tied to drug traffickers. Leigh Winchell, assistant director for investigative programs at US immigration & customs enforcement ... said 47,000 people had lost their lives since 2006 as a result of Mexican drug traffickers. The senators highlighted testimony from Leopoldo Barroso, a former HSBC anti money-laundering director, who told company officials in an exit interview that he was concerned about "allegations of 60% to 70% of laundered proceeds in Mexico" going through HSBC's affiliate.

Note: HSBC may have been founded to service the international drug trade. They eventually settled this case for $1.92 billion. The corrupt bankers were not criminally prosecuted. Settlements like this often amount to "cash for secrecy" deals that are ultimately profitable for banks. For more along these lines, see concise summaries of deeply revealing banking corruption news articles from reliable major media sources.


Bilderberg mystery: Why do people believe in cabals?
2011-06-07, BBC News
http://www.bbc.co.uk/news/magazine-13682082

The secretive Bilderberg Group ... is bringing together the world's financial and political elite this week. Conspiracy theories abound. It's only recently that the media has picked up on the Bilderbergers. Meetings are closed to the public and the media, and no press releases are issued. In the manner of a James Bond plot, up to 150 leading politicians and business people are to gather in a ski resort in Switzerland for four days of discussion about the future of the world. Meetings often feature future political leaders shortly before they become household names. Under the group's leadership of former US Secretary of State Henry Kissinger and one-time EU vice president, Viscount Davignon, the aim is purportedly to allow Western elites to share ideas. But conspiracy theorists have accused it of everything from deliberately engineering the credit crunch to planning to kill 80% of the world population. Denis Healey, co-founder of the group, told the journalist Jon Ronson in his book Them that ... "The confidentiality enabled people to speak honestly without fear of repercussions." Secret cabals extend beyond the Bilderberg Group. The Illuminati ... is alleged to be an all powerful secret society. The Freemasons [is another] secret fraternity society. The conspiracy theorists may get overexcited, but they have a point, says Prof Andrew Kakabadse. The group has genuine power that far outranks the World Economic Forum, which meets in Davos, he argues. And with no transparency, it is easy to see why people are worried about its influence. The theme at Bilderberg is to bolster a consensus around free market Western capitalism and its interests around the globe, he says. "There's a very strong move to have a One World government in the mould of free market Western capitalism."

Note: Why is there so little reporting on this influential group in the major media? Thankfully, the alternative media has had some good articles. And a Google search can be highly informative. For many other revealing news articles from major media sources on powerful secret societies, click here. And for reliable information covering the big picture of how and why these secret societies are using government-sponsored mind control programs to achieve their agenda, click here.


A Secretive Banking Elite Rules Trading in Derivatives
2010-12-12, New York Times
http://www.nytimes.com/2010/12/12/business/12advantage.html

On the third Wednesday of every month, the nine members of an elite Wall Street society gather in Midtown Manhattan. The men share a common goal: to protect the interests of big banks in the vast market for derivatives, one of the most profitable — and controversial — fields in finance. They also share a common secret: The details of their meetings, even their identities, have been strictly confidential. Drawn from giants like JPMorgan Chase, Goldman Sachs and Morgan Stanley, the bankers form a powerful committee that helps oversee trading in derivatives, instruments which, like insurance, are used to hedge risk. In theory, this group exists to safeguard the integrity of the multitrillion-dollar market. In practice, it also defends the dominance of the big banks. The banks in this group ... have fought to block other banks from entering the market, and they are also trying to thwart efforts to make full information on prices and fees freely available. Banks’ influence over this market, and over clearinghouses like the one this select group advises, has costly implications for businesses large and small. The size and reach of this market has grown rapidly over the past two decades. Pension funds today use derivatives to hedge investments. States and cities use them to try to hold down borrowing costs. Airlines use them to secure steady fuel prices. Food companies use them to lock in prices of commodities like wheat or beef.

Note: To explore highly revealing news articles on the powerful secret societies which without doubt back these top bankers, click here. For a treasure trove of reports from reliable sources detailing the amazing control of major banks over government and society, click here.


The Pope, Eichmann and the Nazi 'Ratlines'
2010-03-17, The Telegraph (One of the UK's leading newspapers)
http://blogs.telegraph.co.uk/news/juliankossoff/100030163/the-pope-eichmann-a...

Germany is fighting to keep sealed the Adolf Eichmann files detailing the years the Holocaust chief logistical organiser spent on the run before he was captured by Mossad agents. Those hoping to have a 50-year secrecy order overturned believe the government is embarrassed by details within that may prove German and Vatican officials colluded in his escape and freedom. For the current papacy under the German pope, Benedict XVI, the 4,500 page Eichmann dossier could be the ’smoking gun’ that would shoot down his plans to canonize Pope Pius XII (1939-58), aka ‘Hitler’s Pope.’ The role of Pope Pius XII during World War II, his relationship with Nazism and his efforts (or lack of them) to save Jews from the gas chambers are hotly disputed. Even within the Jewish community there are strong opinions on both sides of the debate. In fact history’s most savage mass murderers – Adolf Eichmann, Dr Josef Mengele, better known as Auschwitz’s ‘Angel of Death’, Franz Stangl, commandant of the Treblinka extermination camp – escaped justice down the ‘ratline’ that ran straight through the Vatican state in Rome. Senior members of the Roman Catholic hierarchy – marinaded in virulent Judeophobia and obsessed by Bolshevism – organised the escape of thousands of the most debauched, cruel monsters to a peaceful, prosperous retirement in Catholic South America.

Note: As mentioned by the initiator of the lawsuit to open the documents in this Associated Press story, "I think it's impossible that in Germany we are hiding documents about a convicted Nazi mass murderer today." Evidence suggests that these Nazis were purposely allowed to escape with the involvement of the Vatican, the CIA, and other groups. Josef Mengele is purported to have gone on to train the CIA in powerful mind control techniques he perfected using concentration camp inmates as guinea pigs. For more on this, click here.


Hospitalization Rates Higher in Kids Who Get Flu Shots
2009-05-19, U.S. News & World Report
http://health.usnews.com/health-news/managing-your-healthcare/research/articl...

Children who get the annual flu vaccine, especially those who have asthma, may be more likely to be hospitalized than children who don't get the shot, a new study shows. But the researcher noted ... "This may not be a reflection of the vaccine but that these patients are the sickest, and their doctors insist they get a vaccination," said study author Dr. Avni Y. Joshi, a fellow at the Mayo Clinic in Rochester, Minn. "I would be very cautious about interpreting this," said Dr. Gurjit Khurana Hershey, director of asthma research and professor of pediatrics at Cincinnati Children's Hospital. "The bottom line is that kids with asthma who get the flu vaccine are probably a different population anyway. They may be the more severely ill children, so it may have very little to do with the vaccine." The study has too many unknowns and covers too wide an age range over too many flu seasons to indicate any change in recommendations, said Dr. Hank Bernstein, a member of the committee on infectious diseases of the American Academy of Pediatrics. The authors looked back at 263 children aged 6 months to 18 years who had visited the Mayo Clinic between 1999 and 2006 with laboratory-confirmed influenza. Children -- including children who had asthma -- who received the annual inactivated flu vaccine were almost three times more likely to be hospitalized than those who were not inoculated.

Note: With hospitalization rates nearly three times that of children who did not get vaccinated, why are these doctors downplaying this study so much? Why the focus on asthma, when the study covered a wide range of children? Why isn't anyone calling for more research on these striking results? For lots of articles raising serious questions about the safety of vaccines, click here.


Tamiflu Developer: Swine Flu Could Have Come From Bio-Experiment Lab
2009-05-14, ABC News
http://abcnews.go.com/GMA/SwineFlu/story?id=7584420

An Australian researcher claims the swine flu, which has killed at least 64 people so far, might not be a mutation that occurred naturally but a man-made product of genetic experiments accidently leaked from a laboratory -- a theory the World Health Organization is taking very seriously. Adrian Gibbs, a scientist on the team that was behind the development of Tamiflu, says in a report he is submitting today that swine flu might have been created using eggs to grow viruses and make new vaccines, and could have been accidently leaked to the general public. "It might be some sort of simple error that's not being recognized," Gibbs said on ABC's "Good Morning America." In an interview with Bloomberg Television, Gibbs admitted there are other ways to explain swine flu's origin. "One of the simplest explanations if that it's a laboratory escape, but there are lots of others," he said. Regardless of the validity of Gibb's claims, he and several experts say that just bringing the idea of laboratory security to the public's attention is important. "There are lives at risk," Gibbs said. "The sooner this idea gets out, the better."

Note: What would cause one of the developers of Tamiflu to make such a statement? If you read between the lines, there is much more here than meets the eye. For lots more on this intriguing development, click here.


Concentration camp doctor tops list of wanted Nazis
2008-04-30, Boston Globe/Associated Press
http://articles.boston.com/2008-04-30/news/29272267_1_efraim-zuroff-top-nazi-...

Karl Lotter, a prisoner who worked in the hospital at Mauthausen concentration camp, had no trouble remembering the first time he watched SS doctor Aribert Heim kill a man. It was 1941, and an 18-year-old Jew had been sent to the clinic with a foot inflammation. Heim asked him about himself and why he was so fit. The young man said he had been a soccer player and swimmer. Then, instead of treating the prisoner's foot, Heim anesthetized him, cut him open, castrated him, took apart one kidney and removed the second, Lotter said. The victim's head was removed and the flesh boiled off so that Heim could keep it on display. "He needed the head because of its perfect teeth," Lotter, a non-Jewish political prisoner, recalled in testimony eight years later that was included in an Austrian warrant for Heim's arrest. But Heim managed to avoid prosecution, his American-held file in Germany mysteriously omitting his time at Mauthausen, and today he is the most wanted Nazi war criminal on a list of hundreds who the Simon Wiesenthal Center estimates are still free.

Note: As this article shows, some Nazi concentration camp doctors had virtually no moral aversion to killing and torturing any prisoner. Some of the most infamous doctors were tasked with perfecting mind control by any means. And many, like Heim, were allowed to escape. For reliable information on this, and how some of these doctors were then secretly brought to the US to train the CIA in mind control techniques, click here.


Mind Games
2007-01-14, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/01/10/AR20070110013...

A community of people who believe the government is beaming voices into their minds ... may be crazy, but the Pentagon has pursued a weapon that can do just that. An academic paper written for the Air Force in the mid-1990s mentions the idea of [such] a weapon. "The signal can be a 'message from God' that can warn the enemy of impending doom, or encourage the enemy to surrender." In 2002, the Air Force Research Laboratory patented precisely such a technology: using microwaves to send words into someone's head. The patent was based on human experimentation in October 1994 at the Air Force lab, where scientists were able to transmit phrases into the heads of human subjects, albeit with marginal intelligibility. The official U.S. Air Force position is that there are no non-thermal effects of microwaves. Yet ... the military's use of weapons that employ electromagnetic radiation to create pain is well-known. In 2001, the Pentagon declassified one element of this research: the Active Denial System, a weapon that uses electromagnetic radiation to heat skin and create an intense burning sensation. While its exact range is classified, Doug Beason, an expert in directed-energy weapons, puts it at about 700 meters, and the beam cannot penetrate a number of materials, such as aluminum. Given the history of America's clandestine research, it's reasonable to assume that if the defense establishment could develop mind-control or long-distance ray weapons, it almost certainly would. And, once developed, the possibility that they might be tested on innocent civilians could not be categorically dismissed.

Note: For lots more reliable, verifiable information on the little-known, yet critical topic of nonlethal weapons, click here. For an excellent two-page summary of government mind control programs, click here.


CIA role claim in Kennedy killing
2006-11-21, BBC News
http://news.bbc.co.uk/1/hi/programmes/newsnight/6169006.stm

New video and photographic evidence ... puts three senior CIA operatives at the scene of Robert Kennedy's assassination. It reveals that the operatives and four unidentified associates were at the Ambassador Hotel, Los Angeles in the moments before and after the shooting on 5 June, 1968. The CIA had no domestic jurisdiction and some of the officers were based in South-East Asia at the time, with no reason to be in Los Angeles. Kennedy had just won the California Democratic primary on an anti-War ticket and was set to challenge Nixon for the White House. A 24-year-old Palestinian, Sirhan Sirhan, was arrested as the lone assassin. However, even under hypnosis, he has never been able to remember the shooting and defence psychiatrists concluded he was in a trance at the time. Witnesses placed Sirhan's gun several feet in front of Kennedy but the autopsy showed the fatal shot came from one inch behind. Dr Herbert Spiegel, a world authority on hypnosis at Columbia University, believes Sirhan may have been hypnotically programmed to act as a decoy for the real assassin. Three of these men have been positively identified as senior officers who worked together in 1963 at JMWAVE, the CIA's Miami base. David Morales was Chief of Operations and once told friends: "I was in Dallas when we got the son of a bitch and I was in Los Angeles when we got the little bastard." George Joannides was Chief of Psychological Warfare Operations. Now, we see him at the Ambassador Hotel the night a second Kennedy is assassinated.

Note: There is ample evidence that Sirhan Sirhan was a programmed Manchurian Candidate. Declassified CIA documents show that U.S. intelligence services were creating programmed assassins back as early as the 1950s. For reliable, verifiable information on this key topic, click here.


Enron Schemes Caught On Tape
2005-02-03, CBS News
http://www.cbsnews.com/stories/2005/02/03/eveningnews/main671618.shtml

During the West Coast Power crisis homes went dark and streetlights were out ... causing injuries and accidents. But the danger didn't stop Enron's energy traders from having a good laugh. CBS ... reports on the Enron scheme, as caught on new audio tape. The traders and plant operator laugh and plot in a display that seems to prove the theory that years before the energy crisis, Enron manipulated markets. "They had to do a rolling blackout through the town and there was a red light there he didn't see," one Enron trader says on tape. "That's beautiful," a second voice responds. Enron secretly shut power plants down so they could cause, and then cash in on, the crisis. Enron also pulled power out of states like California, causing emergency conditions to worsen. "Sorry California," an Enron trader says. "I'm bringing all our power out of state today." Plant operators were coached on how to lie to officials. "We want you guys to get a little creative..." one voice says on the tape, "and come up with a reason to go down. Just call 'em, Hey guys…we're coming down." The plant operator replies, "OK, so we're just comin' down for some maintenance?" "Right," the trader says. "And that's cool?" the plant operator asks. "Hopefully," the trader responds, to which the men are heard laughing. Enron also pulled power out of states like California, causing emergency conditions to worsen. The "shut downs" and "pull outs" triggered sky high power prices. "We're just making money hand over fist!" one voice is heard saying on the tape. And when states complained, the guys at Enron seemed to have a response. "Get a f****** clue," one says. "Yeah," another chimes in. "Leave us alone. Let us make a little bit of money."

Note: For an eye-opening two-minute video clip on CBS, watch "Enron Schemers on Tape" at this link. MSNBC also published a revealing article on this. And a New York Times article states "Company officials had long denied that they illegally shut down plants to create artificial shortages. Two months after the recording showed how the Nevada plant was shut down, [Enron CEO Kenneth] Lay called any claims of market manipulation 'conspiracy theories.'" For lots more reliable information on the energy cover-up, click here.


Of Mice, Men and In-Between
2004-11-20, Washington Post
http://www.washingtonpost.com/wp-dyn/articles/A63731-2004Nov19.html

In Minnesota, pigs are being born with human blood in their veins. In Nevada, there are sheep whose livers and hearts are largely human. In California, mice peer from their cages with human brain cells firing inside their skulls. Biologists call these hybrid animals chimeras, after the mythical Greek creature with a lion's head, a goat's body and a serpent's tail. Chimeras are allowing scientists to watch, for the first time, how nascent human cells and organs mature and interact ... inside the bodies of living creatures. But with no federal guidelines in place ... how human must a chimera be before more stringent research rules should kick in? Chimerism becomes a more sensitive topic when it involves growing entire human organs inside animals. And it becomes especially sensitive when it deals in brain cells. Imagine, said Robert Streiffer, a professor of philosophy and bioethics at the University of Wisconsin, a human-chimpanzee chimera endowed with speech ... what some have called a "humanzee." Perhaps the most ambitious efforts to make use of chimeras come from Irving Weissman, director of Stanford University's Institute of Cancer/Stem Cell Biology and Medicine. Weissman helped make the first mouse with a nearly complete human immune system. More recently his team injected human neural stem cells into mouse fetuses, creating mice whose brains are about 1 percent human. Now Weissman says he is thinking about making chimeric mice whose brains are 100 percent human.

Note: If the above link fails, click here.


Brainwash victims win cash claims
2004-10-17, Times of London
http://www.thesundaytimes.co.uk/sto/news/uk_news/article242309.ece

Hundreds of mentally ill patients who were subjected to barbaric CIA-funded brainwashing experiments ... could be entitled to compensation following a landmark court ruling. Doctor Ewan Cameron, who became one of the world’s leading psychiatrists, developed techniques used by Nazi scientists to wipe out the existing personalities of people in his care. Cameron ... was recruited by the CIA during the cold war while working at McGill University in Montreal, Canada. He carried out mind-control experiments using drugs such as LSD on hundreds of patients, but only 77 of them were awarded compensation. Now a landmark ruling by a Federal Court judge in Montreal will allow more than 250 former patients, whose claims were rejected, to seek compensation. Last week, Alan Stein, of Montreal law firm Stein and Stein ... confirmed he was in the process of contacting former clients who could now renew their appeal. “There are about 200 people still due compensation,” he said. Using techniques similar to those portrayed in the celebrated novel the Manchurian Candidate, it was believed that people could be brainwashed and reprogrammed to carry out specific acts. Cameron developed a range of depatterning “treatments”. Patients were woken from drug-induced stupors two or three times a day for multiple electric shocks. In a specially designed “sleep room” made famous by Anne Collins’s book of the same name, Cameron placed a speaker under the patient’s pillow and relayed negative messages for 16 hours a day. Cameron ... rose to become the first president of the World Psychiatric Association.

Note: If the above link does not work, click here. Dr. Cameron was once President of the American and World Psychiatric Associations. For more on the severe abuses of doctors in serving the CIA's mind control programs, click here. This article clearly shows that the Manchurian candidate (programmed assassin) is not just fiction. For a powerful two-page summary of 18,000 pages of declassified CIA documents on this disturbing mind control program, click here. Links to view the original top secret documents are included.


Transcript: Rice's Testimony on 9/11 (for 9/11 Commissioner Lehman)
2004-04-08, Washington Post
http://www.washingtonpost.com/wp-dyn/articles/A61252-2004Apr8_4.html

LEHMAN. Were you told that there were numerous young Arab males in flight training? RICE. I was not. LEHMAN. Were you told that the red team in F.A.A. for 10 years had reported ... that the U.S. airport security system never got higher than 20 percent effective. RICE. To the best of my recollection I was not told that. LEHMAN. Were you aware that I.N.S. had quietly internally halved its internal security enforcement budget? RICE. I was not made aware of that. LEHMAN. Were you aware that it was the U.S. government established policy not to question or oppose the sanctuary policies [which] prohibited the local police from cooperating at all with federal immigration authorities? RICE. I do not believe I was aware of that. LEHMAN. Were you aware of a program that was well established that allowed Saudi citizens to get visas without interviews? RICE. I learned of that after 9/11. LEHMAN. Were you aware of the extensive activities [of] the Saudi government in supporting over 300 radical teaching schools and mosques around the country, including right here in the United States? Were you aware at the time of the fact that Saudi Arabia ... had in their custody the C.F.O. [Chief Financial Officer] and the closest confidante of Al Qaeda, of Osama bin Laden, and that they refused direct access to the United States? RICE. I don't remember anything of that kind. LEHMAN. Were you aware that they would not cooperate and give us access to the perpetrators of the Cobar Towers attack? RICE. I was very involved in issues concerning Cobar Towers. LEHMAN. Were you aware that it was the policy of the Justice Department ... to fine airlines if they have more than two young Arab males in secondary questioning? RICE. No.

Note: Don't miss the full revealing transcript at the link above. Most of the quotes above are towards the bottom of the webpage. Why didn't we hear lots more about these astounding facts put forward by one of the 9/11 commissioners, yet hardly mentioned in the final report? For lots more, click here.


Federal agency planned plane-crashing-into-building drill [on] Sept. 11
2002-08-22, USA Today/Associated Press
http://www.usatoday.com/news/nation/2002-08-22-sept-11-plane-drill-_x.htm

In what the government describes as a bizarre coincidence, one U.S. intelligence agency was planning an exercise last Sept. 11 in which an errant aircraft would crash into one of its buildings. But the cause wasn't terrorism — it was to be a simulated accident. Officials at the Chantilly, Va.-based National Reconnaissance Office had scheduled an exercise that morning in which a small corporate jet would crash into one of the four towers at the agency's headquarters building. The agency is about four miles from the runways of Washington Dulles International Airport. "It was just an incredible coincidence that this happened to involve an aircraft crashing into our facility," [NRO spokesman Art] Haubold said. "As soon as the real world events began, we canceled the exercise." Adding to the coincidence, American Airlines Flight 77 — the Boeing 767 that was hijacked and crashed into the Pentagon — took off from Dulles at 8:10 a.m. on Sept. 11, 50 minutes before the exercise was to begin. It struck the Pentagon around 9:40 a.m., killing 64 aboard the plane and 125 on the ground. The National Reconnaissance Office operates many of the nation's spy satellites. It draws its personnel from the military and the CIA. In a promotion for speaker John Fulton, a CIA officer assigned as chief of NRO's strategic gaming division, the announcement says, "On the morning of September 11th 2001, Mr. Fulton and his team ... were running a pre-planned simulation to explore the emergency response issues that would be created if a plane were to strike a building."

Note: For many more disturbing coincindences and outright cover-ups around 9/11, click here. And for yet another amazing "coincidence" surrounding the London bombings, click here.


Tsunami bomb - NZ's devastating war secret
1999-09-25, New Zealand Herald (New Zealand's leading newspaper)
http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=14727

Top-secret wartime experiments were conducted off the coast of Auckland to perfect a tidal wave bomb, declassified files reveal. United States defence chiefs said that if the project had been completed before the end of the war it could have played a role as effective as that of the atom bomb. Details of the tsunami bomb, known as Project Seal, are contained in 53-year-old documents released by the Ministry of Foreign Affairs and Trade. Papers stamped "top secret" show the US and British military were eager for Seal to be developed in the post-war years too. The experiments involved laying a pattern of explosives underwater to create a tsunami. It is unclear what happened to Project Seal once the final report was forwarded to Wellington Defence Headquarters late in the 1940s. The bomb was never tested on a full scale. "Whether it could ever be resurrected ... Under some circumstances I think it could be devastating."


Homosexual prostitution inquiry ensnares VIPs with Reagan, Bush
1989-06-29, Washington Times
http://www.WantToKnow.info/890629washingtontimesfranklin

A homosexual prostitution ring is under investigation by federal and District authorities and includes among its clients key officials of the Reagan and Bush administrations, military officers, congressional aides and US and foreign businessmen with close social ties to Washington's political elite. Reporters for this newspaper examined hundreds of credit-card vouchers, drawn on both corporate and personal cards and made payable to the escort service operated by the homosexual ring. Among clients who charged homosexual prostitutes services on major credit cards over the past 18 months are Charles K. Dutcher, former associate director of presidential personnel in the Reagan administration, and Paul R. Balach, Labor Secretary Elizabeth Dole’s political personnel liaison to the White House. Members of major news organizations also procured escort services from the ring, credit card documents show. These include Stanley Mark Tapscott, who was an assistant managing editor of The Washington Times. Before joining The Times, Mr. Tapscott worked for the Office of Personnel Management in the Reagan administration. A major concern, said the former official with longtime ties to top-ranking military intelligence officers, was that hostile foreign intelligence services were using young male prostitutes to compromise top administration homosexuals, thus making them subject to blackmail.

Note: How is it possible that this major story was not covered by any major media other than the Washington Times? For answers to this question, click here. For more on this astonishing case, don't miss the excellent, reliable resources and the powerful, suppressed Discovery Channel documentary available here. For an insider's story of how prostitution was regularly used to compromise politicians, click here.


80 Institutions Used in C.I.A. Mind Studies
1977-08-04, New York Times
http://select.nytimes.com/gst/abstract.html?res=F20D15F63A5B167493C6A91783D85...

Adm. Stansfield Turner, the Director of Central Intelligence, testified today that the C.I.A. had secretly supported human behavior control research at 80 institutions, including 44 colleges or universities as well as hospitals, prisons and pharmaceutical companies. He said that the main action years of MK-Ultra were from 1953 through 1963. The projects, he said, had included tests of LSD and of a "K," or "knockout drop." The agency had supported 185 nongovernment researchers in 149 separate research projects. Admiral Turner said that ... 8,000 pages of newly discovered documents do not contain the names of the subjects of the tests but do contain "leads" that might enable them to be found. Admiral Turner acknowledged under questioning that the C.I.A. had apparently planned to test drugs on terminal cancer patients at the same institution where it secretly contributed $375,000 toward the construction of a hospital building. The New York Times has independently confirmed the institution is Georgetown University Medical School here. Admiral Turner [also] said that "some unwitting testing took place on criminal sexual psychopaths confined at a state hospital." At the two-hour hearing today, Senator Kennedy, a Massachusetts Democrat, pressed Admiral Turner to let the universities, researchers and possible subjects of the tests know of the C.I.A.'s involvement. "These individuals have a right to know who they are and why they were used," he said.

Note: If the above link fails, click here. For lots more reliable, verifiable information suggesting a major cover-up of government mind control programs, click here.


'Matador' With a Radio Stops Wired Bull
1965-05-17, New York Times
http://select.nytimes.com/gst/abstract.html?res=F20817F9395812738DDDAE0994DD4...

The brave bull bore down on the unarmed "matador" — a scientist who had never faced a fighting bull. But the charging animal's horns never reached the man behind the heavy red cape. Moments before that could happen, Dr. Jose M. R. Delgado, the scientist, pressed a button on a small radio transmitter in his hand, and the bull braked to a halt. Then, he pressed another button on the transmitter and the bull obediently turned to the right and trotted away. The bull was obeying commands from his brain that had been called forth by electrical stimulation—by the radio signals—of certain regions in which fine wire electrodes had been painlessly implanted the day before. [Experiments] have shown, he explained, that "functions traditionally related to the psyche, such as friendliness, pleasure or verbal expression, can be induced, modified and inhibited by direct electrical stimulation of the brain." For example, he has been able to "play" monkeys and cats 'like little electronic toys" that yawn, hide, fight, play, mate and go to sleep on command. With humans under treatment for epilepsy, he has increased word output sixfold in one person, has produced severe anxiety in another, and in several others has induced feelings of profound friendliness—all by electrical stimulation of various specific regions of their brains. "I do not know why more work of this sort isn't done," he remarked recently, "because it is so economical and easy." Monkeys will learn to press a button that sends a stimulus to the brain of an enraged member of the colony and calms it down, indicating that animals can be taught to control one another's behavior.

Note: If the above link fails, click here. This article shows mind control was being developed over 50 years ago. Though this technology can be used for good purposes, it also can and secretly has been used to manipulate and control for many years. For lots of information based on released CIA documents on how mind control has been secretly used for decades to affect both individual behavior and global politics, click here and here.


Western Europe: New Elan in an Old Clan
1963-12-20, Time Magazine
http://www.time.com/time/magazine/article/0,9171,938990,00.html

For seven generations, one European family has dominated an incredible part of all that money can buy. From its London and Paris banks, the family's millions have been sent forth to ... business enterprises on six continents. Some of its stately dwellings are the kind of mansions that mere San Simeons hoped to imitate. This ancient and unusual banking dynasty shields itself from the curious eye of the public, but the map and history of Europe have been changed by its action and etched with its name: the House of Rothschild. Seldom unimaginative in the use of their money, Rothschild gold has powered the ambitions of prime ministers, princes and popes. It has financed wars and reparations treaties, changed the course of politics and bailed out armies and nations. The Rothschilds strung railroads across the Continent, gained control of the Suez Canal [and] carved diamond mines in the African veld. The British Rothschilds [are still] the world's most important bullion dealers. No modern family ... has been so important for so long in European business. Newer dynasties such as the Rockefellers and the Fords have made more millions, but ... ledgers cannot reflect the Rothschild lands, their possessions and influence accumulated over the generations, their priceless collections of art. Today, the legend is very much alive—and being added to. The Rothschilds are striking out in many new directions behind a silver curtain of discretion. Rather than run companies by themselves, the Rothschilds often prefer to start or join syndicates, placing their men on boards to exert maximum influence with minimum investment risk. [They rely on] a far spreading network of agents, who seldom even admit that they are employed by the Rothschilds.

Note: To read the full, fascinating article, click here. The major media have very rarely exposed the power and wealth of the Rothschilds as in this article. Note that the article was written less than a month after the assassination of John F. Kennedy. Could it be because of some anger at the elite who killed Kennedy that this highly revealing article was actually published? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.


Air Force Order on Saucers Cited
1960-02-28, New York Times
http://select.nytimes.com/gst/abstract.html?res=F50A12F9345D1A728DDDA10A94DA4...

The Air Force has sent its commands a warning to treat sightings of unidentified flying objects as "serious business" directly related to the nation's defense, it was learned today. An Air Force spokesman confirmed issuance of the directive after portions of it were made public by a private “flying saucer” group. The new regulations were issued by the Air Force inspector general Dec. 24. Existence of the document was revealed by the National Investigations Committee on Aerial Phenomena [NICAP]. The privately financed committee accused the Air Force of deception in publicly describing reports of unidentified flying objects as delusions and hoaxes while sending the private admonition to its commands. Vice Admiral R. H. Hillenkoetter (Ret.), a committee board member and former director of the Central Intelligence Agency, said ... "It is time for the truth to be brought out in open Congressional hearings. Behind the scenes, high-ranking Air Force officers are soberly concerned about the UFOs. But through official secrecy and ridicule, many citizens are led to believe the unknown flying objects are nonsense," the retired admiral said. He charged that "to hide the facts, the Air Force has silenced its personnel.

Note: If the above link fails, click here for a free copy of this article. Why would a former head of the CIA be claiming that Air Force officers are "soberly concerned" about UFOs? For an abundance of reliable, verifiable information on this major cover-up, click here


Declassified Memorandum to FBI Director: Flying Saucers
1950-03-22, Website of FBI
http://vault.fbi.gov/hottel_guy/Guy%20Hottel%20Part%201%20of%201/view

An investigator for the Air Forces stated that three so-called flying saucers had been recovered in New Mexico. They were described as being circular in shape with raised centers, approximately 50 feet in diameter. Each one was occupied by three bodies of human shape but only three feet tall, dressed in metallic cloth of a very fine texture. Each body was bandaged in a manner similar to the blackout suits used by speed fliers and test pilots. The saucers were found in New Mexico due to the fact that the Government has a very high powered radar set-up in that area and it is believed the radar interferes with the controlling mechanism of the saucers.

Note: Download this amazing document and view it on our website at this link. For an ABC news article discussing this, click here. Another FBI document shows FBI chief J. Edgar Hoover wanted "full access to discs recovered" at Roswell. For numerous highly revealing major media reports presenting strong evidence on UFOs, click here. For other reliable and inspiring information on this topic, visit our UFO Information Center.


Is It a Crime to Avoid Vaccines? People Who Refuse Are Being Punished With Jail and Job Loss
2017-12-05, Newsweek
http://www.newsweek.com/sending-parents-jail-refusing-vaccinate-doesnt-work-s...

Don’t want to get a vaccine for yourself or your child? Prepare to face the consequences. In the last month, a Detroit mother went to jail because she refused to vaccinate her child. Fifty people lost their jobs at a group of Midwestern hospitals and clinics because they declined a flu shot. And an Oregon university has blocked students from registering for classes unless they have a meningitis shot. All states have some vaccine requirements for public education—no shots, no school. All but three states - Mississippi, West Virginia and California - allow parents to send their child to school without vaccines based on some kind of non-medical exemption. In 2013, more than 90 percent of American children had been vaccinated for chicken pox, hepatitis B, measles, mumps and rubella, according to the Centers for Disease Control and Prevention. However, a significant number of people ... hesitate when a doctor offers them a vaccine. A new study released on Monday found that 27 percent of the parents surveyed could be classified as moderately or highly hesitant around vaccines. That same study found these people may be particularly concerned with the purity of vaccines. Increasingly, parents who choose not to vaccinate are warned of harsh penalties. People who choose not to vaccinate themselves may also face serious consequences. Some states have laws guiding which vaccinations people working at hospitals or other health care facilities must have; more often, requirements may be enshrined in a facility's policy, not in law.

Note: For more along these lines, see concise summaries of deeply revealing vaccine controversy news articles from reliable major media sources.


‘Human sacrifice’ staged at Cern, home of the God Particle
2016-08-18, The Independent (One of the UK's leading newspapers)
http://www.independent.co.uk/news/science/cern-human-sacrifice-video-watch-ha...

A human sacrifice has been staged in the grounds of the European Organisation for Nuclear Research, the home of the God Particle. A video circulating online shows hooded figures apparently engaging in a ritual, staged under a huge statue of a Hindu deity, at the end of which a woman is stabbed. The footage appears to have been recorded as part of a prank by scientists at Europe’s top physics lab, which serves as the home of the Large Hadron Collider. The identity and motives of those behind the video hasn’t yet been discovered. In the footage itself, multiple people are shown wearing long, flowing black robes – and one appears to have hiking boots on underneath. They are depicted walking around, before a woman moves onto the floor and is apparently stabbed. As that happens, the person who is supposedly recording the video appears to react – firing out expletives and apparently running away, which causes the camera to move away from the scene before it is cut off. A Cern spokesperson confirmed that the video had been filmed there, but said that it had been made without permission or knowledge. It’s far from the first time that scientific work has been associated with the occult or the mystical. Because of the highly-specialised – and often terrifying – work that goes on at Cern, it has become a haven of speculation.

Note: Was this sacrifice really faked? Watch the one-minute video available here. The opening of the huge Gotthard tunnel with its most bizarre, occult opening ceremony (as reported by BBC), occurred not long before this ritual. Watch a video filled with intriguing speculation on this and more. And to dive even deeper into what's going on with occult sacrifice, read this important article.


U.S. threatened massive fine to force Yahoo to release data
2014-09-11, Washington Post
http://www.washingtonpost.com/business/technology/us-threatened-massive-fine-...

The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


The US government can brand you a terrorist based on a Facebook post
2014-08-30, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2014/aug/30/terrorist-watch-list-rul...

The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.

Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.


Racy Photos Were Often Shared at N.S.A., Snowden Says
2014-07-21, New York Times
http://www.nytimes.com/2014/07/21/us/politics/edward-snowden-at-nsa-sexually-...

The former National Security Agency contractor Edward J. Snowden said in a wide-ranging interview ... that the oversight of surveillance programs was so weak that members of the United States military working at the spy agency sometimes shared sexually explicit photos they intercepted. He also said the British government often pioneered the most invasive surveillance programs because its intelligence services operate with fewer restrictions intended to protect individual privacy than its counterparts in the United States and other allies. “In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive,” he said. “So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: ‘Oh, hey, that’s great. Send that to Bill down the way.’ ” Mr. Snowden said that type of sharing ... was “seen as the fringe benefits of surveillance positions.” He said that this was never reported and that the system for auditing surveillance programs was “incredibly weak.” Mr. Snowden had particularly stark criticism for the British government’s surveillance programs, because in Britain the respect for individual privacy, he said, “is not strongly encoded in law or policy.” Because it has fewer restrictions, British intelligence platforms “are used as a testing ground” for programs of all five intelligence partners, a group referred to as “Five Eyes,” which includes Britain, Canada, Australia, New Zealand and the United States.”

Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


N.S.A. Able to Foil Basic Safeguards of Privacy on Web
2013-09-06, New York Times
http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show. Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth. The agency ... deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products [called "backdoors"].

Note: For an excellent article in the UK's respected Guardian on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.


1.6 Billion Rounds Of Ammo For Homeland Security? It's Time For A National Conversation
2013-03-11, Forbes
http://www.forbes.com/sites/ralphbenko/2013/03/11/1-6-billion-rounds-of-ammo-...

The Denver Post, on February 15th, ran an Associated Press article entitled "Homeland Security aims to buy 1.6b rounds of ammo". It confirmed that the Department of Homeland Security has issued an open purchase order for 1.6 billion rounds of ammunition. Some of this purchase order is for hollow-point rounds, forbidden by international law for use in war, along with a frightening amount specialized for snipers. Also reported elsewhere, at the height of the Iraq War the Army was expending less than 6 million rounds a month. Therefore 1.6 billion rounds would be enough to sustain a hot war for 20+ years. DHS now is [also] showing off its acquisition of heavily armored personnel carriers, repatriated from the Iraqi and Afghani theaters of operation. The Department of Homeland Security is apparently taking delivery (apparently through the Marine Corps Systems Command, Quantico VA, via the manufacturer – Navistar Defense LLC) of an undetermined number of [recently retrofitted] ‘Mine Resistant Protected’ MaxxPro MRAP vehicles for service on the streets of the United States.” Why would they need such over-the-top vehicles on U.S. streets to withstand IEDs, mine blasts, and 50 caliber hits to bullet-proof glass? In a war zone… yes, definitely. [But] on the streets of America?

Note: For a U.S. Army field manual titled "Internment and Resettlement Operations" (FM 3-39.40) describing how large numbers of American citizens could be sent to internment camps if involved in "terrorist" activities, click here. The introduction to this document states, "Commanders will use technology and conduct police intelligence operations to influence and control populations, evacuate detainees and, conclusively, transition rehabilitative and reconciliation operations to other functional agencies." For a disturbing report on the massive expansion of drones over US skies, click here.


The medieval, unaccountable Corporation of London is ripe for protest
2011-10-31, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2011/oct/31/corporation-london-city-m...

It's the dark heart of Britain, the place where democracy goes to die, immensely powerful, equally unaccountable. But I doubt that one in 10 British people has any idea of what the Corporation of the City of London is and how it works. As Nicholas Shaxson explains in his fascinating book Treasure Islands, the Corporation exists outside many of the laws and democratic controls which govern the rest of the United Kingdom. The City of London is the only part of Britain over which parliament has no authority. This is ... an official old boys' network. In one respect at least the Corporation acts as the superior body: it imposes on the House of Commons a figure called the remembrancer: an official lobbyist who sits behind the Speaker's chair and ensures that, whatever our elected representatives might think, the City's rights and privileges are protected. The mayor of London's mandate stops at the boundaries of the Square Mile. The City has exploited this remarkable position to establish itself as a kind of offshore state, a secrecy jurisdiction which controls the network of tax havens housed in the UK's crown dependencies and overseas territories. This autonomous state within our borders is in a position to launder the ill-gotten cash of oligarchs, kleptocrats, gangsters and drug barons. It has also made the effective regulation of global finance almost impossible.

Note: To understand how democracy is easily circumvented, read this full article. For lots more from reliable sources on the hidden background to the control over governments held by financial powers, click here.


Battle Over the Bailout
2010-02-14, New York Times
http://www.nytimes.com/2010/02/14/nyregion/14fed.html

Mark Pittman, an investigative reporter for Bloomberg News ... filed a Freedom of Information Act request with the Federal Reserve Board, seeking the details of its unprecedented efforts to funnel money to the collapsing banks of Wall Street. That was in September 2008. Just more than a year later, Mr. Pittman ... died unexpectedly at age 52. But his cause has persevered. It is now known as Bloomberg L.P. v. Board of Governors of the Federal Reserve, an attempt to unlock the vault of the largest Wall Street rescue plan in decades — or, as the legal briefs put it, to “break down a wall of secrecy” that the Fed has kept in place for nearly two years in its “controversial use of public money to prop up financial institutions.” The Federal Reserve has wrapped itself in secrecy since the turn of the 20th century, when a select group of financiers met at the private Jekyll Island Club off the eastern coast of Georgia and, forgoing last names to preserve their anonymity among the staff, drafted legislation to create a central bank. Its secrecy, of course, persists today, with Ben S. Bernanke, the Federal Reserve chairman, refusing to tell even Congress which banks received government money under the bailout. There is also a heated battle to force the Fed to disclose its role in the controversial attempt to save the insurance giant American International Group.

Note: Isn't it interesting that Pittman died at age 52 while trying to expose manipulations of the big bankers? For a one-minute video proving the existence of a secret weapon which can cause an undetectable heart attack, click here. For a concise, excellent background on the hidden role of the Federal Reserve, click here.


US aid tied to purchase of arms
2010-01-02, Sydney Mountain Herald
http://www.smh.com.au/world/us-aid-tied-to-purchase-of-arms-20100101-llsb.html

Just before Christmas, the US President, Barack Obama, signed into law one of his country's biggest aid pledges of the year. It was bound not for Africa or any of the many struggling countries on the World Bank's list. It was a deal for $US2.77 billion ($3 billion) to go to Israel in 2010 and a total of $US30 billion over the next decade. Israel is bound by the agreement to use 75 per cent of the aid to buy military hardware made in the US. For the first time the US is also providing $US500 million to the Palestinian Authority, including $US100 million to train security forces, under the strict proviso that the authority's leadership recognises Israel. For many years Israel has been the largest recipient of US foreign aid, followed by Egypt ($US1.75 billion), which also receives most of its assistance in tied military aid. The Congressional Research Service says that the US spent 17 per cent of its total aid budget - or $US5.1 billion - on military aid in 2008, of which $US4.7 billion was grants to enable governments to receive equipment from the US.

Note: Israel's population is 7.5 million. If you do the math, the US is providing the equivalent of $4,000 in aid to every man, woman and child in Israel over the next decade, with $3,000 of that to buy US military hardware. For lots more on government-facilitated profiteering in the arms industry, click here and here.


G30, Ripe for Conspiracy Theorists
2009-12-04, Wall Street Journal blog
http://blogs.wsj.com/economics/2009/12/04/g30-ripe-for-conspiracy-theorists

If you want to encourage the kind of conspiracy theories that have prospered in the wake of last year’s financial crisis — those that describe a secret cabal of elites running the world — try doing the following: Have a group of 30 high-powered economists, government officials and bankers meet under the auspices of an international group that shares ideas on how to run the global financial architecture. Have your Board of Trustees led by an influential former Federal Reserve chairman who’s now working as a senior advisor to the president of the United States. Name the former vice chairman of bailout behemoth AIG as the group’s Chairman and CEO (It helps that he [is] former governor of the Bank of Israel). Ensure that membership includes the likes of these: A former Treasury Secretary and president of Harvard who also now works as a top presidential economic advisor; Citigroup’s senior vice chairman; a former IMF deputy managing director and the current governor of the Bank of Israel; and top representatives of the world’s four most important central banks. Hold two days of closed-door meetings at the New York Fed. Do not publicize a list of attendees and leave everyone guessing about the agenda. These were the circumstances surrounding Friday’s start to the 62nd plenary meetings of the Group of 30, whose formal name is “The Consultative Group on International Economic and Monetary Affairs, Inc.”

Note: The article interestingly then goes on to claim that this secret meeting of the world's top bankers is not really anything to worry about, that they are really working for the public good. If so, why not have the meeting open and widely covered by the press? For many other revealing articles from major media reports on secret societies and secret meetings of the most rich and powerful people in our world, click here.


State to 'spy' on every phone call, email and web search
2009-11-10, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/news/newstopics/politics/lawandorder/6534319/State...

Every phone call, text message, email and website visit made by private citizens is to be stored for a year and will be available for monitoring by government bodies. All telecoms companies and internet service providers will be required by law to keep a record of every customer’s personal communications, showing who they have contacted, when and where, as well as the websites they have visited. Despite widespread opposition to the increasing amount of surveillance in Britain, 653 public bodies will be given access to the information, including police, local councils, the Financial Services Authority, the ambulance service, fire authorities and even prison governors. They will not require the permission of a judge or a magistrate to obtain the information, but simply the authorisation of a senior police officer or the equivalent of a deputy head of department at a local authority. The Government announced yesterday it was pressing ahead with privately held “Big Brother” databases that opposition leaders said amounted to “state-spying” and a form of “covert surveillance” on the public. It is doing so despite its own consultation showing that it has little public support. The new rules ... will not only force communications companies to keep their records for longer, but to expand the type of data they keep to include details of every website their customers visit.

Note: For many more reports from major media sources on the disturbing trend toward increasing government and corporate surveillance and loss of privacy, click here.


How Goldman secretly bet on the housing crash
2009-11-01, Kansas City Star/McClatchy Newspapers
http://www.kansascity.com/437/story/1542453.html

In 2006 and 2007, Goldman Sachs Group peddled more than $40 billion in securities backed by at least 200,000 risky home mortgages, but never told the buyers it was secretly betting that a sharp drop in U.S. housing prices would send the value of those securities plummeting. Goldman's sales and its clandestine wagers, completed at the brink of the housing market meltdown, enabled one of the nation's premier investment banks to pass most of its potential losses to others before a flood of mortgage loan defaults staggered the U.S. and global economies. Only later did investors discover that what Goldman promoted as triple-A investments were closer to junk. Now, pension funds, insurance companies, labor unions and foreign financial institutions that bought those dicey mortgage securities are facing large losses, and a five-month McClatchy Newspapers investigation has found that Goldman's failure to disclose that it made secret, exotic bets on an imminent housing crash may have violated securities laws. "The Securities and Exchange Commission should be very interested in any financial company that secretly decides a financial product is a loser and then goes out and actively markets that product or very similar products to unsuspecting customers without disclosing its true opinion," said Laurence Kotlikoff, a Boston University economics professor who's proposed a massive overhaul of the nation's big banks. "This is fraud and should be prosecuted."

Note: For an eye-opening, powerful PBS video which reveals how the economic crisis was conscously allowed to happen, click here. It reveals that Fed chairman Alan Greenspan was against investigating any fraud. For many reports from reliable sources on corruption at the core of the Wall Street collapse and bailout, click here.


Material missing from Oklahoma bombing tapes, lawyer says
2009-09-27, USA Today/Associated Press
http://www.usatoday.com/news/nation/2009-09-27-okla-city-bombing-tapes_N.htm

Long-secret security tapes showing the chaos immediately after the 1995 bombing of the Oklahoma City federal building are blank in the minutes before the blast and appear to have been edited, an attorney who obtained the recordings said Sunday. "The real story is what's missing," said Jesse Trentadue, a Salt Lake City attorney who obtained the recordings through the federal Freedom of Information Act as part of an unofficial inquiry he is conducting into the April 19, 1995, bombing that killed 168 people and injured hundreds more. The tapes turned over by the FBI came from security cameras various companies had mounted outside office buildings near the Alfred P. Murrah Federal Building. They are blank at points before 9:02 a.m., when a truck bomb carrying a 4,000-pound fertilizer-and-fuel-oil bomb detonated in front of the building, Trentadue said. "Four cameras in four different locations going blank at basically the same time on the morning of April 19, 1995. There ain't no such thing as a coincidence," Trentadue said. He said government officials claim the security cameras did not record the minutes before the bombing because "they had run out of tape" or "the tape was being replaced." "The absence of footage from these crucial time intervals is evidence that there is something there that the FBI doesn't want anybody to see." Trentadue said he is seeking more tapes along with a variety of bombing-related documents from the FBI and the CIA. An FOIA request by Trentadue for 26 CIA documents was rejected in June. A letter from the National Geospatial-Intelligence Agency, which reviewed the documents, said their release "could cause grave damage to our national security."

Note: This revealing article also tells how Trentadue's brother was murdered by FBI agents who mistakenly thought his brother was the bomber. For more valuable information on this and other evidence challenging the official story of the Oklahoma City bombing, click here.


Pakistani Prime Minister Benazir Bhutto: Osama bin Laden is Dead
2007-11-02, BBC News
http://news.bbc.co.uk/player/nol/newsid_7070000/newsid_7075800/7075843.stm

David Frost: Does anyone know exactly who was responsible for this assassination attempt? There is one report that said that you arranged to send President Musharraf a letter ... in the event of your death by assassination, urging him to investigate certain individuals in his government. Is that true? Benazir Bhutto: Yes it is true that I wrote to General Musharraf. I feel these are the forces that really want to stop not just me, but the democratic process and the will of the people [from] triumphing. David Frost: In terms of these three people you mentioned where they members of or associated with the government? Benazir Bhutto: One of them is a very key figure in security. He is a former military officer. He is someone who has had dealings with Jaish-e-Mohammad, one of the band [of] groups of Maulana Masood Azhar, who was in an Indian jail for decapitating three British tourists and three American tourists. And he also had dealings with Omar Shiekh, who murdered Osama bin Laden.

Note: The key statement on bin Laden's murder happens at minute five in the video at the above link. If the link fails, click here. For a Jan. 9, 2010 BBC article also suggesting bin Laden may already have been dead years earlier and that his death had been covered up, click here. Bhutto was assassinated not long after this interview on Dec. 27, 2007.


The White House Coup
2007-07-23, BBC Radio
http://www.bbc.co.uk/radio4/history/document/document_20070723.shtml

[BBC Radio] uncovers details of a planned coup in the USA in 1933 by right-wing American businessmen. The coup was aimed at toppling President Franklin D Roosevelt with the help of half-a-million war veterans. The plotters, who were alleged to involve some of the most famous families in America (owners of Heinz, Birds Eye, Goodtea, Maxwell [House] and George Bush’s grandfather, Prescott [Bush]) believed that their country should adopt the policies of Hitler and Mussolini to beat the great depression. Why [is] so little ... known about this biggest ever peacetime threat to American democracy?

Note: The highly decorated General Smedley Butler, author of the landmark book War is a Racket, was approached by the plotters for assistance in carrying out this coup. He at first played along, but then eventually exposed the coup plot in Congressional testimony. Yet news of this huge plot was squelched by both the government and media. To understand why, read a two-page summary of General Butler's book by clicking here and listen to the gripping, 30-minute BBC broadcast at the link above.


Fiscal mess awaits new defense chief: 'Worst-managed' federal agency
2006-12-13, San Francisco Chronicle (San Francisco's leading newspaper)
http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/12/13/MNG96MUHPF1.DTL

Robert Gates will face ... the enormous task of cleaning up the Pentagon's tangled finances, which outside auditors lambaste as so chaotic that no one knows how much money is being spent on defense at any given time. The White House's Office of Management and Budget believes the Pentagon's financial management systems are in such a mess "that independent auditors still cannot certify the accuracy of the financial statements." David Walker, the U.S. Comptroller General, issued a devastating assessment of the Pentagon's finances, which include an annual budget of over $500 billion. The Pentagon's financial problems "are pervasive, complex, long-standing and deeply rooted in virtually all business operations throughout the department," Walker told the Senate Armed Services Committee. Financial problems like the Pentagon's "would put any civilian company out of business," said Kwai Chan, a former GAO auditor ... and author of a report entitled "Financial Management in the Department of Defense: No One is Accountable." Winslow Wheeler, a former national security expert for the Senate Budget Committee, called the Defense Department "the worst-managed agency in the federal government, (that) can't account for the half-trillion dollars it spends each year, and seeks to produce weapons that are irrelevant or ineffective, or both."

Note: For major media articles showing that more than $1 trillion of taxpayers money have gone missing at the Pentagon, click here. For the deeper reasons behind this, a top U.S. general's explanation is available here.


Voting machines put U.S. democracy at risk
2006-09-20, CNN News
http://www.cnn.com/2006/US/09/19/Dobbs.Sept20/index.html

There is little assurance your vote will count. As we've been reporting almost nightly...for more than a year, electronic voting machines are placing our democracy at risk. These machines time and again have been demonstrated to be extremely vulnerable to tampering and error, and many of them have no voter-verified paper trail. Only 27 states have laws requiring the use of voter-verified paper trails. 15 states [have] no mandated requirements for safeguarding your vote. During the 2004 presidential election, one voting machine...added nearly 3,900 additional votes to Bush's total. Officials caught the machine's error because only 638 voters cast presidential ballots at that precinct, but in a heavily populated district, can we really be sure the votes will be counted correctly? [In] the May primary election in Cuyahoga County, Ohio...the electronic voting machines' four sources of vote totals -- individual ballots, paper trail summary, election archives and memory cards -- didn't even match up. The report concluded that relying on the current system for Cuyahoga County's more than 1.3 million people should be viewed as "a calculated risk." Are we really willing to risk our democracy? A 2005 Government Accountability Office report on electronic voting confirmed the worst fears of watchdog groups and election officials. "There is evidence that some of these concerns have been realized and have caused problems with recent elections, resulting in the loss and miscount of votes." That is simply unacceptable. Congress and the White House need to immediately take steps to assure the integrity of electronic voting with paper trails that could be audited in any recount.

Note: For lots more reliable, verifiable information on the various aspects of the elections cover-up, see http://www.wanttoknow.info/electionsinformation


Journals 'regularly publish fraudulent research
2006-05-03, The Guardian (One of the U.K.'s leading newspapers)
http://society.guardian.co.uk/health/story/0,,1766642,00.html

Fraudulent research regularly appears in the 30,000 scientific journals published worldwide, a former editor of the British Medical Journal (BMJ) said today. Even when journals discover that published research is fabricated or falsified they rarely retract the findings, according to Richard Smith, who was also chief executive of the BMJ publishing group. Writing in the latest edition of the Journal of the Royal Society of Medicine, Dr Smith called on editors to blow the whistle on bad research and to use their clout to pressure universities into taking action against dodgy researchers. The former BMJ editor said it was likely that research fraud was "equally common" in the 30,000 plus scientific journals across the globe but was "invariably covered up". His call for action comes in the wake of several high profile cases of fraudulent research, including the Korean scientist Hwang Woo-suk who fabricated stem cell research that it was claimed would open up new ways to treat diseases like Parkinson's. Dr Smith criticised the failure of scientific institutions, including universities, to discipline dodgy researchers even when alerted to problems by journals. "Few countries have measures in place to ensure research is carried out ethically," he said. "Most cases are not publicised. They are simply not recognised, covered up altogether or the guilty researcher is urged to retrain, move to another institution or retire from research."

Note: For reliable information on the collusion of industry, government, and research facilities who place profits above advances in public health: http://www.WantToKnow.info/healthcoverup


Was Use of Cell Phones on 9/11 Flights Possible?
2004-12-15, WantToKnow.info/Washington Post/SF Chronicle/Associated Press
http://www.WantToKnow.info/911cellphonecalls

”Once you get to a certain height, you are no longer in the range of the cellular network, because cell phone towers aren't built to project their signals that high.”

Washington Post, 12/9/04

“Today's vote by the FCC is intended to address whether technology has improved to the extent that cell phone calls now are possible above 10,000 feet -- they weren't in the past.”

San Francisco Chronicle, 12/15/04

"With television cameramen hovering, Qualcomm chief executive Irwin Jacobs sat in the front row of coach and made one of the first legal cell phone calls from a commercial jetliner. Jacobs pronounced the [brand new] technology behind the airborne phone call a success, although adding that it will be improved over the next couple years. Connections from the plane were generally good, although some calls were dropped."

USA Today/Associated Press, 7/16/04

Note: To find articles showing multiple cell phone use on Sept. 11, 2001, type "9/11" and "cell phone calls" into your favorite search engine, or click here for a Washington Post report on an alleged 30-minute uninterrupted cell phone call from Flight 93. Click here for a CNN report on another call from that flight. Tests have shown it is not possible to have an extended cell phone conversation above 10,000 feet.


Write More About Skull And Bones
2004-10-27, San Francisco Chronicle (San Francisco's leading newspaper)
http://sfgate.com/cgi-bin/article.cgi?f=/g/a/2004/10/27/notes102704.DTL

I get this a lot: Hey Mark ... why don't you quit toeing the typical blasé journalism line ... and instead write about the real truths? Like for example how both Kerry and Bush are members of mega-yuppie Yale secret society/boys' club Skull & Bones. And why, furthermore, don't you talk about the real truths of 9/11? Haven't you seen that amazing [9/11] video on that Web site? And what about Building 7? Why did that 47-story tower adjacent to the WTC collapse when it had no fire and no plane crash? Why isn't the media reporting any of this? Does this make you laugh? Scoff? It is, after all, incredibly easy to dismiss conspiracy theories. But you know what? It's not that easy. These people ... have a point. They are indeed onto something quite large and ominous and it very much has to do with the media toeing the line of "safe" information. There is indeed ample evidence that the U.S. government, long before 9/11, had already discussed the quite plausible possibilities and strategic benefits of unleashing a "Pearl Harbor"-type event on America. There are plenty of strangely unanswered questions about 9/11, about the stunning inaction of NORAD and Bush's stupefying nonreaction upon hearing of the attack, not to mention his administration's incredible attempts to halt any independent 9/11 investigations. Of course, no one in any major media will touch this stuff. It is professional suicide to dare suggest an alternate truth to the one supplied by the Pentagon and regurgitated by the media. And the truth is, we don't really want such unstable questions answered. We simply cannot tolerate to have our world, our leaders, our foundations so questioned. We prefer stasis to growth, security to true knowledge.


Conspiracy Theories Flourish on the Internet
2004-10-07, Washington Post
http://www.washingtonpost.com/wp-dyn/articles/A13059-2004Oct6.html

Darren Williams spent four weeks this summer making a short but startling video that raises novel questions about the 2001 attack. The video, "9/11: Pentagon Strike," suggests that it was not American Airlines Flight 77 that slammed into the Pentagon, but a missile or a small plane. The video offers flashes of photographs taken shortly after impact, interspersed with witness accounts. The pictures seem incompatible with damage caused by a jumbo jet. Firefighters stand outside a perfectly round hole in a Pentagon wall where the Boeing 757 punched through; it is less than 20 feet in diameter. Propelled by word of mouth, Internet search engines and e-mail, the video has been downloaded by millions of people around the world. Williams created a Web site for the video, www.pentagonstrike.co.uk. Then he e-mailed a copy to Laura Knight-Jadczyk [who] posted a link to the video on the group's Web site, www.Cassiopaea.org. Within 36 hours, Williams's site collapsed under the crush of tens of thousands of visitors. But there were others to fill the void. In Texas, a former casino worker who downloaded the video began drawing almost 700,000 visitors a day. In Louisiana, a young Navy specialist put the video on his personal Web page. Suddenly, the site was inundated by more than 20,000 hits. "Pentagon Strike" is just the latest and flashiest example of a growing number of Web sites, books and videos contending that something other than a commercial airliner hit the Pentagon. Knight-Jadczyk said she never imagined anyone outside her group would ever view "Pentagon Strike." "The fact everybody's been sending it to his brother and his cousin ... reflects the fact that there is a deep unease," she said.

Note: This five-minute video is well worth watching, even though it was made a few years ago. To view it free online, click here. For lots more information suggesting a major 9/11 cover-up, click here.


Military waste under fire: $1 trillion missing
2003-05-18, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2003/05/18/MN251738.DTL

The Department of Defense, already infamous for spending $640 for a toilet seat...couldn't account for more than a trillion dollars in financial transactions, not to mention dozens of tanks, missiles and planes. The nonpartisan General Accounting Office has raised the volume of its perennial complaints about the financial woes at Defense, which recently failed its seventh audit in as many years. "Overhauling DOD's financial management operations represent a challenge that goes far beyond financial accounting," GAO chief David Walker told lawmakers. Recent government reports suggest the Pentagon's money management woes have reached astronomical proportions. A GAO report found Defense inventory systems so lax that the U.S. Army lost track of 56 airplanes, 32 tanks, and 36 Javelin missile command launch-units. When military leaders were scrambling to find enough chemical and biological warfare suits to protect U.S. troops, the department was caught selling these suits as surplus on the Internet "for pennies on the dollar," a GAO official said. "We are overhauling our financial management system," said Dov Zakheim, the Pentagon's chief financial officer. "The Pentagon has failed to address financial problems that dwarf those of Enron," said Rep. Henry Waxman, D-Los Angeles. Gregory Kutz, director of GAO's financial management division [said] "I've been to Wal-Mart. They were able to tell me how many tubes of toothpaste were in Fairfax, Va. And DOD can't find its chem-bio suits." Opposition to defense spending is portrayed as unpatriotic. Legislators are often more concerned about winning Pentagon pork than controlling defense waste.

Note: You can read the GAO Report (Page 17 on missing planes). Page two states, "To date, no major part of DOD has yet been able to pass the test of an independent audit." For an intriguing Online Journal article exposing the deep role of the Pentagon's former CFO (Chief Financial Officer) Zakheim in this corruption, click here. Why wasn't and isn't this front page headlines? Why are newspaper editors keeping this most vital information from the public?


The people who control the world
2003-01-30, CNN
http://www.cnn.com/2003/SHOWBIZ/books/01/30/ronson.them

The Middle Ages had the Knights Templar. The 18th century had the Masons and the Illuminati. Our modern age has golf-playing businessmen. [Jon] Ronson, a 35-year-old British writer, humorist and documentarian, kept reading and hearing about the "tiny elite [that] rules the world from inside a secret room" -- so he decided to go in search of it. He met with extremists of many stripes: Ku Klux Klansmen with a PR bent, Muslim rabble-rousers ... and others convinced that a New World Order meant the end of the world. He sought out the industrialists of groups such as the Bilderberg Group and Bohemian Grove. He wrote about his experiences in "Them." Ronson's extremists seem rather normal. Some are very much aware of how their views marginalize them. The people of "Them" are people who are all too human -- even if they would deny others their humanity. As the saying goes, just because you're paranoid doesn't mean someone's not out to get you. Ronson doesn't deny that many of the extremists in "Them" are, well, extreme. Many have put together half-baked theories that blame the troubles of the world on wealthy businessmen, usually a code word for Jews. Ronson, who's Jewish himself, sometimes found it awkward to listen to their views. Conspiracy theorists tend to be fearful, less educated, less tied in to the power structure. Meanwhile, the leaders of corporations and countries do meet as part of conferences sponsored by organizations such as the Trilateral Commission and the Bilderberg Group. While researching a Bilderberg Group meeting, [Ronson] was chased through parts of Portugal by shadowy security men. He found out just how thin the membrane between "us" and "them" may be.

Note: Them is by far the most balanced, entertaining book you are likely to find on conspiracy theorists. It pokes a lot of fun both at the conspiracy theorists and at the powerful secret groups which he finds to be deluded almost as much as the conspiracy theorists themselves.


The Secret War
2002-10-27, Los Angeles Times
http://articles.latimes.com/2002/oct/27/opinion/op-arkin27

The Defense Department is dramatically expanding its 'black world' of covert operations. The Bush administration has turned to what the Pentagon calls the "black world" to press the war on terrorism and weapons of mass destruction. The increasingly dominant role of the military ... reflects the desire of Secretary of Defense Donald Rumsfeld to gain greater overall control of the war on terror. "Our task is to find and destroy the enemy before they strike us." Though covert action can bring quick results, because it is isolated from the normal review processes it can just as quickly bring mistakes and larger problems. The epicenter of the Pentagon's covert operations remains the North Carolina-based Joint Special Operations Command, often referred to as Delta Force. The super-secret command is still not officially acknowledged to exist. Rumsfeld's influential Defense Science Board ... recommends creation of a super-Intelligence Support Activity, an organization it dubs the Proactive, Preemptive Operations Group, (P2OG), to bring together CIA and military covert action, information warfare, intelligence, and cover and deception. This body would launch secret operations aimed at "stimulating reactions" among terrorists and states possessing weapons of mass destruction -- that is, for instance, prodding terrorist cells into action and exposing themselves to "quick-response" attacks by U.S. forces. The Air Force is designing its own Global Response Task Force ... capable of delivering a "worldwide attack within an hour."

Note: For an amazing exposé by a highly decorated U.S. general on the hidden reasons behind war, click here.


Toyota smashes fuel economy record
2002-10-20, London Times
http://www.timesonline.co.uk/article/0,,588-451038,00.html

Tucked away on the Toyota stand you will find a cheeky little coupé that looks sporty but whose raison d’ętre is fuel economy, the lowest exhaust emissions and ease of recycling. The ES3 — the initials stand for Eco Spirit — achieves 104mpg in the official European fuel consumption tests, a record for a four-seat car. Some months ago I drove this prototype and not only is it even more economical than the special “3 litre” (three litres of fuel for every 100km travelled, or 94mpg) versions of the Audi A2 and VW Lupo that sell in Germany, but the Toyota is more lively and responsive and would be very acceptable as an everyday car. The ES3 has a 1.4 litre turbocharged diesel engine and CVT (continuously variable transmission).

Note: So what happened to this amazing car? Why haven't we heard anything about it since the article was published in 2002? Read the revealing WantToKnow.info article at this link to learn how this amazing car, which was the talk of the fuel economy car industry in 2002, eventually disappeared. And for an excellent essay which provides key information on this topic, including a detailed list of suppressed inventions which greatly improve gasoline mileage reported over the years in respected magazines, click here.


Foundations are in place for martial law in the US
2002-07-21, Sydney Morning Herald
http://www.smh.com.au/articles/2002/07/27/1027497418339.html

Recent pronouncements from the Bush Administration and national security initiatives put in place in the Reagan era could see internment camps and martial law in the United States. When president Ronald Reagan was considering invading Nicaragua he issued a series of executive orders that provided the Federal Emergency Management Agency (FEMA) with broad powers in the event of a "crisis" such as "violent and widespread internal dissent or national opposition against a US military invasion abroad". On July 20 the Detroit Free Press ran a story entitled "Arabs in US could be held, official warns". The story referred to a member of the US Civil Rights Commission who foresaw the possibility of internment camps for Arab Americans. FEMA has practised for such an occasion. FEMA, whose main role is disaster response, is also responsible for handling US domestic unrest. From 1982-84 Colonel Oliver North assisted FEMA in drafting its civil defence preparations. They included executive orders providing for suspension of the constitution, the imposition of martial law, internment camps, and the turning over of government to the president and FEMA. A Miami Herald article on July 5, 1987, reported that the former FEMA director Louis Guiffrida's deputy, John Brinkerhoff, handled the martial law portion of the planning. Today Mr Brinkerhoff is with the highly influential Anser Institute for Homeland Security.

Note: Most of these provisions are still in place today. Isn't it time for a change?


Congress OKs Use of Force
2001-09-15, Los Angeles Times
http://articles.latimes.com/2001/sep/15/news/mn-46069

Two of them were American-trained Saudi fighter pilots. One graduated from America's foremost flight university. One drank Stoli and orange juice and one advertised for a Mexican bride. The 19 men identified by the FBI as suspects in the World Trade Center and Pentagon hijack attacks ... studied flying, lived in nondescript suburban apartments and seldom called attention to themselves. Most lived for a time in Florida. Others were scattered in Massachusetts, New Jersey, Arizona and Southern California. Then, in the last several weeks, they began disappearing from their neighborhoods. They reappeared Friday on a list of suspects in the deadliest terrorist attack in U.S. history. The FBI said it did not know for certain where most of the men came from, exactly where they lived in the United States or how old they were. Several had names so common in the Middle East that tracking them down might never be possible. A defense official said two of the [9/11] hijackers were former Saudi fighter pilots who had studied in exchange programs at the Defense Language School at Lackland Air Force Base in Texas and the Air War College at Maxwell Air Force Base in Alabama.

Note: Can you beleive that two of the alleged 9/11 hijackers trained at a US Air Force base? For other major media reports showing as many as seven of the hijackers trained at US military bases, click here.


Tapes Depict Proposal to Thwart Bomb Used in Trade Center Blast
1993-10-28, New York Times
http://select.nytimes.com/search/restricted/article?res=F00617FE3A5C0C7B8EDDA...

Law-enforcement officials were told that terrorists were building a bomb that was eventually used to blow up the World Trade Center. The informer was to have helped the plotters build the bomb and supply the fake powder, but the plan was called off by an F.B.I. supervisor who had other ideas about how the informer, Emad A. Salem, should be used. The account, which is given in the transcript of hundreds of hours of tape recordings Mr. Salem secretly made of his talks with law-enforcement agents, portrays the authorities as in a far better position than previously known to foil the Feb. 26 bombing of New York City's tallest towers. The explosion left six people dead, more than 1,000 injured and damages in excess of half a billion dollars. The transcript quotes Mr. Salem as saying that he wanted to complain to F.B.I. headquarters in Washington about the bureau's failure to stop the bombing, but was dissuaded by an agent identified as John Anticev. "He said, I don't think that the New York people would like the things out of the New York office to go to Washington, D.C." Another agent ... does not dispute Mr. Salem's account, but rather, appears to agree with it. Other Salem tapes and transcripts were being withheld pending Government review, of "security and other issues." William M. Kunstler, a defense lawyer in the case, accused the Government this week of improper delay in handing over all the material. The transcripts he had seen, he said, "were filled with all sorts of Government misconduct." But citing the judge's order, he said he could not provide any details.

Note: If the above link fails, click here. For a two-minute CBS News clip the same day giving more information on this little-known story, click here.


CIA Brainwashing Suit Settled
1988-10-05, Chicago Tribune
http://pqasb.pqarchiver.com/chicagotribune/access/24835384.html?dids=24835384...

Eight elderly Canadians who were victims of CIA-funded brainwashing experiments in the 1950s reached a tentative out-of-court settlement Tuesday in their multimillion-dollar damage suit against the U.S. spy agency. The Canadian plaintiffs, who say they suffered permanent mental and physical damage as a result of the bizarre experiments performed on them at a Montreal psychiatric hospital, will divide a $750,000 payment among them, according to their attorney, James Turner. The Canadians, all patients of the late Dr. Ewen Cameron at Montreal's Allan Memorial Institute in the late 1950s, were injected with repeated doses of mind-altering LSD, deprived of sleep, subjected to massive electroshock treatments and forced to listen to thousands of repetitions of taped messages taken from the most sensitive moments of their therapy sessions.

Note: Dr. Cameron was once President of the American and World Psychiatric Associations. For more on the severe abuses of doctors in serving the CIA's mind control programs, click here. For lots more reliable, verifiable information on CIA mind control experiments and programs, click here. The link above provides this abstract of the complete article, which can be accessed by payment of a small fee.


The Secret Government: The Constitution in Crisis
1987-11-04, WantToKnow.info/PBS Documentary
http://www.WantToKnow.info/050423secretgovernment

The Secret Government is an interlocking network of official functionaries, spies, mercenaries, ex-generals, profiteers and superpatriots, who, for a variety of motives, operate outside the legitimate institutions of government. The Russians had been our ally against the Nazis, an expedient alliance for the sake of war. Now they were our enemy. To fight them we turned to some of the very men who had inflicted on humanity the horrors of Hitler’s madness. We hired Nazis’ as American spies. Admiral Gene La Rocque: “That National Security Act of 1947 changed dramatically the direction of this great nation. It established the framework for a national security state. Never have we had a National Security Council so concerned about the nation’s security that we’re always looking for threats and looking how to orchestrate our society to oppose those threats. National Security was invented, almost, in 1947, and now it has become the prime mover of everything we do. The National Security Act also gave us the Central Intelligence Agency." In 1975 ... Congress took its first public look at the Secret Government. Senator Frank Church chaired the Select Committee to study government operations. The hearings opened the books on a string of lethal activities. From the use of electric pistols and poison pellets, to Mafia connections and drug experiments. And they gave us a detailed account of assassination plots against foreign leaders and the overthrowing of sovereign governments. This is a system easily corrupted. While freedom does have enemies in the world, it can also be undermined here at home, in the dark, by those posing as its friends.

Note: This highly revealing PBS documentary is available for free viewing on the Internet. For the link, written text, and much more on this amazingly revealing documentary, click here.


Method and Apparatus for Tunneling by Melting
1972-09-22, US Patent and Trademark Office
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&...

The invention described herein was made in the course of, or under, a contract with the U. S. ATOMIC ENERGY COMMISSION. It relates ... to a method and apparatus for drilling, tunneling and shaft-sinking in rock with particular advantage at hitherto inaccessible depths. The present invention uses the basic apparatus and method disclosed in U.S. Pat. No. 3,357,505 and in Los Alamos Scientific Laboratory of the University of California Report No. LA-3243 (1965) entitled "Rock Melting as a Drilling Technique." In the existing rock melting devices of the prior art, a major difficulty which limited performance was that of delivering a sufficiently large heat flux to the melting face of the drill or penetrator. The development of the heat pipe alleviates this problem in that the use of heat pipes enables the transfer of heat energy from a compact heat source to the extended melting surface of the penetrator at rates high enough to maintain the surface above the melting temperature of the rock. The extrapolation of a mechanism useful for forming large holes in the earth in accordance with the present invention uses the combination of a refractory rock-melting tool, an in situ heat source preferably a small nuclear reactor and an exceedingly efficient heat transfer mechanism such as a system of heat pipes to convey heat from the source to the walls of the drilling tool.

Note: This patent shows that government scientists at Los Alamos were using a "small nuclear reactor" to drill underground tunnels. Several of the inventors listed on the patent worked at Los Alamos National Laboratory, including: McInteer, Berthus B.; Mills, Robert L.; Potter, Robert M.; Robinson, Eugene S.; Rowley, John C.; and Smith, Morton C.. For photos and more fascinating information on this most intriguing patent, click here.


Flying Disks
1947-07-10, FBI Website, UFO Vault
http://vault.fbi.gov/UFO/UFO%20Part%201%20of%2016/

At request of Brigadier General George F. Schulgen, Chief of the Requirements Intelligence Branch of Army Air Corps Intelligence, Special Agent [deleted] discussed the above captioned matter with him on July 9, 1947. General Schulgen indicated to [deleted] that the Air Corps has taken the attitude that every effort must be undertaken in order to run down and ascertain whether or not the flying disks are a fact and, if so, to learn all about them. He advised that to complete the picture he desired the assistance of the Federal Bureau of Investigation in locating and questioning the individuals who first sighted the so-called flying disks in order to ascertain whether or not they are sincere in their statements that they saw these disks. [Deleted] indicated that it was his attitude that the flying disks are not the result of any Army or Navy experiments. He stated that he was of the opinion that the Bureau, if at all possible, should accede to General Schulgen's request. [FBI Director J. Edgar Hoover's handwritten response:] I would do it but before agreeing to it we must insist upon full access to discs recovered. For instance in the Sa. case the army grabbed it and would not let us have it for cursory investigation.

Note: The excerpt above is from pages 44 and 45 of the rich collection of declassified FBI documents on UFOs at the link above. If the link fails, click here. Note that this was just days after the Roswell crash. For lots more solid evidence of a major UFO cover-up, see our UFO Information Center at this link. Why hasn't this been widely reported and become public knowledge? For a possible answer, click here.


First digital pill approved despite worries about biomedical Big Brother
2017-11-14, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/business/article/First-digital-pill-approved-despite-wo...

Regulators have approved the first drug with a sensor that alerts doctors when the medication has been taken. The digital pill combines two existing products: the former blockbuster psychiatric medication Abilify - long used to treat schizophrenia and bipolar disorder - with a sensor tracking system first approved in 2012. Experts say the technology could be a useful tool, but it will also change how doctors relate to their patients as they’re able to see whether they are following instructions. The pill has not yet been shown to actually improve patients’ medication compliance, a feature insurers are likely to insist on before paying for the pill. Additionally, patients must be willing to allow their doctors and caregivers to access the digital information. The technology carries risks for patient privacy, too, if there are breaches of medical data or unauthorized use as a surveillance tool, said James Giordano, a professor of neurology at Georgetown University Medical Center. “Could this type of device be used for real-time surveillance? The answer is of course it could,” said Giordano. The new pill, Abilify MyCite, is embedded with a digital sensor that is activated by stomach fluids, sending a signal to a patch worn by the patient and notifying a digital smartphone app that the medication has been taken.

Note: In 2010, it was quietly reported that Novartis AG would be seeking regulatory approval for such "chip-in-a-pill technology". For more along these lines, see concise summaries of deeply revealing news articles on microchip implants and the disappearance of privacy.


The NSA and Me: By Former ABC Producer James Bamford
2014-10-02, The Intercept
https://firstlook.org/theintercept/2014/10/02/the-nsa-and-me/

My biggest battle with the NSA came before my book [The Puzzle Palace] was even published. I had obtained the criminal file that the Justice Department had opened on the NSA. Marked as Top Secret, the file was so sensitive that only two original copies existed. Never before or since has an entire agency been the subject of a criminal investigation. Senior officials at the NSA were even read their Miranda rights. Issued on June 6, 1975, the report noted that both the NSA and CIA had engaged in questionable and possibly illegal electronic surveillance. As a result, Attorney General Edward Levi established a secret internal task force to look into the potential for criminal prosecution. Focusing particularly on NSA, the task force probed more deeply into domestic eavesdropping than any part of the executive branch had ever done before. The report’s prosecutive summary also pointed to the NSA’s top-secret “charter” issued by the Executive Branch, which exempts the agency from legal restraints placed on the rest of the government. This ... meant the NSA did not have to follow any restrictions placed on electronic surveillance “unless it was expressly directed to do so.” In short, the report asked, how can you prosecute an agency that is above the law? More than three decades later, the NSA, like a mom-and-pop operation that has exploded into a global industry, now employs sweeping powers of surveillance that Frank Church could scarcely have imagined in the days of wired phones and clunky typewriters. At the same time, the Senate intelligence committee he once chaired has done an about face, protecting the agencies from the public rather than the public from the agencies. Without adequate oversight, or penalties for abuse, the only protection that citizens have comes not from Congress or the courts, but from whistleblowers.

Note: James Bamford is the courageous ABC producer and investigative reporter who first exposed the declassified Operation Northwoods files in the May of 2001. These files showed beyond a shadow of a doubt that the top Pentagon generals were willing to carry out false flag terrorism activities which would kill innocent civilians in order to foment war fever against Cuba. Yet only ABC News out of all the major media outlets was willing to report this most shocking news. Don't miss the entire, highly revealing article by Bamford at the link above.


In NSA-intercepted data, those not targeted far outnumber the foreigners who are
2014-07-05, Washington Post
http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data...

Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. [90% of] account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. [Many] files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year. The files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ
2014-02-27, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/feb/27/gchq-nsa-webcam-images-internet-...

Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal. GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not. In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally. Yahoo ... denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy". Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012. The system, eerily reminiscent of the telescreens evoked in George Orwell's Nineteen Eighty-Four, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs. Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds ... to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Stealth Surprises in NSA Report Take on Non-NSA Spying
2013-12-20, ABC News
http://abcnews.go.com/Blotter/stealth-surprises-nsa-report-nsa-spying/story?i...

The White House's expert NSA panel may have made headlines ... for telling President Barack Obama to knock off the collection of Americans' meta-data, but surveillance experts said they were surprised that the panel also took to task some controversial non-NSA-related spy tactics as well. One recommendation was to impose much stricter oversight on the FBI's ability to issue National Security Letters (NSLs), which have been used to obtain telephone call records and credit reports in terrorism and espionage cases. Another even more peculiar recommendation by the five national security experts ... was their advice that "governments" shouldn't hack into bank accounts and drain funds. "Governments should not use their offensive cyber capabilities to change the amounts held in financial accounts or otherwise manipulate the financial systems," the unanimous Review Group on Intelligence and Communications Technologies report warned Obama. "That was a strangely specific recommendation for something nobody was talking about," Kel McClanahan, executive director of government transparency group National Security Counselors, told ABC News. Michelle Richardson, the American Civil Liberties Union's legislative council in Washington, also said the findings on "NSLs" and government hacking were unexpected -- but welcomed.

Note: The fact that this expert panel would even mention governments manipulating financial accounts suggests that if it hasn't already happened, some were seriously considering this. For lots more on this strange news, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


GCHQ and NSA targeted charities, Germans, Israeli PM and EU chief
2013-12-20, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-ger...

British and American intelligence agencies had a comprehensive list of surveillance targets that included the EU's competition commissioner, German government buildings in Berlin and overseas, and the heads of institutions that provide humanitarian and financial help to Africa, top-secret documents reveal. The papers show GCHQ [and the NSA were] targeting organisations such as the United Nations development programme, the UN's children's charity Unicef and Médecins du Monde, a French organisation that provides doctors and medical volunteers to conflict zones. The head of the Economic Community of West African States (Ecowas) also appears in the documents, along with text messages he sent to colleagues. One GCHQ document, drafted in January 2009, makes clear that the agencies were targeting an email address listed as belonging to another important American ally – the "Israeli prime minister". Ehud Olmert was in office at the time. Three further Israeli targets appeared on GCHQ documents, including another email address understood to have been used to send messages between the then Israeli defence minister, Ehud Barak, and his chief of staff, Yoni Koren. The names and details are the latest revelations to come from documents leaked by the whistleblower Edward Snowden. They provoked a furious reaction. The disclosures reflect the breadth of targets sought by the agencies, which goes far beyond the desire to intercept the communications of potential terrorists and criminals, or diplomats and officials from hostile countries.

Note: Later reports revealed that GHCQ also targeted the global human rights organization Amnesty International. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Overt and Covert: ‘The Brothers,’ by Stephen Kinzer
2013-11-08, New York Times
http://www.nytimes.com/2013/11/10/books/review/the-brothers-by-stephen-kinzer...

The Brothers” is a riveting chronicle of government-sanctioned murder, casual elimination of “inconvenient” regimes, relentless prioritization of American corporate interests and cynical arrogance on the part of two men. John Foster Dulles and his brother, Allen, were ... lawyers, partners in the immensely powerful firm of Sullivan & Cromwell. John Foster Dulles served as secretary of state from 1953 to 1959; his brother ran the C.I.A. from 1953 to 1961. In his detailed, well­constructed and highly readable book, Stephen Kinzer ... shows how the brothers drove America’s interventionist foreign policy. Kinzer highlights John Foster Dulles’s central role in channeling funds from the United States to Nazi Germany in the 1930s. Sullivan & Cromwell floated bonds for Krupp A. G., the arms manufacturer, and also worked for I. G. Farben, the chemicals conglomerate that later manufactured Zyklon B, the gas used to murder millions of Jews. For the Dulles brothers, and for much of the American government, threats to corporate interests were categorized as support for communism. There are also reminders in Kinzer’s book of dark events in the history of American intelligence. Sixty years ago, Frank Olson, a C.I.A. officer, was reported to have jumped to his death during mind-control experiments “in which psychoactive drugs were administered to unknowing victims.” But last year, Kinzer reports, Olson’s family filed suit, claiming he had actually been murdered after visiting secret C.I.A. prisons in Europe.

Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


No Morsel Too Minuscule for All-Consuming N.S.A.
2013-11-03, New York Times
http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consu...

When Ban Ki-moon, the United Nations secretary general, sat down with President Obama at the White House in April to discuss Syrian chemical weapons, Israeli-Palestinian peace talks and climate change, it was a cordial, routine exchange. The National Security Agency nonetheless went to work in advance and intercepted Mr. Ban’s talking points for the meeting, a feat the agency later reported as an “operational highlight” in a weekly internal brag sheet. It was emblematic of an agency that for decades has operated on the principle that any eavesdropping that can be done on a foreign target of any conceivable interest — now or in the future — should be done. After all, American intelligence officials reasoned, who’s going to find out? From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as foes, as has become obvious in recent weeks; the agency’s official mission list includes using its surveillance powers to achieve “diplomatic advantage” over such allies as France and Germany and “economic advantage” over Japan and Brazil, among other countries. The scale of eavesdropping by the N.S.A., with 35,000 workers and $10.8 billion a year, sets it apart.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


NSA monitored calls of 35 world leaders after US official handed over contacts
2013-10-24, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-c...

The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden. The confidential memo reveals that the NSA encourages senior officials in its "customer" departments, such as the White House, State and the Pentagon, to share their "Rolodexes" so the agency can add the phone numbers of leading foreign politicians to their surveillance systems. The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately "tasked" for monitoring by the NSA. The revelation is set to add to mounting diplomatic tensions between the US and its allies, after the German chancellor Angela Merkel ... accused the US of tapping her mobile phone. The NSA memo obtained by the Guardian suggests that such surveillance was not isolated, as the agency routinely monitors the phone numbers of world leaders – and even asks for the assistance of other US officials to do so. The memo, dated October 2006 and which was issued to staff in the agency's Signals Intelligence Directorate (SID), was titled "Customers Can Help SID Obtain Targetable Phone Numbers". In the wake of the Merkel row, the US is facing growing international criticism that any intelligence benefit from spying on friendly governments is far outweighed by the potential diplomatic damage.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


The Snowden files: why the British public should be worried about GCHQ
2013-10-03, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/oct/03/edward-snowden-files-john-lanche...

The problem and the risk [with surveillance by GCHQ] comes in the area of mass capture of data, or strategic surveillance. This is the kind of intelligence gathering that sucks in data from everyone, everywhere: from phones, internet use from email to website visits, social networking, instant messaging and video calls, and even areas such as video gaming; in short, everything digital. In the US, the Prism programme may have given the NSA access to the servers of companies such as Google and Facebook; in the UK, GCHQ has gained a similar degree of access via its Tempora programme, and the two of them together have a cable- and network-tapping capabilities collectively called Upstream, which have the ability to intercept anything that travels over the internet. This data is fed into a database called XKeyscore, which allows analysts to extract information "in real time", ie immediately. What this adds up to is a new thing in human history: with a couple of clicks of a mouse, an agent of the state can target your home phone, or your mobile, or your email, or your passport number, or any of your credit card numbers, or your address, or any of your log-ins to a web service. Using that "selector", the state can get access to all the content of your communications, via any of those channels; can gather information about anyone you communicate with, can get a full picture of all your internet use, can track your location online and offline. It can, in essence, know everything about you, including – thanks to the ability to look at your internet searches – what's on your mind.

Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


NSA stories around the world
2013-09-23, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/sep/23/various-items-nsa-india-...

One of the most overlooked aspects of the NSA reporting in the US has been just how global of a story this has become. Last week it was revealed that Belgium's largest telecom, Belgacom, was the victim of a massive hacking attack which systematically compromised its system for as long as two years. Last week, using documents obtained from NSA whistleblower Edward Snowden, Laura Poitras and other Der Spiegel journalists reported in that paper that it was the GCHQ, Britain's intelligence agency, that was behind the attack. According to that report, the attack was carried out by targeting individual engineers at the telecom with malware that allowed GCHQ agents to "own" their computer and thus exploit their access to the telecommunications system. As the US and UK run around the world protesting the hacking activities of others and warning of the dangers of cyber-attacks, that duo is one of the most aggressive and malicious, if not the most aggressive and malicious, perpetrators of those attacks of anyone on the planet. Nobody hacks as prolifically and aggressively as the two countries who most vocally warn of the dangers of hacking. A coalition called Stop Watching Us has been formed by privacy and civil liberties groups from across the political spectrum. On October 26, the 12th anniversary of the enactment of the Patriot Act, they will hold an anti-surveillance rally in Washington DC.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


XKeyscore: NSA tool collects 'nearly everything a user does on the internet'
2013-07-31, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


How Barrett Brown shone light on the murky world of security contractors [and is now jailed]
2013-06-24, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/jun/24/surveillance-us-national-...

[Barrett] Brown is not a household name like Edward Snowden or Bradley Manning. But after helping expose a dirty tricks plot, he faces jail. Brown made a splash in February 2011 by helping to uncover "Team Themis", a project by intelligence contractors retained by Bank of America to demolish the hacker society known as Anonymous. The Team Themis story began in late 2010, when Julian Assange warned WikiLeaks would release documents outlining an "ecosystem of corruption [that] could take down a bank or two." Bank of America went into damage-control mode and, as the New York Times reported, assembled "a team of 15 to 20 top Bank of America officials … scouring thousands of documents in the event that they become public." Days later, Bank of America retained the well-connected law firm of Hunton & Williams [which] "proposed various schemes to attack" WikiLeaks. Its partners suggested creating false documents and fake personas to damage progressive organizations. The tech companies' emails – which Anonymous hacked and Barrett Brown helped publicize – listed planned tactics: "Feed[ing] the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error." Brown [has] been cooling his heels in a jail outside Dallas ... awaiting two separate trials that could put him on ice for more than 100 years. In contrast to the FBI's aggressive pursuit of Brown, no probe of the Team Themis project was launched – despite a call from 17 US House representatives to investigate a possible conspiracy to violate federal laws.

Note: With the wide focus on the privatized national security state by the leaks from Edward Snowden, there is renewed interest in Brown's plight and the campaign for justice in his case. For more on this and to support Barret Brown, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.


Killing Americans on U.S. Soil: Eric Holder's Evasive, Manipulative Letter
2013-03-06, The Atlantic
https://www.theatlantic.com/politics/archive/2013/03/killing-americans-on-us-...

On December 7, 1941, Japanese war planes bombed the U.S. naval base at Pearl Harbor, Hawaii. Six decades later, Al Qaeda terrorists flew hijacked airplanes into the World Trade Center and the Pentagon. Neither President Franklin Roosevelt nor President George W. Bush targeted and killed Americans on U.S. soil in the aftermath of those attacks. Doing so wouldn't have made any sense. How strange, then, that Attorney General Eric Holder invoked those very attacks in a letter confirming that President Obama believes there are circumstances in which he could order Americans targeted and killed on U.S. soil. "It is possible ... for the President to authorize the military to use lethal force within the territory of the United States," he wrote. "The President could conceivably have no choice but to authorize the military to use such force if necessary to protect the homeland in the circumstances of a catastrophic attack like the ones suffered on December 7, 1941 and on September 11, 2001." The very scenario to be guarded against is a president using the pretext of a terrorist attack to seize extraordinary powers. Isn't that among the most likely scenarios for the United States turning into an authoritarian security state?

Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.


Holder: US can legally kill Americans in terror groups
2012-03-05, MSNBC
http://usnews.msnbc.msn.com/_news/2012/03/05/10585197-holder-us-can-legally-k...

The U.S. government is legally justified in killing its own citizens overseas if they are involved in plotting terror attacks against America, Attorney General Eric Holder said [on March 5], offering the Obama administration's most detailed explanation so far of its controversial targeted killing program. The Fifth Amendment provides that no one can be "deprived of life" without due process of law. But that due process, Holder said, doesn't necessarily come from a court. "Due process and judicial process are not one and the same, particularly when it comes to national security. The Constitution guarantees due process, not judicial process," the attorney general said. The ACLU called Holder's explanation "a defense of the government’s chillingly broad claimed authority to conduct targeted killings of civilians, including American citizens, far from any battlefield without judicial review or public scrutiny." "Few things are as dangerous to American liberty as the proposition that the government should be able to kill citizens anywhere in the world on the basis of legal standards and evidence that are never submitted to a court, either before or after the fact," said Hina Shamsi, director of the ACLU’s National Security Project. "Anyone willing to trust President Obama with the power to secretly declare an American citizen an enemy of the state and order his extrajudicial killing should ask whether they would be willing to trust the next president with that dangerous power,” she said. The ACLU is suing the Obama administration, seeking to have documents regarding the targeted killing program made public.

Note: Attorney General Holder's claim that US citizens can be killed by the government without judicial process clearly violates the U.S. Bill of Rights. In addition to the Fifth Amendment that states that no person shall be held to answer for a crime "without due process of law," the Sixth Amendment states that "the accused shall enjoy the right to a speedy and public trial."


At CIA, Grave Mistakes, Then Promotions
2011-02-11, ABC News/AP
http://abcnews.go.com/Politics/wireStory?id=12874101

In December 2003, security forces boarded a bus in Macedonia and snatched a German citizen named Khaled el-Masri. For the next five months, el-Masri was a ghost. Only a select group of CIA officers knew he had been whisked to a secret prison for interrogation in Afghanistan. But he was the wrong guy. In the years since the Sept. 11, 2001, terrorist attacks, officers who committed serious mistakes that left people wrongly imprisoned or even dead have received only minor admonishments or no punishment at all. Many officers who made significant missteps are now the senior managers fighting the president's spy wars. The AP investigation of the CIA's actions revealed a disciplinary system that takes years to make decisions, hands down reprimands inconsistently and is viewed inside the agency as prone to favoritism and manipulation. When people are disciplined, the punishment seems to roll downhill, sparing senior managers even when they were directly involved in operations that go awry. Two officers involved in the death of a prisoner in Afghanistan, for instance, received no discipline and have advanced into Middle East leadership positions. Other officers were punished after participating in a mock execution in Poland and playing a role in the death of a prisoner in Iraq. Those officers retired, then rejoined the intelligence community as contractors. Since 9/11, retired CIA officers have published a variety of books opining on what ails the CIA. Their conclusions differ, but they are in nearly unanimous agreement that the system of accountability is broken.

Note: It is great news that the media is now revealing some of the craziness at the CIA, a topic that was almost taboo for the press in the past.


Critics question billions in aid routed back to US contractors
2011-02-03, Boston Globe
http://www.boston.com/news/nation/articles/2011/02/03/critics_question_billio...

United States taxpayers have funneled more than $60 billion of aid into Egypt since President Hosni Mubarak came to power in 1981, but more than half of the money has been spent supplying weapons to the country’s military. About $34 billion of the aid to Egypt has come in the form of grants that Congress requires Egypt to spend on American military hardware. In recent years the large amount of aid earmarked for the military, and the relatively low sums supporting civilian aid, have attracted scathing criticism from Egyptians, some of whom argue that US aid has gone to entrench a military dictator at the expense of the fledgling democracy activists. During the early turmoil, protesters were the target of tear gas canisters that read "made in the USA," fueling debate about the aid. Last year, Egypt was the fifth-largest recipient of US aid, getting $1.6 billion. Congress ... authorized major aid packages to both [Egypt and Israel in 1979], using an informal formula — not enshrined in the peace treaty — that gave Egypt $2 for every $3 that Israel received. Israel quickly became the largest recipient of US aid, and Egypt the second-largest — rankings that were only recently overtaken by wars in Afghanistan and Iraq, and last year, the disaster in Haiti. The strong interest of US companies could help explain why US military assistance to Egypt has remained at $1.3 billion a year, while its civilian economic assistance has steadily shrunk, from $815 million a decade ago to $250 million requested for 2011. The decline began in 1998, when Israel arranged for a reduction in economic support and an increase military aid. As Israeli’s economic aid shrunk, so too did Egypt’s.

Note: Israel receives about $3 billion a year from the US, yet the population of the country is 8 million. If you do the math, the US is providing the equivalent of nearly $4,000 in aid per year to every man, woman and child in Israel, with $3,000 of that to buy US military hardware. For lots more reliable information on how the military/industrial complex manipulates world politics to support the war machine, click here and here.


Learning From Lehman
2010-03-14, New York Times
http://www.nytimes.com/2010/03/14/opinion/14sun3.html

On top of everything Lehman Brothers did before it collapsed in 2008, nearly toppling the financial system, it now seems that it was aggressively massaging its books. A new report on the Lehman collapse, released last week ... would leave anyone dumbstruck by the firm’s audacity — and reminded of the crying need for adult supervision of Wall Street. The 2,200-page report [finds that] Lehman engaged in transactions that let it temporarily shift troubled assets off its books and in so doing, hide its reliance on borrowed money. The maneuvers ... made the firm appear healthier than it was. [The author, Anton R. Valukas, a former federal prosecutor,] wrote that Richard S. Fuld Jr., Lehman’s former chief executive, was “at least grossly negligent,” and that Lehman executives engaged in “actionable balance sheet manipulation.” According to the report, rating agencies, government regulators and Lehman’s board of directors had no clue about the gimmicks. The result is that we were all blindsided. And we could be blindsided again. Congress is not even close to passing meaningful regulatory reform. The surviving banks have only gotten bigger and more politically powerful. If the Valukas report is not a wake-up call, what would be?

Note: The Lehman report is described in detail here. For revealing information showing how the US Treasury Department continues to fight against a much-needed audit of the Federal Reserve, click here. For a great collection of revealing reports from reliable sources on the hidden realities behind the financial crisis and government bailouts of the biggest financial corporations, click here.


Daniel Ellsberg on the Limits of Knowledge
2010-02-27, Mother Jones
http://www.motherjones.com/kevin-drum/2010/02/daniel-ellsberg-limitations-kno...

[Here's a story] from Ellsberg's book Secrets. The setting is a meeting with Henry Kissinger in late 1968. In 1968 Ellsberg was a highly respected analyst ... who had worked for both the Pentagon and Rand, and Kissinger was just entering the government. Ellsberg told him, "Henry, there's something I would like to tell you. You've dealt a great deal with top secret information. But you're about to receive a whole slew of special clearances, maybe fifteen or twenty of them, that are higher than top secret. First, you'll be exhilarated by some of this new information. But second, ... you will feel like a fool for having studied, written, talked about these subjects, criticized and analyzed decisions made by presidents for years without having known of the existence of all this information. In particular, you'll feel foolish for having literally rubbed shoulders for over a decade with some officials and consultants who did have access to all this ... and you'll be stunned that they kept that secret from you so well. You will feel like a fool. Then, after you've ... become used to using what amounts to whole libraries of hidden information, ... you will forget there ever was a time when you didn't have it. You'll be aware only of the fact that you have it now and most others don't ... and that all those other people are fools. [In] a matter of two or three years — you'll eventually become aware of the limitations of this information. It's often inaccurate, and it can lead you astray. But that takes a while to learn. In the meantime ... you will deal with a person who doesn't have those clearances only from the point of view of what you want him to believe and what impression you want him to go away with. You'll have to lie carefully to him about what you know. In effect, you will have to manipulate him.

Note: Don't miss the entire fascinating, highly revealing article at the link above. To see this quote from Ellsberg's book on Google books, click here. For more on government secrets, see the deeply revealing reports from reliable major media sources available here.


Greece to Make All Large Cash Transactions Illegal
2010-02-16, Christian Science Monitor
http://www.csmonitor.com/Money/The-Daily-Reckoning/2010/0216/Greece-to-Make-A...

Embroiled in its debt crisis and looking for any avenue to bolster tax receipts [Greece] has done the unthinkable – it has made [cash, in euros] illegal for transactions over 1,500 euros. Of course, larger credit- or debit-based electronic transactions over 1,500 will still be denominated in euros. However, electronic transactions clearly require infrastructure and limit personal freedom. From Reuters: “From 1. Jan. 2011, every transaction above 1,500 euros between natural persons and businesses, or between businesses, will not be considered legal if it is done in cash. Transactions will have to be done through debit or credit cards.” It seems wrong for the Greek state to dictate how cash euros can be used. In fact, it’s surprising that the EU-endorsed plan would allow Greece to control euro usage at that level. Despite the fact that the reform bill is a piece of an approved EU plan to help improve Greek tax revenue and reduce deficit, it seems to go too far in curtailing personal liberty. How much is a government willing to punish its own citizens for using “too much” of their own legal tender in an otherwise legal transaction?

Note: What gives any government the right to limit cash transactions? And why is the EU approving this unusual measure? Could this be part of a hidden agenda to push the public towards a cashless society?


Drug money saved banks in global crisis, claims UN advisor
2009-12-13, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/global/2009/dec/13/drug-money-banks-saved-un-cfief-...

Drugs money worth billions of dollars kept the financial system afloat at the height of the global crisis, the United Nations' drugs and crime tsar has told the Observer. Antonio Maria Costa, head of the UN Office on Drugs and Crime, said he has seen evidence that the proceeds of organised crime were "the only liquid investment capital" available to some banks on the brink of collapse last year. He said that a majority of the $352bn (Ł216bn) of drugs profits was absorbed into the economic system as a result. This will raise questions about crime's influence on the economic system at times of crisis. It will also prompt further examination of the banking sector as world leaders, including Barack Obama and Gordon Brown, call for new International Monetary Fund regulations. Speaking from his office in Vienna, Costa said evidence that illegal money was being absorbed into the financial system was first drawn to his attention by intelligence agencies and prosecutors around 18 months ago. "In many instances, the money from drugs was the only liquid investment capital. In the second half of 2008, liquidity was the banking system's main problem and hence liquid capital became an important factor," he said. Some of the evidence put before his office indicated that gang money was used to save some banks from collapse when lending seized up, he said. "Inter-bank loans were funded by money that originated from the drugs trade and other illegal activities... There were signs that some banks were rescued that way."

Note: For many revealing reports from major media sources on the hidden realities behind the global financial crisis, click here.


Ventura Turns Investigator for 'Conspiracy Theory'
2009-12-01, ABC News/Associated Press
http://abcnews.go.com/Entertainment/wireStory?id=9219009

Jesse Ventura is back for another stab at TV stardom, this time hosting a program that digs into conspiracy theories, including alternate views of what was behind the attacks of Sept. 11, 2001, and the purpose of a sprawling research center in remote Alaska. The former Minnesota governor, professional wrestler and Navy SEAL stars in "Conspiracy Theory With Jesse Ventura," ... on truTV. The cable network, part of Turner Broadcasting System Inc., has ordered seven episodes of the hourlong weekly series. Marc Juris, executive vide president and general manager of truTV, said Ventura is passionate about the show and brings "knowledge from the inside" of government. "He's not doing this as an act or a gimmick. It's true to his heart. He's really looking for the answers," Juris told the AP. The premiere episode deals with the High Frequency Active Auroral Research Program, or HAARP, a 35-acre compound of 180 antennas near Gakona, Alaska, that is used to study the Earth's ionosphere. Ventura and those he interviews question whether the government is using the site to manipulate the weather or to bombard people with mind-controlling radio waves. Future "Conspiracy Theory" shows explore alleged cover-ups surrounding the Sept. 11 attacks and whether there are real "Manchurian Candidate" assassins who are programmed to kill, said Juris.

Note: Ventura was also a Navy Seal, where he personally was involved in top secret activities and learned how what is presented to the public is very different from the deeper realities. Don't miss the highly educational episode on the vitally important topic of HAARP by clicking here. And watch the excellent episode on 9/11 by clicking here. You'll be surprised by the new angles presented.


Skull and Bones members include some of America's most powerful
2009-11-12, CNN
http://www.edition.cnn.com/TRANSCRIPTS/0911/12/ec.01.html

What really happens behind the padlocked doors of this windowless building, [the home] of Skull and Bones, Yale's oldest secret society? Its members include some of America's most powerful and privileged elite all sworn to secrecy. [CAMPBELL] BROWN: Alexandra Robbins broke through the wall of silence to write Secrets of the Tomb based on clandestine interviews with dozens of bonesmen. Only 15 [Yale students] get picked each year. The society includes at least three U.S. presidents, Supreme Court justices, and too many senators and CEOs to name. In 2004, Bush versus Kerry was the first all-bonesmen presidential election. ALEXANDRA ROBBINS: Skull and Bones' only purpose is to get its members into positions of prominence around the world so that they can elevate other members to similar positions. One of the first activities they participate in is called connubial bliss, where ... each member must spend an evening standing in front of the other 14 bonesmen and recount his or her entire sexual and romantic history. BROWN: According to one ... story, Prescott Bush, George W. Bush's grandfather, was part of a group that broke into the Oklahoma burial place of the Apache chief Geronimo and made off with his skull. Geronimo's grave was disturbed back in 1918, there are photos of skulls inside the "Skull and Bones" tomb. They have their own private retreat. Deer Island off the coast of New York. And a world of ready investors and political contacts in the highest echelons of American society. What has kept the secret society alive for all these years? Good old fashioned networking for the super elite.

Note: To watch the CNN video clip on this Yale secret society, click here. For lots more powerful information on Skull and Bones and other secret societies reported in major media articles, click here.


Police in Ł9m scheme to log 'domestic extremists'
2009-10-25, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/uk/2009/oct/25/police-domestic-extremists-database

Police are gathering the personal details of thousands of activists who attend political meetings and protests, and storing their data on a network of nationwide intelligence databases. The hidden apparatus has been constructed to monitor "domestic extremists". Detailed information about the political activities of campaigners is being stored on a number of overlapping IT systems, even if they have not committed a crime. Senior officers say domestic extremism, a term coined by police that has no legal basis, can include activists suspected of minor public order offences such as peaceful direct action and civil disobedience. Three national police units responsible for combating domestic extremism are run by the "terrorism and allied matters" committee of the Association of Chief Police Officers (Acpo). In total, it receives Ł9m in public funding, from police forces and the Home Office, and employs a staff of 100. The main unit, the National Public Order Intelligence Unit (NPOIU), runs a central database which lists thousands of so-called domestic extremists. It filters intelligence supplied by police forces across England and Wales, which routinely deploy surveillance teams at protests, rallies and public meetings. Vehicles associated with protesters are being tracked via a nationwide system of automatic number plate recognition (ANPR) cameras. Police surveillance units, known as Forward Intelligence Teams (FIT) and Evidence Gatherers, record footage and take photographs of campaigners as they enter and leave openly advertised public meetings. Surveillance officers are provided with "spotter cards" used to identify the faces of target individuals who police believe are at risk of becoming involved in domestic extremism. Targets include high-profile activists regularly seen taking part in protests.

Note: This important article should be read in its entirety. For further revelations of the magnitude of this surveillance and "rebranding protest as extremism " program, click here.


Officers accused of inciting violence to testify before police ethics panel
2009-10-23, Globe and Mail (One of Canada's leading newspapers)
http://www.theglobeandmail.com/news/national/officers-accused-of-inciting-vio...

Three undercover officers accused of inciting protesters to attack riot police at the 2007 North American leaders summit in Montebello are being summoned to testify before Quebec's independent police ethics committee. The decision from the committee released this week overrules an independent review that exonerated the officers. It also comes more than two years after the black-clad trio were first exposed on YouTube. Dave Coles, the union leader who confronted the men at the time and filed a complaint against the police ... said he suspects an inquiry would find there was political involvement. “This is the big question: Who sent them in?” asked Mr. Coles. “And don't give me some lame excuse that it was a low-level officer.” Video images of the incident posted on YouTube showed three officers disguised as protesters wearing black tops and camouflage pants. Their faces were covered by black and white bandanas. One of them, wearing a sideways ball cap marked with graffiti, held a large stone in his hand. Mr. Coles yelled at them to show their faces and the officer carrying the rock responded with a two-handed shove.

Note: Click on the link above to watch the astonishing YouTube video of this police provocation. This is just one case that happened to be caught on film. Why are undercover police infiltrating activist groups and inciting violence at demonstrations around the world?


Bailiffs get power to use force on debtors
2008-12-21, Times of London
http://www.timesonline.co.uk/tol/news/politics/article5375668.ece

The [U.K.] government has been accused of trampling on individual liberties by proposing wide-ranging new powers for bailiffs to break into homes and to use “reasonable force” against householders who try to protect their valuables. Under the regulations, bailiffs for private firms would for the first time be given permission to restrain or pin down householders. They would also be able to force their way into homes to seize property to pay off debts, such as unpaid credit card bills and loans. “These laws strip away tried and tested protections that make a person’s home his castle, and which have stood for centuries,” said Paul Nicolson, chairman of the Zacchaeus 2000 Trust, a London-based welfare charity. “They could clearly lead to violent confrontations and undermine fundamental liberties.” Bailiffs have for hundreds of years been denied powers to break into homes for civil debt or to use force against debtors, except in self-defence. Ministers have now proposed bailiffs be given powers to physically remove debtors who try to defend their property, for example by draping themselves over a car or blocking the door of their home. Details of the new guidelines were obtained under freedom of information laws. Reasonable grounds for breaking down the door include the “movement of a curtain”, a radio being heard or a figure being spotted inside which “may be the offender”. In one case, an 89-year-old grandmother returned home to find a bailiff sitting in her chair having drawn up a list of her possessions. He was pursuing a parking fine owed by her son, who did not even live at the address.

Note: For many disturbing reports from reliable sources on threats to civil liberties, click here.


Man with tuberculosis jailed for not wearing mask
2007-04-03, CNN/Associated Press
http://www.cnn.com/2007/HEALTH/conditions/04/03/tuberculosis.confinement.ap

Behind the county hospital's tall cinderblock walls, a 27-year-old tuberculosis patient ... sits in a jail cell equipped with a ventilation system that keeps germs from escaping. Robert Daniels has been locked up indefinitely, perhaps for the rest of his life, since last July. But he has not been charged with a crime. Instead, he suffers from an extensively drug-resistant strain of tuberculosis. It is considered virtually untreatable. County health authorities obtained a court order to lock him up as a danger to the public because ... he did not heed doctors' instructions to wear a mask in public. "I'm being treated worse than an inmate," Daniels said. "I'm all alone. Four walls. Even the door to my room has been locked. I haven't seen my reflection in months." He said sheriff's deputies will not let him take a shower -- he cleans himself with wet wipes -- and have taken away his television, radio, personal phone and computer. His only visitors are masked medical staff members who come in to give him his medication. Though Daniels' confinement is extremely rare, health experts say it is a situation that U.S. public health officials may have to confront more and more because of the spread of drug-resistant TB and the emergence of diseases such as SARS and avian flu.

Note: If the above link fails, click here. What possible reason is there for taking away this man's TV, radio, cell phone, and computer? Are we being prepared for mass quarantines and imprisonment due to disease? For more, click here.


An Orwellian solution to kids skipping school
2007-02-20, Atlanta Journal-Constitution (Atlanta's leading newspaper)
http://www.ajc.com/opinion/content/opinion/stories/2007/02/19/0220truants.html

Let's say your teenager is a habitual truant and there is nothing you can do about it. A Washington area politician thinks he might have the solution: Fit the child with a Global Positioning System chip, then have police track him down. "It allows them to get caught easier," said Maryland Delegate Doyle Niemann (D-Prince George's), who recently co-sponsored legislation in the House that would use electronic surveillance as part of a broader truancy reduction plan. "It's going to be done unobtrusively. The chips are tiny and can be put into a hospital ID band or a necklace." Niemann's legislation mirrors a bill sponsored by state Sen. Gwendolyn Britt (D-Prince George's). Both would provide truants and their parents with better access to social services, such as mental health evaluations and help with schoolwork. Electronic monitoring would be a last resort. Still, the prospect of tagging children and using them in some "catch and release" hunt by police casts a pall over everything that's good about the plan. Odd how billions and billions of dollars keep going to a war that almost nobody wants, but there's never enough to fund the educational programs that nearly everybody says are needed. Aimed solely at students in Prince George's — the only predominantly black county in the Washington area — the truancy effort is called a "pilot program," a first-of-its-kind experiment. It would cost $400,000 to keep track of about 660 students a year.

Note: For more reliable information on the push to microchip the entire population, click here.


Making Martial Law Easier
2007-02-19, New York Times
http://www.nytimes.com/2007/02/19/opinion/19mon3.html?ex=1329541200&en=b63c90...

A disturbing recent phenomenon in Washington is that laws that strike to the heart of American democracy have been passed in the dead of night. So it was with a provision quietly tucked into the enormous defense budget bill at the Bush administration’s behest that makes it easier for a president to override local control of law enforcement and declare martial law. The provision, signed into law in October, weakens two obscure but important bulwarks of liberty. One is the doctrine that bars military forces, including a federalized National Guard, from engaging in law enforcement. The other is the Insurrection Act of 1807, which ... essentially limits a president’s use of the military in law enforcement to putting down lawlessness, insurrection and rebellion, where a state is violating federal law or depriving people of constitutional rights. The newly enacted provisions upset this careful balance. The president may now use military troops as a domestic police force in response to a natural disaster, a disease outbreak, terrorist attack or to any “other condition.” Changes of this magnitude should be made only after a thorough public airing. But these new presidential powers were slipped into the law without hearings or public debate. The president made no mention of the changes when he signed the measure, and neither the White House nor Congress consulted in advance with the nation’s governors.


Opium, thugs bloom under U.S. policies in Afghanistan war
2006-12-17, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/12/17/ING08MTPMB1.DTL

The Taliban ... briefly banned poppy cultivation in 2000 in an effort to gain U.S. diplomatic recognition and aid. When the Bush administration invaded Afghanistan in October 2001, poppies were grown on only 7,600 hectares. Under the American occupation ... poppy cultivation spread to every province, and overall production has increased exponentially ever since -- this year by 60 percent. Within Afghanistan, where perhaps 3 million people draw direct income from poppy, profits may reach $3 billion this year. In-country profit adds up to an estimated 60 percent of Afghanistan's gross domestic product, or more than half the country's annual income. Afghanistan provides 92 percent of the world's heroin. Through many administrations, the U.S. government has been implicated in the Afghan drug trade. Before the American and Pakistani-sponsored mujahedeen took on the Soviets in 1979, Afghanistan produced a very small amount of opium for regional markets, and no heroin at all. By the end of the jihad against the Soviet army, it was the world's top producer of both drugs. The CIA made it all possible by providing legal cover for these operations. The United States [encouraged] Islamist extremists (then "our" soldiers) and ... set the stage for the Taliban. [Currently,] President Hamid Karzai['s] strategy is to avoid confrontation, befriend potential adversaries and give them offices, often in his Cabinet. The trade penetrates even the elected Parliament. Among the 249 members of the Wolesi Jirga (lower house) are at least 17 known drug traffickers, in addition to 40 commanders of armed militias, 24 members of criminal gangs, and 19 men facing serious allegations of war crimes.

Note: Could it be that some U.S. officials are turning a blind eye, or even supporting this drug trade? For some very strong evidence of this from a former award-winning DEA agent turned journalist and author, click here.


Insiders' stock sale-purchase ratio widens
2006-12-07, Chicago Tribune/Bloomberg
http://www.chicagotribune.com/business/chi-0612070153dec07,0,3801935.story

Stock sales by America's corporate leaders exceeded purchases last month by the widest ratio in nearly 20 years. Executives sold $63.18 of shares for every $1 they bought in November, the largest ratio since at least January 1987. U.S. securities laws require company executives and directors to disclose stock purchases or sales within two business days. Insiders sold $8.4 billion in shares last month, according to data compiled from SEC filings. Buying was ... $133 million. The overall insider-selling amount was the fifth-highest since 1987. Selling peaked at $13.9 billion in March 2000. The data have "value for investors," said Wayne Reisner at Carret Asset Management in New York. "It's people who are very familiar with their company and their stock." Insiders executed 6.34 sales transactions for each purchase transaction in the eight weeks ended Dec. 1. That's up from 2.45 in the period ended Aug. 4 and above the ratio of 2.25 he considers neutral for the market. Microsoft ranked first among U.S. companies, with $594.2 million in sales by insiders in November. Seagate Technology and DreamWorks Animation SKG Inc. ranked second and third, at $311.8 million and $224.2 million, respectively. Google Inc. was fourth, at $182.1 million.

Note: Isn't it interesting that the NASDAQ stock index reached it's all-time high in March 2000, the exact month executive stock selling hit its record, and just prior to the huge NASDAQ crash. Is it possible that corporate executives knew something the rest of us didn't?


Pentagon resists pleas for help in Afghan opium fight
2006-12-05, Los Angeles Times
http://www.latimes.com/news/nationworld/washingtondc/la-fg-afghandrugs5dec05,...

The Pentagon ... has resisted entreaties from U.S. anti-narcotics officials to play an aggressive role in the faltering campaign to curb the country's opium trade. Military units in Afghanistan largely overlook drug bazaars, rebuff some requests to take U.S. drug agents on raids and do little to counter the organized crime syndicates shipping the drug to Europe, Asia and, increasingly, the United States. Poppy cultivation has exploded, increasing by more than half this year. Afghanistan supplies about 92% of the world's opium. "It is surprising to me that we have allowed things to get to the point that they have," said ... a former top State Department counter-narcotics official. Outgoing Defense Secretary Donald H. Rumsfeld has said that Afghanistan's flourishing opium trade is a law enforcement problem, not a military one. The opium trade is one-third of the country's economy. Several dozen kingpins ... have become more brazen, richer and powerful. [They] openly run huge opium bazaars and labs that turn opium into heroin. [The] head of the United Nations Office on Drugs and Crime said ... that the location of major drug operations were "well-known to us and to the authorities." The Pentagon has balked at drug interdiction efforts even when it had the resources, said a former senior U.S. anti-drug official. "There were [drug] convoys where military people looked the other way," the former official said. "DEA would identify a lab to go hit or a storage facility and [the Pentagon] would find a reason to ground the helicopters." A recent congressional report said the DEA asked the Pentagon for airlifts on 26 occasions in 2005, and the requests were denied in all but three cases.

Note: Some observers and insiders believe the reason Afghanistan was attacked is because the Taliban had virtually stopped the opium trade in 2001. For reliable evidence supporting these allegations, click here.


Classified intelligence bills often are unread
2006-08-06, Boston Globe
http://www.boston.com/news/nation/washington/articles/2006/08/06/classified_i...

Nearly all members of the House of Representatives opted out of a chance to read this year's classified intelligence bill, and then voted on secret provisions they knew almost nothing about. The bill, which passed by 327 to 96 in April, authorized the Bush administration's plans for fighting the war on terrorism. Many members say they faced an untenable choice: Either consent to a review process so secretive that they could never mention anything about it in House debates, under the threat of prosecution, or vote on classified provisions they knew nothing about. Most chose to know nothing. A Globe survey sent to all members of the House, [revealed] the vast majority of the respondents ... said they typically don't read the classified parts of intelligence bills. The failure to read the bill, however, calls into question the vows of many House members to provide greater oversight of intelligence. The rules make open debate on intelligence policy and funding nearly impossible, lawmakers say. Revealing classified secrets has long been a crime, punishable by expulsion from the House and criminal prosecution. Operating largely in secret, the intelligence panels have a limited staff because of the security clearances involved. Further, committee members can't go to outside experts to vet policies or give advice, leaving members with no way to fact-check the administration's assertions. Democratic and Republican leaders are no longer briefed together, raising questions about whether the two leaders are being told the same things.

Note: If above link fails, click here. If you want to understand how U.S. Congressional representatives are kept in the dark and easily manipulated when it comes to intelligence matters, this article is a must read.


Protesters challenge the powerful at exclusive California retreat
2006-07-22, San Francisco Chronicle
http://www.sfgate.com/cgi-bin/article.cgi?f=/n/a/2006/07/22/state/n163157D01.DTL

Hundreds of protesters gathered outside an exclusive California retreat for government and business leaders Saturday to challenge the right of a "ruling elite" to make policy decisions without public scrutiny. The annual Bohemian Grove retreat has attracted powerful men such as Ronald Reagan, George Bush, former Secretary of State Henry Kissinger, philanthropist David Rockefeller, former West German Chancellor Helmut Schmidt and former House Speaker Newt Gingrich. It's also become a magnet for all types of activists who increasingly use the event to network and organize their campaigns. The men who attend the Bohemian Grove retreat spend two weeks performing plays, eating gourmet camp grub, listening to speakers and power-bonding at the 2,700-acre compound near the Russian River in Sonoma County. The retreat is organized by the exclusive San Francisco-based Bohemian Club. The club and event are shrouded in mystery, much like Yale University's most-famous secret society, Skull and Bones, whose members include President George W. Bush and his presidential rival Sen. John Kerry.

Note: This article strangely has been removed from the San Francisco Chronicle website. To see it in the Internet Archive, click here. For an informative five-minute ABC news clip on the power elite gathering Bohemian Grove reported in 1981, click here. And for reliable information on the most secretive meeting of the world's elite reported by the major media, see our Bilderberg Group compilation available here.


Nationwide Child Abuse Ring In Free Discovery Channel Documentary
2006-05-01, Discovery Channel/WantToKnow.info
http://www.WantToKnow.info/060501conspiracyofsilence

"Conspiracy of Silence" is a powerful, disturbing documentary revealing a nationwide child abuse and pedophilia ring that leads to the highest levels of government. Featuring intrepid investigator John DeCamp, a highly decorated Vietnam war veteran and 16-year Nebraska state senator, "Conspiracy of Silence" reveals how rogue elements at all levels of government have been involved in systematic child abuse and pedophilia to feed the base desires of key politicians. Based on DeCamp's riveting book, The Franklin Cover-up, "Conspiracy of Silence" begins with the shut-down of Nebraska's Franklin Community Federal Credit Union after a raid by federal agencies in November 1988 revealed that $40 million was missing. When the Nebraska legislature launched a probe into the affair, what initially looked like a financial swindle soon exploded into a startling tale of drugs, money laundering, and a nationwide child abuse ring. Nineteen months later, the legislative committee's chief investigator died suddenly and violently, like more than a dozen other people linked to the Franklin case.


John K. Vance; Uncovered LSD Project at CIA
2005-06-16, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2005/06/15/AR20050615026...

John K. Vance [was] a member of the Central Intelligence Agency inspector general's staff in the early 1960s who discovered that the agency was running a research project that included administering LSD and other drugs to unwitting human subjects. Code-named MKULTRA (and pronounced m-k-ultra), the project Mr. Vance uncovered was the brainchild of CIA Director Allen Dulles, who was intrigued by reports of mind-control techniques allegedly conducted by Soviet, Chinese and North Korean agents on U.S. prisoners of war during the Korean War. The CIA wanted to use similar techniques on its own POWs and perhaps use LSD or other mind-bending substances on foreign leaders, including Cuba's Fidel Castro a few years after the project got underway in 1953. Heading MKULTRA was a CIA chemist named Sidney Gottlieb. In congressional testimony, Gottlieb, who died in 1999, acknowledged that the agency had administered LSD to as many as 40 unwitting subjects, including prison inmates and patrons of brothels set up and run by the agency. At least one participant died when he jumped out of a 10th-floor window in a hotel; others claimed to have suffered serious psychological damage. Mr. Vance learned about MKULTRA in the spring of 1963 during a wide-ranging inspector general survey of the agency's technical services division. The inspector general's report said: "The concepts involved in manipulating human behavior are found by many people both within and outside the agency to be distasteful and unethical." MKULTRA came to public light in 1977 as a result of hearings conducted by a Senate committee on intelligence chaired by Sen. Frank Church (D-Idaho).

Note: If the above link fails, click here. For an excellent two-page summary of reliable verifiable information on CIA mind control programs which clearly violated ethical and moral standards, click here.


Air Force pursuing antimatter weapons
2004-10-04, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2004/10/04/MNGM393GPK1.DTL

The U.S. Air Force is quietly spending millions of dollars investigating ways to use a radical power source -- antimatter, the eerie "mirror" of ordinary matter -- in future weapons. The most powerful potential energy source presently thought to be available to humanity, antimatter is a term normally heard in science-fiction films. But antimatter itself isn't fiction. During the Cold War, the Air Force funded numerous scientific studies of the basic physics of antimatter. Following an initial inquiry from The Chronicle this summer, the Air Force forbade its employees from publicly discussing the antimatter research program. Still, details on the program appear in numerous Air Force documents distributed over the Internet prior to the ban. It almost defies belief, the amount of explosive force available in a speck of antimatter. One millionth of a gram of positrons contain as much energy as 37.8 kilograms (83 pounds) of TNT. A simple calculation, then, shows that about 50-millionths of a gram could generate a blast equal to the explosion ... in Oklahoma City in 1995. Officials at Eglin Air Force Base initially agreed enthusiastically to try to arrange an interview with ... Kenneth Edwards, director of the "revolutionary munitions" team at the Munitions Directorate at Eglin. "We're all very excited about this technology," spokesman Rex Swenson [said] in late July. But Swenson backed out in August after he was overruled by higher officials in the Air Force and Pentagon. Reached by phone in late September, Edwards repeatedly declined to be interviewed. His superiors gave him "strict instructions not to give any interviews personally. "I'm sorry about that -- this (antimatter) project is sort of my grandchild."


Skull And Bones
2004-06-13, CBS News
http://www.cbsnews.com/stories/2003/10/02/60minutes/main576332.shtml

As opposite as George Bush and John Kerry may seem to be, they do share a common secret - one they've shared for decades. The secret: details of their membership in Skull and Bones, the elite Yale University society whose members include some of the most powerful men of the 20th century. Bonesmen, as they're called, are forbidden to reveal what goes on in their inner sanctum. Bones has included presidents, cabinet officers, spies, Supreme Court justices, [and] captains of industry. They'd responded to questions with utter silence until an enterprising Yale graduate, Alexandra Robbins, managed to penetrate the wall of silence in her book, Secrets of the Tomb. "I spoke with about 100 members of Skull and Bones. They were members who were tired of the secrecy,” says Robbins. “But probably twice that number hung up on me, harassed me, or threatened me.” Skull and Bones, with all its ritual and macabre relics, was founded in 1832. Since then, it has chosen or "tapped" only 15 senior students a year who become ... lifetime members of the ultimate old boys' club. A lot of Bonesmen have gone on to positions of great power. President Bush ... tapped five fellow Bonesmen to join his administration. Bonesmen have [included] William Howard Taft, the 27th President; Henry Luce, the founder of Time Magazine; and W. Averell Harriman, the diplomat and confidant of U.S. presidents. Mr. Bush, like his father and grandfather before him, has refused to talk openly about Skull and Bones. But as a Bonesman, he was required to reveal his innermost secrets to his fellow Bones initiates. They're supposed to recount their entire sexual histories in ... a dimly-lit cozy room.

Note: For a highly revealing, four-minute CNN News clip on Skull and Bones, click here. For other major media news clips reporting on this powerful secret society, click here. And for lots more reliable information from major media sources on powerful, secret groups like this, click here.


FBI let innocents get death sentences
2003-11-22, Sydney Morning Herald (Australia's leading newspaper)
http://www.smh.com.au/articles/2003/11/21/1069027333534.html

The FBI used murderers as informants in Boston for three decades, even allowing innocent men to be sentenced to death to protect the secret operation, a government report has found. The FBI's policy "must be considered one of the greatest failures in the history of federal law enforcement" and had "disastrous consequences", the report by the House Committee on Government Reform said. More than 20 people were murdered by FBI informants in Boston from 1965, often with the help of FBI agents, it said. But no FBI agent or official has ever been disciplined. The FBI's policy of using murderers grew out of a belated effort by a former director, J. Edgar Hoover, to go after the Mafia, which Hoover had earlier denied even existed. In the early 1960s, the bureau began recruiting underworld informers in its new campaign. The report focuses heavily on one episode, the 1965 murder of Edward Deegan, a small-time hoodlum who was killed by Jimmy Flemmi and Joseph Barboza, who had just been recruited by an FBI agent in Boston. The FBI knew the two men were the killers because it had been using an unauthorised wire tap and had heard Flemmi ask the Mafia boss, Raymond Patriarca, for permission to kill Deegan. A few days later, Deegan was shot dead. Four men who had nothing to do with the killing were tried and convicted, with two sentenced to death and two to life in prison. Two of the men died in prison and two had their sentences commuted and were freed after serving 30 years behind bars. Hoover was kept fully informed about this murder and the wrongful convictions, the report said.


Eugenics and the Nazis -- the California connection
2003-11-09, San Francisco Chronicle (San Francisco's leading newspaper)
http://articles.sfgate.com/2003-11-09/opinion/17517477_1_eugenics-ethnic-clea...

Hitler and his henchmen victimized an entire continent and exterminated millions in his quest for a so-called Master Race. But the concept of a white, blond-haired, blue-eyed master Nordic race didn't originate with Hitler. The idea was created in the United States, and cultivated in California, decades before Hitler came to power. Eugenics would have been so much bizarre parlor talk had it not been for extensive financing by corporate philanthropies, specifically the Carnegie Institution, the Rockefeller Foundation and the Harriman railroad fortune. They were all in league with some of America's most respected scientists from such prestigious universities as Stanford, Yale, Harvard and Princeton. These academicians espoused race theory and race science, and then faked and twisted data to serve eugenics' racist aims. Stanford President David Starr Jordan originated the notion of "race and blood" in his 1902 racial epistle "Blood of a Nation," in which the university scholar declared that human qualities and conditions such as talent and poverty were passed through the blood. The Rockefeller Foundation helped found the German eugenics program and even funded the program that Josef Mengele worked in before he went to Auschwitz.

Note: Josef Mengele's US-funded eugenics research laid the foundation for his experimentation on human subjects before and during World War II. He went on to participate in CIA-funded mind-control experimentation after that war. For more on Mengele, click here.


Did LBJ Cover For Israel?
2003-10-23, CBS News/Associated Press
http://www.cbsnews.com/stories/2003/10/23/national/main579649.shtml

A former Navy attorney who helped lead the military investigation of the 1967 Israeli attack on the USS Liberty that killed 34 American servicemen says former President Lyndon Johnson and his defense secretary, Robert McNamara, ordered that the inquiry conclude the incident was an accident. Retired Capt. Ward Boston said Johnson and McNamara told those heading the Navy's inquiry to "conclude that the attack was a case of 'mistaken identity' despite overwhelming evidence to the contrary." Boston was senior legal counsel to the Navy's original 1967 review of the attack. He said in the sworn statement that he stayed silent for years because ... "when orders come ... I follow them." The USS Liberty was an electronic intelligence-gathering ship that was cruising international waters off the Egyptian coast on June 8, 1967. Israeli planes and torpedo boats opened fire on the Liberty. It was "one of the classic all-American cover-ups," said Ret. Adm. Thomas Moorer, a former Joint Chiefs of Staff chairman who spent a year investigating the attack as part of an independent panel he formed with other former military officials. The panel also included a former U.S. ambassador to Saudi Arabia, James Akins. David Lewis of Lemington, Vt., was on the Liberty when it was attacked. In an interview, he said Israel had to know it was targeting an American ship. He said a U.S. flag was flying that day and Israel shot it full of holes. The sailors on the ship, he said, quickly hoisted another American flag, a much bigger one, to show Israel it was a U.S. vessel.

Note: For lots more on this major cover-up by a U.S. president and top military officers, click here. ABC producer James Bamford, who exposed the Operation Northwoods cover-up, also has an excellent chapter on this event in his highly revealing book, Body of Secrets, about the National Security Agency.


This war on terrorism is bogus (by past U.K. Minister of Environment)
2003-09-06, The Guardian (One of the U.K.'s leading newspapers)
http://www.guardian.co.uk/comment/story/0,3604,1036571,00.html

At least 11 countries provided advance warning to the US of the 9/11 attacks. Two senior Mossad experts were sent to Washington in August 2001 to alert the CIA and FBI to a cell of 200 terrorists said to be preparing a big operation. The list they provided included the names of four of the 9/11 hijackers, none of whom was arrested. In November 2001 the US airforce complained it had had al-Qaida and Taliban leaders in its sights as many as 10 times over the previous six weeks, but had been unable to attack because they did not receive permission quickly enough. The BBC reported [that] a former Pakistan foreign secretary was told by senior American officials at a meeting in Berlin in mid-July 2001 that "military action against Afghanistan would go ahead by the middle of October". Zacarias Moussaoui ... was arrested in August 2001. One agent wrote, a month before 9/11, that Moussaoui might be planning to crash into the Twin Towers. US agents ... sought a warrant to search his computer. They were turned down by the FBI. [A] PNAC blueprint supports an earlier document ... which said the US must "discourage advanced industrial nations from challenging our leadership". The document also calls for the creation of "US space forces" to dominate space, and the total control of cyberspace to prevent "enemies" using the internet. It also hints that the US may consider developing biological weapons "that can target specific genotypes [and] may transform biological warfare from the realm of terror to a politically useful tool". The conclusion of all this analysis must surely be that the "global war on terrorism" has the hallmarks of a political myth propagated to pave the way for a wholly different agenda - the US goal of world hegemony, built around securing by force command over the oil supplies required to drive the whole project.

Note: This is one of the very few articles recommended as a must read. Michael Meacher was the U.K. Minister of Environment from May 1997 to June 2003. Mr. Meacher lays out a wealth of highly revealing information backed by reliable sources. To confirm most of his statements on our 9/11 timeline, click here. Mr. Meacher's cliams were reported on BBC News, as well, though the BBC mentioned amazingly little on his claims of U.S. involvement in 9/11. To see the BBC article click here.


What Did the C.I.A. Do to His Father?
2001-04-01, New York Times
http://query.nytimes.com/gst/fullpage.html?sec=health&res=9D02E2DE113CF932A35...

For a quarter of a century, [Eric Olson] has believed that the Central Intelligence Agency murdered his father, a United States government scientist. On Nov. 28, 1953, around 2 a.m. [the] night manager at the Statler Hotel ... in New York rushed out the front door ... to find a middle-aged man lying on the sidewalk. The man had fallen from the 10th floor -- apparently after crashing through a closed window. [In late July, 1975] the C.I.A.'s director, William Colby [provided Olson's] family ... declassified documents relating to Frank Olson's death. Olson had not been a civilian employee of the Department of the Army. He had been a C.I.A. employee working at Fort Detrick. Olson's specialty, it turned out, had been the development of aerosols for the delivery of anthrax. The Colby documents were ... full of unexplained terms like the ''Artichoke'' and ''Bluebird'' projects. These turned out to be the precursors of what became known as MK-ULTRA, a C.I.A. project, beginning in the Korean War, to explore the use of drugs like LSD as truth serums, as well as botulism and anthrax, for use in covert assassination. The documents claimed that during a meeting between the C.I.A. and Fort Detrick scientists ... on Nov. 19,1953, Sidney Gottlieb of the C.I.A. slipped LSD into Olson's glass of Cointreau. Olson, a scientist by training, would have known that he was working for a government that had put Nazi scientists on trial at Nuremberg for immoral experiments on human beings. Now, in the late summer of 1953, [Olson] faced up to the possibility that his own government was doing the same thing. Slipping LSD into Olson's Cointreau was ... designed to get him to talk ... to assess what kind of risk he posed and then eliminate him if necessary.

Note: For those interested in this vital, yet disturbing topic, the entire Times article is well worth reading. For further verifiable information on the CIA mind control programs mentioned in this article, click here.


Today's News Is Brought to You by Big Brother
2000-02-27, Los Angeles Times
http://www.wanttoknow.info/mass_media/CNN-psyops-la-times-000327

A handful of military personnel from the 4th Psychological Operations Group, based at Fort Bragg, NC, have until recently been working in CNN's headquarters in Atlanta. [A] Dutch journalist named Abe de Vries came up with this important story ... and remains properly astounded that no mainstream news medium in the US has evinced any interest in it. De Vries ... originally [came] upon the story [following] a military symposium in Arlington, VA that discussed the use of the press in military operations. De Vries saw a good story, picked up the phone, and finally reached Maj. Thomas Collins of the US Army Information Service, who duly confirmed the presence of these Army psy-ops experts at CNN. "Psy-ops personnel, soldiers, and officers," De Vries quoted Collins as telling him, "have been working in CNN's headquarters ... through our program, training with industry. They helped in the production of news." Eason Jordan, who identified himself as CNN's president of news-gathering and international networks, [confirmed] that CNN had hosted a total of five interns from US Army psy-ops. Jordan said the program began ... just before the end of the war against Serbia and only recently terminated. Executives at CNN now describe the Army psy-ops intern tours at CNN as having been insignificant. The commanding officer of the psy-ops group certainly thought them of sufficient significance to mention at that high-level Pentagon powwow in Arlington about propaganda and psychological warfare.

Note: This article strangely has been removed from the Los Angeles Times archives. The link above shows a scanned image of the actual newspaper. The article was first published in the San Jose Mercury News on March 23, 2000, though the article is also strangely not available in their archives. U.S. Congressional testimony in the 1970s revealed that the CIA paid employees of major media networks to influence public opinion. The CIA's Operation Mockingbird revealed blatant efforts by the CIA to manipulate public opinion in the U.S., thus violating its charter.


Professor Feels Himself Become Closer to the Machine
1998-09-23, ABC News
http://web.archive.org/web/20001109140100/http://more.abcnews.go.com/sections...

When Kevin Warwick enters his office building on the campus of Reading University, strange things happen. As Warwick heads down the main hall, lights turn on. When he turns to the right, an office door unbolts and opens. Each step is clocked and recorded. The building knows who he is, where he is, and what he expects to happen. The building [even] says, “Hello Professor Warwick.” The structure knows Warwick because of the electrical fuse-sized “smart card” implanted in his left arm. In Britain, he’s been dubbed “The Cyborg Man,” the first person known to have a microchip implanted in his body for communication with outside machines. Warwick predicts chip implants will one day replace time cards, criminal tracking devices, even credit cards. Capable of carrying huge amounts of data, they may, he says, one day be used to identify individuals by Social Security numbers, blood type, even their banking information. No one knows yet how the body will respond to this type of invasion. Warwick is not blind to the ethical questions of this technology. Implants ostensibly designed to clock workers in and out might be misused to monitor where people are at all times and who they are meeting. Governments could move to use implants instead of I.D. cards and passports, but what would stop them from using this new science to invade privacy? “I feel mentally different. When I am in the building I feel much more closely connected with the computer.

Note: Those who would like to control the public named these implants "smart cards" to encourage us to accept them. For more reliable information on important topic, click here and here.


Modern art was CIA 'weapon'
1995-10-22, The Independent (One of the UK's leading newspapers)
http://www.independent.co.uk/news/world/modern-art-was-cia-weapon-1578808.html

For decades in art circles it was either a rumour or a joke, but now it is confirmed as a fact. The Central Intelligence Agency used American modern art - including the works of such artists as Jackson Pollock, Robert Motherwell, Willem de Kooning and Mark Rothko - as a weapon in the Cold War. The CIA fostered and promoted American Abstract Expressionist painting around the world for more than 20 years. This was a period, in the 1950s and 1960s, when the great majority of Americans disliked or even despised modern art. Why did the CIA support them? Because in the propaganda war with the Soviet Union, this new artistic movement could be held up as proof of the creativity, the intellectual freedom, and the cultural power of the US. Russian art, strapped into the communist ideological straitjacket, could not compete. The existence of this policy, rumoured and disputed for many years, has now been confirmed for the first time by former CIA officials. The decision to include culture and art in the US Cold War arsenal was taken as soon as the CIA was founded in 1947. Dismayed at the appeal communism still had for many intellectuals and artists in the West, the new agency set up a division, the Propaganda Assets Inventory, which at its peak could influence more than 800 newspapers, magazines and public information organisations. They joked that it was like a Wurlitzer jukebox: when the CIA pushed a button it could hear whatever tune it wanted playing across the world. Unknown to the artists, the new American art was secretly promoted under a policy known as the "long leash." [This] centrepiece of the CIA campaign ... a vast jamboree of intellectuals, writers, historians, poets, and artists ... was set up with CIA funds in 1950 and run by a CIA agent. At its height, it had offices in 35 countries and published more than two dozen magazines.

Note: Read the entire article at the link above to learn how the CIA secretly funnels money through cooperative millionaires. To this day, the CIA has agents in key press positions to stop stories they don't want or to promote their own pieces widely in the media. For more along these lines, see concise summaries of deeply revealing media corruption news articles and intelligence agency news articles, all from reliable major media sources.


Iran-Contra Hearing; North's Testimony: 'Fall Guy' and Foreign Policy
1987-07-14, New York Times
http://www.nytimes.com/1987/07/14/world/iran-contra-hearings-north-s-testimon...

REPRESENTATIVE JACK BROOKS, Democrat of Texas. Colonel North, in your work at the N.S.C., were you not assigned, at one time, to work on plans for the continuity of government in the event of a major disaster? SENATOR DANIEL K. INOUYE, Democrat of Hawaii. I believe that question touches upon a highly sensitive and classified area so may I request that you not touch upon that. MR. BROOKS. I was particularly concerned, Mr. Chairman, because I read in Miami papers, and several others, that there had been a plan developed, by that same agency, a contingency plan in the event of emergency, that would suspend the American Constitution. And I was deeply concerned about it and wondered if that was the area in which he had worked. I believe that it was, and I wanted to get his confirmation. MR. INOUYE. May I most respectfully request that that matter not be touched upon, at this stage. If we wish to get into this, I'm certain arrangements can be made for an executive session.

Note: Why was the chairman not allowing a discussion of the fact that plans were being made in the event of an emergency for the suspension of the U.S. Constitution? To watch a two-minute video which includes this testimony, click here.


Reagan Advisers Ran 'Secret' Government
1987-07-05, Miami Herald
http://nl.newsbank.com/nl-search/we/Archives?p_product=MH&p_theme=mh&p_action...

Some of President Reagan’s top advisers have operated a virtual parallel government outside the traditional Cabinet departments and agencies almost from the day Reagan took office, congressional investigators and administration officials have concluded. Investigators believe that the advisers’ activities extended well beyond the secret arms sales to Iran and aid to the contras now under investigation. Lt. Col. Oliver North, for example, helped draw up a controversial plan to suspend the Constitution in the event of a national crisis, such as nuclear war, violent and widespread internal dissent or national opposition to a U.S. military invasion abroad. The advisers conducted their activities through secret contacts throughout the government with persons who acted at their direction but did not officially report to them. The activities of those contacts were coordinated by the National Security Council, the officials and investigators said. There appears to have been no formal directive for the advisers’ activities, which knowledgeable sources described as a parallel government. In a secret assessment of the activities, the lead counsel for the Senate Iran-contra committee called it a “secret government-within-a-government.” The arrangement permitted Reagan administration officials to claim that they were not involved in controversial or illegal activities, the officials said. “It was the ultimate plausible deniability,” said a well-briefed official who has served the Reagan administration since 1982 and who often collaborated on covert assistance to the Nicaraguan contras.

Note: See a downloaded copy of this article and the amazing full text. A recent Boston Globe article suggests that US national security policy continues to be made by concealed, unaccountable institutions within a corrupt government.


Moore Asks Inquiry Into Charges on Preparedness Campaign
1917-02-14, New York Times
http://query.nytimes.com/gst/abstract.html?res=9504E7DA1538EE32A25757C1A9649C...

A demand for an investigation of charges printed in the Congressional Record by Representative Oscar Callaway of Texas, a pacifist Democrat, that “the J.P. Morgan interests, the steel shipbuilding, and powder interests” had purchased control of twenty-five great newspapers to further the preparedness campaign, was made in the House today by Representative J. Hampton Moore, a Pennsylvania Republican. Mr. Callaway’s speech, as inserted in The Record charged: “In March, 1915, the J.P. Morgan interests, the steel, shipbuilding and powder interests, and their subsidiary organizations got together twelve men high up in the newspaper world and employed them to select from the most influential papers in the United States in sufficient numbers of them to control generally the policy of the daily press of the United States. They found it was only necessary to purchase the control of twenty-five of the greatest newspapers. [An] editor was furnished for each paper to properly supervise and edit information regarding the questions of preparedness, militarism, financial policies and other things of national and international nature considered vital to the interests of the purchasers. The policy also included the suppression of everything in opposition to the wishes of the interests served."

Note: For more showing how the media is controlled by carefully selected people placed by big money and the power elite, click here and here. For a short video of Congressional testimony from the 1970s proving CIA media manipulation, click here. The full text of this revealing article is available free at this link.


Forget the FBI cache; the Podesta emails show how America is run
2016-10-31, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/commentisfree/2016/oct/31/the-podesta-emails-show...

WikiLeaks’ dump of messages to and from Clinton’s campaign chief offer an unprecedented view into the workings of the elite, and how it looks after itself. The emails [are] being slowly released ... from the hacked account of Hillary Clinton’s campaign chair John Podesta. Their significance goes far beyond mere scandal: they ... furnish us with an opportunity to observe the upper reaches of the American status hierarchy. In one now-famous email chain, for example, the reader can watch current US trade representative Michael Froman, writing from a Citibank email address in 2008, appear to name President Obama’s cabinet even before the great hope-and-change election was decided. This genre of Podesta email, in which people try to arrange jobs for themselves or their kids, points us toward the most fundamental thing we know about the people at the top of this class: their loyalty to one another and the way it overrides everything else. Of course Hillary Clinton staffed her state department with investment bankers and then did speaking engagements for investment banks as soon as she was done at the state department. Of course she appears to think that any kind of bank reform should “come from the industry itself”. And of course no elite bankers were ever prosecuted by the Obama administration. Read these emails and you understand, with a start, that the people at the top tier of American life all know each other. They are all engaged in promoting one another’s careers, constantly.

Note: For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


Snowden: New Zealand’s Prime Minister Isn’t Telling the Truth About Mass Surveillance
2014-09-15, The Intercept
https://firstlook.org/theintercept/2014/09/15/snowden-new-zealand-surveillance

Prime Minister John Key ... has denied that New Zealand’s spy agency GCSB engages in mass surveillance, mostly as a means of convincing the country to enact a new law vesting the agency with greater powers. Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. If you live in New Zealand, you are being watched. At the NSA I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called “XKEYSCORE.” It allows total, granular access to the database of communications collected in the course of mass surveillance. It is not limited to or even used largely for the purposes of cybersecurity, as has been claimed, but is instead used primarily for reading individuals’ private email, text messages, and internet traffic. I know this because it was my full-time job in Hawaii, where I worked every day in an NSA facility with a top secret clearance. The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks. It means they have the ability see every website you visit, every text message you send, every call you make, every ticket you purchase, every donation you make, and every book you order online. From “I’m headed to church” to “I hate my boss” to “She’s in the hospital,” the GCSB is there. Your words are intercepted, stored, and analyzed by algorithms long before they’re ever read by your intended recipient.

Note: New Zealand's prime minister has acknowledged that Snowden may be right, as reported in this article. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


The U.S. Government’s Secret Plans to Spy for American Corporations
2014-09-05, The Intercept
https://firstlook.org/theintercept/2014/09/05/us-governments-plans-use-econom...

Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. [But] the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations. But a secret 2009 report issued by [Director of National Intelligence James Clapper's] office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies. One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence”.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Mysterious Phony Cell Towers Could Be Intercepting Your Calls
2014-08-27, Popular Science
http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-b...

Les Goldsmith, the CEO of ESD America [marketers of the Crytophone 500], points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device. “Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.” Who is running these interceptors and what are they doing with the calls? Goldsmith says we can’t be sure, but he has his suspicions. “Are some of them U.S. government interceptors?” [asks] Goldsmith. Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. For governments or other entities able to afford a price tag of “less than $100,000,” says Goldsmith, high-quality interceptors are quite realistic. Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example.

Note: Do you think the government might have put up fake cell towers to nab more data? For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


The Surveillance Engine: How the NSA Built Its Own Secret Google
2014-08-25, The Intercept
https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-c...

The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. ICREACH [as the search engine is called] contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy. ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


The ultimate goal of the NSA is total population control
2014-07-11, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the...

William Binney is one of the highest-level whistleblowers [to] emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance. On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations. “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.” Binney ... described a future where surveillance is ubiquitous and government intrusion unlimited. “The ultimate goal of the NSA is total population control”, Binney said. He praised the revelations and bravery of former NSA contractor Edward Snowden. Unlike Snowden, Binney didn’t take any documents with him when he left the NSA. He now says that hard evidence of illegal spying would have been invaluable. The latest Snowden leaks, featured in the Washington Post, detail private conversations of average Americans with no connection to extremism. It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Court gave NSA broad leeway in surveillance, documents show
2014-06-30, Washington Post
http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-le...

A classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well. The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency. The documents underscore the remarkable breadth of potential “foreign intelligence” collection. An affidavit in support of the 2010 foreign-government certification said the NSA believes that foreigners who will be targeted for collection “possess, are expected to receive and/or are likely to communicate foreign intelligence information concerning these foreign powers.” That language could allow for surveillance of academics, journalists and human rights researchers. A Swiss academic who has information on the German government’s position in the run-up to an international trade negotiation, for instance, could be targeted if the government has determined there is a foreign-intelligence need for that information. If a U.S. college professor e-mails the Swiss professor’s e-mail address or phone number to a colleague, the American’s e-mail could be collected as well, under the program’s court-approved rules.

Note: For more on this, see concise summaries of deeply revealing intelligence agency news articles from reliable major media sources.


US Pushing Local Cops to Stay Mum on Surveillance
2014-06-12, ABC News/Associated Press
http://abcnews.go.com/Politics/wireStory/us-pushing-local-cops-stay-mum-surve...

The Obama administration has been quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods. Citing security reasons, the U.S. has intervened in routine state public records cases and criminal trials regarding use of the technology. This has resulted in police departments withholding materials or heavily censoring documents in rare instances when they disclose any [information] about the purchase and use of such powerful surveillance equipment. One well-known type of this surveillance equipment is known as a Stingray. The equipment tricks cellphones into identifying some of their owners' account information, like a unique subscriber number, and transmitting data to police as if it were a phone company's tower. That allows police to obtain cellphone information without having to ask for help from service providers ... and can locate a phone without the user even making a call or sending a text message. The Obama administration is asking agencies to withhold common information about the equipment, such as how the technology is used and how to turn it on. "These extreme secrecy efforts are in relation to very controversial, local government surveillance practices using highly invasive technology," said Nathan Freed Wessler, a staff attorney with the American Civil Liberties Union, which has fought for the release of these types of records. "People should have the facts about what the government is doing to them."

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Vodafone: governments use secret cables to tap phones
2014-06-06, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/technology/internet-security/10880208/Vodafone-gov...

Government agencies are able to listen to phone conversations live and even track the location of citizens without warrants using secret cables connected directly to network equipment, admits Vodafone today. The company said that secret wires have been connected to its network and those belonging to competitors, giving government agencies the ability to tap in to phone and broadband traffic. In many countries this is mandatory for all telecoms companies, it said. Vodafone is today publishing its first Law Enforcement Disclosure Report which will describe exactly how the governments it deals with are eavesdropping on citizens. It is calling for an end to the use of “direct access” eavesdropping and transparency on the number of warrants issued giving access to private data. Gus Hosein, executive director of Privacy International, said: "Vodafone is taking a commendable step by taking this issue on at an international scale. And they are trying to identify the legal basis for governments' claimed powers. Governments around the world are unashamedly abusing privacy by demanding access to communications and data, and alarmingly, sometimes granting themselves direct access to the networks. Now that Vodafone has been more open, the entire industry has cover to take the necessary next step of pushing back. Pushing back against bad requests is a start, pushing back against bad laws is the next step. The usefulness of transparency reports hinges on governments abiding by the rule of law. We now know that these reports only provide a limited picture of what is going on.”

Note: For more on government surveillance of the world's population, see the deeply revealing reports from reliable major media sources available here.


British Spy Chiefs Secretly Begged to Play in NSA’s Data Pools
2014-04-30, The Intercept
https://firstlook.org/theintercept/article/2014/04/30/gchq-prism-nsa-fisa-uns...

Britain’s electronic surveillance agency, Government Communications Headquarters [GCHQ], has long presented its collaboration with the National Security Agency’s massive electronic spying efforts as proportionate, carefully monitored, and well within the bounds of privacy laws. But according to a top-secret document in the archive of material provided to The Intercept by NSA whistleblower Edward Snowden, GCHQ secretly coveted the NSA’s vast troves of private communications and sought “unsupervised access” to its data as recently as last year. The document, dated April 2013, reveals that GCHQ requested broad new authority to tap into data collected under a law that authorizes a variety of controversial NSA surveillance initiatives, including the PRISM program. PRISM is a system used by the NSA and the FBI to obtain the content of personal emails, chats, photos, videos, and other data processed by nine of the world’s largest internet companies, including Google, Yahoo!, Microsoft, Apple, Facebook, and Skype. The arrangement GCHQ proposed would also have provided the British agency with greater access to millions of international phone calls and emails that the NSA siphons directly from phone networks and the internet. The Snowden files do not indicate whether NSA granted GCHQ’s request, but they do show that the NSA was “supportive” of the idea, and that GCHQ was permitted extensive access to PRISM during the London Olympics in 2012. The request for the broad access was communicated at “leadership” level.

Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.


NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls
2014-03-18, Washington Post
http://www.washingtonpost.com/world/national-security/nsa-surveillance-progra...

The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage. At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

Note: Though technically it is illegal for the NSA to snoop on Americans without good cause, all they have to do is to share this technology with another country like the UK, and then ask the UK to do the snooping and send the results back to them, thereby circumventing the law. For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.


How the NSA Plans to Infect ‘Millions’ of Computers with Malware
2014-03-12, The Intercept
https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millio...

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic. In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Report: CIA spied on Senate committee staff
2014-03-05, CBS News
http://www.cbsnews.com/news/report-cia-spied-on-senate-committee-staff/

As staff for the Senate Intelligence Committee gathered information to conduct oversight of the CIA, the CIA was secretly monitoring them, according to reports from McClatchy [News] and the New York Times. The committee staff was reviewing documents in a secure room at CIA headquarters as part of its investigation into the CIA's now-defunct detention and interrogation program, but the agency was secretly monitoring their work, according to reports. Complaints about the spying have reportedly prompted the CIA inspector general -- the agency's internal watchdog -- to look into the agency's behavior. Sen. Mark Udall, D-Colo., seemed to reference the surveillance in a letter to President Obama ... in which he urged the president to support the fullest declassification of the committee's CIA report. "As you are aware, the C.I.A. has recently taken unprecedented action against the committee in relation to the internal C.I.A. review, and I find these actions to be incredibly troubling for the committee's oversight responsibilities and for our democracy," Udall wrote. "It is essential that the Committee be able to do its oversight work -- consistent with our constitutional principle of the separation of powers -- without the CIA posing impediments or obstacles as it is today." Sen. Martin Heinrich, D-N.M., another member of the intelligence committee, declared in a statement Wednesday, "The Senate Intelligence Committee oversees the CIA, not the other way around."

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Watchdog Report Says N.S.A. Program Is Illegal and Should End
2014-01-23, New York Times
http://www.nytimes.com/2014/01/23/us/politics/watchdog-report-says-nsa-progra...

An independent federal privacy watchdog has concluded that the National Security Agency’s program to collect bulk phone call records has provided only “minimal” benefits in counterterrorism efforts, is illegal and should be shut down. The findings are laid out in a 238-page report [that represents] the first major public statement by the Privacy and Civil Liberties Oversight Board, which Congress made an independent agency in 2007 and only recently became fully operational. The Obama administration has portrayed the bulk collection program as useful and lawful. But in its report, the board lays out what may be the most detailed critique of the government’s once-secret legal theory behind the program: that a law known as Section 215 of the Patriot Act, which allows the F.B.I. to obtain business records deemed “relevant” to an investigation, can be legitimately interpreted as authorizing the N.S.A. to collect all calling records in the country. The program “lacks a viable legal foundation under Section 215, implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value,” the report said. “As a result, the board recommends that the government end the program.” The report also sheds light on the history of the once-secret bulk collection program. It contains the first official acknowledgment that the Foreign Intelligence Surveillance Court produced no judicial opinion detailing its legal rationale for the program until last August, even though it had been issuing orders to phone companies for the records and to the N.S.A. for how it could handle them since May 2006.

Note: The PCLOB report is titled "Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court," and is available here. For more on government attacks to privacy, see the deeply revealing reports from reliable major media sources available here.


NSA collects millions of text messages daily in 'untargeted' global sweep
2014-01-16, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messa...

The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. On average, each day the NSA was able to extract: • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images. • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Secret contract tied NSA and security industry pioneer
2013-12-20, CNBC/Reuters
http://www.cnbc.com/id/101290438

As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products. Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year. The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Intel officials believe Snowden has 'doomsday' cache
2013-11-26, MSN/Reuters
http://news.msn.com/us/intel-officials-believe-snowden-has-doomsday-cache

British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said. One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm. U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories. "The worst is yet to come," said one former U.S. official who follows the investigation closely. Snowden ... is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents. [It is] estimated that the total number of Snowden documents made public so far is over 500. Glenn Greenwald, who met with Snowden in Hong Kong and was among the first to report on the leaked documents for the Guardian newspaper, said the former NSA contractor had "taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published."

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


GCHQ and European spy agencies worked together on mass surveillance
2013-11-01, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/uk-news/2013/nov/01/gchq-europe-spy-agencies-mass-...

The German, French, Spanish and Swedish intelligence services have all developed methods of mass surveillance of internet and phone traffic over the past five years in close partnership with Britain's GCHQ eavesdropping agency. The bulk monitoring is carried out through direct taps into fibre optic cables and the development of covert relationships with telecommunications companies. A loose but growing eavesdropping alliance has allowed intelligence agencies from one country to cultivate ties with corporations from another to facilitate the trawling of the web, according to GCHQ documents leaked by the former US intelligence contractor Edward Snowden. The files also make clear that GCHQ played a leading role in advising its European counterparts how to work around national laws intended to restrict the surveillance power of intelligence agencies. US intelligence officials have insisted the mass monitoring was carried out by the security agencies in the countries involved and shared with the US. The Guardian revealed the existence of GCHQ's Tempora programme, in which the electronic intelligence agency tapped directly into the transatlantic fibre optic cables to carry out bulk surveillance. GCHQ officials expressed admiration for the technical capabilities of German intelligence to do the same thing, [saying] the Federal Intelligence Service (BND) had "huge technological potential and good access to the heart of the internet – they are already seeing some bearers running at 40Gbps and 100Gbps". Bearers is the GCHQ term for the fibre optic cables, and gigabits per second (Gbps) measures the speed at which data runs through them.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Edward Snowden is no traitor
2013-10-21, Washington Post
http://www.washingtonpost.com/opinions/richard-cohen-edward-snowden-is-no-tra...

What are we to make of Edward Snowden? I know what I once made of him. He was no real whistleblower, I wrote, but “ridiculously cinematic” and “narcissistic” as well. As time has proved, my judgments were just plain wrong. Whatever Snowden is, he is curiously modest and has bent over backward to ensure that the information he has divulged has done as little damage as possible. As a “traitor,” he lacks the requisite intent and menace. But traitor is what Snowden has been roundly called. Harry Reid: “I think Snowden is a traitor.” John Boehner: “He’s a traitor.” Rep. Peter King: “This guy is a traitor; he’s a defector.” And Dick Cheney not only denounced Snowden as a “traitor” but also suggested that he might have shared information with the Chinese. This innuendo, as with Saddam Hussein’s weapons of mass destruction, is more proof of Cheney’s unerring determination to be cosmically wrong. The early denunciations of Snowden now seem both over the top and beside the point. If he is a traitor, then which side did he betray and to whom does he now owe allegiance? Snowden seems to have sold out to no one. In fact, a knowledgeable source says that Snowden has not even sold his life story and has rebuffed offers of cash for interviews. Maybe his most un-American act is passing up a chance at easy money. Someone ought to look into this. Snowden’s residency in Russia has been forced upon him — he had nowhere else to go. Snowden insists that neither the Russians nor, before them, the Chinese have gotten their grubby hands on his top-secret material.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Privacy Fears Grow as Cities Increase Surveillance
2013-10-14, New York Times
http://www.nytimes.com/2013/10/14/technology/privacy-fears-as-surveillance-gr...

Federal grants of $7 million, initially intended to help thwart terror attacks at the port in Oakland, Calif., are instead going to a police initiative that will collect and analyze reams of surveillance data. The new system ... is the latest example of how cities are compiling and processing large amounts of information, known as big data, for routine law enforcement. And the system underscores how technology has enabled the tracking of people in many aspects of life. Like the Oakland effort, other pushes to use new surveillance tools in law enforcement are supported with federal dollars. The New York Police Department, aided by federal financing, has a big data system that links 3,000 surveillance cameras with license plate readers, radiation sensors, criminal databases and terror suspect lists. Police in Massachusetts have used federal money to buy automated license plate scanners. And police in Texas have bought a drone with homeland security money. [Critics] of the Oakland initiative, formally known as the Domain Awareness Center, [say] the program, which will create a central repository of surveillance information, will also gather data about the everyday movements and habits of law-abiding residents. Oakland has a contract with the Science Applications International Corporation, or SAIC, to build its system. That company has earned the bulk of its $12 billion in annual revenue from military contracts.

Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


Revealed: how US and UK spy agencies defeat internet privacy and security
2013-09-05, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves. Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software. "Backdoors are fundamentally in conflict with good security," said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. "Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise."

Note: For an excellent article in the New York Times on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.


Bush-Era NSA Whistleblower Makes Most Explosive Allegations Yet About Extent of Gov’t Surveillance — and You Won’t Believe Who He Says They Spied On
2013-06-20, The Blaze
http://www.theblaze.com/stories/2013/06/20/bush-era-nsa-whistleblower-makes-m...

Russ Tice, a former intelligence analyst and Bush-era NSA whistleblower, claimed Wednesday that the intelligence community has ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats. “They went after – and I know this because I had my hands literally on the paperwork for these sort of things – they went after high-ranking military officers. They went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees," [said] Tice. “But they went after other ones, too. They went after lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House.” Then Tice dropped the bombshell about Obama. "In summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois ... that’s the president of the United States now.” FBI whistleblower Sibel Edmonds and Tice agreed that such wide-ranging surveillance of officials could provide the intelligence agencies with unthinkable power to blackmail their opponents. “I was worried that the intelligence community now has sway over what is going on,” Tice said. Tice first blew the whistle on ... domestic spying across multiple agencies in 2005.

Note: Listen to Tice's shocking revelations in this interview. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.


NSA surveillance played little role in foiling terror plots, experts say
2013-06-12, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2013/jun/12/nsa-surveillance-data-terror-attack

Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.

Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.


Everything you need to know about the NSA’s phone records scandal
2013-06-06, Washington Post
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/06/everything-you-nee...

The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata — a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, it’s possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So it’s possible the NSA is using rooms like that to listen to everyone’s phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but it’s hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.

Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.


U.S. to let spy agencies scour Americans' finances
2013-03-13, Chicago Tribune/Reuters
http://articles.chicagotribune.com/2013-03-13/business/chi-us-to-let-spy-agen...

The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document. The proposed plan represents a major step by U.S. intelligence agencies to spot and track down [targeted persons] by bringing together financial databanks, criminal records and military intelligence. Financial institutions that operate in the United States are required by law to file reports of "suspicious customer activity," such as large money transfers or unusually structured bank accounts, to Treasury's Financial Crimes Enforcement Network (FinCEN). The Federal Bureau of Investigation already has full access to the database. However, intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, currently have to make case-by-case requests for information to FinCEN. The Treasury plan would give spy agencies the ability to analyze more raw financial data than they have ever had before. Financial institutions file more than 15 million "suspicious activity reports" every year, according to Treasury. Banks, for instance, are required to report all personal cash transactions exceeding $10,000.

Note: For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.


Rented computers secretly photographed users having sex
2012-09-26, BBC News
http://www.bbc.co.uk/news/technology-19726954

Rented computers from seven different companies secretly took photographs of their users, US authorities have said. The companies used software made by US company Designerware which could track key strokes and other personal data. The software, called PC Rental Agent, captured people engaging in "intimate acts", including sex. It is believed that PC Rental Agent has been installed in approximately 420,000 computers worldwide. The Federal Trade Commission ruling concerned a feature in the software, called Detective Mode, which would typically become activated if the user was late in returning equipment, or failed to pay for use. Detective Mode would assist the rental store in locating the overdue computer in order to pursue its return. Part of the process involved a pop-up window designed to look like a software registration screen. It would request personal information such as email addresses and telephone numbers that could then be used to pursue the users for payment and/or the return of equipment. In addition, the FTC said the software had access to much more sensitive information, including: usernames and passwords for email accounts, social media websites, and financial institutions. Among the other data collected were social security numbers; medical records; private emails to doctors; bank and credit card statements. Webcam pictures of children, partially undressed individuals, and intimate activities at home were also found. In the FTC's formal complaint document, it said the software had captured "couples engaged in sexual activities".

Note: Do you think other companies or intelligence agencies might be conducting similar monitoring? For more on this, click here.


The new totalitarianism of surveillance technology
2012-08-15, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2012/aug/15/new-totalitarianism-surve...

Last week, New York Mayor Michael Bloomberg joined NYPD Commissioner Ray Kelly to unveil a major new police surveillance infrastructure, developed by Microsoft. The Domain Awareness System links existing police databases with live video feeds, including cameras using vehicle license plate recognition software. No mention was made of whether the system plans to use – or already uses – facial recognition software. But, at present, there is no law to prevent US government and law enforcement agencies from building facial recognition databases. And we know from industry newsletters that the US military, law enforcement, and the department of homeland security are betting heavily on facial recognition technology. As PC World notes, Facebook itself is a market leader in the technology – but military and security agencies are close behind. According to Homeland Security Newswire, billions of dollars are being invested in the development and manufacture of various biometric technologies capable of detecting and identifying anyone, anywhere in the world – via iris-scanning systems, already in use; foot-scanning technology (really); voice pattern ID software, and so on. What is very obvious is that this technology will not be applied merely to people under arrest, or to people under surveillance in accordance with the fourth amendment. No, the "targets" here [include] everyone. In the name of "national security", the capacity is being built to identify, track and document any citizen constantly and continuously.

Note: For deeply revealing reports from reliable major media sources on civil liberties, click here.


Rothschild and Rockefeller families team up for some extra wealth creation
2012-05-30, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/finance/newsbysector/banksandfinance/9300784/Roths...

The Rothschild and Rockefeller families have teamed up to buy assets from banks and other distressed sellers in a union between two of the best-known names in financial history. RIT Capital Partners, which is chaired by Lord Rothschild, has taken a 37pc stake in Rockefeller Financial Services, the family’s wealth advisory and asset management wing. It has snapped up the holding from French bank Société Générale for less than Ł100m. The transatlantic alliance cements a five-decade acquaintance between the now ennobled Jacob Rothschild, 76, and David Rockefeller, 96, the grandson of the ruthlessly acquisitive American oilman and philanthropist John D Rockefeller. The two patricians now plan to capitalise on their family names to buy other asset managers or their portfolios, using their networks of top-notch contacts to ensure they get a seat at the table for any deal. The Rockefeller group goes back to 1882, set up to invest the family money made by John D Rockefeller’s Standard Oil, the forerunner for today’s Exxon Corporation, which he built with a Darwinian aggression. “Do you know the only thing that gives me pleasure? It’s to see my dividends coming in,” he once said. The Rothschild banking dynasty has its roots in the 18th century when Mayer Amschel Rothschild set up a business in Frankfurt. That sprang to fame in 1815 when it bought government bonds in anticipation of Napoleon’s defeat at Waterloo.

Note: Why is that these two hugely wealthy families get so little press coverage? Could it be that their wealth and influence exerts control over the major media? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.


Rothschild loses libel case, and reveals secret world of money and politics
2012-02-11, The Independent (One of the UK's leading newspapers)
http://www.independent.co.uk/news/uk/home-news/rothschild-loses-libel-case-an...

Nathaniel Rothschild, scion of the banking dynasty and friend of seemingly everyone in the spheres of finance, business and politics, ... has lost his libel case against the Daily Mail, which he sued for "substantial damages" over its account of his and [Lord] Mandelson's extraordinary trip to Russia in January 2005. Mr Rothschild claimed he was subjected to "sustained and unjustified" attacks in the May 2010 article, which portrayed him as a "puppet master", dangling his friend Lord Mandelson in front of the Russian oligarch Oleg Deripaska to ease the passage of colossal business deals. It began on Mr Rothschild's private jet from the World Economic Forum in Davos to Moscow, where they met Mr Deripaska, the aluminium plant manager who became the richest oligarch of them all, and continued on Mr Deripaska's private jet to his chalet in Siberia. The judge rejected the notion that Mr Rothschild and Mr Mandelson had flown out as friends, not business associates, and said Mr Rothschild's behaviour had in part been "inappropriate". "That conduct foreseeably brought Lord Mandelson's public office and personal integrity into disrepute," the judge said. That leading politicians, bankers and businessmen associate with each other in fashions that blur the boundaries between work and pleasure is a secret too great to be maintained with any success, but it doesn't make the details, on the rare occasions they actually emerge, any more palatable.

Note: For lots more from major media sources on corporate and government corruption, click here and here.


Monitoring America
2010-12-20, Washington Post
http://projects.washingtonpost.com/top-secret-america/articles/monitoring-ame...

Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators. The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing. The months-long investigation [by The Washington Post], based on nearly 100 interviews and 1,000 documents, found that: * Technologies and techniques honed for use on the battlefields of Iraq and Afghanistan have migrated into the hands of law enforcement agencies in America. * The FBI is building a database with the names and certain personal information, such as employment history, of thousands of U.S. citizens and residents whom a local police officer or a fellow citizen believed to be acting suspiciously. * Law enforcement agencies have hired as trainers self-described experts whose extremist views on Islam and terrorism are considered inaccurate and counterproductive by the FBI and U.S. intelligence agencies. * The Department of Homeland Security sends its state and local partners intelligence reports with little meaningful guidance, and state reports have sometimes inappropriately reported on lawful meetings.

Note: This report is part of a series, "Top Secret America," by The Washington Post. For more, click here.


Gaza flotilla activists were shot in head at close range
2010-06-04, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2010/jun/04/gaza-flotilla-activists-autopsy-r...

Israel was tonight under pressure to allow an independent inquiry into its assault on the Gaza aid flotilla after autopsy results on the bodies of those killed, obtained by the Guardian, revealed they were peppered with 9mm bullets, many fired at close range. Nine Turkish men on board the Mavi Marmara were shot a total of 30 times and five were killed by gunshot wounds to the head, according to the vice-chairman of the Turkish council of forensic medicine, [Yalcin Buyuk]. The results revealed that a 60-year-old man, Ibrahim Bilgen, was shot four times in the temple, chest, hip and back. A 19-year-old, named as Fulkan Dogan, who also has US citizenship, was shot five times from less that 45cm, in the face, in the back of the head, twice in the leg and once in the back. Two other men were shot four times, and five of the victims were shot either in the back of the head or in the back. The new information about the manner and intensity of the killings undermines Israel's insistence that its soldiers opened fire only in self defence and in response to attacks by the activists. "Given the very disturbing evidence which contradicts the line from the Israeli media and suggests that Israelis have been very selective in the way they have addressed this, there is now an overwhelming need for an international inquiry," said Andrew Slaughter MP, a member of the all party group on Britain and Palestine.


Head of IMF Proposes New Reserve Currency
2010-02-26, ABC News/Associated Press
http://abcnews.go.com/Business/wireStory?id=9958995

Dominique Strauss-Kahn, the head of the International Monetary Fund, suggested [that] the organization might one day be called on to provide countries with a global reserve currency that would serve as an alternative to the U.S. dollar. "That day has not yet come, but I think it is intellectually healthy to explore these kinds of ideas now," he said in a speech on the future mandate of the 186-nation Washington-based lending organization. Strauss-Kahn said such an asset could be similar to but distinctly different from the IMF's special drawing rights, or SDRs, the accounting unit that countries use to hold funds within the IMF. It is based on a basket of major currencies. He said having other alternatives to the dollar "would limit the extent to which the international monetary system as a whole depends on the policies and conditions of a single, albeit dominant, country." Several countries, including China and Russia, have called for an alternative to the dollar as a reserve currency.

Note: For a treasure trove of reports from reliable sources on the hidden realities behind the world financial and economic crisis, click here.


Who's in Big Brother's Database?
2009-11-05, New York Review of Books
http://www.nybooks.com/articles/23231

On a remote edge of Utah's dry and arid high desert ... hard-hatted construction workers with top-secret clearances are preparing to build [a] mammoth $2 billion structure. It's being built by the ultra-secret National Security Agency ... to house trillions of phone calls, e-mail messages, and [electronic data trails of all kinds]. The NSA is also completing work on another data archive, this one in San Antonio, Texas, which will be nearly the size of the Alamodome. Just how much information will be stored in these windowless cybertemples? A recent report prepared by the MITRE Corporation, a Pentagon think tank, [states] "Sensor data volume could potentially increase to the level of Yottabytes [10-to-the-24th-power bytes] by 2015." Once vacuumed up and stored in these near-infinite "libraries," the data are then analyzed by powerful infoweapons, supercomputers running complex algorithmic programs, to determine who among us may be — or may one day become — a terrorist. Emerging [after 9/11] as the most powerful chief the spy world has ever known was the director of the NSA. He is in charge of an organization three times the size of the CIA and empowered in 2008 by Congress to spy on Americans to an unprecedented degree. These new centers in Utah, Texas, and possibly elsewhere will likely become the centralized repositories for the data intercepted by the NSA in America's version of the "big brother database."

Note: James Bamford, the author of this review of a new book on the history of the NSA, has himself written three important books on the agency. For many revealing reports from reliable sources on the developing capacity by government and corporate surveillance to construct a "Big Brother" states, click here.


Control of Cybersecurity Becomes Divisive Issue
2009-04-17, New York Times
http://www.nytimes.com/2009/04/17/us/politics/17cyber.html?partner=rss&emc=rs...

The National Security Agency has been campaigning to lead the government’s rapidly growing cybersecurity programs, raising privacy and civil liberties concerns among some officials who fear that the move could give the spy agency too much control over government computer networks. The security agency’s interest in taking over the dominant role has met resistance, including the resignation of the Homeland Security Department official who was until last month in charge of coordinating cybersecurity efforts throughout the government. Rod Beckstrom, who resigned in March as director of the National Cyber Security Center at the Homeland Security Department, said ... that he feared that the N.S.A.’s push for a greater role in guarding the government’s computer systems could give it the power to collect and analyze every e-mail message, text message and Google search conducted by every employee in every federal agency. Mr. Beckstrom said he believed that an intelligence service that is supposed to focus on foreign targets should not be given so much control over the flow of information within the United States government. To detect threats against the computer infrastructure — including hackers, viruses and intrusions by foreign agents and terrorists — cybersecurity guardians must have virtually unlimited access to networks. Mr. Beckstrom argues that those responsibilities should be divided among agencies. “I have very serious concerns about the concentration of too much power in one agency,” he said. “Power over information is so important, and it is so difficult to monitor, that we need to have checks and balances.”

Note: For further disturbing reports from reliable sources on government efforts to establish total surveillance systems, click here.


Apocalypse now? 30 days when the world didn't end
2008-09-09, Times of London (One of the U.K.'s leading newspapers)
http://www.timesonline.co.uk/tol/comment/faith/article4717864.ece

The beginning of the first serious experiments using CERN’s Large Hadron Collider this week has given rise to a welter of fanciful scare stories about the obliteration of the Earth by a pocket black hole or a cascade reaction of exotic particles. Similar predictions have been made around the launch of several other particle physics experiments and even the first atomic weapons tests. Predictions of the world’s end are nothing new though. We’ve picked out 30 of the most memorable apocalypses that never, for one reason or another, quite happened. 1: 2,800BC: The oldest surviving prediction of the world’s imminent demise was found inscribed upon an Assyrian clay tablet which stated: "Our earth is degenerate in these latter days. There are signs that the world is speedily coming to an end. Bribery and corruption are common." 4: Mar 25, 970 AD. The Lotharingian computists believed they had found evidence in the Bible that a conjunction of certain feast days prefigured the end times. They were just one of a wide scattering of millennial cults springing up in advance of that first Millennium. The millennial panic endured for at least 30 years after the fateful date had come and gone, with some adjustment made to allow 1,000 years after the crucifixion, rather than the nativity. 8: 1648: Having made close study of the kabbalah, theTurkish rabbi Sabbatai Zevi predicted that the Messiah would make a miraculous return in 1648, and that his name would be Sabbatai Zevi. 9: 1666: A year packed with apocalyptic portent. With a date containing the figures commonly accepted as the biblical Number of the Beast and following a protracted period of plague in England, it was little surprise that many should believe the Great Fire of London to be a herald of the Last Days.


Civil liberties group criticizes new FBI authority
2008-07-02, Boston Globe/Associated Press
http://www.boston.com/news/nation/washington/articles/2008/07/02/civil_libert...

Nearly 40 years ago, the FBI was roundly criticized for investigating Americans without evidence [that] they had broken any laws. Now, critics fear the FBI may be gearing up to do it again. Tentative Justice Department guidelines, to be released later this summer, would let agents investigate people whose backgrounds -- and potentially their race or ethnicity -- match the traits of terrorists. Such profiling ... echoes the FBI's now-defunct COINTELPRO, an operation under Director J. Edgar Hoover in the 1950s and 1960s to monitor and disrupt groups with communist and socialist ties. Before it was shut down in 1971, the domestic spying operation -- formally known as Counterintelligence Programs -- had expanded to include civil rights groups, anti-war activists, ... state legislators and journalists. Among the FBI's targets were Martin Luther King Jr., Malcolm X, and John Lennon, along with members of black [political] groups ... and student protesters. The new proposal to allow investigations of Americans with no evidence of wrongdoing is "COINTELPRO for the 21st century," said Barry Steinhardt of the American Civil Liberties Union. "But this is much more insidious because it could involve more people. In the days of COINTELPRO, they were watching only a few people. Now they could be watching everyone."

Note: For many disturbing reports on threats to civil liberties, click here.


Rule by fear or rule by law?
2008-02-04, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2008/02/04/ED5OUPQJ7.DTL

Since 9/11, and seemingly without the notice of most Americans, the federal government has assumed the authority to institute martial law, arrest a wide swath of dissidents (citizen and noncitizen alike), and detain people without legal or constitutional recourse in the event of "an emergency influx of immigrants in the U.S., or to support the rapid development of new programs." Beginning in 1999, the government has entered into a series of single-bid contracts with Halliburton subsidiary Kellogg, Brown and Root (KBR) to build detention camps at undisclosed locations within the United States. The government has also contracted with several companies to build thousands of railcars, some reportedly equipped with shackles, ostensibly to transport detainees. According to diplomat and author Peter Dale Scott, the KBR contract is part of a Homeland Security plan titled ENDGAME, which sets as its goal the removal of "all removable aliens" and "potential terrorists." What kind of "new programs" require the construction and refurbishment of detention facilities in nearly every state of the union with the capacity to house perhaps millions of people? The 2007 National Defense Authorization Act (NDAA) ... gives the executive the power to invoke martial law. The Military Commissions Act of 2006 ... allows for the indefinite imprisonment of anyone who ... speaks out against the government's policies. The law calls for secret trials for citizens and noncitizens alike. What could the government be contemplating that leads it to make contingency plans to detain without recourse millions of its own citizens?

Note: This important warning from former U.S. Congressman Dan Hamburg and Lewis Seiler should be read in its entirety. For more chilling reports on serious threats to our civil liberties, click here.


Judges OK warrantless monitoring of Web use
2007-07-07, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/07/07/BAGMNQSJDA1.DTL

Federal agents do not need a search warrant to monitor a suspect's computer use and determine the e-mail addresses and Web pages the suspect is contacting, a federal appeals court ruled Friday. In a drug case from San Diego County, the Ninth U.S. Circuit Court of Appeals in San Francisco likened computer surveillance to the "pen register" devices that officers use to pinpoint the phone numbers a suspect dials, without listening to the phone calls themselves. In Friday's ruling, the court said computer users should know that they lose privacy protections with e-mail and Web site addresses when they are communicated to the company whose equipment carries the messages. The search is no more intrusive than officers' examination of a list of phone numbers or the outside of a mailed package, neither of which requires a warrant, Judge Raymond Fisher said in the 3-0 ruling. Defense lawyer Michael Crowley disagreed. His client, Dennis Alba, was sentenced to 30 years in prison after being convicted of operating a laboratory in Escondido that manufactured the drug ecstasy. Some of the evidence against Alba came from agents' tracking of his computer use. The court upheld his conviction and sentence. Expert evidence in Alba's case showed that the Web addresses obtained by federal agents included page numbers that allowed the agents to determine what someone read online, Crowley said. The ruling "further erodes our privacy," the attorney said. "The great political marketplace of ideas is the Internet, and the government has unbridled access to it."

Note: So now every email you send and read can be monitored legally. Why didn't this make news headlines?


Pentagon restricting testimony in Congress
2007-05-10, Boston Globe
http://www.boston.com/news/nation/washington/articles/2007/05/10/pentagon_res...

The Pentagon has placed unprecedented restrictions on who can testify before Congress, reserving the right to bar lower-ranking officers, enlisted soldiers, and career bureaucrats from appearing before oversight committees or having their remarks transcribed. The guidelines, described in an April 19 memo to the staff director of the House Armed Services Committee, adds that all field-level officers and enlisted personnel must be "deemed appropriate" by the Department of Defense before they can participate in personal briefings for members of Congress or their staffs. In addition, according to the memo, the proceedings must not be recorded. Any officers who are allowed to testify must be accompanied by an official from the administration. Veterans of the legislative process -- who say they have never heard of such guidelines before -- maintain that the Pentagon has no authority to set such ground rules. A Pentagon spokesman confirmed that the guidelines are new. The memo has fueled complaints that the Bush administration is trying to restrict access to information about the war in Iraq. [A] special House oversight panel, according to aides, has written at least 10 letters to the Pentagon since February seeking information and has received only one official reply. Nor has the Pentagon fully complied with repeated requests for all the monthly assessments of Iraqi security forces.

Note: When the military begins to control the legislative, democracy begins to shift towards dictatorship. And for reliable information how the Pentagon cannot account for hundreds of billions of dollars, click here.


A monstrous war crime
2007-03-28, The Guardian (One of the U.K.'s leading newspapers)
http://www.guardian.co.uk/Iraq/Story/0,,2044345,00.html

Our collective failure has been to take our political leaders at their word. This week the BBC reported that the government's own scientists advised ministers that the Johns Hopkins study on Iraq civilian mortality was accurate and reliable. Published in the Lancet ...it estimated that 650,000 Iraqi civilians had died since the American and British led invasion in March 2003. Immediately after publication, the prime minister's official spokesman said that the Lancet's study "was not one we believe to be anywhere near accurate". The foreign secretary ... said that the Lancet figures were "extrapolated" and a "leap". President Bush said: "I don't consider it a credible report". Scientists at the UK's Department for International Development thought differently. They concluded that the study's methods were "tried and tested". Indeed, the Johns Hopkins approach would likely lead to an "underestimation of mortality". The Ministry of Defence's chief scientific adviser ... recommended "caution in publicly criticising the study". When these recommendations went to the prime minister's advisers, they were horrified. Tony Blair was advised to say: "The overriding message is that there are no accurate or reliable figures of deaths in Iraq". At a time when we are celebrating our enlightened abolition of slavery 200 years ago, we are continuing to commit one of the worst international abuses of human rights of the past half-century. Two hundred years from now, the Iraq war will be mourned as the moment when Britain violated its delicate democratic constitution and joined the ranks of nations that use extreme pre-emptive killing as a tactic of foreign policy.

Note: This article is written by Richard Horton, the editor of the highly esteemed British medical journal Lancet.


[N.Y.] City Police Spied Broadly Before G.O.P. Convention
2007-03-25, New York Times
http://www.nytimes.com/2007/03/25/nyregion/25infiltrate.html?ex=1332475200&en...

For at least a year before the 2004 Republican National Convention, teams of undercover New York City police officers traveled to cities across the country, Canada and Europe to conduct covert observations of people who planned to protest at the convention, according to police records and interviews. From Albuquerque to Montreal, San Francisco to Miami, undercover New York police officers attended meetings of political groups, posing as sympathizers or fellow activists. They made friends, shared meals, swapped e-mail messages and then filed daily reports with the department’s Intelligence Division. In hundreds of reports stamped “N.Y.P.D. Secret,” the Intelligence Division chronicled the views and plans of people who had no apparent intention of breaking the law. These included members of street theater companies, church groups and antiwar organizations. Three New York City elected officials were cited in the reports. In at least some cases, intelligence on what appeared to be lawful activity was shared with police departments in other cities. In addition to sharing information with other police departments, New York undercover officers were active themselves in at least 15 places outside New York — including California, Connecticut, Florida, Georgia, Illinois, Massachusetts, Michigan, Montreal, New Hampshire, New Mexico, Oregon, Tennessee, Texas and Washington, D.C. — and in Europe. To date, as the boundaries of the department’s expanded powers continue to be debated, police officials have provided only glimpses of its intelligence-gathering.


My National Security Letter Gag Order
2007-03-23, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/03/22/AR20070322018...

The Justice Department's inspector general revealed on March 9 that the FBI has been systematically abusing one of the most controversial provisions of the USA Patriot Act: the expanded power to issue "national security letters." It no doubt surprised most Americans to learn that between 2003 and 2005 the FBI issued more than 140,000 specific demands under this provision. It did not, however, come as any surprise to me. Three years ago, I received a national security letter (NSL) in my capacity as the president of a small Internet access and consulting business. The letter ordered me to provide sensitive information about one of my clients. There was no indication that a judge had reviewed or approved the letter, and it turned out that none had. The letter came with a gag provision that prohibited me from telling anyone, including my client, that the FBI was seeking this information. Based on the context of the demand -- a context that the FBI still won't let me discuss publicly -- I suspected that the FBI was abusing its power. Living under the gag order has been stressful and surreal. Under the threat of criminal prosecution, I must hide all aspects of my involvement in the case -- including the mere fact that I received an NSL -- from my colleagues, my family and my friends. When I meet with my attorneys I cannot tell my girlfriend where I am going or where I have been. I hide any papers related to the case in a place where she will not look. When clients and friends ask me whether I am the one challenging the constitutionality of the NSL statute, I have no choice but to look them in the eye and lie. At some point -- a point we passed long ago -- the secrecy itself becomes a threat to our democracy.


Call to reopen Oklahoma bomb case
2007-03-02, BBC News
http://news.bbc.co.uk/2/hi/programmes/6275147.stm

The FBI man in charge of collecting evidence from the government building destroyed by the Oklahoma bomb has called for the case to be reopened. Former deputy assistant director Danny Coulson ... said a federal grand jury is now needed to find out what really happened. He argues this is the only way to prove whether other people were involved in the bombing in a wider conspiracy beyond Timothy McVeigh and Terry Nichols. Mr Coulson spent 31 years in the FBI. Between 1991 and 1997 he was the deputy assistant director of the Criminal Division of the FBI in Washington, responsible for all violent crime cases in the United States. Mr Coulson said there were some "very strong indicators" that other people were involved with Timothy McVeigh. The FBI interviewed 24 people who claimed to have seen McVeigh in Oklahoma City with someone else on the morning of the attack, yet the only known accomplice of McVeigh, Terry Nichols, was at home in Kansas over 200 miles away on that day. The FBI's investigation concluded that the eyewitnesses were unreliable. However, Danny Coulson says they were "extremely credible" and had no reason to make it up. "If only one person had seen it, or two of three, but 24?" he said. "I know FBI headquarters told [agents] to close down the investigation in Elohim City which has some very significant connections to Mr McVeigh. "Never in my career did I have FBI headquarters tell me not to investigate something." Last December a US Congressional report found no conclusive evidence of a wider conspiracy, but the report concluded that "questions remain unanswered and mysteries remain unsolved."

Note: Don't miss a highly revealing four-minute video-clip showing live media coverage of the Oklahoma City bomb available here. The official story is that one truck with a huge bomb was parked in front of the Oklahoma City federal building and only Timothy McVeigh and his partner were involved. The news footage proves that others must have been involved, as multiple unexploded bombs were recovered from points inside the building. Yet none of this was questioned in later testimony.


Carlyle Changes Its Stripes
2007-02-12, BusinessWeek
http://www.businessweek.com/magazine/content/07_07/b4021001.htm

In the two decades since private equity firms first stormed the business world, they've been called a lot of things, from raiders to barbarians. But only [the Carlyle Group] has been tagged in the popular imagination with warmongering, treason, and acting as cold-eyed architects of government conspiracies. Carlyle, founded 20 years ago in the shadow of Washington's power centers, long went about its business far from the public eye. Its ranks were larded with the politically connected, including former Presidents, Cabinet members, even former British Prime Minister John Major. It used its partners' collective relationships to build a lucrative business buying, transforming, and selling companies -- particularly defense companies that did business with governments. Carlyle's radical makeover has turned the firm into the biggest fund-raising juggernaut the private equity world has ever seen. By the end of this year it expects to have an unprecedented $85 billion in investor commitments under management, up sixfold from 2001 and more than any other firm. [Founder David] Rubenstein sees the total swelling to as much as $300 billion by 2012. Make no mistake -- Carlyle is already massive. It owns nearly 200 companies that generate a combined $68 billion in revenue and employ 200,000 people. Last year it bought a new company approximately once every three days and sold one almost once a week -- all while dabbling in increasingly esoteric investments. Since its founding in 1987 it has generated annualized after-fee returns of 26%, compared with the industry average in the mid-teens.

Note: With former presidents including George H.W. Bush and many other top world politicians helping to sway huge military contracts, could this be considered a form of insider trading? Those 26% yearly returns are placing our tax monies in the hands of individuals and companies that are already among the wealthiest in the world. For lots more on manipulation of your tax money, click here. And for a Washington Post article showing Osama Bin Laden's brother met with George H.W. Bush at a Carlyle meeting one day before 9/11, click here.


Rise and shine: Wake up to an enhanced life
2007-01-25, CNN News
http://www.cnn.com/2007/TECH/science/01/25/ft.newdrugs

A new breed of lifestyle drugs could allow us to choose how much we sleep, boost our memories and even allow us to enjoy ourselves more, without any side effects. Will they unleash human capabilities never seen before or create a dystopian 24-hour society where we are dependent on drugs to regulate our lifestyle and behavior? One drug already available is modafinil, marketed as the vaguely Orwellian-sounding Provigil. It enables those who take it to stay awake and alert for 48 hours. It is a eugeroic that delivers a feeling of wakefulness without the physical or mental jitter. There is already a market for it for those without any medical need - it is developing a cult following among workaholics and students studying for exams. The military is also very interested in eugeroic. Their reliance on amphetamines for lengthy operations have had catastrophic consequences in the past. The "friendly-fire" incidents in Afghanistan in 2002 when U.S. pilots killed Canadian troops was blamed on the "go pills" they had taken. The U.S. Defense Advanced Research Projects Agency (DARPA) tested a compound called CX717 in its quest to find a drug that can create a "metabolically dominant war-fighter of the future" able to function for seven days without sleep. CX717 is an ampakine, a compound that increases the brains computing powers. It re-writes the rules of what it takes to create a memory and just how strong those memories can be. Will cans of soda containing eugeroics or ampakines be as common as caffeine drinks on the shelves of 24-hour stores? The potential is certainly there for a brave new world of personality medication.


FBI Chided for OKC Bomb Investigation
2006-12-25, ABC News/Associated Press
http://www.abcnews.go.com/Politics/wireStory?id=2749903

A two-year congressional inquiry into the Oklahoma City bombing concludes that the FBI didn't fully investigate whether other suspects may have helped Timothy McVeigh and Terry Nichols with the deadly 1995 attack, allowing questions to linger a decade later. The House International Relations investigative subcommittee [declared that] there is no conclusive evidence of a foreign connection to the attack, but that far too many unanswered questions remain. The report also sharply criticizes the FBI for failing to be curious enough to pursue credible information that foreign or U.S. citizens may have had contact with Nichols or McVeigh and could have assisted their plot. "We did our best with limited resources, and I think we moved the understanding of this issue forward a couple of notches even though important questions remain unanswered," Rep. Dana Rohrabacher, R-Calif., the subcommittee chairman, said in an interview with The Associated Press. Rohrabacher's subcommittee saved its sharpest words for the Justice Department, saying officials there exhibited a mindset of thwarting congressional oversight and did not assist the investigation fully.

Note: Should you choose to explore the deadly Oklahoma City bombing, you will find that there are many strange inconsistencies suggesting a major cover-up. If you are interested in more, you might start here.


Does Israel have the bomb or not? Olmert: Yes, we do.
2006-12-13, San Francisco Chronicle (San Francisco's leading newspaper)
http://sfgate.com/cgi-bin/blogs/sfgate/detail?blogid=15archive/&entry_id=11779

For decades, Israel coyly has refused to confirm or deny what, since 1986, the whole world has known for sure: that is that the Jewish state is the one country in the Middle East that has a well-developed, nuclear arsenal. It was 20 years ago that Mordechai Vanunu, a former technician at Israel's Dimona nuclear facility in the Negev Desert, informed Britain's Sunday Times about the weapons program, leading "defense analysts to rank the country as the [world's] sixth largest nuclear power." Vanunu was jailed for 18 years for revealing state secrets. Israel calls its refusal to deny or confirm the existence of its nuclear arms its "nuclear ambiguity" policy. Why? Explains the Times (U.K.): "For many years, Israel was the only country outside the five declared nuclear powers to have built an atomic weapon ... It wanted its enemies in the region to know that it had nuclear capability if threatened. But it also wanted to keep the existence secret so that it did not fall [a]foul of international action designed to halt the proliferation of nuclear weapons, particularly strict U.S. laws which could have jeopardized billions of dollars in annual aid." The Jerusalem Post notes that "Nuclear ambiguity was a comfortable arrangement for both Israeli and U.S. administrations, designed to allow Israel to get on with whatever it was doing ... without too much international pressure, and [to allow] the U.S. to not seem too hypocritical by not demanding its Middle East ally sign the [Non-proliferation Treaty]. Ambiguity might have worked for four decades, but ... it is now hopelessly outdated."

Note: The media has been quite reluctant to discuss these issues openly. Could it be they fear people might question the amount of U.S. aid? Israel's population is 6.5 million. Official U.S. yearly foreign aid to Israel has been about $2.5 to 3.0 billion for many years. If you do the math, U.S. taxpayers are giving every man, woman, and child in Israel about $400/year -- over ten times the per capita rate paid to any other country. That's quite a yearly gift! A Christian Science Monitor article says if all forms of aid are considered, the figures are even higher.


To Fill His Shoes, Mr. Bernanke, Learn to Dance
2005-10-30, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2005/10/28/AR20051028024...

In his 18 years as chairman of the Federal Reserve, Greenspan has occasionally drawn criticism, but no one disputes his technical prowess or sniffs at his track record of low inflation and steady, almost uninterrupted growth. Enter Ben S. Bernanke, President Bush's nominee to take Greenspan's place. The former Princeton economics professor is currently the chairman of the president's Council of Economic Advisers. The following are excerpts from [a speech] by Ben S. Bernanke. "On Milton Friedman's Ninetieth Birthday," Nov. 8, 2002: "I first read 'A Monetary History of the United States' early in my graduate school years at M.I.T. I was hooked, and I have been a student of monetary economics and economic history ever since. Friedman and [his co-author Anna J.] Schwartz made the case that the economic collapse of 1929-33 was the product of the nation's monetary mechanism gone wrong. What I take from their work is the idea that monetary forces, particularly if unleashed in a destabilizing direction, can be extremely powerful. "I would like to say to Milton and Anna: Regarding the Great Depression. You're right, we did it. We're very sorry. But thanks to you, we won't do it again."

Note: The chairman of the Federal Reserve Board admits here that the Federal Reserve caused the Great Depression. The Federal Reserve is owned by powerful private banks. It was created in 1913 largely in secrecy and fought by many who understood the dangers involved. For more reliable information on this, click here.


Rove leak is just part of larger scandal
2005-07-15, Christian Science Monitor
http://www.csmonitor.com/2005/0715/p09s02-cods.html

The underlying issue in the Karl Rove controversy is not a leak, but a war and how America was misled into that war. In 2002 President Bush, having decided to invade Iraq, was casting about for a casus belli. The weapons of mass destruction theme was not yielding very much until a dubious Italian intelligence report ... provided reason to speculate that Iraq might be trying to buy so-called yellowcake uranium from the African country of Niger. the CIA sent Joseph Wilson, an old Africa hand, to Niger to investigate. Mr. Wilson spent eight days talking to everyone in Niger possibly involved and came back to report no sign of an Iraqi bid for uranium. Ignoring Wilson's report, Cheney talked on TV about Iraq's nuclear potential. And the president himself, in his 2003 State of the Union address no less, pronounced: "The British government has learned that Saddam Hussein recently sought significant quantities of uranium from Africa." Wilson directly challenged the administration with a July 6, 2003 New York Times op-ed headlined, "What I didn't find in Africa," and making clear his belief that the president deliberately manipulated intelligence in order to justify an invasion. Three days later, Bob Novak's column appeared giving Wilson's wife's name, Valerie Plame, and the fact she was an undercover CIA officer. Enough is known to surmise that the leaks of Rove, or others deputized by him, amounted to retaliation against someone who had the temerity to challenge the president of the United States. The role of Rove and associates added up to a small incident in a very large scandal - the effort to delude America into thinking it faced a threat dire enough to justify a war.


London Bombings: Strange Coincidences Raise Serious Questions
2005-07-13, BBC/MSNBC/London Times/More
http://www.WantToKnow.info/050713londonbombingcoverup

At half past nine this morning we were actually running an exercise for a company of over a thousand people in London based on simultaneous bombs going off precisely at the railway stations where it happened this morning, so I still have the hairs on the back of my neck standing up right now. -- Former Scotland Yard Official Peter Power on BBC Radio, 7/7/05 (the day of the bombings)

"The explosives appear to be of military origin, which is very worrying," said Christophe Chaboud, head of the French Anti-Terrorism Coordination Unit and one of five top officials sent by Paris to London immediately after Thursday's attacks. -- Reuters, 7/11/05

A SINGLE bombmaker using high-grade military explosives is believed to be responsible for building the four devices that killed more than 50 people last week. Similar components from the explosive devices have been found at all four murder sites, leading detectives to believe that each of the 10lb rucksack bombs was the work of one man. They also believe that the materials used were not home made but sophisticated military explosives. -- London Times, 7/12/05

Translator Jacob Keryakes, who said that a copy of the message was later posted on a secular Web site, noted that the claim of responsibility contained an error in one of the Quranic verses it cited. That suggests that the claim may be phony. "This is not something al-Qaida would do." he said. - MSNBC News, 7/7/05


No Boundaries
2005-06-09, CNN News
http://transcripts.cnn.com/TRANSCRIPTS/0506/09/ldt.01.html

A panel sponsored by the Council on Foreign Relations wants the United States to focus not on the defense of our own borders, but rather create what effectively would be a common border that includes Mexico and Canada. CHRISTINE ROMANS, CNN CORRESPONDENT: On Capitol Hill, testimony [is] calling for Americans to start thinking like citizens of North America and treat the U.S., Mexico and Canada like one big country. That's the view in a report called "Building a North American Community." It envisions a common border around the U.S., Mexico and Canada in just five years, a border pass for residents of the three countries, and a freer flow of goods and people. [Task force member Robert] PASTOR: What we hope to accomplish by 2010 is a common external tariff which will mean that goods can move easily across the border. We want a common security perimeter around all of North America. ROMANS: Security experts say folding Mexico and Canada into the U.S. is a grave breach of that sovereignty. [The report calls for] temporary migrant worker programs expanded with full mobility of labor between the three countries in the next five years. The idea here is to make North America more like the European Union. [CNN Anchor Lou] DOBBS: Americans must think that our political and academic elites have gone utterly mad at a time when three-and-a-half years, approaching four years after September 11, we still don't have border security. And this group of elites is talking about not defending our borders, finally, but rather creating new ones. It's astonishing.

Note: This agenda is being promoted in key political forums with practically no media reporting. For one of the few media articles reporting on this important topic, click here.


The ricin ring that never was
2005-04-14, The Guardian (One of the U.K.'s leading newspapers)
http://politics.guardian.co.uk/attacks/comment/0,1320,1459178,00.html

Colin Powell does not need more humiliation. But yesterday a London jury brought down another section of the case he made for war - that Iraq and Osama bin Laden were supporting and directing terrorist poison cells throughout Europe, including a London ricin ring. Yesterday's verdicts on five defendants ... make clear there was no ricin ring. Nor did the "ricin ring" make or have ricin. Not that the government shared that news with us. The public record for the past three fear-inducing years has been that ricin was found in the Wood Green flat occupied by some of yesterday's acquitted defendants. It wasn't. [Found there] were the internal documents of the supposed al-Qaida cell planning the "big one" in Britain. But the recipes were untested and unoriginal, borrowed from US sources. Moreover, ricin is not a weapon of mass destruction. It is a poison which has only ever been used for one-on-one killings. All the information roads led west, not to Kabul but to California and the US midwest. The recipes for ricin now seen on the internet were invented 20 years ago by survivalist Kurt Saxon. The chemical lists found in London were an exact copy of pages on an internet site in Palo Alto, California. But it seems this information was not shared with the then home secretary, David Blunkett, who was still whipping up fear two weeks later. The most ironic twist was an attempt to introduce an "al- Qaida manual" into the case. To show that the Jihad manual was written in the 1980s ... was easy. The ricin recipe it contained was a direct translation from a 1988 US book called the Poisoner's Handbook. We have all been victims of this mass deception.

Note: As the above link no longer functions, click here for the full article. According to a post on Prof. Michel Chossudovsky's excellent Center for Research on Globalization website and other inside sources, the British government ordered the above article removed from the website within a week of its publication. Someone doesn't want us knowing how we are manipulated into fear. For more on this, click here.


Lost in Translation: How Bush Interpreter Got Through Security
2005-02-22, Wall Street Journal (Article on website founder Fred Burks)
http://online.wsj.com/article/0,,SB110901231065260117,00.html?mod=todays_us_p...

Frederick Burks believes in UFOs, communes with dolphins, [and] runs a Web site that promotes conspiracy theories about U.S. complicity in the 9/11 attacks. And, until last October, he had the ear of the world's most powerful man ... George W. Bush. When President Bush traveled to Bali for a meeting with President Megawati in October 2003 ... [Karen] Brooks, then the National Security Council's Indonesia expert, says she personally requested that he get the job because he was so good and "Megawati loved him." Now Mr. Burks has popped up in Jakarta as a star witness for the defense in the terrorism trial of a fundamentalist Islamic cleric. Speaking to the Jakarta court in fluent Indonesian, Mr. Burks described a secret 2002 meeting between a U.S. presidential envoy and Indonesia's then president, Megawati Sukarnoputri. Mr. Burks's testimony, delivered last month in a south Jakarta court, turned the former White House interpreter ... into a national celebrity here in Indonesia. While working as Mr. Bush's Indonesian-language interpreter, Mr. Burks set up several Web sites, including momentoflove.org, weboflove.org and WantToKnow.info. After 9/11, he began collecting and then posting documents he believes show that parts of the U.S. government knew an attack was coming and may even have been complicit in its execution. "I'm sometimes labeled a conspiracy theorist, but I'm not," he says. "I'm someone who can handle dark energy, the really ugly things that are going on behind the scenes, without getting too upset."

Note: This article surprisingly was on the front page of the Wall Street Journal. The above link requires payment to read the full article. To read it free and learn much more, click here.


C.I.A. Said to Rebuff Congress on Nazi Files
2005-01-30, New York Times
http://www.nytimes.com/2005/01/30/international/europe/30nazis.html?ex=126482...

The Central Intelligence Agency is refusing to provide hundreds of thousands of pages of documents sought by a government working group under a 1998 law that requires full disclosure of classified records related to Nazi war criminals. Some made public last year showed a closer relationship between the United States government and Nazi war criminals than had previously been understood, including the C.I.A.'s recruitment of war criminal suspects or Nazi collaborators. For nearly three years, the C.I.A. has interpreted the 1998 law narrowly and rebuffed requests for additional records. The dispute has not previously been made public. The American government worked closely with Nazi war criminals and collaborators, allowing many of them to live in the United States after World War II. Historians who have studied the documents made public so far have said that at least five associates of the Nazi leader Adolf Eichmann, the architect of Hitler's campaign to exterminate Jews, had worked for the CIA. The records also indicate that the CIA tried to recruit two dozen more war criminals or Nazi collaborators. Among former Nazis who were given refuge in the United States was Wernher von Braun, the German scientist who developed the V-2 rocket in World War II for the Nazis and played a major role in the development of the American space program.

Note: Operation Paperclip involved secretly importing hundreds of Nazi scientists into the U.S. and providing them with aliases and influential work in U.S. government and intelligence services. Some of them were known experts in mind control techniques. For more reliable information, click here.


Warming Up to Cold Fusion
2004-11-21, Washington Post
http://www.washingtonpost.com/wp-dyn/articles/A54964-2004Nov16.html

Peter Hagelstein is trying to revive hope for a future of clean, inexhaustible, inexpensive energy. Fifteen years after the scientific embarrassment of the century ... a panel of scientists gathered. The panel's charge was simple: to determine whether [cold fusion] had even a prayer of a chance at working. The Department of Energy went to great lengths to cloak the meeting from public view. No announcement, no reporters. None of the names of the people attending that day was disclosed. Since 1989, hundreds of scientists working in dozens of labs around the world have claimed ... results. Supporters point to the written literature -- more than 3,000 papers -- as proof of the effect. But the most credible cold fusion advocates concede that the vast majority of those papers are of poor quality. "Brilliant," "genius" and "reclusive" were words used to describe [SRI scientist Peter] Hagelstein 20 years ago, when he rose to prominence as one of the young scientists behind President Ronald Reagan's plans to build a missile shield in outer space. Hagelstein [now] describes the mainstream scientific community as "mafias" that promote and publish their friends' work, unwilling to accept new ideas. As Hagelstein explains it, leading physicists came out swiftly and prematurely against cold fusion. Hagelstein says his acceptance of cold fusion was by no means immediate. It took several years before he was convinced. [Now] Hagelstein says, he has seen enough cold fusion data to convince him that the science is clearly real. The field's acceptance, he maintains, will be simply a matter of the scientific community's looking at the improved experimental results in the future and coming to understand them.

Note: If the above link fails, click here. Why all the secrecy around this important topic? To learn why the power elite don't want cheap energy, click here.


US seizes independent media sites
2004-10-11, BBC News
http://news.bbc.co.uk/1/hi/technology/3732718.stm

The FBI has shut down some 20 sites which were part of an alternative media network known as Indymedia. A US court order forced the firm hosting the material to hand over two servers in the UK used by the group. Indymedia says it is a news source for the anti-globalisation movement and other social justice issues. The reasons behind the seizure are unclear but the FBI has reportedly said the action was taken at the request of Italian and Swiss authorities. The servers affected were run by Rackspace, a US web hosting company with offices in London. It said it had received a court order from the US authorities last Thursday to hand over the computer equipment at its UK hosting facility. The reasons behind the action against the Indymedia websites are unclear. The group said the servers affected had hosted the sites of more then 20 local collectives and audio streams for several radio stations, as well as several other projects. The seizure has sparked off protests from journalist groups. "The constitution does not permit the government unilaterally to cut off the speech of an independent media outlet, especially without providing a reason or even allowing Indymedia the information necessary to contest the seizure," said EFF [Electronic Frontier Foundation] Staff Attorney Kurt Opsahl.

Note: This important news was not covered by any major U.S. media. Why? Is it a coincidence that these websites were taken down shortly after they started promoting a video clip showing President Bush may have been using an electronic hearing aid during the presidential election debates with John Kerry? Website founder Fred Burks had personal experience suggesting Bush may have used electronic feeds in high-level meetings while Burks worked as a language interpreter for him. For more, click here.


How Bush's grandfather helped Hitler's rise to power
2004-09-25, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/usa/story/0,12271,1312540,00.html

George Bush's grandfather, the late US senator Prescott Bush, was a director and shareholder of companies that profited from their involvement with the financial backers of Nazi Germany. Newly discovered files in the US National Archives [confirm] that a firm of which Prescott Bush was a director was involved with the financial architects of Nazism. His business dealings...continued until his company's assets were seized in 1942 under the Trading with the Enemy Act. There has been a steady internet chatter about the "Bush/Nazi" connection, much of it inaccurate and unfair. But the new documents, many of which were only declassified last year, show that even after America had entered the war...he worked for and profited from companies closely involved with the very German businesses that financed Hitler's rise to power. Remarkably, little of Bush's dealings with Germany has received public scrutiny, partly because of the secret status of the documentation involving him. But now [a] multibillion dollar legal action for damages by two Holocaust survivors against the Bush family, and the imminent publication of three books on the subject are threatening to make Prescott Bush's business history an uncomfortable issue for his grandson. Three sets of archives spell out Prescott Bush's involvement. All three are readily available, thanks to the efficient US archive system. Like his son, George, and grandson, George W, he went to Yale where he was, again like his descendants, a member of the secretive and influential Skull and Bones student society.


On the Voting Machine Makers' Tab
2004-09-12, New York Times
http://www.nytimes.com/2004/09/12/opinion/12sun2.html?ex=1252728000&en=dda931...

Some of electronic voting's loudest defenders have been state and local election officials. Many of those same officials have financial ties to voting machine companies. Former secretaries of state from Florida and Georgia have signed on as lobbyists for Election Systems and Software and Diebold Election Systems. When Bill Jones left office as California's secretary of state in 2003, he quickly became a consultant to Sequoia Voting Systems. His assistant secretary of state took a full-time job there. The list goes on. Even while in office, many election officials are happy to accept voting machine companies' largess. Forty-three percent of the budget of the National Association of Secretaries of State comes from voting machine companies and other vendors. State governments in a growing number of states...have pushed through much-needed laws that require electronic voting machines to produce paper records. But these groups have faced intense opposition from election officials [who] argued that voter-verifiable paper trails...are impractical. While they may sincerely think that electronic voting machines are so trustworthy that there is no need for a paper record of votes, their views have to be regarded with suspicion until their conflicts are addressed.


Camps for Citizens: Ashcroft's Hellish Vision
2004-08-14, Los Angeles Times
http://www.latimes.com/news/printedition/opinion/la-oe-turley14aug14.story

Atty. Gen. John Ashcroft's announced desire for camps for U.S. citizens he deems to be "enemy combatants" has moved him from merely being a political embarrassment to being a constitutional menace. Ashcroft's plan, disclosed last week but little publicized, would allow him to order the indefinite incarceration of U.S. citizens and summarily strip them of their constitutional rights and access to the courts by declaring them enemy combatants. Ashcroft hopes to use his self-made "enemy combatant" stamp for any citizen whom he deems to be part of a wider terrorist conspiracy. Aides have indicated that a "high-level committee" will recommend which citizens are to be stripped of their constitutional rights and sent to Ashcroft's new camps. Few would have imagined any attorney general seeking to reestablish such camps for citizens. We have learned from painful experience that unchecked authority, once tasted, easily becomes insatiable. We are only now getting a full vision of Ashcroft's America. Ashcroft seems to dream of a country secured from itself, neatly contained and controlled by his judgment of loyalty. For more than 200 years, security and liberty have been viewed as coexistent values. Ashcroft and his aides appear to view this relationship as lineal, where security must precede liberty. Every generation has its test of principle in which people of good faith can no longer remain silent in the face of authoritarian ambition. If we cannot join together to fight the abomination of American camps, we have already lost what we are defending.

Note: If the above link fails, click here. This aritcle was written by Jonathan Turley, a professor of constitutional law at George Washington University. Though Ashcroft resigned, the laws he crafted remain in place.


US Justice System Is 'Broken,' Lawyers Say
2004-06-24, The Los Angeles Times
http://www.latimes.com/news/printedition/asection/la-na-punish24jun24,1,72496...

The American criminal justice system relies too heavily on imprisoning people and needs to consider more effective alternatives, according to a study released Wednesday by the American Bar Assn., the nation's largest lawyers' organization. "For more than 20 years, we've gotten tougher on crime," said Dennis W. Archer, a former Detroit mayor and the group's current president. "We can no longer sit by as more and more people — particularly in minority communities — are sent away for longer and longer periods of time while we make it more and more difficult for them to return to society after they serve their time. The system is broken. We need to fix it." Both the number of incarcerated Americans and the cost of locking them up are massive, the report said, and have been escalating significantly in recent years. Between 1974 and 2002, the number of inmates in federal and state prisons rose six-fold. By 2002, 476 out of every 100,000 Americans were imprisoned. In 1982, the states and federal government spent $9 billion on jails and prisons. By 1999, the figure had risen to $49 billion. Based on trends, a black male born in 2001 has a 1 in 3 chance of being imprisoned during his lifetime, while the chances for a Latino male are 1 in 6, and for a white male, 1 in 17. The report contains numerous reform proposals. Among them: the repeal of mandatory minimum sentencing laws; more funding for substance abuse and mental health programs; assistance for prisoners reentering society; [and] task forces to study racial and ethnic disparities in the criminal justice system.

Note: If above link fails, click here. The prison-industrial complex attracts huge profits and strongly supports laws like "three strikes" where third time offenders are automatically imprisoned for life, even for petty crime.


Cosmic bolt probed in shuttle disaster
2003-02-07, San Francisco Chronicle (San Francisco's leading newspaper)
http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2003/02/07/CAMERA.TMP

Federal scientists are looking for evidence that a bolt of electricity in the upper atmosphere might have doomed the space shuttle Columbia as it streaked over California. Investigators are combing records from a network of ultra-sensitive instruments that might have detected a faint thunderclap in the upper atmosphere at the same time a photograph taken by a San Francisco astronomer appears to show a purplish bolt of lightning striking the shuttle. Los Alamos National Laboratories physicist Mark Stanley said that "we've seen very strong ionization in sprites" indicating that there were enough air molecules ionized to cause heating and an accompanying pulse -- a celestial thunderclap, as it were. NASA administrators confirmed Thursday that the photograph ... is being evaluated by Columbia crash investigators. The astronomer, who has asked that his name not be used, has declined to release the digital image to the media. [A] family of "transient" electrical effects occup[ies] this part of the sky, including sprites, which leap from the ionosphere to the tops of thunderheads. Ironically, an experiment of Israeli astronaut Ilan Ramon, aboard the doomed Columbia, was among the last fully funded work conducted on sprites. Scientists have observed interaction between a blue jet and a meteor. And in December 1999, Los Alamos National Laboratories researcher David Suszcynsky and colleagues, including Lyons, published an account of a meteor that apparently triggered a sprite.

Note: For a second article with the subtitle "Mysterious purple streak is shown hitting Columbia 7 minutes before it disintegrated," click here. Though this most bizarre news suggested another possible reason for the crash of the shuttle Columbia, it was virtually ignored throughout the official investigation. Why?


Economist tallies swelling cost of Israel to US
2002-12-09, Christian Science Monitor
http://www.csmonitor.com/2002/1209/p16s01-wmgn.html

Since 1973, Israel has cost the United States about $1.6 trillion. If divided by today's population, that is more than $5,700 per person. This is an estimate by Thomas Stauffer, a consulting economist in Washington. Mr. Stauffer has tallied the total cost to the US of its backing of Israel in its drawn-out, violent dispute with the Palestinians. The bill adds up to more than twice the cost of the Vietnam War. Israel is the largest recipient of US foreign aid. It has been getting $3 billion a year for years. Israel has been given $240 billion since 1973, Stauffer reckons. In addition, the US has given Egypt $117 billion and Jordan $22 billion in foreign aid in return for signing peace treaties with Israel. Stauffer wonders if Americans are aware of the full bill for supporting Israel since some costs, if not hidden, are little known. Other US help includes: • Israel buys discounted, serviceable "excess" US military equipment. Stauffer says these discounts amount to "several billion dollars" over recent years. • Israel uses roughly 40 percent of its $1.8 billion per year in military aid, ostensibly earmarked for purchase of US weapons, to buy Israeli-made hardware. It also has won the right to require the Defense Department or US defense contractors to buy Israeli-made equipment or subsystems, paying 50 to 60 cents on every defense dollar the US gives to Israel. US help ... has enabled Israel to become a major weapons supplier. Weapons make up almost half of Israel's manufactured exports. US defense contractors often resent the buy-Israel requirements and the extra competition subsidized by US taxpayers. Stauffer [has] been assisted in this research by a number of mostly retired military or diplomatic officials who do not go public for fear of being labeled anti-Semitic.

Note: Israel has a population of 6.5 million. Yearly foreign aid to Israel has generally varied between $2.5 to 3.0 billion for many years (it's difficult to locate these figures on U.S. government websites). If you do the math, U.S. taxpayers are giving every man, woman, and child, in Israel about $400/year -- over ten times the per capita rate paid to any other country. That's quite a tax break, especially considering they are not Americans.


Live rats driven by remote control
2002-05-05, The Guardian (One of the U.K.'s leading newspapers)
http://www.guardian.co.uk/international/story/0,3604,708454,00.html

Scientists have turned living rats into remote-controlled, pleasure-driven robots which can be guided up ladders, through ruins and into minefields at the click of a laptop key. The project ... is funded by the US military's research arm. Animals have often been used by humans in combat and in search and rescue, but not under direct computer-to-brain electronic control. The advent of surgically altered roborats marks the crossing of a new boundary in the mechanisation, and potential militarisation, of nature. In 10 sessions the rats learned that if they ran forward and turned left or right on cue, they would be "rewarded" with a buzz of electrically delivered pleasure. Once trained they would move instantaneously and accurately as directed, for up to an hour at a time. The rats could be steered up ladders, along narrow ledges and down ramps, up trees, and into collapsed piles of concrete rubble. Roborats fitted with cameras or other sensors could be used as search and rescue aids. In theory, be put to some unpleasant uses, such as assassination. [For] surveillance ... you could apply this to birds ... if you could fit birds with sensors and cameras. Michael Reiss, professor of science education at London's Institute of Education and a leading bioethics thinker ... said he was uneasy about humankind "subverting the autonomy" of animals. "There is a part of me that is not entirely happy with the idea of our subverting a sentient animal's own aspirations and wish to lead a life of its own."

Note: Remember that secret military projects are almost always at least a decade in advance of anything you read in the media. For lots more on this little-known subject, click here.


Chemical Coup d'etat
2002-04-16, The Guardian (One of the U.K.'s leading newspapers)
http://www.guardian.co.uk/Archive/Article/0,4273,4394862,00.html

The US wants to depose the diplomat who could take away its pretext for war with Iraq. On Sunday, the US government will launch an international coup. It has been planned for a month. It will be executed quietly, and most of us won't know what is happening until it's too late. It is seeking to overthrow 60 years of multilateralism in favour of a global regime built on force. The coup begins with its attempt ... to unseat the man in charge of ridding the world of chemical weapons. If it succeeds, this will be the first time that the head of a multilateral agency will have been deposed in this manner. The coup will also shut down the peaceful options for dealing with the chemical weapons Iraq may possess, helping to ensure that war then becomes the only means of destroying them. The Organisation for the Prohibition of Chemical Weapons (OPCW) enforces the chemical weapons convention. Its director-general is a workaholic Brazilian diplomat called Jose Bustani. He has, arguably, done more in the past five years to promote world peace than anyone else on earth. His inspectors have overseen the destruction of 2 million chemical weapons and two-thirds of the world's chemical weapon facilities. In May 2000, as a tribute to his extraordinary record, Bustani was re-elected unanimously by the member states for a second five-year term. Last year Colin Powell wrote to him to thank him for his "very impressive" work. But now everything has changed. [But now] the man celebrated for his achievements has been denounced as an enemy of the people. In January, with no prior warning or explanation, the US state department asked the Brazilian government to recall him.

Note: The "coup" was successful. The New York Times, though reporting few of the details above, stated six days after the above article, "José M. Bustani ... was voted out of office today after refusing repeated demands by the United States that he step down because of his 'management style.'" For why this highly revealing story received no media coverage in the U.S., click here. For a top U.S. general's comments, click here.


US grants N Korea nuclear funds
2002-04-02, BBC News
http://news.bbc.co.uk/1/hi/world/asia-pacific/1908571.stm

The US Government has announced that it will release $95m to North Korea as part of an agreement to replace the Stalinist country's own nuclear programme, which the US suspected was being misused. In releasing the funding, President George W Bush waived the Framework's requirement that North Korea allow inspectors to ensure it has not hidden away any weapons-grade plutonium from the original reactors. President Bush argued that the decision was "vital to the national security interests of the United States". The head of the Non-proliferation Policy Education Centre in Washington, a critic of the Agreed Framework, has warned that even when the new reactors are completed they may not be tamper-proof. "These reactors are like all reactors, They have the potential to make weapons. So you might end up supplying the worst nuclear violator with the means to acquire the very weapons we're trying to prevent it acquiring," Henry Sokolski told the Far Eastern Economic Review.

Note: Though this article is from 2002, one must ask why on earth President Bush would waive the requirement for inspectors who would ensure no nuclear weapons development? Wasn't this one of three countries he had already labeled as the axis of evil? For answers to these questions, click here.


Who pulls the strings?
2001-03-10, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/books/2001/mar/10/extract1

So this is how it works. A tiny, shoe-string central office in Holland decides each year which country will host the next meeting. Each country has two steering committee members. They call up Bilderberg-friendly global corporations, such as Xerox or Heinz or Fiat or Barclays or Nokia, which donate the hundreds of thousands of pounds needed. They do not accept unsolicited donations from non-Bilderberg corporations. Nobody can buy their way into a Bilderberg meeting, although many corporations have tried. Then they decide who to invite - who seems to be a "Bilderberg person". The notion of a Bilderberg person hasn't changed since the earliest days, back in 1954. The guests are expressly asked not to give interviews to journalists. There are two morning sessions and two afternoon sessions. While furiously denying that they secretly ruled the world, my Bilderberg interviewees did admit to me that international affairs had, from time to time, been influenced by these sessions. This is how Denis Healey described a Bilderberg person to me: "To say we were striving for a one-world government is exaggerated, but not wholly unfair. Bilderberg is a way of bringing together politicians, industrialists, financiers and journalists. Politics should involve people who aren't politicians."

Note: For lots more on the highly secretive Bilderberg meeting from two later BBC News article, click here. For many other revealing articles from major media reports on secret societies and secret meetings of the most rich and powerful people in our world, click here.


History in black and white
1997-01-26, The Telegraph (One of the UK's leading newspapers)
http://www.independent.co.uk/arts-entertainment/history-in-black-and-white-12...

[Review of] RHODES: The Race for Africa by Antony Thomas, BBC Books. The book is ... intelligent, detailed, well-researched and credibly nuanced. The book's aim is to kill off once and for all the public-schoolboy perception of [Cecil] Rhodes as the model Englishman who selflessly deployed his vast diamond wealth to the task of civilising Southern Africa while adding, virtually single-handedly, a chunk of territory the size of Europe to Her Majesty's imperial possessions. The picture that persuasively emerges in the book [is] of a man of immense charm and demonic single-mindedness. Rhodes ... tailored his rhetoric to suit an age when lust for acquisition had to be dressed in the garb of moral rectitude. Thus the famous lines from his precocious personal credo, drafted at the age of 23: "I contend that we are the finest race in the world, and the more of the world we inhabit, the better it is for the human race." Business ... was the medium he employed to pursue personal power. He beat his rivals not by fighting them but by seducing them. By bribery (Rhodes coined the expression "every man has his price") or sheer force of personality, or more often both, he submitted members of the British cabinet, Kruger's Boers and proud African chieftains to his colossal will. Such were his powers of persuasion that after a smallpox epidemic struck Kimberley in 1883, he prevailed upon local doctors to sign false documents declaring the outbreak to be a rare skin disease. Thus did he prevent the temporary closure of his diamond mines and thus did at least 751 people needlessly, hideously die. By the end of the book Thomas leaves us in no doubt as to Rhodes' greatness, but he concludes that it was a misdirected greatness, a story of talents squandered and opportunities lost.

Note: Often portrayed in history books as one of the most influential men of the 19th century, Rhodes not only believed his was the superior race, in his will he advocated "for the establishment, promotion and development of a Secret Society, the true aim and object whereof shall be for the extension of British rule throughout the world." For major media reports revealing other secret societies with similar aims, click here. For more information on Rhodes and secret societies from Caroll Quigley's epic Tragedy and Hope, click here.


Weather as a Force Multiplier: Owning the Weather in 2025
1996-08-01, US Air Force Air University
http://csat.au.af.mil/2025/volume3/vol3ch15.pdf

In 2025, US aerospace forces can “own the weather” by capitalizing on emerging technologies and focusing development of those technologies to war-fighting applications. Such a capability offers the war fighter tools to shape the battlespace in ways never before possible. Weather-modification is a force multiplier with tremendous power that could be exploited across the full spectrum of war-fighting environments. From enhancing friendly operations or disrupting those of the enemy via small-scale tailoring of natural weather patterns complete dominance of global communications and counter-space control, weather-modification offers war fighter a wide-range of possible options to defeat or coerce an adversary. But, while offensive weather modification efforts would certainly be undertaken by US forces with great caution and trepidation, it is clear that we cannot afford to allow an adversary to obtain an exclusive weather-modification capability.

Note: The above quote is taken from pages 6 and 35, the executive summary and conclusion of the above US Air Force study. For a highly revealing article suggesting elements within government have much more control over the weather than is thought, click here.


Secrets by the thousands
1946-10-01, Harper's magazine
http://www.harpers.org/archive/1946/10/0032777

Someone wrote to Wright Field recently, saying he understood this country had got together quite a collection of enemy war secrets, that many were now on public sale, and could he, please, be sent everything on German jet engines. 'The Army Air Forces' answered: "Sorry – but that would be fifty tons." Moreover, that fifty tons was just a small portion. Wright Field is working from a documents "mother lode" of fifteen hundred tons. It is estimated that over a million separate items ... very likely contain practically all the scientific, industrial, and military secrets of Germany. What did we find? The head of the communications unit ... showed me then what had been two of the most closely-guarded technical secrets of the war: the infra-red device which the Germans invented for seeing at night, and the remarkable diminutive generator which operated it. The diminutive generator – five inches across – stepped up current from an ordinary flashlight battery to 15,000 volts. It had a walnut-sized motor which spun a rotor at 10,000 rpm. The generator then ran 3,000 hours! "As for medical secrets in this collection," one Army-surgeon has remarked, "some of them will save American medicine years of research; some of them are revolutionary – like, for instance, the German technique for treatment after prolonged and usually fatal exposure to cold." This discovery ... reversed everything medical science thought about the subject. And in aeronautics and guided missiles [the secrets] proved to be downright alarming. Army Air Force experts declare publicly that in rocket power and guided missiles the Nazis were ahead of us by at least ten years.

Note: To read the entire fascinating article, click here. To verify this article on the Harper's Magazine website, click here. How can the Nazi technology have been so far superior to that of the allies? For the riveting testimony of numerous military officers on the back engineering of UFO technologies, click here.


Amazon has a patent to keep you from comparison shopping while you’re in its stores
2017-06-16, Washington Post
https://www.washingtonpost.com/news/innovations/wp/2017/06/16/amazon-has-a-pa...

As grocery shoppers work to digest Amazon’s massive acquisition of Whole Foods for $13.7 billion, the digital storefront recently scored a victory that aims to reinforce the company’s growing investments in brick-and-mortar retail. Amazon was awarded a patent May 30 that could help it choke off a common issue faced by many physical stores: Customers’ use of smartphones to compare prices even as they walk around a shop. But Amazon now has the technology to prevent that type of behavior when customers enter any of its physical stores and log onto the WiFi networks there. Titled “Physical Store Online Shopping Control,” Amazon’s patent describes a system that can identify a customer’s Internet traffic and sense when the smartphone user is trying to access a competitor’s website. When that happens, Amazon may take one of several actions. It may block access to the competitor’s site, preventing customers from viewing comparable products from rivals. It might redirect the customer to Amazon’s own site or to other, Amazon-approved sites. It might notify an Amazon salesperson to approach the customer. Or it might send the customer’s smartphone a text message, coupon or other information designed to lure the person back into Amazon’s orbit.

Note: For more along these lines, see concise summaries of deeply revealing corporate corruption news articles from reliable major media sources.


Facial recognition database used by FBI is out of control, House committee hears
2017-03-27, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/technology/2017/mar/27/us-facial-recognition-data...

Approximately half of adult Americans’ photographs are stored in facial recognition databases that can be accessed by the FBI, without their knowledge or consent, in the hunt for suspected criminals. About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports. The algorithms used to identify matches are inaccurate about 15% of the time, and are more likely to misidentify black people than white people. These are just some of the damning facts presented at last week’s House oversight committee hearing, where politicians and privacy campaigners criticized the FBI and called for stricter regulation of facial recognition technology at a time when it is creeping into law enforcement and business. The FBI first launched its advanced biometric database ... in 2010, augmenting the old fingerprint database with further capabilities including facial recognition. The bureau did not inform the public ... nor did it publish a privacy impact assessment, required by law, for five years. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos. Last year, the US government accountability office (GAO) analyzed the FBI’s use of facial recognition technology and found it to be lacking in accountability, accuracy and oversight. “It doesn’t know how often the system incorrectly identifies the wrong subject,” explained the GAO’s Diana Maurer. “Innocent people could bear the burden of being falsely accused.”

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


Peter Thiel Wants to Inject Himself with Young People's Blood
2016-08-01, Vanity Fair
http://www.vanityfair.com/news/2016/08/peter-thiel-wants-to-inject-himself-wi...

Trump delegate and Gawker bankrupter Peter Thiel is no stranger to the idea of increasing his lifespan through science. On Bloomberg TV in 2014, Thiel explained that he was taking human-growth hormone pills as part of his plan to live 120 years. Given Thiel’s obsession with warding off death, it comes as no surprise that the Silicon Valley billionaire is interested in at least one radical way of doing it: injecting himself with a young person’s blood. [In] a year-old interview ... the venture-capitalist [said] that he’s interested in parabiosis, which includes the practice of getting transfusions of blood from a younger person, as a means of improving health and potentially reversing aging. “I'm looking into parabiosis stuff. This is where they did the young blood into older mice and they found that had a massive rejuvenating effect,” he said. “It’s one of these very odd things where people had done these studies in the 1950s and then it got dropped altogether. I think there are a lot of these things that have been strangely under-explored.” A Thiel Capital employee ... previously expressed interest in the technique to Jesse Karmazin, the founder of Ambrosia LLC, a company that has been looking for volunteers over the age of 35 to receive blood transfusions from individuals under the age of 25. Bercovici notes that Silicon Valley is abound with rumors of wealthy tech elites experimenting with parabiosis, and Gawker ... received a tip in June claiming that Thiel “spends $40,000 per quarter to get an infusion of blood from an 18-year-old.”

Note: One university researcher has found that many in the European royalty until the end of the 18th century practiced selective cannibalism in the belief if would keep them young. Another article goes into greater depth about the practice some elder members of the wealthy elite taking blood infusions from young people to stay young.


Why Operation Jade Helm 15 is freaking out the Internet
2015-03-31, Washington Post
http://www.washingtonpost.com/news/checkpoint/wp/2015/03/31/why-the-new-speci...

Elite service members from four branches of the U.S. military will launch an operation this summer in which they will operate covertly among the U.S. public and travel from state to state in military aircraft. Texas, Utah and a section of southern California are labelled as hostile territory, and New Mexico isn’t much friendlier. That’s the scheme for Jade Helm 15, a new Special Operations exercise that runs from July 15 to Sept. 15. Army Special Operations Command announced it last week, saying the size and scope of the mission sets it apart from many other training exercises. The exercise has prompted widespread conspiracy theories that the United States is preparing to hatch martial law. In particular, some have expressed alarm about this map, which outlines events for the exercise in unclassified documents posted online last week. The Washington Post verified them to be legitimate by speaking to Army sources. They appear to have been prepared for local authorities. It’s also worth noting that the military has routinely launched exercises in the past in which regions of the United States are identified as hostile for the purpose of training.

Note: This Washington Post article is clearly playing down some important facts and developments. Why is the US military spending so much time and money preparing for scenarios where US soil and citizens are considered enemies? Read and educate yourself with this excellent article on Operation Jade Helm 15, one in a string of US exercises planning for mass civilian arrests under a variety of scenarios.


Navy Plans Electromagnetic War Games Over National Park and Forest in Washington State
2014-11-10, Truthout
http://www.truth-out.org/news/item/27339-navy-plans-electromagnetic-war-games...

Olympic National Park and Olympic National Forest in Washington State are ... where the US Navy aims to conduct its Northwest Electromagnetic Radiation Warfare training program. It will fly ... 2,900 training exercises over wilderness, communities and cities across the Olympic Peninsula for 260 days per year, with exercises lasting up to 16 hours per day. No public notices for the Navy's plans were published in any media that directly serve the Olympic Peninsula. But word spread. Public outcry forced the Navy to extend the public comment period until November 28 and schedule more public meetings. According to the US Navy's Information Dominance Roadmap 2013-2028, the Navy states it "will require new capabilities to fully employ integrated information in warfare by expanding the use of advanced electronic warfare." The purpose of these war games is to train to deny the enemy "all possible frequencies of electromagnetic radiation (i.e. electromagnetic energy) for use in such applications as communication systems..." David King, the mayor of Port Townsend, a town on the Northeast corner of the Olympic Peninsula, has voiced his opposition to the plan, along with numerous other public officials. Mike Welding, the Naval Air Station at Whidbey Island spokesman, recently admitted to reporters, "If someone is in the exclusion area for more than 15 minutes, that's a ballpark estimate for when there would be some concern for potential to injure, to receive burns."

Note: We don't generally use truth-out.org as a reliable source, but as no major media are covering this most important development, we're including this article here. To verify this information, please click on some of the links in the article and see the U.S. Navy's "Information Dominance Roadmap".


Key Democrats, Led by Hillary Clinton, Leave No doubt that Endless War is Official U.S. Doctrine
2014-10-07, The Intercept with Glenn Greenwald
https://firstlook.org/theintercept/2014/10/07/key-democrats-led-hillary-clint...

Any doubts about whether Endless War ... is official American doctrine should be permanently erased by this week’s comments from two leading Democrats, both former top national security officials in the Obama administration. Leon Panetta, the long-time Democratic Party operative who served as Obama’s Defense Secretary and CIA Director, said this week of Obama’s new bombing campaign: “I think we’re looking at kind of a 30-year war.” He criticized Obama ... for being insufficiently militaristic. Then we have Hillary Clinton [who] at an event in Ottawa yesterday ... proclaimed that the fight against these “militants” will “be a long-term struggle” that should entail an “information war” as “well as an air war.” The new war, she said, is “essential” and the U.S. shies away from fighting it “at our peril.” Like Panetta (and most establishment Republicans), Clinton made clear ... that virtually all of her disagreements with Obama’s foreign policy were the by-product of her view of Obama as insufficiently hawkish, militaristic and confrontational. “Endless War” is not dramatic rhetorical license but a precise description of America’s foreign policy. It’s not hard to see why. A state of endless war justifies ever-increasing state power and secrecy and a further erosion of rights. It also entails a massive transfer of public wealth to the “homeland security” and weapons industry (which the US media deceptively calls the “defense sector”). The War on Terror ... was designed from the start to be endless. This war ... thus enables an endless supply of power and profit to flow to those political and economic factions that control the government regardless of election outcomes.

Note: Read the prophetic writings of one of the most highly decorated US generals ever describing how he discovered after retirement that war is created by bankers and mega-corporations to funnel ever more tax-payer money into their coffers. For more along these lines, see the excellent, reliable resources provided in our War Information Center.


George Brandis has silently swept away your freedoms
2014-09-29, Sydney Morning Herald (Australia's leading newspaper)
http://www.smh.com.au/comment/george-brandis-has-silently-swept-away-your-fre...

Australia has changed radically since last week though it might not look like it on the surface. Late Thursday night the Senate passed the National Security Amendment Bill (No.1) 2014 giving unlimited power to spies and secret police. Now officials can break the law with immunity from prosecution - and without having to answer to a court. They can act in total secrecy. They will decide what they do and to whom and when. They do not have to ask permission. They will choose when to interfere in your life and when they won't. They can dip into your most private communications and they don't need a warrant to do so. Sometimes they will do it because it is necessary to fight crime. Sometimes because they enjoy it. If they mess up your life and you tell anybody, you will get 10 years' jail – even if it doesn't harm security. When a Special Intelligence Operation (SIO) is declared then any participant can break the law on you with no consequences, according to Schedule 3 section 35k. There are broad limits. They cannot kill or torture you, or cause significant physical injury. Minor injury or mental torment is fine. Anyone involved in an SIO will have these powers – but who are they? ASIO, with 1778 staff. The Australian Federal Police, with more than 6900 staff. NSW Police with about 16,370 officers and a spy database called COPS which has more than 30 million entries on the people of NSW. But not just them. Anyone involved in an SIO enjoys legal immunity, including affiliates and subcontractors – whoever they are. Many Senators clearly hadn't read the 128 pages of major legal changes in the NSA Bill. The citizen needs protection from the state built into the laws and that is what they smashed on Thursday.

Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


Nigeria Launches Electronic ID Cards
2014-08-28, BBC News
http://www.bbc.com/news/world-africa-28970411

Nigeria's president has formally launched a national electronic identity card, which all Nigerians will have to have by 2019 if they want to vote ... the first biometric card which can also be used to make electronic payments. MasterCard is providing the prepaid payment element and it hopes millions of Nigerians without bank accounts will now gain access to financial services. An attempt to introduce national ID cards in Nigeria 10 years ago failed. Analysts blame corruption for its failure. MasterCard said combining an identity card with a payment card for those aged 16 and over was a significant move. "It breaks down one of the most significant barriers to financial inclusion - proof of identity," MasterCard's Daniel Monehin said in a statement. The new cards show a person's photograph, name, age and unique ID number - and 10 fingerprints and an iris are scanned during enrolment. These details are intended to ensure that there are no duplicates on the system. During the pilot phase, which began registering names last October, 13 million MasterCard-branded ID cards will be issued. There are enrolment centres in all 36 states and there is no fee to get the card, though people will be charged in the event that it needs to be replaced. The Nigerian Identity Management Commission (NIMC), which is behind the rollout, is trying to integrate several government databases including those for driving licences, voter registration, health insurance, taxes and pensions.

Note: This identification scheme is underwritten by a major financial services company, and directly connects a citizen's political identity, financial identity, and biological identity to a centralized electronic database. To understand some of the dangers of this, see concise summaries of deeply revealing microchip implant news articles from reliable major media sources.


Embracing flag, Snowden says he hopes to return to U.S.
2014-08-13, USA Today
http://www.usatoday.com/story/news/world/2014/08/13/snowden-wired-flag/13995013/

Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."

Note: Read the cover story from Wired magazine with a deep inside report on Snowden.


Before Snowden: The Whistleblowers Who Tried To Lift The Veil
2014-07-22, NPR
http://www.npr.org/2014/07/22/333741495/before-snowden-the-whistleblowers-who...

Bill Binney worked at the National Security Agency [for] nearly three decades as one of its leading crypto-mathematicians. He then became one of its leading whistleblowers. The NSA is overseen by Congress, the courts and other government departments. It's also supposed to be watched from the inside by its own workers. But over the past dozen years, whistleblowers like Binney have had a rough track record. Those who tried unsuccessfully to work within the system say Edward Snowden — the former National Security Agency contractor who shared top-secret documents with reporters — learned from their bitter experience. For Binney, the decision to quit the NSA and become a whistleblower began a few weeks after the terrorist attacks of Sept. 11, 2001, when he says he discovered the spy agency had begun using software he'd created to scoop up information on Americans — all without a court order. "I had to get out of there, because they were using the program I built to do domestic spying, and I didn't want any part of it, I didn't want to be associated with it," he says. "I look at it as basically treason. They were subverting the Constitution." Binney says he and two other NSA colleagues who also quit tried sounding the alarm with congressional committees. But because they did not have documents to prove their charges, nobody believed them. Snowden, he says, did not repeat that mistake. "He recognized right away, it was very clear to me, that if he wanted anybody to believe him, he'd have to take a lot of documentation with him — which is what he did," Binney says.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


N.S.A. Collecting Millions of Faces From Web Images
2014-06-01, New York Times
http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-we...

The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents. The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed. The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. It is not clear how many people around the world, and how many Americans, might have been caught up in the effort. Neither federal privacy laws nor the nation’s surveillance laws provide specific protections for facial images. Civil-liberties advocates and other critics are concerned that the power of the improving technology, used by government and industry, could erode privacy. “Facial recognition can be very invasive,” said Alessandro Acquisti, a researcher on facial recognition technology at Carnegie Mellon University.

Note: For another New York Times article showing how the NSA is using mobile phone apps to "snatch data revealing the player’s location, age, sex and other personal information," see this article.


Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas
2014-05-19, The Intercept
https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-...

The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. SOMALGET is part of a broader NSA program called MYSTIC, which ... is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Glenn Greenwald: from Martin Luther King to Anonymous, the state targets dissenters not just "bad guys"
2014-05-13, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/may/13/glenn-greenwald-anonymous-mass-s...

The opportunity those in power have to characterise political opponents as "national security threats" or even "terrorists" has repeatedly proven irresistible. In the past decade, the government ... has formally so designated environmental activists, broad swaths of anti-government rightwing groups, anti-war activists, and associations organised around Palestinian rights. One document from the Snowden files, dated 3 October 2012, chillingly underscores the point. It revealed that the agency has been monitoring the online activities of individuals it believes express "radical" ideas and who have a "radicalising" influence on others. Among the information collected about the individuals, at least one of whom is a "US person", are details of their online sex activities and "online promiscuity." The agency discusses ways to exploit this information to destroy their reputations and credibility. The record is suffused with examples of groups and individuals being placed under government surveillance by virtue of their dissenting views and activism – Martin Luther King, the civil rights movement, anti-war activists, environmentalists. The NSA's treatment of Anonymous ... is especially troubling and extreme. Gabriella Coleman, a specialist on Anonymous at McGill University, said that [Anonymous] "is not a defined" entity but rather "an idea that mobilises activists to take collective action and voice political discontent. It is a broad-based global social movement with no centralised or official organised leadership structure. Some have rallied around the name to engage in digital civil disobedience, but nothing remotely resembling terrorism."

Note: This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


United States Of Secrets
2014-05-12, KPBS.org
http://www.kpbs.org/news/2014/may/12/frontline-united-states-secrets/

When NSA contractor Edward Snowden downloaded tens of thousands of top-secret documents from a highly secure government network, it led to the largest leak of classified information in history — and sparked a fierce debate over privacy, technology and democracy in the post-9/11 world. Now, in "United States Of Secrets," FRONTLINE goes behind the headlines to reveal the dramatic inside story of how the U.S. government came to monitor and collect the communications of millions of people around the world—including ordinary Americans—and the lengths they went to trying to hide the massive surveillance program from the public. “This is as close to the complete picture as anyone has yet put together — and it’s bigger and more pervasive than we thought,” says veteran FRONTLINE filmmaker Michael Kirk. In part one ... Kirk [pieces] together the secret history of the unprecedented surveillance program that began in the wake of September 11 and continues today – even after the revelations of its existence by Edward Snowden. Then, in part two, premiering Tuesday, May 20 ..., veteran FRONTLINE filmmaker Martin Smith continues the story, exploring the secret relationship between Silicon Valley and the National Security Agency, and investigating how the government and tech companies have worked together to gather and warehouse your data. “Through in-depth interviews with more than 60 whistleblowers, elected officials, journalists, intelligence insiders and cabinet officials, we have woven together the secret narrative that reveals the scale and scope of the government’s spying program,” says Kirk.

Note: Don't miss this engaging program, available at this link. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Glenn Greenwald: the explosive day we revealed Edward Snowden's identity to the world
2014-05-11, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/may/11/glenn-greenwald-nsa-whistleblowe...

On Sunday 9 June 2013, the Guardian published the story that revealed [Edward] Snowden to the world. The article told Snowden's story, conveyed his motives, and proclaimed that "Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley [now Chelsea] Manning." We quoted [a note from Snowden that said:] "I understand that I will be made to suffer for my actions … but I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant." The reaction to the article and the video was more intense than anything I had experienced as a writer. Ellsberg himself, writing the following day in the Guardian, proclaimed that "there has not been in American history a more important leak than Edward Snowden's release of NSA material – and that definitely includes the Pentagon Papers 40 years ago". Several hundred thousand people posted the link to their Facebook accounts in the first several days alone. Almost three million people watched the interview on YouTube. Many more saw it on the Guardian's website. The overwhelming response was shock and inspiration at Snowden's courage.

Note: Don't miss the full, exciting story of how Snowden originally came to leak his stunning information at the link above. This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Stories about NSA surveillance, Snowden leaks win Pulitzers for two news groups
2014-04-14, CNN
http://www.cnn.com/2014/04/14/us/pulitzer-prizes-journalism

Two news organizations' stories about National Security Agency surveillance, based upon documents leaked by Edward Snowden, have been awarded the Pulitzer Prize for public service, often described as the highest prize in American journalism. The Washington Post and ... The Guardian each received the prize on [April 14]. The recognition of the NSA reporting was most significant because of the questions raised by Snowden's leaks and the reaction to them. Snowden, who has been living in Russia while seeking asylum from U.S. prosecution, said in a statement that the Pulitzer board's recognition of the coverage was "vindication for everyone who believes that the public has a role in government." "We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance." While Snowden provided a trove of documents, reporters including Glenn Greenwald, working for the Guardian; Barton Gellman, working for The Post; and Laura Poitras, who worked with both, pored over the raw information, decided with their editors what parts were ethical to publish, and turned the information into stories that stunned readers around the world.

Note: For more on the historic Snowden revelations, see the deeply revealing reports from reliable major media sources available here.


NSA posed as Facebook to infect computers with malware, report says
2014-03-12, Los Angeles Times
http://www.latimes.com/business/technology/la-fi-tn-nsa-posing-facebook-malwa...

The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.

Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.


N.S.A. Devises Radio Pathway Into Computers
2014-01-15, New York Times
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-conn...

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


NSA review to leave spying programs largely unchanged, reports say
2013-12-13, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/dec/13/nsa-review-to-leave-spying-progr...

A participant in a White House-sponsored review of surveillance activities described as “shameful” an apparent decision to leave most of the National Security Agency’s controversial bulk spying intact. Sascha Meinrath, director of the Open Technology Institute, said [on December 13] that ... “The review group was searching for ways to make the most modest pivot necessary to continue business as usual.” Should the review group’s report resemble descriptions that leaked ... the report “does nothing to alter the lack of trust the global populace has for what the US is doing, and nothing to restore our reputation as an ethical internet steward,” said Meinrath, who met with the advisory panel and White House officials twice to discuss the bulk surveillance programs that have sparked international outrage. Leaks about the review group’s expected recommendations to the New York Times and Wall Street Journal strengthened Meinrath and other participants’ long-standing suspicions that much of the NSA’s sweeping spy powers would survive. The Times quoted an anonymous official familiar with the group saying its report “says we can’t dismantle these programs, but we need to change the way almost all of them operate”. According to the leaks, the review group will recommend that bulk collection of every American’s phone call data continue, possibly by the phone companies instead of the NSA, with tighter restrictions than the “reasonable, articulable suspicion” standard for searching through them that the NSA currently employs.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


Law enforcement using methods from NSA playbook
2013-12-08, USA Today
http://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-ns...

The National Security Agency isn't the only government entity secretly collecting data from people's cellphones. Local police are increasingly scooping it up, too. Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information about thousands of cellphone users at a time, whether they are targets of an investigation or not. The records, from more than 125 police agencies in 33 states, reveal [that] about one in four law-enforcement agencies have used a tactic known as a "tower dump," which gives police data about the identity, activity and location of any phone that connects to the targeted cellphone towers over a set span of time, usually an hour or two. A typical dump covers multiple towers, and wireless providers, and can net information from thousands of phones. At least 25 police departments own a Stingray, a suitcase-size device that costs as much as $400,000 and acts as a fake cell tower. The system, typically installed in a vehicle so it can be moved into any neighborhood, tricks all nearby phones into connecting to it and feeding data to police. In some states, the devices are available to any local police department via state surveillance units. Organizations such as the American Civil Liberties Union and Electronic Privacy Information Center say the swelling ability by even small-town police departments to easily and quickly obtain large amounts of cellphone data raises questions about the erosion of people's privacy as well as their Fourth Amendment protections against unreasonable search and seizure.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data
2013-11-20, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-p...

The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden. In the first explicit confirmation that UK citizens have been caught up in US mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo ... says the material is being put in databases where it can be made available to other members of the US intelligence and military community. Until now, it had been generally understood that the citizens of each country were protected from surveillance by any of the others. But the Snowden material reveals that: • In 2007, the rules were changed to allow the NSA to analyse and retain any British citizens' mobile phone and fax numbers, emails and IP addresses swept up by its dragnet. • These communications were "incidentally collected" by the NSA, meaning the individuals were not the initial targets of surveillance operations and therefore were not suspected of wrongdoing. • The NSA has been using the UK data to conduct so-called "pattern of life" or "contact-chaining" analyses, under which the agency can look up to three "hops" away from a target of interest – examining the communications of a friend of a friend of a friend. Three hops for a typical Facebook user could pull the data of more than 5 million people into the dragnet.

Note: For more on government threats to privacy, see the deeply revealing reports from reliable major media sources available here.


FISA court order that allowed NSA surveillance is revealed for first time
2013-11-19, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/19/court-order-that-allowed-nsa-sur...

A secret court order that authorised a massive trawl by the National Security Agency of Americans' email and internet data was published for the first time on [November 18], among a trove of documents that also revealed a judge's concern that the NSA "continuously" and "systematically" violated the limits placed on the program. Another later court order found that what it called "systemic overcollection" had taken place. In a heavily redacted opinion Colleen Kollar-Kotelly, the former presiding judge of the FISA court, placed legal weight on the methods of surveillance employed by the NSA, which had never before collected the internet data of “an enormous volume of communications”. The methods, known as pen registers and trap-and-trace devices, record the incoming and outgoing routing information of communications. Kollar-Kotelly ruled that acquiring the metadata, and not the content, of email and internet usage in bulk was harmonious with the “purpose” of Congress and prior court rulings – even though no surveillance statute ever authorized it and top officials at the Justice Department and the FBI threatened to resign in 2004 over what they considered its dubious legality. The type of data collected under the program included information on the "to", "from" and "bcc" lines of an email rather than the content. Metadata, wrote Kollar-Kotelly, enjoyed no protection under the fourth amendment to the US constitution, a precedent established by the Supreme Court in 1979 in a single case on which the NSA relies currently.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


Snowden Says He Took No Secret Files to Russia
2013-10-17, New York Times
http://www.nytimes.com/2013/10/18/world/snowden-says-he-took-no-secret-files-...

Edward J. Snowden, the former National Security Agency contractor, said in an extensive interview this month that he did not take any secret N.S.A. documents with him to Russia when he fled there in June, assuring that Russian intelligence officials could not get access to them. He also asserted that he was able to protect the documents from China’s spies because he was familiar with that nation’s intelligence abilities, saying that as an N.S.A. contractor he had targeted Chinese operations and had taught a course on Chinese cybercounterintelligence. “There’s a zero percent chance the Russians or Chinese have received any documents,” he said. Mr. Snowden added that inside the spy agency “there’s a lot of dissent.” But he said that people were kept in line through “fear and a false image of patriotism,” which he described as “obedience to authority.” He said he believed that if he tried to question the N.S.A.’s surveillance operations as an insider, his efforts “would have been buried forever,” and he would “have been discredited and ruined.” Mr. Snowden said he finally decided to act when he discovered a copy of a classified 2009 inspector general’s report on the N.S.A.’s warrantless wiretapping program during the Bush administration. After reading about the program, which skirted the existing surveillance laws, he concluded that it had been illegal, he said. “If the highest officials in government can break the law without fearing punishment or even any repercussions at all,” he said, “secret powers become tremendously dangerous.”

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


N.S.A. Gathers Data on Social Connections of U.S. Citizens
2013-09-29, New York Times
http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citiz...

Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials. The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor. The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners. Almost everything about the agency’s operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nation’s intelligence court or any public debate.

Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


ACLU warns of mass tracking through license plate scanners
2013-07-18, CBS News
http://www.cbsnews.com/8301-201_162-57594179/aclu-warns-of-mass-tracking-thro...

The American Civil Liberties Union is warning that law enforcement officials are using license plate scanners to amass massive and unregulated databases that can be used to track law-abiding citizens as their go about their daily lives. In a new report, "You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements," the ACLU discusses the data culled from license plate scanners - cameras mounted on patrol cars, overpasses and elsewhere to record your license plate number and location at a given time. There are tens of thousands such cameras now in operation, according to the group, with the data in some cases being stored indefinitely. The ACLU report is the result of an analysis of 26,000 pages of documents from police departments around the country, obtained through nearly 600 [FOIA] requests. It finds that while some jurisdictions keep the information gleaned from the scanners for a short time ... many hold onto the data for years. The organization complains that there are "virtually no rules in place" to keep officials from tracking "everybody all the time." The ACLU also warns that the data is being fed into larger databases, with the private National Vehicle Location Service now holding more than 800 million license plate records. The group's database is used by more than 2,200 law enforcement customers. The [ACLU] report warns that the data can be used in an official capacity to spy on protesters or target communities based on their religious beliefs, or unofficially by a police officer who wants to keep an eye on a romantic rival.

Note: For more on privacy, see the deeply revealing reports from reliable major media sources available here.


Wearing a mask at a riot is now a crime
2013-06-19, CBC (Canada's Public Broadcasting System)
http://www.cbc.ca/news/canada/story/2013/06/19/pol-mask-bill-royal-assent.html

A bill that bans the wearing of masks during a riot or unlawful assembly and carries a maximum 10-year prison sentence ... became law today. The bill is meant to give police an added tool to prevent lawful protests from becoming violent riots, and that it will help police identify people who engage in vandalism or other illegal acts. The bill originally proposed a penalty of up to five years, but the House of Commons justice committee amended it and doubled the penalty to up to 10 years in prison for committing the offence. The bill didn't have unanimous support, and was opposed by some who are concerned about its effect on freedom of expression and privacy. Civil liberties advocates argued the measures could create a chilling effect on free speech and that peaceful protesters can unintentionally find themselves involved in an unlawful assembly. They also noted that there are legitimate reasons for wearing masks at protests; some may be worried about reprisals at work, for example, if sighted at a political protest. "Any law that infringes upon civil liberties needs to be held to a test of absolute necessity, and I don't think that test has been met in this instance," said Michael Byers, a political scientist at the University of British Columbia.

Note: Police seem to be specifically targeting the now popular Guy Falkes masks representing opposition to oppressive authority. For more on the erosion of civil liberties, see the deeply revealing reports from reliable major media sources available here.


Are all telephone calls recorded and accessible to the US government?
2013-05-04, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/may/04/telephone-calls-recorded-...

CNN's Out Front with Erin Burnett [has been] focused on the possible involvement in the Boston Marathon attack of Katherine Russell, the 24-year-old American widow of the deceased suspect, Tamerlan Tsarnaev. Anonymous government officials are claiming that they are now focused on telephone calls between Russell and Tsarnaev that took place both before and after the attack to determine if she had prior knowledge of the plot or participated in any way. Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could: BURNETT: There's no way they actually can find out what happened, right, unless she tells them? CLEMENTE: No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. We certainly can find that out. BURNETT: So they can actually get that? People are saying, look, that is incredible. CLEMENTE: No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not. On Thursday night, Clemente again appeared on CNN. He reiterated what he said the night before but added expressly that "all digital communications in the past" are recorded and stored. All digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.

Note: All of our communications have been monitored by government computers for years. BBC News reported in this this 1999 article about the Echelon network which monitors all communications globally. For deeply revealing reports from reliable major media sources on government and corporate threats to privacy, click here.


The Program
2012-08-23, New York Times
http://www.nytimes.com/2012/08/23/opinion/the-national-security-agencys-domes...

[William] Binney, a 32-year veteran of the National Security Agency turned whistle-blower, ... described details about Stellar Wind, the N.S.A.’s top-secret domestic spying program begun after 9/11, which was so controversial that it nearly caused top Justice Department officials to resign in protest, in 2004. “The decision must have been made in September 2001,” Mr. Binney told me [and] cinematographer Kirsten Johnson. “That’s when the equipment started coming in.” He resigned over this in 2001 and began speaking out publicly in the last year. [Binney] is among a group of N.S.A. whistle-blowers, including Thomas A. Drake, who have each risked everything — their freedom, livelihoods and personal relationships — to warn Americans about the dangers of N.S.A. domestic spying. The N.S.A. has technical abilities that are nearly impossible to defend against if you are targeted. The 2008 amendments to the Foreign Intelligence Surveillance Act, which oversees the N.S.A. activities, are up for renewal in December. Two members of the Senate Select Committee on Intelligence, Senators Ron Wyden of Oregon and Mark Udall of Colorado ... have been warning about “secret interpretations” of laws and backdoor “loopholes” that allow the government to collect our private communications. Thirteen senators have signed a letter expressing concern about a “loophole” in the law that permits the collection of United States data. The A.C.L.U. and other groups have also challenged the constitutionality of the law, and the Supreme Court will hear arguments in that case on Oct. 29.

Note: The video about this on the NY Times webpage at the link above is quite revealing. One potent comment of this 32-year NSA veteran in the video is "They wanted to highly classify the extreme impeachable crimes they were committing." For deeply revealing reports from reliable major media sources on government and corporate surveillance, click here.


Rothschilds to merge British and French banking operations to secure control
2012-04-05, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/finance/newsbysector/banksandfinance/9189053/Roths...

The Rothschild dynasty is to merge its British and French banking operations to secure long-term control of the business and to boost the firm's financial strength ahead of the introduction of tougher capital requirements for banks. The 200-year-old banks will be reunited under a single shareholding that will bring together the fortunes of the French and English sides of the renowned family as they attempt to safeguard the business against the effects of new regulation and the fallout from the global financial crisis. Paris Orleans, the Rothschild Group's Paris-based holding company, will convert into a French limited partnership, securing the families' control of the bank against potential takeovers. The new partnership will then buy out minority investors in NM Rothschild & Sons, the UK business, as well as outstanding minority interests in the French operations. Paris Orleans has a market value of more than €500m (Ł415m) and is about 30pc owned by outside investors. The Rothschild Group employs 3,000 people in 42 countries and is one of the world's leading independent investment banks, advising some of the largest international companies on capital raisings and mergers and acquisitions. The bank also remains a player in the private equity industry and operates several merchant banking operations that invest directly in business across Europe and the rest of the world.

Note: Why is that these two hugely wealthy families get so little press coverage? Could it be that their wealth and influence exerts control over the major media? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.


Brother, Can You Spare $6 Trillion?
2012-02-18, New York Times
http://www.nytimes.com/2012/02/18/world/europe/italy-arrests-8-in-fake-us-tre...

The Italian police ... arrested eight people on charges related to the seizure of $6 trillion in fake United States Treasury bonds, in a mysterious scheme that stretched from Hong Kong to Switzerland to the southern Italian region of Basilicata. The value of the seized bonds is in the neighborhood of half of the United States’ entire public debt of $15.36 trillion, but only the uninitiated would have accepted them as real securities. Rather than counterfeit, they were what officials call fictitious, printed in 6,000 units of $1 billion each, a denomination that does not exist and the equivalent of $3 bills. The United States Embassy in Rome said its experts had examined the bonds, which bore the date 1934, and determined that they were fictitious and apparently part of a scheme intended to defraud Swiss banks. According to the Federal Reserve, such “fictitious instrument fraud” is increasingly common, and unwitting investors have been cheated of nearly $10 billion in recent years. In a common ploy, “criminals present fictitious financial instruments such as Federal Reserve notes, standby letters of credit, prime bank guarantees or prime bank notes in order to fraudulently collateralize loans,” the Federal Reserve says on its Web site. In 2009, Italian police seized phony United States Treasury bonds with a face value of $250 billion.

Note: There is a major problem with the claim that these are fake. If you were a counterfeiter and wanted to fake bonds, you would have to be out of your mind to fake them in denominations of $1 billion. As reported here, no one would ever dream of cashing them. For excellent research by David Wilcock suggesting that the bonds are real, and that this may be part of a huge, hidden manipulation, click here.


Local police stockpile high-tech, combat-ready gear
2011-12-21, NPR/Center for Investigative Reporting
http://americaswarwithin.org/articles/2011/12/21/local-police-stockpile-high-...

If terrorists ever target Fargo, N.D., the local police will be ready. In recent years, they have bought bomb-detection robots, digital communications equipment and Kevlar helmets, like those used by soldiers in foreign wars. For local siege situations requiring real firepower, police there can use a new $256,643 armored truck, complete with a rotating turret. Until that day, however, the menacing truck is mostly used for training runs and appearances at the annual Fargo picnic, where it’s been displayed near a children’s bounce house. Fargo, like thousands of other communities in every state, has been on a gear-buying spree with the aid of more than $34 billion in federal government grants since the Sept. 11, 2001, terrorist attacks on New York and the Pentagon. The federal grant spending, awarded with little oversight from Washington, has fueled a rapid, broad transformation of police operations in Fargo and in departments across the country. More than ever before, police rely on quasi-military tactics and equipment. A review of records from 41 states obtained through open-government requests, and interviews with more than two-dozen current and former police officials and terrorism experts, shows police departments around the U.S. have transformed into small army-like forces. Many police, including beat cops, now routinely carry assault rifles.

Note: For lots more on the militarization of US police from reliable sources, click here and here.


Shock Doctrine, U.S.A.
2011-02-24, New York Times
http://www.nytimes.com/2011/02/25/opinion/25krugman.html

The story of the privatization-obsessed Coalition Provisional Authority [created by Bush in Iraq in 2003] was the centerpiece of Naomi Klein’s best-selling book “The Shock Doctrine,” which argued that it was part of a broader pattern. From Chile in the 1970s onward, she suggested, right-wing ideologues have exploited crises to push through an agenda that has nothing to do with resolving those crises, and everything to do with imposing their vision of a harsher, more unequal, less democratic society. Which brings us to Wisconsin 2011, where the shock doctrine is on full display. In recent weeks, Madison has been the scene of large demonstrations against the governor’s budget bill, which would deny collective-bargaining rights to public-sector workers. Gov. Scott Walker claims that he needs to pass his bill to deal with the state’s fiscal problems. But his attack on unions has nothing to do with the budget. What’s happening in Wisconsin is, instead, a power grab — an attempt to exploit the fiscal crisis to destroy the last major counterweight to the political power of corporations and the wealthy. And the power grab goes beyond union-busting. The bill in question is 144 pages long, and there are some extraordinary things hidden deep inside. For example, the bill includes language that would allow officials appointed by the governor to make sweeping cuts in health coverage for low-income families without having to go through the normal legislative process. The state of Wisconsin owns a number of plants supplying heating, cooling, and electricity to state-run facilities. The language in the budget bill would ... let the governor privatize any or all of these facilities. Not only that, he could sell them, without taking bids, to anyone he chooses. And note that any such sale would, by definition, be “considered to be in the public interest.”

Note: For an abundance of major media articles revealing rampant government corruption, click here.


Every email and website to be stored
2010-10-20, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/technology/news/8075563/Every-email-and-website-to...

Every email, phone call and website visit is to be recorded and stored after the Coalition Government revived controversial Big Brother snooping plans. It will allow security services and the police to spy on the activities of every Briton who uses a phone or the internet. Moves to make every communications provider store details for at least a year will be unveiled later this year sparking fresh fears over a return of the surveillance state. It comes despite the Coalition Agreement promised to "end the storage of internet and email records without good reason". The plans are expected to involve service providers storing all users details for a set period of time. That will allow the security and police authorities to track every phone call, email, text message and website visit made by the public if they argue it is needed to tackle crime or terrorism. The information will include who is contacting whom, when and where and which websites are visited, but not the content of the conversations or messages. The move was buried in the Government's Strategic Defence and Security Review.

Note: For lots more from major media sources on increasing government and corporate threats to privacy, click here.


GPS tracker in car inflames privacy debate
2010-10-16, Seattle Times/Associated Press
http://seattletimes.nwsource.com/html/nationworld/2013181658_gpstracking17.html

Yasir Afifi, a 20-year-old computer salesman and community-college student, took his car in for an oil change earlier this month and his mechanic spotted an odd wire hanging from the undercarriage. The wire was attached to a strange magnetic device that puzzled Afifi and the mechanic. They freed it from the car and posted images of it online, asking for help in identifying it. Two days later, FBI agents arrived at Afifi's Santa Clara apartment and demanded the return of their property — a global-positioning-system tracking device now at the center of a raging legal debate over privacy rights. One federal judge wrote that the widespread use of the device was straight out of George Orwell's novel Nineteen Eighty-Four." By holding that this kind of surveillance doesn't impair an individual's reasonable expectation of privacy, the panel hands the government the power to track the movements of every one of us, every day of our lives," wrote Alex Kozinski, the chief judge of the 9th U.S. Circuit Court of Appeals, in a blistering dissent in which a three-judge panel from his court ruled that search warrants weren't necessary for GPS tracking. In his dissent, Chief Judge Kozinski noted that GPS technology is far different from tailing a suspect on a public road, which requires the active participation of investigators. "The devices create a permanent electronic record that can be compared, contrasted and coordinated to deduce all manner of private information about individuals," Kozinksi wrote.

Note: For an AP photo of this device, click here.


Big Brother: Eye-scanners being installed across one Mexican city
2010-08-19, USA Today
http://content.usatoday.com/communities/ondeadline/post/2010/08/big-brother-e...

Mexico's sixth-largest city, Leon, is on the road to ... a future in which everyone is tracked wherever they go. Fast Company reports that U.S. biometrics firm Global Rainmakers and its Mexican partner announced yesterday that they have begun installing iris-scanning technology in the city of more than 1 million in Guanajuato state. The companies aim ... to create "the most secure city in the world." The first phase concentrates on law enforcement and security checkpoints. Then the iris scanners, which the firms say can "identify humans in motion and at a distance while ensuring liveness," will fill malls, pharmacies, mass transit, medical centers and banks, "among other public and private locations," Fast Company writes. "In the future, whether it's entering your home, opening your car, entering your workspace, getting a pharmacy prescription refilled, or having your medical records pulled up, everything will come off that unique key that is your iris," says Jeff Carter, CDO of Global Rainmakers. Before coming to GRI, Carter headed a think tank partnership between Bank of America, Harvard, and MIT. "Every person, place, and thing on this planet will be connected [to the iris system] within the next 10 years," he says.

Note: For lots more from reliable sources on threats to privacy, click here.


America locks up too many people, some for acts that should not even be criminal
2010-07-22, The Economist magazine
http://economist.com/node/16640389

America is different from the rest of the world in lots of ways, many of them good. One of the bad ones is its willingness to lock up its citizens. One American adult in 100 festers behind bars (with the rate rising to one in nine for young black men). Its imprisoned population, at 2.3m, exceeds that of 15 of its states. No other rich country is nearly as punitive as the Land of the Free. The rate of incarceration is a fifth of America’s level in Britain, a ninth in Germany and a twelfth in Japan. America’s incarceration rate has quadrupled since 1970. Similar things have happened elsewhere. The incarceration rate in Britain has more than doubled, and that in Japan increased by half, over the period. But the trend has been sharper in America than in most of the rich world, and the disparity has grown. It is explained neither by a difference in criminality (the English are slightly more criminal than Americans, though less murderous), nor by the success of the policy: America’s violent-crime rate is higher than it was 40 years ago. Many states have mandatory minimum sentences, which remove judges’ discretion to show mercy, even when the circumstances of a case cry out for it. “Three strikes” laws, which were at first used to put away persistently violent criminals for life, have in several states been applied to lesser offenders.

Note: For a recent report on the size of the US prison population in comparison with other countries, click here.


Inside Norway's 'Doomsday Vault'
2010-03-11, Fox News
http://www.foxnews.com/scitech/2010/03/11/inside-norways-doomsday-vault

In a remote mountainside on the Norwegian tundra sits the "doomsday vault," a backup against disaster -- manmade or otherwise. Inside lives the last hope should the unthinkable occur: a global seedbank that could be used to replant the world. It's a modern day Noah's Ark, in other words, full not of animals but of plantlife. The Svalbard "doomsday" Global Seed Vault [stores] a half-million seed varieties. The arctic permafrost offers natural freezing for the seeds, while additional cooling brings the temperatures down to minus 0.4 degrees Fahrenheit. Should disaster wipe out a species -- or in the case of a large-scale global crisis -- its stockers hope the seeds stored there could be used to restore life. The preciousness of the seeds there is also reflected in the inaccessible nature of the vault. Anyone seeking access to the seeds themselves will have to pass through four locked doors: the heavy steel entrance doors, a second door approximately 115 meters down the tunnel and finally the two keyed air-locked doors. Keys are coded to allow access to different levels of the facility. Not all keys unlock all doors.

Note: Should a major disaster or armageddon happen, the designers of this vault assume that the keyholders will survive. Why such a high level of security when this is by no means certain?


Strange New Air Force Facility Energizes Ionosphere, Fans Conspiracy Flames
2009-07-20, Wired magazine
http://www.wired.com/politics/security/magazine/17-08/mf_haarp

The senior senator from Alaska, Ted Stevens, enjoyed a reputation for inserting projects into the federal budget to benefit his home state, most notoriously a $223 million bridge from the town of Ketchikan to, well, not much of anyplace. In 1988, [physics] researchers sat down with Stevens and assured him that an ionospheric heater would be a bona fide scientific marvel and a guaranteed job creator, and it could be built for a mere $30 million. Just like that, the Pentagon had $10 million for ionospheric heater research. In a series of meetings in the winter of 1989-90, the field's leading lights ... pitched the Navy and the Air Force. Haarp, they asserted, could lead to "significant operational capabilities." They'd build a giant phased antenna array that would aim a finely tuned beam of high-frequency radio waves into the sky. The beam would excite electrons in the ionosphere, altering that spot's conductivity and inducing it to emit its own extremely low frequency waves, which could theoretically penetrate the earth's surface to reveal hidden bunkers or be used to contact deeply submerged submarines. Of course, the scientists said, you'd need a brand-new, state-of-the-art ionospheric heater to see if any of this was even feasible. The Pentagon ... began using Stevens' earmarked cash to fund the appropriate studies. For more than a year, planning proceeded largely out of public view. Then, in 1993, an Anchorage teachers' union rep named Nick Begich—son of one of Alaska's most important political families—found a notice about Haarp in the Australian conspiracy magazine Nexus. In 1995, he self-published a book, Angels Don't Play This HAARP. It sold 100,000 copies. He started giving speeches on Haarp's dangers everywhere, from UFO conventions to the European Parliament.

Note: For more excellent information on HAARP, click here. There is much more than meets the eye here.


Swine flu shots may go to kids first, Sebelius says
2009-06-16, USA Today/Associated Press
http://www.usatoday.com/news/health/2009-06-16-swine-flu-vaccine_N.htm

Schoolchildren could be first in line for swine flu vaccine this fall — and schools are being put on notice that they might even be turned into shot clinics. Health and Human Services Secretary Kathleen Sebelius said Tuesday she is urging school superintendents around the country to spend the summer preparing for that possibility, if the government goes ahead with mass vaccinations. "If you think about vaccinating kids, schools are the logical place," Sebelius told The Associated Press. No decision has been made yet on whether and how to vaccinate millions of Americans against the new flu strain that the World Health Organization last week formally dubbed a pandemic, meaning it now is circulating the globe unchecked. But the U.S. is pouring money into development of a vaccine in anticipation of giving at least some people the shots. While swine flu doesn't yet seem any more lethal than the regular flu that each winter kills 36,000 people in the U.S. alone, scientists fear it may morph into a more dangerous type. Even in its current form, the WHO says about half of the more than 160 people worldwide killed by swine flu so far were previously young and healthy. If that trend continues, "the target may be school-age children as a first priority" for vaccination, Sebelius said Tuesday. "That's being watched carefully." The last mass vaccination against a different swine flu, in the U.S. in 1976, was marred by reports of a paralyzing side effect — for a feared outbreak that never happened. The secretary said: "The worst of all worlds is to have the vaccine cause more damage than the flu potential."

Note: This article admits "swine flu doesn't yet seem any more lethal than the regular flu that each winter kills 36,000 people in the U.S. alone." Be very cautious around any vaccination campaign. Vaccines are extremely poorly regulated and known to fill the wallets of rich politicians invested in them. For lots more reliable, verifiable information on this, click here.


Pentagon Plans New Arm to Wage Cyberspace Wars
2009-05-29, New York Times
http://www.nytimes.com/2009/05/29/us/politics/29cyber.html

The Pentagon plans to create a new military command for cyberspace ... stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare. White House officials say Mr. Obama has not yet been formally presented with the Pentagon plan. But he is expected to sign a classified order in coming weeks that will create the military cybercommand, officials said. It is a recognition that the United States already has a growing number of computer weapons in its arsenal and must prepare strategies for their use — as a deterrent or alongside conventional weapons — in a wide variety of possible future conflicts. [A] main dispute has been over whether the Pentagon or the National Security Agency should take the lead in preparing for and fighting cyberbattles. Under one proposal still being debated, parts of the N.S.A. would be integrated into the military command so they could operate jointly. A classified set of presidential directives is expected to lay out the military’s new responsibilities and how it coordinates its mission with that of the N.S.A., where most of the expertise on digital warfare resides today. The decision to create a cybercommand is a major step beyond the actions taken by the Bush administration, which authorized several computer-based attacks but never resolved the question of how the government would prepare for a new era of warfare fought over digital networks. Officials declined to describe potential offensive operations, but said they now viewed cyberspace as comparable to more traditional battlefields.

Note: Combine this with the BBC's revealing article on US plans to fight the Internet, and there is reason for concern. For lots more on new developments in modern war planning, click here.


Four states adopt 'no-smiles' policy for driver's licenses
2009-05-25, USA Today
http://www.usatoday.com/news/nation/2009-05-25-licenses_N.htm

Stopping driver's license fraud is no laughing matter: Four states are ordering people to wipe the grins off their faces in their license photos. "Neutral facial expressions" are required at departments of motor vehicles (DMVs) in Arkansas, Indiana, Nevada and Virginia. That means you can't smile, or smile very much. Other states may follow. The serious poses are urged by DMVs that have installed high-tech software that compares a new license photo with others that have already been shot. When a new photo seems to match an existing one, the software sends alarms that someone may be trying to assume another driver's identity. But there's a wrinkle in the technology: a person's grin. Face-recognition software can fail to match two photos of the same person if facial expressions differ in each photo, says Carnegie Mellon University robotics professor Takeo Kanade. Dull expressions "make the comparison process more accurate," says Karen Chappell, deputy commissioner of the Virginia DMV, whose no-smile policy took effect in March. Arkansas, Indiana and Nevada allow slight smiles. "You just can't grin really large," Arkansas driver services chief Tonie Shields says. A total of 31 states do computerized matching of driver's license photos and three others are considering it, says the American Association of Motor Vehicle Administrators. Most say their software matches faces regardless of expressions. "People can smile here in Pennsylvania," state Transportation Department spokesman Craig Yetter says.

Note: For incisive commentary and a heart-warming video addressing this very topic, click here.


Boston launches flu shot tracking
2008-11-21, Boston Globe
http://www.boston.com/news/local/massachusetts/articles/2008/11/21/boston_lau...

Using technology originally developed for mass disasters, Boston disease trackers are embarking on a novel experiment - one of the first in the country - aimed at eventually creating a citywide registry of everyone who has had a flu vaccination. The resulting vaccination map would allow swift intervention in neighborhoods left vulnerable to the fast-moving respiratory illness. The trial starts this afternoon, when several hundred people are expected to queue up for immunizations at the headquarters of the Boston Public Health Commission. Each of them will get a bracelet printed with a unique identifier code. Information about the vaccine's recipients, and the shot, will be entered into handheld devices similar to those used by delivery truck drivers. Infectious disease specialists in Boston and elsewhere predicted that the registry approach could prove even more useful if something more sinister strikes: a bioterrorism attack or the long-feared arrival of a global flu epidemic. In such crises, the registry could be used to track who received a special vaccine or antidote to a deadly germ. "Anything you can do to better pinpoint who's vaccinated and who's not, that's absolutely vital," said Michael Osterholm, director of the Center for Infectious Disease Research & Policy at the University of Minnesota. "I wish more cities were doing this kind of thing." When people arrive for their shots, they will get an ID bracelet with a barcode. Next, basic information - name, age, gender, address - will be entered into the patient tracking database. There will be electronic records, too, of who gave the vaccine and whether it was injected into the right arm or the left, and time-stamped for that day.

Note: For more on the serious risks and dangers posed by vaccines, click here and here.


Online warfare research outlined
2008-05-15, Washington Times
http://washingtontimes.com/apps/pbcs.dll/article?AID=/20080515/FOREIGN/586297...

Procurement documents released by the U.S. Air Force give a rare glimpse into Pentagon plans for developing an offensive cyber-war capacity that can infiltrate, steal data from and, if necessary, take down enemy information-technology networks. The Broad Area Announcement, posted ... by the Air Force Research Laboratory's Information Directorate, outlines a two-year, $11 million effort to develop capabilities to "access ... any remotely located open or closed computer information systems," lurk on them "completely undetected," "stealthily exfiltrate information" from them and ultimately "be able to affect computer information systems through Deceive, Deny, Disrupt, Degrade, Destroy (D5) effects." "Of interest," the announcement says, "are any and all techniques to enable user and/or root-level access to both fixed [and] mobile computing platforms ... [and] methodologies to enable access to any and all operating systems, patch levels, applications and hardware." The announcement is the latest stage in the Air Force's effort to develop a cyber-war capability and establish itself as the service that delivers U.S. military power in cyberspace. Last year, the Air Force announced it was setting up a Cyberspace Command ... and was developing military doctrine for the prosecution of cyber-war operations. The developments highlight the murky legal territory on which the cyber-wars of the future will be fought. More important, because of the difficulties in identifying attackers and immediately quantifying damage from a cyber-attack, it can be hard to determine when such attacks constitute an act of war as opposed to crime or even vandalism.


Here come the thought police
2007-11-19, Baltimore Sun (Baltimore's leading newspaper)
http://www.baltimoresun.com/news/opinion/oped/bal-op.thoughtpolice19nov19,0,2...

With overwhelming bipartisan support, Rep. Jane Harman's "Violent Radicalization and Homegrown Terrorism Prevention Act" passed the House 404-6 late last month. Swift Senate passage appears certain. Not since the "Patriot Act" of 2001 has any bill so threatened our constitutionally guaranteed rights. Diverse groups vigorously oppose Ms. Harman's effort to stifle dissent. Unfortunately, the mainstream press and leading presidential candidates remain silent. Ms. Harman ... thinks it likely that the United States will face a native brand of terrorism in the immediate future and offers a plan to deal with ideologically based violence. But her plan is a greater danger to us than the threats she fears. Her bill tramples constitutional rights by creating a commission with sweeping investigative power and a mandate to propose laws prohibiting whatever the commission labels "homegrown terrorism." The proposed commission is a menace through its power to hold hearings, take testimony and administer oaths, an authority granted to even individual members of the commission - little Joe McCarthys - who will tour the country to hold their own private hearings. Ms. Harman's proposal includes an absurd attack on the Internet ... and legalizes an insidious infiltration of targeted organizations. While Ms. Harman denies that her proposal creates "thought police," it defines "homegrown terrorism" as "planned" or "threatened" use of force to coerce the government or the people in the promotion of "political or social objectives." That means that no force need actually have occurred as long as the government charges that the individual or group thought about doing it. Any social or economic reform is fair game. The bill defines "violent radicalization" as promoting an "extremist belief system." But American governments, state and national, have a long history of interpreting radical "belief systems" as inevitably leading to violence to facilitate change.

Note: For many major media reports on serious new threats to civil liberties, click here.


Blackwater's Owner Has Spies for Hire
2007-11-03, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/11/02/AR20071102021...

The Prince Group, the holding company that owns Blackwater Worldwide, has been building an operation that will [develop] intelligence ... for clients in industry and government. The operation, Total Intelligence Solutions, has assembled a roster of former ... high-ranking figures from agencies such as the CIA and defense intelligence. Its chairman is Cofer Black, the former head of counterterrorism at CIA known for his leading role in many of the agency's more controversial programs, including the rendition and interrogation of ... suspects and the detention of some of them in secret prisons overseas. Its chief executive is Robert Richer, a former CIA associate deputy director of operations who was heavily involved in running the agency's role in the Iraq war. Because of its roster and its ties to owner Erik Prince, the multimillionaire former Navy SEAL, the company's thrust into this world highlights the blurring of lines between government, industry and activities formerly reserved for agents operating in the shadows. Richer, for instance, once served as the chief of the CIA's Near East division and is said to have ties to King Abdullah of Jordan. The CIA had spent millions helping train Jordan's intelligence service in exchange for information. Now Jordan has hired Blackwater to train its special forces. "Cofer can open doors," said Richer, who served 22 years at the CIA. "I can open doors. We can generally get in to see who we need to see. We ... can deal with the right minister or person." "They have the skills and background to do anything anyone wants," said RJ Hillhouse, who writes a national security blog called The Spy Who Billed Me. "There's no oversight. They're an independent company offering freelance espionage services. They're rent-a-spies."


Special Operations Prepared for Domestic Missions
2007-06-22, washingtonpost.com
http://blog.washingtonpost.com/earlywarning/2007/06/special_operations_prepar...

The U.S. Northern Command, the military command responsible for "homeland defense," has asked the Pentagon if it can establish its own special operations command for domestic missions. The request ... would establish a permanent sub-command for responses to incidents of domestic terrorism as well as other occasions where special operators may be necessary on American soil. The establishment of a domestic special operations mission, and the preparation of contingency plans to employ commandos in the United States, would upend decades of tradition. Military actions within the United States are the responsibility of state militias (the National Guard), and federal law enforcement is a function of the FBI. Employing special operations for domestic missions sounds very ominous, and NORTHCOM's request earlier this year should receive the closest possible Pentagon and congressional scrutiny. There's only one problem: NORTHCOM is already doing what it has requested permission to do. When NORTHCOM was established after 9/11 to be the military counterpart to the Department of Homeland Security, within its headquarters staff it established a Compartmented Planning and Operations Cell (CPOC) responsible for planning and directing a set of "compartmented" and "sensitive" operations on U.S., Canadian and Mexican soil. In other words, these are the very special operations that NORTHCOM is now formally asking the Pentagon to beef up into a public and acknowledged sub-command.


FBI Terror Watch List
2007-06-13, ABC News
http://blogs.abcnews.com/theblotter/2007/06/fbi_terror_watc.html

A terrorist watch list compiled by the FBI has apparently swelled to include more than half a million names. Privacy and civil liberties advocates say the list is growing uncontrollably, threatening its usefulness in the war on terror. The bureau says the number of names on its terrorist watch list is classified. A portion of the FBI's unclassified 2008 budget request posted to the Department of Justice Web site, however, refers to "the entire watch list of 509,000 names." A spokesman for the interagency National Counterterrorism Center (NCTC), which maintains the government's list of all suspected terrorists with links to international organizations, said they had 465,000 names covering 350,000 individuals. Many names are different versions of the same identity. In addition to the NCTC list, the FBI keeps a list of U.S. persons who are believed to be domestic terrorists - abortion clinic bombers, for example, or firebombing environmental extremists, who have no known tie to an international terrorist group. Combined, the NCTC and FBI compendia comprise the watch list used by federal security screening personnel on the lookout for terrorists. While the NCTC has made no secret of its terrorist tally, the FBI has consistently declined to tell the public how many names are on its list. "It grows seemingly without control or limitation," said ACLU senior legislative counsel Tim Sparapani of the terrorism watch list. Sparapani called the 509,000 figure "stunning. If we have 509,000 names on that list, the watch list is virtually useless," he told ABC News. "You'll be capturing innocent individuals with no connection to crime or terror." U.S. lawmakers and their spouses have been detained because their names were on the watch list.


Claims of 9/11 conspiracy have suspect running scared
2007-05-25, Rocky Mountain News (One of Denver's two leading newspapers)
http://www.rockymountainnews.com/drmn/local/article/0,1299,DRMN_15_5555425,00...

A former Federal Emergency Management Agency videographer accused of killing his wife in Denver is seeking political asylum in Argentina, claiming the U.S. government wants him silenced for what he saw in the smoldering ruins of the Twin Towers after 9/11. Kurt Sonnenfeld's efforts to avoid extradition have gained interest from human rights organizations in South America and broad attention from conspiracy theorists on the Internet. Sonnenfeld, 44, is charged with first-degree murder in the New Year's Day 2002 shooting death of his 36-year-old wife, Nancy. Sonnenfeld is quoted by the Argentine newspaper el Pais as saying, "I realized that they were after something else: the tapes of Ground Zero in my possession." Sonnenfeld said he was arrested by Interpol agents on the new Denver charges a week after delivering a demo video of 9/11 footage to a TV producer in Argentina. "I find that extremely coincidental," he said. In other interviews with Argentine media, Sonnenfeld is quoted as saying, "What I saw (at 9/11) leads me to the terrible conclusion that there was foreknowledge of what was going to happen — the precautions that were taken to save certain things that the authorities there considered irreplaceable or invaluable. For example, certain things were missing that could only have been removed with a truck. Yet after the first plane hit one of the towers, everything in Manhattan collapsed and no one could have gotten near the towers to do that." Sonnenfeld is quoted as saying documentation was removed from U.S. intelligence agencies in the World Trade Center, including the CIA, prior to the attacks.

Note: To read a more recent, powerful Voltaire Network interview with Kurt Sonnenfeld, click here. The truth is coming out more all the time!


Income tax is an old American story that just grows more taxing
2007-04-15, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2007/04/15/INGO8P5G3B1.DTL

Millions of us are engaging in one of life's least-enjoyable activities. We're doing our taxes. We can thank the 16th Amendment for all this unpleasantness. Much maligned, much misunderstood, this amendment, ratified in February 1913, permits Congress to "lay and collect taxes on incomes from whatever source derived." Proposed by a Republican president, William Howard Taft, but commonly blamed on -- or credited to -- his Democratic successor, Woodrow Wilson, it was promptly denounced by unhappy members of both parties. Only in 1862 did Congress, facing Civil War expenses, impose a federal income tax. There were two marvelous things about this Civil War income tax. One was that you declared your own income. The second was that it was abolished after 10 years. The main reason this Civil War income tax disappeared was not that the government felt it no longer needed the money (alas, this is never true). The tax was lifted because wealthy Northeast manufacturers, the war's major taxpayers, possessed the congressional clout to replace income taxes with protective tariffs that shielded their manufactured goods. In 1894, [a] new income tax became law, only to be declared unconstitutional one year later. When the 16th Amendment was first put into practice, it would indeed be the "rich man's tax," both sides predicted. With generous deductions and a $3,000 exemption (about $55,000 today), most people didn't feel a thing. Best of all, the instructions were only one page long. Soon, of course, all this changed, in ways that nobody, pro-tax or con, could have foreseen.

Note: Many are unaware that the U.S. functioned without income tax for much of its history. The public never would have supported the 16th Amendment in 1913 if they thought it would tax the common worker. Were we duped? The 16th Amendment coincidentally was passed in the same year that the Federal Reserve (which took over the printing of U.S. money) was established. Few know that the Federal Reserve is neither truly federal or a full reserve. For more on this very well hidden fact and other cover-ups around banking, click here.


Going to Canada? Check your past
2007-02-23, San Francisco Chronicle (San Francisco's leading newspaper)
http://sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/02/23/MNGCAO9NSB1.DTL

Welcome to the new world of border security. Unsuspecting Americans are turning up at the Canadian border expecting clear sailing, only to find that their past -- sometimes their distant past -- is suddenly an issue. There was a time not long ago when a trip across the border from the United States to Canada was accomplished with a wink and a wave of a driver's license. Those days are over. Take the case of 55-year-old Lake Tahoe resident Greg Felsch. Stopped at the border in Vancouver this month at the start of a planned five-day ski trip, he was sent back to the United States because of a DUI conviction seven years ago. Not that he had any idea what was going on when he was told at customs: "Your next stop is immigration." Felsch was ushered into a room. "There must have been 75 people in line," he says. "We were there for three hours. One woman was in tears. A guy was sent back for having a medical marijuana card. I felt like a felon with an ankle bracelet." Or ask the well-to-do East Bay couple who flew to British Columbia this month for an eight-day ski vacation at the famed Whistler Chateau, where rooms run to $500 a night. They'd made the trip many times, but were surprised at the border to be told that the husband would have to report to "secondary" immigration. There, in a room he estimates was filled with 60 other concerned travelers, he was told he was "a person who was inadmissible to Canada." The problem? A conviction for marijuana possession ... in 1975. This is just the beginning. Soon other nations will be able to look into your past when you want to travel there.


Merck Suspends Lobbying for Vaccine
2007-02-21, CBS News/Associated Press
http://www.cbsnews.com/stories/2007/02/21/ap/business/mainD8NDU4AG0.shtml

Pediatricians, gynecologists and even health insurers all call Gardasil, the first vaccine to prevent cervical cancer, a big medical advance. But medical groups, politicians and parents began rebelling after disclosure of a behind-the-scenes lobbying campaign by Gardasil's maker, Merck & Co., to get state legislatures to require 11- and 12-year-old girls to get the three-dose vaccine as a requirement for school attendance. Some parents' groups and doctors particularly objected because the vaccine protects against a sexually transmitted disease. Vaccines mandated for school attendance usually are for diseases easily spread through casual contact, such as measles and mumps. Bowing to pressure, Merck said Tuesday that it is immediately suspending its controversial campaign, which it had funded through a third party. Legislatures in roughly 20 states have introduced measures that would mandate girls have the vaccine to attend school. Texas Gov. Rick Perry on Feb. 2 issued an executive order requiring Texas girls entering the sixth grade as of 2008 get the vaccinations. Dr. Anne Francis, who chairs an American Academy of Pediatrics committee [stated] "I believe that their timing was a little bit premature," she said, "so soon after (Gardasil's) release, before we have a picture of whether there are going to be any untoward side effects." The country has been "burned" by some drugs whose serious side effects emerged only after they were in wide use, including Merck's withdrawn painkiller Vioxx. The vaccine also is controversial because of its price - $360 for the three doses required.

Note: $360 for every girl in school would amount to quite a hefty transfer of funds from taxpayers into the pockets of Merck. Could profit and campaign contributions be behind the move to make this mandatory?


The new Jewish question
2007-02-11, The Observer (One of the U.K.'s leading newspapers)
http://observer.guardian.co.uk/review/story/0,,2010212,00.html

A furious row has been raging in the international Jewish community over the rights and wrongs of criticising Israel. At its centre is a British historian [Tony Judt] who accuses his fellow Jews in the US of stifling any debate about Israel. His opponents say his views give succour to anti-Semites. In an essay written by the Holocaust scholar Alvin Rosenfeld and published by the American Jewish Committee, Judt's views - and those of other 'progressive Jews' ... were expressly linked to anti-Semitism. That row was reported in the New York Times, giving it an unprecedented prominence, and since then the story has opened the floodgates of a debate that until now has been shrouded in fear. Americans have long been in the grip of a cultural taboo that is characterised by Judt as follows: 'All Jews are silenced by the requirement to be supportive of Israel, and all non-Jews are silenced by the fear of being thought anti-Semitic, and there is no conversation on the subject.' [A] new forum for dissent ... was launched in Britain last week by an eminent group. In launching its manifesto, Independent Jewish Voices has taken the 40th anniversary of the occupation of the West Bank and Gaza Strip as an occasion to create 'a climate and a space in which Jews of different affiliations and persuasions can express their opinions about the actions of the Israeli government without being accused of disloyalty or ... self-hating.' One of its founding principles is: 'The battle against anti-Semitism is vital and is undermined whenever opposition to Israeli government policies is automatically branded as anti-Semitic.'


An explosion of disbelief - fresh doubts over 9/11
2007-02-09, The Daily Mail (The U.K.'s second most popular newspaper)
http://www.dailymail.co.uk/pages/live/articles/news/worldnews.html?in_article...

A recent poll by the respected New York Times revealed that three out of four Americans now suspect the U.S. government of not telling the truth about 9/11. This proportion has shot up from a year ago, when half the population said they did not believe the official story. [The] accepted version of what happened on 9/11 is being challenged by a 90-minute internet movie, [Loose Change, which is] so popular that up to 100 million viewers have watched [it]. Why were no military aircraft scrambled in time to head off the attacks? How could a rookie pilot - as one of the terrorists was - fly a Boeing 757 aircraft so precisely into the Pentagon? The movie's assertions are being explored by a number of commentators in America and Britain. Former Labour Cabinet Minister Michael Meacher ... has said of 9/11: "Never in modern history has an event of such cataclysmic significance been shrouded in such mystery." These words were written in a foreword for Professor David Ray Griffin's bestselling book, The New Pearl Harbour. Griffin ... is emeritus professor at the Claremont School of Theology in California and a respected philosopher. Together, the book and the movie have raised the question: could the attack be a carbon copy of Operation Northwoods, an aborted plan by President Kennedy to stage terror attacks in America and blame them on Communist Cuba as a pretext for a U.S. invasion to overthrow Fidel Castro? Initially ... Professor Griffin dismissed claims the attacks could have been an inside job. It was only a year later ... that the professor was sent a 'timeline' on the day's events based entirely on newspaper and television accounts. It was then that he changed his mind.

Note: The timeline which opened Prof. Griffin's eyes was the two-page 9/11 timeline from WantToKnow.info available at http://www.WantToKnow.info/9-11cover-up. This is the most supportive article yet by the mainstream media. The word is spreading. For lots more reliable, verifiable information on 9/11, click here.


Genetically Engineered Rice Wins USDA Approval
2006-11-25, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2006/11/24/AR20061124011...

The Department of Agriculture declared safe for human consumption yesterday an experimental variety of genetically engineered rice found to have contaminated the U.S. rice supply this summer. The move ... to deregulate the special long-grain rice, LL601, was seen as a legal boon to its creator, Bayer CropScience. The company applied for approval shortly after the widespread contamination was disclosed in August and now faces a class-action lawsuit filed by hundreds of farmers in Arkansas and Missouri. The experimental rice ... escaped from Bayer's test plots after the company dropped the project in 2001. The resulting contamination, once it became public, prompted countries around the world to block rice imports from the United States, sending rice futures plummeting and farmers into fits. In approving the rice, the USDA allowed Bayer to take a regulatory shortcut and skip many of the usual safety tests. Joseph Mendelson, legal director of the nonprofit Center for Food Safety, said the quick approval shows that the USDA is more concerned about the fortunes of the biotechnology industry than about consumers' health. "USDA is telling agricultural biotechnology companies that it doesn't matter if you're negligent, if you break the rules, if you contaminate the food supply with untested genetically engineered crops, we'll bail you out," Mendelson said in a statement. Officials in Europe, where genetically altered rice is derisively dubbed "Frankenfood," made clear as recently as last week that European countries will not accept any U.S. rice, he said.

Note: For reliable information on the deception and dangers of GM (Genetically Modified) food, click here.


Pentagon boosts 'media war' unit
2006-10-31, BBC News
http://news.bbc.co.uk/2/hi/americas/6100906.stm

The US defence department has set up a new unit to better promote its message across 24-hour rolling news outlets, and particularly on the internet. The Pentagon said the move would boost its ability to counter "inaccurate" news stories and exploit new media. The newly-established unit would use "new media" channels to push its message and "set the record straight", Pentagon press secretary Eric Ruff said. A Pentagon memo seen by the Associated Press news agency said the new unit would "develop messages" for the 24-hour news cycle and aim to "correct the record". The unit would reportedly monitor media such as weblogs and would also employ "surrogates", or top politicians or lobbyists who could be interviewed on TV and radio shows.


Senior Government Officials Question 9/11 Commission Report
2006-09-11, Boston Globe/Fox News/Wall Street Journal, More
http://www.WantToKnow.info/officialsquestion911commissionreport

Many respected senior members of the U.S. military, intelligence services, and government have expressed significant criticism of the 9/11 Commission Report. Some even allege government complicity in the terrible acts of 9/11. Below are the highly revealing statements on this vital topic of over 50 prominent public servants with links for verification and further investigation. The collective voices of these respected senior officials give credibility to the claim that the 9/11 Commission Report is tragically flawed. These dedicated individuals from both political parties cannot be simply dismissed as irresponsible believers in some 9/11 conspiracy theory. Their sincere concern, backed by decades of service to their country, demonstrate that criticism of the 9/11 Commission Report is not only reasonable and responsible, it is in fact a patriotic duty.


The CIA-Contra-Crack Connection, 10 Years Later
2006-08-17, Los Angeles Times
http://www.latimes.com/news/opinion/la-oe-schou18aug18,0,2765183.story

Ten years ago today, one of the most controversial news articles of the 1990s quietly appeared on the front page of the San Jose Mercury News. Titled "Dark Alliance"...the three-part series by reporter Gary Webb linked the CIA and Nicaragua's Contras to the crack cocaine epidemic that ripped through South Los Angeles in the 1980s. Most of the nation's elite newspapers at first ignored the story. A public uproar, especially among urban African Americans, forced them to respond. What followed was one of the most bizarre, unseemly and ultimately tragic scandals in the annals of American journalism. Top news organizations closed ranks to debunk claims Webb never made, ridicule assertions that turned out to be true and ignore corroborating evidence when it came to light. The whole shameful cycle was repeated when Webb committed suicide in December 2004. At first, the Mercury News defended the series, but after nine months, Executive Editor Jerry Ceppos wrote a half-apologetic letter to readers that defended "Dark Alliance" while acknowledging obvious mistakes. Webb privately (and accurately) predicted the mea culpa would universally be misperceived as a total retraction, and he publicly accused the paper of cowardice. He resigned a few months later. Meanwhile, spurred on by Webb's story, the CIA conducted an internal investigation that acknowledged in March 1998 that the agency had covered up Contra drug trafficking for more than a decade. History will tell if Webb receives the credit he's due for prodding the CIA to acknowledge its shameful collaboration with drug dealers.

Note: Many thanks to the Los Angeles Times for the courage to report this story. For more on this incredibly revealing, yet very tragic case which reveals corruption in both the government and media at the highest levels: http://www.WantToKnow.info/mediacover-up#webb


Sickened Iraq Vets Cite Depleted Uranium
2006-08-13, ABC News/Associated Press
http://abcnews.go.com/US/wireStory?id=2307268

A shell coated with depleted uranium pierces a tank like a hot knife through butter. It also leaves behind a fine radioactive dust with a half-life of 4.5 billion years. Depleted uranium is the garbage left from producing enriched uranium for nuclear weapons and energy plants. At Walter Reed Army Medical Center in Washington, D.C., [Herbert Reed] ran into a buddy from his unit. And another, and another. They began to talk. [They] all have depleted uranium in their urine. The veterans, using their positive results as evidence, have sued the U.S. Army, claiming officials knew the hazards of depleted uranium, but concealed the risks. The Department of Defense says depleted uranium is powerful and safe. Military research on mice shows that depleted uranium can enter the bloodstream and come to rest in bones, the brain, kidneys and lymph nodes. Other research in rats shows that DU can result in cancerous tumors and genetic mutations. Fifteen years after it was first used in battle, there is only one U.S. government study monitoring veterans exposed to depleted uranium. Number of soldiers in the survey: 32. Depleted uranium falls into the quagmire of Gulf War Syndrome, from which no treatment has emerged. About 30 percent of the 700,000 men and women who served in the first Gulf War still suffer [this] baffling array of symptoms. Depleted uranium has long been suspected as a possible contributor. It took more than 25 years for the Pentagon to acknowledge that Agent Orange...was linked to [major disease and] sufferings. It took 40 years for the military to compensate sick World War II vets exposed to massive blasts of radiation during tests of the atomic bomb.

Note: Why isn't the media reporting more on this health disaster? For lots more on how veterans suffer from corporate and governmental denial and manipulations, see what a highly decorated U.S. General has to say on the suffering of soldiers at http://www.WantToKnow.info/warcoverup. For an amazingly revealing documentary with interviews from top sources on the depleted uranium cover-up, click here.


Secretive society's big names include Kissinger, Rockefeller, a queen
2006-06-09, Toronto Star (one of Canada's leading newspapers)
http://www.thestar.com/NASApp/cs/ContentServer?pagename=thestar/Layout/Articl...

Among prominent attendees at this year's conference of the Bilderberg group, a secretive society that includes some of the world's most powerful people: Jacques Aigrain, CEO of Swiss Re. Ahmad Chalabi, former deputy prime minister of Iraq and long-time opponent of Saddam Hussein. George A. David, chairman of Coca-Cola. Paul Desmarais, CEO of Power Corporation. Richard Holbrooke, key American negotiator for 1995 Bosnian peace accords. Vernon Jordan, friend and onetime presidential aide to Bill Clinton. Henry Kissinger, foreign-policy guru and secretary of state under Richard Nixon. Ed Kronenburg, director of NATO's private office. Bernardino Leon Gross, Spain's foreign minister. Ronald S. Lloyd, chairman of Credit Suisse First Boston. Queen Beatrix of The Netherlands. Gordon Nixon, Royal Bank of Canada president, CEO. George Pataki, governor of New York state. Richard Perle, senior foreign policy adviser to U.S. President George W. Bush. David Rockefeller, retired banker, heir to oil fortune. Dennis Ross, former Clinton Mideast negotiator. Giulio Tremonti, VP of Italy's chamber of deputies. James Wolfensohn, U.S. Mideast envoy, former head of the World Bank. Robert Zoellick, deputy U.S. secretary of state.

Note: If the above link fails, click here. For those who know about the pre-war manipulations involving weapons of mass destruction in Iraq, the participation of Ahmed Chalabi speaks volumes. And for a revealing three-minute video clip on CNN about this highly secretive group, click here.


Planted fake news stories on American TV
2006-05-29, The Independent (One of the U.K.'s leading newspapers)
http://news.independent.co.uk/world/americas/article621189.ece

Federal authorities are actively investigating dozens of American television stations for broadcasting items produced by the Bush administration and major corporations, and passing them off as normal news. Some of the fake news segments talked up success in the war in Iraq, or promoted the companies' products. Investigators from the Federal Communications Commission (FCC) are seeking information about stations across the country after a report produced...by the non-profit group Centre for Media and Democracy found that over a 10-month period at least 77 television stations were making use of the faux news broadcasts, known as Video News Releases (VNRs). Not one told viewers who had produced the items. The FCC has declined to comment on the investigation but investigators from the commission's enforcement unit recently approached Ms Farsetta for a copy of her group's report. Among items provided by the Bush administration to news stations was one in which an Iraqi-American in Kansas City was seen saying "Thank you Bush. Thank you USA" in response to the 2003 fall of Baghdad. The footage was actually produced by the State Department, one of 20 federal agencies that have produced and distributed such items. The FCC was urged to act by a lobbying campaign organised by Free Press, another non-profit group that focuses on media policy. More than 25,000 people [have] written to the FCC about the VNRs.


FBI Keeps Watch on Activists
2006-03-27, Los Angeles Times
http://www.latimes.com/news/nationworld/nation/la-na-fbi27mar27,0,5815737.story

The FBI, while waging a highly publicized war against terrorism, has spent resources gathering information on antiwar and environmental protesters and on activists who feed vegetarian meals to the homeless, the agency's internal memos show. For years, the FBI's definition of terrorism has included violence against property. That definition has led FBI investigations to online discussion boards, organizing meetings and demonstrations of a wide range of activist groups. The FBI's encounters with activists are described in hundreds of pages of documents obtained by the American Civil Liberties Union under the Freedom of Information Act after agents visited several activists before the 2004 political conventions. ACLU attorneys acknowledge that the FBI memos are heavily redacted and contain incomplete portraits of some cases. Still, the attorneys say, the documents show that the FBI has monitored groups that were not suspected of any crime. FBI officials respond that there is nothing improper about agents attending a meeting or demonstration.


National Security Watch: Disquieted whistleblowers
2005-10-11, U.S. News and World Report
http://www.usnews.com/usnews/news/articles/051011/11natsec.htm

The first annual National Security Whistleblowers Conference...has to be one of the more unusual gatherings of intelligence veterans in recent years. The nearly 20 current or former officials from the FBI, CIA, Defense Intelligence Agency, and even the supersecret National Security Agency who make up the core of the conference share an unusual distinction: They are all deeply out of favor with their longtime employers. Most cannot discuss the allegations they are making in detail because the specifics are highly classified. The agencies they work for also refuse to answer questions. The current and former officials at the conference said that today's climate in Washington has never been worse for whistleblowers. One of the biggest names of the conference never even uttered a word. Lt. Col. Anthony Shaffer is the military intelligence operative who...went public with a controversial claim that a year before September 11, his top-secret task force "Able Danger" was able to identify the man who later turned out to be the lead hijacker [on 9/11]. Shaffer was slated to speak but instead sat quietly by as his lawyer, Mark Zaid, spoke for him. "Tony is not allowed to talk," Zaid said. "He is gagged from talking to Congress." The conference was organized by Sibel Edmonds, a former FBI translator who was pushed out of the bureau after raising accusations of wrongdoing by other FBI translators. She has been barred from discussing the details of her case by the FBI. She created the National Security Whistleblowers Coalition www.nswbc.org to bring whistleblowers like her together to push for legal reforms.

Note: For a detailed article in Vanity Fair on Sibel Edmonds' courageous efforts to expose the truth, click here. For the whistleblowing action which drew international media attention by WantToKnow.info founder Fred Burks, click here.


Shocking ruling
2005-09-13, USA Today
http://www.usatoday.com/news/opinion/editorials/2005-09-13-other-news-edit_x.htm

Jose Padilla, who was born in New York and grew up in Chicago, landed at O'Hare airport more than three years ago and hasn't been seen since. He disappeared into a succession of jails and military prisons without being charged with a crime, without trial and without even a hearing on the allegations against him. In a ruling that puts the liberties of every citizen at risk, a federal appeals court said Friday there's nothing wrong with that. Worse, the ruling -- expected to be appealed -- isn't limited to O'Hare airport or to Padilla. The court said Congress has given the president authority to order the jailing of anyone anywhere for as long as he wishes, as long as he claims it's connected to the war on terrorism. That sounds more like the power accorded a dictator than the president of the United States. Repeal of the Constitution's Fourth, Fifth and Sixth amendments wasn't part of the package when Congress passed that anti-terrorism resolution after the 9/11 attacks.


Hurricane Katrina: Compilation of FEMA's Rejections of Qualified Help
2005-09-12, Chicago Tribune/New York Times/Washington Post/CNN/More
http://www.WantToKnow.info/femafailureskatrina

FEMA refuses hundreds of personnel, dozens of vehicles - Chicago Tribune, 9/2/05
http://www.chicagotribune.com/news/local/chi-050902daley,1,2011979.story

FEMA won't let Red Cross deliver food - Pittsburgh Post-Gazette, 9/3/05
http://www.post-gazette.com/pg/05246/565143.stm

FEMA fails to utilize Navy ship with 600-bed hospital on board - Chicago Tribune, 9/4/05
http://www.chicagotribune.com/news/nationworld/chi-0509040369sep04,1,4144825.story

FEMA turns away state-of-the-art mobile hospital from Univ. of North Carolina - CNN, 9/5/05
http://edition.cnn.com/2005/HEALTH/09/04/katrina.sick.redtape.ap/

FEMA won't accept Amtrak's help in evacuations - Financial Times, 9/5/05
http://news.ft.com/cms/s/84aa35cc-1da8-11da-b40b-00000e

FEMA turns back Wal-Mart supply trucks - New York Times, 9/6/05
http://www.nytimes.com/2005/09/05/national/nationalspecial/05blame.html

FEMA prevents Coast Guard from delivering diesel fuel - New York Times, 9/6/05
http://www.nytimes.com/2005/09/05/national/nationalspecial/05blame.html

FEMA blocks 500-boat citizen flotilla from delivering aid - News Sentinel, 9/8/05
http://www.fortwayne.com/mld/newssentinel/news/editorial/12595873.htm

FEMA asks media not to take pictures of dead - Washington Post, 9/8/05
http://www.washingtonpost.com/wp-dyn/content/article/2005/09/07/AR2005090702126.html

FEMA turns back German government plane loaded with 15 tons of food - Spiegel, 9/12/05
http://service.spiegel.de/cache/international/0,1518,374268,00.html

FEMA: "First Responders Urged Not To Respond" Unless Dispatched - FEMA's own website
http://www.fema.gov/news/newsrelease.fema?id=18470

For those who are ready to go even deeper, read about FEMA's shady beginnings by clicking here. Then, to see Online Journal's revealing analysis article "New Orleans: Dress rehearsal for lockdown of America," click here.


MI6 protected Nazi who killed 100 British agents
2005-05-14, London Times
http://www.timesonline.co.uk/article/0,,2-1611185,00.html

ONE of Hitler’s top intelligence officers, who ordered the murders of more than 100 British secret agents in concentration camps, was spared execution as a war criminal and selected to work for MI6. Newly opened papers contain startling evidence that...British Intelligence “turned” Horst Kopkow, faked his death and used him to fight the Cold War. The Atkins documents have been corroborated by newly declassified secret papers in the British and American National Archives. Britain has denied that it engaged in the dark arts used by the Americans, whose employment of Nazis to catch Communists has been well-documented. British intelligence sources pointed out that Kopkow was not in the league of “the butcher of Lyons”, a reference to Klaus Barbie, the most notorious war criminal employed by the Americans. The Kopkow case is uniquely chilling because the MI6 men who spared him were colleagues and “handlers” of his victims. Among those whose torture and death he sanctioned were men and women of the SOE and MI6 agents.


Congressional Testimony Reveals Four Wargames on 9/11
2005-03-11, WantToKnow.info/C-SPAN
http://www.wanttoknow.info/050317wargames911

CMK [Congresswoman Cythia McKinney]: Mr. Secretary, after the last Hearing, I thought that my office was promised a written response to my question regarding the four wargames on September 11th. I have not yet received that response. The question was ... whether or not the activities of the four wargames going on on September 11th actually impaired our ability to respond to the attacks. RM [Top Pentagon Chief, General Richard Myers]: The answer to the question is no, it did not impair our response, in fact General Eberhart who was in the command of the North American Aerospace Defense Command as he testified in front of the 9/11 Commission I believe - I believe he told them that it enhanced our ability to respond, given that NORAD didn't have the overall responsibility for responding to the attacks that day. That was an FAA responsibility. But they were two CPXs; there was one Department of Justice exercise that didn't have anything to do with the other three; and there was an actual operation ongoing because there was some Russian bomber activity up near Alaska. CMK: Who was in charge of managing those wargames? RM: The important thing to realize is that North American Aerospace Defense Command was responsible. These are command post exercises; what that means is that all the battle positions that are normally not filled are indeed filled; so it was an easy transition from an exercise into a real world situation. It actually enhanced the response; otherwise, it would take somewhere between 30 minutes and a couple of hours to fill those positions, those battle stations, with the right staff officers.

Note: For the full transcript of this testimony and more, click here. Why to this day have all media (other than C-SPAN) and the 9/11 Commission Report failed to inform the public that there were four wargames happening at the time of the 9/11 attacks? For possible answers, click here.


Students ordered to wear tracking tags
2005-02-09, MSNBC News
http://www.msnbc.msn.com/id/6942751

The only grade school in this rural town is requiring students to wear radio frequency identification badges that can track their every move. Some parents are outraged, fearing it will rob their children of privacy. The badges introduced at Brittan Elementary School on Jan. 18 rely on the same radio frequency and scanner technology that companies use to track livestock and product inventory. The system was imposed, without parental input, by the school as a way to simplify attendance-taking and potentially reduce vandalism and improve student safety. Some parents see a system that can monitor their children's movements on campus as something straight out of Orwell. This latest adaptation of radio frequency ID technology was developed by InCom Corp., a local company co-founded by the parent of a former Brittan student, and some parents are suspicious about the financial relationship between the school and the company. InCom has paid the school several thousand dollars for agreeing to the experiment, and has promised a royalty from each sale if the system takes off, said the company's co-founder, Michael Dobson, who works as a technology specialist in the town's high school.


Microchip to allow wallet-free drinking
2005-01-17, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/news/uknews/4194899/Microchip-to-allow-wallet-free...

A Scottish nightclub is about to become the first in Britain to offer its customers the chance to have a microchip implanted in their arm to save them carrying cash. The "digital wallet", the size of a grain of rice, guarantees entry to the club and allows customers to buy drinks on account. Brad Stevens, owner of Bar Soba in Glasgow, said his customers had responded enthusiastically to the idea. The VeriChip is inserted by a medical professional and then scanned for its unique ID number as a customer enters the bar. The scheme was criticised by a spokesman for the Scottish Executive, who said the microchip could encourage excessive drinking, and by Notags, a consumer group set up to resist the spread of radio frequency identification devices. A spokesman said: "The chip contains your name and ID number and, as this could be read remotely without your knowledge, that is already too much information."

Note: For summaries of media articles showing an agenda to promote microchip implants in humans, click here. For a well-researched essay by a caring woman whose dog died of cancer likely from a microchip, click here.


Scientists Find Ways to Make Us Slaves
2004-10-17, WantToKnow.info/London Times
http://www.WantToKnow.info/monkeydrones

Scientists have discovered a way of manipulating a gene that turns animals into drones that do not become bored with repetitive tasks. The experiments, conducted on monkeys, are the first to demonstrate that animal behaviour can be permanently changed, turning the subjects from aggressive to "compliant" creatures. The genes are identical in humans and although the discovery could help to treat depression and other types of mental illness, it will raise images of the Epsilon caste from Aldous Huxley's futuristic novel Brave New World. The experiments... involved blocking the effect of a gene called D2 in a particular part of the brain. This cut off the link between the rhesus monkeys' motivation and reward. Instead of speeding up with the approach of a deadline or the prospect of a "treat," the monkeys in the experiment could be made to work just as enthusiastically for long periods. The scientists say the identical technique would apply to humans. [They] found that they could make the monkeys work their hardest and fastest all the time, without any complaint or sign of slacking, just by manipulating D2 so that they forgot about the expectation of reward. Methods of manipulating human physical and psychological traits are just around the corner, and the technology will emerge first as a lucrative add-on available from in vitro fertilization clinics. "There's no doubt we will be able to influence behaviour," said Julian Savulescu, a professor of ethics at Oxford University.

Note: For lots more reliable information on how human behavior is already being manipulated, click here.


RNC [Republican National Convention] to Feature Unusual Forms of Sound
2004-08-25, ABC News
http://abcnews.go.com/Technology/story?id=99472

Outside the convention hall, New York City police plan to control protesters using a device that directs sound for up to 1,500 feet in a spotlight-like beam. Meanwhile, a display of former Republican presidents inside the hall will feature campaign speeches that are funneled to listeners through highly focused audio beams. Both technologies feature unprecedented manipulation of sound, but for very different purposes. And while both technologies have unique, "gee-whiz" factors, some remain uneasy with the idea of using sound to control crowds. When in weapon mode, LRAD blasts a tightly controlled stream of caustic sound that can be turned up to high enough levels to trigger nausea or possibly fainting. LRAD ... has been used by the U.S. military in Iraq and at sea as a non-lethal force. In these settings, operators can use the device not only to convey orders, but also as a weapon. In tests, police have shown how they can convey orders in a normal voice to someone as far as four blocks away. The sound beam is even equipped with a viewfinder so the operator can precisely target the audio by finding a person in cross hairs. Rather than using pure volume to throw sound far, the LRAD reaches distant ears by focusing the audio beam. Wherever the beam makes contact with air, the air molecules interact in a way that isolates the original audible sound. So if you're standing in front of the ultrasonic sound wave, you can hear the sound. If you're a few inches away, you hear nothing. Already, some Coca-Cola machines in Japan are equipped with the technology so passers-by hear the enticing sound of soda being poured into a glass of ice.

Note: For more reliable information on these "non-lethal weapons," click here.


Technology gets under clubbers' skin
2004-06-09, CNN News
http://edition.cnn.com/2004/WORLD/europe/06/09/spain.club

Queuing to get into one nightclub in Spain could soon be a thing of the past for regular customers thanks to a tiny computer chip implanted under their skin. The technology, known as a VeriChip, also means nightclubbers can leave their cash and cards at home and buy drinks using a scanner. The bill can then be paid later. Clubbers who want to join the scheme at Baja Beach Club in Barcelona pay 125 euros (about US $150) for the VeriChip -- about the size of a grain of rice -- to be implanted in their body. Then when they pass through a scanner the chip is activated and it emits a signal containing the individual's number, which is then transmitted to a secure data storage site. The club's director, Conrad Chase, said he began using the VeriChip, made by Applied Digital Solutions, in March 2004 because he needed something similar to a VIP card and wanted to provide his customers with better service. He said 10 of the club's regular customers, including himself, have been implanted with the chip, and predicted more would follow. "I know many people who want to be implanted," said Chase. "Almost everybody now has a piercing, tattoos or silicone. Why not get the chip and be original?" Chase said VeriChip could also boost security by speeding up checks at airports, for example. He denied the scheme had any drawbacks. The VeriChip is an in-house debit card and contains no personal information.

Note: Why is the media so upbeat about this? The article raises very few questions, yet seems to promote microchip implants in humans as the wave of the future for commerce.


Enough evidence for trial of CIA drugging
2004-05-25, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2004/05/25/BAGMH6R8OU1.DTL

A San Jose man who claimed the CIA secretly had given him LSD in 1957 as part of a mind-control experiment -- causing him to try to hold up a San Francisco bar ... offered enough evidence of possible drugging to go to trial on his $12 million damages suit. The decision by Chief U.S. District Judge Marilyn Hall Patel cited what appeared to be an admission by a former operative in the CIA program ... that he had slipped LSD into one of Wayne Ritchie's drinks. "I drugged guys involved in about 10, 12 (instances)," former federal narcotics agent Ira Feldman, who worked for the CIA's Project MKULTRA, told Ritchie's lawyer. The [MKULTRA] program ... was an attempt to find chemicals or techniques that could control human consciousness. The CIA and federal narcotics agents started giving mind-altering drugs to unsuspecting government employees, private citizens and prison volunteers in the early 1950s. Ritchie believes he was drugged during an office Christmas party. He ... was overcome with depression and a feeling that everyone had turned against him. He ... drove to a Fillmore District bar, demanded money ... and was hit over the head and knocked unconscious. He pleaded guilty to attempted robbery. Ritchie quit his job in disgrace, found work as a housepainter and spent years fighting off suicidal urges. Then in 1999, he read the obituary of MKULTRA's director, Sidney Gottlieb, and began to believe he had been one of the program's guinea pigs -- especially after the diary of a now-deceased MKULTRA agent showed he might have attended the same Christmas party.

Note: Though Ritchie lost the first round in court, he plans to appeal. For an abundance of reliable, verifiable information on secret government mind control programs, click here.


Professor has nightmare vision of global positioning technology
2003-05-07, WantToKnow.info/Kansas City Star (Leading newspaper of Kansas City)
http://www.WantToKnow.info/030307kansascitystar

Jerome Dobson is not joking. The University of Kansas research professor, a respected leader in the field of geographic information technologies [speculates about] "geoslavery" -- a form of technological human control that could make "George Orwell's `Big Brother' nightmare ... look amateurish." He's talking about overlords electronically punishing errant workers. He's talking about the possibility of people hooked to, tracked by, and potentially shocked or burned using inexpensive electronic bracelets, manacles or implants. Dobson worked for 26 years at Tennessee's Oak Ridge National Laboratory creating, for the government, the maps used in global tracking. He is the president of the American Geographical Society. And he is not alone in his thoughts. [In] the journal published by the Institute of Electrical and Electronics Engineers, a paper titled "Geoslavery" is co-written by Dobson and Peter F. Fisher, British editor of the International Journal of Geographical Information Science. "Human tracking systems, currently sold commercially without restrictions, already empower those who would be masters. Safeguards have not yet evolved to protect those destined to be slaves," they wrote. With a laptop computer, employers can keep track of their drivers' every move. Implanted chips ... keep track of livestock or pets. Whereify Wireless Inc. sells its GPS Kids Locator for $400. The device, which also looks like a watch, can be locked to a child's wrist. Dobson said that ... none of the companies was thinking of anything nefarious. [Yet he] worries that where there is an evil will, there is an evil way. He hopes [to ] create debate and perhaps legislation or safeguards around the technology that will keep it from being misused.


History's Mysteries: Mind Control: America's Secret War
2001-08-01, History Channel
http://store.aetv.com/html/product/index.jhtml?id=73738&browseCategoryId=&loc...

It is one of the ill-kept secrets of America's intelligence agencies--for decades, they have worked virtually non-stop to perfect means of controlling the human mind. But while many have suspected the existence of these projects, the details have long been preserved. MIND CONTROL blows the lid off years of chilling experiments, drawing on documents reluctantly released through the Freedom of Information Act and interviews with some of the victims, including a woman whose past was literally taken away. Hear from John Marks, the author of In Search of the Manchurian Candidate, who broke the story of the CIA's abuses by unraveling the mysteries contained in financial records. All the other records pertaining to the experiments were destroyed by the agency in an attempt to prevent the details from ever being known.

Note: Interviews in this eye-opening documentary with top psychiatrists, lawyers, and victims send chills up the spine. A former head of the American Psychiatric Association, Dr. Ewen Cameron, is one of many highly respected doctors who erased the personalities of thousands of unsuspecting victims, while many in the profession simply turned a blind eye. To watch this powerful documentary free online, click here.


Conference on Terrorism, Weapons of Mass Destruction, and U.S. Strategy
1997-04-28, Defense Link (Official Website of U.S. Department of Defense)
http://www.defenselink.mil/transcripts/1997/t042897_t0428coh.html

Some countries have been trying to construct something like an Ebola Virus, and that would be a very dangerous phenomenon, to say the least. Alvin Toeffler has written about this in terms of some scientists in their laboratories trying to devise certain types of pathogens that would be ethnic specific so that they could just eliminate certain ethnic groups and races; and others are designing some sort of engineering, some sort of insects that can destroy specific crops. Others are engaging even in an eco- type of terrorism whereby they can alter the climate, set off earthquakes, volcanoes remotely through the use of electromagnetic waves. So there are plenty of ingenious minds out there that are at work finding ways in which they can wreak terror upon other nations. It's real, and that's the reason why we have to intensify our efforts.

If terrorist organizations have the capability to set off earthquakes and other major natural disasters, do you think huge military research laboratories with vast budgets might have some of the same capabilities? For more, click here and here.


New York City Mayor Hylan Foresees A Revolt
1922-12-10, New York Times
http://query.nytimes.com/mem/archive-free/pdf?res=9F07EED6153AEF33A25753C1A96...

One of the most astounding facts about our American life is that the wealth and property of the country and the control of the machinery of government are in the hands of less than 2 per cent of the inhabitants. A small group of excessively wealthy individuals, members of the Republican and Democratic Parties alike, have, through the exercise of powerful, sinister and, too often, unlawful influence, usurped the government and seized public property on such a wholesale scale that they have become ... virtual dictators. A small group of international bankers and money lenders, public utility exploiters and tariff beneficiaries have actually dictated nominations for offices up to the Presidency. They have placed the slickest, cleverest, and most cunning manipulators in official positions, even in the minor posts, where they could be of service when called upon by the invisible power which, utterly devoid of all humanity, seeks but to wallow in riches. So absolute is the power of America's secret dynastic rulers that they have, without hindrance, written the very platforms and pledges of political parties, and because of substantial contributions to campaign chests they have arrogated to themselves the right to dictate the governmental policies of the administration elected to office regardless of party. Woe to the public officials who dare to resent their dictatorship! If there be such public officials who will not submit to their imperious dictation, then the flood-gates of lying press propaganda are released, sweeping the unhappy public servant to an earthly as well as political grave, or compelling him to compromise with his conscience and become their subservient tool to the end of his term.

Note: John F. Hylan was Mayor of New York City from 1918 to 1925. New York has long been the US banking and financial headquarters, with the mayor's office about a half-mile from the New York Stock Exchange. The rest of this important article can be accessed at this link as well as the one above. It is interesting to note that this article was published not long after the Federal Reserve was created, turning over huge amounts of control of the U.S. economy to the most powerful bankers in the country. For more on this, click here.


After Paris, there will be no stopping the surveillance state now
2015-11-19, CBC (Canada's public broadcasting system)
http://www.cbc.ca/news/world/surveillance-state-neil-macdonald-1.3325327

The tools European security agencies now have at their disposal ... would make any American or Canadian intelligence officer drool. Britain has literally created a surveillance state. The British Security Industry Authority estimated three years ago the government has installed about six million closed-circuit TV cameras in the public square; one for every 10 citizens. The French, too, have vastly expanded public video surveillance in recent years. And it's all been done with overwhelming support from the general public, which feels safer for the presence of the surveillance, never mind the lack of objective proof that they are more protected against outrages, which keep on occurring. Both England and France are former colonial powers that ... long ago subordinated individual rights to collective security. Canada and America more dearly cherish individual rights. Still, a surveillance state is growing here, too. David Lyon, a professor of surveillance studies at Queen's University, has identified several public surveillance trends, all of which he says are "increasing at an accelerating rate." Canada is not about to become Western Europe, he says, but "it is incumbent upon us as a society to think about the ethical consequences" of mass surveillance. [Some] would argue that the cameras are desperately needed tools, and that anyone who isn't doing anything wrong has nothing to worry about. That of course is the police state justification. They hate us because we are free, we are told. The fact that we've responded by giving up ever more freedom doesn't seem to matter.

Note: Many of the politicians publicly defending the surveillance state receive huge sums of money from private security companies. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


Internet Giants Erect Barriers to Spy Agencies
2014-06-07, New York Times
http://www.nytimes.com/2014/06/07/technology/internet-giants-erect-barriers-t...

[Google engineers] are making it far more difficult — and far more expensive — for the National Security Agency and the intelligence arms of other governments around the world to pierce their systems. As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps. After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant. But governments are fighting back, harder than ever. The cellphone giant Vodafone reported ... that a “small number” of governments around the world have demanded the ability to tap directly into its communication networks [and] noted that some countries did not issue warrants to obtain phone, email or web-searching traffic, because “the relevant agencies and authorities already have permanent access to customer communications via their own direct link.”

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Everyone should know just how much the government lied to defend the NSA
2014-05-17, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2014/may/17/government-lies-nsa-just...

Just before Edward Snowden became a household name, the ACLU argued before the supreme court that the FISA Amendments Act – one of the two main laws used by the NSA to conduct mass surveillance – was unconstitutional. In a sharply divided opinion, the Supreme Court ruled, 5-4, that the case should be dismissed because the plaintiffs didn't have "standing". The court relied on two claims by the Justice Department to support their ruling: 1) that the NSA would only get the content of Americans' communications without a warrant when they are targeting a foreigner abroad for surveillance, and 2) that the Justice Department would notify criminal defendants who have been spied on under the Fisa Amendments Act, so there exists some way to challenge the law in court. It turns out that neither of those statements were true. One of the most explosive Snowden revelations exposed a then-secret technique known as "about" surveillance. As the New York Times first reported, the NSA "is searching the contents of vast amounts of Americans' e-mail and text communications into and out of the country, hunting for people who mention information about foreigners under surveillance." In other words, the NSA doesn't just target a contact overseas – it sweeps up everyone's international communications into a dragnet and searches them for keywords. The Snowden leaks also pushed the Justice Department to admit ... that the government hadn't been notifying any defendants they were being charged based on NSA surveillance.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


New surveillance technology can track everyone in an area for several hours at a time
2014-02-05, Washington Post
http://www.washingtonpost.com/business/technology/new-surveillance-technology...

From 10,000 feet up, tracking an entire city at one glance: Ohio-based Persistent Surveillance Systems is trying to convince cities across the country that its surveillance technology can help reduce crime. Its new generation of camera technology is far more powerful than the police cameras to which America has grown accustomed. But these newer cameras have sparked some privacy concerns. A new, far more powerful generation is being quietly deployed [from small aircraft] that can track every vehicle and person across an area the size of a small city, for several hours at a time. Although these cameras can’t read license plates or see faces, they provide such a wealth of data that police, businesses and even private individuals can use them to help identify people and track their movements. Already, the cameras have been flown above major public events such as the Ohio political rally where Sen. John McCain named Sarah Palin as his running mate in 2008. They’ve been flown above Baltimore; Philadelphia; Compton, Calif.; and Dayton [OH] in demonstrations for police. They’ve also been used for traffic impact studies, [and] for security at NASCAR races. Defense contractors are developing similar technology for the military, but its potential for civilian use is raising novel civil liberties concerns. In Dayton, where Persistent Surveillance Systems is based, city officials balked last year when police considered paying for 200 hours of flights, in part because of privacy complaints. The Supreme Court generally has given wide latitude to police using aerial surveillance as long as the photography captures images visible to the naked eye.

Note: For more on surveillance by government agencies and corporations, see the deeply revealing reports from reliable major media sources available here.


Edward Snowden, after months of NSA revelations, says his mission’s accomplished
2013-12-23, Washington Post
http://www.washingtonpost.com/world/national-security/edward-snowden-after-mo...

Taken together, the [Edward Snowden] revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations. Six months after the first revelations ... Snowden agreed to reflect at length on the roots and repercussions of his choice. He was relaxed and animated over two days of nearly unbroken conversation. Snowden offered vignettes from his intelligence career and from his recent life as “an indoor cat” in Russia. But he consistently steered the conversation back to surveillance, democracy and the meaning of the documents he exposed. “For me, in terms of personal satisfaction, the mission’s already accomplished,” he said. “I already won. As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn’t want to change society. I wanted to give society a chance to determine if it should change itself. All I wanted was for the public to be able to have a say in how they are governed,” he said. Snowden ... had come to believe that a dangerous machine of mass surveillance was growing unchecked. Closed-door oversight by Congress and the Foreign Intelligence Surveillance Court was a “graveyard of judgment,” he said, manipulated by the agency it was supposed to keep in check. The NSA’s business is “information dominance,” the use of other people’s secrets to shape events. At 29, Snowden upended the agency on its own turf.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Connecting the Dots on PRISM, Phone Surveillance, and the NSA’s Massive Spy Center
2013-06-12, Wired Magazine
http://www.wired.com/threatlevel/2013/06/nsa-prism-verizon-surveillance

Long before Edward Snowden walked out of the NSA with his trove of documents, whistleblowers there had been trying for years to bring attention to the massive turn toward domestic spying that the agency was making. Last year in my Wired cover story on the enormous new NSA data center in Utah, Bill Binney, the man who largely designed the agency’s worldwide eavesdropping system, warned of the secret, nationwide surveillance. He told how the NSA had gained access to billions of billing records not only from AT&T but also from Verizon. I also wrote about Adrienne J. Kinne, an NSA intercept operator who attempted to blow the whistle on the NSA’s illegal eavesdropping on Americans following the 9/11 attacks. She [attempted and failed] to end the illegal activity with appeals all the way up the chain of command to Major General Keith Alexander. The deception by General Alexander is especially troubling. In my new cover story for Wired’s July issue ...I show how he has become the most powerful intelligence chief in the nation’s history. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the U.S. Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

Note: James Bamford, the author of this article, was the ABC producer responsible for breaking the story on Operation Northwoods, which proved a level of deception almost beyond belief at the very highest levels of the Pentagon. For more on this, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.


U.S. Tries to Make It Easier to Wiretap the Internet
2010-09-27, New York Times
http://www.nytimes.com/2010/09/27/us/27wiretap.html

Federal law enforcement and national security officials are preparing to seek sweeping new regulations for the Internet, arguing that their ability to wiretap criminal and terrorism suspects is “going dark” as people increasingly communicate online instead of by telephone. Essentially, officials want Congress to require all services that enable communications — including encrypted e-mail transmitters like BlackBerry, social networking Web sites like Facebook and software that allows direct “peer to peer” messaging like Skype — to be technically capable of complying if served with a wiretap order. The mandate would include being able to intercept and unscramble encrypted messages. James X. Dempsey, vice president of the Center for Democracy and Technology, an Internet policy group, said the proposal had “huge implications” and challenged “fundamental elements of the Internet revolution” — including its decentralized design. “They are really asking for the authority to redesign services that take advantage of the unique, and now pervasive, architecture of the Internet,” he said. “They basically want to turn back the clock and make Internet services function the way that the telephone system used to function.”

Note: For an analysis of this new government move to spy on US citizens, click here. For lots more from reliable sources on disturbing government threats to privacy and civil liberties, click here and here.


IMF blueprint for a global currency – yes really
2010-08-04, Financial Times
http://ftalphaville.ft.com/blog/2010/08/04/306346/imf-blueprint-for-a-global-...

[An] IMF paper [that] first came out in April, 2010, [a]uthored by Reza Moghadam, director of the IMF’s strategy, policy and review department, ... discusses how the IMF sees the International Monetary System evolving after the financial crisis. In the eyes of the IMF ... the best way to ensure the stability of the international monetary system (post crisis) is actually by launching a global currency. And that, the IMF says, is largely because [sovereign nations] cannot be trusted to redistribute surplus reserves, or battle their deficits, themselves. The ongoing buildup of such imbalances, meanwhile, only makes the system increasingly vulnerable to shocks. It’s also a process that’s ultimately unsustainable for all, says the IMF. All in all, the IMF believes there has simply been too much reserve hoarding going on. A global currency makes the most sense, the paper concludes — especially since the SDR [Special Drawing Rights] is currently just an accounting tool that draws on the freely usable currencies of member states, not an actual currency itself.

Note: For key news articles on the global financial crisis to which this IMF report is responding, click here.


Raw-food raid highlights a hunger
2010-07-25, Los Angeles Times
http://www.latimes.com/news/la-fi-raw-food-raid-20100725,0,4350641,full.story

With no warning one weekday morning, investigators entered an organic grocery with a search warrant and ordered the hemp-clad workers to put down their buckets of mashed coconut cream and to step away from the nuts. Then, guns drawn, four officers fanned out across Rawesome Foods in Venice. Skirting past the arugula and peering under crates of zucchini, they found the raid's target inside a walk-in refrigerator: unmarked jugs of raw milk. Cartons of raw goat and cow milk and blocks of unpasteurized goat cheese were among the groceries seized in the June 30 raid by federal, state and local authorities — the latest salvo in the heated food fight over what people can put in their mouths. On one side are government regulators, who say they are enforcing rules designed to protect consumers from unsafe foods and to provide a level playing field for producers. On the other side are " healthy food" consumers [who] seek food in its most pure form. "This is about control and profit, not our health," said Aajonus Vonderplanitz, co-founder of Rawesome Foods. "How can we not have the freedom to choose what we eat?" Demand for all manner of raw foods — including honey, nuts and meat — has been growing, spurred by heightened interest in the way food is produced. But raw milk in particular has drawn a lot of regulatory scrutiny, largely because the politically powerful dairy industry has pressed the government to act.

Note: For lots more on government corruption from reliable sources, click here.


U.S. Plans Cyber Shield for Utilities, Companies
2010-07-08, Wall Street Journal
http://online.wsj.com/article/SB10001424052748704545004575352983850463108.html

The federal government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants. The surveillance by the National Security Agency, the government's chief eavesdropping agency, would rely on a set of sensors deployed in computer networks for critical infrastructure that would be triggered by unusual activity suggesting an impending cyber attack. Defense contractor Raytheon Corp. recently won a classified contract for the initial phase of the surveillance effort valued at up to $100 million. Some industry and government officials familiar with the program see Perfect Citizen as an intrusion by the NSA into domestic affairs. One internal Raytheon email, the text of which was seen by The Wall Street Journal [said,] "Perfect Citizen is Big Brother." Raytheon declined to comment on this email. The information gathered by Perfect Citizen could also have applications beyond the critical infrastructure sector, officials said, serving as a data bank that would also help companies and agencies who call upon NSA for help with investigations of cyber attacks, as Google did when it sustained a major attack late last year.

Note: For key reports of government and corporate surveillance from reliable sources, click here.


Bush Signs Law to Widen Legal Reach for Wiretapping
2007-08-06, New York Times
http://www.nytimes.com/2007/08/06/washington/06nsa.html?ex=1344052800&en=5e75...

President Bush signed into law ... legislation that broadly [expands] the government’s authority to eavesdrop on the international telephone calls and e-mail messages of American citizens without warrants. The law [goes] far beyond the small fixes that administration officials had said were needed to gather information about foreign terrorists [and will] sharply alter the legal limits on the government’s ability to monitor millions of phone calls and e-mail messages going in and out of the United States. The new law for the first time [provides] a legal framework for much of the surveillance without warrants that was being conducted in secret by the National Security Agency and outside the Foreign Intelligence Surveillance Act, the 1978 law that is supposed to regulate the way the government can listen to the private communications of American citizens. “This more or less legalizes the N.S.A. program,” said Kate Martin, director of the Center for National Security Studies in Washington. Previously, the government needed search warrants approved by a special intelligence court to eavesdrop on ... electronic communications between individuals inside the United States and people overseas. The new law gives the attorney general and the director of national intelligence the power to approve the international surveillance, rather than the special intelligence court. The law also gave the administration greater power to force telecommunications companies to cooperate with such spying operations. The companies can now be compelled to cooperate by orders from the attorney general and the director of national intelligence.


Files on Illegal Spying Show C.I.A. Skeletons From Cold War
2007-06-26, New York Times
http://www.nytimes.com/2007/06/27/washington/27cia.html?ex=1340596800&en=3fa7...

Long-secret documents released Tuesday provide new details about how the Central Intelligence Agency illegally spied on Americans decades ago. Known inside the agency as the “family jewels,” the 702 pages of documents released Tuesday catalog domestic wiretapping operations, failed assassination plots, mind-control experiments and spying on journalists from the early years of the C.I.A. The papers provide evidence of paranoia and occasional incompetence as the agency began a string of illegal spying operations in the 1960s and 1970s, often to hunt links between Communist governments and the domestic protests that roiled the nation in that period. Yet the long-awaited documents leave out a great deal. Large sections are censored, showing that the C.I.A. still cannot bring itself to expose all the skeletons in its closet. And many activities about overseas operations disclosed years ago by journalists, Congressional investigators and a presidential commission — which led to reforms of the nation’s intelligence agencies — are not detailed in the papers. The 60-year-old agency has been under fire ... by critics [of] the secret prisons and harsh interrogation practices it has adopted since the Sept. 11 attacks. Some intelligence experts suggested ... that the release of the documents was intended to distract from the current controversies. And they and historians expressed disappointment that the documents were so heavily censored. Tom Blanton of the National Security Archive, the research group that filed the Freedom of Information request in 1992 that led to the documents’ becoming public, said he was initially underwhelmed by them because they contained little about the agency’s foreign operations. But Mr. Blanton said what was striking was the scope of the C.I.A’s domestic spying efforts.

Note: The entire body of the CIA's "Family Jewels" documents have been posted online by the National Security Archives, and can be read by clicking here.


White House revises post-disaster protocol
2007-06-02, Boston Globe
http://www.boston.com/news/nation/washington/articles/2007/06/02/white_house_...

The Bush administration is writing a new plan to maintain governmental control in the wake of an apocalyptic terrorist attack or overwhelming natural disaster, moving such doomsday planning for the first time from the Federal Emergency Management Agency to officials inside the White House. Discussion among legal specialists, homeland security experts and Internet commentators [includes] concerns that the policy may [make] it too easy to invoke emergency presidential powers such as martial law. The ... new "National Continuity Policy" contains few details about how surviving officials would invoke emergency powers, or when emergency powers should be deemed to be no longer necessary. The unanswered questions have provoked anxiety across ideological lines. The conservative commentator Jerome Corsi [wrote] that the directive looked like a recipe for allowing the office of the presidency to seize "dictatorial powers" because the policy does not discuss consulting Congress about when to invoke emergency powers -- or when to turn them off. Some specialists say that the White House should be more specific about its worst-case scenario plans, pointing out two unanswered questions: what circumstances would trigger implementation of the plan and what legal limits the White House recognizes on its own emergency powers. The policy ... does not contain a direct reference to statutes in which Congress has imposed checks and balances on the president's power to impose martial law or other extraordinary measures, [nor does it] explicitly acknowledge the National Emergencies Act, [a] law that gives Congress the right to override the president's determination that a national emergency still exists.


Police Log Confirms FBI Role In Arrests
2007-04-03, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/04/02/AR20070402015...

A secret FBI intelligence unit helped detain a group of war protesters in a downtown Washington parking garage in April 2002 and interrogated some of them on videotape about their political and religious beliefs. [Washington] D.C. police said authorities only recently found the logs of police responses to that day's events. That discovery came after three years of police assurances in federal court that no such records or logs existed showing the FBI's role. The FBI and D.C. police said they had no records of such an incident. And police told a federal court that no FBI agents were present when officers arrested more than 20 protesters that afternoon for trespassing; police viewed them as suspicious for milling around the parking garage entrance. Similar intelligence-gathering operations have been reported in New York, where a local police intelligence unit tried to infiltrate groups planning to protest at the Republican National Convention in 2004, and in Colorado, where records surfaced showing that the FBI collected names and license plates of people protesting timber industry practices at a 2002 industry convention.


Texas Governor Defends Vaccine Order
2007-02-22, MSNBC/Associated Press
http://news.moneycentral.msn.com/provider/providerarticle.aspx?feed=AP&Date=2...

Gov. Rick Perry on Thursday angrily defended his relationship with Merck & Co. and his executive order requiring that schoolgirls receive the drugmaker's vaccine against the sexually transmitted cervical-cancer virus. The Associated Press reported Wednesday that Perry's chief of staff had met with key aides about the vaccine on Oct. 16, the same day Merck's political action committee donated $5,000 to the governor's campaign. In issuing the order, the governor made Texas the first state to require the vaccine Gardasil for all schoolgirls. But many lawmakers have complained about his bypassing the Legislature altogether. The executive order has inflamed conservatives, who said it contradicts Texas' abstinence-only sexual education policies and intrudes into families' lives. Critics have previously questioned Perry's ties to Merck. Mike Toomey, Perry's former chief of staff, now lobbies for the drug company. And the governor accepted a total of $6,000 from Merck during his re-election campaign. Merck has waged a behind-the-scenes lobbying campaign to get state legislatures to require girls to get the three-dose vaccine to enroll in school. But on Tuesday the pharmaceutical company announced it was suspending the effort because of pressure from parents and medical groups. The Kentucky House on Thurday passed a bill that would require the vaccination for middle school girls unless their parents sign a form opposing it. Virginia lawmakers have also passed legislation requiring the vaccine, but the governor has not decided if he will sign it.

Note: The drug company lobby is the most powerful in the U.S., as reported by the former editor-in-chief of one of the most respected medical journals in the U.S. Click here for more.


Italy indicts 31 in alleged CIA kidnapping
2007-02-16, MSNBC/Associated Press
http://www.msnbc.msn.com/id/17184663

A judge Friday indicted 26 Americans and five Italians in the abduction of an Egyptian terror suspect on a Milan street in what would be the first criminal trial stemming from the CIA’s extraordinary rendition program. Prosecutors allege that five Italian intelligence officials worked with the Americans to seize Muslim cleric Osama Moustafa Hassan Nasr on Feb. 17, 2003. Nasr was allegedly transferred by vehicle to the Aviano Air Force base near Venice, then by air to the Ramstein Air Base in Germany, and on to Egypt, where his lawyer says he was tortured. Nasr was freed earlier this week by an Egyptian court that found his four years of detention in Egypt “unfounded.” All but one of the Americans have been identified as CIA agents, including the former Milan station chief Robert Seldon Lady and former Rome station chief Jeffrey Castelli. Among the Italians indicted by Judge Caterina Interlandi was the former chief of military intelligence, Nicolo Pollari, and his former deputy, Marco Mancini. The CIA has refused to comment on the case, which has put an uncomfortable spotlight on its operations. Prosecutors are pressing the Italian government to seek the extradition of the Americans. In Italy, defendants can be tried in absentia. Prosecutors elsewhere in Europe are moving ahead with cases aimed at the CIA program. A Munich prosecutor recently issued arrest warrants for 13 people in another alleged CIA-orchestrated kidnapping, that of a German citizen who says he was seized in December 2003 at the Serbian-Macedonia border and flown to Afghanistan.

Note: At long last, the CIA is beginning to be held accountable for flagrantly breaking laws resulting in torture.


Former top CIA official, contractor indicted
2007-02-13, MSNBC News/Associated Press
http://www.msnbc.msn.com/id/17134253

The CIA’s former No. 3 official and a defense contractor were charged Tuesday with fraud and other offenses in the corruption investigation that sent former Rep. Randy “Duke” Cunningham to prison. Federal indictments named Kyle “Dusty” Foggo, executive director of the CIA until he resigned in May, and his close friend, San Diego defense contractor Brent Wilkes, both 52, according to two government officials who spoke on condition of anonymity. One of the officials said the grand jury heard claims that Foggo joined Wilkes on trips to Hawaii and Scotland, and was introduced to Wilkes’ employees as early as 2003 as a “future executive” of Wilkes’ company, Wilkes Corp., which allegedly received $12 million in illicit contracts from various government agencies. Cunningham, an eight-term Republican, served on the House Intelligence Committee and on the defense subcommittee of the Appropriations Committee — assignments that made him a key figure in the awarding of Pentagon contracts. Cunningham pleaded guilty in November 2005 to taking $2.4 million in bribes from defense contractors and others, including mortgage payments and a yacht he named “Duke-Stir.” The indictments paint a stunning picture of corruption in Washington. The alleged crimes by Cunningham and defense contractors is, according to the U.S. Attorney in San Diego, "breathtaking in scope." Foggo was named executive director of the CIA in 2004, responsible for running the agency’s day-to-day operations. He retired in May while under investigation by the FBI, the Internal Revenue Service, the Pentagon, the CIA and the U.S. attorney’s office in San Diego.

Note: This is very encouraging news as the once "untouchable" CIA is finally being subject to some of the same laws and justice as the rest of us.


Power is not only an aphrodisiac, it does weird things to some of us
2006-11-19, San Francisco Chronicle
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/11/19/INGT9MCJHJ1.DTL

Lyndon Johnson relished summoning underlings in to confer with him while he sat on the toilet. Richard Nixon authorized illegal wiretaps on perceived enemies because, as he later told an interviewer, "when the president does it, it's not illegal." Bill Clinton wantonly had sex with intern Monica Lewinsky. Why is it said that power corrupts, and absolute power corrupts absolutely? In the past few years...research has zeroed in on what an intoxicating elixir power can be. And one thing has become clear: The phrase "drunk with power" is often a dead-on description. These new studies show that power acts to lower inhibitions, much the same as alcohol does. It explains why powerful people act with great daring and sometimes behave rather like gorillas. "Disinhibition is the very root of power," said Stanford Professor Deborah Gruenfeld, a social psychologist who focuses on the study of power. "For most people, what we think of as 'power plays' aren't calculated and Machiavellian -- they happen at the subconscious level. When people feel powerful, they stop trying to 'control themselves.'" People with power...tend to be more oblivious to what others think, more likely to pursue the satisfaction of their own appetites, poorer judges of other people's reactions, more likely to hold stereotypes, overly optimistic and more likely to take risks. People who are naturally selfish grow even more selfish if they attain power, while people who are naturally selfless and giving become more so with power. Henry Kissinger discerned that power is "the ultimate aphrodisiac." "Nearly all men can stand adversity," said Abraham Lincoln, "but if you want to test a man's character, give him power."

Note: This most excellent article graphically describes the problems that can occur when a hierarchical political systems places certain individuals in positions of great authority. For more on this fascinating topic, click here.


Don't Turn Us Into Poodles
2006-07-04, New York Times
http://select.nytimes.com/2006/07/04/opinion/04kristof.html

Journalists regularly hold back information for national security reasons; I recently withheld information at the request of the intelligence community. The one thing worse than a press that is "out of control" is one that is under control. Anybody who has lived in a Communist country knows that. Just consider what would happen if the news media as a whole were as docile to the administration as Fox News or The Wall Street Journal editorial page. When I was covering the war in Iraq, we reporters would sometimes tune to Fox News and watch, mystified, as it purported to describe how Iraqis loved Americans. Such coverage...misled conservatives about Iraq from the beginning. The real victims of Fox News weren't the liberals it attacked but the conservatives who believed it. Historically, we in the press have done more damage to our nation by withholding secret information than by publishing it. One example was this newspaper's withholding details of the plans for the Bay of Pigs invasion. President Kennedy himself suggested that the U.S. would have been better served if The Times had published the full story and derailed the invasion. Then there were the C.I.A. abuses that journalists kept mum about until they spilled over and prompted the Church Committee investigation in the 1970's. In the run-up to the Iraq war, the press...was too credulous about claims that Iraq possessed large amounts of W.M.D. In each of these cases...we failed in our watchdog role, and we failed our country. So be very wary of Mr. Bush's effort to tame the press. Watchdogs can be mean, dumb and obnoxious, but it would be even more dangerous to trade them in for lap dogs.


Bush Ignores Laws He Inks, Vexing Congress
2006-06-27, ABC News/Associated Press
http://abcnews.go.com/Politics/wireStory?id=2122700

A bill becomes the rule of the land when Congress passes it and the president signs it into law, right? Not necessarily, according to the White House. A law is not binding when a president issues a separate statement saying he reserves the right to revise, interpret or disregard it on national security and constitutional grounds. That's the argument a Bush administration official is expected to make Tuesday before the Senate Judiciary Committee, chaired by Arlen Specter, R-Pa., who has demanded a hearing on a practice he considers an example of the administration's abuse of power. "It's a challenge to the plain language of the Constitution," Specter said in an interview. [Bush has] challenge[d] many more statutes passed by Congress than any other president. Specter's hearing is about more than the statements. He's been compiling a list of White House practices he bluntly says could amount to abuse of executive power from warrantless domestic wiretapping program to sending officials to hearings who refuse to answer lawmakers' questions. But Specter and his allies maintain that Bush is doing an end-run around the veto process. In his presidency's sixth year, Bush has yet to issue a single veto. Instead, he has issued hundreds of signing statements invoking his right to interpret or ignore laws on everything from whistleblower protections to how Congress oversees the Patriot Act.


The Dark Side
2006-06-20, PBS Frontline
http://www.pbs.org/wgbh/pages/frontline/darkside/#press

Amid daily revelations about prewar intelligence and a growing scandal surrounding the indictment of the vice president's chief of staff and presidential adviser, Lewis "Scooter" Libby, FRONTLINE goes behind the headlines to investigate the internal war that was waged between the intelligence community and Richard Bruce Cheney, the most powerful vice president in the nation's history. "A lot of what needs to be done here will have to be done quietly, without any discussion, using sources and methods that are available to our intelligence agencies," Cheney told Americans just after 9/11. He warned the public that the government would have to operate on the "dark side." In The Dark Side, airing June 20, 2006, at 9 P.M. on PBS...FRONTLINE tells the story of the vice president's role as the chief architect of the war on terror and his battle with Director of Central Intelligence George Tenet for control of the "dark side." Drawing on more than 40 interviews and thousands of documents, the film provides a step-by-step examination of what happened inside the councils of war. After the attacks on 9/11, Cheney seized the initiative and pushed for expanding presidential power, transforming America's intelligence agencies, and bringing the war on terror to Iraq. In the initial stages of the war on terror, Tenet's CIA was rising to prominence as the lead agency in the Afghanistan war. But when Tenet insisted in his personal meetings with the president that there was no connection between Al Qaeda and Iraq, Cheney and Rumsfeld initiated a secret program to re-examine the evidence and marginalize the agency and Tenet.


U.S. Prison Study Faults System and the Public
2006-06-08, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2006/06/07/AR20060607020...

Not only are America's prisons and jails largely failing the 13.5 million adults who pass through them each year, but the American public is also failing the prisons and jails. Politicians have passed laws dramatically increasing the inmate population to 2.2 million on a given day without understanding life behind bars or funding programs likely to help prisoners return home and not commit more crimes. Even the data that would help specialists make sense of U.S. crime and punishment are lacking. "We should be astonished by the size of the prisoner population, troubled by the disproportionate incarceration of African-Americans and Latinos, and saddened by the waste of human potential," [a] panel said in a report to be presented to Congress. The recent boom in imprisonment has not always made Americans safer. Each year, the United States spends an estimated $60 billion on corrections. The report...finds too much violence and too little medical and mental health care, as well as a "desperate need for the kinds of productive activities that discourage violence and make rehabilitation possible." Studies...suggest that the most accurate indicator of a successful return to society is the inmate's connection to family. The panel described the high-security segregation of inmates as "counter-productive," often leading to greater prison violence and more serious crimes upon release.

Note: Certain elite groups are making large profits on the dramatic increase in numbers of prisoners across the nation over the past two decades. The prison-industrial complex sadly draws very little media attention.


Molly Ivins: The Israeli lobby
2006-05-26, CNN News
http://www.cnn.com/2006/POLITICS/04/26/ivins.israelilobby/index.html

A working paper by John Mearsheimer, professor of political science at the University of Chicago, and Stephen Walt, professor of international affairs at the Kennedy School of Government at Harvard, called "The Israel Lobby" was printed in the London Review of Books...and all hell broke loose. For having the sheer effrontery to point out the painfully obvious -- that there is an Israel lobby in the United States -- Mearsheimer and Walt have been accused of being anti-Semitic, nutty and guilty of "kooky academic work." Of course there is an Israeli lobby in America. The American Israel Public Affairs Committee (AIPAC)...calls itself "America's Pro-Israel Lobby." In the United States, we do not have...full-throttle debate about Israel. Jews who criticize Israel are charmingly labeled "self-hating Jews." As I have often pointed out, that must mean there are a lot of self-hating Israelis, because those folks raise hell over their own government's policies all the time. It's...the vehemence of the attacks on anyone perceived as criticizing Israel that makes them so odious. Israel is the No. 1 recipient of American foreign aid, and it seems an easy case can be made that the United States has subjugated its own interests to those of Israel. Whether you agree or not, it is a discussion well worth having and one that should not be shut down before it can start by unfair accusations of "anti-Semitism."

Note In this article, Molly Ivans acknowledges that she is a pro-Israel Jew who believes we need to talk about the powerful influence of the Jewish lobby on American government. For information on how Harvard distanced itself from the above paper: http://www.nysun.com/article/29638. For the mixed reaction to this academic paper in Israel: http://www.csmonitor.com/2006/0324/dailyUpdate.html


US group implants electronic tags in workers
2006-02-13, MSNBC/Financial Times
http://msnbc.msn.com/id/11314766/

An Ohio company has embedded silicon chips in two of its employees - the first known case in which US workers have been "tagged" electronically as a way of identifying them. A private video surveillance company said it was testing the technology as a way of controlling access to a room where it holds security video footage for government agencies and the police. Embedding slivers of silicon in workers is likely to add to the controversy over RFID technology, widely seen as one of the next big growth industries. RFID chips – inexpensive radio transmitters that give off a unique identifying signal – have been implanted in pets or attached to goods so they can be tracked in transit. "There are very serious privacy and civil liberty issues of having people permanently numbered," said Liz McIntyre, who campaigns against the use of identification technology. "There's nothing pulsing or sending out a signal," said Mr Darks, who has had a chip in his own arm. "It's not a GPS chip. My wife can't tell where I am." The technology's defenders say it is acceptable as long as it is not compulsory. But critics say any implanted device could be used to track the "wearer" without their knowledge.


NSA Whistleblower Alleges Illegal Spying
2006-01-10, ABC News
http://abcnews.go.com/WNT/Investigation/story?id=1491889

Russell Tice, a longtime insider at the National Security Agency, is now a whistleblower the agency would like to keep quiet. For 20 years, Tice worked in the shadows. "I specialized in what's called special access programs," Tice said of his job. "We called them 'black world' programs and operations." Some of those secret "black world" operations run by the NSA were operated in ways that he believes violated the law. He is prepared to tell Congress all he knows. Tice says the technology exists to track and sort through every domestic and international phone call...and to search for key words or phrases that a terrorist might use. Tice...says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. "For most Americans [who] placed an overseas communication, more than likely they were sucked into that vacuum." He told ABC News that he was a source for the [New York] Times. But Tice maintains that his conscience is clear. "We need to clean up the intelligence community. We've had abuses, and they need to be addressed." The NSA revoked Tice's security clearance in May of last year based on what it called psychological concerns and later dismissed him. Tice calls that bunk and says that's the way the NSA deals with troublemakers and whistleblowers.


CIA Gave Iran Bomb Plans, Book Says
2006-01-04, Los Angeles Times
http://www.latimes.com/news/nationworld/world/la-fg-intel4jan04,0,6972451.story

In a clumsy effort to sabotage Iran's nuclear program, the CIA in 2004 intentionally handed Tehran some top-secret bomb designs laced with a hidden flaw that U.S. officials hoped would doom any weapon made from them. But the Iranians were tipped to the scheme by the Russian defector hired by the CIA to deliver the plans and may have gleaned scientific information useful for designing a bomb, writes New York Times reporter James Risen in "State of War." Two nuclear weapons experts...added that a deliberate flaw in the plans could have been easily found by the Iranians. The New York Times delayed for a year publication of its article on the NSA's domestic spying, in part because of personal requests from the president. Critics have questioned whether the paper could have published the information before last year's presidential election if it had decided against a delay. Newspaper officials have refused to comment on reasons for the delay or on the exact timing. Top New York Times officials also refused to publish a news article about the reported CIA plot to give intentionally flawed nuclear plans to Iran, according to a person briefed on the newspaper's conversations by one of the participants. That person said the New York Times withheld publication at the request of the White House and former CIA Director George J. Tenet.


Vietnam Study, Casting Doubts, Remains Secret
2005-10-31, New York Times
http://www.nytimes.com/2005/10/31/politics/31war.html?ex=1288414800&en=e2f5e3...

The National Security Agency has kept secret since 2001 a finding by an agency historian that during the Tonkin Gulf episode, which helped precipitate the Vietnam War, N.S.A. officers deliberately distorted critical intelligence to cover up their mistakes. The historian's conclusion is the first serious accusation that communications intercepted by the N.S.A., the secretive eavesdropping and code-breaking agency, were falsified so that they made it look as if North Vietnam had attacked American destroyers on Aug. 4, 1964, two days after a previous clash. President Lyndon B. Johnson cited the supposed attack to persuade Congress to authorize broad military action in Vietnam, but most historians have concluded in recent years that there was no second attack. The N.S.A. historian, Robert J. Hanyok, found a pattern of translation mistakes that went uncorrected, altered intercept times and selective citation of intelligence that persuaded him that midlevel agency officers had deliberately skewed the evidence. Mr. Hanyok's findings were published nearly five years ago in a classified in-house journal, and starting in 2002 he and other government historians argued that it should be made public. But their effort was rebuffed by higher-level agency policymakers, according to an intelligence official. The intelligence official said the evidence for deliberate falsification is "about as certain as it can be."

Note: For lots more on war fabrication see the excellent information in our War Information Center and the released FOIA documents from the early 1960s showing that top Pentagon officials planned to kill innocent Americans in order to provoke a war against Cuba at http://www.WantToKnow.info/010501operationnorthwoods


Dick Cheney's Song of America
2005-10-26, Harpers Magazine
http://www.harpers.org/DickCheneysSongOfAmerica.html

Drafting a plan for global dominance. Few writers are more ambitious than the writers of government policy papers, and few policy papers are more ambitious than Dick Cheney's masterwork. It has taken several forms over the last decade and is in fact the product of several ghostwriters (notably Paul Wolfowitz and Colin Powell), but Cheney has been consistent in his dedication to the ideas in the documents that bear his name, and he has maintained a close association with the ideologues behind them. Let us, therefore, call Cheney the author, and this series of documents the Plan. The Plan was published in unclassified form most recently under the title of Defense Strategy for the 1990s, as Cheney ended his term as secretary of defense under the elder George Bush in early 1993. The Plan is for the United States to rule the world. The overt theme is unilateralism, but it is ultimately a story of domination. It calls for the United States to maintain its overwhelming military superiority and prevent new rivals from rising up to challenge it on the world stage. It calls for dominion over friends and enemies alike. It says not that the United States must be more powerful, or most powerful, but that it must be absolutely powerful. The Plan is disturbing in many ways, and ultimately unworkable. Yet it is being sold now as an answer to the 'new realities' of the post-September 11 world, even as it was sold previously as the answer to the new realities of the post-Cold War world. For Cheney, the Plan has always been the right answer, no matter how different the questions.


Bush's Veil Over History
2005-10-10, New York Times
http://www.nytimes.com/2005/10/10/opinion/10kelley.html?ex=1286596800&en=0619...

Secrecy has been perhaps the most consistent trait of the George W. Bush presidency. Whether it involves refusing to provide the names of oil executives who advised Vice President Dick Cheney on energy policy, prohibiting photographs of flag-draped coffins returning from Iraq, or forbidding the release of files pertaining to Chief Justice John Roberts...President Bush seems determined to control what the public is permitted to know. Perhaps the most egregious example occurred on Nov. 1, 2001, when President Bush signed Executive Order 13233, under which a former president's private papers can be released only with the approval of both that former president (or his heirs) and the current one. Before that executive order, the National Archives had controlled the release of documents under the Presidential Records Act of 1978, which stipulated that all papers, except those pertaining to national security, had to be made available 12 years after a president left office. Now, however, Mr. Bush can prevent the public from knowing not only what he did in office, but what Bill Clinton, George H. W. Bush and Ronald Reagan did in the name of democracy. The best interests of the nation are at stake. As the American Political Science Association, one plaintiff in the federal lawsuit, put it: "The only way we can improve the operation of government, enhance the accountability of decision-makers and ultimately help maintain public trust in government is for people to understand how it worked in the past."

Note: For more on secrecy and what we can do about it, click here.


Energy-beam weapons still missing from action
2005-08-12, MSNBC/Associated Press
http://msnbc.msn.com/id/8516353

For years, the U.S. military has explored a new kind of firepower that is instantaneous, precise and virtually inexhaustible: beams of electromagnetic energy. "Directed-energy" pulses can be throttled up or down depending on the situation, much like the phasers on "Star Trek" could be set to kill or merely stun. Such weapons are now nearing fruition. The hallmark of all directed-energy weapons is that the target -- whether a human or a mechanical object -- has no chance to avoid the shot because it moves at the speed of light. At some frequencies, it can penetrate walls. "When you're dealing with people whose full intent is to die, you can't give people a choice of whether to comply," said George Gibbs, a systems engineer for the Marine Expeditionary Rifle Squad Program who oversees directed-energy projects. "What I'm looking for is a way to shoot everybody, and they're all OK." Among the simplest forms are inexpensive, handheld lasers that fill people's field of vision, inducing a temporary blindness to ensure they stop at a checkpoint, for example. Some of these already are used in Iraq. A separate branch of directed-energy research involves bigger, badder beams: lasers that could obliterate targets tens of miles away from ships or planes. Such a strike would be so surgical that, as some designers put it at a recent conference here, the military could plausibly deny responsibility. The directed-energy component in the project is the Active Denial System, developed by Air Force researchers and built by Raytheon Co. It produces a millimeter-wavelength burst of energy that penetrates 1/64 of an inch into a person's skin, agitating water molecules to produce heat. The sensation is certain to get people to halt whatever they are doing.


Passports go electronic with new microchip
2004-12-09, Christian Science Monitor
http://www.csmonitor.com/2004/1209/p12s01-stct.html

The US passport is about to go electronic, with a tiny microchip embedded in its cover. The chip is the latest outpost in the battle to outwit tamperers. But it's also one that worries privacy advocates. The RFID (radio frequency identification) chip in each passport will contain the same personal data as now appear on the inside pages - name, date of birth, place of birth, issuing office - and a digitized version of the photo. But the 64K chip will be read remotely. And there's the rub. The scenario, privacy advocates say, could be as simple as you standing in line with your passport as someone walks by innocuously carrying a briefcase. Inside that case, a microchip reader could be skimming data from your passport to be used for identity theft. Or maybe authorities or terrorists want to see who's gathered in a crowd and surreptitiously survey your ID and track you. Why not choose a contact chip, where there would be no possibility of skimming, asks Barry Steinhardt, director of the ACLU's Technology and Liberty Project. "There was another way to go, which was to put an electronic strip in the passport that would require contact." The State Department says it's just following international standards set by the International Civil Aviation Organization (ICAO), under the umbrella of the United Nations. The ICAO specified the RFID ... at the behest of the United States. All countries that are part of the US visa-waiver program must use the new passports by Oct. 26, 2005. Mr. Steinhardt ... says the US pushed through the standards against the reservations of the Europeans. "Bush says at the G8 meeting, 'We have to adhere to the global standard,' as though we had nothing to do with it," he says in exasperation.

Note: If the above link fails, click here. For more on the risk of RFID chips, click here.


A Real Chip On Your Shoulder
2003-07-17, CBS News/Associated Press
http://www.cbsnews.com/stories/2003/07/17/tech/main563819.shtml

A U.S. company launched Thursday in Mexico the sale of microchips that can be implanted under a person's skin and used to confirm everything from health history to identity. The microchips ... went on sale last year in the United States. The microchip, the size of a grain of rice, is implanted in the arm or hip and can contain information on everything from a person's blood type to their name. In a two-hour presentation, Palm Beach, Florida-based Applied Digital Solutions Inc. introduced reporters to the VeriChip and used a syringe-like device and local anesthetic to implant a sample in the right arm of employee Carlos Altamirano. “It doesn't hurt at all,” he said. “The whole process is just painless.” Antonio Aceves, the director of the Mexican company charged with distributing the chip here, said that in the first year of sales, the company hoped to implant chips in 10,000 people and ensure that at least 70 percent of all hospitals had the technology to read the devices. One chip costs $150 and has a $50 annual fee. Users can update and manage their chips' information by calling a 24-hour customer service line. The VeriChip can track subjects who are within 5 miles, but officials want to develop a new chip that can use satellite technology to track people who are farther away and may have been kidnapped. While the idea of using the chip to track people has raised privacy concerns in the United States, the idea has been popular with Mexicans. The company hopes to have the new anti-kidnapping chip developed by 2003.


Weekend break for the global elite
2001-05-25, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2001/may/25/globalisation.madeleinebunting

Global power-brokers have a penchant for siting their get-togethers in inaccessible places. Since Seattle 1999, Washington and Prague 2000, the calendar of global get-togethers has attracted lively anti-globalisation demonstrations. Davos this year had unusually tight security to try and keep protestors well away, leading to allegations of unnecessary heavy-handedness by the Swiss police. This weekend, it is the turn of Bilderberg, perhaps the most secretive (or as the organisers would prefer to claim, discrete) club for the global elite. It holds its weekend on Stenungsund, an island off the Swedish west coast. The group was created by Denis (now Lord) Healey, Joseph Retinger, David Rockefeller and Prince Bernhard of the Netherlands (a former SS officer) - the group aimed to [bring] together financiers, industrialists, politicians and opinion formers; the press have never been allowed access. There is a growing perception that globalisation is a process which is being managed for the benefit of a small proportion of the planet's residents and at terrible cost to many more. There is a perception of illegitimacy about unaccountable corporate power and governments elected on low turnout: sooner or later global power-brokers will have to recognise this crisis of legitimacy, and engage with protestors rather than run away from them.

Note: For lots more reliable news on powerful secret societies, click here. And for another balanced article on the powerful Bilderberg Group, click here.


What really happened in Florida?
2001-02-16, BBC News
http://news.bbc.co.uk/1/hi/events/newsnight/1174115.stm

We are coming into Tallahassee. A very expensive contract between Governor Jeb [Bush]'s division of elections and a private company named DBT...accidentally wiped off the voter rolls thousands of Democratic voters. [We're on the] 18th floor division of elections. We have come to ask Mr Clayton Roberts, the director, a few questions. "It says here in the contract that the verification is supposed to be done by DBT. That you paid them $4 million. It could look to others don't you think that you paid $4 million to purchase this election for the Republican party. 95% wrong on the felon list. Mr Roberts, could you answer the question regarding the contract?" Instead, Mr Roberts called out State troopers. The difficult questions are: Did Governor Jeb Bush, his Secretary of State Katherine Harris, and her Director of Elections, Clayton Roberts, know they had wrongly barred 22,000 black, Democrat voters before the elections? After the elections did they use their powers to prevent the count of 20,000 votes for the Democrats? CAMPAIGNER: "Were people taken out of polls and stopped from voting? Yes, I think that was not right." Altogether, it looks like this cost the Democrats about 22,000 votes in Florida, which George Bush won by only 537 votes. In all, Palm Beach voting machines misread 27,000 ballots. Jeb Bush's Secretary of State, Katharine Harris, stopped them counting these votes by hand.

Note: You can watch a video of this and much more fascinating information at the BBC link above. To read a brief summary of BBC reporter Greg Palast's coverage of the 2000 election results in Floriday, see http://www.WantToKnow.info/massmedia#palast. And why wasn't this incredibly vital information reported in any of the American media?


Cloudborn Electric Wavelets To Encircle the Globe
1904-03-27, New York Times
http://select.nytimes.com/gst/abstract.html?res=F50716FB355F13718DDDAE0A94DB4...

To gather in the latent electricity in the clouds and with the globe itself as a medium of transmission to convey telegraphic messages, power for commercial purposes, or even the sound of the human voice to the utmost confines of the earth is the latest dream of Nikola Tesla. The transmitting station is an octagonal tower, pyramidal in shape, and some 187 feet in height. J. Pierpont Morgan [was] interested in his odd enterprise and furnished him with financial assistance. Tesla's transmitting tower as it stands in lonely grandeur and boldly silhouetted against the sky ... is a source or great satisfaction and of some mystification. No instruments have been installed as yet in the transmitter, nor has Mr. Tesla given any description of what they will be like. But in his article he announces that he will transmit from the tower an electric wave of a total maximum activity of ten million horse power. This, he says, will be possible with a plant of but 100 horse power, by the use of a magnifying transmitter of his own invention. What he expects to accomplish is summed up in the closing paragraph as follows: "When the great truth, accidentally revealed and experimentally confirmed, is fully recognized, that this planet ... is to electric currents virtually no more than a small metal ball and that by virtue of this fact many possibilities ... are rendered absolutely sure of accomplishment; when the first plant is inaugurated and it is shown that a telegraphic message ... can be transmitted to any terrestrial distance, ... the energy of a waterfall made available for supplying light, heat or motive power, anywhere ... humanity will be like an ant heap stirred up with a stick."

Note: If the above link fails, click here Claimed by some to be greater than Thomas Edison, Nikola Tesla was a brilliant inventor whose name and inventions were long suppressed after J.P. Morgan and others realized Tesla's inventions could give the public free energy, thereby taking away a major source of income for the elite. For a PBS tribute to Tesla, click here. For lots more on this energy genius, click here. For more on the energy cover-up, click here.


DOJ demands Facebook information from 'anti-administration activists'
2017-09-30, CNN News
http://www.cnn.com/2017/09/28/politics/facebook-anti-administration-activists...

Trump administration lawyers are demanding the private account information of potentially thousands of Facebook users in three separate search warrants served on the social media giant. The warrants specifically target the accounts of three Facebook users who are described ... as "anti-administration activists who have spoken out at organized events, and who are generally very critical of this administration's policies." One of those users, Emmelia Talarico, operated the disruptj20 page where Inauguration Day protests were organized and discussed; the page was visited by an estimated 6,000 users whose identities the government would have access to if Facebook hands over the information. Talarico says if her account information was given to the government, officials would have access to her "personal passwords, security questions and answers, and credit card information," plus "the private lists of invitees and attendees to multiple political events." The American Civil Liberties Union, representing the three Facebook users, filed a motion to quash the warrants Thursday. "What is particularly chilling about these warrants is that anti-administration political activists are going to [be] scrutinized by the very administration they are protesting," said ACLU attorney Scott Michelman. Facebook was initially served the warrants in February 2017 along with a gag order which barred the social media company from alerting the three users that the government was seeking their private information.

Note: United Nations officials recently said that the US government's treatment of activists was increasingly "incompatible with US obligations under international human rights law". For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy.


Jade Helm 15, heavily scrutinized military exercise, to open without media access
2015-07-08, Washington Post
https://www.washingtonpost.com/news/checkpoint/wp/2015/07/08/jade-helm-15-hea...

Jade Helm 15, the controversial Special Operations exercise that spawned a wave of conspiracy theories about a government takeover, will open next week without any media allowed to observe it, a military spokesman said. Embedded reporters won’t be permitted at any point during the exercise, in which military officials say that secretive Special Operations troops will maneuver through private and publicly owned land in several southern states. The exercise is scheduled for July 15 through September 15 and is expected to include more than 1,200 troops. Army Special Operations Command announced the exercise in March, saying its size and scope would set it apart from most training exercises. For months, some protesters have said Jade Helm is setting the stage for future martial law. Texas Gov. Greg Abbott, a Republican, called in April for the Texas State Guard to monitor the exercise [to] improve communication between Special Operations forces and civilians in Texas. The Washington Post has several times requested access to observe the exercise, making the case to the military that first-hand media coverage would help explain the mission. [Army spokesman Lt. Col. Mark] Lastoria said it is not possible to allow a journalist to travel with Special Operations forces in the field. The military has granted access to Special Operations in the past, however. In one recent example, a journalist observed the exercise Robin Sage in North Carolina.

Note: See interesting information on Jade Helm 15 based on government documents concluding that it is largely an artificial intelligence operation.


Assange: Google Is Not What It Seems
2014-10-23, Newsweek
http://www.newsweek.com/assange-google-not-what-it-seems-279447

In June 2011, (WikiLeaks’ founder) Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt. The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas. Cohen had moved to Google from the U.S. State Department. Schmidt arrived first, accompanied by his then partner, Lisa Shields ... a vice president of the Council on Foreign Relations. Two months later, WikiLeaks’ release of State Department cables was coming to an abrupt end. Two years later, in the wake of his early 2013 visits to China, North Korea and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, “back-channel diplomacy” for Washington. In 1999 ... Schmidt joined the New America Foundation. The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place hundreds of articles and op-eds per year. In 2003, the U.S. National Security Agency (NSA) had already started systematically violating the Foreign Intelligence Surveillance Act (FISA). During the same period, Google ... was accepting NSA money to the tune of $2 million to provide the agency with search tools. In 2012, Google arrived on the list of top-spending Washington, D.C., lobbyists. Whether it is being just a company or “more than just a company,” Google’s geopolitical aspirations are firmly enmeshed within the foreign-policy agenda of the world’s largest superpower.

Note: Read the complete Newsweek article summarized above for Julian Assange's detailed accounting of the connections between Washington D.C. insiders, Google and related technology companies, intelligence agencies, and civil society organizations. For more about Wikileaks, read this news article summary. For more on the geopolitical big picture, see these concise summaries of deeply revealing news articles from reliable major media sources.


Edward Snowden urges professionals to encrypt client communications
2014-07-17, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/jul/17/edward-snowden-professionals-enc...

The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations. Snowden said professionals were failing in their obligations to their clients, sources, patients and parishioners in what he described as a new and challenging world. "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe. Any communications should be encrypted by default," he said. Snowden's plea for the professions to tighten security came during an extensive and revealing interview with the Guardian in Moscow. During the seven hours of interview, Snowden: • Said if he ended up in US detention in Guantánamo Bay he could live with it. • Does not have any regrets. • Said that ... he was independently secure, living on savings, and money from awards and speeches he has delivered online round the world. • Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in "sexually compromising" situations are routinely passed around. He works online late into the night; a solitary, digital existence not that dissimilar to his earlier life. He said he was using part of that time to work on the new focus for his technical skills, designing encryption tools to help professionals such as journalists protect sources and data. He is negotiating foundation funding for the project, a contribution to addressing the problem of professions wanting to protect client or patient data, and in this case journalistic sources.

Note: Read the transcript of the Guardian's new interview of Edward Snowden. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Snowden: Why hasn’t the Director of National Intelligence been punished for lying to Congress
2014-05-01, Washington Post blog
http://www.washingtonpost.com/blogs/the-switch/wp/2014/05/01/snowden-why-hasn...

Former National Security Agency contractor Edward Snowden, and one of the reporters who first broke the news of Snowden's documents, Laura Poitras, received a Ridenhour Truth-Teller prize [on April 30] to a standing ovation at the National Press Club. Snowden leaked classified documents that exposed the NSA's massive global surveillance programs. Snowden ... compared his actions with that of Director of National Intelligence James R. Clapper, who denied that the NSA was "wittingly" collecting data on millions of Americans in a Senate Intelligence Committee hearing last spring -- a claim at odds with revelations about domestic phone records collection as a result of documents provided by Snowden. "The oath that I remember is James Clapper raising his hand, swearing to tell the truth and then lying to the American public," Snowden said. "I also swore an oath, but that oath was not to secrecy, but to defend the American Constitution." While Clapper has accused Snowden of perpetrating the most "massive and damaging theft of intelligence" in U.S. history, Snowden argues his actions were serving a larger public interest that superseded the national intelligence need for secrecy. Later in the speech, he described Clapper as having "committed a crime by lying under oath to the American people," and questioned why charges were never brought against the director. By contrast, Snowden said, charges were brought against him soon after he revealed himself as the source of the leaks.

Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.


NSA broke privacy rules thousands of times per year, audit finds
2013-08-15, Washington Post
http://www.washingtonpost.com/world/national-security/nsa-broke-privacy-rules...

The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents. Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by statute and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls. The documents, provided earlier this summer to The Washington Post by former NSA contractor Edward Snowden, include a level of detail and analysis that is not routinely shared with Congress or the special court that oversees surveillance. In one of the documents, agency personnel are instructed to remove details and substitute more generic language in reports to the Justice Department and the Office of the Director of National Intelligence. In one instance, the NSA decided that it need not report the unintended surveillance of Americans. The NSA audit obtained by The Post, dated May 2012, counted 2,776 incidents in the preceding 12 months of unauthorized collection, storage, access to or distribution of legally protected communications. Many involved failures of due diligence or violations of standard operating procedure. The most serious incidents included a violation of a court order and unauthorized use of data about more than 3,000 Americans and green-card holders.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Daniel Ellsberg: ‘I’m sure that President Obama would have sought a life sentence in my case’
2013-06-05, Washington Post
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/05/daniel-ellsberg-im...

[Daniel] Ellsberg is one of the most outspoken critics of the Obama administration’s prosecution of leakers. Under President Obama’s tenure, the government has prosecuted six individuals for releasing classified information to media organizations. Ellsberg is particularly fierce in his support of Bradley Manning, a young soldier who released a large amount of classified information to WikiLeaks. Manning was arrested in 2010, and his military court-martial began this week. Ellsberg considers Manning a hero, and he argues that there is little difference between what Manning did in 2010 and what Ellsberg did four decades earlier. [Q.}: In a 1973 interview, you said that a “secondary objective” of releasing the Pentagon Papers was “the hope of changing the tolerance of Executive secrecy that had grown up over the last quarter of a century both in Congress and the courts and in the public at large.” How has that “tolerance of secrecy” changed over the last four decades? DE: There’s been very great tolerance that if the magic words “national security,” or the new words “homeland security” are invoked, Congress has given the president virtually a free hand in deciding what information they will know as well as the public. I wouldn’t count on the current court with its current makeup making the same ruling with the Pentagon Papers as they did 40 years ago. I’m sure that President Obama would have sought a life sentence in my case. Various things that were counted as unconstitutional then have been put in the president’s hands now. He’s become an elected monarch. Nixon’s slogan, “when the president does it, it’s not illegal,” is pretty much endorsed now.

Note: To see key quotes showing the amazing courage and dedication of Snowden, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.


Raytheon software trolls social networks
2013-02-12, San Francisco Chronicle (SF's leading newspaper)
http://www.sfgate.com/technology/article/Raytheon-software-trolls-social-netw...

Raytheon, a Massachusetts defense contractor, has built tracking software that pulls information from social networks, according to a video obtained by the Guardian newspaper in London. "[Raytheon] has acknowledged the technology was shared with U.S. government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analyzing 'trillions of entities' from cyberspace." Using public data from Facebook, Twitter, Gowalla and Foursquare, the software - called RIOT, or Rapid Information Overlay Technology - apparently gathers uploaded information and forms a profile of a person's every move that was registered with one of the websites. The video obtained by the newspaper starts with a demonstration by Raytheon's "principal investigator," Brian Urch, showing how easy it is to track an employee named Nick - a real person - based on all the places he has checked in using his smartphone. "When people take pictures and post them on the Internet using their smartphones, the phone will actually embed the latitude and longitude in the header data - so we're going to take advantage of that," Urch says. "So now we know where Nick's gone ... and now we'll predict where he'll be in the future." Urch goes on to analyze - using graphs and calendars - where Nick likes to spend his personal time and make predictions about his behavior. "If you ever wanted to get a hold of his laptop, you might want to visit the gym at 6 a.m. on Monday," Urch says with alarming casualness.

Note: To read the full Guardian article, click here.


'Hitler skull' revealed as female
2009-09-29, BBC News
http://news.bbc.co.uk/2/hi/8281839.stm

A bone fragment believed to be part of Adolf Hitler's skull has been revealed as being that of an unidentified woman, US scientists have said. The section of bone - marked with a bullet hole - was used to support the theory that Hitler shot himself. Russian scientists said the skull piece was found alongside Hitler's jawbone and had put it on display in Moscow. But US scientists said DNA tests revealed it actually belonged to a woman aged between 20 and 40. An archaeologist from the University of Connecticut travelled to Moscow, where the fragment has been on show in the city's federal archive since 2000, to take a sample. Nick Bellantoni said he had suspected even before the bone was tested that the fragment did not come from an adult male. DNA tests confirmed that the bone fragment came from a female. Doubts about exactly how Hitler died have persisted for decades. Russian officials said that the bodies of Hitler and Eva Braun - who reportedly committed suicide in a Berlin bunker in 1945 - were removed from a shell crater shortly after they died. The piece of skull forms part of a collection that also includes a section of a bloodstained sofa where Hitler is believed to have shot himself after swallowing a cyanide pill.


US Air Force prepares drones to end era of fighter pilots
2009-08-23, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2009/aug/22/us-air-force-drones-pilots-afghan...

As part of an expanding programme of battlefield automation, the US Air Force has said it is now training more drone operators than fighter and bomber pilots and signalled the end of the era of the fighter pilot is in sight. Just three years ago, the service was able to fly just 12 drones at a time; now it can fly more than 50. At a trade conference outside Washington last week, military contractors presented a future vision in which pilotless drones serve as fighters, bombers and transports, even automatic mini-drones programmed to attack in swarms. Contractors made presentations for "nano-size" drones the size of moths that can flit into buildings to gather intelligence; drone helicopters; large aircraft that could be used as strategic bombers and new mid-sized drones could act as jet fighters. This Terminator-like vision in which future generations of fighter aces become cubicle-bound drone operators thousands of miles from conflict is already here: the deployment that began during the Bush administration has accelerated during the first seven months of Obama's term. Some 5,000 robotic vehicles and drones are now deployed in Iraq and Afghanistan. By 2015, the Pentagon's $230bn arms procurement programme Future Combat Systems expects to robotise around 15% of America's armed forces. As US domestic approval for the "Af-Pak" conflict slips (a new Washington Post poll found less than a quarter of the US public support sending more troops to Afghanistan), the reliance of drones is likely to grow, analysts say. The air force study suggests areas of warfare too critical for automation, including dogfighting and nuclear-bombing, could eventually be handled by drones.

Note: For revealing reports on Pentagon war planning from major media sources, click here.


Billionaire club in bid to curb overpopulation
2009-05-24, Times of London
http://www.timesonline.co.uk/tol/news/world/us_and_americas/article6350303.ece

Some of America’s leading billionaires have met secretly to consider how their wealth could be used to slow the growth of the world’s population. Described as the Good Club by one insider, it included David Rockefeller Jr, the patriarch of America’s wealthiest dynasty, Warren Buffett and George Soros, the financiers, Michael Bloomberg, the mayor of New York, and the media moguls Ted Turner and Oprah Winfrey. They gathered at the home of Sir Paul Nurse, a British Nobel prize biochemist and president of the private Rockefeller University, in Manhattan on May 5. The informal afternoon session was so discreet that some of the billionaires’ aides were told they were at “security briefings”. Stacy Palmer, editor of the Chronicle of Philanthropy, said the summit was unprecedented. “We only learnt about it afterwards, by accident. Normally these people are happy to talk good causes, but this is different – maybe because they don’t want to be seen as a global cabal,” he said. Some details were emerging this weekend, however. Taking their cue from Gates they agreed that overpopulation was a priority. [A] guest said there was “nothing as crude as a vote” but a consensus emerged that they would back a strategy in which population growth would be tackled as a potentially disastrous environmental, social and industrial threat. “This is something so nightmarish that everyone in this group agreed it needs big-brain answers,” said the guest. “They need to be independent of government agencies, which are unable to head off the disaster we all see looming.” Why all the secrecy? “They wanted to speak rich to rich without worrying anything they said would end up in the newspapers, painting them as an alternative world government,” he said.

Note: This very secret private meeting of billionaires planning to "solve" the world's "overpopulation" problem occurred just a few days before the latest Bilderberg meeting. For an ABC article on the same, click here. Is this a more positive twist on the Bilderberg Group of the worlds' power elite, or more of the same?


Microchips Everywhere: a Future Vision
2008-01-29, Seattle Times/Associated Press
http://seattletimes.nwsource.com/html/businesstechnology/2004151388_apchippin...

Here's a vision of the not-so-distant future: Microchips with antennas will be embedded in virtually everything you buy, wear, drive and read, allowing retailers and law enforcement to track consumer items -- and, by extension, consumers -- wherever they go, from a distance. A seamless, global network of electronic "sniffers" will scan radio tags in myriad public settings, identifying people and their tastes instantly so that customized ads, "live spam," may be beamed at them. In "Smart Homes," sensors built into walls, floors and appliances will inventory possessions, record eating habits, monitor medicine cabinets -- all the while, silently reporting data to marketers eager for a peek into the occupants' private lives. Science fiction? In truth, much of the radio frequency identification [RFID] technology that enables objects and people to be tagged and tracked wirelessly already exists -- and new and potentially intrusive uses of it are being patented, perfected and deployed. Some of the world's largest corporations are vested in the success of RFID technology, which couples highly miniaturized computers with radio antennas to broadcast information about sales and buyers to company databases. Already, microchips are turning up in some computer printers, car keys and tires, on shampoo bottles and department store clothing tags. They're also in library books and "contactless" payment cards. With tags in so many objects, relaying information to databases that can be linked to credit and bank cards, almost no aspect of life may soon be safe from the prying eyes of corporations and governments, says Mark Rasch, former head of the computer-crime unit of the U.S. Justice Department.

Note: For lots more on microchip implants, click here.


Houston Police Drone Aircraft
2007-11-23, CNN
http://edition.cnn.com/TRANSCRIPTS/0711/23/sitroom.02.html

Transcript: [Suzanne] MALVEAUX: A Texas mystery solved -- at least partially. We now know Houston police are going to start using unmanned drone aircraft. But the question remains, well, for what? Stephen Dean of CNN affiliate KPRC has got an exclusive look. STEPHEN DEAN, KPRC CORRESPONDENT (voice-over): HPD [Houston Police Dept.], the federal Department of Homeland Security and other invited guests all watching to see how this drone could be used for police work in and around Houston. We tracked that drone from News Chopper 2. And that drone was able to use a high-powered camera to track us. Those cameras can actually look into people's homes or even follow them in moving cars -- which raises all sorts of new questions. HPD quickly hustled together a news conference when it realized our cameras were there for the entire secret test. Executive Assistant Chief Martha Mantabo admits that could mean covert police action. But she says it's too early to tell what else HPD will do with the aircraft. We asked, are these drones headed for ticketing speeders from the sky? MONTALVO: I'm not ruling anything out. DEAN: Back at the secret test site, police helicopter pilots claimed the entire air space was restricted and even threatened our local 2 Investigates pilot with action from the FAA if we didn't leave. But we checked with FAA several times and there never was a flight restriction. That leaves some to wonder whether the police are now ready to use terrorism fears since 911 to push the envelope further into our private lives.

Note: To watch the video of secret police work in action, click here.


Big Brother Spying on Americans' Internet Data?
2007-11-07, ABC News
http://abcnews.go.com/Politics/Story?id=3833172

According to a former AT&T employee, the government has warrantless access to a great deal of Internet traffic should they care to take a peek. As information is traded between users it flows also into a locked, secret room on the sixth floor of AT&T's San Francisco offices and other rooms around the country -- where the U.S. government can sift through and find the information it wants, former AT&T employee Mark Klein alleged Wednesday at a press conference on Capitol Hill. "An exact copy of all Internet traffic that flowed through critical AT&T cables -- e-mails, documents, pictures, Web browsing, voice-over-Internet phone conversations, everything -- was being diverted to equipment inside the secret room," he said. Klein ... said that as an AT&T technician overseeing Internet operations in San Francisco, he helped maintain optical splitters that diverted data en route to and from AT&T customers. One day he found that the splitters were hard-wired into a secret room on the sixth floor. Documents he obtained [from] AT&T showed that highly sophisticated data mining equipment was kept there. Conversations he had with other technicians and the AT&T documents led Klein to believe there are 15 to 20 such sites nationwide, including in Seattle, Los Angeles, San Jose, San Diego and Atlanta, he said. Brian Reid, a former Stanford electrical engineering professor who appeared with Klein, said the NSA would logically collect phone and Internet data simultaneously because of the way fiber optic cables are intertwined. He said ... the system described by Klein suggests a "wholesale, dragnet surveillance." Of the major telecom companies, only Qwest is known to have rejected government requests for access to data. Former Qwest CEO Joseph Nacchio, appealing an insider trading conviction last month, said the government was seeking access to data even before Sept. 11.


Same Agencies to Run, Oversee Surveillance Program
2007-08-07, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/08/06/AR20070806013...

The Bush administration plans to leave oversight of its expanded foreign eavesdropping program to the same government officials who supervise the surveillance activities and to the intelligence personnel who carry them out, senior government officials said yesterday. The law, which permits intercepting Americans' calls and e-mails without a warrant if the communications involve overseas transmission, gives Director of National Intelligence Mike McConnell and Attorney General Alberto R. Gonzales responsibility for creating the broad procedures determining whose telephone calls and e-mails are collected. It also gives McConnell and Gonzales the role of assessing compliance with those procedures. The law ... does not contain provisions for outside oversight -- unlike an earlier House measure that called for audits every 60 days by the Justice Department's inspector general. The controversial changes to the 1978 Foreign Intelligence Surveillance Act were approved by both chambers of the Democratic-controlled Congress despite privacy concerns raised by Democratic leaders and civil liberties advocacy groups. Central to the new program is the collection of foreign intelligence from "communication service providers," which the officials declined to identify, citing secrecy concerns. Under the new law, the attorney general is required to draw up the governing procedures for surveillance activity, for approval by the Foreign Intelligence Surveillance Court. Once the procedures are established, the attorney general and director of national intelligence will formally certify that the collection of data is authorized. But the certification will be placed under seal "unless the certification is necessary to determine the legality of the acquisition," according to the law signed by Bush.


Bush Changes Continuity Plan
2007-05-10, The Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/05/09/AR20070509027...

President Bush issued a formal national security directive yesterday ordering agencies to prepare contingency plans for a surprise, "decapitating" attack on the federal government, and assigned responsibility for coordinating such plans to the White House. The prospect of a nuclear bomb being detonated in Washington without warning ... has been cited by many security analysts as a rising concern since the Sept. 11, 2001, attacks. The order makes explicit that the focus of federal worst-case planning involves a covert nuclear attack against the nation's capital. "Adequate warning of potential emergencies that could pose a significant risk to the homeland might not be available, and therefore all continuity planning shall be based on the assumption that no such warning will be received," states the 72-paragraph order. The statement added, "Emphasis will be placed upon geographic dispersion of leadership, staff, and infrastructure in order to increase survivability and maintain uninterrupted Government Functions." After the 2001 attacks, Bush assigned about 100 senior civilian managers to rotate secretly to locations outside of Washington for weeks or months at a time [forming] a shadow government that evolved based on long-standing "continuity of operations plans." Since then, other agencies including the Pentagon, the Office of the Director of National Intelligence and the CIA have taken steps to relocate facilities or key functions outside of Washington for their own reasons, citing factors such as economics or the importance of avoiding Beltway "group-think."

Note: Why isn't Congress making these absolutely vital decisions? What gives these organizations authority to determine what will happen in the case of a major attack?


Ousted U.S. attorneys received positive job evaluations
2007-02-12, San Jose Mercury News
http://www.mercurynews.com/mld/mercurynews/news/politics/16683938.htm

Although the Bush administration has said that six U.S. attorneys were fired recently in part because of "performance related" issues, at least five of them received positive job evaluations before they were ordered to step down. Attorney General Alberto Gonzales, using authority he gained in March from a little-noticed provision of the Patriot Act, has appointed interim U.S. attorneys from the Bush administration's inner circle. Daniel Bogden, the U.S. attorney in Nevada, was described in his last job performance evaluation in 2003 as being a "capable" leader who was highly regarded ... said a Justice Department official. David Iglesias, the U.S. attorney in New Mexico, also received a positive evaluation last year, according to another Justice Department official. Both officials asked not to be identified. The other U.S. attorneys who received good reviews were John McKay, the former U.S. attorney in Seattle; Paul Charlton, the former U.S. attorney in Arizona; and Carol Lam, the current U.S. attorney in San Diego. The decision to fire the U.S. attorneys came under scrutiny late last month after Senate Democrats discovered a change in the Patriot Act that allowed Gonzales to appoint interim U.S. attorneys for indefinite terms without Senate approval. In testimony to the Senate Judiciary Committee last week, [Deputy Attorney General Paul] McNulty conceded that H.E. "Bud" Cummins, the former U.S. attorney in Arkansas, wasn't fired because of how he handled his job. Rather, McNulty said, administration officials wanted to make room for Timothy Griffin, a former aide of presidential adviser Karl Rove.

Note: To read a related Associated Press article on U.S. Attorney General Gonzalez, click here. The article starts with "Attorney General Alberto Gonzales criticized federal judges ... for ruling on cases that affect national-security policy. Judges, he contended, are unqualified to decide terrorism issues that he said are best settled by Congress or the president." Isn't that negating the balance of powers laid out in the U.S. Constitution?


Police spies chosen to lead war protest
2006-07-28, San Francisco Chronicle
http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2006/07/28/SURVEILLANCE.TMP

Two Oakland police officers working undercover at an anti-war protest in May 2003 got themselves elected to leadership positions in an effort to influence [a] demonstration. The department assigned the officers to join activists protesting the U.S. war in Iraq ... a police official said last year in a sworn deposition. [At the] demonstration, police fired nonlethal bullets and bean bags at demonstrators who blocked the Port of Oakland's entrance in a protest. Dozens of activists and longshoremen on their way to work suffered injuries ranging from welts to broken bones and have won nearly $2 million in legal settlements from the city. In a deposition related to a lawsuit filed by protesters, Deputy Police Chief Howard Jordan said activists had elected the undercover officers to "plan the route of the march and decide I guess where it would end up and some of the places that it would go." Oakland police had also monitored online postings by the longshoremen's union regarding its opposition to the war. The documents ... were released Thursday by the American Civil Liberties Union, as part of a report criticizing government surveillance of political activists since the terrorist attacks of Sept. 11, 2001. Jordan ... noted that "two of our officers were elected leaders within an hour on May 12." The idea was "to gather the information and maybe even direct them to do something that we want them to do." The ACLU said the Oakland case was one of several instances in which police agencies had spied on legitimate political activity since 2001.


Drug firms a danger to health - report
2006-07-26, Guardian (One of U.K.'s leading newspapers)
http://www.guardian.co.uk/medicine/story/0,,1806084,00.html

Drug companies are accused today of endangering public health through widescale marketing malpractices, ranging from covertly attempting to persuade consumers that they are ill to bribing doctors and misrepresenting the results of safety and efficacy tests on their products. In a report that charts the scale of illicit practices by drug companies in the UK and across Europe, Consumers International - the world federation of consumer organisations - says people are not being given facts about the medicines they take because the companies hide the marketing tactics on which they spend billions. "Irresponsible marketing practices form a serious, persistent and widespread problem among the entire pharmaceutical industry," says the report, which analyses the conduct of 20 of the biggest companies. Scandals such as the withdrawal of Vioxx ... show that unethical drug promotion is a consumer concern. Merck withdrew the drug in September 2004, but allegedly knew it could increase the chances of heart attacks and strokes from 2000 and has been accused of manipulating study results to play down the risk. More than 6,000 lawsuits have been filed against the company in the United States by people who claim they suffered heart attacks as a result of the drug. There is no room for complacency when drug companies spend twice as much on marketing as on research...but do not publish information on their drug promotion practices.


Israelis unleash Scream at protest
2005-06-06, Toronto Star (One of Canada's leading newspapers)
http://www.torstarreports.com/NASApp/cs/ContentServer?pagename=thestar/Layout...

The knees buckle, the brain aches, the stomach turns. And suddenly, nobody feels like protesting anymore. Witnesses describe a minute-long blast of sound emanating from a white Israeli military vehicle. Within seconds, protestors began falling to their knees, unable to maintain their balance. An Israeli military source, speaking on the customary condition of anonymity, confirmed the existence of the Scream. "The intention is to disperse crowds with sound pulses that create nausea and dizziness," the Israel Defence Force spokesperson told the Toronto Star. The IDF is saying little about the science behind the Scream, citing classified information. But the technology is believed to be similar to the LRAD — Long-Range Acoustic Device — used by U.S. forces in Iraq as a means of crowd control. Hillel Pratt, a professor of neurobiology ... likens the effect of such technologies to simulated seasickness. "It doesn't necessarily have to be a loud sound. The combination of low frequencies at high intensities, for example, can create discrepancies in the inputs to the brain," said Pratt. Arik Asherman, a leader of Rabbis For Human Rights, was cautiously optimistic the Scream could make a positive difference. But Asherman said Israeli officials would be wise to use the Scream sparingly. "We need to remind ourselves the problem is not the demonstrations, but what the demonstrations are about," he said. "If this makes it any more difficult for Palestinians to express themselves in a non-violent way, that is problematic. The best way to disperse demonstrations is to deal with the actual issues.

Note: If the above link fails, click here.


What drives support for this torturer
2005-05-16, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/comment/story/0,3604,1484631,00.html

Oil and gas ensure that the US backs the Uzbek dictator to the hilt. The bodies of hundreds of pro-democracy protesters in Uzbekistan are scarcely cold, and already the White House is looking for ways to dismiss them. The conviction rate in criminal and political trials in Uzbekistan is over 99% - in President Karimov's torture chambers, everyone confesses. Karimov is very much George Bush's man in central Asia. There is not a senior member of the US administration who is not on record saying warm words about Karimov. There is not a single word recorded by any of them calling for free elections in Uzbekistan.

Note: The above article is particularly revealing in that it is written by the UK's former ambassador to Uzbekistan.


The Coming Wars (by Seymour M. Hersch)
2005-01-24, The New Yorker
http://www.newyorker.com/printable/?fact/050124fa_fact

“This is a war against terrorism, and Iraq is just one campaign. The Bush Administration is looking at this as a huge war zone,” the former high-level intelligence official told me. “Next, we’re going to have the Iranian campaign." The President has signed a series of findings and executive orders authorizing secret commando groups and other Special Forces units to conduct covert operations against suspected terrorist targets in as many as ten nations in the Middle East and South Asia. “The Pentagon doesn’t feel obligated to report any of this to Congress,” the former high-level intelligence official said. “They don’t even call it ‘covert ops’ -- it’s too close to the C.I.A. phrase. In their view, it’s ‘black reconnaissance.’ They’re not even going to tell the cincs” -- the regional American military commanders-in-chief.


Uncovering an Israeli jail that specializes in nightmares
2004-06-16, Newsweek
http://msnbc.msn.com/id/5251751

What [Israeli historian Gad] Kroizer had discovered and later footnoted in an academic paper ... was the location of an ultrasecret jail where Israel has held Arabs in total seclusion for years, barred visits by the Red Cross and allegedly tortured inmates. Known as 1391, the facility is used as an interrogation center by a storied unit of Israel's military intelligence, whose members-all Arabic speakers-are trained to wring confessions from the toughest militants. Some of the methods are reminiscent of Abu Ghraib: nudity as a humiliation tactic, compromising photographs, sleep deprivation. In a few cases, at least, interrogators at 1391 appear to have gone beyond Israel's own hair-splitting distinction between torture and what a state commission referred to in 1987 as "moderate physical pressure." But the nightmare for those in 1391 is the isolation and the fear that no one knows where you are. The location of the compound is so hush-hush that a court this year banned a visit by an Israeli legislator. Prisoners describe being hooded everywhere at the facility except in their cells. Hassan Rawajbeh ... a member of the nearly disbanded Palestinian Preventive Security force ... was picked up by soldiers in Nablus 18 months ago. He was hooded, handcuffed and thrown on the floor of a van. When the hood was removed, he was in a tiny, windowless cell. The chamber contained no toilet, only a bucket in the corner, which ... his jailers would empty once every few weeks. A low buzzing droned constantly. For nearly four months, Rawajbeh saw no one but his interrogators, who kept him naked for days at a time and prevented him from going to the bathroom.


Who killed Nick Berg?
2004-05-29, Sydney Morning Herald
http://www.smh.com.au/articles/2004/05/28/1085641717320.html

Iraq in flames, Washington an object of disgust. What to do? At this pivotal moment, CNN and Fox News are tipped off to a clip of an American citizen being beheaded. The victim is ... Nick Berg.The vile deed is deemed the work of al-Qaeda. The timing of the video was brilliant for the West. Media pundits judged the crime a deeper evil than the systemic torture of innocent Iraqis. But some people sensed a rat. But if it was not al-Qaeda, who? While this video shows a human body having its head chopped off, it does not necessarily portray an act of murder. A month before the discovery of [his] corpse, Berg had been released from custody. But whose custody? Brigadier General Mark Kimmitt ... claimed he was in the custody of Iraqi police. However, the Iraqi police chief [stated] "the Iraqi police never arrested the slain American". Berg's family are certain his jailers were the US military. His father, Michael, had been told so by the FBI. He has produced an email from a US consular official ... confirming that his son was in the hands of the US. In his final moments on screen Berg is wearing an orange jumpsuit of the kind familiar from Guantanamo Bay. His white chair is identical to those in the photographs of the Abu Ghraib prison tortures. During the decapitation, starting at the front of the throat, there is little sign of blood. The scream is wildly out of sync, sounds female, and is obviously dubbed. Dr John Simpson, executive director for surgical affairs at the Royal Australasian College of Surgeons ... agrees with other experts who find it highly probable that Berg had died before his decapitation. There's something fishy about this video. In the end, the question is: who killed Nick Berg, and why?

Note: If the above link fails, click here. For a CNN article raising other serious questions on Berg, click here. For more reliable information on how government can control and manipulate public perception, click here.


Bush Bones connected to Kerry Bones
2004-04-13, Boston Globe
http://www.boston.com/news/politics/president/kerry/articles/2004/04/13/bush_...

Skull and Bones is a shadowy, elite secret society that selects 15 new members each year from the senior class at Yale. It is known both for its celebrity membership - past "taps'' include William F. Buckley Jr., President William Howard Taft, and Henry Luce, the founder of Time magazine - and for its bizarre rituals. The rites - said to include a "blood''-drinking initiation and oodles of frank sex talk by the once all-male undergrads (Bones started admitting women in 1992) - are much discussed but little known. This is, after all, a secret society. In her 2002 book, "Secrets of the Tomb,'' Alexandra Robbins speculated that the 2004 presidential election might pit Bonesman George W. Bush (Yale, 1968) against Bonesman John F. Kerry (Yale, 1966.) Good call! This organization [was] once deemed to be so secretive that members had to leave the room if the society's name was ever mentioned in public. Both Bush's father and his grandfather, Senator Prescott Bush, were Bonesmen. [Bonesman John Kerry's] second wife's first husband, the late senator John Heinz, was Bones, as was his father. GWB: "My senior year I joined Skull and Bones, a secret society, so secret I can't say anything more" (from his 1999 campaign biography). JFK [John Kerry]: "There's not much I can say, Tim, because it's a secret" (to Tim Russert on "Meet the Press").

Note: If secret societies produce this many influential leaders, shouldn't the public have a right to know more about them? For lots more, click here.


The Armageddon Plan
2004-03-01, The Atlantic Monthly
http://www.theatlantic.com/doc/prem/200403/mann

At least once a year during the 1980s Dick Cheney and Donald Rumsfeld vanished. Cheney was ... a [Republican] congressman. Rumsfeld [was] the head of G. D. Searle & Co.. Yet for periods of three or four days at a time no one in Congress knew where Cheney was, nor could anyone at Searle locate Rumsfeld. Rumsfeld and Cheney were principal actors in one of the most highly classified programs of the Reagan Administration. [It] called for setting aside the legal rules for presidential succession ... in favor of a secret procedure for putting in place a new "President" and his staff. The program is of particular interest today because it helps to explain the thinking and behavior of the second Bush Administration [since] September 11, 2001. The idea was to concentrate on speed, to preserve "continuity of government," and to avoid cumbersome procedures; the speaker of the House, the president pro tempore of the Senate, and the rest of Congress would play a greatly diminished role. "One of the awkward questions we faced ... was whether to reconstitute Congress after a nuclear attack. It was decided that no, it would be easier to operate without them." [Cheney's and Rumsfeld's] participation in the extra-constitutional continuity-of-government exercises ... also demonstrates a broad, underlying truth about these two men. For three decades ... even when they were out of the executive branch of government, they were never far away. They stayed in touch with defense, military, and intelligence officials, who regularly called upon them. They were ... a part of the permanent hidden national-security apparatus of the United States.

Note: If above link fails, click here. The author, James Mann, is a former Washington correspondent for the Los Angeles Times, and senior writer-in-residence at the Center for Strategic and International Studies, in Washington, D.C. Apparently, Cheney and Rumsfeld don't find Congress to be very important.


Your life at your fingertips — courtesy of the Pentagon
2003-06-02, USA Today/Associated Press
http://www.usatoday.com/tech/news/techinnovations/2003-06-02-lifelog_x.htm

Coming to you soon from the Pentagon: the diary to end all diaries — a multimedia, digital record of everywhere you go and everything you see, hear, read, say and touch. Known as LifeLog, the project has been put out for contractor bids by the Defense Advanced Research Projects Agency, or DARPA, the agency that helped build the Internet and that is now developing the next generation of [surveillance] tools. The agency ... [considers] LifeLog ... a tool to capture "one person's experience in and interactions with the world" through a camera, microphone and sensors worn by the user. Everything from heartbeats to travel to Internet chatting would be recorded. The goal is to create breakthrough software that helps analyze behavior, habits and routines, according to Pentagon documents reviewed by The Associated Press. The products of the unclassified project would be available to both the private sector and other government agencies — a concern to privacy advocates. John Pike of Global Security.org, a defense analysis group, is dubious the project has military application. "I have a much easier time understanding how Big Brother would want this than how (Defense Secretary Donald) Rumsfeld would use it," Pike said. "They have not identified a military application."

Note: For more on this at Wired, click here.


Nervous system manipulation by electromagnetic fields from monitors
2003-01-14, US Patent and Trademark Office Website
http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&...

Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. The implementations of the invention are adapted to the source of video stream that drives the monitor, be it a computer program, a TV broadcast, a video tape or a digital video disc (DVD). The program that causes a monitor to display a pulsing image may be run on a remote computer that is connected to the user computer by a link; the latter may partly belong to a network, which may be the Internet. A live TV broadcast can be arranged to have the feature imbedded simply by slightly pulsing the illumination of the scene that is being broadcast. This method can of course also be used in making movies and recording video tapes and DVDs. Certain monitors can emit ... pulses that are so weak as to be subliminal. This is unfortunate since it opens a way for mischievous application of the invention, whereby people are exposed unknowingly to manipulation of their nervous systems for someone else's purposes.

Note: If the above link fails, click here.


E-mail users warned over spy network
2001-05-29, BBC News
http://news.bbc.co.uk/1/hi/world/europe/1357264.stm

Computer users across Europe should encrypt all their e-mails, to avoid being spied on by a UK-US eavesdropping network, say Euro-MPs. The tentacles of the Echelon network stretch so far that the UK's involvement could constitute a breach of human rights, they say. The Euro-MPs have been studying Echelon for almost a year, after allegations that it has been used by the US to commit industrial espionage against European firms. They conclude that Echelon - whose existence is not officially acknowledged - is reading millions of e-mails and faxes sent every day by ordinary people. The US has denied the system even exists, and the UK refuses to give details, except to say that communications interception is a vital tool in the fight against "dangers to society". The Echelon operation is based at Fort Meade in Maryland, America, and at the UK's spy centre, GCHQ in Cheltenham.

Note: For another revealing BBC News report on Echelon, click here.


Google Comes Under Fire for 'Secret' Relationship with NSA
2011-01-25, Yahoo News/PC World
http://news.yahoo.com/s/pcworld/20110125/tc_pcworld/googlecomesunderfireforse...

Consumer Watchdog, an advocacy group largely focused in recent years on Google's privacy practices, has called [for] a congressional investigation into the Internet giant's "cozy" relationship with U.S. President Barack Obama's administration. In a letter sent [on January 24], Consumer Watchdog asked Representative Darrell Issa, the new chairman of the House Oversight and Government Reform Committee, to investigate the relationship between Google and several government agencies. "We believe Google has inappropriately benefited from close ties to the administration," the letter said. "It should not get special treatment and access because of a special relationship with the administration." Consumer Watchdog's latest complaints about the relationship of Google and the Obama administration are outlined in a 32-page report [which] questions Google's relationship with the U.S. National Security Agency and calls for the company to be more open about what consumer information it shares with the spy agency.


WikiLeaks founder drops 'mass spying' hint
2010-06-22, ABC News (Australian Broadcasting Corporation)
http://www.abc.net.au/news/stories/2010/06/22/2933892.htm

WikiLeaks co-founder Julian Assange has given his strongest indication yet about the next big leak from his whistleblower organisation. In an interview with the ABC's Foreign Correspondent, Mr Assange said cryptically of WikiLeaks' current project: "I can give an analogy. If there had been mass spying that had affected many, many people and organisations and the details of that mass spying were released then that is something that would reveal that the interests of many people had been abused." He agreed it would be of the "calibre" of publishing information about the way the top secret Echelon system - the US-UK electronic spying network which eavesdrops on worldwide communications traffic - had been used. Mr Assange also confirmed that WikiLeaks has a copy of a video showing a US military bombing of a western Afghan township which killed dozens of people, including children. During the course of the past month, Mr Assange has been talking to [ABC's] Foreign Correspondent for [an upcoming] program examining the efficacy of the WikiLeaks model. "What we want to create is a system where there is guaranteed free press across the world, the entire world, that every individual in the world has the ability to publish materials that is meaningful," he said.

Note: For more on government surveillance from major media sources, click here.


What Microsoft knows and keeps about you
2010-02-25, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/blogs/ybenjamin/detail??blogid=150&entry_id=57956

It's time to reflect on the immense powers Americans have ceded to the government and [the] potential for abuse by federal, state and local authorities. The global Internet and telecommunications infrastructure provides massive information on almost ... every person on the planet. One power truly stands out --- the all-encompassing reach and technological capabilities of the US National Security Agency. If you want to be secure, don't use a phone, a computer, credit card or any other technologically linked system because it guarantees that Big Brother will find you. Big Brother is not just the government. Most consumer "spying" comes from subpoenas and requests from non-terrorist-related federal, state, local agency requests and non-governmental private litigation and discovery. Simply put, a subpoena issued by a court in support of private litigation and discovery may have the same impact on an individual as the full force of the NSA. What information is typically requested from a company by say a plaintiff's lawyer during some discovery phase? Well, it's everything. In fact, it's generally a fishing expedition for every log file, every uploaded video, photo, chat session and anything else they can get their hands on.

Note: For lots more from major media sources on the continuing development of a global society under Big Brother's constant gaze, click here.


Pope Urges Forming New World Economic Order to Work for the ‘Common Good’
2009-07-08, New York Times
http://www.nytimes.com/2009/07/08/world/europe/08pope.html?partner=rss&emc=rs...

Pope Benedict XVI [has] called for a radical rethinking of the global economy, criticizing a growing divide between rich and poor and urging the establishment of a “true world political authority” to oversee the economy and work for the “common good.” He criticized the current economic system, “where the pernicious effects of sin are evident,” and urged financiers in particular to “rediscover the genuinely ethical foundation of their activity.” He also called for “greater social responsibility” on the part of business. “Once profit becomes the exclusive goal, if it is produced by improper means and without the common good as its ultimate end, it risks destroying wealth and creating poverty,” Benedict wrote in his new encyclical, which the Vatican released on [July 7]. More than two years in the making, “Caritas in Veritate,” or “Charity in Truth,” is Benedict’s third encyclical since he became pope in 2005. Filled with terms like “globalization,” “market economy,” “outsourcing,” “labor unions” and “alternative energy,” it is not surprising that the Italian media reported that the Vatican was having difficulty translating the 144-page document into Latin. In many ways, the document is a puzzling cross between an anti-globalization tract and a government white paper, another signal that the Vatican does not comfortably fit into traditional political categories of right and left. Benedict also called for a reform of the United Nations so there could be a unified “global political body” that allowed the less powerful of the earth to have a voice, and he called on rich nations to help less fortunate ones.


Inventory Uncovers 9,200 More Pathogens
2009-06-18, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2009/06/17/AR20090617032...

An inventory of potentially deadly pathogens at Fort Detrick's infectious disease laboratory found more than 9,000 vials that had not been accounted for, Army officials said yesterday, raising concerns that officials wouldn't know whether dangerous toxins were missing. After four months of searching about 335 freezers and refrigerators at the U.S. Army Medical Research Institute of Infectious Diseases in Frederick, investigators found 9,220 samples that hadn't been included in a database of about 66,000 items listed as of February, said Col. Mark Kortepeter, the institute's deputy commander. The vials contained some dangerous pathogens, among them the Ebola virus, anthrax bacteria and botulinum toxin, and less lethal agents such as Venezuelan equine encephalitis virus and the bacterium that causes tularemia. Most of them, forgotten inside freezer drawers, hadn't been used in years or even decades. Officials said some serum samples from hemorrhagic fever patients dated to the Korean War. The overstock and the previous inaccuracy of the database raised the possibility that someone could have taken a sample outside the lab with no way for officials to know something was missing. The institute has been under pressure to tighten security in the wake of the 2001 anthrax attacks, which killed five people and sickened 17. FBI investigators say they think the anthrax strain used in the attacks originated at the Army lab, and its prime suspect, Bruce E. Ivins, researched anthrax there. Ivins committed suicide last year during an investigation into his activities.

Note: Fort Detrick is the home of the government lab which is suspected to be involved with the creation of many previously unknown lethal viruses and germs. For lots more, see the excellent work of Dr. Leonard Horowitz at this link and this one.


The Business of Intelligence Gathering
2008-06-15, New York Times
http://www.nytimes.com/2008/06/15/business/15shelf.html?partner=rssuserland&e...

America is ruled by an “intelligence-industrial complex” whose allegiance is not to the taxpaying public but to a cabal of private-sector contractors. That is the central thesis of Spies for Hire: The Secret World of Intelligence Outsourcing by Tim Shorrock, ... an investigative journalist. His book [provides a] disturbing overview of the intelligence community, also known as “the I.C.” Mr. Shorrock says our government is outsourcing 70 percent of its intelligence budget, or more than $42 billion a year, to a “secret army” of corporate vendors. Because of accelerated privatization efforts after 9/11, these companies are participating in covert operations and intelligence-gathering activities that were considered “inherently governmental” functions reserved for agencies like the Central Intelligence Agency, he says. Some of the book’s most intriguing assertions concern the permeating influence of the consulting firm Booz Allen Hamilton. In 2006, Mr. Shorrock reports, Booz Allen amassed $3.7 billion in revenue, much of which came from classified government contracts exempt from public oversight. Among its more than 18,000 employees are R. James Woolsey, the former C.I.A. director, and Joan Dempsey, a former longtime United States intelligence official who declared in a 2004 speech, “I like to refer to Booz Allen as the shadow I.C.” The “revolving door” between Booz Allen and the I.C. is personified by Mike McConnell, who joined the firm after serving as head of the National Security Agency under President Bill Clinton, only to return as director of national intelligence under President Bush.

Note: For revealing reports on government corruption from reliable sources, click here.


State Department Use of Contractors Leaps in 4 Years
2007-10-19, New York Times
http://www.nytimes.com/2007/10/24/washington/24contractor.html?ex=1350878400&...

Over the past four years, the amount of money the State Department pays to private security and law enforcement contractors has soared to nearly $4 billion a year from $1 billion, ... but ... the department had added few new officials to oversee the contracts. Auditors and outside exerts say the results have been vast cost overruns, poor contract performance and, in some cases, violence that has so far gone unpunished. A vast majority of the money goes to companies like DynCorp International and Blackwater [Worldwide] to protect diplomats overseas, train foreign police forces and assist in drug eradication programs. There are only 17 contract compliance officers at the State Department’s management bureau overseeing spending of the billions of dollars on these programs, officials said. Two new reports have delivered harsh judgments about the State Department’s handling of the contracts, including the protective services contract that employs Blackwater guards whose involvement in a Sept. 16 shooting in Baghdad has raised questions about their role in guarding American diplomats in Iraq. The ballooning budget for outside contracts at the State Department is emblematic of a broader trend, contracting experts say. The Bush administration has doubled the amount of government money going to all types of contractors to $400 billion, creating a new and thriving class of post-9/11 corporations carrying out delicate work for the government. But the number of government employees issuing, managing and auditing contracts has barely grown. “That’s a criticism that’s true of not just State but of almost every agency,” said Jody Freeman, an expert on administrative law at Harvard Law School.


An Opportunity for Wall St. in China’s Surveillance Boom
2007-09-07, New York Times
http://www.nytimes.com/2007/09/11/business/worldbusiness/11security.html?ex=1...

Li Runsen, the powerful technology director of China’s ministry of public security, is best known for leading Project Golden Shield, China’s intensive effort to strengthen police control over the Internet. But last month Mr. Li took an additional title: director for China Security and Surveillance Technology, a fast-growing company that installs and sometimes operates surveillance systems for Chinese police agencies, jails and banks, among other customers. The company has just been approved for a listing on the New York Stock Exchange. The company’s listing and Mr. Li’s membership on its board are just the latest signs of ever-closer ties among Wall Street, surveillance companies and the Chinese government’s security apparatus. Wall Street analysts now follow the growth of companies that install surveillance systems providing Chinese police stations with 24-hour video feeds from nearby Internet cafes. Hedge fund money from the United States has paid for the development of not just better video cameras, but face-recognition software and even newer behavior-recognition software designed to spot the beginnings of a street protest and notify police. Executives of Chinese surveillance companies say they are helping their government reduce street crime, preserve social stability and prevent terrorism. They note that London has a more sophisticated surveillance system, although the Chinese system will soon be far more extensive. Wall Street executives also defend the industry as necessary to keep the peace at a time of rapid change in China. They point out that New York has begun experimenting with surveillance cameras in Lower Manhattan and other areas of the city.


Spy Satellites Turned on the U.S.
2007-09-06, ABC News
http://abcnews.go.com/TheLaw/story?id=3567635

Traditionally, powerful spy satellites have been used to search for strategic threats overseas. But now the Department of Homeland Security has developed a new office to use the satellites to [monitor the US itself]. [DHS] officials ... faced extensive criticism [in Congress] about the privacy and civil liberty concerns of the new office, called the National Applications Office. [House Homeland Security] Committee members expressed concern about abuse of the satellite imagery, charging that Homeland Security had not informed the oversight committee about the program. "What's most disturbing is learning about it from The Wall Street Journal," said Committee Chairman Rep. Bennie Thompson, D-Miss. The lawmakers also expressed concern about using military capabilities for U.S. law enforcement and Homeland Security operations, potentially a violation of the Posse Comitatus Act, which bars the military from serving as a law enforcement body within the United States. Committee members said that in addition to not being informed about the National Applications Office program, they had not yet been provided with documents defining the limits and legal guidance about the program. [They] sent a letter to Homeland Security saying, "We are so concerned that ... we are calling for a moratorium on the program. Today's testimony made clear that there is effectively no legal framework governing the domestic use of satellite imagery for the various purposes envisioned by the department."


Bush administration defends spy law
2007-08-07, Los Angeles Times
http://www.latimes.com/news/la-na-intel7aug07,0,1631228.story

The Bush administration rushed to defend new espionage legislation Monday amid growing concern that the changes could lead to increased spying by U.S. intelligence agencies on American citizens. But officials declined to provide details about how the new capabilities might be used by the National Security Agency and other spy services. And in many cases, they could point only to internal monitoring mechanisms to prevent abuse of the new rules that appear to give the government greater authority to tap into the traffic flowing across U.S. telecommunications networks. Officials rejected assertions that the new capabilities would enable the government to cast electronic "drift nets" that might ensnare U.S. citizens [and] that the new legislation would amount to the expansion of a controversial — and critics contend unconstitutional — warrantless wiretapping program that President Bush authorized after the 9/11 attacks. Intelligence experts said there were an array of provisions in the new legislation that appeared to make it possible for the government to engage in intelligence-collection activities that the Bush administration officials were discounting. "They are trying to shift the terms of the debate to their intentions and away from the meaning of the new law," said Steven Aftergood, an intelligence policy analyst at the Federation of American Scientists. "The new law gives them authority to do far more than simply surveil foreign communications abroad," he said. "It expands the surveillance program beyond terrorism to encompass foreign intelligence. It permits the monitoring of communications of a U.S. person as long as he or she is not the primary target. And it effectively removes judicial supervision of the surveillance process."


In Bush we trust - or else
2007-08-05, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/08/05/EDJFRB8AF1.DTL

President Bush's latest affront to the U.S. Constitution [is] in plain view on the White House Web site: "Executive Order: Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq." This far-reaching order ... is a frontal assault on the Fifth Amendment, which decrees that the government cannot seize an individual's property without due process. [The order asserts] the authority to freeze the American assets of anyone who directly or indirectly assists someone who poses "a significant risk" [to] the "peace and stability" of [Iraq] or the reconstruction effort. "On its face, this is the greatest encroachment on civil liberties since the internment of Japanese Americans in World War II," said Bruce Fein, a constitutional lawyer who was a deputy attorney general in the Reagan administration. Fein said the sanctions against suspected violators would amount to "a financial death penalty. King George III really would have been jealous of this power." The executive order not only calls for the freezing of assets of anyone who directly or indirectly [opposes US policy in Iraq,] it prohibits anyone else from providing "funds, goods or services" to a blacklisted individual. In other words, a friend or relative could have his or her assets seized for trying to help someone whose bank account is suddenly frozen. An attorney who offered legal help could risk losing everything he or she owned. Then again, there's not much need for lawyers in the world of this executive order. The blacklist would be drawn up by the "secretary of treasury, in consultation with the secretary of state and the secretary of defense." The Fifth Amendment was written for good reason: It's dangerous to give the government unchecked authority to seize private property without judicial review.


We are moving ever closer to the era of mind control
2006-02-06, The Guardian (one of the UK's leading newspapers)
http://www.guardian.co.uk/science/story/0,,1702694,00.html

There is increasing military interest in the development of techniques that can survey and possibly manipulate the mental processes of potential enemies, or enhance the potential of one's own troops. There is nothing new about such an interest. In the US, it stretches back at least half a century. Impressed by claims that the Soviet Union was developing psychological warfare, the CIA and the Defence Advanced Projects Agency (Darpa) began their own programmes. Early experiments included the clandestine feeding of LSD to their own operatives and attempts at 'brain-washing'. By the 1960s, Darpa, along with the US Navy, was funding almost all US research into 'artificial intelligence', in order to develop methods and technologies for the 'automated battlefield' and the 'intelligent soldier'. Contracts were let and patents taken out on techniques aimed at recording signals from the brains of enemy personnel at a distance, in order to 'read their minds'. These efforts have burgeoned in the aftermath of the so-called 'war on terror'. The step beyond reading thoughts is to attempt to control them directly. A new technique - transcranial magnetic stimulation (TMS) - has begun to generate interest. This focuses an intense magnetic field on specific brain regions, and has been shown to affect thoughts, perceptions and behaviour.

Note: These technologies are far more developed than this article suggests. For reliable, verifiable information on these little-known "non-lethal" weapons: http://www.WantToKnow.info/mindcontrol10pg#nonlethal


Spain colluded in NSA spying on its citizens, Spanish newspaper reports
2013-10-30, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/oct/30/spain-colluded-nsa-spying-citize...

The widespread surveillance of Spanish citizens by the US National Security Agency, which caused outrage when it was reported this week, was the product of a collaboration with Spain's intelligence services, according to one Spanish newspaper. Spanish agents not only knew about the work of the NSA but also facilitated it, El Mundo reports. An NSA document entitled "Sharing computer network operations cryptologic information with foreign partners" reportedly shows how the US relies on the collaboration of many countries to give it access to intelligence information, including electronic metadata. According to the document seen by El Mundo, the US classifies cooperation with various countries on four different levels. In the first group – "Comprehensive Cooperation" – are the UK, Australia, Canada and New Zealand. The second group – "Focused Cooperation" – of which Spain is a member, includes 19 countries, all of them European, apart from Japan and South Korea. The third group – "Limited cooperation" – consists of countries such as France, Israel, India and Pakistan; while the fourth – "Exceptional Cooperation" – is made up of countries that the US considers to be hostile to its interests. The NSA documents [suggest] the Spanish intelligence services were working hand in hand with the NSA, as were other foreign agencies. But if there was any doubt as to who held the upper hand, the NSA documents make clear that any collaboration was always to serve the needs of protecting American interests.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Administration Set to Use New Spy Program in U.S.
2008-04-12, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/04/11/AR20080411036...

The Bush administration said yesterday that it plans to start using the nation's most advanced spy technology for domestic purposes soon, rebuffing challenges by House Democrats over the idea's legal authority. Homeland Security Secretary Michael Chertoff said his department will activate his department's new domestic satellite surveillance office in stages, starting as soon as possible. Sophisticated overhead sensor data will be used for law enforcement once privacy and civil rights concerns are resolved, he said. His statements marked a fresh determination to operate the department's new National Applications Office. But Congress delayed launch of the new office last October. Critics cited its potential to expand the role of military assets in domestic law enforcement, to turn new or as-yet-undeveloped technologies against Americans without adequate public debate, and to divert the existing civilian and scientific focus of some satellite work to security uses. Democrats say Chertoff has not spelled out what federal laws govern the NAO, whose funding and size are classified. Congress barred Homeland Security from funding the office until its investigators could review the office's operating procedures and safeguards. The department submitted answers on Thursday, but some lawmakers promptly said the response was inadequate. [Rep. Bennie G. Thompson (D-Miss.), chairman of the House Homeland Security Committee] said, "We still don't know whether the NAO will pass constitutional muster since no legal framework has been provided."

Note: For many more revealing stories on threats to civil liberties, click here.


Spies' Battleground Turns Virtual
2008-02-06, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/05/AR20080205031...

U.S. intelligence officials are [now claiming] that popular Internet services that enable computer users to adopt cartoon-like personas in three-dimensional online spaces also are creating security vulnerabilities by opening novel ways ... to move money, organize and conduct corporate espionage. Over the last few years, "virtual worlds" such as Second Life and other role-playing games have become home to millions of computer-generated personas known as avatars. By directing their avatars, people can take on alternate personalities, socialize, explore and earn and spend money across uncharted online landscapes. Nascent economies have sprung to life in these 3-D worlds, complete with currency, banks and shopping malls. Corporations and government agencies have opened animated virtual offices, and a growing number of organizations hold meetings where avatars gather and converse in newly minted conference centers. Intelligence officials ... say they're convinced that the qualities that many computer users find so attractive about virtual worlds -- including anonymity, global access and the expanded ability to make financial transfers outside normal channels -- have turned them into seedbeds for transnational threats. The government's growing concern seems likely to make virtual worlds the next battlefield in the struggle over the proper limits on the government's quest to [expand] data collection and analysis and the surveillance of commercial computer systems. Virtual worlds could also become an actual battlefield. The intelligence community has begun contemplating how to use Second Life and other such communities as platforms for cyber weapons.


China Enacting a High-Tech Plan to Track People
2007-08-12, New York Times
http://www.nytimes.com/2007/08/12/business/worldbusiness/12security.html?ex=1...

At least 20,000 police surveillance cameras are being installed along streets here [in Shenzhen] in southern China and will soon be guided by sophisticated computer software from an American-financed company to recognize automatically the faces of police suspects and detect unusual activity. Starting this month in a port neighborhood and then spreading across Shenzhen, a city of 12.4 million people, residency cards fitted with powerful computer chips programmed by the same company will be issued to most citizens. Data on the chip will include not just the citizen’s name and address but also work history, educational background, religion, ethnicity, police record, medical insurance status and landlord’s phone number. Even personal reproductive history will be included, for enforcement of China’s controversial “one child” policy. Plans are being studied to add credit histories, subway travel payments and small purchases charged to the card. Security experts describe China’s plans as the world’s largest effort to meld cutting-edge computer technology with police work to track the activities of a population. But they say the technology can be used to violate civil rights. “We have a very good relationship with U.S. companies like I.B.M., Cisco, H.P., Dell,” said Robin Huang, the chief operating officer of China Public Security. “All of these U.S. companies work with us to build our system together.” The role of American companies in helping Chinese security forces has periodically been controversial in the United States. Executives from Yahoo, Google, Microsoft and Cisco Systems testified in February 2006 at a Congressional hearing called to review whether they had deliberately designed their systems to help the Chinese state muzzle dissidents on the Internet; they denied having done so.


FBI Finds It Frequently Overstepped in Collecting Data
2007-06-14, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/06/13/AR20070613024...

An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.


Tech Watch: Forecasting Pain
2006-12-00, Popular Mechanics
http://www.popularmechanics.com/technology/military_law/4202262.html

No longer a gleam in the Pentagon's eye, ray guns — or radiofrequency (RF) weapons, to be exact — officially have arrived. As troops are increasingly forced to serve as an ad hoc police force, nonlethal weapons have become a priority for the military. The Department of Defense is currently testing the Active Denial System (ADS), which fires pain-inducing beams of 95-GHz radio waves, for deployment on ground vehicles. This surface heating doesn't actually burn the target, but is painful enough to force a retreat. While the military continues to investigate the safety of RF-based weapons, defense contractor Raytheon has released Silent Guardian, a stripped-down version of the ADS, marketed to law enforcement and security providers as well as to the military. Using a joystick and a targeting screen, operators can induce pain from over 250 yards away, as opposed to more than 500 yards with the ADS. Unlike its longer-ranged counterpart, Silent Guardian is available now. As futuristic — and frightening — as the ADS "pain ray" sounds, the Air Force Office of Scientific Research is funding an even more ambitious use of RF energy. Researchers at the University of Nevada are investigating the feasibility of a method that would immobilize targets without causing pain. Rather than heating the subject's skin, this approach would use microwaves at 0.75 to 6 GHz to affect skeletal muscle contractions. This project is still in the beginning stages. The ADS, on the other hand, is already a painful reality.

Note: For lots more concerning information on non-lethal weapons, click here.


Kanata hotel hosts high-level power group
2006-06-09, CBC News (Canada's equivalent of PBS)
http://www.cbc.ca/ottawa/story/ot-bilderberg20060609.html

A serene setting in Ottawa's west-end Kanata suburb has been transformed into a four-day festival of black suits, black limousines, burly security guards and a bevy of conspiracy theories. The security outside the Brookstreet Hotel is much tighter than it is on Parliament Hill. Inside, the CBC was told, all guests were asked to check out at 8:30 a.m. on Thursday. The hotel appears to be hosting the annual meeting of one of the world's most secretive and powerful societies: the Bilderberg group. But, of course, no one will admit it. People who follow the Bilderberg group say it persuaded Europe to adopt a common currency, and, among other things, persuaded Bill Clinton to support the North American Free Trade Agreement. "David Rockefeller is going to be here. Henry Kissinger is going to be here. Wolfowitz, the president of the World Bank, is going to be here" says Daniel Estulin, who has written a book about the Bilderberg group. Jim Tucker, who has followed the Bilderberg group for the last 30 years, told CBC News he is troubled by all the secrecy. "Officials of the United States government [should not] have a private meeting with private citizens about public policy," Tucker says.


In the chaos of Iraq, one project is on target: a giant US embassy
2006-05-03, London Times
http://www.timesonline.co.uk/article/0,,3-2162249,00.html

The question puzzles and enrages a city: how is it that the Americans cannot keep the electricity running in Baghdad for more than a couple of hours a day, yet still manage to build themselves the biggest embassy on Earth? Irritation grows as residents deprived of air-conditioning and running water three years after the US-led invasion watch the massive US Embassy they call 'George W's palace' rising from the banks of the Tigris. In the pavement cafés, people moan that the structure is bigger than anything Saddam Hussein built. Officially, the design of the compound is supposed to be a secret, but you cannot hide the giant construction cranes and the concrete contours of the 21 buildings that are taking shape. Looming over the skyline, the embassy has the distinction of being the only big US building project in Iraq that is on time and within budget. In a week when Washington revealed a startling list of missed deadlines and overspending on building projects, Congress was told that the bill for the embassy was $592 million (Ł312 million).

Note: For the deeper reasons behind this war, don't miss http://www.WantToKnow.info/warcoverup


Military Plays Up Role of Zarqawi
2006-04-10, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2006/04/09/AR20060409008...

[April 10, 2006] The U.S. military is conducting a propaganda campaign to magnify the role of the leader of al-Qaeda in Iraq, according to internal military documents. The effort has raised his profile in a way that some military intelligence officials believe may have...helped the Bush administration tie the war to...Sept. 11. Although Zarqawi and other foreign insurgents in Iraq have conducted deadly bombing attacks, they remain "a very small part of the actual numbers," [said] Col. Derek Harvey, who...was one of the top officers handling Iraq intelligence issues on the staff of the Joint Chiefs of Staff. "Our own focus on Zarqawi has enlarged his caricature...made him more important than he really is." One briefing slide about U.S. "strategic communications" in Iraq, prepared for Army Gen. George W. Casey Jr., the top U.S. commander in Iraq, describes the "home audience" as one of six major targets of the American side of the war. There were direct military efforts to use the U.S. media to affect views of the war. One slide in the same briefing, for example, noted that a "selective leak" about Zarqawi was made to Dexter Filkins, a New York Times reporter. Filkins's resulting article...ran on the Times front page. U.S. propaganda efforts in Iraq in 2004 cost $24 million. "Villainize Zarqawi" one U.S. military briefing from 2004 stated. It listed..."PSYOP," the U.S. military term for propaganda work. One internal briefing, produced by the U.S. military headquarters in Iraq, said..."The Zarqawi PSYOP program is the most successful information campaign to date."


Experts blame flooding on faulty levees
2005-09-21, MSNBC News/Washington Post
http://msnbc.msn.com/id/9419053

Louisiana's top hurricane experts have rejected the official explanations for the floodwall collapses that inundated much of New Orleans, concluding that Hurricane Katrina's storm surges were much smaller than authorities have suggested and that the city's flood-protection system should have kept most of the city dry. With the help of complex computer models and stark visual evidence, scientists and engineers at Louisiana State University's Hurricane Center have concluded that Katrina's surges did not come close to overtopping those barriers. That would make faulty design, inadequate construction or some combination of the two the likely cause of the breaching of the floodwalls. Ivor van Heerden, the Hurricane Center's deputy director, said the real scandal of Katrina is the "catastrophic structural failure" of barriers that should have handled the hurricane with relative ease. "We are absolutely convinced that those floodwalls were never overtopped," said van Heerden. On a tour Tuesday, researchers...showed a "debris line" that indicates the top height of Katrina's waves was at least four feet below the crest of Lake Pontchartrain's levees. They contended that the pattern of destruction behind the breaches was consistent with a localized "pressure burst," rather than widespread overtopping. Former representative Bob Livingston, (R-La.)...noted that the earthen levees along Lake Pontchartrain had all held, while concrete floodwalls had failed. He was especially concerned about the 17th Street barrier, saying it "shouldn't have broken." If Katrina did not exceed the design capacity of the New Orleans levees, the federal government may bear ultimate responsibility for this disaster.


Emotional Rather blasts 'new journalism order'
2005-09-19, ABC News
http://abcnews.go.com/Entertainment/wireStory?id=1141521

Former CBS News anchor Dan Rather said Monday that there is a climate of fear running through newsrooms stronger than he has ever seen in his more than four-decade career. Rather famously tangled with President Nixon and his aides during the Watergate years while Rather was a hard-charging White House correspondent. He said that in the intervening years, politicians "of every persuasion" had gotten better at applying pressure on the conglomerates that own the broadcast networks. He called it a "new journalism order." He said this pressure -- along with the "dumbed-down, tarted-up" coverage, the advent of 24-hour cable competition and the chase for ratings and demographics -- has taken its toll on the news business. "All of this creates a bigger atmosphere of fear in newsrooms," Rather said.


UK film: terror fears exaggerated
2005-05-14, CNN/Reuters
http://www.cnn.com/2005/SHOWBIZ/Movies/05/14/film.cannes.terrorfears.reut

CANNES, France (Reuters) -- A British documentary arguing U.S. neo-conservatives have exaggerated the terror threat is set to rock the Cannes Film Festival on Saturday, the way "Fahrenheit 9/11" stirred emotions here a year ago. At a screening late on Friday ahead of its gala on Saturday, "The Power of Nightmares" by filmmaker and senior BBC producer Adam Curtis kept an audience of journalists and film buyers glued to their seats and taking notes for a full 2-1/2 hours. The film, a non-competition entry, argues that the fear of terrorism has come to pervade politics in the United States and Britain even though much of that angst is based on carefully nurtured illusions.

Note: To view this excellent film online free, click here.


Why We Fight
2005-03-23, BBC (Film Review)
http://www.bbc.co.uk/bbcfour/documentaries/storyville/why-we-fight.shtml

This award-winning film provides an inside look at the anatomy of the American war machine. Why We Fight [was originally] the title of a series of propaganda films that Frank Capra began making in 1942, with the aim of encouraging the American war effort against Nazism. Director Eugene Jarecki (The Trials of Henry Kissinger) has used the films as a commentary on the contemporary obsession of the American elite with military power. He also harks back to a speech by President Eisenhower, who, just before he left office, referred to the "military-industrial complex". Eisenhower was worried that too much intelligence, and too much business acumen in America, had become focussed on the production of unnecessary weapons systems. Since Eisenhower's time, everything has become much worse, as Eugene Jarecki describes it. The war in Iraq was made possible by a new range of weapons systems: a bomb called the "bunker buster" was dropped by stealth bombers on the first night of the conflict. Is American foreign policy dominated by the idea of military supremacy? Has the military become too important in American life? Jarecki's shrewd and intelligent polemic would seem to give an affirmative answer to each of these questions.

Note: To watch this great film (which won the Grand Jury Prize at the Sundance Film Festival) free online, click here or here. For powerful information on cover-ups around war, click here.


Encouraging Words of Regret From Dean Baquet
2014-06-06, The Intercept
https://firstlook.org/theintercept/2014/06/06/encouraging-words-dean-baquet-w...

NPR’s David Folkenflik has a revealing new look at ... one of the most important journalistic stories of the last decade: The New York Times‘ 2004 decision ... to suppress for 15 months (through Bush’s re-election) its reporters’ discovery that the NSA was illegally eavesdropping on Americans without warrants. This episode was one significant reason Edward Snowden purposely excluded the Times from his massive trove of documents. In an interview with Folkenflik, the paper’s new executive editor, Dean Baquet, describes the paper’s exclusion from the Snowden story as “really painful.” But ... Baquet has his own checkered history in suppressing plainly newsworthy stories at the government’s request, including a particularly inexcusable 2007 decision, when he was the managing editor of The Los Angeles Times, to kill a story based on AT&T whistleblower Mark Klein’s revelations that the NSA had built secret rooms at AT&T to siphon massive amounts of domestic telephone traffic. In his NPR interview, Baquet insists that he has had a serious change of heart on such questions as a result of the last year of NSA revelations: "[Baquet] says the experience has proved that news executives are often unduly deferential to seemingly authoritative warnings unaccompanied by hard evidence." Dean Baquet’s epiphany about the U.S. government and the American media ... is long overdue, but better late than never. Let us hope that it signals an actual change in behavior.

Note: For more on this, see concise summaries of deeply revealing media corruption news articles from reliable major media sources.


Keep the focus on facts about NSA spying
2014-01-16, San Francisco Chronicle (SF's leading newspaper)
http://www.sfgate.com/opinion/article/Keep-the-focus-on-facts-about-NSA-spyin...

To have a genuinely constructive debate, data must be compiled, evidence must be amassed and verifiable truths must be presented. This truism is particularly significant when it comes to debates about security and liberty. Without facts, we get the counterproductive discourse we are being treated to right now - the one hijacked by National Security Administration defenders throwing temper tantrums, tossing out fear-mongering platitudes and trying to prevent any scrutiny of the agency. Tune into a national news program and you inevitably will hear pundits who have spent the last decade mindlessly cheering on wars and warrantless wiretapping now echoing the talking points emanating from surveillance-state apparatchiks like Reps. Mike Rogers, R-Mich., and Dutch Ruppersberger, D-Md. This week, these two lawmakers, who head the House Intelligence Committee, summarized all the bluster in a press release that should be enshrined for posterity. In an attempt to defend the NSA, the bipartisan duo breathlessly claimed that whistle-blower Edward Snowden ended up "endangering each and every American" by exposing the government's mass surveillance (i.e., metadata) programs. They indicted Snowden's patriotism and said his disclosures of the NSA's unlawful and unconstitutional programs "aligned him with our enemy." But the facts now leaking out of the government's national security apparatus are doing the opposite. They are debunking - rather than confirming - the NSA defenders' platitudes.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Report: Revolving Door Spins Quickly Between Congress, Wall Street
2010-06-03, Center for Responsive Politics/Public Citizen
http://www.opensecrets.org/news/2010/06/report-revolving-door-spins-quickly.html

Organizations in the financial services sector have deployed at least 1,447 former federal employees to lobby Congress and federal agencies since the beginning of 2009, according to a joint analysis of federal disclosure records and other data released today by Public Citizen and the Center for Responsive Politics. This small army of registered financial services sector lobbyists includes at least 73 former members of Congress, of whom 17 served on the banking committees of either the U.S. House of Representatives or the Senate. At least 66 industry lobbyists worked for these committees as staffers, while 82 additional lobbyists once worked for congressional members who currently serve on these key committees. Further, at least 42 financial services lobbyists formerly served in some capacity in the U.S. Treasury Department. At least seven served in the Office of the Comptroller of the Currency, including two former comptrollers. “Wall Street hires former members of Congress and their staff for a reason," said David Arkush, director of Public Citizen’s Congress Watch division. "These people are influential because they have personal relationships with current members and staff. It’s hard to say no to your friends."

Note: To read the full report, click here. The nonprofit, nonpartisan Center for Responsive Politics is the nation's premier research group tracking money in federal politics and its effect on elections and public policy. Public Citizen is a national, nonprofit consumer advocacy organization based in Washington, D.C.


Loosening of F.B.I. Rules Stirs Privacy Concerns
2009-10-29, New York Times
http://www.nytimes.com/2009/10/29/us/29manual.html

After a Somali-American teenager from Minneapolis committed a suicide bombing in Africa in October 2008, the Federal Bureau of Investigation began investigating whether a Somali Islamist group had recruited him on United States soil. Instead of collecting information only on people about whom they had a tip or links to the teenager, agents fanned out to scrutinize Somali communities. The operation unfolded as the Bush administration was relaxing some domestic intelligence-gathering rules. The F.B.I.’s interpretation of those rules was recently made public when it released, in response to a Freedom of Information lawsuit, its “Domestic Investigations and Operations Guide.” The disclosure of the manual has opened the widest window yet onto how agents have been given greater power in the post-Sept. 11 era. But the manual’s details have alarmed privacy advocates. “It raises fundamental questions about whether a domestic intelligence agency can protect civil liberties if they feel they have a right to collect broad personal information about people they don’t even suspect of wrongdoing,” said Mike German, a former F.B.I. agent who now works for the American Civil Liberties Union. The manual authorizes agents to open an “assessment” to “proactively” seek information about whether people or organizations are involved in national security threats. Assessments permit agents to use potentially intrusive techniques, like sending confidential informants to infiltrate organizations and following and photographing targets in public. When selecting targets, agents are permitted to consider political speech or religion as one criterion.

Note: To read the FBI's recently-released and redacted new "Domestic Investigations and Operation Guide", described by the New York Times as giving "F.B.I. agents the most power in national security matters that they have had since the post-Watergate era," click here.


Review: 'New World Order' on Independent Film Channel
2009-05-26, Los Angeles Times
http://www.latimes.com/entertainment/news/la-et-new-world-order26-2009may26,0...

"New World Order," which premieres today on the Independent Film Channel, is a film about ... volunteers in an "information war" who see ... that 9/11 was an "inside job," that the military-industrial complex killed Kennedy, and that an international "power elite" is plotting to enslave us all, excepting for those it will kill outright. They are hard to pigeonhole politically, these conspiracy adepts, trusting neither the "socialist Democrats" nor the "fascist Republicans" -- Ron Paul seems to be their man, if anyone is -- yet sounding as often like '60s leftist radicals as right-wing militiamen. They take the 1st Amendment as seriously as any card-carrying member of the ACLU, styling themselves muckrakers and speakers of truth to power, often through a bullhorn. The man with the biggest bullhorn is Alex Jones, an Austin, Texas-based syndicated radio host ... and the point through which all the strands connect in this unexpectedly affecting, nonjudgmental documentary by Luke Meyer and Andrew Neel. Much of what Jones and his fellows and followers believe is, in a general way, hardly controversial. But whether 9/11 was a plot to bring on world government, or whether the government you already have has painted a red or blue dot on your mailbox to indicate whether you will be shot immediately or merely be sent to the "FEMA camps" when the American Armageddon arrives, well, that's a pale horse of a different color. (Still, you'll want to check your mailbox now.) "This is more important than how much Britney Spears' hair sold for on EBay, 'Dancing With the Stars' or who's gonna be America's next idol," says one believer. "People think this is a joke. We're not a joke."

Note: The disparaging tone of this review of the documentary is typical of mainstream media treatment of 9/11 truth activity, but it makes clear that the film itself does not share this attitude.


Warning over 'surveillance state'
2009-02-06, BBC News
http://news.bbc.co.uk/2/hi/uk_news/politics/7872425.stm

Electronic surveillance and collection of personal data are "pervasive" in British society and threaten to undermine democracy, peers [in the House of Lords] have warned. CCTV cameras and the DNA database were two examples of threats to privacy, the Lords constitution committee said. It called for compensation for people subject to illegal surveillance. Civil liberties campaigners have warned about the risks of a "surveillance society" in which the state acquires ever-greater powers to track people's movements and retain personal data. In its report, the Lords constitution committee said growth in surveillance by both the state and the private sector risked threatening people's right to privacy, which it said was "an essential pre-requisite to the exercise of individual freedom". People were often unaware of the scale of personal information held and exchanged by public bodies, it said. "There can be no justification for this gradual but incessant creep towards every detail about us being recorded and pored over by the state," committee chairman and Tory peer Lord Goodlad said. "The huge rise in surveillance and data collection by the state and other organisations risks undermining the long-standing tradition of privacy and individual freedom which are vital for democracy," Lord Goodlad added. Human rights campaigners Liberty welcomed the report.

Note: For key reports from major media sources on growing threats to privacy from governments and corporations, click here.


Let's face it, soon Big Brother will have no trouble recognising you
2009-01-13, Times of London
http://www.timesonline.co.uk/tol/comment/columnists/guest_contributors/articl...

This is the year when automated face-recognition finally goes mainstream, and it's about time we considered its social and political implications. Researchers are developing sharply accurate scanners that monitor faces in 3D and software that analyses skin texture to turn tiny wrinkles, blemishes and spots into a numerical formula. The strongest face-recognition algorithms are now considered more accurate than most humans - and already the Home Office and the Association of Chief Police Officers have held discussions about the possibility of linking such systems with automatic car-numberplate recognition and public-transport databases. Join everything together via the internet, and voilŕ - the nation's population, down to the individual Times reader, can be conveniently and automatically monitored in real time. So let's understand this: governments and police are planning to implement increasingly accurate surveillance technologies that are unnoticeable, cheap, pervasive, ubiquitous, and searchable in real time. And private businesses, from bars to workplaces, will also operate such systems, whose data trail may well be sold on or leaked to third parties - let's say, insurance companies that have an interest in knowing about your unhealthy lifestyle, or your ex-spouse who wants evidence that you can afford higher maintenance payments.

Note: For disturbing reports on threats to privacy from major media sources, click here.


Travelers' Laptops May Be Detained At Border: No Suspicion Required
2008-08-01, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/08/01/AR20080801030...

Federal agents may take a traveler's laptop computer or other electronic device to an off-site location for an unspecified period of time without any suspicion of wrongdoing, as part of border search policies the Department of Homeland Security recently disclosed. Also, officials may share copies of the laptop's contents with other agencies and private entities for language translation, data decryption or other reasons, according to the policies, dated July 16 and issued by two DHS agencies, U.S. Customs and Border Protection and U.S. Immigration and Customs Enforcement. "The policies . . . are truly alarming," said Sen. Russell Feingold (D-Wis.), who is probing the government's border search practices. He said he intends to introduce legislation soon that would require reasonable suspicion for border searches, as well as prohibit profiling on race, religion or national origin. DHS officials said the newly disclosed policies ... apply to anyone entering the country, including U.S. citizens. Civil liberties and business travel groups have pressed the government to disclose its procedures as an increasing number of international travelers have reported that their laptops, cellphones and other digital devices had been taken -- for months, in at least one case -- and their contents examined. The policies cover "any device capable of storing information in digital or analog form," including hard drives, flash drives, cellphones, iPods, pagers, beepers, and video and audio tapes. They also cover "all papers and other written documentation," including books, pamphlets and "written materials commonly referred to as 'pocket trash' or 'pocket litter.' "

Note: For many reports from reliable, verifiable sources on threats to privacy, click here.


Microsoft seeks patent for office 'spy' software
2008-01-16, Times of London
http://technology.timesonline.co.uk/tol/news/tech_and_web/article3193480.ece

Microsoft is developing Big Brother-style software capable of remotely monitoring a worker’s productivity, physical wellbeing and competence. The Times has seen a patent application filed by the company for a computer system that links workers to their computers via wireless sensors that measure their metabolism. The system would allow managers to monitor employees’ performance by measuring their heart rate, body temperature, movement, facial expression and blood pressure. Unions said they fear that employees could be dismissed on the basis of a computer’s assessment of their physiological state. This is believed to be the first time a company has proposed developing such software for mainstream workplaces. Microsoft submitted a patent application in the US for a “unique monitoring system” that could link workers to their computers. Wireless sensors could read “heart rate, galvanic skin response, EMG, brain signals, respiration rate, body temperature, movement facial movements, facial expressions and blood pressure”, the application states. The system could also “automatically detect frustration or stress in the user”. Physical changes to an employee would be matched to an individual psychological profile based on a worker’s weight, age and health. If the system picked up an increase in heart rate or facial expressions suggestive of stress or frustration, it would tell management. Civil liberties groups and privacy lawyers strongly criticised the potential of the system for “taking the idea of monitoring people at work to a new level”.

Note: For revealing reports from major media sources on the increasing surveillance of all aspects of society by secret government and corporate programs, click here.


Concerns Raised on Wider Spying Under New Law
2007-08-19, New York Times
http://www.nytimes.com/2007/08/19/washington/19fisa.html?ex=1345176000&en=2e7...

Broad new surveillance powers approved by Congress this month could allow the Bush administration to conduct spy operations that go well beyond wiretapping to include — without court approval — certain types of physical searches on American soil and the collection of Americans’ business records. “This may give the administration even more authority than people thought,” said David Kris, a former senior Justice Department lawyer in the Bush and Clinton administrations. Several legal experts said that by redefining the meaning of “electronic surveillance,” the new law narrows the types of communications covered in the Foreign Intelligence Surveillance Act, known as FISA, by indirectly giving the government the power to use intelligence collection methods far beyond wiretapping that previously required court approval if conducted inside the United States. These new powers include the collection of business records, physical searches and so-called “trap and trace” operations, analyzing specific calling patterns. For instance, the legislation would allow the government, under certain circumstances, to demand the business records of an American in Chicago without a warrant if it asserts that the search concerns its surveillance of a person who is in Paris, experts said. Some civil rights advocates said they suspected that the administration made the language of the bill intentionally vague to allow it even broader discretion over wiretapping decisions. The end result ... is that the legislation may grant the government the right to collect a range of information on American citizens inside the United States without warrants, as long as the administration asserts that the spying concerns the monitoring of a person believed to be overseas.


Domestic Use of Spy Satellites To Widen
2007-08-16, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/08/15/AR20070815024...

The Bush administration has approved a plan to expand domestic access to some of the most powerful tools of 21st-century spycraft, giving law enforcement officials and others the ability to view data obtained from satellite and aircraft sensors that can see through cloud cover and even penetrate buildings and underground bunkers. A program approved by the Office of the Director of National Intelligence and the Department of Homeland Security will allow broader domestic use of secret overhead imagery beginning as early as this fall, with the expectation that state and local law enforcement officials will eventually be able to tap into technology once largely restricted to foreign surveillance. But the program ... quickly provoked opposition from civil liberties advocates, who said the government is crossing a well-established line against the use of military assets in domestic law enforcement. The administration's decision would provide domestic authorities with unprecedented access to high-resolution, real-time satellite photos. They could also have access to much more. Civil liberties groups quickly condemned the move, which Kate Martin, director of the Center for National Security Studies, ... likened to "Big Brother in the sky. They want to turn these enormous spy capabilities ... onto Americans. They are laying the bricks one at a time for a police state." Steven Aftergood, director of the Project on Government Secrecy for the Federation of American Scientists, said that ... oversight for the program was woefully inadequate. Enhanced access "shouldn't be adopted at all costs because it comes with risk to privacy and to the integrity of our political institutions," he said.


US doles out millions for street cameras
2007-08-12, Boston Globe
http://www.boston.com/news/nation/articles/2007/08/12/us_doles_out_millions_f...

The Department of Homeland Security is funneling millions of dollars to local governments nationwide for purchasing high-tech video camera networks, accelerating the rise of a "surveillance society" in which the sense of freedom that stems from being anonymous in public will be lost, privacy rights advocates warn. The department ... has doled out millions on surveillance cameras, transforming city streets and parks into places under constant observation. A Globe [investigation] shows that a large number of new surveillance systems, costing at least tens and probably hundreds of millions of dollars, are being simultaneously installed around the country as part of homeland security grants. Federal money is helping New York, Baltimore, and Chicago build massive surveillance systems that may also link thousands of privately owned security cameras. Boston has installed about 500 cameras in the MBTA system, funded in part with homeland security funds. Marc Rotenberg, director of the Electronic Privacy Information Center, said [the] Homeland Security Department is the primary driver in spreading surveillance cameras, making their adoption more attractive by offering federal money to city and state leaders. The proliferation of cameras could mean that Americans will feel less free because legal public behavior -- attending a political rally, entering a doctor's office, or even joking with friends in a park -- will leave a permanent record, retrievable by authorities at any time.


The Fear of Fear Itself
2007-08-07, New York Times
http://www.nytimes.com/2007/08/07/opinion/07tue1.html?ex=1344139200&en=69538e...

It was appalling to watch over the last few days as Congress — now led by Democrats — caved in to yet another unnecessary and dangerous expansion of President Bush’s powers, this time to spy on Americans in violation of basic constitutional rights. Many of the 16 Democrats in the Senate and 41 in the House who voted for the bill said that they had acted in the name of national security, but the only security at play was their job security. What [do] the Democrats ... plan to do with their majority in Congress if they are too scared of Republican campaign ads to use it to protect the Constitution and restrain an out-of-control president[?] The White House and its allies on Capitol Hill railroaded Congress into voting a vast expansion of the president’s powers. They gave the director of national intelligence and the attorney general authority to intercept — without warrant, court supervision or accountability — any telephone call or e-mail message that moves in, out of or through the United States as long as there is a “reasonable belief” that one party is not in the United States. While serving little purpose, the new law has real dangers. It would allow the government to intercept, without a warrant, every communication into or out of any country, including the United States. The Democratic majority has made strides on other issues like children’s health insurance against White House opposition. As important as these measures are, they do not excuse the Democrats from remedying the damage Mr. Bush has done to civil liberties and the Bill of Rights. That is their most important duty.


Chips: High Tech Aids or Tracking Tools?
2007-07-22, ABC News/Associated Press
http://www.abcnews.go.com/Technology/wireStory?id=3402044

CityWatcher.com, a provider of surveillance equipment, attracted little notice itself until a year ago, when two of its employees had glass-encapsulated microchips with miniature antennas embedded in their forearms. The "chipping" of two workers with RFIDs radio frequency identification tags ... was merely a way of restricting access to ... sensitive data and images ... the company said. Innocuous? Maybe. But the news that Americans had, for the first time, been injected with electronic identifiers to perform their jobs fired up a debate over the proliferation of ever-more-precise tracking technologies and their ability to erode privacy in the digital age. To some, the ... notion of tagging people was Orwellian. Chipping, these critics said, might start with Alzheimer's patients or Army Rangers, but would eventually be suggested for convicts, then parolees, then sex offenders, then illegal aliens until one day, a majority of Americans, falling into one category or another, would find themselves electronically tagged. "It was scary that a government contractor that specialized in putting surveillance cameras on city streets was the first to incorporate this technology in the workplace," says Liz McIntyre, co-author of Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID. Within days of the company's announcement, civil libertarians and Christian conservatives joined to excoriate the microchip's implantation in people.

Note: For educated speculation on how certain powerful people might like to have everyone implanted with microchips for security and control purposes, click here.


FBI Plans Initiative To Profile Terrorists
2007-07-11, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/07/10/AR20070710018...

The Federal Bureau of Investigation is developing a computer-profiling system that would enable investigators to target possible terror suspects. The System to Assess Risk, or STAR, assigns risk scores to possible suspects based on a variety of information, similar to the way a credit bureau assigns a rating based on a consumer's spending behavior and debt. The program focuses on foreign suspects but also includes data about some U.S. residents. Some lawmakers said ... that the report raises new questions about the government's power to use personal information and intelligence without accountability. "The Bush administration has expanded the use of this technology, often in secret, to collect and sift through Americans' most sensitive personal information," said Sen. Patrick J. Leahy (D-Vt.), chairman of the Senate Judiciary Committee. The use of data mining in the war on terror has sparked criticism. An airplane-passenger screening program called CAPPS II was revamped and renamed because of civil liberty concerns. An effort to collect Americans' personal and financial data called Total Information Awareness was killed. Law enforcement and national security officials have continued working on other programs to use computers to sift through information for signs of threats. The Department of Homeland Security, for example, flags travelers entering and leaving the United States who may be potential suspects through a risk-assessment program called the Automated Targeting System.


Contingencies for nuclear terrorist attack
2007-05-11, San Francisco Chronicle (San Francisco's leading newspaper)
http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2007/05/11/MNG2OPP22R1.DTL

Senior government and military officials and other experts, organized by a joint Stanford-Harvard program called the Preventive Defense Project, met behind closed doors in Washington for a day-long workshop called "The Day After." The organizers of the nonpartisan project, Stanford's William Perry, a secretary of defense in the Clinton administration, and Harvard's Ashton Carter, a senior Defense Department official during the Clinton years, assumed the detonation of a bomb similar in size to the weapon that destroyed Hiroshima in World War II. A paper [they] are writing ... urges local governments and individuals to build underground bomb shelters; encourages authorities who survive to prevent evacuation of at least some of the areas attacked for three days ... and proposes suspending regulations on radiation exposure so that first responders would be able to act, even if that caused higher cancer rates. "The public at large will expect that their government had thought through this possibility and to have planned for it," Carter said in an interview. "This kind of an event would be unprecedented. We have had glimpses of something like this with Hiroshima, and glimpses with 9/11 and with Katrina. But those are only glimpses. If one bomb goes off, there are likely to be more to follow," Carter said. "This fact, that nuclear terrorism will appear as a syndrome rather than a single episode, has major consequences." It would, he added, require powerful government intervention to force people to do something many may resist -- staying put.

Note: Ashton Carter was co-author, with Philip Zelikow (later Executive Director of the 9/11 Commission) and John Deutch (former CIA Director), of a 1998 Foreign Affairs article, "Catastrophic Terrorism: Tackling the New Danger," which warned of a possible catastrophic attack on the World Trade Center and accurately described the governmental aftermath of 9/11.


U.S. Issues Guidelines in Case of Flu Pandemic
2007-02-01, New York Times
http://www.nytimes.com/2007/02/01/health/01cnd-flu.html?ex=1327986000&en=0815...

Cities should close schools for up to three months in the event of a severe flu outbreak, ball games and movies should be canceled ... the federal government advised today in issuing new pandemic flu guidelines to states and cities. Health officials acknowledged that such measures would hugely disrupt public life, but they argued that these measure would buy the time needed to produce vaccines and would save lives. “We have to be prepared for a Category 5 pandemic,” said Dr. Martin Cetron, director of global migration and quarantine for the Centers for Disease Control and Prevention. “It’s not easy. The only thing that’s harder is facing the consequences.” The new guidelines also advocate having sick people and all their families' even apparently healthy members stay home for 7 to 10 days. Any pandemic is expected to move faster than a new vaccine can be produced. Current experimental vaccines against H5N1 avian flu are in short supply and based on strains isolated in 2004 or 2005. Although the government is creating a $4 billion stockpile of the antiviral drug Tamiflu, it is only useful when taken within the first 48 hours, and Tamiflu-resistant flu strains have already been found. The historian John Barry, author of “The Great Influenza,” a history of the 1918 flu, questioned an idea underpinning the study’s conclusions. There is evidence, he said, that some cities with low sickness and death rates in 1918 ... were hit by a milder spring wave of the virus. That would have, in effect, inoculated their citizens against the more severe fall wave and might have been more important than their public health measures.

Note: Why is it that government officials seem to want us to be afraid? Could it be that when we live in fear, we are more willing to give up our freedoms and money and allow them to be in control? For more, click here. And why would the government spend billions on stockpiling drugs of questionable use? For an answer, click here.


Lou Dobbs Tonight: Agenda to Create a North American Union
2006-11-29, CNN
http://transcripts.cnn.com/TRANSCRIPTS/0611/29/ldt.01.html

When Mexican president Vicente Fox leaves office this week and Felipe Calderon takes his place, President Bush will be the last of the so-called three amigos. Bush, Fox, and, of course, Canadian prime minister Paul Martin were the originators of the so-called Security and Prosperity Partnership, which critics call nothing more than a North American [U]nion. It means open borders, commerce of all [kinds] ... without the approval of either American voters or the U.S. Congress. An effort, the governments say, to harmonize regulation and increase cooperation between three very different countries. A new Canadian prime minister [is] joining the discussions as this North American partnership barrels ahead, with departments and ministries of all three governments working quickly to integrate North America by 2010. Now Mexico's new president, Felipe Calderon, [is] widely expected to keep the progress moving. Critics, though, say there's too little transparency and no congressional oversight. [Tom Fitton of Judicial Watch says] "There's nothing wrong with neighboring governments talking to each other, synchronizing their watches to make sure they're all on the same page in the cases of emergency or on trade issues or even on the flows of goods and people. But if policies are being made that the American people might oppose, or that are contrary to the law ... they're doing something a bit more nefarious." [Fitton] points to SPP documents urging the free flow of goods and people across borders and a wish list from business interests that borders remain open during a flu pandemic. Worse, critics say foreign policy elites are promoting a European-style union, erasing borders between the three countries and eventually moving to a single North American currency called the [Amero].

Note: To view the CNN broadcast of the above, click here. The Canadian TV network CNBC also carried a two-minute report on one of the supposed outcomes of the SPP, the Amero, which is a new common currency being planned for use by Canada, the U.S., and Mexico. To watch this news report, click here.


Foley's Behavior No Secret on Capitol Hill
2006-10-01, ABC News
http://abcnews.go.com/WNT/story?id=2514770

[Congressman] Foley's obsession with 16- and 17-year-old male pages has been known to Republicans on Capitol Hill for at least five years. But other than issue a warning, little else seems to have been done about the congressman. A former page has come forward to tell ABC News warnings were issued about Foley to the pages in 2001. Internet messages [were] sent by Foley to three different pages after that warning. Two of them were sent to pages in the 2001-2002 class, with sexually explicit messages, most too graphic to be broadcast, from Foley using the screen name Maf54. "Maf54: To be honest, I am a little to interested in you. So that's why I need to back off a little. Teen: Ya, slow things down a little im still young…like under 18. don't want to do anything illegal…im not 18. Maf54: cool..dont forget to measure for me." [This last sentence was] a reference to his request that the page provide the measurements of his sexual organ, a request he repeatedly made to another page as well. Former pages tell ABC News the pages involved with Foley were afraid to offend the powerful Republican congressman. It's possible Foley could end up being prosecuted under laws he helped to enact as the co-chairman of the House caucus on Missing and Exploited Children.

Note: If you want to know the degree of sexual corruption which reaches to the highest levels in government, see the incredibly well done Discovery Channel documentary Conspiracy of Silence available free online at http://www.WantToKnow.info/060501conspiracyofsilence


Failures of Imagination
2006-09-01, September/October 2006 Issue Columbia Journalism Review
http://www.cjr.org/issues/2006/5/Umansky.asp

It was early December 2002. [Carlotta] Gall, the Afghanistan correspondent for The New York Times, had just seen a press release from the U.S. military announcing the death of a prisoner at its Bagram Air Base. Soon thereafter the military issued a second release about another detainee death at Bagram. Gall: “I just wanted to know more. And I came up against a blank wall." The body of one of the detainees had been returned, a young taxi driver known as Dilawar. Gall met with Dilawar’s family, and his brother handed Gall a death certificate...that the military had issued. “It said, ‘homicide.’ The press release announcing Dilawar’s death stated...heart attack, a conclusion repeated by the top U.S. commander in Afghanistan. But the death certificate, the authenticity of which the military later confirmed to Gall, stated that Dilawar — who was just twenty-two years old — died as a result of “blunt force injuries to lower extremities complicating coronary artery disease.” Gall filed a story. It sat for a month. “I very rarely have to wait long for a story to run.” Gall’s story...had been at the center of an editorial fight. Roger Cohen, then the Times’s foreign editor: “I pitched it, I don’t know, four times at page-one meetings, with increasing urgency and frustration. My single greatest frustration as foreign editor was my inability to get that story on page one.” The story ran on page fourteen under the headline "U.S.Military Investigating Death of Afghan in Custody." The Times also reported that officers who had overseen the Bagram prison at the time were promoted; another, who had lied to investigators, was transferred to help oversee interrogations at Abu Ghraib and awarded a Bronze Star.

Note: Why does it take a university journal to ask the hard questions? Again and again, news that should be front-page headlines is buried on insignificant pages or not reported at all. This key article from one of the most respected schools of journalism in the world tells it all about the unreported and underreported violent abuse of prisoners condoned by elements of the U.S. military. Don't miss reading this most powerful story in its entirety.


Times Blocks Article to U.K. Web Readers
2006-08-29, ABC News/Associated Press
http://abcnews.go.com/Technology/wireStory?id=2371151

The New York Times' Web site is blocking British readers from a news article detailing the investigation into the recent airline terror plot. "We had clear legal advice that publication in the U.K. might run afoul of their law," Times spokeswoman Diane McNulty said Tuesday. "It's a country that doesn't have the First Amendment, but it does have the free press. We felt we should respect their country's law." Visitors who click on a link to the article, published Monday, instead got a notice explaining that British law "prohibits publication of prejudicial information about the defendants prior to trial." The blocked article reveals evidence authorities have in the alleged plot to use liquid explosives to down U.S. airliners over the Atlantic. The Times also blocked U.K. access to an audio summary of the top Times stories, which included the article in question. British readers could find excerpts posted on Web journals and other unblocked sites. In fact, the Daily Mail of London published an article on the case, attributing details to the Times. The Times also is keeping the article out of printed editions published in the U.K. or mailed to U.K. subscribers.

Note: To see the blocked article, click here. The more likely reason for blocking the article is that it makes clear that the threat was significantly exaggerated by authorities and that experts on the case were unsure "whether any of the suspects was technically capable of assembling and detonating liquid explosives." Clearly, there are those who want to keep us in fear in order to gain ever greater control.


Ontario to build reactors
2006-06-12, Toronto Star (one of Canada's leading newspapers)
http://www.thestar.com/NASApp/cs/ContentServer?pagename=thestar/Layout/Articl...

The provincial government will announce tomorrow that Ontario is embracing more nuclear power plants. Premier Dalton McGuinty has privately spoken of his government's plans to confidants for days, insiders say. In an off-the-record speech on Saturday night in Ottawa to the secretive Bilderberg group, McGuinty discussed the pros and cons of more nuclear plants. The premier privately admitted the public will officially learn of the plans tomorrow. Insiders told the Star he was unequivocal in private conversations about his support for the controversial electricity source. McGuinty's staff deliberately omitted any mention of his speech Saturday to the Bilderberg session...from his public itinerary. The group, named for the Dutch hotel the organization first met at in 1954, holds its sessions behind closed doors amid tight security. Because participants in Bilderberg sessions are sworn to secrecy under threat of ex-communication from the group, politicians tend to lower their guard and speak candidly. It was the kind of power-broker audience the premier, who sat with Pataki, Reisman and Queen Beatrix, would want to reach when delivering a message about investing in Ontario — and massive investment will be required to pay for $40 billion in nuclear plants.

Note:If the above link fails, click here. If the Bilderbergers truly support the interests of all of us, why the need for so much secrecy? Why is there no website? Why until just a few years ago was there virtually no reporting on the influential Bilderberg Group at all in the major media?


Secretive group's departure as low-key as arrival
2006-06-12, Ottawa Citizen (leading newspaper of Canada's capital city)
http://www.canada.com/ottawacitizen/news/story.html?id=12fd4eaa-1b87-48da-9fe...

Four days after they arrived quietly at a Kanata hotel, the world's rich and powerful left just as mysteriously, in limos and SUVs with blacked-out windows. The Bilderberg Group, a secretive organization of politicians and business leaders from around the world, gave no public statements. With private security guards and metal barriers keeping outsiders on the street, the Bilderbergers met privately and then whisked themselves away in ones and twos, mostly to the airport. What they talked about at the Brookstreet Hotel is still a secret. The group meets annually, and is usually rumoured to discuss international politics and business, from Middle East crises to oil prices. They emerged singly yesterday -- Bilderberg president Etienne Davignon of Belgium, American David Rockefeller, Italian economist Mario Monti, European competition commissioner Neelie Kroes from the Netherlands, and, watchers thought, Iraqi politician Ahmed Chalabi. Protesters on the sidewalk have their own version of the agenda: world domination, a merger of Canada with the United States and Mexico, hiding the cure for cancer, suppression of cars that get 200 miles per gallon of fuel, [and] an invasion of Iran.

Note: This article lists the names and descriptions of 21 participants of this Bilderberg meeting. If you read through them, you will see that they are clearly among the most powerful and wealthy people in the world.


VIPs' arrivals marked by a discreet 'B'
2006-06-09, Ottawa Citizen (leading newspaper of Canada's capital city) (Front page)
http://www.canada.com/ottawacitizen/news/story.html?id=6ac7a723-323b-497c-970...

Greeted at the airport by limousine drivers holding single-letter "B" signs, global luminaries such as Henry Kissinger, David Rockefeller and Queen Beatrix of the Netherlands began quietly slipping into Ottawa yesterday for the annual gathering of the ultra-secretive Bilderberg Group. The group's discreet approach was evident as attendees arrived yesterday at the Ottawa Airport. Outside the airport, a phalanx of limousines lined up to ferry guests to the Brookstreet. Approached by a Citizen reporter upon his arrival, former U.S. defence policy adviser Richard Perle shot down criticism about the secrecy of the group's meetings. "It's a private organization," he said. He denied the charge, advanced by Bilderberg critics, that the organization crafts public policy behind closed doors. "It discusses public policy," he stressed. Mr. Perle also dismissed suggestions that the group's heavy representation from the oil industry gives it influence over energy prices. Also seen arriving yesterday were Jorma Ollila, chairman of Royal Dutch Shell [and] World Bank president James Wolfenson. According to an unsigned press release sent by fax yesterday, presumably by Bilderberg organizers, attendees will also include New York Governor George Pataki, deputy prime minister of Iraq Ahmad Chalabi, the heads of Coca-Cola, Credit Suisse, [and] the Royal Bank of Canada. "The meeting is private to encourage frank and open discussion," said the release. "There will be no press conference."

Note: To see photos of this article on the front page of the Ottawa Citizen:
http://www.prisonplanet.com/Pictures/Jun06/110606bbg_media_ottawa_citizen.jpg
http://www.prisonplanet.com/Pictures/Jun06/110606bbg_tucker_paper_cover.jpg
For a video clip of reporters trying trying to get close, click here and go to the "Video" section on the right.


VIPs set to arrive for Bilderberg meeting
2006-06-08, Ottawa Citizen (leading newspaper of Canada's capital city)
http://www.canada.com/ottawacitizen/news/story.html?id=11df53f7-6caf-4385-a6d...

Members of the Bilderberg Group will descend on the upscale Brookstreet Hotel for the three-day meeting, several police sources confirmed yesterday. When asked about police plans for the event, a police spokeswoman referred the Citizen to Alan Bell of Globe Risk Holdings. Reached by phone, Mr. Bell -- who is listed as president of Globe Risk Holdings in Toronto and a former SAS paratrooper commando -- said he hadn't heard of the Bilderberg Group and denied that his firm has been hired to guard this week's conference. "Never heard of that conference. What is it?" said Mr. Bell before politely cutting the conservation short. But according to the company's website, Globe Risk Holdings specializes in "strategic planning and counter-measures," recruits its consultants primarily from elite military counter-terrorist and special forces units, and has "undertaken consultancy and project work worldwide in areas of high risk". "The consultants at Globe Risk Holdings have proven backgrounds in military, special forces, law enforcement and government organizations with real life expertise in the areas of international security...close protection, sabotage prevention, and military/law enforcement," reads the company website.

Note: Denial and lying seem to be standard protocol for those involved with the Bilderberg group. What does that say about what is being discussed in their secre