As a 501(c)(3) nonprofit, we depend almost entirely on donations from people like you.
We really need your help to continue this work! Please consider making a donation.
Subscribe here and join over 13,000 subscribers to our free weekly newsletter

Big Brother News Articles

Below are key excerpts of revealing news articles on Big Brother from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

Explore our comprehensive news index on a wide variety of fascinating topics.
Explore the top 20 most revealing news media articles we've summarized.
Check out 10 useful approaches for making sense of the media landscape.

Sort articles by: Article Date | Date Posted on WantToKnow.info | Importance


United States Of Secrets
2014-05-12, KPBS.org
http://www.kpbs.org/news/2014/may/12/frontline-united-states-secrets/

When NSA contractor Edward Snowden downloaded tens of thousands of top-secret documents from a highly secure government network, it led to the largest leak of classified information in history and sparked a fierce debate over privacy, technology and democracy in the post-9/11 world. Now, in "United States Of Secrets," FRONTLINE goes behind the headlines to reveal the dramatic inside story of how the U.S. government came to monitor and collect the communications of millions of people around the worldincluding ordinary Americansand the lengths they went to trying to hide the massive surveillance program from the public. This is as close to the complete picture as anyone has yet put together and its bigger and more pervasive than we thought, says veteran FRONTLINE filmmaker Michael Kirk. In part one ... Kirk [pieces] together the secret history of the unprecedented surveillance program that began in the wake of September 11 and continues today even after the revelations of its existence by Edward Snowden. Then, in part two, premiering Tuesday, May 20 ..., veteran FRONTLINE filmmaker Martin Smith continues the story, exploring the secret relationship between Silicon Valley and the National Security Agency, and investigating how the government and tech companies have worked together to gather and warehouse your data. Through in-depth interviews with more than 60 whistleblowers, elected officials, journalists, intelligence insiders and cabinet officials, we have woven together the secret narrative that reveals the scale and scope of the governments spying program, says Kirk.

Note: Don't miss this engaging program, available at this link. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Glenn Greenwald: the explosive day we revealed Edward Snowden's identity to the world
2014-05-11, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/may/11/glenn-greenwald-nsa-whistleblowe...

On Sunday 9 June 2013, the Guardian published the story that revealed [Edward] Snowden to the world. The article told Snowden's story, conveyed his motives, and proclaimed that "Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley [now Chelsea] Manning." We quoted [a note from Snowden that said:] "I understand that I will be made to suffer for my actions but I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant." The reaction to the article and the video was more intense than anything I had experienced as a writer. Ellsberg himself, writing the following day in the Guardian, proclaimed that "there has not been in American history a more important leak than Edward Snowden's release of NSA material and that definitely includes the Pentagon Papers 40 years ago". Several hundred thousand people posted the link to their Facebook accounts in the first several days alone. Almost three million people watched the interview on YouTube. Many more saw it on the Guardian's website. The overwhelming response was shock and inspiration at Snowden's courage.

Note: Don't miss the full, exciting story of how Snowden originally came to leak his stunning information at the link above. This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Stories about NSA surveillance, Snowden leaks win Pulitzers for two news groups
2014-04-14, CNN
http://www.cnn.com/2014/04/14/us/pulitzer-prizes-journalism

Two news organizations' stories about National Security Agency surveillance, based upon documents leaked by Edward Snowden, have been awarded the Pulitzer Prize for public service, often described as the highest prize in American journalism. The Washington Post and ... The Guardian each received the prize on [April 14]. The recognition of the NSA reporting was most significant because of the questions raised by Snowden's leaks and the reaction to them. Snowden, who has been living in Russia while seeking asylum from U.S. prosecution, said in a statement that the Pulitzer board's recognition of the coverage was "vindication for everyone who believes that the public has a role in government." "We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance." While Snowden provided a trove of documents, reporters including Glenn Greenwald, working for the Guardian; Barton Gellman, working for The Post; and Laura Poitras, who worked with both, pored over the raw information, decided with their editors what parts were ethical to publish, and turned the information into stories that stunned readers around the world.

Note: For more on the historic Snowden revelations, see the deeply revealing reports from reliable major media sources available here.


NSA posed as Facebook to infect computers with malware, report says
2014-03-12, Los Angeles Times
http://www.latimes.com/business/technology/la-fi-tn-nsa-posing-facebook-malwa...

The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.

Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.


N.S.A. Devises Radio Pathway Into Computers
2014-01-15, New York Times
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-conn...

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


NSA review to leave spying programs largely unchanged, reports say
2013-12-13, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/dec/13/nsa-review-to-leave-spying-progr...

A participant in a White House-sponsored review of surveillance activities described as shameful an apparent decision to leave most of the National Security Agencys controversial bulk spying intact. Sascha Meinrath, director of the Open Technology Institute, said [on December 13] that ... The review group was searching for ways to make the most modest pivot necessary to continue business as usual. Should the review groups report resemble descriptions that leaked ... the report does nothing to alter the lack of trust the global populace has for what the US is doing, and nothing to restore our reputation as an ethical internet steward, said Meinrath, who met with the advisory panel and White House officials twice to discuss the bulk surveillance programs that have sparked international outrage. Leaks about the review groups expected recommendations to the New York Times and Wall Street Journal strengthened Meinrath and other participants long-standing suspicions that much of the NSAs sweeping spy powers would survive. The Times quoted an anonymous official familiar with the group saying its report says we cant dismantle these programs, but we need to change the way almost all of them operate. According to the leaks, the review group will recommend that bulk collection of every Americans phone call data continue, possibly by the phone companies instead of the NSA, with tighter restrictions than the reasonable, articulable suspicion standard for searching through them that the NSA currently employs.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


Law enforcement using methods from NSA playbook
2013-12-08, USA Today
http://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-ns...

The National Security Agency isn't the only government entity secretly collecting data from people's cellphones. Local police are increasingly scooping it up, too. Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information about thousands of cellphone users at a time, whether they are targets of an investigation or not. The records, from more than 125 police agencies in 33 states, reveal [that] about one in four law-enforcement agencies have used a tactic known as a "tower dump," which gives police data about the identity, activity and location of any phone that connects to the targeted cellphone towers over a set span of time, usually an hour or two. A typical dump covers multiple towers, and wireless providers, and can net information from thousands of phones. At least 25 police departments own a Stingray, a suitcase-size device that costs as much as $400,000 and acts as a fake cell tower. The system, typically installed in a vehicle so it can be moved into any neighborhood, tricks all nearby phones into connecting to it and feeding data to police. In some states, the devices are available to any local police department via state surveillance units. Organizations such as the American Civil Liberties Union and Electronic Privacy Information Center say the swelling ability by even small-town police departments to easily and quickly obtain large amounts of cellphone data raises questions about the erosion of people's privacy as well as their Fourth Amendment protections against unreasonable search and seizure.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data
2013-11-20, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-p...

The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden. In the first explicit confirmation that UK citizens have been caught up in US mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo ... says the material is being put in databases where it can be made available to other members of the US intelligence and military community. Until now, it had been generally understood that the citizens of each country were protected from surveillance by any of the others. But the Snowden material reveals that: In 2007, the rules were changed to allow the NSA to analyse and retain any British citizens' mobile phone and fax numbers, emails and IP addresses swept up by its dragnet. These communications were "incidentally collected" by the NSA, meaning the individuals were not the initial targets of surveillance operations and therefore were not suspected of wrongdoing. The NSA has been using the UK data to conduct so-called "pattern of life" or "contact-chaining" analyses, under which the agency can look up to three "hops" away from a target of interest examining the communications of a friend of a friend of a friend. Three hops for a typical Facebook user could pull the data of more than 5 million people into the dragnet.

Note: For more on government threats to privacy, see the deeply revealing reports from reliable major media sources available here.


FISA court order that allowed NSA surveillance is revealed for first time
2013-11-19, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/19/court-order-that-allowed-nsa-sur...

A secret court order that authorised a massive trawl by the National Security Agency of Americans' email and internet data was published for the first time on [November 18], among a trove of documents that also revealed a judge's concern that the NSA "continuously" and "systematically" violated the limits placed on the program. Another later court order found that what it called "systemic overcollection" had taken place. In a heavily redacted opinion Colleen Kollar-Kotelly, the former presiding judge of the FISA court, placed legal weight on the methods of surveillance employed by the NSA, which had never before collected the internet data of an enormous volume of communications. The methods, known as pen registers and trap-and-trace devices, record the incoming and outgoing routing information of communications. Kollar-Kotelly ruled that acquiring the metadata, and not the content, of email and internet usage in bulk was harmonious with the purpose of Congress and prior court rulings even though no surveillance statute ever authorized it and top officials at the Justice Department and the FBI threatened to resign in 2004 over what they considered its dubious legality. The type of data collected under the program included information on the "to", "from" and "bcc" lines of an email rather than the content. Metadata, wrote Kollar-Kotelly, enjoyed no protection under the fourth amendment to the US constitution, a precedent established by the Supreme Court in 1979 in a single case on which the NSA relies currently.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


Snowden Says He Took No Secret Files to Russia
2013-10-17, New York Times
http://www.nytimes.com/2013/10/18/world/snowden-says-he-took-no-secret-files-...

Edward J. Snowden, the former National Security Agency contractor, said in an extensive interview this month that he did not take any secret N.S.A. documents with him to Russia when he fled there in June, assuring that Russian intelligence officials could not get access to them. He also asserted that he was able to protect the documents from Chinas spies because he was familiar with that nations intelligence abilities, saying that as an N.S.A. contractor he had targeted Chinese operations and had taught a course on Chinese cybercounterintelligence. Theres a zero percent chance the Russians or Chinese have received any documents, he said. Mr. Snowden added that inside the spy agency theres a lot of dissent. But he said that people were kept in line through fear and a false image of patriotism, which he described as obedience to authority. He said he believed that if he tried to question the N.S.A.s surveillance operations as an insider, his efforts would have been buried forever, and he would have been discredited and ruined. Mr. Snowden said he finally decided to act when he discovered a copy of a classified 2009 inspector generals report on the N.S.A.s warrantless wiretapping program during the Bush administration. After reading about the program, which skirted the existing surveillance laws, he concluded that it had been illegal, he said. If the highest officials in government can break the law without fearing punishment or even any repercussions at all, he said, secret powers become tremendously dangerous.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


N.S.A. Gathers Data on Social Connections of U.S. Citizens
2013-09-29, New York Times
http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citiz...

Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials. The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor. The agency was authorized to conduct large-scale graph analysis on very large sets of communications metadata without having to check foreignness of every e-mail address, phone number or other identifier, the document said. The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such enrichment data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners. Almost everything about the agencys operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nations intelligence court or any public debate.

Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


ACLU warns of mass tracking through license plate scanners
2013-07-18, CBS News
http://www.cbsnews.com/8301-201_162-57594179/aclu-warns-of-mass-tracking-thro...

The American Civil Liberties Union is warning that law enforcement officials are using license plate scanners to amass massive and unregulated databases that can be used to track law-abiding citizens as their go about their daily lives. In a new report, "You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements," the ACLU discusses the data culled from license plate scanners - cameras mounted on patrol cars, overpasses and elsewhere to record your license plate number and location at a given time. There are tens of thousands such cameras now in operation, according to the group, with the data in some cases being stored indefinitely. The ACLU report is the result of an analysis of 26,000 pages of documents from police departments around the country, obtained through nearly 600 [FOIA] requests. It finds that while some jurisdictions keep the information gleaned from the scanners for a short time ... many hold onto the data for years. The organization complains that there are "virtually no rules in place" to keep officials from tracking "everybody all the time." The ACLU also warns that the data is being fed into larger databases, with the private National Vehicle Location Service now holding more than 800 million license plate records. The group's database is used by more than 2,200 law enforcement customers. The [ACLU] report warns that the data can be used in an official capacity to spy on protesters or target communities based on their religious beliefs, or unofficially by a police officer who wants to keep an eye on a romantic rival.

Note: For more on privacy, see the deeply revealing reports from reliable major media sources available here.


Wearing a mask at a riot is now a crime
2013-06-19, CBC (Canada's Public Broadcasting System)
http://www.cbc.ca/news/canada/story/2013/06/19/pol-mask-bill-royal-assent.html

A bill that bans the wearing of masks during a riot or unlawful assembly and carries a maximum 10-year prison sentence ... became law today. The bill is meant to give police an added tool to prevent lawful protests from becoming violent riots, and that it will help police identify people who engage in vandalism or other illegal acts. The bill originally proposed a penalty of up to five years, but the House of Commons justice committee amended it and doubled the penalty to up to 10 years in prison for committing the offence. The bill didn't have unanimous support, and was opposed by some who are concerned about its effect on freedom of expression and privacy. Civil liberties advocates argued the measures could create a chilling effect on free speech and that peaceful protesters can unintentionally find themselves involved in an unlawful assembly. They also noted that there are legitimate reasons for wearing masks at protests; some may be worried about reprisals at work, for example, if sighted at a political protest. "Any law that infringes upon civil liberties needs to be held to a test of absolute necessity, and I don't think that test has been met in this instance," said Michael Byers, a political scientist at the University of British Columbia.

Note: Police seem to be specifically targeting the now popular Guy Falkes masks representing opposition to oppressive authority. For more on the erosion of civil liberties, see the deeply revealing reports from reliable major media sources available here.


Are all telephone calls recorded and accessible to the US government?
2013-05-04, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/may/04/telephone-calls-recorded-...

CNN's Out Front with Erin Burnett [has been] focused on the possible involvement in the Boston Marathon attack of Katherine Russell, the 24-year-old American widow of the deceased suspect, Tamerlan Tsarnaev. Anonymous government officials are claiming that they are now focused on telephone calls between Russell and Tsarnaev that took place both before and after the attack to determine if she had prior knowledge of the plot or participated in any way. Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could: BURNETT: There's no way they actually can find out what happened, right, unless she tells them? CLEMENTE: No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. We certainly can find that out. BURNETT: So they can actually get that? People are saying, look, that is incredible. CLEMENTE: No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not. On Thursday night, Clemente again appeared on CNN. He reiterated what he said the night before but added expressly that "all digital communications in the past" are recorded and stored. All digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.

Note: All of our communications have been monitored by government computers for years. BBC News reported in this this 1999 article about the Echelon network which monitors all communications globally. For deeply revealing reports from reliable major media sources on government and corporate threats to privacy, click here.


The Program
2012-08-23, New York Times
http://www.nytimes.com/2012/08/23/opinion/the-national-security-agencys-domes...

[William] Binney, a 32-year veteran of the National Security Agency turned whistle-blower, ... described details about Stellar Wind, the N.S.A.s top-secret domestic spying program begun after 9/11, which was so controversial that it nearly caused top Justice Department officials to resign in protest, in 2004. The decision must have been made in September 2001, Mr. Binney told me [and] cinematographer Kirsten Johnson. Thats when the equipment started coming in. He resigned over this in 2001 and began speaking out publicly in the last year. [Binney] is among a group of N.S.A. whistle-blowers, including Thomas A. Drake, who have each risked everything their freedom, livelihoods and personal relationships to warn Americans about the dangers of N.S.A. domestic spying. The N.S.A. has technical abilities that are nearly impossible to defend against if you are targeted. The 2008 amendments to the Foreign Intelligence Surveillance Act, which oversees the N.S.A. activities, are up for renewal in December. Two members of the Senate Select Committee on Intelligence, Senators Ron Wyden of Oregon and Mark Udall of Colorado ... have been warning about secret interpretations of laws and backdoor loopholes that allow the government to collect our private communications. Thirteen senators have signed a letter expressing concern about a loophole in the law that permits the collection of United States data. The A.C.L.U. and other groups have also challenged the constitutionality of the law, and the Supreme Court will hear arguments in that case on Oct. 29.

Note: The video about this on the NY Times webpage at the link above is quite revealing. One potent comment of this 32-year NSA veteran in the video is "They wanted to highly classify the extreme impeachable crimes they were committing." For deeply revealing reports from reliable major media sources on government and corporate surveillance, click here.


Rothschilds to merge British and French banking operations to secure control
2012-04-05, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/finance/newsbysector/banksandfinance/9189053/Roths...

The Rothschild dynasty is to merge its British and French banking operations to secure long-term control of the business and to boost the firm's financial strength ahead of the introduction of tougher capital requirements for banks. The 200-year-old banks will be reunited under a single shareholding that will bring together the fortunes of the French and English sides of the renowned family as they attempt to safeguard the business against the effects of new regulation and the fallout from the global financial crisis. Paris Orleans, the Rothschild Group's Paris-based holding company, will convert into a French limited partnership, securing the families' control of the bank against potential takeovers. The new partnership will then buy out minority investors in NM Rothschild & Sons, the UK business, as well as outstanding minority interests in the French operations. Paris Orleans has a market value of more than 500m (415m) and is about 30pc owned by outside investors. The Rothschild Group employs 3,000 people in 42 countries and is one of the world's leading independent investment banks, advising some of the largest international companies on capital raisings and mergers and acquisitions. The bank also remains a player in the private equity industry and operates several merchant banking operations that invest directly in business across Europe and the rest of the world.

Note: Why is that these two hugely wealthy families get so little press coverage? Could it be that their wealth and influence exerts control over the major media? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.


Brother, Can You Spare $6 Trillion?
2012-02-18, New York Times
http://www.nytimes.com/2012/02/18/world/europe/italy-arrests-8-in-fake-us-tre...

The Italian police ... arrested eight people on charges related to the seizure of $6 trillion in fake United States Treasury bonds, in a mysterious scheme that stretched from Hong Kong to Switzerland to the southern Italian region of Basilicata. The value of the seized bonds is in the neighborhood of half of the United States entire public debt of $15.36 trillion, but only the uninitiated would have accepted them as real securities. Rather than counterfeit, they were what officials call fictitious, printed in 6,000 units of $1 billion each, a denomination that does not exist and the equivalent of $3 bills. The United States Embassy in Rome said its experts had examined the bonds, which bore the date 1934, and determined that they were fictitious and apparently part of a scheme intended to defraud Swiss banks. According to the Federal Reserve, such fictitious instrument fraud is increasingly common, and unwitting investors have been cheated of nearly $10 billion in recent years. In a common ploy, criminals present fictitious financial instruments such as Federal Reserve notes, standby letters of credit, prime bank guarantees or prime bank notes in order to fraudulently collateralize loans, the Federal Reserve says on its Web site. In 2009, Italian police seized phony United States Treasury bonds with a face value of $250 billion.

Note: There is a major problem with the claim that these are fake. If you were a counterfeiter and wanted to fake bonds, you would have to be out of your mind to fake them in denominations of $1 billion. As reported here, no one would ever dream of cashing them. For excellent research by David Wilcock suggesting that the bonds are real, and that this may be part of a huge, hidden manipulation, click here.


Local police stockpile high-tech, combat-ready gear
2011-12-21, NPR/Center for Investigative Reporting
http://americaswarwithin.org/articles/2011/12/21/local-police-stockpile-high-...

If terrorists ever target Fargo, N.D., the local police will be ready. In recent years, they have bought bomb-detection robots, digital communications equipment and Kevlar helmets, like those used by soldiers in foreign wars. For local siege situations requiring real firepower, police there can use a new $256,643 armored truck, complete with a rotating turret. Until that day, however, the menacing truck is mostly used for training runs and appearances at the annual Fargo picnic, where its been displayed near a childrens bounce house. Fargo, like thousands of other communities in every state, has been on a gear-buying spree with the aid of more than $34 billion in federal government grants since the Sept. 11, 2001, terrorist attacks on New York and the Pentagon. The federal grant spending, awarded with little oversight from Washington, has fueled a rapid, broad transformation of police operations in Fargo and in departments across the country. More than ever before, police rely on quasi-military tactics and equipment. A review of records from 41 states obtained through open-government requests, and interviews with more than two-dozen current and former police officials and terrorism experts, shows police departments around the U.S. have transformed into small army-like forces. Many police, including beat cops, now routinely carry assault rifles.

Note: For lots more on the militarization of US police from reliable sources, click here and here.


Shock Doctrine, U.S.A.
2011-02-24, New York Times
http://www.nytimes.com/2011/02/25/opinion/25krugman.html

The story of the privatization-obsessed Coalition Provisional Authority [created by Bush in Iraq in 2003] was the centerpiece of Naomi Kleins best-selling book The Shock Doctrine, which argued that it was part of a broader pattern. From Chile in the 1970s onward, she suggested, right-wing ideologues have exploited crises to push through an agenda that has nothing to do with resolving those crises, and everything to do with imposing their vision of a harsher, more unequal, less democratic society. Which brings us to Wisconsin 2011, where the shock doctrine is on full display. In recent weeks, Madison has been the scene of large demonstrations against the governors budget bill, which would deny collective-bargaining rights to public-sector workers. Gov. Scott Walker claims that he needs to pass his bill to deal with the states fiscal problems. But his attack on unions has nothing to do with the budget. Whats happening in Wisconsin is, instead, a power grab an attempt to exploit the fiscal crisis to destroy the last major counterweight to the political power of corporations and the wealthy. And the power grab goes beyond union-busting. The bill in question is 144 pages long, and there are some extraordinary things hidden deep inside. For example, the bill includes language that would allow officials appointed by the governor to make sweeping cuts in health coverage for low-income families without having to go through the normal legislative process. The state of Wisconsin owns a number of plants supplying heating, cooling, and electricity to state-run facilities. The language in the budget bill would ... let the governor privatize any or all of these facilities. Not only that, he could sell them, without taking bids, to anyone he chooses. And note that any such sale would, by definition, be considered to be in the public interest.

Note: For an abundance of major media articles revealing rampant government corruption, click here.


Every email and website to be stored
2010-10-20, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/technology/news/8075563/Every-email-and-website-to...

Every email, phone call and website visit is to be recorded and stored after the Coalition Government revived controversial Big Brother snooping plans. It will allow security services and the police to spy on the activities of every Briton who uses a phone or the internet. Moves to make every communications provider store details for at least a year will be unveiled later this year sparking fresh fears over a return of the surveillance state. It comes despite the Coalition Agreement promised to "end the storage of internet and email records without good reason". The plans are expected to involve service providers storing all users details for a set period of time. That will allow the security and police authorities to track every phone call, email, text message and website visit made by the public if they argue it is needed to tackle crime or terrorism. The information will include who is contacting whom, when and where and which websites are visited, but not the content of the conversations or messages. The move was buried in the Government's Strategic Defence and Security Review.

Note: For lots more from major media sources on increasing government and corporate threats to privacy, click here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.