Big Brother News ArticlesExcerpts of Key Big Brother News Articles in Media
Adm. Stansfield Turner, the Director of Central Intelligence, testified today that the C.I.A. had secretly supported human behavior control research at 80 institutions, including 44 colleges or universities as well as hospitals, prisons and pharmaceutical companies. He said that the main action years of MK-Ultra were from 1953 through 1963. The projects, he said, had included tests of LSD and of a "K," or "knockout drop." The agency had supported 185 nongovernment researchers in 149 separate research projects. Admiral Turner said that ... 8,000 pages of newly discovered documents do not contain the names of the subjects of the tests but do contain "leads" that might enable them to be found. Admiral Turner acknowledged under questioning that the C.I.A. had apparently planned to test drugs on terminal cancer patients at the same institution where it secretly contributed $375,000 toward the construction of a hospital building. The New York Times has independently confirmed the institution is Georgetown University Medical School here. Admiral Turner [also] said that "some unwitting testing took place on criminal sexual psychopaths confined at a state hospital." At the two-hour hearing today, Senator Kennedy, a Massachusetts Democrat, pressed Admiral Turner to let the universities, researchers and possible subjects of the tests know of the C.I.A.'s involvement. "These individuals have a right to know who they are and why they were used," he said.
The brave bull bore down on the unarmed "matador" — a scientist who had never faced a fighting bull. But the charging animal's horns never reached the man behind the heavy red cape. Moments before that could happen, Dr. Jose M. R. Delgado, the scientist, pressed a button on a small radio transmitter in his hand, and the bull braked to a halt. Then, he pressed another button on the transmitter and the bull obediently turned to the right and trotted away. The bull was obeying commands from his brain that had been called forth by electrical stimulation—by the radio signals—of certain regions in which fine wire electrodes had been painlessly implanted the day before. [Experiments] have shown, he explained, that "functions traditionally related to the psyche, such as friendliness, pleasure or verbal expression, can be induced, modified and inhibited by direct electrical stimulation of the brain." For example, he has been able to "play" monkeys and cats 'like little electronic toys" that yawn, hide, fight, play, mate and go to sleep on command. With humans under treatment for epilepsy, he has increased word output sixfold in one person, has produced severe anxiety in another, and in several others has induced feelings of profound friendliness—all by electrical stimulation of various specific regions of their brains. "I do not know why more work of this sort isn't done," he remarked recently, "because it is so economical and easy." Monkeys will learn to press a button that sends a stimulus to the brain of an enraged member of the colony and calms it down, indicating that animals can be taught to control one another's behavior.
Note: If the above link fails, click here. This article shows mind control was being developed over 50 years ago. Though this technology can be used for good purposes, it also can and secretly has been used to manipulate and control for many years. For lots of information based on released CIA documents on how mind control has been secretly used for decades to affect both individual behavior and global politics, click here and here.
For seven generations, one European family has dominated an incredible part of all that money can buy. From its London and Paris banks, the family's millions have been sent forth to ... business enterprises on six continents. Some of its stately dwellings are the kind of mansions that mere San Simeons hoped to imitate. This ancient and unusual banking dynasty shields itself from the curious eye of the public, but the map and history of Europe have been changed by its action and etched with its name: the House of Rothschild. Seldom unimaginative in the use of their money, Rothschild gold has powered the ambitions of prime ministers, princes and popes. It has financed wars and reparations treaties, changed the course of politics and bailed out armies and nations. The Rothschilds strung railroads across the Continent, gained control of the Suez Canal [and] carved diamond mines in the African veld. The British Rothschilds [are still] the world's most important bullion dealers. No modern family ... has been so important for so long in European business. Newer dynasties such as the Rockefellers and the Fords have made more millions, but ... ledgers cannot reflect the Rothschild lands, their possessions and influence accumulated over the generations, their priceless collections of art. Today, the legend is very much alive—and being added to. The Rothschilds are striking out in many new directions behind a silver curtain of discretion. Rather than run companies by themselves, the Rothschilds often prefer to start or join syndicates, placing their men on boards to exert maximum influence with minimum investment risk. [They rely on] a far spreading network of agents, who seldom even admit that they are employed by the Rothschilds.
Note: To read the full, fascinating article, click here. The major media have very rarely exposed the power and wealth of the Rothschilds as in this article. Note that the article was written less than a month after the assassination of John F. Kennedy. Could it be because of some anger at the elite who killed Kennedy that this highly revealing article was actually published? For more on secret societies which command huge hidden power, see the deeply revealing reports from reliable major media sources available here.
The Air Force has sent its commands a warning to treat sightings of unidentified flying objects as "serious business" directly related to the nation's defense, it was learned today. An Air Force spokesman confirmed issuance of the directive after portions of it were made public by a private “flying saucer” group. The new regulations were issued by the Air Force inspector general Dec. 24. Existence of the document was revealed by the National Investigations Committee on Aerial Phenomena [NICAP]. The privately financed committee accused the Air Force of deception in publicly describing reports of unidentified flying objects as delusions and hoaxes while sending the private admonition to its commands. Vice Admiral R. H. Hillenkoetter (Ret.), a committee board member and former director of the Central Intelligence Agency, said ... "It is time for the truth to be brought out in open Congressional hearings. Behind the scenes, high-ranking Air Force officers are soberly concerned about the UFOs. But through official secrecy and ridicule, many citizens are led to believe the unknown flying objects are nonsense," the retired admiral said. He charged that "to hide the facts, the Air Force has silenced its personnel.
Note: If the above link fails, click here for a free copy of this article. Why would a former head of the CIA be claiming that Air Force officers are "soberly concerned" about UFOs? For an abundance of reliable, verifiable information on this major cover-up, click here
An investigator for the Air Forces stated that three so-called flying saucers had been recovered in New Mexico. They were described as being circular in shape with raised centers, approximately 50 feet in diameter. Each one was occupied by three bodies of human shape but only three feet tall, dressed in metallic cloth of a very fine texture. Each body was bandaged in a manner similar to the blackout suits used by speed fliers and test pilots. The saucers were found in New Mexico due to the fact that the Government has a very high powered radar set-up in that area and it is believed the radar interferes with the controlling mechanism of the saucers.
Note: Download this amazing document and view it on our website at this link. For an ABC news article discussing this, click here. Another FBI document shows FBI chief J. Edgar Hoover wanted "full access to discs recovered" at Roswell. For numerous highly revealing major media reports presenting strong evidence on UFOs, click here. For other reliable and inspiring information on this topic, visit our UFO Information Center.
Don’t want to get a vaccine for yourself or your child? Prepare to face the consequences. In the last month, a Detroit mother went to jail because she refused to vaccinate her child. Fifty people lost their jobs at a group of Midwestern hospitals and clinics because they declined a flu shot. And an Oregon university has blocked students from registering for classes unless they have a meningitis shot. All states have some vaccine requirements for public education—no shots, no school. All but three states - Mississippi, West Virginia and California - allow parents to send their child to school without vaccines based on some kind of non-medical exemption. In 2013, more than 90 percent of American children had been vaccinated for chicken pox, hepatitis B, measles, mumps and rubella, according to the Centers for Disease Control and Prevention. However, a significant number of people ... hesitate when a doctor offers them a vaccine. A new study released on Monday found that 27 percent of the parents surveyed could be classified as moderately or highly hesitant around vaccines. That same study found these people may be particularly concerned with the purity of vaccines. Increasingly, parents who choose not to vaccinate are warned of harsh penalties. People who choose not to vaccinate themselves may also face serious consequences. Some states have laws guiding which vaccinations people working at hospitals or other health care facilities must have; more often, requirements may be enshrined in a facility's policy, not in law.
Note: For more along these lines, see concise summaries of deeply revealing vaccine controversy news articles from reliable major media sources.
A human sacrifice has been staged in the grounds of the European Organisation for Nuclear Research, the home of the God Particle. A video circulating online shows hooded figures apparently engaging in a ritual, staged under a huge statue of a Hindu deity, at the end of which a woman is stabbed. The footage appears to have been recorded as part of a prank by scientists at Europe’s top physics lab, which serves as the home of the Large Hadron Collider. The identity and motives of those behind the video hasn’t yet been discovered. In the footage itself, multiple people are shown wearing long, flowing black robes – and one appears to have hiking boots on underneath. They are depicted walking around, before a woman moves onto the floor and is apparently stabbed. As that happens, the person who is supposedly recording the video appears to react – firing out expletives and apparently running away, which causes the camera to move away from the scene before it is cut off. A Cern spokesperson confirmed that the video had been filmed there, but said that it had been made without permission or knowledge. It’s far from the first time that scientific work has been associated with the occult or the mystical. Because of the highly-specialised – and often terrifying – work that goes on at Cern, it has become a haven of speculation.
Note: Was this sacrifice really faked? Watch the one-minute video available here. The opening of the huge Gotthard tunnel with its most bizarre, occult opening ceremony (as reported by BBC), occurred not long before this ritual. Watch a video filled with intriguing speculation on this and more. And to dive even deeper into what's going on with occult sacrifice, read this important article.
The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.
Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
The former National Security Agency contractor Edward J. Snowden said in a wide-ranging interview ... that the oversight of surveillance programs was so weak that members of the United States military working at the spy agency sometimes shared sexually explicit photos they intercepted. He also said the British government often pioneered the most invasive surveillance programs because its intelligence services operate with fewer restrictions intended to protect individual privacy than its counterparts in the United States and other allies. “In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive,” he said. “So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: ‘Oh, hey, that’s great. Send that to Bill down the way.’ ” Mr. Snowden said that type of sharing ... was “seen as the fringe benefits of surveillance positions.” He said that this was never reported and that the system for auditing surveillance programs was “incredibly weak.” Mr. Snowden had particularly stark criticism for the British government’s surveillance programs, because in Britain the respect for individual privacy, he said, “is not strongly encoded in law or policy.” Because it has fewer restrictions, British intelligence platforms “are used as a testing ground” for programs of all five intelligence partners, a group referred to as “Five Eyes,” which includes Britain, Canada, Australia, New Zealand and the United States.”
Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show. Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth. The agency ... deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products [called "backdoors"].
The Denver Post, on February 15th, ran an Associated Press article entitled "Homeland Security aims to buy 1.6b rounds of ammo". It confirmed that the Department of Homeland Security has issued an open purchase order for 1.6 billion rounds of ammunition. Some of this purchase order is for hollow-point rounds, forbidden by international law for use in war, along with a frightening amount specialized for snipers. Also reported elsewhere, at the height of the Iraq War the Army was expending less than 6 million rounds a month. Therefore 1.6 billion rounds would be enough to sustain a hot war for 20+ years. DHS now is [also] showing off its acquisition of heavily armored personnel carriers, repatriated from the Iraqi and Afghani theaters of operation. The Department of Homeland Security is apparently taking delivery (apparently through the Marine Corps Systems Command, Quantico VA, via the manufacturer – Navistar Defense LLC) of an undetermined number of [recently retrofitted] ‘Mine Resistant Protected’ MaxxPro MRAP vehicles for service on the streets of the United States.” Why would they need such over-the-top vehicles on U.S. streets to withstand IEDs, mine blasts, and 50 caliber hits to bullet-proof glass? In a war zone… yes, definitely. [But] on the streets of America?
Note: For a U.S. Army field manual titled "Internment and Resettlement Operations" (FM 3-39.40) describing how large numbers of American citizens could be sent to internment camps if involved in "terrorist" activities, click here. The introduction to this document states, "Commanders will use technology and conduct police intelligence operations to influence and control populations, evacuate detainees and, conclusively, transition rehabilitative and reconciliation operations to other functional agencies." For a disturbing report on the massive expansion of drones over US skies, click here.
It's the dark heart of Britain, the place where democracy goes to die, immensely powerful, equally unaccountable. But I doubt that one in 10 British people has any idea of what the Corporation of the City of London is and how it works. As Nicholas Shaxson explains in his fascinating book Treasure Islands, the Corporation exists outside many of the laws and democratic controls which govern the rest of the United Kingdom. The City of London is the only part of Britain over which parliament has no authority. This is ... an official old boys' network. In one respect at least the Corporation acts as the superior body: it imposes on the House of Commons a figure called the remembrancer: an official lobbyist who sits behind the Speaker's chair and ensures that, whatever our elected representatives might think, the City's rights and privileges are protected. The mayor of London's mandate stops at the boundaries of the Square Mile. The City has exploited this remarkable position to establish itself as a kind of offshore state, a secrecy jurisdiction which controls the network of tax havens housed in the UK's crown dependencies and overseas territories. This autonomous state within our borders is in a position to launder the ill-gotten cash of oligarchs, kleptocrats, gangsters and drug barons. It has also made the effective regulation of global finance almost impossible.
Note: To understand how democracy is easily circumvented, read this full article. For lots more from reliable sources on the hidden background to the control over governments held by financial powers, click here.
Mark Pittman, an investigative reporter for Bloomberg News ... filed a Freedom of Information Act request with the Federal Reserve Board, seeking the details of its unprecedented efforts to funnel money to the collapsing banks of Wall Street. That was in September 2008. Just more than a year later, Mr. Pittman ... died unexpectedly at age 52. But his cause has persevered. It is now known as Bloomberg L.P. v. Board of Governors of the Federal Reserve, an attempt to unlock the vault of the largest Wall Street rescue plan in decades — or, as the legal briefs put it, to “break down a wall of secrecy” that the Fed has kept in place for nearly two years in its “controversial use of public money to prop up financial institutions.” The Federal Reserve has wrapped itself in secrecy since the turn of the 20th century, when a select group of financiers met at the private Jekyll Island Club off the eastern coast of Georgia and, forgoing last names to preserve their anonymity among the staff, drafted legislation to create a central bank. Its secrecy, of course, persists today, with Ben S. Bernanke, the Federal Reserve chairman, refusing to tell even Congress which banks received government money under the bailout. There is also a heated battle to force the Fed to disclose its role in the controversial attempt to save the insurance giant American International Group.
Note: Isn't it interesting that Pittman died at age 52 while trying to expose manipulations of the big bankers? For a one-minute video proving the existence of a secret weapon which can cause an undetectable heart attack, click here. For a concise, excellent background on the hidden role of the Federal Reserve, click here.
Just before Christmas, the US President, Barack Obama, signed into law one of his country's biggest aid pledges of the year. It was bound not for Africa or any of the many struggling countries on the World Bank's list. It was a deal for $US2.77 billion ($3 billion) to go to Israel in 2010 and a total of $US30 billion over the next decade. Israel is bound by the agreement to use 75 per cent of the aid to buy military hardware made in the US. For the first time the US is also providing $US500 million to the Palestinian Authority, including $US100 million to train security forces, under the strict proviso that the authority's leadership recognises Israel. For many years Israel has been the largest recipient of US foreign aid, followed by Egypt ($US1.75 billion), which also receives most of its assistance in tied military aid. The Congressional Research Service says that the US spent 17 per cent of its total aid budget - or $US5.1 billion - on military aid in 2008, of which $US4.7 billion was grants to enable governments to receive equipment from the US.
Note: Israel's population is 7.5 million. If you do the math, the US is providing the equivalent of $4,000 in aid to every man, woman and child in Israel over the next decade, with $3,000 of that to buy US military hardware. For lots more on government-facilitated profiteering in the arms industry, click here and here.
If you want to encourage the kind of conspiracy theories that have prospered in the wake of last year’s financial crisis — those that describe a secret cabal of elites running the world — try doing the following: Have a group of 30 high-powered economists, government officials and bankers meet under the auspices of an international group that shares ideas on how to run the global financial architecture. Have your Board of Trustees led by an influential former Federal Reserve chairman who’s now working as a senior advisor to the president of the United States. Name the former vice chairman of bailout behemoth AIG as the group’s Chairman and CEO (It helps that he [is] former governor of the Bank of Israel). Ensure that membership includes the likes of these: A former Treasury Secretary and president of Harvard who also now works as a top presidential economic advisor; Citigroup’s senior vice chairman; a former IMF deputy managing director and the current governor of the Bank of Israel; and top representatives of the world’s four most important central banks. Hold two days of closed-door meetings at the New York Fed. Do not publicize a list of attendees and leave everyone guessing about the agenda. These were the circumstances surrounding Friday’s start to the 62nd plenary meetings of the Group of 30, whose formal name is “The Consultative Group on International Economic and Monetary Affairs, Inc.”
Note: The article interestingly then goes on to claim that this secret meeting of the world's top bankers is not really anything to worry about, that they are really working for the public good. If so, why not have the meeting open and widely covered by the press? For many other revealing articles from major media reports on secret societies and secret meetings of the most rich and powerful people in our world, click here.
Every phone call, text message, email and website visit made by private citizens is to be stored for a year and will be available for monitoring by government bodies. All telecoms companies and internet service providers will be required by law to keep a record of every customerâ€™s personal communications, showing who they have contacted, when and where, as well as the websites they have visited. Despite widespread opposition to the increasing amount of surveillance in Britain, 653 public bodies will be given access to the information, including police, local councils, the Financial Services Authority, the ambulance service, fire authorities and even prison governors. They will not require the permission of a judge or a magistrate to obtain the information, but simply the authorisation of a senior police officer or the equivalent of a deputy head of department at a local authority. The Government announced yesterday it was pressing ahead with privately held â€śBig Brotherâ€ť databases that opposition leaders said amounted to â€śstate-spyingâ€ť and a form of â€ścovert surveillanceâ€ť on the public. It is doing so despite its own consultation showing that it has little public support. The new rules ... will not only force communications companies to keep their records for longer, but to expand the type of data they keep to include details of every website their customers visit.
Note: For many more reports from major media sources on the disturbing trend toward increasing government and corporate surveillance and loss of privacy, click here.
In 2006 and 2007, Goldman Sachs Group peddled more than $40 billion in securities backed by at least 200,000 risky home mortgages, but never told the buyers it was secretly betting that a sharp drop in U.S. housing prices would send the value of those securities plummeting. Goldman's sales and its clandestine wagers, completed at the brink of the housing market meltdown, enabled one of the nation's premier investment banks to pass most of its potential losses to others before a flood of mortgage loan defaults staggered the U.S. and global economies. Only later did investors discover that what Goldman promoted as triple-A investments were closer to junk. Now, pension funds, insurance companies, labor unions and foreign financial institutions that bought those dicey mortgage securities are facing large losses, and a five-month McClatchy Newspapers investigation has found that Goldman's failure to disclose that it made secret, exotic bets on an imminent housing crash may have violated securities laws. "The Securities and Exchange Commission should be very interested in any financial company that secretly decides a financial product is a loser and then goes out and actively markets that product or very similar products to unsuspecting customers without disclosing its true opinion," said Laurence Kotlikoff, a Boston University economics professor who's proposed a massive overhaul of the nation's big banks. "This is fraud and should be prosecuted."
Note: For an eye-opening, powerful PBS video which reveals how the economic crisis was conscously allowed to happen, click here. It reveals that Fed chairman Alan Greenspan was against investigating any fraud. For many reports from reliable sources on corruption at the core of the Wall Street collapse and bailout, click here.
Long-secret security tapes showing the chaos immediately after the 1995 bombing of the Oklahoma City federal building are blank in the minutes before the blast and appear to have been edited, an attorney who obtained the recordings said Sunday. "The real story is what's missing," said Jesse Trentadue, a Salt Lake City attorney who obtained the recordings through the federal Freedom of Information Act as part of an unofficial inquiry he is conducting into the April 19, 1995, bombing that killed 168 people and injured hundreds more. The tapes turned over by the FBI came from security cameras various companies had mounted outside office buildings near the Alfred P. Murrah Federal Building. They are blank at points before 9:02 a.m., when a truck bomb carrying a 4,000-pound fertilizer-and-fuel-oil bomb detonated in front of the building, Trentadue said. "Four cameras in four different locations going blank at basically the same time on the morning of April 19, 1995. There ain't no such thing as a coincidence," Trentadue said. He said government officials claim the security cameras did not record the minutes before the bombing because "they had run out of tape" or "the tape was being replaced." "The absence of footage from these crucial time intervals is evidence that there is something there that the FBI doesn't want anybody to see." Trentadue said he is seeking more tapes along with a variety of bombing-related documents from the FBI and the CIA. An FOIA request by Trentadue for 26 CIA documents was rejected in June. A letter from the National Geospatial-Intelligence Agency, which reviewed the documents, said their release "could cause grave damage to our national security."
Note: This revealing article also tells how Trentadue's brother was murdered by FBI agents who mistakenly thought his brother was the bomber. For more valuable information on this and other evidence challenging the official story of the Oklahoma City bombing, click here.
David Frost: Does anyone know exactly who was responsible for this assassination attempt? There is one report that said that you arranged to send President Musharraf a letter ... in the event of your death by assassination, urging him to investigate certain individuals in his government. Is that true? Benazir Bhutto: Yes it is true that I wrote to General Musharraf. I feel these are the forces that really want to stop not just me, but the democratic process and the will of the people [from] triumphing. David Frost: In terms of these three people you mentioned where they members of or associated with the government? Benazir Bhutto: One of them is a very key figure in security. He is a former military officer. He is someone who has had dealings with Jaish-e-Mohammad, one of the band [of] groups of Maulana Masood Azhar, who was in an Indian jail for decapitating three British tourists and three American tourists. And he also had dealings with Omar Shiekh, who murdered Osama bin Laden.
Note: The key statement on bin Laden's murder happens at minute five in the video at the above link. If the link fails, click here. For a Jan. 9, 2010 BBC article also suggesting bin Laden may already have been dead years earlier and that his death had been covered up, click here. Bhutto was assassinated not long after this interview on Dec. 27, 2007.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.