Big Brother News ArticlesExcerpts of Key Big Brother News Articles in Media
At request of Brigadier General George F. Schulgen, Chief of the Requirements Intelligence Branch of Army Air Corps Intelligence, Special Agent [deleted] discussed the above captioned matter with him on July 9, 1947. General Schulgen indicated to [deleted] that the Air Corps has taken the attitude that every effort must be undertaken in order to run down and ascertain whether or not the flying disks are a fact and, if so, to learn all about them. He advised that to complete the picture he desired the assistance of the Federal Bureau of Investigation in locating and questioning the individuals who first sighted the so-called flying disks in order to ascertain whether or not they are sincere in their statements that they saw these disks. [Deleted] indicated that it was his attitude that the flying disks are not the result of any Army or Navy experiments. He stated that he was of the opinion that the Bureau, if at all possible, should accede to General Schulgen's request. [FBI Director J. Edgar Hoover's handwritten response:] I would do it but before agreeing to it we must insist upon full access to discs recovered. For instance in the Sa. case the army grabbed it and would not let us have it for cursory investigation.
Note: The excerpt above is from pages 44 and 45 of the rich collection of declassified FBI documents on UFOs at the link above. If the link fails, click here. Note that this was just days after the Roswell crash. For lots more solid evidence of a major UFO cover-up, see our UFO Information Center at this link. Why hasn't this been widely reported and become public knowledge? For a possible answer, click here.
Regulators have approved the first drug with a sensor that alerts doctors when the medication has been taken. The digital pill combines two existing products: the former blockbuster psychiatric medication Abilify - long used to treat schizophrenia and bipolar disorder - with a sensor tracking system first approved in 2012. Experts say the technology could be a useful tool, but it will also change how doctors relate to their patients as they’re able to see whether they are following instructions. The pill has not yet been shown to actually improve patients’ medication compliance, a feature insurers are likely to insist on before paying for the pill. Additionally, patients must be willing to allow their doctors and caregivers to access the digital information. The technology carries risks for patient privacy, too, if there are breaches of medical data or unauthorized use as a surveillance tool, said James Giordano, a professor of neurology at Georgetown University Medical Center. “Could this type of device be used for real-time surveillance? The answer is of course it could,” said Giordano. The new pill, Abilify MyCite, is embedded with a digital sensor that is activated by stomach fluids, sending a signal to a patch worn by the patient and notifying a digital smartphone app that the medication has been taken.
Note: In 2010, it was quietly reported that Novartis AG would be seeking regulatory approval for such "chip-in-a-pill technology". For more along these lines, see concise summaries of deeply revealing news articles on microchip implants and the disappearance of privacy.
My biggest battle with the NSA came before my book [The Puzzle Palace] was even published. I had obtained the criminal file that the Justice Department had opened on the NSA. Marked as Top Secret, the file was so sensitive that only two original copies existed. Never before or since has an entire agency been the subject of a criminal investigation. Senior officials at the NSA were even read their Miranda rights. Issued on June 6, 1975, the report noted that both the NSA and CIA had engaged in questionable and possibly illegal electronic surveillance. As a result, Attorney General Edward Levi established a secret internal task force to look into the potential for criminal prosecution. Focusing particularly on NSA, the task force probed more deeply into domestic eavesdropping than any part of the executive branch had ever done before. The report’s prosecutive summary also pointed to the NSA’s top-secret “charter” issued by the Executive Branch, which exempts the agency from legal restraints placed on the rest of the government. This ... meant the NSA did not have to follow any restrictions placed on electronic surveillance “unless it was expressly directed to do so.” In short, the report asked, how can you prosecute an agency that is above the law? More than three decades later, the NSA, like a mom-and-pop operation that has exploded into a global industry, now employs sweeping powers of surveillance that Frank Church could scarcely have imagined in the days of wired phones and clunky typewriters. At the same time, the Senate intelligence committee he once chaired has done an about face, protecting the agencies from the public rather than the public from the agencies. Without adequate oversight, or penalties for abuse, the only protection that citizens have comes not from Congress or the courts, but from whistleblowers.
Note: James Bamford is the courageous ABC producer and investigative reporter who first exposed the declassified Operation Northwoods files in the May of 2001. These files showed beyond a shadow of a doubt that the top Pentagon generals were willing to carry out false flag terrorism activities which would kill innocent civilians in order to foment war fever against Cuba. Yet only ABC News out of all the major media outlets was willing to report this most shocking news. Don't miss the entire, highly revealing article by Bamford at the link above.
Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. [90% of] account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. [Many] files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year. The files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal. GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not. In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally. Yahoo ... denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy". Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012. The system, eerily reminiscent of the telescreens evoked in George Orwell's Nineteen Eighty-Four, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs. Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds ... to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
The White House's expert NSA panel may have made headlines ... for telling President Barack Obama to knock off the collection of Americans' meta-data, but surveillance experts said they were surprised that the panel also took to task some controversial non-NSA-related spy tactics as well. One recommendation was to impose much stricter oversight on the FBI's ability to issue National Security Letters (NSLs), which have been used to obtain telephone call records and credit reports in terrorism and espionage cases. Another even more peculiar recommendation by the five national security experts ... was their advice that "governments" shouldn't hack into bank accounts and drain funds. "Governments should not use their offensive cyber capabilities to change the amounts held in financial accounts or otherwise manipulate the financial systems," the unanimous Review Group on Intelligence and Communications Technologies report warned Obama. "That was a strangely specific recommendation for something nobody was talking about," Kel McClanahan, executive director of government transparency group National Security Counselors, told ABC News. Michelle Richardson, the American Civil Liberties Union's legislative council in Washington, also said the findings on "NSLs" and government hacking were unexpected -- but welcomed.
Note: The fact that this expert panel would even mention governments manipulating financial accounts suggests that if it hasn't already happened, some were seriously considering this. For lots more on this strange news, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
British and American intelligence agencies had a comprehensive list of surveillance targets that included the EU's competition commissioner, German government buildings in Berlin and overseas, and the heads of institutions that provide humanitarian and financial help to Africa, top-secret documents reveal. The papers show GCHQ [and the NSA were] targeting organisations such as the United Nations development programme, the UN's children's charity Unicef and Médecins du Monde, a French organisation that provides doctors and medical volunteers to conflict zones. The head of the Economic Community of West African States (Ecowas) also appears in the documents, along with text messages he sent to colleagues. One GCHQ document, drafted in January 2009, makes clear that the agencies were targeting an email address listed as belonging to another important American ally – the "Israeli prime minister". Ehud Olmert was in office at the time. Three further Israeli targets appeared on GCHQ documents, including another email address understood to have been used to send messages between the then Israeli defence minister, Ehud Barak, and his chief of staff, Yoni Koren. The names and details are the latest revelations to come from documents leaked by the whistleblower Edward Snowden. They provoked a furious reaction. The disclosures reflect the breadth of targets sought by the agencies, which goes far beyond the desire to intercept the communications of potential terrorists and criminals, or diplomats and officials from hostile countries.
Note: Later reports revealed that GHCQ also targeted the global human rights organization Amnesty International. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
“The Brothers” is a riveting chronicle of government-sanctioned murder, casual elimination of “inconvenient” regimes, relentless prioritization of American corporate interests and cynical arrogance on the part of two men. John Foster Dulles and his brother, Allen, were ... lawyers, partners in the immensely powerful firm of Sullivan & Cromwell. John Foster Dulles served as secretary of state from 1953 to 1959; his brother ran the C.I.A. from 1953 to 1961. In his detailed, wellconstructed and highly readable book, Stephen Kinzer ... shows how the brothers drove America’s interventionist foreign policy. Kinzer highlights John Foster Dulles’s central role in channeling funds from the United States to Nazi Germany in the 1930s. Sullivan & Cromwell floated bonds for Krupp A. G., the arms manufacturer, and also worked for I. G. Farben, the chemicals conglomerate that later manufactured Zyklon B, the gas used to murder millions of Jews. For the Dulles brothers, and for much of the American government, threats to corporate interests were categorized as support for communism. There are also reminders in Kinzer’s book of dark events in the history of American intelligence. Sixty years ago, Frank Olson, a C.I.A. officer, was reported to have jumped to his death during mind-control experiments “in which psychoactive drugs were administered to unknowing victims.” But last year, Kinzer reports, Olson’s family filed suit, claiming he had actually been murdered after visiting secret C.I.A. prisons in Europe.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
When Ban Ki-moon, the United Nations secretary general, sat down with President Obama at the White House in April to discuss Syrian chemical weapons, Israeli-Palestinian peace talks and climate change, it was a cordial, routine exchange. The National Security Agency nonetheless went to work in advance and intercepted Mr. Ban’s talking points for the meeting, a feat the agency later reported as an “operational highlight” in a weekly internal brag sheet. It was emblematic of an agency that for decades has operated on the principle that any eavesdropping that can be done on a foreign target of any conceivable interest — now or in the future — should be done. After all, American intelligence officials reasoned, who’s going to find out? From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as foes, as has become obvious in recent weeks; the agency’s official mission list includes using its surveillance powers to achieve “diplomatic advantage” over such allies as France and Germany and “economic advantage” over Japan and Brazil, among other countries. The scale of eavesdropping by the N.S.A., with 35,000 workers and $10.8 billion a year, sets it apart.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden. The confidential memo reveals that the NSA encourages senior officials in its "customer" departments, such as the White House, State and the Pentagon, to share their "Rolodexes" so the agency can add the phone numbers of leading foreign politicians to their surveillance systems. The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately "tasked" for monitoring by the NSA. The revelation is set to add to mounting diplomatic tensions between the US and its allies, after the German chancellor Angela Merkel ... accused the US of tapping her mobile phone. The NSA memo obtained by the Guardian suggests that such surveillance was not isolated, as the agency routinely monitors the phone numbers of world leaders – and even asks for the assistance of other US officials to do so. The memo, dated October 2006 and which was issued to staff in the agency's Signals Intelligence Directorate (SID), was titled "Customers Can Help SID Obtain Targetable Phone Numbers". In the wake of the Merkel row, the US is facing growing international criticism that any intelligence benefit from spying on friendly governments is far outweighed by the potential diplomatic damage.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The problem and the risk [with surveillance by GCHQ] comes in the area of mass capture of data, or strategic surveillance. This is the kind of intelligence gathering that sucks in data from everyone, everywhere: from phones, internet use from email to website visits, social networking, instant messaging and video calls, and even areas such as video gaming; in short, everything digital. In the US, the Prism programme may have given the NSA access to the servers of companies such as Google and Facebook; in the UK, GCHQ has gained a similar degree of access via its Tempora programme, and the two of them together have a cable- and network-tapping capabilities collectively called Upstream, which have the ability to intercept anything that travels over the internet. This data is fed into a database called XKeyscore, which allows analysts to extract information "in real time", ie immediately. What this adds up to is a new thing in human history: with a couple of clicks of a mouse, an agent of the state can target your home phone, or your mobile, or your email, or your passport number, or any of your credit card numbers, or your address, or any of your log-ins to a web service. Using that "selector", the state can get access to all the content of your communications, via any of those channels; can gather information about anyone you communicate with, can get a full picture of all your internet use, can track your location online and offline. It can, in essence, know everything about you, including – thanks to the ability to look at your internet searches – what's on your mind.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
One of the most overlooked aspects of the NSA reporting in the US has been just how global of a story this has become. Last week it was revealed that Belgium's largest telecom, Belgacom, was the victim of a massive hacking attack which systematically compromised its system for as long as two years. Last week, using documents obtained from NSA whistleblower Edward Snowden, Laura Poitras and other Der Spiegel journalists reported in that paper that it was the GCHQ, Britain's intelligence agency, that was behind the attack. According to that report, the attack was carried out by targeting individual engineers at the telecom with malware that allowed GCHQ agents to "own" their computer and thus exploit their access to the telecommunications system. As the US and UK run around the world protesting the hacking activities of others and warning of the dangers of cyber-attacks, that duo is one of the most aggressive and malicious, if not the most aggressive and malicious, perpetrators of those attacks of anyone on the planet. Nobody hacks as prolifically and aggressively as the two countries who most vocally warn of the dangers of hacking. A coalition called Stop Watching Us has been formed by privacy and civil liberties groups from across the political spectrum. On October 26, the 12th anniversary of the enactment of the Patriot Act, they will hold an anti-surveillance rally in Washington DC.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
[Barrett] Brown is not a household name like Edward Snowden or Bradley Manning. But after helping expose a dirty tricks plot, he faces jail. Brown made a splash in February 2011 by helping to uncover "Team Themis", a project by intelligence contractors retained by Bank of America to demolish the hacker society known as Anonymous. The Team Themis story began in late 2010, when Julian Assange warned WikiLeaks would release documents outlining an "ecosystem of corruption [that] could take down a bank or two." Bank of America went into damage-control mode and, as the New York Times reported, assembled "a team of 15 to 20 top Bank of America officials … scouring thousands of documents in the event that they become public." Days later, Bank of America retained the well-connected law firm of Hunton & Williams [which] "proposed various schemes to attack" WikiLeaks. Its partners suggested creating false documents and fake personas to damage progressive organizations. The tech companies' emails – which Anonymous hacked and Barrett Brown helped publicize – listed planned tactics: "Feed[ing] the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error." Brown [has] been cooling his heels in a jail outside Dallas ... awaiting two separate trials that could put him on ice for more than 100 years. In contrast to the FBI's aggressive pursuit of Brown, no probe of the Team Themis project was launched – despite a call from 17 US House representatives to investigate a possible conspiracy to violate federal laws.
Note: With the wide focus on the privatized national security state by the leaks from Edward Snowden, there is renewed interest in Brown's plight and the campaign for justice in his case. For more on this and to support Barret Brown, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.
On December 7, 1941, Japanese war planes bombed the U.S. naval base at Pearl Harbor, Hawaii. Six decades later, Al Qaeda terrorists flew hijacked airplanes into the World Trade Center and the Pentagon. Neither President Franklin Roosevelt nor President George W. Bush targeted and killed Americans on U.S. soil in the aftermath of those attacks. Doing so wouldn't have made any sense. How strange, then, that Attorney General Eric Holder invoked those very attacks in a letter confirming that President Obama believes there are circumstances in which he could order Americans targeted and killed on U.S. soil. "It is possible ... for the President to authorize the military to use lethal force within the territory of the United States," he wrote. "The President could conceivably have no choice but to authorize the military to use such force if necessary to protect the homeland in the circumstances of a catastrophic attack like the ones suffered on December 7, 1941 and on September 11, 2001." The very scenario to be guarded against is a president using the pretext of a terrorist attack to seize extraordinary powers. Isn't that among the most likely scenarios for the United States turning into an authoritarian security state?
The U.S. government is legally justified in killing its own citizens overseas if they are involved in plotting terror attacks against America, Attorney General Eric Holder said [on March 5], offering the Obama administration's most detailed explanation so far of its controversial targeted killing program. The Fifth Amendment provides that no one can be "deprived of life" without due process of law. But that due process, Holder said, doesn't necessarily come from a court. "Due process and judicial process are not one and the same, particularly when it comes to national security. The Constitution guarantees due process, not judicial process," the attorney general said. The ACLU called Holder's explanation "a defense of the government’s chillingly broad claimed authority to conduct targeted killings of civilians, including American citizens, far from any battlefield without judicial review or public scrutiny." "Few things are as dangerous to American liberty as the proposition that the government should be able to kill citizens anywhere in the world on the basis of legal standards and evidence that are never submitted to a court, either before or after the fact," said Hina Shamsi, director of the ACLU’s National Security Project. "Anyone willing to trust President Obama with the power to secretly declare an American citizen an enemy of the state and order his extrajudicial killing should ask whether they would be willing to trust the next president with that dangerous power,” she said. The ACLU is suing the Obama administration, seeking to have documents regarding the targeted killing program made public.
Note: Attorney General Holder's claim that US citizens can be killed by the government without judicial process clearly violates the U.S. Bill of Rights. In addition to the Fifth Amendment that states that no person shall be held to answer for a crime "without due process of law," the Sixth Amendment states that "the accused shall enjoy the right to a speedy and public trial."
In December 2003, security forces boarded a bus in Macedonia and snatched a German citizen named Khaled el-Masri. For the next five months, el-Masri was a ghost. Only a select group of CIA officers knew he had been whisked to a secret prison for interrogation in Afghanistan. But he was the wrong guy. In the years since the Sept. 11, 2001, terrorist attacks, officers who committed serious mistakes that left people wrongly imprisoned or even dead have received only minor admonishments or no punishment at all. Many officers who made significant missteps are now the senior managers fighting the president's spy wars. The AP investigation of the CIA's actions revealed a disciplinary system that takes years to make decisions, hands down reprimands inconsistently and is viewed inside the agency as prone to favoritism and manipulation. When people are disciplined, the punishment seems to roll downhill, sparing senior managers even when they were directly involved in operations that go awry. Two officers involved in the death of a prisoner in Afghanistan, for instance, received no discipline and have advanced into Middle East leadership positions. Other officers were punished after participating in a mock execution in Poland and playing a role in the death of a prisoner in Iraq. Those officers retired, then rejoined the intelligence community as contractors. Since 9/11, retired CIA officers have published a variety of books opining on what ails the CIA. Their conclusions differ, but they are in nearly unanimous agreement that the system of accountability is broken.
Note: It is great news that the media is now revealing some of the craziness at the CIA, a topic that was almost taboo for the press in the past.
United States taxpayers have funneled more than $60 billion of aid into Egypt since President Hosni Mubarak came to power in 1981, but more than half of the money has been spent supplying weapons to the country’s military. About $34 billion of the aid to Egypt has come in the form of grants that Congress requires Egypt to spend on American military hardware. In recent years the large amount of aid earmarked for the military, and the relatively low sums supporting civilian aid, have attracted scathing criticism from Egyptians, some of whom argue that US aid has gone to entrench a military dictator at the expense of the fledgling democracy activists. During the early turmoil, protesters were the target of tear gas canisters that read "made in the USA," fueling debate about the aid. Last year, Egypt was the fifth-largest recipient of US aid, getting $1.6 billion. Congress ... authorized major aid packages to both [Egypt and Israel in 1979], using an informal formula — not enshrined in the peace treaty — that gave Egypt $2 for every $3 that Israel received. Israel quickly became the largest recipient of US aid, and Egypt the second-largest — rankings that were only recently overtaken by wars in Afghanistan and Iraq, and last year, the disaster in Haiti. The strong interest of US companies could help explain why US military assistance to Egypt has remained at $1.3 billion a year, while its civilian economic assistance has steadily shrunk, from $815 million a decade ago to $250 million requested for 2011. The decline began in 1998, when Israel arranged for a reduction in economic support and an increase military aid. As Israeli’s economic aid shrunk, so too did Egypt’s.
Note: Israel receives about $3 billion a year from the US, yet the population of the country is 8 million. If you do the math, the US is providing the equivalent of nearly $4,000 in aid per year to every man, woman and child in Israel, with $3,000 of that to buy US military hardware. For lots more reliable information on how the military/industrial complex manipulates world politics to support the war machine, click here and here.
On top of everything Lehman Brothers did before it collapsed in 2008, nearly toppling the financial system, it now seems that it was aggressively massaging its books. A new report on the Lehman collapse, released last week ... would leave anyone dumbstruck by the firm’s audacity — and reminded of the crying need for adult supervision of Wall Street. The 2,200-page report [finds that] Lehman engaged in transactions that let it temporarily shift troubled assets off its books and in so doing, hide its reliance on borrowed money. The maneuvers ... made the firm appear healthier than it was. [The author, Anton R. Valukas, a former federal prosecutor,] wrote that Richard S. Fuld Jr., Lehman’s former chief executive, was “at least grossly negligent,” and that Lehman executives engaged in “actionable balance sheet manipulation.” According to the report, rating agencies, government regulators and Lehman’s board of directors had no clue about the gimmicks. The result is that we were all blindsided. And we could be blindsided again. Congress is not even close to passing meaningful regulatory reform. The surviving banks have only gotten bigger and more politically powerful. If the Valukas report is not a wake-up call, what would be?
Note: The Lehman report is described in detail here. For revealing information showing how the US Treasury Department continues to fight against a much-needed audit of the Federal Reserve, click here. For a great collection of revealing reports from reliable sources on the hidden realities behind the financial crisis and government bailouts of the biggest financial corporations, click here.
[Here's a story] from Ellsberg's book Secrets. The setting is a meeting with Henry Kissinger in late 1968. In 1968 Ellsberg was a highly respected analyst ... who had worked for both the Pentagon and Rand, and Kissinger was just entering the government. Ellsberg told him, "Henry, there's something I would like to tell you. You've dealt a great deal with top secret information. But you're about to receive a whole slew of special clearances, maybe fifteen or twenty of them, that are higher than top secret. First, you'll be exhilarated by some of this new information. But second, ... you will feel like a fool for having studied, written, talked about these subjects, criticized and analyzed decisions made by presidents for years without having known of the existence of all this information. In particular, you'll feel foolish for having literally rubbed shoulders for over a decade with some officials and consultants who did have access to all this ... and you'll be stunned that they kept that secret from you so well. You will feel like a fool. Then, after you've ... become used to using what amounts to whole libraries of hidden information, ... you will forget there ever was a time when you didn't have it. You'll be aware only of the fact that you have it now and most others don't ... and that all those other people are fools. [In] a matter of two or three years — you'll eventually become aware of the limitations of this information. It's often inaccurate, and it can lead you astray. But that takes a while to learn. In the meantime ... you will deal with a person who doesn't have those clearances only from the point of view of what you want him to believe and what impression you want him to go away with. You'll have to lie carefully to him about what you know. In effect, you will have to manipulate him.
Note: Don't miss the entire fascinating, highly revealing article at the link above. To see this quote from Ellsberg's book on Google books, click here. For more on government secrets, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.