As of March 26, we're $27,100 in the red for the quarter. Donate here to support this vital work
Subscribe here and join over 13,000 subscribers to our free weekly newsletter

Big Brother News Stories

Below are key excerpts of revealing news articles on Big Brother from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

Explore our comprehensive news index on a wide variety of fascinating topics.
Explore the top 20 most revealing news media articles we've summarized.
Check out 10 useful approaches for making sense of the media landscape.

Sort articles by: Article Date | Date Posted on WantToKnow.info | Importance

Bush Signs Law to Widen Legal Reach for Wiretapping
2007-08-06, New York Times
Posted: 2007-08-09 08:46:41
http://www.nytimes.com/2007/08/06/washington/06nsa.html?ex=1344052800&en=5e75...

President Bush signed into law ... legislation that broadly [expands] the governments authority to eavesdrop on the international telephone calls and e-mail messages of American citizens without warrants. The law [goes] far beyond the small fixes that administration officials had said were needed to gather information about foreign terrorists [and will] sharply alter the legal limits on the governments ability to monitor millions of phone calls and e-mail messages going in and out of the United States. The new law for the first time [provides] a legal framework for much of the surveillance without warrants that was being conducted in secret by the National Security Agency and outside the Foreign Intelligence Surveillance Act, the 1978 law that is supposed to regulate the way the government can listen to the private communications of American citizens. This more or less legalizes the N.S.A. program, said Kate Martin, director of the Center for National Security Studies in Washington. Previously, the government needed search warrants approved by a special intelligence court to eavesdrop on ... electronic communications between individuals inside the United States and people overseas. The new law gives the attorney general and the director of national intelligence the power to approve the international surveillance, rather than the special intelligence court. The law also gave the administration greater power to force telecommunications companies to cooperate with such spying operations. The companies can now be compelled to cooperate by orders from the attorney general and the director of national intelligence.


Chips: High Tech Aids or Tracking Tools?
2007-07-22, ABC News/Associated Press
Posted: 2007-08-03 08:29:14
http://www.abcnews.go.com/Technology/wireStory?id=3402044

CityWatcher.com, a provider of surveillance equipment, attracted little notice itself until a year ago, when two of its employees had glass-encapsulated microchips with miniature antennas embedded in their forearms. The "chipping" of two workers with RFIDs radio frequency identification tags ... was merely a way of restricting access to ... sensitive data and images ... the company said. Innocuous? Maybe. But the news that Americans had, for the first time, been injected with electronic identifiers to perform their jobs fired up a debate over the proliferation of ever-more-precise tracking technologies and their ability to erode privacy in the digital age. To some, the ... notion of tagging people was Orwellian. Chipping, these critics said, might start with Alzheimer's patients or Army Rangers, but would eventually be suggested for convicts, then parolees, then sex offenders, then illegal aliens until one day, a majority of Americans, falling into one category or another, would find themselves electronically tagged. "It was scary that a government contractor that specialized in putting surveillance cameras on city streets was the first to incorporate this technology in the workplace," says Liz McIntyre, co-author of Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID. Within days of the company's announcement, civil libertarians and Christian conservatives joined to excoriate the microchip's implantation in people.

Note: For educated speculation on how certain powerful people might like to have everyone implanted with microchips for security and control purposes, click here.


FBI Plans Initiative To Profile Terrorists
2007-07-11, Washington Post
Posted: 2007-07-21 07:45:44
http://www.washingtonpost.com/wp-dyn/content/article/2007/07/10/AR20070710018...

The Federal Bureau of Investigation is developing a computer-profiling system that would enable investigators to target possible terror suspects. The System to Assess Risk, or STAR, assigns risk scores to possible suspects based on a variety of information, similar to the way a credit bureau assigns a rating based on a consumer's spending behavior and debt. The program focuses on foreign suspects but also includes data about some U.S. residents. Some lawmakers said ... that the report raises new questions about the government's power to use personal information and intelligence without accountability. "The Bush administration has expanded the use of this technology, often in secret, to collect and sift through Americans' most sensitive personal information," said Sen. Patrick J. Leahy (D-Vt.), chairman of the Senate Judiciary Committee. The use of data mining in the war on terror has sparked criticism. An airplane-passenger screening program called CAPPS II was revamped and renamed because of civil liberty concerns. An effort to collect Americans' personal and financial data called Total Information Awareness was killed. Law enforcement and national security officials have continued working on other programs to use computers to sift through information for signs of threats. The Department of Homeland Security, for example, flags travelers entering and leaving the United States who may be potential suspects through a risk-assessment program called the Automated Targeting System.


FBI Would Skirt the Law With Proposed Phone Record Program, Experts Say
2007-07-10, ABC News blog
Posted: 2007-07-21 07:42:01
http://blogs.abcnews.com/theblotter/2007/07/fbi-would-skirt.html

A proposed new FBI program would skirt federal laws by paying private companies to hold millions of phone and Internet records which the bureau is barred from keeping itself, experts say. The $5 million project would apparently pay private firms to store at least two years' worth of telephone and Internet activity by millions of Americans, few of whom would ever be considered a suspect in any terrorism, intelligence or criminal matter. The FBI is barred by law from collecting and storing such data if it has no connection to a specific investigation or intelligence matter. In recent years the bureau has tried to encourage telecommunications firms to voluntarily store such information, but corporations have balked at the cost of keeping records they don't need."The government isn't allowed to warehouse the information, and the companies don't want to, so this creates a business incentive for the companies to warehouse it, so the government can access it later," said Mike German, a policy expert on national security and privacy issues for the American Civil Liberties Union (ACLU)."It's a public-private partnership that puts civil liberties to the test." In March, an FBI official identified the companies as Verizon, MCI and AT&T.Even the bureau's own top lawyer said she found the [FBI's] behavior "disturbing," noting that when requesting access to phone company records, it repeatedly referenced "emergency" situations that did not exist, falsely claimed grand juries had subpoenaed information and failed to keep records on much of its own activity.


Judges OK warrantless monitoring of Web use
2007-07-07, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2007-07-11 11:37:16
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/07/07/BAGMNQSJDA1.DTL

Federal agents do not need a search warrant to monitor a suspect's computer use and determine the e-mail addresses and Web pages the suspect is contacting, a federal appeals court ruled Friday. In a drug case from San Diego County, the Ninth U.S. Circuit Court of Appeals in San Francisco likened computer surveillance to the "pen register" devices that officers use to pinpoint the phone numbers a suspect dials, without listening to the phone calls themselves. In Friday's ruling, the court said computer users should know that they lose privacy protections with e-mail and Web site addresses when they are communicated to the company whose equipment carries the messages. The search is no more intrusive than officers' examination of a list of phone numbers or the outside of a mailed package, neither of which requires a warrant, Judge Raymond Fisher said in the 3-0 ruling. Defense lawyer Michael Crowley disagreed. His client, Dennis Alba, was sentenced to 30 years in prison after being convicted of operating a laboratory in Escondido that manufactured the drug ecstasy. Some of the evidence against Alba came from agents' tracking of his computer use. The court upheld his conviction and sentence. Expert evidence in Alba's case showed that the Web addresses obtained by federal agents included page numbers that allowed the agents to determine what someone read online, Crowley said. The ruling "further erodes our privacy," the attorney said. "The great political marketplace of ideas is the Internet, and the government has unbridled access to it."

Note: So now every email you send and read can be monitored legally. Why didn't this make news headlines?


Files on Illegal Spying Show C.I.A. Skeletons From Cold War
2007-06-26, New York Times
Posted: 2007-07-06 08:41:10
http://www.nytimes.com/2007/06/27/washington/27cia.html?ex=1340596800&en=3fa7...

Long-secret documents released Tuesday provide new details about how the Central Intelligence Agency illegally spied on Americans decades ago. Known inside the agency as the family jewels, the 702 pages of documents released Tuesday catalog domestic wiretapping operations, failed assassination plots, mind-control experiments and spying on journalists from the early years of the C.I.A. The papers provide evidence of paranoia and occasional incompetence as the agency began a string of illegal spying operations in the 1960s and 1970s, often to hunt links between Communist governments and the domestic protests that roiled the nation in that period. Yet the long-awaited documents leave out a great deal. Large sections are censored, showing that the C.I.A. still cannot bring itself to expose all the skeletons in its closet. And many activities about overseas operations disclosed years ago by journalists, Congressional investigators and a presidential commission which led to reforms of the nations intelligence agencies are not detailed in the papers. The 60-year-old agency has been under fire ... by critics [of] the secret prisons and harsh interrogation practices it has adopted since the Sept. 11 attacks. Some intelligence experts suggested ... that the release of the documents was intended to distract from the current controversies. And they and historians expressed disappointment that the documents were so heavily censored. Tom Blanton of the National Security Archive, the research group that filed the Freedom of Information request in 1992 that led to the documents becoming public, said he was initially underwhelmed by them because they contained little about the agencys foreign operations. But Mr. Blanton said what was striking was the scope of the C.I.As domestic spying efforts.

Note: The entire body of the CIA's "Family Jewels" documents have been posted online by the National Security Archives, and can be read by clicking here.


Special Operations Prepared for Domestic Missions
2007-06-22, washingtonpost.com
Posted: 2007-07-06 08:23:16
http://blog.washingtonpost.com/earlywarning/2007/06/special_operations_prepar...

The U.S. Northern Command, the military command responsible for "homeland defense," has asked the Pentagon if it can establish its own special operations command for domestic missions. The request ... would establish a permanent sub-command for responses to incidents of domestic terrorism as well as other occasions where special operators may be necessary on American soil. The establishment of a domestic special operations mission, and the preparation of contingency plans to employ commandos in the United States, would upend decades of tradition. Military actions within the United States are the responsibility of state militias (the National Guard), and federal law enforcement is a function of the FBI. Employing special operations for domestic missions sounds very ominous, and NORTHCOM's request earlier this year should receive the closest possible Pentagon and congressional scrutiny. There's only one problem: NORTHCOM is already doing what it has requested permission to do. When NORTHCOM was established after 9/11 to be the military counterpart to the Department of Homeland Security, within its headquarters staff it established a Compartmented Planning and Operations Cell (CPOC) responsible for planning and directing a set of "compartmented" and "sensitive" operations on U.S., Canadian and Mexican soil. In other words, these are the very special operations that NORTHCOM is now formally asking the Pentagon to beef up into a public and acknowledged sub-command.


CIA to Air Decades of Its Dirty Laundry
2007-06-22, Washington Post
Posted: 2007-06-27 07:51:16
http://www.washingtonpost.com/wp-dyn/content/article/2007/06/21/AR20070621024...

The CIA will declassify hundreds of pages of long-secret records detailing some of the intelligence agency's worst illegal abuses -- the so-called "family jewels" documenting a quarter-century of overseas assassination attempts, domestic spying, kidnapping and infiltration of leftist groups ... CIA Director Michael V. Hayden said yesterday. The documents ... also include accounts of break-ins and theft, the agency's opening of private mail to and from China and the Soviet Union, wiretaps and surveillance of journalists, and a series of "unwitting" tests on U.S. civilians, including the use of drugs. The documents have been sought for decades by historians, journalists and conspiracy theorists and have been the subject of many fruitless Freedom of Information Act requests. In anticipation of the CIA's release, the National Security Archive at George Washington University yesterday published a separate set of documents from January 1975 detailing internal government discussions of the abuses. Those documents portray a rising sense of panic within the administration of President Gerald R. Ford that what then-CIA Director William E. Colby called "skeletons" in the CIA's closet had begun to be revealed in news accounts. "It's surely part of [Hayden's] program now to draw a bright line with the past," said National Security Archive Director Thomas S. Blanton. "But it's uncanny how the government keeps dipping into the black bag." Newly revealed details of ancient CIA operations, Blanton said, "are pretty resonant today."


C.I.A. Chief Tries Preaching a Culture of More Openness
2007-06-22, New York Times
Posted: 2007-06-27 07:49:05
http://www.nytimes.com/2007/06/23/washington/23hayden.html?ex=1340251200&en=3...

William E. Colby faced an uneasy decision in late 1973 when he took over the Central Intelligence Agency: whether to make public the agencys internal accounting, then being compiled, of its domestic spying, assassination plots and other misdeeds since its founding nearly three decades earlier. Mr. Colby decided to keep the so-called family jewels a secret, and wrote in his memoir in 1978 that he believed the agencys already sullied reputation ... could not have withstood a public airing of all its dirty laundry. So why, at a time when the agency has again been besieged by criticism, this time for its program of secret detentions and interrogations since the Sept. 11 attacks, would the current director, Gen. Michael V. Hayden, decide to declassify the same documents that Mr. Colby chose to keep secret? General Hayden said it was essential for the C.I.A. ... to be as open as possible in order to build public trust and dispel myths surrounding its operations. The more that the agency can tell the public, he said, the less chance that misinformation among the public will fill the vacuum. It was this outlook that General Hayden, whose public relations skills are well known in Washington, brought to an earlier job. There, as director of the National Security Agency, he tried to overhaul the N.S.A.s public image that of the shadowy, menacing organization portrayed in the movie Enemy of the State by inviting reporters to briefings and authorizing its officials to speak to the author James Bamford for his book on the agency, Body of Secrets.

Note: For a brief summary of and links to further information about James Bamford's important book on the NSA, Body of Secrets, click here.


FBI Finds It Frequently Overstepped in Collecting Data
2007-06-14, Washington Post
Posted: 2007-06-23 06:47:16
http://www.washingtonpost.com/wp-dyn/content/article/2007/06/13/AR20070613024...

An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.


80 Institutions Used in C.I.A. Mind Studies
1977-08-04, New York Times
Posted: 2007-06-22 08:52:36
http://select.nytimes.com/gst/abstract.html?res=F20D15F63A5B167493C6A91783D85...

Adm. Stansfield Turner, the Director of Central Intelligence, testified today that the C.I.A. had secretly supported human behavior control research at 80 institutions, including 44 colleges or universities as well as hospitals, prisons and pharmaceutical companies. He said that the main action years of MK-Ultra were from 1953 through 1963. The projects, he said, had included tests of LSD and of a "K," or "knockout drop." The agency had supported 185 nongovernment researchers in 149 separate research projects. Admiral Turner said that ... 8,000 pages of newly discovered documents do not contain the names of the subjects of the tests but do contain "leads" that might enable them to be found. Admiral Turner acknowledged under questioning that the C.I.A. had apparently planned to test drugs on terminal cancer patients at the same institution where it secretly contributed $375,000 toward the construction of a hospital building. The New York Times has independently confirmed the institution is Georgetown University Medical School here. Admiral Turner [also] said that "some unwitting testing took place on criminal sexual psychopaths confined at a state hospital." At the two-hour hearing today, Senator Kennedy, a Massachusetts Democrat, pressed Admiral Turner to let the universities, researchers and possible subjects of the tests know of the C.I.A.'s involvement. "These individuals have a right to know who they are and why they were used," he said.

Note: If the above link fails, click here. For lots more reliable, verifiable information suggesting a major cover-up of government mind control programs, click here.


FBI Terror Watch List
2007-06-13, ABC News
Posted: 2007-06-15 10:15:35
http://blogs.abcnews.com/theblotter/2007/06/fbi_terror_watc.html

A terrorist watch list compiled by the FBI has apparently swelled to include more than half a million names. Privacy and civil liberties advocates say the list is growing uncontrollably, threatening its usefulness in the war on terror. The bureau says the number of names on its terrorist watch list is classified. A portion of the FBI's unclassified 2008 budget request posted to the Department of Justice Web site, however, refers to "the entire watch list of 509,000 names."A spokesman for the interagency National Counterterrorism Center (NCTC), which maintains the government's list of all suspected terrorists with links to international organizations, said they had 465,000 names covering 350,000 individuals. Many names are different versions of the same identity. In addition to the NCTC list, the FBI keeps a list of U.S. persons who are believed to be domestic terrorists - abortion clinic bombers, for example, or firebombing environmental extremists, who have no known tie to an international terrorist group. Combined, the NCTC and FBI compendia comprise the watch list used by federal security screening personnel on the lookout for terrorists. While the NCTC has made no secret of its terrorist tally, the FBI has consistently declined to tell the public how many names are on its list. "It grows seemingly without control or limitation," said ACLU senior legislative counsel Tim Sparapani of the terrorism watch list. Sparapani called the 509,000 figure "stunning. If we have 509,000 names on that list, the watch list is virtually useless," he told ABC News. "You'll be capturing innocent individuals with no connection to crime or terror." U.S. lawmakers and their spouses have been detained because their names were on the watch list.


White House revises post-disaster protocol
2007-06-02, Boston Globe
Posted: 2007-06-08 08:21:39
http://www.boston.com/news/nation/washington/articles/2007/06/02/white_house_...

The Bush administration is writing a new plan to maintain governmental control in the wake of an apocalyptic terrorist attack or overwhelming natural disaster, moving such doomsday planning for the first time from the Federal Emergency Management Agency to officials inside the White House. Discussion among legal specialists, homeland security experts and Internet commentators [includes] concerns that the policy may [make] it too easy to invoke emergency presidential powers such as martial law. The ... new "National Continuity Policy" contains few details about how surviving officials would invoke emergency powers, or when emergency powers should be deemed to be no longer necessary. The unanswered questions have provoked anxiety across ideological lines. The conservative commentator Jerome Corsi [wrote] that the directive looked like a recipe for allowing the office of the presidency to seize "dictatorial powers" because the policy does not discuss consulting Congress about when to invoke emergency powers -- or when to turn them off. Some specialists say that the White House should be more specific about its worst-case scenario plans, pointing out two unanswered questions: what circumstances would trigger implementation of the plan and what legal limits the White House recognizes on its own emergency powers. The policy ... does not contain a direct reference to statutes in which Congress has imposed checks and balances on the president's power to impose martial law or other extraordinary measures, [nor does it] explicitly acknowledge the National Emergencies Act, [a] law that gives Congress the right to override the president's determination that a national emergency still exists.


The Armageddon Plan
2004-03-01, The Atlantic Monthly
Posted: 2007-06-02 06:43:13
http://www.theatlantic.com/doc/prem/200403/mann

At least once a year during the 1980s Dick Cheney and Donald Rumsfeld vanished. Cheney was ... a [Republican] congressman. Rumsfeld [was] the head of G. D. Searle & Co.. Yet for periods of three or four days at a time no one in Congress knew where Cheney was, nor could anyone at Searle locate Rumsfeld. Rumsfeld and Cheney were principal actors in one of the most highly classified programs of the Reagan Administration. [It] called for setting aside the legal rules for presidential succession ... in favor of a secret procedure for putting in place a new "President" and his staff. The program is of particular interest today because it helps to explain the thinking and behavior of the second Bush Administration [since] September 11, 2001. The idea was to concentrate on speed, to preserve "continuity of government," and to avoid cumbersome procedures; the speaker of the House, the president pro tempore of the Senate, and the rest of Congress would play a greatly diminished role. "One of the awkward questions we faced ... was whether to reconstitute Congress after a nuclear attack. It was decided that no, it would be easier to operate without them." [Cheney's and Rumsfeld's] participation in the extra-constitutional continuity-of-government exercises ... also demonstrates a broad, underlying truth about these two men. For three decades ... even when they were out of the executive branch of government, they were never far away. They stayed in touch with defense, military, and intelligence officials, who regularly called upon them. They were ... a part of the permanent hidden national-security apparatus of the United States.

Note: If above link fails, click here. The author, James Mann, is a former Washington correspondent for the Los Angeles Times, and senior writer-in-residence at the Center for Strategic and International Studies, in Washington, D.C. Apparently, Cheney and Rumsfeld don't find Congress to be very important.


What Did the C.I.A. Do to His Father?
2001-04-01, New York Times
Posted: 2007-06-02 06:40:10
http://query.nytimes.com/gst/fullpage.html?sec=health&res=9D02E2DE113CF932A35...

For a quarter of a century, [Eric Olson] has believed that the Central Intelligence Agency murdered his father, a United States government scientist. On Nov. 28, 1953, around 2 a.m. [the] night manager at the Statler Hotel ... in New York rushed out the front door ... to find a middle-aged man lying on the sidewalk. The man had fallen from the 10th floor -- apparently after crashing through a closed window. [In late July, 1975] the C.I.A.'s director, William Colby [provided Olson's] family ... declassified documents relating to Frank Olson's death. Olson had not been a civilian employee of the Department of the Army. He had been a C.I.A. employee working at Fort Detrick. Olson's specialty, it turned out, had been the development of aerosols for the delivery of anthrax. The Colby documents were ... full of unexplained terms like the ''Artichoke'' and ''Bluebird'' projects. These turned out to be the precursors of what became known as MK-ULTRA, a C.I.A. project, beginning in the Korean War, to explore the use of drugs like LSD as truth serums, as well as botulism and anthrax, for use in covert assassination. The documents claimed that during a meeting between the C.I.A. and Fort Detrick scientists ... on Nov. 19,1953, Sidney Gottlieb of the C.I.A. slipped LSD into Olson's glass of Cointreau. Olson, a scientist by training, would have known that he was working for a government that had put Nazi scientists on trial at Nuremberg for immoral experiments on human beings. Now, in the late summer of 1953, [Olson] faced up to the possibility that his own government was doing the same thing. Slipping LSD into Olson's Cointreau was ... designed to get him to talk ... to assess what kind of risk he posed and then eliminate him if necessary.

Note: For those interested in this vital, yet disturbing topic, the entire Times article is well worth reading. For further verifiable information on the CIA mind control programs mentioned in this article, click here.


Contingencies for nuclear terrorist attack
2007-05-11, San Francisco Chronicle (San Francisco's leading newspaper)
Posted: 2007-05-25 11:30:29
http://sfgate.com/cgi-bin/article.cgi?f=/c/a/2007/05/11/MNG2OPP22R1.DTL

Senior government and military officials and other experts, organized by a joint Stanford-Harvard program called the Preventive Defense Project, met behind closed doors in Washington for a day-long workshop called "The Day After." The organizers of the nonpartisan project, Stanford's William Perry, a secretary of defense in the Clinton administration, and Harvard's Ashton Carter, a senior Defense Department official during the Clinton years, assumed the detonation of a bomb similar in size to the weapon that destroyed Hiroshima in World War II. A paper [they] are writing ... urges local governments and individuals to build underground bomb shelters; encourages authorities who survive to prevent evacuation of at least some of the areas attacked for three days ... and proposes suspending regulations on radiation exposure so that first responders would be able to act, even if that caused higher cancer rates. "The public at large will expect that their government had thought through this possibility and to have planned for it," Carter said in an interview. "This kind of an event would be unprecedented. We have had glimpses of something like this with Hiroshima, and glimpses with 9/11 and with Katrina. But those are only glimpses. If one bomb goes off, there are likely to be more to follow," Carter said. "This fact, that nuclear terrorism will appear as a syndrome rather than a single episode, has major consequences." It would, he added, require powerful government intervention to force people to do something many may resist -- staying put.

Note: Ashton Carter was co-author, with Philip Zelikow (later Executive Director of the 9/11 Commission) and John Deutch (former CIA Director), of a 1998 Foreign Affairs article, "Catastrophic Terrorism: Tackling the New Danger," which warned of a possible catastrophic attack on the World Trade Center and accurately described the governmental aftermath of 9/11.


Bush Changes Continuity Plan
2007-05-10, The Washington Post
Posted: 2007-05-25 11:26:53
http://www.washingtonpost.com/wp-dyn/content/article/2007/05/09/AR20070509027...

President Bush issued a formal national security directive yesterday ordering agencies to prepare contingency plans for a surprise, "decapitating" attack on the federal government, and assigned responsibility for coordinating such plans to the White House. The prospect of a nuclear bomb being detonated in Washington without warning ... has been cited by many security analysts as a rising concern since the Sept. 11, 2001, attacks. The order makes explicit that the focus of federal worst-case planning involves a covert nuclear attack against the nation's capital. "Adequate warning of potential emergencies that could pose a significant risk to the homeland might not be available, and therefore all continuity planning shall be based on the assumption that no such warning will be received," states the 72-paragraph order. The statement added, "Emphasis will be placed upon geographic dispersion of leadership, staff, and infrastructure in order to increase survivability and maintain uninterrupted Government Functions." After the 2001 attacks, Bush assigned about 100 senior civilian managers to rotate secretly to locations outside of Washington for weeks or months at a time [forming] a shadow government that evolved based on long-standing "continuity of operations plans." Since then, other agencies including the Pentagon, the Office of the Director of National Intelligence and the CIA have taken steps to relocate facilities or key functions outside of Washington for their own reasons, citing factors such as economics or the importance of avoiding Beltway "group-think."

Note: Why isn't Congress making these absolutely vital decisions? What gives these organizations authority to determine what will happen in the case of a major attack?


Catastrophic Terrorism: Tackling the New Danger
1998-11-01, Foreign Affairs, (the journal of the Council on Foreign Relations)
Posted: 2007-05-25 11:20:47
http://www.foreignaffairs.org/19981101faessay1434/ashton-carter-john-deutch-%...

A successful attack with weapons of mass destruction could certainly take thousands, or tens of thousands, of lives. If the device that exploded in 1993 under the World Trade Center had been nuclear, or had effectively dispersed a deadly pathogen, the resulting horror and chaos would have exceeded our ability to describe it. Such an act of catastrophic terrorism would be a watershed event in American history. It could involve loss of life and property unprecedented in peacetime and undermine America's fundamental sense of security, as did the Soviet atomic bomb test in 1949. Like Pearl Harbor, this event would divide our past and future into a before and after. The United States might respond with draconian measures, scaling back civil liberties, allowing wider surveillance of citizens, detention of suspects, and use of deadly force.

Note: Is this not a remarkable statement? This 1998 article was written by Philip Zelikow (who later was Executive Director of the 9/11 Commission!!!), John Deutch (former CIA Director), and Ashton Carter (former deputy secretary of defense). Dr. David Ray Griffin, an esteemed WTK team member, asks in his new book, Debunking 9/11 Debunking, "Would it not be interesting if we were to learn that those who orchestrated the attacks of 9/11 were able to put one of their own -- someone who at least had foreknowledge of the attacks -- in charge of carrying out the official investigation into these attacks?" To view the full article, click here.


C.I.A. Data Show 14-Year Project On Controlling Human Behavior
1977-07-21, New York Times
Posted: 2007-05-25 08:36:44
http://select.nytimes.com/gst/abstract.html?res=F60A1FFC3E59157493C3AB178CD85...

The Central Intelligence Agency conducted a 14-year program to find ways to "control human behavior" through the use of chemical, biological and radiological material, according to agency documents made public today by John Marks. The documents ... suggested broader experimentation on unwitting humans by the intelligence agency or its paid researchers than had been publicly known before. Mr. Marks distributed 20 documents that described the following incidents, among others: In 1956, the C.I.A. contracted with a private physician to test "bulbocapnine," a drug that can cause stupor or induce a catatonic state, on monkeys and "convicts incarcerated at" an unnamed state penitentiary. A letter from an unnamed C.I.A. official in 1949 discussed ways of killing people without leaving a trace. "I believe that there are two chemical substances which would be most useful in that they would leave no characteristic pathological findings," the letter said. In 1952, two Russian agents who were "suspected of being doubled" were interrogated using "narcohypnotic" methods. The two men were given sodium pentothal and a stimulant. One interrogation produced a "remarkable" regression, the papers said, during which "the subject actually relived certain past activities of his life. The subject totally accepted Mr. [name deleted] as an old and trusted and beloved personal friend whom the subject had known in years past in Georgia, U.S.S.R." The C.I.A. conducted secret medical experiments from 1949 through 1963 under the code names Bluebird, Artichoke, MK Ultra and MK Delta.

Note: If the above link fails, click here. Watch a one-minute video clip showing Congressional testimony on a dart gun which causes a heart attack without leaving any evidence. Explore further reliable, verifiable information suggesting a major cover-up of government mind control programs. Read other revealing news articles on mind control.


Pentagon restricting testimony in Congress
2007-05-10, Boston Globe
Posted: 2007-05-14 12:19:47
http://www.boston.com/news/nation/washington/articles/2007/05/10/pentagon_res...

The Pentagon has placed unprecedented restrictions on who can testify before Congress, reserving the right to bar lower-ranking officers, enlisted soldiers, and career bureaucrats from appearing before oversight committees or having their remarks transcribed. The guidelines, described in an April 19 memo to the staff director of the House Armed Services Committee, adds that all field-level officers and enlisted personnel must be "deemed appropriate" by the Department of Defense before they can participate in personal briefings for members of Congress or their staffs. In addition, according to the memo, the proceedings must not be recorded. Any officers who are allowed to testify must be accompanied by an official from the administration. Veterans of the legislative process -- who say they have never heard of such guidelines before -- maintain that the Pentagon has no authority to set such ground rules. A Pentagon spokesman confirmed that the guidelines are new. The memo has fueled complaints that the Bush administration is trying to restrict access to information about the war in Iraq. [A] special House oversight panel, according to aides, has written at least 10 letters to the Pentagon since February seeking information and has received only one official reply. Nor has the Pentagon fully complied with repeated requests for all the monthly assessments of Iraqi security forces.

Note: When the military begins to control the legislative, democracy begins to shift towards dictatorship. And for reliable information how the Pentagon cannot account for hundreds of billions of dollars, click here.


Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.