Big Brother News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on Big Brother from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Since 1973, Israel has cost the United States about $1.6 trillion. If divided by today's population, that is more than $5,700 per person. This is an estimate by Thomas Stauffer, a consulting economist in Washington. Mr. Stauffer has tallied the total cost to the US of its backing of Israel in its drawn-out, violent dispute with the Palestinians. The bill adds up to more than twice the cost of the Vietnam War. Israel is the largest recipient of US foreign aid. It has been getting $3 billion a year for years. Israel has been given $240 billion since 1973, Stauffer reckons. In addition, the US has given Egypt $117 billion and Jordan $22 billion in foreign aid in return for signing peace treaties with Israel. Stauffer wonders if Americans are aware of the full bill for supporting Israel since some costs, if not hidden, are little known. Other US help includes: • Israel buys discounted, serviceable "excess" US military equipment. Stauffer says these discounts amount to "several billion dollars" over recent years. • Israel uses roughly 40 percent of its $1.8 billion per year in military aid, ostensibly earmarked for purchase of US weapons, to buy Israeli-made hardware. It also has won the right to require the Defense Department or US defense contractors to buy Israeli-made equipment or subsystems, paying 50 to 60 cents on every defense dollar the US gives to Israel. US help ... has enabled Israel to become a major weapons supplier. Weapons make up almost half of Israel's manufactured exports. US defense contractors often resent the buy-Israel requirements and the extra competition subsidized by US taxpayers. Stauffer [has] been assisted in this research by a number of mostly retired military or diplomatic officials who do not go public for fear of being labeled anti-Semitic.
Note: Israel has a population of 6.5 million. Yearly foreign aid to Israel has generally varied between $2.5 to 3.0 billion for many years (it's difficult to locate these figures on U.S. government websites). If you do the math, U.S. taxpayers are giving every man, woman, and child, in Israel about $400/year -- over ten times the per capita rate paid to any other country. That's quite a tax break, especially considering they are not Americans.
Scientists have turned living rats into remote-controlled, pleasure-driven robots which can be guided up ladders, through ruins and into minefields at the click of a laptop key. The project ... is funded by the US military's research arm. Animals have often been used by humans in combat and in search and rescue, but not under direct computer-to-brain electronic control. The advent of surgically altered roborats marks the crossing of a new boundary in the mechanisation, and potential militarisation, of nature. In 10 sessions the rats learned that if they ran forward and turned left or right on cue, they would be "rewarded" with a buzz of electrically delivered pleasure. Once trained they would move instantaneously and accurately as directed, for up to an hour at a time. The rats could be steered up ladders, along narrow ledges and down ramps, up trees, and into collapsed piles of concrete rubble. Roborats fitted with cameras or other sensors could be used as search and rescue aids. In theory, be put to some unpleasant uses, such as assassination. [For] surveillance ... you could apply this to birds ... if you could fit birds with sensors and cameras. Michael Reiss, professor of science education at London's Institute of Education and a leading bioethics thinker ... said he was uneasy about humankind "subverting the autonomy" of animals. "There is a part of me that is not entirely happy with the idea of our subverting a sentient animal's own aspirations and wish to lead a life of its own."
Note: Remember that secret military projects are almost always at least a decade in advance of anything you read in the media. For lots more on this little-known subject, click here.
The US wants to depose the diplomat who could take away its pretext for war with Iraq. On Sunday, the US government will launch an international coup. It has been planned for a month. It will be executed quietly, and most of us won't know what is happening until it's too late. It is seeking to overthrow 60 years of multilateralism in favour of a global regime built on force. The coup begins with its attempt ... to unseat the man in charge of ridding the world of chemical weapons. If it succeeds, this will be the first time that the head of a multilateral agency will have been deposed in this manner. The coup will also shut down the peaceful options for dealing with the chemical weapons Iraq may possess, helping to ensure that war then becomes the only means of destroying them. The Organisation for the Prohibition of Chemical Weapons (OPCW) enforces the chemical weapons convention. Its director-general is a workaholic Brazilian diplomat called Jose Bustani. He has, arguably, done more in the past five years to promote world peace than anyone else on earth. His inspectors have overseen the destruction of 2 million chemical weapons and two-thirds of the world's chemical weapon facilities. In May 2000, as a tribute to his extraordinary record, Bustani was re-elected unanimously by the member states for a second five-year term. Last year Colin Powell wrote to him to thank him for his "very impressive" work. But now everything has changed. [But now] the man celebrated for his achievements has been denounced as an enemy of the people. In January, with no prior warning or explanation, the US state department asked the Brazilian government to recall him.
Note: The "coup" was successful. The New York Times, though reporting few of the details above, stated six days after the above article, "José M. Bustani ... was voted out of office today after refusing repeated demands by the United States that he step down because of his 'management style.'" For why this highly revealing story received no media coverage in the U.S., click here. For a top U.S. general's comments, click here.
The US Government has announced that it will release $95m to North Korea as part of an agreement to replace the Stalinist country's own nuclear programme, which the US suspected was being misused. In releasing the funding, President George W Bush waived the Framework's requirement that North Korea allow inspectors to ensure it has not hidden away any weapons-grade plutonium from the original reactors. President Bush argued that the decision was "vital to the national security interests of the United States". The head of the Non-proliferation Policy Education Centre in Washington, a critic of the Agreed Framework, has warned that even when the new reactors are completed they may not be tamper-proof. "These reactors are like all reactors, They have the potential to make weapons. So you might end up supplying the worst nuclear violator with the means to acquire the very weapons we're trying to prevent it acquiring," Henry Sokolski told the Far Eastern Economic Review.
Note: Though this article is from 2002, one must ask why on earth President Bush would waive the requirement for inspectors who would ensure no nuclear weapons development? Wasn't this one of three countries he had already labeled as the axis of evil? For answers to these questions, click here.
So this is how it works. A tiny, shoe-string central office in Holland decides each year which country will host the next meeting. Each country has two steering committee members. They call up Bilderberg-friendly global corporations, such as Xerox or Heinz or Fiat or Barclays or Nokia, which donate the hundreds of thousands of pounds needed. They do not accept unsolicited donations from non-Bilderberg corporations. Nobody can buy their way into a Bilderberg meeting, although many corporations have tried. Then they decide who to invite - who seems to be a "Bilderberg person". The notion of a Bilderberg person hasn't changed since the earliest days, back in 1954. The guests are expressly asked not to give interviews to journalists. There are two morning sessions and two afternoon sessions. While furiously denying that they secretly ruled the world, my Bilderberg interviewees did admit to me that international affairs had, from time to time, been influenced by these sessions. This is how Denis Healey described a Bilderberg person to me: "To say we were striving for a one-world government is exaggerated, but not wholly unfair. Bilderberg is a way of bringing together politicians, industrialists, financiers and journalists. Politics should involve people who aren't politicians."
Note: For lots more on the highly secretive Bilderberg meeting from two later BBC News article, click here. For many other revealing articles from major media reports on secret societies and secret meetings of the most rich and powerful people in our world, click here.
[Review of] RHODES: The Race for Africa by Antony Thomas, BBC Books. The book is ... intelligent, detailed, well-researched and credibly nuanced. The book's aim is to kill off once and for all the public-schoolboy perception of [Cecil] Rhodes as the model Englishman who selflessly deployed his vast diamond wealth to the task of civilising Southern Africa while adding, virtually single-handedly, a chunk of territory the size of Europe to Her Majesty's imperial possessions. The picture that persuasively emerges in the book [is] of a man of immense charm and demonic single-mindedness. Rhodes ... tailored his rhetoric to suit an age when lust for acquisition had to be dressed in the garb of moral rectitude. Thus the famous lines from his precocious personal credo, drafted at the age of 23: "I contend that we are the finest race in the world, and the more of the world we inhabit, the better it is for the human race." Business ... was the medium he employed to pursue personal power. He beat his rivals not by fighting them but by seducing them. By bribery (Rhodes coined the expression "every man has his price") or sheer force of personality, or more often both, he submitted members of the British cabinet, Kruger's Boers and proud African chieftains to his colossal will. Such were his powers of persuasion that after a smallpox epidemic struck Kimberley in 1883, he prevailed upon local doctors to sign false documents declaring the outbreak to be a rare skin disease. Thus did he prevent the temporary closure of his diamond mines and thus did at least 751 people needlessly, hideously die. By the end of the book Thomas leaves us in no doubt as to Rhodes' greatness, but he concludes that it was a misdirected greatness, a story of talents squandered and opportunities lost.
Note: Often portrayed in history books as one of the most influential men of the 19th century, Rhodes not only believed his was the superior race, in his will he advocated "for the establishment, promotion and development of a Secret Society, the true aim and object whereof shall be for the extension of British rule throughout the world." For major media reports revealing other secret societies with similar aims, click here. For more information on Rhodes and secret societies from Caroll Quigley's epic Tragedy and Hope, click here.
In 2025, US aerospace forces can “own the weather” by capitalizing on emerging technologies and focusing development of those technologies to war-fighting applications. Such a capability offers the war fighter tools to shape the battlespace in ways never before possible. Weather-modification is a force multiplier with tremendous power that could be exploited across the full spectrum of war-fighting environments. From enhancing friendly operations or disrupting those of the enemy via small-scale tailoring of natural weather patterns complete dominance of global communications and counter-space control, weather-modification offers war fighter a wide-range of possible options to defeat or coerce an adversary. But, while offensive weather modification efforts would certainly be undertaken by US forces with great caution and trepidation, it is clear that we cannot afford to allow an adversary to obtain an exclusive weather-modification capability.
Note: The above quote is taken from pages 6 and 35, the executive summary and conclusion of the above US Air Force study. For a highly revealing article suggesting elements within government have much more control over the weather than is thought, click here.
As grocery shoppers work to digest Amazon’s massive acquisition of Whole Foods for $13.7 billion, the digital storefront recently scored a victory that aims to reinforce the company’s growing investments in brick-and-mortar retail. Amazon was awarded a patent May 30 that could help it choke off a common issue faced by many physical stores: Customers’ use of smartphones to compare prices even as they walk around a shop. But Amazon now has the technology to prevent that type of behavior when customers enter any of its physical stores and log onto the WiFi networks there. Titled “Physical Store Online Shopping Control,” Amazon’s patent describes a system that can identify a customer’s Internet traffic and sense when the smartphone user is trying to access a competitor’s website. When that happens, Amazon may take one of several actions. It may block access to the competitor’s site, preventing customers from viewing comparable products from rivals. It might redirect the customer to Amazon’s own site or to other, Amazon-approved sites. It might notify an Amazon salesperson to approach the customer. Or it might send the customer’s smartphone a text message, coupon or other information designed to lure the person back into Amazon’s orbit.
Note: For more along these lines, see concise summaries of deeply revealing corporate corruption news articles from reliable major media sources.
Approximately half of adult Americans’ photographs are stored in facial recognition databases that can be accessed by the FBI, without their knowledge or consent, in the hunt for suspected criminals. About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports. The algorithms used to identify matches are inaccurate about 15% of the time, and are more likely to misidentify black people than white people. These are just some of the damning facts presented at last week’s House oversight committee hearing, where politicians and privacy campaigners criticized the FBI and called for stricter regulation of facial recognition technology at a time when it is creeping into law enforcement and business. The FBI first launched its advanced biometric database ... in 2010, augmenting the old fingerprint database with further capabilities including facial recognition. The bureau did not inform the public ... nor did it publish a privacy impact assessment, required by law, for five years. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos. Last year, the US government accountability office (GAO) analyzed the FBI’s use of facial recognition technology and found it to be lacking in accountability, accuracy and oversight. “It doesn’t know how often the system incorrectly identifies the wrong subject,” explained the GAO’s Diana Maurer. “Innocent people could bear the burden of being falsely accused.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
Trump delegate and Gawker bankrupter Peter Thiel is no stranger to the idea of increasing his lifespan through science. On Bloomberg TV in 2014, Thiel explained that he was taking human-growth hormone pills as part of his plan to live 120 years. Given Thiel’s obsession with warding off death, it comes as no surprise that the Silicon Valley billionaire is interested in at least one radical way of doing it: injecting himself with a young person’s blood. [In] a year-old interview ... the venture-capitalist [said] that he’s interested in parabiosis, which includes the practice of getting transfusions of blood from a younger person, as a means of improving health and potentially reversing aging. “I'm looking into parabiosis stuff. This is where they did the young blood into older mice and they found that had a massive rejuvenating effect,” he said. “It’s one of these very odd things where people had done these studies in the 1950s and then it got dropped altogether. I think there are a lot of these things that have been strangely under-explored.” A Thiel Capital employee ... previously expressed interest in the technique to Jesse Karmazin, the founder of Ambrosia LLC, a company that has been looking for volunteers over the age of 35 to receive blood transfusions from individuals under the age of 25. Bercovici notes that Silicon Valley is abound with rumors of wealthy tech elites experimenting with parabiosis, and Gawker ... received a tip in June claiming that Thiel “spends $40,000 per quarter to get an infusion of blood from an 18-year-old.”
Note: One university researcher has found that many in the European royalty until the end of the 18th century practiced selective cannibalism in the belief if would keep them young. Another article goes into greater depth about the practice some elder members of the wealthy elite taking blood infusions from young people to stay young.
Elite service members from four branches of the U.S. military will launch an operation this summer in which they will operate covertly among the U.S. public and travel from state to state in military aircraft. Texas, Utah and a section of southern California are labelled as hostile territory, and New Mexico isn’t much friendlier. That’s the scheme for Jade Helm 15, a new Special Operations exercise that runs from July 15 to Sept. 15. Army Special Operations Command announced it last week, saying the size and scope of the mission sets it apart from many other training exercises. The exercise has prompted widespread conspiracy theories that the United States is preparing to hatch martial law. In particular, some have expressed alarm about this map, which outlines events for the exercise in unclassified documents posted online last week. The Washington Post verified them to be legitimate by speaking to Army sources. They appear to have been prepared for local authorities. It’s also worth noting that the military has routinely launched exercises in the past in which regions of the United States are identified as hostile for the purpose of training.
Note: This Washington Post article is clearly playing down some important facts and developments. Why is the US military spending so much time and money preparing for scenarios where US soil and citizens are considered enemies? Read and educate yourself with this excellent article on Operation Jade Helm 15, one in a string of US exercises planning for mass civilian arrests under a variety of scenarios.
Olympic National Park and Olympic National Forest in Washington State are ... where the US Navy aims to conduct its Northwest Electromagnetic Radiation Warfare training program. It will fly ... 2,900 training exercises over wilderness, communities and cities across the Olympic Peninsula for 260 days per year, with exercises lasting up to 16 hours per day. No public notices for the Navy's plans were published in any media that directly serve the Olympic Peninsula. But word spread. Public outcry forced the Navy to extend the public comment period until November 28 and schedule more public meetings. According to the US Navy's Information Dominance Roadmap 2013-2028, the Navy states it "will require new capabilities to fully employ integrated information in warfare by expanding the use of advanced electronic warfare." The purpose of these war games is to train to deny the enemy "all possible frequencies of electromagnetic radiation (i.e. electromagnetic energy) for use in such applications as communication systems..." David King, the mayor of Port Townsend, a town on the Northeast corner of the Olympic Peninsula, has voiced his opposition to the plan, along with numerous other public officials. Mike Welding, the Naval Air Station at Whidbey Island spokesman, recently admitted to reporters, "If someone is in the exclusion area for more than 15 minutes, that's a ballpark estimate for when there would be some concern for potential to injure, to receive burns."
Note: We don't generally use truth-out.org as a reliable source, but as no major media are covering this most important development, we're including this article here. To verify this information, please click on some of the links in the article and see the U.S. Navy's "Information Dominance Roadmap".
Any doubts about whether Endless War ... is official American doctrine should be permanently erased by this week’s comments from two leading Democrats, both former top national security officials in the Obama administration. Leon Panetta, the long-time Democratic Party operative who served as Obama’s Defense Secretary and CIA Director, said this week of Obama’s new bombing campaign: “I think we’re looking at kind of a 30-year war.” He criticized Obama ... for being insufficiently militaristic. Then we have Hillary Clinton [who] at an event in Ottawa yesterday ... proclaimed that the fight against these “militants” will “be a long-term struggle” that should entail an “information war” as “well as an air war.” The new war, she said, is “essential” and the U.S. shies away from fighting it “at our peril.” Like Panetta (and most establishment Republicans), Clinton made clear ... that virtually all of her disagreements with Obama’s foreign policy were the by-product of her view of Obama as insufficiently hawkish, militaristic and confrontational. “Endless War” is not dramatic rhetorical license but a precise description of America’s foreign policy. It’s not hard to see why. A state of endless war justifies ever-increasing state power and secrecy and a further erosion of rights. It also entails a massive transfer of public wealth to the “homeland security” and weapons industry (which the US media deceptively calls the “defense sector”). The War on Terror ... was designed from the start to be endless. This war ... thus enables an endless supply of power and profit to flow to those political and economic factions that control the government regardless of election outcomes.
Note: Read the prophetic writings of one of the most highly decorated US generals ever describing how he discovered after retirement that war is created by bankers and mega-corporations to funnel ever more tax-payer money into their coffers. For more along these lines, see the excellent, reliable resources provided in our War Information Center.
Australia has changed radically since last week though it might not look like it on the surface. Late Thursday night the Senate passed the National Security Amendment Bill (No.1) 2014 giving unlimited power to spies and secret police. Now officials can break the law with immunity from prosecution - and without having to answer to a court. They can act in total secrecy. They will decide what they do and to whom and when. They do not have to ask permission. They will choose when to interfere in your life and when they won't. They can dip into your most private communications and they don't need a warrant to do so. Sometimes they will do it because it is necessary to fight crime. Sometimes because they enjoy it. If they mess up your life and you tell anybody, you will get 10 years' jail – even if it doesn't harm security. When a Special Intelligence Operation (SIO) is declared then any participant can break the law on you with no consequences, according to Schedule 3 section 35k. There are broad limits. They cannot kill or torture you, or cause significant physical injury. Minor injury or mental torment is fine. Anyone involved in an SIO will have these powers – but who are they? ASIO, with 1778 staff. The Australian Federal Police, with more than 6900 staff. NSW Police with about 16,370 officers and a spy database called COPS which has more than 30 million entries on the people of NSW. But not just them. Anyone involved in an SIO enjoys legal immunity, including affiliates and subcontractors – whoever they are. Many Senators clearly hadn't read the 128 pages of major legal changes in the NSA Bill. The citizen needs protection from the state built into the laws and that is what they smashed on Thursday.
Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Nigeria's president has formally launched a national electronic identity card, which all Nigerians will have to have by 2019 if they want to vote ... the first biometric card which can also be used to make electronic payments. MasterCard is providing the prepaid payment element and it hopes millions of Nigerians without bank accounts will now gain access to financial services. An attempt to introduce national ID cards in Nigeria 10 years ago failed. Analysts blame corruption for its failure. MasterCard said combining an identity card with a payment card for those aged 16 and over was a significant move. "It breaks down one of the most significant barriers to financial inclusion - proof of identity," MasterCard's Daniel Monehin said in a statement. The new cards show a person's photograph, name, age and unique ID number - and 10 fingerprints and an iris are scanned during enrolment. These details are intended to ensure that there are no duplicates on the system. During the pilot phase, which began registering names last October, 13 million MasterCard-branded ID cards will be issued. There are enrolment centres in all 36 states and there is no fee to get the card, though people will be charged in the event that it needs to be replaced. The Nigerian Identity Management Commission (NIMC), which is behind the rollout, is trying to integrate several government databases including those for driving licences, voter registration, health insurance, taxes and pensions.
Note: This identification scheme is underwritten by a major financial services company, and directly connects a citizen's political identity, financial identity, and biological identity to a centralized electronic database. To understand some of the dangers of this, see concise summaries of deeply revealing microchip implant news articles from reliable major media sources.
Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."
Note: Read the cover story from Wired magazine with a deep inside report on Snowden.
Bill Binney worked at the National Security Agency [for] nearly three decades as one of its leading crypto-mathematicians. He then became one of its leading whistleblowers. The NSA is overseen by Congress, the courts and other government departments. It's also supposed to be watched from the inside by its own workers. But over the past dozen years, whistleblowers like Binney have had a rough track record. Those who tried unsuccessfully to work within the system say Edward Snowden — the former National Security Agency contractor who shared top-secret documents with reporters — learned from their bitter experience. For Binney, the decision to quit the NSA and become a whistleblower began a few weeks after the terrorist attacks of Sept. 11, 2001, when he says he discovered the spy agency had begun using software he'd created to scoop up information on Americans — all without a court order. "I had to get out of there, because they were using the program I built to do domestic spying, and I didn't want any part of it, I didn't want to be associated with it," he says. "I look at it as basically treason. They were subverting the Constitution." Binney says he and two other NSA colleagues who also quit tried sounding the alarm with congressional committees. But because they did not have documents to prove their charges, nobody believed them. Snowden, he says, did not repeat that mistake. "He recognized right away, it was very clear to me, that if he wanted anybody to believe him, he'd have to take a lot of documentation with him — which is what he did," Binney says.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents. The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed. The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. It is not clear how many people around the world, and how many Americans, might have been caught up in the effort. Neither federal privacy laws nor the nation’s surveillance laws provide specific protections for facial images. Civil-liberties advocates and other critics are concerned that the power of the improving technology, used by government and industry, could erode privacy. “Facial recognition can be very invasive,” said Alessandro Acquisti, a researcher on facial recognition technology at Carnegie Mellon University.
Note: For another New York Times article showing how the NSA is using mobile phone apps to "snatch data revealing the player’s location, age, sex and other personal information," see this article.
The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. SOMALGET is part of a broader NSA program called MYSTIC, which ... is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The opportunity those in power have to characterise political opponents as "national security threats" or even "terrorists" has repeatedly proven irresistible. In the past decade, the government ... has formally so designated environmental activists, broad swaths of anti-government rightwing groups, anti-war activists, and associations organised around Palestinian rights. One document from the Snowden files, dated 3 October 2012, chillingly underscores the point. It revealed that the agency has been monitoring the online activities of individuals it believes express "radical" ideas and who have a "radicalising" influence on others. Among the information collected about the individuals, at least one of whom is a "US person", are details of their online sex activities and "online promiscuity." The agency discusses ways to exploit this information to destroy their reputations and credibility. The record is suffused with examples of groups and individuals being placed under government surveillance by virtue of their dissenting views and activism – Martin Luther King, the civil rights movement, anti-war activists, environmentalists. The NSA's treatment of Anonymous ... is especially troubling and extreme. Gabriella Coleman, a specialist on Anonymous at McGill University, said that [Anonymous] "is not a defined" entity but rather "an idea that mobilises activists to take collective action and voice political discontent. It is a broad-based global social movement with no centralised or official organised leadership structure. Some have rallied around the name to engage in digital civil disobedience, but nothing remotely resembling terrorism."
Note: This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.