Big Brother News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on Big Brother from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations. Snowden said professionals were failing in their obligations to their clients, sources, patients and parishioners in what he described as a new and challenging world. "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe. Any communications should be encrypted by default," he said. Snowden's plea for the professions to tighten security came during an extensive and revealing interview with the Guardian in Moscow. During the seven hours of interview, Snowden: • Said if he ended up in US detention in Guantánamo Bay he could live with it. • Does not have any regrets. • Said that ... he was independently secure, living on savings, and money from awards and speeches he has delivered online round the world. • Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in "sexually compromising" situations are routinely passed around. He works online late into the night; a solitary, digital existence not that dissimilar to his earlier life. He said he was using part of that time to work on the new focus for his technical skills, designing encryption tools to help professionals such as journalists protect sources and data. He is negotiating foundation funding for the project, a contribution to addressing the problem of professions wanting to protect client or patient data, and in this case journalistic sources.
Note: Read the transcript of the Guardian's new interview of Edward Snowden. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Former National Security Agency contractor Edward Snowden, and one of the reporters who first broke the news of Snowden's documents, Laura Poitras, received a Ridenhour Truth-Teller prize [on April 30] to a standing ovation at the National Press Club. Snowden leaked classified documents that exposed the NSA's massive global surveillance programs. Snowden ... compared his actions with that of Director of National Intelligence James R. Clapper, who denied that the NSA was "wittingly" collecting data on millions of Americans in a Senate Intelligence Committee hearing last spring -- a claim at odds with revelations about domestic phone records collection as a result of documents provided by Snowden. "The oath that I remember is James Clapper raising his hand, swearing to tell the truth and then lying to the American public," Snowden said. "I also swore an oath, but that oath was not to secrecy, but to defend the American Constitution." While Clapper has accused Snowden of perpetrating the most "massive and damaging theft of intelligence" in U.S. history, Snowden argues his actions were serving a larger public interest that superseded the national intelligence need for secrecy. Later in the speech, he described Clapper as having "committed a crime by lying under oath to the American people," and questioned why charges were never brought against the director. By contrast, Snowden said, charges were brought against him soon after he revealed himself as the source of the leaks.
Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents. Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by statute and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls. The documents, provided earlier this summer to The Washington Post by former NSA contractor Edward Snowden, include a level of detail and analysis that is not routinely shared with Congress or the special court that oversees surveillance. In one of the documents, agency personnel are instructed to remove details and substitute more generic language in reports to the Justice Department and the Office of the Director of National Intelligence. In one instance, the NSA decided that it need not report the unintended surveillance of Americans. The NSA audit obtained by The Post, dated May 2012, counted 2,776 incidents in the preceding 12 months of unauthorized collection, storage, access to or distribution of legally protected communications. Many involved failures of due diligence or violations of standard operating procedure. The most serious incidents included a violation of a court order and unauthorized use of data about more than 3,000 Americans and green-card holders.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
[Daniel] Ellsberg is one of the most outspoken critics of the Obama administration’s prosecution of leakers. Under President Obama’s tenure, the government has prosecuted six individuals for releasing classified information to media organizations. Ellsberg is particularly fierce in his support of Bradley Manning, a young soldier who released a large amount of classified information to WikiLeaks. Manning was arrested in 2010, and his military court-martial began this week. Ellsberg considers Manning a hero, and he argues that there is little difference between what Manning did in 2010 and what Ellsberg did four decades earlier. [Q.}: In a 1973 interview, you said that a “secondary objective” of releasing the Pentagon Papers was “the hope of changing the tolerance of Executive secrecy that had grown up over the last quarter of a century both in Congress and the courts and in the public at large.” How has that “tolerance of secrecy” changed over the last four decades? DE: There’s been very great tolerance that if the magic words “national security,” or the new words “homeland security” are invoked, Congress has given the president virtually a free hand in deciding what information they will know as well as the public. I wouldn’t count on the current court with its current makeup making the same ruling with the Pentagon Papers as they did 40 years ago. I’m sure that President Obama would have sought a life sentence in my case. Various things that were counted as unconstitutional then have been put in the president’s hands now. He’s become an elected monarch. Nixon’s slogan, “when the president does it, it’s not illegal,” is pretty much endorsed now.
Note: To see key quotes showing the amazing courage and dedication of Snowden, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
Raytheon, a Massachusetts defense contractor, has built tracking software that pulls information from social networks, according to a video obtained by the Guardian newspaper in London. "[Raytheon] has acknowledged the technology was shared with U.S. government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analyzing 'trillions of entities' from cyberspace." Using public data from Facebook, Twitter, Gowalla and Foursquare, the software - called RIOT, or Rapid Information Overlay Technology - apparently gathers uploaded information and forms a profile of a person's every move that was registered with one of the websites. The video obtained by the newspaper starts with a demonstration by Raytheon's "principal investigator," Brian Urch, showing how easy it is to track an employee named Nick - a real person - based on all the places he has checked in using his smartphone. "When people take pictures and post them on the Internet using their smartphones, the phone will actually embed the latitude and longitude in the header data - so we're going to take advantage of that," Urch says. "So now we know where Nick's gone ... and now we'll predict where he'll be in the future." Urch goes on to analyze - using graphs and calendars - where Nick likes to spend his personal time and make predictions about his behavior. "If you ever wanted to get a hold of his laptop, you might want to visit the gym at 6 a.m. on Monday," Urch says with alarming casualness.
Note: To read the full Guardian article, click here.
A bone fragment believed to be part of Adolf Hitler's skull has been revealed as being that of an unidentified woman, US scientists have said. The section of bone - marked with a bullet hole - was used to support the theory that Hitler shot himself. Russian scientists said the skull piece was found alongside Hitler's jawbone and had put it on display in Moscow. But US scientists said DNA tests revealed it actually belonged to a woman aged between 20 and 40. An archaeologist from the University of Connecticut travelled to Moscow, where the fragment has been on show in the city's federal archive since 2000, to take a sample. Nick Bellantoni said he had suspected even before the bone was tested that the fragment did not come from an adult male. DNA tests confirmed that the bone fragment came from a female. Doubts about exactly how Hitler died have persisted for decades. Russian officials said that the bodies of Hitler and Eva Braun - who reportedly committed suicide in a Berlin bunker in 1945 - were removed from a shell crater shortly after they died. The piece of skull forms part of a collection that also includes a section of a bloodstained sofa where Hitler is believed to have shot himself after swallowing a cyanide pill.
As part of an expanding programme of battlefield automation, the US Air Force has said it is now training more drone operators than fighter and bomber pilots and signalled the end of the era of the fighter pilot is in sight. Just three years ago, the service was able to fly just 12 drones at a time; now it can fly more than 50. At a trade conference outside Washington last week, military contractors presented a future vision in which pilotless drones serve as fighters, bombers and transports, even automatic mini-drones programmed to attack in swarms. Contractors made presentations for "nano-size" drones the size of moths that can flit into buildings to gather intelligence; drone helicopters; large aircraft that could be used as strategic bombers and new mid-sized drones could act as jet fighters. This Terminator-like vision in which future generations of fighter aces become cubicle-bound drone operators thousands of miles from conflict is already here: the deployment that began during the Bush administration has accelerated during the first seven months of Obama's term. Some 5,000 robotic vehicles and drones are now deployed in Iraq and Afghanistan. By 2015, the Pentagon's $230bn arms procurement programme Future Combat Systems expects to robotise around 15% of America's armed forces. As US domestic approval for the "Af-Pak" conflict slips (a new Washington Post poll found less than a quarter of the US public support sending more troops to Afghanistan), the reliance of drones is likely to grow, analysts say. The air force study suggests areas of warfare too critical for automation, including dogfighting and nuclear-bombing, could eventually be handled by drones.
Note: For revealing reports on Pentagon war planning from major media sources, click here.
Some of America’s leading billionaires have met secretly to consider how their wealth could be used to slow the growth of the world’s population. Described as the Good Club by one insider, it included David Rockefeller Jr, the patriarch of America’s wealthiest dynasty, Warren Buffett and George Soros, the financiers, Michael Bloomberg, the mayor of New York, and the media moguls Ted Turner and Oprah Winfrey. They gathered at the home of Sir Paul Nurse, a British Nobel prize biochemist and president of the private Rockefeller University, in Manhattan on May 5. The informal afternoon session was so discreet that some of the billionaires’ aides were told they were at “security briefings”. Stacy Palmer, editor of the Chronicle of Philanthropy, said the summit was unprecedented. “We only learnt about it afterwards, by accident. Normally these people are happy to talk good causes, but this is different – maybe because they don’t want to be seen as a global cabal,” he said. Some details were emerging this weekend, however. Taking their cue from Gates they agreed that overpopulation was a priority. [A] guest said there was “nothing as crude as a vote” but a consensus emerged that they would back a strategy in which population growth would be tackled as a potentially disastrous environmental, social and industrial threat. “This is something so nightmarish that everyone in this group agreed it needs big-brain answers,” said the guest. “They need to be independent of government agencies, which are unable to head off the disaster we all see looming.” Why all the secrecy? “They wanted to speak rich to rich without worrying anything they said would end up in the newspapers, painting them as an alternative world government,” he said.
Note: This very secret private meeting of billionaires planning to "solve" the world's "overpopulation" problem occurred just a few days before the latest Bilderberg meeting. For an ABC article on the same, click here. Is this a more positive twist on the Bilderberg Group of the worlds' power elite, or more of the same?
Here's a vision of the not-so-distant future: Microchips with antennas will be embedded in virtually everything you buy, wear, drive and read, allowing retailers and law enforcement to track consumer items -- and, by extension, consumers -- wherever they go, from a distance. A seamless, global network of electronic "sniffers" will scan radio tags in myriad public settings, identifying people and their tastes instantly so that customized ads, "live spam," may be beamed at them. In "Smart Homes," sensors built into walls, floors and appliances will inventory possessions, record eating habits, monitor medicine cabinets -- all the while, silently reporting data to marketers eager for a peek into the occupants' private lives. Science fiction? In truth, much of the radio frequency identification [RFID] technology that enables objects and people to be tagged and tracked wirelessly already exists -- and new and potentially intrusive uses of it are being patented, perfected and deployed. Some of the world's largest corporations are vested in the success of RFID technology, which couples highly miniaturized computers with radio antennas to broadcast information about sales and buyers to company databases. Already, microchips are turning up in some computer printers, car keys and tires, on shampoo bottles and department store clothing tags. They're also in library books and "contactless" payment cards. With tags in so many objects, relaying information to databases that can be linked to credit and bank cards, almost no aspect of life may soon be safe from the prying eyes of corporations and governments, says Mark Rasch, former head of the computer-crime unit of the U.S. Justice Department.
Note: For lots more on microchip implants, click here.
Transcript: [Suzanne] MALVEAUX: A Texas mystery solved -- at least partially. We now know Houston police are going to start using unmanned drone aircraft. But the question remains, well, for what? Stephen Dean of CNN affiliate KPRC has got an exclusive look. STEPHEN DEAN, KPRC CORRESPONDENT (voice-over): HPD [Houston Police Dept.], the federal Department of Homeland Security and other invited guests all watching to see how this drone could be used for police work in and around Houston. We tracked that drone from News Chopper 2. And that drone was able to use a high-powered camera to track us. Those cameras can actually look into people's homes or even follow them in moving cars -- which raises all sorts of new questions. HPD quickly hustled together a news conference when it realized our cameras were there for the entire secret test. Executive Assistant Chief Martha Mantabo admits that could mean covert police action. But she says it's too early to tell what else HPD will do with the aircraft. We asked, are these drones headed for ticketing speeders from the sky? MONTALVO: I'm not ruling anything out. DEAN: Back at the secret test site, police helicopter pilots claimed the entire air space was restricted and even threatened our local 2 Investigates pilot with action from the FAA if we didn't leave. But we checked with FAA several times and there never was a flight restriction. That leaves some to wonder whether the police are now ready to use terrorism fears since 911 to push the envelope further into our private lives.
Note: To watch the video of secret police work in action, click here.
According to a former AT&T employee, the government has warrantless access to a great deal of Internet traffic should they care to take a peek. As information is traded between users it flows also into a locked, secret room on the sixth floor of AT&T's San Francisco offices and other rooms around the country -- where the U.S. government can sift through and find the information it wants, former AT&T employee Mark Klein alleged Wednesday at a press conference on Capitol Hill. "An exact copy of all Internet traffic that flowed through critical AT&T cables -- e-mails, documents, pictures, Web browsing, voice-over-Internet phone conversations, everything -- was being diverted to equipment inside the secret room," he said. Klein ... said that as an AT&T technician overseeing Internet operations in San Francisco, he helped maintain optical splitters that diverted data en route to and from AT&T customers. One day he found that the splitters were hard-wired into a secret room on the sixth floor. Documents he obtained [from] AT&T showed that highly sophisticated data mining equipment was kept there. Conversations he had with other technicians and the AT&T documents led Klein to believe there are 15 to 20 such sites nationwide, including in Seattle, Los Angeles, San Jose, San Diego and Atlanta, he said. Brian Reid, a former Stanford electrical engineering professor who appeared with Klein, said the NSA would logically collect phone and Internet data simultaneously because of the way fiber optic cables are intertwined. He said ... the system described by Klein suggests a "wholesale, dragnet surveillance." Of the major telecom companies, only Qwest is known to have rejected government requests for access to data. Former Qwest CEO Joseph Nacchio, appealing an insider trading conviction last month, said the government was seeking access to data even before Sept. 11.
The Bush administration plans to leave oversight of its expanded foreign eavesdropping program to the same government officials who supervise the surveillance activities and to the intelligence personnel who carry them out, senior government officials said yesterday. The law, which permits intercepting Americans' calls and e-mails without a warrant if the communications involve overseas transmission, gives Director of National Intelligence Mike McConnell and Attorney General Alberto R. Gonzales responsibility for creating the broad procedures determining whose telephone calls and e-mails are collected. It also gives McConnell and Gonzales the role of assessing compliance with those procedures. The law ... does not contain provisions for outside oversight -- unlike an earlier House measure that called for audits every 60 days by the Justice Department's inspector general. The controversial changes to the 1978 Foreign Intelligence Surveillance Act were approved by both chambers of the Democratic-controlled Congress despite privacy concerns raised by Democratic leaders and civil liberties advocacy groups. Central to the new program is the collection of foreign intelligence from "communication service providers," which the officials declined to identify, citing secrecy concerns. Under the new law, the attorney general is required to draw up the governing procedures for surveillance activity, for approval by the Foreign Intelligence Surveillance Court. Once the procedures are established, the attorney general and director of national intelligence will formally certify that the collection of data is authorized. But the certification will be placed under seal "unless the certification is necessary to determine the legality of the acquisition," according to the law signed by Bush.
President Bush issued a formal national security directive yesterday ordering agencies to prepare contingency plans for a surprise, "decapitating" attack on the federal government, and assigned responsibility for coordinating such plans to the White House. The prospect of a nuclear bomb being detonated in Washington without warning ... has been cited by many security analysts as a rising concern since the Sept. 11, 2001, attacks. The order makes explicit that the focus of federal worst-case planning involves a covert nuclear attack against the nation's capital. "Adequate warning of potential emergencies that could pose a significant risk to the homeland might not be available, and therefore all continuity planning shall be based on the assumption that no such warning will be received," states the 72-paragraph order. The statement added, "Emphasis will be placed upon geographic dispersion of leadership, staff, and infrastructure in order to increase survivability and maintain uninterrupted Government Functions." After the 2001 attacks, Bush assigned about 100 senior civilian managers to rotate secretly to locations outside of Washington for weeks or months at a time [forming] a shadow government that evolved based on long-standing "continuity of operations plans." Since then, other agencies including the Pentagon, the Office of the Director of National Intelligence and the CIA have taken steps to relocate facilities or key functions outside of Washington for their own reasons, citing factors such as economics or the importance of avoiding Beltway "group-think."
Note: Why isn't Congress making these absolutely vital decisions? What gives these organizations authority to determine what will happen in the case of a major attack?
Although the Bush administration has said that six U.S. attorneys were fired recently in part because of "performance related" issues, at least five of them received positive job evaluations before they were ordered to step down. Attorney General Alberto Gonzales, using authority he gained in March from a little-noticed provision of the Patriot Act, has appointed interim U.S. attorneys from the Bush administration's inner circle. Daniel Bogden, the U.S. attorney in Nevada, was described in his last job performance evaluation in 2003 as being a "capable" leader who was highly regarded ... said a Justice Department official. David Iglesias, the U.S. attorney in New Mexico, also received a positive evaluation last year, according to another Justice Department official. Both officials asked not to be identified. The other U.S. attorneys who received good reviews were John McKay, the former U.S. attorney in Seattle; Paul Charlton, the former U.S. attorney in Arizona; and Carol Lam, the current U.S. attorney in San Diego. The decision to fire the U.S. attorneys came under scrutiny late last month after Senate Democrats discovered a change in the Patriot Act that allowed Gonzales to appoint interim U.S. attorneys for indefinite terms without Senate approval. In testimony to the Senate Judiciary Committee last week, [Deputy Attorney General Paul] McNulty conceded that H.E. "Bud" Cummins, the former U.S. attorney in Arkansas, wasn't fired because of how he handled his job. Rather, McNulty said, administration officials wanted to make room for Timothy Griffin, a former aide of presidential adviser Karl Rove.
Note: To read a related Associated Press article on U.S. Attorney General Gonzalez, click here. The article starts with "Attorney General Alberto Gonzales criticized federal judges ... for ruling on cases that affect national-security policy. Judges, he contended, are unqualified to decide terrorism issues that he said are best settled by Congress or the president." Isn't that negating the balance of powers laid out in the U.S. Constitution?
Two Oakland police officers working undercover at an anti-war protest in May 2003 got themselves elected to leadership positions in an effort to influence [a] demonstration. The department assigned the officers to join activists protesting the U.S. war in Iraq ... a police official said last year in a sworn deposition. [At the] demonstration, police fired nonlethal bullets and bean bags at demonstrators who blocked the Port of Oakland's entrance in a protest. Dozens of activists and longshoremen on their way to work suffered injuries ranging from welts to broken bones and have won nearly $2 million in legal settlements from the city. In a deposition related to a lawsuit filed by protesters, Deputy Police Chief Howard Jordan said activists had elected the undercover officers to "plan the route of the march and decide I guess where it would end up and some of the places that it would go." Oakland police had also monitored online postings by the longshoremen's union regarding its opposition to the war. The documents ... were released Thursday by the American Civil Liberties Union, as part of a report criticizing government surveillance of political activists since the terrorist attacks of Sept. 11, 2001. Jordan ... noted that "two of our officers were elected leaders within an hour on May 12." The idea was "to gather the information and maybe even direct them to do something that we want them to do." The ACLU said the Oakland case was one of several instances in which police agencies had spied on legitimate political activity since 2001.
Drug companies are accused today of endangering public health through widescale marketing malpractices, ranging from covertly attempting to persuade consumers that they are ill to bribing doctors and misrepresenting the results of safety and efficacy tests on their products. In a report that charts the scale of illicit practices by drug companies in the UK and across Europe, Consumers International - the world federation of consumer organisations - says people are not being given facts about the medicines they take because the companies hide the marketing tactics on which they spend billions. "Irresponsible marketing practices form a serious, persistent and widespread problem among the entire pharmaceutical industry," says the report, which analyses the conduct of 20 of the biggest companies. Scandals such as the withdrawal of Vioxx ... show that unethical drug promotion is a consumer concern. Merck withdrew the drug in September 2004, but allegedly knew it could increase the chances of heart attacks and strokes from 2000 and has been accused of manipulating study results to play down the risk. More than 6,000 lawsuits have been filed against the company in the United States by people who claim they suffered heart attacks as a result of the drug. There is no room for complacency when drug companies spend twice as much on marketing as on research...but do not publish information on their drug promotion practices.
The knees buckle, the brain aches, the stomach turns. And suddenly, nobody feels like protesting anymore. Witnesses describe a minute-long blast of sound emanating from a white Israeli military vehicle. Within seconds, protestors began falling to their knees, unable to maintain their balance. An Israeli military source, speaking on the customary condition of anonymity, confirmed the existence of the Scream. "The intention is to disperse crowds with sound pulses that create nausea and dizziness," the Israel Defence Force spokesperson told the Toronto Star. The IDF is saying little about the science behind the Scream, citing classified information. But the technology is believed to be similar to the LRAD — Long-Range Acoustic Device — used by U.S. forces in Iraq as a means of crowd control. Hillel Pratt, a professor of neurobiology ... likens the effect of such technologies to simulated seasickness. "It doesn't necessarily have to be a loud sound. The combination of low frequencies at high intensities, for example, can create discrepancies in the inputs to the brain," said Pratt. Arik Asherman, a leader of Rabbis For Human Rights, was cautiously optimistic the Scream could make a positive difference. But Asherman said Israeli officials would be wise to use the Scream sparingly. "We need to remind ourselves the problem is not the demonstrations, but what the demonstrations are about," he said. "If this makes it any more difficult for Palestinians to express themselves in a non-violent way, that is problematic. The best way to disperse demonstrations is to deal with the actual issues.
Note: If the above link fails, click here.
Oil and gas ensure that the US backs the Uzbek dictator to the hilt. The bodies of hundreds of pro-democracy protesters in Uzbekistan are scarcely cold, and already the White House is looking for ways to dismiss them. The conviction rate in criminal and political trials in Uzbekistan is over 99% - in President Karimov's torture chambers, everyone confesses. Karimov is very much George Bush's man in central Asia. There is not a senior member of the US administration who is not on record saying warm words about Karimov. There is not a single word recorded by any of them calling for free elections in Uzbekistan.
Note: The above article is particularly revealing in that it is written by the UK's former ambassador to Uzbekistan.
“This is a war against terrorism, and Iraq is just one campaign. The Bush Administration is looking at this as a huge war zone,” the former high-level intelligence official told me. “Next, we’re going to have the Iranian campaign." The President has signed a series of findings and executive orders authorizing secret commando groups and other Special Forces units to conduct covert operations against suspected terrorist targets in as many as ten nations in the Middle East and South Asia. “The Pentagon doesn’t feel obligated to report any of this to Congress,” the former high-level intelligence official said. “They don’t even call it ‘covert ops’ -- it’s too close to the C.I.A. phrase. In their view, it’s ‘black reconnaissance.’ They’re not even going to tell the cincs” -- the regional American military commanders-in-chief.
What [Israeli historian Gad] Kroizer had discovered and later footnoted in an academic paper ... was the location of an ultrasecret jail where Israel has held Arabs in total seclusion for years, barred visits by the Red Cross and allegedly tortured inmates. Known as 1391, the facility is used as an interrogation center by a storied unit of Israel's military intelligence, whose members-all Arabic speakers-are trained to wring confessions from the toughest militants. Some of the methods are reminiscent of Abu Ghraib: nudity as a humiliation tactic, compromising photographs, sleep deprivation. In a few cases, at least, interrogators at 1391 appear to have gone beyond Israel's own hair-splitting distinction between torture and what a state commission referred to in 1987 as "moderate physical pressure." But the nightmare for those in 1391 is the isolation and the fear that no one knows where you are. The location of the compound is so hush-hush that a court this year banned a visit by an Israeli legislator. Prisoners describe being hooded everywhere at the facility except in their cells. Hassan Rawajbeh ... a member of the nearly disbanded Palestinian Preventive Security force ... was picked up by soldiers in Nablus 18 months ago. He was hooded, handcuffed and thrown on the floor of a van. When the hood was removed, he was in a tiny, windowless cell. The chamber contained no toilet, only a bucket in the corner, which ... his jailers would empty once every few weeks. A low buzzing droned constantly. For nearly four months, Rawajbeh saw no one but his interrogators, who kept him naked for days at a time and prevented him from going to the bathroom.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.