Big Brother News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on Big Brother from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Iraq in flames, Washington an object of disgust. What to do? At this pivotal moment, CNN and Fox News are tipped off to a clip of an American citizen being beheaded. The victim is ... Nick Berg.The vile deed is deemed the work of al-Qaeda. The timing of the video was brilliant for the West. Media pundits judged the crime a deeper evil than the systemic torture of innocent Iraqis. But some people sensed a rat. But if it was not al-Qaeda, who? While this video shows a human body having its head chopped off, it does not necessarily portray an act of murder. A month before the discovery of [his] corpse, Berg had been released from custody. But whose custody? Brigadier General Mark Kimmitt ... claimed he was in the custody of Iraqi police. However, the Iraqi police chief [stated] "the Iraqi police never arrested the slain American". Berg's family are certain his jailers were the US military. His father, Michael, had been told so by the FBI. He has produced an email from a US consular official ... confirming that his son was in the hands of the US. In his final moments on screen Berg is wearing an orange jumpsuit of the kind familiar from Guantanamo Bay. His white chair is identical to those in the photographs of the Abu Ghraib prison tortures. During the decapitation, starting at the front of the throat, there is little sign of blood. The scream is wildly out of sync, sounds female, and is obviously dubbed. Dr John Simpson, executive director for surgical affairs at the Royal Australasian College of Surgeons ... agrees with other experts who find it highly probable that Berg had died before his decapitation. There's something fishy about this video. In the end, the question is: who killed Nick Berg, and why?
Note: If the above link fails, click here. For a CNN article raising other serious questions on Berg, click here. For more reliable information on how government can control and manipulate public perception, click here.
Skull and Bones is a shadowy, elite secret society that selects 15 new members each year from the senior class at Yale. It is known both for its celebrity membership - past "taps'' include William F. Buckley Jr., President William Howard Taft, and Henry Luce, the founder of Time magazine - and for its bizarre rituals. The rites - said to include a "blood''-drinking initiation and oodles of frank sex talk by the once all-male undergrads (Bones started admitting women in 1992) - are much discussed but little known. This is, after all, a secret society. In her 2002 book, "Secrets of the Tomb,'' Alexandra Robbins speculated that the 2004 presidential election might pit Bonesman George W. Bush (Yale, 1968) against Bonesman John F. Kerry (Yale, 1966.) Good call! This organization [was] once deemed to be so secretive that members had to leave the room if the society's name was ever mentioned in public. Both Bush's father and his grandfather, Senator Prescott Bush, were Bonesmen. [Bonesman John Kerry's] second wife's first husband, the late senator John Heinz, was Bones, as was his father. GWB: "My senior year I joined Skull and Bones, a secret society, so secret I can't say anything more" (from his 1999 campaign biography). JFK [John Kerry]: "There's not much I can say, Tim, because it's a secret" (to Tim Russert on "Meet the Press").
Note: If secret societies produce this many influential leaders, shouldn't the public have a right to know more about them? For lots more, click here.
At least once a year during the 1980s Dick Cheney and Donald Rumsfeld vanished. Cheney was ... a [Republican] congressman. Rumsfeld [was] the head of G. D. Searle & Co.. Yet for periods of three or four days at a time no one in Congress knew where Cheney was, nor could anyone at Searle locate Rumsfeld. Rumsfeld and Cheney were principal actors in one of the most highly classified programs of the Reagan Administration. [It] called for setting aside the legal rules for presidential succession ... in favor of a secret procedure for putting in place a new "President" and his staff. The program is of particular interest today because it helps to explain the thinking and behavior of the second Bush Administration [since] September 11, 2001. The idea was to concentrate on speed, to preserve "continuity of government," and to avoid cumbersome procedures; the speaker of the House, the president pro tempore of the Senate, and the rest of Congress would play a greatly diminished role. "One of the awkward questions we faced ... was whether to reconstitute Congress after a nuclear attack. It was decided that no, it would be easier to operate without them." [Cheney's and Rumsfeld's] participation in the extra-constitutional continuity-of-government exercises ... also demonstrates a broad, underlying truth about these two men. For three decades ... even when they were out of the executive branch of government, they were never far away. They stayed in touch with defense, military, and intelligence officials, who regularly called upon them. They were ... a part of the permanent hidden national-security apparatus of the United States.
Note: If above link fails, click here. The author, James Mann, is a former Washington correspondent for the Los Angeles Times, and senior writer-in-residence at the Center for Strategic and International Studies, in Washington, D.C. Apparently, Cheney and Rumsfeld don't find Congress to be very important.
Coming to you soon from the Pentagon: the diary to end all diaries — a multimedia, digital record of everywhere you go and everything you see, hear, read, say and touch. Known as LifeLog, the project has been put out for contractor bids by the Defense Advanced Research Projects Agency, or DARPA, the agency that helped build the Internet and that is now developing the next generation of [surveillance] tools. The agency ... [considers] LifeLog ... a tool to capture "one person's experience in and interactions with the world" through a camera, microphone and sensors worn by the user. Everything from heartbeats to travel to Internet chatting would be recorded. The goal is to create breakthrough software that helps analyze behavior, habits and routines, according to Pentagon documents reviewed by The Associated Press. The products of the unclassified project would be available to both the private sector and other government agencies — a concern to privacy advocates. John Pike of Global Security.org, a defense analysis group, is dubious the project has military application. "I have a much easier time understanding how Big Brother would want this than how (Defense Secretary Donald) Rumsfeld would use it," Pike said. "They have not identified a military application."
Note: For more on this at Wired, click here.
Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. The implementations of the invention are adapted to the source of video stream that drives the monitor, be it a computer program, a TV broadcast, a video tape or a digital video disc (DVD). The program that causes a monitor to display a pulsing image may be run on a remote computer that is connected to the user computer by a link; the latter may partly belong to a network, which may be the Internet. A live TV broadcast can be arranged to have the feature imbedded simply by slightly pulsing the illumination of the scene that is being broadcast. This method can of course also be used in making movies and recording video tapes and DVDs. Certain monitors can emit ... pulses that are so weak as to be subliminal. This is unfortunate since it opens a way for mischievous application of the invention, whereby people are exposed unknowingly to manipulation of their nervous systems for someone else's purposes.
Note: If the above link fails, click here.
Computer users across Europe should encrypt all their e-mails, to avoid being spied on by a UK-US eavesdropping network, say Euro-MPs. The tentacles of the Echelon network stretch so far that the UK's involvement could constitute a breach of human rights, they say. The Euro-MPs have been studying Echelon for almost a year, after allegations that it has been used by the US to commit industrial espionage against European firms. They conclude that Echelon - whose existence is not officially acknowledged - is reading millions of e-mails and faxes sent every day by ordinary people. The US has denied the system even exists, and the UK refuses to give details, except to say that communications interception is a vital tool in the fight against "dangers to society". The Echelon operation is based at Fort Meade in Maryland, America, and at the UK's spy centre, GCHQ in Cheltenham.
Note: For another revealing BBC News report on Echelon, click here.
Democratic presidential candidates Sens. Bernie Sanders, Kamala Harris and Elizabeth Warren on Wednesday defended Rep. Ilhan Omar against the backlash to her comments slamming pro-Israel groups and politicians, which have been called anti-Semitic. Sanders, who is Jewish, said criticism of Omar and efforts to get her taken off the House Foreign Affairs Committee ... are aimed at stopping a discussion about American's foreign policy toward Israel. [He] differentiated between promoting anti-Semitism and criticizing Israel as a state. Harris called out all instances of bigotry and expressed concern that the focus on Omar "may put her at risk." Warren [stated], "Branding criticism of Israel as automatically anti-Semitic has a chilling effect on our public discourse and makes it harder to achieve a peaceful solution between Israelis and Palestinians. Threats of violence -- like those made against Rep. Omar -- are never acceptable." Last month, Omar faced criticism for tweets insinuating that the pro-Israel lobbying group American Israel Public Affairs Committee was effectively buying off US politicians. The Minnesota Democrat subsequently apologized after demands from Speaker Nancy Pelosi of California. Omar [also] implied that pro-Israel lawmakers are under a "political influence in this country that says it is OK for people to push for allegiance to a foreign country." House Foreign Affairs Chairman Eliot Engel said Tuesday that he does not want Omar removed from her seat on the committee because of her recent comments, despite previously calling for her to apologize in a fiery statement.
Consumer Watchdog, an advocacy group largely focused in recent years on Google's privacy practices, has called [for] a congressional investigation into the Internet giant's "cozy" relationship with U.S. President Barack Obama's administration. In a letter sent [on January 24], Consumer Watchdog asked Representative Darrell Issa, the new chairman of the House Oversight and Government Reform Committee, to investigate the relationship between Google and several government agencies. "We believe Google has inappropriately benefited from close ties to the administration," the letter said. "It should not get special treatment and access because of a special relationship with the administration." Consumer Watchdog's latest complaints about the relationship of Google and the Obama administration are outlined in a 32-page report [which] questions Google's relationship with the U.S. National Security Agency and calls for the company to be more open about what consumer information it shares with the spy agency.
WikiLeaks co-founder Julian Assange has given his strongest indication yet about the next big leak from his whistleblower organisation. In an interview with the ABC's Foreign Correspondent, Mr Assange said cryptically of WikiLeaks' current project: "I can give an analogy. If there had been mass spying that had affected many, many people and organisations and the details of that mass spying were released then that is something that would reveal that the interests of many people had been abused." He agreed it would be of the "calibre" of publishing information about the way the top secret Echelon system - the US-UK electronic spying network which eavesdrops on worldwide communications traffic - had been used. Mr Assange also confirmed that WikiLeaks has a copy of a video showing a US military bombing of a western Afghan township which killed dozens of people, including children. During the course of the past month, Mr Assange has been talking to [ABC's] Foreign Correspondent for [an upcoming] program examining the efficacy of the WikiLeaks model. "What we want to create is a system where there is guaranteed free press across the world, the entire world, that every individual in the world has the ability to publish materials that is meaningful," he said.
Note: For more on government surveillance from major media sources, click here.
It's time to reflect on the immense powers Americans have ceded to the government and [the] potential for abuse by federal, state and local authorities. The global Internet and telecommunications infrastructure provides massive information on almost ... every person on the planet. One power truly stands out --- the all-encompassing reach and technological capabilities of the US National Security Agency. If you want to be secure, don't use a phone, a computer, credit card or any other technologically linked system because it guarantees that Big Brother will find you. Big Brother is not just the government. Most consumer "spying" comes from subpoenas and requests from non-terrorist-related federal, state, local agency requests and non-governmental private litigation and discovery. Simply put, a subpoena issued by a court in support of private litigation and discovery may have the same impact on an individual as the full force of the NSA. What information is typically requested from a company by say a plaintiff's lawyer during some discovery phase? Well, it's everything. In fact, it's generally a fishing expedition for every log file, every uploaded video, photo, chat session and anything else they can get their hands on.
Note: For lots more from major media sources on the continuing development of a global society under Big Brother's constant gaze, click here.
Pope Benedict XVI [has] called for a radical rethinking of the global economy, criticizing a growing divide between rich and poor and urging the establishment of a “true world political authority” to oversee the economy and work for the “common good.” He criticized the current economic system, “where the pernicious effects of sin are evident,” and urged financiers in particular to “rediscover the genuinely ethical foundation of their activity.” He also called for “greater social responsibility” on the part of business. “Once profit becomes the exclusive goal, if it is produced by improper means and without the common good as its ultimate end, it risks destroying wealth and creating poverty,” Benedict wrote in his new encyclical, which the Vatican released on [July 7]. More than two years in the making, “Caritas in Veritate,” or “Charity in Truth,” is Benedict’s third encyclical since he became pope in 2005. Filled with terms like “globalization,” “market economy,” “outsourcing,” “labor unions” and “alternative energy,” it is not surprising that the Italian media reported that the Vatican was having difficulty translating the 144-page document into Latin. In many ways, the document is a puzzling cross between an anti-globalization tract and a government white paper, another signal that the Vatican does not comfortably fit into traditional political categories of right and left. Benedict also called for a reform of the United Nations so there could be a unified “global political body” that allowed the less powerful of the earth to have a voice, and he called on rich nations to help less fortunate ones.
An inventory of potentially deadly pathogens at Fort Detrick's infectious disease laboratory found more than 9,000 vials that had not been accounted for, Army officials said yesterday, raising concerns that officials wouldn't know whether dangerous toxins were missing. After four months of searching about 335 freezers and refrigerators at the U.S. Army Medical Research Institute of Infectious Diseases in Frederick, investigators found 9,220 samples that hadn't been included in a database of about 66,000 items listed as of February, said Col. Mark Kortepeter, the institute's deputy commander. The vials contained some dangerous pathogens, among them the Ebola virus, anthrax bacteria and botulinum toxin, and less lethal agents such as Venezuelan equine encephalitis virus and the bacterium that causes tularemia. Most of them, forgotten inside freezer drawers, hadn't been used in years or even decades. Officials said some serum samples from hemorrhagic fever patients dated to the Korean War. The overstock and the previous inaccuracy of the database raised the possibility that someone could have taken a sample outside the lab with no way for officials to know something was missing. The institute has been under pressure to tighten security in the wake of the 2001 anthrax attacks, which killed five people and sickened 17. FBI investigators say they think the anthrax strain used in the attacks originated at the Army lab, and its prime suspect, Bruce E. Ivins, researched anthrax there. Ivins committed suicide last year during an investigation into his activities.
Note: Fort Detrick is the home of the government lab which is suspected to be involved with the creation of many previously unknown lethal viruses and germs. For lots more, see the excellent work of Dr. Leonard Horowitz at this link and this one.
America is ruled by an “intelligence-industrial complex” whose allegiance is not to the taxpaying public but to a cabal of private-sector contractors. That is the central thesis of Spies for Hire: The Secret World of Intelligence Outsourcing by Tim Shorrock, ... an investigative journalist. His book [provides a] disturbing overview of the intelligence community, also known as “the I.C.” Mr. Shorrock says our government is outsourcing 70 percent of its intelligence budget, or more than $42 billion a year, to a “secret army” of corporate vendors. Because of accelerated privatization efforts after 9/11, these companies are participating in covert operations and intelligence-gathering activities that were considered “inherently governmental” functions reserved for agencies like the Central Intelligence Agency, he says. Some of the book’s most intriguing assertions concern the permeating influence of the consulting firm Booz Allen Hamilton. In 2006, Mr. Shorrock reports, Booz Allen amassed $3.7 billion in revenue, much of which came from classified government contracts exempt from public oversight. Among its more than 18,000 employees are R. James Woolsey, the former C.I.A. director, and Joan Dempsey, a former longtime United States intelligence official who declared in a 2004 speech, “I like to refer to Booz Allen as the shadow I.C.” The “revolving door” between Booz Allen and the I.C. is personified by Mike McConnell, who joined the firm after serving as head of the National Security Agency under President Bill Clinton, only to return as director of national intelligence under President Bush.
Note: For revealing reports on government corruption from reliable sources, click here.
Over the past four years, the amount of money the State Department pays to private security and law enforcement contractors has soared to nearly $4 billion a year from $1 billion, ... but ... the department had added few new officials to oversee the contracts. Auditors and outside exerts say the results have been vast cost overruns, poor contract performance and, in some cases, violence that has so far gone unpunished. A vast majority of the money goes to companies like DynCorp International and Blackwater [Worldwide] to protect diplomats overseas, train foreign police forces and assist in drug eradication programs. There are only 17 contract compliance officers at the State Departments management bureau overseeing spending of the billions of dollars on these programs, officials said. Two new reports have delivered harsh judgments about the State Departments handling of the contracts, including the protective services contract that employs Blackwater guards whose involvement in a Sept. 16 shooting in Baghdad has raised questions about their role in guarding American diplomats in Iraq. The ballooning budget for outside contracts at the State Department is emblematic of a broader trend, contracting experts say. The Bush administration has doubled the amount of government money going to all types of contractors to $400 billion, creating a new and thriving class of post-9/11 corporations carrying out delicate work for the government. But the number of government employees issuing, managing and auditing contracts has barely grown. Thats a criticism thats true of not just State but of almost every agency, said Jody Freeman, an expert on administrative law at Harvard Law School.
Li Runsen, the powerful technology director of China’s ministry of public security, is best known for leading Project Golden Shield, China’s intensive effort to strengthen police control over the Internet. But last month Mr. Li took an additional title: director for China Security and Surveillance Technology, a fast-growing company that installs and sometimes operates surveillance systems for Chinese police agencies, jails and banks, among other customers. The company has just been approved for a listing on the New York Stock Exchange. The company’s listing and Mr. Li’s membership on its board are just the latest signs of ever-closer ties among Wall Street, surveillance companies and the Chinese government’s security apparatus. Wall Street analysts now follow the growth of companies that install surveillance systems providing Chinese police stations with 24-hour video feeds from nearby Internet cafes. Hedge fund money from the United States has paid for the development of not just better video cameras, but face-recognition software and even newer behavior-recognition software designed to spot the beginnings of a street protest and notify police. Executives of Chinese surveillance companies say they are helping their government reduce street crime, preserve social stability and prevent terrorism. They note that London has a more sophisticated surveillance system, although the Chinese system will soon be far more extensive. Wall Street executives also defend the industry as necessary to keep the peace at a time of rapid change in China. They point out that New York has begun experimenting with surveillance cameras in Lower Manhattan and other areas of the city.
Traditionally, powerful spy satellites have been used to search for strategic threats overseas. But now the Department of Homeland Security has developed a new office to use the satellites to [monitor the US itself]. [DHS] officials ... faced extensive criticism [in Congress] about the privacy and civil liberty concerns of the new office, called the National Applications Office. [House Homeland Security] Committee members expressed concern about abuse of the satellite imagery, charging that Homeland Security had not informed the oversight committee about the program. "What's most disturbing is learning about it from The Wall Street Journal," said Committee Chairman Rep. Bennie Thompson, D-Miss. The lawmakers also expressed concern about using military capabilities for U.S. law enforcement and Homeland Security operations, potentially a violation of the Posse Comitatus Act, which bars the military from serving as a law enforcement body within the United States. Committee members said that in addition to not being informed about the National Applications Office program, they had not yet been provided with documents defining the limits and legal guidance about the program. [They] sent a letter to Homeland Security saying, "We are so concerned that ... we are calling for a moratorium on the program. Today's testimony made clear that there is effectively no legal framework governing the domestic use of satellite imagery for the various purposes envisioned by the department."
The Bush administration rushed to defend new espionage legislation Monday amid growing concern that the changes could lead to increased spying by U.S. intelligence agencies on American citizens. But officials declined to provide details about how the new capabilities might be used by the National Security Agency and other spy services. And in many cases, they could point only to internal monitoring mechanisms to prevent abuse of the new rules that appear to give the government greater authority to tap into the traffic flowing across U.S. telecommunications networks. Officials rejected assertions that the new capabilities would enable the government to cast electronic "drift nets" that might ensnare U.S. citizens [and] that the new legislation would amount to the expansion of a controversial — and critics contend unconstitutional — warrantless wiretapping program that President Bush authorized after the 9/11 attacks. Intelligence experts said there were an array of provisions in the new legislation that appeared to make it possible for the government to engage in intelligence-collection activities that the Bush administration officials were discounting. "They are trying to shift the terms of the debate to their intentions and away from the meaning of the new law," said Steven Aftergood, an intelligence policy analyst at the Federation of American Scientists. "The new law gives them authority to do far more than simply surveil foreign communications abroad," he said. "It expands the surveillance program beyond terrorism to encompass foreign intelligence. It permits the monitoring of communications of a U.S. person as long as he or she is not the primary target. And it effectively removes judicial supervision of the surveillance process."
President Bush's latest affront to the U.S. Constitution [is] in plain view on the White House Web site: "Executive Order: Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq." This far-reaching order ... is a frontal assault on the Fifth Amendment, which decrees that the government cannot seize an individual's property without due process. [The order asserts] the authority to freeze the American assets of anyone who directly or indirectly assists someone who poses "a significant risk" [to] the "peace and stability" of [Iraq] or the reconstruction effort. "On its face, this is the greatest encroachment on civil liberties since the internment of Japanese Americans in World War II," said Bruce Fein, a constitutional lawyer who was a deputy attorney general in the Reagan administration. Fein said the sanctions against suspected violators would amount to "a financial death penalty. King George III really would have been jealous of this power." The executive order not only calls for the freezing of assets of anyone who directly or indirectly [opposes US policy in Iraq,] it prohibits anyone else from providing "funds, goods or services" to a blacklisted individual. In other words, a friend or relative could have his or her assets seized for trying to help someone whose bank account is suddenly frozen. An attorney who offered legal help could risk losing everything he or she owned. Then again, there's not much need for lawyers in the world of this executive order. The blacklist would be drawn up by the "secretary of treasury, in consultation with the secretary of state and the secretary of defense." The Fifth Amendment was written for good reason: It's dangerous to give the government unchecked authority to seize private property without judicial review.
There is increasing military interest in the development of techniques that can survey and possibly manipulate the mental processes of potential enemies, or enhance the potential of one's own troops. There is nothing new about such an interest. In the US, it stretches back at least half a century. Impressed by claims that the Soviet Union was developing psychological warfare, the CIA and the Defence Advanced Projects Agency (Darpa) began their own programmes. Early experiments included the clandestine feeding of LSD to their own operatives and attempts at 'brain-washing'. By the 1960s, Darpa, along with the US Navy, was funding almost all US research into 'artificial intelligence', in order to develop methods and technologies for the 'automated battlefield' and the 'intelligent soldier'. Contracts were let and patents taken out on techniques aimed at recording signals from the brains of enemy personnel at a distance, in order to 'read their minds'. These efforts have burgeoned in the aftermath of the so-called 'war on terror'. The step beyond reading thoughts is to attempt to control them directly. A new technique - transcranial magnetic stimulation (TMS) - has begun to generate interest. This focuses an intense magnetic field on specific brain regions, and has been shown to affect thoughts, perceptions and behaviour.
Note: These technologies are far more developed than this article suggests. For reliable, verifiable information on these little-known "non-lethal" weapons: http://www.WantToKnow.info/mindcontrol10pg#nonlethal
The widespread surveillance of Spanish citizens by the US National Security Agency, which caused outrage when it was reported this week, was the product of a collaboration with Spain's intelligence services, according to one Spanish newspaper. Spanish agents not only knew about the work of the NSA but also facilitated it, El Mundo reports. An NSA document entitled "Sharing computer network operations cryptologic information with foreign partners" reportedly shows how the US relies on the collaboration of many countries to give it access to intelligence information, including electronic metadata. According to the document seen by El Mundo, the US classifies cooperation with various countries on four different levels. In the first group – "Comprehensive Cooperation" – are the UK, Australia, Canada and New Zealand. The second group – "Focused Cooperation" – of which Spain is a member, includes 19 countries, all of them European, apart from Japan and South Korea. The third group – "Limited cooperation" – consists of countries such as France, Israel, India and Pakistan; while the fourth – "Exceptional Cooperation" – is made up of countries that the US considers to be hostile to its interests. The NSA documents [suggest] the Spanish intelligence services were working hand in hand with the NSA, as were other foreign agencies. But if there was any doubt as to who held the upper hand, the NSA documents make clear that any collaboration was always to serve the needs of protecting American interests.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.