Big Brother News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on Big Brother from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
The Bush administration said yesterday that it plans to start using the nation's most advanced spy technology for domestic purposes soon, rebuffing challenges by House Democrats over the idea's legal authority. Homeland Security Secretary Michael Chertoff said his department will activate his department's new domestic satellite surveillance office in stages, starting as soon as possible. Sophisticated overhead sensor data will be used for law enforcement once privacy and civil rights concerns are resolved, he said. His statements marked a fresh determination to operate the department's new National Applications Office. But Congress delayed launch of the new office last October. Critics cited its potential to expand the role of military assets in domestic law enforcement, to turn new or as-yet-undeveloped technologies against Americans without adequate public debate, and to divert the existing civilian and scientific focus of some satellite work to security uses. Democrats say Chertoff has not spelled out what federal laws govern the NAO, whose funding and size are classified. Congress barred Homeland Security from funding the office until its investigators could review the office's operating procedures and safeguards. The department submitted answers on Thursday, but some lawmakers promptly said the response was inadequate. [Rep. Bennie G. Thompson (D-Miss.), chairman of the House Homeland Security Committee] said, "We still don't know whether the NAO will pass constitutional muster since no legal framework has been provided."
Note: For many more revealing stories on threats to civil liberties, click here.
U.S. intelligence officials are [now claiming] that popular Internet services that enable computer users to adopt cartoon-like personas in three-dimensional online spaces also are creating security vulnerabilities by opening novel ways ... to move money, organize and conduct corporate espionage. Over the last few years, "virtual worlds" such as Second Life and other role-playing games have become home to millions of computer-generated personas known as avatars. By directing their avatars, people can take on alternate personalities, socialize, explore and earn and spend money across uncharted online landscapes. Nascent economies have sprung to life in these 3-D worlds, complete with currency, banks and shopping malls. Corporations and government agencies have opened animated virtual offices, and a growing number of organizations hold meetings where avatars gather and converse in newly minted conference centers. Intelligence officials ... say they're convinced that the qualities that many computer users find so attractive about virtual worlds -- including anonymity, global access and the expanded ability to make financial transfers outside normal channels -- have turned them into seedbeds for transnational threats. The government's growing concern seems likely to make virtual worlds the next battlefield in the struggle over the proper limits on the government's quest to [expand] data collection and analysis and the surveillance of commercial computer systems. Virtual worlds could also become an actual battlefield. The intelligence community has begun contemplating how to use Second Life and other such communities as platforms for cyber weapons.
At least 20,000 police surveillance cameras are being installed along streets here [in Shenzhen] in southern China and will soon be guided by sophisticated computer software from an American-financed company to recognize automatically the faces of police suspects and detect unusual activity. Starting this month in a port neighborhood and then spreading across Shenzhen, a city of 12.4 million people, residency cards fitted with powerful computer chips programmed by the same company will be issued to most citizens. Data on the chip will include not just the citizen’s name and address but also work history, educational background, religion, ethnicity, police record, medical insurance status and landlord’s phone number. Even personal reproductive history will be included, for enforcement of China’s controversial “one child” policy. Plans are being studied to add credit histories, subway travel payments and small purchases charged to the card. Security experts describe China’s plans as the world’s largest effort to meld cutting-edge computer technology with police work to track the activities of a population. But they say the technology can be used to violate civil rights. “We have a very good relationship with U.S. companies like I.B.M., Cisco, H.P., Dell,” said Robin Huang, the chief operating officer of China Public Security. “All of these U.S. companies work with us to build our system together.” The role of American companies in helping Chinese security forces has periodically been controversial in the United States. Executives from Yahoo, Google, Microsoft and Cisco Systems testified in February 2006 at a Congressional hearing called to review whether they had deliberately designed their systems to help the Chinese state muzzle dissidents on the Internet; they denied having done so.
An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.
No longer a gleam in the Pentagon's eye, ray guns — or radiofrequency (RF) weapons, to be exact — officially have arrived. As troops are increasingly forced to serve as an ad hoc police force, nonlethal weapons have become a priority for the military. The Department of Defense is currently testing the Active Denial System (ADS), which fires pain-inducing beams of 95-GHz radio waves, for deployment on ground vehicles. This surface heating doesn't actually burn the target, but is painful enough to force a retreat. While the military continues to investigate the safety of RF-based weapons, defense contractor Raytheon has released Silent Guardian, a stripped-down version of the ADS, marketed to law enforcement and security providers as well as to the military. Using a joystick and a targeting screen, operators can induce pain from over 250 yards away, as opposed to more than 500 yards with the ADS. Unlike its longer-ranged counterpart, Silent Guardian is available now. As futuristic — and frightening — as the ADS "pain ray" sounds, the Air Force Office of Scientific Research is funding an even more ambitious use of RF energy. Researchers at the University of Nevada are investigating the feasibility of a method that would immobilize targets without causing pain. Rather than heating the subject's skin, this approach would use microwaves at 0.75 to 6 GHz to affect skeletal muscle contractions. This project is still in the beginning stages. The ADS, on the other hand, is already a painful reality.
Note: For lots more concerning information on non-lethal weapons, click here.
A serene setting in Ottawa's west-end Kanata suburb has been transformed into a four-day festival of black suits, black limousines, burly security guards and a bevy of conspiracy theories. The security outside the Brookstreet Hotel is much tighter than it is on Parliament Hill. Inside, the CBC was told, all guests were asked to check out at 8:30 a.m. on Thursday. The hotel appears to be hosting the annual meeting of one of the world's most secretive and powerful societies: the Bilderberg group. But, of course, no one will admit it. People who follow the Bilderberg group say it persuaded Europe to adopt a common currency, and, among other things, persuaded Bill Clinton to support the North American Free Trade Agreement. "David Rockefeller is going to be here. Henry Kissinger is going to be here. Wolfowitz, the president of the World Bank, is going to be here" says Daniel Estulin, who has written a book about the Bilderberg group. Jim Tucker, who has followed the Bilderberg group for the last 30 years, told CBC News he is troubled by all the secrecy. "Officials of the United States government [should not] have a private meeting with private citizens about public policy," Tucker says.
The question puzzles and enrages a city: how is it that the Americans cannot keep the electricity running in Baghdad for more than a couple of hours a day, yet still manage to build themselves the biggest embassy on Earth? Irritation grows as residents deprived of air-conditioning and running water three years after the US-led invasion watch the massive US Embassy they call 'George W's palace' rising from the banks of the Tigris. In the pavement cafés, people moan that the structure is bigger than anything Saddam Hussein built. Officially, the design of the compound is supposed to be a secret, but you cannot hide the giant construction cranes and the concrete contours of the 21 buildings that are taking shape. Looming over the skyline, the embassy has the distinction of being the only big US building project in Iraq that is on time and within budget. In a week when Washington revealed a startling list of missed deadlines and overspending on building projects, Congress was told that the bill for the embassy was $592 million (Ł312 million).
Note: For the deeper reasons behind this war, don't miss http://www.WantToKnow.info/warcoverup
[April 10, 2006] The U.S. military is conducting a propaganda campaign to magnify the role of the leader of al-Qaeda in Iraq, according to internal military documents. The effort has raised his profile in a way that some military intelligence officials believe may have...helped the Bush administration tie the war to...Sept. 11. Although Zarqawi and other foreign insurgents in Iraq have conducted deadly bombing attacks, they remain "a very small part of the actual numbers," [said] Col. Derek Harvey, who...was one of the top officers handling Iraq intelligence issues on the staff of the Joint Chiefs of Staff. "Our own focus on Zarqawi has enlarged his caricature...made him more important than he really is." One briefing slide about U.S. "strategic communications" in Iraq, prepared for Army Gen. George W. Casey Jr., the top U.S. commander in Iraq, describes the "home audience" as one of six major targets of the American side of the war. There were direct military efforts to use the U.S. media to affect views of the war. One slide in the same briefing, for example, noted that a "selective leak" about Zarqawi was made to Dexter Filkins, a New York Times reporter. Filkins's resulting article...ran on the Times front page. U.S. propaganda efforts in Iraq in 2004 cost $24 million. "Villainize Zarqawi" one U.S. military briefing from 2004 stated. It listed..."PSYOP," the U.S. military term for propaganda work. One internal briefing, produced by the U.S. military headquarters in Iraq, said..."The Zarqawi PSYOP program is the most successful information campaign to date."
Louisiana's top hurricane experts have rejected the official explanations for the floodwall collapses that inundated much of New Orleans, concluding that Hurricane Katrina's storm surges were much smaller than authorities have suggested and that the city's flood-protection system should have kept most of the city dry. With the help of complex computer models and stark visual evidence, scientists and engineers at Louisiana State University's Hurricane Center have concluded that Katrina's surges did not come close to overtopping those barriers. That would make faulty design, inadequate construction or some combination of the two the likely cause of the breaching of the floodwalls. Ivor van Heerden, the Hurricane Center's deputy director, said the real scandal of Katrina is the "catastrophic structural failure" of barriers that should have handled the hurricane with relative ease. "We are absolutely convinced that those floodwalls were never overtopped," said van Heerden. On a tour Tuesday, researchers...showed a "debris line" that indicates the top height of Katrina's waves was at least four feet below the crest of Lake Pontchartrain's levees. They contended that the pattern of destruction behind the breaches was consistent with a localized "pressure burst," rather than widespread overtopping. Former representative Bob Livingston, (R-La.)...noted that the earthen levees along Lake Pontchartrain had all held, while concrete floodwalls had failed. He was especially concerned about the 17th Street barrier, saying it "shouldn't have broken." If Katrina did not exceed the design capacity of the New Orleans levees, the federal government may bear ultimate responsibility for this disaster.
Former CBS News anchor Dan Rather said Monday that there is a climate of fear running through newsrooms stronger than he has ever seen in his more than four-decade career. Rather famously tangled with President Nixon and his aides during the Watergate years while Rather was a hard-charging White House correspondent. He said that in the intervening years, politicians "of every persuasion" had gotten better at applying pressure on the conglomerates that own the broadcast networks. He called it a "new journalism order." He said this pressure -- along with the "dumbed-down, tarted-up" coverage, the advent of 24-hour cable competition and the chase for ratings and demographics -- has taken its toll on the news business. "All of this creates a bigger atmosphere of fear in newsrooms," Rather said.
CANNES, France (Reuters) -- A British documentary arguing U.S. neo-conservatives have exaggerated the terror threat is set to rock the Cannes Film Festival on Saturday, the way "Fahrenheit 9/11" stirred emotions here a year ago. At a screening late on Friday ahead of its gala on Saturday, "The Power of Nightmares" by filmmaker and senior BBC producer Adam Curtis kept an audience of journalists and film buyers glued to their seats and taking notes for a full 2-1/2 hours. The film, a non-competition entry, argues that the fear of terrorism has come to pervade politics in the United States and Britain even though much of that angst is based on carefully nurtured illusions.
Note: To view this excellent film online free, click here.
This award-winning film provides an inside look at the anatomy of the American war machine. Why We Fight [was originally] the title of a series of propaganda films that Frank Capra began making in 1942, with the aim of encouraging the American war effort against Nazism. Director Eugene Jarecki (The Trials of Henry Kissinger) has used the films as a commentary on the contemporary obsession of the American elite with military power. He also harks back to a speech by President Eisenhower, who, just before he left office, referred to the "military-industrial complex". Eisenhower was worried that too much intelligence, and too much business acumen in America, had become focussed on the production of unnecessary weapons systems. Since Eisenhower's time, everything has become much worse, as Eugene Jarecki describes it. The war in Iraq was made possible by a new range of weapons systems: a bomb called the "bunker buster" was dropped by stealth bombers on the first night of the conflict. Is American foreign policy dominated by the idea of military supremacy? Has the military become too important in American life? Jarecki's shrewd and intelligent polemic would seem to give an affirmative answer to each of these questions.
Note: To watch this great film (which won the Grand Jury Prize at the Sundance Film Festival) free online, click here or here. For powerful information on cover-ups around war, click here.
NPR’s David Folkenflik has a revealing new look at ... one of the most important journalistic stories of the last decade: The New York Times‘ 2004 decision ... to suppress for 15 months (through Bush’s re-election) its reporters’ discovery that the NSA was illegally eavesdropping on Americans without warrants. This episode was one significant reason Edward Snowden purposely excluded the Times from his massive trove of documents. In an interview with Folkenflik, the paper’s new executive editor, Dean Baquet, describes the paper’s exclusion from the Snowden story as “really painful.” But ... Baquet has his own checkered history in suppressing plainly newsworthy stories at the government’s request, including a particularly inexcusable 2007 decision, when he was the managing editor of The Los Angeles Times, to kill a story based on AT&T whistleblower Mark Klein’s revelations that the NSA had built secret rooms at AT&T to siphon massive amounts of domestic telephone traffic. In his NPR interview, Baquet insists that he has had a serious change of heart on such questions as a result of the last year of NSA revelations: "[Baquet] says the experience has proved that news executives are often unduly deferential to seemingly authoritative warnings unaccompanied by hard evidence." Dean Baquet’s epiphany about the U.S. government and the American media ... is long overdue, but better late than never. Let us hope that it signals an actual change in behavior.
Note: For more on this, see concise summaries of deeply revealing media corruption news articles from reliable major media sources.
To have a genuinely constructive debate, data must be compiled, evidence must be amassed and verifiable truths must be presented. This truism is particularly significant when it comes to debates about security and liberty. Without facts, we get the counterproductive discourse we are being treated to right now - the one hijacked by National Security Administration defenders throwing temper tantrums, tossing out fear-mongering platitudes and trying to prevent any scrutiny of the agency. Tune into a national news program and you inevitably will hear pundits who have spent the last decade mindlessly cheering on wars and warrantless wiretapping now echoing the talking points emanating from surveillance-state apparatchiks like Reps. Mike Rogers, R-Mich., and Dutch Ruppersberger, D-Md. This week, these two lawmakers, who head the House Intelligence Committee, summarized all the bluster in a press release that should be enshrined for posterity. In an attempt to defend the NSA, the bipartisan duo breathlessly claimed that whistle-blower Edward Snowden ended up "endangering each and every American" by exposing the government's mass surveillance (i.e., metadata) programs. They indicted Snowden's patriotism and said his disclosures of the NSA's unlawful and unconstitutional programs "aligned him with our enemy." But the facts now leaking out of the government's national security apparatus are doing the opposite. They are debunking - rather than confirming - the NSA defenders' platitudes.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
Organizations in the financial services sector have deployed at least 1,447 former federal employees to lobby Congress and federal agencies since the beginning of 2009, according to a joint analysis of federal disclosure records and other data released today by Public Citizen and the Center for Responsive Politics. This small army of registered financial services sector lobbyists includes at least 73 former members of Congress, of whom 17 served on the banking committees of either the U.S. House of Representatives or the Senate. At least 66 industry lobbyists worked for these committees as staffers, while 82 additional lobbyists once worked for congressional members who currently serve on these key committees. Further, at least 42 financial services lobbyists formerly served in some capacity in the U.S. Treasury Department. At least seven served in the Office of the Comptroller of the Currency, including two former comptrollers. “Wall Street hires former members of Congress and their staff for a reason," said David Arkush, director of Public Citizen’s Congress Watch division. "These people are influential because they have personal relationships with current members and staff. It’s hard to say no to your friends."
Note: To read the full report, click here. The nonprofit, nonpartisan Center for Responsive Politics is the nation's premier research group tracking money in federal politics and its effect on elections and public policy. Public Citizen is a national, nonprofit consumer advocacy organization based in Washington, D.C.
After a Somali-American teenager from Minneapolis committed a suicide bombing in Africa in October 2008, the Federal Bureau of Investigation began investigating whether a Somali Islamist group had recruited him on United States soil. Instead of collecting information only on people about whom they had a tip or links to the teenager, agents fanned out to scrutinize Somali communities. The operation unfolded as the Bush administration was relaxing some domestic intelligence-gathering rules. The F.B.I.’s interpretation of those rules was recently made public when it released, in response to a Freedom of Information lawsuit, its “Domestic Investigations and Operations Guide.” The disclosure of the manual has opened the widest window yet onto how agents have been given greater power in the post-Sept. 11 era. But the manual’s details have alarmed privacy advocates. “It raises fundamental questions about whether a domestic intelligence agency can protect civil liberties if they feel they have a right to collect broad personal information about people they don’t even suspect of wrongdoing,” said Mike German, a former F.B.I. agent who now works for the American Civil Liberties Union. The manual authorizes agents to open an “assessment” to “proactively” seek information about whether people or organizations are involved in national security threats. Assessments permit agents to use potentially intrusive techniques, like sending confidential informants to infiltrate organizations and following and photographing targets in public. When selecting targets, agents are permitted to consider political speech or religion as one criterion.
Note: To read the FBI's recently-released and redacted new "Domestic Investigations and Operation Guide", described by the New York Times as giving "F.B.I. agents the most power in national security matters that they have had since the post-Watergate era," click here.
"New World Order," which premieres today on the Independent Film Channel, is a film about ... volunteers in an "information war" who see ... that 9/11 was an "inside job," that the military-industrial complex killed Kennedy, and that an international "power elite" is plotting to enslave us all, excepting for those it will kill outright. They are hard to pigeonhole politically, these conspiracy adepts, trusting neither the "socialist Democrats" nor the "fascist Republicans" -- Ron Paul seems to be their man, if anyone is -- yet sounding as often like '60s leftist radicals as right-wing militiamen. They take the 1st Amendment as seriously as any card-carrying member of the ACLU, styling themselves muckrakers and speakers of truth to power, often through a bullhorn. The man with the biggest bullhorn is Alex Jones, an Austin, Texas-based syndicated radio host ... and the point through which all the strands connect in this unexpectedly affecting, nonjudgmental documentary by Luke Meyer and Andrew Neel. Much of what Jones and his fellows and followers believe is, in a general way, hardly controversial. But whether 9/11 was a plot to bring on world government, or whether the government you already have has painted a red or blue dot on your mailbox to indicate whether you will be shot immediately or merely be sent to the "FEMA camps" when the American Armageddon arrives, well, that's a pale horse of a different color. (Still, you'll want to check your mailbox now.) "This is more important than how much Britney Spears' hair sold for on EBay, 'Dancing With the Stars' or who's gonna be America's next idol," says one believer. "People think this is a joke. We're not a joke."
Note: The disparaging tone of this review of the documentary is typical of mainstream media treatment of 9/11 truth activity, but it makes clear that the film itself does not share this attitude.
Electronic surveillance and collection of personal data are "pervasive" in British society and threaten to undermine democracy, peers [in the House of Lords] have warned. CCTV cameras and the DNA database were two examples of threats to privacy, the Lords constitution committee said. It called for compensation for people subject to illegal surveillance. Civil liberties campaigners have warned about the risks of a "surveillance society" in which the state acquires ever-greater powers to track people's movements and retain personal data. In its report, the Lords constitution committee said growth in surveillance by both the state and the private sector risked threatening people's right to privacy, which it said was "an essential pre-requisite to the exercise of individual freedom". People were often unaware of the scale of personal information held and exchanged by public bodies, it said. "There can be no justification for this gradual but incessant creep towards every detail about us being recorded and pored over by the state," committee chairman and Tory peer Lord Goodlad said. "The huge rise in surveillance and data collection by the state and other organisations risks undermining the long-standing tradition of privacy and individual freedom which are vital for democracy," Lord Goodlad added. Human rights campaigners Liberty welcomed the report.
Note: For key reports from major media sources on growing threats to privacy from governments and corporations, click here.
This is the year when automated face-recognition finally goes mainstream, and it's about time we considered its social and political implications. Researchers are developing sharply accurate scanners that monitor faces in 3D and software that analyses skin texture to turn tiny wrinkles, blemishes and spots into a numerical formula. The strongest face-recognition algorithms are now considered more accurate than most humans - and already the Home Office and the Association of Chief Police Officers have held discussions about the possibility of linking such systems with automatic car-numberplate recognition and public-transport databases. Join everything together via the internet, and voilŕ - the nation's population, down to the individual Times reader, can be conveniently and automatically monitored in real time. So let's understand this: governments and police are planning to implement increasingly accurate surveillance technologies that are unnoticeable, cheap, pervasive, ubiquitous, and searchable in real time. And private businesses, from bars to workplaces, will also operate such systems, whose data trail may well be sold on or leaked to third parties - let's say, insurance companies that have an interest in knowing about your unhealthy lifestyle, or your ex-spouse who wants evidence that you can afford higher maintenance payments.
Note: For disturbing reports on threats to privacy from major media sources, click here.
Federal agents may take a traveler's laptop computer or other electronic device to an off-site location for an unspecified period of time without any suspicion of wrongdoing, as part of border search policies the Department of Homeland Security recently disclosed. Also, officials may share copies of the laptop's contents with other agencies and private entities for language translation, data decryption or other reasons, according to the policies, dated July 16 and issued by two DHS agencies, U.S. Customs and Border Protection and U.S. Immigration and Customs Enforcement. "The policies . . . are truly alarming," said Sen. Russell Feingold (D-Wis.), who is probing the government's border search practices. He said he intends to introduce legislation soon that would require reasonable suspicion for border searches, as well as prohibit profiling on race, religion or national origin. DHS officials said the newly disclosed policies ... apply to anyone entering the country, including U.S. citizens. Civil liberties and business travel groups have pressed the government to disclose its procedures as an increasing number of international travelers have reported that their laptops, cellphones and other digital devices had been taken -- for months, in at least one case -- and their contents examined. The policies cover "any device capable of storing information in digital or analog form," including hard drives, flash drives, cellphones, iPods, pagers, beepers, and video and audio tapes. They also cover "all papers and other written documentation," including books, pamphlets and "written materials commonly referred to as 'pocket trash' or 'pocket litter.' "
Note: For many reports from reliable, verifiable sources on threats to privacy, click here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.