Please donate here to support this vital work.
Revealing News For a Better World

Terrorism Media Articles
Excerpts of Key Terrorism Media Articles in Major Media


Below are key excerpts of revealing news articles on terrorism from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


Lawmakers say FBI thwarts inquiry into Boston bombings
2013-07-10, Boston Globe
http://www.bostonglobe.com/news/politics/2013/07/10/house-chairman-says-fbi-s...

Members of a congressional committee [on July 10] accused the FBI of stalling an inquiry into the Boston Marathon bombings, saying the bureau had no grounds for withholding what it knew about Tamerlan Tsarnaev prior to the attacks. “The information requested by this committee belongs to the American people,’’ said Representative Michael McCaul, a Texas Republican who chairs the House Homeland Security Committee. “It does not belong solely to the FBI.” The frustrations, aired publicly after FBI officials rebuffed an invitation to appear before the committee, stemmed from the FBI’s unwillingness to detail how it handled a security review of Tsarnaev nearly two years before the Marathon bombings. “The FBI continues to refuse this committee’s appropriate requests for information and documents crucial to our investigation into what happened in Boston,” McCaul declared as he opened a committee hearing. Tsarnaev died after a firefight with police in Watertown within hours of being identified as a suspect. Members were particularly frustrated by a July 3 letter to the committee from the FBI. The letter, reviewed by the Globe, said the bureau would not be responding to all the committee’s requests for information. “The fact that the FBI is not sharing information with this committee with jurisdiction over homeland security I think is just totally unacceptable,” said Representative Peter King, a New York Republican.

Note: For more strangeness around the Boston bombing with a key witness being deported, click here. For more on the realities of intelligence agency manipulations, see the deeply revealing reports from reliable major media sources available here.


Bin Laden Records Kept in the Shadows
2013-07-08, ABC News/Associated Press
http://abcnews.go.com/Politics/wireStory/secret-move-bin-laden-records-shadow...

The top U.S. special operations commander, Adm. William McRaven, ordered military files about the Navy SEAL raid on Osama bin Laden's hideout to be purged from Defense Department computers and sent to the CIA, where they could be more easily shielded from ever being made public. The secret move, described briefly in a draft report by the Pentagon's inspector general, set off no alarms within the Obama administration even though it appears to have sidestepped federal rules and perhaps also the U.S. Freedom of Information Act. The CIA, noting that the bin Laden mission was overseen by then-CIA Director Leon Panetta before he became defense secretary, said that the SEALs were effectively assigned to work temporarily for the CIA, which has presidential authority to conduct covert operations. The records transfer was part of an effort by McRaven to protect the names of the personnel involved in the raid, according to the inspector general's draft report. But secretly moving the records allowed the Pentagon to tell The Associated Press that it couldn't find any documents inside the Defense Department that AP had requested more than two years ago, and would represent a new strategy for the U.S. government to shield even its most sensitive activities from public scrutiny. "Welcome to the shell game in place of open government," said Thomas Blanton, director of the National Security Archive, a private research institute at George Washington University. "Guess which shell the records are under. If you guess the right shell, we might show them to you. It's ridiculous."

Note: For a powerful analysis of the strong evidence that Osama bin Laden most likely died in Afghanistan in December 2001, long before he was "killed" by the SEALs raid in Pakistan, read David Ray Griffin's Osama bin Laden: Dead or Alive? For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.


In Secret, Court Vastly Broadens Powers of N.S.A.
2013-07-07, New York Times
http://www.nytimes.com/2013/07/07/us/in-secret-court-vastly-broadens-powers-o...

In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans. The rulings, some nearly 100 pages long, reveal that the court has taken on a much more expansive role by regularly assessing broad constitutional questions and establishing important judicial precedents, with almost no public scrutiny. The 11-member Foreign Intelligence Surveillance Court, known as the FISA court, was once mostly focused on approving case-by-case wiretapping orders. But since major changes in legislation and greater judicial oversight of intelligence operations were instituted six years ago, it has quietly become almost a parallel Supreme Court, serving as the ultimate arbiter on surveillance issues and delivering opinions that will most likely shape intelligence practices for years to come. In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures. Unlike the Supreme Court, the FISA court hears from only one side in the case — the government — and its findings are almost never made public.

Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.


South American Leaders Demand Apology in Plane Row
2013-07-05, New York Times
http://www.nytimes.com/aponline/2013/07/05/world/americas/ap-lt-nsa-surveilla...

South America's leftist leaders rallied to support Bolivian President Evo Morales after his plane was rerouted amid suspicions that NSA leaker Edward Snowden was on board and they demanded an apology from France, Italy, Portugal and Spain. The presidents of Argentina, Ecuador, Suriname, Venezuela and Uruguay joined Morales in the Bolivian city of Cochabamba ... to denounce the treatment of Morales, who warned that he would close the U.S. Embassy in Bolivia if necessary. Morales again blamed Washington for pressuring European countries to refuse to allow his plane to fly through their airspace on Tuesday, forcing it to land in Vienna, Austria, in what he called a violation of international law. He had been returning from a summit in Russia during which he had suggested he would be willing to consider a request from Snowden for asylum. Spanish Foreign Minister Jose Manuel Garcia-Margallo said Friday that his nation and other European countries were told Snowden was aboard the Bolivian presidential plane. He did not say who supplied the information and declined to say whether he had been in contact with the United States. Ecuadorean President Rafael Correa said that he and other leaders were offering full support to Morales following the rerouting of the plane, calling it an aggression against the Americas. Venezuelan President Nicolas Maduro protested alleged attempts by Spanish officials to search the Bolivian presidential plane and accused the CIA of encouraging several European countries to deny the presidential plane their airspace.

Note: The subservience of European governments to the US attempt to apprehend Snowden by forcing Pres. Morales' plane down is logical given the recent revelations that they are also engaging in total surveillance of their own populations. For information on this click here (France), here (the UK), and here (Germany).


U.S. Postal Service Logging All Mail for Law Enforcement
2013-07-04, New York Times
http://www.nytimes.com/2013/07/04/us/monitoring-of-snail-mail.html?pagewanted...

Leslie James Pickering noticed something odd in his mail last September: a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home. “Show all mail to supv” — supervisor — “for copying prior to going out on the street,” read the card. It included Mr. Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green. “It was a bit of a shock to see it,” said Mr. Pickering, who with his wife owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service. Mr. Pickering was targeted by a longtime surveillance system called mail covers, a forerunner of a vastly more expansive effort, the Mail Isolation Control and Tracking program, in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year. It is not known how long the government saves the images. The Mail Isolation Control and Tracking program was created after the anthrax attacks in late 2001. It enables the Postal Service to retrace the path of mail at the request of law enforcement. No one disputes that it is sweeping.

Note: The exposure by whistleblower Edward Snowden of the NSA's massive domestic and global spying operations seems to have triggered a series of other revelations about surveillance of the US population, like this report on the US Postal Service's photographing all mail. Hardly a week goes by without another major revelation, such as a new digital photo-ID database utilized by the FBI and police forces, and the development by US police of a national DNA database on all "potential suspects". Since very few US citizens are terrorists, what is the real purpose behind this total surveillance?


How cash rules surveillance policy
2013-07-04, San Francisco Chronicle (SF's leading newspaper)
http://www.sfchronicle.com/opinion/article/How-cash-rules-surveillance-policy...

Have you noticed anything missing in the political discourse about the National Security Administration's unprecedented mass surveillance? There's at least been some conversation about the intelligence community's potential criminality and constitutional violations. But there have only been veiled references to how cash undoubtedly tilts the debate against those who challenge the national security state. Those indirect references have come in stories about Booz Allen Hamilton, the security contractor that employed Edward Snowden. CNN/Money notes that 99 percent of the firm's multibillion-dollar annual revenues now come from the federal government. Those revenues are part of a larger and growing economic sector within the military-industrial complex - a sector that, according to author Tim Shorrock, is "a $56 billion-a-year industry." Yet few in the Washington press corps mention that politicians' attacks on surveillance critics may have nothing to do with principle and everything to do with shilling for campaign donors. For a taste of what that kind of institutionalized corruption looks like, peruse the Influence Explorer site to see how much Booz Allen Hamilton and its parent company, the Carlyle Group, spend. As you'll see, from Barack Obama to John McCain, many of the politicians publicly defending the surveillance state have taken huge sums of money from the firms. Simply put, there are corporate forces with a vested financial interest in making sure the debate over security is tilted toward the surveillance state and against critics of that surveillance state.

Note: Tim Shorrock, quoted above, is the author of Spies for Hire: The Secret World of Intelligence Outsourcing.


The Real War on Reality
2013-06-14, New York Times
http://opinionator.blogs.nytimes.com/2013/06/14/the-real-war-on-reality/

The modern American surveillance state is not really the stuff of paranoid fantasies; it has arrived. The revelations about the National Security Agency’s PRISM data collection program have raised awareness ... about the reach and power of secret intelligence gatherers operating behind the facades of government and business. But those revelations ... have been partial — they primarily focus on one government agency and on the surveillance end of intelligence work, purportedly done in the interest of national security. What has received less attention is the fact that most intelligence work today is not carried out by government agencies but by private intelligence firms and that much of that work involves another common aspect of intelligence work: deception. That is, it is involved not just with the concealment of reality, but with the manufacture of it. Important insight into the world [of] these companies came from a 2010 hack by a group best known as LulzSec ... which targeted the private intelligence firm HBGary Federal. That hack yielded 75,000 e-mails. Team Themis (a group that included HBGary and the private intelligence and security firms Palantir Technologies, Berico Technologies and Endgame Systems) was effectively brought in to find a way to undermine the credibility of WikiLeaks and the journalist Glenn Greenwald (who recently broke the story of Edward Snowden’s leak of the N.S.A.’s Prism program), because of Greenwald’s support for WikiLeaks. The plan called for actions to “sabotage or discredit the opposing organization” including a plan to submit fake documents and then call out the error.

Note: For more on the games intelligence agencies play, see the deeply revealing reports from reliable major media sources available here.


NSA surveillance played little role in foiling terror plots, experts say
2013-06-12, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2013/jun/12/nsa-surveillance-data-terror-attack

Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.

Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.


This is how to deal with armed forces' brutality
2013-06-09, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/jun/09/armed-forces-brutality-i...

Baha Mousa was tortured to death in September 2003 while in the custody of the British armed forces in Iraq. The subsequent inquiry led to a report, published in September 2011, that leaves no doubt about the ... brutal illegality of the UK's current approach to the detention and interrogation of suspected insurgents. The training of interrogators used in Iraq involved blatant illegality: forced nakedness, screaming foul abuse into detainees' faces, sensory deprivation and [other forms of torture]. The list of unlawful killings is endless. And there are hundreds of Iraqis' cases before British courts in which allegations are made of egregious acts of torture and cruel, inhuman and degrading treatment. A high court judgment in late May ... involves more than 1,000 Iraqi cases of unlawful killings and acts of torture. It establishes that whenever UK personnel abroad have authority and control over others – and commit what might be acts of unlawful killing and torture – there must be an "inquisitorial process" in public into each case. There must also be public scrutiny of the systemic issues arising from these cases. Take, for example, the case of Huda, an eight-year-old girl in a yellow dress playing with her friends one sunlit morning in Basra. A British rifleman in a tank, apparently perceiving her to be a threat to force security, shot her dead without warning at close range. Before this new judgment, the Ministry of Defence successfully shut the door on any accountability. Under the new system, the commanding officer would have to suspend the soldier and send in the military police to forensically examine the scene, interview witnesses and family, and send the results of a full investigation back to London to be examined independently and publicly.

Note: For more on atrocities committed by the US and UK military forces in their wars of aggression in Iraq and Afghanistan, see the deeply revealing reports from reliable major media sources available here.


U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program
2013-06-07, Washington Post
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from...

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs. The program, code-named PRISM, has not been made public until now. It may be the first of its kind. Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” GCHQ, Britain’s equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority. Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.

Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.


Everything you need to know about the NSA’s phone records scandal
2013-06-06, Washington Post
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/06/everything-you-nee...

The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata — a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, it’s possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So it’s possible the NSA is using rooms like that to listen to everyone’s phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but it’s hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.

Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.


What if laws applied to everyone?
2013-06-06, Fox News
http://www.foxnews.com/opinion/2013/06/06/what-if-laws-applied-to-everyone/

What if government officials have written laws that apply only to us and not to them? What if we gave them the power to protect our freedoms and our safety and they used that power to trick and trap some of us? What if government officials broke the laws we hired them to enforce? What if they prosecuted others for breaking the same laws they broke? What if the government enacted a law making it a crime to provide material assistance to terrorist organizations? What if the government looked at that law and claimed it applied to a dentist or a shopkeeper who sold services or goods to a terrorist organization, and not just to financiers and bomb makers? What if the Supreme Court ruled that the law is so broad that it covers backslapping, advocacy and free speech? What if the law is so broad that it punishes ideas and the free expression of those ideas, even if no one is harmed thereby? What if FBI agents pretended to be members of these terrorist organizations and set out to find people in America who were willing to join? What if the FBI arrested the people it found and encouraged just as they were about to leave the U.S. and then charged them with providing material assistance to terrorist organizations? What if the president boasted that in his mind these duped dopes were really terrorists and their arrests kept us all safer? What if offensive wars are illegal and morally wrong? What if killing is evil when not done in self-defense? What if those who kill not in self-defense are prosecuted and punished, except when they do so in large numbers and to the sounds of trumpets blaring? What do we do about a government that breaks the laws we have hired it to enforce?

Note: Andrew P. Napolitano, author of this opinion, is the senior judicial analyst at Fox News Channel. Judge Napolitano has written seven books on the U.S. Constitution. His latest is Theodore and Woodrow: How Two American Presidents Destroyed Constitutional Freedom.


Graham: FBI hindered Congress’s 9/11 inquiry, withheld reports about Sarasota Saudis
2013-06-05, Miami Herald
http://www.miamiherald.com/2013/06/05/3434487/graham-fbi-hindered-congresss.html

Former U.S. Sen. Bob Graham has accused the FBI in court papers of having impeded Congress’s Joint Inquiry into 9/11 by withholding information about a Florida connection to the ... attacks that killed nearly 3,000 people. The information ... includes a recently declassified FBI report that ties a Saudi family who once lived in Sarasota “to individuals associated with the terrorist attacks on 9/11/2001.” “The FBI’s failure to call (to the Joint Inquiry’s attention) documents finding ‘many connections’ between Saudis living in the United States and individuals associated with the terrorist attack(s) … interfered with the Inquiry’s ability to complete its mission,” said Graham, co-chairman of the Joint Inquiry. Graham said the FBI kept the 9/11 Commission in the dark, too. He said co-chairmen Thomas Kean and Lee Hamilton and executive director Philip Zelikow all told him they were unaware of the FBI’s Sarasota investigation. Moreover, Graham stated that Deputy FBI Director Sean Joyce, the Bureau’s second in command, personally intervened to block him from speaking with the special agent-in-charge of the Sarasota investigation. “I am troubled by what appears to me to be a persistent effort by the FBI to conceal from the American people information concerning possible Saudi support of the Sept. 11 attacks,” Florida’s former governor said.

Note: For deeply revealing reports from reliable major media sources on the 9/11 attacks, click here.


Bilderberg 2013: welcome to 1984
2013-06-05, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2013/jun/05/bilderberg-2013-goldman-sachs-wat...

The auditorium grew hushed as a senior Watford borough councillor took to his feet. Now it was the turn of the people of Watford to speak. What would they make of this international three-day policy summit, with its heavyweight delegate list bulging with billionaire financiers, party leaders and media moguls, protected by the biggest security operation Watford has ever seen? At one point in the meeting, during a tense exchange about contingency plans for dog-walkers, [Chief Inspector] Rhodes let slip that Operation Discuss (the codename for the Bilderberg security operation) had been up and running for 18 months. Residents and journalists shared an intake of breath. "Eighteen months?" The reason for all the secrecy? "Terrorism". After 59 years of Bilderberg guests scuttling about in the shadows, ducking lenses and dodging the news, that's the rationale we're given? The same rationale, presumably, is behind the Great Wall of Watford, a concrete-and-wire security fence encircling the hotel. As ugly as it is unnecessary, it looks like the kind of thing you throw yourself against in a stalag before being machine-gunned from a watchtower. Appropriately fascistic, you might say, if you regard fascism as "the merger of corporate and government power", as Mussolini put it. The same threat of "terrorism" was used to justify the no-pedestrian, no-stopping zones near the venue. The police laid out their logic: they had "no specific intelligence" regarding a terror threat. However, in recent incidents, such as Boston and Woolwich, there had been no intelligence prior to the attack. Therefore the lack of any threat of a terror attack fitted exactly the profile of a terror attack. The lack of a threat was a threat. Welcome to 1984.

Note: For a list of this year's Bilderberg participants, which include 90-year-old Henry Kissinger, click here. For lots more on secret societies from reliable sources, click here.


The ‘Signature Strikes’ Program
2013-05-29, New York Times
http://takingnote.blogs.nytimes.com/2013/05/29/the-signature-strikes-program/...

Toward the end of a May 27 article in The Times about President Obama’s speech in which, among other things, he mentioned setting new standards for ordering drone strikes against non-Americans, there was this rather disturbing paragraph: “Even as he set new standards, a debate broke out about what they actually meant and what would actually change. For now, officials said, ‘signature strikes’ targeting groups of unidentified armed men presumed to be extremists will continue in the Pakistani tribal areas.” As Glenn Greenwald has pointed out, those two sentences seem to contradict the entire tenor of Mr. Obama’s speech, and of a letter to Congress from Attorney General Eric Holder. Both men seemed to be saying that the administration would stop using unmanned drones to kill targets merely suspected, due to their location or their actions, of a link to Al Qaeda or another terrorist organization. Those strikes have resulted in untold civilian casualties that have poisoned America’s relationship with Yemen and Pakistan. Mr. Obama talked at some length about civilian casualties, and also said that the need to use drone strikes against “forces that are massing to support attacks on coalition forces” will disappear once American forces withdraw from Afghanistan at the end of 2014. But so what to make of that paragraph in the May 27 article? I asked the White House. What I got in response was part of a background briefing given after the president’s speech that repeated the language about how the need for signature strikes will fade.

Note: Drone strikes often miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


U.S. acknowledges killing of four U.S. citizens in counterterrorism operations
2013-05-22, Washington Post
http://www.washingtonpost.com/world/national-security/us-acknowledges-killing...

The Obama administration acknowledged [on May 22] that it has killed four Americans in overseas counterterrorism operations since 2009, the first time it has publicly taken responsibility for the deaths. Three are known to have died in CIA drone strikes in Yemen in 2011: Anwar al-Awlaki, his 16-year-old son and Samir Khan. The fourth — Jude Kennan Mohammad, a Florida native indicted in North Carolina in 2009 — was killed in Pakistan, where the CIA has operated a drone campaign against terrorism suspects for nearly a decade. His death was previously unreported. In addition to disclosure of the four killings, Holder wrote that Obama has approved classified briefings for Congress on an overall policy document, informally called the “playbook.” The document, more than a year in the making, codifies the administration’s standards and processes for its unprecedented program of targeted killing and capture of terrorism suspects outside of war zones. Nearly 400 drone strikes, in Pakistan, Yemen and Somalia, have been launched by the CIA and U.S. military forces during Obama’s presidency. According to Holder’s letter, Awlaki was the only U.S. citizen the administration “has specifically targeted and killed.” Two weeks after Awlaki’s death, his 16-year-old son, Abdulrahman — who had gone to the Yemeni desert in search of his father — was killed in a drone strike meant for someone else. That strike was similarly unacknowledged, although a senior administration official privately characterized it as a “mistake.”

Note: So an American citizen, Awlaki's son, was killed by a drone by "mistake"? What happened to the Fifth Amendment of the U.S. Constitution, which states no citizen shall "be deprived of life, liberty, or property, without due process of law"? For deeply revealing reports from reliable major media sources on the atrocities carried out by the US and UK in their global wars of aggression, click here.


Washington gets explicit: its 'war on terror' is permanent
2013-05-17, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/may/17/endless-war-on-terror-obama

On [May 16], the Senate Armed Services Committee held a hearing on whether the statutory basis for [the "Global War on Terror"] - the 2001 Authorization to Use Military Force (AUMF) - should be revised (meaning: expanded). Asked at a Senate hearing today how long the war on terrorism will last, Michael Sheehan, the assistant secretary of defense for special operations and low-intensity conflict, answered, 'At least 10 to 20 years.' The military historian Andrew Bacevich has spent years warning that US policy planners have adopted an explicit doctrine of "endless war". Obama officials, despite repeatedly boasting that they have delivered permanently crippling blows to al-Qaida, are now, as clearly as the English language permits, openly declaring this to be so. It is hard to resist the conclusion that this war has no purpose other than its own eternal perpetuation. This war is not a means to any end but rather is the end in itself. The "war on terror" cannot and will not end on its own [because] the nation's most powerful political and economic factions reap a bonanza of benefits from its continuation. The genius of America's endless war machine is that, learning from the unpleasantness of the Vietnam war protests, it has rendered the costs of war largely invisible.

Note: A top US general long ago exposed the corrupt roots of war in his penetrating book War is a Racket. For a concise, two-page summary of this revealing book, click here. For deeply revealing reports from reliable major media sources on the atrocities carried out by the US and UK in their global wars of aggression, click here.


The 9/11 Phone Calls: Disturbing Irregularities Uncovered in the Calls that Flashed around the World
2013-05-16, Wall Street Journal/PRNewswire
http://online.wsj.com/article/PR-CO-20130516-909978.html

The 9/11 Consensus Panel now offers four evidence-based points about the alleged phone calls from the 9/11 flights. The famous "let's roll" drama of the passenger revolt on UA 93 was relayed by passenger Todd Beamer's 13-minute unrecorded seat-back call to GTE telephone supervisor Lisa Jefferson, who reported Beamer as strangely tranquil, declining to speak to his wife. Eerily, Beamer's line remained open for 15 minutes after the crash. Oddly, the Verizon wireless record shows that 19 calls were made from Beamer's cell phone long after the crash of UA 93. Initial media reports and FBI interviews detailed more than a dozen cell phone calls from the planes at high elevation. Yet in 2001, a telephone spokesperson stated that sustained mobile calls were not possible above 10,000 feet. During the 2006 Moussaoui Trial, the FBI (under oath) reduced the number of cell phone calls to two calls made from 5,000 feet, and presented evidence of only one (not two) "unconnected" call from Barbara Olson, lasting "0 seconds." In another twist, two other women reported that Caller-ID showed their husband's cell numbers on their answering machines, which while lasting several minutes, had been made from elevations of 25,000 and 35,000 feet. Although the FBI conducted a massive investigation into the calls, none of the telephone billing, nor any of the cell phone location data stored in standard phone company records has been publicly released.

Note: The 9/11 Consensus Panel, consisting of scientists, pilots, professors, attorneys, and journalists, has developed 32 Points of evidence contradicting specific claims made by the official account of 9/11. For many unanswered questions about 9/11 raised by highly credible former government officials and professors, click here and here. For our 9/11 Information Center filled with reliable, verifiable 9/11 resources, click here.


Boston chief: Wasn't told FBI got Tsarnaev warning
2013-05-09, Houston Chronicle/Associated Press
http://www.chron.com/news/crime/article/Boston-chief-Wasn-t-told-FBI-got-Tsar...

The FBI did not initially share with Boston police the warnings it had received from Russia about one suspect in last month's marathon bombings, despite the work of four city police representatives on a federal terrorism task force, Boston's police commissioner told Congress on [May 9]. Boston police learned about the Russian security service warnings only later. The congressional hearing was the first in a series to review the government's initial response to the attacks, ask what information authorities received about Tsarnaev and his brother before the bombings and consider whether everything was handled correctly. Some lawmakers questioned whether Boston police could have more thoroughly investigated Tsarnaev after 2011, based on Russia's vague warnings then to the FBI and CIA or the discovery by the Homeland Security Department in 2012 that he was traveling to Russia for six months, and whether Justice Department rules intended to protect civil liberties constrained the FBI's own inquiry. Led by the FBI, Joint Terrorism Task Forces operate in many cities as a way to bring federal, state and local officials together to share information. The model has existed for decades but, after 9/11, task forces sprouted up in cities nationwide to ensure that police were not out of the loop on investigations like the one the FBI conducted into Tsarnaev.

Note: For a powerful 11-minute video presenting undeniable evidence that the Boston bombers' uncle was closely linked to both the CIA and terrorist organizations, click here. Many are questioning whether the recent Boston bombing was a false flag operation. Though it is not conclusive, you can find some very reliable evidence that this might be the case at this link and this one. For deeply revealing reports from reliable major media sources on the deceptions of intelligence agencies, click here.


Are all telephone calls recorded and accessible to the US government?
2013-05-04, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/may/04/telephone-calls-recorded-...

CNN's Out Front with Erin Burnett [has been] focused on the possible involvement in the Boston Marathon attack of Katherine Russell, the 24-year-old American widow of the deceased suspect, Tamerlan Tsarnaev. Anonymous government officials are claiming that they are now focused on telephone calls between Russell and Tsarnaev that took place both before and after the attack to determine if she had prior knowledge of the plot or participated in any way. Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could: BURNETT: There's no way they actually can find out what happened, right, unless she tells them? CLEMENTE: No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. We certainly can find that out. BURNETT: So they can actually get that? People are saying, look, that is incredible. CLEMENTE: No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not. On Thursday night, Clemente again appeared on CNN. He reiterated what he said the night before but added expressly that "all digital communications in the past" are recorded and stored. All digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.

Note: All of our communications have been monitored by government computers for years. BBC News reported in this this 1999 article about the Echelon network which monitors all communications globally. For deeply revealing reports from reliable major media sources on government and corporate threats to privacy, click here.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"