Please donate here to support this vital work.
Revealing News For a Better World

Terrorism Media Articles
Excerpts of Key Terrorism Media Articles in Major Media


Below are key excerpts of revealing news articles on terrorism from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


Marine says beatings urged in Iraq
2007-07-15, Los Angeles Times
http://www.latimes.com/news/nationworld/world/la-fg-marines15jul15,0,7740534....

A Marine corporal, testifying Saturday at the murder trial of a buddy, said that Marines in his unit began routinely beating Iraqis after being ordered by officers to "crank up the violence level." Cpl. Saul H. Lopezromo said Marines in his platoon, including the defendant, Cpl. Trent D. Thomas, were angry when officers criticized them as not being as tough as other Marine platoons. "We're all hard-chargers, we're not there to mess around, so we took it as an insult," Lopezromo said. Within weeks of allegedly being scolded, seven Marines and a Navy corpsman went out late one night to find and kill a suspected insurgent in the village of Hamandiya near the Abu Ghraib prison. Unable to find their target, the Marines and corpsman dragged another man from his house, fatally shot him, and then planted an AK-47 assault rifle near the body to make it look like he had been killed in a shootout, according to court testimony. "We were told to crank up the violence level," said Lopezromo, who testified for the defense. He indicated that during daily patrols the Marines became much rougher with Iraqis. Asked by a juror to explain, he said, "We beat people, sir." Lopezromo said he believed that officers knew of the beatings, and ... said he saw nothing wrong in what Thomas and the others did. "I don't see it as an execution, sir," he told the judge. "I see it as killing the enemy." He added that Marines, in effect, consider all Iraqi men as part of the insurgency. Prosecution witnesses testified that Thomas shot the 52-year-old Iraq at point-blank range after he had already been shot by other Marines and was lying on the ground. Lopezromo said a procedure called "dead-checking" was routine. Marines are taught "dead-checking" in boot camp ... he said.


FBI Plans Initiative To Profile Terrorists
2007-07-11, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/07/10/AR20070710018...

The Federal Bureau of Investigation is developing a computer-profiling system that would enable investigators to target possible terror suspects. The System to Assess Risk, or STAR, assigns risk scores to possible suspects based on a variety of information, similar to the way a credit bureau assigns a rating based on a consumer's spending behavior and debt. The program focuses on foreign suspects but also includes data about some U.S. residents. Some lawmakers said ... that the report raises new questions about the government's power to use personal information and intelligence without accountability. "The Bush administration has expanded the use of this technology, often in secret, to collect and sift through Americans' most sensitive personal information," said Sen. Patrick J. Leahy (D-Vt.), chairman of the Senate Judiciary Committee. The use of data mining in the war on terror has sparked criticism. An airplane-passenger screening program called CAPPS II was revamped and renamed because of civil liberty concerns. An effort to collect Americans' personal and financial data called Total Information Awareness was killed. Law enforcement and national security officials have continued working on other programs to use computers to sift through information for signs of threats. The Department of Homeland Security, for example, flags travelers entering and leaving the United States who may be potential suspects through a risk-assessment program called the Automated Targeting System.


FBI Would Skirt the Law With Proposed Phone Record Program, Experts Say
2007-07-10, ABC News blog
http://blogs.abcnews.com/theblotter/2007/07/fbi-would-skirt.html

A proposed new FBI program would skirt federal laws by paying private companies to hold millions of phone and Internet records which the bureau is barred from keeping itself, experts say. The $5 million project would apparently pay private firms to store at least two years' worth of telephone and Internet activity by millions of Americans, few of whom would ever be considered a suspect in any terrorism, intelligence or criminal matter. The FBI is barred by law from collecting and storing such data if it has no connection to a specific investigation or intelligence matter. In recent years the bureau has tried to encourage telecommunications firms to voluntarily store such information, but corporations have balked at the cost of keeping records they don't need. "The government isn't allowed to warehouse the information, and the companies don't want to, so this creates a business incentive for the companies to warehouse it, so the government can access it later," said Mike German, a policy expert on national security and privacy issues for the American Civil Liberties Union (ACLU).  "It's a public-private partnership that puts civil liberties to the test." In March, an FBI official identified the companies as Verizon, MCI and AT&T. Even the bureau's own top lawyer said she found the [FBI's] behavior "disturbing," noting that when requesting access to phone company records, it repeatedly referenced "emergency" situations that did not exist, falsely claimed grand juries had subpoenaed information and failed to keep records on much of its own activity.


Who Runs the CIA? Outsiders for Hire.
2007-07-08, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/07/06/AR20070706019...

The most intriguing secrets of the "war on terror" have nothing to do with al-Qaeda and its fellow travelers. They're about the mammoth private spying industry that all but runs U.S. intelligence operations today. In April, Director of National Intelligence Mike McConnell was poised to publicize a year-long examination of outsourcing by U.S. intelligence agencies. But the report was inexplicably delayed -- and suddenly classified a national secret. What McConnell doesn't want you to know is that the private spy industry has succeeded where no foreign government has: It has penetrated the CIA and is running the show. Over the past five years (some say almost a decade), there has been a revolution in the intelligence community toward wide-scale outsourcing. Private companies now perform key intelligence-agency functions, to the tune ... of more than $42 billion a year. Intelligence professionals [say] that more than 50 percent of the National Clandestine Service (NCS) -- the heart, brains and soul of the CIA -- has been outsourced to private firms such as Abraxas, Booz Allen Hamilton, Lockheed Martin and Raytheon. These firms recruit spies, create non-official cover identities and control the movements of CIA case officers. They also provide case officers and watch officers at crisis centers and regional desk officers who control clandestine operations worldwide. As The Los Angeles Times first reported last October, more than half the workforce in two key CIA stations -- Baghdad and Islamabad, Pakistan -- is made up of industrial contractors, or "green badgers," in CIA parlance. Intelligence insiders say that entire branches of the NCS have been outsourced to private industry.


Judges OK warrantless monitoring of Web use
2007-07-07, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/07/07/BAGMNQSJDA1.DTL

Federal agents do not need a search warrant to monitor a suspect's computer use and determine the e-mail addresses and Web pages the suspect is contacting, a federal appeals court ruled Friday. In a drug case from San Diego County, the Ninth U.S. Circuit Court of Appeals in San Francisco likened computer surveillance to the "pen register" devices that officers use to pinpoint the phone numbers a suspect dials, without listening to the phone calls themselves. In Friday's ruling, the court said computer users should know that they lose privacy protections with e-mail and Web site addresses when they are communicated to the company whose equipment carries the messages. The search is no more intrusive than officers' examination of a list of phone numbers or the outside of a mailed package, neither of which requires a warrant, Judge Raymond Fisher said in the 3-0 ruling. Defense lawyer Michael Crowley disagreed. His client, Dennis Alba, was sentenced to 30 years in prison after being convicted of operating a laboratory in Escondido that manufactured the drug ecstasy. Some of the evidence against Alba came from agents' tracking of his computer use. The court upheld his conviction and sentence. Expert evidence in Alba's case showed that the Web addresses obtained by federal agents included page numbers that allowed the agents to determine what someone read online, Crowley said. The ruling "further erodes our privacy," the attorney said. "The great political marketplace of ideas is the Internet, and the government has unbridled access to it."

Note: So now every email you send and read can be monitored legally. Why didn't this make news headlines?


Angler: The Cheney Vice Presidency
2007-06-24, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/06/23/AR20070623008...

Part One: 'A Different Understanding With the President': In less than an hour ... Cheney's proposal had become a military order from the commander in chief. Foreign terrorism suspects held by the United States were stripped of access to any court -- civilian or military, domestic or foreign. They could be confined indefinitely without charges and would be tried, if at all, in closed "military commissions." "What the hell just happened?" Secretary of State Colin L. Powell demanded ... when CNN announced the order that evening, Nov. 13, 2001. National security adviser Condoleezza Rice, incensed, sent an aide to find out. Even witnesses to the Oval Office signing said they did not know the vice president had played any part. "Angler," as the Secret Service code-named him, has approached the levers of power obliquely, skirting orderly lines of debate he once enforced as chief of staff to President Gerald R. Ford. He has battled a bureaucracy he saw as hostile, using intimate knowledge of its terrain. He has empowered aides to fight above their rank, taking on roles reserved in other times for a White House counsel or national security adviser. And he has found a ready patron in George W. Bush for edge-of-the-envelope views on executive supremacy that previous presidents did not assert. Over the past six years, Cheney has shaped his times as no vice president has before. [The] relationship [between Bush and Cheney] is opaque, a vital unknown in assessing Cheney's impact on events. Officials who see them together often, not all of them admirers of the vice president, detect a strong sense of mutual confidence that Cheney is serving Bush's aims.

Note: This is an important, in-depth investigation of the Cheney vice-presidency. It is highly revealing and well worth reading it its entirety.


White House of Mirrors
2007-06-24, New York Times
http://www.nytimes.com/2007/06/24/opinion/24sun1.html?ex=1340337600&en=2b456e...

President Bush has turned the executive branch into a two-way mirror. They get to see everything Americans do: our telephone calls, e-mail, and all manner of personal information. And we get to see nothing about what they do. Everyone knows this administration has disdained openness and accountability since its first days. That is about the only thing it does not hide. But recent weeks have produced disturbing disclosures about just how far Mr. Bush’s team is willing to go to keep lawmakers and the public in the dark. That applies to big issues — like the C.I.A.’s secret prisons — and to things that would seem too small-bore to order up a cover-up. Vice President Dick Cheney sets the gold standard, placing himself not just above Congress and the courts but above Mr. Bush himself. For the last four years, he has been defying a presidential order requiring executive branch agencies to account for the classified information they handle. When the agency that enforces this rule tried to do its job, Mr. Cheney proposed abolishing the agency. Since the 9/11 attacks, Mr. Bush has tried to excuse his administration’s obsession with secrecy by saying that dangerous times require greater discretion. He rammed the Patriot Act through Congress with a promise that national security agencies would make sure the new powers were not abused. But on June 14, The Washington Post reported that the [FBI] potentially broke the law or its own rules several thousand times over the past five years when it used the Patriot Act to snoop on domestic phone calls, e-mail and financial transactions of ordinary Americans.


When Computers Attack
2007-06-24, New York Times
http://www.nytimes.com/2007/06/24/weekinreview/24schwartz.html?ex=1340337600&...

Anyone who follows technology or military affairs has heard the predictions for more than a decade. Cyberwar is coming. Although the long-announced, long-awaited computer-based conflict has yet to occur, the forecast grows more ominous with every telling: an onslaught is brought by a warring nation, backed by its brains and computing resources; banks and other businesses in the enemy states are destroyed; governments grind to a halt; telephones disconnect. Industrial remote-control technologies known as Scada systems, for Supervisory Control and Data Acquisition ... allow remote monitoring and control of operations like manufacturing production lines and civil works projects like dams. So security experts envision terrorists at a keyboard remotely shutting down factory floors or opening a dam’s floodgates to devastate cities downstream. But how bad would a cyberwar really be — especially when compared with the blood-and-guts genuine article? And is there really a chance it would happen at all? Whatever the answer, governments are readying themselves for the Big One. The United States is arming up. Robert Elder, commander of the Air Force Cyberspace Command, told reporters ... that his newly formed command, which defends military data, communications and control networks, is learning how to disable an opponent’s computer networks and crash its databases. “We want to go in and knock them out in the first round,” he said, as reported on Military.com.


Special Operations Prepared for Domestic Missions
2007-06-22, washingtonpost.com
http://blog.washingtonpost.com/earlywarning/2007/06/special_operations_prepar...

The U.S. Northern Command, the military command responsible for "homeland defense," has asked the Pentagon if it can establish its own special operations command for domestic missions. The request ... would establish a permanent sub-command for responses to incidents of domestic terrorism as well as other occasions where special operators may be necessary on American soil. The establishment of a domestic special operations mission, and the preparation of contingency plans to employ commandos in the United States, would upend decades of tradition. Military actions within the United States are the responsibility of state militias (the National Guard), and federal law enforcement is a function of the FBI. Employing special operations for domestic missions sounds very ominous, and NORTHCOM's request earlier this year should receive the closest possible Pentagon and congressional scrutiny. There's only one problem: NORTHCOM is already doing what it has requested permission to do. When NORTHCOM was established after 9/11 to be the military counterpart to the Department of Homeland Security, within its headquarters staff it established a Compartmented Planning and Operations Cell (CPOC) responsible for planning and directing a set of "compartmented" and "sensitive" operations on U.S., Canadian and Mexican soil. In other words, these are the very special operations that NORTHCOM is now formally asking the Pentagon to beef up into a public and acknowledged sub-command.


Osama Flight Shocker
2007-06-21, New York Post
http://www.nypost.com/seven/06212007/news/nationalnews/osama_flight_shocker_n...

Osama bin Laden was suspected of chartering a plane that carried his family and other Saudis from the United States shortly after 9/11, according to FBI documents released yesterday. One FBI document referred to a Ryan Air 727 plane that left Los Angeles on Sept. 19, 2001, carrying Saudi nationals. "The plane was chartered either by the Saudi Arabian royal family or Osama bin Laden," according to the document obtained by Judicial Watch. The flight made stops in Orlando, Washington, D.C. and Boston, and terminated in Paris. Asked about the documents' assertion, an FBI spokesman said, "There is no new information here. Osama bin Laden did not charter a flight out of the U.S."

Note: To read an excellent article on the implications of this brief report, click here.


FBI Finds It Frequently Overstepped in Collecting Data
2007-06-14, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/06/13/AR20070613024...

An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.


FBI Terror Watch List
2007-06-13, ABC News
http://blogs.abcnews.com/theblotter/2007/06/fbi_terror_watc.html

A terrorist watch list compiled by the FBI has apparently swelled to include more than half a million names. Privacy and civil liberties advocates say the list is growing uncontrollably, threatening its usefulness in the war on terror. The bureau says the number of names on its terrorist watch list is classified. A portion of the FBI's unclassified 2008 budget request posted to the Department of Justice Web site, however, refers to "the entire watch list of 509,000 names." A spokesman for the interagency National Counterterrorism Center (NCTC), which maintains the government's list of all suspected terrorists with links to international organizations, said they had 465,000 names covering 350,000 individuals. Many names are different versions of the same identity. In addition to the NCTC list, the FBI keeps a list of U.S. persons who are believed to be domestic terrorists - abortion clinic bombers, for example, or firebombing environmental extremists, who have no known tie to an international terrorist group. Combined, the NCTC and FBI compendia comprise the watch list used by federal security screening personnel on the lookout for terrorists. While the NCTC has made no secret of its terrorist tally, the FBI has consistently declined to tell the public how many names are on its list. "It grows seemingly without control or limitation," said ACLU senior legislative counsel Tim Sparapani of the terrorism watch list. Sparapani called the 509,000 figure "stunning. If we have 509,000 names on that list, the watch list is virtually useless," he told ABC News. "You'll be capturing innocent individuals with no connection to crime or terror." U.S. lawmakers and their spouses have been detained because their names were on the watch list.


US college rejects Jewish professor over anti-Israel stance
2007-06-11, The Guardian (one of the U.K.'s leading newspapers)
http://www.guardian.co.uk/usa/story/0,,2100590,00.html

One of the most rancorous disputes in American academia has ended with a prominent political scientist ... being denied tenure at one of the country's top-10 private universities. Norman Finkelstein, author of The Holocaust Industry, [is a professor at] the political sciences department of DePaul University in Chicago. Mr Finkelstein has argued in his books that claims of anti-semitism are used to dampen down criticism of Israeli policy towards the Palestinians and that the Holocaust is exploited by some Jewish institutions for their own gain. His outspoken position as a Jewish intellectual critical of Israel and of some elites within the Jewish community has prompted passionate debate. Prominent intellectuals such as [Noam Chomsky] have spoken out in Mr Finkelstein's favour, but others have decried him. His most bitter opponent is Alan Dershowitz, a Harvard law professor, who campaigned heavily to prevent tenure being granted. Soon after Mr Finkelstein applied for it, Mr Dershowitz sent DePaul faculty members a dossier of what he categorised as the "most egregious academic sins, outright lies, misquotations, and distortions" of the political scientist. The dispute has roots that go deeper still, with Mr Finkelstein devoting much of his most recent book, Beyond Chutzpah: On the Misuse of Anti-Semitism and the Abuse of History, to an attack on Mr Dershowitz's own work. Mr Finkelstein, the son of Holocaust survivors, has responded to the decision ... by condemning the vote as an act of political aggression. "I met the standards of tenure DePaul required, but it wasn't enough to overcome the political opposition to my speaking out on the Israel-Palestine conflict."


In Iraq's four-year looting frenzy, the allies have become the vandals
2007-06-08, The Guardian (one of the U.K.'s leading newspapers)
http://arts.guardian.co.uk/art/heritage/story/0,,2098275,00.html

Fly into the American air base of Tallil outside Nasiriya in central Iraq and the flight path is over the great ziggurat of Ur, reputedly the earliest city on earth. Ur is safe within the base compound. But its walls are pockmarked with wartime shrapnel and a blockhouse is being built over an adjacent archaeological site. When the head of Iraq's supposedly sovereign board of antiquities and heritage, Abbas al-Hussaini, tried to inspect the site recently, the Americans refused him access to his own most important monument. Under Saddam you were likely to be tortured and shot if you let someone steal an antiquity; in today's Iraq you are likely to be tortured and shot if you don't. The tragic fate of the national museum in Baghdad in April 2003 was as if federal troops had invaded New York city, sacked the police and told the criminal community that the Metropolitan was at their disposal. The local tank commander was told specifically not to protect the museum for a full two weeks after the invasion. Even the Nazis protected the Louvre. America [has converted] Nebuchadnezzar's great city of Babylon into the hanging gardens of Halliburton. In the process the 2,500-year-old brick pavement to the Ishtar Gate was smashed by tanks and the gate itself damaged. Babylon is being rendered archaeologically barren. Outside the capital some 10,000 sites of incomparable importance to the history of western civilisation, barely 20% yet excavated, are being looted as systematically as was the museum in 2003. When [archeologists] tried to remove vulnerable carvings from the ancient city of Umma to Baghdad, [they] found gangs of looters already in place with bulldozers, dump trucks and AK47s.


Nuking Iran: The Republican Agenda?
2007-06-06, Washington Post
http://blog.washingtonpost.com/earlywarning/2007/06/nuking_iran_the_republica...

At the Republican debate, almost all the candidates said that they would not rule out a nuclear attack on Iran as a means to prevent it from getting its own nuclear weapons. Only one [candidate] would say that attacking Iran -- indeed even threatening to nuke Iran -- is not the right strategy. "We have to come to our senses about this issue of war and preemption," he said. The audience applauded, but he didn't get much support from his fellow candidates. Rep. Duncan Hunter of California was the starkest: "I would authorize the use of tactical nuclear weapons if there was no other way to preempt those particular centrifuges," he said. Former New York Mayor Rudolph Giuliani ... added that "you can't rule out anything and you shouldn't take any option off the table." Former Virginia Gov. Jim Gilmore also [stated] "all options are on the table" with regard to Iranian nuclear weapons. Said former Massachusetts Gov. Mitt Romney: "I wouldn't take any options off the table." After the debate, former Sen. Fred Thompson of Tennessee, who did not particpate, added his name to the list of candidates who would consider a preemptive attack against Iran. Only Rep. Ron Paul of Texas, the "Dennis the Menace" of his party, said he opposed a nuclear strike on moral grounds and because he believed Iran "has done no harm to us directly and is no threat to our national security." The Iraq war and the war against terrorism are the central battles of our time, these candidates say. They all profess their faith in God and the United States, and speak of a moral struggle between good and evil, between the United States and "radical Islam." Yet they are not willing to say that nuclear weapons have no place in modern confrontations.

Note: For what a top US general has to say about war manipulations, click here.


I blame myself for our downfall in Iraq
2007-06-06, The Telegraph (one of the U.K.'s leading newspapers)
http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2007/06/10/wirq110.xml

A former American army torturer has laid bare the traumatic effects of American interrogation techniques in Iraq - on their victims and on the perpetrators themselves. Tony Lagouranis conducted mock executions, forced men and boys into agonising stress positions, kept suspects awake for weeks on end, used dogs to terrify detainees and subjected others to hypothermia. But he confesses that he was deeply scarred by the realisation that what he did has contributed to the downfall of American forces in Iraq. Mr Lagouranis, 37, suffered nightmares and anxiety attacks on his return to Chicago. Between January 2004 and January 2005, he tortured suspects, most of whom he says turned out to be innocent. He says that he realised he had entered a moral dungeon when he found himself reading a Holocaust memoir, hoping to pick up torture tips from the Nazis. "When I first got back I had a lot of anxiety. I had a personal crisis because I felt I had done immoral things and I didn't see a way to cope with that. I saw a psychologist. I had a lot to work through." He says that helped prevent him becoming "a totally broken human being". Mr Lagouranis has written a recently published book about his experiences, Fear Up Harsh, a term for intimidating a detainee by shouting at him. He makes clear that torture has cost America its moral authority in Iraq by detaining innocent people and treating them badly. He writes: "My actions, combined with the actions of the arresting infantry who left bruises on their prisoners, and the actions of the officers who wanted to get promotions, repeated in microcosm all over this country, had a cumulative effect. I could blame Bush and Rumsfeld, but I would always have to also blame myself."

Note: For a top US general's comments on the psychological abuse soldiers suffer as a result of war, click here.


'USS Liberty' veterans demand investigation
2007-06-03, Arizona Republic (Arizona's leading newspaper)
http://www.azcentral.com/arizonarepublic/viewpoints/articles/0603liberty0603....

In demanding a congressional investigation into the aborted rescue during the attack of the USS Liberty and subsequent alleged cover-up [the following] conclusions [were] submitted in October 2003 to the Office of the U.S. Secretary of Defense by the USS Liberty Veterans Association, Inc.: 1. That on June 8, 1967 ... Israel launched a two-hour air and naval attack against USS Liberty ... inflicting 34 dead and 173 wounded American servicemen; 2. That ... unmarked Israeli aircraft dropped napalm canisters on USS Liberty's bridge and fired 30mm cannons and rockets into [the] ship; 3. That the torpedo boat attack involved not only the firing of torpedoes, but the machine-gunning of Liberty's firefighters and stretcher-bearers as they struggled to save their ship and crew; the Israeli torpedo boats later returned to machine-gun at close range three of the Liberty's life rafts that had been lowered into the water by survivors to rescue the most seriously wounded; 4. That there is compelling evidence that Israel's attack was a deliberate attempt to destroy an American ship and kill her entire crew; evidence of such intent is supported by statements from Secretary of State Dean Rusk, Undersecretary of State George Ball, former CIA Director Richard Helms, former NSA Directors Lt. Gen. William Odom, USA (Ret.), Adm. Bobby Ray Inman, USN (Ret.), and Marshal Carter; former NSA deputy directors Oliver Kirby and Maj. Gen. John Morrison, USAF (Ret.); 6. The White House deliberately prevented the U.S. Navy from coming to the defense of USS Liberty by recalling Sixth Fleet military rescue support while the ship was under attack.

Note: To view the BBC documentary about the USS Liberty attack, "Dead in the Water," click here. For more information about the USS Liberty, click here.


White House revises post-disaster protocol
2007-06-02, Boston Globe
http://www.boston.com/news/nation/washington/articles/2007/06/02/white_house_...

The Bush administration is writing a new plan to maintain governmental control in the wake of an apocalyptic terrorist attack or overwhelming natural disaster, moving such doomsday planning for the first time from the Federal Emergency Management Agency to officials inside the White House. Discussion among legal specialists, homeland security experts and Internet commentators [includes] concerns that the policy may [make] it too easy to invoke emergency presidential powers such as martial law. The ... new "National Continuity Policy" contains few details about how surviving officials would invoke emergency powers, or when emergency powers should be deemed to be no longer necessary. The unanswered questions have provoked anxiety across ideological lines. The conservative commentator Jerome Corsi [wrote] that the directive looked like a recipe for allowing the office of the presidency to seize "dictatorial powers" because the policy does not discuss consulting Congress about when to invoke emergency powers -- or when to turn them off. Some specialists say that the White House should be more specific about its worst-case scenario plans, pointing out two unanswered questions: what circumstances would trigger implementation of the plan and what legal limits the White House recognizes on its own emergency powers. The policy ... does not contain a direct reference to statutes in which Congress has imposed checks and balances on the president's power to impose martial law or other extraordinary measures, [nor does it] explicitly acknowledge the National Emergencies Act, [a] law that gives Congress the right to override the president's determination that a national emergency still exists.


Nations Use Fear to Distract From Rights Abuses, Group Says
2007-05-24, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/05/23/AR20070523014...

Powerful governments and armed groups are spreading fear to divert attention from human rights abuses ... Amnesty International said yesterday in its annual assessment of rights worldwide. "The politics of fear is fueling a downward spiral of human rights abuse in which no right is sacrosanct and no person is safe," said Irene Khan, secretary general of the human rights watchdog. Governments are undermining the rule of law and human rights with "short-sighted fear-mongering and divisive policies." The United States is "the leading country using fear to justify the unjustifiable," said Larry Cox, executive director of Amnesty International USA. "The U.S. used to be in a position to speak out effectively against torture and military tribunals. We can't do that now because we are carrying out some of the same practices," he said. The organization urged the new U.S. Congress to take the lead in restoring respect for humane standards and practices at home and abroad. Citizens in many countries are being manipulated by fear, the group said. Amnesty applauded civil society for its "courage and commitment" in the face of abuses. Marches, petitions, blogs and armbands "may not seem much by themselves," the report said, "but by bringing people together they unleash an energy for change that should not be underestimated. People power will change the face of human rights in the 21st century."


In Iraq, a human life is worth $2,500; in Manhattan, $1.8 million
2007-05-20, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2007/05/20/...

What is the value of a human life? This came to mind recently, thanks to U.S. Marines, who, in early March, went on a killing rampage near Jalalabad in Afghanistan. A platoon of elite Marine Special Operations troops was ambushed by a suicide bomber in a minivan and one was wounded. Initially, it was reported that as many as 10 Afghans were killed and 34 wounded as the platoon fled the site. Later, it was admitted that the Marines had wielded "excessive force" after the ambush had ended. The Marines were reported to have murdered "12 people -- including a 4-year-old girl, a 1-year-old boy and three elderly villagers.'' According to a report by Carlotta Gall of the New York Times, a "16-year-old newly married girl was cut down while she was carrying a bundle of grass to her family's farmhouse." After much protest in Afghanistan, Col. John Nicholson met with the families of the Afghans who had been killed and wounded by the Marines. He offered this official apology: "I stand before you today, deeply, deeply ashamed and terribly sorry that Americans have killed and wounded innocent Afghan people." And then he paid about $2,000 per death to family members. The military calls these "condolence payments." We also know something about how the U.S. government evaluated the worth of the lives of slaughtered American innocents after the Sept. 11, 2001, attacks. The family or spouse of a loved one murdered that day was also given a monetary value -- $1.8 million. The U.S. government has indeed offered the world an evaluation of what price slaughter should exact in the deaths of innocents: The value of a civilian slaughtered ... on Sept. 11: $1.8 million. The value of a civilian slaughtered by U.S. Marines near Jalalabad, Afghanistan: $2,000.

Note: For more astonishing information on how the military mishandles your tax dollars, click here.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"