Please donate here to support this vital work.
Revealing News For a Better World

Terrorism Media Articles
Excerpts of Key Terrorism Media Articles in Major Media


Below are key excerpts of revealing news articles on terrorism from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


FBI Proposes Building Network of U.S. Informants
2007-07-25, ABC News blog
http://blogs.abcnews.com/theblotter/2007/07/fbi-proposes-bu.html

The FBI is taking cues from the CIA to recruit thousands of covert informants in the United States as part of a sprawling effort to boost its intelligence capabilities. According to a recent unclassified report to Congress, the FBI expects its informants to provide secrets about possible terrorists and foreign spies, although some may also be expected to aid with criminal investigations, in the tradition of law enforcement confidential informants. The FBI said the push was driven by a 2004 directive from President Bush ordering the bureau to improve its counterterrorism efforts by boosting its human intelligence capabilities. The aggressive push for more secret informants appears to be part of a new effort to grow its intelligence and counterterrorism efforts. Other recent proposals include expanding its collection and analysis of data on U.S. persons, retaining years' worth of Americans' phone records and even increasing so-called "black bag" secret entry operations. To handle the increase in so-called human sources, the FBI also plans to overhaul its database system, so it can manage records and verify the accuracy of information from "more than 15,000" informants, according to the document. The bureau has arranged to use elements of CIA training to teach FBI agents about "Source Targeting and Development," the report states. The courses will train FBI special agents on the "comprehensive tradecraft" needed to identify, recruit and manage these "confidential human sources."


Destabilizing Iraq, Broadly Defined
2007-07-23, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/07/22/AR20070722011...

Be careful what you say and whom you help -- especially when it comes to the Iraq war and the Iraqi government. President Bush issued an executive order last week titled "Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq." It could be interpreted as targeting the financial assets of any American who directly or indirectly aids someone who has committed or "poses a significant risk of committing" violent acts "threatening the peace or stability of Iraq" or who undermines "efforts to promote economic reconstruction and political reform" in the war-torn country. The text of the order, if interpreted broadly, could cast a far bigger net to include not just those who commit violent acts or pose the risk of doing so in Iraq, but also third parties -- such as U.S. citizens in this country -- who knowingly or unknowingly aid or encourage such people. The targeting of not just those who support perpetrators of violence but also those who support individuals who "pose a significant risk" of committing violence goes far beyond normal legal language related to intent and could be applied in a highly arbitrary manner, said Bruce Fein, a senior Justice Department official in the Reagan administration. Fein also questioned the executive order's inclusion of third parties, such as U.S. citizens who assist, sponsor or make "any contribution or provision of funds, goods, or services" to assist people on the Treasury list. "What about a lawyer hired to get someone off the list?" Fein asked. The Treasury Department's Office of Foreign Assets Control keeps a "Specially Designated Nationals and Blocked Persons" roll that includes those covered by several such executive orders. It most recently ran to 276 pages.

Note: To read the full text of the Executive Order, "Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq," click here.


Bush Approves New CIA Methods
2007-07-21, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/07/20/AR20070720012...

President Bush set broad legal boundaries for the CIA's harsh interrogation of terrorism suspects yesterday, allowing the intelligence agency to resume a program that was suspended last year after criticism that it violated U.S. and international law. In an executive order lacking any details about actual interrogation techniques, Bush said the CIA program will now comply with a Geneva Conventions prohibition against "outrages upon personal dignity, in particular humiliating and degrading treatment." Two administration officials said that suspects now in U.S. custody could be moved immediately into the "enhanced interrogation" program and subjected to techniques that go beyond those allowed by the U.S. military. Rights activists criticized Bush's order for failing to spell out which techniques are now approved or prohibited. "All the order really does is to have the president say, 'Everything in that other document that I'm not showing you is legal -- trust me,' " said Tom Malinowski of Human Rights Watch. The CIA interrogation guidelines are contained in a classified document. A senior intelligence official, asked whether this list includes such widely criticized methods as the simulated drowning known as "waterboarding," declined to discuss specifics but said "it would be very wrong to assume that the program of the past would move into the future unchanged." CIA detainees have also alleged they were left naked in cells for prolonged periods, subjected to sensory and sleep deprivation and extreme heat and cold, and sexually taunted. A senior administration official briefing reporters yesterday said that any future use of "extremes of heat and cold" would be subject to a "reasonable interpretation . . . we're not talking about forcibly induced hypothermia."


DeFazio asks, but he's denied access
2007-07-20, The Oregonian (Oregon's leading newspaper)
http://www.oregonlive.com/news/oregonian/index.ssf?/base/news/118489654058910...

Oregonians called Peter DeFazio's office, worried there was a conspiracy buried in the classified portion of a White House plan for operating the government after a terrorist attack. As a member of the U.S. House on the Homeland Security Committee, DeFazio, D-Ore., is permitted to enter a secure "bubbleroom" in the Capitol and examine classified material. So he asked the White House to see the secret documents. On Wednesday, DeFazio got his answer: DENIED. "I just can't believe they're going to deny a member of Congress the right of reviewing how they plan to conduct the government of the United States after a significant terrorist attack," DeFazio says. Homeland Security Committee staffers told his office that the White House initially approved his request, but it was later quashed. DeFazio doesn't know who did it or why. "We're talking about the continuity of the government of the United States of America," DeFazio says. "I would think that would be relevant to any member of Congress, let alone a member of the Homeland Security Committee." Bush administration spokesman Trey Bohn declined to say why DeFazio was denied access: "We do not comment through the press on the process that this access entails. It is important to keep in mind that much of the information related to the continuity of government is highly sensitive." Norm Ornstein, a legal scholar who studies government continuity at the conservative American Enterprise Institute, said he "cannot think of one good reason" to deny access to a member of Congress who serves on the Homeland Security Committee. This is the first time DeFazio has been denied access to documents. "Maybe the people who think there's a conspiracy out there are right," DeFazio said.


Leader of Al Qaeda group in Iraq was fictional, U.S. military says
2007-07-18, New York Times
http://www.nytimes.com/2007/07/18/world/africa/18iht-iraq.4.6718200.html?_r=0

The leader of one the most notorious insurgent groups in Iraq was said to be a mysterious Iraqi named Abdullah Rashid al-Baghdadi. As the titular head of the Islamic State in Iraq, an organization publicly backed by Al Qaeda, Baghdadi issued a steady stream of incendiary pronouncements. Despite claims by Iraqi officials that he had been killed in May, Baghdadi appeared to have persevered unscathed. On Wednesday, a senior American military spokesman provided a new explanation for Baghdadi's ability to escape attack: He never existed. Brigadier General Kevin Bergner, the chief American military spokesman, said the elusive Baghdadi was actually a fictional character whose audio-taped declarations were provided by an elderly actor named Abu Adullah al-Naima. The ploy was to invent Baghdadi, a figure whose very name establishes his Iraqi pedigree, [and] install him as the head of a front organization called the Islamic State of Iraq. Ayman al-Zawahiri, Osama bin Laden's deputy, sought to reinforce the deception by referring to Baghdadi in his video and Internet statements. Bruce Riedel, a former CIA official and a Middle East expert ... suggested that the disclosures made Wednesday might not be the final word on Baghdadi and the leaders of Al Qaeda in Mesopotamia. "First, they say we have killed him," Riedel said, referring to the statements by some Iraqi government officials. "Then we heard him after his death and now they are saying he never existed. That suggests that our intelligence on Al Qaeda in Iraq is not what we want it to be."

Note: The above was written in 2007. More recently, the current Islamic State caliph Abu Bakr al-Baghdadi was reported in Newsweek to have been held alongside Al Qaeda militants by U.S. forces at Camp Bucca, a "virtual terrorist University" in Iraq.


In Intelligence World, A Mute Watchdog
2007-07-15, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/07/14/AR20070714008...

An independent oversight board created to identify intelligence abuses after the CIA scandals of the 1970s did not send any reports to the attorney general of legal violations during the first 5 1/2 years of the Bush administration's counterterrorism effort, the Justice Department has told Congress. The President's Intelligence Oversight Board -- the principal civilian watchdog of the intelligence community -- is obligated under a 26-year-old executive order to tell the attorney general and the president about any intelligence activities it believes "may be unlawful." The board was vacant for the first two years of the Bush administration. The board's mandate is to provide independent oversight, so the absence of such communications has prompted critics to question whether the board was doing its job. "It's now apparent that the IOB was not actively employed in the early part of the administration. And it was a crucial period when its counsel would seem to have been needed the most," said Anthony Harrington, who served as the board's chairman for most of the Clinton administration. Senate Judiciary Committee chairman Patrick J. Leahy (D-Vt.) added: "It is deeply disturbing that this administration seems to spend so much of its energy and resources trying to find ways to ignore any check and balance on its authority and avoid accountability to Congress and the American public."


Marine says beatings urged in Iraq
2007-07-15, Los Angeles Times
http://www.latimes.com/news/nationworld/world/la-fg-marines15jul15,0,7740534....

A Marine corporal, testifying Saturday at the murder trial of a buddy, said that Marines in his unit began routinely beating Iraqis after being ordered by officers to "crank up the violence level." Cpl. Saul H. Lopezromo said Marines in his platoon, including the defendant, Cpl. Trent D. Thomas, were angry when officers criticized them as not being as tough as other Marine platoons. "We're all hard-chargers, we're not there to mess around, so we took it as an insult," Lopezromo said. Within weeks of allegedly being scolded, seven Marines and a Navy corpsman went out late one night to find and kill a suspected insurgent in the village of Hamandiya near the Abu Ghraib prison. Unable to find their target, the Marines and corpsman dragged another man from his house, fatally shot him, and then planted an AK-47 assault rifle near the body to make it look like he had been killed in a shootout, according to court testimony. "We were told to crank up the violence level," said Lopezromo, who testified for the defense. He indicated that during daily patrols the Marines became much rougher with Iraqis. Asked by a juror to explain, he said, "We beat people, sir." Lopezromo said he believed that officers knew of the beatings, and ... said he saw nothing wrong in what Thomas and the others did. "I don't see it as an execution, sir," he told the judge. "I see it as killing the enemy." He added that Marines, in effect, consider all Iraqi men as part of the insurgency. Prosecution witnesses testified that Thomas shot the 52-year-old Iraq at point-blank range after he had already been shot by other Marines and was lying on the ground. Lopezromo said a procedure called "dead-checking" was routine. Marines are taught "dead-checking" in boot camp ... he said.


FBI Plans Initiative To Profile Terrorists
2007-07-11, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/07/10/AR20070710018...

The Federal Bureau of Investigation is developing a computer-profiling system that would enable investigators to target possible terror suspects. The System to Assess Risk, or STAR, assigns risk scores to possible suspects based on a variety of information, similar to the way a credit bureau assigns a rating based on a consumer's spending behavior and debt. The program focuses on foreign suspects but also includes data about some U.S. residents. Some lawmakers said ... that the report raises new questions about the government's power to use personal information and intelligence without accountability. "The Bush administration has expanded the use of this technology, often in secret, to collect and sift through Americans' most sensitive personal information," said Sen. Patrick J. Leahy (D-Vt.), chairman of the Senate Judiciary Committee. The use of data mining in the war on terror has sparked criticism. An airplane-passenger screening program called CAPPS II was revamped and renamed because of civil liberty concerns. An effort to collect Americans' personal and financial data called Total Information Awareness was killed. Law enforcement and national security officials have continued working on other programs to use computers to sift through information for signs of threats. The Department of Homeland Security, for example, flags travelers entering and leaving the United States who may be potential suspects through a risk-assessment program called the Automated Targeting System.


FBI Would Skirt the Law With Proposed Phone Record Program, Experts Say
2007-07-10, ABC News blog
http://blogs.abcnews.com/theblotter/2007/07/fbi-would-skirt.html

A proposed new FBI program would skirt federal laws by paying private companies to hold millions of phone and Internet records which the bureau is barred from keeping itself, experts say. The $5 million project would apparently pay private firms to store at least two years' worth of telephone and Internet activity by millions of Americans, few of whom would ever be considered a suspect in any terrorism, intelligence or criminal matter. The FBI is barred by law from collecting and storing such data if it has no connection to a specific investigation or intelligence matter. In recent years the bureau has tried to encourage telecommunications firms to voluntarily store such information, but corporations have balked at the cost of keeping records they don't need. "The government isn't allowed to warehouse the information, and the companies don't want to, so this creates a business incentive for the companies to warehouse it, so the government can access it later," said Mike German, a policy expert on national security and privacy issues for the American Civil Liberties Union (ACLU).  "It's a public-private partnership that puts civil liberties to the test." In March, an FBI official identified the companies as Verizon, MCI and AT&T. Even the bureau's own top lawyer said she found the [FBI's] behavior "disturbing," noting that when requesting access to phone company records, it repeatedly referenced "emergency" situations that did not exist, falsely claimed grand juries had subpoenaed information and failed to keep records on much of its own activity.


Who Runs the CIA? Outsiders for Hire.
2007-07-08, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/07/06/AR20070706019...

The most intriguing secrets of the "war on terror" have nothing to do with al-Qaeda and its fellow travelers. They're about the mammoth private spying industry that all but runs U.S. intelligence operations today. In April, Director of National Intelligence Mike McConnell was poised to publicize a year-long examination of outsourcing by U.S. intelligence agencies. But the report was inexplicably delayed -- and suddenly classified a national secret. What McConnell doesn't want you to know is that the private spy industry has succeeded where no foreign government has: It has penetrated the CIA and is running the show. Over the past five years (some say almost a decade), there has been a revolution in the intelligence community toward wide-scale outsourcing. Private companies now perform key intelligence-agency functions, to the tune ... of more than $42 billion a year. Intelligence professionals [say] that more than 50 percent of the National Clandestine Service (NCS) -- the heart, brains and soul of the CIA -- has been outsourced to private firms such as Abraxas, Booz Allen Hamilton, Lockheed Martin and Raytheon. These firms recruit spies, create non-official cover identities and control the movements of CIA case officers. They also provide case officers and watch officers at crisis centers and regional desk officers who control clandestine operations worldwide. As The Los Angeles Times first reported last October, more than half the workforce in two key CIA stations -- Baghdad and Islamabad, Pakistan -- is made up of industrial contractors, or "green badgers," in CIA parlance. Intelligence insiders say that entire branches of the NCS have been outsourced to private industry.


Judges OK warrantless monitoring of Web use
2007-07-07, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfgate.com/cgi-bin/article.cgi?file=/c/a/2007/07/07/BAGMNQSJDA1.DTL

Federal agents do not need a search warrant to monitor a suspect's computer use and determine the e-mail addresses and Web pages the suspect is contacting, a federal appeals court ruled Friday. In a drug case from San Diego County, the Ninth U.S. Circuit Court of Appeals in San Francisco likened computer surveillance to the "pen register" devices that officers use to pinpoint the phone numbers a suspect dials, without listening to the phone calls themselves. In Friday's ruling, the court said computer users should know that they lose privacy protections with e-mail and Web site addresses when they are communicated to the company whose equipment carries the messages. The search is no more intrusive than officers' examination of a list of phone numbers or the outside of a mailed package, neither of which requires a warrant, Judge Raymond Fisher said in the 3-0 ruling. Defense lawyer Michael Crowley disagreed. His client, Dennis Alba, was sentenced to 30 years in prison after being convicted of operating a laboratory in Escondido that manufactured the drug ecstasy. Some of the evidence against Alba came from agents' tracking of his computer use. The court upheld his conviction and sentence. Expert evidence in Alba's case showed that the Web addresses obtained by federal agents included page numbers that allowed the agents to determine what someone read online, Crowley said. The ruling "further erodes our privacy," the attorney said. "The great political marketplace of ideas is the Internet, and the government has unbridled access to it."

Note: So now every email you send and read can be monitored legally. Why didn't this make news headlines?


Angler: The Cheney Vice Presidency
2007-06-24, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/06/23/AR20070623008...

Part One: 'A Different Understanding With the President': In less than an hour ... Cheney's proposal had become a military order from the commander in chief. Foreign terrorism suspects held by the United States were stripped of access to any court -- civilian or military, domestic or foreign. They could be confined indefinitely without charges and would be tried, if at all, in closed "military commissions." "What the hell just happened?" Secretary of State Colin L. Powell demanded ... when CNN announced the order that evening, Nov. 13, 2001. National security adviser Condoleezza Rice, incensed, sent an aide to find out. Even witnesses to the Oval Office signing said they did not know the vice president had played any part. "Angler," as the Secret Service code-named him, has approached the levers of power obliquely, skirting orderly lines of debate he once enforced as chief of staff to President Gerald R. Ford. He has battled a bureaucracy he saw as hostile, using intimate knowledge of its terrain. He has empowered aides to fight above their rank, taking on roles reserved in other times for a White House counsel or national security adviser. And he has found a ready patron in George W. Bush for edge-of-the-envelope views on executive supremacy that previous presidents did not assert. Over the past six years, Cheney has shaped his times as no vice president has before. [The] relationship [between Bush and Cheney] is opaque, a vital unknown in assessing Cheney's impact on events. Officials who see them together often, not all of them admirers of the vice president, detect a strong sense of mutual confidence that Cheney is serving Bush's aims.

Note: This is an important, in-depth investigation of the Cheney vice-presidency. It is highly revealing and well worth reading it its entirety.


White House of Mirrors
2007-06-24, New York Times
http://www.nytimes.com/2007/06/24/opinion/24sun1.html?ex=1340337600&en=2b456e...

President Bush has turned the executive branch into a two-way mirror. They get to see everything Americans do: our telephone calls, e-mail, and all manner of personal information. And we get to see nothing about what they do. Everyone knows this administration has disdained openness and accountability since its first days. That is about the only thing it does not hide. But recent weeks have produced disturbing disclosures about just how far Mr. Bush’s team is willing to go to keep lawmakers and the public in the dark. That applies to big issues — like the C.I.A.’s secret prisons — and to things that would seem too small-bore to order up a cover-up. Vice President Dick Cheney sets the gold standard, placing himself not just above Congress and the courts but above Mr. Bush himself. For the last four years, he has been defying a presidential order requiring executive branch agencies to account for the classified information they handle. When the agency that enforces this rule tried to do its job, Mr. Cheney proposed abolishing the agency. Since the 9/11 attacks, Mr. Bush has tried to excuse his administration’s obsession with secrecy by saying that dangerous times require greater discretion. He rammed the Patriot Act through Congress with a promise that national security agencies would make sure the new powers were not abused. But on June 14, The Washington Post reported that the [FBI] potentially broke the law or its own rules several thousand times over the past five years when it used the Patriot Act to snoop on domestic phone calls, e-mail and financial transactions of ordinary Americans.


When Computers Attack
2007-06-24, New York Times
http://www.nytimes.com/2007/06/24/weekinreview/24schwartz.html?ex=1340337600&...

Anyone who follows technology or military affairs has heard the predictions for more than a decade. Cyberwar is coming. Although the long-announced, long-awaited computer-based conflict has yet to occur, the forecast grows more ominous with every telling: an onslaught is brought by a warring nation, backed by its brains and computing resources; banks and other businesses in the enemy states are destroyed; governments grind to a halt; telephones disconnect. Industrial remote-control technologies known as Scada systems, for Supervisory Control and Data Acquisition ... allow remote monitoring and control of operations like manufacturing production lines and civil works projects like dams. So security experts envision terrorists at a keyboard remotely shutting down factory floors or opening a dam’s floodgates to devastate cities downstream. But how bad would a cyberwar really be — especially when compared with the blood-and-guts genuine article? And is there really a chance it would happen at all? Whatever the answer, governments are readying themselves for the Big One. The United States is arming up. Robert Elder, commander of the Air Force Cyberspace Command, told reporters ... that his newly formed command, which defends military data, communications and control networks, is learning how to disable an opponent’s computer networks and crash its databases. “We want to go in and knock them out in the first round,” he said, as reported on Military.com.


Special Operations Prepared for Domestic Missions
2007-06-22, washingtonpost.com
http://blog.washingtonpost.com/earlywarning/2007/06/special_operations_prepar...

The U.S. Northern Command, the military command responsible for "homeland defense," has asked the Pentagon if it can establish its own special operations command for domestic missions. The request ... would establish a permanent sub-command for responses to incidents of domestic terrorism as well as other occasions where special operators may be necessary on American soil. The establishment of a domestic special operations mission, and the preparation of contingency plans to employ commandos in the United States, would upend decades of tradition. Military actions within the United States are the responsibility of state militias (the National Guard), and federal law enforcement is a function of the FBI. Employing special operations for domestic missions sounds very ominous, and NORTHCOM's request earlier this year should receive the closest possible Pentagon and congressional scrutiny. There's only one problem: NORTHCOM is already doing what it has requested permission to do. When NORTHCOM was established after 9/11 to be the military counterpart to the Department of Homeland Security, within its headquarters staff it established a Compartmented Planning and Operations Cell (CPOC) responsible for planning and directing a set of "compartmented" and "sensitive" operations on U.S., Canadian and Mexican soil. In other words, these are the very special operations that NORTHCOM is now formally asking the Pentagon to beef up into a public and acknowledged sub-command.


Osama Flight Shocker
2007-06-21, New York Post
http://www.nypost.com/seven/06212007/news/nationalnews/osama_flight_shocker_n...

Osama bin Laden was suspected of chartering a plane that carried his family and other Saudis from the United States shortly after 9/11, according to FBI documents released yesterday. One FBI document referred to a Ryan Air 727 plane that left Los Angeles on Sept. 19, 2001, carrying Saudi nationals. "The plane was chartered either by the Saudi Arabian royal family or Osama bin Laden," according to the document obtained by Judicial Watch. The flight made stops in Orlando, Washington, D.C. and Boston, and terminated in Paris. Asked about the documents' assertion, an FBI spokesman said, "There is no new information here. Osama bin Laden did not charter a flight out of the U.S."

Note: To read an excellent article on the implications of this brief report, click here.


FBI Finds It Frequently Overstepped in Collecting Data
2007-06-14, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/06/13/AR20070613024...

An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.


FBI Terror Watch List
2007-06-13, ABC News
http://blogs.abcnews.com/theblotter/2007/06/fbi_terror_watc.html

A terrorist watch list compiled by the FBI has apparently swelled to include more than half a million names. Privacy and civil liberties advocates say the list is growing uncontrollably, threatening its usefulness in the war on terror. The bureau says the number of names on its terrorist watch list is classified. A portion of the FBI's unclassified 2008 budget request posted to the Department of Justice Web site, however, refers to "the entire watch list of 509,000 names." A spokesman for the interagency National Counterterrorism Center (NCTC), which maintains the government's list of all suspected terrorists with links to international organizations, said they had 465,000 names covering 350,000 individuals. Many names are different versions of the same identity. In addition to the NCTC list, the FBI keeps a list of U.S. persons who are believed to be domestic terrorists - abortion clinic bombers, for example, or firebombing environmental extremists, who have no known tie to an international terrorist group. Combined, the NCTC and FBI compendia comprise the watch list used by federal security screening personnel on the lookout for terrorists. While the NCTC has made no secret of its terrorist tally, the FBI has consistently declined to tell the public how many names are on its list. "It grows seemingly without control or limitation," said ACLU senior legislative counsel Tim Sparapani of the terrorism watch list. Sparapani called the 509,000 figure "stunning. If we have 509,000 names on that list, the watch list is virtually useless," he told ABC News. "You'll be capturing innocent individuals with no connection to crime or terror." U.S. lawmakers and their spouses have been detained because their names were on the watch list.


US college rejects Jewish professor over anti-Israel stance
2007-06-11, The Guardian (one of the U.K.'s leading newspapers)
http://www.guardian.co.uk/usa/story/0,,2100590,00.html

One of the most rancorous disputes in American academia has ended with a prominent political scientist ... being denied tenure at one of the country's top-10 private universities. Norman Finkelstein, author of The Holocaust Industry, [is a professor at] the political sciences department of DePaul University in Chicago. Mr Finkelstein has argued in his books that claims of anti-semitism are used to dampen down criticism of Israeli policy towards the Palestinians and that the Holocaust is exploited by some Jewish institutions for their own gain. His outspoken position as a Jewish intellectual critical of Israel and of some elites within the Jewish community has prompted passionate debate. Prominent intellectuals such as [Noam Chomsky] have spoken out in Mr Finkelstein's favour, but others have decried him. His most bitter opponent is Alan Dershowitz, a Harvard law professor, who campaigned heavily to prevent tenure being granted. Soon after Mr Finkelstein applied for it, Mr Dershowitz sent DePaul faculty members a dossier of what he categorised as the "most egregious academic sins, outright lies, misquotations, and distortions" of the political scientist. The dispute has roots that go deeper still, with Mr Finkelstein devoting much of his most recent book, Beyond Chutzpah: On the Misuse of Anti-Semitism and the Abuse of History, to an attack on Mr Dershowitz's own work. Mr Finkelstein, the son of Holocaust survivors, has responded to the decision ... by condemning the vote as an act of political aggression. "I met the standards of tenure DePaul required, but it wasn't enough to overcome the political opposition to my speaking out on the Israel-Palestine conflict."


In Iraq's four-year looting frenzy, the allies have become the vandals
2007-06-08, The Guardian (one of the U.K.'s leading newspapers)
http://arts.guardian.co.uk/art/heritage/story/0,,2098275,00.html

Fly into the American air base of Tallil outside Nasiriya in central Iraq and the flight path is over the great ziggurat of Ur, reputedly the earliest city on earth. Ur is safe within the base compound. But its walls are pockmarked with wartime shrapnel and a blockhouse is being built over an adjacent archaeological site. When the head of Iraq's supposedly sovereign board of antiquities and heritage, Abbas al-Hussaini, tried to inspect the site recently, the Americans refused him access to his own most important monument. Under Saddam you were likely to be tortured and shot if you let someone steal an antiquity; in today's Iraq you are likely to be tortured and shot if you don't. The tragic fate of the national museum in Baghdad in April 2003 was as if federal troops had invaded New York city, sacked the police and told the criminal community that the Metropolitan was at their disposal. The local tank commander was told specifically not to protect the museum for a full two weeks after the invasion. Even the Nazis protected the Louvre. America [has converted] Nebuchadnezzar's great city of Babylon into the hanging gardens of Halliburton. In the process the 2,500-year-old brick pavement to the Ishtar Gate was smashed by tanks and the gate itself damaged. Babylon is being rendered archaeologically barren. Outside the capital some 10,000 sites of incomparable importance to the history of western civilisation, barely 20% yet excavated, are being looted as systematically as was the museum in 2003. When [archeologists] tried to remove vulnerable carvings from the ancient city of Umma to Baghdad, [they] found gangs of looters already in place with bulldozers, dump trucks and AK47s.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"