Terrorism News StoriesExcerpts of Key Terrorism News Stories in Major Media
Below are key excerpts of revealing news articles on terrorism from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Newly declassified documents obtained [by] Judicial Watch, are raising questions over the U.S. government's handling of Anwar al-Awlaki, and whether it [recruited] the radical American cleric as an intelligence source in 2002. Director Robert Mueller did not dismiss the possibility. "I am not personally familiar with any effort to recruit Anwar al-Awlaki as an asset -- that does not mean to say there was not an effort at some level of the Bureau (FBI) or another agency to do so," Mueller said. Fox's ongoing reporting ... shows that in 2002 he was released from custody at JFK international airport -- despite an active warrant for his arrest -- with the okay of FBI Agent Wade Ammerman. Within days of his re-entry, al-Awlaki showed up in Ammerman's counter-terrorism investigation in Virginia into Ali al-Timimi, who is now serving a life sentence on non-terrorism charges. None of the information about al-Awlaki's release from federal custody at JFK, a sudden decision by the Justice Department in October 2002 to rescind an arrest warrant for the cleric, nor the cleric's connection to Ammerman was provided to the defense during Timimi’s 2005 trial. Documents ... show the FBI Director was more deeply involved in the post-9/11 handling of al-Awlaki than previously known. One memo from Mueller to then-Attorney General John Ashcroft on Oct. 3, 2002 -- seven days before the cleric re-entered the U.S. and was detained at JFK -- is marked "Secret" and titled "Anwar Aulaqi: IT-UBL/AL-QAEDA." "Why would al-Awlaki get the attention of the FBI Director? Why would a warrant for his arrest be pulled when he's trying to reenter the country?" asked Judicial Watch President Tom Fitton.
Note: Al-Awlaki, who was born in New Mexico and was a US citizen, died in a U.S. drone attack in Yemen nearly two years ago, the first American targeted for death by the CIA, by its own admission. With the confirmation that he had been an intelligence asset for the US government as early as 2002, his assassination takes on new significance. For more on the murky background of Al-Awlaki, click here and here.
Michael Hayden, the former director of the National Security Agency, has invaded America’s television sets in recent weeks to warn about Edward Snowden’s leaks and the continuing terrorist threat to America. But what often goes unmentioned, as the Guardian’s Glenn Greenwald pointed out, is that Hayden has a financial stake in keeping Americans scared and on a permanent war footing against Islamist militants. And the private firm he works for, called the Chertoff Group, is not the only one making money by scaring Americans. Post-9/11 America has witnessed a boom in private firms dedicated to the hyped-up threat of terrorism. The drive to privatize America’s national security apparatus accelerated in the aftermath of the terrorist attacks, and it’s gotten to the point where 70 percent of the national intelligence budget is now spent on private contractors, as author Tim Shorrock reported [in Spies for Hire: the Secret World of Intelligence Outsourcing]. The private intelligence contractors have profited to the tune of at least $6 billion a year. In 2010, the Washington Post revealed that there are 1,931 private firms across the country dedicated to fighting terrorism. What it all adds up to is a massive industry profiting off government-induced fear of terrorism, even though Americans are more likely to be killed by a car crash or their own furniture than a terror attack. Here are five private companies cashing in on keeping you afraid. 1. The Chertoff Group 2. Booz Allen Hamilton 3. Science Applications International Corp. 4. Center for Counterintelligence and Security Studies 5. Security Solutions International.
Note: For more on government and corporate corruption in pushing the terror hoax, see the deeply revealing reports from reliable major media sources available here.
What if government officials have written laws that apply only to us and not to them? What if we gave them the power to protect our freedoms and our safety and they used that power to trick and trap some of us? What if government officials broke the laws we hired them to enforce? What if they prosecuted others for breaking the same laws they broke? What if the government enacted a law making it a crime to provide material assistance to terrorist organizations? What if the government looked at that law and claimed it applied to a dentist or a shopkeeper who sold services or goods to a terrorist organization, and not just to financiers and bomb makers? What if the Supreme Court ruled that the law is so broad that it covers backslapping, advocacy and free speech? What if the law is so broad that it punishes ideas and the free expression of those ideas, even if no one is harmed thereby? What if FBI agents pretended to be members of these terrorist organizations and set out to find people in America who were willing to join? What if the FBI arrested the people it found and encouraged just as they were about to leave the U.S. and then charged them with providing material assistance to terrorist organizations? What if the president boasted that in his mind these duped dopes were really terrorists and their arrests kept us all safer? What if offensive wars are illegal and morally wrong? What if killing is evil when not done in self-defense? What if those who kill not in self-defense are prosecuted and punished, except when they do so in large numbers and to the sounds of trumpets blaring? What do we do about a government that breaks the laws we have hired it to enforce?
Note: Andrew P. Napolitano, author of this opinion, is the senior judicial analyst at Fox News Channel. Judge Napolitano has written seven books on the U.S. Constitution. His latest is Theodore and Woodrow: How Two American Presidents Destroyed Constitutional Freedom.
A former CIA officer has broken the U.S. silence around the 2003 abduction of a radical Islamist cleric in Italy, charging that the agency inflated the threat the preacher posed and that the United States then allowed Italy to prosecute her and other Americans to shield President George W. Bush and other U.S. officials from responsibility for approving the operation. Confirming for the first time that she worked undercover for the CIA in Milan when the operation took place, Sabrina De Sousa provided new details about the “extraordinary rendition” that led to the only criminal prosecution stemming from the secret Bush administration rendition and detention program launched after the Sept. 11, 2001, attacks. The cleric, Osama Mustapha Hassan Nasr, was snatched from a Milan street by a team of CIA operatives and flown to Egypt, where he was held for the better part of four years without charges and allegedly tortured. An Egyptian court in 2007 ruled that his imprisonment was “unfounded” and ordered him released. Among the allegations made by De Sousa in a series of interviews with McClatchy: – The former CIA station chief in Rome, Jeffrey Castelli, whom she called the mastermind of the operation, exaggerated Nasr's terrorist threat to win approval for the rendition and misled his superiors [to believe] that Italian military intelligence had agreed to the operation. – Senior CIA officials, including then-CIA Director George Tenet, approved the operation even though Nasr wasn’t wanted in Egypt and wasn’t on the U.S. list of top al Qaida terrorists. – Condoleezza Rice, then the White House national security adviser, ... agreed to it and recommended that Bush approve the abduction.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Sharp disagreement over the future of the Guantanamo Bay detention camp dominated the first Senate hearing on the issue in four years. The meeting [on July 24] of a Senate Judiciary Committee subcommittee, held in the wake of a high-profile hunger strike by inmates ... made clear that deep partisan divisions remain over whether keeping the prison open is a threat to national security or a necessity. Opened at a U.S. Navy base in Cuba in the months after the Sept. 11, 2001, terrorist attack, Guantanamo was established by President George W. Bush to hold detainees suspected of connections to global terrorism organizations. Allegations of abuse and torture of inmates have led to repeated calls for Guantanamo's closure, and Obama has campaigned twice on the issue, though Congress has passed repeated measures to keep the prison open. Sen. Richard J. Durbin (D-Ill.), who is chairman of the panel, urged Congress to support Obama's efforts, which would end the indefinite detention of prisoners without trial and either release them or charge them in American courts. "The risk of keeping it open far outranks the risk of closing it." Retired Army Maj. Gen. Paul D. Eaton, who trained the Iraqi armed forces from 2003 to 2004, testified that by continuing to violate human rights and American law, the practices at Guantanamo proved more harmful to the U.S. national security interests. "Guantanamo is a terrorist-creating organization," he said to a reporter after the hearing. "It's a terrific recruiting tool."
Note: Whether or not detainees were truly terrorists before they were imprisoned at Guantanamo, how do you think they feel about the US government after years there? You have to wonder if this isn't being done to create terrorists, just as many prisons become training grounds for criminals.
A Florida medical examiner’s office said [on July 16] that the FBI has ordered the office not to release its autopsy report of a Chechen man fatally shot by a Boston FBI agent in May. The medical examiner’s office said it completed the autopsy report on Ibragim Todashev, a friend of [a] suspected Boston Marathon bomber, on July 8 and that the report was “ready for release.” The agent shot and killed Todashev on May 22 in his Orlando apartment during an interrogation related to the Boston Marathon bombings. Critics have called for an independent inquiry, questioning the blanket of secrecy surrounding the case. The FBI and the Massachusetts State Police sought out Todashev after the Marathon bombings, but have refused to release details of the shooting. Media reports have provided conflicting accounts: Some said Todashev attacked the agent with a blade during an interrogation, while others said Todashev was unarmed. Another said he lunged at the agent with a metal pole or a broomstick. The agent shot Todashev multiple times, according to family members who released photos of Todashev’s dead body as part of their call for an inquiry into his death. Family members and advocacy groups have questioned the media accounts, pointing out that Todashev had repeatedly cooperated with the FBI. The Council on American-Islamic Relations and the ACLU have called for independent inquiries into the shooting. According to CAIR in Florida, which is conducting its own investigation into Todashev’s slaying, Todashev had spoken to the FBI at least three times at their offices after the Marathon bombings.
Note: What are they hiding here?
Members of a congressional committee [on July 10] accused the FBI of stalling an inquiry into the Boston Marathon bombings, saying the bureau had no grounds for withholding what it knew about Tamerlan Tsarnaev prior to the attacks. “The information requested by this committee belongs to the American people,’’ said Representative Michael McCaul, a Texas Republican who chairs the House Homeland Security Committee. “It does not belong solely to the FBI.” The frustrations, aired publicly after FBI officials rebuffed an invitation to appear before the committee, stemmed from the FBI’s unwillingness to detail how it handled a security review of Tsarnaev nearly two years before the Marathon bombings. “The FBI continues to refuse this committee’s appropriate requests for information and documents crucial to our investigation into what happened in Boston,” McCaul declared as he opened a committee hearing. Tsarnaev died after a firefight with police in Watertown within hours of being identified as a suspect. Members were particularly frustrated by a July 3 letter to the committee from the FBI. The letter, reviewed by the Globe, said the bureau would not be responding to all the committee’s requests for information. “The fact that the FBI is not sharing information with this committee with jurisdiction over homeland security I think is just totally unacceptable,” said Representative Peter King, a New York Republican.
Note: For more strangeness around the Boston bombing with a key witness being deported, click here. For more on the realities of intelligence agency manipulations, see the deeply revealing reports from reliable major media sources available here.
The top U.S. special operations commander, Adm. William McRaven, ordered military files about the Navy SEAL raid on Osama bin Laden's hideout to be purged from Defense Department computers and sent to the CIA, where they could be more easily shielded from ever being made public. The secret move, described briefly in a draft report by the Pentagon's inspector general, set off no alarms within the Obama administration even though it appears to have sidestepped federal rules and perhaps also the U.S. Freedom of Information Act. The CIA, noting that the bin Laden mission was overseen by then-CIA Director Leon Panetta before he became defense secretary, said that the SEALs were effectively assigned to work temporarily for the CIA, which has presidential authority to conduct covert operations. The records transfer was part of an effort by McRaven to protect the names of the personnel involved in the raid, according to the inspector general's draft report. But secretly moving the records allowed the Pentagon to tell The Associated Press that it couldn't find any documents inside the Defense Department that AP had requested more than two years ago, and would represent a new strategy for the U.S. government to shield even its most sensitive activities from public scrutiny. "Welcome to the shell game in place of open government," said Thomas Blanton, director of the National Security Archive, a private research institute at George Washington University. "Guess which shell the records are under. If you guess the right shell, we might show them to you. It's ridiculous."
Note: For a powerful analysis of the strong evidence that Osama bin Laden most likely died in Afghanistan in December 2001, long before he was "killed" by the SEALs raid in Pakistan, read David Ray Griffin's Osama bin Laden: Dead or Alive? For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans. The rulings, some nearly 100 pages long, reveal that the court has taken on a much more expansive role by regularly assessing broad constitutional questions and establishing important judicial precedents, with almost no public scrutiny. The 11-member Foreign Intelligence Surveillance Court, known as the FISA court, was once mostly focused on approving case-by-case wiretapping orders. But since major changes in legislation and greater judicial oversight of intelligence operations were instituted six years ago, it has quietly become almost a parallel Supreme Court, serving as the ultimate arbiter on surveillance issues and delivering opinions that will most likely shape intelligence practices for years to come. In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures. Unlike the Supreme Court, the FISA court hears from only one side in the case — the government — and its findings are almost never made public.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Leslie James Pickering noticed something odd in his mail last September: a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home. “Show all mail to supv” — supervisor — “for copying prior to going out on the street,” read the card. It included Mr. Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green. “It was a bit of a shock to see it,” said Mr. Pickering, who with his wife owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service. Mr. Pickering was targeted by a longtime surveillance system called mail covers, a forerunner of a vastly more expansive effort, the Mail Isolation Control and Tracking program, in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year. It is not known how long the government saves the images. The Mail Isolation Control and Tracking program was created after the anthrax attacks in late 2001. It enables the Postal Service to retrace the path of mail at the request of law enforcement. No one disputes that it is sweeping.
Note: The exposure by whistleblower Edward Snowden of the NSA's massive domestic and global spying operations seems to have triggered a series of other revelations about surveillance of the US population, like this report on the US Postal Service's photographing all mail. Hardly a week goes by without another major revelation, such as a new digital photo-ID database utilized by the FBI and police forces, and the development by US police of a national DNA database on all "potential suspects". Since very few US citizens are terrorists, what is the real purpose behind this total surveillance?
Have you noticed anything missing in the political discourse about the National Security Administration's unprecedented mass surveillance? There's at least been some conversation about the intelligence community's potential criminality and constitutional violations. But there have only been veiled references to how cash undoubtedly tilts the debate against those who challenge the national security state. Those indirect references have come in stories about Booz Allen Hamilton, the security contractor that employed Edward Snowden. CNN/Money notes that 99 percent of the firm's multibillion-dollar annual revenues now come from the federal government. Those revenues are part of a larger and growing economic sector within the military-industrial complex - a sector that, according to author Tim Shorrock, is "a $56 billion-a-year industry." Yet few in the Washington press corps mention that politicians' attacks on surveillance critics may have nothing to do with principle and everything to do with shilling for campaign donors. For a taste of what that kind of institutionalized corruption looks like, peruse the Influence Explorer site to see how much Booz Allen Hamilton and its parent company, the Carlyle Group, spend. As you'll see, from Barack Obama to John McCain, many of the politicians publicly defending the surveillance state have taken huge sums of money from the firms. Simply put, there are corporate forces with a vested financial interest in making sure the debate over security is tilted toward the surveillance state and against critics of that surveillance state.
Note: Tim Shorrock, quoted above, is the author of Spies for Hire: The Secret World of Intelligence Outsourcing.
The modern American surveillance state is not really the stuff of paranoid fantasies; it has arrived. The revelations about the National Security Agency’s PRISM data collection program have raised awareness ... about the reach and power of secret intelligence gatherers operating behind the facades of government and business. But those revelations ... have been partial — they primarily focus on one government agency and on the surveillance end of intelligence work, purportedly done in the interest of national security. What has received less attention is the fact that most intelligence work today is not carried out by government agencies but by private intelligence firms and that much of that work involves another common aspect of intelligence work: deception. That is, it is involved not just with the concealment of reality, but with the manufacture of it. Important insight into the world [of] these companies came from a 2010 hack by a group best known as LulzSec ... which targeted the private intelligence firm HBGary Federal. That hack yielded 75,000 e-mails. Team Themis (a group that included HBGary and the private intelligence and security firms Palantir Technologies, Berico Technologies and Endgame Systems) was effectively brought in to find a way to undermine the credibility of WikiLeaks and the journalist Glenn Greenwald (who recently broke the story of Edward Snowden’s leak of the N.S.A.’s Prism program), because of Greenwald’s support for WikiLeaks. The plan called for actions to “sabotage or discredit the opposing organization” including a plan to submit fake documents and then call out the error.
Note: For more on the games intelligence agencies play, see the deeply revealing reports from reliable major media sources available here.
South America's leftist leaders rallied to support Bolivian President Evo Morales after his plane was rerouted amid suspicions that NSA leaker Edward Snowden was on board and they demanded an apology from France, Italy, Portugal and Spain. The presidents of Argentina, Ecuador, Suriname, Venezuela and Uruguay joined Morales in the Bolivian city of Cochabamba ... to denounce the treatment of Morales, who warned that he would close the U.S. Embassy in Bolivia if necessary. Morales again blamed Washington for pressuring European countries to refuse to allow his plane to fly through their airspace on Tuesday, forcing it to land in Vienna, Austria, in what he called a violation of international law. He had been returning from a summit in Russia during which he had suggested he would be willing to consider a request from Snowden for asylum. Spanish Foreign Minister Jose Manuel Garcia-Margallo said Friday that his nation and other European countries were told Snowden was aboard the Bolivian presidential plane. He did not say who supplied the information and declined to say whether he had been in contact with the United States. Ecuadorean President Rafael Correa said that he and other leaders were offering full support to Morales following the rerouting of the plane, calling it an aggression against the Americas. Venezuelan President Nicolas Maduro protested alleged attempts by Spanish officials to search the Bolivian presidential plane and accused the CIA of encouraging several European countries to deny the presidential plane their airspace.
Note: The subservience of European governments to the US attempt to apprehend Snowden by forcing Pres. Morales' plane down is logical given the recent revelations that they are also engaging in total surveillance of their own populations. For information on this click here (France), here (the UK), and here (Germany).
Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.
Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
The auditorium grew hushed as a senior Watford borough councillor took to his feet. Now it was the turn of the people of Watford to speak. What would they make of this international three-day policy summit, with its heavyweight delegate list bulging with billionaire financiers, party leaders and media moguls, protected by the biggest security operation Watford has ever seen? At one point in the meeting, during a tense exchange about contingency plans for dog-walkers, [Chief Inspector] Rhodes let slip that Operation Discuss (the codename for the Bilderberg security operation) had been up and running for 18 months. Residents and journalists shared an intake of breath. "Eighteen months?" The reason for all the secrecy? "Terrorism". After 59 years of Bilderberg guests scuttling about in the shadows, ducking lenses and dodging the news, that's the rationale we're given? The same rationale, presumably, is behind the Great Wall of Watford, a concrete-and-wire security fence encircling the hotel. As ugly as it is unnecessary, it looks like the kind of thing you throw yourself against in a stalag before being machine-gunned from a watchtower. Appropriately fascistic, you might say, if you regard fascism as "the merger of corporate and government power", as Mussolini put it. The same threat of "terrorism" was used to justify the no-pedestrian, no-stopping zones near the venue. The police laid out their logic: they had "no specific intelligence" regarding a terror threat. However, in recent incidents, such as Boston and Woolwich, there had been no intelligence prior to the attack. Therefore the lack of any threat of a terror attack fitted exactly the profile of a terror attack. The lack of a threat was a threat. Welcome to 1984.
Note: For a list of this year's Bilderberg participants, which include 90-year-old Henry Kissinger, click here. For lots more on secret societies from reliable sources, click here.
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs. The program, code-named PRISM, has not been made public until now. It may be the first of its kind. Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” GCHQ, Britain’s equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority. Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.
Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.
The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata — a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, it’s possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So it’s possible the NSA is using rooms like that to listen to everyone’s phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but it’s hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.
Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.
Former U.S. Sen. Bob Graham has accused the FBI in court papers of having impeded Congress’s Joint Inquiry into 9/11 by withholding information about a Florida connection to the ... attacks that killed nearly 3,000 people. The information ... includes a recently declassified FBI report that ties a Saudi family who once lived in Sarasota “to individuals associated with the terrorist attacks on 9/11/2001.” “The FBI’s failure to call (to the Joint Inquiry’s attention) documents finding ‘many connections’ between Saudis living in the United States and individuals associated with the terrorist attack(s) … interfered with the Inquiry’s ability to complete its mission,” said Graham, co-chairman of the Joint Inquiry. Graham said the FBI kept the 9/11 Commission in the dark, too. He said co-chairmen Thomas Kean and Lee Hamilton and executive director Philip Zelikow all told him they were unaware of the FBI’s Sarasota investigation. Moreover, Graham stated that Deputy FBI Director Sean Joyce, the Bureau’s second in command, personally intervened to block him from speaking with the special agent-in-charge of the Sarasota investigation. “I am troubled by what appears to me to be a persistent effort by the FBI to conceal from the American people information concerning possible Saudi support of the Sept. 11 attacks,” Florida’s former governor said.
Note: For deeply revealing reports from reliable major media sources on the 9/11 attacks, click here.
The 9/11 Consensus Panel now offers four evidence-based points about the alleged phone calls from the 9/11 flights. The famous "let's roll" drama of the passenger revolt on UA 93 was relayed by passenger Todd Beamer's 13-minute unrecorded seat-back call to GTE telephone supervisor Lisa Jefferson, who reported Beamer as strangely tranquil, declining to speak to his wife. Eerily, Beamer's line remained open for 15 minutes after the crash. Oddly, the Verizon wireless record shows that 19 calls were made from Beamer's cell phone long after the crash of UA 93. Initial media reports and FBI interviews detailed more than a dozen cell phone calls from the planes at high elevation. Yet in 2001, a telephone spokesperson stated that sustained mobile calls were not possible above 10,000 feet. During the 2006 Moussaoui Trial, the FBI (under oath) reduced the number of cell phone calls to two calls made from 5,000 feet, and presented evidence of only one (not two) "unconnected" call from Barbara Olson, lasting "0 seconds." In another twist, two other women reported that Caller-ID showed their husband's cell numbers on their answering machines, which while lasting several minutes, had been made from elevations of 25,000 and 35,000 feet. Although the FBI conducted a massive investigation into the calls, none of the telephone billing, nor any of the cell phone location data stored in standard phone company records has been publicly released.
Note: The 9/11 Consensus Panel, consisting of scientists, pilots, professors, attorneys, and journalists, has developed 32 Points of evidence contradicting specific claims made by the official account of 9/11. For many unanswered questions about 9/11 raised by highly credible former government officials and professors, click here and here. For our 9/11 Information Center filled with reliable, verifiable 9/11 resources, click here.
The Obama administration acknowledged [on May 22] that it has killed four Americans in overseas counterterrorism operations since 2009, the first time it has publicly taken responsibility for the deaths. Three are known to have died in CIA drone strikes in Yemen in 2011: Anwar al-Awlaki, his 16-year-old son and Samir Khan. The fourth — Jude Kennan Mohammad, a Florida native indicted in North Carolina in 2009 — was killed in Pakistan, where the CIA has operated a drone campaign against terrorism suspects for nearly a decade. His death was previously unreported. In addition to disclosure of the four killings, Holder wrote that Obama has approved classified briefings for Congress on an overall policy document, informally called the “playbook.” The document, more than a year in the making, codifies the administration’s standards and processes for its unprecedented program of targeted killing and capture of terrorism suspects outside of war zones. Nearly 400 drone strikes, in Pakistan, Yemen and Somalia, have been launched by the CIA and U.S. military forces during Obama’s presidency. According to Holder’s letter, Awlaki was the only U.S. citizen the administration “has specifically targeted and killed.” Two weeks after Awlaki’s death, his 16-year-old son, Abdulrahman — who had gone to the Yemeni desert in search of his father — was killed in a drone strike meant for someone else. That strike was similarly unacknowledged, although a senior administration official privately characterized it as a “mistake.”
Note: So an American citizen, Awlaki's son, was killed by a drone by "mistake"? What happened to the Fifth Amendment of the U.S. Constitution, which states no citizen shall "be deprived of life, liberty, or property, without due process of law"? For deeply revealing reports from reliable major media sources on the atrocities carried out by the US and UK in their global wars of aggression, click here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.