Terrorism News StoriesExcerpts of Key Terrorism News Stories in Major Media
Below are key excerpts of revealing news articles on terrorism from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
A federal intelligence court judge earlier this year secretly declared a key element of the Bush administration's wiretapping efforts illegal, according to a lawmaker and government sources, providing a previously unstated rationale for fevered efforts by congressional lawmakers this week to expand the president's spying powers. House Minority Leader John A. Boehner (R-Ohio) disclosed elements of the court's decision in remarks ... to Fox News as he was promoting the administration-backed wiretapping legislation. The judge, whose name could not be learned, concluded early this year that the government had overstepped its authority in attempting to broadly surveil communications between two locations overseas that are passed through routing stations in the United States. The decision was both a political and practical blow to the administration, which had long held that all of the National Security Agency's enhanced surveillance efforts since 2001 were legal. The administration for years had declined to subject those efforts to the jurisdiction of the Foreign Intelligence Surveillance Court, and after it finally did so in January the court ruled that the administration's legal judgment was at least partly wrong. The practical effect has been to block the NSA's efforts to collect information from a large volume of foreign calls and e-mails that passes through U.S. communications nodes clustered around New York and California. Both Democrats and Republicans have signaled they are eager to fix that problem through amendments to the Foreign Intelligence Surveillance Act (FISA). An unstated facet of the program is that anyone the foreigner is calling inside the United States, as long as that person is not the primary target, would also be wiretapped.
Since the 9/11 terrorist attacks, the Bush administration has repeatedly demonstrated that it does not feel bound by the law or the Constitution. It cannot even be trusted to properly use the enhanced powers it was legally granted after the attacks. Yet, once again, President Bush has been trying to stampede Congress into a completely unnecessary expansion of his power to spy on Americans. The fight is over the 1978 Foreign Intelligence Surveillance Act, which requires the government to obtain a warrant before eavesdropping on electronic communications that involve someone in the United States. Mr. Bush decided after 9/11 that he was no longer going to obey that law. He authorized the National Security Agency to intercept international telephone calls and e-mail messages of Americans and other residents of this country without a court order. He told the public nothing and Congress next to nothing about what he was doing, until The Times disclosed the spying in December 2005. Ever since, the White House has tried to pressure Congress into legalizing Mr. Bush’s rogue operation. The administration and its ... supporters in Congress argue that American intelligence is blinded by FISA and have seized on neatly timed warnings of heightened terrorist activity to scare everyone. It is vital for Americans, especially lawmakers, to resist that argument. It is pure propaganda. [The question at issue is] whether we are a nation ruled by law, or the whims of men in power.
New charges have been filed alleging that a former top CIA official pushed a proposed $100 million government contract for his best friend in return for lavish vacations, private jet flights and a lucrative job offer. The indictment [brings] charges ... against Kyle “Dusty” Foggo, who resigned from the spy agency a year ago, and ... defense contractor Brent Wilkes. The charges grew from the bribery scandal that landed former U.S. Rep. Randy “Duke” Cunningham in prison. The pair now face 30 wide-ranging counts of fraud, conspiracy and money laundering [including that] Foggo provided Wilkes with “sensitive, internal information related to ... national security,” including classified information, to help him prepare proposals for providing undercover flights for the CIA under the guise of a civil aviation company and armored vehicles for agency operations. Then, he pushed his CIA colleagues to hire Wilkes’ companies without disclosing their friendship, prosecutors allege. In a June 2005 e-mail to the head of CIA air operations quoted in the indictment, Foggo offered to “use some ’EXDIR grease”’ on Wilkes’ behalf. Foggo was the agency’s executive director at the time. In return, Wilkes offered to hire Foggo after he retired from government service. [An] initial indictment in February charged the pair with 11 counts of the same charges in connection with a $1.7 million water-supply contract Foggo allegedly helped win for one of Wilkes’ companies while he was working as a logistics coordinator at a CIA supply hub overseas. Foggo, the former No. 3 official at the CIA, resigned from the spy agency after his house and office were raided by federal agents.
Note: Until just a few years ago, there was a virtual blackout in the media on any negative coverage of the CIA. The prosecution of the #3 man in the CIA is an external manifestation of huge shake-ups going on behind the scenes. Buzzy Krongard, the previous #3 at the CIA has been linked to the millions of dollars in suspicious stock option trades made just prior to 9/11 that were never claimed, though this received little media coverage.
The Bush administration's chief intelligence official said yesterday that President Bush authorized a series of secret surveillance activities under a single executive order in late 2001. The disclosure makes clear that a controversial National Security Agency program was part of a much broader operation than the president previously described. The disclosure by Mike McConnell [is] the first time that the administration has publicly acknowledged that Bush's order included undisclosed activities beyond the warrantless surveillance of e-mails and phone calls that Bush confirmed in December 2005. McConnell [disclosed] that the executive order following the Sept. 11, 2001 attacks included "a number of . . . intelligence activities" and that a name routinely used by the administration -- the Terrorist Surveillance Program -- applied only to "one particular aspect of these activities, and nothing more. This is the only aspect of the NSA activities that can be discussed publicly, because it is the only aspect of those various activities whose existence has been officially acknowledged." News reports ... have detailed a range of activities linked to the program, including the use of data mining to identify surveillance targets and the participation of telecommunication companies in turning over millions of phone records. Kate Martin ... of the Center for National Security Studies, said the new disclosures show that ... administration officials have "repeatedly misled the Congress and the American public" about the extent of NSA surveillance efforts. "They have repeatedly tried to give the false impression that the surveillance was narrow and justified," Martin said. "Why did it take accusations of perjury before the DNI disclosed that there is indeed other, presumably broader and more questionable, surveillance?"
The Bush administration is pressing Congress this week for the authority to intercept, without a court order, any international phone call or e-mail between a surveillance target outside the United States and any person in the United States. It would also give the attorney general sole authority to order the interception of communications for up to one year as long as he certifies that the surveillance is directed at a person outside the United States. Civil liberties and privacy groups have denounced the administration's proposal, which they say would effectively allow the National Security Agency to revive a warrantless surveillance program conducted in secret from 2001 until late 2005. They say it would also give the government authority to force carriers to turn over any international communications into and out of the United States without a court order. An unstated facet of the program is that anyone the foreigner is calling inside the United States, as long as that person is not the primary target, would also be wiretapped. Caroline Fredrickson, director of the ACLU's Washington legislative office [said], "What the administration is really going after is the Americans. Even if the primary target is overseas, they want to be able to wiretap Americans without a warrant." The proposal would also allow the NSA to ... have access to the entire stream of communications without the phone company sorting, said Kate Martin, director of the Center for National Security Studies. "It's a 'trust us' system," she said. "Give us access and trust us."
Since 9/11, President Bush's repeated assaults on the Constitution and celebration of international lawlessness ... have needlessly made Americans less safe. The president, for example, has flouted the Foreign Intelligence Surveillance Act in intercepting the conversations and e-mails of American citizens on American soil on his say-so alone. He has claimed authority to break into and enter our homes, open our mail and commit torture. He has insisted that the entire United States is a battlefield -- even pizza parlors -- where lethal military force may be employed to kill ... suspects with bombs or missiles. He has detained citizens and noncitizens alike as enemy combatants based on secret evidence. And he has insisted that he is constitutionally empowered to keep U.S. troops in Iraq indefinitely. Congress should restore the Constitution's checks and balances and protections against government abuses. The most frightening of Bush's abuses travels under the banner of "extraordinary rendition." In its name, Bush has kidnapped, secretly imprisoned, and tortured. The practice is what would be expected of dictators such as the Soviet Union's Joseph Stalin or Iraq's Saddam Hussein. The detainees are held incommunicado without accusation or trial. No judge reviews the allegedly incriminating evidence. No law restricts interrogation methods or the conditions of confinement. And the innocent are left without recourse as "collateral damage" in Bush's ... global [war on terrorism].
Note: The author, Bruce Fein, served as Associate Attorney General under President Reagan.
Be careful what you say and whom you help -- especially when it comes to the Iraq war and the Iraqi government. President Bush issued an executive order last week titled "Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq." It could be interpreted as targeting the financial assets of any American who directly or indirectly aids someone who has committed or "poses a significant risk of committing" violent acts "threatening the peace or stability of Iraq" or who undermines "efforts to promote economic reconstruction and political reform" in the war-torn country. The text of the order, if interpreted broadly, could cast a far bigger net to include not just those who commit violent acts or pose the risk of doing so in Iraq, but also third parties -- such as U.S. citizens in this country -- who knowingly or unknowingly aid or encourage such people. The targeting of not just those who support perpetrators of violence but also those who support individuals who "pose a significant risk" of committing violence goes far beyond normal legal language related to intent and could be applied in a highly arbitrary manner, said Bruce Fein, a senior Justice Department official in the Reagan administration. Fein also questioned the executive order's inclusion of third parties, such as U.S. citizens who assist, sponsor or make "any contribution or provision of funds, goods, or services" to assist people on the Treasury list. "What about a lawyer hired to get someone off the list?" Fein asked. The Treasury Department's Office of Foreign Assets Control keeps a "Specially Designated Nationals and Blocked Persons" roll that includes those covered by several such executive orders. It most recently ran to 276 pages.
Note: To read the full text of the Executive Order, "Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq," click here.
President Bush set broad legal boundaries for the CIA's harsh interrogation of terrorism suspects yesterday, allowing the intelligence agency to resume a program that was suspended last year after criticism that it violated U.S. and international law. In an executive order lacking any details about actual interrogation techniques, Bush said the CIA program will now comply with a Geneva Conventions prohibition against "outrages upon personal dignity, in particular humiliating and degrading treatment." Two administration officials said that suspects now in U.S. custody could be moved immediately into the "enhanced interrogation" program and subjected to techniques that go beyond those allowed by the U.S. military. Rights activists criticized Bush's order for failing to spell out which techniques are now approved or prohibited. "All the order really does is to have the president say, 'Everything in that other document that I'm not showing you is legal -- trust me,' " said Tom Malinowski of Human Rights Watch. The CIA interrogation guidelines are contained in a classified document. A senior intelligence official, asked whether this list includes such widely criticized methods as the simulated drowning known as "waterboarding," declined to discuss specifics but said "it would be very wrong to assume that the program of the past would move into the future unchanged." CIA detainees have also alleged they were left naked in cells for prolonged periods, subjected to sensory and sleep deprivation and extreme heat and cold, and sexually taunted. A senior administration official briefing reporters yesterday said that any future use of "extremes of heat and cold" would be subject to a "reasonable interpretation . . . we're not talking about forcibly induced hypothermia."
Oregonians called Peter DeFazio's office, worried there was a conspiracy buried in the classified portion of a White House plan for operating the government after a terrorist attack. As a member of the U.S. House on the Homeland Security Committee, DeFazio, D-Ore., is permitted to enter a secure "bubbleroom" in the Capitol and examine classified material. So he asked the White House to see the secret documents. On Wednesday, DeFazio got his answer: DENIED. "I just can't believe they're going to deny a member of Congress the right of reviewing how they plan to conduct the government of the United States after a significant terrorist attack," DeFazio says. Homeland Security Committee staffers told his office that the White House initially approved his request, but it was later quashed. DeFazio doesn't know who did it or why. "We're talking about the continuity of the government of the United States of America," DeFazio says. "I would think that would be relevant to any member of Congress, let alone a member of the Homeland Security Committee." Bush administration spokesman Trey Bohn declined to say why DeFazio was denied access: "We do not comment through the press on the process that this access entails. It is important to keep in mind that much of the information related to the continuity of government is highly sensitive." Norm Ornstein, a legal scholar who studies government continuity at the conservative American Enterprise Institute, said he "cannot think of one good reason" to deny access to a member of Congress who serves on the Homeland Security Committee. This is the first time DeFazio has been denied access to documents. "Maybe the people who think there's a conspiracy out there are right," DeFazio said.
An independent oversight board created to identify intelligence abuses after the CIA scandals of the 1970s did not send any reports to the attorney general of legal violations during the first 5 1/2 years of the Bush administration's counterterrorism effort, the Justice Department has told Congress. The President's Intelligence Oversight Board -- the principal civilian watchdog of the intelligence community -- is obligated under a 26-year-old executive order to tell the attorney general and the president about any intelligence activities it believes "may be unlawful." The board was vacant for the first two years of the Bush administration. The board's mandate is to provide independent oversight, so the absence of such communications has prompted critics to question whether the board was doing its job. "It's now apparent that the IOB was not actively employed in the early part of the administration. And it was a crucial period when its counsel would seem to have been needed the most," said Anthony Harrington, who served as the board's chairman for most of the Clinton administration. Senate Judiciary Committee chairman Patrick J. Leahy (D-Vt.) added: "It is deeply disturbing that this administration seems to spend so much of its energy and resources trying to find ways to ignore any check and balance on its authority and avoid accountability to Congress and the American public."
A Marine corporal, testifying Saturday at the murder trial of a buddy, said that Marines in his unit began routinely beating Iraqis after being ordered by officers to "crank up the violence level." Cpl. Saul H. Lopezromo said Marines in his platoon, including the defendant, Cpl. Trent D. Thomas, were angry when officers criticized them as not being as tough as other Marine platoons. "We're all hard-chargers, we're not there to mess around, so we took it as an insult," Lopezromo said. Within weeks of allegedly being scolded, seven Marines and a Navy corpsman went out late one night to find and kill a suspected insurgent in the village of Hamandiya near the Abu Ghraib prison. Unable to find their target, the Marines and corpsman dragged another man from his house, fatally shot him, and then planted an AK-47 assault rifle near the body to make it look like he had been killed in a shootout, according to court testimony. "We were told to crank up the violence level," said Lopezromo, who testified for the defense. He indicated that during daily patrols the Marines became much rougher with Iraqis. Asked by a juror to explain, he said, "We beat people, sir." Lopezromo said he believed that officers knew of the beatings, and ... said he saw nothing wrong in what Thomas and the others did. "I don't see it as an execution, sir," he told the judge. "I see it as killing the enemy." He added that Marines, in effect, consider all Iraqi men as part of the insurgency. Prosecution witnesses testified that Thomas shot the 52-year-old Iraq at point-blank range after he had already been shot by other Marines and was lying on the ground. Lopezromo said a procedure called "dead-checking" was routine. Marines are taught "dead-checking" in boot camp ... he said.
The Federal Bureau of Investigation is developing a computer-profiling system that would enable investigators to target possible terror suspects. The System to Assess Risk, or STAR, assigns risk scores to possible suspects based on a variety of information, similar to the way a credit bureau assigns a rating based on a consumer's spending behavior and debt. The program focuses on foreign suspects but also includes data about some U.S. residents. Some lawmakers said ... that the report raises new questions about the government's power to use personal information and intelligence without accountability. "The Bush administration has expanded the use of this technology, often in secret, to collect and sift through Americans' most sensitive personal information," said Sen. Patrick J. Leahy (D-Vt.), chairman of the Senate Judiciary Committee. The use of data mining in the war on terror has sparked criticism. An airplane-passenger screening program called CAPPS II was revamped and renamed because of civil liberty concerns. An effort to collect Americans' personal and financial data called Total Information Awareness was killed. Law enforcement and national security officials have continued working on other programs to use computers to sift through information for signs of threats. The Department of Homeland Security, for example, flags travelers entering and leaving the United States who may be potential suspects through a risk-assessment program called the Automated Targeting System.
A proposed new FBI program would skirt federal laws by paying private companies to hold millions of phone and Internet records which the bureau is barred from keeping itself, experts say. The $5 million project would apparently pay private firms to store at least two years' worth of telephone and Internet activity by millions of Americans, few of whom would ever be considered a suspect in any terrorism, intelligence or criminal matter. The FBI is barred by law from collecting and storing such data if it has no connection to a specific investigation or intelligence matter. In recent years the bureau has tried to encourage telecommunications firms to voluntarily store such information, but corporations have balked at the cost of keeping records they don't need. "The government isn't allowed to warehouse the information, and the companies don't want to, so this creates a business incentive for the companies to warehouse it, so the government can access it later," said Mike German, a policy expert on national security and privacy issues for the American Civil Liberties Union (ACLU). "It's a public-private partnership that puts civil liberties to the test." In March, an FBI official identified the companies as Verizon, MCI and AT&T. Even the bureau's own top lawyer said she found the [FBI's] behavior "disturbing," noting that when requesting access to phone company records, it repeatedly referenced "emergency" situations that did not exist, falsely claimed grand juries had subpoenaed information and failed to keep records on much of its own activity.
The most intriguing secrets of the "war on terror" have nothing to do with al-Qaeda and its fellow travelers. They're about the mammoth private spying industry that all but runs U.S. intelligence operations today. In April, Director of National Intelligence Mike McConnell was poised to publicize a year-long examination of outsourcing by U.S. intelligence agencies. But the report was inexplicably delayed -- and suddenly classified a national secret. What McConnell doesn't want you to know is that the private spy industry has succeeded where no foreign government has: It has penetrated the CIA and is running the show. Over the past five years (some say almost a decade), there has been a revolution in the intelligence community toward wide-scale outsourcing. Private companies now perform key intelligence-agency functions, to the tune ... of more than $42 billion a year. Intelligence professionals [say] that more than 50 percent of the National Clandestine Service (NCS) -- the heart, brains and soul of the CIA -- has been outsourced to private firms such as Abraxas, Booz Allen Hamilton, Lockheed Martin and Raytheon. These firms recruit spies, create non-official cover identities and control the movements of CIA case officers. They also provide case officers and watch officers at crisis centers and regional desk officers who control clandestine operations worldwide. As The Los Angeles Times first reported last October, more than half the workforce in two key CIA stations -- Baghdad and Islamabad, Pakistan -- is made up of industrial contractors, or "green badgers," in CIA parlance. Intelligence insiders say that entire branches of the NCS have been outsourced to private industry.
Federal agents do not need a search warrant to monitor a suspect's computer use and determine the e-mail addresses and Web pages the suspect is contacting, a federal appeals court ruled Friday. In a drug case from San Diego County, the Ninth U.S. Circuit Court of Appeals in San Francisco likened computer surveillance to the "pen register" devices that officers use to pinpoint the phone numbers a suspect dials, without listening to the phone calls themselves. In Friday's ruling, the court said computer users should know that they lose privacy protections with e-mail and Web site addresses when they are communicated to the company whose equipment carries the messages. The search is no more intrusive than officers' examination of a list of phone numbers or the outside of a mailed package, neither of which requires a warrant, Judge Raymond Fisher said in the 3-0 ruling. Defense lawyer Michael Crowley disagreed. His client, Dennis Alba, was sentenced to 30 years in prison after being convicted of operating a laboratory in Escondido that manufactured the drug ecstasy. Some of the evidence against Alba came from agents' tracking of his computer use. The court upheld his conviction and sentence. Expert evidence in Alba's case showed that the Web addresses obtained by federal agents included page numbers that allowed the agents to determine what someone read online, Crowley said. The ruling "further erodes our privacy," the attorney said. "The great political marketplace of ideas is the Internet, and the government has unbridled access to it."
Note: So now every email you send and read can be monitored legally. Why didn't this make news headlines?
Part One: 'A Different Understanding With the President': In less than an hour ... Cheney's proposal had become a military order from the commander in chief. Foreign terrorism suspects held by the United States were stripped of access to any court -- civilian or military, domestic or foreign. They could be confined indefinitely without charges and would be tried, if at all, in closed "military commissions." "What the hell just happened?" Secretary of State Colin L. Powell demanded ... when CNN announced the order that evening, Nov. 13, 2001. National security adviser Condoleezza Rice, incensed, sent an aide to find out. Even witnesses to the Oval Office signing said they did not know the vice president had played any part. "Angler," as the Secret Service code-named him, has approached the levers of power obliquely, skirting orderly lines of debate he once enforced as chief of staff to President Gerald R. Ford. He has battled a bureaucracy he saw as hostile, using intimate knowledge of its terrain. He has empowered aides to fight above their rank, taking on roles reserved in other times for a White House counsel or national security adviser. And he has found a ready patron in George W. Bush for edge-of-the-envelope views on executive supremacy that previous presidents did not assert. Over the past six years, Cheney has shaped his times as no vice president has before. [The] relationship [between Bush and Cheney] is opaque, a vital unknown in assessing Cheney's impact on events. Officials who see them together often, not all of them admirers of the vice president, detect a strong sense of mutual confidence that Cheney is serving Bush's aims.
Note: This is an important, in-depth investigation of the Cheney vice-presidency. It is highly revealing and well worth reading it its entirety.
The U.S. Northern Command, the military command responsible for "homeland defense," has asked the Pentagon if it can establish its own special operations command for domestic missions. The request ... would establish a permanent sub-command for responses to incidents of domestic terrorism as well as other occasions where special operators may be necessary on American soil. The establishment of a domestic special operations mission, and the preparation of contingency plans to employ commandos in the United States, would upend decades of tradition. Military actions within the United States are the responsibility of state militias (the National Guard), and federal law enforcement is a function of the FBI. Employing special operations for domestic missions sounds very ominous, and NORTHCOM's request earlier this year should receive the closest possible Pentagon and congressional scrutiny. There's only one problem: NORTHCOM is already doing what it has requested permission to do. When NORTHCOM was established after 9/11 to be the military counterpart to the Department of Homeland Security, within its headquarters staff it established a Compartmented Planning and Operations Cell (CPOC) responsible for planning and directing a set of "compartmented" and "sensitive" operations on U.S., Canadian and Mexican soil. In other words, these are the very special operations that NORTHCOM is now formally asking the Pentagon to beef up into a public and acknowledged sub-command.
President Bush has turned the executive branch into a two-way mirror. They get to see everything Americans do: our telephone calls, e-mail, and all manner of personal information. And we get to see nothing about what they do. Everyone knows this administration has disdained openness and accountability since its first days. That is about the only thing it does not hide. But recent weeks have produced disturbing disclosures about just how far Mr. Bush’s team is willing to go to keep lawmakers and the public in the dark. That applies to big issues — like the C.I.A.’s secret prisons — and to things that would seem too small-bore to order up a cover-up. Vice President Dick Cheney sets the gold standard, placing himself not just above Congress and the courts but above Mr. Bush himself. For the last four years, he has been defying a presidential order requiring executive branch agencies to account for the classified information they handle. When the agency that enforces this rule tried to do its job, Mr. Cheney proposed abolishing the agency. Since the 9/11 attacks, Mr. Bush has tried to excuse his administration’s obsession with secrecy by saying that dangerous times require greater discretion. He rammed the Patriot Act through Congress with a promise that national security agencies would make sure the new powers were not abused. But on June 14, The Washington Post reported that the [FBI] potentially broke the law or its own rules several thousand times over the past five years when it used the Patriot Act to snoop on domestic phone calls, e-mail and financial transactions of ordinary Americans.
Anyone who follows technology or military affairs has heard the predictions for more than a decade. Cyberwar is coming. Although the long-announced, long-awaited computer-based conflict has yet to occur, the forecast grows more ominous with every telling: an onslaught is brought by a warring nation, backed by its brains and computing resources; banks and other businesses in the enemy states are destroyed; governments grind to a halt; telephones disconnect. Industrial remote-control technologies known as Scada systems, for Supervisory Control and Data Acquisition ... allow remote monitoring and control of operations like manufacturing production lines and civil works projects like dams. So security experts envision terrorists at a keyboard remotely shutting down factory floors or opening a dam’s floodgates to devastate cities downstream. But how bad would a cyberwar really be — especially when compared with the blood-and-guts genuine article? And is there really a chance it would happen at all? Whatever the answer, governments are readying themselves for the Big One. The United States is arming up. Robert Elder, commander of the Air Force Cyberspace Command, told reporters ... that his newly formed command, which defends military data, communications and control networks, is learning how to disable an opponent’s computer networks and crash its databases. “We want to go in and knock them out in the first round,” he said, as reported on Military.com.
Osama bin Laden was suspected of chartering a plane that carried his family and other Saudis from the United States shortly after 9/11, according to FBI documents released yesterday. One FBI document referred to a Ryan Air 727 plane that left Los Angeles on Sept. 19, 2001, carrying Saudi nationals. "The plane was chartered either by the Saudi Arabian royal family or Osama bin Laden," according to the document obtained by Judicial Watch. The flight made stops in Orlando, Washington, D.C. and Boston, and terminated in Paris. Asked about the documents' assertion, an FBI spokesman said, "There is no new information here. Osama bin Laden did not charter a flight out of the U.S."
Note: To read an excellent article on the implications of this brief report, click here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.