Please donate here to support this vital work.
Revealing News For a Better World

Government Corruption Media Articles
Excerpts of Key Government Corruption Media Articles in Major Media


Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


New leaker disclosing U.S. secrets, government concludes
2014-08-06, CNN
http://www.cnn.com/2014/08/05/politics/u-s-new-leaker

The federal government has concluded there's a new leaker exposing national security documents in the aftermath of surveillance disclosures by former NSA contractor Edward Snowden, U.S. officials tell CNN. Proof of the newest leak comes from national security documents that formed the basis of a news story published [August 5] by the Intercept, the news site launched by Glenn Greenwald, who also published Snowden's leaks. The Intercept article focuses on the growth in U.S. government databases of known or suspected terrorist names during the Obama administration. The article cites documents prepared by the National Counterterrorism Center dated August 2013, which is after Snowden left the United States to avoid criminal charges. Government officials have been investigating to find out that identity. In a February interview with CNN's Reliable Sources, Greenwald said: "I definitely think it's fair to say that there are people who have been inspired by Edward Snowden's courage and by the great good and virtue that it has achieved." The biggest database, called the Terrorist Identities Datamart Environment, now has 1 million names, a U.S. official confirmed to CNN. The Intercept first reported the new TIDE database numbers, along with details of other databases. As of November, 2013, there were 700,000 people listed in the Terrorist Screening Database (TSDB), or the "Terrorist Watchlist, according to a U.S. official. The Intercept report said, citing the documents, that 40% on the "Terrorist Watchlist" aren't affiliated with terror groups.

Note: For more on this, see concise summaries of deeply revealing 'terror' manipulation news articles from reliable major media sources.


Why do two white Americans get the Ebola serum while hundreds of Africans die?
2014-08-06, Washington Post
http://www.washingtonpost.com/posteverything/wp/2014/08/06/why-do-two-white-a...

What should happen if a massive viral outbreak appears out of nowhere and the only possible treatment is an untested drug? And who should receive it? The two American missionaries who contracted the almost-always-fatal virus in West Africa were given access to an experimental drug cocktail called ZMapp. It consists of immune-boosting monoclonal antibodies that were extracted from mice exposed to bits of Ebola DNA. Now in isolation at an Atlanta hospital, they appear to be doing well. It’s an opportunity the 900 Africans who’ve died so far never had. The reasons for different treatment are partly about logistics, partly about economics and, partly about a lack of any standard policy for giving out untested drugs in emergencies. Before this outbreak, ZMapp had only been tested on monkeys. But privileged humans were always going to be the first ones to try it. ZMapp requires a lot of refrigeration and careful handling, plus close monitoring by experienced doctors and scientists—better to try it at a big urban hospital than in rural West Africa, where no such infrastructure exists. And the two Americans who got it in Africa had been infected for more than a week, making its efficacy completely unknown.

Note: For more on this, see concise summaries of deeply revealing health news articles from reliable major media sources.


Ebola virus: British experts urge US and WHO to ‘give Africans cure’
2014-08-06, The Independent (One of the UK's leading newspapers)
http://www.independent.co.uk/news/world/africa/ebola-outbreak-british-experts...

Three of Britain’s leading Ebola specialists have said experimental treatments for the deadly Ebola virus must be offered to the people of West Africa, after two US aid workers were administered with the “cure” in Liberia. The two missionaries, Dr Kent Brantly and Nancy Writebol, are alive and now being cared for at a specialist isolation unit in Atlanta. Though the pair remain weak – and there is no way of knowing at this stage how much of a help the new drug has actually been – the fact that it was given to the two Americans has resulted in widespread criticism and recriminations in West Africa. Almost 900 people have died from the Ebola virus across Guinea, Liberia and Sierra Leone since the latest outbreak began in February this year. Some strains can have fatality rates of up to 90 per cent, though that of the current crisis appears to be around 60 per cent. Now Peter Piot, who discovered Ebola in 1976, David Heymann, the director of the Chatham House Centre on Global Health Security and Jeremy Farrar from the Wellcome Trust have said there are in fact several drugs and vaccines under study that could be used to combat the disease. Liberia’s assistant health minister, Tolbert Nyenswah, said that the news of Dr Brantly and Ms Writebol’s treatment had “made our job very difficult” as dying patients and their relatives in Africa request the same “cure”. The US aid workers were given ZMapp, a drug made from antibodies produced in a lab that has never gone through human trials or been approved by the US’s FDA Food and Drug Administration. Piot, Farrar and Heymann questioned why Africans were not being given the same chance.

Note: For more on this, see concise summaries of deeply revealing health news articles from reliable major media sources.


Barack Obama’s Secret Terrorist-Tracking System, by the Numbers
2014-08-05, The Intercept
https://firstlook.org/theintercept/article/2014/08/05/watch-commander

Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local law enforcement agencies, private contractors, and foreign governments—more than 40 percent are described by the government as having “no recognized terrorist group affiliation.” The documents, obtained from a source in the intelligence community, also reveal that the Obama Administration has presided over an unprecedented expansion of the terrorist screening system. Since taking office, Obama has boosted the number of people on the no fly list more than ten-fold, to an all-time high of 47,000. “If everything is terrorism, then nothing is terrorism,” says David Gomez, a former senior FBI special agent. The watchlisting system, he adds, is “revving out of control.” The classified documents were prepared by the National Counterterrorism Center, the lead agency for tracking individuals with suspected links to international terrorism. Stamped “SECRET” and “NOFORN” (indicating they are not to be shared with foreign governments), they offer the most complete numerical picture of the watchlisting system to date. The government adds names to its databases, or adds information on existing subjects, at a rate of 900 records each day.

Note: For more on this, see concise summaries of deeply revealing 'terror' manipulation news articles from reliable major media sources.


Man who filmed NYPD choke hold video arrested on weapons charges
2014-08-03, Reuters
http://www.reuters.com/article/2014/08/03/us-usa-new-york-chokehold-idUSKBN0G...

A man who filmed a New York City police officer use a choke hold on a suspect who later died has been arrested on weapons charges, law enforcement officials said on [August 3]. Ramsey Orta, 22, and a 17-year-old female were spotted on [August 2] outside a known drug location on Staten Island by narcotics officers who saw Orta put a handgun in his companion's waistband, the New York Police Department said. Orta, who has a previous criminal conviction, faces two charges of criminal possession of a weapon. At some point during his arrest, Orta told officers, "You're just mad because I filmed your boy," an NYPD spokeswoman said. The comment was apparently in reference to the July 17 cellphone video shot by Orta during the arrest of Eric Garner, who was placed in a choke hold by a police officer while being detained for peddling illegal cigarettes. Garner later died, and the New York City medical examiner ruled the his death a homicide. Footage of the incident circulated widely on the Internet, triggering outrage and raising questions about police tactics and use of force. The choke hold is banned by the NYPD, which says it is investigating why the maneuver was used.

Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


Inquiry by C.I.A. Affirms It Spied on Senate Panel
2014-08-01, New York Times
http://www.nytimes.com/2014/08/01/world/senate-intelligence-commitee-cia-inte...

An internal investigation by the C.I.A. has found that its officers penetrated a computer network used by the Senate Intelligence Committee in preparing its damning report on the C.I.A.’s detention and interrogation program. The report by the agency’s inspector general also found that C.I.A. officers read the emails of the Senate investigators and sent a criminal referral to the Justice Department based on false information. The investigation also discovered that the officers created a false online identity to gain access on more than one occasion to computers used by the committee staff. The inspector general’s account of how the C.I.A. secretly monitored a congressional committee charged with supervising its activities touched off angry criticism from members of the Senate and amounted to vindication for Senator Dianne Feinstein of California, the committee’s Democratic chairwoman, who excoriated the C.I.A. in March when the agency’s monitoring of committee investigators became public. Senator Mark Udall, Democrat of Colorado and another member of the Intelligence Committee, demanded Mr. Brennan’s resignation. “The C.I.A. unconstitutionally spied on Congress by hacking into the Senate Intelligence Committee computers,” he said in a written statement. “This grave misconduct not only is illegal but it violates the U.S. Constitution’s requirement of separation of powers,” he added.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


U.S. Senate report to suggest harsh CIA interrogations were unnecessary
2014-08-01, Chicago Tribune/Reuters
http://www.chicagotribune.com/news/nationworld/politics/sns-rt-us-usa-cia-tor...

A U.S. Senate committee report will conclude that the CIA's use of harsh interrogation after the Sept. 11, 2001, attacks yielded no critical intelligence on terrorist plots that could not have been obtained through non-coercive methods, U.S. officials familiar with the document said. [The] report [is] expected to suggest that the "enhanced" techniques were unnecessary and also to accuse some CIA officers of misleading Congress about the effectiveness of the program. Officials said the Senate Intelligence Committee was unlikely to release the report to the public without some additional review. "A preliminary review of the report indicates there have been significant redactions. We need additional time to understand the basis for these redactions and determine their justification. Therefore the report will be held until further notice and released when that process is completed," Democratic Sen. Dianne Feinstein, the committee's chair, said. Committee investigators also concluded that the agency misled other executive branch agencies and Congress by claiming that only by using harsh methods did the agency achieve ... counter-terrorism breakthroughs that otherwise would not have been possible. The report will criticize some CIA officials by name, the officials said.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Britain’s Crime of Complicity
2014-07-31, New York Times
http://www.nytimes.com/2014/07/31/opinion/Britains-Crime-of-Complicity-With-t...

The [UK] government [has] announced an inquiry into historical allegations of child sex abuse by leading political figures. The Westminster inquiry will investigate not just the rape and assault of children at group homes going back decades but also accusations that child abuse by politicians and other public figures was deliberately covered up or even facilitated by members of the elite. [The] Parliament has ... spent 30 years failing to catch the pedophiles in its own house. Before the inquiry was even announced, it emerged that 114 files concerning allegations of abuse against children involving senior political figures had mysteriously disappeared. What links all these convicted or alleged predators of children is not background or upbringing. What united them was power and access — and a sense of entitlement, acquired from Britain’s traditional elite, that came from the knowledge that their reputations were too great for them to be held accountable. In many cases, investigation by the authorities was deliberately deflected. Nowhere is this truer than at Britain’s top “public schools,” as the private secondary, usually boarding, schools are known. In these, a culture of bullying and sexualized violence has been understood for more than a century as part of the process of training young men to be leaders. Teachers at 130 of these schools have been implicated; several schools are under criminal investigation by the police. That victims of child abuse often grow up to replicate that abuse, to become bullies or tyrants or covert sexual predators, has long been understood as a human tragedy. Only in Britain does it seem to have been the intrinsic psychology at the dark heart of the governing elite.

Note: For more on this, see concise summaries of deeply revealing sexual abuse scandals news articles from reliable major media sources.


Afghanistan Has Cost the U.S. More Than the Marshall Plan
2014-07-31, Bloomberg Businessweek
http://www.bloomberg.com/bw/articles/2014-07-31/afghanistan-has-cost-the-u-do...

The U.S. has now spent more on the reconstruction of Afghanistan than it spent on the Marshall Plan, which resuscitated Europe after World War II. The Marshall Plan delivered $103 billion in today’s dollars to 16 European countries between 1948 and 1952. That has now been topped by congressional appropriations for reconstruction in Afghanistan, which so far have come to $109 billion in today’s dollars. The difference: The Marshall Plan helped Europe get back on its feet, while Afghanistan is a chaotic mess. The Marshall Plan comparison is the most striking fact in a depressing, 259-page quarterly report to Congress issued July 30 by John Sopko, the congressionally appointed special inspector general for Afghanistan reconstruction. One recent audit ... raised concerns about the army’s ability to account for some 465,000 U.S.-provided small arms. This quarter, Sopko’s report says, a local police unit cut the power lines from Kabul ... “in retaliation for not being paid for three months.” To cut costs, NATO plans to shrink the Afghan National Security Forces to less than 230,000 by 2017. But an independent assessment ... concluded that the forces will require more than 370,000 people. That would cost three times as much as the Afghan government’s entire domestic revenue. Afghanistan’s main exports are carpets and rugs, dried fruits, medicinal plants, opium, and gems. But Sopko observes, “opiates are not part of the licit economy, and gems are easy to smuggle, so their contributions to government revenue are limited.”

Note: By 2000, the Taliban had mostly stopped heroin production in Afghanistan. But once this country was under US control, illicit drug production surged to record levels and Afghanistan became a narco state. How much "reconstruction" money became the drug cartel money that kept big banks afloat in 2008?


WikiLeaks reveals Australian gagging order over political bribery allegations
2014-07-30, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/jul/30/wikileaks-australia-super-injunc...

A sweeping [gag] order issued in Australia to block reporting of any bribery allegations involving several international political leaders in the region has been exposed by WikiLeaks. The prohibition emerged from a criminal case in the Australian courts and applies throughout the country. It was issued by the criminal division of the supreme court of Victoria in Melbourne. The Australia-wide [gag] order is a superinjunction, which means it also contains a clause insisting that the terms of the order itself should remain secret. [It] states: "Subject to further order, there [shall] be no disclosure, by publication or otherwise, of any information derived from or prepared for the purposes of these proceedings including the terms of these orders." In a statement published with the leak, Julian Assange, the founder of WikiLeaks, said the gagging order relates to a case that "concerns the subsidiaries of the Australian central bank". He said it was the first blanket suppression order of this nature in Australia since 1995. "With this order, the worst in living memory, the Australian government is not just gagging the Australian press, it is blindfolding the Australian public," said Assange, who is himself Australian. "This is not simply a question of the Australian government failing to give this international corruption case the public scrutiny it is due. Foreign minister Julie Bishop must explain why she is threatening every Australian with imprisonment in an attempt to cover up an embarrassing corruption scandal involving the Australian government".

Note: Very few media were even willing to report on the reasons for this gag order, which were clearly to cover up corruption at the highest levels. See the CNN article for how no mention is even made of what was revealed. It seems that the higher up the corruption goes, the more vehemently courts rule to keep the investigations secret. Could there be a double standard here? For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


FBI Defends Search for Oklahoma City Bombing Video
2014-07-29, ABC News/Associated Press
http://abcnews.go.com/US/wireStory/trial-opening-video-oklahoma-city-bombing-...

The FBI thoroughly searched its archives and found no evidence that more videos of the Oklahoma City bombing exist, agency employees told a judge [on July 28] in a trial that has rekindled questions about whether any others were involved in the 1995 attack. Additional searches for videos that Salt Lake City lawyer Jesse Trentadue believes are being withheld would be burdensome and fruitless, FBI attorney Kathryn Wyer argued during the first day of a bench trial. Trentadue says the agency is refusing to release videos that show a second person was with Timothy McVeigh when he parked a truck outside the Oklahoma City federal building and detonated a bomb that killed 168 people. The government says McVeigh was alone. [But] the 30 video recordings the FBI has released don't show the explosion or McVeigh's arrival in a rental truck. Unsatisfied by the FBI's previous explanations and citing the public importance of the tapes, U.S. District Judge Clark Waddoups has ordered the agency to explain why it can't find videos that are mentioned in evidence logs. Trentadue believes the presence of a second suspect explains why his brother, Kenneth Trentadue, was flown to Oklahoma several months after the bombing, where he died in a federal holding cell. Kenneth Trentadue bore a striking resemblance to a police sketch based on witness descriptions of the enigmatic suspect "John Doe No. 2," who was never identified..

Note: There is strong evidence of a major cover-up in the Oklahoma City bombing. See this Wall Street Journal article, this Associated Press article, this ABC News article, and this Deseret News article for examples.


Your chicken is about to get more full of feces
2014-07-28, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2014/jul/28/chicken-regulations-obam...

Most chickens spend the bulk of their short lives covered or standing in feces, ... and the way in which they are dispatched in the modern era is so sordid that farm states are actually passing laws to keep you from ever bearing witness to the slaughter. The one small hope for human health has been that the US Department of Agriculture has inspectors to watch over [chicken] processing plants and make sure we don't eat sick chickens or chickens covered in their own feces as they make their way through the processing plant. That is, it's been the one hope until now. The USDA is moving toward final approval of a rule that would replace most government inspectors with untrained company employees, and to allow companies to slaughter chickens at a much faster rate. The rule is called the "Modernization of Poultry Slaughter Inspection", but advocates like the Center for Food Safety and Food and Water Watch are calling it the "Filthy Chicken Rule". "It's really letting the fox guard the chicken coop", says Tony Corbo of Food and Water Watch. And there are already plenty of problems. The rule comes in the midst of a years-long increase in the number of food-born illnesses, driven in part by a shortage of government inspectors. Salmonella "is estimated to cause 1.2 million illnesses in the United States, with about 23,000 hospitalizations and 450 deaths" each year, according to a recent report by the Centers for Disease Control and Prevention.

Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


The Secret Government Rulebook For Labeling You a Terrorist
2014-07-23, The Intercept
https://firstlook.org/theintercept/article/2014/07/23/blacklisted/

The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist. The “March 2013 Watchlisting Guidance,” a 166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire “categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted. The rulebook ... was developed behind closed doors by representatives of the nation’s intelligence, military, and law-enforcement establishment, including the Pentagon, CIA, NSA, and FBI. Emblazoned with the crests of 19 agencies, it offers the most complete and revealing look into the secret history of the government’s terror list policies to date.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Before Snowden: The Whistleblowers Who Tried To Lift The Veil
2014-07-22, NPR
http://www.npr.org/2014/07/22/333741495/before-snowden-the-whistleblowers-who...

Bill Binney worked at the National Security Agency [for] nearly three decades as one of its leading crypto-mathematicians. He then became one of its leading whistleblowers. The NSA is overseen by Congress, the courts and other government departments. It's also supposed to be watched from the inside by its own workers. But over the past dozen years, whistleblowers like Binney have had a rough track record. Those who tried unsuccessfully to work within the system say Edward Snowden — the former National Security Agency contractor who shared top-secret documents with reporters — learned from their bitter experience. For Binney, the decision to quit the NSA and become a whistleblower began a few weeks after the terrorist attacks of Sept. 11, 2001, when he says he discovered the spy agency had begun using software he'd created to scoop up information on Americans — all without a court order. "I had to get out of there, because they were using the program I built to do domestic spying, and I didn't want any part of it, I didn't want to be associated with it," he says. "I look at it as basically treason. They were subverting the Constitution." Binney says he and two other NSA colleagues who also quit tried sounding the alarm with congressional committees. But because they did not have documents to prove their charges, nobody believed them. Snowden, he says, did not repeat that mistake. "He recognized right away, it was very clear to me, that if he wanted anybody to believe him, he'd have to take a lot of documentation with him — which is what he did," Binney says.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Government agents 'directly involved' in most high-profile US terror plots
2014-07-21, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/jul/21/government-agents-directly-invol...

Nearly all of the highest-profile domestic terrorism plots in the United States since 9/11 featured the "direct involvement" of government agents or informants, a new report says. Some of the controversial "sting" operations "were proposed or led by informants", bordering on entrapment by law enforcement. Yet the courtroom obstacles to proving entrapment are significant, one of the reasons the stings persist. The lengthy report, released on [July 21] by Human Rights Watch, raises questions about the US criminal justice system's [respect for] civil rights and due process in post-9/11 terrorism cases. [The report] portrays a system that features not just the sting operations but secret evidence, anonymous juries, extensive pretrial detentions and convictions significantly removed from actual plots. "In some cases the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act," the report alleges. Out of the 494 cases related to terrorism the US has tried since 9/11, the plurality of convictions ... are not for thwarted plots but for "material support" charges, a broad category expanded further by the 2001 Patriot Act that permits prosecutors to pursue charges with tenuous connections to a terrorist act or group. Several cases featured years-long solitary confinement for accused terrorists before their trials. Some defendants displayed signs of mental incapacity. Jurors for the 2007 plot to attack the Fort Dix army base, itself influenced by government informants, were anonymous, limiting defense counsel's ability to screen out bias.

Note: Why was this important news not picked up by any major US media? For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Racy Photos Were Often Shared at N.S.A., Snowden Says
2014-07-21, New York Times
http://www.nytimes.com/2014/07/21/us/politics/edward-snowden-at-nsa-sexually-...

The former National Security Agency contractor Edward J. Snowden said in a wide-ranging interview ... that the oversight of surveillance programs was so weak that members of the United States military working at the spy agency sometimes shared sexually explicit photos they intercepted. He also said the British government often pioneered the most invasive surveillance programs because its intelligence services operate with fewer restrictions intended to protect individual privacy than its counterparts in the United States and other allies. “In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive,” he said. “So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: ‘Oh, hey, that’s great. Send that to Bill down the way.’ ” Mr. Snowden said that type of sharing ... was “seen as the fringe benefits of surveillance positions.” He said that this was never reported and that the system for auditing surveillance programs was “incredibly weak.” Mr. Snowden had particularly stark criticism for the British government’s surveillance programs, because in Britain the respect for individual privacy, he said, “is not strongly encoded in law or policy.” Because it has fewer restrictions, British intelligence platforms “are used as a testing ground” for programs of all five intelligence partners, a group referred to as “Five Eyes,” which includes Britain, Canada, Australia, New Zealand and the United States.”

Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


Meet Executive Order 12333: The Reagan rule that lets the NSA spy on Americans
2014-07-18, Washington Post
https://www.washingtonpost.com/opinions/meet-executive-order-12333-the-reagan...

In March I received a call from the White House counsel’s office regarding a speech I had prepared for my boss at the State Department. The speech was about the impact ... of National Security Agency surveillance practices. The draft stated that “if U.S. citizens disagree with congressional and executive branch determinations about the proper scope of signals intelligence activities, they have the opportunity to change the policy through our democratic process.” But the White House counsel’s office told me that no, that wasn’t true. I was instructed to amend the line. Some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them. Public debate about the bulk collection of U.S. citizens’ data by the NSA has focused largely on Section 215 of the Patriot Act. Based in part on classified facts that I am prohibited by law from publishing, I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215. Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained. None of the reforms that Obama announced earlier this year will affect such collection.

Note: The above was written by John Napier Tye, former section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor. A 2014 Washington Post investigation sheds more light on the NSA's legally dubious domestic mass surveillance program. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


The Details About the CIA's Deal With Amazon
2014-07-17, The Atlantic
https://www.theatlantic.com/technology/archive/2014/07/the-details-about-the-...

The intelligence community is about to get the equivalent of an adrenaline shot to the chest. This summer, a $600 million computing cloud developed by Amazon Web Services for the Central Intelligence Agency over the past year will begin servicing all 17 agencies that make up the intelligence community. If the technology plays out as officials envision, it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks. For the first time, agencies within the intelligence community will be able to order a variety of on-demand computing and analytic services from the CIA and National Security Agency. What's more, they'll only pay for what they use. For the risk-averse intelligence community, the decision to go with a commercial cloud vendor is a radical departure from business as usual. It is difficult to underestimate the cloud contract's importance. In a recent public appearance, CIA Chief Information Officer Douglas Wolfe called it "one of the most important technology procurements in recent history," with ramifications far outside the realm of technology. The importance of the cloud capabilities the CIA gets through leveraging Amazon Web Services' horsepower is best exemplified in computing intelligence data. Instead of each agency building out its own systems, select agencies ... are responsible for governing its major components.

Note: The CIA tries to "collect everything and hold on to it forever." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


Edward Snowden urges professionals to encrypt client communications
2014-07-17, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/jul/17/edward-snowden-professionals-enc...

The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations. Snowden said professionals were failing in their obligations to their clients, sources, patients and parishioners in what he described as a new and challenging world. "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe. Any communications should be encrypted by default," he said. Snowden's plea for the professions to tighten security came during an extensive and revealing interview with the Guardian in Moscow. During the seven hours of interview, Snowden: • Said if he ended up in US detention in Guantánamo Bay he could live with it. • Does not have any regrets. • Said that ... he was independently secure, living on savings, and money from awards and speeches he has delivered online round the world. • Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in "sexually compromising" situations are routinely passed around. He works online late into the night; a solitary, digital existence not that dissimilar to his earlier life. He said he was using part of that time to work on the new focus for his technical skills, designing encryption tools to help professionals such as journalists protect sources and data. He is negotiating foundation funding for the project, a contribution to addressing the problem of professions wanting to protect client or patient data, and in this case journalistic sources.

Note: Read the transcript of the Guardian's new interview of Edward Snowden. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Hacking Online Polls and Other Ways British Spies Seek to Control the Internet
2014-07-14, The Intercept
https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-...

The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call. The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users. A newly released top-secret GCHQ document called “JTRIG Tools and Techniques” provides a comprehensive, birds-eye view of just how underhanded and invasive this unit’s operations are. The document—available in full here—is designed to notify other GCHQ units of JTRIG’s “weaponised capability” when it comes to the dark internet arts, and serves as a sort of hacker’s buffet for wreaking online havoc.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"