Government Corruption Media ArticlesExcerpts of Key Government Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
A secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documents taken from the National Security Agency by Edward Snowden and obtained by NBC News. The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous. A division of Government Communications Headquarters (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack. The documents ... show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder - and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms. Among the methods listed in the document were jamming phones, computers and email accounts and masquerading as an enemy in a "false flag" operation. A British hacktivist known as T-Flow, who was prosecuted for hacking, [said] no evidence of how his identity was discovered ever appeared in court documents.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
U.S. Sen. Elizabeth Warren said ... she is shocked that the federal government is earning an estimated $66 billion in profits from student loans originated between 2007 and 2012. [She] was reacting to a Government Accountability Office report [issued on January 31]. A previous Congressional Budget Office report estimated that the government will pocket an additional $185 billion in profits on new student loans made over the next 10 years. ‘‘This is obscene. The government should not be making $66 billion in profits off the backs of our students,’’ Warren said in a statement. ‘‘This report reinforces what we already knew — instead of investing in our children and their futures, the government is squeezing profits out of our young people and adding to the mountain of debt they will spend their lives struggling to repay.’’ Warren and eight other U.S. senators committed to wring government profits out of student loans and address [the] $1.2 trillion in outstanding student loan debt they say is crushing families and putting a strain on the economy. ‘‘We cannot bury our heads in the sand and pretend the profits don’t exist, or use accounting tricks to make them disappear,’’ Warren said. ‘‘It’s time to end the practice of profiting from young people who are trying to get an education and refinance existing loans.’’ Warren has [introduced a bill] that tries to pressure colleges to keep costs down for students and ensure they get a meaningful diploma when they graduate.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
Vera Scroggins, an outspoken opponent of fracking, is legally barred from the new county hospital. Also off-limits, unless Scroggins wants to risk fines and arrest, are the Chinese restaurant where she takes her grandchildren, the supermarkets and drug stores where she shops, the animal shelter where she adopted her Yorkshire terrier, bowling alley, recycling centre, golf club, and lake shore. In total, 312.5 sq miles are no-go areas for Scroggins under a sweeping court order granted by a local judge that bars her from any properties owned or leased by one of the biggest drillers in the Pennsylvania natural gas rush, Cabot Oil & Gas Corporation. The ban represents one of the most extreme measures taken by the oil and gas industry to date against protesters like Scroggins, who has operated peacefully and within the law including taking Yoko Ono to frack sites in her bid to elevate public concerns about fracking. It was always going to be an unequal fight when Scroggins, now 63, made it her self-appointed mission five years ago to stop fracking in this, the richest part of the Marcellus Shale. The judge [granted] Cabot a temporary injunction barring Scroggins from all property owned or leased by the company. In court filings, Cabot said it holds leases on 200,000 acres of land, equivalent to 312.5 sq miles. That amounts to nearly 40% of the largely rural county in north-eastern Pennsylvania where Scroggins lives and where Cabot does most of its drilling.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The British government can tap into the cables carrying the world’s web traffic at will and spy on what people are doing on some of the world’s most popular social media sites ... without the knowledge or consent of the companies. Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated a pilot program to their U.S. partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter. Called “Psychology A New Kind of SIGDEV" (Signals Development), the presentation includes a section that spells out “Broad real-time monitoring of online activity” of YouTube videos, URLs “liked” on Facebook, and Blogspot/Blogger visits. The monitoring program is called “Squeaky Dolphin.” Experts told NBC News the documents show the British had to have been either physically able to tap the cables carrying the world’s web traffic or able to use a third party to gain physical access to the massive stream of data. Representatives of Facebook and Google, which owns YouTube, said they ... were unaware the collection had occurred. The NSA does analysis of social media similar to that in the GCHQ demonstration. In 2010 ... GCHQ exploited unencrypted data from Twitter to identify specific users around the world and target them with propaganda.
Note: Read an article diving deeper and showing how online reputations are ruthlessly destroyed by powerful groups. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
Iceland let its banks fail in 2008 because they proved too big to save. Now, the island is finding crisis-management decisions made half a decade ago have put it on a trajectory that’s turned 2 percent unemployment into a realistic goal. While the euro area grapples with record joblessness, led by more than 25 percent in Greece and Spain, only about 4 percent of Iceland’s labor force is without work. Prime Minister Sigmundur D. Gunnlaugsson says even that’s too high. The island’s sudden economic meltdown in October 2008 made international headlines as a debt-fueled banking boom ended in a matter of weeks when funding markets froze. Policy makers overseeing the $14 billion economy refused to back the banks, which subsequently defaulted on $85 billion. The government’s decision to protect state finances left it with the means to continue social support programs that shielded Icelanders from penury during the worst financial crisis in six decades. Of creditor claims against the banks, Gunnlaugsson says “this is not public debt and never will be.” Successive Icelandic governments have forced banks to write off mortgage debts to help households. The government’s 2014 budget sets aside about 43 percent of its spending for the Welfare Ministry, a level that is largely unchanged since before the crisis. Inflation, which peaked at 19 percent in January 2009, ... was 4.2 percent in December. To support households, Gunnlaugsson in November unveiled a plan to provide as much as 7 percent of gross domestic product in mortgage debt relief. The government intends to finance the plan, which the OECD has criticized as being too blunt, partly by raising taxes on banks.
Note: Why is Iceland's major success in letting banks fail getting so little press coverage? For a possible answer, click here. For more on government responses to the banking crisis and their impacts on people, see the deeply revealing reports from reliable major media sources available here.
The U.S. National Security Agency is involved in industrial espionage and will grab any intelligence it can get its hands on regardless of its value to national security, former NSA contractor Edward Snowden told a German TV network. ARD TV quoted Snowden saying the NSA does not limit its espionage to issues of national security and he cited German engineering firm, Siemens as one target. "If there's information at Siemens that's beneficial to U.S. national interests - even if it doesn't have anything to do with national security - then they'll take that information nevertheless," Snowden said. Snowden's claim the NSA is engaged in industrial espionage follows a New York Times report earlier this month that the NSA put software in almost 100,000 computers around the world, allowing it to carry out surveillance on those devices and could provide a digital highway for cyberattacks. The NSA planted most of the software after gaining access to computer networks, but has also used a secret technology that allows it entry even to computers not connected to the Internet, the newspaper said, citing U.S. officials, computer experts and documents leaked by Snowden. Frequent targets of the programme, code-named Quantum, included units of the Chinese military and industrial targets.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
An independent federal privacy watchdog has concluded that the National Security Agency’s program to collect bulk phone call records has provided only “minimal” benefits in counterterrorism efforts, is illegal and should be shut down. The findings are laid out in a 238-page report [that represents] the first major public statement by the Privacy and Civil Liberties Oversight Board, which Congress made an independent agency in 2007 and only recently became fully operational. The Obama administration has portrayed the bulk collection program as useful and lawful. But in its report, the board lays out what may be the most detailed critique of the government’s once-secret legal theory behind the program: that a law known as Section 215 of the Patriot Act, which allows the F.B.I. to obtain business records deemed “relevant” to an investigation, can be legitimately interpreted as authorizing the N.S.A. to collect all calling records in the country. The program “lacks a viable legal foundation under Section 215, implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value,” the report said. “As a result, the board recommends that the government end the program.” The report also sheds light on the history of the once-secret bulk collection program. It contains the first official acknowledgment that the Foreign Intelligence Surveillance Court produced no judicial opinion detailing its legal rationale for the program until last August, even though it had been issuing orders to phone companies for the records and to the N.S.A. for how it could handle them since May 2006.
Note: The PCLOB report is titled "Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court," and is available here. For more on government attacks to privacy, see the deeply revealing reports from reliable major media sources available here.
In early 2003, two senior CIA officers arrived at the U.S. Embassy in Warsaw to pick up a pair of large cardboard boxes. Inside were bundles of cash totaling $15 million that had been flown from Germany via diplomatic pouch. The Americans and Poles then sealed an agreement that over the previous weeks had allowed the CIA the use of a secret prison — a remote villa in the Polish lake district — to interrogate al-Qaeda suspects. The Polish intelligence service received the money, and the CIA had a solid location for its newest covert operation, according to former agency officials who spoke on the condition of anonymity to discuss the interrogation program, including previously unreported details about the creation of the CIA’s “black sites,” or secret prisons. The CIA prison in Poland was arguably the most important of all the black sites created by the agency after the Sept. 11, 2001, attacks. It was the first of a trio in Europe that housed the initial wave of accused Sept. 11 conspirators, and it was where Khalid Sheik Mohammed, the self-declared mastermind of the attacks, was waterboarded 183 times after his capture. In December, the European Court of Human Rights heard arguments that Poland violated international law and participated in torture by accommodating its American ally. “In the face of Polish and United States efforts to draw a veil over these abuses, the European Court of Human Rights now has an opportunity to break this conspiracy of silence and uphold the rule of law,” said Amrit Singh, a lawyer with the Open Society Justice Initiative.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
More than a dozen family members of China's top political and military leaders are making use of offshore companies based in the British Virgin Islands, leaked financial documents reveal. The brother-in-law of China's current president, Xi Jinping, as well as the son and son-in-law of former premier Wen Jiabao are among the political relations making use of the offshore havens, financial records show. The documents also disclose the central role of major Western banks and accountancy firms ... in the offshore world, acting as middlemen in the establishing of companies. The Hong Kong office of Credit Suisse, for example, established the BVI company Trend Gold Consultants for Wen Yunsong, the son of Wen Jiabao, during his father's premiership — while PwC and UBS performed similar services for hundreds of other wealthy Chinese individuals. The disclosure of China's use of secretive financial structures is the latest revelation from "Offshore Secrets", a two-year reporting effort led by the International Consortium of Investigative Journalists (ICIJ), which obtained more than 200 gigabytes of leaked financial data from two companies in the British Virgin Islands, and shared the information with the Guardian and other international news outlets. In all, the ICIJ data reveals more than 21,000 clients from mainland China and Hong Kong have made use of offshore havens in the Caribbean. Between $1tn and $4tn in untraced assets have left China since 2000, according to estimates.
Note: Read the ICIJ's full report of the latest offshore links. For more on financial corruption, see the deeply revealing reports from reliable major media sources available here.
In my last year on Wall Street my bonus was $3.6 million — and I was angry because it wasn’t big enough. I was 30 years old, had no children to raise, no debts to pay, no philanthropic goal in mind. I wanted more money for exactly the same reason an alcoholic needs another drink: I was addicted. It was actually my absurdly wealthy bosses who helped me see the limitations of unlimited wealth. I was in a meeting with one of them, and a few other traders, and they were talking about the new hedge-fund regulations. Most everyone on Wall Street thought they were a bad idea. “But isn’t it better for the system as a whole?” I asked. The room went quiet, and my boss shot me a withering look. I remember his saying, “I don’t have the brain capacity to think about the system as a whole. All I’m concerned with is how this affects our company.” I felt as if I’d been punched in the gut. He was afraid of losing money, despite all that he had. From that moment on, I started to see Wall Street with new eyes. I noticed the vitriol that traders directed at the government for limiting bonuses after the crash. I heard the fury in their voices at the mention of higher taxes. These traders despised anything or anyone that threatened their bonuses. Wealth addiction was described by the late sociologist and playwright Philip Slater in a 1980 book, but addiction researchers have paid the concept little attention. Like alcoholics driving drunk, wealth addiction imperils everyone. Wealth addicts are, more than anybody, specifically responsible for the ever widening rift that is tearing apart our once great country.
Note: For more on financial corruption, see the deeply revealing reports from reliable major media sources available here.
In what may be the biggest such scandal in Air Force history, 34 officers entrusted with land-based nuclear missiles have been pulled off the job for alleged involvement in a cheating ring that officials say was uncovered during a drug probe. The 34 are suspected of cheating several months ago on a routine proficiency test that includes checking missile launch officers' knowledge of how to handle an "emergency war order," which is the term for the authorization required to launch a nuclear weapon. The cheating scandal is the latest in a series of Air Force nuclear stumbles ... including deliberate violations of safety rules, failures of inspections, breakdowns in training and evidence that the men and women who operate the missiles from underground command posts are suffering burnout. In October the general who commands the nuclear missile force was fired for engaging in embarrassing behavior, including drunkenness, while leading a U.S. delegation to a nuclear exercise in Russia. The AP disclosed in May an internal Air Force email in which a missile operations officer complained that his force was infested with "rot" bad attitudes and disregard for discipline. The Air Force's nuclear mission includes operation of 450 Minuteman 3 intercontinental ballistic missiles. The Malmstrom unit failed a nuclear safety and security inspection in August but succeeded on a redo in October.
Note: Some are speculating about a purge of high-level U.S. military officers. For evidence of this, click here. And is it just a coincidence that the Malmstrom unit is mentioned? That is the base where several officers testified that a UFO shut down all nuclear warheads several decades ago. For more, click here. And for more on military corruption, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. On average, each day the NSA was able to extract: • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images. • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
To have a genuinely constructive debate, data must be compiled, evidence must be amassed and verifiable truths must be presented. This truism is particularly significant when it comes to debates about security and liberty. Without facts, we get the counterproductive discourse we are being treated to right now - the one hijacked by National Security Administration defenders throwing temper tantrums, tossing out fear-mongering platitudes and trying to prevent any scrutiny of the agency. Tune into a national news program and you inevitably will hear pundits who have spent the last decade mindlessly cheering on wars and warrantless wiretapping now echoing the talking points emanating from surveillance-state apparatchiks like Reps. Mike Rogers, R-Mich., and Dutch Ruppersberger, D-Md. This week, these two lawmakers, who head the House Intelligence Committee, summarized all the bluster in a press release that should be enshrined for posterity. In an attempt to defend the NSA, the bipartisan duo breathlessly claimed that whistle-blower Edward Snowden ended up "endangering each and every American" by exposing the government's mass surveillance (i.e., metadata) programs. They indicted Snowden's patriotism and said his disclosures of the NSA's unlawful and unconstitutional programs "aligned him with our enemy." But the facts now leaking out of the government's national security apparatus are doing the opposite. They are debunking - rather than confirming - the NSA defenders' platitudes.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
Lawmakers pressed Social Security Administration officials ... over a massive fraud scandal involving New York City cops and firefighters who allegedly bilked the government out of millions by falsely claiming disability from working at Ground Zero after 9/11. Rep. Sam Johnson (R-Texas), chairman of the House's Ways and Means subcommittee that oversees the agency ... convened the hearing following the stunning arrests last week of more than 100 in New York from vaunted public safety agencies known in the city as the "Finest" and the "Bravest," who stand accused of filing phony disability claims. Many allegedly faked mental disabilities they claimed were as a result of the [attacks] that reduced the World Trade Center into a smoldering wasteland of rubble. Johnson demanded accountability from the acting chief of the Social Security Administration, Carolyn Colvin and agency Inspector General Patrick O'Carroll. Workers labored for months to retrieve remains of hundreds who perished in the twin towers on 9/11 and were sickened by toxic air that the feds had said was safe to breathe without respirator masks. The alleged New York scam was lucrative for the perpetrators and is estimated to have cost the Social security pension fund at least $22 million so far, with more arrests to come, according to testimony from Edward Ryan, New York SSA IG Special Agent in Charge. "When we executed search warrants we found large amounts of cash in safes……and gold bars" Ryan testified.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
New York City has agreed to pay $18 million to settle dozens of lawsuits filed by protesters, journalists and bystanders who said they were wrongly arrested at the 2004 Republican National Convention and held for hours in makeshift holding cells. The settlement, which must be approved by a federal judge, would end nearly a decade of legal wrangling over more than 1,800 arrests, mostly on charges of disorderly conduct or parading without a permit. Hundreds sued, saying they were illegally arrested by an overzealous police department. Nearly all the arrests were dismissed by the court or the defendants acquitted. Lawyers with the New York Civil Liberties Union had previously asked the judge hearing case to conclude that police didn't have probable cause to make mass arrests during the convention, at which President George W. Bush was nominated for another term. "This historic settlement sends a clear message," said NYCLU attorney Chris Dunn. "We will not allow the police to trample on the First Amendment rights of protesters." Sarah Coburn, 30, said her arrest at the convention inspired her to become an attorney to fight for the civil rights of others. She was 20 at the time, and was held for 30 hours before she was released. She's now a public defender. "It was awful to be subjected to those conditions," she said. "I want to make sure no one else has to be."
Note: For more on government assaults on civil liberties, see the deeply revealing reports from reliable major media sources available here.
A series of revelations about the rocket believed to have delivered poison sarin gas to a Damascus suburb last summer are challenging American intelligence assumptions about that attack and suggest that the case U.S. officials initially made for retaliatory military action was flawed. A team of security and arms experts, meeting this week in Washington to discuss the matter, has concluded that the range of the rocket that delivered sarin in the largest attack that night was too short for the device to have been fired from the Syrian government positions where the Obama administration insists they originated. The authors of a report released Wednesday said that their study of the rocket’s design, its likely payload and its possible trajectories show that it would have been impossible for the rocket to have been fired from inside areas controlled by the government of Syrian President Bashar Assad. In the report, titled “Possible Implications of Faulty U.S. Technical Intelligence,” Richard Lloyd, a former United Nations weapons inspector, and Theodore Postol, a professor of science, technology and national security policy at the Massachusetts Institute of Technology, argue that the question about the rocket’s range indicates a major weakness in the case for military action initially pressed by Obama administration officials. Postol said that a basic analysis of the weapon ... would have shown that it wasn’t capable of flying the 6 miles from the center of the Syrian government-controlled part of Damascus to the point of impact in the suburbs, or even the 3.6 miles from the edges of government-controlled ground.
Note: For more on government lies designed to start wars, see the deeply revealing reports from reliable major media sources available here.
After a tumultuous year at the war-on-terror detention center in Guantanamo Bay, Cuba, where the U.S. military's motto is "Safe, Humane, Legal, Transparent," operations are cloaked in secrecy. The prison approaches the start of its 13th year next week with a new reclusive regime that no longer discloses what was once routinely released information. The daily tally of hunger striking detainees — the protest that engulfed more than 100 prisoners at its peak this summer — stopped in December. Guards and other prison camp troops are under orders to withhold their names when talking to reporters. On the witness stand in the war court recently, a lawyer in the uniform of an Air Force officer gave sworn testimony under a curious, unexplained fake name — "Major Krueger." Guantanamo is remote, and what is happening there in this new era has mostly gone unnoticed. The government controls access to everything pertaining to Guantanamo. Journalists have to get the military's permission to go there, navigate censorship of their pictures, wait 40 seconds to hear what happens in court and then wait weeks to see court filings. The current crackdown on information can range from the mildly curious to the outright comedic. At times it seems to signify a gratuitous use of power by troops on rotation with sudden power to [wield] a censor's scissors. At times, it suggests a government bureaucracy whose default is knee-jerk secrecy.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
On a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludgeoned each other over 15 rounds in a televised title bout viewed by millions around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with nearly every document inside. They were never caught, and the stolen documents that they mailed anonymously to newspaper reporters ... would become a flood of revelations about extensive spying and dirty-tricks operations by the F.B.I. against dissident groups. Perhaps the most damning document from the cache [was] a 1970 memorandum that ... urged agents to step up their interviews of antiwar activists and members of dissident student groups. “It will enhance the paranoia endemic in these circles and will further serve to get the point across there is an F.B.I. agent behind every mailbox.” Another document, signed by Hoover himself, revealed widespread F.B.I. surveillance of black student groups on college campuses. But the document that would have the biggest impact on reining in the F.B.I.’s domestic spying activities [included] a mysterious word: Cointelpro ... shorthand for Counterintelligence Program. Since 1956, the F.B.I. had carried out an expansive campaign to spy on civil rights leaders, political organizers and suspected Communists, and had tried to sow distrust among protest groups. Among the grim litany of revelations was a blackmail letter F.B.I. agents had sent anonymously to the Rev. Dr. Martin Luther King Jr., threatening to expose his extramarital affairs if he did not commit suicide. The intent of Cointelpro was to destroy lives and ruin reputations.
Note: To learn about the brave citizen burglars who have now revealed themselves and watch the engaging video covering this story, click on the link given above. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Sigurdur "Siggi" Thordarson, [is a] cherubic, blond 21-year-old who has been called everything in the [Icelandic] press from "attention seeker" to "traitor" to "psychopath". Four years ago, just as WikiLeaks was winning international notoriety, the then-17-year-old hacking prodigy became Assange's youngest and most trusted sidekick. But as Assange became more embattled and besieged, the protégé turned on his mentor in the most shocking of ways: becoming the first FBI informant inside the group. His tale reveals not only the paranoia and strife within WikiLeaks, but just how far the feds were willing to go to get Assange. The revelation of Siggi's role as an FBI snitch has polarized WikiLeaks insiders. WikiLeaks spokesman Kristinn Hrafnsson [dismissed] Siggi as "a pathological liar." While other WikiLeaks insiders also question Siggi's credibility, they insist that his story can't be discounted, and there's more to it than the organization is letting on. The truth, it seems, may be held in the leaks. Siggi has provided Rolling Stone with more than a terabyte of secret files he claims to have taken from WikiLeaks before he left in November 2011 and gave to the FBI: thousands of pages of chat logs, videos, tapped phone calls, government documents and more than a few bombshells from the organization's most heated years. Whatever their origins, the SiggiLeaks are a deep and revealing portal into one of the most guarded and influential organizations of the 21st century – and the extreme measures its embattled leader is willing to take.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.