Please donate here to support this vital work.
Revealing News For a Better World

Government Corruption News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


Snowden: NSA conducts industrial espionage too
2014-01-26, CBS News/Reuters
http://www.cbsnews.com/news/snowden-nsa-conducts-industrial-espionage-too/

The U.S. National Security Agency is involved in industrial espionage and will grab any intelligence it can get its hands on regardless of its value to national security, former NSA contractor Edward Snowden told a German TV network. ARD TV quoted Snowden saying the NSA does not limit its espionage to issues of national security and he cited German engineering firm, Siemens as one target. "If there's information at Siemens that's beneficial to U.S. national interests - even if it doesn't have anything to do with national security - then they'll take that information nevertheless," Snowden said. Snowden's claim the NSA is engaged in industrial espionage follows a New York Times report earlier this month that the NSA put software in almost 100,000 computers around the world, allowing it to carry out surveillance on those devices and could provide a digital highway for cyberattacks. The NSA planted most of the software after gaining access to computer networks, but has also used a secret technology that allows it entry even to computers not connected to the Internet, the newspaper said, citing U.S. officials, computer experts and documents leaked by Snowden. Frequent targets of the programme, code-named Quantum, included units of the Chinese military and industrial targets.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Cheating Alleged in US Nuclear Missile Force
2014-01-16, ABC News/Associated Press
http://abcnews.go.com/Politics/wireStory/air-force-34-missile-officers-cheati...

In what may be the biggest such scandal in Air Force history, 34 officers entrusted with land-based nuclear missiles have been pulled off the job for alleged involvement in a cheating ring that officials say was uncovered during a drug probe. The 34 are suspected of cheating several months ago on a routine proficiency test that includes checking missile launch officers' knowledge of how to handle an "emergency war order," which is the term for the authorization required to launch a nuclear weapon. The cheating scandal is the latest in a series of Air Force nuclear stumbles ... including deliberate violations of safety rules, failures of inspections, breakdowns in training and evidence that the men and women who operate the missiles from underground command posts are suffering burnout. In October the general who commands the nuclear missile force was fired for engaging in embarrassing behavior, including drunkenness, while leading a U.S. delegation to a nuclear exercise in Russia. The AP disclosed in May an internal Air Force email in which a missile operations officer complained that his force was infested with "rot" bad attitudes and disregard for discipline. The Air Force's nuclear mission includes operation of 450 Minuteman 3 intercontinental ballistic missiles. The Malmstrom unit failed a nuclear safety and security inspection in August but succeeded on a redo in October.

Note: Some are speculating about a purge of high-level U.S. military officers. For evidence of this, click here. And is it just a coincidence that the Malmstrom unit is mentioned? That is the base where several officers testified that a UFO shut down all nuclear warheads several decades ago. For more, click here. And for more on military corruption, see the deeply revealing reports from reliable major media sources available here.


Stealth Surprises in NSA Report Take on Non-NSA Spying
2013-12-20, ABC News
http://abcnews.go.com/Blotter/stealth-surprises-nsa-report-nsa-spying/story?i...

The White House's expert NSA panel may have made headlines ... for telling President Barack Obama to knock off the collection of Americans' meta-data, but surveillance experts said they were surprised that the panel also took to task some controversial non-NSA-related spy tactics as well. One recommendation was to impose much stricter oversight on the FBI's ability to issue National Security Letters (NSLs), which have been used to obtain telephone call records and credit reports in terrorism and espionage cases. Another even more peculiar recommendation by the five national security experts ... was their advice that "governments" shouldn't hack into bank accounts and drain funds. "Governments should not use their offensive cyber capabilities to change the amounts held in financial accounts or otherwise manipulate the financial systems," the unanimous Review Group on Intelligence and Communications Technologies report warned Obama. "That was a strangely specific recommendation for something nobody was talking about," Kel McClanahan, executive director of government transparency group National Security Counselors, told ABC News. Michelle Richardson, the American Civil Liberties Union's legislative council in Washington, also said the findings on "NSLs" and government hacking were unexpected -- but welcomed.

Note: The fact that this expert panel would even mention governments manipulating financial accounts suggests that if it hasn't already happened, some were seriously considering this. For lots more on this strange news, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


GCHQ and NSA targeted charities, Germans, Israeli PM and EU chief
2013-12-20, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-ger...

British and American intelligence agencies had a comprehensive list of surveillance targets that included the EU's competition commissioner, German government buildings in Berlin and overseas, and the heads of institutions that provide humanitarian and financial help to Africa, top-secret documents reveal. The papers show GCHQ [and the NSA were] targeting organisations such as the United Nations development programme, the UN's children's charity Unicef and Médecins du Monde, a French organisation that provides doctors and medical volunteers to conflict zones. The head of the Economic Community of West African States (Ecowas) also appears in the documents, along with text messages he sent to colleagues. One GCHQ document, drafted in January 2009, makes clear that the agencies were targeting an email address listed as belonging to another important American ally – the "Israeli prime minister". Ehud Olmert was in office at the time. Three further Israeli targets appeared on GCHQ documents, including another email address understood to have been used to send messages between the then Israeli defence minister, Ehud Barak, and his chief of staff, Yoni Koren. The names and details are the latest revelations to come from documents leaked by the whistleblower Edward Snowden. They provoked a furious reaction. The disclosures reflect the breadth of targets sought by the agencies, which goes far beyond the desire to intercept the communications of potential terrorists and criminals, or diplomats and officials from hostile countries.

Note: Later reports revealed that GHCQ also targeted the global human rights organization Amnesty International. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Uruguay's president Jos Mujica: no palace, no motorcade, no frills
2013-12-13, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/dec/13/uruguay-president-jose-mujica

If anyone could claim to be leading by example in an age of austerity, it is Jos Mujica, Uruguay's president, who has forsworn a state palace in favour of a farmhouse, donates the vast bulk of his salary to social projects, flies economy class and drives an old Volkswagen Beetle. But the former guerrilla fighter is clearly disgruntled by those who tag him "the world's poorest president" and much as he would like others to adopt a more sober lifestyle the 78-year-old has been in politics long enough to recognise the folly of claiming to be a model for anyone. "If I asked people to live as I live, they would kill me," Mujica said during an interview in his small but cosy one-bedroom home set amid chrysanthemum fields outside Montevideo. The president is a former member of the Tupamaros guerrilla group, which was notorious in the early 1970s for bank robberies, kidnappings and distributing stolen food and money among the poor. He was shot by police six times and spent 14 years in a military prison, much of it in dungeon-like conditions. Since becoming leader of Uruguay in 2010, however, he has won plaudits worldwide for living within his means, decrying excessive consumption and pushing ahead with policies on same-sex marriage, abortion and cannabis legalisation that have reaffirmed Uruguay as the most socially liberal country in Latin America. But the man who is best known as Pepe says those who consider him poor fail to understand the meaning of wealth. "I'm not the poorest president. The poorest is the one who needs a lot to live," he said. "My lifestyle is a consequence of my wounds. I'm the son of my history."

Note: For a treasure trove of great news articles which will inspire you to make a difference, click here.


Corporate Espionage Undermines Democracy
2013-11-26, MSN/Reuters
http://money.msn.com/business-news/article.aspx?feed=OBR&Date=20131127&ID=171...

It’s not just the NSA that has been caught spying on Americans. Some of our nation’s largest corporations have been conducting espionage as well, against civic groups. That’s the lesson of a new report on corporate espionage against nonprofit organizations by ... Essential Information. The title of the report is Spooky Business, and it is apt. Spooky Business is like a Canterbury Tales of corporate snoopery: Hiring investigators to pose as volunteers and journalists. Hacking. Wiretapping. Information warfare. Physical intrusion. Investigating the private lives of nonprofit leaders. Dumpster diving using an active duty police officer to gain access to trash receptacles. Electronic surveillance. Many different types of nonprofit civic organizations have been targeted by corporate spies: environmental, public interest, consumer, food safety, animal rights, pesticide reform, nursing home reform, gun control and social justice. A diverse constellation of corporations has planned or executed corporate espionage against these nonprofit civic organizations. Food companies like Kraft, Coca-Cola, Burger King, McDonald’s and Monsanto. Oil companies like Shell, BP and Chevron. Chemical companies like Dow and Sasol. Also involved are the retailers (Wal-Mart), banks (Bank of America), and, of course, the nation’s most powerful trade association: the U.S. Chamber of Commerce. Plenty of mercenary spooks have joined up to abet them, including former officials at the FBI, CIA, NSA, Secret Service and U.S. military. Sometimes even government contractors are part of the snooping.

Note: For more on corporate corruption, see the deeply revealing reports from reliable major media sources available here.


Behind the Pentagon’s doctored ledgers, a running tally of epic waste
2013-11-18, CNBC/Reuters
http://www.cnbc.com/id/101206230

Linda Woodford spent the last 15 years of her career inserting phony numbers in the U.S. Department of Defense's accounts. Woodford and her fellow [accountants] set about preparing monthly reports to square the Navy's books with the U.S. Treasury's. And every month ... numbers were missing. Numbers were clearly wrong. Woodford and her colleagues were told by superiors to ... enter false numbers, commonly called "plugs," to make the Navy's totals match the Treasury's. Fudging the accounts with false entries is standard operating procedure. Former military service officials say record-keeping at the operational level throughout the services is rife with made-up numbers to cover lost or missing information. Plugs also are symptomatic of one very large problem: the Pentagon's chronic failure to keep track of its money—how much it has, how much it pays out and how much is wasted or stolen. The Defense Department's 2012 budget totaled $565.8 billion, more than the annual defense budgets of the 10 next largest military spenders combined, including Russia and China. How much of that money is spent as intended is impossible to determine. The Pentagon is largely incapable of keeping track of its vast stores of weapons, ammunition and other supplies. It has amassed a backlog of more than half a trillion dollars in unaudited contracts with outside vendors. [It] also has systematically ignored warnings about its accounting practices. The Pentagon is the only federal agency that has not complied with a law that requires annual audits of all government departments. That means that the $8.5 trillion in taxpayer money doled out by Congress to the Pentagon since 1996 ... has never been accounted for. That sum exceeds the value of China's economic output last year. A single [military accounting] office in Columbus, Ohio, made at least $1.59 trillion - yes, trillion - in errors, including $538 billion in plugs.

Note: This article sadly fails to state the obvious: Many military officers illegally rake in tons of money with false contracts which benefit those officers and contracting companies. They obviously don't want their accounts to be properly audited. For a revealing essay by a top U.S. general exposing major war manipulations, click here. For more on military corruption, see the deeply revealing reports from reliable major media sources available here.


Overt and Covert: ‘The Brothers,’ by Stephen Kinzer
2013-11-08, New York Times
http://www.nytimes.com/2013/11/10/books/review/the-brothers-by-stephen-kinzer...

The Brothers” is a riveting chronicle of government-sanctioned murder, casual elimination of “inconvenient” regimes, relentless prioritization of American corporate interests and cynical arrogance on the part of two men. John Foster Dulles and his brother, Allen, were ... lawyers, partners in the immensely powerful firm of Sullivan & Cromwell. John Foster Dulles served as secretary of state from 1953 to 1959; his brother ran the C.I.A. from 1953 to 1961. In his detailed, well­constructed and highly readable book, Stephen Kinzer ... shows how the brothers drove America’s interventionist foreign policy. Kinzer highlights John Foster Dulles’s central role in channeling funds from the United States to Nazi Germany in the 1930s. Sullivan & Cromwell floated bonds for Krupp A. G., the arms manufacturer, and also worked for I. G. Farben, the chemicals conglomerate that later manufactured Zyklon B, the gas used to murder millions of Jews. For the Dulles brothers, and for much of the American government, threats to corporate interests were categorized as support for communism. There are also reminders in Kinzer’s book of dark events in the history of American intelligence. Sixty years ago, Frank Olson, a C.I.A. officer, was reported to have jumped to his death during mind-control experiments “in which psychoactive drugs were administered to unknowing victims.” But last year, Kinzer reports, Olson’s family filed suit, claiming he had actually been murdered after visiting secret C.I.A. prisons in Europe.

Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


No Morsel Too Minuscule for All-Consuming N.S.A.
2013-11-03, New York Times
http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consu...

When Ban Ki-moon, the United Nations secretary general, sat down with President Obama at the White House in April to discuss Syrian chemical weapons, Israeli-Palestinian peace talks and climate change, it was a cordial, routine exchange. The National Security Agency nonetheless went to work in advance and intercepted Mr. Ban’s talking points for the meeting, a feat the agency later reported as an “operational highlight” in a weekly internal brag sheet. It was emblematic of an agency that for decades has operated on the principle that any eavesdropping that can be done on a foreign target of any conceivable interest — now or in the future — should be done. After all, American intelligence officials reasoned, who’s going to find out? From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as foes, as has become obvious in recent weeks; the agency’s official mission list includes using its surveillance powers to achieve “diplomatic advantage” over such allies as France and Germany and “economic advantage” over Japan and Brazil, among other countries. The scale of eavesdropping by the N.S.A., with 35,000 workers and $10.8 billion a year, sets it apart.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


NSA monitored calls of 35 world leaders after US official handed over contacts
2013-10-24, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-c...

The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden. The confidential memo reveals that the NSA encourages senior officials in its "customer" departments, such as the White House, State and the Pentagon, to share their "Rolodexes" so the agency can add the phone numbers of leading foreign politicians to their surveillance systems. The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately "tasked" for monitoring by the NSA. The revelation is set to add to mounting diplomatic tensions between the US and its allies, after the German chancellor Angela Merkel ... accused the US of tapping her mobile phone. The NSA memo obtained by the Guardian suggests that such surveillance was not isolated, as the agency routinely monitors the phone numbers of world leaders – and even asks for the assistance of other US officials to do so. The memo, dated October 2006 and which was issued to staff in the agency's Signals Intelligence Directorate (SID), was titled "Customers Can Help SID Obtain Targetable Phone Numbers". In the wake of the Merkel row, the US is facing growing international criticism that any intelligence benefit from spying on friendly governments is far outweighed by the potential diplomatic damage.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


'Everyone knew' about Jimmy Savile, former officer says
2013-10-17, BBC
http://www.bbc.com/news/uk-24564933

A former police officer has spoken about some of his colleagues' attitude to Jimmy Savile in the 1960s - saying that everyone in the force knew "Jimmy liked them young". The ex-officer ... was with Leeds City Police in the 1960s. He used to patrol areas of the city where Savile was well known. Late one night, just before midnight, he noticed Jimmy Savile's Rolls Royce parked in a secluded spot on the edge of Roundhay Park. "As I went past I saw the interior lights were on," he said. "He was sat in the driver's seat and was talking to a young lady in the passenger seat. She looked ... perhaps 15 or 16. "I said, 'What's the matter, Jimmy - what are you doing up here?' "He said, 'Yeah, we're fine, aren't we?' And she smiled. Then he said, 'We're waiting for 12 o'clock, son.' "Why?" I asked. 'Because it's her birthday tomorrow, she's 16.' And he winked at me. "I asked the girl, 'Are you ok?' "She smiled - there was no impression she was being forced to be there. "Jimmy then said, 'Now get back on your bike before you lose your job.'" The former officer said today that the attitudes of the time were "different" and accepts that such actions today would be unthinkable. "Leeds City Police ... turned a blind eye to 15-year-olds but never considered that as paedophilia. The officer ... believes that attitude of the police towards Savile lasted for years afterwards, [and] that police may have informally talked to Savile about the age of his girlfriends in the 1960s. Jimmy Savile, a former TV presenter and radio DJ ... is believed to have abused hundreds.

Note: Watch an excellent segment by Australia's "60-Minutes" team titled "Spies, Lords and Predators" on a pedophile ring in the UK which leads directly to the highest levels of government. A second suppressed documentary, "Conspiracy of Silence," goes even deeper into this sad subject. For more along these lines, see concise summaries of deeply revealing sexual abuse scandal news articles from reliable major media sources.


Rigging currency markets
2013-10-12, The Economist
http://www.economist.com/news/finance-and-economics/21587824-are-foreign-exch...

[Banks] have rigged LIBOR, an interest rate used to peg contracts worth trillions. Its equivalent in the world of derivatives, ISDAfix, has also come under question. Commodities prices from crude oil to platinum have been the subject of allegations and inquiries. Now prices in global currency markets, where turnover is $5 trillion a day, are being scrutinised by authorities, who suspect bankers have tampered with those too. Switzerland’s financial watchdog announced on October 4th that it was investigating a slew of banks it thinks have manipulated currencies. Britain and the European Union also have probes under way. Concerns reportedly centre around abnormal movements ahead of a widely-used daily snapshot of exchange rates, known as the 4pm “London fix”. It represents the average of prices agreed during 60 seconds’ trading, and is used as a reference rate to execute a much larger set of currency deals. Bankers, who are big participants in the market, have huge incentives to nudge the price of a given currency pairing ahead of the fix. With billions of dollars changing hands, a difference of a fraction of a cent can add a tidy sum to the bonus pool. If proven, the charge would amount to banks fleecing their clients. Banks know the big trades they are about to execute on others’ behalf, and are often themselves the counterparty. By moving the markets ahead of the fix, they could alter the rate to their profit and their clients’ loss. One suspected method is “banging the close”: submitting a quick succession of orders just as the benchmark is set, to distort its value.

Note: For more on financial corruption, see the deeply revealing reports from reliable major media sources available here.


The Snowden files: why the British public should be worried about GCHQ
2013-10-03, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/oct/03/edward-snowden-files-john-lanche...

The problem and the risk [with surveillance by GCHQ] comes in the area of mass capture of data, or strategic surveillance. This is the kind of intelligence gathering that sucks in data from everyone, everywhere: from phones, internet use from email to website visits, social networking, instant messaging and video calls, and even areas such as video gaming; in short, everything digital. In the US, the Prism programme may have given the NSA access to the servers of companies such as Google and Facebook; in the UK, GCHQ has gained a similar degree of access via its Tempora programme, and the two of them together have a cable- and network-tapping capabilities collectively called Upstream, which have the ability to intercept anything that travels over the internet. This data is fed into a database called XKeyscore, which allows analysts to extract information "in real time", ie immediately. What this adds up to is a new thing in human history: with a couple of clicks of a mouse, an agent of the state can target your home phone, or your mobile, or your email, or your passport number, or any of your credit card numbers, or your address, or any of your log-ins to a web service. Using that "selector", the state can get access to all the content of your communications, via any of those channels; can gather information about anyone you communicate with, can get a full picture of all your internet use, can track your location online and offline. It can, in essence, know everything about you, including – thanks to the ability to look at your internet searches – what's on your mind.

Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


As F.B.I. Pursued Snowden, an E-Mail Service Stood Firm
2013-10-03, New York Times
http://www.nytimes.com/2013/10/03/us/snowdens-e-mail-provider-discusses-press...

The owner of the e-mail service [Lavabit, Ladar Levison,] said he closed it down after the government, in pursuit of Edward J. Snowden, sought untrammeled access to the protected messages of all his customers. Mr. Levison was willing to allow investigators with a court order to tap Mr. Snowden’s e-mail account; he had complied with similar narrowly targeted requests involving other customers about two dozen times. But they wanted more, he said: the passwords, encryption keys and computer code that would essentially allow the government untrammeled access to the protected messages of all his customers. That, he said, was too much. On Aug. 8, Mr. Levison closed Lavabit rather than, in his view, betray his promise of secure e-mail to his customers. On [October 2], a federal judge unsealed documents in the case, allowing the tech entrepreneur to speak candidly for the first time about his experiences. He had been summoned to testify to a grand jury in Virginia; forbidden to discuss his case; held in contempt of court and fined $10,000 for handing over his private encryption keys on paper and not in digital form; and, finally, threatened with arrest for saying too much when he shuttered his business. While Mr. Levison’s struggles have been with the F.B.I., hovering in the background is the N.S.A., which has worked secretly for years to undermine or bypass encrypted services like Lavabit so that their electronic message scrambling cannot obstruct the agency’s spying. Mr. Levison’s case shows how law enforcement officials can use legal tools to pry open messages, no matter how well protected.

Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


NSA spied on Martin Luther King, documents reveal
2013-09-25, USA Today
http://www.bbc.co.uk/news/world-us-canada-24279394

The US National Security Agency spied on civil rights leader Martin Luther King and boxer Muhammad Ali during the height of the Vietnam War protests, declassified documents reveal. The documents show the NSA also tracked journalists from the New York Times and the Washington Post and two senators. Some NSA officials later described the programme as "disreputable if not outright illegal", the documents show. The operation, dubbed "Minaret", was originally exposed in the 1970s. However, the names of those on the phone-tapping "watch list" had been kept secret until now. The secret papers were published after a government panel ruled in favour of researchers at George Washington University. The university's National Security Archive - a research institute that seeks to check government secrecy - described the names on the NSA's watch-list as "eye-popping". The agency eavesdropped on civil rights leaders Martin Luther King and Whitney Young as well as boxing champion Muhammad Ali, New York Times journalist Tom Wicker and Washington Post columnist Art Buchwald. The NSA also monitored the overseas phone calls of two prominent US senators - Democrat Frank Church and Republican Howard Baker. In 1967 the strength of the anti-war campaign led President Lyndon Johnson to ask US intelligence agencies to find out if some protests were being stoked by foreign governments. Many of those targeted were considered to be critics of US involvement in the Vietnam War. The NSA worked with other spy agencies to draw up the "watch lists" of anti-war critics, tapping their phone calls. The programme continued after Richard Nixon entered the White House in 1969.

Note: These names were kept secret until now allegedly for reason of "national security." Note how this term is repeatedly used to cover up illegal government activity solely to protect those who commit these crimes. For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


NSA stories around the world
2013-09-23, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/sep/23/various-items-nsa-india-...

One of the most overlooked aspects of the NSA reporting in the US has been just how global of a story this has become. Last week it was revealed that Belgium's largest telecom, Belgacom, was the victim of a massive hacking attack which systematically compromised its system for as long as two years. Last week, using documents obtained from NSA whistleblower Edward Snowden, Laura Poitras and other Der Spiegel journalists reported in that paper that it was the GCHQ, Britain's intelligence agency, that was behind the attack. According to that report, the attack was carried out by targeting individual engineers at the telecom with malware that allowed GCHQ agents to "own" their computer and thus exploit their access to the telecommunications system. As the US and UK run around the world protesting the hacking activities of others and warning of the dangers of cyber-attacks, that duo is one of the most aggressive and malicious, if not the most aggressive and malicious, perpetrators of those attacks of anyone on the planet. Nobody hacks as prolifically and aggressively as the two countries who most vocally warn of the dangers of hacking. A coalition called Stop Watching Us has been formed by privacy and civil liberties groups from across the political spectrum. On October 26, the 12th anniversary of the enactment of the Patriot Act, they will hold an anti-surveillance rally in Washington DC.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


The biggest threat to America? The size of its own military budget
2013-08-09, The Guardian (One of the UK's Leading Newspapers)
http://www.theguardian.com/commentisfree/2013/aug/09/biggest-threat-america-s...

Don't be fooled by terror alerts and dire warnings: the world in general is a safer place than ever. Don't believe me? Check out what Michael Morell, the No. 2 man at the CIA, had to say about the threats facing America in this recent interview with the Wall Street Journal. If anyone knows about foreign threats, it's gotta be this guy, right? He gets to see everything [at the CIA]. The fact is, none of what Morell describes as a threat actually is a significant threat. And while national security elites – from the secretary of defense to prominent think tank denizens like to describe the world today as a "dangerous" place, it simply isn't true. There were six wars last year (just six!). This follows a consistent trend of declining violence that dates back decades. When wars do occur, they pretty much never occur between states. Since the Gulf war of 1991, territorial conquest has gone the way of the dodo. Indeed, when the US fights a major war these days, it is generally because they've started it – with consistently disastrous results. What is most striking about Morell's warnings is, in fact, the stunning hollowness of the threats he describes. If Syria, North Korea and Iran are truly what threaten us, then truly, we have little to fear from the world outside our borders. That this grab-bag of minor threats is used to justify a defense budget in the range of $600bn, an active and reserve force of 1 million troops and a far-flung empire of military bases and partners – not to mention, a rather effective navy and air force, and thousands of nuclear weapons – is astounding. If this is best the CIA can do, they really need to pick up their game. So, rest easy, America. It's not so bad out there.

Note: Read the powerful words of a top US general showing that war is a racket resulting from greed and propaganda put out by banks and major corporations at this link. To watch the BBC's powerful documentary "Power of Nightmares", showing that "Al Qaeda" was likely fabricated and is in fact little more than a US/UK psychological operation to enable the Global War on Terror, click here.


Americans pay GCHQ Ł100m to spy for them, leaked papers claim
2013-08-01, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/news/uknews/defence/10217280/Americans-pay-GCHQ-10...

GCHQ has received at least Ł100 million from the US to help fund intelligence gathering, raising questions over American influence on the British agencies. The money was paid across a range of projects over three years and resulted in GCHQ spying on behalf of America, according to leaked documents. It also emerged that the intelligence agency wants the ability to “exploit any phone, anywhere, any time” and that some staff have raised concerns over the “morality and ethics” of their operational work. The payments from the US National Security Agency (NSA) are detailed in GCHQ’s annual “investment portfolios”, leaked by Mr Snowden to The Guardian. The NSA paid GCHQ Ł22.9 million in 2009, Ł39.9 million in 2010 and Ł34.7 million in 2011/12. The 2010 funding included ... Ł17.2 million for the agency’s “Mastering the Internet” project, which gathers “raw” information from the web to be analysed. In return, GCHQ has to have the American view in mind when prioritising work, the papers claim. One strategy briefing disclosed the pressure on GCHQ to meet NSA demands, saying: “GCHQ must pull its weight and be seen to pull its weight.” In another document, from 2010, GCHQ apparently acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


XKeyscore: NSA tool collects 'nearly everything a user does on the internet'
2013-07-31, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


What the Government Pays to Snoop on You
2013-07-10, CNBC/Associated Press
http://www.cnbc.com/id/100876701

In the era of intense government surveillance and secret court orders, a murky multimillion-dollar market has emerged. Paid for by U.S. tax dollars, but with little public scrutiny, surveillance fees charged in secret by technology and phone companies can vary wildly. AT&T, for example, imposes a $325 "activation fee" for each wiretap and $10 a day to maintain it. Smaller carriers Cricket and U.S. Cellular charge only about $250 per wiretap. But snoop on a Verizon customer? That costs the government $775 for the first month and $500 each month after that. Regardless of price, the surveillance business is growing. The U.S. government long has enjoyed access to phone networks and high-speed Internet traffic under the U.S. Communications Assistance for Law Enforcement Act to catch suspected criminals and terrorists. More recently, the FBI has pushed technology companies like Google and Skype to guarantee access to real-time communications on their services. As the number of law enforcement requests for data grew and carriers upgraded their technology, the cost of accommodating government surveillance requests increased. AT&T, for example, said it devotes roughly 100 employees to review each request and hand over data. Likewise, Verizon said its team of 70 employees works around the clock, seven days a week to handle the quarter-million requests it gets each year.

Note: For more on government and corporate attacks on privacy, see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"