Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption Media Articles
Excerpts of Key Intelligence Agency Corruption Media Articles in Major Media


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


IG: Agency didn’t report polygraph admissions of child molestations
2014-04-22, Washington Post blog
http://www.washingtonpost.com/blogs/federal-eye/wp/2014/04/22/ig-agency-didnt...

The federal government’s spy-satellite agency failed to alert authorities after some of its employees and contractors admitted during polygraph tests to crimes including child molestation and lying on security-clearance questionnaires, according to a watchdog. The intelligence community’s inspector general released two reports ... saying the National Reconnaissance Office did not refer some of the cases because of confusion about reporting expectations and requirements. According to one of the reports, an Air Force lieutenant colonel admitted during a 2010 lie-detector test to touching a child in a sexual way and downloading child pornography on his work computer. The NRO only reported that case to the Air Force division that oversees security clearances instead of the Justice Department or the Air Force’s special-investigations office, the inspector general said. The NRO is not legally required to report certain state crimes such as child molestation. Thirty individuals who took NRO lie-detector tests from 2009 through 2012 admitted to child abuse or using child pornography, according to the report. The NRO failed to report three of those cases. Sen. Chuck Grassley (R-Iowa), who requested the review after a McClatchy news investigation raised concerns about the matter in 2012, said the NRO showed a “complete lack of common sense in failing to require reporting of serious state crimes of this sort.”

Note: The NRO is the agency that was running a drill on the morning of 9/11 of an airplane crashing into one of its Washington, DC buildings, as reported in this USA Today article. It has also allegedly been involved in the UFO cover-up, as reported in this testimony.


Intelligence Chief Issues Limits on Press Contacts
2014-04-22, New York Times
http://www.nytimes.com/2014/04/22/us/politics/intelligence-chief-issues-limit...

The Obama administration has barred officials at 17 agencies from speaking to journalists about unclassified intelligence-related topics without permission, according to a newly disclosed directive. The directive, issued by James R. Clapper Jr., the director of national intelligence, also requires the agencies’ employees to report any unplanned contact with journalists. Officials who violate the directive may be disciplined or fired, the directive says. The directive prohibits unauthorized “contact with the media about intelligence-related information, including intelligence sources, methods, activities and judgments,” without regard to whether it is classified. It says that employees who violate the policy “may be subject to administrative actions that may include revocation of security clearances or termination of employment.” At a minimum, the directive adds, any violation of the policy “will be handled in the same manner as a security violation.” Mr. Clapper signed the directive on March 20, and it was quietly posted on the office’s website last week. The directive limiting contact with reporters was reported Monday by Steve Aftergood, a government secrecy specialist for the Federation of American Scientists. In a blog post, Mr. Aftergood portrayed the directive as seeking to ensure that “the only news about intelligence is to be authorized news.” He criticized the policy as going too far, arguing that routine interactions between agency employees and reporters about unclassified matters did not pose a threat to national security, but that limiting them would hurt the public.

Note: Yet another major effort to muzzle whistleblowers. For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.


Covert Inquiry by F.B.I. Rattles 9/11 Tribunals
2014-04-19, New York Times
http://www.nytimes.com/2014/04/19/us/politics/covert-inquiry-by-fbi-rattles-9...

Two weeks ago, a pair of F.B.I. agents appeared unannounced at the door of a member of the defense team for one of the men accused of plotting the 9/11 terrorist attacks. As a contractor working with the defense team at Guantánamo Bay, Cuba, the man was bound by the same confidentiality rules as a lawyer. But the agents wanted to talk. They asked questions, lawyers say, about the legal teams for Ramzi bin al-Shibh, Khalid Shaikh Mohammed and other accused terrorists who will eventually stand trial before a military tribunal at Guantánamo. Before they left, the agents asked the contractor to sign an agreement promising not to tell anyone about the conversation. With that signature, Mr. bin al-Shibh’s lawyers say, the government turned a member of their team into an F.B.I. informant. The F.B.I.’s inquiry became the focus of the pretrial hearings at Guantánamo this week, after the contractor disclosed it to the defense team. It was a reminder that, no matter how much the proceedings at the island military prison resemble a familiar American trial, the invisible hand of the United States government is at work there in ways unlike anything seen in typical courtrooms. “It’s a courtroom with three benches,” said Eugene R. Fidell, who teaches military justice at Yale Law School. “There’s one person pretending to be the judge, and two other agencies behind the scenes exerting at least as much influence.” Thirteen years after 9/11, nobody has been convicted in connection with the attacks.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Biometric Surveillance Means Someone Is Always Watching
2014-04-17, Newsweek
https://www.newsweek.com/2014/04/25/biometric-surveillance-means-someone-alwa...

From 2008 to 2010, as Edward Snowden has revealed, the National Security Agency (NSA) collaborated with the British Government Communications Headquarters to intercept the webcam footage of over 1.8 million Yahoo users. The agencies were analyzing images they downloaded from webcams and scanning them for known terrorists who might be using the service to communicate, matching faces from the footage to suspects with the help of a new technology called face recognition. In attempting to find faces, the Pentagon's Optic Nerve program recorded webcam sex by its unknowing targets–up to 11 percent of the material the program collected was "undesirable nudity" that employees were warned not to access. And that's just the beginning of what face recognition technology might mean for us in the digital era. The U.S. government is in the process of building the world's largest cache of face recognition data, with the goal of identifying every person in the country. The creation of such a database would mean that anyone could be tracked wherever his or her face appears, whether it's on a city street or in a mall. Today's laws don't protect Americans from having their webcams scanned for facial data. "If cameras connected to databases can do face recognition, it will become impossible to be anonymous in society," [attorney Jennifer] Lynch says. That means every person in the U.S. would be passively tracked at all times.

Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.


9/11 conspiracy theorist and investigative journalist 'commits suicide'
2014-04-15, Daily Mail (One of the UK's largest-circulation newspapers)
http://www.dailymail.co.uk/news/article-2605429/9-11-conspiracy-theorist-inve...

9/11 [activist] and investigative journalist Michael Ruppert has reportedly committed suicide. The 63-year-old former narcotics investigator with the LAPD shot himself after his radio show, according to an announcement by author Carolyn Baker who was a guest on his final broadcast on [April 13]. Mr Ruppert was famous for his litany of conspiracy theories which encompassed the CIA to drugs, international politics, the oil industry, Wall Street and 9/11. On her Facebook page, Ms Baker wrote: 'This was not a ''fake'' suicide. It was very well planned by Mike who gave us few clues but elaborate instructions for how to proceed without him.' After leaving the LAPD, Mr Ruppert started a website From The Wilderness which claimed to expose government corruption. It included his claims that he had seen drug-dealing at the CIA. Mr Ruppert gained notoriety by confronting then-CIA Director John Deutch during a meeting in 1995 and telling him that he had seen CIA officers involved in drug-dealing. He later claimed on his website that the CIA and American government was involved in 9/11. In 2004, he published Crossing the Rubicon: The Decline of the American Empire at the End of the Age of Oil. The book alleged that former VP Dick Cheney had conspired with Wall Street and other government officials over the September 11 World Trade Center attacks. In 2009, he starred in a documentary called Collapse where he spoke about his theories involving the demise of mankind following the economic and energy crises.

Note: Mike Ruppert was a great hero who courageously reported reliable information the mainstream media would not touch. For a five-minute video of his public testimony on CIA drug running, click here. For a 10-minute video showing his great despair about the condition of the world, click here. Thank you, Mike, for opening the eyes of so many to the deeper realities in our world. Another courageous hero of the 9/11 movement, John Judge, also died, from complications of a stroke, on April 15. For more on his great work, click here. For a great 8-minute video of his revealing powerful information you may not know, click here.


Stories about NSA surveillance, Snowden leaks win Pulitzers for two news groups
2014-04-14, CNN
http://www.cnn.com/2014/04/14/us/pulitzer-prizes-journalism

Two news organizations' stories about National Security Agency surveillance, based upon documents leaked by Edward Snowden, have been awarded the Pulitzer Prize for public service, often described as the highest prize in American journalism. The Washington Post and ... The Guardian each received the prize on [April 14]. The recognition of the NSA reporting was most significant because of the questions raised by Snowden's leaks and the reaction to them. Snowden, who has been living in Russia while seeking asylum from U.S. prosecution, said in a statement that the Pulitzer board's recognition of the coverage was "vindication for everyone who believes that the public has a role in government." "We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance." While Snowden provided a trove of documents, reporters including Glenn Greenwald, working for the Guardian; Barton Gellman, working for The Post; and Laura Poitras, who worked with both, pored over the raw information, decided with their editors what parts were ethical to publish, and turned the information into stories that stunned readers around the world.

Note: For more on the historic Snowden revelations, see the deeply revealing reports from reliable major media sources available here.


Inside the FBI’s secret relationship with the military’s special operations
2014-04-10, Washington Post
http://www.washingtonpost.com/world/national-security/inside-the-fbis-secret-...

The FBI’s transformation from a crime-fighting agency to a counterterrorism organization in the wake of the Sept. 11, 2001, attacks has been well documented. Less widely known has been the bureau’s role in secret operations against al-Qaeda and its affiliates in Iraq and Afghanistan, among other locations around the world. With the war in Afghanistan ending, FBI officials have become more willing to discuss a little-known alliance between the bureau and the Joint Special Operations Command (JSOC) that allowed agents to participate in hundreds of raids in Iraq and Afghanistan. The relationship benefited both sides. JSOC used the FBI’s expertise in exploiting digital media and other materials to locate insurgents and detect plots, including any against the United States. The bureau’s agents, in turn, could preserve evidence and maintain a chain of custody should any suspect be transferred to the United States for trial. In early 2003, two senior FBI counterterrorism officials traveled to Afghanistan to meet with the Joint Special Operations Command’s deputy commander at Bagram air base. The pace of activity in Afghanistan was slow at first. An FBI official said there was less than a handful of [Hostage and Rescue Team] deployments to Afghanistan in those early months; the units primarily worked with the SEALs as they hunted top al-Qaeda targets. The tempo quickened with the U.S.-led invasion of Iraq in 2003. At first, the HRT’s mission was mainly to protect other FBI agents when they left the Green Zone, former FBI officials said. In 2005, all of the HRT members in Iraq began to work under JSOC.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket
2014-04-04, The Intercept
https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media...

This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. This sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda. Those programs, carried out in secrecy and with little accountability ... threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


White House Defends 'Cuban Twitter' to Stir Unrest
2014-04-04, ABC News/Associated Press
http://abcnews.go.com/Politics/wireStory/white-house-defends-cuban-twitter-st...

The Obama administration on [April 3] defended its creation of a Twitter-like Cuban communications network [called ZunZuneo] to undermine the Communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval. But two senior Democrats on congressional intelligence and judiciary committees said they had known nothing about the effort. An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform. First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent. Yet its users were neither aware it was created by [USAID, the U.S. Agency for International Development] with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes. Josefina Vidal, director of U.S. affairs at Cuba's Foreign Ministry, said ... that the ZunZuneo program "shows once again that the United States government has not renounced its plans of subversion against Cuba, which have as their aim the creation of situations of destabilization in our country to create changes in the public order and toward which it continues to devote multimillion-dollar budgets each year."

Note: If any other country did this to the U.S., how do you think the U.S. government would respond?


NSA performed warrantless searches on Americans' calls and emails – Clapper
2014-04-01, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/apr/01/nsa-surveillance-loophole-americ...

US intelligence chiefs have confirmed that the National Security Agency has [performed] warrantless searches on Americans’ communications. The NSA's collection programs are ostensibly targeted at foreigners, but in August the Guardian revealed a secret rule change allowing NSA analysts to search for Americans' details within the databases. Now, in a letter to Senator Ron Wyden, an Oregon Democrat on the intelligence committee, the director of national intelligence, James Clapper, has confirmed the use of this legal authority to search for data related to “US persons”. The legal authority to perform the searches, revealed in top-secret NSA documents provided ... by Edward Snowden, was denounced by Wyden as a “backdoor search loophole.” Many of the NSA's most controversial programs collect information under the law affected by the so-called loophole. These include Prism, which allows the agency to collect data from Google, Apple, Facebook, Yahoo and other tech companies, and the agency's Upstream program – a huge network of internet cable taps. Confirmation that the NSA has searched for Americans’ communications in its phone call and email databases complicates President Barack Obama’s initial defenses of the broad surveillance in June. Wyden and Udall [said] “Today’s admission by the Director of National Intelligence is further proof that meaningful surveillance reform must include closing the back-door searches loophole and requiring the intelligence community to show probable cause before deliberately searching through ... the communications of individual Americans."

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


CIA lied about torture to justify using it
2014-04-01, MSNBC
http://www.msnbc.com/msnbc/cia-lied-about-torture-justify-using-it

A Senate intelligence committee investigation found that the Central Intelligence Agency employed brutal interrogation methods that turned out to be largely useless and then lied about their effectiveness. The Senate report contradicts the main defenses of the Bush-era torture program: That harsh methods were needed to produce "actionable results," and that the program itself helped save American lives by foiling terror attacks. Instead, the CIA overstated the effectiveness of the program and concealed the harshness of the methods they used. Intelligence breakthroughs credited to the “enhanced interrogation” program by the CIA were instead gleaned through other means, and then used by the agency to bolster defenses of the program. Conservative media figures incessantly hyped former Bush administration officials’ at times verifiably false claims about the efficacy of the program. The Bush administration’s trip to the “dark side” provided pundits, op-ed columnists, and other media personalities an endless stream of satisfaction from talking like the greased up protagonists of 1980s action films.

Note: For an article explaining how even though this report may be declassified, the public will not have access to most of it, click here. For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Der Spiegel: NSA Put Merkel on List of 122 Targeted Leaders
2014-03-29, The Intercept
https://firstlook.org/theintercept/article/2014/03/29/der-spiegel-nsa-ghcq-ha...

Secret documents newly disclosed by the German news magazine Der Spiegel ... shed more light on how aggressively the National Security Agency and its British counterpart have targeted Germany for surveillance. A series of classified files from the archive provided to reporters by NSA whistleblower Edward Snowden ... reveal that the NSA appears to have included Merkel in a surveillance database alongside more than 100 other foreign leaders. The documents also confirm for the first time that, in March 2013, the NSA obtained a top-secret court order against Germany as part of U.S. government efforts to monitor communications related to the country. [A] document, dated 2009, indicates that Merkel was targeted in a broader NSA surveillance effort. She appears to have been placed in the NSA’s so-called “Target Knowledge Base“ (TKB), which Der Spiegel described as the central agency database of individual targets. An internal NSA description states that employees can use it to analyze “complete profiles“ of targeted people. But the NSA’s surveillance of Germany has extended far beyond its leader. A separate document from the NSA’s Special Source Operations unit ... shows that the Obama administration obtained a top-secret court order specifically permitting it to monitor communications related to Germany. Special Source Operations is the NSA department that manages what the agency describes as its “corporate partnerships” with major US companies, including AT&T, Verizon, Microsoft, and Google.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Defense lawyers: Did FBI pressure push Boston bomber over the edge?
2014-03-29, Christian Science Monitor
http://www.csmonitor.com/USA/Justice/2014/0329/Defense-lawyers-Did-FBI-pressu...

Three days after an FBI agent was cleared of wrongdoing in the bizarre killing of an associate of slain Boston bombing suspect Tamerlan Tsarnaev, lawyers for Dzhokhar Tsarnaev, the only surviving bombing suspect, alleged that the FBI attempted to recruit the elder Tsarnaev as an informant. Dzhokhar Tsarnaev’s defense team said that new information suggests the FBI interviewed Tamerlan on several occasions before the attack, and even pressured him to surreptitiously report on the Chechen underworld. The Bureau has continued to emphatically state that it didn’t know the identities of the two suspected bombers until they were fingerprinted, and have denied any involvement with the brothers aside from following up on a tip from a Russian emissary that the elder Tsarnaev may have been seeking jihad. In the case of Ibragim Todashev, who allegedly took part with Tamerlan in a robbery turned triple-homicide in Waltham, in 2011, family members have also stated that FBI pressure may have pushed the 20-something ethnic Chechen and mixed martial arts fighter to the brink of violence. Since the terrorist attacks of 9/11, the Bureau has stepped up surveillance of specific racial, ethnic and religious communities, including the use of informants. The tactics have ... left the Bureau open to charges of entrapment, not to mention assorted Internet conspiracy theories. Part of those post-9/11 tactics are the use of “voluntary interviews … often encouraging interviewees to serve as informants in their communities,” writes the American Civil Liberties Union.

Note: Why didn't the FBI reveal its attempt to recruit the elder Tsarnaev when the bombing happened? Something is quite fishy here.


Health conspiracy theories are widely believed
2014-03-19, USA Today
http://www.usatoday.com/story/news/nation/2014/03/19/health-conspiracy-theori...

Nearly half of American adults believe the federal government, corporations or both are involved in at least one conspiracy to cover up health information, a new survey finds. Conspiracy theories on everything from cancer cures to cellphones to vaccines are well known and accepted by sizable segments of the population, according to a research letter published this week in JAMA Internal Medicine. The findings reflect "a very low level of trust" in government and business, especially in pharmaceutical companies, says study co-author Eric Oliver, a professor of political science at the University of Chicago. The online survey of 1,351 adults found: • 37% agree the Food and Drug Administration is keeping "natural cures for cancer and other diseases" away from the public because of "pressure from drug companies." • 20% believe health officials are hiding evidence that cellphones cause cancer. • 20% believe doctors and health officials push child vaccines even though they "know these vaccines cause autism and other psychological disorders." • Smaller numbers endorse theories involving fluoride, genetically modified foods and the deliberate infection of African Americans with HIV. • 49% believe at least one of the theories and 18% believe at least three. The beliefs also go along with certain health behaviors, the survey found. Those who believe at least three health conspiracy theories are less likely to use sunscreen, get flu shots or get check-ups and are more likely to use herbal remedies and eat organic foods.

Note: For an intriguing list of 10 major health cover-ups with evidence to back it up, click here.


NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls
2014-03-18, Washington Post
http://www.washingtonpost.com/world/national-security/nsa-surveillance-progra...

The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage. At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

Note: Though technically it is illegal for the NSA to snoop on Americans without good cause, all they have to do is to share this technology with another country like the UK, and then ask the UK to do the snooping and send the results back to them, thereby circumventing the law. For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.


Malaysian investigators conclude missing airliner hijacked
2014-03-15, CBS News/Associated Press
"http://www.cbsnews.com/news/malaysia-airlines-flight-370-more-sinister-theor...

Malaysia's prime minister says the disappearance of Malaysia Airlines Flight 370 appears to be "deliberate." The latest evidence suggests the plane didn't experience a catastrophic incident over the South China Sea as was initially suspected. Prime Minister Najib Razak said the investigation has refocused onto the crew and passengers aboard the missing plane. He added that ... all possibilities are still being investigated. A Malaysian government official who is involved in the investigation said investigators have concluded that one of the pilots or someone else with flying experience hijacked the missing Malaysia Airlines jet. The official said that hijacking was no longer a theory. "It is conclusive." A Malaysian official, who also declined to be identified because he is not authorized to brief the media, said only a skilled aviator could navigate the plane the way it was flown after its last confirmed location over the South China Sea. The official said it had been established with a "more than 50 percent" degree of certainty that military radar had picked up the missing plane after it dropped off civilian radar. Malaysian officials have said radar data suggest it may have turned back and crossed back over the Malaysian peninsula westward, after setting out toward the Chinese capital. The flight altered its course more than once after it lost contact with ground control and that it made significant changes in altitude. Investigators say there's further evidence suggesting the jet did not crash immediately after being lost on radar; a transmitter on the plane tried for another four hours to ping satellites.

Note: Why is the military radar 50% certain? How could a transmitter on the plane ping for four hours, yet no one on the plane made a phone call? Remember that after Flight 93 was hijacked on 9/11, many phone calls were made by passengers on the plane. There is an abundance of high strangeness to this airplane's disappearance. For valuable speculation on the missing flight not well covered in the major media, click here. For some very unusual radar evidence of its disappearance, click here.


US criticised by UN for human rights failings on NSA, guns and drones
2014-03-13, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/mar/13/us-un-human-rights-abuses-nsa-dr...

The US came under sharp criticism at the UN human rights committee in Geneva on [March 13] for a long list of human rights abuses that included everything from detention without charge at Guantánamo, drone strikes and NSA surveillance, to the death penalty, rampant gun violence and endemic racial inequality. The experts raised questions about the National Security Agency’s surveillance of digital communications in the wake of Edward Snowden’s revelations. The committee’s 18 experts [are] charged with upholding the International Covenant on Civil and Political Rights (ICCPR), a UN treaty that the US ratified in 1992. The US came under sustained criticism for its global counter-terrorism tactics, including the use of unmanned drones to kill al-Qaida suspects, and its transfer of detainees to third countries that might practice torture, such as Algeria. Committee members also highlighted the Obama administration’s failure to prosecute any of the officials responsible for permitting waterboarding and other “enhanced interrogation” techniques under the previous administration. Walter Kälin, a Swiss international human rights lawyer who sits on the committee, attacked the US government’s refusal to recognise the convention’s mandate over its actions beyond its own borders. The US has asserted since 1995 that the ICCPR does not apply to US actions beyond its borders - and has used that “extra-territoriality” claim to justify its actions in Guantánamo and in conflict zones.

Note: How sad that it appears this news was not reported in any major US media.


How the NSA Plans to Infect ‘Millions’ of Computers with Malware
2014-03-12, The Intercept
https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millio...

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic. In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Snowden: Feinstein a Hypocrite for Blasting CIA Spying
2014-03-12, NBC News
http://www.nbcnews.com/storyline/cia-senate-snooping/snowden-feinstein-hypocr...

Former NSA contractor Edward Snowden accused Sen. Dianne Feinstein of hypocrisy ... for complaining about alleged CIA spying on U.S. senators while tolerating government spying on private citizens. "It's clear the CIA was trying to play 'keep away' with documents relevant to an investigation by their overseers in Congress, and that's a serious constitutional concern,” said Snowden in a statement to NBC News. “But it's equally if not more concerning that we're seeing another 'Merkel Effect,' where an elected official does not care at all that the rights of millions of ordinary citizens are violated by our spies, but suddenly it's a scandal when a politician finds out the same thing happens to them." Snowden was ... referring to German Chancellor Angela Merkel’s indignation at reports that the U.S. had listened in on her personal conversations, but her failure to condemn the NSA for mass surveillance of communications of German citizens. Both were revealed by the release of documents that Snowden took from NSA computers and distributed to journalists.

Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.


NSA posed as Facebook to infect computers with malware, report says
2014-03-12, Los Angeles Times
http://www.latimes.com/business/technology/la-fi-tn-nsa-posing-facebook-malwa...

The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.

Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"