Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption Media Articles
Excerpts of Key Intelligence Agency Corruption Media Articles in Major Media


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


NSA collects millions of text messages daily in 'untargeted' global sweep
2014-01-16, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messa...

The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. On average, each day the NSA was able to extract: • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images. • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Keep the focus on facts about NSA spying
2014-01-16, San Francisco Chronicle (SF's leading newspaper)
http://www.sfgate.com/opinion/article/Keep-the-focus-on-facts-about-NSA-spyin...

To have a genuinely constructive debate, data must be compiled, evidence must be amassed and verifiable truths must be presented. This truism is particularly significant when it comes to debates about security and liberty. Without facts, we get the counterproductive discourse we are being treated to right now - the one hijacked by National Security Administration defenders throwing temper tantrums, tossing out fear-mongering platitudes and trying to prevent any scrutiny of the agency. Tune into a national news program and you inevitably will hear pundits who have spent the last decade mindlessly cheering on wars and warrantless wiretapping now echoing the talking points emanating from surveillance-state apparatchiks like Reps. Mike Rogers, R-Mich., and Dutch Ruppersberger, D-Md. This week, these two lawmakers, who head the House Intelligence Committee, summarized all the bluster in a press release that should be enshrined for posterity. In an attempt to defend the NSA, the bipartisan duo breathlessly claimed that whistle-blower Edward Snowden ended up "endangering each and every American" by exposing the government's mass surveillance (i.e., metadata) programs. They indicted Snowden's patriotism and said his disclosures of the NSA's unlawful and unconstitutional programs "aligned him with our enemy." But the facts now leaking out of the government's national security apparatus are doing the opposite. They are debunking - rather than confirming - the NSA defenders' platitudes.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


N.S.A. Devises Radio Pathway Into Computers
2014-01-15, New York Times
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-conn...

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Burglars Who Took On F.B.I. Abandon Shadows
2014-01-07, New York Times
http://www.nytimes.com/2014/01/07/us/burglars-who-took-on-fbi-abandon-shadows...

On a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludgeoned each other over 15 rounds in a televised title bout viewed by millions around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with nearly every document inside. They were never caught, and the stolen documents that they mailed anonymously to newspaper reporters ... would become a flood of revelations about extensive spying and dirty-tricks operations by the F.B.I. against dissident groups. Perhaps the most damning document from the cache [was] a 1970 memorandum that ... urged agents to step up their interviews of antiwar activists and members of dissident student groups. “It will enhance the paranoia endemic in these circles and will further serve to get the point across there is an F.B.I. agent behind every mailbox.” Another document, signed by Hoover himself, revealed widespread F.B.I. surveillance of black student groups on college campuses. But the document that would have the biggest impact on reining in the F.B.I.’s domestic spying activities [included] a mysterious word: Cointelpro ... shorthand for Counterintelligence Program. Since 1956, the F.B.I. had carried out an expansive campaign to spy on civil rights leaders, political organizers and suspected Communists, and had tried to sow distrust among protest groups. Among the grim litany of revelations was a blackmail letter F.B.I. agents had sent anonymously to the Rev. Dr. Martin Luther King Jr., threatening to expose his extramarital affairs if he did not commit suicide. The intent of Cointelpro was to destroy lives and ruin reputations.

Note: To learn about the brave citizen burglars who have now revealed themselves and watch the engaging video covering this story, click on the link given above. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


The WikiLeaks Mole
2014-01-06, Rolling Stone
http://www.rollingstone.com/politics/news/the-wikileaks-mole-20140106

Sigurdur "Siggi" Thordarson, [is a] cherubic, blond 21-year-old who has been called everything in the [Icelandic] press from "attention seeker" to "traitor" to "psychopath". Four years ago, just as WikiLeaks was winning international notoriety, the then-17-year-old hacking prodigy became Assange's youngest and most trusted sidekick. But as Assange became more embattled and besieged, the protégé turned on his mentor in the most shocking of ways: becoming the first FBI informant inside the group. His tale reveals not only the paranoia and strife within WikiLeaks, but just how far the feds were willing to go to get Assange. The revelation of Siggi's role as an FBI snitch has polarized WikiLeaks insiders. WikiLeaks spokesman Kristinn Hrafnsson [dismissed] Siggi as "a pathological liar." While other WikiLeaks insiders also question Siggi's credibility, they insist that his story can't be discounted, and there's more to it than the organization is letting on. The truth, it seems, may be held in the leaks. Siggi has provided Rolling Stone with more than a terabyte of secret files he claims to have taken from WikiLeaks before he left in November 2011 and gave to the FBI: thousands of pages of chat logs, videos, tapped phone calls, government documents and more than a few bombshells from the organization's most heated years. Whatever their origins, the SiggiLeaks are a deep and revealing portal into one of the most guarded and influential organizations of the 21st century – and the extreme measures its embattled leader is willing to take.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


I worked on the US drone program. The public should know what really goes on
2013-12-29, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/dec/29/drones-us-military

Whenever I read comments by politicians defending the Unmanned Aerial Vehicle Predator and Reaper program – aka drones – I wish I could ask them a few questions. I'd start with: "How many women and children have you seen incinerated by a Hellfire missile?" Few of these politicians who so brazenly proclaim the benefits of drones have a real clue of what actually goes on. I, on the other hand, have seen these awful sights first hand. What the public needs to understand is that the video provided by a drone is not usually clear enough to detect someone carrying a weapon, even on a crystal-clear day. This makes it incredibly difficult for the best analysts to identify if someone has weapons for sure. One example comes to mind: "The feed is so pixelated, what if it's a shovel, and not a weapon?" I felt this confusion constantly, as did my fellow UAV analysts. We always wonder if ... we destroyed an innocent civilian's life all because of a bad image or angle. I know the feeling you experience when you see someone die. Horrifying barely covers it. When you are exposed to it over and over again it becomes like a small video, embedded in your head, forever on repeat, causing psychological pain and suffering. UAV troops are victim to not only the haunting memories of this work that they carry with them, but also the guilt of always being a little unsure of how accurate their confirmations of weapons or identification of hostile individuals were. The UAVs in the Middle East are used as a weapon, not as protection, and as long as our public remains ignorant to this, this serious threat to the sanctity of human life – at home and abroad – will continue.

Note: For more on war crimes committed by the US and UK in the illegal "global war on terror", see the deeply revealing reports from reliable major media sources available here.


Agent: FBI key in border agent Terry slaying
2013-12-26, Arizona Republic (AZ's leading newspaper)
http://www.azcentral.com/news/articles/20131226fast-furious-agent-terry-killi...

A federal agent who exposed the Justice Departments flawed gun-trafficking investigation known as Operation Fast and Furious says the FBI played a key role in events leading to the 2010 murder near Nogales, Ariz., of U.S. Border Patrol Agent Brian Terry. John Dodson, a special agent with the Bureau of Alcohol, Tobacco, Firearms and Explosives, contends that the bandits who killed Terry were working for FBI operatives and were sent to the border to do a drug rip-off using intelligence from the federal Drug Enforcement Administration. I dont think the (FBI) assets were part of the rip-off crew, Dodson said. I think they were directing the rip crew. Dodsons comments to The Arizona Republic amplify assertions he made in his recently released book, The Unarmed Truth, about his role as a whistle-blower in the Fast and Furious debacle. In his book, Dodson uses cautious language to characterize his account of circumstances surrounding Terrys death, saying the information is based on firsthand knowledge, personal opinion and press reports. He asserts that the DEA had information about, and may have orchestrated, a large drug shipment through Peck Canyon that December night. He alleges that DEA agents shared that intelligence with FBI counterparts, who advised criminal informants from another cartel that the load would be theirs for the taking. Stealing such a shipment would increase the clout of the FBI informants in the cartel organization they had penetrated, Dodson wrote, and thus lead to better intel for them in the future.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Edward Snowden, after months of NSA revelations, says his mission’s accomplished
2013-12-23, Washington Post
http://www.washingtonpost.com/world/national-security/edward-snowden-after-mo...

Taken together, the [Edward Snowden] revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations. Six months after the first revelations ... Snowden agreed to reflect at length on the roots and repercussions of his choice. He was relaxed and animated over two days of nearly unbroken conversation. Snowden offered vignettes from his intelligence career and from his recent life as “an indoor cat” in Russia. But he consistently steered the conversation back to surveillance, democracy and the meaning of the documents he exposed. “For me, in terms of personal satisfaction, the mission’s already accomplished,” he said. “I already won. As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn’t want to change society. I wanted to give society a chance to determine if it should change itself. All I wanted was for the public to be able to have a say in how they are governed,” he said. Snowden ... had come to believe that a dangerous machine of mass surveillance was growing unchecked. Closed-door oversight by Congress and the Foreign Intelligence Surveillance Court was a “graveyard of judgment,” he said, manipulated by the agency it was supposed to keep in check. The NSA’s business is “information dominance,” the use of other people’s secrets to shape events. At 29, Snowden upended the agency on its own turf.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Stealth Surprises in NSA Report Take on Non-NSA Spying
2013-12-20, ABC News
http://abcnews.go.com/Blotter/stealth-surprises-nsa-report-nsa-spying/story?i...

The White House's expert NSA panel may have made headlines ... for telling President Barack Obama to knock off the collection of Americans' meta-data, but surveillance experts said they were surprised that the panel also took to task some controversial non-NSA-related spy tactics as well. One recommendation was to impose much stricter oversight on the FBI's ability to issue National Security Letters (NSLs), which have been used to obtain telephone call records and credit reports in terrorism and espionage cases. Another even more peculiar recommendation by the five national security experts ... was their advice that "governments" shouldn't hack into bank accounts and drain funds. "Governments should not use their offensive cyber capabilities to change the amounts held in financial accounts or otherwise manipulate the financial systems," the unanimous Review Group on Intelligence and Communications Technologies report warned Obama. "That was a strangely specific recommendation for something nobody was talking about," Kel McClanahan, executive director of government transparency group National Security Counselors, told ABC News. Michelle Richardson, the American Civil Liberties Union's legislative council in Washington, also said the findings on "NSLs" and government hacking were unexpected -- but welcomed.

Note: The fact that this expert panel would even mention governments manipulating financial accounts suggests that if it hasn't already happened, some were seriously considering this. For lots more on this strange news, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


GCHQ and NSA targeted charities, Germans, Israeli PM and EU chief
2013-12-20, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-ger...

British and American intelligence agencies had a comprehensive list of surveillance targets that included the EU's competition commissioner, German government buildings in Berlin and overseas, and the heads of institutions that provide humanitarian and financial help to Africa, top-secret documents reveal. The papers show GCHQ [and the NSA were] targeting organisations such as the United Nations development programme, the UN's children's charity Unicef and Médecins du Monde, a French organisation that provides doctors and medical volunteers to conflict zones. The head of the Economic Community of West African States (Ecowas) also appears in the documents, along with text messages he sent to colleagues. One GCHQ document, drafted in January 2009, makes clear that the agencies were targeting an email address listed as belonging to another important American ally – the "Israeli prime minister". Ehud Olmert was in office at the time. Three further Israeli targets appeared on GCHQ documents, including another email address understood to have been used to send messages between the then Israeli defence minister, Ehud Barak, and his chief of staff, Yoni Koren. The names and details are the latest revelations to come from documents leaked by the whistleblower Edward Snowden. They provoked a furious reaction. The disclosures reflect the breadth of targets sought by the agencies, which goes far beyond the desire to intercept the communications of potential terrorists and criminals, or diplomats and officials from hostile countries.

Note: Later reports revealed that GHCQ also targeted the global human rights organization Amnesty International. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Secret contract tied NSA and security industry pioneer
2013-12-20, CNBC/Reuters
http://www.cnbc.com/id/101290438

As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products. Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year. The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Senate Asks C.I.A. to Share Its Report on Interrogations
2013-12-18, New York Times
http://www.nytimes.com/2013/12/18/us/politics/senators-ask-to-see-internal-ci...

The Senate Intelligence Committee has asked the C.I.A. for an internal study done by the agency that lawmakers believe is broadly critical of the C.I.A.’s detention and interrogation program but was withheld from congressional oversight committees. The committee’s request comes in the midst of a yearlong battle with the C.I.A. over the release of the panel’s own exhaustive report about the program, one of the most controversial policies of the post-Sept. 11 era. The Senate report, totaling more than 6,000 pages, was completed last December but has yet to be declassified. According to people who have read the study, it is unsparing in its criticism of the now-defunct interrogation program and presents a chronicle of C.I.A. officials’ repeatedly misleading the White House, Congress and the public about the value of brutal methods that, in the end, produced little valuable intelligence. Senator Mark Udall, Democrat of Colorado, disclosed the existence of the internal C.I.A. report during an Intelligence Committee hearing on Tuesday. He said he believed it was begun several years ago and “is consistent with the Intelligence’s Committee’s report” although it “conflicts with the official C.I.A. response to the committee’s report.” “If this is true,” Mr. Udall said ... “this raises fundamental questions about why a review the C.I.A. conducted internally years ago — and never provided to the committee — is so different from the C.I.A.’s formal response to the committee study.”

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


NSA’s indiscriminate spying ‘collapsing,’ Snowden says in open letter
2013-12-17, Washington Post/Associated Press
http://www.washingtonpost.com/world/nsas-indiscriminate-spying-collapsing-sno...

National Security Agency leaker Edward Snowden wrote in a lengthy “open letter to the people of Brazil” that he has been inspired by the global debate ignited by his release of thousands of documents and that the NSA’s culture of indiscriminate global espionage “is collapsing.” In the letter, Snowden commended the Brazilian government for its strong stand against U.S. spying. He wrote that he would be willing to help the South American nation investigate NSA spying on its soil but could not fully participate in doing so without being granted political asylum, because the U.S. “government will continue to interfere with my ability to speak.” The documents revealed that Brazil is the top NSA target in Latin America, in spying that has included the monitoring of Brazilian President Dilma Rousseff’s cellphone and hacking into the internal network of the state-run oil company Petrobras. In his letter, Snowden dismissed U.S. explanations to the Brazilian government and others that the bulk metadata gathered on billions of e-mails and calls was more “data collection” than surveillance. “There is a huge difference between legal programs, legitimate spying ... and these programs of dragnet mass surveillance that put entire populations under an all-seeing eye and save copies forever,” he wrote. “These programs were never about terrorism: they’re about economic spying, social control, and diplomatic manipulation. They’re about power.” Brazilian senators have asked for Snowden’s help during hearings about the NSA’s targeting of Brazil, an important transit hub for transatlantic fiber-optic cables that are hacked.

Note: To read Snowden's full, inspiring letter, click here.


Alleged Boston Marathon bomber Tamerlan Tsarnaev believed in 'majestic mind control'
2013-12-16, The Independent (One of the UK's leading newspapers)
http://www.independent.co.uk/news/world/americas/alleged-boston-marathon-bomb...

Suspected Boston Marathon bomber Tamerlan Tsarnaev heard voices inside his head and had an alter-ego, a report published in The Boston Globe claimed yesterday. Donald Larking, 67, who attended the same Boston mosque as the suspected bomber, said Tsarnaev believed the voices were part of a “majestic mind control”, which was “a way of breaking down a person and creating an alternative personality with which they must coexist." Larking also told the Globe that Tsarnaev was “torn” between himself and an alter-ego. “You can give a signal, a phrase or a gesture, and bring out the alternate personality and make them do things,” he said; “Tamerlan thought someone might have done that to him.” According to the report, the voices “came to [Tsarnaev] at unexpected times, an internal rambling that he alone could hear. Alarmed, he confided to his mother that the voice 'felt like two people inside of me. “As he got older, the voice became more authoritative, its bidding more insistent. Tamerlan confided in a close friend that the voice had begun to issue orders and to require him to perform certain acts, though he never told his friend specifically what those acts were.” Tamerlan, 26, and his younger brother Dzhokhar, 20, are alleged to have planted the two pressure cooker bombs that killed three and injured more than 260 at the Boston Marathon in April. While Tamerlan was later killed in a shootout with police, his brother was captured and now potentially faces the death penalty under charges of terrorism.

Note: Many have long suspected that most mass murderers are mind control victims subject to top secret mind control programs, like those revealed in declassified government documents on this webpage. For the full investigative report in the Boston Globe, click here. For lots more verifiable information on these mind control programs, click here.


The Soviet Union Spent $1 Billion On Mind-Control Experiments During The Cold War As Part Of Arms Race With The US: Report
2013-12-16, International Business Times
http://www.ibtimes.com/soviet-union-spent-1-billion-mind-control-experiments-...

The battle between the U.S. and the Soviet Union during the Cold War, for technological and scientific one-upmanship, included a costly effort that involved the two superpowers' attempts to develop mind-control weapons, according to a new study. A blog post at the Physics arXiv Blog, citing a new paper by researcher Serge Kernbach, said that both the U.S. and the Soviet Union experimented with parapsychology, mind control and remote influence. And, while some of the work conducted by the U.S. on these topics is now public, much less is known about the Soviet body of knowledge, which reportedly cost about a billion dollars to gather. “The Soviets had a similar program. This included experiments in parapsychology, which the Soviets called psychotronics,” the blogpost said. “The work built on a long-standing idea in Soviet science that the human brain could receive and transmit a certain kind of high frequency electromagnetic radiation and that this could influence other objects too.” Kernbach provided an overview of the Soviet Union’s efforts in unconventional research between 1917 and 2003, [based] on publications in Russian technical journals and recently declassified documents. The U.S. developed a 20-year CIA program, called Project MKULTRA, which began in the early 1950s to study ways of manipulating people’s minds and altering their brain functions. The Soviets too focused on a similar program and developed a device called a "cerpan" that could generate and store high-frequency electromagnetic radiation produced by the human brain in hopes of influencing other objects.

Note: For an excellent two-page summary of reliable information on secret government mind control programs, click here. For more on mind control research and operations by the CIA, see the deeply revealing reports from reliable major media sources available here.


United States of Secrets: William Binney
2013-12-13, PBS
https://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united...

A 36-year NSA veteran, William Binney resigned from the agency and became a whistleblower after discovering that elements of a data-monitoring program he had helped develop - nicknamed ThinThread - were being used to spy on Americans. So 2005, December, The New York Times article comes out. ... How important was it? "It touched on that real issues," [said Binney]. "The warrantless wiretapping was not really a major component of it, but it touched on the data mining, which is really, really the big issue, data mining of the metadata and content. That was really the big issue, because that's how you can monitor the entire population simultaneously, whereas the warrantless wiretaps were isolated cases. You could pick an isolated number of them and do them, whereas in the mining process, you would do the entire population." The administration [used] this article to start an aggressive whistleblowing hunt. "[On July 22, 2005] the FBI was in my house ... pointing a gun at me when I was coming out of the shower. The raid took about seven hours. At the time we didn't know that Tom Drake had gone to The Baltimore Sun," [said Binney]. "Material [Tom Drake was indicted for] was clearly marked unclassified, and all they did was draw a line through it and classified that material, and then they charged him with having classified material. It's like framing him. The judge in the court ... knew they were framing him," [said Biney].

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


NSA review to leave spying programs largely unchanged, reports say
2013-12-13, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/dec/13/nsa-review-to-leave-spying-progr...

A participant in a White House-sponsored review of surveillance activities described as “shameful” an apparent decision to leave most of the National Security Agency’s controversial bulk spying intact. Sascha Meinrath, director of the Open Technology Institute, said [on December 13] that ... “The review group was searching for ways to make the most modest pivot necessary to continue business as usual.” Should the review group’s report resemble descriptions that leaked ... the report “does nothing to alter the lack of trust the global populace has for what the US is doing, and nothing to restore our reputation as an ethical internet steward,” said Meinrath, who met with the advisory panel and White House officials twice to discuss the bulk surveillance programs that have sparked international outrage. Leaks about the review group’s expected recommendations to the New York Times and Wall Street Journal strengthened Meinrath and other participants’ long-standing suspicions that much of the NSA’s sweeping spy powers would survive. The Times quoted an anonymous official familiar with the group saying its report “says we can’t dismantle these programs, but we need to change the way almost all of them operate”. According to the leaks, the review group will recommend that bulk collection of every American’s phone call data continue, possibly by the phone companies instead of the NSA, with tighter restrictions than the “reasonable, articulable suspicion” standard for searching through them that the NSA currently employs.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


Former whistleblowers: open letter to intelligence employees after Snowden
2013-12-11, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/dec/11/whistleblowers-open-lett...

At least since the aftermath of September 2001, western governments and intelligence agencies have been hard at work expanding the scope of their own power, while eroding privacy, civil liberties and public control of policy. What used to be viewed as paranoid, Orwellian, tin-foil hat fantasies [turn] out post-Snowden, to be not even the whole story. We've been warned for years that these things were going on: wholesale surveillance of entire populations, militarization of the internet, the end of privacy. Secret laws, secret interpretations of secret laws by secret courts and no effective parliamentary oversight whatsoever. By and large the media have paid scant attention to this, even as more and more courageous, principled whistleblowers stepped forward. The unprecedented persecution of truth-tellers, initiated by the Bush administration and severely accelerated by the Obama administration, has been mostly ignored, while record numbers of well-meaning people are charged with serious felonies simply for letting their fellow citizens know what's going on. Numerous ex-NSA officials have come forward in the past decade, disclosing massive fraud, vast illegalities and abuse of power in [that] agency, including Thomas Drake, William Binney and Kirk Wiebe. The response was 100% persecution and 0% accountability by both the NSA and the rest of government. Since the summer of 2013, the public has witnessed a shift in debate over these matters. The reason is that one courageous person: Edward Snowden.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


New Yorker, Washington Post Passed On Seymour Hersh Syria Report
2013-12-08, Huffington Post
http://www.huffingtonpost.com/2013/12/08/seymour-hersh-syria-report_n_4409674...

Pulitzer Prize-winning journalist Seymour Hersh accused the Obama administration ... of having “cherry-picked intelligence” regarding the Aug. 21 chemical attack in Syria that served as evidence for an argument in favor of striking President Bashar Assad's government. Though President Barack Obama eventually decided not to strike Syria, the administration made a public case for war by saying that Assad’s regime was responsible for a poison gas attack in the outskirts of Damascus. The U.N. later concluded the attack had involved the nerve agent sarin. In his piece -- titled "Whose Sarin?" -- Hersh reported that al-Nusra, a jihadi group fighting in Syria’s long-running civil war, had also "mastered the mechanics of creating sarin and was capable of manufacturing it in quantity.” Therefore, he wrote, “Obama did not tell the whole story” when stating with certainty that Assad had to be responsible, crossing a so-called "red line" that would trigger U.S. retaliation. Hersh is a freelancer, but he's best known these days for his work in The New Yorker, where he helped break the Abu Ghraib scandal in 2004. In an email, Hersh wrote that “there was little interest” for the story at The New Yorker. Hersh then took the story to The Washington Post. Hersh wrote that he was told by email that Executive Editor Marty Baron decided “that the sourcing in the article did not meet the Post's standards.” Hersh [then] sent the Syria story to editors at the London Review of Books, LRB Senior Editor Christian Lorentzen [said]. Lorentzen said the piece was not only edited, but thoroughly fact checked by a former New Yorker fact checker who had worked with Hersh in the past.

Note: For more on government lies to provide pretexts for war, see the deeply revealing reports from reliable major media sources available here.


Law enforcement using methods from NSA playbook
2013-12-08, USA Today
http://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-ns...

The National Security Agency isn't the only government entity secretly collecting data from people's cellphones. Local police are increasingly scooping it up, too. Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information about thousands of cellphone users at a time, whether they are targets of an investigation or not. The records, from more than 125 police agencies in 33 states, reveal [that] about one in four law-enforcement agencies have used a tactic known as a "tower dump," which gives police data about the identity, activity and location of any phone that connects to the targeted cellphone towers over a set span of time, usually an hour or two. A typical dump covers multiple towers, and wireless providers, and can net information from thousands of phones. At least 25 police departments own a Stingray, a suitcase-size device that costs as much as $400,000 and acts as a fake cell tower. The system, typically installed in a vehicle so it can be moved into any neighborhood, tricks all nearby phones into connecting to it and feeding data to police. In some states, the devices are available to any local police department via state surveillance units. Organizations such as the American Civil Liberties Union and Electronic Privacy Information Center say the swelling ability by even small-town police departments to easily and quickly obtain large amounts of cellphone data raises questions about the erosion of people's privacy as well as their Fourth Amendment protections against unreasonable search and seizure.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"