Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption Media Articles
Excerpts of Key Intelligence Agency Corruption Media Articles in Major Media


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data
2013-11-20, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-p...

The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden. In the first explicit confirmation that UK citizens have been caught up in US mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo ... says the material is being put in databases where it can be made available to other members of the US intelligence and military community. Until now, it had been generally understood that the citizens of each country were protected from surveillance by any of the others. But the Snowden material reveals that: • In 2007, the rules were changed to allow the NSA to analyse and retain any British citizens' mobile phone and fax numbers, emails and IP addresses swept up by its dragnet. • These communications were "incidentally collected" by the NSA, meaning the individuals were not the initial targets of surveillance operations and therefore were not suspected of wrongdoing. • The NSA has been using the UK data to conduct so-called "pattern of life" or "contact-chaining" analyses, under which the agency can look up to three "hops" away from a target of interest – examining the communications of a friend of a friend of a friend. Three hops for a typical Facebook user could pull the data of more than 5 million people into the dragnet.

Note: For more on government threats to privacy, see the deeply revealing reports from reliable major media sources available here.


FISA court order that allowed NSA surveillance is revealed for first time
2013-11-19, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/19/court-order-that-allowed-nsa-sur...

A secret court order that authorised a massive trawl by the National Security Agency of Americans' email and internet data was published for the first time on [November 18], among a trove of documents that also revealed a judge's concern that the NSA "continuously" and "systematically" violated the limits placed on the program. Another later court order found that what it called "systemic overcollection" had taken place. In a heavily redacted opinion Colleen Kollar-Kotelly, the former presiding judge of the FISA court, placed legal weight on the methods of surveillance employed by the NSA, which had never before collected the internet data of “an enormous volume of communications”. The methods, known as pen registers and trap-and-trace devices, record the incoming and outgoing routing information of communications. Kollar-Kotelly ruled that acquiring the metadata, and not the content, of email and internet usage in bulk was harmonious with the “purpose” of Congress and prior court rulings – even though no surveillance statute ever authorized it and top officials at the Justice Department and the FBI threatened to resign in 2004 over what they considered its dubious legality. The type of data collected under the program included information on the "to", "from" and "bcc" lines of an email rather than the content. Metadata, wrote Kollar-Kotelly, enjoyed no protection under the fourth amendment to the US constitution, a precedent established by the Supreme Court in 1979 in a single case on which the NSA relies currently.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


A Miami police informant, a prophetic racist and fresh questions about JFK’s death
2013-11-15, Miami Herald
http://www.miamiherald.com/2013/11/15/3756229/a-miami-police-informant-a-prop...

[Thirteen] days before that dark day in Dallas, [police informant Willie Augustus] Somersett elicited a chilling, police tape-recorded threat from a right-wing racist who talked of how the President would soon be shot “from an office building with a high-powered rifle” and how “they’ll pick up somebody within hours after…just to throw the public off.” Extremist Joseph A. Milteer, of Quitman, Ga., made the threat against Kennedy in the kitchen of Somersett’s small apartment in downtown Miami. In the late 1970s, the House Assassinations Committee had experts analyze a photograph taken in Dealey Plaza moments before the first shot of an unidentified motorcade spectator “who bears a strong resemblance” to Milteer. The experts, however, concluded the man was not Milteer, who died in 1974. But now, a retired FBI agent who says that within hours of the assassination he was assigned to locate Milteer has [said] the man in the photograph is indeed Milteer. “I stood next to the man. I interviewed him and spent hours with him,” said Don Adams, who spent 20 years with the FBI before working as a police chief in Ohio. “There is no question in my mind. As soon as I saw that picture I almost fell off of my feet.” Congressional investigators never contacted Adams. Adams, now 82, says he saw the Dealey Plaza photograph for the first time a decade after his 1982 retirement from the FBI. The photograph renewed his interest in the case and ultimately led him to write the book, From an Office Building with a High-Powered Rifle. His insider’s account raises disturbing questions about the FBI’s investigation of Kennedy’s death.

Note: To watch a five-minute video of 20-year FBI agent Don Adams stating he has no doubt there was a major cover-up of the JFK assassination, click here. For more excellent, revealing videos on the assassination, click here and here. For more on the JFK assassination, see the deeply revealing reports from reliable major media sources available here.


The Top 5 John F. Kennedy Assassination Conspiracy Theories
2013-11-11, ABC News
http://abcnews.go.com/US/top-john-kennedy-assassination-conspiracy-theories/s...

The fifty years since the assassination of John F. Kennedy have done little to quell the public's interest or skepticism about who killed the president. In 1978 ... the House of Representatives Select Committee on Assassinations found that in addition to Oswald, there likely was a second gunman who fired at the president's motorcade. The commission concluded that the gunmen were part of a "conspiracy," without determining exactly who was behind it, opening the door to five decades and a cottage industry of theories. According to a 2003 ABC News Poll, 70 percent of Americans believe Kennedy's death was "the result of a plot, not the act of a lone killer." Fifty-one percent believe Oswald did not act alone, and 7 percent believe Oswald was not involved at all in the assassination. In the years since Kennedy's death more than 2,000 books have been written about the assassination, many of which espouse one or more conspiracy theories. In nearly every theory that involves American conspirators, be they wealthy industrialists or tough-as-nails mafiosi, one group is routinely represented – the CIA. One theory suggests that Oswald was a CIA operative and agents tampered with his FBI file before and after the investigation to make it appear he was a communist and lone wolf. [Another theory claims President Lyndon] Johnson was aided in the plot by another man who would become president, George H.W. Bush, a burgeoning CIA official who happened to be in Dallas on the day of the assassination.

Note: On the 50th anniversary of the Kennedy assassination see our powerful JFK assassination information center and the best videos and news articles on the topic. For an astonishing History Channel Video in which the attorney for Lyndon Johnson states he has no doubt Johnson was involved in the assassination, click here.


Overt and Covert: ‘The Brothers,’ by Stephen Kinzer
2013-11-08, New York Times
http://www.nytimes.com/2013/11/10/books/review/the-brothers-by-stephen-kinzer...

The Brothers” is a riveting chronicle of government-sanctioned murder, casual elimination of “inconvenient” regimes, relentless prioritization of American corporate interests and cynical arrogance on the part of two men. John Foster Dulles and his brother, Allen, were ... lawyers, partners in the immensely powerful firm of Sullivan & Cromwell. John Foster Dulles served as secretary of state from 1953 to 1959; his brother ran the C.I.A. from 1953 to 1961. In his detailed, well­constructed and highly readable book, Stephen Kinzer ... shows how the brothers drove America’s interventionist foreign policy. Kinzer highlights John Foster Dulles’s central role in channeling funds from the United States to Nazi Germany in the 1930s. Sullivan & Cromwell floated bonds for Krupp A. G., the arms manufacturer, and also worked for I. G. Farben, the chemicals conglomerate that later manufactured Zyklon B, the gas used to murder millions of Jews. For the Dulles brothers, and for much of the American government, threats to corporate interests were categorized as support for communism. There are also reminders in Kinzer’s book of dark events in the history of American intelligence. Sixty years ago, Frank Olson, a C.I.A. officer, was reported to have jumped to his death during mind-control experiments “in which psychoactive drugs were administered to unknowing victims.” But last year, Kinzer reports, Olson’s family filed suit, claiming he had actually been murdered after visiting secret C.I.A. prisons in Europe.

Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


CIA made doctors torture suspected terrorists after 9/11, taskforce finds
2013-11-04, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/04/cia-doctors-torture-suspected-te...

Doctors and psychologists working for the US military violated the ethical codes of their profession under instruction from the defence department and the CIA to become involved in the torture and degrading treatment of suspected terrorists, an investigation has concluded. The report of the Taskforce on Preserving Medical Professionalism in National Security Detention Centres concludes that after 9/11, health professionals working with the military and intelligence services "designed and participated in cruel, inhumane and degrading treatment and torture of detainees". The report lays blame primarily on the defence department (DoD) and the CIA, which required their healthcare staff to put aside any scruples in the interests of intelligence gathering and security practices that caused severe harm to detainees, from waterboarding to sleep deprivation and force-feeding. The two-year review by the 19-member taskforce, Ethics Abandoned: Medical Professionalism and Detainee Abuse in the War on Terror, supported by the Institute on Medicine as a Profession (IMAP) and the Open Society Foundations, says that the DoD termed those involved in interrogation "safety officers" rather than doctors. Doctors and nurses were required to participate in the force-feeding of prisoners on hunger strike, against the rules of the World Medical Association and the American Medical Association. Doctors and psychologists working for the DoD were required to breach patient confidentiality and share what they knew of the prisoner's physical and psychological condition with interrogators, and were used as interrogators themselves.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Lawyers in Stratfor leak case present letters of support ahead of sentencing
2013-11-04, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/04/stratfor-leak-jeremy-hammond-sup...

Lawyers acting for Jeremy Hammond, the Chicago-based hacktivist facing up to 10 years in prison for releasing internal emails from the private intelligence agency Stratfor, have lodged 265 letters of support with the federal judge who will determine his sentence on 15 November. The letters call on judge Loretta Preska ... to show leniency towards Hammond, a former member of the hacking network Anonymous who has become a cause célčbre for hacktivists, civil libertarians and those concerned about the rights of whistleblowers. Among the correspondents are Daniel Ellsberg, source of the 1970s Pentagon Papers leak on the Vietnam war, and Jesselyn Radack, a former Justice Department whistleblower who now works at the Government Accountability Project. Hammond, 28, has pleaded guilty to one count under the Computer Fraud and Abuse Act (CFAA) relating to a 2011 cyber attack on Strategic Forecasting, Inc, known as Stratfor – an information analysis company based in Austin, Texas. Working alongside a fellow hacker operating under the internet handle Sabu – who was later revealed to be an FBI informant – Hammond downloaded an email spool from Stratfor containing millions of files and sent the data to the anti-secrecy website WikiLeaks which released them as the “Global Intelligence Files”. The Stratfor emails revealed that [Stratfor] had been contracted by Dow Chemical, parent company of Union Carbide which owned the Bhopal pesticide plant where the world’s worst industrial catastrophe took place in 1984, to follow the activities of campaigners seeking redress for the victims.

Note: For an excellent follow-up article titled "The Revolutionaries in Our Midst," click here. For more on privatization of "intelligence", see the deeply revealing reports from reliable major media sources available here.


No Morsel Too Minuscule for All-Consuming N.S.A.
2013-11-03, New York Times
http://www.nytimes.com/2013/11/03/world/no-morsel-too-minuscule-for-all-consu...

When Ban Ki-moon, the United Nations secretary general, sat down with President Obama at the White House in April to discuss Syrian chemical weapons, Israeli-Palestinian peace talks and climate change, it was a cordial, routine exchange. The National Security Agency nonetheless went to work in advance and intercepted Mr. Ban’s talking points for the meeting, a feat the agency later reported as an “operational highlight” in a weekly internal brag sheet. It was emblematic of an agency that for decades has operated on the principle that any eavesdropping that can be done on a foreign target of any conceivable interest — now or in the future — should be done. After all, American intelligence officials reasoned, who’s going to find out? From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as foes, as has become obvious in recent weeks; the agency’s official mission list includes using its surveillance powers to achieve “diplomatic advantage” over such allies as France and Germany and “economic advantage” over Japan and Brazil, among other countries. The scale of eavesdropping by the N.S.A., with 35,000 workers and $10.8 billion a year, sets it apart.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


GCHQ and European spy agencies worked together on mass surveillance
2013-11-01, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/uk-news/2013/nov/01/gchq-europe-spy-agencies-mass-...

The German, French, Spanish and Swedish intelligence services have all developed methods of mass surveillance of internet and phone traffic over the past five years in close partnership with Britain's GCHQ eavesdropping agency. The bulk monitoring is carried out through direct taps into fibre optic cables and the development of covert relationships with telecommunications companies. A loose but growing eavesdropping alliance has allowed intelligence agencies from one country to cultivate ties with corporations from another to facilitate the trawling of the web, according to GCHQ documents leaked by the former US intelligence contractor Edward Snowden. The files also make clear that GCHQ played a leading role in advising its European counterparts how to work around national laws intended to restrict the surveillance power of intelligence agencies. US intelligence officials have insisted the mass monitoring was carried out by the security agencies in the countries involved and shared with the US. The Guardian revealed the existence of GCHQ's Tempora programme, in which the electronic intelligence agency tapped directly into the transatlantic fibre optic cables to carry out bulk surveillance. GCHQ officials expressed admiration for the technical capabilities of German intelligence to do the same thing, [saying] the Federal Intelligence Service (BND) had "huge technological potential and good access to the heart of the internet – they are already seeing some bearers running at 40Gbps and 100Gbps". Bearers is the GCHQ term for the fibre optic cables, and gigabits per second (Gbps) measures the speed at which data runs through them.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Spain colluded in NSA spying on its citizens, Spanish newspaper reports
2013-10-30, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/oct/30/spain-colluded-nsa-spying-citize...

The widespread surveillance of Spanish citizens by the US National Security Agency, which caused outrage when it was reported this week, was the product of a collaboration with Spain's intelligence services, according to one Spanish newspaper. Spanish agents not only knew about the work of the NSA but also facilitated it, El Mundo reports. An NSA document entitled "Sharing computer network operations cryptologic information with foreign partners" reportedly shows how the US relies on the collaboration of many countries to give it access to intelligence information, including electronic metadata. According to the document seen by El Mundo, the US classifies cooperation with various countries on four different levels. In the first group – "Comprehensive Cooperation" – are the UK, Australia, Canada and New Zealand. The second group – "Focused Cooperation" – of which Spain is a member, includes 19 countries, all of them European, apart from Japan and South Korea. The third group – "Limited cooperation" – consists of countries such as France, Israel, India and Pakistan; while the fourth – "Exceptional Cooperation" – is made up of countries that the US considers to be hostile to its interests. The NSA documents [suggest] the Spanish intelligence services were working hand in hand with the NSA, as were other foreign agencies. But if there was any doubt as to who held the upper hand, the NSA documents make clear that any collaboration was always to serve the needs of protecting American interests.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


New book reveals how much FBI, CIA knew about Oswald before Kennedy assassination
2013-10-27, CBS News
http://www.cbsnews.com/8301-3460_162-57609489/new-book-reveals-how-much-fbi-c...

It has long been known that the Warren Commission ... was flawed in ways that led to generations of conspiracy theories about what happened on Nov. 22, 1963. A [new] book from former New York Times reporter Philip Shenon digs into exactly what the commission got wrong, both by intentional concealment, or, in Shenon's view, extensive attempts by both the CIA and FBI to withhold just how much they knew about Kennedy assassin Lee Harvey Oswald. "Much of the truth about the Kennedy assassination has still not been told, [and] much of the evidence about the president's murder was covered up or destroyed - shredded, incinerated, or erased - before it could reach the commission," Shenon writes in the prologue to A Cruel and Shocking Act: The Secret History of the Kennedy Assassination, which draws its title from the first sentence of the commission's report. Shenon tells the story of how Navy pathologist James Humes threw his blood-stained notes from Kennedy's autopsy into the fire after he transcribed a fresh copy of the report. He said that he wanted to keep the documents from falling into the hands of "ghouls," and gave a similar rationale for ordering that the sheets that covered Kennedy's head wounds in Dallas be laundered during the autopsy. The commission's investigators never even saw the photos and X-rays from the autopsy. Shenon also points to the CIA as having taken great steps to cover up their knowledge of Oswald's visit to Mexico City before the assassination.

Note: As the 50th anniversary of the Kennedy assassination approaches see our powerful JFK assassination information center and the best videos and news articles on the topic. For more on political assassinations, see the deeply revealing reports from reliable major media sources available here.


Congressional oversight of the NSA is a joke. I should know, I'm in Congress
2013-10-25, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/oct/25/nsa-no-congress-oversight

Recently, the US House of Representatives voted on an amendment ... that would have curbed the NSA's omnipresent and inescapable [spying] tactics. Despite furious lobbying by the intelligence industrial complex and its allies, and four hours of frantic and overwrought briefings by the NSA's General Keith Alexander, 205 of 422 Representatives voted for the amendment. The vote signaled a clear message to the NSA: we do not trust you. The vote also conveyed another, more subtle message: members of Congress do not trust that the House Intelligence Committee is providing the necessary oversight. On the contrary, "oversight" has become "overlook". Despite being a member of Congress possessing security clearance, I've learned far more about government spying on me and my fellow citizens from reading media reports than I have from "intelligence" briefings. My colleagues feel the same way. In fact, one long-serving conservative Republican told me that he doesn't attend such briefings anymore, because, "they always lie". Many of us worry that Congressional Intelligence Committees are more loyal to the "intelligence community" that they are tasked with policing, than to the Constitution. And the House Intelligence Committee isn't doing anything to assuage our concerns. Supporters of the NSA's vast ubiquitous domestic spying operation assure the public that members of Congress can be briefed on these activities whenever they want. Senator Saxby Chambliss says all a member of Congress needs to do is ask for information, and he'll get it. Well I did ask, and the House Intelligence Committee said "no", repeatedly. And virtually every other member not on the Intelligence Committee gets the same treatment.

Note: The above article was written by courageous U.S. Congressman Alan Grayson. For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


NSA monitored calls of 35 world leaders after US official handed over contacts
2013-10-24, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/oct/24/nsa-surveillance-world-leaders-c...

The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden. The confidential memo reveals that the NSA encourages senior officials in its "customer" departments, such as the White House, State and the Pentagon, to share their "Rolodexes" so the agency can add the phone numbers of leading foreign politicians to their surveillance systems. The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately "tasked" for monitoring by the NSA. The revelation is set to add to mounting diplomatic tensions between the US and its allies, after the German chancellor Angela Merkel ... accused the US of tapping her mobile phone. The NSA memo obtained by the Guardian suggests that such surveillance was not isolated, as the agency routinely monitors the phone numbers of world leaders – and even asks for the assistance of other US officials to do so. The memo, dated October 2006 and which was issued to staff in the agency's Signals Intelligence Directorate (SID), was titled "Customers Can Help SID Obtain Targetable Phone Numbers". In the wake of the Merkel row, the US is facing growing international criticism that any intelligence benefit from spying on friendly governments is far outweighed by the potential diplomatic damage.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Human rights groups accuse US of war crimes
2013-10-22, MSNBC
http://www.msnbc.com/msnbc/human-rights-groups-accuse-us-war-crimes

The United States is facing increasingly harsh criticism over its use of lethal drone strikes to target suspected terrorists. American drone strikes in Pakistan and Yemen may amount to war crimes, according to a pair of reports released by international human rights groups. Examining nine drone strikes in Pakistan, the Amnesty International report concludes that the attacks killed large numbers of innocent civilians, and accuses the U.S. of targeting rescuers who arrive in the aftermath of the strikes to aid the wounded. A report from Human Rights Watch states that the majority of people killed by six drone strikes in Yemen were civilians (57 out of the 82 killed). The groups’ findings that the United States has killed more civilians than it has admitted are bolstered by a UN report ... that stated U.S. drone strikes had killed as many as 400 civilians in Pakistan and almost 60 in Yemen. These reports clash with the U.S. government’s own assessment of the strikes. Officials have maintained that civilian casualties from drone strikes are minimal, even in the face of multiple third-party evaluations that state otherwise. Both groups are demanding that the Obama administration investigate allegations of civilian deaths, release more information about the legal basis for drone strikes on suspected terrorists, provide restitution to those unjustly harmed and reveal the identities of those who lost their lives in the attacks.

Note: If a single civilian in the US were killed by a foreign drone, the entire nation would be up in arms. Do we have a double standard here? For more on this, see concise summaries of deeply revealing war atrocities news articles from reliable major media sources.


Security Check Now Starts Long Before You Fly
2013-10-22, New York Times
http://www.nytimes.com/2013/10/22/business/security-check-now-starts-long-bef...

The Transportation Security Administration is expanding its screening of passengers before they arrive at the airport by searching a wide array of government and private databases that can include records like car registrations and employment information. It is unclear precisely what information the agency is relying upon to make these risk assessments, given the extensive range of records it can access, including tax identification number, past travel itineraries, property records, physical characteristics, and law enforcement or intelligence information. The measures go beyond the background check the government has conducted for years, called Secure Flight, in which a passenger’s name, gender and date of birth are compared with terrorist watch lists. Now, the search includes using a traveler’s passport number, which is already used to screen people at the border, and other identifiers to access a system of databases maintained by the Department of Homeland Security. “I think the best way to look at it is as a pre-crime assessment every time you fly,” said Edward Hasbrouck, a consultant to the Identity Project, one of the groups that oppose the prescreening initiatives. “The default will be the highest, most intrusive level of search, and anything less will be conditioned on providing some additional information in some fashion.” Critics argue that the problem with what the agency calls an “intelligence-driven, risk-based analysis” of passenger data is that secret computer rules, not humans, make these determinations. Civil liberties groups have questioned whether the agency has the legal authority to make these assessments.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Edward Snowden is no traitor
2013-10-21, Washington Post
http://www.washingtonpost.com/opinions/richard-cohen-edward-snowden-is-no-tra...

What are we to make of Edward Snowden? I know what I once made of him. He was no real whistleblower, I wrote, but “ridiculously cinematic” and “narcissistic” as well. As time has proved, my judgments were just plain wrong. Whatever Snowden is, he is curiously modest and has bent over backward to ensure that the information he has divulged has done as little damage as possible. As a “traitor,” he lacks the requisite intent and menace. But traitor is what Snowden has been roundly called. Harry Reid: “I think Snowden is a traitor.” John Boehner: “He’s a traitor.” Rep. Peter King: “This guy is a traitor; he’s a defector.” And Dick Cheney not only denounced Snowden as a “traitor” but also suggested that he might have shared information with the Chinese. This innuendo, as with Saddam Hussein’s weapons of mass destruction, is more proof of Cheney’s unerring determination to be cosmically wrong. The early denunciations of Snowden now seem both over the top and beside the point. If he is a traitor, then which side did he betray and to whom does he now owe allegiance? Snowden seems to have sold out to no one. In fact, a knowledgeable source says that Snowden has not even sold his life story and has rebuffed offers of cash for interviews. Maybe his most un-American act is passing up a chance at easy money. Someone ought to look into this. Snowden’s residency in Russia has been forced upon him — he had nowhere else to go. Snowden insists that neither the Russians nor, before them, the Chinese have gotten their grubby hands on his top-secret material.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Snowden Says He Took No Secret Files to Russia
2013-10-17, New York Times
http://www.nytimes.com/2013/10/18/world/snowden-says-he-took-no-secret-files-...

Edward J. Snowden, the former National Security Agency contractor, said in an extensive interview this month that he did not take any secret N.S.A. documents with him to Russia when he fled there in June, assuring that Russian intelligence officials could not get access to them. He also asserted that he was able to protect the documents from China’s spies because he was familiar with that nation’s intelligence abilities, saying that as an N.S.A. contractor he had targeted Chinese operations and had taught a course on Chinese cybercounterintelligence. “There’s a zero percent chance the Russians or Chinese have received any documents,” he said. Mr. Snowden added that inside the spy agency “there’s a lot of dissent.” But he said that people were kept in line through “fear and a false image of patriotism,” which he described as “obedience to authority.” He said he believed that if he tried to question the N.S.A.’s surveillance operations as an insider, his efforts “would have been buried forever,” and he would “have been discredited and ruined.” Mr. Snowden said he finally decided to act when he discovered a copy of a classified 2009 inspector general’s report on the N.S.A.’s warrantless wiretapping program during the Bush administration. After reading about the program, which skirted the existing surveillance laws, he concluded that it had been illegal, he said. “If the highest officials in government can break the law without fearing punishment or even any repercussions at all,” he said, “secret powers become tremendously dangerous.”

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Documents reveal NSA’s extensive involvement in targeted killing program
2013-10-16, Washington Post
http://www.washingtonpost.com/world/national-security/documents-reveal-nsas-e...

It was an innocuous e-mail, one of millions sent every day by spouses with updates on the situation at home. But this one was of particular interest to the National Security Agency and contained clues that put the sender’s husband in the crosshairs of a CIA drone. Days later, Hassan Ghul ... was killed by a drone strike in Pakistan’s tribal belt. Documents provided ... by former NSA contractor Edward Snowden confirm his demise in October 2012 and reveal the agency’s extensive involvement in the targeted killing program that has served as a centerpiece of President Obama’s counterterrorism strategy. The documents provide the most detailed account of the intricate collaboration between the CIA and the NSA in the drone campaign. [The] collection of records in the Snowden trove [make] clear that the drone campaign — often depicted as the CIA’s exclusive domain — relies heavily on the NSA’s ability to vacuum up enormous quantities of e-mail, phone calls and other fragments of signals intelligence, or SIGINT. To handle the expanding workload, the NSA created a secret unit known as the Counter-Terrorism Mission Aligned Cell, or CT MAC, to concentrate the agency’s vast resources on hard-to-find [targets]. Former CIA officials said the files are an accurate reflection of the NSA’s contribution to finding targets in a campaign that has killed more than 3,000 people [in] Pakistan.

Note: For more on the use of drones to kill abroad and spy at home, see the deeply revealing reports from reliable major media sources available here.


Privacy Fears Grow as Cities Increase Surveillance
2013-10-14, New York Times
http://www.nytimes.com/2013/10/14/technology/privacy-fears-as-surveillance-gr...

Federal grants of $7 million, initially intended to help thwart terror attacks at the port in Oakland, Calif., are instead going to a police initiative that will collect and analyze reams of surveillance data. The new system ... is the latest example of how cities are compiling and processing large amounts of information, known as big data, for routine law enforcement. And the system underscores how technology has enabled the tracking of people in many aspects of life. Like the Oakland effort, other pushes to use new surveillance tools in law enforcement are supported with federal dollars. The New York Police Department, aided by federal financing, has a big data system that links 3,000 surveillance cameras with license plate readers, radiation sensors, criminal databases and terror suspect lists. Police in Massachusetts have used federal money to buy automated license plate scanners. And police in Texas have bought a drone with homeland security money. [Critics] of the Oakland initiative, formally known as the Domain Awareness Center, [say] the program, which will create a central repository of surveillance information, will also gather data about the everyday movements and habits of law-abiding residents. Oakland has a contract with the Science Applications International Corporation, or SAIC, to build its system. That company has earned the bulk of its $12 billion in annual revenue from military contracts.

Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


The Snowden files: why the British public should be worried about GCHQ
2013-10-03, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/oct/03/edward-snowden-files-john-lanche...

The problem and the risk [with surveillance by GCHQ] comes in the area of mass capture of data, or strategic surveillance. This is the kind of intelligence gathering that sucks in data from everyone, everywhere: from phones, internet use from email to website visits, social networking, instant messaging and video calls, and even areas such as video gaming; in short, everything digital. In the US, the Prism programme may have given the NSA access to the servers of companies such as Google and Facebook; in the UK, GCHQ has gained a similar degree of access via its Tempora programme, and the two of them together have a cable- and network-tapping capabilities collectively called Upstream, which have the ability to intercept anything that travels over the internet. This data is fed into a database called XKeyscore, which allows analysts to extract information "in real time", ie immediately. What this adds up to is a new thing in human history: with a couple of clicks of a mouse, an agent of the state can target your home phone, or your mobile, or your email, or your passport number, or any of your credit card numbers, or your address, or any of your log-ins to a web service. Using that "selector", the state can get access to all the content of your communications, via any of those channels; can gather information about anyone you communicate with, can get a full picture of all your internet use, can track your location online and offline. It can, in essence, know everything about you, including – thanks to the ability to look at your internet searches – what's on your mind.

Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"