Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Christopher Steele, the former MI6 agent who investigated Donald Trump’s alleged Kremlin links, was so worried by what he was discovering that at the end he was working without pay. Mr Steele also decided to pass on information to both British and American intelligence officials after concluding that such material should not just be in the hands of political opponents of Mr Trump, who had hired his services, but was a matter of national security. However, say security sources, Mr Steele became increasingly frustrated that the FBI was failing to take action on the intelligence. He came to believe there was a cover-up, that a cabal within the Bureau blocked a thorough inquiry into Mr Trump. A colleague of Mr Steele in Washington, Glenn Simpson, a former Wall Street Journal reporter who runs the firm Fusion GPS, felt the same way. Fusion GPS had been hired by Republican opponents of Mr Trump in September 2015. In June 2016 Mr Steele came on the team. In July, Mr Trump won the Republican nomination and the Democrats became new employers of Mr Steele and Fusion GPS. By September ... Mr Steele [had] compiled a set of his memos into one document and passed it to his contacts at the FBI. But there seemed to be little progress in a proper inquiry into Mr Trump. The Bureau, instead, seemed to be devoting their resources in the pursuit of Hillary Clinton’s email transgressions. The New York office, in particular, appeared to be on a crusade against Ms Clinton.
Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss this provocative article by Glenn Greenwald and this interview he gave to Fox News. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the manipulation of public perception.
It was known as the “secret war,” but the covert campaign the Kennedy administration waged against Fidel Castro in the years after the Bay of Pigs rivaled open warfare in time, effort and money spent. It was a war waged largely by the Central Intelligence Agency from an informal command post at what was then the south campus of the University of Miami - home to JMWAVE, the code name for the biggest CIA station in the world outside Langley, Virginia. From there, upward of 400 full-time CIA officers toiled, plotting the covert campaign against Cuba, ranging from sabotage to assassination. Its chief from 1962 to 1965 ... was Ted Shackley. But Shackley was not the real commander of the covert war. That role fell to Robert F. Kennedy, the U.S. attorney general and brother of the president. By the fall of 1961, under intense prodding from Robert Kennedy, the U.S. policy had evolved into Operation Mongoose, the code name for a multiagency covert action plan designed to bring down Castro. The basic concept of the entire operation was to “bring about the revolt of the Cuban people ... and institute a new government,” [Mongoose operations chief Brig. Gen. Edward] Lansdale [said]. The budget of the Miami station has been estimated at $50 million annually during its peak years. In the most active period - roughly 1962 to 1964 - several thousand Cubans were on the payroll for a variety of tasks, ranging from sabotage and infiltration runs to Cuba to propaganda activities.
Note: A 1967 report declassified in 2003 describes some of the CIA's many plans to kill or embarrass Fidel Castro. For more along these lines, see concise summaries of deeply revealing intelligence agency news articles from reliable major media sources.
The poster child of the American torture program sits in a Guantanamo Bay prison cell, where many U.S. officials hope he will simply be forgotten. Zayn al-Abidin Muhammad Husayn, known to the world as Abu Zubaydah ... was the “guinea pig” of the CIA torture program. He was the first prisoner sent to a secret CIA “black site,” the first to have his interrogation “enhanced ” and the only prisoner subjected to all of the CIA’s approved techniques, as well as many that were not authorized. He is the man for whom the George W. Bush administration wrote the infamous torture memo in the summer of 2002. Senior officials thought he had been personally involved in every major al-Qaeda operation, including 9/11. Today, the United States acknowledges that assessment was, to put it graciously, overblown. His extended torture provided no actionable intelligence about al-Qaeda’s plans. He has never been charged with a violation of U.S. law, military or civilian, and apparently never will be formally charged. Instead, he languishes at Guantanamo. After years in secret prisons around the world, he remains incommunicado, with no prospect of trial. Who is Zubaydah, really? Public understanding about Zubaydah remains remarkably controlled and superficial. In connection with Zubaydah’s stalled case seeking federal court review of his detention, the government has recently agreed to clear for public release a few of the letters he has written to us. These brief letters [are] published here for the first time.
Note: The use of humans as guinea pigs in government, military, and medical experiments has a long history. For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Government lawyers on Thursday continued their fight to bury the Senate Torture Report, arguing before the D.C. District Court of Appeals that the 6,700-page text could not be released on procedural grounds. When the 500-page executive summary of the report was released more than a year ago, it prompted international outcry and renewed calls for prosecution. The summary describes not only the CIA’s rape and torture of detainees, but also how the agency consistently misrepresented the brutality and effectiveness of the torture program. But many of the most graphic details are in Volume III of the full report, which former Senate Intelligence Committee chair Dianne Feinstein has said contains “excruciating” details on “each of the 119 known individuals who were held in CIA custody.” On the same day the executive summary was released, the Intelligence Committee sent copies of the full report to executive branch agencies with instructions ... that they be used “as broadly as appropriate to make sure that this experience is never repeated.” Last year, after succeeding Feinstein as chair, Sen. Richard Burr, R-Ga., requested that the copies distributed to federal agencies be returned to Congress, prompting a legal standoff. In the meantime ... the Justice Department has “refuse[d] to allow executive branch officials to review the full and final study.”
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
692 felony convictions in California ... were thrown out between 1989 and 2012 based on errors or misconduct by police, prosecutors, defense lawyers or judges, according to a new study by researchers at UC Berkeley and the University of Pennsylvania. The report ... didn’t include misdemeanor cases, which amount to about 80 percent of all prosecutions, or juvenile cases. And it also excluded the costs of jailing people who were later released without charges, which may amount to $70 million a year, the report said. The study examined only records from California and ... looked at cases in which felony convictions were overturned and the defendants were later cleared. More than half the cases involved prosecutors’ wrongful withholding of evidence. One example was that of former Black Panther Elmer “Geronimo” Pratt. Pratt was convicted in 1972 of murdering schoolteacher Carolyn Olson [in 1968] and was sentenced to life in prison, based in part on [witness] testimony. He was freed in 1999 after a judge found that prosecutors had withheld evidence that the witness was an informant for the FBI, which was then trying to discredit Pratt as part of its Cointelpro campaign. The authors questioned long-standing laws that shield prosecutors from lawsuits by criminal defendants. They said they knew of no other profession that received immunity for “intentional wrongdoing that gravely injures another.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the prison system.
The Federal Bureau of Investigation has quietly developed a new way to measure its success in the war on terror: counting the number of terror threats it has “disrupted” in a year. In the section on “Performance Measures” in the FBI’s latest financial statement, the bureau reports 440 “terror disruptions” in the 12-month period ending on September 30, 2015. That’s ... more than three times the 2015 “target” of 125. In a vacuum, that would appear to suggest that the FBI’s terror-fighting mission - which sucked ... 54 percent of the bureau’s $9.8 billion budget in 2015 - is exceeding expectations. But that number - 440 - is much higher than the number of arrests reported by the FBI. The Washington Post counted about 60 terror-related arrests in 2015. Of those arrests, many were of people trying to travel abroad or trying to help others do so. Many more involved people planning attacks that were essentially imaginary, often goaded by FBI informants. There was only one genuinely “foiled attack” in the United States between January 2014 and September 2015. And that one ... was stopped by the local police department. The fact that the agency establishes a target for terrorism disruptions is also troubling, said Michael German, a former FBI agent.
Note: The FBI has made a habit of manufacturing "terrorist plots" from thin air. Now it appears that activities reminiscent of COINTELPRO are again being carried out to justify massive anti-terrorism spending. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
A UN panel will conclude Wikileaks founder Julian Assange is being "arbitrarily detained" in the UK, the Swedish foreign ministry has said. Mr Assange, 44, claimed asylum in London's Ecuadorean embassy in 2012. The Met Police says Mr Assange will be arrested if he leaves the embassy. The Australian was originally arrested in London in 2010 under a European Arrest Warrant issued by Sweden over rape and sexual assault claims. In 2012, while on bail, he claimed asylum inside the Ecuadorean embassy in Knightsbridge after the UK Supreme Court had ruled the extradition against him could go ahead. Mr Assange's Wikileaks organisation posted secret American government documents on the internet, and he says Washington could seek his extradition to the US to face espionage charges if he is sent to Sweden. In the statement, published earlier by Wikileaks on Twitter, Mr Assange said: "Should the UN announce tomorrow that I have lost my case against the United Kingdom and Sweden I shall exit the embassy at noon on Friday to accept arrest by British police ... However, should I prevail and the state parties be found to have acted unlawfully, I expect the immediate return of my passport and the termination of further attempts to arrest me." Last October, Scotland Yard said it would no longer station officers outside the Ecuador embassy following an operation which it said had cost Ł12.6m. But it said "a number of overt and covert tactics to arrest him" would still be deployed.
Note: Read more about the "legal limbo" and propaganda campaign carried out against Assange and Wikileaks. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
From 2011 to 2013, the most elite forces in the U.S. military, supported by the CIA and other elements of the intelligence community, set out to destroy the Taliban and al Qaeda forces that remained hidden ... along Afghanistan’s northeastern border with Pakistan. Dubbed Operation Haymaker, the campaign has been described as a potential model for the future of American warfare. The military’s own analysis demonstrates that the Haymaker campaign was in many respects a failure. The vast majority of those killed in airstrikes were not the direct targets. Nor did the campaign succeed in significantly degrading al Qaeda’s operations in the region. The frequency with which “targeted killing” operations hit unnamed bystanders is among the more striking takeaways from the Haymaker slides. [Documents obtained by The Intercept] show that during a five-month stretch of the campaign, nearly nine out of 10 people who died in airstrikes were not the Americans’ direct targets. Larry Lewis, formerly a principal research scientist at the Center for Naval Analyses, ... found that drone strikes in Afghanistan were 10 times more likely to kill civilians than conventional aircraft. This month, an American airstrike on a hospital run by the international organization Médecins Sans Frontičres ... killed at least a dozen members of the humanitarian group’s medical staff and 10 patients, including three children. A nurse on the scene recalled seeing six victims in the intensive care unit ablaze in their beds.
Note: Read more about the major failings of US drone attacks. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
In 1986, the director of Britain's premier domestic spy agency told Margaret Thatcher's cabinet secretary the risk of "embarrassment" from publicizing a politician's suspected child abuse was greater than the "danger" he presented. CBS News partner network Sky News reported the new twist in Britain's long and still-unfolding child sexual abuse scandal on Thursday, saying then-MI5 director Sir Antony Duff had told Prime Minister Thatcher's staffer "the risks of political embarrassment to the government is rather greater than the security danger." The name of the Member of Parliament Duff had been asked to investigate, over allegations he had a "penchant for small boys," has not been revealed, but Sky reported Wednesday that four former senior politicians were named in previously unseen government documents on abuse. All four have been dead for years, but they were senior members of Thatcher's cabinet. Over the course of several years the sex abuse scandal has snowballed, revealing - at best - a pervasive lax attitude among British law enforcement, politicians and celebrity culture toward the abuse of children during the 1970s and 80s. The ongoing police investigation has already landed some big names from British culture ... in jail for abuses committed during the height of their popularity. Others have been posthumously revealed as serial abusers. Sky's investigation, however, is the first time any suggestion of a possible cover-up of abuse by senior government officials has emerged.
Note: The Thatcher government was reported to have covered up a VIP pedophile ring. Watch an excellent segment by Australia's "60-Minutes" team "Spies, Lords and Predators" on a pedophile ring in the UK which leads directly to the highest levels of government. A second suppressed documentary, "Conspiracy of Silence," goes even deeper into this topic in the US. For more along these lines, see concise summaries of deeply revealing sexual abuse scandal news articles from reliable major media sources.
Germany has been spying and eavesdropping on its closest partners in the EU and passing the information to the US for more than a decade, a parliamentary inquiry in Berlin has found, triggering allegations of lying and coverups reaching to the very top of Angela Merkel’s administration. Under a 2002 pact between German intelligence (BND) and the NSA, Berlin used its largest electronic eavesdropping facility in Bavaria to monitor email and telephone traffic at the Élysée Palace, the offices of the French president, and of key EU institutions in Brussels including the European commission. The BND’s biggest listening post at Bad Aibling in Bavaria was abused for years for NSA spying on European states. “The core is the political spying on our European neighbours and EU institutions,” an unnamed source said to be familiar with the evidence told the Süddeutsche. As well as the political intelligence activities, the NSA also got the BND to spy on European aerospace and defence firms. German and American individuals and companies were not monitored. The Bad Aibling complex of listening posts was an NSA facility for years. Under an agreement in 2002, it was handed over to the Germans in 2004. Since then, much of the information gleaned was routinely passed to the Americans. According to the Süddeutsche, the Americans supplied search terms on a weekly basis to the Germans – totalling 690,000 phone numbers and 7.8m IP addresses up until 2013.
Note: Many countries claim they don't spy on their own citizens. What they do is have agreements to spy on each other's citizens so that they can then share the information and still technically claim they are not breaking any laws. This article shows how it works. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of privacy rights from reliable major media sources.
After the first revelations of domestic surveillance by NSA whistleblower Edward Snowden, President Obama defended the spying programs by claiming they were “subject to congressional oversight and congressional reauthorization and congressional debate.” But as Rep. Alan Grayson, D-Fla., and other members of Congress have pointed out, there is essentially a "two-tiered" system for oversight, with lawmakers and staff on specialized committees, such as the House and Senate committees on Intelligence and Homeland Security, controlling the flow of information and routinely excluding other Congress members. A large number of lobbyists and consultants [pass] through the revolving door between the intelligence community and the watchdogs who purportedly oversee the intelligence community. Lobbyist influence is a particularly sensitive issue when it comes to intelligence committees, since those committees oversee secret “black budgets” in which money is disbursed with greatly reduced public oversight. The potential for self dealing is significant; former Rep. Randy “Duke” Cunningham, R-Calif., was caught accepting bribes to essentially earmark government contracts into a black budget. Lobbyist control over the House and Senate intelligence and homeland security committees may have a profound impact on a range of surveillance issues debated by Congress this year, including the Cybersecurity Information Sharing Act and the Patriot Act.
Note: The above article details several examples of industry lobbyists now operating in key government oversight positions within an unaccountable intelligence establishment. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in intelligence agencies.
Pete Seeger, composer of classic American folk tunes including "If I Had a Hammer" and "Where Have All the Flowers Gone?", was spied on by FBI agents for more than two decades because he wrote a protest letter as a young man concerned about plans to deport tens of thousands of Japanese American citizens at the end of the second world war. A vast file on Seeger was released ... in response to a request under the freedom of information act. The bureau’s spies first took an interest in the singer in 1943, [and continued] into the early 1970s. The suspicion was that Seeger, who died in early 2014, was a security risk with close connections to the Communist party. The FBI file on him has nearly 1,800 pages – 90 of them are still withheld for security reasons. Throughout the 1950s, when Seeger was part of the Weavers folk group, the bureau commissioned hundreds of reports on him. As the Weavers scored chart hits, Seeger was blacklisted for his suspected Communist party links. In 1955 he was called before the House Committee on un-American Activities and asked if he was a communist. “I am not going to answer any questions as to my associations, my philosophical or religious beliefs or my political beliefs or how I voted in any election or any of these private affairs,” Seeger replied. Two years later he was cited for contempt of Congress and then, four years later, found guilty and sentenced to a year in prison. Let free on bail, Seeger’s conviction was overturned a year later.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The “war on terror” is not the CIA’s first venture into human experimentation. At the dawn of the Cold War, German scientists and doctors with Nazi records of human experimentation were given new identities and brought to the United States under Operation Paperclip. In 1953, the CIA established the MK-ULTRA program, [which] evolved into experiments in psychological torture. During the Vietnam War, the CIA developed the Phoenix program, which combined psychological torture with brutal interrogations, human experimentation and extrajudicial executions. In 1963, the CIA produced a manual titled “Kubark Counterintelligence Interrogation” to guide agents in the art of extracting information. An updated version of the Kubark guide [was] produced in 1983 and titled “Human Resource Exploitation Manual” [for CIA supported] right-wing regimes in Latin America and Southeast Asia. Here we are again. On April 15, 2002, [psychologists hired by the CIA] Mitchell and Jessen arrived at a black site in Thailand to supervise the interrogation of Abu Zubaydah, the first “high-value detainee” captured by the CIA. From then ... at least thirty-eight people were subjected to psychological and physical torments, and the results were methodically documented and analyzed. That is the textbook definition of human experimentation.
Note: For more along these lines, see this list depicting the rampant use of humans as guinea pigs in government, military, and medical experiments over the last century, or watch "Human Resources", a two-hour documentary on the subject. For more, see the excellent, reliable resources provided in our Mind Control Information Center.
The intrusions into former CBS News correspondent Sharyl Attkisson’s computers constitute the narrative spine of the reporter’s new book “Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington.” In October 2012, right in the midst of the Benghazi story ... a person who’s identified as “Jeff” warns Attkisson: “I’ve been reading your reports online about Benghazi. It’s pretty incredible. Keep at it. But you’d better watch out.” So CBS News hires an independent computer analyst whom Attkisson identifies as "Jerry Patel." He finds a massive amount of suspicious activity in the computer. Intrusions of this caliber, concludes “Patel,” are “far beyond the the abilities of even the best nongovernment hackers.” In summing up, Attkisson writes, “Everything Patel has found serves to confirm my January source and analysis. Patel tells me that only a few entities possess these skills. One of them is the U.S. government. [Computer security specialist] Don Allison ... takes a close look at Attkisson’s iMac. The results: “While a great deal of data has been expertly wiped in an attempt to cover-up the deed, Don is able to find remnants of what was once there. There’s key evidence of a government computer connection to my computer. A sort of backdoor link that leads to an ISP address for a government computer that can’t be accessed by the general public on the Web. It’s an undeniable link to the U.S. government.”
Note: For lots more on this courageous reporter and suppression of vital news, read this article and this one. Then read even more mind-blowing reports of news suppression by top journalists.
TERRY GROSS: James Risen [is] an investigative reporter for The New York Times. He, along with Eric Lichtbau, broke the story about warrantless wiretapping. Now Risen is facing a prison sentence for refusing to reveal his source or sources for that story. [Risen] has a new book called "Pay Any Price: Greed, Power And Endless War," which is a series of investigations into who's making money on the War on Terror and what are some of the secret operations within it. You recently wrote an article in The New York Times with Laura Poitras who broke the Edward Snowden story along with Glenn Greenwald. And you reported on how American intelligence is trying to harvest facial imagery with the intention of - what's it for? RISEN: Facial recognition ... in a way that no [one] really understood before has become a central focus of the NSA today. They can link that up with a signals intelligence, which is the communications that they intercept [and] basically find where you are, what you're doing, who you're seeing and virtually anything about you in real time. GROSS: So ... your big story turned out kind of differently than the celebrations facing Woodward and Bernstein. RISEN: I think the times have changed. We had this period in journalism for about 30 years where there was the government and the press. The government ... wouldn't go after whistleblowers or reporters very aggressively. It's only after the - after 9/11 and after the plane case, which you may remember where Judy Miller was sent to jail. I think the post-9/11 age, the government has decided to become much more aggressive against reporters and whistleblowers.
Note: The above quotes are from the transcript of a radio interview that you can listen to by clicking on the news story link provided. For more along these lines, see concise summaries of deeply revealing stories about high level manipulation of mass media from reliable sources.
In the space of a single primetime address on [September 10], Barack Obama dealt a crippling blow to a creaking, 40-year old effort to restore legislative primacy to American warmaking. The administration’s rationale, at odds with the war it is steadily expanding, is to forestall an endless conflict foisted upon it by a bloodthirsty legislature. Yet one of the main authorities Obama is relying on for avoiding Congress is the 2001 ... document known as the Authorization to Use Military Force (AUMF) that few think actually applies to ISIS. Taken together with the congressional leadership’s shrug, Obama has stripped the veneer off a contemporary fact of American national security: presidents make war on their own, and congresses acquiesce. An allergy to congressional authorisation is enmeshed with the president’s stated desire to end what he last year termed a “perpetual war” footing. It has led Obama in directions legal scholars consider highly questionable. Not only has Obama rejected restrictions of his warmaking power, he has also rejected legislative expansions of it - a more curious choice. Obama has been wary that Congress will offer up new laws that entrench and expand an amorphous war that, in his mind, he has waged with the minimum necessary amount of force. Obama last year advocated the eventual repeal of the 2001 authorisation - as well as the 2002 congressional approval of the Iraq war - to aid in turning a page on a long era of US warfare. [After Obama's address] a senior administration official told reporters that the 2001 authorisation covered the war against ISIS.
Note: The war machine marches on as the US presidency claims ever more power over Congress. For more on this, see concise summaries of deeply revealing war news articles from reliable major media sources.
The CIA brought top al-Qaeda suspects close “to the point of death” by drowning them in water-filled baths during interrogation sessions in the years that followed the September 11 attacks, a security source has told The Telegraph. The description of the torture meted out to at least two leading al-Qaeda suspects, including the alleged 9/11 mastermind Khalid Sheikh Mohammed, far exceeds the conventional understanding of waterboarding, or “simulated drowning” so far admitted by the CIA. “They weren’t just pouring water over their heads or over a cloth,” said the source who has first-hand knowledge of the period. “They were holding them under water until the point of death, with a doctor present to make sure they did not go too far. This was real torture.” The account of extreme CIA interrogation comes as the US Senate prepares to publish a declassified version of its so-called Torture Report – a 3,600-page report document based on a review of several million classified CIA documents. Publication of the report is currently being held up by a dispute over how much of the 480-page public summary should remain classified, but it is expected to be published within weeks. A second source who is familiar with the Senate report told The Telegraph that it contained several unflinching accounts of some CIA interrogations which – the source predicted – would “deeply shock” the general public.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
Florida’s former U.S. Sen. Bob Graham ... has been fighting both the Bush and Obama administrations to declassify 28 pages of a 9/11 intelligence report that may detail and expose the efforts of members of the Saudi Arabian royal family in aiding and abetting [9/11] terrorists in Florida, many who were themselves Saudi. Graham is befuddled as to why the Obama administration does not release these documents, which he read when he was chair of the Senate Select Intelligence Committee and co-chair of a congressional inquiry into the 9/11 attacks. As a result, he has joined a Freedom of Information Act request alongside others, asking that 80,000 pages of information on a Saudi family that disappeared just before the attacks be made public. “It isn’t credible that 19 people — most [of whom] could not speak English well and did not have experience in the United States — could carry out such a complicated task without external assistance,” Graham insists. The Saudi family living in Sarasota fled to Saudi Arabia just prior to the 9/11 attacks. Were they tipped off that they should leave? If so, by whom? Graham believes that there was a deliberate effort to cover up Saudi involvement in the tragedy of 9/11 by the Bush administration, one, he says, that the Obama administration appears to support. The American public needs to know. The families of those who were lost to the 9/11 attacks or those who fought in Afghanistan and Iraq deserve an answer as well.
Note: For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.
[Google engineers] are making it far more difficult — and far more expensive — for the National Security Agency and the intelligence arms of other governments around the world to pierce their systems. As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps. After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant. But governments are fighting back, harder than ever. The cellphone giant Vodafone reported ... that a “small number” of governments around the world have demanded the ability to tap directly into its communication networks [and] noted that some countries did not issue warrants to obtain phone, email or web-searching traffic, because “the relevant agencies and authorities already have permanent access to customer communications via their own direct link.”
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Just before Edward Snowden became a household name, the ACLU argued before the supreme court that the FISA Amendments Act – one of the two main laws used by the NSA to conduct mass surveillance – was unconstitutional. In a sharply divided opinion, the Supreme Court ruled, 5-4, that the case should be dismissed because the plaintiffs didn't have "standing". The court relied on two claims by the Justice Department to support their ruling: 1) that the NSA would only get the content of Americans' communications without a warrant when they are targeting a foreigner abroad for surveillance, and 2) that the Justice Department would notify criminal defendants who have been spied on under the Fisa Amendments Act, so there exists some way to challenge the law in court. It turns out that neither of those statements were true. One of the most explosive Snowden revelations exposed a then-secret technique known as "about" surveillance. As the New York Times first reported, the NSA "is searching the contents of vast amounts of Americans' e-mail and text communications into and out of the country, hunting for people who mention information about foreigners under surveillance." In other words, the NSA doesn't just target a contact overseas – it sweeps up everyone's international communications into a dragnet and searches them for keywords. The Snowden leaks also pushed the Justice Department to admit ... that the government hadn't been notifying any defendants they were being charged based on NSA surveillance.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.