Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden. The confidential memo reveals that the NSA encourages senior officials in its "customer" departments, such as the White House, State and the Pentagon, to share their "Rolodexes" so the agency can add the phone numbers of leading foreign politicians to their surveillance systems. The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately "tasked" for monitoring by the NSA. The revelation is set to add to mounting diplomatic tensions between the US and its allies, after the German chancellor Angela Merkel ... accused the US of tapping her mobile phone. The NSA memo obtained by the Guardian suggests that such surveillance was not isolated, as the agency routinely monitors the phone numbers of world leaders – and even asks for the assistance of other US officials to do so. The memo, dated October 2006 and which was issued to staff in the agency's Signals Intelligence Directorate (SID), was titled "Customers Can Help SID Obtain Targetable Phone Numbers". In the wake of the Merkel row, the US is facing growing international criticism that any intelligence benefit from spying on friendly governments is far outweighed by the potential diplomatic damage.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The problem and the risk [with surveillance by GCHQ] comes in the area of mass capture of data, or strategic surveillance. This is the kind of intelligence gathering that sucks in data from everyone, everywhere: from phones, internet use from email to website visits, social networking, instant messaging and video calls, and even areas such as video gaming; in short, everything digital. In the US, the Prism programme may have given the NSA access to the servers of companies such as Google and Facebook; in the UK, GCHQ has gained a similar degree of access via its Tempora programme, and the two of them together have a cable- and network-tapping capabilities collectively called Upstream, which have the ability to intercept anything that travels over the internet. This data is fed into a database called XKeyscore, which allows analysts to extract information "in real time", ie immediately. What this adds up to is a new thing in human history: with a couple of clicks of a mouse, an agent of the state can target your home phone, or your mobile, or your email, or your passport number, or any of your credit card numbers, or your address, or any of your log-ins to a web service. Using that "selector", the state can get access to all the content of your communications, via any of those channels; can gather information about anyone you communicate with, can get a full picture of all your internet use, can track your location online and offline. It can, in essence, know everything about you, including – thanks to the ability to look at your internet searches – what's on your mind.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The owner of the e-mail service [Lavabit, Ladar Levison,] said he closed it down after the government, in pursuit of Edward J. Snowden, sought untrammeled access to the protected messages of all his customers. Mr. Levison was willing to allow investigators with a court order to tap Mr. Snowden’s e-mail account; he had complied with similar narrowly targeted requests involving other customers about two dozen times. But they wanted more, he said: the passwords, encryption keys and computer code that would essentially allow the government untrammeled access to the protected messages of all his customers. That, he said, was too much. On Aug. 8, Mr. Levison closed Lavabit rather than, in his view, betray his promise of secure e-mail to his customers. On [October 2], a federal judge unsealed documents in the case, allowing the tech entrepreneur to speak candidly for the first time about his experiences. He had been summoned to testify to a grand jury in Virginia; forbidden to discuss his case; held in contempt of court and fined $10,000 for handing over his private encryption keys on paper and not in digital form; and, finally, threatened with arrest for saying too much when he shuttered his business. While Mr. Levison’s struggles have been with the F.B.I., hovering in the background is the N.S.A., which has worked secretly for years to undermine or bypass encrypted services like Lavabit so that their electronic message scrambling cannot obstruct the agency’s spying. Mr. Levison’s case shows how law enforcement officials can use legal tools to pry open messages, no matter how well protected.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The US National Security Agency spied on civil rights leader Martin Luther King and boxer Muhammad Ali during the height of the Vietnam War protests, declassified documents reveal. The documents show the NSA also tracked journalists from the New York Times and the Washington Post and two senators. Some NSA officials later described the programme as "disreputable if not outright illegal", the documents show. The operation, dubbed "Minaret", was originally exposed in the 1970s. However, the names of those on the phone-tapping "watch list" had been kept secret until now. The secret papers were published after a government panel ruled in favour of researchers at George Washington University. The university's National Security Archive - a research institute that seeks to check government secrecy - described the names on the NSA's watch-list as "eye-popping". The agency eavesdropped on civil rights leaders Martin Luther King and Whitney Young as well as boxing champion Muhammad Ali, New York Times journalist Tom Wicker and Washington Post columnist Art Buchwald. The NSA also monitored the overseas phone calls of two prominent US senators - Democrat Frank Church and Republican Howard Baker. In 1967 the strength of the anti-war campaign led President Lyndon Johnson to ask US intelligence agencies to find out if some protests were being stoked by foreign governments. Many of those targeted were considered to be critics of US involvement in the Vietnam War. The NSA worked with other spy agencies to draw up the "watch lists" of anti-war critics, tapping their phone calls. The programme continued after Richard Nixon entered the White House in 1969.
Note: These names were kept secret until now allegedly for reason of "national security." Note how this term is repeatedly used to cover up illegal government activity solely to protect those who commit these crimes. For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
One of the most overlooked aspects of the NSA reporting in the US has been just how global of a story this has become. Last week it was revealed that Belgium's largest telecom, Belgacom, was the victim of a massive hacking attack which systematically compromised its system for as long as two years. Last week, using documents obtained from NSA whistleblower Edward Snowden, Laura Poitras and other Der Spiegel journalists reported in that paper that it was the GCHQ, Britain's intelligence agency, that was behind the attack. According to that report, the attack was carried out by targeting individual engineers at the telecom with malware that allowed GCHQ agents to "own" their computer and thus exploit their access to the telecommunications system. As the US and UK run around the world protesting the hacking activities of others and warning of the dangers of cyber-attacks, that duo is one of the most aggressive and malicious, if not the most aggressive and malicious, perpetrators of those attacks of anyone on the planet. Nobody hacks as prolifically and aggressively as the two countries who most vocally warn of the dangers of hacking. A coalition called Stop Watching Us has been formed by privacy and civil liberties groups from across the political spectrum. On October 26, the 12th anniversary of the enactment of the Patriot Act, they will hold an anti-surveillance rally in Washington DC.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
GCHQ has received at least Ł100 million from the US to help fund intelligence gathering, raising questions over American influence on the British agencies. The money was paid across a range of projects over three years and resulted in GCHQ spying on behalf of America, according to leaked documents. It also emerged that the intelligence agency wants the ability to “exploit any phone, anywhere, any time” and that some staff have raised concerns over the “morality and ethics” of their operational work. The payments from the US National Security Agency (NSA) are detailed in GCHQ’s annual “investment portfolios”, leaked by Mr Snowden to The Guardian. The NSA paid GCHQ Ł22.9 million in 2009, Ł39.9 million in 2010 and Ł34.7 million in 2011/12. The 2010 funding included ... Ł17.2 million for the agency’s “Mastering the Internet” project, which gathers “raw” information from the web to be analysed. In return, GCHQ has to have the American view in mind when prioritising work, the papers claim. One strategy briefing disclosed the pressure on GCHQ to meet NSA demands, saying: “GCHQ must pull its weight and be seen to pull its weight.” In another document, from 2010, GCHQ apparently acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Former FBI supervisor John Morris thought he had left his sordid relationship with James "Whitey" Bulger back in Boston along with the envelopes of money, the cases of expensive wine, the home-cooked meals he had prepared for the accused mob boss. Then the phone rang one night. It was 1995 and Bulger had become a fugitive from justice. It was Bulger on the phone. And he was livid. A Boston newspaper had reported that Bulger was a longtime FBI informant, and Bulger wanted Morris to have the story retracted. "He said if he was going to jail ... I was going with him." Morris testified in the trial of Bulger, 83, who is accused of a string of crimes, including 19 murders. Testimony during the trial has stated Bulger ran a criminal enterprise with the help of corrupt FBI agents [John] Connolly and Morris, and that Bulger was an FBI informant concerning his criminal rivals. Morris' testimony put a spotlight on a staggering amount of corruption in the Boston FBI field office that included cash bribes and tip-offs to wiretaps. Connolly's relationship with Bulger extended into the Massachusetts State House, Morris testified. His friendship with Bulger's brother, then Senate President William Bulger, [could] land him a job as the Boston police commissioner upon his retirement from the bureau. Connolly's behavior did not raise any eyebrows with the Special Agents in Charge of the Boston FBI field office, Morris told the court. In fact it was quite the opposite. FBI bosses sought Connolly's friendship, Morris testified. "He had tremendous access across the board to everything including sports events, political figures," Morris testified.
Note: For more on major corruption within the FBI and other intelligence services, see the deeply revealing reports from reliable major media sources available here.
The peculiar circumstances of journalist Michael Hastings' death in Los Angeles last week have unleashed a wave of conspiracy theories. Now there's another theory to contribute to the paranoia: According to a prominent security analyst, technology exists that could [have] allowed someone to hack his car. Former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarke [said] that what is known about the single-vehicle crash is "consistent with a car cyber attack." Clarke said, "There is reason to believe that intelligence agencies for major powers" -- including the United States -- know how to remotely seize control of a car. "It's relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn't want acceleration, to throw on the brakes when the driver doesn't want the brakes on, to launch an air bag," Clarke told The Huffington Post. Hastings was driving a 2013 Mercedes C250 coupe when he crashed into a tree on Highland Ave. in Los Angeles at approximately 4:30 am on June 18. Video posted online showed the car in flames, and one neighbor told a local news crew she heard a sound like an explosion. Another eyewitness said the car's engine had been thrown 50 to 60 yards from the car. There were no other vehicles involved in the accident. The fire was so all-consuming that it took the Los Angeles County coroner's office two days to identify Hastings' body, but Clarke said a cyber attack on the vehicle would have been nearly impossible to trace "even if the dozen or so computers on board hadn't melted."
Note: For a video of a DARPA specialist talking about how any computerized function of a car can be taken over, click here. This news article shows how a university test proved a car's onboard computer can be hacked. For an excellent video presenting powerful evidence that Hastings' death was anything but suicide, click here. For a Fox News video showing other evidence of premeditated murder, click here. In this video, a good friend states he had just received an email from Hastings that he had a story on the CIA that would be the biggest story yet. A later email then said he was worried as he was now under FBI investigation.
[Barrett] Brown is not a household name like Edward Snowden or Bradley Manning. But after helping expose a dirty tricks plot, he faces jail. Brown made a splash in February 2011 by helping to uncover "Team Themis", a project by intelligence contractors retained by Bank of America to demolish the hacker society known as Anonymous. The Team Themis story began in late 2010, when Julian Assange warned WikiLeaks would release documents outlining an "ecosystem of corruption [that] could take down a bank or two." Bank of America went into damage-control mode and, as the New York Times reported, assembled "a team of 15 to 20 top Bank of America officials … scouring thousands of documents in the event that they become public." Days later, Bank of America retained the well-connected law firm of Hunton & Williams [which] "proposed various schemes to attack" WikiLeaks. Its partners suggested creating false documents and fake personas to damage progressive organizations. The tech companies' emails – which Anonymous hacked and Barrett Brown helped publicize – listed planned tactics: "Feed[ing] the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error." Brown [has] been cooling his heels in a jail outside Dallas ... awaiting two separate trials that could put him on ice for more than 100 years. In contrast to the FBI's aggressive pursuit of Brown, no probe of the Team Themis project was launched – despite a call from 17 US House representatives to investigate a possible conspiracy to violate federal laws.
Note: With the wide focus on the privatized national security state by the leaks from Edward Snowden, there is renewed interest in Brown's plight and the campaign for justice in his case. For more on this and to support Barret Brown, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.
Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA). The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate. One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects. This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets. The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden. Britain's technical capacity to tap into the cables that carry the world's communications ... has made GCHQ an intelligence superpower. A total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.
Note: For solid evidence spy agencies targeted even top politicians, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.
Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic. The disclosure raises new questions about the boundaries of surveillance by GCHQ [Government Communications Headquarters] and its American sister organisation, the National Security Agency [NSA], whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. They reveal that during G20 meetings in April and September 2009 GCHQ used what one document calls "ground-breaking intelligence capabilities" to intercept the communications of visiting delegations. This included: • Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates' use of computers; • Penetrating the security on delegates' BlackBerrys to monitor their email messages and phone calls; • Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit.
Note: For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here
Since 9/11, there has been, at first secretly but increasingly openly, a revocation of the bill of rights for which this country fought over 200 years ago. In particular, the fourth and fifth amendments of the US constitution, which safeguard citizens from unwarranted intrusion by the government into their private lives, have been virtually suspended. The United States is not now a police state. But given the extent of this invasion of people's privacy, we do have the full electronic and legislative infrastructure of such a state. These powers are extremely dangerous. There are legitimate reasons for ... secrecy about communications intelligence. But what is not legitimate is to use a secrecy system to hide programs that are blatantly unconstitutional. In 1975, Senator Frank Church spoke of the National Security Agency in these terms: "I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return." The dangerous prospect of which he warned was that America's intelligence gathering capability – which is today beyond any comparison with what existed in his pre-digital era – "at any time could be turned around on the American people and no American would have any privacy left." That has now happened. That is what [Edward] Snowden has exposed, with official, secret documents. We have fallen into Senator Church's abyss.
Note: The above was written by Daniel Ellsberg, a former US military analyst who in 1971 leaked the Pentagon Papers, showing how the US public had been misled about the Vietnam war. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs. The program, code-named PRISM, has not been made public until now. It may be the first of its kind. Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” GCHQ, Britain’s equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority. Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.
Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.
Former U.S. Sen. Bob Graham has accused the FBI in court papers of having impeded Congress’s Joint Inquiry into 9/11 by withholding information about a Florida connection to the ... attacks that killed nearly 3,000 people. The information ... includes a recently declassified FBI report that ties a Saudi family who once lived in Sarasota “to individuals associated with the terrorist attacks on 9/11/2001.” “The FBI’s failure to call (to the Joint Inquiry’s attention) documents finding ‘many connections’ between Saudis living in the United States and individuals associated with the terrorist attack(s) … interfered with the Inquiry’s ability to complete its mission,” said Graham, co-chairman of the Joint Inquiry. Graham said the FBI kept the 9/11 Commission in the dark, too. He said co-chairmen Thomas Kean and Lee Hamilton and executive director Philip Zelikow all told him they were unaware of the FBI’s Sarasota investigation. Moreover, Graham stated that Deputy FBI Director Sean Joyce, the Bureau’s second in command, personally intervened to block him from speaking with the special agent-in-charge of the Sarasota investigation. “I am troubled by what appears to me to be a persistent effort by the FBI to conceal from the American people information concerning possible Saudi support of the Sept. 11 attacks,” Florida’s former governor said.
Note: For deeply revealing reports from reliable major media sources on the 9/11 attacks, click here.
A dozen years after the terrorist attacks of Sept. 11, 2001, an independent, nonpartisan panel’s examination of the interrogation and detention programs carried out in their aftermath by the Bush administration ... provides a valuable, even necessary reckoning. The work of the [11-member task force convened by the Constitution Project, a legal research and advocacy group] is informed by interviews with dozens of former American and foreign officials, as well as with former prisoners. It is the fullest independent effort so far to assess the treatment of detainees at Guantánamo Bay, in Afghanistan and Iraq, and at the C.I.A.’s secret prisons. The report’s authoritative conclusion that “the United States engaged in the practice of torture” is impossible to dismiss. The report found that those methods violated international legal obligations with “no firm or persuasive evidence” that they produced valuable information that could not have been obtained by other means. The task force found that using torture — like waterboarding, slamming prisoners into walls, and chaining them in uncomfortable stress position for hours — had “no justification”. And in engineering “enforced disappearances” and secret detentions, the United States violated its international treaty obligations. As the panel notes, there never was before “the kind of considered and detailed discussions that occurred after 9/11 directly involving a president and his top advisers on the wisdom, propriety and legality of inflicting pain and torment on some detainees in our custody.”
Note: For another informative article on this from the Times, click here.
The FBI suspected within days of the Sept. 11, 2001, terrorist attacks that the American Muslim cleric Anwar al-Awlaki may have purchased tickets for some of the hijackers for air travel in advance of the attacks, according to newly released documents. The heavily redacted records – obtained by Judicial Watch through a [FOIA] request – suggest the FBI held evidence tying the American-born cleric to the hijackers just 16 days after the attack that killed nearly 3,000 Americans. “We have FBI documents showing that the FBI knew that al-Awlaki had bought three tickets for three of the hijackers to fly into Florida and into Las Vegas, including the lead hijacker, Mohammad Atta,” Tom Fitton, president of Judicial Watch, told Fox News. He added that the records show the cleric, killed in September 2011 by a U.S. drone strike in Yemen, “was a central focus of the FBI's investigation of 9/11. They show he wasn't cooperative. And they show that he was under surveillance.” The cleric was a guest speaker on moderate Islam at a Pentagon executive dining room in February 2002. The newly released documents now suggest the FBI knew five months earlier of al-Awlaki’s probable link to the hijackers. Al-Awlaki was held at New York City’s JFK airport on Oct. 10, 2002, under a warrant for passport fraud, a felony punishable by 10 years. However, ... an FBI agent, Wade Ammerman, from the bureau’s Washington field office ordered the cleric be released from custody, even though there was an active warrant for his arrest.
Note: Click here to view the more than 200 pages of documents obtained by Judicial Watch. Isn't it quite strange that the continuously monitored Al-Awlaki was breakfasting with the Pentagon brass and was released from custody by the FBI, after the 9/11 attacks? Could his assassination by drone have been for the purpose of keeping him quiet about what he knew concerning 9/11?
Through Freedom of Information Act requests and interviews with officials at numerous agencies, The Wall Street Journal has reconstructed the clash over the counterterrorism program within the administration of President Barack Obama. The attorney general [has] signed the changes into effect. The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them. That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation. Now, NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans "reasonably believed to constitute terrorism information" may be permanently retained. "It's breathtaking" in its scope, said a former senior administration official. The Fourth Amendment of the Constitution says that searches of "persons, houses, papers and effects" shouldn't be conducted without "probable cause" that a crime has been committed.
Note: This article requires subscription to view at the link above. To read it for free, click here. For analysis of this sweeping increase in government privacy invasions, click here. For deeply revealing reports from reliable major media sources on government privacy invasions, click here.
Last week, Stanford University and New York University released a major study about the use of drones in the ever-evolving but never-ending war on terror. Drones are terrorizing an entire civilian population. [We] spent weeks in Pakistan interviewing more than 60 people from North Waziristan. Many were survivors of strikes. Others had lost loved ones and family members. All of them live under the constant threat of annihilation. What my colleagues and I learned from these unnamed and unknown victims of America's drone warfare gave the report its title: "Living Under Drones." Drones are a constant presence in the skies above the North Waziristan tribal area in Pakistan, with as many as six hovering over villages at any one time. People hear them day and night. They are an inescapable presence, the looming specter of death from above. And that presence is steadily destroying a community twice the size of Rhode Island. The routines of daily life have been ripped to shreds. Indisputably innocent people cower in their homes, afraid to assemble on the streets. "Double taps," or secondary strikes on the same target, have stopped residents from aiding those who have been injured. A leading humanitarian agency now delays assistance by an astonishing six hours. What makes this situation even worse is that no one can tell people in these communities what they can do to make themselves safe. No one knows who is on the American kill list, no one knows how they got there and no one knows what they can do to get themselves off. It's all terrifyingly random. Suddenly, and without warning, a missile launches and obliterates everyone within a 16-yard radius.
Note: The author of this report, Jennifer Gibson, is a staff attorney with Reprieve, a London-based legal charity that represents dozens of Pakistani drone victims. For an excellent, seven-minute video by professors exploring the tragic reality of drone strikes in Pakistan, click here. For the "Living Under Drones" website where you can read a summary and download this report by Stanford University and the New York Times, click here. To learn about a beautiful movement to place large photos of children's faces in target areas to stop drone operators from killing innocents, click here.
Revelations that prominent radical activist Richard Aoki was an FBI informant have prompted angry denials among his supporters, but newly released records confirm he was secretly providing information to agents during the period he gave the Black Panthers guns and firearms training. The documents from Aoki's FBI informant file - totaling 221 pages - were released after a court challenge under the Freedom of Information Act and show that Aoki was an informant from 1961 to 1977, with only brief interruptions. The records say that at various points, he provided information that was "unique" and of "extreme value." The records chronicle Aoki's 16-year career as an informant, including years in which he was a student at Merritt College in Oakland and at UC Berkeley, participating in the Black Panthers and other radical groups. They also cover years during which Aoki was a teacher at those universities. An early FBI report says Aoki was assigned the alias "Richard Ford" to use when signing reports, as well as a permanent informant number, which the FBI redacted. It notes his date of birth, his parents' names and his address. "Coverage furnished by this informant is unique and not available from any other source," the FBI report says. "Many activist individuals seek informant's advice and counseling since informant is considered as a militant who has succeeded within the establishment without surrending (sic) to it."
Note: Here is undeniable evidence that the FBI was involved in infiltrating movements and radicalizing them with guns and weapons. Why isn't this being discussed widely in the media, particularly as it is likely this is still going on, most recently with the Occupy movement? The revelation that Aoki was an informant was first made last month in a news report and video by the Center for Investigative Reporting, based on the new book Subversives: The FBI's War on Student Radicals, and Reagan's Rise to Power.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.