Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


FBI calls half of populace with 9/11 doubts potential terrorists
2013-09-19, Digital Journal
http://digitaljournal.com/article/358624

A Department of Justice memo [distributed by the FBI] instructs local police, under a program named "Communities Against Terrorism," to consider anyone who harbors "conspiracy theories" about 9/11 to be a potential terrorist. The memo thus adds 9/11-official-story skeptics to a growing list of targets described by federal law enforcement [as] security threats, such as those who express "libertarian philosophies," "Second Amendment-oriented views," interest in "self-sufficiency," "fears of Big Brother or big government," and "Declarations of Constitutional rights and civil liberties." A newly released national poll shows that 48 percent of Americans either have some doubts about the official account of 9/11, or do not believe it at all. The FBI memo entitled "Potential Indicators of Terrorist Activities Related to Sleepers" says that people who should be 'considered suspicious' [for] possible involvement in "terrorist activity" include those who hold the "attitude" described as "Conspiracy theories about Westerners." The memo continues: "e.g. (sic) the CIA arranged for 9/11 to legitimize the invasion of foreign lands." "Sleepers" refers to "sleeper cells," in FBI jargon, which are terrorists awaiting orders to be activated into terrorist activity. According to the polling firm YouGov, 38% of Americans have some doubts about the official account of 9/11, 10% do not believe it at all, and 12% are unsure about it. Among well-known doubters of the official 9/11 account are many military officers, law enforcement personnel, firefighters, and pilots.

Note: We don't normally use Digital Journal as a news source, but this article is too important to not include, and no major media source is covering the story. For evidence that search engines are actively blocking 9/11 truth videos, click here. For more on the questions raised about the official explanation of the 9/11 events by highly respected professors and former government and military officials, click here and here.


Lawsuit asks FBI to release Sarasota 9/11 documents
2013-09-10, Sarasota Herald-Tribune (Sarasota FL's leading newspaper)
http://www.heraldtribune.com/article/20130910/ARTICLE/130919971/-1/news?p=all...

Twelve years after the 9/11 attacks that included three hijacker pilots trained in Venice [FL], the terrorists' alleged interaction with a high-echelon Saudi family that lived in Sarasota remains shrouded in secrecy. But Sunshine law and Freedom of Information Act requests filed by an independent South Florida news organization have chipped away at the FBI's position that information related to the family remain secret. Broward Bulldog editor Dan Christensen and former U.S. Sen. Bob Graham say the documents could shed light on how the locally trained terrorists were managed and supported. Graham, former Florida governor and a co-chair of [the] Congressional body that investigated the attacks, believes the FBI has covered up Saudi support of the terrorists. The former senator wants more disclosure about what happened in Sarasota because he feels it may add to a bigger, largely censored subject: Who financed and supported the 9/11 terror attacks? "The FBI is aggressively resisting the release of any additional documents," he said. "The question is, why are they doing this? What interest does the FBI have in denying the existence of its own documents? Beyond that, they have thrown a blanket of national security over virtually everything, and why are they doing that for an event that occurred, soon to be, 12 years ago?" At the time of the 9/11 attacks, President George W. Bush was visiting a school in Sarasota. Then came the revelation that three of the hijackers learned to fly at Venice Airport.

Note: For lots more reliable information suggesting a major cover-up around the events of 9/11, click here and here.


Revealed: how US and UK spy agencies defeat internet privacy and security
2013-09-05, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves. Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software. "Backdoors are fundamentally in conflict with good security," said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. "Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise."

Note: For an excellent article in the New York Times on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.


U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary
2013-08-29, Washington Post
http://www.washingtonpost.com/world/national-security/black-budget-summary-de...

U.S. spy agencies have built an intelligence-gathering colossus since the attacks of Sept. 11, 2001, but remain unable to provide critical information to the president on a range of national security threats, according to the government’s top-secret budget. The $52.6 billion “black budget” for fiscal 2013, obtained by The Washington Post from former intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny. Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses the money or how it performs against the goals set by the president and Congress. The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the U.S. intelligence community, which has 107,035 employees. Among the notable revelations in the budget summary: Spending by the CIA has surged past that of every other spy agency, with $14.7 billion in requested funding for 2013. The figure vastly exceeds outside estimates and is nearly 50 percent above that of the National Security Agency, which conducts eavesdropping operations and has long been considered the behemoth of the community. The CIA and the NSA have begun aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as “offensive cyber operations.”

Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.


NYPD's massive mosque spying operations revealed
2013-08-28, MSN/Associated Press
http://news.msn.com/us/nypds-massive-mosque-spying-operations-revealed

The New York Police Department has secretly labeled entire mosques as terrorism organizations, a designation that allows police to use informants to record sermons and spy on imams, often without specific evidence of criminal wrongdoing. Designating an entire mosque as a terrorism enterprise means that anyone who attends prayer services there is a potential subject of an investigation and fair game for surveillance. Since the 9/11 attacks, the NYPD has opened at least a dozen "terrorism enterprise investigations" into mosques, according to interviews and confidential police documents. Many TEIs stretch for years, allowing surveillance to continue even though the NYPD has never criminally charged a mosque or Islamic organization with operating as a terrorism enterprise. The documents show in detail how, in its hunt for terrorists, the NYPD investigated countless innocent New York Muslims and put information about them in secret police files. As a tactic, opening an enterprise investigation on a mosque is so potentially invasive that while the NYPD conducted at least a dozen, the FBI never did one, according to interviews with federal law enforcement officials. The revelations about the NYPD's massive spying operations are in documents recently obtained by The Associated Press and part of a new book, Enemies Within: Inside the NYPD's Secret Spying Unit... The book ... is based on hundreds of previously unpublished police files and interviews with current and former NYPD, CIA and FBI officials.

Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.


FBI director does not deny al-Awlaki may have been government asset
2013-08-23, Fox News
http://www.foxnews.com/politics/2013/08/23/did-us-government-try-to-recruit-r...

Newly declassified documents obtained [by] Judicial Watch, are raising questions over the U.S. government's handling of Anwar al-Awlaki, and whether it [recruited] the radical American cleric as an intelligence source in 2002. Director Robert Mueller did not dismiss the possibility. "I am not personally familiar with any effort to recruit Anwar al-Awlaki as an asset -- that does not mean to say there was not an effort at some level of the Bureau (FBI) or another agency to do so," Mueller said. Fox's ongoing reporting ... shows that in 2002 he was released from custody at JFK international airport -- despite an active warrant for his arrest -- with the okay of FBI Agent Wade Ammerman. Within days of his re-entry, al-Awlaki showed up in Ammerman's counter-terrorism investigation in Virginia into Ali al-Timimi, who is now serving a life sentence on non-terrorism charges. None of the information about al-Awlaki's release from federal custody at JFK, a sudden decision by the Justice Department in October 2002 to rescind an arrest warrant for the cleric, nor the cleric's connection to Ammerman was provided to the defense during Timimi’s 2005 trial. Documents ... show the FBI Director was more deeply involved in the post-9/11 handling of al-Awlaki than previously known. One memo from Mueller to then-Attorney General John Ashcroft on Oct. 3, 2002 -- seven days before the cleric re-entered the U.S. and was detained at JFK -- is marked "Secret" and titled "Anwar Aulaqi: IT-UBL/AL-QAEDA." "Why would al-Awlaki get the attention of the FBI Director? Why would a warrant for his arrest be pulled when he's trying to reenter the country?" asked Judicial Watch President Tom Fitton.

Note: Al-Awlaki, who was born in New Mexico and was a US citizen, died in a U.S. drone attack in Yemen nearly two years ago, the first American targeted for death by the CIA, by its own admission. With the confirmation that he had been an intelligence asset for the US government as early as 2002, his assassination takes on new significance. For more on the murky background of Al-Awlaki, click here and here.


Why are the JFK files still sealed after 50 years?
2013-08-17, MSN/Associated Press
http://news.msn.com/us/why-are-the-jfk-files-still-sealed-after-50-years

Five decades after President John F. Kennedy was fatally shot and long after official inquiries ended, thousands of pages of investigative documents remain withheld from public view. The contents of these files are partially known — and intriguing — and conspiracy buffs are not the only ones seeking to open them for a closer look. Some serious researchers believe the off-limits files could shed valuable new light on nagging mysteries of the assassination — including what U.S. intelligence agencies knew about accused assassin Lee Harvey Oswald before Nov. 22, 1963. It turns out that several hundred of the still-classified pages concern a deceased CIA agent, George Joannides, whose activities just before the assassination and, fascinatingly, during a government investigation years later, have tantalized researchers for years. "This is not about conspiracy, this is about transparency," said Jefferson Morley, a former Washington Post reporter and author embroiled in a decade-long lawsuit against the CIA, seeking release of the closed documents. "I think the CIA should obey the law. I don't think most people think that's a crazy idea." But so far, the Joannides files and thousands more pages primarily from the CIA remain off-limits at a National Archives center in College Park, Md. Anthony Summers, a British author whose sequel to his JFK book Not In Your Lifetime will be released this year, [said] "By withholding Joannides material, the agency continues to encourage the public to believe they're covering up something more sinister."

Note: For more on the strange secrecy around Joannides and his checkered past, see the New York Times article summarized here. For more on political assassinations, see the deeply revealing reports from reliable major media sources available here.


Email service used by Snowden shuts itself down, warns against using US-based companies
2013-08-09, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/aug/09/lavabit-shutdown-snowden...

A Texas-based encrypted email service recently revealed to be used by Edward Snowden - Lavabit - announced yesterday it was shutting itself down in order to avoid complying with what it perceives as unjust secret US court orders to provide government access to its users' content. "After significant soul searching, I have decided to suspend operations," the company's founder, Ladar Levinson, wrote in a statement to users posted on the front page of its website. He said the US directive forced on his company "a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit." He chose the latter. CNET's Declan McCullagh ... speculates that Lavabit was served "with [a] federal court order to intercept users' passwords" to allow ongoing monitoring of emails; specifically: "the order can also be to install FedGov-created malware." After challenging the order in district court and losing - all in a secret court proceeding, naturally - Lavabit shut itself down to avoid compliance while it appeals to the Fourth Circuit. What is particularly creepy about the Lavabit self-shutdown is that the company is gagged by law even from discussing the legal challenges it has mounted and the court proceeding it has engaged. In other words, the American owner of the company believes his Constitutional rights and those of his customers are being violated by the US Government, but he is not allowed to talk about it. Lavabit has been told that they would face serious criminal sanctions if they publicly discuss what is being done to their company.

Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.


CIA 'running arms smuggling team in Benghazi when consulate was attacked'
2013-08-02, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/news/worldnews/africaandindianocean/libya/10218288...

The CIA has been subjecting operatives to monthly polygraph tests in an attempt to suppress details of a reported US arms smuggling operation in Benghazi that was ongoing when its ambassador was killed by a mob in the city last year, according to reports. Up to 35 CIA operatives were working in the city during the attack last September on the US consulate that resulted in the death of Ambassador Chris Stevens and three other Americans, according to CNN. The television network said that a CIA team was working in an annex near the consulate on a project to supply missiles from Libyan armouries to Syrian rebels. Sources said that more Americans were hurt in the assault ... than had been previously reported. CIA chiefs were actively working to ensure the real nature of its operations in the city did not get out. So only the losses suffered by the State Department in the city had been reported to Congress. Frank Wolf, a US congressman who represents the district that contains CIA headquarters in Langley, Virginia, is one of 150 members of Congress for a new investigation into the failures in Benghazi. "I think it is a form of a cover-up, and I think it's an attempt to push it under the rug," he said. "We should have the people who were on the scene come in, testify under oath, do it publicly, and lay it out. And there really isn't any national security issue involved with regards to that."

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


The Public-Private Surveillance Partnership
2013-07-31, Bloomberg News
http://www.bloomberg.com/news/2013-07-31/the-public-private-surveillance-part...

Computers and networks inherently produce data, and our constant interactions with them allow corporations to collect an enormous amount of intensely personal data about us as we go about our daily lives. Sometimes we produce this data inadvertently simply by using our phones, credit cards, computers and other devices. Sometimes we give corporations this data directly on Google, Facebook, [or] Apple’s iCloud ... in exchange for whatever free or cheap service we receive from the Internet in return. The NSA is also in the business of spying on everyone, and it has realized it’s far easier to collect all the data from these corporations rather than from us directly. The result is a corporate-government surveillance partnership, one that allows both the government and corporations to get away with things they couldn’t otherwise. There are two types of laws in the U.S., each designed to constrain a different type of power: constitutional law, which places limitations on government, and regulatory law, which constrains corporations. Historically, these two areas have largely remained separate, but today each group has learned how to use the other’s laws to bypass their own restrictions. The government uses corporations to get around its limits, and corporations use the government to get around their limits. This partnership manifests itself in various ways. The government uses corporations to circumvent its prohibitions against eavesdropping domestically on its citizens. Corporations rely on the government to ensure that they have unfettered use of the data they collect.

Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.


‘Against Their Will’ looks at children used for tests
2013-07-08, Boston Globe
http://www.bostonglobe.com/arts/books/2013/07/07/book-review-against-their-wi...

Pop quiz: Name a state residential school where children were enrolled in medical experiments over an almost 20-year period, in which they were unknowingly fed a steady diet of radioactive isotopes, subjected to regular blood draws, and placed in solitary confinement if they refused to cooperate. Answer: the Walter E. Fernald State School in Waltham [Mass.} during the mid 20th century. Unfortunately, as Allen Hornblum, Judith Newman, and Gregory Dober painfully describe in their chilling new book, Against Their Will: The Secret History of Medical Experimentation on Children in Cold War America, Fernald was not the only institution in the country, or even in the state, where children were conscripted into sometimes deadly medical experiments. These were conducted by ambitious physicians and scientists whose belief in what they were trying to accomplish often blinded them to the potentially horrific consequences of their actions. “Against Their Will’’ opens with an overview of the eugenics movement in the United States, which found sympathizers among many luminaries of American medicine in the 19th and early 20th centuries. With its disdain for the disabled, who were considered genetically inferior, the movement paved the way for use of “defective’’ children in research. The book then provides multiple examples of medical experiments perpetrated on developmentally delayed and physically disabled children at multiple institutions across the country over the course of decades, often reading like case studies straight out of the 1947 Nazi doctors’ trial.

Note: For a long list of verifiable incidents where unknowing citizens were used as guinea pigs on a massive scale, click here.


Bin Laden Records Kept in the Shadows
2013-07-08, ABC News/Associated Press
http://abcnews.go.com/Politics/wireStory/secret-move-bin-laden-records-shadow...

The top U.S. special operations commander, Adm. William McRaven, ordered military files about the Navy SEAL raid on Osama bin Laden's hideout to be purged from Defense Department computers and sent to the CIA, where they could be more easily shielded from ever being made public. The secret move, described briefly in a draft report by the Pentagon's inspector general, set off no alarms within the Obama administration even though it appears to have sidestepped federal rules and perhaps also the U.S. Freedom of Information Act. The CIA, noting that the bin Laden mission was overseen by then-CIA Director Leon Panetta before he became defense secretary, said that the SEALs were effectively assigned to work temporarily for the CIA, which has presidential authority to conduct covert operations. The records transfer was part of an effort by McRaven to protect the names of the personnel involved in the raid, according to the inspector general's draft report. But secretly moving the records allowed the Pentagon to tell The Associated Press that it couldn't find any documents inside the Defense Department that AP had requested more than two years ago, and would represent a new strategy for the U.S. government to shield even its most sensitive activities from public scrutiny. "Welcome to the shell game in place of open government," said Thomas Blanton, director of the National Security Archive, a private research institute at George Washington University. "Guess which shell the records are under. If you guess the right shell, we might show them to you. It's ridiculous."

Note: For a powerful analysis of the strong evidence that Osama bin Laden most likely died in Afghanistan in December 2001, long before he was "killed" by the SEALs raid in Pakistan, read David Ray Griffin's Osama bin Laden: Dead or Alive? For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.


In Secret, Court Vastly Broadens Powers of N.S.A.
2013-07-07, New York Times
http://www.nytimes.com/2013/07/07/us/in-secret-court-vastly-broadens-powers-o...

In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans. The rulings, some nearly 100 pages long, reveal that the court has taken on a much more expansive role by regularly assessing broad constitutional questions and establishing important judicial precedents, with almost no public scrutiny. The 11-member Foreign Intelligence Surveillance Court, known as the FISA court, was once mostly focused on approving case-by-case wiretapping orders. But since major changes in legislation and greater judicial oversight of intelligence operations were instituted six years ago, it has quietly become almost a parallel Supreme Court, serving as the ultimate arbiter on surveillance issues and delivering opinions that will most likely shape intelligence practices for years to come. In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures. Unlike the Supreme Court, the FISA court hears from only one side in the case — the government — and its findings are almost never made public.

Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.


U.S. Postal Service Logging All Mail for Law Enforcement
2013-07-04, New York Times
http://www.nytimes.com/2013/07/04/us/monitoring-of-snail-mail.html?pagewanted...

Leslie James Pickering noticed something odd in his mail last September: a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home. “Show all mail to supv” — supervisor — “for copying prior to going out on the street,” read the card. It included Mr. Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green. “It was a bit of a shock to see it,” said Mr. Pickering, who with his wife owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service. Mr. Pickering was targeted by a longtime surveillance system called mail covers, a forerunner of a vastly more expansive effort, the Mail Isolation Control and Tracking program, in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year. It is not known how long the government saves the images. The Mail Isolation Control and Tracking program was created after the anthrax attacks in late 2001. It enables the Postal Service to retrace the path of mail at the request of law enforcement. No one disputes that it is sweeping.

Note: The exposure by whistleblower Edward Snowden of the NSA's massive domestic and global spying operations seems to have triggered a series of other revelations about surveillance of the US population, like this report on the US Postal Service's photographing all mail. Hardly a week goes by without another major revelation, such as a new digital photo-ID database utilized by the FBI and police forces, and the development by US police of a national DNA database on all "potential suspects". Since very few US citizens are terrorists, what is the real purpose behind this total surveillance?


Army reportedly blocking military access to Guardian coverage of NSA leaks
2013-06-27, NBC News
http://usnews.nbcnews.com/_news/2013/06/27/19177709-army-reportedly-blocking-...

The Army is blocking all access to The Guardian newspaper's reports about the National Security Agency's sweeping collection of data about Americans' email and phone communications, an Army spokesman said Thursday. The Monterey (Calif.) Herald reported that employees at the Presidio of Monterey, an Army public affairs base about 100 miles south of San Francisco, were unable to gain access to The Guardian's articles on former NSA contractor Edward Snowden and his professed leaks of classified information about the intelligence programs. Late Thursday, an Army spokesman told The Herald by email that the newspaper's NSA reports were, in fact, being blocked across the entire Army. He wrote that it's routine for the Defense Department to take "network hygiene" action to prevent disclosure of classified information, The Herald reported. "We make every effort to balance the need to preserve information access with operational security," the newspaper quoted the spokesman as saying. "However there are strict policies and directives in place regarding protecting and handling classified information."

Note: To read the full story in the Monterey Herald, click here. For the Guardian's coverage of this, click here. Does the military have the right to censor its members' access to information?


What Airline Whistleblowers Have to Say About the New Theory on Flight 800
2013-06-25, Time Magazine
http://ideas.time.com/2013/06/25/what-airline-whistleblowers-have-to-say-abou...

A cadre of six government and non-government experts who served the National Transportation Safety Board when that independent federal agency investigated the explosion of a Boeing 747 off the coast of Long Island in July 1996 ... are the protagonists of a new documentary, "TWA Flight 800". After four years of investigation, the NTSB claimed the cause of Flight 800's explosion was a mechanical defect, but the new documentary, written and directed by journalist Kristina Borjesson, claims the FBI, NTSB and other government agencies may have covered up that the plane was brought down by a missile strike. Participants in the film have called on the NTSB to reopen the case based on altered physical evidence, suppressed data, and unexamined testimony from hundreds of eyewitnesses. [The] book Attention All Passengers: The Airlines’ Dangerous Descent—and How to Reclaim Our Skies ... published last year ... thanked “the brave men and women who are Federal Aviation Administration, Transportation Security Administration, and airline whistleblowers.” These whistleblowers confirmed such problems as defective airline maintenance outsourcing, FAA oversight failures, TSA waste, and many other important findings. After watching the documentary, I believe there are enough smoking guns to warrant an unbiased reexamination. Last week one major news site was in near hysterics about the documentary, employing the term “conspiracy” ten times. Kristina Borjesson ... wasn’t surprised, noting that reexamining hot topics “discredits previous reporting.”

Note: Kristina Borjesson is a long-time supporter of WantToKnow.info who has written a great piece on Flight 800, which we have posted at this link. She's also the editor of what may be the best book ever on media corruption and manipulation, Into the Buzzsaw. You can find an excellent two-page summary of the book at this link. For the engaging trailer to this film, click here.


Bush-Era NSA Whistleblower Makes Most Explosive Allegations Yet About Extent of Gov’t Surveillance — and You Won’t Believe Who He Says They Spied On
2013-06-20, The Blaze
http://www.theblaze.com/stories/2013/06/20/bush-era-nsa-whistleblower-makes-m...

Russ Tice, a former intelligence analyst and Bush-era NSA whistleblower, claimed Wednesday that the intelligence community has ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats. “They went after – and I know this because I had my hands literally on the paperwork for these sort of things – they went after high-ranking military officers. They went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees," [said] Tice. “But they went after other ones, too. They went after lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House.” Then Tice dropped the bombshell about Obama. "In summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois ... that’s the president of the United States now.” FBI whistleblower Sibel Edmonds and Tice agreed that such wide-ranging surveillance of officials could provide the intelligence agencies with unthinkable power to blackmail their opponents. “I was worried that the intelligence community now has sway over what is going on,” Tice said. Tice first blew the whistle on ... domestic spying across multiple agencies in 2005.

Note: Listen to Tice's shocking revelations in this interview. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.


NSA surveillance played little role in foiling terror plots, experts say
2013-06-12, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2013/jun/12/nsa-surveillance-data-terror-attack

Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.

Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.


The N.S.A.’s Chief Chronicler
2013-06-10, New Yorker
https://www.newyorker.com/books/page-turner/the-n-s-a-s-chief-chronicler

In 1982, long before most Americans ever had to think about warrantless eavesdropping, the journalist James Bamford published “The Puzzle Palace: A Report on N.S.A., America’s Most Secret Agency,” the first book to be written about the National Security Agency. In the book, Bamford describes the agency as “free of legal restrictions” while wielding “technological capabilities for eavesdropping beyond imagination.” He concludes with an ominous warning: “Like an ever-widening sinkhole, N.S.A.’s surveillance technology will continue to expand, quietly pulling in more and more communications and gradually eliminating more and more privacy.” Three decades later, this pronouncement feels uncomfortably prescient: we were warned. Incredibly enough, the Department of Justice, under Jimmy Carter, complied with Bamford’s Freedom of Information Act requests, supplying him with secret documents related to the Church Committee, the Senate group that, in 1975, investigated American intelligence agencies for potential transgression of their mandates. That the government would hand over sensitive information to Bamford predictably infuriated the N.S.A.; Reagan Administration lawyers tried to bully Bamford into ceding his goods, threatening him with the Espionage Act, while the N.S.A. attempted to sequester the documents he’d uncovered. But because he was a lawyer, Bamford knew that he had done nothing wrong.

Note: As a producer for ABC News, Bamford was also the one who obtained startling declassified documents showing that the top Pentagon generals signed off on plans in the early 1960s to blow up a US ship in the Havana harbor or incite violent terrorism in US cities and blame it on Cuba. Strangely, ABC's article "U.S. Military Wanted to Provoke War With Cuba" was the only media report on this incredibly revealing document release. For more along these lines, see concise summaries of revealing news articles on intelligence agency corruption and the disappearance of privacy.


Everything you need to know about the NSA’s phone records scandal
2013-06-06, Washington Post
http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/06/everything-you-nee...

The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata — a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, it’s possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So it’s possible the NSA is using rooms like that to listen to everyone’s phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but it’s hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.

Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"