Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


New leaker disclosing U.S. secrets, government concludes
2014-08-06, CNN
http://www.cnn.com/2014/08/05/politics/u-s-new-leaker

The federal government has concluded there's a new leaker exposing national security documents in the aftermath of surveillance disclosures by former NSA contractor Edward Snowden, U.S. officials tell CNN. Proof of the newest leak comes from national security documents that formed the basis of a news story published [August 5] by the Intercept, the news site launched by Glenn Greenwald, who also published Snowden's leaks. The Intercept article focuses on the growth in U.S. government databases of known or suspected terrorist names during the Obama administration. The article cites documents prepared by the National Counterterrorism Center dated August 2013, which is after Snowden left the United States to avoid criminal charges. Government officials have been investigating to find out that identity. In a February interview with CNN's Reliable Sources, Greenwald said: "I definitely think it's fair to say that there are people who have been inspired by Edward Snowden's courage and by the great good and virtue that it has achieved." The biggest database, called the Terrorist Identities Datamart Environment, now has 1 million names, a U.S. official confirmed to CNN. The Intercept first reported the new TIDE database numbers, along with details of other databases. As of November, 2013, there were 700,000 people listed in the Terrorist Screening Database (TSDB), or the "Terrorist Watchlist, according to a U.S. official. The Intercept report said, citing the documents, that 40% on the "Terrorist Watchlist" aren't affiliated with terror groups.

Note: For more on this, see concise summaries of deeply revealing 'terror' manipulation news articles from reliable major media sources.


Barack Obama’s Secret Terrorist-Tracking System, by the Numbers
2014-08-05, The Intercept
https://firstlook.org/theintercept/article/2014/08/05/watch-commander

Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local law enforcement agencies, private contractors, and foreign governments—more than 40 percent are described by the government as having “no recognized terrorist group affiliation.” The documents, obtained from a source in the intelligence community, also reveal that the Obama Administration has presided over an unprecedented expansion of the terrorist screening system. Since taking office, Obama has boosted the number of people on the no fly list more than ten-fold, to an all-time high of 47,000. “If everything is terrorism, then nothing is terrorism,” says David Gomez, a former senior FBI special agent. The watchlisting system, he adds, is “revving out of control.” The classified documents were prepared by the National Counterterrorism Center, the lead agency for tracking individuals with suspected links to international terrorism. Stamped “SECRET” and “NOFORN” (indicating they are not to be shared with foreign governments), they offer the most complete numerical picture of the watchlisting system to date. The government adds names to its databases, or adds information on existing subjects, at a rate of 900 records each day.

Note: For more on this, see concise summaries of deeply revealing 'terror' manipulation news articles from reliable major media sources.


U.S. Senate report to suggest harsh CIA interrogations were unnecessary
2014-08-01, Chicago Tribune/Reuters
http://www.chicagotribune.com/news/nationworld/politics/sns-rt-us-usa-cia-tor...

A U.S. Senate committee report will conclude that the CIA's use of harsh interrogation after the Sept. 11, 2001, attacks yielded no critical intelligence on terrorist plots that could not have been obtained through non-coercive methods, U.S. officials familiar with the document said. [The] report [is] expected to suggest that the "enhanced" techniques were unnecessary and also to accuse some CIA officers of misleading Congress about the effectiveness of the program. Officials said the Senate Intelligence Committee was unlikely to release the report to the public without some additional review. "A preliminary review of the report indicates there have been significant redactions. We need additional time to understand the basis for these redactions and determine their justification. Therefore the report will be held until further notice and released when that process is completed," Democratic Sen. Dianne Feinstein, the committee's chair, said. Committee investigators also concluded that the agency misled other executive branch agencies and Congress by claiming that only by using harsh methods did the agency achieve ... counter-terrorism breakthroughs that otherwise would not have been possible. The report will criticize some CIA officials by name, the officials said.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


FBI Defends Search for Oklahoma City Bombing Video
2014-07-29, ABC News/Associated Press
http://abcnews.go.com/US/wireStory/trial-opening-video-oklahoma-city-bombing-...

The FBI thoroughly searched its archives and found no evidence that more videos of the Oklahoma City bombing exist, agency employees told a judge [on July 28] in a trial that has rekindled questions about whether any others were involved in the 1995 attack. Additional searches for videos that Salt Lake City lawyer Jesse Trentadue believes are being withheld would be burdensome and fruitless, FBI attorney Kathryn Wyer argued during the first day of a bench trial. Trentadue says the agency is refusing to release videos that show a second person was with Timothy McVeigh when he parked a truck outside the Oklahoma City federal building and detonated a bomb that killed 168 people. The government says McVeigh was alone. [But] the 30 video recordings the FBI has released don't show the explosion or McVeigh's arrival in a rental truck. Unsatisfied by the FBI's previous explanations and citing the public importance of the tapes, U.S. District Judge Clark Waddoups has ordered the agency to explain why it can't find videos that are mentioned in evidence logs. Trentadue believes the presence of a second suspect explains why his brother, Kenneth Trentadue, was flown to Oklahoma several months after the bombing, where he died in a federal holding cell. Kenneth Trentadue bore a striking resemblance to a police sketch based on witness descriptions of the enigmatic suspect "John Doe No. 2," who was never identified..

Note: There is strong evidence of a major cover-up in the Oklahoma City bombing. See this Wall Street Journal article, this Associated Press article, this ABC News article, and this Deseret News article for examples.


Before Snowden: The Whistleblowers Who Tried To Lift The Veil
2014-07-22, NPR
http://www.npr.org/2014/07/22/333741495/before-snowden-the-whistleblowers-who...

Bill Binney worked at the National Security Agency [for] nearly three decades as one of its leading crypto-mathematicians. He then became one of its leading whistleblowers. The NSA is overseen by Congress, the courts and other government departments. It's also supposed to be watched from the inside by its own workers. But over the past dozen years, whistleblowers like Binney have had a rough track record. Those who tried unsuccessfully to work within the system say Edward Snowden — the former National Security Agency contractor who shared top-secret documents with reporters — learned from their bitter experience. For Binney, the decision to quit the NSA and become a whistleblower began a few weeks after the terrorist attacks of Sept. 11, 2001, when he says he discovered the spy agency had begun using software he'd created to scoop up information on Americans — all without a court order. "I had to get out of there, because they were using the program I built to do domestic spying, and I didn't want any part of it, I didn't want to be associated with it," he says. "I look at it as basically treason. They were subverting the Constitution." Binney says he and two other NSA colleagues who also quit tried sounding the alarm with congressional committees. But because they did not have documents to prove their charges, nobody believed them. Snowden, he says, did not repeat that mistake. "He recognized right away, it was very clear to me, that if he wanted anybody to believe him, he'd have to take a lot of documentation with him — which is what he did," Binney says.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


The Details About the CIA's Deal With Amazon
2014-07-17, The Atlantic
https://www.theatlantic.com/technology/archive/2014/07/the-details-about-the-...

The intelligence community is about to get the equivalent of an adrenaline shot to the chest. This summer, a $600 million computing cloud developed by Amazon Web Services for the Central Intelligence Agency over the past year will begin servicing all 17 agencies that make up the intelligence community. If the technology plays out as officials envision, it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks. For the first time, agencies within the intelligence community will be able to order a variety of on-demand computing and analytic services from the CIA and National Security Agency. What's more, they'll only pay for what they use. For the risk-averse intelligence community, the decision to go with a commercial cloud vendor is a radical departure from business as usual. It is difficult to underestimate the cloud contract's importance. In a recent public appearance, CIA Chief Information Officer Douglas Wolfe called it "one of the most important technology procurements in recent history," with ramifications far outside the realm of technology. The importance of the cloud capabilities the CIA gets through leveraging Amazon Web Services' horsepower is best exemplified in computing intelligence data. Instead of each agency building out its own systems, select agencies ... are responsible for governing its major components.

Note: The CIA tries to "collect everything and hold on to it forever." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


MP burgled after handing paedophile dossier to Leon Brittan
2014-07-02, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/news/uknews/crime/10942103/MP-burgled-after-handin...

The home of an MP who compiled a dossier alleging paedophile activity within Westminster was burgled twice in suspicious circumstances around the time he took it to the authorities, his son has said. Barry Dickens said nothing was taken in what appeared to be two "very professional" intrusions into his father Geoffrey's home in 1983, leading to suspicions they may have been related to his attempt to expose alleged abuse. He said he did not know what had happened to an apparent second copy of the dossier after the Home Office admitted one which it received for investigation at the time appeared to have been destroyed. "My parents had two burglaries at the time close to it without anything being taken, which seemed a very professional job the way they were carried out," Mr Dickens – whose father died in 1995 – [said]. He said the dossier contained concerns and worries expressed to the MP about the behaviour of ''those with a high profile, in an office or high status'' and questioned its subsequent disappearance. He said his father had been motivated to take on the cause of vulnerable young people by his own difficult childhood in a succession of foster homes and that he would be pleased that the case had become public now. Backing a public inquiry, [he] added: "A lot of people came forward with facts. I think it does need doing and finishing."

Note: See powerful evidence from a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government


N.S.A. Collecting Millions of Faces From Web Images
2014-06-01, New York Times
http://www.nytimes.com/2014/06/01/us/nsa-collecting-millions-of-faces-from-we...

The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents. The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed. The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. It is not clear how many people around the world, and how many Americans, might have been caught up in the effort. Neither federal privacy laws nor the nation’s surveillance laws provide specific protections for facial images. Civil-liberties advocates and other critics are concerned that the power of the improving technology, used by government and industry, could erode privacy. “Facial recognition can be very invasive,” said Alessandro Acquisti, a researcher on facial recognition technology at Carnegie Mellon University.

Note: For another New York Times article showing how the NSA is using mobile phone apps to "snatch data revealing the player’s location, age, sex and other personal information," see this article.


Was the Iranian threat fabricated by Israel and the U.S.?
2014-05-31, Haaretz (One of Israel's leading newspapers)
http://www.haaretz.com/news/diplomacy-defense/.premium-1.596104

A new book by Gareth Porter, an American historian and researcher specializing in U.S. national security, shows how the actual state of the Iranian nuclear program does not match the Iranian threat narrative. Manufactured Crisis: The Untold Story of the Nuclear Scare ... is a highly detailed and well-documented book for all interested in understanding how we arrived at the Iranian nuclear crisis, and the “attack scenarios” and invented facts and intelligence reports. The story begins with U.S. support for the Iraqis during the 1980s Iraq-Iran war. The critical point [came] with the collapse of the Soviet empire. According to Porter, that event and the end of the Cold War pulled out the rug from under the CIA’s raison d’ętre. The solution the Americans found to continue providing the [CIA] with a tremendous budget was the invention of a new threat – the merging of weapons of mass destruction (an ambiguous term in itself) and terror. Iran ... provided the threat that “saved” the CIA. Running through Porter’s book is the well-substantiated claim that U.S. and Israeli policies on Iran derived from their political and organizational interests, and not necessarily from careful factual analysis of the Iranian nuclear program, which was subject to IAEA monitoring, or of the intentions of the Iranian leadership. According to Porter, no systematic analysis was made of the goals of the Iranian nuclear program, and neither U.S. nor Israeli policy makers devoted any thought to why all of Iran’s official declarations on the subject were in line with the Treaty on the Non-Proliferation of Nuclear Weapons.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Despite Obama's new rules, no end in sight for drone war
2014-05-23, MSN/Reuters
http://news.msn.com/in-depth/despite-obamas-new-rules-no-end-in-sight-for-dro...

A year after Obama laid out new conditions for drone attacks around the world, U.S. forces are failing to comply fully with the rules he set for them: to strike only when there is an imminent threat to Americans and when there is virtually no danger of taking innocent lives. Although Obama promised greater transparency in his speech at the National Defense University, U.S. lawmakers are increasingly critical of the secrecy surrounding the operations. There are growing concerns in Washington that the net effect of the targeted-killing program may be counterproductive. [Obama] is showing no sign of relinquishing what has become his counterterrorism weapon of choice since he took office in 2009. Drones are spreading to new areas ... in far-flung places like Somalia and in Nigeria. "Here we are, a year later, asking 'what has really changed?'" said University of Notre Dame law professor Mary Ellen O'Connell, a leading expert on extrajudicial killings who has testified before U.S. congressional committees. "The drones are still flying and the president still sees the attractiveness of this cold and antiseptic means of killing." Obama's vision of shifting control of the drone program from the shadowy paramilitary arm of the Central Intelligence Agency to the more publicly accountable Pentagon is moving at what one national security source described as a "glacial pace." The Pentagon's Joint Special Operations Command is widely believed to have been behind the December 12 drone strike in a remote part of Yemen that hit a convoy later identified as a wedding procession, killing 15 people.

Note: For more on the expansion of drones in skies worldwide, see the deeply revealing reports from reliable major media sources available here.


Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas
2014-05-19, The Intercept
https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-...

The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. SOMALGET is part of a broader NSA program called MYSTIC, which ... is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Glenn Greenwald: from Martin Luther King to Anonymous, the state targets dissenters not just "bad guys"
2014-05-13, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/may/13/glenn-greenwald-anonymous-mass-s...

The opportunity those in power have to characterise political opponents as "national security threats" or even "terrorists" has repeatedly proven irresistible. In the past decade, the government ... has formally so designated environmental activists, broad swaths of anti-government rightwing groups, anti-war activists, and associations organised around Palestinian rights. One document from the Snowden files, dated 3 October 2012, chillingly underscores the point. It revealed that the agency has been monitoring the online activities of individuals it believes express "radical" ideas and who have a "radicalising" influence on others. Among the information collected about the individuals, at least one of whom is a "US person", are details of their online sex activities and "online promiscuity." The agency discusses ways to exploit this information to destroy their reputations and credibility. The record is suffused with examples of groups and individuals being placed under government surveillance by virtue of their dissenting views and activism – Martin Luther King, the civil rights movement, anti-war activists, environmentalists. The NSA's treatment of Anonymous ... is especially troubling and extreme. Gabriella Coleman, a specialist on Anonymous at McGill University, said that [Anonymous] "is not a defined" entity but rather "an idea that mobilises activists to take collective action and voice political discontent. It is a broad-based global social movement with no centralised or official organised leadership structure. Some have rallied around the name to engage in digital civil disobedience, but nothing remotely resembling terrorism."

Note: This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


United States Of Secrets
2014-05-12, KPBS.org
http://www.kpbs.org/news/2014/may/12/frontline-united-states-secrets/

When NSA contractor Edward Snowden downloaded tens of thousands of top-secret documents from a highly secure government network, it led to the largest leak of classified information in history — and sparked a fierce debate over privacy, technology and democracy in the post-9/11 world. Now, in "United States Of Secrets," FRONTLINE goes behind the headlines to reveal the dramatic inside story of how the U.S. government came to monitor and collect the communications of millions of people around the world—including ordinary Americans—and the lengths they went to trying to hide the massive surveillance program from the public. “This is as close to the complete picture as anyone has yet put together — and it’s bigger and more pervasive than we thought,” says veteran FRONTLINE filmmaker Michael Kirk. In part one ... Kirk [pieces] together the secret history of the unprecedented surveillance program that began in the wake of September 11 and continues today – even after the revelations of its existence by Edward Snowden. Then, in part two, premiering Tuesday, May 20 ..., veteran FRONTLINE filmmaker Martin Smith continues the story, exploring the secret relationship between Silicon Valley and the National Security Agency, and investigating how the government and tech companies have worked together to gather and warehouse your data. “Through in-depth interviews with more than 60 whistleblowers, elected officials, journalists, intelligence insiders and cabinet officials, we have woven together the secret narrative that reveals the scale and scope of the government’s spying program,” says Kirk.

Note: Don't miss this engaging program, available at this link. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Glenn Greenwald: the explosive day we revealed Edward Snowden's identity to the world
2014-05-11, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/may/11/glenn-greenwald-nsa-whistleblowe...

On Sunday 9 June 2013, the Guardian published the story that revealed [Edward] Snowden to the world. The article told Snowden's story, conveyed his motives, and proclaimed that "Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley [now Chelsea] Manning." We quoted [a note from Snowden that said:] "I understand that I will be made to suffer for my actions … but I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant." The reaction to the article and the video was more intense than anything I had experienced as a writer. Ellsberg himself, writing the following day in the Guardian, proclaimed that "there has not been in American history a more important leak than Edward Snowden's release of NSA material – and that definitely includes the Pentagon Papers 40 years ago". Several hundred thousand people posted the link to their Facebook accounts in the first several days alone. Almost three million people watched the interview on YouTube. Many more saw it on the Guardian's website. The overwhelming response was shock and inspiration at Snowden's courage.

Note: Don't miss the full, exciting story of how Snowden originally came to leak his stunning information at the link above. This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


9/11 conspiracy theorist and investigative journalist 'commits suicide'
2014-04-15, Daily Mail (One of the UK's largest-circulation newspapers)
http://www.dailymail.co.uk/news/article-2605429/9-11-conspiracy-theorist-inve...

9/11 [activist] and investigative journalist Michael Ruppert has reportedly committed suicide. The 63-year-old former narcotics investigator with the LAPD shot himself after his radio show, according to an announcement by author Carolyn Baker who was a guest on his final broadcast on [April 13]. Mr Ruppert was famous for his litany of conspiracy theories which encompassed the CIA to drugs, international politics, the oil industry, Wall Street and 9/11. On her Facebook page, Ms Baker wrote: 'This was not a ''fake'' suicide. It was very well planned by Mike who gave us few clues but elaborate instructions for how to proceed without him.' After leaving the LAPD, Mr Ruppert started a website From The Wilderness which claimed to expose government corruption. It included his claims that he had seen drug-dealing at the CIA. Mr Ruppert gained notoriety by confronting then-CIA Director John Deutch during a meeting in 1995 and telling him that he had seen CIA officers involved in drug-dealing. He later claimed on his website that the CIA and American government was involved in 9/11. In 2004, he published Crossing the Rubicon: The Decline of the American Empire at the End of the Age of Oil. The book alleged that former VP Dick Cheney had conspired with Wall Street and other government officials over the September 11 World Trade Center attacks. In 2009, he starred in a documentary called Collapse where he spoke about his theories involving the demise of mankind following the economic and energy crises.

Note: Mike Ruppert was a great hero who courageously reported reliable information the mainstream media would not touch. For a five-minute video of his public testimony on CIA drug running, click here. For a 10-minute video showing his great despair about the condition of the world, click here. Thank you, Mike, for opening the eyes of so many to the deeper realities in our world. Another courageous hero of the 9/11 movement, John Judge, also died, from complications of a stroke, on April 15. For more on his great work, click here. For a great 8-minute video of his revealing powerful information you may not know, click here.


Stories about NSA surveillance, Snowden leaks win Pulitzers for two news groups
2014-04-14, CNN
http://www.cnn.com/2014/04/14/us/pulitzer-prizes-journalism

Two news organizations' stories about National Security Agency surveillance, based upon documents leaked by Edward Snowden, have been awarded the Pulitzer Prize for public service, often described as the highest prize in American journalism. The Washington Post and ... The Guardian each received the prize on [April 14]. The recognition of the NSA reporting was most significant because of the questions raised by Snowden's leaks and the reaction to them. Snowden, who has been living in Russia while seeking asylum from U.S. prosecution, said in a statement that the Pulitzer board's recognition of the coverage was "vindication for everyone who believes that the public has a role in government." "We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance." While Snowden provided a trove of documents, reporters including Glenn Greenwald, working for the Guardian; Barton Gellman, working for The Post; and Laura Poitras, who worked with both, pored over the raw information, decided with their editors what parts were ethical to publish, and turned the information into stories that stunned readers around the world.

Note: For more on the historic Snowden revelations, see the deeply revealing reports from reliable major media sources available here.


The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket
2014-04-04, The Intercept
https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media...

This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. This sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda. Those programs, carried out in secrecy and with little accountability ... threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


NSA posed as Facebook to infect computers with malware, report says
2014-03-12, Los Angeles Times
http://www.latimes.com/business/technology/la-fi-tn-nsa-posing-facebook-malwa...

The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.

Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.


Behind Clash Between C.I.A. and Congress, a Secret Report on Interrogations
2014-03-08, New York Times
http://www.nytimes.com/2014/03/08/us/politics/behind-clash-between-cia-and-co...

It was early December when the Central Intelligence Agency began to suspect it had suffered what it regarded as an embarrassing computer breach. Investigators for the Senate Intelligence Committee, working in the basement of a C.I.A. facility in Northern Virginia, had obtained an internal agency review summarizing thousands of documents related to the agency’s detention and interrogation program. Parts of the C.I.A. report cast a particularly harsh light on the program, the same program the agency was in the midst of defending in a prolonged dispute with the intelligence committee. What the C.I.A. did next opened a new and even more rancorous chapter in the struggle over how the history of the interrogation program will be written. Agency officials began scouring the digital logs of the computer network used by the Senate staff members to try to learn how and where they got the report. Their search not only raised constitutional questions about the propriety of an intelligence agency investigating its congressional overseers, but has also resulted in two parallel inquiries by the Justice Department — one into the C.I.A. and one into the committee. Each side accuses the other of spying on it, with the Justice Department now playing the uneasy role of arbitrator in the bitter dispute. “It’s always been a dicey proposition to be investigating Congress,” said W. George Jameson, a C.I.A. lawyer for decades. “You don’t do it lightly.”

Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.


Who Tried to Silence Drone Victim Kareem Khan?
2014-02-25, The Intercept
https://firstlook.org/theintercept/2014/02/25/tried-silence-drone-victim-kare...

In the early morning hours of February 5, a group of armed men – some dressed in Pakistani police uniforms – appeared at Kareem Khan’s home, awoke him and his family at gunpoint, and took him away in an unmarked vehicle. Khan was hooded, shackled around the wrists and ankles, and driven for hours, eventually arriving at a building where he was thrown into a windowless holding cell. There he stayed for more than a week, during which he was subjected to sensory deprivation and physical abuse. Khan says he was repeatedly beaten on the soles of his feet and threatened with death by his captors. He was kept hooded and shackled for most of the day, and fed only dry bread and water. Khan has no doubts about why he was targeted. He is the first person to attempt a legal challenge to the CIA drone program in Pakistan, after his son and brother were killed in a drone strike near his home in North Waziristan on December 31st 2009. His abduction and detention occurred just over a week before Khan was to travel with [his Pakistani lawyer, Shahzad] Akbar and Jennifer Gibson, a lawyer with the UK-based legal charity Reprieve, to speak with European parliamentarians about the CIA drone program. Among the topics of discussion were the extralegal nature of the program, as well as covert intelligence sharing by European spy agencies. While in captivity, Khan was interrogated by men who refused to identify themselves, and who questioned him repeatedly about his plans to speak with the media and about the cases of others who had been killed by drones. Since the start of the “War on Terror” it has been estimated by local human rights groups that as many as 8,000 Pakistani citizens have been “disappeared” by local intelligence agencies, often at the behest of their American counterparts.

Note: The Intercept is the new media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for their independence. For more on the atrocities committed by the US and UK in the illegal "global war on terror", see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"