Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


Judge Tosses Muslim Spying Suit Against NYPD, Says Any Damage Was Caused by Reporters Who Exposed It
2014-02-21, The Intercept
https://firstlook.org/theintercept/2014/02/21/judge-tosses-muslim-spying-suit...

A federal judge in Newark has thrown out a lawsuit against the New York Police Department for spying on New Jersey Muslims, saying if anyone was at fault, it was the Associated Press for telling people about it. In his ruling ... U.S. District Court Judge William J. Martini simultaneously demonstrated the willingness of the judiciary to give law enforcement alarming latitude in the name of fighting terror, greenlighted the targeting of Muslims based solely on their religious beliefs, and blamed the media for upsetting people by telling them what their government was doing. The NYPD’s clandestine spying on daily life in Muslim communities in the region — with no probable cause, and nothing to show for it — was exposed in a Pulitzer-Prize winning series of stories by the AP. The stories described infiltration and surveillance of at least 20 mosques, 14 restaurants, 11 retail stores, two grade schools, and two Muslim student associations in New Jersey alone. In a cursory, 10-page ruling issued before even hearing oral arguments, Martini essentially said that what the targets didn’t know didn’t hurt them: "None of the Plaintiffs’ injuries arose until after the Associated Press released unredacted, confidential NYPD documents and articles expressing its own interpretation of those documents. Nowhere in the Complaint do Plaintiffs allege that they suffered harm prior to the unauthorized release of the documents by the Associated Press. This confirms that Plaintiffs’ alleged injuries flow from the Associated Press’s unauthorized disclosure of the documents. The harms are not “fairly traceable” to any act of surveillance."

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


The NSA’s Secret Role in the U.S. Assassination Program
2014-02-10, The Intercept (With Glenn Greenwald)
https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/

The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone. The former JSOC drone operator ... states that innocent people have “absolutely” been killed as a result. Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. The Obama administration has repeatedly insisted that its operations kill terrorists with the utmost precision. Within the NSA ... a motto quickly caught on at Geo Cell: ‘We Track ’Em, You Whack ’Em.’” In December 2009, utilizing the NSA’s metadata collection programs, the Obama administration dramatically escalated U.S. drone and cruise missile strikes in Yemen. The first strike in the country known to be authorized by Obama targeted an alleged Al Qaeda camp in the southern village of al-Majala. The strike, which included the use of cluster bombs, resulted in the deaths of 14 women and 21 children.

Note: For an in-depth interview on this important topic, click here. Would anyone in a developed country tolerate their citizens being killed by the drones of a foreign government? Note also that The Intercept is the new media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for the their independence.


N.S.A. Devises Radio Pathway Into Computers
2014-01-15, New York Times
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-conn...

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


The WikiLeaks Mole
2014-01-06, Rolling Stone
http://www.rollingstone.com/politics/news/the-wikileaks-mole-20140106

Sigurdur "Siggi" Thordarson, [is a] cherubic, blond 21-year-old who has been called everything in the [Icelandic] press from "attention seeker" to "traitor" to "psychopath". Four years ago, just as WikiLeaks was winning international notoriety, the then-17-year-old hacking prodigy became Assange's youngest and most trusted sidekick. But as Assange became more embattled and besieged, the protégé turned on his mentor in the most shocking of ways: becoming the first FBI informant inside the group. His tale reveals not only the paranoia and strife within WikiLeaks, but just how far the feds were willing to go to get Assange. The revelation of Siggi's role as an FBI snitch has polarized WikiLeaks insiders. WikiLeaks spokesman Kristinn Hrafnsson [dismissed] Siggi as "a pathological liar." While other WikiLeaks insiders also question Siggi's credibility, they insist that his story can't be discounted, and there's more to it than the organization is letting on. The truth, it seems, may be held in the leaks. Siggi has provided Rolling Stone with more than a terabyte of secret files he claims to have taken from WikiLeaks before he left in November 2011 and gave to the FBI: thousands of pages of chat logs, videos, tapped phone calls, government documents and more than a few bombshells from the organization's most heated years. Whatever their origins, the SiggiLeaks are a deep and revealing portal into one of the most guarded and influential organizations of the 21st century – and the extreme measures its embattled leader is willing to take.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


I worked on the US drone program. The public should know what really goes on
2013-12-29, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/dec/29/drones-us-military

Whenever I read comments by politicians defending the Unmanned Aerial Vehicle Predator and Reaper program – aka drones – I wish I could ask them a few questions. I'd start with: "How many women and children have you seen incinerated by a Hellfire missile?" Few of these politicians who so brazenly proclaim the benefits of drones have a real clue of what actually goes on. I, on the other hand, have seen these awful sights first hand. What the public needs to understand is that the video provided by a drone is not usually clear enough to detect someone carrying a weapon, even on a crystal-clear day. This makes it incredibly difficult for the best analysts to identify if someone has weapons for sure. One example comes to mind: "The feed is so pixelated, what if it's a shovel, and not a weapon?" I felt this confusion constantly, as did my fellow UAV analysts. We always wonder if ... we destroyed an innocent civilian's life all because of a bad image or angle. I know the feeling you experience when you see someone die. Horrifying barely covers it. When you are exposed to it over and over again it becomes like a small video, embedded in your head, forever on repeat, causing psychological pain and suffering. UAV troops are victim to not only the haunting memories of this work that they carry with them, but also the guilt of always being a little unsure of how accurate their confirmations of weapons or identification of hostile individuals were. The UAVs in the Middle East are used as a weapon, not as protection, and as long as our public remains ignorant to this, this serious threat to the sanctity of human life – at home and abroad – will continue.

Note: For more on war crimes committed by the US and UK in the illegal "global war on terror", see the deeply revealing reports from reliable major media sources available here.


NSA’s indiscriminate spying ‘collapsing,’ Snowden says in open letter
2013-12-17, Washington Post/Associated Press
http://www.washingtonpost.com/world/nsas-indiscriminate-spying-collapsing-sno...

National Security Agency leaker Edward Snowden wrote in a lengthy “open letter to the people of Brazil” that he has been inspired by the global debate ignited by his release of thousands of documents and that the NSA’s culture of indiscriminate global espionage “is collapsing.” In the letter, Snowden commended the Brazilian government for its strong stand against U.S. spying. He wrote that he would be willing to help the South American nation investigate NSA spying on its soil but could not fully participate in doing so without being granted political asylum, because the U.S. “government will continue to interfere with my ability to speak.” The documents revealed that Brazil is the top NSA target in Latin America, in spying that has included the monitoring of Brazilian President Dilma Rousseff’s cellphone and hacking into the internal network of the state-run oil company Petrobras. In his letter, Snowden dismissed U.S. explanations to the Brazilian government and others that the bulk metadata gathered on billions of e-mails and calls was more “data collection” than surveillance. “There is a huge difference between legal programs, legitimate spying ... and these programs of dragnet mass surveillance that put entire populations under an all-seeing eye and save copies forever,” he wrote. “These programs were never about terrorism: they’re about economic spying, social control, and diplomatic manipulation. They’re about power.” Brazilian senators have asked for Snowden’s help during hearings about the NSA’s targeting of Brazil, an important transit hub for transatlantic fiber-optic cables that are hacked.

Note: To read Snowden's full, inspiring letter, click here.


The Soviet Union Spent $1 Billion On Mind-Control Experiments During The Cold War As Part Of Arms Race With The US: Report
2013-12-16, International Business Times
http://www.ibtimes.com/soviet-union-spent-1-billion-mind-control-experiments-...

The battle between the U.S. and the Soviet Union during the Cold War, for technological and scientific one-upmanship, included a costly effort that involved the two superpowers' attempts to develop mind-control weapons, according to a new study. A blog post at the Physics arXiv Blog, citing a new paper by researcher Serge Kernbach, said that both the U.S. and the Soviet Union experimented with parapsychology, mind control and remote influence. And, while some of the work conducted by the U.S. on these topics is now public, much less is known about the Soviet body of knowledge, which reportedly cost about a billion dollars to gather. “The Soviets had a similar program. This included experiments in parapsychology, which the Soviets called psychotronics,” the blogpost said. “The work built on a long-standing idea in Soviet science that the human brain could receive and transmit a certain kind of high frequency electromagnetic radiation and that this could influence other objects too.” Kernbach provided an overview of the Soviet Union’s efforts in unconventional research between 1917 and 2003, [based] on publications in Russian technical journals and recently declassified documents. The U.S. developed a 20-year CIA program, called Project MKULTRA, which began in the early 1950s to study ways of manipulating people’s minds and altering their brain functions. The Soviets too focused on a similar program and developed a device called a "cerpan" that could generate and store high-frequency electromagnetic radiation produced by the human brain in hopes of influencing other objects.

Note: For an excellent two-page summary of reliable information on secret government mind control programs, click here. For more on mind control research and operations by the CIA, see the deeply revealing reports from reliable major media sources available here.


NSA review to leave spying programs largely unchanged, reports say
2013-12-13, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/dec/13/nsa-review-to-leave-spying-progr...

A participant in a White House-sponsored review of surveillance activities described as “shameful” an apparent decision to leave most of the National Security Agency’s controversial bulk spying intact. Sascha Meinrath, director of the Open Technology Institute, said [on December 13] that ... “The review group was searching for ways to make the most modest pivot necessary to continue business as usual.” Should the review group’s report resemble descriptions that leaked ... the report “does nothing to alter the lack of trust the global populace has for what the US is doing, and nothing to restore our reputation as an ethical internet steward,” said Meinrath, who met with the advisory panel and White House officials twice to discuss the bulk surveillance programs that have sparked international outrage. Leaks about the review group’s expected recommendations to the New York Times and Wall Street Journal strengthened Meinrath and other participants’ long-standing suspicions that much of the NSA’s sweeping spy powers would survive. The Times quoted an anonymous official familiar with the group saying its report “says we can’t dismantle these programs, but we need to change the way almost all of them operate”. According to the leaks, the review group will recommend that bulk collection of every American’s phone call data continue, possibly by the phone companies instead of the NSA, with tighter restrictions than the “reasonable, articulable suspicion” standard for searching through them that the NSA currently employs.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


Law enforcement using methods from NSA playbook
2013-12-08, USA Today
http://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-ns...

The National Security Agency isn't the only government entity secretly collecting data from people's cellphones. Local police are increasingly scooping it up, too. Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information about thousands of cellphone users at a time, whether they are targets of an investigation or not. The records, from more than 125 police agencies in 33 states, reveal [that] about one in four law-enforcement agencies have used a tactic known as a "tower dump," which gives police data about the identity, activity and location of any phone that connects to the targeted cellphone towers over a set span of time, usually an hour or two. A typical dump covers multiple towers, and wireless providers, and can net information from thousands of phones. At least 25 police departments own a Stingray, a suitcase-size device that costs as much as $400,000 and acts as a fake cell tower. The system, typically installed in a vehicle so it can be moved into any neighborhood, tricks all nearby phones into connecting to it and feeding data to police. In some states, the devices are available to any local police department via state surveillance units. Organizations such as the American Civil Liberties Union and Electronic Privacy Information Center say the swelling ability by even small-town police departments to easily and quickly obtain large amounts of cellphone data raises questions about the erosion of people's privacy as well as their Fourth Amendment protections against unreasonable search and seizure.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


Canada allowed widespread NSA surveillance at 2010 G20 summit
2013-11-28, NBC News/Reuters
http://www.nbcnews.com/id/53688035#.UpkAXo2f8h0

Canada allowed the U.S. National Security Agency (NSA) to conduct widespread surveillance during the 2010 Group of 20 summit in Toronto, according to a media report that cited documents from former NSA contractor Edward Snowden. The report by the Canadian Broadcasting Corp ... cited briefing notes it said showed the United States turned its Ottawa embassy into a security command post during a six-day spying operation by the top-secret U.S. agency as President Barack Obama and other world leaders met that June. One of the bylines on the CBC report was Glenn Greenwald, the U.S. journalist who has worked with Snowden on several other NSA stories. CBC ... quoted an NSA briefing note describing the operation as "closely coordinated with the Canadian partner". The Canadian equivalent of the NSA is the Communications Security Establishment Canada, or CSEC. CBC said the documents did not reveal the targets of the NSA operation, but described part of the U.S. eavesdropping agency's mandate at the Toronto summit as "providing support to policymakers". CSEC, which has a very low public profile, employs about 2,000 people. It is part of the so-called Five Eyes intelligence-sharing network that also includes the United States, Britain, New Zealand and Australia. Last month, Brazil angrily demanded an explanation for media reports which said CSEC agents had targeted its mines and energy industry.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Robert F. Kennedy saw conspiracy in JFK’s assassination
2013-11-24, Boston Globe
https://www.bostonglobe.com/metro/2013/11/24/his-brother-keeper-robert-kenned...

Much has been made of Bobby Kennedy’s impossible burden following the assassination of his brother. A review of [documents released as recently as a few months ago] by the Globe, fortified by the work of historians and new interviews with former Kennedy aides, paints a picture of a brother responding to the assassination with equal parts crippling grief and growing suspicions. In the five years between his brother’s murder and his own assassination in 1968, Bobby Kennedy voiced public support for the findings of the Warren Commission, namely that a pathetic, attention-seeking gunman had alone been responsible for the murder of President Kennedy. Privately, though, Bobby was dismissive of the commission, seeing it ... as a public relations tool. After hearing the news out of Dallas, it’s clear that he quickly focused his attention on three areas of suspicion: Cuba, the Mafia, and the CIA. Crucially, Bobby had become his brother’s point man in managing all three of those highly fraught portfolios. And by the time the president was gunned down, Bobby understood better than anyone how all three had become hopelessly interwoven, and how much all three bore his own imprint. For while John Kennedy was the one gunned down, Bobby had reason to believe he may have been the ultimate target. Walking the grounds of Hickory Hill just an hour after receiving confirmation of his brother’s death, Bobby confided in an aide something truly unsettling. That aide, Edwin Guthman, would later recount it in his book “We Band of Brothers.” “I thought they would get one of us,” Bobby said, adding, “I thought it would be me.”

Note: In 2006, BBC reported that CIA operatives were directly involved in Robert Kennedy's assassination, and that Sirhan Sirhan may have been a programmed Manchurian Candidate. For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.


US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data
2013-11-20, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-p...

The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden. In the first explicit confirmation that UK citizens have been caught up in US mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo ... says the material is being put in databases where it can be made available to other members of the US intelligence and military community. Until now, it had been generally understood that the citizens of each country were protected from surveillance by any of the others. But the Snowden material reveals that: • In 2007, the rules were changed to allow the NSA to analyse and retain any British citizens' mobile phone and fax numbers, emails and IP addresses swept up by its dragnet. • These communications were "incidentally collected" by the NSA, meaning the individuals were not the initial targets of surveillance operations and therefore were not suspected of wrongdoing. • The NSA has been using the UK data to conduct so-called "pattern of life" or "contact-chaining" analyses, under which the agency can look up to three "hops" away from a target of interest – examining the communications of a friend of a friend of a friend. Three hops for a typical Facebook user could pull the data of more than 5 million people into the dragnet.

Note: For more on government threats to privacy, see the deeply revealing reports from reliable major media sources available here.


FISA court order that allowed NSA surveillance is revealed for first time
2013-11-19, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/19/court-order-that-allowed-nsa-sur...

A secret court order that authorised a massive trawl by the National Security Agency of Americans' email and internet data was published for the first time on [November 18], among a trove of documents that also revealed a judge's concern that the NSA "continuously" and "systematically" violated the limits placed on the program. Another later court order found that what it called "systemic overcollection" had taken place. In a heavily redacted opinion Colleen Kollar-Kotelly, the former presiding judge of the FISA court, placed legal weight on the methods of surveillance employed by the NSA, which had never before collected the internet data of “an enormous volume of communications”. The methods, known as pen registers and trap-and-trace devices, record the incoming and outgoing routing information of communications. Kollar-Kotelly ruled that acquiring the metadata, and not the content, of email and internet usage in bulk was harmonious with the “purpose” of Congress and prior court rulings – even though no surveillance statute ever authorized it and top officials at the Justice Department and the FBI threatened to resign in 2004 over what they considered its dubious legality. The type of data collected under the program included information on the "to", "from" and "bcc" lines of an email rather than the content. Metadata, wrote Kollar-Kotelly, enjoyed no protection under the fourth amendment to the US constitution, a precedent established by the Supreme Court in 1979 in a single case on which the NSA relies currently.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


The Top 5 John F. Kennedy Assassination Conspiracy Theories
2013-11-11, ABC News
http://abcnews.go.com/US/top-john-kennedy-assassination-conspiracy-theories/s...

The fifty years since the assassination of John F. Kennedy have done little to quell the public's interest or skepticism about who killed the president. In 1978 ... the House of Representatives Select Committee on Assassinations found that in addition to Oswald, there likely was a second gunman who fired at the president's motorcade. The commission concluded that the gunmen were part of a "conspiracy," without determining exactly who was behind it, opening the door to five decades and a cottage industry of theories. According to a 2003 ABC News Poll, 70 percent of Americans believe Kennedy's death was "the result of a plot, not the act of a lone killer." Fifty-one percent believe Oswald did not act alone, and 7 percent believe Oswald was not involved at all in the assassination. In the years since Kennedy's death more than 2,000 books have been written about the assassination, many of which espouse one or more conspiracy theories. In nearly every theory that involves American conspirators, be they wealthy industrialists or tough-as-nails mafiosi, one group is routinely represented – the CIA. One theory suggests that Oswald was a CIA operative and agents tampered with his FBI file before and after the investigation to make it appear he was a communist and lone wolf. [Another theory claims President Lyndon] Johnson was aided in the plot by another man who would become president, George H.W. Bush, a burgeoning CIA official who happened to be in Dallas on the day of the assassination.

Note: On the 50th anniversary of the Kennedy assassination see our powerful JFK assassination information center and the best videos and news articles on the topic. For an astonishing History Channel Video in which the attorney for Lyndon Johnson states he has no doubt Johnson was involved in the assassination, click here.


CIA made doctors torture suspected terrorists after 9/11, taskforce finds
2013-11-04, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/04/cia-doctors-torture-suspected-te...

Doctors and psychologists working for the US military violated the ethical codes of their profession under instruction from the defence department and the CIA to become involved in the torture and degrading treatment of suspected terrorists, an investigation has concluded. The report of the Taskforce on Preserving Medical Professionalism in National Security Detention Centres concludes that after 9/11, health professionals working with the military and intelligence services "designed and participated in cruel, inhumane and degrading treatment and torture of detainees". The report lays blame primarily on the defence department (DoD) and the CIA, which required their healthcare staff to put aside any scruples in the interests of intelligence gathering and security practices that caused severe harm to detainees, from waterboarding to sleep deprivation and force-feeding. The two-year review by the 19-member taskforce, Ethics Abandoned: Medical Professionalism and Detainee Abuse in the War on Terror, supported by the Institute on Medicine as a Profession (IMAP) and the Open Society Foundations, says that the DoD termed those involved in interrogation "safety officers" rather than doctors. Doctors and nurses were required to participate in the force-feeding of prisoners on hunger strike, against the rules of the World Medical Association and the American Medical Association. Doctors and psychologists working for the DoD were required to breach patient confidentiality and share what they knew of the prisoner's physical and psychological condition with interrogators, and were used as interrogators themselves.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Human rights groups accuse US of war crimes
2013-10-22, MSNBC
http://www.msnbc.com/msnbc/human-rights-groups-accuse-us-war-crimes

The United States is facing increasingly harsh criticism over its use of lethal drone strikes to target suspected terrorists. American drone strikes in Pakistan and Yemen may amount to war crimes, according to a pair of reports released by international human rights groups. Examining nine drone strikes in Pakistan, the Amnesty International report concludes that the attacks killed large numbers of innocent civilians, and accuses the U.S. of targeting rescuers who arrive in the aftermath of the strikes to aid the wounded. A report from Human Rights Watch states that the majority of people killed by six drone strikes in Yemen were civilians (57 out of the 82 killed). The groups’ findings that the United States has killed more civilians than it has admitted are bolstered by a UN report ... that stated U.S. drone strikes had killed as many as 400 civilians in Pakistan and almost 60 in Yemen. These reports clash with the U.S. government’s own assessment of the strikes. Officials have maintained that civilian casualties from drone strikes are minimal, even in the face of multiple third-party evaluations that state otherwise. Both groups are demanding that the Obama administration investigate allegations of civilian deaths, release more information about the legal basis for drone strikes on suspected terrorists, provide restitution to those unjustly harmed and reveal the identities of those who lost their lives in the attacks.

Note: If a single civilian in the US were killed by a foreign drone, the entire nation would be up in arms. Do we have a double standard here? For more on this, see concise summaries of deeply revealing war atrocities news articles from reliable major media sources.


Snowden Says He Took No Secret Files to Russia
2013-10-17, New York Times
http://www.nytimes.com/2013/10/18/world/snowden-says-he-took-no-secret-files-...

Edward J. Snowden, the former National Security Agency contractor, said in an extensive interview this month that he did not take any secret N.S.A. documents with him to Russia when he fled there in June, assuring that Russian intelligence officials could not get access to them. He also asserted that he was able to protect the documents from China’s spies because he was familiar with that nation’s intelligence abilities, saying that as an N.S.A. contractor he had targeted Chinese operations and had taught a course on Chinese cybercounterintelligence. “There’s a zero percent chance the Russians or Chinese have received any documents,” he said. Mr. Snowden added that inside the spy agency “there’s a lot of dissent.” But he said that people were kept in line through “fear and a false image of patriotism,” which he described as “obedience to authority.” He said he believed that if he tried to question the N.S.A.’s surveillance operations as an insider, his efforts “would have been buried forever,” and he would “have been discredited and ruined.” Mr. Snowden said he finally decided to act when he discovered a copy of a classified 2009 inspector general’s report on the N.S.A.’s warrantless wiretapping program during the Bush administration. After reading about the program, which skirted the existing surveillance laws, he concluded that it had been illegal, he said. “If the highest officials in government can break the law without fearing punishment or even any repercussions at all,” he said, “secret powers become tremendously dangerous.”

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


N.S.A. Gathers Data on Social Connections of U.S. Citizens
2013-09-29, New York Times
http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citiz...

Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials. The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor. The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners. Almost everything about the agency’s operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nation’s intelligence court or any public debate.

Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


CIA Director Brennan Confirmed as Reporter Michael Hastings Next Target
2013-08-12, San Diego 6-TV
http://www.sandiego6.com/story/cia-director-brennan-confirmed-as-reporter-mic...

This week Elise Jordan, wife of famed journalist Michael Hastings, who recently died under suspicious circumstances, corroborated this reporter's sources that CIA Director John Brennan was Hastings next exposé project. Last month a source provided San Diego 6 News with an alarming email hacked from super-secret CIA contractor Stratfor’s President Fred Burton. The email was posted on WikiLeaks and alleged that then Obama counter-terrorism czar Brennan was in charge of the government's continued crackdown or witch-hunt on investigative journalists. The release of a new surveillance video from a nearby Italian restaurant by Michael Krikorian, an author, freelance blogger who also writes for LA Weekly, reveals a lot of information about Hastings’ final seconds. A University professor told San Diego 6 News that calculating the speed of Hastings car follows a simple mathematic equation. By using the video and the distance traveled (195 feet) as well as the seconds that lapsed prior to the explosion – the car was traveling roughly 35 mph. That revelation is important because Jose, an employee [at] a nearby business and a witness to the accident told KTLA ... the car was traveling at a high rate of speed and he saw sparks coming from the car and saw it explode before hitting the tree. The pre-explosion could possibly explain the flash of light on the video that preceded the appearance of the car in the video. The pre-explosion and slower speed could also explain the minimal damage to the palm tree. It also provides an explanation for the location of the engine and drive train at more than 100 feet from the tree impact area.

Note: Michael Hastings' wife Elise Jordan, in the interview at the first link in the text above, said that his research into CIA Director Brennan will be published soon in Rolling Stone. For further analysis of these revelations, click here. For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


US directs agents to cover up program used to investigate Americans
2013-08-05, CNBC/Reuters
http://www.cnbc.com/id/100938530

A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin—not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence—information that could reveal entrapment, mistakes or biased witnesses. "I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers. "It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"