Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Stories
Excerpts of Key Intelligence Agency Corruption News Stories in Major Media


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


New leaker disclosing U.S. secrets, government concludes
2014-08-06, CNN
Posted: 2014-08-11 13:45:46
http://www.cnn.com/2014/08/05/politics/u-s-new-leaker

The federal government has concluded there's a new leaker exposing national security documents in the aftermath of surveillance disclosures by former NSA contractor Edward Snowden, U.S. officials tell CNN. Proof of the newest leak comes from national security documents that formed the basis of a news story published [August 5] by the Intercept, the news site launched by Glenn Greenwald, who also published Snowden's leaks. The Intercept article focuses on the growth in U.S. government databases of known or suspected terrorist names during the Obama administration. The article cites documents prepared by the National Counterterrorism Center dated August 2013, which is after Snowden left the United States to avoid criminal charges. Government officials have been investigating to find out that identity. In a February interview with CNN's Reliable Sources, Greenwald said: "I definitely think it's fair to say that there are people who have been inspired by Edward Snowden's courage and by the great good and virtue that it has achieved." The biggest database, called the Terrorist Identities Datamart Environment, now has 1 million names, a U.S. official confirmed to CNN. The Intercept first reported the new TIDE database numbers, along with details of other databases. As of November, 2013, there were 700,000 people listed in the Terrorist Screening Database (TSDB), or the "Terrorist Watchlist, according to a U.S. official. The Intercept report said, citing the documents, that 40% on the "Terrorist Watchlist" aren't affiliated with terror groups.

Note: For more on this, see concise summaries of deeply revealing 'terror' manipulation news articles from reliable major media sources.


Barack Obama’s Secret Terrorist-Tracking System, by the Numbers
2014-08-05, The Intercept
Posted: 2014-08-11 13:43:11
https://firstlook.org/theintercept/article/2014/08/05/watch-commander

Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local law enforcement agencies, private contractors, and foreign governments—more than 40 percent are described by the government as having “no recognized terrorist group affiliation.” The documents, obtained from a source in the intelligence community, also reveal that the Obama Administration has presided over an unprecedented expansion of the terrorist screening system. Since taking office, Obama has boosted the number of people on the no fly list more than ten-fold, to an all-time high of 47,000. “If everything is terrorism, then nothing is terrorism,” says David Gomez, a former senior FBI special agent. The watchlisting system, he adds, is “revving out of control.” The classified documents were prepared by the National Counterterrorism Center, the lead agency for tracking individuals with suspected links to international terrorism. Stamped “SECRET” and “NOFORN” (indicating they are not to be shared with foreign governments), they offer the most complete numerical picture of the watchlisting system to date. The government adds names to its databases, or adds information on existing subjects, at a rate of 900 records each day.

Note: For more on this, see concise summaries of deeply revealing 'terror' manipulation news articles from reliable major media sources.


U.S. Senate report to suggest harsh CIA interrogations were unnecessary
2014-08-01, Chicago Tribune/Reuters
Posted: 2014-08-11 13:41:27
http://www.chicagotribune.com/news/nationworld/politics/sns-rt-us-usa-cia-tor...

A U.S. Senate committee report will conclude that the CIA's use of harsh interrogation after the Sept. 11, 2001, attacks yielded no critical intelligence on terrorist plots that could not have been obtained through non-coercive methods, U.S. officials familiar with the document said. [The] report [is] expected to suggest that the "enhanced" techniques were unnecessary and also to accuse some CIA officers of misleading Congress about the effectiveness of the program. Officials said the Senate Intelligence Committee was unlikely to release the report to the public without some additional review. "A preliminary review of the report indicates there have been significant redactions. We need additional time to understand the basis for these redactions and determine their justification. Therefore the report will be held until further notice and released when that process is completed," Democratic Sen. Dianne Feinstein, the committee's chair, said. Committee investigators also concluded that the agency misled other executive branch agencies and Congress by claiming that only by using harsh methods did the agency achieve ... counter-terrorism breakthroughs that otherwise would not have been possible. The report will criticize some CIA officials by name, the officials said.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


NYT Will Use The Word Torture, Finally
2014-08-07, Huffington Post
Posted: 2014-08-11 13:39:56
http://www.huffingtonpost.com/2014/08/07/nyt-torture_n_5659997.html

The New York Times announced on [August 7] that it will use the word torture to describe the United States' controversial interrogation tactics on terror suspects. "From now on, The Times will use the word “torture” to describe incidents in which we know for sure that interrogators inflicted pain on a prisoner in an effort to get information," said Times executive editor Dean Baquet. In the past, the Times had been sharply criticized for not using the word torture. Instead, [it] had referred to torture as "brutal interrogation," or similar epithets. The Times is hardly the only major media outlet to avoid using the word "torture." Reuters referred to the tactics as "brutal interrogation methods" and the AP has called them "enhanced interrogation techniques." The media have been accused of following along with President Bush's denial that the U.S. does not use torture. Banquet [says] that "while the methods set off a national debate, the Justice Department insisted that the techniques did not rise to the legal definition of 'torture.'” Baquet said that reporters and editors had debated the issue in wake of the Senate Intelligence Committee's torture report, which has yet to be released. Last week, President Obama admitted that the CIA "tortured some folks" in post-9/11 anti-terror efforts.

Note: For more on this, see concise summaries of deeply revealing media cover-ups news articles from reliable major media sources.


Inquiry by C.I.A. Affirms It Spied on Senate Panel
2014-08-01, New York Times
Posted: 2014-08-04 07:44:36
http://www.nytimes.com/2014/08/01/world/senate-intelligence-commitee-cia-inte...

An internal investigation by the C.I.A. has found that its officers penetrated a computer network used by the Senate Intelligence Committee in preparing its damning report on the C.I.A.’s detention and interrogation program. The report by the agency’s inspector general also found that C.I.A. officers read the emails of the Senate investigators and sent a criminal referral to the Justice Department based on false information. The investigation also discovered that the officers created a false online identity to gain access on more than one occasion to computers used by the committee staff. The inspector general’s account of how the C.I.A. secretly monitored a congressional committee charged with supervising its activities touched off angry criticism from members of the Senate and amounted to vindication for Senator Dianne Feinstein of California, the committee’s Democratic chairwoman, who excoriated the C.I.A. in March when the agency’s monitoring of committee investigators became public. Senator Mark Udall, Democrat of Colorado and another member of the Intelligence Committee, demanded Mr. Brennan’s resignation. “The C.I.A. unconstitutionally spied on Congress by hacking into the Senate Intelligence Committee computers,” he said in a written statement. “This grave misconduct not only is illegal but it violates the U.S. Constitution’s requirement of separation of powers,” he added.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


FBI Defends Search for Oklahoma City Bombing Video
2014-07-29, ABC News/Associated Press
Posted: 2014-08-04 07:40:57
http://abcnews.go.com/US/wireStory/trial-opening-video-oklahoma-city-bombing-...

The FBI thoroughly searched its archives and found no evidence that more videos of the Oklahoma City bombing exist, agency employees told a judge [on July 28] in a trial that has rekindled questions about whether any others were involved in the 1995 attack. Additional searches for videos that Salt Lake City lawyer Jesse Trentadue believes are being withheld would be burdensome and fruitless, FBI attorney Kathryn Wyer argued during the first day of a bench trial. Trentadue says the agency is refusing to release videos that show a second person was with Timothy McVeigh when he parked a truck outside the Oklahoma City federal building and detonated a bomb that killed 168 people. The government says McVeigh was alone. [But] the 30 video recordings the FBI has released don't show the explosion or McVeigh's arrival in a rental truck. Unsatisfied by the FBI's previous explanations and citing the public importance of the tapes, U.S. District Judge Clark Waddoups has ordered the agency to explain why it can't find videos that are mentioned in evidence logs. Trentadue believes the presence of a second suspect explains why his brother, Kenneth Trentadue, was flown to Oklahoma several months after the bombing, where he died in a federal holding cell. Kenneth Trentadue bore a striking resemblance to a police sketch based on witness descriptions of the enigmatic suspect "John Doe No. 2," who was never identified..

Note: There is strong evidence of a major cover-up in the Oklahoma City bombing. See this Wall Street Journal article, this Associated Press article, this ABC News article, and this Deseret News article for examples.


Government agents 'directly involved' in most high-profile US terror plots
2014-07-21, The Guardian (One of the UK's leading newspapers)
Posted: 2014-07-29 06:20:54
http://www.theguardian.com/world/2014/jul/21/government-agents-directly-invol...

Nearly all of the highest-profile domestic terrorism plots in the United States since 9/11 featured the "direct involvement" of government agents or informants, a new report says. Some of the controversial "sting" operations "were proposed or led by informants", bordering on entrapment by law enforcement. Yet the courtroom obstacles to proving entrapment are significant, one of the reasons the stings persist. The lengthy report, released on [July 21] by Human Rights Watch, raises questions about the US criminal justice system's [respect for] civil rights and due process in post-9/11 terrorism cases. [The report] portrays a system that features not just the sting operations but secret evidence, anonymous juries, extensive pretrial detentions and convictions significantly removed from actual plots. "In some cases the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act," the report alleges. Out of the 494 cases related to terrorism the US has tried since 9/11, the plurality of convictions ... are not for thwarted plots but for "material support" charges, a broad category expanded further by the 2001 Patriot Act that permits prosecutors to pursue charges with tenuous connections to a terrorist act or group. Several cases featured years-long solitary confinement for accused terrorists before their trials. Some defendants displayed signs of mental incapacity. Jurors for the 2007 plot to attack the Fort Dix army base, itself influenced by government informants, were anonymous, limiting defense counsel's ability to screen out bias.

Note: Why was this important news not picked up by any major US media? For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


The Secret Government Rulebook For Labeling You a Terrorist
2014-07-23, The Intercept
Posted: 2014-07-29 06:18:58
https://firstlook.org/theintercept/article/2014/07/23/blacklisted/

The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist. The “March 2013 Watchlisting Guidance,” a 166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire “categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted. The rulebook ... was developed behind closed doors by representatives of the nation’s intelligence, military, and law-enforcement establishment, including the Pentagon, CIA, NSA, and FBI. Emblazoned with the crests of 19 agencies, it offers the most complete and revealing look into the secret history of the government’s terror list policies to date.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Before Snowden: The Whistleblowers Who Tried To Lift The Veil
2014-07-22, NPR
Posted: 2014-07-29 06:16:22
http://www.npr.org/2014/07/22/333741495/before-snowden-the-whistleblowers-who...

Bill Binney worked at the National Security Agency [for] nearly three decades as one of its leading crypto-mathematicians. He then became one of its leading whistleblowers. The NSA is overseen by Congress, the courts and other government departments. It's also supposed to be watched from the inside by its own workers. But over the past dozen years, whistleblowers like Binney have had a rough track record. Those who tried unsuccessfully to work within the system say Edward Snowden — the former National Security Agency contractor who shared top-secret documents with reporters — learned from their bitter experience. For Binney, the decision to quit the NSA and become a whistleblower began a few weeks after the terrorist attacks of Sept. 11, 2001, when he says he discovered the spy agency had begun using software he'd created to scoop up information on Americans — all without a court order. "I had to get out of there, because they were using the program I built to do domestic spying, and I didn't want any part of it, I didn't want to be associated with it," he says. "I look at it as basically treason. They were subverting the Constitution." Binney says he and two other NSA colleagues who also quit tried sounding the alarm with congressional committees. But because they did not have documents to prove their charges, nobody believed them. Snowden, he says, did not repeat that mistake. "He recognized right away, it was very clear to me, that if he wanted anybody to believe him, he'd have to take a lot of documentation with him — which is what he did," Binney says.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Racy Photos Were Often Shared at N.S.A., Snowden Says
2014-07-21, New York Times
Posted: 2014-07-29 06:14:48
http://www.nytimes.com/2014/07/21/us/politics/edward-snowden-at-nsa-sexually-...

The former National Security Agency contractor Edward J. Snowden said in a wide-ranging interview ... that the oversight of surveillance programs was so weak that members of the United States military working at the spy agency sometimes shared sexually explicit photos they intercepted. He also said the British government often pioneered the most invasive surveillance programs because its intelligence services operate with fewer restrictions intended to protect individual privacy than its counterparts in the United States and other allies. “In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive,” he said. “So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: ‘Oh, hey, that’s great. Send that to Bill down the way.’ ” Mr. Snowden said that type of sharing ... was “seen as the fringe benefits of surveillance positions.” He said that this was never reported and that the system for auditing surveillance programs was “incredibly weak.” Mr. Snowden had particularly stark criticism for the British government’s surveillance programs, because in Britain the respect for individual privacy, he said, “is not strongly encoded in law or policy.” Because it has fewer restrictions, British intelligence platforms “are used as a testing ground” for programs of all five intelligence partners, a group referred to as “Five Eyes,” which includes Britain, Canada, Australia, New Zealand and the United States.”

Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


CIA Reveals Covert Acts In Chile
2000-09-11, CBS News
Posted: 2014-07-29 06:04:03
http://www.cbsnews.com/news/cia-reveals-covert-acts-in-chile/

The CIA is acknowledging for the first time the extent of its deep involvement in Chile, where it dealt with coup-plotters, false propagandists and assassins. The agency [released] a declassified report required by the U.S. Congress. Despite the disclosures, the CIA report admits to no abuses or cover-up by CIA agents. But it chronicles clandestine contacts authorized by then-U.S. President Richard Nixon and other top U.S. officials which it said would violate standards now upheld by the agency. Among the disclosures: The CIA had prior knowledge of the plot that overthrew Allende three years later. The CIA supported a kidnapping attempt of Chile's army chief in October 1970, as part of a plot to prevent the congressional confirmation of Allende as president. The kidnapping attempt failed, and Gen. Rene Schneider was shot and killed. The CIA later paid $35,000 to the kidnappers in what it termed "humanitarian" assistance. The CIA made a one-time payment to secret police head Gen. Manuel Contreras Sepulveda, the head of the military regime's feared secret police. He was sentenced in 1993 for killing Chilean socialist leader Orlando Letelier in Washington in 1976. Contreras has said the CIA was behind the assassination. The report also describes efforts to influence news media in Chile against Allende and to continue anti-leftist propaganda efforts by successor Pinochet, "including support for news media committed to creating a positive image for the military Junta" now accused of an array of abuses during his 17-year rule, including more than 3,000 killings.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Hacking Online Polls and Other Ways British Spies Seek to Control the Internet
2014-07-14, The Intercept
Posted: 2014-07-22 10:22:49
https://firstlook.org/theintercept/2014/07/14/manipulating-online-polls-ways-...

The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call. The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users. A newly released top-secret GCHQ document called “JTRIG Tools and Techniques” provides a comprehensive, birds-eye view of just how underhanded and invasive this unit’s operations are. The document—available in full here—is designed to notify other GCHQ units of JTRIG’s “weaponised capability” when it comes to the dark internet arts, and serves as a sort of hacker’s buffet for wreaking online havoc.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Edward Snowden urges professionals to encrypt client communications
2014-07-17, The Guardian (One of the UK's leading newspapers)
Posted: 2014-07-22 10:20:50
http://www.theguardian.com/world/2014/jul/17/edward-snowden-professionals-enc...

The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations. Snowden said professionals were failing in their obligations to their clients, sources, patients and parishioners in what he described as a new and challenging world. "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe. Any communications should be encrypted by default," he said. Snowden's plea for the professions to tighten security came during an extensive and revealing interview with the Guardian in Moscow. During the seven hours of interview, Snowden: • Said if he ended up in US detention in Guantánamo Bay he could live with it. • Does not have any regrets. • Said that ... he was independently secure, living on savings, and money from awards and speeches he has delivered online round the world. • Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in "sexually compromising" situations are routinely passed around. He works online late into the night; a solitary, digital existence not that dissimilar to his earlier life. He said he was using part of that time to work on the new focus for his technical skills, designing encryption tools to help professionals such as journalists protect sources and data. He is negotiating foundation funding for the project, a contribution to addressing the problem of professions wanting to protect client or patient data, and in this case journalistic sources.

Note: Read the transcript of the Guardian's new interview of Edward Snowden. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


In NSA-intercepted data, those not targeted far outnumber the foreigners who are
2014-07-05, Washington Post
Posted: 2014-07-14 16:30:59
http://www.washingtonpost.com/world/national-security/in-nsa-intercepted-data...

Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. [90% of] account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. [Many] files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year. The files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


The ultimate goal of the NSA is total population control
2014-07-11, The Guardian (One of the UK's leading newspapers)
Posted: 2014-07-14 16:29:31
http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the...

William Binney is one of the highest-level whistleblowers [to] emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance. On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations. “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.” Binney ... described a future where surveillance is ubiquitous and government intrusion unlimited. “The ultimate goal of the NSA is total population control”, Binney said. He praised the revelations and bravery of former NSA contractor Edward Snowden. Unlike Snowden, Binney didn’t take any documents with him when he left the NSA. He now says that hard evidence of illegal spying would have been invaluable. The latest Snowden leaks, featured in the Washington Post, detail private conversations of average Americans with no connection to extremism. It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


CIA employee’s quest to release information ‘destroyed my entire career’
2014-07-04, Washington Post
Posted: 2014-07-14 16:28:12
http://www.washingtonpost.com/world/national-security/cia-employees-quest-to-...

His CIA career included assignments in Africa, Afghanistan and Iraq, but the most perilous posting for Jeffrey Scudder turned out to be a two-year stint in a sleepy office that looks after the agency’s historical files. It was there that Scudder discovered a stack of articles, hundreds of histories of long-dormant conflicts and operations that he concluded were still being stored in secret years after they should have been shared with the public. To get them released, Scudder submitted a request under the Freedom of Information Act — a step that any citizen can take, but one that is highly unusual for a CIA employee. Four years later, the CIA has released some of those articles and withheld others. It also has forced Scudder out. His request set in motion a harrowing sequence. He was confronted by supervisors and accused of mishandling classified information while assembling his FOIA request. His house was raided by the FBI and his family’s computers seized. Stripped of his job and his security clearance, Scudder said he agreed to retire last year after being told that if he refused, he risked losing much of his pension. “I submitted a FOIA and it basically destroyed my entire career,” Scudder said. Scudder’s case .. highlights the risks to workers who take on their powerful spy-agency employers. Scudder’s actions appear to have posed no perceptible risk to national security, but he found himself in the cross hairs of the CIA and FBI.

Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


MP burgled after handing paedophile dossier to Leon Brittan
2014-07-02, The Telegraph (One of the UK's leading newspapers)
Posted: 2014-07-14 16:22:06
http://www.telegraph.co.uk/news/uknews/crime/10942103/MP-burgled-after-handin...

The home of an MP who compiled a dossier alleging paedophile activity within Westminster was burgled twice in suspicious circumstances around the time he took it to the authorities, his son has said. Barry Dickens said nothing was taken in what appeared to be two "very professional" intrusions into his father Geoffrey's home in 1983, leading to suspicions they may have been related to his attempt to expose alleged abuse. He said he did not know what had happened to an apparent second copy of the dossier after the Home Office admitted one which it received for investigation at the time appeared to have been destroyed. "My parents had two burglaries at the time close to it without anything being taken, which seemed a very professional job the way they were carried out," Mr Dickens – whose father died in 1995 – [said]. He said the dossier contained concerns and worries expressed to the MP about the behaviour of ''those with a high profile, in an office or high status'' and questioned its subsequent disappearance. He said his father had been motivated to take on the cause of vulnerable young people by his own difficult childhood in a succession of foster homes and that he would be pleased that the case had become public now. Backing a public inquiry, [he] added: "A lot of people came forward with facts. I think it does need doing and finishing."

Note: See powerful evidence from a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government


Before Shooting in Iraq, a Warning on Blackwater
2014-06-30, New York Times
Posted: 2014-07-07 08:26:27
http://www.nytimes.com/2014/06/30/us/before-shooting-in-iraq-warning-on-black...

Just weeks before Blackwater guards fatally shot 17 civilians at Baghdad’s Nisour Square in 2007, the State Department began investigating the security contractor’s operations in Iraq. But the inquiry was abandoned after Blackwater’s top manager there issued a threat: “that he could kill” the government’s chief investigator and “no one could or would do anything about it as we were in Iraq.” American Embassy officials in Baghdad sided with Blackwater rather than the State Department investigators as a dispute over the probe escalated in August 2007, the previously undisclosed documents show. The officials told the investigators that they had disrupted the embassy’s relationship with the security contractor and ordered them to leave the country. After returning to Washington, the chief investigator wrote a scathing report to State Department officials documenting misconduct by Blackwater employees and warning that lax oversight of the company, which had a contract worth more than $1 billion to protect American diplomats, had created “an environment full of liability and negligence.” “The management structures in place to manage and monitor our contracts in Iraq have become subservient to the contractors themselves,” the investigator, Jean C. Richter, wrote in an Aug. 31, 2007, memo to State Department officials. “Blackwater contractors saw themselves as above the law,” he said, adding that the “hands off” management resulted in a situation in which “the contractors, instead of Department officials, are in command and in control.”

Note: For more on this, see concise summaries of deeply revealing war crimes news articles from reliable major media sources.


Court gave NSA broad leeway in surveillance, documents show
2014-06-30, Washington Post
Posted: 2014-07-07 08:25:08
http://www.washingtonpost.com/world/national-security/court-gave-nsa-broad-le...

A classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well. The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency. The documents underscore the remarkable breadth of potential “foreign intelligence” collection. An affidavit in support of the 2010 foreign-government certification said the NSA believes that foreigners who will be targeted for collection “possess, are expected to receive and/or are likely to communicate foreign intelligence information concerning these foreign powers.” That language could allow for surveillance of academics, journalists and human rights researchers. A Swiss academic who has information on the German government’s position in the run-up to an international trade negotiation, for instance, could be targeted if the government has determined there is a foreign-intelligence need for that information. If a U.S. college professor e-mails the Swiss professor’s e-mail address or phone number to a colleague, the American’s e-mail could be collected as well, under the program’s court-approved rules.

Note: For more on this, see concise summaries of deeply revealing intelligence agency news articles from reliable major media sources.


War Gear Flows to Police Departments
2014-06-09, New York Times
Posted: 2014-06-16 16:44:08
http://www.nytimes.com/2014/06/09/us/war-gear-flows-to-police-departments.html

As President Obama ushers in the end of what he called America’s “long season of war,” the former tools of combat — M-16 rifles, grenade launchers, silencers and more — are ending up in local police departments, often with little public notice. During the Obama administration, according to Pentagon data, police departments have received tens of thousands of machine guns; nearly 200,000 ammunition magazines; thousands of pieces of camouflage and night-vision equipment; and hundreds of silencers, armored cars and aircraft. The equipment has been added to the armories of police departments that already look and act like military units. Police SWAT teams are now deployed tens of thousands of times each year, increasingly for routine jobs. Police departments ... are adding more firepower and military gear than ever. Some, especially in larger cities, have used federal grant money to buy armored cars and other tactical gear. And the free surplus program remains a favorite of many police chiefs who say they could otherwise not afford such equipment. The number of SWAT teams has skyrocketed since the 1980s, according to studies by Peter B. Kraska, an Eastern Kentucky University professor who has been researching the issue for decades. Recruiting videos feature clips of officers storming into homes with smoke grenades and firing automatic weapons. In Springdale, Ark., a police recruiting video is dominated by SWAT clips, including officers throwing a flash grenade into a house and creeping through a field in camouflage.

Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"