Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The White House's expert NSA panel may have made headlines ... for telling President Barack Obama to knock off the collection of Americans' meta-data, but surveillance experts said they were surprised that the panel also took to task some controversial non-NSA-related spy tactics as well. One recommendation was to impose much stricter oversight on the FBI's ability to issue National Security Letters (NSLs), which have been used to obtain telephone call records and credit reports in terrorism and espionage cases. Another even more peculiar recommendation by the five national security experts ... was their advice that "governments" shouldn't hack into bank accounts and drain funds. "Governments should not use their offensive cyber capabilities to change the amounts held in financial accounts or otherwise manipulate the financial systems," the unanimous Review Group on Intelligence and Communications Technologies report warned Obama. "That was a strangely specific recommendation for something nobody was talking about," Kel McClanahan, executive director of government transparency group National Security Counselors, told ABC News. Michelle Richardson, the American Civil Liberties Union's legislative council in Washington, also said the findings on "NSLs" and government hacking were unexpected -- but welcomed.
Note: The fact that this expert panel would even mention governments manipulating financial accounts suggests that if it hasn't already happened, some were seriously considering this. For lots more on this strange news, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Taken together, the [Edward Snowden] revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations. Six months after the first revelations ... Snowden agreed to reflect at length on the roots and repercussions of his choice. He was relaxed and animated over two days of nearly unbroken conversation. Snowden offered vignettes from his intelligence career and from his recent life as “an indoor cat” in Russia. But he consistently steered the conversation back to surveillance, democracy and the meaning of the documents he exposed. “For me, in terms of personal satisfaction, the mission’s already accomplished,” he said. “I already won. As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn’t want to change society. I wanted to give society a chance to determine if it should change itself. All I wanted was for the public to be able to have a say in how they are governed,” he said. Snowden ... had come to believe that a dangerous machine of mass surveillance was growing unchecked. Closed-door oversight by Congress and the Foreign Intelligence Surveillance Court was a “graveyard of judgment,” he said, manipulated by the agency it was supposed to keep in check. The NSA’s business is “information dominance,” the use of other people’s secrets to shape events. At 29, Snowden upended the agency on its own turf.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
British and American intelligence agencies had a comprehensive list of surveillance targets that included the EU's competition commissioner, German government buildings in Berlin and overseas, and the heads of institutions that provide humanitarian and financial help to Africa, top-secret documents reveal. The papers show GCHQ [and the NSA were] targeting organisations such as the United Nations development programme, the UN's children's charity Unicef and Médecins du Monde, a French organisation that provides doctors and medical volunteers to conflict zones. The head of the Economic Community of West African States (Ecowas) also appears in the documents, along with text messages he sent to colleagues. One GCHQ document, drafted in January 2009, makes clear that the agencies were targeting an email address listed as belonging to another important American ally – the "Israeli prime minister". Ehud Olmert was in office at the time. Three further Israeli targets appeared on GCHQ documents, including another email address understood to have been used to send messages between the then Israeli defence minister, Ehud Barak, and his chief of staff, Yoni Koren. The names and details are the latest revelations to come from documents leaked by the whistleblower Edward Snowden. They provoked a furious reaction. The disclosures reflect the breadth of targets sought by the agencies, which goes far beyond the desire to intercept the communications of potential terrorists and criminals, or diplomats and officials from hostile countries.
Note: Later reports revealed that GHCQ also targeted the global human rights organization Amnesty International. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products. Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year. The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Suspected Boston Marathon bomber Tamerlan Tsarnaev heard voices inside his head and had an alter-ego, a report published in The Boston Globe claimed yesterday. Donald Larking, 67, who attended the same Boston mosque as the suspected bomber, said Tsarnaev believed the voices were part of a “majestic mind control”, which was “a way of breaking down a person and creating an alternative personality with which they must coexist." Larking also told the Globe that Tsarnaev was “torn” between himself and an alter-ego. “You can give a signal, a phrase or a gesture, and bring out the alternate personality and make them do things,” he said; “Tamerlan thought someone might have done that to him.” According to the report, the voices “came to [Tsarnaev] at unexpected times, an internal rambling that he alone could hear. Alarmed, he confided to his mother that the voice 'felt like two people inside of me. “As he got older, the voice became more authoritative, its bidding more insistent. Tamerlan confided in a close friend that the voice had begun to issue orders and to require him to perform certain acts, though he never told his friend specifically what those acts were.” Tamerlan, 26, and his younger brother Dzhokhar, 20, are alleged to have planted the two pressure cooker bombs that killed three and injured more than 260 at the Boston Marathon in April. While Tamerlan was later killed in a shootout with police, his brother was captured and now potentially faces the death penalty under charges of terrorism.
Note: Many have long suspected that most mass murderers are mind control victims subject to top secret mind control programs, like those revealed in declassified government documents on this webpage. For the full investigative report in the Boston Globe, click here. For lots more verifiable information on these mind control programs, click here.
National Security Agency leaker Edward Snowden wrote in a lengthy “open letter to the people of Brazil” that he has been inspired by the global debate ignited by his release of thousands of documents and that the NSA’s culture of indiscriminate global espionage “is collapsing.” In the letter, Snowden commended the Brazilian government for its strong stand against U.S. spying. He wrote that he would be willing to help the South American nation investigate NSA spying on its soil but could not fully participate in doing so without being granted political asylum, because the U.S. “government will continue to interfere with my ability to speak.” The documents revealed that Brazil is the top NSA target in Latin America, in spying that has included the monitoring of Brazilian President Dilma Rousseff’s cellphone and hacking into the internal network of the state-run oil company Petrobras. In his letter, Snowden dismissed U.S. explanations to the Brazilian government and others that the bulk metadata gathered on billions of e-mails and calls was more “data collection” than surveillance. “There is a huge difference between legal programs, legitimate spying ... and these programs of dragnet mass surveillance that put entire populations under an all-seeing eye and save copies forever,” he wrote. “These programs were never about terrorism: they’re about economic spying, social control, and diplomatic manipulation. They’re about power.” Brazilian senators have asked for Snowden’s help during hearings about the NSA’s targeting of Brazil, an important transit hub for transatlantic fiber-optic cables that are hacked.
Note: To read Snowden's full, inspiring letter, click here.
At least since the aftermath of September 2001, western governments and intelligence agencies have been hard at work expanding the scope of their own power, while eroding privacy, civil liberties and public control of policy. What used to be viewed as paranoid, Orwellian, tin-foil hat fantasies [turn] out post-Snowden, to be not even the whole story. We've been warned for years that these things were going on: wholesale surveillance of entire populations, militarization of the internet, the end of privacy. Secret laws, secret interpretations of secret laws by secret courts and no effective parliamentary oversight whatsoever. By and large the media have paid scant attention to this, even as more and more courageous, principled whistleblowers stepped forward. The unprecedented persecution of truth-tellers, initiated by the Bush administration and severely accelerated by the Obama administration, has been mostly ignored, while record numbers of well-meaning people are charged with serious felonies simply for letting their fellow citizens know what's going on. Numerous ex-NSA officials have come forward in the past decade, disclosing massive fraud, vast illegalities and abuse of power in [that] agency, including Thomas Drake, William Binney and Kirk Wiebe. The response was 100% persecution and 0% accountability by both the NSA and the rest of government. Since the summer of 2013, the public has witnessed a shift in debate over these matters. The reason is that one courageous person: Edward Snowden.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The Senate Intelligence Committee has asked the C.I.A. for an internal study done by the agency that lawmakers believe is broadly critical of the C.I.A.’s detention and interrogation program but was withheld from congressional oversight committees. The committee’s request comes in the midst of a yearlong battle with the C.I.A. over the release of the panel’s own exhaustive report about the program, one of the most controversial policies of the post-Sept. 11 era. The Senate report, totaling more than 6,000 pages, was completed last December but has yet to be declassified. According to people who have read the study, it is unsparing in its criticism of the now-defunct interrogation program and presents a chronicle of C.I.A. officials’ repeatedly misleading the White House, Congress and the public about the value of brutal methods that, in the end, produced little valuable intelligence. Senator Mark Udall, Democrat of Colorado, disclosed the existence of the internal C.I.A. report during an Intelligence Committee hearing on Tuesday. He said he believed it was begun several years ago and “is consistent with the Intelligence’s Committee’s report” although it “conflicts with the official C.I.A. response to the committee’s report.” “If this is true,” Mr. Udall said ... “this raises fundamental questions about why a review the C.I.A. conducted internally years ago — and never provided to the committee — is so different from the C.I.A.’s formal response to the committee study.”
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency isn't the only government entity secretly collecting data from people's cellphones. Local police are increasingly scooping it up, too. Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information about thousands of cellphone users at a time, whether they are targets of an investigation or not. The records, from more than 125 police agencies in 33 states, reveal [that] about one in four law-enforcement agencies have used a tactic known as a "tower dump," which gives police data about the identity, activity and location of any phone that connects to the targeted cellphone towers over a set span of time, usually an hour or two. A typical dump covers multiple towers, and wireless providers, and can net information from thousands of phones. At least 25 police departments own a Stingray, a suitcase-size device that costs as much as $400,000 and acts as a fake cell tower. The system, typically installed in a vehicle so it can be moved into any neighborhood, tricks all nearby phones into connecting to it and feeding data to police. In some states, the devices are available to any local police department via state surveillance units. Organizations such as the American Civil Liberties Union and Electronic Privacy Information Center say the swelling ability by even small-town police departments to easily and quickly obtain large amounts of cellphone data raises questions about the erosion of people's privacy as well as their Fourth Amendment protections against unreasonable search and seizure.
Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.
Pulitzer Prize-winning journalist Seymour Hersh accused the Obama administration ... of having “cherry-picked intelligence” regarding the Aug. 21 chemical attack in Syria that served as evidence for an argument in favor of striking President Bashar Assad's government. Though President Barack Obama eventually decided not to strike Syria, the administration made a public case for war by saying that Assad’s regime was responsible for a poison gas attack in the outskirts of Damascus. The U.N. later concluded the attack had involved the nerve agent sarin. In his piece -- titled "Whose Sarin?" -- Hersh reported that al-Nusra, a jihadi group fighting in Syria’s long-running civil war, had also "mastered the mechanics of creating sarin and was capable of manufacturing it in quantity.” Therefore, he wrote, “Obama did not tell the whole story” when stating with certainty that Assad had to be responsible, crossing a so-called "red line" that would trigger U.S. retaliation. Hersh is a freelancer, but he's best known these days for his work in The New Yorker, where he helped break the Abu Ghraib scandal in 2004. In an email, Hersh wrote that “there was little interest” for the story at The New Yorker. Hersh then took the story to The Washington Post. Hersh wrote that he was told by email that Executive Editor Marty Baron decided “that the sourcing in the article did not meet the Post's standards.” Hersh [then] sent the Syria story to editors at the London Review of Books, LRB Senior Editor Christian Lorentzen [said]. Lorentzen said the piece was not only edited, but thoroughly fact checked by a former New Yorker fact checker who had worked with Hersh in the past.
Note: For more on government lies to provide pretexts for war, see the deeply revealing reports from reliable major media sources available here.
A participant in a White House-sponsored review of surveillance activities described as “shameful” an apparent decision to leave most of the National Security Agency’s controversial bulk spying intact. Sascha Meinrath, director of the Open Technology Institute, said [on December 13] that ... “The review group was searching for ways to make the most modest pivot necessary to continue business as usual.” Should the review group’s report resemble descriptions that leaked ... the report “does nothing to alter the lack of trust the global populace has for what the US is doing, and nothing to restore our reputation as an ethical internet steward,” said Meinrath, who met with the advisory panel and White House officials twice to discuss the bulk surveillance programs that have sparked international outrage. Leaks about the review group’s expected recommendations to the New York Times and Wall Street Journal strengthened Meinrath and other participants’ long-standing suspicions that much of the NSA’s sweeping spy powers would survive. The Times quoted an anonymous official familiar with the group saying its report “says we can’t dismantle these programs, but we need to change the way almost all of them operate”. According to the leaks, the review group will recommend that bulk collection of every American’s phone call data continue, possibly by the phone companies instead of the NSA, with tighter restrictions than the “reasonable, articulable suspicion” standard for searching through them that the NSA currently employs.
Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.
The federal government’s main terrorist watch list has grown to at least 700,000 people, with little scrutiny over how the determinations are made or the impact on those marked with the terrorist label. The government refuses to confirm or deny whether someone is on the list, officially called the Terrorist Screening Database, or divulge the criteria used to make the decisions. Even less is known about the secondary watch lists that are derived from the main one, including the no-fly list (used to prevent people from boarding aircraft), the selectee and expanded selectee lists (used to flag travelers for extra screening at airport checkpoints), the TECS database (used to vet people entering or leaving the United States), the Consular Lookout and Support System (used to screen visa applications) and the known or suspected terrorists list (used by law enforcement in routine police encounters). For people who have landed on these lists, the terrorist designation has been difficult to challenge legally. The Terrorist Screening Center, which administers the main terrorist watch list, declined to discuss its procedures, or to release current data about the number of people on various watch lists, and how many of them are American citizens.
Note: For more on government threats to civil liberties, see the deeply revealing reports from reliable major media sources available here.
Europe’s human rights court shone a rare public light [December 3] on the secret network of European prisons that the CIA used to interrogate terrorism suspects, reviving questions about the “extraordinary renditions” that angered many on this continent. At [the] hearing, attorneys for two terrorism suspects currently held by the United States at Guantanamo Bay, Cuba, accused Poland of human rights abuses. The lawyers say the suspects fell victim to the CIA’s rendition program, in which terrorism suspects were kidnapped and transferred to third countries; they allege that the two were tortured in a remote Polish prison. All the prisons were closed by May 2006. Interrogations at sea have replaced CIA “black sites” as the U.S. government’s preferred method for holding terrorism suspects and questioning them without access to lawyers. One of the cases heard [concerns] 48-year-old Saudi national Abd al-Rahim al-Nashiri, who faces U.S. terrorism charges for allegedly orchestrating the al-Qaeda attack on the USS Cole in 2000, a bombing in the Yemeni port of Aden that killed 17 sailors. The second case involves 42-year-old Abu Zubaida, a Palestinian also held in Guantanamo who has never been charged with a crime. Both men say they were brought in December 2002 to Poland, where they were detained and subjected to harsh questioning at a Polish military installation in Stare Kiejkuty, a village in the country’s remote northeast. There they were subject to mock executions, waterboarding and other tortures, including being told their families would be arrested and sexually abused, said Amrit Singh, a lawyer representing Nashiri.
Note: For more on war crimes by the US and UK in the "global war on terror", see the deeply revealing reports from reliable major media sources available here.
Despite the Cold War rhetoric of his campaign, JFK's greatest ambition as president was to break the militaristic ideology that has dominated our country since World War II. He told his close friend Ben Bradlee that he wanted the epitaph "He kept the peace," and said to another friend, William Walton, "I am almost a 'peace at any price' president." Hugh Sidey, a journalist and friend, wrote that the governing aspect of JFK's leadership was "a total revulsion" of war. Nevertheless, as James W. Douglass argues in his book JFK and the Unspeakable: Why He Died and Why It Matters, JFK's presidency would be a continuous struggle with his own military and intelligence agencies, which engaged in incessant schemes to trap him into escalating the Cold War into a hot one. His first major confrontation with the Pentagon, the Bay of Pigs catastrophe, came only three months into his presidency and would set the course for the next 1,000 days. From the start, JFK recoiled at the caper's stench, as CIA Director Allen Dulles has acknowledged, demanding assurances from CIA and Pentagon brass that there was no chance of failure and that there would be no need for U.S. military involvement. Dulles and the generals knowingly lied and gave him those guarantees. When the invasion failed, JFK refused to order airstrikes against Castro. JFK was realizing that the CIA posed a monumental threat to American democracy. As the brigade faltered, he told Arthur Schlesinger that he wanted to "splinter the CIA into a thousand pieces and scatter it to the winds."
Note: For more on the powerful social forces that assassinated JFK, see the deeply revealing reports from reliable major media sources available here.
Canada allowed the U.S. National Security Agency (NSA) to conduct widespread surveillance during the 2010 Group of 20 summit in Toronto, according to a media report that cited documents from former NSA contractor Edward Snowden. The report by the Canadian Broadcasting Corp ... cited briefing notes it said showed the United States turned its Ottawa embassy into a security command post during a six-day spying operation by the top-secret U.S. agency as President Barack Obama and other world leaders met that June. One of the bylines on the CBC report was Glenn Greenwald, the U.S. journalist who has worked with Snowden on several other NSA stories. CBC ... quoted an NSA briefing note describing the operation as "closely coordinated with the Canadian partner". The Canadian equivalent of the NSA is the Communications Security Establishment Canada, or CSEC. CBC said the documents did not reveal the targets of the NSA operation, but described part of the U.S. eavesdropping agency's mandate at the Toronto summit as "providing support to policymakers". CSEC, which has a very low public profile, employs about 2,000 people. It is part of the so-called Five Eyes intelligence-sharing network that also includes the United States, Britain, New Zealand and Australia. Last month, Brazil angrily demanded an explanation for media reports which said CSEC agents had targeted its mines and energy industry.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Jimmy Wales, the founder of Wikipedia, has called on Barack Obama to rein in the National Security Agency as he described the whistleblower Edward Snowden as "a hero" whom history will judge "very favourably". Wales called for a "major re-evaluation" of the NSA, adding that the public "would have never approved this sweeping surveillance program" had it been put to a vote. The revelations, Wales said, had been "incredibly damaging and embarrassing to the US. It makes it very difficult for someone like me to go out, as I do, [to] speak to people in authoritarian countries, and say: 'You shouldn’t be spying on activists, you shouldn’t be censoring the internet', when we [in the US] are complicit in these acts of extraordinary intrusion into people’s personal lives. [Snowden] has exposed what I believe to be criminal wrongdoing, lying to Congress, and certainly [an] affront to the Fourth Amendment. I think that history will judge him very favourably. There is a growing sense of concern in Congress about this, a growing sense in Congress that public is angry about this, that they have been misled and I think we are going to see legislation to change this."
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
In the early years after Sept. 11, 2001, the CIA turned some Guantanamo Bay prisoners into double agents, sending them home to help the United States kill terrorists, current and former U.S. officials said. The CIA promised the prisoners freedom, safety for their families and millions of dollars from the agencys secret accounts. It was a gamble. Officials knew there was a chance that some prisoners might quickly spurn their deal and kill Americans. Nearly a dozen current and former U.S. officials described aspects of the program to the Associated Press. Dozens of prisoners were evaluated, but only a handful, from a variety of countries, were turned into spies who signed agreements to work for the CIA. Prisoners agreed to cooperate for a variety of reasons, officials said. Some received assurances that the United States would resettle their families. Another agreed to cooperate after the agency insinuated that it would harm his children, a former official said, a threat similar to those interrogators made to self-proclaimed Sept. 11 mastermind Khalid Sheik Mohammed. All were promised money. Exactly how much each received remains unclear. But altogether, the government paid millions for their services, officials said. The money came from a secret CIA account, code-named Pledge, that is used to pay informants, officials said. Officials said the program ended in 2006 as the flow of detainees to Guantanamo Bay slowed to a trickle. The last prisoner arrived there in 2008.
Note: There is no doubt that the CIA used mind control techniques to control and likely program some of the prisoners. To read verifiable documentation on the U.S. governments secret mind control programs, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
The CIA is funding a study examining various ways mankind can geo-engineer the planet -- blocking or limiting the sunlight that reaches the Earth, stripping carbon dioxide from the skies, seeding the clouds and so on. The project, a panel called “Geoengineering Climate: Technical Evaluation and Discussion of Impacts,” is backed by the National Academy of Sciences [NAS}, the National Oceanic and Atmospheric Administration (NOAA), NASA -- and the U.S. intelligence community. That’s spy-talk for the CIA, William Kearney, a spokesman for NAS, [said]. Conspiracy theorists love to argue that various world governments seek to control the weather; they cite “chemtrails” and cloud seeding and so on. The group’s first two meetings, May 20 and June 19, were closed-door in their entirety. On July 17 in Washington D.C., closed-door morning and evening meetings book-ended a public session, however, offering a peek into the group’s plans -- and it’s nothing worthy of Fox Mulder’s time, explained Edward Dunlea, study director with the National Academies. “Nothing involved in this study is classified at all,” Dunlea told FoxNews.com. “ This is an assessment of what is known in the science literature about some of the proposed engineering techniques -- both solar-radiation management and carbon-dioxide removal. All of our sponsors are interested in this topic as a part of the larger climate-change discussion, which has economic, environmental and national-security ramifications,” he said.
Note: If nothing is classified, why are the meetings secret? For solid evidence that elements of government have used the HAARP program to control the weather, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
A secret court order that authorised a massive trawl by the National Security Agency of Americans' email and internet data was published for the first time on [November 18], among a trove of documents that also revealed a judge's concern that the NSA "continuously" and "systematically" violated the limits placed on the program. Another later court order found that what it called "systemic overcollection" had taken place. In a heavily redacted opinion Colleen Kollar-Kotelly, the former presiding judge of the FISA court, placed legal weight on the methods of surveillance employed by the NSA, which had never before collected the internet data of “an enormous volume of communications”. The methods, known as pen registers and trap-and-trace devices, record the incoming and outgoing routing information of communications. Kollar-Kotelly ruled that acquiring the metadata, and not the content, of email and internet usage in bulk was harmonious with the “purpose” of Congress and prior court rulings – even though no surveillance statute ever authorized it and top officials at the Justice Department and the FBI threatened to resign in 2004 over what they considered its dubious legality. The type of data collected under the program included information on the "to", "from" and "bcc" lines of an email rather than the content. Metadata, wrote Kollar-Kotelly, enjoyed no protection under the fourth amendment to the US constitution, a precedent established by the Supreme Court in 1979 in a single case on which the NSA relies currently.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden. In the first explicit confirmation that UK citizens have been caught up in US mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo ... says the material is being put in databases where it can be made available to other members of the US intelligence and military community. Until now, it had been generally understood that the citizens of each country were protected from surveillance by any of the others. But the Snowden material reveals that: • In 2007, the rules were changed to allow the NSA to analyse and retain any British citizens' mobile phone and fax numbers, emails and IP addresses swept up by its dragnet. • These communications were "incidentally collected" by the NSA, meaning the individuals were not the initial targets of surveillance operations and therefore were not suspected of wrongdoing. • The NSA has been using the UK data to conduct so-called "pattern of life" or "contact-chaining" analyses, under which the agency can look up to three "hops" away from a target of interest – examining the communications of a friend of a friend of a friend. Three hops for a typical Facebook user could pull the data of more than 5 million people into the dragnet.
Note: For more on government threats to privacy, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.