Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
What are we to make of Edward Snowden? I know what I once made of him. He was no real whistleblower, I wrote, but “ridiculously cinematic” and “narcissistic” as well. As time has proved, my judgments were just plain wrong. Whatever Snowden is, he is curiously modest and has bent over backward to ensure that the information he has divulged has done as little damage as possible. As a “traitor,” he lacks the requisite intent and menace. But traitor is what Snowden has been roundly called. Harry Reid: “I think Snowden is a traitor.” John Boehner: “He’s a traitor.” Rep. Peter King: “This guy is a traitor; he’s a defector.” And Dick Cheney not only denounced Snowden as a “traitor” but also suggested that he might have shared information with the Chinese. This innuendo, as with Saddam Hussein’s weapons of mass destruction, is more proof of Cheney’s unerring determination to be cosmically wrong. The early denunciations of Snowden now seem both over the top and beside the point. If he is a traitor, then which side did he betray and to whom does he now owe allegiance? Snowden seems to have sold out to no one. In fact, a knowledgeable source says that Snowden has not even sold his life story and has rebuffed offers of cash for interviews. Maybe his most un-American act is passing up a chance at easy money. Someone ought to look into this. Snowden’s residency in Russia has been forced upon him — he had nowhere else to go. Snowden insists that neither the Russians nor, before them, the Chinese have gotten their grubby hands on his top-secret material.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
It was an innocuous e-mail, one of millions sent every day by spouses with updates on the situation at home. But this one was of particular interest to the National Security Agency and contained clues that put the sender’s husband in the crosshairs of a CIA drone. Days later, Hassan Ghul ... was killed by a drone strike in Pakistan’s tribal belt. Documents provided ... by former NSA contractor Edward Snowden confirm his demise in October 2012 and reveal the agency’s extensive involvement in the targeted killing program that has served as a centerpiece of President Obama’s counterterrorism strategy. The documents provide the most detailed account of the intricate collaboration between the CIA and the NSA in the drone campaign. [The] collection of records in the Snowden trove [make] clear that the drone campaign — often depicted as the CIA’s exclusive domain — relies heavily on the NSA’s ability to vacuum up enormous quantities of e-mail, phone calls and other fragments of signals intelligence, or SIGINT. To handle the expanding workload, the NSA created a secret unit known as the Counter-Terrorism Mission Aligned Cell, or CT MAC, to concentrate the agency’s vast resources on hard-to-find [targets]. Former CIA officials said the files are an accurate reflection of the NSA’s contribution to finding targets in a campaign that has killed more than 3,000 people [in] Pakistan.
Note: For more on the use of drones to kill abroad and spy at home, see the deeply revealing reports from reliable major media sources available here.
Five decades after President John F. Kennedy was fatally shot and long after official inquiries ended, thousands of pages of investigative documents remain withheld from public view. The contents of these files are partially known — and intriguing — and conspiracy buffs are not the only ones seeking to open them for a closer look. Some serious researchers believe the off-limits files could shed valuable new light on nagging mysteries of the assassination — including what U.S. intelligence agencies knew about accused assassin Lee Harvey Oswald before Nov. 22, 1963. It turns out that several hundred of the still-classified pages concern a deceased CIA agent, George Joannides, whose activities just before the assassination and, fascinatingly, during a government investigation years later, have tantalized researchers for years. "This is not about conspiracy, this is about transparency," said Jefferson Morley, a former Washington Post reporter and author embroiled in a decade-long lawsuit against the CIA, seeking release of the closed documents. "I think the CIA should obey the law. I don't think most people think that's a crazy idea." But so far, the Joannides files and thousands more pages primarily from the CIA remain off-limits at a National Archives center in College Park, Md. Anthony Summers, a British author whose sequel to his JFK book Not In Your Lifetime will be released this year, [said] "By withholding Joannides material, the agency continues to encourage the public to believe they're covering up something more sinister."
Note: For more on the strange secrecy around Joannides and his checkered past, see the New York Times article summarized here. For more on political assassinations, see the deeply revealing reports from reliable major media sources available here.
A video [that went viral] featured footage of a mid-1950s housewife on an acid trip during an LSD experiment. In the film, a researcher, Dr. Sidney Cohen, is shown interviewing, and then dosing, a volunteer at the Veteran's Administration Hospital in Los Angeles. The woman, who is identified only as the wife of a hospital employee, is in her late 20s or early 30s and appears fairly typical of her time. LSD was a legal pharmaceutical drug until 1966. Journalist Don Lattin says he came across the video in the archives of philosopher Gerald Heard while researching a group biography on him, the British writer Aldous Huxley, and Bill Wilson, co-founder of Alcoholics Anonymous. In the video that Lattin posted online, [the housewife] is clearly under the influence and appears to be rather enjoying it. She says: "Everything is alive. This is reality. I wish you could see it. I wish I could talk in technicolor." "This shows that very early on in the 1950s, researchers were aware that there were possible beneficial uses, rather than military or more nefarious uses," he says. In the early 1950s and into the '60s the Army and CIA secretly funded a lot of research to see if LSD could be used as a chemical weapon or a truth serum, says Lattin. But Cohen and his ilk were pursuing a different line of study. They wanted to understand how it works, how the mind works and the connection between the psychotic state and a spiritually enlightened state." Indeed, Wilson, the AA co-founder, did a fair amount of LSD in the 50s , says Lattin. "This surprises people, but he wasn't doing it to get high," he adds. "It was to achieve that spiritual awakening."
Note: The video of this session is quite inspiring. See it at this link. For more on mind-altering drugs, see the deeply revealing reports from reliable major media sources available here.
The problem and the risk [with surveillance by GCHQ] comes in the area of mass capture of data, or strategic surveillance. This is the kind of intelligence gathering that sucks in data from everyone, everywhere: from phones, internet use from email to website visits, social networking, instant messaging and video calls, and even areas such as video gaming; in short, everything digital. In the US, the Prism programme may have given the NSA access to the servers of companies such as Google and Facebook; in the UK, GCHQ has gained a similar degree of access via its Tempora programme, and the two of them together have a cable- and network-tapping capabilities collectively called Upstream, which have the ability to intercept anything that travels over the internet. This data is fed into a database called XKeyscore, which allows analysts to extract information "in real time", ie immediately. What this adds up to is a new thing in human history: with a couple of clicks of a mouse, an agent of the state can target your home phone, or your mobile, or your email, or your passport number, or any of your credit card numbers, or your address, or any of your log-ins to a web service. Using that "selector", the state can get access to all the content of your communications, via any of those channels; can gather information about anyone you communicate with, can get a full picture of all your internet use, can track your location online and offline. It can, in essence, know everything about you, including – thanks to the ability to look at your internet searches – what's on your mind.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Federal grants of $7 million, initially intended to help thwart terror attacks at the port in Oakland, Calif., are instead going to a police initiative that will collect and analyze reams of surveillance data. The new system ... is the latest example of how cities are compiling and processing large amounts of information, known as big data, for routine law enforcement. And the system underscores how technology has enabled the tracking of people in many aspects of life. Like the Oakland effort, other pushes to use new surveillance tools in law enforcement are supported with federal dollars. The New York Police Department, aided by federal financing, has a big data system that links 3,000 surveillance cameras with license plate readers, radiation sensors, criminal databases and terror suspect lists. Police in Massachusetts have used federal money to buy automated license plate scanners. And police in Texas have bought a drone with homeland security money. [Critics] of the Oakland initiative, formally known as the Domain Awareness Center, [say] the program, which will create a central repository of surveillance information, will also gather data about the everyday movements and habits of law-abiding residents. Oakland has a contract with the Science Applications International Corporation, or SAIC, to build its system. That company has earned the bulk of its $12 billion in annual revenue from military contracts.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The owner of the e-mail service [Lavabit, Ladar Levison,] said he closed it down after the government, in pursuit of Edward J. Snowden, sought untrammeled access to the protected messages of all his customers. Mr. Levison was willing to allow investigators with a court order to tap Mr. Snowden’s e-mail account; he had complied with similar narrowly targeted requests involving other customers about two dozen times. But they wanted more, he said: the passwords, encryption keys and computer code that would essentially allow the government untrammeled access to the protected messages of all his customers. That, he said, was too much. On Aug. 8, Mr. Levison closed Lavabit rather than, in his view, betray his promise of secure e-mail to his customers. On [October 2], a federal judge unsealed documents in the case, allowing the tech entrepreneur to speak candidly for the first time about his experiences. He had been summoned to testify to a grand jury in Virginia; forbidden to discuss his case; held in contempt of court and fined $10,000 for handing over his private encryption keys on paper and not in digital form; and, finally, threatened with arrest for saying too much when he shuttered his business. While Mr. Levison’s struggles have been with the F.B.I., hovering in the background is the N.S.A., which has worked secretly for years to undermine or bypass encrypted services like Lavabit so that their electronic message scrambling cannot obstruct the agency’s spying. Mr. Levison’s case shows how law enforcement officials can use legal tools to pry open messages, no matter how well protected.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The murder of President Kennedy was a seminal event for me and for millions of Americans. It changed the course of history. It was a crushing blow to our country and to millions of people around the world. Today, ... profound doubts persist about how President Kennedy was killed and why. My film "JFK" was a metaphor for all those doubts, suspicions and unanswered questions. Now an extraordinary new book offers the best account I have read of this tragedy and its significance. That book is James Douglass's JFK and the Unspeakable: Why He Died and Why It Matters. In his beautifully written and exhaustively researched treatment, Douglass lays out the "motive" for Kennedy's assassination. Simply, he traces a process of steady conversion by Kennedy from his origins as a traditional Cold Warrior to his determination to pull the world back from the edge of destruction. Many of these steps are well known, such as Kennedy's disillusionment with the CIA after the disastrous Bay of Pigs Invasion, and his refusal to follow the reckless recommendations of the Joint Chiefs of Staff in resolving the Cuban Missile Crisis. But many of his steps remain unfamiliar: Kennedy's back-channel dialogue with Khrushchev and their shared pursuit of common ground; his secret opening to dialogue with Fidel Castro (ongoing the very week of his assassination); and his determination to pull out of Vietnam after his probable re-election in 1964. All of these steps caused him to be regarded as a virtual traitor by elements of the military-intelligence community. These were the forces that planned and carried out his assassination.
Note: For more on this important book, click here. For an excellent collection of the best information, videos, books, and essays on the John F. Kennedy assassination, click here.
Twice each week, a top-secret report with distinctive red stripes lands on the desks of select policymakers in Washington. Called the "Red Cell," it is the work of a CIA unit by the same name, set up after the 9/11 attacks. "Some of it is really wacky, even scary," says an insider. "Like bombing Iran." The "Red Cell," in a very real sense, is emblematic of the trouble the U.S. intelligence community finds itself in today. Created in 1947, the U.S. intelligence community has grown enormously in terms of bodies and dollars but also in the number and complexity of its responsibilities. It has also, for many reasons, grown into a mess. After 9/11, Americans had good reason to assume the nation's intelligence capabilities were being improved. But then came the Iraq war and the subsequent revelations that the CIA's "slam dunk" intelligence on Saddam Hussein's stockpiles of banned weapons was a complete air ball, a casualty of badly forged documents, eager exiles with outlandish stories, and analysis that, in the most charitable sense, could be described as flawed. The Senate Intelligence Committee's 511-page Iraq report documents how on the country's weightiest issue – whether to launch a pre-emptive war – the U.S. intelligence community ended up wrong on virtually every critical point. "In short," laments Sen. Jay Rockefeller, the intelligence panel's ranking Democrat, "we went to war in Iraq based on false claims." When Harry Truman signed into law the National Security Act of 1947, creating the CIA, he wanted precisely what the name implied: a central agency for intelligence. "The CIA was set up by me for the sole purpose of getting all the available information to the president," Truman wrote. "It was not intended to operate as an international agency engaged in strange activities." Within months, of course, Truman himself was ordering the CIA to engage in "strange activities," such as staving off a Communist takeover in Italy.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
A Department of Justice memo [distributed by the FBI] instructs local police, under a program named "Communities Against Terrorism," to consider anyone who harbors "conspiracy theories" about 9/11 to be a potential terrorist. The memo thus adds 9/11-official-story skeptics to a growing list of targets described by federal law enforcement [as] security threats, such as those who express "libertarian philosophies," "Second Amendment-oriented views," interest in "self-sufficiency," "fears of Big Brother or big government," and "Declarations of Constitutional rights and civil liberties." A newly released national poll shows that 48 percent of Americans either have some doubts about the official account of 9/11, or do not believe it at all. The FBI memo entitled "Potential Indicators of Terrorist Activities Related to Sleepers" says that people who should be 'considered suspicious' [for] possible involvement in "terrorist activity" include those who hold the "attitude" described as "Conspiracy theories about Westerners." The memo continues: "e.g. (sic) the CIA arranged for 9/11 to legitimize the invasion of foreign lands." "Sleepers" refers to "sleeper cells," in FBI jargon, which are terrorists awaiting orders to be activated into terrorist activity. According to the polling firm YouGov, 38% of Americans have some doubts about the official account of 9/11, 10% do not believe it at all, and 12% are unsure about it. Among well-known doubters of the official 9/11 account are many military officers, law enforcement personnel, firefighters, and pilots.
Note: We don't normally use Digital Journal as a news source, but this article is too important to not include, and no major media source is covering the story. For evidence that search engines are actively blocking 9/11 truth videos, click here. For more on the questions raised about the official explanation of the 9/11 events by highly respected professors and former government and military officials, click here and here.
Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials. The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor. The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners. Almost everything about the agency’s operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nation’s intelligence court or any public debate.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
The CIA has been subjecting operatives to monthly polygraph tests in an attempt to suppress details of a reported US arms smuggling operation in Benghazi that was ongoing when its ambassador was killed by a mob in the city last year, according to reports. Up to 35 CIA operatives were working in the city during the attack last September on the US consulate that resulted in the death of Ambassador Chris Stevens and three other Americans, according to CNN. The television network said that a CIA team was working in an annex near the consulate on a project to supply missiles from Libyan armouries to Syrian rebels. Sources said that more Americans were hurt in the assault ... than had been previously reported. CIA chiefs were actively working to ensure the real nature of its operations in the city did not get out. So only the losses suffered by the State Department in the city had been reported to Congress. Frank Wolf, a US congressman who represents the district that contains CIA headquarters in Langley, Virginia, is one of 150 members of Congress for a new investigation into the failures in Benghazi. "I think it is a form of a cover-up, and I think it's an attempt to push it under the rug," he said. "We should have the people who were on the scene come in, testify under oath, do it publicly, and lay it out. And there really isn't any national security issue involved with regards to that."
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
[Seymour] Hersh, the investigative journalist who has been the nemesis of US presidents since the 1960s and who was once described by the Republican party as "the closest thing American journalism has to a terrorist", ... is angry about the timidity of journalists in America, their failure to challenge the White House and be an unpopular messenger of truth. Don't even get him started on the ... death of Osama bin Laden. "Nothing's been done about that story, it's one big lie, not one word of it is true," he says of the dramatic US Navy Seals raid in 2011. Hersh is writing a book about national security and has devoted a chapter to the bin Laden killing. He says a recent report put out by an "independent" Pakistani commission about life in the Abottabad compound in which Bin Laden was holed up would not stand up to scrutiny. "The Pakistanis put out a report, don't get me going on it. Let's put it this way, it was done with considerable American input. It's a bullshit report," he says hinting of revelations to come in his book. The Obama administration lies systematically, he claims, yet none of the leviathans of American media, the TV networks or big print titles, challenge him. He is certain that NSA whistleblower Edward Snowden "changed the whole nature of the debate" about surveillance. "But I don't know if it's going to mean anything in the long [run] because the polls I see in America – the president can still say to voters 'al-Qaida, al-Qaida' and the public will vote two to one for this kind of surveillance, which is so idiotic," he says.
Note: For a powerful analysis by scholar David Ray Griffin of the years-long Osama bin Laden psyop, arguing that bin Laden probably died in December 2001, see his book Osama Bin Laden: Dead or Alive?. For more on media cover-ups of important realities, see the deeply revealing reports from reliable major media sources available here.
The US National Security Agency spied on civil rights leader Martin Luther King and boxer Muhammad Ali during the height of the Vietnam War protests, declassified documents reveal. The documents show the NSA also tracked journalists from the New York Times and the Washington Post and two senators. Some NSA officials later described the programme as "disreputable if not outright illegal", the documents show. The operation, dubbed "Minaret", was originally exposed in the 1970s. However, the names of those on the phone-tapping "watch list" had been kept secret until now. The secret papers were published after a government panel ruled in favour of researchers at George Washington University. The university's National Security Archive - a research institute that seeks to check government secrecy - described the names on the NSA's watch-list as "eye-popping". The agency eavesdropped on civil rights leaders Martin Luther King and Whitney Young as well as boxing champion Muhammad Ali, New York Times journalist Tom Wicker and Washington Post columnist Art Buchwald. The NSA also monitored the overseas phone calls of two prominent US senators - Democrat Frank Church and Republican Howard Baker. In 1967 the strength of the anti-war campaign led President Lyndon Johnson to ask US intelligence agencies to find out if some protests were being stoked by foreign governments. Many of those targeted were considered to be critics of US involvement in the Vietnam War. The NSA worked with other spy agencies to draw up the "watch lists" of anti-war critics, tapping their phone calls. The programme continued after Richard Nixon entered the White House in 1969.
Note: These names were kept secret until now allegedly for reason of "national security." Note how this term is repeatedly used to cover up illegal government activity solely to protect those who commit these crimes. For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
One of the most overlooked aspects of the NSA reporting in the US has been just how global of a story this has become. Last week it was revealed that Belgium's largest telecom, Belgacom, was the victim of a massive hacking attack which systematically compromised its system for as long as two years. Last week, using documents obtained from NSA whistleblower Edward Snowden, Laura Poitras and other Der Spiegel journalists reported in that paper that it was the GCHQ, Britain's intelligence agency, that was behind the attack. According to that report, the attack was carried out by targeting individual engineers at the telecom with malware that allowed GCHQ agents to "own" their computer and thus exploit their access to the telecommunications system. As the US and UK run around the world protesting the hacking activities of others and warning of the dangers of cyber-attacks, that duo is one of the most aggressive and malicious, if not the most aggressive and malicious, perpetrators of those attacks of anyone on the planet. Nobody hacks as prolifically and aggressively as the two countries who most vocally warn of the dangers of hacking. A coalition called Stop Watching Us has been formed by privacy and civil liberties groups from across the political spectrum. On October 26, the 12th anniversary of the enactment of the Patriot Act, they will hold an anti-surveillance rally in Washington DC.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Twelve years after the 9/11 attacks that included three hijacker pilots trained in Venice [FL], the terrorists' alleged interaction with a high-echelon Saudi family that lived in Sarasota remains shrouded in secrecy. But Sunshine law and Freedom of Information Act requests filed by an independent South Florida news organization have chipped away at the FBI's position that information related to the family remain secret. Broward Bulldog editor Dan Christensen and former U.S. Sen. Bob Graham say the documents could shed light on how the locally trained terrorists were managed and supported. Graham, former Florida governor and a co-chair of [the] Congressional body that investigated the attacks, believes the FBI has covered up Saudi support of the terrorists. The former senator wants more disclosure about what happened in Sarasota because he feels it may add to a bigger, largely censored subject: Who financed and supported the 9/11 terror attacks? "The FBI is aggressively resisting the release of any additional documents," he said. "The question is, why are they doing this? What interest does the FBI have in denying the existence of its own documents? Beyond that, they have thrown a blanket of national security over virtually everything, and why are they doing that for an event that occurred, soon to be, 12 years ago?" At the time of the 9/11 attacks, President George W. Bush was visiting a school in Sarasota. Then came the revelation that three of the hijackers learned to fly at Venice Airport.
Note: For lots more reliable information suggesting a major cover-up around the events of 9/11, click here and here.
The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals. Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis. The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies "pertaining to the protection of US persons", repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights. But this is undermined by the disclosure that Israel is allowed to receive "raw Sigint" – signal intelligence. The memorandum says: "Raw Sigint includes, but is not limited to, unevaluated and [unredacted] transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content." According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
America's National Security Agency may hold crucial evidence about one of the greatest unsolved mysteries of the Cold War — the cause of the 1961 plane crash which killed United Nations Secretary-General Dag Hammarskjold, a commission of prominent jurists says. Widely considered the U.N.'s most effective chief, Hammarskjold died as he was attempting to bring peace to the newly independent Congo. It's long been rumored that his DC-6 plane was shot down, and an independent commission set up to evaluate new evidence surrounding his death on [September 9] recommended a fresh investigation — citing radio intercepts held by the NSA as the possible key to solving the case. Hammerskjold's aircraft went down on the night of Sept. 17, 1961, smashing into a forested area just short of Ndola Airport in modern-day Zambia. A host of hard-to-answer questions about the crash have led to a glut of conspiracy theories. Among them: Why did it take 15 hours to find the wreckage, just a few miles from the airport? Why did Hammarskjold's bodyguard, who survived the crash for a few days, say that the plane "blew up"? Why did witnesses report seeing sparks, flashes, or even another plane? Hammarskjold was flying into a war zone infested with mercenaries and riven by Cold War tension. Foreign multinationals coveted [Congo's] vast mineral wealth and the country was challenged by a Western-backed insurgency in Katanga, which hosted mining interests belonging to United States, Britain, and Belgium.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Over decades and diverse administrations, justifications for the use of force - limited and full scale - have constantly revolved around weapons of mass destruction. Protection against them, real and imaginary, has served [as] justification for government excess and a curtailment of our freedoms. We stop everything because it is WMD and we fret about the consequences of both action and inaction because it is WMD. We do so because of a little known and little understood entity that truly drives American national security practices: It's called the Program. Founded in the darkest days of nuclear threat during the Eisenhower administration, the Program began as a limited system given responsibility for survival of the government. The nuclear arms race ended, but the Program never completely went away. And since 9/11, like everything else about national security, its mission and focus have expanded. The Program exists through a system of sealed envelopes - four dozen formal Presidential Emergency Action Documents more secret than anything that has been revealed about the National Security Agency of late, arrangements that instruct a surviving entity of what to do if a nation-destroying calamity befalls Washington or the United States. Because Doomsday is now thought by the experts in government to be any day, and because the potential battlefield is anyplace and every place, the work of the Program, and its power, have dramatically expanded. A survival apparatus operates behind the scenes as if survival is perpetually and instantly at stake.
Note: The author of this analysis, William M. Arkin, has written American Coup: How a Terrified Government is Destroying the Constitution, and is co-author of the best-selling book and newspaper series Top Secret America: The Rise of the New American Security State.
US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves. Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software. "Backdoors are fundamentally in conflict with good security," said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. "Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise."
Note: For an excellent article in the New York Times on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.