Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Stories
Excerpts of Key Intelligence Agency Corruption News Stories in Major Media


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


Former whistleblowers: open letter to intelligence employees after Snowden
2013-12-11, The Guardian (One of the UK's leading newspapers)
Posted: 2013-12-23 16:13:53
http://www.theguardian.com/commentisfree/2013/dec/11/whistleblowers-open-lett...

At least since the aftermath of September 2001, western governments and intelligence agencies have been hard at work expanding the scope of their own power, while eroding privacy, civil liberties and public control of policy. What used to be viewed as paranoid, Orwellian, tin-foil hat fantasies [turn] out post-Snowden, to be not even the whole story. We've been warned for years that these things were going on: wholesale surveillance of entire populations, militarization of the internet, the end of privacy. Secret laws, secret interpretations of secret laws by secret courts and no effective parliamentary oversight whatsoever. By and large the media have paid scant attention to this, even as more and more courageous, principled whistleblowers stepped forward. The unprecedented persecution of truth-tellers, initiated by the Bush administration and severely accelerated by the Obama administration, has been mostly ignored, while record numbers of well-meaning people are charged with serious felonies simply for letting their fellow citizens know what's going on. Numerous ex-NSA officials have come forward in the past decade, disclosing massive fraud, vast illegalities and abuse of power in [that] agency, including Thomas Drake, William Binney and Kirk Wiebe. The response was 100% persecution and 0% accountability by both the NSA and the rest of government. Since the summer of 2013, the public has witnessed a shift in debate over these matters. The reason is that one courageous person: Edward Snowden.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


Senate Asks C.I.A. to Share Its Report on Interrogations
2013-12-18, New York Times
Posted: 2013-12-23 16:08:16
http://www.nytimes.com/2013/12/18/us/politics/senators-ask-to-see-internal-ci...

The Senate Intelligence Committee has asked the C.I.A. for an internal study done by the agency that lawmakers believe is broadly critical of the C.I.A.’s detention and interrogation program but was withheld from congressional oversight committees. The committee’s request comes in the midst of a yearlong battle with the C.I.A. over the release of the panel’s own exhaustive report about the program, one of the most controversial policies of the post-Sept. 11 era. The Senate report, totaling more than 6,000 pages, was completed last December but has yet to be declassified. According to people who have read the study, it is unsparing in its criticism of the now-defunct interrogation program and presents a chronicle of C.I.A. officials’ repeatedly misleading the White House, Congress and the public about the value of brutal methods that, in the end, produced little valuable intelligence. Senator Mark Udall, Democrat of Colorado, disclosed the existence of the internal C.I.A. report during an Intelligence Committee hearing on Tuesday. He said he believed it was begun several years ago and “is consistent with the Intelligence’s Committee’s report” although it “conflicts with the official C.I.A. response to the committee’s report.” “If this is true,” Mr. Udall said ... “this raises fundamental questions about why a review the C.I.A. conducted internally years ago — and never provided to the committee — is so different from the C.I.A.’s formal response to the committee study.”

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Law enforcement using methods from NSA playbook
2013-12-08, USA Today
Posted: 2013-12-17 11:00:20
http://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-ns...

The National Security Agency isn't the only government entity secretly collecting data from people's cellphones. Local police are increasingly scooping it up, too. Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information about thousands of cellphone users at a time, whether they are targets of an investigation or not. The records, from more than 125 police agencies in 33 states, reveal [that] about one in four law-enforcement agencies have used a tactic known as a "tower dump," which gives police data about the identity, activity and location of any phone that connects to the targeted cellphone towers over a set span of time, usually an hour or two. A typical dump covers multiple towers, and wireless providers, and can net information from thousands of phones. At least 25 police departments own a Stingray, a suitcase-size device that costs as much as $400,000 and acts as a fake cell tower. The system, typically installed in a vehicle so it can be moved into any neighborhood, tricks all nearby phones into connecting to it and feeding data to police. In some states, the devices are available to any local police department via state surveillance units. Organizations such as the American Civil Liberties Union and Electronic Privacy Information Center say the swelling ability by even small-town police departments to easily and quickly obtain large amounts of cellphone data raises questions about the erosion of people's privacy as well as their Fourth Amendment protections against unreasonable search and seizure.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


New Yorker, Washington Post Passed On Seymour Hersh Syria Report
2013-12-08, Huffington Post
Posted: 2013-12-17 10:48:48
http://www.huffingtonpost.com/2013/12/08/seymour-hersh-syria-report_n_4409674...

Pulitzer Prize-winning journalist Seymour Hersh accused the Obama administration ... of having “cherry-picked intelligence” regarding the Aug. 21 chemical attack in Syria that served as evidence for an argument in favor of striking President Bashar Assad's government. Though President Barack Obama eventually decided not to strike Syria, the administration made a public case for war by saying that Assad’s regime was responsible for a poison gas attack in the outskirts of Damascus. The U.N. later concluded the attack had involved the nerve agent sarin. In his piece -- titled "Whose Sarin?" -- Hersh reported that al-Nusra, a jihadi group fighting in Syria’s long-running civil war, had also "mastered the mechanics of creating sarin and was capable of manufacturing it in quantity.” Therefore, he wrote, “Obama did not tell the whole story” when stating with certainty that Assad had to be responsible, crossing a so-called "red line" that would trigger U.S. retaliation. Hersh is a freelancer, but he's best known these days for his work in The New Yorker, where he helped break the Abu Ghraib scandal in 2004. In an email, Hersh wrote that “there was little interest” for the story at The New Yorker. Hersh then took the story to The Washington Post. Hersh wrote that he was told by email that Executive Editor Marty Baron decided “that the sourcing in the article did not meet the Post's standards.” Hersh [then] sent the Syria story to editors at the London Review of Books, LRB Senior Editor Christian Lorentzen [said]. Lorentzen said the piece was not only edited, but thoroughly fact checked by a former New Yorker fact checker who had worked with Hersh in the past.

Note: For more on government lies to provide pretexts for war, see the deeply revealing reports from reliable major media sources available here.


NSA review to leave spying programs largely unchanged, reports say
2013-12-13, The Guardian (One of the UK's leading newspapers)
Posted: 2013-12-17 10:46:57
http://www.theguardian.com/world/2013/dec/13/nsa-review-to-leave-spying-progr...

A participant in a White House-sponsored review of surveillance activities described as “shameful” an apparent decision to leave most of the National Security Agency’s controversial bulk spying intact. Sascha Meinrath, director of the Open Technology Institute, said [on December 13] that ... “The review group was searching for ways to make the most modest pivot necessary to continue business as usual.” Should the review group’s report resemble descriptions that leaked ... the report “does nothing to alter the lack of trust the global populace has for what the US is doing, and nothing to restore our reputation as an ethical internet steward,” said Meinrath, who met with the advisory panel and White House officials twice to discuss the bulk surveillance programs that have sparked international outrage. Leaks about the review group’s expected recommendations to the New York Times and Wall Street Journal strengthened Meinrath and other participants’ long-standing suspicions that much of the NSA’s sweeping spy powers would survive. The Times quoted an anonymous official familiar with the group saying its report “says we can’t dismantle these programs, but we need to change the way almost all of them operate”. According to the leaks, the review group will recommend that bulk collection of every American’s phone call data continue, possibly by the phone companies instead of the NSA, with tighter restrictions than the “reasonable, articulable suspicion” standard for searching through them that the NSA currently employs.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


Who Is Watching the Watch Lists?
2013-12-01, New York Times
Posted: 2013-12-10 11:24:50
http://www.nytimes.com/2013/12/01/sunday-review/who-is-watching-the-watch-lis...

The federal government’s main terrorist watch list has grown to at least 700,000 people, with little scrutiny over how the determinations are made or the impact on those marked with the terrorist label. The government refuses to confirm or deny whether someone is on the list, officially called the Terrorist Screening Database, or divulge the criteria used to make the decisions. Even less is known about the secondary watch lists that are derived from the main one, including the no-fly list (used to prevent people from boarding aircraft), the selectee and expanded selectee lists (used to flag travelers for extra screening at airport checkpoints), the TECS database (used to vet people entering or leaving the United States), the Consular Lookout and Support System (used to screen visa applications) and the known or suspected terrorists list (used by law enforcement in routine police encounters). For people who have landed on these lists, the terrorist designation has been difficult to challenge legally. The Terrorist Screening Center, which administers the main terrorist watch list, declined to discuss its procedures, or to release current data about the number of people on various watch lists, and how many of them are American citizens.

Note: For more on government threats to civil liberties, see the deeply revealing reports from reliable major media sources available here.


European Court of Human Rights hears evidence on secret CIA prisons
2013-12-03, Washington Post/Associated Press
Posted: 2013-12-10 11:22:49
http://www.washingtonpost.com/world/european-court-of-human-rights-hears-evid...

Europe’s human rights court shone a rare public light [December 3] on the secret network of European prisons that the CIA used to interrogate terrorism suspects, reviving questions about the “extraordinary renditions” that angered many on this continent. At [the] hearing, attorneys for two terrorism suspects currently held by the United States at Guantanamo Bay, Cuba, accused Poland of human rights abuses. The lawyers say the suspects fell victim to the CIA’s rendition program, in which terrorism suspects were kidnapped and transferred to third countries; they allege that the two were tortured in a remote Polish prison. All the prisons were closed by May 2006. Interrogations at sea have replaced CIA “black sites” as the U.S. government’s preferred method for holding terrorism suspects and questioning them without access to lawyers. One of the cases heard [concerns] 48-year-old Saudi national Abd al-Rahim al-Nashiri, who faces U.S. terrorism charges for allegedly orchestrating the al-Qaeda attack on the USS Cole in 2000, a bombing in the Yemeni port of Aden that killed 17 sailors. The second case involves 42-year-old Abu Zubaida, a Palestinian also held in Guantanamo who has never been charged with a crime. Both men say they were brought in December 2002 to Poland, where they were detained and subjected to harsh questioning at a Polish military installation in Stare Kiejkuty, a village in the country’s remote northeast. There they were subject to mock executions, waterboarding and other tortures, including being told their families would be arrested and sexually abused, said Amrit Singh, a lawyer representing Nashiri.

Note: For more on war crimes by the US and UK in the "global war on terror", see the deeply revealing reports from reliable major media sources available here.


John F. Kennedy's Vision of Peace
2013-11-20, Rolling Stone
Posted: 2013-12-10 11:21:06
http://www.rollingstone.com/politics/news/john-f-kennedys-vision-of-peace-201...

Despite the Cold War rhetoric of his campaign, JFK's greatest ambition as president was to break the militaristic ideology that has dominated our country since World War II. He told his close friend Ben Bradlee that he wanted the epitaph "He kept the peace," and said to another friend, William Walton, "I am almost a 'peace at any price' president." Hugh Sidey, a journalist and friend, wrote that the governing aspect of JFK's leadership was "a total revulsion" of war. Nevertheless, as James W. Douglass argues in his book JFK and the Unspeakable: Why He Died and Why It Matters, JFK's presidency would be a continuous struggle with his own military and intelligence agencies, which engaged in incessant schemes to trap him into escalating the Cold War into a hot one. His first major confrontation with the Pentagon, the Bay of Pigs catastrophe, came only three months into his presidency and would set the course for the next 1,000 days. From the start, JFK recoiled at the caper's stench, as CIA Director Allen Dulles has acknowledged, demanding assurances from CIA and Pentagon brass that there was no chance of failure and that there would be no need for U.S. military involvement. Dulles and the generals knowingly lied and gave him those guarantees. When the invasion failed, JFK refused to order airstrikes against Castro. JFK was realizing that the CIA posed a monumental threat to American democracy. As the brigade faltered, he told Arthur Schlesinger that he wanted to "splinter the CIA into a thousand pieces and scatter it to the winds."

Note: For more on the powerful social forces that assassinated JFK, see the deeply revealing reports from reliable major media sources available here.


Canada allowed widespread NSA surveillance at 2010 G20 summit
2013-11-28, NBC News/Reuters
Posted: 2013-12-02 09:49:48
http://www.nbcnews.com/id/53688035#.UpkAXo2f8h0

Canada allowed the U.S. National Security Agency (NSA) to conduct widespread surveillance during the 2010 Group of 20 summit in Toronto, according to a media report that cited documents from former NSA contractor Edward Snowden. The report by the Canadian Broadcasting Corp ... cited briefing notes it said showed the United States turned its Ottawa embassy into a security command post during a six-day spying operation by the top-secret U.S. agency as President Barack Obama and other world leaders met that June. One of the bylines on the CBC report was Glenn Greenwald, the U.S. journalist who has worked with Snowden on several other NSA stories. CBC ... quoted an NSA briefing note describing the operation as "closely coordinated with the Canadian partner". The Canadian equivalent of the NSA is the Communications Security Establishment Canada, or CSEC. CBC said the documents did not reveal the targets of the NSA operation, but described part of the U.S. eavesdropping agency's mandate at the Toronto summit as "providing support to policymakers". CSEC, which has a very low public profile, employs about 2,000 people. It is part of the so-called Five Eyes intelligence-sharing network that also includes the United States, Britain, New Zealand and Australia. Last month, Brazil angrily demanded an explanation for media reports which said CSEC agents had targeted its mines and energy industry.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Edward Snowden a 'hero' for NSA disclosures, Wikipedia founder says
2013-11-25, The Guardian (One of the UK's leading newspapers)
Posted: 2013-12-02 09:48:22
http://www.theguardian.com/world/2013/nov/25/edward-snowden-nsa-wikipedia-fou...

Jimmy Wales, the founder of Wikipedia, has called on Barack Obama to rein in the National Security Agency as he described the whistleblower Edward Snowden as "a hero" whom history will judge "very favourably". Wales called for a "major re-evaluation" of the NSA, adding that the public "would have never approved this sweeping surveillance program" had it been put to a vote. The revelations, Wales said, had been "incredibly damaging and embarrassing to the US. It makes it very difficult for someone like me to go out, as I do, [to] speak to people in authoritarian countries, and say: 'You shouldn’t be spying on activists, you shouldn’t be censoring the internet', when we [in the US] are complicit in these acts of extraordinary intrusion into people’s personal lives. [Snowden] has exposed what I believe to be criminal wrongdoing, lying to Congress, and certainly [an] affront to the Fourth Amendment. I think that history will judge him very favourably. There is a growing sense of concern in Congress about this, a growing sense in Congress that public is angry about this, that they have been misled and I think we are going to see legislation to change this."

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


CIA turned some Guantanamo Bay prisoners into double agents against al-Qaeda
2013-11-26, Washington Post/Associated Press
Posted: 2013-12-02 09:46:51
http://www.washingtonpost.com/world/national-security/cia-turned-some-guantan...

In the early years after Sept. 11, 2001, the CIA turned some Guantanamo Bay prisoners into double agents, sending them home to help the United States kill terrorists, current and former U.S. officials said. The CIA promised the prisoners freedom, safety for their families and millions of dollars from the agencys secret accounts. It was a gamble. Officials knew there was a chance that some prisoners might quickly spurn their deal and kill Americans. Nearly a dozen current and former U.S. officials described aspects of the program to the Associated Press. Dozens of prisoners were evaluated, but only a handful, from a variety of countries, were turned into spies who signed agreements to work for the CIA. Prisoners agreed to cooperate for a variety of reasons, officials said. Some received assurances that the United States would resettle their families. Another agreed to cooperate after the agency insinuated that it would harm his children, a former official said, a threat similar to those interrogators made to self-proclaimed Sept. 11 mastermind Khalid Sheik Mohammed. All were promised money. Exactly how much each received remains unclear. But altogether, the government paid millions for their services, officials said. The money came from a secret CIA account, code-named Pledge, that is used to pay informants, officials said. Officials said the program ended in 2006 as the flow of detainees to Guantanamo Bay slowed to a trickle. The last prisoner arrived there in 2008.

Note: There is no doubt that the CIA used mind control techniques to control and likely program some of the prisoners. To read verifiable documentation on the U.S. governments secret mind control programs, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


CIA wants to control the weather, climate change
2013-07-23, Fox News
Posted: 2013-12-02 09:45:22
http://www.foxnews.com/science/2013/07/23/cia-wants-to-control-weather-climat...

The CIA is funding a study examining various ways mankind can geo-engineer the planet -- blocking or limiting the sunlight that reaches the Earth, stripping carbon dioxide from the skies, seeding the clouds and so on. The project, a panel called “Geoengineering Climate: Technical Evaluation and Discussion of Impacts,” is backed by the National Academy of Sciences [NAS}, the National Oceanic and Atmospheric Administration (NOAA), NASA -- and the U.S. intelligence community. That’s spy-talk for the CIA, William Kearney, a spokesman for NAS, [said]. Conspiracy theorists love to argue that various world governments seek to control the weather; they cite “chemtrails” and cloud seeding and so on. The group’s first two meetings, May 20 and June 19, were closed-door in their entirety. On July 17 in Washington D.C., closed-door morning and evening meetings book-ended a public session, however, offering a peek into the group’s plans -- and it’s nothing worthy of Fox Mulder’s time, explained Edward Dunlea, study director with the National Academies. “Nothing involved in this study is classified at all,” Dunlea told FoxNews.com. “ This is an assessment of what is known in the science literature about some of the proposed engineering techniques -- both solar-radiation management and carbon-dioxide removal. All of our sponsors are interested in this topic as a part of the larger climate-change discussion, which has economic, environmental and national-security ramifications,” he said.

Note: If nothing is classified, why are the meetings secret? For solid evidence that elements of government have used the HAARP program to control the weather, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


FISA court order that allowed NSA surveillance is revealed for first time
2013-11-19, The Guardian (One of the UK's leading newspapers)
Posted: 2013-11-26 08:10:53
http://www.theguardian.com/world/2013/nov/19/court-order-that-allowed-nsa-sur...

A secret court order that authorised a massive trawl by the National Security Agency of Americans' email and internet data was published for the first time on [November 18], among a trove of documents that also revealed a judge's concern that the NSA "continuously" and "systematically" violated the limits placed on the program. Another later court order found that what it called "systemic overcollection" had taken place. In a heavily redacted opinion Colleen Kollar-Kotelly, the former presiding judge of the FISA court, placed legal weight on the methods of surveillance employed by the NSA, which had never before collected the internet data of “an enormous volume of communications”. The methods, known as pen registers and trap-and-trace devices, record the incoming and outgoing routing information of communications. Kollar-Kotelly ruled that acquiring the metadata, and not the content, of email and internet usage in bulk was harmonious with the “purpose” of Congress and prior court rulings – even though no surveillance statute ever authorized it and top officials at the Justice Department and the FBI threatened to resign in 2004 over what they considered its dubious legality. The type of data collected under the program included information on the "to", "from" and "bcc" lines of an email rather than the content. Metadata, wrote Kollar-Kotelly, enjoyed no protection under the fourth amendment to the US constitution, a precedent established by the Supreme Court in 1979 in a single case on which the NSA relies currently.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data
2013-11-20, The Guardian (One of the UK's leading newspapers)
Posted: 2013-11-26 08:09:12
http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-p...

The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden. In the first explicit confirmation that UK citizens have been caught up in US mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo ... says the material is being put in databases where it can be made available to other members of the US intelligence and military community. Until now, it had been generally understood that the citizens of each country were protected from surveillance by any of the others. But the Snowden material reveals that: • In 2007, the rules were changed to allow the NSA to analyse and retain any British citizens' mobile phone and fax numbers, emails and IP addresses swept up by its dragnet. • These communications were "incidentally collected" by the NSA, meaning the individuals were not the initial targets of surveillance operations and therefore were not suspected of wrongdoing. • The NSA has been using the UK data to conduct so-called "pattern of life" or "contact-chaining" analyses, under which the agency can look up to three "hops" away from a target of interest – examining the communications of a friend of a friend of a friend. Three hops for a typical Facebook user could pull the data of more than 5 million people into the dragnet.

Note: For more on government threats to privacy, see the deeply revealing reports from reliable major media sources available here.


The Intra-Administration War in Vietnam
1963-10-02, New York Times
Posted: 2013-11-26 08:02:11
http://query.nytimes.com/gst/abstract.html?res=9500E0DB1030EF3BBC4B53DFB66783...

The Central Intelligence Agency is getting a very bad press in dispatches from Vietnam to American newspapers and in articles originating in Washington. The agency is precluded from [giving] information to the press, under a seal of confidence, that challenges or refutes the critics ... because to do so would require some disclosure of its activities. Every President since the C.I.A. was created has protected this secrecy. This Presidential policy has not, however, always restrained other executive units from going confidentially to the press with attacks on C.I.A. operations. The peak of the practice has recently been reached in Vietnam and in Washington. This is revealed almost every day now in dispatches from reporters ... with excellent reputations for reliability. One reporter in this category is Richard Starnes, [who] related that, "according to a high United States source here, twice the C.I.A. flatly refused to carry out instructions from Ambassador Henry Cabot Lodge ... [and] in one instance frustrated a plan of action Mr. Lodge brought from Washington because the agency disagreed with it." Among the views attributed to United States officials on the scene, including one described as a "very high American official ... are the following: The C.I.A.'s growth was "likened to a malignancy" which the "very high official was not sure even the White House could control ... any longer." "If the United States ever experiences [an attempt at a coup to overthrow the Government] it will come from the C.I.A. and not the Pentagon." The agency "represents a tremendous power and total unaccountability to anyone.

Note: The NY Times requires payment to view the above article in full. You can find it available free of charge on this webpage. Note the date of this article, just weeks before JFK was assassinated. Watch an excellent documentary titled "The Killing of a President," which presents huge amounts of evidence, including eye-witness testimony, which shows that JFK could not have been killed by Oswald. You can find an abundance of reliable resources on the JFK assassination in our information center on this topic.


The Top 5 John F. Kennedy Assassination Conspiracy Theories
2013-11-11, ABC News
Posted: 2013-11-18 08:29:46
http://abcnews.go.com/US/top-john-kennedy-assassination-conspiracy-theories/s...

The fifty years since the assassination of John F. Kennedy have done little to quell the public's interest or skepticism about who killed the president. In 1978 ... the House of Representatives Select Committee on Assassinations found that in addition to Oswald, there likely was a second gunman who fired at the president's motorcade. The commission concluded that the gunmen were part of a "conspiracy," without determining exactly who was behind it, opening the door to five decades and a cottage industry of theories. According to a 2003 ABC News Poll, 70 percent of Americans believe Kennedy's death was "the result of a plot, not the act of a lone killer." Fifty-one percent believe Oswald did not act alone, and 7 percent believe Oswald was not involved at all in the assassination. In the years since Kennedy's death more than 2,000 books have been written about the assassination, many of which espouse one or more conspiracy theories. In nearly every theory that involves American conspirators, be they wealthy industrialists or tough-as-nails mafiosi, one group is routinely represented – the CIA. One theory suggests that Oswald was a CIA operative and agents tampered with his FBI file before and after the investigation to make it appear he was a communist and lone wolf. [Another theory claims President Lyndon] Johnson was aided in the plot by another man who would become president, George H.W. Bush, a burgeoning CIA official who happened to be in Dallas on the day of the assassination.

Note: On the 50th anniversary of the Kennedy assassination see our powerful JFK assassination information center and the best videos and news articles on the topic. For an astonishing History Channel Video in which the attorney for Lyndon Johnson states he has no doubt Johnson was involved in the assassination, click here.


Lawyers in Stratfor leak case present letters of support ahead of sentencing
2013-11-04, The Guardian (One of the UK's leading newspapers)
Posted: 2013-11-18 08:23:29
http://www.theguardian.com/world/2013/nov/04/stratfor-leak-jeremy-hammond-sup...

Lawyers acting for Jeremy Hammond, the Chicago-based hacktivist facing up to 10 years in prison for releasing internal emails from the private intelligence agency Stratfor, have lodged 265 letters of support with the federal judge who will determine his sentence on 15 November. The letters call on judge Loretta Preska ... to show leniency towards Hammond, a former member of the hacking network Anonymous who has become a cause célčbre for hacktivists, civil libertarians and those concerned about the rights of whistleblowers. Among the correspondents are Daniel Ellsberg, source of the 1970s Pentagon Papers leak on the Vietnam war, and Jesselyn Radack, a former Justice Department whistleblower who now works at the Government Accountability Project. Hammond, 28, has pleaded guilty to one count under the Computer Fraud and Abuse Act (CFAA) relating to a 2011 cyber attack on Strategic Forecasting, Inc, known as Stratfor – an information analysis company based in Austin, Texas. Working alongside a fellow hacker operating under the internet handle Sabu – who was later revealed to be an FBI informant – Hammond downloaded an email spool from Stratfor containing millions of files and sent the data to the anti-secrecy website WikiLeaks which released them as the “Global Intelligence Files”. The Stratfor emails revealed that [Stratfor] had been contracted by Dow Chemical, parent company of Union Carbide which owned the Bhopal pesticide plant where the world’s worst industrial catastrophe took place in 1984, to follow the activities of campaigners seeking redress for the victims.

Note: For an excellent follow-up article titled "The Revolutionaries in Our Midst," click here. For more on privatization of "intelligence", see the deeply revealing reports from reliable major media sources available here.


CIA made doctors torture suspected terrorists after 9/11, taskforce finds
2013-11-04, The Guardian (One of the UK's leading newspapers)
Posted: 2013-11-12 09:00:46
http://www.theguardian.com/world/2013/nov/04/cia-doctors-torture-suspected-te...

Doctors and psychologists working for the US military violated the ethical codes of their profession under instruction from the defence department and the CIA to become involved in the torture and degrading treatment of suspected terrorists, an investigation has concluded. The report of the Taskforce on Preserving Medical Professionalism in National Security Detention Centres concludes that after 9/11, health professionals working with the military and intelligence services "designed and participated in cruel, inhumane and degrading treatment and torture of detainees". The report lays blame primarily on the defence department (DoD) and the CIA, which required their healthcare staff to put aside any scruples in the interests of intelligence gathering and security practices that caused severe harm to detainees, from waterboarding to sleep deprivation and force-feeding. The two-year review by the 19-member taskforce, Ethics Abandoned: Medical Professionalism and Detainee Abuse in the War on Terror, supported by the Institute on Medicine as a Profession (IMAP) and the Open Society Foundations, says that the DoD termed those involved in interrogation "safety officers" rather than doctors. Doctors and nurses were required to participate in the force-feeding of prisoners on hunger strike, against the rules of the World Medical Association and the American Medical Association. Doctors and psychologists working for the DoD were required to breach patient confidentiality and share what they knew of the prisoner's physical and psychological condition with interrogators, and were used as interrogators themselves.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Security Check Now Starts Long Before You Fly
2013-10-22, New York Times
Posted: 2013-11-12 08:56:05
http://www.nytimes.com/2013/10/22/business/security-check-now-starts-long-bef...

The Transportation Security Administration is expanding its screening of passengers before they arrive at the airport by searching a wide array of government and private databases that can include records like car registrations and employment information. It is unclear precisely what information the agency is relying upon to make these risk assessments, given the extensive range of records it can access, including tax identification number, past travel itineraries, property records, physical characteristics, and law enforcement or intelligence information. The measures go beyond the background check the government has conducted for years, called Secure Flight, in which a passenger’s name, gender and date of birth are compared with terrorist watch lists. Now, the search includes using a traveler’s passport number, which is already used to screen people at the border, and other identifiers to access a system of databases maintained by the Department of Homeland Security. “I think the best way to look at it is as a pre-crime assessment every time you fly,” said Edward Hasbrouck, a consultant to the Identity Project, one of the groups that oppose the prescreening initiatives. “The default will be the highest, most intrusive level of search, and anything less will be conditioned on providing some additional information in some fashion.” Critics argue that the problem with what the agency calls an “intelligence-driven, risk-based analysis” of passenger data is that secret computer rules, not humans, make these determinations. Civil liberties groups have questioned whether the agency has the legal authority to make these assessments.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


GCHQ and European spy agencies worked together on mass surveillance
2013-11-01, The Guardian (One of the UK's leading newspapers)
Posted: 2013-11-12 08:53:10
http://www.theguardian.com/uk-news/2013/nov/01/gchq-europe-spy-agencies-mass-...

The German, French, Spanish and Swedish intelligence services have all developed methods of mass surveillance of internet and phone traffic over the past five years in close partnership with Britain's GCHQ eavesdropping agency. The bulk monitoring is carried out through direct taps into fibre optic cables and the development of covert relationships with telecommunications companies. A loose but growing eavesdropping alliance has allowed intelligence agencies from one country to cultivate ties with corporations from another to facilitate the trawling of the web, according to GCHQ documents leaked by the former US intelligence contractor Edward Snowden. The files also make clear that GCHQ played a leading role in advising its European counterparts how to work around national laws intended to restrict the surveillance power of intelligence agencies. US intelligence officials have insisted the mass monitoring was carried out by the security agencies in the countries involved and shared with the US. The Guardian revealed the existence of GCHQ's Tempora programme, in which the electronic intelligence agency tapped directly into the transatlantic fibre optic cables to carry out bulk surveillance. GCHQ officials expressed admiration for the technical capabilities of German intelligence to do the same thing, [saying] the Federal Intelligence Service (BND) had "huge technological potential and good access to the heart of the internet – they are already seeing some bearers running at 40Gbps and 100Gbps". Bearers is the GCHQ term for the fibre optic cables, and gigabits per second (Gbps) measures the speed at which data runs through them.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"