Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Stories
Excerpts of Key Intelligence Agency Corruption News Stories in Major Media


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


In Secret, Court Vastly Broadens Powers of N.S.A.
2013-07-07, New York Times
Posted: 2013-07-16 09:40:28
http://www.nytimes.com/2013/07/07/us/in-secret-court-vastly-broadens-powers-o...

In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans. The rulings, some nearly 100 pages long, reveal that the court has taken on a much more expansive role by regularly assessing broad constitutional questions and establishing important judicial precedents, with almost no public scrutiny. The 11-member Foreign Intelligence Surveillance Court, known as the FISA court, was once mostly focused on approving case-by-case wiretapping orders. But since major changes in legislation and greater judicial oversight of intelligence operations were instituted six years ago, it has quietly become almost a parallel Supreme Court, serving as the ultimate arbiter on surveillance issues and delivering opinions that will most likely shape intelligence practices for years to come. In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures. Unlike the Supreme Court, the FISA court hears from only one side in the case — the government — and its findings are almost never made public.

Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.


U.S. Postal Service Logging All Mail for Law Enforcement
2013-07-04, New York Times
Posted: 2013-07-09 08:35:24
http://www.nytimes.com/2013/07/04/us/monitoring-of-snail-mail.html?pagewanted...

Leslie James Pickering noticed something odd in his mail last September: a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home. “Show all mail to supv” — supervisor — “for copying prior to going out on the street,” read the card. It included Mr. Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green. “It was a bit of a shock to see it,” said Mr. Pickering, who with his wife owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service. Mr. Pickering was targeted by a longtime surveillance system called mail covers, a forerunner of a vastly more expansive effort, the Mail Isolation Control and Tracking program, in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year. It is not known how long the government saves the images. The Mail Isolation Control and Tracking program was created after the anthrax attacks in late 2001. It enables the Postal Service to retrace the path of mail at the request of law enforcement. No one disputes that it is sweeping.

Note: The exposure by whistleblower Edward Snowden of the NSA's massive domestic and global spying operations seems to have triggered a series of other revelations about surveillance of the US population, like this report on the US Postal Service's photographing all mail. Hardly a week goes by without another major revelation, such as a new digital photo-ID database utilized by the FBI and police forces, and the development by US police of a national DNA database on all "potential suspects". Since very few US citizens are terrorists, what is the real purpose behind this total surveillance?


Was Michael Hastings' Car Hacked? Richard Clarke Says It's Possible
2013-06-24, Huffington Post
Posted: 2013-07-09 08:33:36
http://www.huffingtonpost.com/2013/06/24/michael-hastings-car-hacked_n_349233...

The peculiar circumstances of journalist Michael Hastings' death in Los Angeles last week have unleashed a wave of conspiracy theories. Now there's another theory to contribute to the paranoia: According to a prominent security analyst, technology exists that could [have] allowed someone to hack his car. Former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarke [said] that what is known about the single-vehicle crash is "consistent with a car cyber attack." Clarke said, "There is reason to believe that intelligence agencies for major powers" -- including the United States -- know how to remotely seize control of a car. "It's relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn't want acceleration, to throw on the brakes when the driver doesn't want the brakes on, to launch an air bag," Clarke told The Huffington Post. Hastings was driving a 2013 Mercedes C250 coupe when he crashed into a tree on Highland Ave. in Los Angeles at approximately 4:30 am on June 18. Video posted online showed the car in flames, and one neighbor told a local news crew she heard a sound like an explosion. Another eyewitness said the car's engine had been thrown 50 to 60 yards from the car. There were no other vehicles involved in the accident. The fire was so all-consuming that it took the Los Angeles County coroner's office two days to identify Hastings' body, but Clarke said a cyber attack on the vehicle would have been nearly impossible to trace "even if the dozen or so computers on board hadn't melted."

Note: For a video of a DARPA specialist talking about how any computerized function of a car can be taken over, click here. This news article shows how a university test proved a car's onboard computer can be hacked. For an excellent video presenting powerful evidence that Hastings' death was anything but suicide, click here. For a Fox News video showing other evidence of premeditated murder, click here. In this video, a good friend states he had just received an email from Hastings that he had a story on the CIA that would be the biggest story yet. A later email then said he was worried as he was now under FBI investigation.


How cash rules surveillance policy
2013-07-04, San Francisco Chronicle (SF's leading newspaper)
Posted: 2013-07-09 08:31:11
http://www.sfchronicle.com/opinion/article/How-cash-rules-surveillance-policy...

Have you noticed anything missing in the political discourse about the National Security Administration's unprecedented mass surveillance? There's at least been some conversation about the intelligence community's potential criminality and constitutional violations. But there have only been veiled references to how cash undoubtedly tilts the debate against those who challenge the national security state. Those indirect references have come in stories about Booz Allen Hamilton, the security contractor that employed Edward Snowden. CNN/Money notes that 99 percent of the firm's multibillion-dollar annual revenues now come from the federal government. Those revenues are part of a larger and growing economic sector within the military-industrial complex - a sector that, according to author Tim Shorrock, is "a $56 billion-a-year industry." Yet few in the Washington press corps mention that politicians' attacks on surveillance critics may have nothing to do with principle and everything to do with shilling for campaign donors. For a taste of what that kind of institutionalized corruption looks like, peruse the Influence Explorer site to see how much Booz Allen Hamilton and its parent company, the Carlyle Group, spend. As you'll see, from Barack Obama to John McCain, many of the politicians publicly defending the surveillance state have taken huge sums of money from the firms. Simply put, there are corporate forces with a vested financial interest in making sure the debate over security is tilted toward the surveillance state and against critics of that surveillance state.

Note: Tim Shorrock, quoted above, is the author of Spies for Hire: The Secret World of Intelligence Outsourcing.


The Real War on Reality
2013-06-14, New York Times
Posted: 2013-07-09 08:29:05
http://opinionator.blogs.nytimes.com/2013/06/14/the-real-war-on-reality/

The modern American surveillance state is not really the stuff of paranoid fantasies; it has arrived. The revelations about the National Security Agency’s PRISM data collection program have raised awareness ... about the reach and power of secret intelligence gatherers operating behind the facades of government and business. But those revelations ... have been partial — they primarily focus on one government agency and on the surveillance end of intelligence work, purportedly done in the interest of national security. What has received less attention is the fact that most intelligence work today is not carried out by government agencies but by private intelligence firms and that much of that work involves another common aspect of intelligence work: deception. That is, it is involved not just with the concealment of reality, but with the manufacture of it. Important insight into the world [of] these companies came from a 2010 hack by a group best known as LulzSec ... which targeted the private intelligence firm HBGary Federal. That hack yielded 75,000 e-mails. Team Themis (a group that included HBGary and the private intelligence and security firms Palantir Technologies, Berico Technologies and Endgame Systems) was effectively brought in to find a way to undermine the credibility of WikiLeaks and the journalist Glenn Greenwald (who recently broke the story of Edward Snowden’s leak of the N.S.A.’s Prism program), because of Greenwald’s support for WikiLeaks. The plan called for actions to “sabotage or discredit the opposing organization” including a plan to submit fake documents and then call out the error.

Note: For more on the games intelligence agencies play, see the deeply revealing reports from reliable major media sources available here.


South American Leaders Demand Apology in Plane Row
2013-07-05, New York Times
Posted: 2013-07-09 08:27:05
http://www.nytimes.com/aponline/2013/07/05/world/americas/ap-lt-nsa-surveilla...

South America's leftist leaders rallied to support Bolivian President Evo Morales after his plane was rerouted amid suspicions that NSA leaker Edward Snowden was on board and they demanded an apology from France, Italy, Portugal and Spain. The presidents of Argentina, Ecuador, Suriname, Venezuela and Uruguay joined Morales in the Bolivian city of Cochabamba ... to denounce the treatment of Morales, who warned that he would close the U.S. Embassy in Bolivia if necessary. Morales again blamed Washington for pressuring European countries to refuse to allow his plane to fly through their airspace on Tuesday, forcing it to land in Vienna, Austria, in what he called a violation of international law. He had been returning from a summit in Russia during which he had suggested he would be willing to consider a request from Snowden for asylum. Spanish Foreign Minister Jose Manuel Garcia-Margallo said Friday that his nation and other European countries were told Snowden was aboard the Bolivian presidential plane. He did not say who supplied the information and declined to say whether he had been in contact with the United States. Ecuadorean President Rafael Correa said that he and other leaders were offering full support to Morales following the rerouting of the plane, calling it an aggression against the Americas. Venezuelan President Nicolas Maduro protested alleged attempts by Spanish officials to search the Bolivian presidential plane and accused the CIA of encouraging several European countries to deny the presidential plane their airspace.

Note: The subservience of European governments to the US attempt to apprehend Snowden by forcing Pres. Morales' plane down is logical given the recent revelations that they are also engaging in total surveillance of their own populations. For information on this click here (France), here (the UK), and here (Germany).


Killer Cars? Auto Computer Systems Open to Malfunction, Hackers
2012-01-25, U.S. News & World Report
Posted: 2013-07-01 13:28:03
http://www.usnews.com/news/articles/2012/01/25/killer-cars-auto-computer-syst...

As auto manufacturers imagine a future of self-driving and always-connected cars, they'll need to worry about something else—electronic malfunctions and cyberattacks, according to a report released by the Transportation Research Board. "Automobiles today are literally 'computers on wheels,'" says the report. Current auto software uses more than a million lines of code. In the coming years, onboard computers will become even more important. Like a computer, a car's internal software can be infected with a virus or hacked. Last year, researchers at the University of Washington and the University of California, San Diego, proved that computers could be hacked with either physical access to the car or wirelessly using technology such as Bluetooth. A hacker could then disable the brakes, stop the engine, or worse. According to the report, "automotive manufacturers have designed their networks without giving sufficient attention to such cybersecurity vulnerabilities because automobiles have not faced adversarial pressures."

Note: A New York Times article goes into more detail. The article doesn't mention the obvious possibility that the FBI, NSA, or other intelligence agencies could hack into any car's computer system and cause an accident. There is even a term, "Boston Brakes," for staged car wrecks, allegedly because the CIA first started experimenting with this in Boston. For an article delving into this, click here. Could this be what happened to courageous reporter Michael Hastings and others? For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.


'Whitey' Bulger Trial Details FBI Corruption
2013-06-27, ABC News
Posted: 2013-07-01 13:24:28
http://abcnews.go.com/US/whitey-bulger-trial-details-fbi-corruption/story?id=...

Former FBI supervisor John Morris thought he had left his sordid relationship with James "Whitey" Bulger back in Boston along with the envelopes of money, the cases of expensive wine, the home-cooked meals he had prepared for the accused mob boss. Then the phone rang one night. It was 1995 and Bulger had become a fugitive from justice. It was Bulger on the phone. And he was livid. A Boston newspaper had reported that Bulger was a longtime FBI informant, and Bulger wanted Morris to have the story retracted. "He said if he was going to jail ... I was going with him." Morris testified in the trial of Bulger, 83, who is accused of a string of crimes, including 19 murders. Testimony during the trial has stated Bulger ran a criminal enterprise with the help of corrupt FBI agents [John] Connolly and Morris, and that Bulger was an FBI informant concerning his criminal rivals. Morris' testimony put a spotlight on a staggering amount of corruption in the Boston FBI field office that included cash bribes and tip-offs to wiretaps. Connolly's relationship with Bulger extended into the Massachusetts State House, Morris testified. His friendship with Bulger's brother, then Senate President William Bulger, [could] land him a job as the Boston police commissioner upon his retirement from the bureau. Connolly's behavior did not raise any eyebrows with the Special Agents in Charge of the Boston FBI field office, Morris told the court. In fact it was quite the opposite. FBI bosses sought Connolly's friendship, Morris testified. "He had tremendous access across the board to everything including sports events, political figures," Morris testified.

Note: For more on major corruption within the FBI and other intelligence services, see the deeply revealing reports from reliable major media sources available here.


How Barrett Brown shone light on the murky world of security contractors [and is now jailed]
2013-06-24, The Guardian (One of the UK's leading newspapers)
Posted: 2013-07-01 13:21:43
http://www.guardian.co.uk/commentisfree/2013/jun/24/surveillance-us-national-...

[Barrett] Brown is not a household name like Edward Snowden or Bradley Manning. But after helping expose a dirty tricks plot, he faces jail. Brown made a splash in February 2011 by helping to uncover "Team Themis", a project by intelligence contractors retained by Bank of America to demolish the hacker society known as Anonymous. The Team Themis story began in late 2010, when Julian Assange warned WikiLeaks would release documents outlining an "ecosystem of corruption [that] could take down a bank or two." Bank of America went into damage-control mode and, as the New York Times reported, assembled "a team of 15 to 20 top Bank of America officials … scouring thousands of documents in the event that they become public." Days later, Bank of America retained the well-connected law firm of Hunton & Williams [which] "proposed various schemes to attack" WikiLeaks. Its partners suggested creating false documents and fake personas to damage progressive organizations. The tech companies' emails – which Anonymous hacked and Barrett Brown helped publicize – listed planned tactics: "Feed[ing] the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error." Brown [has] been cooling his heels in a jail outside Dallas ... awaiting two separate trials that could put him on ice for more than 100 years. In contrast to the FBI's aggressive pursuit of Brown, no probe of the Team Themis project was launched – despite a call from 17 US House representatives to investigate a possible conspiracy to violate federal laws.

Note: With the wide focus on the privatized national security state by the leaks from Edward Snowden, there is renewed interest in Brown's plight and the campaign for justice in his case. For more on this and to support Barret Brown, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.


Army reportedly blocking military access to Guardian coverage of NSA leaks
2013-06-27, NBC News
Posted: 2013-07-01 13:18:14
http://usnews.nbcnews.com/_news/2013/06/27/19177709-army-reportedly-blocking-...

The Army is blocking all access to The Guardian newspaper's reports about the National Security Agency's sweeping collection of data about Americans' email and phone communications, an Army spokesman said Thursday. The Monterey (Calif.) Herald reported that employees at the Presidio of Monterey, an Army public affairs base about 100 miles south of San Francisco, were unable to gain access to The Guardian's articles on former NSA contractor Edward Snowden and his professed leaks of classified information about the intelligence programs. Late Thursday, an Army spokesman told The Herald by email that the newspaper's NSA reports were, in fact, being blocked across the entire Army. He wrote that it's routine for the Defense Department to take "network hygiene" action to prevent disclosure of classified information, The Herald reported. "We make every effort to balance the need to preserve information access with operational security," the newspaper quoted the spokesman as saying. "However there are strict policies and directives in place regarding protecting and handling classified information."

Note: To read the full story in the Monterey Herald, click here. For the Guardian's coverage of this, click here. Does the military have the right to censor its members' access to information?


GCHQ taps fibre-optic cables for secret access to world's communications
2013-06-21, The Guardian (One of the UK's leading newspapers)
Posted: 2013-07-01 13:07:04
http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communicati...

Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA). The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate. One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects. This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets. The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden. Britain's technical capacity to tap into the cables that carry the world's communications ... has made GCHQ an intelligence superpower. A total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.

Note: For solid evidence spy agencies targeted even top politicians, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.


Daniel Ellsberg on the Limits of Knowledge
2010-02-27, Mother Jones
Posted: 2013-07-01 13:00:51
http://www.motherjones.com/kevin-drum/2010/02/daniel-ellsberg-limitations-kno...

[Here's a story] from Ellsberg's book Secrets. The setting is a meeting with Henry Kissinger in late 1968. In 1968 Ellsberg was a highly respected analyst ... who had worked for both the Pentagon and Rand, and Kissinger was just entering the government. Ellsberg told him, "Henry, there's something I would like to tell you. You've dealt a great deal with top secret information. But you're about to receive a whole slew of special clearances, maybe fifteen or twenty of them, that are higher than top secret. First, you'll be exhilarated by some of this new information. But second, ... you will feel like a fool for having studied, written, talked about these subjects, criticized and analyzed decisions made by presidents for years without having known of the existence of all this information. In particular, you'll feel foolish for having literally rubbed shoulders for over a decade with some officials and consultants who did have access to all this ... and you'll be stunned that they kept that secret from you so well. You will feel like a fool. Then, after you've ... become used to using what amounts to whole libraries of hidden information, ... you will forget there ever was a time when you didn't have it. You'll be aware only of the fact that you have it now and most others don't ... and that all those other people are fools. [In] a matter of two or three years — you'll eventually become aware of the limitations of this information. It's often inaccurate, and it can lead you astray. But that takes a while to learn. In the meantime ... you will deal with a person who doesn't have those clearances only from the point of view of what you want him to believe and what impression you want him to go away with. You'll have to lie carefully to him about what you know. In effect, you will have to manipulate him.

Note: Don't miss the entire fascinating, highly revealing article at the link above. To see this quote from Ellsberg's book on Google books, click here. For more on government secrets, see the deeply revealing reports from reliable major media sources available here.


FBI uses drones for surveillance in U.S
2013-06-20, CNN
Posted: 2013-06-25 08:54:41
http://www.cnn.com/2013/06/19/politics/fbi-drones/index.html

FBI Director Robert Mueller acknowledged [to the Senate Judiciary Committee on June 19 that] the law enforcement agency uses drone aircraft in the United States for surveillance. He did not say how many unmanned surveillance vehicles (UAVs) the FBI has or how often they have been used. But a law enforcement official told CNN the FBI has used them a little more than a dozen times but did not say when that started. The official said drones are useful in hostage and barricade situations because they operate more quietly and are less visible than traditional aircraft such as helicopters. Bureau spokesman Paul Bresson said their use allows "us to learn critical information that otherwise would be difficult to obtain without introducing serious risk to law enforcement personnel." Bresson said the aircraft can only be used to perform surveillance on stationary subjects and the FBI must first get approval from the Federal Aviation Administration to fly in a "very confined geographic area." Senate Intelligence Committee Chairman Dianne Feinstein expressed concern over drone use domestically. "I think the greatest threat to the privacy of Americans is the drone and the use of the drone, and the very few regulations that are on it today and the booming industry of commercial drones," the California Democrat said. The FAA forecasts some 10,000 civilian drones will be in use in the United States within five years, including those for law enforcement and commercial purposes.

Note: For more on domestic US drone surveillance, click here. For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here.


The F.B.I. Deemed Agents Faultless in 150 Shootings
2013-06-19, New York Times
Posted: 2013-06-25 08:51:39
http://www.nytimes.com/2013/06/19/us/in-150-shootings-the-fbi-deemed-agents-f...

After contradictory stories emerged about an F.B.I. agent’s killing last month of a Chechen man in Orlando, Fla., who was being questioned over ties to the Boston Marathon bombing suspects, the bureau reassured the public that it would clear up the murky episode. But if such internal investigations are time-tested, their outcomes are also predictable: from 1993 to early 2011, F.B.I. agents fatally shot about 70 “subjects” and wounded about 80 others — and every one of those episodes was deemed justified, according to interviews and internal F.B.I. records. The last two years have followed the same pattern: an F.B.I. spokesman said that since 2011, there had been no findings of improper intentional shootings. In most of the shootings, the F.B.I.’s internal investigation was the only official inquiry. In the Orlando case, for example, there have been conflicting accounts about basic facts like whether the Chechen man, Ibragim Todashev, attacked an agent with a knife, was unarmed or was brandishing a metal pole. But Orlando homicide detectives are not independently investigating what happened. Occasionally, the F.B.I. does discipline an agent. A typical punishment involved adding letters of censure to agents’ files. Critics say the fact that for at least two decades no agent has been disciplined for any instance of deliberately shooting someone raises questions about the credibility of the bureau’s internal investigations.

Note: For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here.


3 NSA veterans speak out on whistle-blower: We told you so
2013-06-16, USA Today
Posted: 2013-06-25 08:50:06
http://www.usatoday.com/story/news/politics/2013/06/16/snowden-whistleblower-...

When a National Security Agency contractor revealed top-secret details this month on the government's collection of Americans' phone and Internet records, one select group of intelligence veterans breathed a sigh of relief. Thomas Drake, William Binney and J. Kirk Wiebe belong to a select fraternity: the NSA officials who paved the way. For years, the three whistle-blowers had told anyone who would listen that the NSA collects huge swaths of communications data from U.S. citizens. They had spent decades in the top ranks of the agency, designing and managing the very data-collection systems they say have been turned against Americans. When they became convinced that fundamental constitutional rights were being violated, they complained first to their superiors, then to federal investigators, congressional oversight committees and, finally, to the news media. They have been investigated as criminals and forced to give up careers, reputations and friendships built over a lifetime. Today, they feel vindicated. They say the documents leaked by Edward Snowden, the 29-year-old former NSA contractor who worked as a systems administrator, proves their claims of sweeping government surveillance of millions of Americans not suspected of any wrongdoing. They say those revelations only hint at the programs' reach. On [June 15], USA TODAY brought Drake, Binney and Wiebe together for the first time since the story broke to discuss the NSA revelations. With their lawyer, Jesselyn Radack of the Government Accountability Project, they weighed their implications and their repercussions.

Note: See the link above for a great interview of these courageous whistleblowers. For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here


GCHQ intercepted foreign politicians' communications at G20 summits
2013-06-16, The Guardian (One of the UK's leading newspapers)
Posted: 2013-06-25 08:48:03
http://www.guardian.co.uk/uk/2013/jun/16/gchq-intercepted-communications-g20-...

Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic. The disclosure raises new questions about the boundaries of surveillance by GCHQ [Government Communications Headquarters] and its American sister organisation, the National Security Agency [NSA], whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. They reveal that during G20 meetings in April and September 2009 GCHQ used what one document calls "ground-breaking intelligence capabilities" to intercept the communications of visiting delegations. This included: • Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates' use of computers; • Penetrating the security on delegates' BlackBerrys to monitor their email messages and phone calls; • Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit.

Note: For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here


Hastings' death spawns conspiracy theories
2013-06-20, San Francisco Chronicle (SF's leading newspaper)
Posted: 2013-06-25 08:34:19
http://www.sfgate.com/nation/article/Hastings-death-spawns-conspiracy-theorie...

During the weeks before he was killed in a car crash in Los Angeles, reporter Michael Hastings was researching a story about a privacy lawsuit brought by Florida socialite Jill Kelley against the Department of Defense and the FBI. Hastings, 33, was scheduled to meet with a representative of Kelley next week in Los Angeles to discuss the case, according to a person close to Kelley. Hastings wrote for Rolling Stone and the website BuzzFeed. The story about Kelley, Broadwell and the Petraeus affair would have been consistent with topics that Hastings has focused on during his reporting career, including his 2010 Rolling Stone profile of Gen. Stanley McChrystal, the top American commander in Afghanistan, which led to McChrystal's resignation. The story described the disdain that the general's staff had for President Obama and Vice President Joe Biden. Since Hastings' death early Tuesday, wild conspiracy theories have bloomed on the Internet, implying that he was murdered by powerful forces wanting to silence him. On Wednesday night, the antisecrecy website WikiLeaks [published] a message on Twitter that Hastings had contacted a lawyer for the organization hours before his car smashed into a tree on North Highland Avenue in Los Angeles. The message read: "Michael Hastings contacted WikiLeaks lawyer Jennifer Robinson just a few hours before he died, saying that the FBI was investigating him."

Note: For a more in-depth article in New York Magazine raising serious questions, click here. Among other key evidence, the article quotes an automotive writer saying that the fire caused by the crash was virtually impossible. A U.S. News & World Report article also states, "researchers at the University of Washington and the University of California, San Diego, proved that computers could be hacked with either physical access to the car or wirelessly using technology such as Bluetooth. A hacker could then disable the brakes, stop the engine, or worse." A revealing video shows the engine was thrown 50 yards from the car.


Former TWA Flight 800 Investigators Urge New Look at Crash
2013-06-19, US News & World Report
Posted: 2013-06-25 08:27:12
http://www.usnews.com/news/articles/2013/06/19/former-twa-flight-800-investig...

Former investigators of the 1996 TWA Flight 800 crash are urging the National Transportation Safety Board to reopen its review of the nearly 17-year-old case. In a new documentary about the crash that is scheduled to air next month, several former investigators on the case suggest that missiles brought down the New York-to-Paris plane, killing 230 people when it exploded near Long Island just minutes after it took off. This new evidence could resurrect conspiracy theories that began circulating within days of the crash. However, the NTSB concluded after four years investigating the crash that the plane's center fuel tank exploded "most likely" from a short circuit, ruling out the possibility of a missile, according to the board's report. But the retired investigators claim that those findings were "falsified." "Early on in the investigation there was indication that the evidence was being tampered with," said Hank Hughes, a former senior accident investigator with NTSB, during a conference call with reporters. Hughes and others cited possible missing parts of the plane, possible explosive material and other findings that could corroborate their theory that a missile came from the north. The documentary's co-producer Tom Stalcup told CNN that the film offers "solid proof that there was an external detonation," and that a number of people have come forward confirming these claims.

Note: For powerful evidence from an Emmy-award winning journalist that this investigation was manipulated, click here. To watch the powerful documentary Shadows of Liberty on major media manipulation, including that of TWA flight 800 (minute 14) at this link.


'Pierre Salinger Syndrome' and the TWA 800 conspiracies
2012-07-17, CNN
Posted: 2013-06-25 08:25:24
http://www.cnn.com/2006/US/07/12/twa.conspiracy/index.html

Bolstered by eyewitness accounts and the Internet, the explosion of TWA Flight 800 off the coast of New York 10 years ago spawned a slew of sinister conspiracy theories, most notably the belief that a missile from a U.S. Navy ship was responsible. So prevalent were these theories that the term "Pierre Salinger Syndrome" -- the belief that everything on the Internet is true -- entered the lexicon. Some witness accounts seemed to support the missile theory. It quickly became a hot topic on the young but quickly growing Internet. It might have stayed simply an Internet conspiracy had it not been for Pierre Salinger, President Kennedy's press secretary who had worked as a network news correspondent for a time. Three months after the TWA tragedy, while working as a freelance public relations director, he claimed to have verified the friendly fire cover-up. "It's a document I got about five weeks ago -- came from ... an intelligence agent of France. He had been given this document from an American Secret Service agent based in France," Salinger said at the time. "He had been doing an inquiry and had some contacts with the U.S. Navy." Salinger took to the news airwaves, including CNN, touting his theory. But as baseless as it sounded, Salinger could not be ignored. His accusations gave conspiracy theorists a voice of distinction and credibility.

Note: For powerful evidence from an Emmy-award winning journalist that this investigation was manipulated, click here. To watch the powerful documentary Shadows of Liberty on major media manipulation, including that of TWA flight 800 (minute 14) at this link.


NSA surveillance played little role in foiling terror plots, experts say
2013-06-12, The Guardian (One of the UK's leading newspapers)
Posted: 2013-06-18 13:30:01
http://www.guardian.co.uk/world/2013/jun/12/nsa-surveillance-data-terror-attack

Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.

Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.


Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"