Please donate here to support this vital work.
Revealing News For a Better World

News Articles
Excerpts of Key News Articles in Major Media


Below are key excerpts of little-known, yet highly revealing news articles from the media. Links are provided to the full news articles for verification. If any link fails to function, read this webpage. These articles are listed by order of importance. You can also explore these articles listed by order of the date of the news article or by the date posted. By choosing to educate ourselves, we can build a brighter future.

Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


Americans pay GCHQ Ł100m to spy for them, leaked papers claim
2013-08-01, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/news/uknews/defence/10217280/Americans-pay-GCHQ-10...

GCHQ has received at least Ł100 million from the US to help fund intelligence gathering, raising questions over American influence on the British agencies. The money was paid across a range of projects over three years and resulted in GCHQ spying on behalf of America, according to leaked documents. It also emerged that the intelligence agency wants the ability to “exploit any phone, anywhere, any time” and that some staff have raised concerns over the “morality and ethics” of their operational work. The payments from the US National Security Agency (NSA) are detailed in GCHQ’s annual “investment portfolios”, leaked by Mr Snowden to The Guardian. The NSA paid GCHQ Ł22.9 million in 2009, Ł39.9 million in 2010 and Ł34.7 million in 2011/12. The 2010 funding included ... Ł17.2 million for the agency’s “Mastering the Internet” project, which gathers “raw” information from the web to be analysed. In return, GCHQ has to have the American view in mind when prioritising work, the papers claim. One strategy briefing disclosed the pressure on GCHQ to meet NSA demands, saying: “GCHQ must pull its weight and be seen to pull its weight.” In another document, from 2010, GCHQ apparently acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


XKeyscore: NSA tool collects 'nearly everything a user does on the internet'
2013-07-31, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


Not too ghoulish, Gaga? Singer is nonchalant as she eats fake blood off woman's naked body at art show
2013-07-29, Daily Mail (One of the UK's most popular newspapers)
http://www.dailymail.co.uk/tvshowbiz/article-2380831/Lady-Gaga-nonchalant-as-...

A woman who wore a meat dress was never going to be massively phased by even the most ghoulish piece of performance art. But still, there was an incredible nonchalance about Lady Gaga as she scooped fake blood sauce from a woman's naked body at the 20th annual benefit for the Watermill Center. Gaga arrived with performance artist Marina Abramovic and the center’s director Robert Wilson then mingled with stars like Hugh Jackman and Winona Ryder. The 27-year-old then caused even more of a commotion by bidding $60,000 to buy an Abramovic work, a wall-mounted quartz brick. After the dinner and auction, hosted by Alan Cumming, guests danced with several women wearing nothing but body paint. Gaga, then spotted the woman covered in blood, an onlooker told the NY Post: 'There was a casket with a totally naked woman laying in what looked like a pool of blood. On a table nearby there was a row of little spoons — no one had touched them, because no one knew what they were for. [Wilson] gave two spoons to Gaga and Marina . . . and Gaga dipped the spoon right between the artist’s legs, and took a sip.' She then, 'proceeded to lick the spoon.'

Note: See how this is related to the Pizzagate case in our thoroughly research essay on this topic.


A Universe Full of Planets
2013-07-26, New York Times
http://www.nytimes.com/2013/07/26/opinion/global/a-universe-full-of-planets.h...

Using techniques of exquisite sensitivity and technological finesse, astronomers have spent the past two decades on an astonishing voyage of cosmic discovery. They have found that the universe is full of planets: cold, small, and dark next to their large and glaring suns, these worlds have previously been hidden from us. To spot them represents a challenge that has been compared to looking across thousands of miles to see a firefly buzzing around a brilliant searchlight. They exert a gravitational pull, tugging their parent stars into a gently wobbling motion that we can now detect. We now have firm evidence for thousands of planets, around thousands of stars. We also know something about these worlds, their sizes, their orbits, often their ages. In a handful of cases ... we have even measured the temperature of their upper atmospheres and [determined] their gaseous chemistry, finding substances like sodium, methane and water. No matter how conservative or optimistic we are, the statistics tell us that something like an astonishing one out of every seven stars must harbor a planet similar in size to the Earth, and at roughly the right orbital distance to allow for the possibility of a temperate surface environment. In other words, roughly 15 percent of all suns could, in principle, be hosting a place suitable for life as we know it. Since our galaxy contains at least 200 billion stars, this implies a vast arena for the universe’s ubiquitous carbon chemistry to play in — a process that, as here on Earth, might lead to the complex machinery of life. Indeed, there is a 95-percent confidence — give or take a few percent — that one of these worlds could be within a mere 16 light years of us.

Note: For fascinating testimony from top military and government officials revealing a major cover-up of the existence of UFOs and ETs, click here. For more on the nature of reality, see the deeply revealing reports from reliable major media sources available here.


Delaware 'Public Benefit Corporation' Lets Directors Serve Three Masters Instead Of One
2013-07-16, Forbes
http://www.forbes.com/sites/danielfisher/2013/07/16/delaware-public-benefit-c...

[On July 17 Delaware] Gov. Jack Markell is scheduled to sign a law creating a new “public benefit corporation” where directors must balance the interests of the owners with those of employees, the general public and the environment. Delaware becomes the 19th state to pass such a law, but it may be the most important one since it is home to half of all publicly traded U.S. companies. Not that Ford Motor Co. or Intel are likely to avail themselves of this new corporate structure. Under the Delaware law, 90% of shareholders must approve a shift to benefit status. The law will likely be more popular with closely held firms like Etsy, the online marketplace for handmade products with more than $500 million a year in sales. It gives them a chance to declare a broader set of objectives than profit alone, and a legal structure to pursue them without risking lawsuits by disgruntled shareholders who might prefer a fatter dividend, say, than the comfort of knowing no endangered species were wiped out by their company’s logging operations. Under the new Delaware law, the purpose of a public benefit corporation is to operate in a “responsible and sustainable manner.” Directors can’t be sued for pursuing objectives that advance “artistic, charitable, cultural …scientific or technological” goals. The benefit corporation movement has even formed the Sustainability Accounting Standards Board to come up with the equivalent of GAAP for the Birkenstock-wearing set.

Note: For more on this exciting development, see the Huffington Post article written by Delaware's governor at this link.


What the Government Pays to Snoop on You
2013-07-10, CNBC/Associated Press
http://www.cnbc.com/id/100876701

In the era of intense government surveillance and secret court orders, a murky multimillion-dollar market has emerged. Paid for by U.S. tax dollars, but with little public scrutiny, surveillance fees charged in secret by technology and phone companies can vary wildly. AT&T, for example, imposes a $325 "activation fee" for each wiretap and $10 a day to maintain it. Smaller carriers Cricket and U.S. Cellular charge only about $250 per wiretap. But snoop on a Verizon customer? That costs the government $775 for the first month and $500 each month after that. Regardless of price, the surveillance business is growing. The U.S. government long has enjoyed access to phone networks and high-speed Internet traffic under the U.S. Communications Assistance for Law Enforcement Act to catch suspected criminals and terrorists. More recently, the FBI has pushed technology companies like Google and Skype to guarantee access to real-time communications on their services. As the number of law enforcement requests for data grew and carriers upgraded their technology, the cost of accommodating government surveillance requests increased. AT&T, for example, said it devotes roughly 100 employees to review each request and hand over data. Likewise, Verizon said its team of 70 employees works around the clock, seven days a week to handle the quarter-million requests it gets each year.

Note: For more on government and corporate attacks on privacy, see the deeply revealing reports from reliable major media sources available here.


Breaking the Seal on Drug Research
2013-06-30, New York Times
http://www.nytimes.com/2013/06/30/business/breaking-the-seal-on-drug-research...

Peter Doshi ... is one of the most influential voices in medical research today. Dr. Doshi’s renown comes not from solving the puzzles of cancer or discovering the next blockbuster drug, but from pushing the world’s biggest pharmaceutical companies to open their records to outsiders. Together with a band of far-flung researchers and activists, he is trying to unearth data from clinical trials — complex studies that last for years and often involve thousands of patients across many countries — and make it public. The current system, the activists say, is one in which the meager details of clinical trials published in medical journals, often by authors with financial ties to the companies whose drugs they are writing about, is insufficient to the point of being misleading. For years, researchers have talked about the problem of publication bias, or selectively publishing results of trials. Concern about such bias gathered force in the 1990s and early 2000s, when researchers documented how, time and again, positive results were published while negative ones were not. Taken together, studies have shown that results of only about half of clinical trials make their way into medical journals. In 2009, Dr. Doshi and his colleagues set out to answer a simple question about the anti-flu drug Tamiflu: Does it work? Resolving that question has been far harder than they ever envisioned, and, four years later, there is still no definitive answer.

Note: If the public is going to be taking these drugs, shouldn't all safety studies be publicly available? What are the drug companies hiding? For more on corruption in the pharmaceutical industry, see the deeply revealing reports from reliable major media sources available here.


'Whitey' Bulger Trial Details FBI Corruption
2013-06-27, ABC News
http://abcnews.go.com/US/whitey-bulger-trial-details-fbi-corruption/story?id=...

Former FBI supervisor John Morris thought he had left his sordid relationship with James "Whitey" Bulger back in Boston along with the envelopes of money, the cases of expensive wine, the home-cooked meals he had prepared for the accused mob boss. Then the phone rang one night. It was 1995 and Bulger had become a fugitive from justice. It was Bulger on the phone. And he was livid. A Boston newspaper had reported that Bulger was a longtime FBI informant, and Bulger wanted Morris to have the story retracted. "He said if he was going to jail ... I was going with him." Morris testified in the trial of Bulger, 83, who is accused of a string of crimes, including 19 murders. Testimony during the trial has stated Bulger ran a criminal enterprise with the help of corrupt FBI agents [John] Connolly and Morris, and that Bulger was an FBI informant concerning his criminal rivals. Morris' testimony put a spotlight on a staggering amount of corruption in the Boston FBI field office that included cash bribes and tip-offs to wiretaps. Connolly's relationship with Bulger extended into the Massachusetts State House, Morris testified. His friendship with Bulger's brother, then Senate President William Bulger, [could] land him a job as the Boston police commissioner upon his retirement from the bureau. Connolly's behavior did not raise any eyebrows with the Special Agents in Charge of the Boston FBI field office, Morris told the court. In fact it was quite the opposite. FBI bosses sought Connolly's friendship, Morris testified. "He had tremendous access across the board to everything including sports events, political figures," Morris testified.

Note: For more on major corruption within the FBI and other intelligence services, see the deeply revealing reports from reliable major media sources available here.


Was Michael Hastings' Car Hacked? Richard Clarke Says It's Possible
2013-06-24, Huffington Post
http://www.huffingtonpost.com/2013/06/24/michael-hastings-car-hacked_n_349233...

The peculiar circumstances of journalist Michael Hastings' death in Los Angeles last week have unleashed a wave of conspiracy theories. Now there's another theory to contribute to the paranoia: According to a prominent security analyst, technology exists that could [have] allowed someone to hack his car. Former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarke [said] that what is known about the single-vehicle crash is "consistent with a car cyber attack." Clarke said, "There is reason to believe that intelligence agencies for major powers" -- including the United States -- know how to remotely seize control of a car. "It's relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn't want acceleration, to throw on the brakes when the driver doesn't want the brakes on, to launch an air bag," Clarke told The Huffington Post. Hastings was driving a 2013 Mercedes C250 coupe when he crashed into a tree on Highland Ave. in Los Angeles at approximately 4:30 am on June 18. Video posted online showed the car in flames, and one neighbor told a local news crew she heard a sound like an explosion. Another eyewitness said the car's engine had been thrown 50 to 60 yards from the car. There were no other vehicles involved in the accident. The fire was so all-consuming that it took the Los Angeles County coroner's office two days to identify Hastings' body, but Clarke said a cyber attack on the vehicle would have been nearly impossible to trace "even if the dozen or so computers on board hadn't melted."

Note: For a video of a DARPA specialist talking about how any computerized function of a car can be taken over, click here. This news article shows how a university test proved a car's onboard computer can be hacked. For an excellent video presenting powerful evidence that Hastings' death was anything but suicide, click here. For a Fox News video showing other evidence of premeditated murder, click here. In this video, a good friend states he had just received an email from Hastings that he had a story on the CIA that would be the biggest story yet. A later email then said he was worried as he was now under FBI investigation.


How Barrett Brown shone light on the murky world of security contractors [and is now jailed]
2013-06-24, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/jun/24/surveillance-us-national-...

[Barrett] Brown is not a household name like Edward Snowden or Bradley Manning. But after helping expose a dirty tricks plot, he faces jail. Brown made a splash in February 2011 by helping to uncover "Team Themis", a project by intelligence contractors retained by Bank of America to demolish the hacker society known as Anonymous. The Team Themis story began in late 2010, when Julian Assange warned WikiLeaks would release documents outlining an "ecosystem of corruption [that] could take down a bank or two." Bank of America went into damage-control mode and, as the New York Times reported, assembled "a team of 15 to 20 top Bank of America officials … scouring thousands of documents in the event that they become public." Days later, Bank of America retained the well-connected law firm of Hunton & Williams [which] "proposed various schemes to attack" WikiLeaks. Its partners suggested creating false documents and fake personas to damage progressive organizations. The tech companies' emails – which Anonymous hacked and Barrett Brown helped publicize – listed planned tactics: "Feed[ing] the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error." Brown [has] been cooling his heels in a jail outside Dallas ... awaiting two separate trials that could put him on ice for more than 100 years. In contrast to the FBI's aggressive pursuit of Brown, no probe of the Team Themis project was launched – despite a call from 17 US House representatives to investigate a possible conspiracy to violate federal laws.

Note: With the wide focus on the privatized national security state by the leaks from Edward Snowden, there is renewed interest in Brown's plight and the campaign for justice in his case. For more on this and to support Barret Brown, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.


GCHQ taps fibre-optic cables for secret access to world's communications
2013-06-21, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communicati...

Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA). The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate. One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects. This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets. The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden. Britain's technical capacity to tap into the cables that carry the world's communications ... has made GCHQ an intelligence superpower. A total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.

Note: For solid evidence spy agencies targeted even top politicians, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.


GCHQ intercepted foreign politicians' communications at G20 summits
2013-06-16, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/uk/2013/jun/16/gchq-intercepted-communications-g20-...

Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic. The disclosure raises new questions about the boundaries of surveillance by GCHQ [Government Communications Headquarters] and its American sister organisation, the National Security Agency [NSA], whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. They reveal that during G20 meetings in April and September 2009 GCHQ used what one document calls "ground-breaking intelligence capabilities" to intercept the communications of visiting delegations. This included: • Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates' use of computers; • Penetrating the security on delegates' BlackBerrys to monitor their email messages and phone calls; • Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit.

Note: For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here


Former Bank of America workers allege lies to homeowners
2013-06-14, Chicago Tribune/Reuters
http://www.chicagotribune.com/business/breaking/sns-bank-of-america-workers-a...

Six former Bank of America Corp. employees have alleged that the bank deliberately denied eligible home owners loan modifications and lied to them about the status of their mortgage payments and documents. The bank allegedly used these tactics to shepherd homeowners into foreclosure, as well as in-house loan modifications. Both yielded the bank more profits than the government-sponsored Home Affordable Modification Program, according to documents recently filed as part of a lawsuit in Massachusetts federal court. The former employees, who worked at Bank of America centers throughout the United States, said the bank rewarded customer service representatives who foreclosed on homes with cash bonuses and gift cards to retail stores such as Target Corp and Bed Bath & Beyond Inc. At the same time, the bank punished those who did not make the numbers or objected to its tactics with discipline, including firing. About twice a month, the bank cleaned out its HAMP backlog in an operation called "blitz," where it declined thousands of loan modification requests just because the documents were more than 60 months old, the court documents say. The testimony from the former employees also alleges the bank falsified information it gave the government, saying it had given out HAMP loan modifications when it had not. Borrowers filed the civil case against Bank of America in 2010 and are now seeking class certification.

Note: For deeply revealing reports from reliable major media sources on financial corruption, click here.


America's private prison system is a national disgrace
2013-06-13, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/jun/13/aclu-lawsuit-east-mississ...

Privatization [of government functions] often comes with a lack of oversight and a series of abuses. One particularly stunning example is the American prison system, the realities of which should be a national disgrace. Some of those realities are highlighted in a recent lawsuit filed by the American Civil Liberties Union on behalf of prisoners at the East Mississippi Correctional Facility (EMCF). EMCF houses severely mentally ill prisoners, with the supposed intent of providing both incarceration and treatment. Instead, the ACLU contends, the facility, which is operated by private contractors, is rife with horrific abuses. The complaint lists a litany of such horrors, [including]: Rampant rapes. Placing prisoners in solitary confinement for weeks, months or even years at a time. Rat infestations so bad that vermin crawl over prisoners. Many suicide attempts, some successful. Denying or delaying treatment for infections and even cancer. Stabbings, beatings and other acts of violence. Malnourishment and chronic hunger. Officers who deal with prisoners by using physical violence. The [US] prison system is increasingly built and run by for-profit corporations, who have a financial interest in increasing the number of people in prison while decreasing the amount of money it costs to house them. Since 1980, the US prison population has grown by 790%. We have the largest prison population of any nation in the history of the world.

Note: For deeply revealing reports from reliable major media sources on corruption and human rights abuses in prisons, click here.


'Gay lobby' in the Vatican, says Pope Francis
2013-06-11, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/news/worldnews/europe/vaticancityandholysee/101137...

Pope Francis has admitted that a "gay lobby" exists within the Vatican's administration and is planning to take action about it, according to reports. "Yes, it is difficult," he reportedly said. "In the Curia there are holy people, truly holy people. But there is also a current of corruption, also there is ... a 'gay lobby' and that is true. It is there ... we will have to see what we can do." In February, Italian newspapers reported that a dossier on scandals within the Vatican, ordered by Pope Benedict XVI and delivered to him in December, exposed a network of patronage among a powerful lobby of homosexual churchmen as well as the potential blackmailing of homosexuals. The Italian reports suggested that the details exposed had pushed Benedict to resign in February. The dossier was compiled by three senior cardinals, who were charged with looking into secret rivalries and corruption within the Vatican following the leaking of Benedict's private letters by his butler, Paolo Gabriele. In his audience, Pope Francis allegedly promised to reform the Vatican but said it would be "difficult" and that he could not carry out the reforms himself because he was "disorganised". He reportedly said he would be relying on the commission of eight cardinals he appointed in April to organise reform of the Curia, which is due to meet in October.

Note: For deeply revealing reports from reliable major media sources on secrecy, click here.


Edward Snowden: saving us from the United Stasi of America
2013-06-10, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/jun/10/edward-snowden-united-st...

Since 9/11, there has been, at first secretly but increasingly openly, a revocation of the bill of rights for which this country fought over 200 years ago. In particular, the fourth and fifth amendments of the US constitution, which safeguard citizens from unwarranted intrusion by the government into their private lives, have been virtually suspended. The United States is not now a police state. But given the extent of this invasion of people's privacy, we do have the full electronic and legislative infrastructure of such a state. These powers are extremely dangerous. There are legitimate reasons for ... secrecy about communications intelligence. But what is not legitimate is to use a secrecy system to hide programs that are blatantly unconstitutional. In 1975, Senator Frank Church spoke of the National Security Agency in these terms: "I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return." The dangerous prospect of which he warned was that America's intelligence gathering capability – which is today beyond any comparison with what existed in his pre-digital era – "at any time could be turned around on the American people and no American would have any privacy left." That has now happened. That is what [Edward] Snowden has exposed, with official, secret documents. We have fallen into Senator Church's abyss.

Note: The above was written by Daniel Ellsberg, a former US military analyst who in 1971 leaked the Pentagon Papers, showing how the US public had been misled about the Vietnam war. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.


U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program
2013-06-07, Washington Post
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from...

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs. The program, code-named PRISM, has not been made public until now. It may be the first of its kind. Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” GCHQ, Britain’s equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority. Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.

Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.


Graham: FBI hindered Congress’s 9/11 inquiry, withheld reports about Sarasota Saudis
2013-06-05, Miami Herald
http://www.miamiherald.com/2013/06/05/3434487/graham-fbi-hindered-congresss.html

Former U.S. Sen. Bob Graham has accused the FBI in court papers of having impeded Congress’s Joint Inquiry into 9/11 by withholding information about a Florida connection to the ... attacks that killed nearly 3,000 people. The information ... includes a recently declassified FBI report that ties a Saudi family who once lived in Sarasota “to individuals associated with the terrorist attacks on 9/11/2001.” “The FBI’s failure to call (to the Joint Inquiry’s attention) documents finding ‘many connections’ between Saudis living in the United States and individuals associated with the terrorist attack(s) … interfered with the Inquiry’s ability to complete its mission,” said Graham, co-chairman of the Joint Inquiry. Graham said the FBI kept the 9/11 Commission in the dark, too. He said co-chairmen Thomas Kean and Lee Hamilton and executive director Philip Zelikow all told him they were unaware of the FBI’s Sarasota investigation. Moreover, Graham stated that Deputy FBI Director Sean Joyce, the Bureau’s second in command, personally intervened to block him from speaking with the special agent-in-charge of the Sarasota investigation. “I am troubled by what appears to me to be a persistent effort by the FBI to conceal from the American people information concerning possible Saudi support of the Sept. 11 attacks,” Florida’s former governor said.

Note: For deeply revealing reports from reliable major media sources on the 9/11 attacks, click here.


Facebook rejects rape culture. Can you?
2013-05-31, CNN
http://www.cnn.com/2013/05/30/opinion/chemaly-facebook/index.html

After I wrote an article about misogyny found on Facebook, people began to send me links to content that they had tried and failed to have removed by the site. Among these was a seven-minute video depicting a gang-rape of a girl by the side of the road. I began looking more deeply into the subject. I came across "humor" pages with names like "Raping Your Girlfriend." There were easily accessed pictures and videos of girls and women frightened, humiliated, bruised, beaten, raped, [and] bathed in blood. In one instance, Facebook declined to remove an image of a woman, mouth covered in tape, in which the caption read, "Don't tap her and rap her. Tape her and rape her." The photo went viral. Facebook's response ... "the photo ... did not violate our community standards." I joined [others] to launch a global campaign to confront institutionalized sexism in media. We wrote an open letter to Facebook, co-signed by more than 100 organizations, asking the company ... to train people to recognize violence against women as hateful. We encouraged users of Facebook to send messages to its advertisers encouraging them to boycott the social media network. Over seven days, men and women around the world sent more than 60,000 tweets ... and 5,000 e-mails to targeted advertisers, 16 of whom withdrew their advertising. Facebook responded, noting that its "systems to identify and remove hate speech have failed to work as effectively" as they would like. We are in the midst of a shifting cultural tide in which gender based violence -- historically kept private -- is better understood as a pandemic problem. Facebook's action represents an open acknowledgment that violence against women is a serious issue [that] deserves serious attention.

Note: How sad that it took facebook advertisers withdrawing their support to make this change. And how awesome that the writer of this article, Soraya Chemaly, had to the courage to stand up and do something about it by initiating this sexism campaign against facebook, and to inspire others to join her. Working together, we can make a difference.


The ‘Signature Strikes’ Program
2013-05-29, New York Times
http://takingnote.blogs.nytimes.com/2013/05/29/the-signature-strikes-program/...

Toward the end of a May 27 article in The Times about President Obama’s speech in which, among other things, he mentioned setting new standards for ordering drone strikes against non-Americans, there was this rather disturbing paragraph: “Even as he set new standards, a debate broke out about what they actually meant and what would actually change. For now, officials said, ‘signature strikes’ targeting groups of unidentified armed men presumed to be extremists will continue in the Pakistani tribal areas.” As Glenn Greenwald has pointed out, those two sentences seem to contradict the entire tenor of Mr. Obama’s speech, and of a letter to Congress from Attorney General Eric Holder. Both men seemed to be saying that the administration would stop using unmanned drones to kill targets merely suspected, due to their location or their actions, of a link to Al Qaeda or another terrorist organization. Those strikes have resulted in untold civilian casualties that have poisoned America’s relationship with Yemen and Pakistan. Mr. Obama talked at some length about civilian casualties, and also said that the need to use drone strikes against “forces that are massing to support attacks on coalition forces” will disappear once American forces withdraw from Afghanistan at the end of 2014. But so what to make of that paragraph in the May 27 article? I asked the White House. What I got in response was part of a background briefing given after the president’s speech that repeated the language about how the need for signature strikes will fade.

Note: Drone strikes often miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"