Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption Media Articles
Excerpts of Key Intelligence Agency Corruption Media Articles in Major Media


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


Snowden Docs Show British Spies Used Sex and 'Dirty Tricks'
2014-02-07, NBC News
http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-se...

British spies have developed "dirty tricks" ... that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into "honey traps." Documents taken from the National Security Agency by Edward Snowden ... describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG). According to the documents ... the agency's goal was to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications. The propaganda campaigns use deception, mass messaging and "pushing stories" via Twitter, Flickr, Facebook and YouTube. JTRIG also uses "false flag" operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain's adversaries. Other documents ... show that JTRIG ... used a DDOS attack to shut down Internet chat rooms used by members of the hacktivist group known as Anonymous. A computer virus called Ambassadors Reception was "used in a variety of different areas" and was "very effective." When sent to adversaries ... the virus will "encrypt itself, delete all emails ... and block the computer user from logging on. Spies have long used sexual "honey traps" to snare, blackmail and influence targets. Most often, a male target is led to believe he has an opportunity for a romantic relationship or a sexual liaison with a woman, only to find that the woman is actually an intelligence operative.

Note: You can read the documents released by Snowden at this link and this one. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


James Clapper might as well be called director of US fearmongering
2014-02-06, The Guardian (One of the U.K.'s leading newspapers)
http://www.theguardian.com/commentisfree/2014/feb/06/james-clapper-us-threat-...

James Clapper is very worried. It's not the first time. Last week the man who serves as America's Director of National Intelligence [told] assembled members of the Senate Select Intelligence Committee that the annual worldwide threat assessment ... has filled him with dread. Last year he appeared before Congress for a similar purpose. He was very, very concerned then too. [And the same] in 2012. Of course, one must consider the possibility that over the past five decades the world has never been as dangerous, complex and challenging as it's been over the past three years, [even though the] whole "threat of nuclear holocaust" ... defined much of the 60s, 70s and 80s. Clapper's alarmist tone is hardly matched by the threats he cites. Significantly more Americans die each year from falling furniture [than from terrorist acts]. To listen to Clapper and others in the intelligence community one might never know that inter-state war has largely disappeared and that wars in general are in the midst of a multi-decade decline. 2013 was a landmark year for non-proliferation with important progress made in slowing down Iran's nuclear aspirations and enforcing the norm on chemical weapons usage. There are real threats to the US, but Clapper should be able to talk about them in sober, evidence-based, non-hysterical terms. It's almost as if Clapper and the intelligence community that he helms are playing up foreign threats in order to justify bloated post-9/11 budgets. [Remember that] he allegedly lied to Congress over the extent to which the National Security Agency was collecting phone and e-mail records of individual Americans. [Sadly,] threat mongering and exaggeration is the norm rather than the exception.

Note: For a dramatic BBC documentary showing how many politicians literally promote fear for their own self benefit, watch Power of Nightmares at this link. For more on intense deception perpetrated by the intelligence community, see the deeply revealing reports from reliable major media sources available here.


New surveillance technology can track everyone in an area for several hours at a time
2014-02-05, Washington Post
http://www.washingtonpost.com/business/technology/new-surveillance-technology...

From 10,000 feet up, tracking an entire city at one glance: Ohio-based Persistent Surveillance Systems is trying to convince cities across the country that its surveillance technology can help reduce crime. Its new generation of camera technology is far more powerful than the police cameras to which America has grown accustomed. But these newer cameras have sparked some privacy concerns. A new, far more powerful generation is being quietly deployed [from small aircraft] that can track every vehicle and person across an area the size of a small city, for several hours at a time. Although these cameras can’t read license plates or see faces, they provide such a wealth of data that police, businesses and even private individuals can use them to help identify people and track their movements. Already, the cameras have been flown above major public events such as the Ohio political rally where Sen. John McCain named Sarah Palin as his running mate in 2008. They’ve been flown above Baltimore; Philadelphia; Compton, Calif.; and Dayton [OH] in demonstrations for police. They’ve also been used for traffic impact studies, [and] for security at NASCAR races. Defense contractors are developing similar technology for the military, but its potential for civilian use is raising novel civil liberties concerns. In Dayton, where Persistent Surveillance Systems is based, city officials balked last year when police considered paying for 200 hours of flights, in part because of privacy complaints. The Supreme Court generally has given wide latitude to police using aerial surveillance as long as the photography captures images visible to the naked eye.

Note: For more on surveillance by government agencies and corporations, see the deeply revealing reports from reliable major media sources available here.


Snowden Docs Show UK Spies Attacked Anonymous, Hackers
2014-02-04, NBC News
https://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attac...

A secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documents taken from the National Security Agency by Edward Snowden and obtained by NBC News. The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous. A division of Government Communications Headquarters (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack. The documents ... show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder - and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms. Among the methods listed in the document were jamming phones, computers and email accounts and masquerading as an enemy in a "false flag" operation. A British hacktivist known as T-Flow, who was prosecuted for hacking, [said] no evidence of how his identity was discovered ever appeared in court documents.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


Snowden docs reveal British spies snooped on YouTube and Facebook
2014-01-27, NBC News
http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reve...

The British government can tap into the cables carrying the world’s web traffic at will and spy on what people are doing on some of the world’s most popular social media sites ... without the knowledge or consent of the companies. Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated a pilot program to their U.S. partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter. Called “Psychology A New Kind of SIGDEV" (Signals Development), the presentation includes a section that spells out “Broad real-time monitoring of online activity” of YouTube videos, URLs “liked” on Facebook, and Blogspot/Blogger visits. The monitoring program is called “Squeaky Dolphin.” Experts told NBC News the documents show the British had to have been either physically able to tap the cables carrying the world’s web traffic or able to use a third party to gain physical access to the massive stream of data. Representatives of Facebook and Google, which owns YouTube, said they ... were unaware the collection had occurred. The NSA does analysis of social media similar to that in the GCHQ demonstration. In 2010 ... GCHQ exploited unencrypted data from Twitter to identify specific users around the world and target them with propaganda.

Note: Read an article diving deeper and showing how online reputations are ruthlessly destroyed by powerful groups. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.


Snowden: NSA conducts industrial espionage too
2014-01-26, CBS News/Reuters
http://www.cbsnews.com/news/snowden-nsa-conducts-industrial-espionage-too/

The U.S. National Security Agency is involved in industrial espionage and will grab any intelligence it can get its hands on regardless of its value to national security, former NSA contractor Edward Snowden told a German TV network. ARD TV quoted Snowden saying the NSA does not limit its espionage to issues of national security and he cited German engineering firm, Siemens as one target. "If there's information at Siemens that's beneficial to U.S. national interests - even if it doesn't have anything to do with national security - then they'll take that information nevertheless," Snowden said. Snowden's claim the NSA is engaged in industrial espionage follows a New York Times report earlier this month that the NSA put software in almost 100,000 computers around the world, allowing it to carry out surveillance on those devices and could provide a digital highway for cyberattacks. The NSA planted most of the software after gaining access to computer networks, but has also used a secret technology that allows it entry even to computers not connected to the Internet, the newspaper said, citing U.S. officials, computer experts and documents leaked by Snowden. Frequent targets of the programme, code-named Quantum, included units of the Chinese military and industrial targets.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Watchdog Report Says N.S.A. Program Is Illegal and Should End
2014-01-23, New York Times
http://www.nytimes.com/2014/01/23/us/politics/watchdog-report-says-nsa-progra...

An independent federal privacy watchdog has concluded that the National Security Agency’s program to collect bulk phone call records has provided only “minimal” benefits in counterterrorism efforts, is illegal and should be shut down. The findings are laid out in a 238-page report [that represents] the first major public statement by the Privacy and Civil Liberties Oversight Board, which Congress made an independent agency in 2007 and only recently became fully operational. The Obama administration has portrayed the bulk collection program as useful and lawful. But in its report, the board lays out what may be the most detailed critique of the government’s once-secret legal theory behind the program: that a law known as Section 215 of the Patriot Act, which allows the F.B.I. to obtain business records deemed “relevant” to an investigation, can be legitimately interpreted as authorizing the N.S.A. to collect all calling records in the country. The program “lacks a viable legal foundation under Section 215, implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value,” the report said. “As a result, the board recommends that the government end the program.” The report also sheds light on the history of the once-secret bulk collection program. It contains the first official acknowledgment that the Foreign Intelligence Surveillance Court produced no judicial opinion detailing its legal rationale for the program until last August, even though it had been issuing orders to phone companies for the records and to the N.S.A. for how it could handle them since May 2006.

Note: The PCLOB report is titled "Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court," and is available here. For more on government attacks to privacy, see the deeply revealing reports from reliable major media sources available here.


The hidden history of the CIA’s prison in Poland
2014-01-23, Washington Post
http://www.washingtonpost.com/world/national-security/the-hidden-history-of-t...

In early 2003, two senior CIA officers arrived at the U.S. Embassy in Warsaw to pick up a pair of large cardboard boxes. Inside were bundles of cash totaling $15 million that had been flown from Germany via diplomatic pouch. The Americans and Poles then sealed an agreement that over the previous weeks had allowed the CIA the use of a secret prison — a remote villa in the Polish lake district — to interrogate al-Qaeda suspects. The Polish intelligence service received the money, and the CIA had a solid location for its newest covert operation, according to former agency officials who spoke on the condition of anonymity to discuss the interrogation program, including previously unreported details about the creation of the CIA’s “black sites,” or secret prisons. The CIA prison in Poland was arguably the most important of all the black sites created by the agency after the Sept. 11, 2001, attacks. It was the first of a trio in Europe that housed the initial wave of accused Sept. 11 conspirators, and it was where Khalid Sheik Mohammed, the self-declared mastermind of the attacks, was waterboarded 183 times after his capture. In December, the European Court of Human Rights heard arguments that Poland violated international law and participated in torture by accommodating its American ally. “In the face of Polish and United States efforts to draw a veil over these abuses, the European Court of Human Rights now has an opportunity to break this conspiracy of silence and uphold the rule of law,” said Amrit Singh, a lawyer with the Open Society Justice Initiative.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


NSA collects millions of text messages daily in 'untargeted' global sweep
2014-01-16, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messa...

The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. On average, each day the NSA was able to extract: • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images. • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Keep the focus on facts about NSA spying
2014-01-16, San Francisco Chronicle (SF's leading newspaper)
http://www.sfgate.com/opinion/article/Keep-the-focus-on-facts-about-NSA-spyin...

To have a genuinely constructive debate, data must be compiled, evidence must be amassed and verifiable truths must be presented. This truism is particularly significant when it comes to debates about security and liberty. Without facts, we get the counterproductive discourse we are being treated to right now - the one hijacked by National Security Administration defenders throwing temper tantrums, tossing out fear-mongering platitudes and trying to prevent any scrutiny of the agency. Tune into a national news program and you inevitably will hear pundits who have spent the last decade mindlessly cheering on wars and warrantless wiretapping now echoing the talking points emanating from surveillance-state apparatchiks like Reps. Mike Rogers, R-Mich., and Dutch Ruppersberger, D-Md. This week, these two lawmakers, who head the House Intelligence Committee, summarized all the bluster in a press release that should be enshrined for posterity. In an attempt to defend the NSA, the bipartisan duo breathlessly claimed that whistle-blower Edward Snowden ended up "endangering each and every American" by exposing the government's mass surveillance (i.e., metadata) programs. They indicted Snowden's patriotism and said his disclosures of the NSA's unlawful and unconstitutional programs "aligned him with our enemy." But the facts now leaking out of the government's national security apparatus are doing the opposite. They are debunking - rather than confirming - the NSA defenders' platitudes.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


N.S.A. Devises Radio Pathway Into Computers
2014-01-15, New York Times
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-conn...

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Burglars Who Took On F.B.I. Abandon Shadows
2014-01-07, New York Times
http://www.nytimes.com/2014/01/07/us/burglars-who-took-on-fbi-abandon-shadows...

On a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludgeoned each other over 15 rounds in a televised title bout viewed by millions around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with nearly every document inside. They were never caught, and the stolen documents that they mailed anonymously to newspaper reporters ... would become a flood of revelations about extensive spying and dirty-tricks operations by the F.B.I. against dissident groups. Perhaps the most damning document from the cache [was] a 1970 memorandum that ... urged agents to step up their interviews of antiwar activists and members of dissident student groups. “It will enhance the paranoia endemic in these circles and will further serve to get the point across there is an F.B.I. agent behind every mailbox.” Another document, signed by Hoover himself, revealed widespread F.B.I. surveillance of black student groups on college campuses. But the document that would have the biggest impact on reining in the F.B.I.’s domestic spying activities [included] a mysterious word: Cointelpro ... shorthand for Counterintelligence Program. Since 1956, the F.B.I. had carried out an expansive campaign to spy on civil rights leaders, political organizers and suspected Communists, and had tried to sow distrust among protest groups. Among the grim litany of revelations was a blackmail letter F.B.I. agents had sent anonymously to the Rev. Dr. Martin Luther King Jr., threatening to expose his extramarital affairs if he did not commit suicide. The intent of Cointelpro was to destroy lives and ruin reputations.

Note: To learn about the brave citizen burglars who have now revealed themselves and watch the engaging video covering this story, click on the link given above. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


The WikiLeaks Mole
2014-01-06, Rolling Stone
http://www.rollingstone.com/politics/news/the-wikileaks-mole-20140106

Sigurdur "Siggi" Thordarson, [is a] cherubic, blond 21-year-old who has been called everything in the [Icelandic] press from "attention seeker" to "traitor" to "psychopath". Four years ago, just as WikiLeaks was winning international notoriety, the then-17-year-old hacking prodigy became Assange's youngest and most trusted sidekick. But as Assange became more embattled and besieged, the protégé turned on his mentor in the most shocking of ways: becoming the first FBI informant inside the group. His tale reveals not only the paranoia and strife within WikiLeaks, but just how far the feds were willing to go to get Assange. The revelation of Siggi's role as an FBI snitch has polarized WikiLeaks insiders. WikiLeaks spokesman Kristinn Hrafnsson [dismissed] Siggi as "a pathological liar." While other WikiLeaks insiders also question Siggi's credibility, they insist that his story can't be discounted, and there's more to it than the organization is letting on. The truth, it seems, may be held in the leaks. Siggi has provided Rolling Stone with more than a terabyte of secret files he claims to have taken from WikiLeaks before he left in November 2011 and gave to the FBI: thousands of pages of chat logs, videos, tapped phone calls, government documents and more than a few bombshells from the organization's most heated years. Whatever their origins, the SiggiLeaks are a deep and revealing portal into one of the most guarded and influential organizations of the 21st century – and the extreme measures its embattled leader is willing to take.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


I worked on the US drone program. The public should know what really goes on
2013-12-29, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/dec/29/drones-us-military

Whenever I read comments by politicians defending the Unmanned Aerial Vehicle Predator and Reaper program – aka drones – I wish I could ask them a few questions. I'd start with: "How many women and children have you seen incinerated by a Hellfire missile?" Few of these politicians who so brazenly proclaim the benefits of drones have a real clue of what actually goes on. I, on the other hand, have seen these awful sights first hand. What the public needs to understand is that the video provided by a drone is not usually clear enough to detect someone carrying a weapon, even on a crystal-clear day. This makes it incredibly difficult for the best analysts to identify if someone has weapons for sure. One example comes to mind: "The feed is so pixelated, what if it's a shovel, and not a weapon?" I felt this confusion constantly, as did my fellow UAV analysts. We always wonder if ... we destroyed an innocent civilian's life all because of a bad image or angle. I know the feeling you experience when you see someone die. Horrifying barely covers it. When you are exposed to it over and over again it becomes like a small video, embedded in your head, forever on repeat, causing psychological pain and suffering. UAV troops are victim to not only the haunting memories of this work that they carry with them, but also the guilt of always being a little unsure of how accurate their confirmations of weapons or identification of hostile individuals were. The UAVs in the Middle East are used as a weapon, not as protection, and as long as our public remains ignorant to this, this serious threat to the sanctity of human life – at home and abroad – will continue.

Note: For more on war crimes committed by the US and UK in the illegal "global war on terror", see the deeply revealing reports from reliable major media sources available here.


Agent: FBI key in border agent Terry slaying
2013-12-26, Arizona Republic (AZ's leading newspaper)
http://www.azcentral.com/news/articles/20131226fast-furious-agent-terry-killi...

A federal agent who exposed the Justice Departments flawed gun-trafficking investigation known as Operation Fast and Furious says the FBI played a key role in events leading to the 2010 murder near Nogales, Ariz., of U.S. Border Patrol Agent Brian Terry. John Dodson, a special agent with the Bureau of Alcohol, Tobacco, Firearms and Explosives, contends that the bandits who killed Terry were working for FBI operatives and were sent to the border to do a drug rip-off using intelligence from the federal Drug Enforcement Administration. I dont think the (FBI) assets were part of the rip-off crew, Dodson said. I think they were directing the rip crew. Dodsons comments to The Arizona Republic amplify assertions he made in his recently released book, The Unarmed Truth, about his role as a whistle-blower in the Fast and Furious debacle. In his book, Dodson uses cautious language to characterize his account of circumstances surrounding Terrys death, saying the information is based on firsthand knowledge, personal opinion and press reports. He asserts that the DEA had information about, and may have orchestrated, a large drug shipment through Peck Canyon that December night. He alleges that DEA agents shared that intelligence with FBI counterparts, who advised criminal informants from another cartel that the load would be theirs for the taking. Stealing such a shipment would increase the clout of the FBI informants in the cartel organization they had penetrated, Dodson wrote, and thus lead to better intel for them in the future.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Edward Snowden, after months of NSA revelations, says his mission’s accomplished
2013-12-23, Washington Post
http://www.washingtonpost.com/world/national-security/edward-snowden-after-mo...

Taken together, the [Edward Snowden] revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations. Six months after the first revelations ... Snowden agreed to reflect at length on the roots and repercussions of his choice. He was relaxed and animated over two days of nearly unbroken conversation. Snowden offered vignettes from his intelligence career and from his recent life as “an indoor cat” in Russia. But he consistently steered the conversation back to surveillance, democracy and the meaning of the documents he exposed. “For me, in terms of personal satisfaction, the mission’s already accomplished,” he said. “I already won. As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn’t want to change society. I wanted to give society a chance to determine if it should change itself. All I wanted was for the public to be able to have a say in how they are governed,” he said. Snowden ... had come to believe that a dangerous machine of mass surveillance was growing unchecked. Closed-door oversight by Congress and the Foreign Intelligence Surveillance Court was a “graveyard of judgment,” he said, manipulated by the agency it was supposed to keep in check. The NSA’s business is “information dominance,” the use of other people’s secrets to shape events. At 29, Snowden upended the agency on its own turf.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Stealth Surprises in NSA Report Take on Non-NSA Spying
2013-12-20, ABC News
http://abcnews.go.com/Blotter/stealth-surprises-nsa-report-nsa-spying/story?i...

The White House's expert NSA panel may have made headlines ... for telling President Barack Obama to knock off the collection of Americans' meta-data, but surveillance experts said they were surprised that the panel also took to task some controversial non-NSA-related spy tactics as well. One recommendation was to impose much stricter oversight on the FBI's ability to issue National Security Letters (NSLs), which have been used to obtain telephone call records and credit reports in terrorism and espionage cases. Another even more peculiar recommendation by the five national security experts ... was their advice that "governments" shouldn't hack into bank accounts and drain funds. "Governments should not use their offensive cyber capabilities to change the amounts held in financial accounts or otherwise manipulate the financial systems," the unanimous Review Group on Intelligence and Communications Technologies report warned Obama. "That was a strangely specific recommendation for something nobody was talking about," Kel McClanahan, executive director of government transparency group National Security Counselors, told ABC News. Michelle Richardson, the American Civil Liberties Union's legislative council in Washington, also said the findings on "NSLs" and government hacking were unexpected -- but welcomed.

Note: The fact that this expert panel would even mention governments manipulating financial accounts suggests that if it hasn't already happened, some were seriously considering this. For lots more on this strange news, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


GCHQ and NSA targeted charities, Germans, Israeli PM and EU chief
2013-12-20, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-ger...

British and American intelligence agencies had a comprehensive list of surveillance targets that included the EU's competition commissioner, German government buildings in Berlin and overseas, and the heads of institutions that provide humanitarian and financial help to Africa, top-secret documents reveal. The papers show GCHQ [and the NSA were] targeting organisations such as the United Nations development programme, the UN's children's charity Unicef and Médecins du Monde, a French organisation that provides doctors and medical volunteers to conflict zones. The head of the Economic Community of West African States (Ecowas) also appears in the documents, along with text messages he sent to colleagues. One GCHQ document, drafted in January 2009, makes clear that the agencies were targeting an email address listed as belonging to another important American ally – the "Israeli prime minister". Ehud Olmert was in office at the time. Three further Israeli targets appeared on GCHQ documents, including another email address understood to have been used to send messages between the then Israeli defence minister, Ehud Barak, and his chief of staff, Yoni Koren. The names and details are the latest revelations to come from documents leaked by the whistleblower Edward Snowden. They provoked a furious reaction. The disclosures reflect the breadth of targets sought by the agencies, which goes far beyond the desire to intercept the communications of potential terrorists and criminals, or diplomats and officials from hostile countries.

Note: Later reports revealed that GHCQ also targeted the global human rights organization Amnesty International. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Secret contract tied NSA and security industry pioneer
2013-12-20, CNBC/Reuters
http://www.cnbc.com/id/101290438

As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products. Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year. The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Senate Asks C.I.A. to Share Its Report on Interrogations
2013-12-18, New York Times
http://www.nytimes.com/2013/12/18/us/politics/senators-ask-to-see-internal-ci...

The Senate Intelligence Committee has asked the C.I.A. for an internal study done by the agency that lawmakers believe is broadly critical of the C.I.A.’s detention and interrogation program but was withheld from congressional oversight committees. The committee’s request comes in the midst of a yearlong battle with the C.I.A. over the release of the panel’s own exhaustive report about the program, one of the most controversial policies of the post-Sept. 11 era. The Senate report, totaling more than 6,000 pages, was completed last December but has yet to be declassified. According to people who have read the study, it is unsparing in its criticism of the now-defunct interrogation program and presents a chronicle of C.I.A. officials’ repeatedly misleading the White House, Congress and the public about the value of brutal methods that, in the end, produced little valuable intelligence. Senator Mark Udall, Democrat of Colorado, disclosed the existence of the internal C.I.A. report during an Intelligence Committee hearing on Tuesday. He said he believed it was begun several years ago and “is consistent with the Intelligence’s Committee’s report” although it “conflicts with the official C.I.A. response to the committee’s report.” “If this is true,” Mr. Udall said ... “this raises fundamental questions about why a review the C.I.A. conducted internally years ago — and never provided to the committee — is so different from the C.I.A.’s formal response to the committee study.”

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"