Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Brice Taylor used to be your typical soccer mom, with a successful husband, three kids, and a beautiful home. That is, until she started telling of [her] secret double life as a mind-controlled sex slave for the CIA. Now, this onetime suburban housewife finds herself the unlikely leading lady in a real-life psychosexual spy thriller costarring a former Los Angeles FBI chief. [Former FBI chief Ted Gunderson]: "Brice Taylor is absolutely telling the truth. I would stake my name and reputation of 50 years on it." Taylor says [she was lent] out to such luminaries as Henry Kissinger and every president after Eisenhower except for Carter and the elder Bush, whom Taylor calls a pedophile, accusing him of sleeping with her young daughter. Brice says it turned her into a mindless "Stepford" wife, a programmed sex toy who could be triggered into action by the CIA with subliminal messages embedded in her brain. Taylor: "I was a human robot, who had no ability to think or question on my own. I could only follow commands." We contacted three Los Angeles psychotherapists who treated Brice, but all of them refused to discuss her case, even with her permission. Pam Monday believes that's because they've already been threatened by the CIA. Brice Taylor wrote about her alleged life as a CIA sex slave in vivid detail in a new book out called Thanks for the Memories: The Truth Has Set Me Free!.
Note: For more on mind control operations carried out by government agencies, see the deeply revealing reports from reliable major media sources available here. For our Mind Control Information Center filled with verifiable information on secret government mind control programs, click here.
Standing on the shores of the East End, you can see across the water to some of Long Island's greatest treasures, tantalizingly close yet forbiddingly inaccessible. They are off limits to the public. A mystique ... envelops the islands, and it is well earned. These islands -- Gardiners, Great Gull, Little Gull, Plum and Robins -- have been the setting of some of Long Island's most exciting historical chapters. Captain Kidd buried pirate treasure there. One Island woman was tried for witchcraft decades before Salem's trials. Another was so beautiful that she dazzled Washington society [and] married the President. And during the cold war, one island was used for secret research for a germ warfare attack on the Soviet Union. Plum Island ... is strictly controlled and it has the tightest security of all the islands. Unlike the secret germ warfare project in the 1950's, the first Federal project on Plum Island was quite open and ordinary. In 1826, the Government belatedly bought 3 of its 800 acres for a lighthouse. About the time of the Spanish-American War, the Government bought the rest of Plum and built Fort Terry as the headquarters for artillery batteries at Montauk. Federal officials ... converted the site to the Animal Disease Center in 1954. Since 1929, the country's only outbreak of the dreaded foot-and-mouth disease was in 1978, when it spread to animals outside the laboratory buildings. For decades, officials denied rumors of biological warfare experiments. But in 1993, Newsday unearthed previously classified documents on plans to disrupt the Soviet economy by spreading diseases to kill its pigs, cattle and horses.
Note: At the northernmost tip of Long Island, Plum island sits directly across from the town of Lyme, Conn., famous as the epicenter of the Lyme disease outbreak. This is one of many pieces of evidence suggesting that Lyme disease escaped from government labs there, as described in the book Lab 257: The Disturbing Story of the Government's Secret Germ Laboratory.
The F.B.I. agreed today to pay a settlement of more than $1.16 million to the agent who brought about an overhaul of its crime laboratory. The agent, Frederic Whitehurst, who is a chemist, returned to work from a yearlong suspension today and then voluntarily resigned as required by the deal to settle part of his lawsuit against the bureau. In the 16-page settlement, a copy of which was obtained by The Associated Press, the Federal Bureau of Investigation agreed to pay $1.166 million now to buy annuities that would pay the 50-year-old agent annual amounts equal to the salary and pension he would have earned had he kept working until the normal F.B.I. retirement age of 57. Under terms of the settlement, the bureau will also pay $258,580 in legal fees to Dr. Whitehurst's lawyers, and the Justice Department will drop all consideration of disciplinary action against him. For 10 years as the laboratory supervisor and once the bureau's top bomb residue expert, Dr. Whitehurst complained mostly in vain about laboratory practices. But his efforts finally led last April to a scathing 500-page study of the laboratory by the Justice Department's inspector general, Michael Bromwich. Mr. Bromwich sharply criticized the laboratory for flawed scientific work and inaccurate, pro-prosecution testimony in major cases, including the Oklahoma City and World Trade Center bombings. Mr. Bromwich recommended major changes and discipline for five agents.
Note: Yahoo! News posted a great article with advice to whistleblowers at this link.
Despite the essential role whistleblowers play in illuminating the truth and protecting the public interest, several myths persist about them. The overwhelming majority of employees who see problems want to blow the whistle internally first. Understanding this can - and should - encourage employers to respond appropriately when workers report problems. Similarly, employees who understand that they are in fact whistleblowers when they raise concerns inside the workplace will be better prepared to navigate their rights, risks and options. While many employees who witness wrongdoing in the workplace stay silent, fearing reprisal or futility, those who do raise concerns ... demonstrate faith that their employers are committed to compliance and that they can make a difference. Whistleblowers who report externally typically do so because the problem is significant and their employers have failed to address it or engaged in reprisal (or both). Snowden’s revelations about the NSA’s unconstitutional mass collection of telephone metadata, and Reality Winner’s disclosures about Russian efforts to hack state elections as the Trump campaign was denying Russian involvement, clearly meet this standard of significance. While reporters may use the term “leak” to describe information received from anonymous insiders, the failure to distinguish between leaking and anonymous whistleblowing risks undermining the legitimacy and importance of disclosures that clearly advance the public’s interest.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Heavily armed men burst into the home in the middle of night, hustling four brothers into separate rooms. Afghan special forces then shot them in the head and heart. The operation, the CIA-trained Afghan unit said, targeted the Islamic State group's militants in a remote region of eastern Nangarhar Province. In reality, the raid took place in the province's capital of Jalalabad. The truth of their deaths was eventually revealed by local and international media and the country's intelligence chief, Masoom Stanikzai, was forced to resign. But that's not enough, says Human Rights Watch in a new report released Thursday documenting what it says are mounting atrocities by U.S.-backed Afghan special forces and rising civilian deaths by both American and Afghan forces. It calls for an investigation into whether the U.S. has committed war crimes in Afghanistan. The report says U.S.-led peace talks to end the 18-year-old war have omitted addressing the future of the Afghan special forces that work "as part of the covert operations of the Central Intelligence Agency." The report suggests either disbanding them or bringing them under the control of the Defense Ministry. "These troops include Afghan strike forces who have been responsible for extrajudicial executions and enforced disappearances, indiscriminate airstrikes, attacks on medical facilities, and other violations of international humanitarian law, or the laws of war," it says.
Note: For more along these lines, see concise summaries of deeply revealing news articles on war and intelligence agency corruption from reliable major media sources.
Newly released documents show that another government agency, as well as the Australian Federal Police, was involved in the investigation that led to the raid on the ABC in June. The documents, obtained under Freedom of Information, reveal that the AFP refused to release certain documents relating to the June 6 raid because it said they related to an agency of the Federal Government which is exempt from FOI. Under the section cited by the AFP to justify not releasing the material - subsection 7(1) of the FOI Act - agencies which have complete exemption include the Australian Security Intelligence Organisation (ASIO), the Australian Signals Directorate (ASD) and the Australian Secret Intelligence Service (ASIS). The raid on the ABC's Ultimo headquarters was related to the Afghan Files, a series of stories, published in 2017, which detailed incidents where Australian soldiers in Afghanistan killed unarmed men and children. [South Australian senator Rex] Patrick said ... he believed that the other agency was either ASIO or the Australian Signals Directorate. The primary role of the Australian Signals Directorate is to eavesdrop on conversations and monitor the communications of people of interest outside Australia. The story which prompted one of the raids - on News Corp journalist Annika Smethurst - was about the push by some within the Federal Government to give ASD power to monitor the communications of Australians in Australia, which is currently prohibited by law.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable major media sources.
In a combative exchange at a hearing Friday in Washington, D.C., a federal judge unabashedly accused career State Department officials of lying and signing "clearly false" affidavits to derail a series of lawsuits seeking information about former Secretary of State Hillary Clinton's private email server and her handling of the 2012 terrorist attack on the U.S. Consulate in Benghazi, Libya. U.S. District Court Judge Royce Lamberth also said he was "shocked" and "dumbfounded" when he learned that FBI had granted immunity to former Clinton chief of staff Cheryl Mills during its investigation into the use of Clinton's server, according to a court transcript. The Department of Justice's Inspector General (IG), Michael Horowitz, noted ... in June that it was "inconsistent with typical investigative strategy" for the FBI to allow Mills to sit in during the agency's interview of Clinton during the email probe, given that classified information traveled through Mills' personal email account. "[T]here are serious potential ramifications when one witness attends another witness' interview," the IG wrote. The transparency group Judicial Watch initially sued the State Department in 2014, seeking information about the response to the Benghazi attack after the government didn't respond to a Freedom of Information Act (FOIA) request. Parallel lawsuits ... are probing issues like Clinton's server, whose existence was revealed during the course of the litigation.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
A major U.S. telecommunications company discovered manipulated hardware from Super Micro Computer Inc. in its network and removed it in August, fresh evidence of tampering in China of critical technology components bound for the U.S., according to a security expert working for the telecom company. The security expert, Yossi Appleboum, provided ... evidence of the discovery following the publication of an investigative report in Bloomberg Businessweek that detailed how China’s intelligence services had ordered subcontractors to plant malicious chips in Supermicro server motherboards over a two-year period ending in 2015. [Appleboum’s company] was hired to scan several large data centers belonging to the telecommunications company. Unusual communications from a Supermicro server and a subsequent physical inspection revealed an implant built into the server’s Ethernet connector. The executive said he has seen similar manipulations of different vendors' computer hardware made by contractors in China, not just products from Supermicro. “Supermicro is a victim - so is everyone else,” he said. There are countless points in the supply chain in China where manipulations can be introduced, and deducing them can in many cases be impossible. The manipulation of the Ethernet connector appeared to be similar to a method also used by the U.S. National Security Agency, details of which were leaked in 2013.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Thousands of new documents from Project MKUltra, the Central Intelligence Agency’s mid-century mind control program, will soon be released. The new records include 4,358 undisclosed pages regarding MKUltra’s “behavior modification” efforts. John Greenewald, founder of The Black Vault, a site specializing in declassified government records obtained via Freedom of Information Act (FOIA) requests, first uploaded MKUltra documents in 2004 - tens of thousands of pages, spread over four CD-ROMs. Still, the trove of MKUltra material available on The Black Vault represent only a small fraction of the material from the sprawling, multi-decade program, with the majority lost to history after CIA Director Richard Helms ordered all MKUltra files destroyed in 1973. This makes the new documents crucial to expanding our narrow perspective on the CIA’s actions from the operation’s beginnings in 1953 through the cover-up twenty years later. Project MKUltra was an illegal program of human experimentation undertaken by the CIA to discover methods, both pharmacological and psychological, for controlling the human mind. More than 80 colleges, prisons, pharma companies and hospitals collaborated in the program, including renowned psychiatrist Donald Ewen Cameron, who served president of the American Psychiatric Association and the World Psychiatric Association. The existence of the previously unknown MKUltra pages was discovered in 2016, when a Black Vault user, Oscar Diggs, discovered irregularities in the collection the CIA disclosed to Greenewald.
Note: Read details of the CIA's bizarre efforts to keep these missing documents away from the public on this page. While Black Vault makes the MKUltra archive available for bulk download, you can view individual MKUltra files from this archive on this WantToKnow.info page. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
Four decades ago, [CIA operative Stefan] Halper was responsible for a long-forgotten spying scandal involving the 1980 election. The Reagan campaign – using CIA officials managed by Halper, reportedly under the direction of former CIA Director and then-Vice-Presidential candidate George H.W. Bush – got caught running a spying operation from inside the Carter administration. The plot involved CIA operatives passing classified information about Carter’s foreign policy to Reagan campaign officials. Over the past several weeks, House Republicans have been claiming that the FBI during the 2016 election used an operative to spy on the Trump campaign, and they triggered outrage within the FBI by trying to learn his identity. On May 8, the Washington Post described the informant as “a top-secret intelligence source” and cited DOJ officials as arguing that disclosure of his name “could risk lives by potentially exposing the source, a U.S. citizen who has provided intelligence to the CIA and FBI.” But now ... everyone knows the name of the FBI’s informant: Stefan Halper. So as it turns out, the informant used by the FBI in 2016 to gather information on the Trump campaign was not some previously unknown, top-secret asset whose exposure as an operative could jeopardize lives. Quite the contrary: his decades of work for the CIA – including his role in an obviously unethical if not criminal spying operation during the 1980 presidential campaign – is quite publicly known.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in elections and in the intelligence community.
Alison Steel was only 4˝ years old when her mother's life changed forever. In 1957, Jean Steel was admitted to Montreal's Allan Memorial Institute. In the months that followed, Steel became the victim of CIA-funded brainwashing experiments conducted by Dr. Ewen Cameron. She was kept in a chemically induced sleep for weeks and subjected to rounds of electroshocks, experimental drugs and tape-recorded messages played non-stop. Steel said her mother was never quite the same. Now, 60 years after Cameron's experiments left her mother damaged for life, Alison Steel has finally won a measure of justice for her family. The federal government quietly reached an out-of-court settlement with Steel earlier this year, paying her $100,000 in exchange for dropping the legal action she launched in September 2015. The settlement with Steel is the latest development in the decades-old saga that began with Cameron's experiments at the Allan Memorial Institute in the '50s and '60s. What patients and their families didn't know was that Cameron's experiments were ... being funded by the U.S. Central Intelligence Agency's MK Ultra program. The CIA ... funded mind-control experiments across North America. In 1992, Conservative Justice Minister Kim Campbell decided to compensate dozens of Cameron's former patients. An estimated 70 patients were compensated, but hundreds more who applied were rejected because the government said they hadn't been "de-patterned" enough to warrant compensation.
Note: Read more about the CIA's MK Ultra program. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
Americas love affair with LSD did not begin in Haight-Ashbury or during the summer of love. Instead it was seeded ... in Midwestern laboratories and government offices, where it comprised one strand of an extensive germ warfare programme. Errol Morriss splendidly clammy, mysterious docu-drama Wormwood reopens the file on Frank Olson, a jobbing biochemist who fell to his death from a New York hotel. At the time (December 1953) Olsons death was ruled to be suicide. But 20 years later evidence emerged that complicated the official verdict and prompted Olsons family to sue the federal government. Even today elderly Eric Olson is in search of a definitive answer. He casts himself in the role of a Cold War Hamlet, haunted and harried by his fathers ghost. So what became of luckless Frank Olson? Did he fall or was he pushed? Infuriatingly perhaps fittingly we will have to wait to find out. For Morriss docu-drama is a six-part series, commissioned by Netflix. So were left to blunder on, hands outstretched, past pensive Eric Olson and ... through spooky archive footage of a 1970s congressional hearing where sleazy Colonel Ruwet surely the villain of the piece sits with his back to the camera, meaning that we can only see his starched collar and his bald spot and the hint of a smile when he responds to a question. Who, then, can predict how this investigation turns out?
Note: A 1975 US government report said that Frank Olson committed suicide after being given LSD without his knowledge as part of the CIA's MK-ULTRA program. The lawsuit filed by his sons claimed Olson was killed by the CIA after he "raised concerns about testing chemical and biological weapons on human subjects without their consent". For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Early last month, the C.I.A. director, Mike Pompeo, recommended to President Trump that he shut down a four-year-old effort to arm and train Syrian rebels. The president swiftly ended the program. The rebel army was by then a shell, hollowed out by more than a year of bombing by Russian planes. Critics in Congress had complained for years about the costs - more than $1 billion over the life of the program - and reports that some of the C.I.A.-supplied weapons had ended up in the hands of a rebel group tied to Al Qaeda further sapped political support for the program. President Barack Obama ... agreed to the program in 2013. It soon fell victim to the constantly shifting alliances in Syria’s six-year-old civil war. Once C.I.A.-trained fighters crossed into Syria, C.I.A. officers had difficulty controlling them. The fact that some of their C.I.A. weapons ended up with Nusra Front fighters - and that some of the rebels joined the group - confirmed the fears of many in the Obama administration when the program began. Although the Nusra Front was widely seen as an effective fighting force against [President Bashar al-Assad]’s troops, its Qaeda affiliation made it impossible for the Obama administration to provide direct support for the group. American intelligence officials estimate that the Nusra Front now has as many as 20,000 fighters in Syria, making it Al Qaeda’s largest affiliate. Officials also received ... reports that the C.I.A.-trained rebels had summarily executed prisoners and committed other violations of the rules of armed conflict.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Twice in the past month, National Security Agency cyberweapons stolen from its arsenal have been turned against two very different partners of the United States — Britain and Ukraine. The N.S.A. has [not acknowledged] its role in developing the weapons. White House officials have deflected many questions ... by arguing that the focus should be on the attackers themselves, not the manufacturer of their weapons. The silence is wearing thin for victims of the assaults, as a series of escalating attacks using N.S.A. cyberweapons have hit hospitals, a nuclear site and American businesses. There is growing concern that United States intelligence agencies have rushed to create digital weapons that they cannot keep safe from adversaries or disable once they fall into the wrong hands. On Wednesday, the calls for the agency to address its role in the latest attacks grew louder. Representative Ted Lieu ... who serves on the House Judiciary and Foreign Affairs Committees, urged the N.S.A. to help stop the attacks and to stop hoarding knowledge of the computer vulnerabilities upon which these weapons rely. Brad Smith, the president of Microsoft, said outright that the National Security Agency was the source of the “vulnerabilities” now wreaking havoc. For the American spy agency ... what is unfolding across the world amounts to a digital nightmare. It was as if the Air Force lost some of its most sophisticated missiles and discovered an adversary was launching them against American allies — yet refused to respond, or even to acknowledge that the missiles were built for American use.
Note: It was reported in 2014 that the NSA had developed specialized tools to covertly hack into computers on a mass scale by using automated systems. More recently, a large number of NSA hacking tools were put up for sale online. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
When Bill Binney, former NSA analyst and head of the anti-terror ThinThread metadata program sits in front of you and says he is not afraid of the government, you have to admire him. A wheel-chair-bound U.S. serviceman who rose in the ranks of intelligence to work in top-secret NSA programs, Binney created ThinThread prior to September 11, 2001, and says it mathematically broke down all phone communications anywhere in the world without any infringement on Constitutional rights. The program was self-running. More important, it worked. In "A Good American," the new documentary from executive producer Oliver Stone ... audiences are taken on a tense and frightening ride through Binney and his colleagues' experience developing and deploying ThinThread in tests, only to see its funding pulled just weeks before 9/11 in favor of an expensive and ineffective ... program called Trailblazer. Binney contends that ThinThread would have identified the terrorists who planned and executed the 9/11 terror attacks, thereby preventing them from occurring. When ThinThread's plug was pulled, Binney and his team challenged their NSA bosses, and in the process found themselves at odds with the U.S. government and in a complex web of lies and corruption. Thus, when Binney said he remains unafraid of possible repercussions or retaliation tied to the film's thesis, it's not hard to believe. "What else can they do to me?" he asks. "They've already tried everything to stop me."
Note: Watch a free trailer or rent the whole documentary on this webpage. Read a revealing, detailed New York Times article on Oliver Stone and his profound work to expose corruption and manipulation through film. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
The C.I.A., the F.B.I. and the White House may all agree that Russia was behind the hacking that interfered with the election. But that was of no import to the website Breitbart News, which dismissed reports on the intelligence assessment as “left-wing fake news.” Until now, that term had been widely understood to refer to fabricated news accounts that are meant to spread virally online. But conservative cable and radio personalities ... have appropriated the term and turned it against any news they see as hostile to their agenda. In defining “fake news” so broadly and seeking to dilute its meaning, they are capitalizing on the declining credibility of all purveyors of information. Journalists who work to separate fact from fiction see a dangerous conflation of stories that turn out to be wrong because of a legitimate misunderstanding with those whose clear intention is to deceive. A report, shared more than a million times on social media, that the pope had endorsed Mr. Trump was undeniably false. But was it “fake news” to report on data models that showed Hillary Clinton with overwhelming odds of winning the presidency? Are opinion articles fake if they cherry-pick facts to draw disputable conclusions? “Fake news was a term specifically about people who purposely fabricated stories for clicks and revenue,” said David Mikkelson, the founder of Snopes, the myth-busting website. “Now it includes bad reporting, slanted journalism and outright propaganda. And I think we’re doing a disservice to lump all those things together.”
Note: For more along these lines, see concise summaries of deeply revealing media corruption news articles from reliable sources.
A former contractor for a UK-based public relations firm says that the Pentagon paid more than half a billion dollars for the production and dissemination of fake Al-Qaeda videos that portrayed the insurgent group in a negative light. The PR firm, Bell Pottinger, worked alongside top US military officials at Camp Victory in Baghdad at the height of the Iraq War. The agency was tasked with crafting TV segments in the style of unbiased Arabic news reports, videos of Al-Qaeda bombings that appeared to be filmed by insurgents, and anti-insurgent commercials. Those who watched the videos could be tracked by US forces. Bell Pottinger ... could have earned as much as $120m from the US in 2006. Former video editor Martin Wells, who worked on the IOTF contract with Bell Pottinger, said they were given very specific instructions on how to produce the fake Al-Qaeda propaganda films. US Marines would then take CDs containing the videos while on patrol, then plant them at sites during raids. “If they’re raiding a house and they’re going to make a mess of it looking for stuff anyway, they’d just drop an odd CD there,” he said. The CDs were encoded to open the videos on RealPlayer software that connects to the Internet when it runs. It would issue an IP address that could then be tracked by US intelligence. The programmes produced by Bell Pottinger would move up the chain of command ... and could sometimes go as high up as the White House for approval.
Note: Read more about the fake "Al Qaeda" videos produced and distributed for the Pentagon. For more along these lines, see concise summaries of deeply revealing news articles on military corruption and the manipulation of public perception.
Yahoo has been accused of secretly building a customised software programme to search all of its customers’ incoming emails for specific information provided by US intelligence officials. The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI. Reuters said that a number of surveillance experts said this represented the first case to surface of a US Internet company agreeing to a spy agency’s demand by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time. The agency also said it was unable to determine what data the company had handed over, and if the intelligence officials had approached other email providers besides Yahoo. US phone and Internet companies are known to have handed over bulk customer data to intelligence agencies. But some former government officials and private surveillance experts said they had not previously seen either such a broad directive for real-time Web collection or one that required the creation of a new computer program. “I’ve never seen that, a wiretap in real time on a ‘selector’,” said Albert Gidari, a lawyer who represented phone and Internet companies on surveillance. A selector refers to a type of search term used to zero in on specific information. He added: “It would be really difficult for a provider to do that.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about corporate corruption and the disappearance of privacy.
Secret FBI rules allow agents to obtain journalists’ phone records with approval from two internal officials - far less oversight than under normal judicial procedures. The classified rules ... govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a judge or informing the news organization being targeted. Obtaining a journalist’s records with a national security letter (or NSL) requires the signoff of the FBI’s general counsel and the executive assistant director of the bureau’s National Security Branch. The Obama administration has come under criticism for bringing a record number of leak prosecutions and aggressively targeting journalists in the process. In 2013, after it came out that the Justice Department had secretly seized records from phone lines at the Associated Press and surveilled ... reporter James Rosen, then-Attorney General Eric Holder tightened the rules. The FBI could not label reporters as co-conspirators in order to try to identify their sources - as had happened with Rosen - and it became more difficult to get journalists’ phone records without notifying the news organization first. Yet these changes did not apply to NSLs. Those are governed by a separate set of rules. The FBI issues thousands of NSLs each year, including nearly 13,000 in 2015. Over the years, a series of Inspector General reports found significant problems with their use, yet the FBI is currently pushing to expand the types of information it can demand with an NSL.
Note: The aggressive pursuit of leaks and journalists that report them led BBC to recently ask: "Is the US government at war with whistleblowers?" Read more about the FBI's use of secret National Security Letters. For more along these lines, see concise summaries of deeply revealing news articles on media manipulation and the disappearance of privacy.
Hidden microphones that are part of a clandestine government surveillance program that has been operating around the Bay Area has been exposed. Imagine standing at a bus stop, talking to your friend and having your conversation recorded without you knowing. It happens all the time, and the FBI doesn’t even need a warrant to do it. Jeff Harp, a ... security analyst and former FBI special agent said, “They put microphones under rocks, they put microphones in trees, they plant microphones in equipment. I mean, there’s microphones that are planted in places that people don’t think about, because that’s the intent!” FBI agents hid microphones inside light fixtures and at a bus stop outside the Oakland Courthouse without a warrant to record conversations, between March 2010 and January 2011. Federal authorities are trying to prove real estate investors in San Mateo and Alameda counties are guilty of bid rigging and fraud and used these recordings as evidence. The lawyer for one of the accused real estate investors who will ask the judge to throw out the recordings, told KPIX 5 News that, “Speaking in a public place does not mean that the individual has no reasonable expectation of privacy … private communication in a public place qualifies as a protected ‘oral communication.'”
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.