Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


NSA collects millions of text messages daily in 'untargeted' global sweep
2014-01-16, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/jan/16/nsa-collects-millions-text-messa...

The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. On average, each day the NSA was able to extract: • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images. • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


Agent: FBI key in border agent Terry slaying
2013-12-26, Arizona Republic (AZ's leading newspaper)
http://www.azcentral.com/news/articles/20131226fast-furious-agent-terry-killi...

A federal agent who exposed the Justice Departments flawed gun-trafficking investigation known as Operation Fast and Furious says the FBI played a key role in events leading to the 2010 murder near Nogales, Ariz., of U.S. Border Patrol Agent Brian Terry. John Dodson, a special agent with the Bureau of Alcohol, Tobacco, Firearms and Explosives, contends that the bandits who killed Terry were working for FBI operatives and were sent to the border to do a drug rip-off using intelligence from the federal Drug Enforcement Administration. I dont think the (FBI) assets were part of the rip-off crew, Dodson said. I think they were directing the rip crew. Dodsons comments to The Arizona Republic amplify assertions he made in his recently released book, The Unarmed Truth, about his role as a whistle-blower in the Fast and Furious debacle. In his book, Dodson uses cautious language to characterize his account of circumstances surrounding Terrys death, saying the information is based on firsthand knowledge, personal opinion and press reports. He asserts that the DEA had information about, and may have orchestrated, a large drug shipment through Peck Canyon that December night. He alleges that DEA agents shared that intelligence with FBI counterparts, who advised criminal informants from another cartel that the load would be theirs for the taking. Stealing such a shipment would increase the clout of the FBI informants in the cartel organization they had penetrated, Dodson wrote, and thus lead to better intel for them in the future.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Secret contract tied NSA and security industry pioneer
2013-12-20, CNBC/Reuters
http://www.cnbc.com/id/101290438

As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products. Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year. The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Alleged Boston Marathon bomber Tamerlan Tsarnaev believed in 'majestic mind control'
2013-12-16, The Independent (One of the UK's leading newspapers)
http://www.independent.co.uk/news/world/americas/alleged-boston-marathon-bomb...

Suspected Boston Marathon bomber Tamerlan Tsarnaev heard voices inside his head and had an alter-ego, a report published in The Boston Globe claimed yesterday. Donald Larking, 67, who attended the same Boston mosque as the suspected bomber, said Tsarnaev believed the voices were part of a “majestic mind control”, which was “a way of breaking down a person and creating an alternative personality with which they must coexist." Larking also told the Globe that Tsarnaev was “torn” between himself and an alter-ego. “You can give a signal, a phrase or a gesture, and bring out the alternate personality and make them do things,” he said; “Tamerlan thought someone might have done that to him.” According to the report, the voices “came to [Tsarnaev] at unexpected times, an internal rambling that he alone could hear. Alarmed, he confided to his mother that the voice 'felt like two people inside of me. “As he got older, the voice became more authoritative, its bidding more insistent. Tamerlan confided in a close friend that the voice had begun to issue orders and to require him to perform certain acts, though he never told his friend specifically what those acts were.” Tamerlan, 26, and his younger brother Dzhokhar, 20, are alleged to have planted the two pressure cooker bombs that killed three and injured more than 260 at the Boston Marathon in April. While Tamerlan was later killed in a shootout with police, his brother was captured and now potentially faces the death penalty under charges of terrorism.

Note: Many have long suspected that most mass murderers are mind control victims subject to top secret mind control programs, like those revealed in declassified government documents on this webpage. For the full investigative report in the Boston Globe, click here. For lots more verifiable information on these mind control programs, click here.


United States of Secrets: William Binney
2013-12-13, PBS
https://www.pbs.org/wgbh/pages/frontline/government-elections-politics/united...

A 36-year NSA veteran, William Binney resigned from the agency and became a whistleblower after discovering that elements of a data-monitoring program he had helped develop - nicknamed ThinThread - were being used to spy on Americans. So 2005, December, The New York Times article comes out. ... How important was it? "It touched on that real issues," [said Binney]. "The warrantless wiretapping was not really a major component of it, but it touched on the data mining, which is really, really the big issue, data mining of the metadata and content. That was really the big issue, because that's how you can monitor the entire population simultaneously, whereas the warrantless wiretaps were isolated cases. You could pick an isolated number of them and do them, whereas in the mining process, you would do the entire population." The administration [used] this article to start an aggressive whistleblowing hunt. "[On July 22, 2005] the FBI was in my house ... pointing a gun at me when I was coming out of the shower. The raid took about seven hours. At the time we didn't know that Tom Drake had gone to The Baltimore Sun," [said Binney]. "Material [Tom Drake was indicted for] was clearly marked unclassified, and all they did was draw a line through it and classified that material, and then they charged him with having classified material. It's like framing him. The judge in the court ... knew they were framing him," [said Biney].

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


New Yorker, Washington Post Passed On Seymour Hersh Syria Report
2013-12-08, Huffington Post
http://www.huffingtonpost.com/2013/12/08/seymour-hersh-syria-report_n_4409674...

Pulitzer Prize-winning journalist Seymour Hersh accused the Obama administration ... of having “cherry-picked intelligence” regarding the Aug. 21 chemical attack in Syria that served as evidence for an argument in favor of striking President Bashar Assad's government. Though President Barack Obama eventually decided not to strike Syria, the administration made a public case for war by saying that Assad’s regime was responsible for a poison gas attack in the outskirts of Damascus. The U.N. later concluded the attack had involved the nerve agent sarin. In his piece -- titled "Whose Sarin?" -- Hersh reported that al-Nusra, a jihadi group fighting in Syria’s long-running civil war, had also "mastered the mechanics of creating sarin and was capable of manufacturing it in quantity.” Therefore, he wrote, “Obama did not tell the whole story” when stating with certainty that Assad had to be responsible, crossing a so-called "red line" that would trigger U.S. retaliation. Hersh is a freelancer, but he's best known these days for his work in The New Yorker, where he helped break the Abu Ghraib scandal in 2004. In an email, Hersh wrote that “there was little interest” for the story at The New Yorker. Hersh then took the story to The Washington Post. Hersh wrote that he was told by email that Executive Editor Marty Baron decided “that the sourcing in the article did not meet the Post's standards.” Hersh [then] sent the Syria story to editors at the London Review of Books, LRB Senior Editor Christian Lorentzen [said]. Lorentzen said the piece was not only edited, but thoroughly fact checked by a former New Yorker fact checker who had worked with Hersh in the past.

Note: For more on government lies to provide pretexts for war, see the deeply revealing reports from reliable major media sources available here.


Who Is Watching the Watch Lists?
2013-12-01, New York Times
http://www.nytimes.com/2013/12/01/sunday-review/who-is-watching-the-watch-lis...

The federal government’s main terrorist watch list has grown to at least 700,000 people, with little scrutiny over how the determinations are made or the impact on those marked with the terrorist label. The government refuses to confirm or deny whether someone is on the list, officially called the Terrorist Screening Database, or divulge the criteria used to make the decisions. Even less is known about the secondary watch lists that are derived from the main one, including the no-fly list (used to prevent people from boarding aircraft), the selectee and expanded selectee lists (used to flag travelers for extra screening at airport checkpoints), the TECS database (used to vet people entering or leaving the United States), the Consular Lookout and Support System (used to screen visa applications) and the known or suspected terrorists list (used by law enforcement in routine police encounters). For people who have landed on these lists, the terrorist designation has been difficult to challenge legally. The Terrorist Screening Center, which administers the main terrorist watch list, declined to discuss its procedures, or to release current data about the number of people on various watch lists, and how many of them are American citizens.

Note: For more on government threats to civil liberties, see the deeply revealing reports from reliable major media sources available here.


Intel officials believe Snowden has 'doomsday' cache
2013-11-26, MSN/Reuters
http://news.msn.com/us/intel-officials-believe-snowden-has-doomsday-cache

British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said. One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm. U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories. "The worst is yet to come," said one former U.S. official who follows the investigation closely. Snowden ... is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents. [It is] estimated that the total number of Snowden documents made public so far is over 500. Glenn Greenwald, who met with Snowden in Hong Kong and was among the first to report on the leaked documents for the Guardian newspaper, said the former NSA contractor had "taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published."

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


CIA turned some Guantanamo Bay prisoners into double agents against al-Qaeda
2013-11-26, Washington Post/Associated Press
http://www.washingtonpost.com/world/national-security/cia-turned-some-guantan...

In the early years after Sept. 11, 2001, the CIA turned some Guantanamo Bay prisoners into double agents, sending them home to help the United States kill terrorists, current and former U.S. officials said. The CIA promised the prisoners freedom, safety for their families and millions of dollars from the agencys secret accounts. It was a gamble. Officials knew there was a chance that some prisoners might quickly spurn their deal and kill Americans. Nearly a dozen current and former U.S. officials described aspects of the program to the Associated Press. Dozens of prisoners were evaluated, but only a handful, from a variety of countries, were turned into spies who signed agreements to work for the CIA. Prisoners agreed to cooperate for a variety of reasons, officials said. Some received assurances that the United States would resettle their families. Another agreed to cooperate after the agency insinuated that it would harm his children, a former official said, a threat similar to those interrogators made to self-proclaimed Sept. 11 mastermind Khalid Sheik Mohammed. All were promised money. Exactly how much each received remains unclear. But altogether, the government paid millions for their services, officials said. The money came from a secret CIA account, code-named Pledge, that is used to pay informants, officials said. Officials said the program ended in 2006 as the flow of detainees to Guantanamo Bay slowed to a trickle. The last prisoner arrived there in 2008.

Note: There is no doubt that the CIA used mind control techniques to control and likely program some of the prisoners. To read verifiable documentation on the U.S. governments secret mind control programs, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


GCHQ and European spy agencies worked together on mass surveillance
2013-11-01, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/uk-news/2013/nov/01/gchq-europe-spy-agencies-mass-...

The German, French, Spanish and Swedish intelligence services have all developed methods of mass surveillance of internet and phone traffic over the past five years in close partnership with Britain's GCHQ eavesdropping agency. The bulk monitoring is carried out through direct taps into fibre optic cables and the development of covert relationships with telecommunications companies. A loose but growing eavesdropping alliance has allowed intelligence agencies from one country to cultivate ties with corporations from another to facilitate the trawling of the web, according to GCHQ documents leaked by the former US intelligence contractor Edward Snowden. The files also make clear that GCHQ played a leading role in advising its European counterparts how to work around national laws intended to restrict the surveillance power of intelligence agencies. US intelligence officials have insisted the mass monitoring was carried out by the security agencies in the countries involved and shared with the US. The Guardian revealed the existence of GCHQ's Tempora programme, in which the electronic intelligence agency tapped directly into the transatlantic fibre optic cables to carry out bulk surveillance. GCHQ officials expressed admiration for the technical capabilities of German intelligence to do the same thing, [saying] the Federal Intelligence Service (BND) had "huge technological potential and good access to the heart of the internet – they are already seeing some bearers running at 40Gbps and 100Gbps". Bearers is the GCHQ term for the fibre optic cables, and gigabits per second (Gbps) measures the speed at which data runs through them.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


New book reveals how much FBI, CIA knew about Oswald before Kennedy assassination
2013-10-27, CBS News
http://www.cbsnews.com/8301-3460_162-57609489/new-book-reveals-how-much-fbi-c...

It has long been known that the Warren Commission ... was flawed in ways that led to generations of conspiracy theories about what happened on Nov. 22, 1963. A [new] book from former New York Times reporter Philip Shenon digs into exactly what the commission got wrong, both by intentional concealment, or, in Shenon's view, extensive attempts by both the CIA and FBI to withhold just how much they knew about Kennedy assassin Lee Harvey Oswald. "Much of the truth about the Kennedy assassination has still not been told, [and] much of the evidence about the president's murder was covered up or destroyed - shredded, incinerated, or erased - before it could reach the commission," Shenon writes in the prologue to A Cruel and Shocking Act: The Secret History of the Kennedy Assassination, which draws its title from the first sentence of the commission's report. Shenon tells the story of how Navy pathologist James Humes threw his blood-stained notes from Kennedy's autopsy into the fire after he transcribed a fresh copy of the report. He said that he wanted to keep the documents from falling into the hands of "ghouls," and gave a similar rationale for ordering that the sheets that covered Kennedy's head wounds in Dallas be laundered during the autopsy. The commission's investigators never even saw the photos and X-rays from the autopsy. Shenon also points to the CIA as having taken great steps to cover up their knowledge of Oswald's visit to Mexico City before the assassination.

Note: As the 50th anniversary of the Kennedy assassination approaches see our powerful JFK assassination information center and the best videos and news articles on the topic. For more on political assassinations, see the deeply revealing reports from reliable major media sources available here.


Edward Snowden is no traitor
2013-10-21, Washington Post
http://www.washingtonpost.com/opinions/richard-cohen-edward-snowden-is-no-tra...

What are we to make of Edward Snowden? I know what I once made of him. He was no real whistleblower, I wrote, but “ridiculously cinematic” and “narcissistic” as well. As time has proved, my judgments were just plain wrong. Whatever Snowden is, he is curiously modest and has bent over backward to ensure that the information he has divulged has done as little damage as possible. As a “traitor,” he lacks the requisite intent and menace. But traitor is what Snowden has been roundly called. Harry Reid: “I think Snowden is a traitor.” John Boehner: “He’s a traitor.” Rep. Peter King: “This guy is a traitor; he’s a defector.” And Dick Cheney not only denounced Snowden as a “traitor” but also suggested that he might have shared information with the Chinese. This innuendo, as with Saddam Hussein’s weapons of mass destruction, is more proof of Cheney’s unerring determination to be cosmically wrong. The early denunciations of Snowden now seem both over the top and beside the point. If he is a traitor, then which side did he betray and to whom does he now owe allegiance? Snowden seems to have sold out to no one. In fact, a knowledgeable source says that Snowden has not even sold his life story and has rebuffed offers of cash for interviews. Maybe his most un-American act is passing up a chance at easy money. Someone ought to look into this. Snowden’s residency in Russia has been forced upon him — he had nowhere else to go. Snowden insists that neither the Russians nor, before them, the Chinese have gotten their grubby hands on his top-secret material.

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Privacy Fears Grow as Cities Increase Surveillance
2013-10-14, New York Times
http://www.nytimes.com/2013/10/14/technology/privacy-fears-as-surveillance-gr...

Federal grants of $7 million, initially intended to help thwart terror attacks at the port in Oakland, Calif., are instead going to a police initiative that will collect and analyze reams of surveillance data. The new system ... is the latest example of how cities are compiling and processing large amounts of information, known as big data, for routine law enforcement. And the system underscores how technology has enabled the tracking of people in many aspects of life. Like the Oakland effort, other pushes to use new surveillance tools in law enforcement are supported with federal dollars. The New York Police Department, aided by federal financing, has a big data system that links 3,000 surveillance cameras with license plate readers, radiation sensors, criminal databases and terror suspect lists. Police in Massachusetts have used federal money to buy automated license plate scanners. And police in Texas have bought a drone with homeland security money. [Critics] of the Oakland initiative, formally known as the Domain Awareness Center, [say] the program, which will create a central repository of surveillance information, will also gather data about the everyday movements and habits of law-abiding residents. Oakland has a contract with the Science Applications International Corporation, or SAIC, to build its system. That company has earned the bulk of its $12 billion in annual revenue from military contracts.

Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


Seymour Hersh on Obama, NSA and the 'pathetic' American media
2013-09-27, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/media/media-blog/2013/sep/27/seymour-hersh-obama-n...

[Seymour] Hersh, the investigative journalist who has been the nemesis of US presidents since the 1960s and who was once described by the Republican party as "the closest thing American journalism has to a terrorist", ... is angry about the timidity of journalists in America, their failure to challenge the White House and be an unpopular messenger of truth. Don't even get him started on the ... death of Osama bin Laden. "Nothing's been done about that story, it's one big lie, not one word of it is true," he says of the dramatic US Navy Seals raid in 2011. Hersh is writing a book about national security and has devoted a chapter to the bin Laden killing. He says a recent report put out by an "independent" Pakistani commission about life in the Abottabad compound in which Bin Laden was holed up would not stand up to scrutiny. "The Pakistanis put out a report, don't get me going on it. Let's put it this way, it was done with considerable American input. It's a bullshit report," he says hinting of revelations to come in his book. The Obama administration lies systematically, he claims, yet none of the leviathans of American media, the TV networks or big print titles, challenge him. He is certain that NSA whistleblower Edward Snowden "changed the whole nature of the debate" about surveillance. "But I don't know if it's going to mean anything in the long [run] because the polls I see in America – the president can still say to voters 'al-Qaida, al-Qaida' and the public will vote two to one for this kind of surveillance, which is so idiotic," he says.

Note: For a powerful analysis by scholar David Ray Griffin of the years-long Osama bin Laden psyop, arguing that bin Laden probably died in December 2001, see his book Osama Bin Laden: Dead or Alive?. For more on media cover-ups of important realities, see the deeply revealing reports from reliable major media sources available here.


FBI calls half of populace with 9/11 doubts potential terrorists
2013-09-19, Digital Journal
http://digitaljournal.com/article/358624

A Department of Justice memo [distributed by the FBI] instructs local police, under a program named "Communities Against Terrorism," to consider anyone who harbors "conspiracy theories" about 9/11 to be a potential terrorist. The memo thus adds 9/11-official-story skeptics to a growing list of targets described by federal law enforcement [as] security threats, such as those who express "libertarian philosophies," "Second Amendment-oriented views," interest in "self-sufficiency," "fears of Big Brother or big government," and "Declarations of Constitutional rights and civil liberties." A newly released national poll shows that 48 percent of Americans either have some doubts about the official account of 9/11, or do not believe it at all. The FBI memo entitled "Potential Indicators of Terrorist Activities Related to Sleepers" says that people who should be 'considered suspicious' [for] possible involvement in "terrorist activity" include those who hold the "attitude" described as "Conspiracy theories about Westerners." The memo continues: "e.g. (sic) the CIA arranged for 9/11 to legitimize the invasion of foreign lands." "Sleepers" refers to "sleeper cells," in FBI jargon, which are terrorists awaiting orders to be activated into terrorist activity. According to the polling firm YouGov, 38% of Americans have some doubts about the official account of 9/11, 10% do not believe it at all, and 12% are unsure about it. Among well-known doubters of the official 9/11 account are many military officers, law enforcement personnel, firefighters, and pilots.

Note: We don't normally use Digital Journal as a news source, but this article is too important to not include, and no major media source is covering the story. For evidence that search engines are actively blocking 9/11 truth videos, click here. For more on the questions raised about the official explanation of the 9/11 events by highly respected professors and former government and military officials, click here and here.


Lawsuit asks FBI to release Sarasota 9/11 documents
2013-09-10, Sarasota Herald-Tribune (Sarasota FL's leading newspaper)
http://www.heraldtribune.com/article/20130910/ARTICLE/130919971/-1/news?p=all...

Twelve years after the 9/11 attacks that included three hijacker pilots trained in Venice [FL], the terrorists' alleged interaction with a high-echelon Saudi family that lived in Sarasota remains shrouded in secrecy. But Sunshine law and Freedom of Information Act requests filed by an independent South Florida news organization have chipped away at the FBI's position that information related to the family remain secret. Broward Bulldog editor Dan Christensen and former U.S. Sen. Bob Graham say the documents could shed light on how the locally trained terrorists were managed and supported. Graham, former Florida governor and a co-chair of [the] Congressional body that investigated the attacks, believes the FBI has covered up Saudi support of the terrorists. The former senator wants more disclosure about what happened in Sarasota because he feels it may add to a bigger, largely censored subject: Who financed and supported the 9/11 terror attacks? "The FBI is aggressively resisting the release of any additional documents," he said. "The question is, why are they doing this? What interest does the FBI have in denying the existence of its own documents? Beyond that, they have thrown a blanket of national security over virtually everything, and why are they doing that for an event that occurred, soon to be, 12 years ago?" At the time of the 9/11 attacks, President George W. Bush was visiting a school in Sarasota. Then came the revelation that three of the hijackers learned to fly at Venice Airport.

Note: For lots more reliable information suggesting a major cover-up around the events of 9/11, click here and here.


Revealed: how US and UK spy agencies defeat internet privacy and security
2013-09-05, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves. Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software. "Backdoors are fundamentally in conflict with good security," said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. "Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise."

Note: For an excellent article in the New York Times on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.


U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary
2013-08-29, Washington Post
http://www.washingtonpost.com/world/national-security/black-budget-summary-de...

U.S. spy agencies have built an intelligence-gathering colossus since the attacks of Sept. 11, 2001, but remain unable to provide critical information to the president on a range of national security threats, according to the government’s top-secret budget. The $52.6 billion “black budget” for fiscal 2013, obtained by The Washington Post from former intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny. Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses the money or how it performs against the goals set by the president and Congress. The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the U.S. intelligence community, which has 107,035 employees. Among the notable revelations in the budget summary: Spending by the CIA has surged past that of every other spy agency, with $14.7 billion in requested funding for 2013. The figure vastly exceeds outside estimates and is nearly 50 percent above that of the National Security Agency, which conducts eavesdropping operations and has long been considered the behemoth of the community. The CIA and the NSA have begun aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as “offensive cyber operations.”

Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.


NYPD's massive mosque spying operations revealed
2013-08-28, MSN/Associated Press
http://news.msn.com/us/nypds-massive-mosque-spying-operations-revealed

The New York Police Department has secretly labeled entire mosques as terrorism organizations, a designation that allows police to use informants to record sermons and spy on imams, often without specific evidence of criminal wrongdoing. Designating an entire mosque as a terrorism enterprise means that anyone who attends prayer services there is a potential subject of an investigation and fair game for surveillance. Since the 9/11 attacks, the NYPD has opened at least a dozen "terrorism enterprise investigations" into mosques, according to interviews and confidential police documents. Many TEIs stretch for years, allowing surveillance to continue even though the NYPD has never criminally charged a mosque or Islamic organization with operating as a terrorism enterprise. The documents show in detail how, in its hunt for terrorists, the NYPD investigated countless innocent New York Muslims and put information about them in secret police files. As a tactic, opening an enterprise investigation on a mosque is so potentially invasive that while the NYPD conducted at least a dozen, the FBI never did one, according to interviews with federal law enforcement officials. The revelations about the NYPD's massive spying operations are in documents recently obtained by The Associated Press and part of a new book, Enemies Within: Inside the NYPD's Secret Spying Unit... The book ... is based on hundreds of previously unpublished police files and interviews with current and former NYPD, CIA and FBI officials.

Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.


FBI director does not deny al-Awlaki may have been government asset
2013-08-23, Fox News
http://www.foxnews.com/politics/2013/08/23/did-us-government-try-to-recruit-r...

Newly declassified documents obtained [by] Judicial Watch, are raising questions over the U.S. government's handling of Anwar al-Awlaki, and whether it [recruited] the radical American cleric as an intelligence source in 2002. Director Robert Mueller did not dismiss the possibility. "I am not personally familiar with any effort to recruit Anwar al-Awlaki as an asset -- that does not mean to say there was not an effort at some level of the Bureau (FBI) or another agency to do so," Mueller said. Fox's ongoing reporting ... shows that in 2002 he was released from custody at JFK international airport -- despite an active warrant for his arrest -- with the okay of FBI Agent Wade Ammerman. Within days of his re-entry, al-Awlaki showed up in Ammerman's counter-terrorism investigation in Virginia into Ali al-Timimi, who is now serving a life sentence on non-terrorism charges. None of the information about al-Awlaki's release from federal custody at JFK, a sudden decision by the Justice Department in October 2002 to rescind an arrest warrant for the cleric, nor the cleric's connection to Ammerman was provided to the defense during Timimi’s 2005 trial. Documents ... show the FBI Director was more deeply involved in the post-9/11 handling of al-Awlaki than previously known. One memo from Mueller to then-Attorney General John Ashcroft on Oct. 3, 2002 -- seven days before the cleric re-entered the U.S. and was detained at JFK -- is marked "Secret" and titled "Anwar Aulaqi: IT-UBL/AL-QAEDA." "Why would al-Awlaki get the attention of the FBI Director? Why would a warrant for his arrest be pulled when he's trying to reenter the country?" asked Judicial Watch President Tom Fitton.

Note: Al-Awlaki, who was born in New Mexico and was a US citizen, died in a U.S. drone attack in Yemen nearly two years ago, the first American targeted for death by the CIA, by its own admission. With the confirmation that he had been an intelligence asset for the US government as early as 2002, his assassination takes on new significance. For more on the murky background of Al-Awlaki, click here and here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"