Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency News Articles
Excerpts of key news articles on intelligence agencies


Below are key excerpts of little-known, yet highly revealing news articles on intelligence agencies from the major media. Links are provided to the full articles for verification. If any link fails to function, read this webpage. These intelligence agencies news articles are listed by order of importance. You can also explore them listed by order of the date of the article or by the date posted. By choosing to educate ourselves, we can and will build a brighter future.

Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


New York Times editor: we failed to do our job after 9/11
2015-01-28, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/media/greenslade/2015/jan/28/new-york-times-editor...

Dean Baquet, the executive editor of the New York Times, believes his newspaper – in company with the US mainstream media – failed their audiences after 9/11. He told the German news magazine Der Spiegel that he agreed with the criticism originally made by an NYT reporter, James Risen, Baquet said: “The mainstream press was not aggressive enough after 9/11, was not aggressive enough in asking questions about a decision to go to war in Iraq, was not aggressive enough in asking the hard questions about the war on terror. I accept that for the Los Angeles Times and the New York Times”. Baquet, in charge of the NYT since May 2014, was previously editor-in-chief of the LA Times. In his wide-ranging interview with Der Spiegel, Baquet also spoke about the NSA whistleblower Edward Snowden having chosen to tell his story to the Guardian. He said he regards the Guardian as “a new competitor [for the NYT] in the digital age.” He said: “Does it make me nervous that they compete with us and in fact beat us on the Snowden story? Yes. "It hurt a lot. It meant two things. Morally, it meant that somebody with a big story to tell didn’t think we were the place to go, and that’s painful. And then it also meant that we got beaten on what was arguably the biggest national security story in many, many years.

Note: When asked about the New York Times' refusal to report on military drone base locations in the interview referenced above, Baquet recalls, "A high-ranking CIA official called me up and made the case to leave out where the drone base was. It was Saudi Arabia. I accepted it. And I was wrong." For more along these lines, see these concise summaries of deeply revealing articles about mass media manipulation.


The Saudi Role in Sept. 11 and the Hidden 9/11 Report Pages
2015-01-07, Newsweek
http://www.newsweek.com/saudi-arabia-911-george-w-bush-barack-obama-prince-ba...

28 still-classified pages pages in a congressional inquiry on 9/11 ... raise questions about Saudi financial support to the hijackers in the United States prior to the attacks. Both the administrations of George W. Bush and Barack Obama have refused to declassify the pages on grounds of national security. But [some] members of Congress who have read the pages ... say national security has nothing to do with it. Former Florida Senator Bob Graham, a Democrat who co-chaired the joint investigation of the House and Senate intelligence committees into the Sept. 11 attacks ... maintains that nothing in them qualifies as a legitimate national security secret. The 2002 joint congressional committee probe [Graham] co-chaired reported only that, “contacts in the United States helped hijackers ...” But in an interview with Newsweek, Graham said “the contacts” were Saudis with close connections to their government. The Florida Democrat charged that there has been “an organized effort to suppress information” about Saudi support for terrorism, which "started long before 9/11 and continued ... after 9/11. ISIS ... is a product of Saudi ideals, Saudi money and Saudi organizational support, although now they are making a pretense of being very anti-ISIS,” Graham added. The two co-chairman of ... the 9/11 Commission, likewise urged the White House to declassify the 28 pages. “I’m embarrassed that they’re not declassified,“ former Rep. Lee Hamilton (D-Ind) said at a press conference with his co-chair Tom Kean, the former Republican governor of New Jersey. Meanwhile, Washington and the Saudi royals still maintain their decades-long, cozy relationship.

Note: Several current and former government officials are trying to expose the Saudi government money behind ISIS and other terrorist groups. For more along these lines, read concise summaries of deeply revealing 9/11 investigation news from reliable major media sources.


FBI: Violent crime drops, reaches 1970s level
2014-11-10, Chicago Tribune
http://www.chicagotribune.com/news/nationworld/chi-violent-crime-1970s-level-...

U.S. violent crimes including murders fell 4.4 percent in 2013 to their lowest number since the 1970s, continuing a decades-long downturn, the FBI said on Monday. The law enforcement agency's annual Crime in the United States report showed the country had an estimated 1.16 million violent crimes last year, the lowest number since 1.09 million were recorded in 1978. All types of violent crimes were lower, with murder and non-negligent manslaughter off 4.4 percent to 14,196, the lowest figure since 1968. Rape was down 6.3 percent and robbery fell 2.8 percent, the Federal Bureau of Investigation data showed. The violent crime rate last year was 367.9 for each 100,000 in population, down 5.1 percent from 2012. The rate has fallen every year since at least 1994, the earliest year for readily accessible FBI data, and the 2013 figure was about half the 1994 rate. Property crimes fell 4.1 percent ... the 11th straight yearly decline. In an analysis, the non-profit Pew Charitable Trusts said the drop in crime coincided with a decline in the prison population, with the number of U.S. prisoners down 6 percent in 2013 from its peak in 2008. Thirty-two of the 50 states have seen a drop in crime rates as the rate of imprisonment fell, Pew said. California notched the largest drop in imprisonment rate over the five-year period, at 15 percent, and crime was down 11 percent. The state has been under court order to reduce prison overcrowding, and voters last week approved an initiative that reduced sentences for some crimes.

Note: Why isn't this inspiring news being broadcast widely by the media? And why hasn't the FBI website updated their data on this since 2010? The police and media appear to consistently downplay the huge drop in violent crime since 1994. According to the FBI's own statistics, violent crime has currently dropped to 1/3 or less what it was in 1994. See the revealing FBI graphs and charts here, here, and here. Yet some of these charts have now been removed and mention of this huge decrease downplayed. The obvious reason is that a large decrease in crime might cause people to want to decrease police and FBI budgets. More here.


U.S. threatened massive fine to force Yahoo to release data
2014-09-11, Washington Post
http://www.washingtonpost.com/business/technology/us-threatened-massive-fine-...

The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


The US government can brand you a terrorist based on a Facebook post
2014-08-30, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2014/aug/30/terrorist-watch-list-rul...

The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.

Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.


Why We Fight Wars
2014-08-18, New York Times
http://www.nytimes.com/2014/08/18/opinion/paul-krugman-why-we-fight.html

A century has passed since the start of World War I, which many people at the time declared was “the war to end all wars.” Unfortunately, wars just kept happening. In influential research sponsored by the World Bank, the Oxford economist Paul Collier has shown that the best predictor of civil war, which is all too common in poor countries, is the availability of lootable resources like diamonds. Whatever other reasons rebels cite for their actions seem to be mainly after-the-fact rationalizations. If you’re a modern, wealthy nation, however, war — even easy, victorious war — doesn’t pay. And this has been true for a long time. In his famous 1910 book The Great Illusion, the British journalist Norman Angell argued that “military power is socially and economically futile.” As he pointed out, in an interdependent world (which already existed in the age of steamships, railroads, and the telegraph), war would necessarily inflict severe economic harm even on the victor. Modern nations can’t enrich themselves by waging war. Yet wars keep happening. Why? Governments all too often gain politically from war, even if the war in question makes no sense in terms of national interests. Nations almost always rally around their leaders in times of war, no matter how foolish the war or how awful the leaders. Argentina’s junta briefly became extremely popular during the Falklands war. For a time, the “war on terror” took President George W. Bush’s approval to dizzying heights, and Iraq probably won him the 2004 election. True to form, Mr. Putin’s approval ratings have soared since the Ukraine crisis began.

Note: For more on this, see this concise summary of War Is A Racket, a powerful book written by one of the most highly decorated US generals ever.


Inquiry by C.I.A. Affirms It Spied on Senate Panel
2014-08-01, New York Times
http://www.nytimes.com/2014/08/01/world/senate-intelligence-commitee-cia-inte...

An internal investigation by the C.I.A. has found that its officers penetrated a computer network used by the Senate Intelligence Committee in preparing its damning report on the C.I.A.’s detention and interrogation program. The report by the agency’s inspector general also found that C.I.A. officers read the emails of the Senate investigators and sent a criminal referral to the Justice Department based on false information. The investigation also discovered that the officers created a false online identity to gain access on more than one occasion to computers used by the committee staff. The inspector general’s account of how the C.I.A. secretly monitored a congressional committee charged with supervising its activities touched off angry criticism from members of the Senate and amounted to vindication for Senator Dianne Feinstein of California, the committee’s Democratic chairwoman, who excoriated the C.I.A. in March when the agency’s monitoring of committee investigators became public. Senator Mark Udall, Democrat of Colorado and another member of the Intelligence Committee, demanded Mr. Brennan’s resignation. “The C.I.A. unconstitutionally spied on Congress by hacking into the Senate Intelligence Committee computers,” he said in a written statement. “This grave misconduct not only is illegal but it violates the U.S. Constitution’s requirement of separation of powers,” he added.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Government agents 'directly involved' in most high-profile US terror plots
2014-07-21, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/jul/21/government-agents-directly-invol...

Nearly all of the highest-profile domestic terrorism plots in the United States since 9/11 featured the "direct involvement" of government agents or informants, a new report says. Some of the controversial "sting" operations "were proposed or led by informants", bordering on entrapment by law enforcement. Yet the courtroom obstacles to proving entrapment are significant, one of the reasons the stings persist. The lengthy report, released on [July 21] by Human Rights Watch, raises questions about the US criminal justice system's [respect for] civil rights and due process in post-9/11 terrorism cases. [The report] portrays a system that features not just the sting operations but secret evidence, anonymous juries, extensive pretrial detentions and convictions significantly removed from actual plots. "In some cases the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act," the report alleges. Out of the 494 cases related to terrorism the US has tried since 9/11, the plurality of convictions ... are not for thwarted plots but for "material support" charges, a broad category expanded further by the 2001 Patriot Act that permits prosecutors to pursue charges with tenuous connections to a terrorist act or group. Several cases featured years-long solitary confinement for accused terrorists before their trials. Some defendants displayed signs of mental incapacity. Jurors for the 2007 plot to attack the Fort Dix army base, itself influenced by government informants, were anonymous, limiting defense counsel's ability to screen out bias.

Note: Why was this important news not picked up by any major US media? For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Racy Photos Were Often Shared at N.S.A., Snowden Says
2014-07-21, New York Times
http://www.nytimes.com/2014/07/21/us/politics/edward-snowden-at-nsa-sexually-...

The former National Security Agency contractor Edward J. Snowden said in a wide-ranging interview ... that the oversight of surveillance programs was so weak that members of the United States military working at the spy agency sometimes shared sexually explicit photos they intercepted. He also said the British government often pioneered the most invasive surveillance programs because its intelligence services operate with fewer restrictions intended to protect individual privacy than its counterparts in the United States and other allies. “In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive,” he said. “So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: ‘Oh, hey, that’s great. Send that to Bill down the way.’ ” Mr. Snowden said that type of sharing ... was “seen as the fringe benefits of surveillance positions.” He said that this was never reported and that the system for auditing surveillance programs was “incredibly weak.” Mr. Snowden had particularly stark criticism for the British government’s surveillance programs, because in Britain the respect for individual privacy, he said, “is not strongly encoded in law or policy.” Because it has fewer restrictions, British intelligence platforms “are used as a testing ground” for programs of all five intelligence partners, a group referred to as “Five Eyes,” which includes Britain, Canada, Australia, New Zealand and the United States.”

Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.


Before Shooting in Iraq, a Warning on Blackwater
2014-06-30, New York Times
http://www.nytimes.com/2014/06/30/us/before-shooting-in-iraq-warning-on-black...

Just weeks before Blackwater guards fatally shot 17 civilians at Baghdad’s Nisour Square in 2007, the State Department began investigating the security contractor’s operations in Iraq. But the inquiry was abandoned after Blackwater’s top manager there issued a threat: “that he could kill” the government’s chief investigator and “no one could or would do anything about it as we were in Iraq.” American Embassy officials in Baghdad sided with Blackwater rather than the State Department investigators as a dispute over the probe escalated in August 2007, the previously undisclosed documents show. The officials told the investigators that they had disrupted the embassy’s relationship with the security contractor and ordered them to leave the country. After returning to Washington, the chief investigator wrote a scathing report to State Department officials documenting misconduct by Blackwater employees and warning that lax oversight of the company, which had a contract worth more than $1 billion to protect American diplomats, had created “an environment full of liability and negligence.” “The management structures in place to manage and monitor our contracts in Iraq have become subservient to the contractors themselves,” the investigator, Jean C. Richter, wrote in an Aug. 31, 2007, memo to State Department officials. “Blackwater contractors saw themselves as above the law,” he said, adding that the “hands off” management resulted in a situation in which “the contractors, instead of Department officials, are in command and in control.”

Note: For more on this, see concise summaries of deeply revealing war crimes news articles from reliable major media sources.


Health conspiracy theories are widely believed
2014-03-19, USA Today
http://www.usatoday.com/story/news/nation/2014/03/19/health-conspiracy-theori...

Nearly half of American adults believe the federal government, corporations or both are involved in at least one conspiracy to cover up health information, a new survey finds. Conspiracy theories on everything from cancer cures to cellphones to vaccines are well known and accepted by sizable segments of the population, according to a research letter published this week in JAMA Internal Medicine. The findings reflect "a very low level of trust" in government and business, especially in pharmaceutical companies, says study co-author Eric Oliver, a professor of political science at the University of Chicago. The online survey of 1,351 adults found: • 37% agree the Food and Drug Administration is keeping "natural cures for cancer and other diseases" away from the public because of "pressure from drug companies." • 20% believe health officials are hiding evidence that cellphones cause cancer. • 20% believe doctors and health officials push child vaccines even though they "know these vaccines cause autism and other psychological disorders." • Smaller numbers endorse theories involving fluoride, genetically modified foods and the deliberate infection of African Americans with HIV. • 49% believe at least one of the theories and 18% believe at least three. The beliefs also go along with certain health behaviors, the survey found. Those who believe at least three health conspiracy theories are less likely to use sunscreen, get flu shots or get check-ups and are more likely to use herbal remedies and eat organic foods.

Note: For an intriguing list of 10 major health cover-ups with evidence to back it up, click here.


Snowden Docs Show British Spies Used Sex and 'Dirty Tricks'
2014-02-07, NBC News
http://www.nbcnews.com/news/investigations/snowden-docs-british-spies-used-se...

British spies have developed "dirty tricks" ... that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into "honey traps." Documents taken from the National Security Agency by Edward Snowden ... describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG). According to the documents ... the agency's goal was to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications. The propaganda campaigns use deception, mass messaging and "pushing stories" via Twitter, Flickr, Facebook and YouTube. JTRIG also uses "false flag" operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain's adversaries. Other documents ... show that JTRIG ... used a DDOS attack to shut down Internet chat rooms used by members of the hacktivist group known as Anonymous. A computer virus called Ambassadors Reception was "used in a variety of different areas" and was "very effective." When sent to adversaries ... the virus will "encrypt itself, delete all emails ... and block the computer user from logging on. Spies have long used sexual "honey traps" to snare, blackmail and influence targets. Most often, a male target is led to believe he has an opportunity for a romantic relationship or a sexual liaison with a woman, only to find that the woman is actually an intelligence operative.

Note: You can read the documents released by Snowden at this link and this one. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


Snowden docs reveal British spies snooped on YouTube and Facebook
2014-01-27, NBC News
http://investigations.nbcnews.com/_news/2014/01/27/22469304-snowden-docs-reve...

The British government can tap into the cables carrying the world’s web traffic at will and spy on what people are doing on some of the world’s most popular social media sites ... without the knowledge or consent of the companies. Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated a pilot program to their U.S. partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter. Called “Psychology A New Kind of SIGDEV" (Signals Development), the presentation includes a section that spells out “Broad real-time monitoring of online activity” of YouTube videos, URLs “liked” on Facebook, and Blogspot/Blogger visits. The monitoring program is called “Squeaky Dolphin.” Experts told NBC News the documents show the British had to have been either physically able to tap the cables carrying the world’s web traffic or able to use a third party to gain physical access to the massive stream of data. Representatives of Facebook and Google, which owns YouTube, said they ... were unaware the collection had occurred. The NSA does analysis of social media similar to that in the GCHQ demonstration. In 2010 ... GCHQ exploited unencrypted data from Twitter to identify specific users around the world and target them with propaganda.

Note: Read an article diving deeper and showing how online reputations are ruthlessly destroyed by powerful groups. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.


Burglars Who Took On F.B.I. Abandon Shadows
2014-01-07, New York Times
http://www.nytimes.com/2014/01/07/us/burglars-who-took-on-fbi-abandon-shadows...

On a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludgeoned each other over 15 rounds in a televised title bout viewed by millions around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with nearly every document inside. They were never caught, and the stolen documents that they mailed anonymously to newspaper reporters ... would become a flood of revelations about extensive spying and dirty-tricks operations by the F.B.I. against dissident groups. Perhaps the most damning document from the cache [was] a 1970 memorandum that ... urged agents to step up their interviews of antiwar activists and members of dissident student groups. “It will enhance the paranoia endemic in these circles and will further serve to get the point across there is an F.B.I. agent behind every mailbox.” Another document, signed by Hoover himself, revealed widespread F.B.I. surveillance of black student groups on college campuses. But the document that would have the biggest impact on reining in the F.B.I.’s domestic spying activities [included] a mysterious word: Cointelpro ... shorthand for Counterintelligence Program. Since 1956, the F.B.I. had carried out an expansive campaign to spy on civil rights leaders, political organizers and suspected Communists, and had tried to sow distrust among protest groups. Among the grim litany of revelations was a blackmail letter F.B.I. agents had sent anonymously to the Rev. Dr. Martin Luther King Jr., threatening to expose his extramarital affairs if he did not commit suicide. The intent of Cointelpro was to destroy lives and ruin reputations.

Note: To learn about the brave citizen burglars who have now revealed themselves and watch the engaging video covering this story, click on the link given above. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Congressional oversight of the NSA is a joke. I should know, I'm in Congress
2013-10-25, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/oct/25/nsa-no-congress-oversight

Recently, the US House of Representatives voted on an amendment ... that would have curbed the NSA's omnipresent and inescapable [spying] tactics. Despite furious lobbying by the intelligence industrial complex and its allies, and four hours of frantic and overwrought briefings by the NSA's General Keith Alexander, 205 of 422 Representatives voted for the amendment. The vote signaled a clear message to the NSA: we do not trust you. The vote also conveyed another, more subtle message: members of Congress do not trust that the House Intelligence Committee is providing the necessary oversight. On the contrary, "oversight" has become "overlook". Despite being a member of Congress possessing security clearance, I've learned far more about government spying on me and my fellow citizens from reading media reports than I have from "intelligence" briefings. My colleagues feel the same way. In fact, one long-serving conservative Republican told me that he doesn't attend such briefings anymore, because, "they always lie". Many of us worry that Congressional Intelligence Committees are more loyal to the "intelligence community" that they are tasked with policing, than to the Constitution. And the House Intelligence Committee isn't doing anything to assuage our concerns. Supporters of the NSA's vast ubiquitous domestic spying operation assure the public that members of Congress can be briefed on these activities whenever they want. Senator Saxby Chambliss says all a member of Congress needs to do is ask for information, and he'll get it. Well I did ask, and the House Intelligence Committee said "no", repeatedly. And virtually every other member not on the Intelligence Committee gets the same treatment.

Note: The above article was written by courageous U.S. Congressman Alan Grayson. For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


N.S.A. Able to Foil Basic Safeguards of Privacy on Web
2013-09-06, New York Times
http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show. Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth. The agency ... deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products [called "backdoors"].

Note: For an excellent article in the UK's respected Guardian on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.


Exclusive: FBI allowed informants to commit 5,600 crimes
2013-08-04, USA Today
http://www.usatoday.com/story/news/nation/2013/08/04/fbi-informant-crimes-rep...

The FBI gave its informants permission to break the law at least 5,658 times in a single year, according to newly disclosed documents that show just how often the nation's top law enforcement agency enlists criminals to help it battle crime. The U.S. Justice Department ordered the FBI to begin tracking crimes by its informants more than a decade ago, after the agency admitted that its agents had allowed Boston mobster James "Whitey" Bulger to operate a brutal crime ring in exchange for information about the Mafia. The FBI submits that tally to top Justice Department officials each year, but has never before made it public. Agents authorized 15 crimes a day, on average, including everything from buying and selling illegal drugs to bribing government officials and plotting robberies. FBI officials have said in the past that permitting their informants — who are often criminals themselves — to break the law is an indispensable, if sometimes distasteful, part of investigating criminal organizations. USA TODAY obtained a copy of the FBI's 2011 report under the Freedom of Information Act. The report does not spell out what types of crimes its agents authorized, or how serious they were. It also did not include any information about crimes the bureau's sources were known to have committed without the government's permission. Crimes authorized by the FBI almost certainly make up a tiny fraction of the total number of offenses committed by informants for local, state and federal agencies each year.

Note: As reported in this USA Today article, the DEA and ATF don't even track crimes committed by their informants. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


The 9/11 Phone Calls: Disturbing Irregularities Uncovered in the Calls that Flashed around the World
2013-05-16, Wall Street Journal/PRNewswire
http://online.wsj.com/article/PR-CO-20130516-909978.html

The 9/11 Consensus Panel now offers four evidence-based points about the alleged phone calls from the 9/11 flights. The famous "let's roll" drama of the passenger revolt on UA 93 was relayed by passenger Todd Beamer's 13-minute unrecorded seat-back call to GTE telephone supervisor Lisa Jefferson, who reported Beamer as strangely tranquil, declining to speak to his wife. Eerily, Beamer's line remained open for 15 minutes after the crash. Oddly, the Verizon wireless record shows that 19 calls were made from Beamer's cell phone long after the crash of UA 93. Initial media reports and FBI interviews detailed more than a dozen cell phone calls from the planes at high elevation. Yet in 2001, a telephone spokesperson stated that sustained mobile calls were not possible above 10,000 feet. During the 2006 Moussaoui Trial, the FBI (under oath) reduced the number of cell phone calls to two calls made from 5,000 feet, and presented evidence of only one (not two) "unconnected" call from Barbara Olson, lasting "0 seconds." In another twist, two other women reported that Caller-ID showed their husband's cell numbers on their answering machines, which while lasting several minutes, had been made from elevations of 25,000 and 35,000 feet. Although the FBI conducted a massive investigation into the calls, none of the telephone billing, nor any of the cell phone location data stored in standard phone company records has been publicly released.

Note: The 9/11 Consensus Panel, consisting of scientists, pilots, professors, attorneys, and journalists, has developed 32 Points of evidence contradicting specific claims made by the official account of 9/11. For many unanswered questions about 9/11 raised by highly credible former government officials and professors, click here and here. For our 9/11 Information Center filled with reliable, verifiable 9/11 resources, click here.


With Bags of Cash, C.I.A. Seeks Influence in Afghanistan
2013-04-29, New York Times
http://www.nytimes.com/2013/04/29/world/asia/cia-delivers-cash-to-afghan-lead...

For more than a decade, wads of American dollars packed into suitcases, backpacks and, on occasion, plastic shopping bags have been dropped off every month or so at the offices of Afghanistan’s president — courtesy of the Central Intelligence Agency. All told, tens of millions of dollars have flowed from the C.I.A. to the office of President Hamid Karzai, according to current and former advisers to the Afghan leader. “We called it ‘ghost money,’ ” said Khalil Roman, who served as Mr. Karzai’s deputy chief of staff from 2002 until 2005. “It came in secret, and it left in secret.” The C.I.A. ... has long been known to support some relatives and close aides of Mr. Karzai. But the new accounts of off-the-books cash delivered directly to his office show payments on a vaster scale, and with a far greater impact on everyday governing. Moreover, there is little evidence that the payments bought the influence the C.I.A. sought. Instead, some American officials said, the cash has fueled corruption and empowered warlords, undermining Washington’s exit strategy from Afghanistan. “The biggest source of corruption in Afghanistan,” one American official said, “was the United States.” Now, Mr. Karzai is seeking control over the Afghan militias raised by the C.I.A. to target ... insurgent commanders, potentially upending a critical part of the Obama administration’s plans for fighting militants as conventional military forces pull back this year. But the C.I.A. has continued to pay.

Note: For deeply revealing reports from reliable major media sources on government corruption, click here.


The 'war on terror' - by design - can never end
2013-01-04, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/commentisfree/2013/jan/04/war-on-terror-endless-joh...

In October, the Washington Post's Greg Miller reported that the administration was instituting a "disposition matrix" to determine how terrorism suspects will be disposed of, all based on this fact: "among senior Obama administration officials, there is broad consensus that such operations are likely to be extended at least another decade." As Miller puts it: "That timeline suggests that the United States has reached only the midpoint of what was once known as the global war on terrorism." The polices adopted by the Obama administration ... leave no doubt that they are accelerating, not winding down, the war apparatus that has been relentlessly strengthened over the last decade. In the name of the War on Terror, the current president has diluted decades-old Miranda warnings; codified a new scheme of indefinite detention on US soil; plotted to relocate Guantanamo to Illinois; increased secrecy, repression and release-restrictions at the camp; minted a new theory of presidential assassination powers even for US citizens; renewed the Bush/Cheney warrantless eavesdropping framework for another five years, as well as the Patriot Act, without a single reform; and just signed into law all new restrictions on the release of indefinitely held detainees. Does that sound to you like a government anticipating the end of the War on Terror any time soon? Or does it sound like one working feverishly to make their terrorism-justified powers of detention, surveillance, killing and secrecy permanent? There's a good reason US officials are assuming the "War on Terror" will persist indefinitely: namely, their actions ensure that this occurs.

Note: For deeply revealing reports from reliable major media sources on the War on Terror, click here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"