Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


Portland man: I was tortured in UAE for refusing to become an FBI informant
2015-03-16, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/us-news/2015/mar/16/portland-man-tortured-uae-behe...

When Yonas Fikre stepped off a luxury private jet at Portland airport last month, the only passenger on a $200,000 flight from Sweden, he braced for the worst. The 36-year-old Eritrean-born American was finally back in Portland at the end of a five-year odyssey that began with a simple business trip but landed him in an Arab prison where he alleges he was tortured at the behest of US anti-terrorism officials because he refused to become an informant at his mosque in Oregon. Fikre is suing the FBI, two of its agents and other American officials for allegedly putting him on the US’s no-fly list – a roster of suspected terrorists barred from taking commercial flights – to pressure him to collaborate. When that failed, the lawsuit said, the FBI had him arrested, interrogated and tortured for 106 days in the United Arab Emirates. As shocking as the claims are, they are not the first to emanate from worshippers at Fikre’s mosque in Portland, where at least nine members have been barred from flying by the US authorities. “The no-fly list gives the FBI an extrajudicial tool to coerce Muslims to become informants,” said Gadeir Abbas, a lawyer who represents other clients on the list. “There’s definitely a cluster of cases like this at the FBI’s Portland office. Fikre has not been charged with any terrorism related crimes or even questioned as a potential threat on his return to the US. He remains on the no-fly list.

Note: For more along these lines, see concise summaries of deeply revealing articles about questionable intelligence agency practices from reliable sources.


C.I.A. Cash Ended Up in Coffers of Al Qaeda
2015-03-14, New York Times
http://www.nytimes.com/2015/03/15/world/asia/cia-funds-found-their-way-into-a...

In the spring of 2010, Afghan officials struck a deal to free an Afghan diplomat held hostage by Al Qaeda. But the price was steep — $5 million. To come up with the money, [senior security officials] turned to a secret fund that the Central Intelligence Agency bankrolled with monthly cash deliveries to the presidential palace in Kabul, according to several Afghan officials. The Afghan government, they said, had already squirreled away about $1 million from that fund. Within weeks, that money ... was handed over to Al Qaeda, replenishing its coffers after a relentless C.I.A. campaign of drone strikes in Pakistan had decimated the militant network’s upper ranks. The C.I.A.’s contribution to Qaeda’s bottom line, though, was no well-laid trap. It was just another in a long list of examples of how the United States, largely because of poor oversight and loose financial controls, has sometimes inadvertently financed the very militants it is fighting. While refusing to pay ransoms for Americans kidnapped by Al Qaeda, the Taliban or, more recently, the Islamic State, the United States has spent hundreds of billions of dollars over the last decade at war in Iraq and Afghanistan, some of which has been siphoned off to enemy fighters. The C.I.A., meanwhile, continued dropping off bags of cash — ranging each time from a few hundred thousand dollars to more than $1 million — at the presidential palace every month until last year, when Mr. Karzai stepped down. The money was used to buy the loyalty of warlords, legislators and other prominent — and potentially troublesome — Afghans, helping the palace finance a vast patronage network that secured Mr. Karzai’s power base.

Note: A 2013 New York Times article called the US the "biggest source of corruption in Afghanistan" for its CIA bankrolling of Afghan warlords. Meanwhile, over a billion dollars of Iraqi "reconstruction" cash disappeared and was later tracked to a bunker in Lebanon. For more along these lines, see concise summaries of deeply revealing war corruption news articles from reliable major media sources.


Spy agencies could be funding geo-engineering research in pursuit of weaponising the weather, scientists claims
2015-02-15, The Independent (One of the UK's leading newspapers)
http://www.independent.co.uk/news/science/spy-agencies-could-be-funding-geoen...

A senior American climate scientist has spoken of the fear he experienced when US intelligence services apparently asked him about the possibility of weaponising the weather as a major report on geo-engineering is to be published this week. During a debate on the use of geo-engineering to combat climate change ... Prof Robock said: “I got a phone call from two men who said we work as consultants for the CIA and we'd like to know if some other country was controlling our climate, would we know about it? ”I told them, after thinking a little bit, that we probably would because if you put enough material in the atmosphere to reflect sunlight we would be able to detect it and see the equipment that was putting it up there. “At the same time I thought they were probably also interested in if we could control somebody else's climate, could they detect it?” Professor Robock, who has investigated the potential risks and benefits of using stratospheric particles to simulate the climate-changing effects of volcanic eruptions, said he felt “scared” when the approach was made. “I'd learned of lots of other things the CIA had done that haven't followed the rules and I thought that wasn't how I wanted my tax money spent. Professor Robock’s concerns come as a major report on geo-engineering is to be published this week by the US National Academy of Sciences. Among the report’s list of sponsors is the “US intelligence community." The professor alleges that ... the US government had a proven history of using the weather in a hostile way.

Note: The National Academy of Science's two-part report says that geoengineering technologies "present serious known and possible unknown environmental, social, and political risks, including the possibility of being deployed unilaterally." With a deeply corrupt scientific establishment being guided by corrupt intelligence agencies to meddle with the planet's total ecology, and with low public awareness about the messy history of mysterious atmospheric experiments over cities in the U.S. and elsewhere, what could possibly go wrong? For solid evidence the military has used the weather as a weapon, read about HAARP.


Claims Against Saudis Cast New Light on Secret Pages of 9/11 Report
2015-02-04, New York Times
http://www.nytimes.com/2015/02/05/us/claims-against-saudis-cast-new-light-on-...

A still-classified section of the investigation by congressional intelligence committees into the Sept. 11, 2001, attacks has taken on an almost mythic quality over the past 13 years. Now new claims by Zacarias Moussaoui, a convicted former member of Al Qaeda, that he had high-level contact with officials of the Saudi government in the prelude to Sept. 11 have brought renewed attention to the inquiry’s withheld findings. Representative Stephen F. Lynch, Democrat of Massachusetts [has authored] a bipartisan resolution encouraging President Obama to declassify the section. Mr. Lynch and his allies have been joined by former Senator Bob Graham of Florida, who as chairman of the Senate Intelligence Committee was a leader of the inquiry. He has called for the release of the report’s [28 page] Part 4, which dealt with Saudi Arabia, since President George W. Bush ordered it classified when the rest of the report was released in December 2002. Mr. Graham has repeatedly said it shows that Saudi Arabia was complicit in the Sept. 11 attacks. “The 28 pages primarily relate to who financed 9/11, and they point a very strong finger at Saudi Arabia as being the principal financier,” Mr. Graham said last month as he pressed for the pages to be made public. Proponents of releasing Part 4, titled “Finding, Discussion and Narrative Regarding Certain National Security Matters,” have suggested that the Bush and Obama administrations have held it back for fear of alienating an influential military and economic partner rather than for any national security consideration.

Note: Several prominent current and former US politicians are working to expose the Saudi government money behind terrorism by declassifying this material. Moussaoui's new claims suggest that they are on the right track. For more along these lines, read concise summaries of deeply revealing 9/11 investigation news from reliable major media sources.


The war on leaks has gone way too far when journalists' emails are under surveillance
2015-01-25, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2015/jan/25/war-on-leaks-gone-way-to...

The outrageous legal attack on WikiLeaks and its staffers ... is an attack on freedom of the press itself. WikiLeaks has had their Twitter accounts secretly spied on, been forced to forfeit most of their funding after credit card companies unilaterally cut them off, had the FBI place an informant inside their news organization, watched their supporters hauled before a grand jury, and been the victim of the UK spy agency GCHQ hacking of their website and spying on their readers. Now we’ve learned that, as The Guardian reported on Sunday, the Justice Department got a warrant in 2012 to seize the contents – plus the metadata on emails received, sent, drafted and deleted – of three WikiLeaks’ staffers personal Gmail accounts. The tactics used against WikiLeaks by the Justice Department in their war on leaks [are] also used against mainstream news organizations. For example, after the Washington Post revealed in 2013 the Justice Department had gotten a warrant for the personal Gmail account of Fox News reporter James Rosen in 2010 without his knowledge. Despite the ongoing legal pressure, WikiLeaks has continued to publish important documents in the public interest.

Note: In recent years, Wikileaks' radical transparency has made draft texts of the Trans-Pacific Partnership public, and uncovered a secret CIA report that suggests the US government’s policy of assassinating foreign 'terrorists' does more harm than good. So who is the real problem here?


Revealed: how Blair colluded with Gaddafi regime in secret
2015-01-23, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/politics/2015/jan/23/-sp-blair-gaddafi-letter-than...

Libyan government papers pieced together by [a] team of London lawyers show [that] Tony Blair wrote to Colonel Muammar Gaddafi to thank him for the “excellent cooperation” between the two countries’ counter-terrorism agencies. The letter, written in 2007, followed a period in which the dictator’s intelligence officers were permitted to operate in the UK, approaching and intimidating Libyan refugees. Addressed “Dear Mu’ammar” and signed “Best wishes yours ever, Tony”, the letter was among hundreds of pages of documents recovered from Libyan government offices following the 2011 revolution. Six Libyan men, the widow of a seventh, and five British citizens of Libyan and Somali origin are bringing claims against the British government on the basis of the recovered documents, alleging false imprisonment, blackmail, misfeasance in public office and conspiracy to assault. The recovered documents show that MI5 and MI6 submitted more than 1,600 questions to be put to two opposition leaders after they had been kidnapped with British assistance and flown to one of Gaddafi’s prisons. Both men say they suffered appalling torture. On Thursday an attempt by government lawyers to have the case struck out without admitting liability failed when the high court ruled the allegations “are of real potential public concern” and should be heard and dealt with by the courts.

Note: British intelligence agencies have been trying to silence the lawyers filing this lawsuit, and got caught illegally spying on them. For more along these lines, see concise summaries of deeply revealing news articles about corruption in intelligence agencies and government.


Sharyl Attkisson sues administration over computer hacking
2015-01-05, Fox News
http://www.foxnews.com/politics/2015/01/05/sharyl-attkisson-sues-administrati...

Former CBS News correspondent Sharyl Attkisson has sued the Justice Department over the hacking of her computers, officially accusing the Obama administration of illegal surveillance while she was reporting on administration scandals. In a series of legal filings that seek $35 million in damages, Attkisson alleges that three separate computer forensic exams showed that hackers used sophisticated methods to surreptitiously monitor her work between 2011 and 2013. The intruders installed and periodically refreshed software to steal data and obtain passwords on her home and work computers. She also charges that the hackers monitored her audio using a Skype account. The award-winning reporter says she and her attorneys have "pretty good evidence" that these efforts were "connected" to the Justice Department. She said she was caught in a "Catch-22," forcing her to use the lawsuit and an administrative complaint to discover more about the surveillance through the discovery process and to learn the identities of the "John Does" named in the complaints. Attkisson learned through a Freedom of Information request that the FBI opened an investigation of the hacking case in May 2013, but says the bureau never interviewed her or even notified her of the probe. Attkisson resigned from CBS last March after complaining that she was increasingly unable to get her investigative stories on the air. She has published a best-selling book, "Stonewalled," about her battles against the network and the administration.

Note: Fox News was the only major media to cover this important case. Read a judge's supportive comments about this important case on Ms. Attkisson's website. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


And the Winner of the ‘War On Terror’ Financed Dream Home 2014 Giveaway Is…
2014-12-21, The Intercept
https://firstlook.org/theintercept/2014/12/31/winner-war-terror-financed-drea...

The combined cost of the “war on terror” comes to an estimated $1.6 trillion. A lot of former senior government officials who played important roles in this debacle have done quite well for themselves. [Former CIA director George Tenet] missed multiple signs of a major Al Qaeda attack directed against the United States [prior to 9/11] and approved the Bush administration’s torturing of terror suspects. He got the Presidential Medal of Freedom. He [also] received a $4 million advance to write a memoir. Tenet has received millions more in his current role as ... a board director and advisor to intelligence and military contractors. Louis Freeh, Tenet’s counterpart at the FBI during the run-up to 9/11 [also mishandled] “significant and urgent” intelligence of “serious operational planning” for terrorism attacks by Islamic radicals. Freeh resigned from the FBI two months before 9/11. In 2008, [a businessman named Nasser Kazeminy] was accused of bribing former Senator Norm Coleman, [and] hired Freeh to conduct a “thorough investigation” of the allegations against him in the hopes of clearing his name. In 2011, Freeh issued a public statement saying that his investigation had “completely vindicated” both Kazeminy and Coleman. Freeh also met with the Justice Department – which was investigating the bribery charges but declined to bring a case — on Kazeminy’s behalf. [Today, Freeh has a $3 million] Palm Beach penthouse. Freeh’s wife co-owns it with Kazeminy. The quit claim deed giving Freeh’s wife one-half ownership of the penthouse was signed nine days after Freeh’s vindication of Kazeminy.

Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in intelligence agencies and government.


Prosecute Torturers and Their Bosses
2014-12-21, New York Times
http://www.nytimes.com/2014/12/22/opinion/prosecute-torturers-and-their-bosse...

President Obama [has thus far] failed to bring to justice anyone responsible for the ... official government [torture] program conceived and carried out in the years after the attacks of Sept. 11, 2001. He did allow his Justice Department to investigate the C.I.A.'s destruction of videotapes of torture sessions and those who may have gone beyond the torture techniques authorized by President George W. Bush. But the investigation did not lead to any charges being filed. The American Civil Liberties Union and Human Rights Watch are ... calling for appointment of a special prosecutor to investigate what appears increasingly to be “a vast criminal conspiracy, under color of law, to commit torture and other serious crimes.” The question everyone will want answered, of course, is: Who should be held accountable? Any credible investigation should include former Vice President Dick Cheney; Mr. Cheney’s chief of staff, David Addington; the former C.I.A. director George Tenet; and John Yoo and Jay Bybee, the Office of Legal Counsel lawyers who drafted what became known as the torture memos. There are many more names that could be considered. Because of the Senate’s report, we now know the distance officials in the executive branch went to rationalize, and conceal, the crimes they wanted to commit. The question is whether the nation will stand by and allow the perpetrators of torture to have perpetual immunity for their actions.

Note: Some have called for prosecuting those responsible as violators of international rules against human experimentation. For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices and widespread government corruption.


With hackers running rampant, why would we poke holes in data security?
2014-12-14, LA Times
http://www.latimes.com/opinion/op-ed/la-oe-1215-wyden-backdoor-for-cell-phone...

Hardly a week goes by without a new report of some massive data theft that has put financial information, trade secrets or government records into the hands of computer hackers. The best defense against these attacks is clear: strong data encryption and more secure technology systems. U.S. intelligence agencies hold a different view. James Comey, the FBI director, is lobbying Congress to require that electronics manufacturers create intentional security holes — so-called back doors — that would enable the government to [easily] access data on every American's cellphone and computer. Building a back door into every cellphone, tablet, or laptop means deliberately creating weaknesses that hackers and foreign governments can exploit. What these officials are proposing would be bad for personal data security and bad for business. Built-in back doors have ... disastrous results. The U.S. House of Representatives recognized how dangerous this idea was and in June approved [an] amendment [to] prohibit the government from mandating that technology companies build security weaknesses into any of their products. I introduced legislation in the Senate to accomplish the same goal. Advances in technology always pose a new challenge to law enforcement agencies. But curtailing innovation on data security is no solution, and certainly won't restore public trust in tech companies or government agencies.

Note: Ron Wyden, a member of the Senate Intelligence Committee, wrote the article summarized above. The NSA routinely creates and exploits security holes in commercial encryption software and devices to spy on people, and shares the personal data it obtains with the CIA, FBI, IRS, and others through the DEA's Special Operations Division. What exactly is the FBI director asking congress for now?


Amid Details on Torture, Data on 26 Who Were Held in Error
2014-12-12, New York Times
http://www.nytimes.com/2014/12/13/us/politics/amid-details-on-torture-data-on...

One quiet consequence of this week’s sensational release of the Senate Intelligence Committee’s report on the C.I.A. detention program was a telephone call that a human rights lawyer, Meg Satterthwaite, placed to a client in Yemen, Mohamed Bashmilah. For eight years since Mr. Bashmilah, 46, was released from C.I.A. custody, Ms. Satterthwaite ... had been trying without success to get the United States government to acknowledge that it had held him in secret prisons for 19 months and to explain why. In the phone call on Wednesday, she told him that the Senate report listed him as one of 26 prisoners who, based on C.I.A. documents, had been “wrongfully detained.” After learning the news, Mr. Bashmilah pressed Ms. Satterthwaite, who heads the global justice program at New York University Law School, to tell him what might follow from the Senate’s recognition. Would there be an apology? Would there be some kind of compensation? Among the others mistakenly held for periods of months or years, according to the report, were an “intellectually challenged” man held by the C.I.A. solely to pressure a family member to provide information; two people who were former C.I.A. informants; and two brothers who were falsely linked to Al Qaeda. Ms. Satterthwaite was not able to answer Mr. Bashmilah’s question about an apology or reparation. No apology was forthcoming from the C.I.A., which declined to comment on specific cases.

Note: An ACLU lawsuit filed on behalf of Mr. Bashmilah and others flown to prisons on C.I.A. aircraft was dismissed on the grounds that it might expose state secrets. For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


CIA interrogations report sparks prosecution calls
2014-12-10, BBC News
http://www.bbc.com/news/world-us-canada-30407950

The UN and human rights groups have called for the prosecution of US officials involved in what a Senate report called the "brutal" CIA interrogation of al-Qaeda suspects. UN Special Rapporteur on Human Rights and Counter-Terrorism Ben Emmerson said that senior officials from the administration of George W Bush who planned and sanctioned crimes must be prosecuted, as well as CIA and US government officials responsible for torture. "As a matter of international law, the US is legally obliged to bring those responsible to justice," Mr Emmerson said in a statement made from Geneva. Correspondents say that the chances of prosecuting members of the Bush administration are unlikely. Several countries suspected to have hosted [CIA torture] sites reacted strongly to the publication. Poland's former president [Aleksander Kwasniewski] has publicly acknowledged for the first time [that] his country hosted a secret CIA prison. Lithuanian Prime Minister Algirdas Butkevicius called on the US to say whether CIA used his country to interrogate prisoners. Afghanistan's President Ashraf Ghani called the report "shocking", saying the actions "violated all accepted norms of human rights in the world".

Note: Read revealing excerpts from this most disturbing report. For more, read how the CIA teamed up with the UK's MI6 to kidnap people and deliver them to be tortured at a Libyan site in 2004. Could this US program have happened without strong international support?


Senate Report Rejects Claim on Hunt for Bin Laden
2014-12-09, New York Times
http://www.nytimes.com/2014/12/10/world/senate-report-raises-doubts-about-cia...

Months before the operation that killed Osama bin Laden in 2011, the Central Intelligence Agency secretly prepared a public-relations plan that would stress that information gathered from its disputed interrogation program had played a critical role in the hunt. Starting the day after the raid, agency officials in classified briefings made that point to Congress. But in page after page of previously classified evidence, the Senate Intelligence Committee report on C.I.A. torture, released Tuesday, rejects the notion that torturing detainees contributed to finding Bin Laden. The crucial breakthrough in the hunt was the identification of ... Abu Ahmed al-Kuwaiti. The United States had started wiretapping a phone number associated with Mr. Kuwaiti by late 2001. It was in 2004 that the C.I.A. came to realize that it should focus on finding Mr. Kuwaiti as part of the hunt for Bin Laden. [A man named] Hassan Ghul, who had been captured in Iraqi Kurdistan ... provided “the most accurate” intelligence that the agency produced about Mr. Kuwaiti’s role and ties to Bin Laden. Mr. Ghul provided all the important information about [Mr. Kuwaiti] before he was subjected to any torture techniques. During that [initial] two-day period in January 2004, “He opened up right away and was cooperative from the outset.” Nevertheless, the C.I.A. then decided to torture Mr. Ghul. During and after that treatment, he provided “no actionable threat information.”

Note: Read revealing excerpts from this most disturbing report.


FBI Says It Faked AP Story to Catch Bomb Suspect
2014-10-28, ABC News
http://abcnews.go.com/Technology/wireStory/ap-seattle-times-upset-fbi-imperso...

The FBI confirmed Tuesday it faked an Associated Press story to catch a bomb threat suspect in 2007. Police in Lacey, near Olympia, sought the FBI's help as repeated bomb threats prompted a week of evacuations at Timberline High School in June 2007. The agency obtained a warrant from a federal magistrate judge to send a "communication" to a social media account ... which contained a software tool that could verify Internet addresses, (and) turned out to be a link to a phony AP story about the bomb threats posted on a Web page created by the FBI. The 15-year-old suspect clicked on the link, revealing his computer's location. The FBI did not initially respond to AP's request earlier Tuesday for further detail about the fake story, beyond saying the ruse was necessary. AP spokesman Paul Colford said Tuesday the FBI's "ploy violated AP's name and undermined AP's credibility." "We are extremely concerned and find it unacceptable that the FBI misappropriated the name of The Associated Press and published a false story attributed to AP." Kathy Best, editor of The Seattle Times, said in a statement that, "The FBI, in placing the name of The Associated Press on a phony story sent to a criminal suspect, crossed a line and undermined the credibility of journalists everywhere — including at The Times." The documents revealing the deception were publicized Monday on Twitter by Christopher Soghoian, the principal technologist for the American Civil Liberties Union.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


FBI director attacks tech companies for embracing new modes of encryption
2014-10-16, The Guardian
http://www.theguardian.com/us-news/2014/oct/16/fbi-director-attacks-tech-comp...

The director of the FBI savaged tech companies for their recent embrace of end-to-end encryption and suggested rewriting laws to ensure law enforcement access to customer data in a speech on Thursday. James Comey said data encryption such as that employed on Apple’s latest mobile operating system would deprive police and intelligence companies. Privacy advocates contend Comey is demagoguing the issue. It took a June supreme court ruling, they point out, for law enforcement to abandon its contention that it did not require warrants at all to search through smartphones or tablets, and add that technological vulnerabilities can be exploited by hackers and foreign intelligence agencies as well as the US government. Tech companies contend that their newfound adoption of encryption is a response to overarching government surveillance, much of which occurs ... without a warrant, subject to a warrant broad enough to cover indiscriminate data collection, or under a gag order following a non-judicial subpoena. Comey did not mention such subpoenas, often in the form of National Security Letters, in his remarks. Comey acknowledged that the Snowden disclosures caused “justifiable surprise” among the public about the breadth of government surveillance, but hoped to mitigate it through greater transparency and advocacy. Yet the FBI keeps significant aspects of its surveillance reach hidden even from government oversight bodies. Intelligence officials said in a June letter to a US senator that the FBI does not tally how often it searches through NSA’s vast hoards of international communications, without warrants, for Americans’ identifying information. Comey frequently described himself as being technologically unprepared to offer specific solutions, and said he meant to begin a conversation, even at the risk of putting American tech companies at a competitive disadvantage.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


Chat logs reveal FBI informant Sabu’s role in hacking of Sun newspaper
2014-10-14, The Guardian
http://www.theguardian.com/us-news/2014/oct/14/fbi-informants-role-hacking-su...

The FBI is facing questions over its role in a 2011 hacking attack on Rupert Murdoch’s Sun newspaper in the UK after the publication of chat logs showed that a man acting as an agency informant played a substantial role in the operation. The attack was so successful that the publisher took down the websites of the Sun and the Times while technicians worked out the scale of the hack. Unsealed documents ... seen by the Guardian, show Hector Xavier Monsegur – known widely online as “Sabu” and frequently referred to as the leader of Lulzsec – played an active role in the operation. The chat records show Monsegur encouraging others to break further into News International systems, claiming to have sources at the Sun, and even apparently helping to break staff’s passwords and to source files for stealing. Monsegur was, however, at that time operating under the direction of the FBI. The close involvement of an FBI asset working under extraordinarily close supervision in a hacking attack on a media outlet ultimately owned by a US-listed company is set to raise further questions about the agency’s approach to tackling online crime. The logs also show Sabu on multiple occasions offering detailed technical help to find additional records on different servers, breaking in to new servers, or obtaining more files – which could easily have included those belonging to journalists at either the Sun or Times. The Sun, which is challenging the UK government over police accessing the phone records of one of its reporters, declined to comment on the apparent FBI involvement in attacks on its servers.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources. For an in-depth look at how these practices have been shown to interfere with a free press, see these excellent, reliable Mass Media Resources.


Court Spotlights the FBI’s Super-Secret National Security Letters
2014-10-09, The Intercept
https://firstlook.org/theintercept/2014/10/09/court-spotlight-super-secret-na...

[National security letters], the reach of which was expanded under the Patriot Act in 2001, let the FBI get business records from telephone, banking, and Internet companies with just a declaration that the information is relevant to a counterterrorism investigation. The FBI can get such information with a subpoena or another method with some judicial oversight. Can the government make demands for data entirely in secret? That was the question yesterday before a federal appeals court in San Francisco, where government lawyers argued that National Security Letters — FBI requests for information that are so secret they can’t be publicly acknowledged by the recipients — were essential to counterterrorism investigations. One of the judges seemed to question why there was no end-date on the gag orders, and why the burden was on the recipients of NSLs to challenge them. “It leaves it to the poor person who is subject to those requirements to just constantly petition the government to get rid of it,” said the judge, N. Randy Smith. The FBI sends out thousands of NSLs each year – 21,000 in fiscal year 2012. Google, Yahoo, Facebook and Microsoft filed a brief in support of the NSL challenge, arguing that they want to “publish more detailed aggregate statistics about the volume, scope and type of NSLs that the government uses to demand information about their users.” Twitter also announced this week that it was suing the U.S. government over restrictions on how it can talk about surveillance orders. Tech companies can currently make public information about the number of NSLs or Foreign Intelligence Surveillance Court orders they receive in broad ranges, but Twitter wants to be more specific.

Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.


Resurrecting a Disgraced Reporter
2014-10-02, New York Times
http://www.nytimes.com/2014/10/05/movies/kill-the-messenger-recalls-a-reporte...

As part of their insurgency against the Sandinista government in Nicaragua, some of the C.I.A.-backed contras made money through drug smuggling, transgressions noted in a little-noticed 1988 Senate subcommittee report. Gary Webb, a journalist at The San Jose Mercury News, thought it was a far-fetched story to begin with, but in 1995 and 1996, he dug in and produced a deeply reported and deeply flawed three-part series called Dark Alliance. That groundbreaking series was among the first to blow up on the nascent web, and he was initially celebrated, then investigated and finally discredited. Pushed out of journalism in disgrace, he committed suicide in 2004. [The movie] Kill the Messenger ... suggests that he told a truth others were unwilling to. Mr. Webb was not the first journalist to come across [such matters]. In December 1985, The Associated Press reported that three contra groups had engaged in cocaine trafficking, in part to help finance their war against Nicaragua. Major news outlets mostly gave the issue a pass. Peter Landesman, an investigative journalist who wrote the screenplay, was struck by the reflex to go after Mr. Webb. Planeloads of weapons were sent south from the U.S., and everyone knows that those planes didnt come back empty, but the C.I.A. made sure that they never knew for sure what was in those planes, he said. But instead of going after that, they went after Webb." In 1998, Frederick P. Hitz, the C.I.A. inspector general, testified before the House Intelligence Committee that after looking into the matter at length, he believed the C.I.A. was a bystander or worse in the war on drugs. However dark or extensive, the alliance Mr. Webb wrote about was a real one.

Note: Webb's story was not deeply flawed, as reported in this article. His editor even commented that four Washington Post writers could not find one significant factual error, but then changed his mind after CIA leaders threatened the paper. Read a Sacrament Bee newspaper article for more on Webb and his story. For more along these lines, see the excellent, reliable resources provided in our Mass Media Information Center.


George Brandis has silently swept away your freedoms
2014-09-29, Sydney Morning Herald (Australia's leading newspaper)
http://www.smh.com.au/comment/george-brandis-has-silently-swept-away-your-fre...

Australia has changed radically since last week though it might not look like it on the surface. Late Thursday night the Senate passed the National Security Amendment Bill (No.1) 2014 giving unlimited power to spies and secret police. Now officials can break the law with immunity from prosecution - and without having to answer to a court. They can act in total secrecy. They will decide what they do and to whom and when. They do not have to ask permission. They will choose when to interfere in your life and when they won't. They can dip into your most private communications and they don't need a warrant to do so. Sometimes they will do it because it is necessary to fight crime. Sometimes because they enjoy it. If they mess up your life and you tell anybody, you will get 10 years' jail – even if it doesn't harm security. When a Special Intelligence Operation (SIO) is declared then any participant can break the law on you with no consequences, according to Schedule 3 section 35k. There are broad limits. They cannot kill or torture you, or cause significant physical injury. Minor injury or mental torment is fine. Anyone involved in an SIO will have these powers – but who are they? ASIO, with 1778 staff. The Australian Federal Police, with more than 6900 staff. NSW Police with about 16,370 officers and a spy database called COPS which has more than 30 million entries on the people of NSW. But not just them. Anyone involved in an SIO enjoys legal immunity, including affiliates and subcontractors – whoever they are. Many Senators clearly hadn't read the 128 pages of major legal changes in the NSA Bill. The citizen needs protection from the state built into the laws and that is what they smashed on Thursday.

Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


Who profits from our new war? Inside NSA and private contractors’ secret plans
2014-09-24, Salon
http://www.salon.com/2014/09/24/heres_who_profits_from_our_new_war_inside_nsa...

A massive, $7.2 billion Army intelligence contract signed just 10 days ago underscores the central role to be played by the National Security Agency and its army of private contractors in the unfolding air war being carried out by the United States and its Gulf States allies against the Islamic State in Iraq and Syria. INSCOM’s “global intelligence support” contract will place the contractors at the center of this fight. Under its terms, 21 companies, led by Booz Allen Hamilton, BAE Systems, Lockheed Martin and Northrop Grumman, will compete over the next five years to provide “fully integrated intelligence, security and information operations” in Afghanistan and “future contingency operations” around the world. INSCOM announced the global intelligence contract two days after President Obama, in a speech to the nation, essentially declared war on ISIS in Iraq and Syria and outlined a campaign of airstrikes and combat actions to “degrade and ultimately destroy” the terrorist group. The top contractors on the INSCOM contract are already involved in the war. Lockheed Martin, for example, makes the Hellfire missiles that are used extensively in U.S. drone strikes. Northrop Grumman makes the Global Hawk surveillance drone. Both companies have large intelligence units. 70 percent of the U.S. intelligence budget is spent on private contractors. This spending [is] estimated at around $70 billion a year. [There is a] revolving door between INSCOM and its contractors. The system is corrupted by the close relationships between the companies and their agencies, said [Tom] Drake, who as a whistle-blower was nearly sent to prison for exposing the waste, fraud and abuse in a contracted program at the NSA that ended up losing over $7 billion.

Note: Read a powerful essay written by a top US general showing how he was fooled into supporting wars that were generated by the powerful global elite who want never-ending war in order to keep their profits flowing.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"