Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


Glenn Greenwald: the explosive day we revealed Edward Snowden's identity to the world
2014-05-11, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/may/11/glenn-greenwald-nsa-whistleblowe...

On Sunday 9 June 2013, the Guardian published the story that revealed [Edward] Snowden to the world. The article told Snowden's story, conveyed his motives, and proclaimed that "Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley [now Chelsea] Manning." We quoted [a note from Snowden that said:] "I understand that I will be made to suffer for my actions … but I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant." The reaction to the article and the video was more intense than anything I had experienced as a writer. Ellsberg himself, writing the following day in the Guardian, proclaimed that "there has not been in American history a more important leak than Edward Snowden's release of NSA material – and that definitely includes the Pentagon Papers 40 years ago". Several hundred thousand people posted the link to their Facebook accounts in the first several days alone. Almost three million people watched the interview on YouTube. Many more saw it on the Guardian's website. The overwhelming response was shock and inspiration at Snowden's courage.

Note: Don't miss the full, exciting story of how Snowden originally came to leak his stunning information at the link above. This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


9/11 conspiracy theorist and investigative journalist 'commits suicide'
2014-04-15, Daily Mail (One of the UK's largest-circulation newspapers)
http://www.dailymail.co.uk/news/article-2605429/9-11-conspiracy-theorist-inve...

9/11 [activist] and investigative journalist Michael Ruppert has reportedly committed suicide. The 63-year-old former narcotics investigator with the LAPD shot himself after his radio show, according to an announcement by author Carolyn Baker who was a guest on his final broadcast on [April 13]. Mr Ruppert was famous for his litany of conspiracy theories which encompassed the CIA to drugs, international politics, the oil industry, Wall Street and 9/11. On her Facebook page, Ms Baker wrote: 'This was not a ''fake'' suicide. It was very well planned by Mike who gave us few clues but elaborate instructions for how to proceed without him.' After leaving the LAPD, Mr Ruppert started a website From The Wilderness which claimed to expose government corruption. It included his claims that he had seen drug-dealing at the CIA. Mr Ruppert gained notoriety by confronting then-CIA Director John Deutch during a meeting in 1995 and telling him that he had seen CIA officers involved in drug-dealing. He later claimed on his website that the CIA and American government was involved in 9/11. In 2004, he published Crossing the Rubicon: The Decline of the American Empire at the End of the Age of Oil. The book alleged that former VP Dick Cheney had conspired with Wall Street and other government officials over the September 11 World Trade Center attacks. In 2009, he starred in a documentary called Collapse where he spoke about his theories involving the demise of mankind following the economic and energy crises.

Note: Mike Ruppert was a great hero who courageously reported reliable information the mainstream media would not touch. For a five-minute video of his public testimony on CIA drug running, click here. For a 10-minute video showing his great despair about the condition of the world, click here. Thank you, Mike, for opening the eyes of so many to the deeper realities in our world. Another courageous hero of the 9/11 movement, John Judge, also died, from complications of a stroke, on April 15. For more on his great work, click here. For a great 8-minute video of his revealing powerful information you may not know, click here.


Stories about NSA surveillance, Snowden leaks win Pulitzers for two news groups
2014-04-14, CNN
http://www.cnn.com/2014/04/14/us/pulitzer-prizes-journalism

Two news organizations' stories about National Security Agency surveillance, based upon documents leaked by Edward Snowden, have been awarded the Pulitzer Prize for public service, often described as the highest prize in American journalism. The Washington Post and ... The Guardian each received the prize on [April 14]. The recognition of the NSA reporting was most significant because of the questions raised by Snowden's leaks and the reaction to them. Snowden, who has been living in Russia while seeking asylum from U.S. prosecution, said in a statement that the Pulitzer board's recognition of the coverage was "vindication for everyone who believes that the public has a role in government." "We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance." While Snowden provided a trove of documents, reporters including Glenn Greenwald, working for the Guardian; Barton Gellman, working for The Post; and Laura Poitras, who worked with both, pored over the raw information, decided with their editors what parts were ethical to publish, and turned the information into stories that stunned readers around the world.

Note: For more on the historic Snowden revelations, see the deeply revealing reports from reliable major media sources available here.


The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket
2014-04-04, The Intercept
https://firstlook.org/theintercept/2014/04/04/cuban-twitter-scam-social-media...

This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. This sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda. Those programs, carried out in secrecy and with little accountability ... threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.

Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


NSA posed as Facebook to infect computers with malware, report says
2014-03-12, Los Angeles Times
http://www.latimes.com/business/technology/la-fi-tn-nsa-posing-facebook-malwa...

The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.

Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.


Behind Clash Between C.I.A. and Congress, a Secret Report on Interrogations
2014-03-08, New York Times
http://www.nytimes.com/2014/03/08/us/politics/behind-clash-between-cia-and-co...

It was early December when the Central Intelligence Agency began to suspect it had suffered what it regarded as an embarrassing computer breach. Investigators for the Senate Intelligence Committee, working in the basement of a C.I.A. facility in Northern Virginia, had obtained an internal agency review summarizing thousands of documents related to the agency’s detention and interrogation program. Parts of the C.I.A. report cast a particularly harsh light on the program, the same program the agency was in the midst of defending in a prolonged dispute with the intelligence committee. What the C.I.A. did next opened a new and even more rancorous chapter in the struggle over how the history of the interrogation program will be written. Agency officials began scouring the digital logs of the computer network used by the Senate staff members to try to learn how and where they got the report. Their search not only raised constitutional questions about the propriety of an intelligence agency investigating its congressional overseers, but has also resulted in two parallel inquiries by the Justice Department — one into the C.I.A. and one into the committee. Each side accuses the other of spying on it, with the Justice Department now playing the uneasy role of arbitrator in the bitter dispute. “It’s always been a dicey proposition to be investigating Congress,” said W. George Jameson, a C.I.A. lawyer for decades. “You don’t do it lightly.”

Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.


Who Tried to Silence Drone Victim Kareem Khan?
2014-02-25, The Intercept
https://firstlook.org/theintercept/2014/02/25/tried-silence-drone-victim-kare...

In the early morning hours of February 5, a group of armed men – some dressed in Pakistani police uniforms – appeared at Kareem Khan’s home, awoke him and his family at gunpoint, and took him away in an unmarked vehicle. Khan was hooded, shackled around the wrists and ankles, and driven for hours, eventually arriving at a building where he was thrown into a windowless holding cell. There he stayed for more than a week, during which he was subjected to sensory deprivation and physical abuse. Khan says he was repeatedly beaten on the soles of his feet and threatened with death by his captors. He was kept hooded and shackled for most of the day, and fed only dry bread and water. Khan has no doubts about why he was targeted. He is the first person to attempt a legal challenge to the CIA drone program in Pakistan, after his son and brother were killed in a drone strike near his home in North Waziristan on December 31st 2009. His abduction and detention occurred just over a week before Khan was to travel with [his Pakistani lawyer, Shahzad] Akbar and Jennifer Gibson, a lawyer with the UK-based legal charity Reprieve, to speak with European parliamentarians about the CIA drone program. Among the topics of discussion were the extralegal nature of the program, as well as covert intelligence sharing by European spy agencies. While in captivity, Khan was interrogated by men who refused to identify themselves, and who questioned him repeatedly about his plans to speak with the media and about the cases of others who had been killed by drones. Since the start of the “War on Terror” it has been estimated by local human rights groups that as many as 8,000 Pakistani citizens have been “disappeared” by local intelligence agencies, often at the behest of their American counterparts.

Note: The Intercept is the new media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for their independence. For more on the atrocities committed by the US and UK in the illegal "global war on terror", see the deeply revealing reports from reliable major media sources available here.


Judge Tosses Muslim Spying Suit Against NYPD, Says Any Damage Was Caused by Reporters Who Exposed It
2014-02-21, The Intercept
https://firstlook.org/theintercept/2014/02/21/judge-tosses-muslim-spying-suit...

A federal judge in Newark has thrown out a lawsuit against the New York Police Department for spying on New Jersey Muslims, saying if anyone was at fault, it was the Associated Press for telling people about it. In his ruling ... U.S. District Court Judge William J. Martini simultaneously demonstrated the willingness of the judiciary to give law enforcement alarming latitude in the name of fighting terror, greenlighted the targeting of Muslims based solely on their religious beliefs, and blamed the media for upsetting people by telling them what their government was doing. The NYPD’s clandestine spying on daily life in Muslim communities in the region — with no probable cause, and nothing to show for it — was exposed in a Pulitzer-Prize winning series of stories by the AP. The stories described infiltration and surveillance of at least 20 mosques, 14 restaurants, 11 retail stores, two grade schools, and two Muslim student associations in New Jersey alone. In a cursory, 10-page ruling issued before even hearing oral arguments, Martini essentially said that what the targets didn’t know didn’t hurt them: "None of the Plaintiffs’ injuries arose until after the Associated Press released unredacted, confidential NYPD documents and articles expressing its own interpretation of those documents. Nowhere in the Complaint do Plaintiffs allege that they suffered harm prior to the unauthorized release of the documents by the Associated Press. This confirms that Plaintiffs’ alleged injuries flow from the Associated Press’s unauthorized disclosure of the documents. The harms are not “fairly traceable” to any act of surveillance."

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


The NSA’s Secret Role in the U.S. Assassination Program
2014-02-10, The Intercept (With Glenn Greenwald)
https://firstlook.org/theintercept/article/2014/02/10/the-nsas-secret-role/

The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone. The former JSOC drone operator ... states that innocent people have “absolutely” been killed as a result. Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. The Obama administration has repeatedly insisted that its operations kill terrorists with the utmost precision. Within the NSA ... a motto quickly caught on at Geo Cell: ‘We Track ’Em, You Whack ’Em.’” In December 2009, utilizing the NSA’s metadata collection programs, the Obama administration dramatically escalated U.S. drone and cruise missile strikes in Yemen. The first strike in the country known to be authorized by Obama targeted an alleged Al Qaeda camp in the southern village of al-Majala. The strike, which included the use of cluster bombs, resulted in the deaths of 14 women and 21 children.

Note: For an in-depth interview on this important topic, click here. Would anyone in a developed country tolerate their citizens being killed by the drones of a foreign government? Note also that The Intercept is the new media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for the their independence.


N.S.A. Devises Radio Pathway Into Computers
2014-01-15, New York Times
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-conn...

The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.

Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.


The WikiLeaks Mole
2014-01-06, Rolling Stone
http://www.rollingstone.com/politics/news/the-wikileaks-mole-20140106

Sigurdur "Siggi" Thordarson, [is a] cherubic, blond 21-year-old who has been called everything in the [Icelandic] press from "attention seeker" to "traitor" to "psychopath". Four years ago, just as WikiLeaks was winning international notoriety, the then-17-year-old hacking prodigy became Assange's youngest and most trusted sidekick. But as Assange became more embattled and besieged, the protégé turned on his mentor in the most shocking of ways: becoming the first FBI informant inside the group. His tale reveals not only the paranoia and strife within WikiLeaks, but just how far the feds were willing to go to get Assange. The revelation of Siggi's role as an FBI snitch has polarized WikiLeaks insiders. WikiLeaks spokesman Kristinn Hrafnsson [dismissed] Siggi as "a pathological liar." While other WikiLeaks insiders also question Siggi's credibility, they insist that his story can't be discounted, and there's more to it than the organization is letting on. The truth, it seems, may be held in the leaks. Siggi has provided Rolling Stone with more than a terabyte of secret files he claims to have taken from WikiLeaks before he left in November 2011 and gave to the FBI: thousands of pages of chat logs, videos, tapped phone calls, government documents and more than a few bombshells from the organization's most heated years. Whatever their origins, the SiggiLeaks are a deep and revealing portal into one of the most guarded and influential organizations of the 21st century – and the extreme measures its embattled leader is willing to take.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


I worked on the US drone program. The public should know what really goes on
2013-12-29, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2013/dec/29/drones-us-military

Whenever I read comments by politicians defending the Unmanned Aerial Vehicle Predator and Reaper program – aka drones – I wish I could ask them a few questions. I'd start with: "How many women and children have you seen incinerated by a Hellfire missile?" Few of these politicians who so brazenly proclaim the benefits of drones have a real clue of what actually goes on. I, on the other hand, have seen these awful sights first hand. What the public needs to understand is that the video provided by a drone is not usually clear enough to detect someone carrying a weapon, even on a crystal-clear day. This makes it incredibly difficult for the best analysts to identify if someone has weapons for sure. One example comes to mind: "The feed is so pixelated, what if it's a shovel, and not a weapon?" I felt this confusion constantly, as did my fellow UAV analysts. We always wonder if ... we destroyed an innocent civilian's life all because of a bad image or angle. I know the feeling you experience when you see someone die. Horrifying barely covers it. When you are exposed to it over and over again it becomes like a small video, embedded in your head, forever on repeat, causing psychological pain and suffering. UAV troops are victim to not only the haunting memories of this work that they carry with them, but also the guilt of always being a little unsure of how accurate their confirmations of weapons or identification of hostile individuals were. The UAVs in the Middle East are used as a weapon, not as protection, and as long as our public remains ignorant to this, this serious threat to the sanctity of human life – at home and abroad – will continue.

Note: For more on war crimes committed by the US and UK in the illegal "global war on terror", see the deeply revealing reports from reliable major media sources available here.


NSA’s indiscriminate spying ‘collapsing,’ Snowden says in open letter
2013-12-17, Washington Post/Associated Press
http://www.washingtonpost.com/world/nsas-indiscriminate-spying-collapsing-sno...

National Security Agency leaker Edward Snowden wrote in a lengthy “open letter to the people of Brazil” that he has been inspired by the global debate ignited by his release of thousands of documents and that the NSA’s culture of indiscriminate global espionage “is collapsing.” In the letter, Snowden commended the Brazilian government for its strong stand against U.S. spying. He wrote that he would be willing to help the South American nation investigate NSA spying on its soil but could not fully participate in doing so without being granted political asylum, because the U.S. “government will continue to interfere with my ability to speak.” The documents revealed that Brazil is the top NSA target in Latin America, in spying that has included the monitoring of Brazilian President Dilma Rousseff’s cellphone and hacking into the internal network of the state-run oil company Petrobras. In his letter, Snowden dismissed U.S. explanations to the Brazilian government and others that the bulk metadata gathered on billions of e-mails and calls was more “data collection” than surveillance. “There is a huge difference between legal programs, legitimate spying ... and these programs of dragnet mass surveillance that put entire populations under an all-seeing eye and save copies forever,” he wrote. “These programs were never about terrorism: they’re about economic spying, social control, and diplomatic manipulation. They’re about power.” Brazilian senators have asked for Snowden’s help during hearings about the NSA’s targeting of Brazil, an important transit hub for transatlantic fiber-optic cables that are hacked.

Note: To read Snowden's full, inspiring letter, click here.


The Soviet Union Spent $1 Billion On Mind-Control Experiments During The Cold War As Part Of Arms Race With The US: Report
2013-12-16, International Business Times
http://www.ibtimes.com/soviet-union-spent-1-billion-mind-control-experiments-...

The battle between the U.S. and the Soviet Union during the Cold War, for technological and scientific one-upmanship, included a costly effort that involved the two superpowers' attempts to develop mind-control weapons, according to a new study. A blog post at the Physics arXiv Blog, citing a new paper by researcher Serge Kernbach, said that both the U.S. and the Soviet Union experimented with parapsychology, mind control and remote influence. And, while some of the work conducted by the U.S. on these topics is now public, much less is known about the Soviet body of knowledge, which reportedly cost about a billion dollars to gather. “The Soviets had a similar program. This included experiments in parapsychology, which the Soviets called psychotronics,” the blogpost said. “The work built on a long-standing idea in Soviet science that the human brain could receive and transmit a certain kind of high frequency electromagnetic radiation and that this could influence other objects too.” Kernbach provided an overview of the Soviet Union’s efforts in unconventional research between 1917 and 2003, [based] on publications in Russian technical journals and recently declassified documents. The U.S. developed a 20-year CIA program, called Project MKULTRA, which began in the early 1950s to study ways of manipulating people’s minds and altering their brain functions. The Soviets too focused on a similar program and developed a device called a "cerpan" that could generate and store high-frequency electromagnetic radiation produced by the human brain in hopes of influencing other objects.

Note: For an excellent two-page summary of reliable information on secret government mind control programs, click here. For more on mind control research and operations by the CIA, see the deeply revealing reports from reliable major media sources available here.


NSA review to leave spying programs largely unchanged, reports say
2013-12-13, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/dec/13/nsa-review-to-leave-spying-progr...

A participant in a White House-sponsored review of surveillance activities described as “shameful” an apparent decision to leave most of the National Security Agency’s controversial bulk spying intact. Sascha Meinrath, director of the Open Technology Institute, said [on December 13] that ... “The review group was searching for ways to make the most modest pivot necessary to continue business as usual.” Should the review group’s report resemble descriptions that leaked ... the report “does nothing to alter the lack of trust the global populace has for what the US is doing, and nothing to restore our reputation as an ethical internet steward,” said Meinrath, who met with the advisory panel and White House officials twice to discuss the bulk surveillance programs that have sparked international outrage. Leaks about the review group’s expected recommendations to the New York Times and Wall Street Journal strengthened Meinrath and other participants’ long-standing suspicions that much of the NSA’s sweeping spy powers would survive. The Times quoted an anonymous official familiar with the group saying its report “says we can’t dismantle these programs, but we need to change the way almost all of them operate”. According to the leaks, the review group will recommend that bulk collection of every American’s phone call data continue, possibly by the phone companies instead of the NSA, with tighter restrictions than the “reasonable, articulable suspicion” standard for searching through them that the NSA currently employs.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


Law enforcement using methods from NSA playbook
2013-12-08, USA Today
http://www.usatoday.com/story/news/nation/2013/12/08/cellphone-data-spying-ns...

The National Security Agency isn't the only government entity secretly collecting data from people's cellphones. Local police are increasingly scooping it up, too. Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information about thousands of cellphone users at a time, whether they are targets of an investigation or not. The records, from more than 125 police agencies in 33 states, reveal [that] about one in four law-enforcement agencies have used a tactic known as a "tower dump," which gives police data about the identity, activity and location of any phone that connects to the targeted cellphone towers over a set span of time, usually an hour or two. A typical dump covers multiple towers, and wireless providers, and can net information from thousands of phones. At least 25 police departments own a Stingray, a suitcase-size device that costs as much as $400,000 and acts as a fake cell tower. The system, typically installed in a vehicle so it can be moved into any neighborhood, tricks all nearby phones into connecting to it and feeding data to police. In some states, the devices are available to any local police department via state surveillance units. Organizations such as the American Civil Liberties Union and Electronic Privacy Information Center say the swelling ability by even small-town police departments to easily and quickly obtain large amounts of cellphone data raises questions about the erosion of people's privacy as well as their Fourth Amendment protections against unreasonable search and seizure.

Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.


Canada allowed widespread NSA surveillance at 2010 G20 summit
2013-11-28, NBC News/Reuters
http://www.nbcnews.com/id/53688035#.UpkAXo2f8h0

Canada allowed the U.S. National Security Agency (NSA) to conduct widespread surveillance during the 2010 Group of 20 summit in Toronto, according to a media report that cited documents from former NSA contractor Edward Snowden. The report by the Canadian Broadcasting Corp ... cited briefing notes it said showed the United States turned its Ottawa embassy into a security command post during a six-day spying operation by the top-secret U.S. agency as President Barack Obama and other world leaders met that June. One of the bylines on the CBC report was Glenn Greenwald, the U.S. journalist who has worked with Snowden on several other NSA stories. CBC ... quoted an NSA briefing note describing the operation as "closely coordinated with the Canadian partner". The Canadian equivalent of the NSA is the Communications Security Establishment Canada, or CSEC. CBC said the documents did not reveal the targets of the NSA operation, but described part of the U.S. eavesdropping agency's mandate at the Toronto summit as "providing support to policymakers". CSEC, which has a very low public profile, employs about 2,000 people. It is part of the so-called Five Eyes intelligence-sharing network that also includes the United States, Britain, New Zealand and Australia. Last month, Brazil angrily demanded an explanation for media reports which said CSEC agents had targeted its mines and energy industry.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Robert F. Kennedy saw conspiracy in JFK’s assassination
2013-11-24, Boston Globe
https://www.bostonglobe.com/metro/2013/11/24/his-brother-keeper-robert-kenned...

Much has been made of Bobby Kennedy’s impossible burden following the assassination of his brother. A review of [documents released as recently as a few months ago] by the Globe, fortified by the work of historians and new interviews with former Kennedy aides, paints a picture of a brother responding to the assassination with equal parts crippling grief and growing suspicions. In the five years between his brother’s murder and his own assassination in 1968, Bobby Kennedy voiced public support for the findings of the Warren Commission, namely that a pathetic, attention-seeking gunman had alone been responsible for the murder of President Kennedy. Privately, though, Bobby was dismissive of the commission, seeing it ... as a public relations tool. After hearing the news out of Dallas, it’s clear that he quickly focused his attention on three areas of suspicion: Cuba, the Mafia, and the CIA. Crucially, Bobby had become his brother’s point man in managing all three of those highly fraught portfolios. And by the time the president was gunned down, Bobby understood better than anyone how all three had become hopelessly interwoven, and how much all three bore his own imprint. For while John Kennedy was the one gunned down, Bobby had reason to believe he may have been the ultimate target. Walking the grounds of Hickory Hill just an hour after receiving confirmation of his brother’s death, Bobby confided in an aide something truly unsettling. That aide, Edwin Guthman, would later recount it in his book “We Band of Brothers.” “I thought they would get one of us,” Bobby said, adding, “I thought it would be me.”

Note: In 2006, BBC reported that CIA operatives were directly involved in Robert Kennedy's assassination, and that Sirhan Sirhan may have been a programmed Manchurian Candidate. For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.


US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data
2013-11-20, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/20/us-uk-secret-deal-surveillance-p...

The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden. In the first explicit confirmation that UK citizens have been caught up in US mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo ... says the material is being put in databases where it can be made available to other members of the US intelligence and military community. Until now, it had been generally understood that the citizens of each country were protected from surveillance by any of the others. But the Snowden material reveals that: • In 2007, the rules were changed to allow the NSA to analyse and retain any British citizens' mobile phone and fax numbers, emails and IP addresses swept up by its dragnet. • These communications were "incidentally collected" by the NSA, meaning the individuals were not the initial targets of surveillance operations and therefore were not suspected of wrongdoing. • The NSA has been using the UK data to conduct so-called "pattern of life" or "contact-chaining" analyses, under which the agency can look up to three "hops" away from a target of interest – examining the communications of a friend of a friend of a friend. Three hops for a typical Facebook user could pull the data of more than 5 million people into the dragnet.

Note: For more on government threats to privacy, see the deeply revealing reports from reliable major media sources available here.


FISA court order that allowed NSA surveillance is revealed for first time
2013-11-19, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/nov/19/court-order-that-allowed-nsa-sur...

A secret court order that authorised a massive trawl by the National Security Agency of Americans' email and internet data was published for the first time on [November 18], among a trove of documents that also revealed a judge's concern that the NSA "continuously" and "systematically" violated the limits placed on the program. Another later court order found that what it called "systemic overcollection" had taken place. In a heavily redacted opinion Colleen Kollar-Kotelly, the former presiding judge of the FISA court, placed legal weight on the methods of surveillance employed by the NSA, which had never before collected the internet data of “an enormous volume of communications”. The methods, known as pen registers and trap-and-trace devices, record the incoming and outgoing routing information of communications. Kollar-Kotelly ruled that acquiring the metadata, and not the content, of email and internet usage in bulk was harmonious with the “purpose” of Congress and prior court rulings – even though no surveillance statute ever authorized it and top officials at the Justice Department and the FBI threatened to resign in 2004 over what they considered its dubious legality. The type of data collected under the program included information on the "to", "from" and "bcc" lines of an email rather than the content. Metadata, wrote Kollar-Kotelly, enjoyed no protection under the fourth amendment to the US constitution, a precedent established by the Supreme Court in 1979 in a single case on which the NSA relies currently.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"