News StoriesExcerpts of Key News Stories in Major Media
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Despite his age, 63-year-old Kazuo Niitsuma believes there are many more years of fishing ahead of him. The sea is in his family's blood, he says. His octogenarian father began working on boats when he was 12, and only retired three years ago. But ... Niitsuma knows he may never again get the chance to board his boat and head out into the Pacific in search of sole, whitebait, flounder and greenling. The greatest threat to Niitsuma's livelihood, and that of other fishermen in Hisanohama ... lies just up the coast at the Fukushima Daiichi nuclear power plant. The environment ministry recently announcement that 300 tonnes of contaminated groundwater from Fukushima Daiichi is still seeping over or around barriers into the Pacific every day, more than two years after it was struck by a tsunami in March 2011. Government officials said they suspected the leaks had started soon after the accident. The admission by the ministry, confirmed by Tokyo Electric Power (Tepco), which runs the plant, is likely to keep Hisanohama's 40 fishing boats in port for the foreseeable future. Tepco's failure to handle the contaminated water – and accusations that it tried to cover up the leaks – is a serious setback to attempts to clean up Fukushima Daiichi, 18 months after the government declared it had reached a "safe" state known as cold shutdown. "I haven't been able to fish since the tsunami," Niitsuma said. "People want to be reassured that they are buying fish that is safe to eat, and we can't give them that guarantee at the moment."
Note: Declaring the situation an "emergency", the Japanese government has stepped in to take over control of the response from Tepco. For more on this, click here. For a National Geographic article on what you need to know about the radioactive contamination of the Pacific Ocean by the Fukushima disaster, click here. It reports that scientists have estimated that contaminated seawater could reach the West Coast of the United States in five years or less. For more on the environmental devastation of nuclear power, see the deeply revealing reports from reliable major media sources available here.
GCHQ has received at least Ł100 million from the US to help fund intelligence gathering, raising questions over American influence on the British agencies. The money was paid across a range of projects over three years and resulted in GCHQ spying on behalf of America, according to leaked documents. It also emerged that the intelligence agency wants the ability to “exploit any phone, anywhere, any time” and that some staff have raised concerns over the “morality and ethics” of their operational work. The payments from the US National Security Agency (NSA) are detailed in GCHQ’s annual “investment portfolios”, leaked by Mr Snowden to The Guardian. The NSA paid GCHQ Ł22.9 million in 2009, Ł39.9 million in 2010 and Ł34.7 million in 2011/12. The 2010 funding included ... Ł17.2 million for the agency’s “Mastering the Internet” project, which gathers “raw” information from the web to be analysed. In return, GCHQ has to have the American view in mind when prioritising work, the papers claim. One strategy briefing disclosed the pressure on GCHQ to meet NSA demands, saying: “GCHQ must pull its weight and be seen to pull its weight.” In another document, from 2010, GCHQ apparently acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
Over the last year, I [CNN Chief Medical Correspondent Dr. Sanjay Gupta] have been working on a new documentary called "Weed." The title "Weed" may sound cavalier, but the content is not. I traveled around the world to interview medical leaders, experts, growers and patients. I spoke candidly to them, asking tough questions. What I found was stunning. Long before I began this project, I had steadily reviewed the scientific literature on medical marijuana from the United States and thought it was fairly unimpressive. Reading these papers five years ago, it was hard to make a case for medicinal marijuana. I even wrote about this in a TIME magazine article, back in 2009, titled "Why I would Vote No on Pot." Well, I am here to apologize. I apologize because I didn't look hard enough, until now. I didn't look far enough. I didn't review papers from smaller labs in other countries doing some remarkable research, and I was too dismissive of the loud chorus of legitimate patients whose symptoms improved on cannabis. I mistakenly believed the Drug Enforcement Agency listed marijuana as a schedule 1 substance because of sound scientific proof. Surely, they must have quality reasoning as to why marijuana is in the category of the most dangerous drugs that have "no accepted medicinal use and a high potential for abuse." They didn't have the science to support that claim, and I now know that when it comes to marijuana neither of those things are true. It doesn't have a high potential for abuse, and there are very legitimate medical applications. In fact, sometimes marijuana is the only thing that works.
Note: This article was authored by CNN's Chief Medical Correspondent, Dr. Sanjay Gupta. For more on the proven benefits from many mind-altering drugs, see the deeply revealing reports from reliable major media sources available here.
A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin—not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence—information that could reveal entrapment, mistakes or biased witnesses. "I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers. "It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
A Texas-based encrypted email service recently revealed to be used by Edward Snowden - Lavabit - announced yesterday it was shutting itself down in order to avoid complying with what it perceives as unjust secret US court orders to provide government access to its users' content. "After significant soul searching, I have decided to suspend operations," the company's founder, Ladar Levinson, wrote in a statement to users posted on the front page of its website. He said the US directive forced on his company "a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit." He chose the latter. CNET's Declan McCullagh ... speculates that Lavabit was served "with [a] federal court order to intercept users' passwords" to allow ongoing monitoring of emails; specifically: "the order can also be to install FedGov-created malware." After challenging the order in district court and losing - all in a secret court proceeding, naturally - Lavabit shut itself down to avoid compliance while it appeals to the Fourth Circuit. What is particularly creepy about the Lavabit self-shutdown is that the company is gagged by law even from discussing the legal challenges it has mounted and the court proceeding it has engaged. In other words, the American owner of the company believes his Constitutional rights and those of his customers are being violated by the US Government, but he is not allowed to talk about it. Lavabit has been told that they would face serious criminal sanctions if they publicly discuss what is being done to their company.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Computers and networks inherently produce data, and our constant interactions with them allow corporations to collect an enormous amount of intensely personal data about us as we go about our daily lives. Sometimes we produce this data inadvertently simply by using our phones, credit cards, computers and other devices. Sometimes we give corporations this data directly on Google, Facebook, [or] Apple’s iCloud ... in exchange for whatever free or cheap service we receive from the Internet in return. The NSA is also in the business of spying on everyone, and it has realized it’s far easier to collect all the data from these corporations rather than from us directly. The result is a corporate-government surveillance partnership, one that allows both the government and corporations to get away with things they couldn’t otherwise. There are two types of laws in the U.S., each designed to constrain a different type of power: constitutional law, which places limitations on government, and regulatory law, which constrains corporations. Historically, these two areas have largely remained separate, but today each group has learned how to use the other’s laws to bypass their own restrictions. The government uses corporations to get around its limits, and corporations use the government to get around their limits. This partnership manifests itself in various ways. The government uses corporations to circumvent its prohibitions against eavesdropping domestically on its citizens. Corporations rely on the government to ensure that they have unfettered use of the data they collect.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Four Central Intelligence Agency officers were embedded with the New York Police Department in the decade after Sept. 11, 2001, including one official who helped conduct surveillance operations in the United States, according to a newly disclosed C.I.A. inspector general’s report. That officer believed there were “no limitations” on his activities, the report said, because he was on an unpaid leave of absence, and thus exempt from the prohibition against domestic spying by members of the C.I.A. Another embedded C.I.A. analyst — who was on its payroll — said he was given “unfiltered” police reports that included information unrelated to foreign intelligence, the C.I.A. report said. The once-classified review, completed by the C.I.A. inspector general in December 2011, found that the four agency analysts — more than had previously been known — were assigned at various times to “provide direct assistance” to the local police. The report also raised a series of concerns about the relationship between the two organizations. The C.I.A. inspector general, David B. Buckley, found that the collaboration was fraught with “irregular personnel practices,” that it lacked “formal documentation in some important instances,” and that “there was inadequate direction and control” by agency supervisors. The declassification of the executive summary, in response to a Freedom of Information Act suit, comes ... comes amid lawsuits against the Police Department alleging unconstitutional surveillance of Muslim communities and mosques in New Jersey and New York.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The tale of how the Obama economic team was recruited en masse from Robert Rubin acolytes who either facilitated Wall Street’s pre-crash recklessness while in the Clinton administration or cashed in on it later (or, like Rubin, did both) never loses its power to shock. Michael Froman, Rubin’s chief of staff as Clinton Treasury secretary, not only served as the Obama transition team’s personnel director but moonlighted as a Citigroup managing director while doing so. “Obama essentially entrusted the repairing of the china shop to the bulls who’d helped ransack it,” [Jeff] Connaughton writes [in The Payoff: Why Wall Street Always Wins]. [In This Town Mark] Leibovich updates the story of the tacky prehistory of the Obama White House with its aftermath—the steady parade of Obama alumni who traded change we can believe in for cash on the barrelhead as soon as they left public service. The starry list includes, among many others, Peter Orszag (director of the White House’s Office of Management and Budget, now at Citi), Jake Siewert (the Treasury Department counselor turned chief flack for Goldman Sachs), and David Plouffe (the campaign manager and senior presidential adviser who did consulting for Boeing and General Electric). “When I am president,” Obama had said in 2008, “I will start by closing the revolving door in the White House that’s allowed people to use their administration job as a stepping-stone to further their lobbying careers.” Puzzling over how so many colleagues have strayed from this credo, the former press secretary Robert Gibbs has theorized that either “somehow we have all changed” or, alternatively, “maybe Washington changed us.”
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
JPMorgan Chase & Co. has agreed to pay federal regulators $410 million to settle allegations that the giant bank manipulated energy markets in California and Michigan. About $285 million of the settlement will go to the U.S. Treasury for civil penalties, and about $124 million will be refunded to California ratepayers. The remainder will be refunded to Michigan ratepayers. If this story sounds familiar, that's because it is. Californians who remember the Enron energy debacle of 2000-01 won't be surprised to learn that JPMorgan's traders have been accused of fraudulent behavior. Once again, the fraud was performed by manipulating the auction system that was developed by a quasi-state agency, the California Independent System Operator, to handle California's electricity needs. The Federal Energy Regulatory Commission found that JPMorgan engaged in 12 manipulative bidding strategies, which wound up forcing ratepayers to pay higher amounts than they should have - all because the bank wanted to find a cheap way to profit off of aging power plants in Southern California. JPMorgan used a variety of bait-and-switch strategies - duping Cal-ISO into paying exorbitant fees for running the plants at a low level, for instance, or manipulating the bidding system so that Cal-ISO was forced to pay rates that were many times higher than market rate. The fact that this kind of manipulation is still happening is upsetting. And while $410 million is a record settlement for the FERC, it's a drop in the bucket to JPMorgan, which reported $6.5 billion in quarterly profits this month.
Note: Remember Enron, which scammed millions and then went bankrupt, wiping out pensions of its many employees? To read CBS reports on how Enron purposely shut down power plants so they could cause and then cash in on the energy crisis, click here.
Richmond [CA] city officials took a giant leap forward for everyday people last week when they announced a program to purchase ailing residential mortgages and refinance them through a financial partnership and a bold new initiative that's already begun. To accomplish the task, the city said it will use its eminent domain powers in reverse: To save a home instead of condemn it. Much to the displeasure of the banking industry, the city sent offer letters to more than 600 homeowners whose mortgages are held by nongovernment lending institutions. The program offers to pay lenders the current market value of the property, not the higher value of the mortgage. Under the Richmond program, a bank that approved a $500,000 mortgage would be paid roughly 80 percent of its investment. Already, some lenders contend that such a law violates constitutionally protected property rights and sets a precedent that could open the floodgates for other cities in the same predicament. The mere exploration of similar programs in a half-dozen California cities and counties provoked a strong reaction from the banking industry. Financial experts have warned that the Richmond policy is certain to spawn legal challenges and a backlash from lenders who recalculate higher mortgages in Richmond to offset the risk of the city using a local law to claim a foreclosed property. That's interesting, because no measure was too extreme, no taxpayer sacrifice too great to come up with and fund a new financial model to bail out the bankers and brokerage firms in 2008. But that's what the federal government - and American taxpayers did.
Note: For more on financial corruption, see the deeply revealing reports from reliable major media sources available here.
Amid questions about the safety of the HPV vaccine Gardasil, one of the lead researchers for the Merck drug is speaking out about its risks, benefits and aggressive marketing. Dr. Diane Harper says young girls and their parents should receive more complete warnings before receiving the vaccine to prevent cervical cancer. Dr. Harper helped design and carry out the Phase II and Phase III safety and effectiveness studies to get Gardasil approved, and authored many of the published, scholarly papers about it. She has been a paid speaker and consultant to Merck. It's highly unusual for a researcher to publicly criticize a medicine or vaccine she helped get approved. Dr. Harper joins a number of consumer watchdogs, vaccine safety advocates, and parents who question the vaccine's risk-versus-benefit profile. She says data available for Gardasil shows that ... there is no data showing that it remains effective beyond five years. This raises questions about the CDC's recommendation that the series of shots be given to girls as young as 11-years old. "If we vaccinate 11 year olds and the protection doesn't last... we've put them at harm from side effects, small but real, for no benefit," says Dr. Harper. "The benefit to public health is nothing, there is no reduction in cervical cancers, they are just postponed, unless the protection lasts for at least 15 years, and over 70% of all sexually active females of all ages are vaccinated." She also says that enough serious side effects have been reported after Gardasil use that the vaccine could prove riskier than the cervical cancer it purports to prevent. Cervical cancer is usually entirely curable when detected early through normal Pap screenings.
Note: For more on the dangers of vaccines, see the deeply revealing reports from reliable major media sources available here.
In a broad new policy statement that is in its final drafting stage, the Defense Department asserts that America's political and military mission in the post-Cold-War era will be to insure that no rival superpower is allowed to emerge in Western Europe, Asia or the territory of the former Soviet Union. The classified document makes the case for a world dominated by one superpower whose position can be perpetuated by constructive behavior and sufficient military might to deter any nation or group of nations from challenging American primacy. With its focus on this concept of benevolent domination by one power, the Pentagon document articulates the clearest rejection to date of collective internationalism, the strategy that emerged from World War II when the five victorious powers sought to form a United Nations that could mediate disputes and police outbreaks of violence. Though the document is internal to the Pentagon and is not provided to Congress, its policy statements are developed in conjunction with the National Security Council and in consultation with the President or his senior national security advisers. Its drafting has been supervised by Paul D. Wolfowitz, the Pentagon's Under Secretary for Policy. Mr. Wolfowitz often represents the Pentagon on the Deputies Committee, which formulates policy in an interagency process dominated by the State and Defense departments. The document is known in Pentagon parlance as the Defense Planning Guidance, an internal Administration policy statement that is distributed to the military leaders and civilian Defense Department heads to instruct them on how to prepare their forces, budgets and strategy for the remainder of the decade.
Note: For more on the long-term planning for future war, see the deeply revealing reports from reliable major media sources available here.
Using techniques of exquisite sensitivity and technological finesse, astronomers have spent the past two decades on an astonishing voyage of cosmic discovery. They have found that the universe is full of planets: cold, small, and dark next to their large and glaring suns, these worlds have previously been hidden from us. To spot them represents a challenge that has been compared to looking across thousands of miles to see a firefly buzzing around a brilliant searchlight. They exert a gravitational pull, tugging their parent stars into a gently wobbling motion that we can now detect. We now have firm evidence for thousands of planets, around thousands of stars. We also know something about these worlds, their sizes, their orbits, often their ages. In a handful of cases ... we have even measured the temperature of their upper atmospheres and [determined] their gaseous chemistry, finding substances like sodium, methane and water. No matter how conservative or optimistic we are, the statistics tell us that something like an astonishing one out of every seven stars must harbor a planet similar in size to the Earth, and at roughly the right orbital distance to allow for the possibility of a temperate surface environment. In other words, roughly 15 percent of all suns could, in principle, be hosting a place suitable for life as we know it. Since our galaxy contains at least 200 billion stars, this implies a vast arena for the universe’s ubiquitous carbon chemistry to play in — a process that, as here on Earth, might lead to the complex machinery of life. Indeed, there is a 95-percent confidence — give or take a few percent — that one of these worlds could be within a mere 16 light years of us.
Note: For fascinating testimony from top military and government officials revealing a major cover-up of the existence of UFOs and ETs, click here. For more on the nature of reality, see the deeply revealing reports from reliable major media sources available here.
They escape from aquarium tanks. They locate underwater mines. Now, a new paper published in the journal Proceedings of the National Academy of Science claims that dolphins recognized their own name when called. Vincent Janik, one of the authors of the study and a biology researcher at the University of St. Andrews in Scotland, said that the name is actually a specific type of dolphin vocalization that the animals respond to. "They're these high pitched whistles that have a little bit of a melody," he told ABC News. These sounds are referred to as "signature whistles." Janik and his colleague, Stephanie King, cruised along the east coast of Scotland looking for bottlenose dolphins. After spotting and identifying a dolphin in the wild, the researchers would play one of three different sounds: a modified sound clip of that dolphin's signature whistle, a signature whistle of one of its podmates, or the signature whistle of a completely foreign dolphin. They played the dolphin's own signature whistle and the animal would come up and approach the boat and whistle back. However, the dolphin didn't respond to the other two types of whistles and mostly kept about its business. It may seem odd that the dolphins don't react much to the whistles of their fellow herdmates, but Janik says that copying a dolphin's signature whistle just right is part of their social group. "This copying only occurs between closely associated animals, like between mothers and their calves," he said. Dolphins only need to respond to their own signature whistles, since any socially relevant animal will have learned how to copy it. "It says to them, 'I know that this [whistle] is a friend.'"
Note: Explore an abstract of this intriguing study. For more on the fascinating capabilities of marine mammals, see the deeply revealing reports from reliable major media sources available here.
[On July 17 Delaware] Gov. Jack Markell is scheduled to sign a law creating a new “public benefit corporation” where directors must balance the interests of the owners with those of employees, the general public and the environment. Delaware becomes the 19th state to pass such a law, but it may be the most important one since it is home to half of all publicly traded U.S. companies. Not that Ford Motor Co. or Intel are likely to avail themselves of this new corporate structure. Under the Delaware law, 90% of shareholders must approve a shift to benefit status. The law will likely be more popular with closely held firms like Etsy, the online marketplace for handmade products with more than $500 million a year in sales. It gives them a chance to declare a broader set of objectives than profit alone, and a legal structure to pursue them without risking lawsuits by disgruntled shareholders who might prefer a fatter dividend, say, than the comfort of knowing no endangered species were wiped out by their company’s logging operations. Under the new Delaware law, the purpose of a public benefit corporation is to operate in a “responsible and sustainable manner.” Directors can’t be sued for pursuing objectives that advance “artistic, charitable, cultural …scientific or technological” goals. The benefit corporation movement has even formed the Sustainability Accounting Standards Board to come up with the equivalent of GAAP for the Birkenstock-wearing set.
Note: For more on this exciting development, see the Huffington Post article written by Delaware's governor at this link.
A group of experts advising the nation’s premier cancer research institution has recommended changing the definition of cancer and eliminating the word from some common diagnoses as part of sweeping changes in the nation’s approach to cancer detection and treatment. The recommendations, from a working group of the National Cancer Institute, were published [in] The Journal of the American Medical Association. They say, for instance, that some premalignant conditions, like one that affects the breast called ductal carcinoma in situ, which many doctors agree is not cancer, should be renamed to exclude the word carcinoma so that patients are less frightened and less likely to seek what may be unneeded and potentially harmful treatments that can include the surgical removal of the breast. The group, which includes some of the top scientists in cancer research, also suggested that many lesions detected during breast, prostate, thyroid, lung and other cancer screenings should not be called cancer at all but should instead be reclassified as IDLE conditions, which stands for “indolent lesions of epithelial origin.” The impetus behind the call for change is a growing concern among doctors, scientists and patient advocates that hundreds of thousands of men and women are undergoing needless and sometimes disfiguring and harmful treatments for premalignant and cancerous lesions that are so slow growing they are unlikely to ever cause harm. Once doctors and patients are aware a lesion exists, they typically feel compelled to biopsy, treat and remove it, often at great physical and psychological pain and risk to the patient.
Note: Isn't it interesting that a diagnosis which might not even be accurate can so change a person's life? For more on promising cancer cures which are being suppressed by the medical-industrial complex, see the deeply revealing reports from reliable major media sources available here.
We’re coming up on the fifth anniversary of Wall Street’s meltdown. Banks have rarely had it this good. Earnings for financials, the second-biggest group in the S&P 500 after technology, soared 26 percent last quarter, more than any other industry, analyst estimates show. Housing is back. The stock market is at an all-time high. Investors are finally wiring in cash. The 25 financial firms in the S&P 500 that have so far reported second-quarter results posted earnings totaling $31.6 billion, exceeding estimates of $29.1 billion, Bloomberg data show. Finance is on track to surpass tech again as the most profitable industry in the country. First-half revenue at the six biggest U.S. banks climbed for the first time in four years. Goldman Sachs, Morgan Stanley, Citigroup, JPMorgan Chase, Bank of America, and Wells Fargo reported $43.3 billion in total first-half profit, the most since 2007. The S&P 500 Financials Index is up 26 percent this year, compared with the S&P 500's 18 percent gain. Flush banks cannot sell their bonds fast enough: Almost 60 percent of high-grade debt sales in the U.S. this month are from banks, the biggest ratio in two years, according to Bloomberg. “Banks are somehow making gigatons of money despite onerous new regulations and capital requirements,” writes HuffPo’s Mark Gongloff. “Why, it’s almost like they’re not telling the truth when they warn, repeatedly, that these new rules will destroy their profits and the economy.”
Note: For more on financial corruption, see the deeply revealing reports from reliable major media sources available here.
A British university is delaying the release of an academic paper on how the anti-theft systems of millions of Volkswagen vehicles are at risk of being hacked after the German carmaker took legal action against it. In a statement, the University of Birmingham said it would "defer publication" of the paper — which explains how researchers were able to subvert Volkswagen's security system — after an interim injunction issued by England's High Court. It said it was "disappointed with the judgment which did not uphold the defense of academic freedom and public interest, but respects the decision." The paper ... revealed three ways to bypass a brand of computer chip used by several auto manufacturers to fight vehicle theft. Often referred to as immobilizers, such chips use a secret algorithm to ensure that a car can only be started with the right key, and they've been a mandatory in all new vehicles sold in Britain over the past 15 years. Crucially, the researchers planned to reveal how they were able to reverse-engineer the algorithm — and publish a copy of it in their paper. Volkswagen said that publishing the formula would be "highly damaging" and "facilitate theft of cars," according to a ruling handed down last month by High Court Justice Colin Birss. The judge said that millions of Volkswagen vehicles were issued with the chip, including high-end cars such as Porsches, Audis, Bentleys, and Lamborghinis. The researchers countered that Volkswagen's claim that the paper would be a boon to car thieves was overblown, that they had warned the chip's manufacturer about the vulnerability six months ago, and that a gag order would interfere with their legitimate academic work.
Note: For more on corporate corruption, see the deeply revealing reports from reliable major media sources available here.
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Glenn Greenwald – the reporter who broke the story about the National Security Agency’s surveillance programs – claimed that those NSA programs allowed even low-level analysts to search the private emails and phone calls of Americans. “The NSA has trillions of telephone calls and emails in their databases that they’ve collected over the last several years,” Greenwald told ABC News’ George Stephanopoulos. “All an analyst has to do is enter an email address or an IP address, and [the program] searches that database and lets them listen to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you’ve entered.” Greenwald explained that ... these programs still allow analysts to search through data with little court approval or supervision. Greenwald said "these systems allow analysts to listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it’s all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst,” he added. Greenwald said the existence of these analyst search programs are in line with the claims of Edward Snowden, who first leaked details of the NSA’s surveillance programs last month. “It’s an incredibly powerful and invasive tool, exactly of the type that Mr. Snowden described,” Greenwald said. “NSA officials are going to be testifying before the Senate on Wednesday, and I defy them to deny that these programs work exactly as I just said,” Greenwald said.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.