We need 380 more awesome supporters. Click here for more.
Subscribe here to our free email list

Intelligence Agency Media Articles
Excerpts of Key Intelligence Agency Media Articles in Major Media

Below are highly revealing excerpts of important intelligence agency articles reported in the media suggesting a major cover-up. Links are provided to the full articles on major media websites. If any link fails to function, read this webpage. These intelligence agency articles are listed by article date. You can also explore the articles listed by order of importance or by date posted. By choosing to educate ourselves on these important issues and to spread the word, we can and will build a brighter future.

Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Senate Report Rejects Claim on Hunt for Bin Laden
2014-12-09, New York Times

Months before the operation that killed Osama bin Laden in 2011, the Central Intelligence Agency secretly prepared a public-relations plan that would stress that information gathered from its disputed interrogation program had played a critical role in the hunt. Starting the day after the raid, agency officials in classified briefings made that point to Congress. But in page after page of previously classified evidence, the Senate Intelligence Committee report on C.I.A. torture, released Tuesday, rejects the notion that torturing detainees contributed to finding Bin Laden. The crucial breakthrough in the hunt was the identification of ... Abu Ahmed al-Kuwaiti. The United States had started wiretapping a phone number associated with Mr. Kuwaiti by late 2001. It was in 2004 that the C.I.A. came to realize that it should focus on finding Mr. Kuwaiti as part of the hunt for Bin Laden. [A man named] Hassan Ghul, who had been captured in Iraqi Kurdistan ... provided “the most accurate” intelligence that the agency produced about Mr. Kuwaiti’s role and ties to Bin Laden. Mr. Ghul provided all the important information about [Mr. Kuwaiti] before he was subjected to any torture techniques. During that [initial] two-day period in January 2004, “He opened up right away and was cooperative from the outset.” Nevertheless, the C.I.A. then decided to torture Mr. Ghul. During and after that treatment, he provided “no actionable threat information.”

Note: Read revealing excerpts from this most disturbing report.

Feinstein prevails in long battle to release torture report
2014-12-09, San Francisco Chronicle

Sen. Dianne Feinstein’s last act as chair of the Senate Intelligence Committee ... had Washington’s most powerful forces arrayed against her. At the end ... Feinstein said she was more determined than ever to release the summary of a 6,700-page report on the CIA’s use of torture after the terrorist attacks of Sept. 11, 2001. “She has been vilified, the committee was spied on, the CIA and its supporters ran what amounted to a domestic disinformation campaign against the report and the committee,” said Stephen Rickard, executive director of the Open Society Policy Center, a civil liberties and human rights group in Washington. “She did her job.” Her job was to provide congressional oversight of an executive branch agency, and she met prolonged and intense resistance. Feinstein called the report “the most significant and comprehensive oversight report in the committee’s history, and perhaps in that of the U.S. Senate.” The Senate panel examined nearly 6.3 million pages of documents, without Republican cooperation and against the resistance of the CIA, which went so far as to hack Intelligence Committee computers and threaten to bring criminal charges against the staff. Although President Obama insisted he wanted the report made public, administration officials reportedly pressed for redactions that Senate Democrats said would make the report meaningless.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.

Afghanistan: The Making of a Narco State
2014-12-04, Rolling Stone

In the largest opium harvest in Afghanistan's history; with a record 224,000 hectares under cultivation this year, the country produced an estimated 6,400 tons of opium, or around 90 percent of the world's supply. In Afghanistan today, according to U.N. estimates, the opium industry accounts for 15 percent of the economy. The Afghan narcotics trade has gotten undeniably worse since the U.S.-led invasion: The country produces twice as much opium as it did in 2000. In the provincial capital of Lashkar Gah, I arrange an interview with a drug smuggler. I'll call him Sami. He grew up in a camp near the border town of Chagai, in Pakistan. After finishing 11th grade, he got work as a driver and began ... smuggling opium through the desert. Baramcha, a smuggling hub on the Afghan side of the border ... functions as a kind of switching station for much of the opium trade. "The security situation is good ... the drug smugglers and the ISI are tight together," he says, referring to Pakistan's intelligence service. The United States' alliances with opium traffickers in Afghanistan go back to the 1980s, when the CIA waged a dirty war to undermine the Soviet occupation of the country. Large-scale cultivation was introduced [with] support from the ISI and the CIA. U.S. counternarcotics programs, which have cost nearly $8 billion to date, and the Afghan state-building project in general, are perversely part of ... the drug trade.

Note: Read the complete article above for an in depth look at the Afghan narcotics trade. For more, read this 2002 news article, which shows that the Taliban had nearly eliminated opium production in Afghanistan prior to the US led invasion. Yet once the allies defeated the Taliban, opium production hit new records. Today, Afghanistan produces 90% of the global opium supply. This huge source of income is used to fund all kinds of secret projects. Read powerful evidence that the CIA and US military are directly involved in the drug trade.

Talking to James Risen About Pay Any Price, the War on Terror and Press Freedoms
2014-11-25, The Intercept

James Risen, who won the Pulitzer Prize in 2005 for exposing the NSA warrantless eavesdropping program, has [been] threatened with prison by the Obama Justice Department. [This] is almost certainly the vindictive by-product of the U.S. government’s anger over his NSA reporting. He has published a new book on the War on Terror entitled Pay Any Price: Greed, Power and Endless War. Risen's [critique] is one of the first to offer large amounts of original reporting on ... a particular part of the War on Terror, namely the way in which economic motives, what [he] calls the Homeland Security Industrial Complex, has driven a huge part of the war. GLENN GREENWALD: How much of this economic motive is the cause of the fact that we’ve now been at war for 13 years? RISEN: It plays a really central role. After so many years there’s ... a post-9/11 mercenary class that’s developed that have invested. Not just people who are making money, but people who are in the government. Their status and their power within the government are invested in continuing the war. There’s very little debate about whether to continue the war. When Dick Cheney said, “the gloves come off,” ... that really meant, “We’re going to deregulate national security, and we’re going to take off all the rules that were imposed in the ’70s after Watergate.” That was just a dramatic change. It’s been extended to this whole new homeland security apparatus. People think that terrorism is an existential threat, even though it’s not, and so they’re willing to go along with all this.

Note: The complete interview at the link above provides details of James Risen's fight to preserve journalistic integrity against a corrupted government's attempts to manipulate the news. For more on Risen's deeply revealing investigation of the Homeland Security Industrial Complex, see this recent NPR interview.

FBI: Violent crime drops, reaches 1970s level
2014-11-10, Chicago Tribune

U.S. violent crimes including murders fell 4.4 percent in 2013 to their lowest number since the 1970s, continuing a decades-long downturn, the FBI said on Monday. The law enforcement agency's annual Crime in the United States report showed the country had an estimated 1.16 million violent crimes last year, the lowest number since 1.09 million were recorded in 1978. All types of violent crimes were lower, with murder and non-negligent manslaughter off 4.4 percent to 14,196, the lowest figure since 1968. Rape was down 6.3 percent and robbery fell 2.8 percent, the Federal Bureau of Investigation data showed. The violent crime rate last year was 367.9 for each 100,000 in population, down 5.1 percent from 2012. The rate has fallen every year since at least 1994, the earliest year for readily accessible FBI data, and the 2013 figure was about half the 1994 rate. Property crimes fell 4.1 percent ... the 11th straight yearly decline. In an analysis, the non-profit Pew Charitable Trusts said the drop in crime coincided with a decline in the prison population, with the number of U.S. prisoners down 6 percent in 2013 from its peak in 2008. Thirty-two of the 50 states have seen a drop in crime rates as the rate of imprisonment fell, Pew said. California notched the largest drop in imprisonment rate over the five-year period, at 15 percent, and crime was down 11 percent. The state has been under court order to reduce prison overcrowding, and voters last week approved an initiative that reduced sentences for some crimes.

Note: Why isn't this inspiring news being broadcast widely by the media? And why hasn't the FBI website updated their data on this since 2010? The police and media appear to consistently downplay the huge drop in violent crime since 1994. According to the FBI's own statistics, violent crime has currently dropped to 1/3 or less what it was in 1994. See the revealing FBI graphs and charts here, here, and here. Yet some of these charts have now been removed and mention of this huge decrease downplayed. The obvious reason is that a large decrease in crime might cause people to want to decrease police and FBI budgets. More here.

Nazis Helped Get Us To The Moon. The Reagan White House Helped Keep Them In The U.S.
2014-11-08, Huffington Post

America’s Nazi transplants: scientists, academics and thinkers who were employed by the U.S. government, despite résumés full of horrid atrocities. Washington worked to protect them from the consequences of their horrible pasts. This information, revealed in detail for the first time in [Eric] Lichtblau’s book, “The Nazis Next Door: How America Became a Safe Haven for Hitler’s Men,” traces the legal battles and moral struggles surrounding the ... Operation Paperclip program, which brought former Nazi scientists to America to bolster the nation’s scientific community. Among the Third Reich transplants was the late Wernher von Braun, considered a legendary NASA space scientist who ... oversaw Hitler’s Mittelwerk slave labor factory. Another was the late Dr. Hubertus Strughold, who is still considered the “father of space medicine." Strughold ... helped orchestrate science experiments on human guinea pigs at the Dachau concentration camp. Even while the White House and its intelligence agencies were quietly employing some of the Nazis’ best minds in the nation’s scientific circles, mostly in a Huntsville, Alabama, military community, the Justice Department was secretly building cases against them. A deal was struck that allowed [Arthur] Rudolph to renounce his American citizenship and go quietly back to Germany in 1984. He was never charged with a war crime. No other Paperclip scientists were prosecuted for their past atrocities or complicity in Nazi war crimes.

Note: What this article fails to mention is the Nazi doctors secretly used to teach the CIA mind control methods it perfected. Read an amazing, eye-opening summary on this. Then see the astounding declassified CIA documents on this program.

UK intelligence agencies spying on lawyers in sensitive security cases
2014-11-07, The Guardian (One of the UK's leading newspapers)

The intelligence services have routinely been intercepting legally privileged communications ... according to internal MI5, MI6 and GCHQ documents. The information obtained may even have been exploited unlawfully and used by the agencies in the fighting of court cases in which they themselves are involved, the Investigatory Powers Tribunal (IPT) has been told. MP David Davis, a former shadow home secretary, said past practice was to delete such material immediately if it was ever picked up. 28 extracts of internal intelligence policies showing how legally privileged material is handled by security officials were released to lawyers pursuing a claim through the IPT. The claim has been brought by two Libyans, Abdel-Hakim Belhaj and Sami Al Saadi. They were abducted in a joint MI6-CIA operation and ... tortured by Colonel Muammar Gaddafi’s regime in 2004. Belhaj has been given permission to sue the government for his mistreatment. Davis, who attended the hearing, said: “In the past, when a bug or intercept on a criminal accidentally picked up a conversation with the criminal’s lawyer, the rule was that it was immediately deleted. Today’s hearing shows that is no longer the case. Agencies are clearly keeping records of legal privileged material, and have explicit policies to handle it. In the case of MI5 that policy includes concealing ... that they have the material. This change has been carried out without changing the law or telling parliament. This is an enormous breach of defendants’ judicial rights.”

Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable sources.

'Trojan Horse' Bug Lurking in Vital US Computers Since 2011
2014-11-06, ABC News

A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security. National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the Russian government. The hacked software is used to control ... oil and gas pipelines, power transmission grids, water distribution and filtration systems, wind turbines and even some nuclear plants. The hacking campaign has been ongoing since 2011, but no attempt has been made to activate the malware. DHS sources ... fear that the Russians have torn a page from the old, Cold War playbook, and have placed the malware in key U.S. systems as a threat, and/or as a deterrent to a U.S. cyber-attack on Russian systems. The hack became known to insiders last week when a DHS alert bulletin was issued. The bulletin said the “BlackEnergy” penetration recently had been detected by several companies. DHS said “BlackEnergy” is the same malware that was used ... to target NATO and some energy and telecommunications companies. The hacked software is very advanced. It allows designated workers to control various industrial processes through the computer, an iPad or a smart phone, sources said.

Note: For an example of a computer-based attack on industrial infrastructure, read how a malware called Stuxnet targeted Iranian nuclear facilities. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.

FBI Says It Faked AP Story to Catch Bomb Suspect
2014-10-28, ABC News

The FBI confirmed Tuesday it faked an Associated Press story to catch a bomb threat suspect in 2007. Police in Lacey, near Olympia, sought the FBI's help as repeated bomb threats prompted a week of evacuations at Timberline High School in June 2007. The agency obtained a warrant from a federal magistrate judge to send a "communication" to a social media account ... which contained a software tool that could verify Internet addresses, (and) turned out to be a link to a phony AP story about the bomb threats posted on a Web page created by the FBI. The 15-year-old suspect clicked on the link, revealing his computer's location. The FBI did not initially respond to AP's request earlier Tuesday for further detail about the fake story, beyond saying the ruse was necessary. AP spokesman Paul Colford said Tuesday the FBI's "ploy violated AP's name and undermined AP's credibility." "We are extremely concerned and find it unacceptable that the FBI misappropriated the name of The Associated Press and published a false story attributed to AP." Kathy Best, editor of The Seattle Times, said in a statement that, "The FBI, in placing the name of The Associated Press on a phony story sent to a criminal suspect, crossed a line and undermined the credibility of journalists everywhere — including at The Times." The documents revealing the deception were publicized Monday on Twitter by Christopher Soghoian, the principal technologist for the American Civil Liberties Union.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.

US used Nazis as Cold War spies
2014-10-27, BBC News

Declassified US records reveal the nation's intelligence chiefs used hundreds of Nazis as spies and informants after World War Two. Academics studying the documents say America used at least 1,000 ex-Nazis. Some had served at the highest levels of the Nazi Party, and were recruited to work as spies for the US in Europe. Former SS officer Otto von Bolschwing reportedly wrote policy papers on how to terrorise Jews, but was hired by the CIA to spy in Europe after World War Two. The agency is said to have relocated him and his family to New York in the 1950s as a reward for loyal service. Nazi collaborator Aleksandras Lileikis - linked to the massacres of tens of thousands of Jews in Lithuania - was recruited by the US as a spy in East Germany and later brought over to Boston. There is evidence the CIA even tried to intervene when Mr Lileikis became the subject of a war crimes investigation. Records indicate long-time FBI director J Edgar Hoover not only approved of the use of ex-Nazis as spies, he also dismissed the horrific acts they had been involved in during the war as Soviet propaganda. The revelations come one week after an Associated Press investigation found the US government had paid dozens of suspected Nazi war criminals millions of dollars in Social Security benefits.

Note: Explore powerful evidence that the CIA secretly smuggled Nazi war criminals into the US to teach them mind control techniques.

Sharyl Attkisson’s computer intrusions: ‘Worse than anything Nixon ever did’
2014-10-27, Washington Post Blog

The intrusions into former CBS News correspondent Sharyl Attkisson’s computers constitute the narrative spine of the reporter’s new book “Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington.” In October 2012, right in the midst of the Benghazi story ... a person who’s identified as “Jeff” warns Attkisson: “I’ve been reading your reports online about Benghazi. It’s pretty incredible. Keep at it. But you’d better watch out.” So CBS News hires an independent computer analyst whom Attkisson identifies as "Jerry Patel." He finds a massive amount of suspicious activity in the computer. Intrusions of this caliber, concludes “Patel,” are “far beyond the the abilities of even the best nongovernment hackers.” In summing up, Attkisson writes, “Everything Patel has found serves to confirm my January source and analysis. Patel tells me that only a few entities possess these skills. One of them is the U.S. government. [Computer security specialist] Don Allison ... takes a close look at Attkisson’s iMac. The results: “While a great deal of data has been expertly wiped in an attempt to cover-up the deed, Don is able to find remnants of what was once there. There’s key evidence of a government computer connection to my computer. A sort of backdoor link that leads to an ISP address for a government computer that can’t be accessed by the general public on the Web. It’s an undeniable link to the U.S. government.”

Note: For lots more on this courageous reporter and suppression of vital news, read this article and this one. Then read even more mind-blowing reports of news suppression by top journalists.

In Cold War, U.S. Spy Agencies Used 1,000 Nazis
2014-10-26, New York Times

At the height of the Cold War in the 1950s, law enforcement and intelligence leaders like J. Edgar Hoover at the F.B.I. and Allen Dulles at the C.I.A. aggressively recruited onetime Nazis of all ranks. They believed the ex-Nazis’ intelligence value against the Russians outweighed what one official called “moral lapses” in their service to the Third Reich. The agency hired one former SS officer as a spy in the 1950s, for instance, even after concluding he was probably guilty of “minor war crimes.” In 1994, a lawyer with the C.I.A. pressured prosecutors to drop an investigation into an ex-spy outside Boston implicated in the Nazis’ massacre of tens of thousands of Jews in Lithuania. In 1980, F.B.I. officials refused to tell even the Justice Department’s own Nazi hunters what they knew about 16 suspected Nazis living in the United States. The bureau balked at a request from prosecutors for internal records on the Nazi suspects, memos show, because the 16 men had all worked as F.B.I. informants, providing leads on Communist “sympathizers.” Five of the men were still active informants. In all, the American military, the C.I.A., the F.B.I. and other agencies used at least 1,000 ex-Nazis and collaborators as spies and informants after the war, according to Richard Breitman, a Holocaust scholar at American University. The full tally ... is probably much higher. But many records remain classified even today, making a complete count impossible.

Note: What this article fails to mention is the Nazi doctors secretly used to teach the CIA mind control methods it perfected. Read an amazing, eye-opening summary on this. Then see the astounding declassified CIA documents on this program.

Assange: Google Is Not What It Seems
2014-10-23, Newsweek

In June 2011, (WikiLeaks’ founder) Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt. The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas. Cohen had moved to Google from the U.S. State Department. Schmidt arrived first, accompanied by his then partner, Lisa Shields ... a vice president of the Council on Foreign Relations. Two months later, WikiLeaks’ release of State Department cables was coming to an abrupt end. Two years later, in the wake of his early 2013 visits to China, North Korea and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, “back-channel diplomacy” for Washington. In 1999 ... Schmidt joined the New America Foundation. The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place hundreds of articles and op-eds per year. In 2003, the U.S. National Security Agency (NSA) had already started systematically violating the Foreign Intelligence Surveillance Act (FISA). During the same period, Google ... was accepting NSA money to the tune of $2 million to provide the agency with search tools. In 2012, Google arrived on the list of top-spending Washington, D.C., lobbyists. Whether it is being just a company or “more than just a company,” Google’s geopolitical aspirations are firmly enmeshed within the foreign-policy agenda of the world’s largest superpower.

Note: Read the complete Newsweek article summarized above for Julian Assange's detailed accounting of the connections between Washington D.C. insiders, Google and related technology companies, intelligence agencies, and civil society organizations. For more about Wikileaks, read this news article summary. For more on the geopolitical big picture, see these concise summaries of deeply revealing news articles from reliable major media sources.

Your Taxes Funding Nazi War Criminals' Retirement?
2014-10-20, CBS News/Associated Press

Dozens of suspected Nazi war criminals and SS guards collected millions of dollars in U.S. Social Security benefits after being forced out of the United States. Among those receiving benefits were armed SS troops who guarded the network of Nazi camps where millions of Jews perished; a rocket scientist who used slave laborers to advance his research in the Third Reich; and a Nazi collaborator who engineered the arrest and execution of thousands of Jews in Poland. The deals allowed the Justice Department's former Nazi-hunting unit, the Office of Special Investigations, to skirt lengthy deportation hearings. Social Security benefits became tools, U.S. diplomatic officials said, to secure agreements. The Social Security Administration expressed outrage in 1997 over the use of benefits. Austrian authorities were furious upon learning after the fact about a deal made with Martin Bartesch, a former SS guard at the Mauthausen concentration camp in Austria. "It was not upfront, it was not transparent, it was not a legitimate process," said James Hergen, an assistant legal adviser at the State Department from 1982 until 2007. "This was not the way America should behave." Neal Sher, a former OSI director, said the State Department cared more about diplomatic niceties than holding former members of Adolf Hitler's war machine accountable.

Note: Explore powerful evidence that the CIA secretly smuggled Nazi war criminals into the US to teach them mind control techniques.

Vote all you want. The secret government won't change
2014-10-19, Boston Globe

The Obama version of national security looks almost indistinguishable from the one he inherited. Critics tend to focus on Obama himself, but Tufts University political scientist Michael J. Glennon has a more pessimistic answer: Obama couldn’t have changed policies much even if he tried. Our government no longer works that way. In a new book, “National Security and Double Government,” he catalogs the ways that the defence and national security apparatus is effectively self-governing, with virtually no accountability, transparency, or checks and balances of any kind. He uses the term “double government”: There’s the one we elect, and then there’s the one behind it, steering huge swaths of policy almost unchecked. Elected officials end up serving as mere cover for the real decisions made by the bureaucracy. “National Security and Double Government” comes favorably blurbed by former members of the Defense Department, State Department, White House, and even the CIA. Glennon spoke with Ideas from his office. IDEAS: Where does the term “double government” come from? GLENNON: Walter Bagehot - the scholar who presided over the birth of The Economist magazine. IDEAS: What evidence exists for saying America has a double government? GLENNON: The documented evidence in the book is substantial — there are 800 footnotes. I think the American people ... believe that when they vote for a president or member of Congress or succeed in bringing a case before the courts, that policy is going to change. Policy by and large in the national security realm is made by the concealed institutions.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.

FBI director attacks tech companies for embracing new modes of encryption
2014-10-16, The Guardian

The director of the FBI savaged tech companies for their recent embrace of end-to-end encryption and suggested rewriting laws to ensure law enforcement access to customer data in a speech on Thursday. James Comey said data encryption such as that employed on Apple’s latest mobile operating system would deprive police and intelligence companies. Privacy advocates contend Comey is demagoguing the issue. It took a June supreme court ruling, they point out, for law enforcement to abandon its contention that it did not require warrants at all to search through smartphones or tablets, and add that technological vulnerabilities can be exploited by hackers and foreign intelligence agencies as well as the US government. Tech companies contend that their newfound adoption of encryption is a response to overarching government surveillance, much of which occurs ... without a warrant, subject to a warrant broad enough to cover indiscriminate data collection, or under a gag order following a non-judicial subpoena. Comey did not mention such subpoenas, often in the form of National Security Letters, in his remarks. Comey acknowledged that the Snowden disclosures caused “justifiable surprise” among the public about the breadth of government surveillance, but hoped to mitigate it through greater transparency and advocacy. Yet the FBI keeps significant aspects of its surveillance reach hidden even from government oversight bodies. Intelligence officials said in a June letter to a US senator that the FBI does not tally how often it searches through NSA’s vast hoards of international communications, without warrants, for Americans’ identifying information. Comey frequently described himself as being technologically unprepared to offer specific solutions, and said he meant to begin a conversation, even at the risk of putting American tech companies at a competitive disadvantage.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.

Chat logs reveal FBI informant Sabu’s role in hacking of Sun newspaper
2014-10-14, The Guardian

The FBI is facing questions over its role in a 2011 hacking attack on Rupert Murdoch’s Sun newspaper in the UK after the publication of chat logs showed that a man acting as an agency informant played a substantial role in the operation. The attack was so successful that the publisher took down the websites of the Sun and the Times while technicians worked out the scale of the hack. Unsealed documents ... seen by the Guardian, show Hector Xavier Monsegur – known widely online as “Sabu” and frequently referred to as the leader of Lulzsec – played an active role in the operation. The chat records show Monsegur encouraging others to break further into News International systems, claiming to have sources at the Sun, and even apparently helping to break staff’s passwords and to source files for stealing. Monsegur was, however, at that time operating under the direction of the FBI. The close involvement of an FBI asset working under extraordinarily close supervision in a hacking attack on a media outlet ultimately owned by a US-listed company is set to raise further questions about the agency’s approach to tackling online crime. The logs also show Sabu on multiple occasions offering detailed technical help to find additional records on different servers, breaking in to new servers, or obtaining more files – which could easily have included those belonging to journalists at either the Sun or Times. The Sun, which is challenging the UK government over police accessing the phone records of one of its reporters, declined to comment on the apparent FBI involvement in attacks on its servers.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources. For an in-depth look at how these practices have been shown to interfere with a free press, see these excellent, reliable Mass Media Resources.

Journalist Talks Confidential Sources, Getting Subpoenaed And His New Book
2014-10-14, National Public Radio

TERRY GROSS: James Risen [is] an investigative reporter for The New York Times. He, along with Eric Lichtbau, broke the story about warrantless wiretapping. Now Risen is facing a prison sentence for refusing to reveal his source or sources for that story. [Risen] has a new book called "Pay Any Price: Greed, Power And Endless War," which is a series of investigations into who's making money on the War on Terror and what are some of the secret operations within it. You recently wrote an article in The New York Times with Laura Poitras who broke the Edward Snowden story along with Glenn Greenwald. And you reported on how American intelligence is trying to harvest facial imagery with the intention of - what's it for? RISEN: Facial recognition ... in a way that no [one] really understood before has become a central focus of the NSA today. They can link that up with a signals intelligence, which is the communications that they intercept [and] basically find where you are, what you're doing, who you're seeing and virtually anything about you in real time. GROSS: So ... your big story turned out kind of differently than the celebrations facing Woodward and Bernstein. RISEN: I think the times have changed. We had this period in journalism for about 30 years where there was the government and the press. The government ... wouldn't go after whistleblowers or reporters very aggressively. It's only after the - after 9/11 and after the plane case, which you may remember where Judy Miller was sent to jail. I think the post-9/11 age, the government has decided to become much more aggressive against reporters and whistleblowers.

Note: The above quotes are from the transcript of a radio interview that you can listen to by clicking on the news story link provided. For more along these lines, see concise summaries of deeply revealing stories about high level manipulation of mass media from reliable sources.

Probe of silencers leads to web of Pentagon secrets
2014-10-14, Washington Post

The mysterious workings of a Pentagon office that oversees clandestine operations are unraveling in federal court, where a criminal investigation has exposed a secret weapons program ... to manufacture an untraceable batch of automatic-rifle silencers. The silencers — 349 of them — were ordered by a little-known Navy intelligence office at the Pentagon known as the Directorate for Plans, Policy, Oversight and Integration. The directorate is composed of fewer than 10 civilian employees, most of them retired military personnel. Court records filed by prosecutors allege that the Navy paid the auto mechanic — the brother of the directorate’s boss — $1.6 million for the silencers, even though they cost only $10,000 in parts and labor to manufacture. If the foreign-made weapons were equipped with unmarked silencers, the source said, the weapons could have been used by U.S. or foreign forces for special operations in other countries without any risk that they would be traced back to the United States. No documentation has surfaced in court to indicate that Navy officials formally signed off on the silencer project, although many pretrial motions have been filed under seal. Hall, the directorate official charged with illegally purchasing the silencers, has asserted that he received verbal approval for the secret program from Robert C. Martinage, a former acting undersecretary of the Navy, according to statements made during pretrial hearings. Martinage was forced to resign in January after investigators looking into the silencer deal found evidence that he had engaged in personal misconduct ... unrelated to the silencer contract.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.

Court Spotlights the FBI’s Super-Secret National Security Letters
2014-10-09, The Intercept

[National security letters], the reach of which was expanded under the Patriot Act in 2001, let the FBI get business records from telephone, banking, and Internet companies with just a declaration that the information is relevant to a counterterrorism investigation. The FBI can get such information with a subpoena or another method with some judicial oversight. Can the government make demands for data entirely in secret? That was the question yesterday before a federal appeals court in San Francisco, where government lawyers argued that National Security Letters — FBI requests for information that are so secret they can’t be publicly acknowledged by the recipients — were essential to counterterrorism investigations. One of the judges seemed to question why there was no end-date on the gag orders, and why the burden was on the recipients of NSLs to challenge them. “It leaves it to the poor person who is subject to those requirements to just constantly petition the government to get rid of it,” said the judge, N. Randy Smith. The FBI sends out thousands of NSLs each year – 21,000 in fiscal year 2012. Google, Yahoo, Facebook and Microsoft filed a brief in support of the NSL challenge, arguing that they want to “publish more detailed aggregate statistics about the volume, scope and type of NSLs that the government uses to demand information about their users.” Twitter also announced this week that it was suing the U.S. government over restrictions on how it can talk about surveillance orders. Tech companies can currently make public information about the number of NSLs or Foreign Intelligence Surveillance Court orders they receive in broad ranges, but Twitter wants to be more specific.

Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.

Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.