As of May 24th, we're $8,800 in the red for 2015. Please donate here to support this vital work.

Intelligence Agency Media Articles
Excerpts of Key Intelligence Agency Media Articles in Major Media


Below are highly revealing excerpts of important intelligence agency articles reported in the media suggesting a major cover-up. Links are provided to the full articles on major media websites. If any link fails to function, read this webpage. These intelligence agency articles are listed by article date. You can also explore the articles listed by order of importance or by date posted. By choosing to educate ourselves on these important issues and to spread the word, we can and will build a brighter future.

Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


FBI Says It Faked AP Story to Catch Bomb Suspect
2014-10-28, ABC News
http://abcnews.go.com/Technology/wireStory/ap-seattle-times-upset-fbi-imperso...

The FBI confirmed Tuesday it faked an Associated Press story to catch a bomb threat suspect in 2007. Police in Lacey, near Olympia, sought the FBI's help as repeated bomb threats prompted a week of evacuations at Timberline High School in June 2007. The agency obtained a warrant from a federal magistrate judge to send a "communication" to a social media account ... which contained a software tool that could verify Internet addresses, (and) turned out to be a link to a phony AP story about the bomb threats posted on a Web page created by the FBI. The 15-year-old suspect clicked on the link, revealing his computer's location. The FBI did not initially respond to AP's request earlier Tuesday for further detail about the fake story, beyond saying the ruse was necessary. AP spokesman Paul Colford said Tuesday the FBI's "ploy violated AP's name and undermined AP's credibility." "We are extremely concerned and find it unacceptable that the FBI misappropriated the name of The Associated Press and published a false story attributed to AP." Kathy Best, editor of The Seattle Times, said in a statement that, "The FBI, in placing the name of The Associated Press on a phony story sent to a criminal suspect, crossed a line and undermined the credibility of journalists everywhere — including at The Times." The documents revealing the deception were publicized Monday on Twitter by Christopher Soghoian, the principal technologist for the American Civil Liberties Union.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


US used Nazis as Cold War spies
2014-10-27, BBC News
http://www.bbc.com/news/world-us-canada-29795749

Declassified US records reveal the nation's intelligence chiefs used hundreds of Nazis as spies and informants after World War Two. Academics studying the documents say America used at least 1,000 ex-Nazis. Some had served at the highest levels of the Nazi Party, and were recruited to work as spies for the US in Europe. Former SS officer Otto von Bolschwing reportedly wrote policy papers on how to terrorise Jews, but was hired by the CIA to spy in Europe after World War Two. The agency is said to have relocated him and his family to New York in the 1950s as a reward for loyal service. Nazi collaborator Aleksandras Lileikis - linked to the massacres of tens of thousands of Jews in Lithuania - was recruited by the US as a spy in East Germany and later brought over to Boston. There is evidence the CIA even tried to intervene when Mr Lileikis became the subject of a war crimes investigation. Records indicate long-time FBI director J Edgar Hoover not only approved of the use of ex-Nazis as spies, he also dismissed the horrific acts they had been involved in during the war as Soviet propaganda. The revelations come one week after an Associated Press investigation found the US government had paid dozens of suspected Nazi war criminals millions of dollars in Social Security benefits.

Note: Explore powerful evidence that the CIA secretly smuggled Nazi war criminals into the US to teach them mind control techniques.


Sharyl Attkisson’s computer intrusions: ‘Worse than anything Nixon ever did’
2014-10-27, Washington Post Blog
http://www.washingtonpost.com/blogs/erik-wemple/wp/2014/10/27/sharyl-attkisso...

The intrusions into former CBS News correspondent Sharyl Attkisson’s computers constitute the narrative spine of the reporter’s new book “Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington.” In October 2012, right in the midst of the Benghazi story ... a person who’s identified as “Jeff” warns Attkisson: “I’ve been reading your reports online about Benghazi. It’s pretty incredible. Keep at it. But you’d better watch out.” So CBS News hires an independent computer analyst whom Attkisson identifies as "Jerry Patel." He finds a massive amount of suspicious activity in the computer. Intrusions of this caliber, concludes “Patel,” are “far beyond the the abilities of even the best nongovernment hackers.” In summing up, Attkisson writes, “Everything Patel has found serves to confirm my January source and analysis. Patel tells me that only a few entities possess these skills. One of them is the U.S. government. [Computer security specialist] Don Allison ... takes a close look at Attkisson’s iMac. The results: “While a great deal of data has been expertly wiped in an attempt to cover-up the deed, Don is able to find remnants of what was once there. There’s key evidence of a government computer connection to my computer. A sort of backdoor link that leads to an ISP address for a government computer that can’t be accessed by the general public on the Web. It’s an undeniable link to the U.S. government.”

Note: For lots more on this courageous reporter and suppression of vital news, read this article and this one. Then read even more mind-blowing reports of news suppression by top journalists.


Assange: Google Is Not What It Seems
2014-10-23, Newsweek
http://www.newsweek.com/assange-google-not-what-it-seems-279447

In June 2011, (WikiLeaks’ founder) Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt. The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas. Cohen had moved to Google from the U.S. State Department. Schmidt arrived first, accompanied by his then partner, Lisa Shields ... a vice president of the Council on Foreign Relations. Two months later, WikiLeaks’ release of State Department cables was coming to an abrupt end. Two years later, in the wake of his early 2013 visits to China, North Korea and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, “back-channel diplomacy” for Washington. In 1999 ... Schmidt joined the New America Foundation. The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place hundreds of articles and op-eds per year. In 2003, the U.S. National Security Agency (NSA) had already started systematically violating the Foreign Intelligence Surveillance Act (FISA). During the same period, Google ... was accepting NSA money to the tune of $2 million to provide the agency with search tools. In 2012, Google arrived on the list of top-spending Washington, D.C., lobbyists. Whether it is being just a company or “more than just a company,” Google’s geopolitical aspirations are firmly enmeshed within the foreign-policy agenda of the world’s largest superpower.

Note: Read the complete Newsweek article summarized above for Julian Assange's detailed accounting of the connections between Washington D.C. insiders, Google and related technology companies, intelligence agencies, and civil society organizations. For more about Wikileaks, read this news article summary. For more on the geopolitical big picture, see these concise summaries of deeply revealing news articles from reliable major media sources.


Your Taxes Funding Nazi War Criminals' Retirement?
2014-10-20, CBS News/Associated Press
http://www.cbsnews.com/news/nazi-war-criminal-social-security-benefits-ap-inv...

Dozens of suspected Nazi war criminals and SS guards collected millions of dollars in U.S. Social Security benefits after being forced out of the United States. Among those receiving benefits were armed SS troops who guarded the network of Nazi camps where millions of Jews perished; a rocket scientist who used slave laborers to advance his research in the Third Reich; and a Nazi collaborator who engineered the arrest and execution of thousands of Jews in Poland. The deals allowed the Justice Department's former Nazi-hunting unit, the Office of Special Investigations, to skirt lengthy deportation hearings. Social Security benefits became tools, U.S. diplomatic officials said, to secure agreements. The Social Security Administration expressed outrage in 1997 over the use of benefits. Austrian authorities were furious upon learning after the fact about a deal made with Martin Bartesch, a former SS guard at the Mauthausen concentration camp in Austria. "It was not upfront, it was not transparent, it was not a legitimate process," said James Hergen, an assistant legal adviser at the State Department from 1982 until 2007. "This was not the way America should behave." Neal Sher, a former OSI director, said the State Department cared more about diplomatic niceties than holding former members of Adolf Hitler's war machine accountable.

Note: Explore powerful evidence that the CIA secretly smuggled Nazi war criminals into the US to teach them mind control techniques.


Vote all you want. The secret government won't change
2014-10-19, Boston Globe
https://www.bostonglobe.com/ideas/2014/10/18/vote-all-you-want-the-secret-gov...

The Obama version of national security looks almost indistinguishable from the one he inherited. Critics tend to focus on Obama himself, but Tufts University political scientist Michael J. Glennon has a more pessimistic answer: Obama couldn’t have changed policies much even if he tried. Our government no longer works that way. In a new book, “National Security and Double Government,” he catalogs the ways that the defence and national security apparatus is effectively self-governing, with virtually no accountability, transparency, or checks and balances of any kind. He uses the term “double government”: There’s the one we elect, and then there’s the one behind it, steering huge swaths of policy almost unchecked. Elected officials end up serving as mere cover for the real decisions made by the bureaucracy. “National Security and Double Government” comes favorably blurbed by former members of the Defense Department, State Department, White House, and even the CIA. Glennon spoke with Ideas from his office. IDEAS: Where does the term “double government” come from? GLENNON: Walter Bagehot - the scholar who presided over the birth of The Economist magazine. IDEAS: What evidence exists for saying America has a double government? GLENNON: The documented evidence in the book is substantial — there are 800 footnotes. I think the American people ... believe that when they vote for a president or member of Congress or succeed in bringing a case before the courts, that policy is going to change. Policy by and large in the national security realm is made by the concealed institutions.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


FBI director attacks tech companies for embracing new modes of encryption
2014-10-16, The Guardian
http://www.theguardian.com/us-news/2014/oct/16/fbi-director-attacks-tech-comp...

The director of the FBI savaged tech companies for their recent embrace of end-to-end encryption and suggested rewriting laws to ensure law enforcement access to customer data in a speech on Thursday. James Comey said data encryption such as that employed on Apple’s latest mobile operating system would deprive police and intelligence companies. Privacy advocates contend Comey is demagoguing the issue. It took a June supreme court ruling, they point out, for law enforcement to abandon its contention that it did not require warrants at all to search through smartphones or tablets, and add that technological vulnerabilities can be exploited by hackers and foreign intelligence agencies as well as the US government. Tech companies contend that their newfound adoption of encryption is a response to overarching government surveillance, much of which occurs ... without a warrant, subject to a warrant broad enough to cover indiscriminate data collection, or under a gag order following a non-judicial subpoena. Comey did not mention such subpoenas, often in the form of National Security Letters, in his remarks. Comey acknowledged that the Snowden disclosures caused “justifiable surprise” among the public about the breadth of government surveillance, but hoped to mitigate it through greater transparency and advocacy. Yet the FBI keeps significant aspects of its surveillance reach hidden even from government oversight bodies. Intelligence officials said in a June letter to a US senator that the FBI does not tally how often it searches through NSA’s vast hoards of international communications, without warrants, for Americans’ identifying information. Comey frequently described himself as being technologically unprepared to offer specific solutions, and said he meant to begin a conversation, even at the risk of putting American tech companies at a competitive disadvantage.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


Chat logs reveal FBI informant Sabu’s role in hacking of Sun newspaper
2014-10-14, The Guardian
http://www.theguardian.com/us-news/2014/oct/14/fbi-informants-role-hacking-su...

The FBI is facing questions over its role in a 2011 hacking attack on Rupert Murdoch’s Sun newspaper in the UK after the publication of chat logs showed that a man acting as an agency informant played a substantial role in the operation. The attack was so successful that the publisher took down the websites of the Sun and the Times while technicians worked out the scale of the hack. Unsealed documents ... seen by the Guardian, show Hector Xavier Monsegur – known widely online as “Sabu” and frequently referred to as the leader of Lulzsec – played an active role in the operation. The chat records show Monsegur encouraging others to break further into News International systems, claiming to have sources at the Sun, and even apparently helping to break staff’s passwords and to source files for stealing. Monsegur was, however, at that time operating under the direction of the FBI. The close involvement of an FBI asset working under extraordinarily close supervision in a hacking attack on a media outlet ultimately owned by a US-listed company is set to raise further questions about the agency’s approach to tackling online crime. The logs also show Sabu on multiple occasions offering detailed technical help to find additional records on different servers, breaking in to new servers, or obtaining more files – which could easily have included those belonging to journalists at either the Sun or Times. The Sun, which is challenging the UK government over police accessing the phone records of one of its reporters, declined to comment on the apparent FBI involvement in attacks on its servers.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources. For an in-depth look at how these practices have been shown to interfere with a free press, see these excellent, reliable Mass Media Resources.


Journalist Talks Confidential Sources, Getting Subpoenaed And His New Book
2014-10-14, National Public Radio
http://www.npr.org/2014/10/14/356121289/journalist-talks-confidential-sources...

TERRY GROSS: James Risen [is] an investigative reporter for The New York Times. He, along with Eric Lichtbau, broke the story about warrantless wiretapping. Now Risen is facing a prison sentence for refusing to reveal his source or sources for that story. [Risen] has a new book called "Pay Any Price: Greed, Power And Endless War," which is a series of investigations into who's making money on the War on Terror and what are some of the secret operations within it. You recently wrote an article in The New York Times with Laura Poitras who broke the Edward Snowden story along with Glenn Greenwald. And you reported on how American intelligence is trying to harvest facial imagery with the intention of - what's it for? RISEN: Facial recognition ... in a way that no [one] really understood before has become a central focus of the NSA today. They can link that up with a signals intelligence, which is the communications that they intercept [and] basically find where you are, what you're doing, who you're seeing and virtually anything about you in real time. GROSS: So ... your big story turned out kind of differently than the celebrations facing Woodward and Bernstein. RISEN: I think the times have changed. We had this period in journalism for about 30 years where there was the government and the press. The government ... wouldn't go after whistleblowers or reporters very aggressively. It's only after the - after 9/11 and after the plane case, which you may remember where Judy Miller was sent to jail. I think the post-9/11 age, the government has decided to become much more aggressive against reporters and whistleblowers.

Note: The above quotes are from the transcript of a radio interview that you can listen to by clicking on the news story link provided. For more along these lines, see concise summaries of deeply revealing stories about high level manipulation of mass media from reliable sources.


Probe of silencers leads to web of Pentagon secrets
2014-10-14, Washington Post
http://www.washingtonpost.com/world/national-security/probe-of-silencers-lead...

The mysterious workings of a Pentagon office that oversees clandestine operations are unraveling in federal court, where a criminal investigation has exposed a secret weapons program ... to manufacture an untraceable batch of automatic-rifle silencers. The silencers — 349 of them — were ordered by a little-known Navy intelligence office at the Pentagon known as the Directorate for Plans, Policy, Oversight and Integration. The directorate is composed of fewer than 10 civilian employees, most of them retired military personnel. Court records filed by prosecutors allege that the Navy paid the auto mechanic — the brother of the directorate’s boss — $1.6 million for the silencers, even though they cost only $10,000 in parts and labor to manufacture. If the foreign-made weapons were equipped with unmarked silencers, the source said, the weapons could have been used by U.S. or foreign forces for special operations in other countries without any risk that they would be traced back to the United States. No documentation has surfaced in court to indicate that Navy officials formally signed off on the silencer project, although many pretrial motions have been filed under seal. Hall, the directorate official charged with illegally purchasing the silencers, has asserted that he received verbal approval for the secret program from Robert C. Martinage, a former acting undersecretary of the Navy, according to statements made during pretrial hearings. Martinage was forced to resign in January after investigators looking into the silencer deal found evidence that he had engaged in personal misconduct ... unrelated to the silencer contract.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


Court Spotlights the FBI’s Super-Secret National Security Letters
2014-10-09, The Intercept
https://firstlook.org/theintercept/2014/10/09/court-spotlight-super-secret-na...

[National security letters], the reach of which was expanded under the Patriot Act in 2001, let the FBI get business records from telephone, banking, and Internet companies with just a declaration that the information is relevant to a counterterrorism investigation. The FBI can get such information with a subpoena or another method with some judicial oversight. Can the government make demands for data entirely in secret? That was the question yesterday before a federal appeals court in San Francisco, where government lawyers argued that National Security Letters — FBI requests for information that are so secret they can’t be publicly acknowledged by the recipients — were essential to counterterrorism investigations. One of the judges seemed to question why there was no end-date on the gag orders, and why the burden was on the recipients of NSLs to challenge them. “It leaves it to the poor person who is subject to those requirements to just constantly petition the government to get rid of it,” said the judge, N. Randy Smith. The FBI sends out thousands of NSLs each year – 21,000 in fiscal year 2012. Google, Yahoo, Facebook and Microsoft filed a brief in support of the NSL challenge, arguing that they want to “publish more detailed aggregate statistics about the volume, scope and type of NSLs that the government uses to demand information about their users.” Twitter also announced this week that it was suing the U.S. government over restrictions on how it can talk about surveillance orders. Tech companies can currently make public information about the number of NSLs or Foreign Intelligence Surveillance Court orders they receive in broad ranges, but Twitter wants to be more specific.

Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.


The NSA and Me: By Former ABC Producer James Bamford
2014-10-02, The Intercept
https://firstlook.org/theintercept/2014/10/02/the-nsa-and-me/

My biggest battle with the NSA came before my book [The Puzzle Palace] was even published. I had obtained the criminal file that the Justice Department had opened on the NSA. Marked as Top Secret, the file was so sensitive that only two original copies existed. Never before or since has an entire agency been the subject of a criminal investigation. Senior officials at the NSA were even read their Miranda rights. Issued on June 6, 1975, the report noted that both the NSA and CIA had engaged in questionable and possibly illegal electronic surveillance. As a result, Attorney General Edward Levi established a secret internal task force to look into the potential for criminal prosecution. Focusing particularly on NSA, the task force probed more deeply into domestic eavesdropping than any part of the executive branch had ever done before. The report’s prosecutive summary also pointed to the NSA’s top-secret “charter” issued by the Executive Branch, which exempts the agency from legal restraints placed on the rest of the government. This ... meant the NSA did not have to follow any restrictions placed on electronic surveillance “unless it was expressly directed to do so.” In short, the report asked, how can you prosecute an agency that is above the law? More than three decades later, the NSA, like a mom-and-pop operation that has exploded into a global industry, now employs sweeping powers of surveillance that Frank Church could scarcely have imagined in the days of wired phones and clunky typewriters. At the same time, the Senate intelligence committee he once chaired has done an about face, protecting the agencies from the public rather than the public from the agencies. Without adequate oversight, or penalties for abuse, the only protection that citizens have comes not from Congress or the courts, but from whistleblowers.

Note: James Bamford is the courageous ABC producer and investigative reporter who first exposed the declassified Operation Northwoods files in the May of 2001. These files showed beyond a shadow of a doubt that the top Pentagon generals were willing to carry out false flag terrorism activities which would kill innocent civilians in order to foment war fever against Cuba. Yet only ABC News out of all the major media outlets was willing to report this most shocking news. Don't miss the entire, highly revealing article by Bamford at the link above.


Resurrecting a Disgraced Reporter
2014-10-02, New York Times
http://www.nytimes.com/2014/10/05/movies/kill-the-messenger-recalls-a-reporte...

As part of their insurgency against the Sandinista government in Nicaragua, some of the C.I.A.-backed contras made money through drug smuggling, transgressions noted in a little-noticed 1988 Senate subcommittee report. Gary Webb, a journalist at The San Jose Mercury News, thought it was a far-fetched story to begin with, but in 1995 and 1996, he dug in and produced a deeply reported and deeply flawed three-part series called “Dark Alliance.” That groundbreaking series was among the first to blow up on the nascent web, and he was initially celebrated, then investigated and finally discredited. Pushed out of journalism in disgrace, he committed suicide in 2004. [The movie] “Kill the Messenger” ... suggests that he told a truth others were unwilling to. Mr. Webb was not the first journalist to come across [such matters]. In December 1985, The Associated Press reported that three contra groups had “engaged in cocaine trafficking, in part to help finance their war against Nicaragua.” Major news outlets mostly gave the issue a pass. Peter Landesman, an investigative journalist who wrote the screenplay, was struck by the reflex to go after Mr. Webb. “Planeloads of weapons were sent south from the U.S., and everyone knows that those planes didn’t come back empty, but the C.I.A. made sure that they never knew for sure what was in those planes,” he said. “But instead of going after that, they went after Webb." In 1998, Frederick P. Hitz, the C.I.A. inspector general, testified before the House Intelligence Committee that after looking into the matter at length, he believed the C.I.A. was a bystander — or worse — in the war on drugs. However dark or extensive, the alliance Mr. Webb wrote about was a real one.

Note: Webb's story was not deeply flawed, as reported in this article. His editor even commented that four Washington Post writers could not find one significant factual error, but then changed his mind after CIA leaders threatened the paper. Read a Sacrament Bee newspaper article for more on Webb and his story. For more along these lines, see the excellent, reliable resources provided in our Mass Media Information Center.


George Brandis has silently swept away your freedoms
2014-09-29, Sydney Morning Herald (Australia's leading newspaper)
http://www.smh.com.au/comment/george-brandis-has-silently-swept-away-your-fre...

Australia has changed radically since last week though it might not look like it on the surface. Late Thursday night the Senate passed the National Security Amendment Bill (No.1) 2014 giving unlimited power to spies and secret police. Now officials can break the law with immunity from prosecution - and without having to answer to a court. They can act in total secrecy. They will decide what they do and to whom and when. They do not have to ask permission. They will choose when to interfere in your life and when they won't. They can dip into your most private communications and they don't need a warrant to do so. Sometimes they will do it because it is necessary to fight crime. Sometimes because they enjoy it. If they mess up your life and you tell anybody, you will get 10 years' jail – even if it doesn't harm security. When a Special Intelligence Operation (SIO) is declared then any participant can break the law on you with no consequences, according to Schedule 3 section 35k. There are broad limits. They cannot kill or torture you, or cause significant physical injury. Minor injury or mental torment is fine. Anyone involved in an SIO will have these powers – but who are they? ASIO, with 1778 staff. The Australian Federal Police, with more than 6900 staff. NSW Police with about 16,370 officers and a spy database called COPS which has more than 30 million entries on the people of NSW. But not just them. Anyone involved in an SIO enjoys legal immunity, including affiliates and subcontractors – whoever they are. Many Senators clearly hadn't read the 128 pages of major legal changes in the NSA Bill. The citizen needs protection from the state built into the laws and that is what they smashed on Thursday.

Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


Who profits from our new war? Inside NSA and private contractors’ secret plans
2014-09-24, Salon
http://www.salon.com/2014/09/24/heres_who_profits_from_our_new_war_inside_nsa...

A massive, $7.2 billion Army intelligence contract signed just 10 days ago underscores the central role to be played by the National Security Agency and its army of private contractors in the unfolding air war being carried out by the United States and its Gulf States allies against the Islamic State in Iraq and Syria. INSCOM’s “global intelligence support” contract will place the contractors at the center of this fight. Under its terms, 21 companies, led by Booz Allen Hamilton, BAE Systems, Lockheed Martin and Northrop Grumman, will compete over the next five years to provide “fully integrated intelligence, security and information operations” in Afghanistan and “future contingency operations” around the world. INSCOM announced the global intelligence contract two days after President Obama, in a speech to the nation, essentially declared war on ISIS in Iraq and Syria and outlined a campaign of airstrikes and combat actions to “degrade and ultimately destroy” the terrorist group. The top contractors on the INSCOM contract are already involved in the war. Lockheed Martin, for example, makes the Hellfire missiles that are used extensively in U.S. drone strikes. Northrop Grumman makes the Global Hawk surveillance drone. Both companies have large intelligence units. 70 percent of the U.S. intelligence budget is spent on private contractors. This spending [is] estimated at around $70 billion a year. [There is a] revolving door between INSCOM and its contractors. The system is corrupted by the close relationships between the companies and their agencies, said [Tom] Drake, who as a whistle-blower was nearly sent to prison for exposing the waste, fraud and abuse in a contracted program at the NSA that ended up losing over $7 billion.

Note: Read a powerful essay written by a top US general showing how he was fooled into supporting wars that were generated by the powerful global elite who want never-ending war in order to keep their profits flowing.


Snowden Honored With 'Alternative Nobel'
2014-09-24, ABC News/Associated Press
http://abcnews.go.com/International/wireStory/snowden-honored-alternative-nob...

Edward Snowden was among the winners Wednesday of a Swedish human rights award, sometimes referred to as the "alternative Nobel," for his disclosures of top secret surveillance programs. The decision to honor the former National Security Agency contractor with the Right Livelihood Award appeared to cause a diplomatic headache for Sweden's Foreign Ministry, which withdrew the prize jury's permission to use its media room for the announcement. Snowden split the honorary portion of the award with Alan Rusbridger, editor of the Guardian, which has published a series of articles on government surveillance based on documents leaked by Snowden. The award foundation cited Snowden's "courage and skill" in revealing the extent of government surveillance and praised Rusbridger "for building a global media organization dedicated to responsible journalism in the public interest." Created in 1980, the annual Right Livelihood Award honors efforts that founder Jacob von Uexkull felt were being ignored by the Nobel Prizes. Snowden, who has reportedly also been nominated for the Nobel Peace Prize, remains exiled in Russia since leaking top secret NSA documents to journalists last year. He has been charged under the U.S. Espionage Act and could face up to 30 years in prison. Though the honorary award doesn't include any money, the foundation would offer to help pay Snowden's legal costs. Von Uexkull said the foundation was denied access to the Swedish Foreign Ministry's media room, where it has announced the awards since 1995, after it gave the ministry advance notice of the winners.

Note: For more on this, see concise summaries of deeply revealing secrecy news articles from reliable major media sources.


Snowden: New Zealand’s Prime Minister Isn’t Telling the Truth About Mass Surveillance
2014-09-15, The Intercept
https://firstlook.org/theintercept/2014/09/15/snowden-new-zealand-surveillance

Prime Minister John Key ... has denied that New Zealand’s spy agency GCSB engages in mass surveillance, mostly as a means of convincing the country to enact a new law vesting the agency with greater powers. Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. If you live in New Zealand, you are being watched. At the NSA I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called “XKEYSCORE.” It allows total, granular access to the database of communications collected in the course of mass surveillance. It is not limited to or even used largely for the purposes of cybersecurity, as has been claimed, but is instead used primarily for reading individuals’ private email, text messages, and internet traffic. I know this because it was my full-time job in Hawaii, where I worked every day in an NSA facility with a top secret clearance. The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks. It means they have the ability see every website you visit, every text message you send, every call you make, every ticket you purchase, every donation you make, and every book you order online. From “I’m headed to church” to “I hate my boss” to “She’s in the hospital,” the GCSB is there. Your words are intercepted, stored, and analyzed by algorithms long before they’re ever read by your intended recipient.

Note: New Zealand's prime minister has acknowledged that Snowden may be right, as reported in this article. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


US Senator: 'US Turned Blind Eye to Saudi Role in 9/11, Fuelling Rise of Isis'
2014-09-14, International Business Times
http://www.ibtimes.co.uk/us-senator-us-turned-blind-eye-saudi-role-9-11-fuell...

The rise of ISIS has been aided by the failure of the US government to investigate the connection between the Saudi Arabian government and jihadist networks, said former senator Bob Graham. Senator Graham, who chaired the Senate Intelligence Committee, said that successive administrations had failed to examine the connections between the Saudis and Sunni militant groups. "I believe that the failure to shine a full light on Saudi actions ... has contributed to the Saudi ability to continue to engage in actions that are damaging to the US – and in particular their support for ISIS," he said. The Saudis have been accused of using Sunni militant groups as proxies, channeling money to Islamist groups battling the forces of president Bashar al-Assad in the Syrian civil war, as Sunni and Shia battle for hegemony in the Middle East. The Shia Iranians are chief backers of Assad, and Nouri al Maliki's Shia-dominated government which collapsed following ISIS' onslaught in Iraq, accused the Saudi Arabia and Qatar of funding ISIS, and facilitating "genocide". [Graham] said that Saudi Arabia gives support to the "the most extremist elements among the Sunni". Al-Qaida leader Osama bin Laden was the son of a wealthy construction magnate, who had close ties to the Saudi royal family. It is alleged that redacted pages of the [Joint Congressional 9/11 inquiry] report establish links between Saudi government officials and al-Qaida.

Note: Watch the highly illuminating BBC documentary "Power of Nightmares" that reveals that al-Qaida, under the control of Osama bin Laden, has never actually existed, but is a US/UK-government psychological operation to launch the "Global War on Terror". For more on this, read Prof. David Ray Griffin's deeply revealing book Osama bin Laden: Dead or Alive?


U.S. threatened massive fine to force Yahoo to release data
2014-09-11, Washington Post
http://www.washingtonpost.com/business/technology/us-threatened-massive-fine-...

The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Obama's legal rationale for ISIS strikes: shoot first, ask Congress later
2014-09-11, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/sep/11/obama-isis-syria-air-strikes-leg...

In the space of a single primetime address on [September 10], Barack Obama dealt a crippling blow to a creaking, 40-year old effort to restore legislative primacy to American warmaking. The administration’s rationale, at odds with the war it is steadily expanding, is to forestall an endless conflict foisted upon it by a bloodthirsty legislature. Yet one of the main authorities Obama is relying on for avoiding Congress is the 2001 ... document known as the Authorization to Use Military Force (AUMF) that few think actually applies to ISIS. Taken together with the congressional leadership’s shrug, Obama has stripped the veneer off a contemporary fact of American national security: presidents make war on their own, and congresses acquiesce. An allergy to congressional authorisation is enmeshed with the president’s stated desire to end what he last year termed a “perpetual war” footing. It has led Obama in directions legal scholars consider highly questionable. Not only has Obama rejected restrictions of his warmaking power, he has also rejected legislative expansions of it - a more curious choice. Obama has been wary that Congress will offer up new laws that entrench and expand an amorphous war that, in his mind, he has waged with the minimum necessary amount of force. Obama last year advocated the eventual repeal of the 2001 authorisation - as well as the 2002 congressional approval of the Iraq war - to aid in turning a page on a long era of US warfare. [After Obama's address] a senior administration official told reporters that the 2001 authorisation covered the war against ISIS.

Note: The war machine marches on as the US presidency claims ever more power over Congress. For more on this, see concise summaries of deeply revealing war news articles from reliable major media sources.



Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.