As of April 20th, we're $7,900 in the red for 2015. Kindly donate here to support this vital work.

Intelligence Agency Media Articles
Excerpts of Key Intelligence Agency Media Articles in Major Media


Below are many highly revealing excerpts of important intelligence agency articles reported in the mainstream media suggesting a cover-up. Links are provided to the full articles on major media websites. If any link fails to function, read this webpage. These intelligence agency articles are listed by article date. You can also explore the articles listed by order of importance or by date posted. By choosing to educate ourselves on these important issues and to spread the word, we can and will build a brighter future.

Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


Who profits from our new war? Inside NSA and private contractors’ secret plans
2014-09-24, Salon
http://www.salon.com/2014/09/24/heres_who_profits_from_our_new_war_inside_nsa...

A massive, $7.2 billion Army intelligence contract signed just 10 days ago underscores the central role to be played by the National Security Agency and its army of private contractors in the unfolding air war being carried out by the United States and its Gulf States allies against the Islamic State in Iraq and Syria. INSCOM’s “global intelligence support” contract will place the contractors at the center of this fight. Under its terms, 21 companies, led by Booz Allen Hamilton, BAE Systems, Lockheed Martin and Northrop Grumman, will compete over the next five years to provide “fully integrated intelligence, security and information operations” in Afghanistan and “future contingency operations” around the world. INSCOM announced the global intelligence contract two days after President Obama, in a speech to the nation, essentially declared war on ISIS in Iraq and Syria and outlined a campaign of airstrikes and combat actions to “degrade and ultimately destroy” the terrorist group. The top contractors on the INSCOM contract are already involved in the war. Lockheed Martin, for example, makes the Hellfire missiles that are used extensively in U.S. drone strikes. Northrop Grumman makes the Global Hawk surveillance drone. Both companies have large intelligence units. 70 percent of the U.S. intelligence budget is spent on private contractors. This spending [is] estimated at around $70 billion a year. [There is a] revolving door between INSCOM and its contractors. The system is corrupted by the close relationships between the companies and their agencies, said [Tom] Drake, who as a whistle-blower was nearly sent to prison for exposing the waste, fraud and abuse in a contracted program at the NSA that ended up losing over $7 billion.

Note: Read a powerful essay written by a top US general showing how he was fooled into supporting wars that were generated by the powerful global elite who want never-ending war in order to keep their profits flowing.


Snowden Honored With 'Alternative Nobel'
2014-09-24, ABC News/Associated Press
http://abcnews.go.com/International/wireStory/snowden-honored-alternative-nob...

Edward Snowden was among the winners Wednesday of a Swedish human rights award, sometimes referred to as the "alternative Nobel," for his disclosures of top secret surveillance programs. The decision to honor the former National Security Agency contractor with the Right Livelihood Award appeared to cause a diplomatic headache for Sweden's Foreign Ministry, which withdrew the prize jury's permission to use its media room for the announcement. Snowden split the honorary portion of the award with Alan Rusbridger, editor of the Guardian, which has published a series of articles on government surveillance based on documents leaked by Snowden. The award foundation cited Snowden's "courage and skill" in revealing the extent of government surveillance and praised Rusbridger "for building a global media organization dedicated to responsible journalism in the public interest." Created in 1980, the annual Right Livelihood Award honors efforts that founder Jacob von Uexkull felt were being ignored by the Nobel Prizes. Snowden, who has reportedly also been nominated for the Nobel Peace Prize, remains exiled in Russia since leaking top secret NSA documents to journalists last year. He has been charged under the U.S. Espionage Act and could face up to 30 years in prison. Though the honorary award doesn't include any money, the foundation would offer to help pay Snowden's legal costs. Von Uexkull said the foundation was denied access to the Swedish Foreign Ministry's media room, where it has announced the awards since 1995, after it gave the ministry advance notice of the winners.

Note: For more on this, see concise summaries of deeply revealing secrecy news articles from reliable major media sources.


Snowden: New Zealand’s Prime Minister Isn’t Telling the Truth About Mass Surveillance
2014-09-15, The Intercept
https://firstlook.org/theintercept/2014/09/15/snowden-new-zealand-surveillance

Prime Minister John Key ... has denied that New Zealand’s spy agency GCSB engages in mass surveillance, mostly as a means of convincing the country to enact a new law vesting the agency with greater powers. Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. If you live in New Zealand, you are being watched. At the NSA I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called “XKEYSCORE.” It allows total, granular access to the database of communications collected in the course of mass surveillance. It is not limited to or even used largely for the purposes of cybersecurity, as has been claimed, but is instead used primarily for reading individuals’ private email, text messages, and internet traffic. I know this because it was my full-time job in Hawaii, where I worked every day in an NSA facility with a top secret clearance. The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks. It means they have the ability see every website you visit, every text message you send, every call you make, every ticket you purchase, every donation you make, and every book you order online. From “I’m headed to church” to “I hate my boss” to “She’s in the hospital,” the GCSB is there. Your words are intercepted, stored, and analyzed by algorithms long before they’re ever read by your intended recipient.

Note: New Zealand's prime minister has acknowledged that Snowden may be right, as reported in this article. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


US Senator: 'US Turned Blind Eye to Saudi Role in 9/11, Fuelling Rise of Isis'
2014-09-14, International Business Times
http://www.ibtimes.co.uk/us-senator-us-turned-blind-eye-saudi-role-9-11-fuell...

The rise of ISIS has been aided by the failure of the US government to investigate the connection between the Saudi Arabian government and jihadist networks, said former senator Bob Graham. Senator Graham, who chaired the Senate Intelligence Committee, said that successive administrations had failed to examine the connections between the Saudis and Sunni militant groups. "I believe that the failure to shine a full light on Saudi actions ... has contributed to the Saudi ability to continue to engage in actions that are damaging to the US – and in particular their support for ISIS," he said. The Saudis have been accused of using Sunni militant groups as proxies, channeling money to Islamist groups battling the forces of president Bashar al-Assad in the Syrian civil war, as Sunni and Shia battle for hegemony in the Middle East. The Shia Iranians are chief backers of Assad, and Nouri al Maliki's Shia-dominated government which collapsed following ISIS' onslaught in Iraq, accused the Saudi Arabia and Qatar of funding ISIS, and facilitating "genocide". [Graham] said that Saudi Arabia gives support to the "the most extremist elements among the Sunni". Al-Qaida leader Osama bin Laden was the son of a wealthy construction magnate, who had close ties to the Saudi royal family. It is alleged that redacted pages of the [Joint Congressional 9/11 inquiry] report establish links between Saudi government officials and al-Qaida.

Note: Watch the highly illuminating BBC documentary "Power of Nightmares" that reveals that al-Qaida, under the control of Osama bin Laden, has never actually existed, but is a US/UK-government psychological operation to launch the "Global War on Terror". For more on this, read Prof. David Ray Griffin's deeply revealing book Osama bin Laden: Dead or Alive?


U.S. threatened massive fine to force Yahoo to release data
2014-09-11, Washington Post
http://www.washingtonpost.com/business/technology/us-threatened-massive-fine-...

The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Obama's legal rationale for ISIS strikes: shoot first, ask Congress later
2014-09-11, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/sep/11/obama-isis-syria-air-strikes-leg...

In the space of a single primetime address on [September 10], Barack Obama dealt a crippling blow to a creaking, 40-year old effort to restore legislative primacy to American warmaking. The administration’s rationale, at odds with the war it is steadily expanding, is to forestall an endless conflict foisted upon it by a bloodthirsty legislature. Yet one of the main authorities Obama is relying on for avoiding Congress is the 2001 ... document known as the Authorization to Use Military Force (AUMF) that few think actually applies to ISIS. Taken together with the congressional leadership’s shrug, Obama has stripped the veneer off a contemporary fact of American national security: presidents make war on their own, and congresses acquiesce. An allergy to congressional authorisation is enmeshed with the president’s stated desire to end what he last year termed a “perpetual war” footing. It has led Obama in directions legal scholars consider highly questionable. Not only has Obama rejected restrictions of his warmaking power, he has also rejected legislative expansions of it - a more curious choice. Obama has been wary that Congress will offer up new laws that entrench and expand an amorphous war that, in his mind, he has waged with the minimum necessary amount of force. Obama last year advocated the eventual repeal of the 2001 authorisation - as well as the 2002 congressional approval of the Iraq war - to aid in turning a page on a long era of US warfare. [After Obama's address] a senior administration official told reporters that the 2001 authorisation covered the war against ISIS.

Note: The war machine marches on as the US presidency claims ever more power over Congress. For more on this, see concise summaries of deeply revealing war news articles from reliable major media sources.


Ex-Senator: FBI covered up 9/11 investigation
2014-09-10, WTSP-TV (Tampa Bay, FL CBS affiliate)
http://www.wtsp.com/story/news/investigations/2014/09/10/911-cover-up-fbi-for...

A major FBI cover-up ... connects Sarasota and the 9/11 hijackers to the Saudi Arabian government. While still at Sarasota's Emma E. Booker Elementary on the day of the 2001 terrorist attacks, President George W. Bush said, "Terrorism against our nation will not stand." However, the president's visit wasn't the only thing to tie this Bay area county to the September 11th attacks. Within days, we learned three of the hijackers had been living in the area while taking flying lessons at Huffman Aviation and Florida Flight Training in Sarasota County... but there is even more than that. "There was a network supporting the hijackers," says former U.S. Senator and Florida governor Bob Graham. According to Graham, the FBI has been covering up that fact for years, and continues to try and hide it even now. Graham says he is convinced there was a direct line between some of the terrorists who carried out the September 11th attacks and the government of Saudi Arabia. According to Graham, the FBI was aware of the strong connection between hijackers and a Saudi Arabian family who were living in an upscale Sarasota gated community. Twelve days before 9/11, the family abandoned the house -- leaving behind valuable items including food, clothing, furnishings and three vehicles. "There are some things I can't talk about," Graham told us, "And there are others like what I know is involved in the investigation in Sarasota, which is diametrically opposed to what the FBI said publicly."

Note: For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.


CIA 'tortured al-Qaeda suspects close to the point of death by drowning them in water-filled baths'
2014-09-07, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/news/worldnews/al-qaeda/11080450/CIA-tortured-al-Q...

The CIA brought top al-Qaeda suspects close “to the point of death” by drowning them in water-filled baths during interrogation sessions in the years that followed the September 11 attacks, a security source has told The Telegraph. The description of the torture meted out to at least two leading al-Qaeda suspects, including the alleged 9/11 mastermind Khalid Sheikh Mohammed, far exceeds the conventional understanding of waterboarding, or “simulated drowning” so far admitted by the CIA. “They weren’t just pouring water over their heads or over a cloth,” said the source who has first-hand knowledge of the period. “They were holding them under water until the point of death, with a doctor present to make sure they did not go too far. This was real torture.” The account of extreme CIA interrogation comes as the US Senate prepares to publish a declassified version of its so-called Torture Report – a 3,600-page report document based on a review of several million classified CIA documents. Publication of the report is currently being held up by a dispute over how much of the 480-page public summary should remain classified, but it is expected to be published within weeks. A second source who is familiar with the Senate report told The Telegraph that it contained several unflinching accounts of some CIA interrogations which – the source predicted – would “deeply shock” the general public.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


Aggressive police take hundreds of millions of dollars from motorists not charged with crimes
2014-09-06, Washington Post
http://www.washingtonpost.com/sf/investigative/2014/09/06/stop-and-seize/

The spread of an aggressive brand of policing ... has spurred the seizure of hundreds of millions of dollars in cash from motorists and others not charged with crimes. Thousands of people have been forced to fight legal battles that can last more than a year to get their money back. Behind the rise in seizures is a little-known cottage industry of private police-training firms that teach the techniques of “highway interdiction” to departments across the country. [It has] enabled police nationwide to share detailed reports about American motorists — criminals and the innocent alike — including their Social Security numbers, addresses and identifying tattoos, as well as hunches about which drivers to stop. A thriving subculture of road officers on the network now competes to see who can seize the most cash and contraband, describing their exploits in the network’s chat rooms and sharing “trophy shots” of money and drugs. Some police advocate highway interdiction as a way of raising revenue for cash-strapped municipalities. Unexplored until now is the role of the federal government and the private police trainers in encouraging officers to target cash on the nation’s highways. There have been 61,998 cash seizures made on highways and elsewhere since 9/11 without search warrants ... totaling more than $2.5 billion. State and local authorities kept more than $1.7 billion of that while Justice, Homeland Security and other federal agencies received $800 million. 298 departments and 210 task forces have seized the equivalent of 20 percent or more of their annual budgets since 2008. In 400 federal court cases examined by The Post where people who challenged seizures and received some money back, the majority were black, Hispanic or another minority.

Note: Watch an excellent spoof on this unbelievable police practice. For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


The U.S. Government’s Secret Plans to Spy for American Corporations
2014-09-05, The Intercept
https://firstlook.org/theintercept/2014/09/05/us-governments-plans-use-econom...

Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. [But] the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations. But a secret 2009 report issued by [Director of National Intelligence James Clapper's] office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies. One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence”.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.


The CIA’s Mop-Up Man: L.A. Times Reporter Cleared Stories With Agency Before Publication
2014-09-04, The Intercept
https://firstlook.org/theintercept/2014/09/04/former-l-times-reporter-cleared...

A prominent national security reporter for the Los Angeles Times routinely submitted drafts and detailed summaries of his stories to CIA press handlers prior to publication, according to documents obtained by The Intercept. Email exchanges between CIA public affairs officers and Ken Dilanian, now an Associated Press intelligence reporter who previously covered the CIA for the Times, show that Dilanian enjoyed a closely collaborative relationship with the agency, explicitly promising positive news coverage and sometimes sending the press office entire story drafts for review prior to publication. In at least one instance, the CIA’s reaction appears to have led to significant changes in the story that was eventually published in the Times. Dilanian’s emails were included in hundreds of pages of documents that the CIA turned over in response to two FOIA requests seeking records on the agency’s interactions with reporters. They include email exchanges with reporters for the Associated Press, Washington Post, New York Times, Wall Street Journal, and other outlets. In addition to Dilanian’s deferential relationship with the CIA’s press handlers, the documents show that the agency regularly invites journalists to its McLean, Va., headquarters for briefings and other events.

Note: For more on this, see concise summaries of deeply revealing major media corruption news articles from reliable major media sources.


White House should release 9/11 documents
2014-09-03, Miami Herald
http://www.miamiherald.com/2014/09/03/4317165/white-house-should-release-911....

Florida’s former U.S. Sen. Bob Graham ... has been fighting both the Bush and Obama administrations to declassify 28 pages of a 9/11 intelligence report that may detail and expose the efforts of members of the Saudi Arabian royal family in aiding and abetting [9/11] terrorists in Florida, many who were themselves Saudi. Graham is befuddled as to why the Obama administration does not release these documents, which he read when he was chair of the Senate Select Intelligence Committee and co-chair of a congressional inquiry into the 9/11 attacks. As a result, he has joined a Freedom of Information Act request alongside others, asking that 80,000 pages of information on a Saudi family that disappeared just before the attacks be made public. “It isn’t credible that 19 people — most [of whom] could not speak English well and did not have experience in the United States — could carry out such a complicated task without external assistance,” Graham insists. The Saudi family living in Sarasota fled to Saudi Arabia just prior to the 9/11 attacks. Were they tipped off that they should leave? If so, by whom? Graham believes that there was a deliberate effort to cover up Saudi involvement in the tragedy of 9/11 by the Bush administration, one, he says, that the Obama administration appears to support. The American public needs to know. The families of those who were lost to the 9/11 attacks or those who fought in Afghanistan and Iraq deserve an answer as well.

Note: For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.


Homeland Security was built to fend off terrorists. Why's it so busy arming cops to fight average Americans?
2014-09-02, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2014/sep/02/homeland-security-depart...

America has raged against the appalling behavior of the local police in Ferguson, Missouri, and for good reason: automatic rifles pointed at protesters, tank-like armored trucks blocking marches, the teargassing and arresting of reporters, tactics unfit even for war zones. [But ire] should also be focused on the federal government agency that has enabled the rise of military police, and so much more: the Department of Homeland Security (DHS). The 240,000-employee [agency] has been the primary arms dealer for out-of-control local cops in Ferguson and beyond, handing out tens of billions of dollars in grants for military equipment in the last decade with little to no oversight. Police can act like paramilitary forces to combat the most mundane crimes without much worry of the consequences. But the problem with DHS is much larger than just combat gear: Homeland Security is also transferring tens or hundreds of millions of dollars in high-tech spying technology to local police through a sprawling backroom operation surveilling your neighborhood, much of which may be unconstitutional. DHS has its own fleet of Predator drones roaming the US border and far beyond, which it has loaned out to police over 500 times. Homeland Security is also handing out millions of dollars to local police to “accelerate and facilitate the adoption” of smaller drones that police can fly themselves. Cops claim they want these “middleman” drones for “emergencies,” but ... documents show they’ll end up using them for “crowd control” and “intelligence gathering”.

Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.


The US government can brand you a terrorist based on a Facebook post
2014-08-30, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/commentisfree/2014/aug/30/terrorist-watch-list-rul...

The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.

Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.


Former cyber security chief convicted in child porn case
2014-08-27, CBS News
http://www.cbsnews.com/news/former-cyber-security-chief-convicted-in-child-po...

A former federal cyber security chief was convicted [on August 26] on several charges related to accessing and distributing child pornography. Timothy DeFoggi, 56, was acting director of cyber security at the U.S. Department of Health and Human Services when he was detained in May 2013 as part of an investigation targeting three child pornography websites. The former Germantown, Md. resident registered as a member of one of the sites on March 2, 2012, according to a U.S. Department of Justice press release. He used the site to access and solicit child pornography, "and exchanged private messages with other members where he expressed an interest in the violent rape and murder of children," according to the DOJ. DeFoggi also suggested to one member of a message board that they meet in person to fulfill fantasies of violently raping and murdering children. He is the sixth person convicted in connection with the investigation. Sentencing is scheduled for Nov. 7.

Note: For powerful evidence from a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government, click here. For more on this, see concise summaries of deeply revealing sexual abuse scandals news articles from reliable major media sources.


Mysterious Phony Cell Towers Could Be Intercepting Your Calls
2014-08-27, Popular Science
http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-b...

Les Goldsmith, the CEO of ESD America [marketers of the Crytophone 500], points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device. “Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.” Who is running these interceptors and what are they doing with the calls? Goldsmith says we can’t be sure, but he has his suspicions. “Are some of them U.S. government interceptors?” [asks] Goldsmith. Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. For governments or other entities able to afford a price tag of “less than $100,000,” says Goldsmith, high-quality interceptors are quite realistic. Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example.

Note: Do you think the government might have put up fake cell towers to nab more data? For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


The Surveillance Engine: How the NSA Built Its Own Secret Google
2014-08-25, The Intercept
https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-c...

The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. ICREACH [as the search engine is called] contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy. ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.


Judge orders FBI to investigate witness tampering
2014-08-25, Miami Herald
http://www.miamiherald.com/2014/08/25/4308448/judge-orders-fbi-to-investigate...

A federal judge has ordered the FBI to scrutinize allegations that the agency pressured a witness not to testify in a trial about videos related to the Oklahoma City bombing. U.S. District Judge Clark Waddoups said the agency needs to get to the bottom of the claims from Utah lawyer Jesse Trentadue, who said that the FBI threatened to cut off a former government operative's benefits if he appeared in court. Waddoups decided the lawyer's report raises disturbing questions, and he wanted evidence that the agency has thoroughly investigated the matter. Waddoups ordered the attorneys to present the results of the witness-tampering investigation on Nov. 13. The hearing is the latest in a case that reignited questions about whether others were involved in the bombing that killed 168 people. Trentadue argues surveillance videos from 1995 show Timothy McVeigh had an accomplice. The agency says its investigators have done a reasonable search and found no evidence of additional unreleased videos. [John] Matthews was supposed to testify during a late July bench trial, but Trentadue argued that he backed out at the last minute because the FBI threatened to cut off his veteran's and disability benefits. Trentadue said Matthews was part of a stealth government operation before the Oklahoma City bombing tracking militia movements of which McVeigh was a part, and his testimony could support the idea that there was a second suspect. Matthews told him and a colleague that he had been pressured in phone calls just before and after he was supposed to testify, the lawyer said.

Note: Many aspects of the Oklahoma City bombing were covered up. For a compilation of media videos showing without doubt that there were other bombs in the building which later were completely ignored, click here. For other major media articles showing major manipulation, click here click here, here, and here.


Why We Fight Wars
2014-08-18, New York Times
http://www.nytimes.com/2014/08/18/opinion/paul-krugman-why-we-fight.html

A century has passed since the start of World War I, which many people at the time declared was “the war to end all wars.” Unfortunately, wars just kept happening. In influential research sponsored by the World Bank, the Oxford economist Paul Collier has shown that the best predictor of civil war, which is all too common in poor countries, is the availability of lootable resources like diamonds. Whatever other reasons rebels cite for their actions seem to be mainly after-the-fact rationalizations. If you’re a modern, wealthy nation, however, war — even easy, victorious war — doesn’t pay. And this has been true for a long time. In his famous 1910 book The Great Illusion, the British journalist Norman Angell argued that “military power is socially and economically futile.” As he pointed out, in an interdependent world (which already existed in the age of steamships, railroads, and the telegraph), war would necessarily inflict severe economic harm even on the victor. Modern nations can’t enrich themselves by waging war. Yet wars keep happening. Why? Governments all too often gain politically from war, even if the war in question makes no sense in terms of national interests. Nations almost always rally around their leaders in times of war, no matter how foolish the war or how awful the leaders. Argentina’s junta briefly became extremely popular during the Falklands war. For a time, the “war on terror” took President George W. Bush’s approval to dizzying heights, and Iraq probably won him the 2004 election. True to form, Mr. Putin’s approval ratings have soared since the Ukraine crisis began.

Note: For more on this, see this concise summary of War Is A Racket, a powerful book written by one of the most highly decorated US generals ever.


Embracing flag, Snowden says he hopes to return to U.S.
2014-08-13, USA Today
http://www.usatoday.com/story/news/world/2014/08/13/snowden-wired-flag/13995013/

Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."

Note: Read the cover story from Wired magazine with a deep inside report on Snowden.



Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.