Intelligence Agency News Stories
Excerpts of Key Intelligence Agency News Stories in Major Media


Below are many highly revealing excerpts of important intelligence agency news stories reported in the major media that suggest a major cover-up. Links are provided to the full stories on their mainstream media websites. If any link fails to function, read this webpage. These intelligence agency news stories are listed by date posted to this webpage. You can explore the same articles listed by order of importance or by article date. By choosing to educate ourselves on these important issues and to spread the word, we can and will build a brighter future.


Intelligence Agency News stories


Note: This comprehensive list of intelligence agency news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Obama's legal rationale for ISIS strikes: shoot first, ask Congress later
2014-09-11, The Guardian (One of the UK's leading newspapers)
Posted: 2014-09-23 19:40:54
http://www.theguardian.com/world/2014/sep/11/obama-isis-syria-air-strikes-leg...

In the space of a single primetime address on [September 10], Barack Obama dealt a crippling blow to a creaking, 40-year old effort to restore legislative primacy to American warmaking. The administration’s rationale, at odds with the war it is steadily expanding, is to forestall an endless conflict foisted upon it by a bloodthirsty legislature. Yet one of the main authorities Obama is relying on for avoiding Congress is the 2001 ... document known as the Authorization to Use Military Force (AUMF) that few think actually applies to ISIS. Taken together with the congressional leadership’s shrug, Obama has stripped the veneer off a contemporary fact of American national security: presidents make war on their own, and congresses acquiesce. An allergy to congressional authorisation is enmeshed with the president’s stated desire to end what he last year termed a “perpetual war” footing. It has led Obama in directions legal scholars consider highly questionable. Not only has Obama rejected restrictions of his warmaking power, he has also rejected legislative expansions of it - a more curious choice. Obama has been wary that Congress will offer up new laws that entrench and expand an amorphous war that, in his mind, he has waged with the minimum necessary amount of force. Obama last year advocated the eventual repeal of the 2001 authorisation - as well as the 2002 congressional approval of the Iraq war - to aid in turning a page on a long era of US warfare. [After Obama's address] a senior administration official told reporters that the 2001 authorisation covered the war against ISIS.

Note: The war machine marches on as the US presidency claims ever more power over Congress. For more on this, see concise summaries of deeply revealing war news articles from reliable major media sources.




US Senator: 'US Turned Blind Eye to Saudi Role in 9/11, Fuelling Rise of Isis'
2014-09-14, International Business Times
Posted: 2014-09-23 19:37:52
http://www.ibtimes.co.uk/us-senator-us-turned-blind-eye-saudi-role-9-11-fuell...

The rise of ISIS has been aided by the failure of the US government to investigate the connection between the Saudi Arabian government and jihadist networks, said former senator Bob Graham. Senator Graham, who chaired the Senate Intelligence Committee, said that successive administrations had failed to examine the connections between the Saudis and Sunni militant groups. "I believe that the failure to shine a full light on Saudi actions ... has contributed to the Saudi ability to continue to engage in actions that are damaging to the US – and in particular their support for ISIS," he said. The Saudis have been accused of using Sunni militant groups as proxies, channeling money to Islamist groups battling the forces of president Bashar al-Assad in the Syrian civil war, as Sunni and Shia battle for hegemony in the Middle East. The Shia Iranians are chief backers of Assad, and Nouri al Maliki's Shia-dominated government which collapsed following ISIS' onslaught in Iraq, accused the Saudi Arabia and Qatar of funding ISIS, and facilitating "genocide". [Graham] said that Saudi Arabia gives support to the "the most extremist elements among the Sunni". Al-Qaida leader Osama bin Laden was the son of a wealthy construction magnate, who had close ties to the Saudi royal family. It is alleged that redacted pages of the [Joint Congressional 9/11 inquiry] report establish links between Saudi government officials and al-Qaida.

Note: Watch the highly illuminating BBC documentary "Power of Nightmares" that reveals that al-Qaida, under the control of Osama bin Laden, has never actually existed, but is a US/UK-government psychological operation to launch the "Global War on Terror". For more on this, read Prof. David Ray Griffin's deeply revealing book Osama bin Laden: Dead or Alive?




U.S. threatened massive fine to force Yahoo to release data
2014-09-11, Washington Post
Posted: 2014-09-23 19:36:18
http://www.washingtonpost.com/business/technology/us-threatened-massive-fine-...

The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.




Snowden: New Zealand’s Prime Minister Isn’t Telling the Truth About Mass Surveillance
2014-09-15, The Intercept
Posted: 2014-09-23 19:34:44
https://firstlook.org/theintercept/2014/09/15/snowden-new-zealand-surveillance

Prime Minister John Key ... has denied that New Zealand’s spy agency GCSB engages in mass surveillance, mostly as a means of convincing the country to enact a new law vesting the agency with greater powers. Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. If you live in New Zealand, you are being watched. At the NSA I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called “XKEYSCORE.” It allows total, granular access to the database of communications collected in the course of mass surveillance. It is not limited to or even used largely for the purposes of cybersecurity, as has been claimed, but is instead used primarily for reading individuals’ private email, text messages, and internet traffic. I know this because it was my full-time job in Hawaii, where I worked every day in an NSA facility with a top secret clearance. The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks. It means they have the ability see every website you visit, every text message you send, every call you make, every ticket you purchase, every donation you make, and every book you order online. From “I’m headed to church” to “I hate my boss” to “She’s in the hospital,” the GCSB is there. Your words are intercepted, stored, and analyzed by algorithms long before they’re ever read by your intended recipient.

Note: New Zealand's prime minister has acknowledged that Snowden may be right, as reported in this article. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.




CIA 'tortured al-Qaeda suspects close to the point of death by drowning them in water-filled baths'
2014-09-07, The Telegraph (One of the UK's leading newspapers)
Posted: 2014-09-15 07:19:16
http://www.telegraph.co.uk/news/worldnews/al-qaeda/11080450/CIA-tortured-al-Q...

The CIA brought top al-Qaeda suspects close “to the point of death” by drowning them in water-filled baths during interrogation sessions in the years that followed the September 11 attacks, a security source has told The Telegraph. The description of the torture meted out to at least two leading al-Qaeda suspects, including the alleged 9/11 mastermind Khalid Sheikh Mohammed, far exceeds the conventional understanding of waterboarding, or “simulated drowning” so far admitted by the CIA. “They weren’t just pouring water over their heads or over a cloth,” said the source who has first-hand knowledge of the period. “They were holding them under water until the point of death, with a doctor present to make sure they did not go too far. This was real torture.” The account of extreme CIA interrogation comes as the US Senate prepares to publish a declassified version of its so-called Torture Report – a 3,600-page report document based on a review of several million classified CIA documents. Publication of the report is currently being held up by a dispute over how much of the 480-page public summary should remain classified, but it is expected to be published within weeks. A second source who is familiar with the Senate report told The Telegraph that it contained several unflinching accounts of some CIA interrogations which – the source predicted – would “deeply shock” the general public.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.




The CIA’s Mop-Up Man: L.A. Times Reporter Cleared Stories With Agency Before Publication
2014-09-04, The Intercept
Posted: 2014-09-15 07:17:42
https://firstlook.org/theintercept/2014/09/04/former-l-times-reporter-cleared...

A prominent national security reporter for the Los Angeles Times routinely submitted drafts and detailed summaries of his stories to CIA press handlers prior to publication, according to documents obtained by The Intercept. Email exchanges between CIA public affairs officers and Ken Dilanian, now an Associated Press intelligence reporter who previously covered the CIA for the Times, show that Dilanian enjoyed a closely collaborative relationship with the agency, explicitly promising positive news coverage and sometimes sending the press office entire story drafts for review prior to publication. In at least one instance, the CIA’s reaction appears to have led to significant changes in the story that was eventually published in the Times. Dilanian’s emails were included in hundreds of pages of documents that the CIA turned over in response to two FOIA requests seeking records on the agency’s interactions with reporters. They include email exchanges with reporters for the Associated Press, Washington Post, New York Times, Wall Street Journal, and other outlets. In addition to Dilanian’s deferential relationship with the CIA’s press handlers, the documents show that the agency regularly invites journalists to its McLean, Va., headquarters for briefings and other events.

Note: For more on this, see concise summaries of deeply revealing major media corruption news articles from reliable major media sources.




White House should release 9/11 documents
2014-09-03, Miami Herald
Posted: 2014-09-15 07:16:21
http://www.miamiherald.com/2014/09/03/4317165/white-house-should-release-911....

Florida’s former U.S. Sen. Bob Graham ... has been fighting both the Bush and Obama administrations to declassify 28 pages of a 9/11 intelligence report that may detail and expose the efforts of members of the Saudi Arabian royal family in aiding and abetting [9/11] terrorists in Florida, many who were themselves Saudi. Graham is befuddled as to why the Obama administration does not release these documents, which he read when he was chair of the Senate Select Intelligence Committee and co-chair of a congressional inquiry into the 9/11 attacks. As a result, he has joined a Freedom of Information Act request alongside others, asking that 80,000 pages of information on a Saudi family that disappeared just before the attacks be made public. “It isn’t credible that 19 people — most [of whom] could not speak English well and did not have experience in the United States — could carry out such a complicated task without external assistance,” Graham insists. The Saudi family living in Sarasota fled to Saudi Arabia just prior to the 9/11 attacks. Were they tipped off that they should leave? If so, by whom? Graham believes that there was a deliberate effort to cover up Saudi involvement in the tragedy of 9/11 by the Bush administration, one, he says, that the Obama administration appears to support. The American public needs to know. The families of those who were lost to the 9/11 attacks or those who fought in Afghanistan and Iraq deserve an answer as well.

Note: For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.




Ex-Senator: FBI covered up 9/11 investigation
2014-09-10, WTSP-TV (Tampa Bay, FL CBS affiliate)
Posted: 2014-09-15 07:14:53
http://www.wtsp.com/story/news/investigations/2014/09/10/911-cover-up-fbi-for...

A major FBI cover-up ... connects Sarasota and the 9/11 hijackers to the Saudi Arabian government. While still at Sarasota's Emma E. Booker Elementary on the day of the 2001 terrorist attacks, President George W. Bush said, "Terrorism against our nation will not stand." However, the president's visit wasn't the only thing to tie this Bay area county to the September 11th attacks. Within days, we learned three of the hijackers had been living in the area while taking flying lessons at Huffman Aviation and Florida Flight Training in Sarasota County... but there is even more than that. "There was a network supporting the hijackers," says former U.S. Senator and Florida governor Bob Graham. According to Graham, the FBI has been covering up that fact for years, and continues to try and hide it even now. Graham says he is convinced there was a direct line between some of the terrorists who carried out the September 11th attacks and the government of Saudi Arabia. According to Graham, the FBI was aware of the strong connection between hijackers and a Saudi Arabian family who were living in an upscale Sarasota gated community. Twelve days before 9/11, the family abandoned the house -- leaving behind valuable items including food, clothing, furnishings and three vehicles. "There are some things I can't talk about," Graham told us, "And there are others like what I know is involved in the investigation in Sarasota, which is diametrically opposed to what the FBI said publicly."

Note: For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.




The U.S. Government’s Secret Plans to Spy for American Corporations
2014-09-05, The Intercept
Posted: 2014-09-15 07:09:21
https://firstlook.org/theintercept/2014/09/05/us-governments-plans-use-econom...

Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. [But] the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations. But a secret 2009 report issued by [Director of National Intelligence James Clapper's] office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies. One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence”.

Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.




Campaign Mounts to Declassify 9/11 Report’s References to Alleged Saudi Involvement
2014-08-07, Vice News
Posted: 2014-09-09 06:54:37
https://news.vice.com/article/campaign-mounts-to-declassify-911-reports-refer...

Nearly 13 years after the 9/11 terrorist attacks, the extent of Saudi involvement in the deaths of almost 3,000 people remains unclear — but according to members of Congress and the families of victims, information about this has been suppressed ever since the publication of a 2002 congressional investigation into the plot. Prior to the release of the final report of the Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001, the Bush administration classified a 28-page section in the name of national security. The 28 pages make up part four of the report, a section titled “Finding, Discussion and Narrative Regarding Certain Sensitive National Security Matters.” They are widely believed to implicate Saudi officials or describe support from Saudi intelligence for the hijackers, 15 of whom were Saudi citizens. Former Senator Bob Graham of Florida, who co-chaired the joint Senate-House investigation, dispensed with the equivocation and told VICE News that the redactions are a “cover up.” “I’ve said this since the first classification of the 28 pages,” he remarked. “It’s become more and more inexplicable as to why two administrations have denied the American people information that would help them better understand what happened on 9/11.” Graham said that the 28 pages describe the financing of the attacks. “Follow the money,” he said. “That will illuminate other significant aspects of 9/11.” The Saudi kingdom has always denied any complicity in the attacks.”

Note: Watch a video of Congressman Massie telling how shocked he was to read these 28 pages. Why aren't the major media reporting this important news? For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.




The Lies They Told
2009-11-12, New York Times
Posted: 2014-09-09 06:53:17
http://www.nytimes.com/2009/11/15/books/review/Heilbrunn-t.html

When Sept. 11, 2001, dawned, the Northeast Air Defense Sector in Rome, N.Y., went on full alert — to prepare for a training exercise that envisioned a sneak attack by Russian planes flying over the North Pole to bomb the United States, a prospect that Defense Secretary Robert McNamara had dismissed as outdated in 1966. Later that morning, ... three F-16 fighter jets were scrambled from Langley Air Force Base to form a combat air patrol over Washington. But degraded radio transmission quality meant that the pilots were left clueless about the nature of their mission. On seeing the Pentagon in flames, the lead fighter pilot later explained, “I reverted to the Russian threat. I’m thinking cruise missile threat from the sea. You know, you look down and see the Pentagon burning, and I thought the bastards snuck one by us. You couldn’t see any airplanes, and no one told us anything.” As senior counsel to the 9/11 Commission, [Farmer] investigated the derelict conduct of the national security apparatus. Now that numerous transcripts and tapes have been declassified, [in his book The Ground Truth] Farmer draws on them to assail the government’s official depiction of 9/11 as so much public relations flimflam. Both Deputy Defense Secretary Paul Wolfowitz and Vice President Dick Cheney, Farmer says, provided palpably false versions that touted the military’s readiness to shoot down United 93 before it could hit Washington. Planes were never in place to intercept it. Farmer ... was the attorney general of New Jersey and is the dean of the Rutgers School of Law,

Note: For more on Farmer's book, see a summary of this Time magazine article. For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.




Mysterious Phony Cell Towers Could Be Intercepting Your Calls
2014-08-27, Popular Science
Posted: 2014-09-09 06:51:43
http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-b...

Les Goldsmith, the CEO of ESD America [marketers of the Crytophone 500], points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device. “Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.” Who is running these interceptors and what are they doing with the calls? Goldsmith says we can’t be sure, but he has his suspicions. “Are some of them U.S. government interceptors?” [asks] Goldsmith. Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. For governments or other entities able to afford a price tag of “less than $100,000,” says Goldsmith, high-quality interceptors are quite realistic. Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example.

Note: Do you think the government might have put up fake cell towers to nab more data? For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.




The US government can brand you a terrorist based on a Facebook post
2014-08-30, The Guardian (One of the UK's leading newspapers)
Posted: 2014-09-09 06:48:20
http://www.theguardian.com/commentisfree/2014/aug/30/terrorist-watch-list-rul...

The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.

Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.




Homeland Security was built to fend off terrorists. Why's it so busy arming cops to fight average Americans?
2014-09-02, The Guardian (One of the UK's leading newspapers)
Posted: 2014-09-09 06:44:46
http://www.theguardian.com/commentisfree/2014/sep/02/homeland-security-depart...

America has raged against the appalling behavior of the local police in Ferguson, Missouri, and for good reason: automatic rifles pointed at protesters, tank-like armored trucks blocking marches, the teargassing and arresting of reporters, tactics unfit even for war zones. [But ire] should also be focused on the federal government agency that has enabled the rise of military police, and so much more: the Department of Homeland Security (DHS). The 240,000-employee [agency] has been the primary arms dealer for out-of-control local cops in Ferguson and beyond, handing out tens of billions of dollars in grants for military equipment in the last decade with little to no oversight. Police can act like paramilitary forces to combat the most mundane crimes without much worry of the consequences. But the problem with DHS is much larger than just combat gear: Homeland Security is also transferring tens or hundreds of millions of dollars in high-tech spying technology to local police through a sprawling backroom operation surveilling your neighborhood, much of which may be unconstitutional. DHS has its own fleet of Predator drones roaming the US border and far beyond, which it has loaned out to police over 500 times. Homeland Security is also handing out millions of dollars to local police to “accelerate and facilitate the adoption” of smaller drones that police can fly themselves. Cops claim they want these “middleman” drones for “emergencies,” but ... documents show they’ll end up using them for “crowd control” and “intelligence gathering”.

Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.




The Surveillance Engine: How the NSA Built Its Own Secret Google
2014-08-25, The Intercept
Posted: 2014-09-02 11:09:41
https://firstlook.org/theintercept/2014/08/25/icreach-nsa-cia-secret-google-c...

The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. ICREACH [as the search engine is called] contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy. ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.




Former cyber security chief convicted in child porn case
2014-08-27, CBS News
Posted: 2014-09-02 10:53:39
http://www.cbsnews.com/news/former-cyber-security-chief-convicted-in-child-po...

A former federal cyber security chief was convicted [on August 26] on several charges related to accessing and distributing child pornography. Timothy DeFoggi, 56, was acting director of cyber security at the U.S. Department of Health and Human Services when he was detained in May 2013 as part of an investigation targeting three child pornography websites. The former Germantown, Md. resident registered as a member of one of the sites on March 2, 2012, according to a U.S. Department of Justice press release. He used the site to access and solicit child pornography, "and exchanged private messages with other members where he expressed an interest in the violent rape and murder of children," according to the DOJ. DeFoggi also suggested to one member of a message board that they meet in person to fulfill fantasies of violently raping and murdering children. He is the sixth person convicted in connection with the investigation. Sentencing is scheduled for Nov. 7.

Note: For powerful evidence from a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government, click here. For more on this, see concise summaries of deeply revealing sexual abuse scandals news articles from reliable major media sources.




Judge orders FBI to investigate witness tampering
2014-08-25, Miami Herald
Posted: 2014-09-02 10:52:32
http://www.miamiherald.com/2014/08/25/4308448/judge-orders-fbi-to-investigate...

A federal judge has ordered the FBI to scrutinize allegations that the agency pressured a witness not to testify in a trial about videos related to the Oklahoma City bombing. U.S. District Judge Clark Waddoups said the agency needs to get to the bottom of the claims from Utah lawyer Jesse Trentadue, who said that the FBI threatened to cut off a former government operative's benefits if he appeared in court. Waddoups decided the lawyer's report raises disturbing questions, and he wanted evidence that the agency has thoroughly investigated the matter. Waddoups ordered the attorneys to present the results of the witness-tampering investigation on Nov. 13. The hearing is the latest in a case that reignited questions about whether others were involved in the bombing that killed 168 people. Trentadue argues surveillance videos from 1995 show Timothy McVeigh had an accomplice. The agency says its investigators have done a reasonable search and found no evidence of additional unreleased videos. [John] Matthews was supposed to testify during a late July bench trial, but Trentadue argued that he backed out at the last minute because the FBI threatened to cut off his veteran's and disability benefits. Trentadue said Matthews was part of a stealth government operation before the Oklahoma City bombing tracking militia movements of which McVeigh was a part, and his testimony could support the idea that there was a second suspect. Matthews told him and a colleague that he had been pressured in phone calls just before and after he was supposed to testify, the lawyer said.

Note: Many aspects of the Oklahoma City bombing were covered up. For a compilation of media videos showing without doubt that there were other bombs in the building which later were completely ignored, click here. For other major media articles showing major manipulation, click here click here, here, and here.




Why We Fight Wars
2014-08-18, New York Times
Posted: 2014-08-25 08:21:14
http://www.nytimes.com/2014/08/18/opinion/paul-krugman-why-we-fight.html

A century has passed since the start of World War I, which many people at the time declared was “the war to end all wars.” Unfortunately, wars just kept happening. In influential research sponsored by the World Bank, the Oxford economist Paul Collier has shown that the best predictor of civil war, which is all too common in poor countries, is the availability of lootable resources like diamonds. Whatever other reasons rebels cite for their actions seem to be mainly after-the-fact rationalizations. If you’re a modern, wealthy nation, however, war — even easy, victorious war — doesn’t pay. And this has been true for a long time. In his famous 1910 book The Great Illusion, the British journalist Norman Angell argued that “military power is socially and economically futile.” As he pointed out, in an interdependent world (which already existed in the age of steamships, railroads, and the telegraph), war would necessarily inflict severe economic harm even on the victor. Modern nations can’t enrich themselves by waging war. Yet wars keep happening. Why? Governments all too often gain politically from war, even if the war in question makes no sense in terms of national interests. Nations almost always rally around their leaders in times of war, no matter how foolish the war or how awful the leaders. Argentina’s junta briefly became extremely popular during the Falklands war. For a time, the “war on terror” took President George W. Bush’s approval to dizzying heights, and Iraq probably won him the 2004 election. True to form, Mr. Putin’s approval ratings have soared since the Ukraine crisis began.

Note: For more on this, see this concise summary of War Is A Racket, a powerful book written by one of the most highly decorated US generals ever.




Embracing flag, Snowden says he hopes to return to U.S.
2014-08-13, USA Today
Posted: 2014-08-18 07:39:42
http://www.usatoday.com/story/news/world/2014/08/13/snowden-wired-flag/13995013/

Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."

Note: Read the cover story from Wired magazine with a deep inside report on Snowden.




For some firms, NSA eavesdropping means business
2014-08-12, San Francisco Chronicle (SF's leading newspaper)
Posted: 2014-08-18 07:38:16
http://www.sfgate.com/technology/article/For-some-firms-NSA-eavesdropping-mea...

To many Americans, online eavesdropping by the U.S. National Security Agency is an outrage, a threat to privacy and freedom. To some, it's a business opportunity. A small but growing number of companies have introduced Internet and communications services designed to shield users from the government's eyes. A few even advertise their products as "NSA-proof." Many of the companies have been offering encrypted online services for years, scrambling their customers' data and communications in ways that require the right computer-generated "key" to decode. They are at least as concerned with thwarting private hackers and corporate spies as they are with blocking federal agents. But some entrepreneurs in the field found motivation in the NSA, after learning that the agency has been collecting troves of Internet and phone data on ordinary citizens for years. "Privacy and democracy go hand in hand - that's why this is so important," said Jason Stockman, one of the creators of ProtonMail, which began offering an encrypted e-mail service in May. "Our goal is to protect people against mass surveillance." But most companies will quickly admit that if the NSA - or some foreign intelligence service - really wants your data, they can't guarantee protection. Since the NSA conducts its business in secret, its full capabilities remain a matter of speculation. Most companies that invoke the NSA in their marketing focus on encryption.

Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.





Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


As of Nov. 20, 2014, we're $4,500 in the red. Kindly donate here to support this vital work.

Subscribe here to our free email list for two information-packed emails per week.


WantToKnow.info is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"