03-01-2012, 06:07 AM
[TABLE="width: 798"]
[TR]
[TD]May 15, 2005 NSA INTERCEPTS FOR BOLTON MASKED AS "TRAINING EXERCISE"
Fox Censorship? We report, you decide.....
Related Articles:
[/TD]
[/TR]
[/TABLE]
[TR]
[TD]May 15, 2005 NSA INTERCEPTS FOR BOLTON MASKED AS "TRAINING EXERCISE"
NSA INTERCEPTS FOR BOLTON MASKED AS "TRAINING EXERCISE"
Wayne Madsen
May 15, 2005 -- According to National Security Agency insiders, outgoing NSA Director General Michael Hayden approved special communications intercepts of phone conversations made by past and present U.S. government officials. The intercepts are at the height of the current controversy surrounding the nomination of Undersecretary of State John R. Bolton as ambassador to the United Nations. It was revealed by Connecticut Senator Christopher Dodd during Bolton's Senate Foreign Relations Committee nomination hearing that Bolton requested transcripts of 10 NSA intercepts of conversations between named U.S. government officials and foreign persons. Later, it was revealed that U.S. companies [also treated as "U.S. persons" by NSA] were also identified in an additional nine intercepts requested by Bolton. However, NSA insiders report that Hayden approved special intercept operations on behalf of Bolton and had them masked as "training missions" in order to get around internal NSA regulations that normally prohibit such eavesdropping on U.S. citizens.
It is noteworthy that in the fictional movie "Enemy of the State," it was under the authority of a "training mission" that renegade NSA officials targeted U.S. civilians for eavesdropping. United States Signals Intelligence Directive (USSID) 18, the NSA's "Bible" for the conducting of surveillance against U.S. persons, allows "U.S. material," i.e., listening to U.S. persons, to be used for training missions. However, USSID 18 also requires that all intercepts conducted for such training missions are to be completely destroyed after completion of the training operation. In the case of Bolton and other Bush administration hard liners, the material in question was not deleted and was transmitted in raw intercept form to external agencies for clearly political purposes a violation of the Foreign Intelligence Surveillance Act and USSID 18, which only allows such raw training mission intercepts to be transmitted when evidence of criminal activity is uncovered during the training mission. Unlike signals intelligence (SIGINT) data stored in the "Anchory" (formerly known as the SIGINT On-line Intelligence System or "SOLIS") database, training intercepts are completely off-the-books and, in the case of raw intercepts provided to Bolton and others, the NSA and its Signals Intelligence Directorate (SID) can claim "plausible deniability" in stating that only "official" intercept transcripts were provided to users outside the agency. Because they are to be destroyed after completion of training missions, the training intercepts do not appear in any agency logs and cannot be obtained by the Senate Foreign Relations Committee unless they are subpoenaed directly from Bolton and his colleagues.
Hayden breezed through Senate conformation hearings as the new Deputy Director of National Intelligence, where he will serve as John Negroponte's chief assistant and have authority over the entire U.S. Intelligence Community.
Intelligence community insiders claim that a number of State Department and other government officials may have been subject to NSA "training" surveillance and that transcripts between them and foreign officials likely ended up in the possession of Bolton and his neo-conservative political allies, including such members of Vice President Dick Cheney's staff as David Wurmser (a former assistant to Bolton at State), John Hannah, and Lewis "Scooter" Libby.
Possible affected individuals include: Secretary of State Colin Powell and Deputy Secretary of State Richard Armitage and their conversations with their counterparts and officials around the world; Assistant Secretary of State for Near Eastern Affairs William Burns and his telephone conversations with International Atomic Energy Agency director general Mohammed el Baradei and Britain's top non-proliferation official William Ehrman (Bolton was frozen out of negotiations between Burns, Britain, and Libya over the stand down of the Libyan weapons of mass destruction program) (also Burns's conversations with Syrian Foreign Minister Farouq al Shara over charges by Bolton that Syria possessed WMDs and conversations between Burns and former chief UN Iraq weapons inspector Hans Blix); various phone calls made by Chairman of the President's Foreign Intelligence Advisory Board Brent Scowcroft; U.S. Special Envoy on North Korea Charles "Jack" Pritchard and his telephone conversations with U.S. ambassador to South Korea Thomas Hubbard, Assistant Secretary of State for East Asian Affairs James Kelly, and Richard Armitage; New Mexico Governor Bill Richardson and his telephone conversations with Secretary of State Powell and North Korea's deputy UN ambassador Han Song Ryol; phone conversations between Senate Foreign Relations Committee Chairman Joseph Biden and his Iranian counterpart, Majlis foreign affairs chair Mohsen Mirdamad and between Biden, his staff, and William Burns and Undersecretary of State for Political Affairs Marc Grossman; and President Jimmy Carter's phone conversations with Cuban officials before and during his May 2002 trip to Cuba (Carter said he found no evidence to support Bolton's claims of Cuban biological weapons development).
Wayne Madsen
May 15, 2005 -- According to National Security Agency insiders, outgoing NSA Director General Michael Hayden approved special communications intercepts of phone conversations made by past and present U.S. government officials. The intercepts are at the height of the current controversy surrounding the nomination of Undersecretary of State John R. Bolton as ambassador to the United Nations. It was revealed by Connecticut Senator Christopher Dodd during Bolton's Senate Foreign Relations Committee nomination hearing that Bolton requested transcripts of 10 NSA intercepts of conversations between named U.S. government officials and foreign persons. Later, it was revealed that U.S. companies [also treated as "U.S. persons" by NSA] were also identified in an additional nine intercepts requested by Bolton. However, NSA insiders report that Hayden approved special intercept operations on behalf of Bolton and had them masked as "training missions" in order to get around internal NSA regulations that normally prohibit such eavesdropping on U.S. citizens.
It is noteworthy that in the fictional movie "Enemy of the State," it was under the authority of a "training mission" that renegade NSA officials targeted U.S. civilians for eavesdropping. United States Signals Intelligence Directive (USSID) 18, the NSA's "Bible" for the conducting of surveillance against U.S. persons, allows "U.S. material," i.e., listening to U.S. persons, to be used for training missions. However, USSID 18 also requires that all intercepts conducted for such training missions are to be completely destroyed after completion of the training operation. In the case of Bolton and other Bush administration hard liners, the material in question was not deleted and was transmitted in raw intercept form to external agencies for clearly political purposes a violation of the Foreign Intelligence Surveillance Act and USSID 18, which only allows such raw training mission intercepts to be transmitted when evidence of criminal activity is uncovered during the training mission. Unlike signals intelligence (SIGINT) data stored in the "Anchory" (formerly known as the SIGINT On-line Intelligence System or "SOLIS") database, training intercepts are completely off-the-books and, in the case of raw intercepts provided to Bolton and others, the NSA and its Signals Intelligence Directorate (SID) can claim "plausible deniability" in stating that only "official" intercept transcripts were provided to users outside the agency. Because they are to be destroyed after completion of training missions, the training intercepts do not appear in any agency logs and cannot be obtained by the Senate Foreign Relations Committee unless they are subpoenaed directly from Bolton and his colleagues.
Hayden breezed through Senate conformation hearings as the new Deputy Director of National Intelligence, where he will serve as John Negroponte's chief assistant and have authority over the entire U.S. Intelligence Community.
Intelligence community insiders claim that a number of State Department and other government officials may have been subject to NSA "training" surveillance and that transcripts between them and foreign officials likely ended up in the possession of Bolton and his neo-conservative political allies, including such members of Vice President Dick Cheney's staff as David Wurmser (a former assistant to Bolton at State), John Hannah, and Lewis "Scooter" Libby.
Possible affected individuals include: Secretary of State Colin Powell and Deputy Secretary of State Richard Armitage and their conversations with their counterparts and officials around the world; Assistant Secretary of State for Near Eastern Affairs William Burns and his telephone conversations with International Atomic Energy Agency director general Mohammed el Baradei and Britain's top non-proliferation official William Ehrman (Bolton was frozen out of negotiations between Burns, Britain, and Libya over the stand down of the Libyan weapons of mass destruction program) (also Burns's conversations with Syrian Foreign Minister Farouq al Shara over charges by Bolton that Syria possessed WMDs and conversations between Burns and former chief UN Iraq weapons inspector Hans Blix); various phone calls made by Chairman of the President's Foreign Intelligence Advisory Board Brent Scowcroft; U.S. Special Envoy on North Korea Charles "Jack" Pritchard and his telephone conversations with U.S. ambassador to South Korea Thomas Hubbard, Assistant Secretary of State for East Asian Affairs James Kelly, and Richard Armitage; New Mexico Governor Bill Richardson and his telephone conversations with Secretary of State Powell and North Korea's deputy UN ambassador Han Song Ryol; phone conversations between Senate Foreign Relations Committee Chairman Joseph Biden and his Iranian counterpart, Majlis foreign affairs chair Mohsen Mirdamad and between Biden, his staff, and William Burns and Undersecretary of State for Political Affairs Marc Grossman; and President Jimmy Carter's phone conversations with Cuban officials before and during his May 2002 trip to Cuba (Carter said he found no evidence to support Bolton's claims of Cuban biological weapons development).
Fox Censorship? We report, you decide.....
On April 26 at Noon EDT, New Mexico Governor Bill Richardson was being interviewed on Fox News Channel about the nomination of John Bolton. As he was about to comment on this article, the satellite signal to Santa Fe suddenly went dead and the Fox News host quickly blamed the dark screen on a lost satellite signal.-----------------------------NSA LEADERSHIP MAKES THIS EDITOR A HIGH PRIORITY -- June 15, 2005From NSA sources:
While the bush administration claims it is fighting a "global war on terrorism" -- one of NSA's priorities is to check up on what this editor is doing and who he is talking to.
deputy dirnsa bill black receives a briefing on me a couple times a week -- and the word is out that the boys in charge of fort meade "want me bad."
Hey guys -- I thought Osama bin Laden was your target, how about Zawahiri? Zarqawi anyone?
Face it -- the upper echelons (pun intended) at NSA have a rebellion on their hands -- changing the targeting to me will not make that revolt go away -- may even make it worse.
Meanwhile, some guys at FBI global counter - intelligence are interested in those cryptologic fire sales you folks have been running at Fort Meade. just hope the customers aren't paying in new Israeli shekels [NIS] (not worth very much on the currency exchanges).
HAYDEN INTERNAL NSA MEMO
From an internal FOUO NSA document from 2003 written by Hayden. Hayden indicates that SIGINT was responsible for Bush administration pre-Iraq war demarches at the UN. This is clear proof that Hayden was working hand-in-hand with Negroponte, Cheney, Rumsfeld, Bolton and other war hawks and that the order to bug the UN Security Council by NSA came from the highest levels in the Bush administration. The reference to "UN speeches" also indicate that NSA cherry picked the intercepts of Iraqi field commanders that were played during Colin Powell's speech to the UN Security Council:
(U//FOUO) Let's face it. We're good at what we do. We've become a best sellerfrom real time targeting of air strikes and terrorist roll-ups based on SIGINT alone to demarches and UN speeches that create (rather than just reflect) new diplomatic realities. We have become an increasingly valued source of intelligence for national decision-makers and military commanders alike. We did well in Operation ENDURING FREEDOM, but we truly shone in Operation IRAQI FREEDOM. We were able to create a highly fluid cryptologic process through improved access and increased collaboration.
Hayden also indicates that Bush himself ordered the Director of Central Intelligence to "hunt" for SIGINT even in stored data systems to justify the attack on Iraq:(U//FOUO) That's the world in which we organized the old American intelligence enterprise. It was an easy division of labor between SIGINT and HUMINTbetween NSA and CIAbetween electronic data in motion and physical data at rest. But that is a world that no longer exists; once we entered the computer age, we saw a new reality--electronic data at rest. In a short note to the DCI, the President in February 2002 swept away all the theological fine points about "data at rest". He empowered NSA to be hunters of electronic information in all of its forms and states. This wasn't just a tactical convenience. It was recognition of the power of SIGINTand of the need to protect American data from the SIGINT of our adversaries.
On Bolton's ordering of intercepts from NSA on his colleagues and other U.S. persons, Hayden's following dictate that the information be minimized and that it must have some inherent intelligence value, at the very least, was violated by Bolton's request:(U) US law and policy present more serious issues. EO 12333 recognizes that electronic surveillance is so intrusive that we have established very specific rules to prevent unreasonable intrusion into privacy. EO 12333 tells us that information derived from electronic surveillance is not to be shared unless two criteria are met: US person information has been minimized so as to uphold 4th Amendment protections from unreasonable search and the information provided is of inherent intelligence value.
In the following excerpt seems to be a reference by Hayden to mono-linguistic people like Bolton who wanted to have the keys to the English-intercept SIGINT candy store and non-NSA Arabic linguists (possibly a reference to Israelis and dual loyalist US-Israeli citizens active in Iraq and other countries) wanting access to raw Arabic intercepts:
(U//FOUO) Much of the above would delight many of those who have been clamoring for more extensive access to our databases and other SIGINT derived information. These folks usually couch such views in the form of a request for "raw SIGINT"a formulation that usually connotes little knowledge about our discipline and even less likelihood that any kind of sharing with them would lead to something useful!
(U//FOUO) When I press for an explanation of what these folks mean by "raw SIGINT" (usually accompanied by an explanation on my part of our production processes: access, collection, processing, translating, analyzing, reporting), I'm finally told that what they really want are English language transcripts of intercepted communications. They often seem surprised when I report that that usually that doesn't help us much in terms of dealing with the volume of modern communications and in fact would probably add to our workload. And to those who might have linguists in appropriate languages, I also point out that no one would be served by "amateur night" with inexperienced analysts second-guessing our linguists about the meaning of guarded conversations in obscure dialects laced heavily with allegorical Koranic references and spoken by interlocutors who seem to easily confuse the "is" with the "ought to be".***
(U//FOUO) We will have to insist that those whom we wish to more closely embrace in our production activities be fully qualified to participate. This cannot be about just throwing open the front door and making our information the equivalent of a cryptologic fire sale. "Wedding" is sometimes a barely veiled reference to an upcoming terrorist attack but it is also true that even very bad people occasionally get married. We must be open to those who can truly act on or have the expertise to add value to what we can provide. But we also must take care that only those who have something to add get to swim up the SIGINT production stream.
While the bush administration claims it is fighting a "global war on terrorism" -- one of NSA's priorities is to check up on what this editor is doing and who he is talking to.
deputy dirnsa bill black receives a briefing on me a couple times a week -- and the word is out that the boys in charge of fort meade "want me bad."
Hey guys -- I thought Osama bin Laden was your target, how about Zawahiri? Zarqawi anyone?
Face it -- the upper echelons (pun intended) at NSA have a rebellion on their hands -- changing the targeting to me will not make that revolt go away -- may even make it worse.
Meanwhile, some guys at FBI global counter - intelligence are interested in those cryptologic fire sales you folks have been running at Fort Meade. just hope the customers aren't paying in new Israeli shekels [NIS] (not worth very much on the currency exchanges).
HAYDEN INTERNAL NSA MEMO
From an internal FOUO NSA document from 2003 written by Hayden. Hayden indicates that SIGINT was responsible for Bush administration pre-Iraq war demarches at the UN. This is clear proof that Hayden was working hand-in-hand with Negroponte, Cheney, Rumsfeld, Bolton and other war hawks and that the order to bug the UN Security Council by NSA came from the highest levels in the Bush administration. The reference to "UN speeches" also indicate that NSA cherry picked the intercepts of Iraqi field commanders that were played during Colin Powell's speech to the UN Security Council:
(U//FOUO) Let's face it. We're good at what we do. We've become a best sellerfrom real time targeting of air strikes and terrorist roll-ups based on SIGINT alone to demarches and UN speeches that create (rather than just reflect) new diplomatic realities. We have become an increasingly valued source of intelligence for national decision-makers and military commanders alike. We did well in Operation ENDURING FREEDOM, but we truly shone in Operation IRAQI FREEDOM. We were able to create a highly fluid cryptologic process through improved access and increased collaboration.
Hayden also indicates that Bush himself ordered the Director of Central Intelligence to "hunt" for SIGINT even in stored data systems to justify the attack on Iraq:(U//FOUO) That's the world in which we organized the old American intelligence enterprise. It was an easy division of labor between SIGINT and HUMINTbetween NSA and CIAbetween electronic data in motion and physical data at rest. But that is a world that no longer exists; once we entered the computer age, we saw a new reality--electronic data at rest. In a short note to the DCI, the President in February 2002 swept away all the theological fine points about "data at rest". He empowered NSA to be hunters of electronic information in all of its forms and states. This wasn't just a tactical convenience. It was recognition of the power of SIGINTand of the need to protect American data from the SIGINT of our adversaries.
On Bolton's ordering of intercepts from NSA on his colleagues and other U.S. persons, Hayden's following dictate that the information be minimized and that it must have some inherent intelligence value, at the very least, was violated by Bolton's request:(U) US law and policy present more serious issues. EO 12333 recognizes that electronic surveillance is so intrusive that we have established very specific rules to prevent unreasonable intrusion into privacy. EO 12333 tells us that information derived from electronic surveillance is not to be shared unless two criteria are met: US person information has been minimized so as to uphold 4th Amendment protections from unreasonable search and the information provided is of inherent intelligence value.
In the following excerpt seems to be a reference by Hayden to mono-linguistic people like Bolton who wanted to have the keys to the English-intercept SIGINT candy store and non-NSA Arabic linguists (possibly a reference to Israelis and dual loyalist US-Israeli citizens active in Iraq and other countries) wanting access to raw Arabic intercepts:
(U//FOUO) Much of the above would delight many of those who have been clamoring for more extensive access to our databases and other SIGINT derived information. These folks usually couch such views in the form of a request for "raw SIGINT"a formulation that usually connotes little knowledge about our discipline and even less likelihood that any kind of sharing with them would lead to something useful!
(U//FOUO) When I press for an explanation of what these folks mean by "raw SIGINT" (usually accompanied by an explanation on my part of our production processes: access, collection, processing, translating, analyzing, reporting), I'm finally told that what they really want are English language transcripts of intercepted communications. They often seem surprised when I report that that usually that doesn't help us much in terms of dealing with the volume of modern communications and in fact would probably add to our workload. And to those who might have linguists in appropriate languages, I also point out that no one would be served by "amateur night" with inexperienced analysts second-guessing our linguists about the meaning of guarded conversations in obscure dialects laced heavily with allegorical Koranic references and spoken by interlocutors who seem to easily confuse the "is" with the "ought to be".***
(U//FOUO) We will have to insist that those whom we wish to more closely embrace in our production activities be fully qualified to participate. This cannot be about just throwing open the front door and making our information the equivalent of a cryptologic fire sale. "Wedding" is sometimes a barely veiled reference to an upcoming terrorist attack but it is also true that even very bad people occasionally get married. We must be open to those who can truly act on or have the expertise to add value to what we can provide. But we also must take care that only those who have something to add get to swim up the SIGINT production stream.
June 15, 2005 (UPDATE)
Did the "throwing open the front door and making our information the equivalent of a cryptologic fire sale," to which Hayden was referring, have anything to do with indicted US Air Force Reserve Colonel Larry A. Franklin providing COMINT or "communications intelligence" to an Israeli embassy official? From the US Justice Department Count Five against Franklin:
COUNT FIVE
Communication of Classified Communications Intelligence Information
Communication of Classified Communications Intelligence Information
On or about June 26, 2003, in Arlington, Virginia, within the Eastern District of Virginia, defendant LAWRENCE ANTHONY FRANKLIN did unlawfully, knowingly, and wilfully communicate, furnish, and otherwise make available to an unauthorized person, classified information obtained by the processes of communications intelligence from the communication of a foreign government, knowing the same to have been obtained by such processes.
(In violation of Title 18, United States Code, Section 798 (a) (4))
[Filed in U.S. District Court, Alexandria, VA on May 26, 2005]
***
[Filed in U.S. District Court, Alexandria, VA on May 26, 2005]
***
Bolton and his neo-conservative allies misused NSA intercepts for their own purposes. Did this also involve making NSA intercepts of Iranian communications available to Mossad, AIPAC, and Iraqi con man Ahmad Chalabi via Franklin and other Israeli moles inside the Pentagon? The evidence indicates that the Bolton NSA intercept caper, the AIPAC espionage scandal, and the leak of Valerie Plame and Brewster Jennings & Associates CIA covers are all part of the same investigation -- one that points to Israel and its American allies indeed holding a "fire sale" on America's national security secrets. [Ed.]
Related Articles:
- May 27, 2005 SPY AGENCY DISRUPTION REACHES FORT MEADE
- January 26, 2006 - From a Real Conservative
- August 28, 2008 -- Russia confirms WMR report that it seized US intelligence equipment
- April 11-13, 2008 -- UPDATED 1X. Prosecutor malfeasance revealed in trial of NSA analyst
- June 26, 2006 -- NSA sources report that Executive Order 12333, which broadens the internal surveillance capabilities of the NSA, CIA, and FBI when pursuing known foreign nationals inside the U.S., has been routinely violated by the NSA and CIA
- October 30, 2007 -- NSA infiltrated by hostile intelligence agents
- August 31, 2005 -- A Merit System Protection Board hearing was held in Baltimore on August 30 concerning charges that former NSA intelligence officer Russ Tice
- December 4, 2005 - Another vicious Bush administration attack on a U.S. intelligence professional
- February 9, 2006 -- NSA Director embroiled in Iraq torture scandal
- February 3, 2006 -- Dick Cheney's and the neo-cons' other "work up."
- September 22, 2008 -- Was there a closed circuit feed on the WTC on 9/11?
- December 24, 2005 -- NSA snooping of web dates back to 1995
- October 7-8, 2008 -- Russian TV displays captured American/NATO military equipment from Georgia
- May 4-6, 2007 -- On Wednesday, US federal Judge Peter Messitte decided not to break with the precedent set by US Judge T. S. Ellis in the American Israel Public Affairs Committee (AIPAC) Espionage Act case
- June 18, 2007 -- NSA officials deride U.S. Constitution
- March 12, 2008 -- Defense Department sources confirm Israeli intelligence connection to hooker ring
- July 8, 2008 -- US spy plane incident with China more serious than reported
- February 4, 2006 -- A sophisticated cellular phone eavesdropping system has been discovered in Greece
- May 30 - June 1, 2008 -- America's decimation of Iraq's auto mechanics
- August 24, 2005 -- WMR has received another scathing letter concerning the neocon pogrom at NSA.
- December 22, 2005 -- He who lies most, lies worst
- August 5, 2008 -- Incarcerated former NSA Iraq analyst is refused appeal without a hearing
- February 20, 2006 -- The editor is posting some documents from the older archives.
- September 23, 2008 -- "Higher than top secret" surveillance program may be emerging from shadows
- July 7, 2008 -- Colombian hostage "rescue" a staged event
- April 7, 2006 -- Class action lawsuit against AT&T in AT&T-NSA cooperation deal "big" according to NSA insiders
- December 28, 2005 -- BREAKING NEWS. NSA spied on its own employees
- October 17, 2007 -- Evidence points to NSA ramping up plans for illegal wiretapping during Clinton administration
- March 30, 2006 -- LATE EDITION -- US Judge Peter Messitte today sentenced former NSA "Iraqi shop" signals intelligence analyst Ken Ford Jr., to six years in prison and no fine
- June 26, 2006 -- According to U.S. intelligence sources, the National Security Agency (NSA) intercepted communications prior to 9-11 tying convicted "Al Qaeda" conspirator Zacarias Moussaoui to an impending terrorist attack in the United States.
- February 27, 2006 -- Former NSA analyst Ken Ford, Jr., who was subjected to a joint FBI/NSA set-up and a neo-con orchestrated show trial as a result his analysis of Iraqi nuclear capabilities in 2003, is scheduled to be sentenced at 9:30 am on Mar 1
- July 28, 2006 -- National Security Agency (NSA) whistleblower Russell Tice subpoenaed to testify
- Sep. 18, 2005 -- EXCLUSIVE REPORT: THE DEMISE OF GLOBAL COMMUNICATIONS SECURITY
- April 20, 2006 -- Beating Bush's NSA e-mail surveillance simple
- July 22/23, 2006 -- Yesterday, the Washington Post's Dana Priest (about the only reporter there who still does actual investigative journalism) had a story about a CIA contractor for BAE Systems who was fired after posting an entry on the intelligence com
- October 31-November 1, 2008 -- NSA has mental patients working as security agents
- November 19, 2007 -- NSA not interested in WMD proliferation by Russian-Israeli-Ukrainian Mafia
- June 1, 2005 NSA and selling the nation's prized secrets to contractors
- March 1, 2006 -- Wrongfully-convicted former NSA analyst Ken Ford Jr., was due to be sentenced today
- May 7, 2006 -- WMR reported extensively on Michael Hayden's management, scandal, and morale problems at the National Security Agency (NSA).
- August 17, 2005 -- Political purges continue at the National Security Agency (NSA).
- June 25, 2007 -- U.S. intelligence remains in Uzbekistan
- November 2-4, 2007 -- NSA signals intelligence yields clues about future nuclear war
- March 22, 2007 -- Open memo to General Michael Hayden, CIA Director.
- August 3, 2005 -- "Clean up man" takes over NSA.
- August 25, 2008 -- Russia captures U.S. intelligence-collection vehicles
- Sept. 26, 2007 -- El Pais publishes transcript of Bush-Aznar pre-war meeting
- April 24, 2008 -- Kadish and Pollard part of larger Israeli spy ring, including sleeper cells
- July 9, 2007 -- Details emerge of surveillance system opposed by Ashcroft and Comey
- October 31, 2007 -- NSA warns against kiosks at Columbia Mall in Maryland
- December 5, 2005 -- FORT MEADE, MARYLAND -- Nothing anonymous at NSA, including AA.
- September 30, 2008 -- NSA reverses decision on WMR FOIA request
- January 30, 2006 -- NSA's spying on paradise and a frozen continent
- April 16, 2008 -- Flight 93 shot down by Air Force jets
- June 27, 2006 -- Republican Rep. Peter King (NY), the chairman of the House of Representatives Homeland Security Committee, has called for the U.S. Attorney General to prosecute The New York Times under the Espionage Act
- December 4, 2005 -- US intercepted communications of Congolese President Kabila during 1998 Rwandan-Ugandan invasion of Congo
- April 24, 2008 -- Wrongfully convicted ex-NSA Iraq analyst Ken Ford support campaign
- December 30, 2005 -- More on Firstfruits
- November 30, 2005 -- Rep. Chris Shays (R-CT), chairman of the House Government Reform Subcommittee on National Security, Emerging Threats, and International Relations, yesterday postponed a hearing on national security whistleblowers
- January 24, 2006 -- Hayden Ducks Questions On NSA Whistleblowing
- January 13, 2006 -- The name has been changed to protect the guilty
- February 15, 2006 -- National security whistleblowers testify about planted classified documents and other abuses
- February 28, 2008 -- Creative financing at NSA continues to enrich SAIC
- December 4, 2005 -- Current Deputy Director for National Intelligence helped lay groundwork for 9-11 intelligence failures
- May 25, 2006 -- Hayden's policy: "If not asked, don't tell."
- October 31, 2007 -- NSA "Went Dark" on Caucasus Region Hours Before Beslan Attack
- November 1, 2007 -- NSA linguists and analysts being assigned to Iraqi combat duty as "Army Augmentees"
- August 18, 2008 -- NSA continues surveillance of journalists; WMR editor subject of espionage investigation
- May 15, 2006 -- When is a "scoop" not a "scoop?" ABC News, in an "exclusive" today, is reporting that U.S. intelligence agencies, including the NSA and CIA, have been conducting surveillance on the phone calls of journalists
- October 11-12, 2008 -- Maryland State Police open up political surveillance files
- December 4, 2007 -- Intelligence still being cooked by neocons
- Aug. 1, 2006 -- NSA whistleblower Russell Tice's appearance before the federal grand jury originally scheduled for Wednesday, August 2, has been cancelled
- September 17, 2008 -- Is "Ma Bell" coming back?
- December 16, 2005 -- Former NSA analyst and White House Secret Service officer found guilty in politically-motivated trial
- February 24, 2006 -- NSA expands surveillance of journalists
- December 30, 2005 -- BREAKING NEWS. The Alberto Gonzales Justice Department is opening up a criminal investigation of the leak of classified NSA information
- December 14, 2005 -- Prosecution and defense closing arguments in the Kenneth W. Ford case
- March 30, 2006 -- Rescheduled politically-motivated sentencing of ex-NSA analyst Ken Ford this morning in Maryland
- April 23, 2006 -- Former National Security Agency (NSA) signals intelligence analyst Kenneth Ford Jr
- March 31, 2006 -- In yesterday's sentencing hearing for former NSA analyst Ken Ford, Federal Judge Peter Messitte mentioned the defense's contention that the classified NSA documents Ford was accused of removing from NSA had been planted in Ford's home
- May 18-20, 2007 -- WMR's first series of articles, upon our inception in 2005, covered the misuse by the Bush administration
- April 30, 2007 -- A TALE OF TWO TRIALS: INFLUENCE PEDDLING, JUDGE SHOPPING, AND DIRTY PROSECUTORS
- February 7, 2006 -- The Bush Crime family has alienated the very people who have been at the forefront of America's intelligence efforts
- February 5, 2007 -- This editor had a brief conversation with Governor Richardson at the Washington Hilton
- February 4/5/6, 2006 -- Former NSA analyst Kenneth Ford was accepted into a fast track internship program at NSA in November 2002
- August 23, 2005 -- In the spirit of the Soviet "psikhushka" psychiatric hospitals where anti-regime dissidents were sent, NSA is using psychologists to eliminate independent-minded intelligence analysts and other career employees. Adverse psychiatric eval
- March 28-30, 2008 -- NSA pulling over and detaining drivers
- January 5, 2006 -- More details emerge on NSA spying on journalists and politicians
- December 1, 2005 -- WMR will be at the US Courthouse in Greenbelt, Maryland today covering the trial of former National Security Agency (NSA) analyst Kenneth Ford
- October 7-8, 2008 -- NSA press sweep
- June 26, 2006 -- Art Imitating Life -- NSA, Hayden, and "Enemy of the State." WMR has learned of a connection between senior NSA personnel and the producers of the movie about NSA, "Enemy of the State."
- May 27-28, 2008 -- Another confirmation that Calipari was targeted by US forces
- September 15, 2008 -- "Einstein" replaces "Big Brother" in Internet surveillance
- September 4, 2005 -- The Soviet-style "psikhushka" psychiatric abuse of NSA employees continues unchecked.
- December 31, 2007 - January 1, 2008 - No evidence of Pakistani or U.S. Sigint intercepts of "Al Qaeda" in Pak tribal regions
- April 17, 2007 -- Our sources inform us that a possible fire today has knocked out classified communications services at the US State Department's Communications Annex facility
- December 12, 2006 -- In a long-awaited report on the death of Princess Diana
- February 6, 2006 -- NSA Security, long an out-of-control entity, is now conducting a witch hunt at the agency
- March 10, 2008 -- WMR scooped WSJ on NSA's expanded reach two years ago
- April 15, 2008 -- NSA's treasure trove of financial data
[/TD]
[/TR]
[/TABLE]
"Where is the intersection between the world's deep hunger and your deep gladness?"