Newer News: June 2014
May 2014 Intelligence News
- The House committee on intelligence needs oversight of its own by Rep. Rush Holt and Steven Aftergood, MSNBC, May 30. "Who watches the watchmen? For now, the truthful answer is 'nobody.' We can do better."
- Snowden's Damage: More Trust Than Verify from Gov't by Tony Capaccio, Bloomberg, May 30. "So what damage did the world's most infamous/famous/glamorous cyber geek cause the U.S. military-intelligence establishment?"
- US lags in airing its old secrets by Bryan Bender, Boston Globe, May 26. "Four years after President Obama pledged to preside over the most transparent government ever -- a vow that included declassifying as many documents as possible contained in the so-called backlog -- the majority are still secret."
- Microsoft challenged a National Security Letter -- and won by Barry Levine, VentureBeat, May 23. "Has Microsoft been standing up to federal searches more than we've known? That question is appropriate, following news that the tech giant sued the FBI in civil court last year over a National Security Letter (NSL) that sought information from one of its enterprise customers."
- House Passes Curbs On NSA Phone Surveillance by Ken Dilanian, Associated Press, May 22. "The bill was severely weakened to mollify U.S. intelligence agencies, which insisted that the surveillance programs that shocked many Americans are a critical bulwark against terror plots."
- Pentagon report finds Snowden leaks had 'staggering' intelligence impact by Jason Leopold, The Guardian, May 22. "A top-secret Pentagon report to assess the damage to national security from the leak of classified National Security Agency documents by Edward Snowden concluded that 'the scope of the compromised knowledge related to US intelligence capabilities is staggering'."
- Statement of Administration Policy on the USA Freedom Act, The White House, May 21. "The bill ensures our intelligence and law enforcement professionals have the authorities they need to protect the Nation, while further ensuring that individuals' privacy is appropriately protected when these authorities are employed."
- CIA Seeks Extension of Time to Process SSCI Interrogation Report, May 15. "Due to the fluid nature of this process, aspects of which are beyond the CIA's control, the Agency does not yet have a firm date by which it can complete the processing of the CIA Response and the so-called Panetta Report, although it hopes the declassification review and accompanying processing of those documents can be completed this summer." (Supporting letter from WH Counsel Katherine Ruemmler, April 18).
- Memo Revisits Policy on Citing Leaked Material, to Some Confusion by Charlie Savage, New York Times, May 9. "The Office of the Director of National Intelligence sent an internal memo to its work force on Friday saying that its new policy on pre-publication review of speeches, books, articles, term papers and other writings permits current and former employees to refer to news articles as long as the officials do not confirm any classified information."
- Intelligence Policy Bans Citation of Leaked Material by Charlie Savage, New York Times, May 8. "The Obama administration is clamping down on a technique that government officials have long used to join in public discussions of well-known but technically still-secret information: citing news reports based on unauthorized disclosures."
- Despite Senate hopes of speedy release, CIA torture report won't be made public for months by Jonathan Landay, McClatchy News, May 7. "The release of the long-awaited Senate Intelligence Committee report on the CIA's use of waterboarding and other interrogation techniques -- widely denounced as torture -- is certain to take much longer than the 30 days sought by Senate Democrats."
- Arms Cache Most Likely Kept in Texas by the C.I.A. by Charlie Savage, New York Times, May 4. "In passing references scattered through once-classified documents and cryptic public comments by former intelligence officials, it is referred to as "Midwest Depot," but the bland code name belies the role it has played in some of the C.I.A.'s most storied operations."
Older News: April 2014
Maintained by Steven Aftergood
Updated June 2, 2014