Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption Media Articles
Excerpts of Key Intelligence Agency Corruption Media Articles in Major Media


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


2 Ex-Workers Accuse Blackwater Security Company of Defrauding the U.S. for Years
2010-02-11, New York Times
http://www.nytimes.com/2010/02/11/us/11suit.html

Two former employees of Blackwater Worldwide have accused the private security company of defrauding the government for years by filing bogus receipts, double billing for the same services and charging government agencies for strippers and prostitutes, according to court documents unsealed this week. In a December 2008 lawsuit, the former employees said top Blackwater officials had engaged in a pattern of deception as they carried out government contracts in Iraq and Afghanistan, and in Louisiana in the aftermath of Hurricane Katrina. The lawsuit, filed under the False Claims Act, also asserts that Blackwater officials turned a blind eye to “excessive and unjustified” force against Iraqi civilians by several Blackwater guards. Blackwater has earned billions of dollars from government agencies in the years since the Sept. 11 attacks, when the company won contracts to protect American diplomats in Iraq and Afghanistan. The former employees who filed the lawsuit, a married couple named Brad and Melan Davis, said there was little financial oversight of the money. The documents detailing the Davises’ accusations were unsealed after the Justice Department declined to join in the case against Blackwater, which last year changed its name to Xe Services.

Note: For lots more on corporate fraud and war profiteering from reliable sources, click here.


License to Kill? Intelligence Chief Says U.S. Can Take Out American Terrorists
2010-02-03, ABC News
http://abcnews.go.com/Politics/license-kill-intelligence-chief-us-american-te...

The director of national intelligence affirmed rather bluntly today that the U.S. intelligence community has authority to target American citizens for assassination if they present a direct terrorist threat to the United States. "We take direct actions against terrorists in the intelligence community; if we think that direct action will involve killing an American, we get specific permission to do that," Director of National Intelligence Dennis Blair told the House Intelligence Committee. "Whether that American is involved in a group that is trying to attack us, whether that American ... is a threat to other Americans. Those are the factors involved." Blair explained. According to U.S. officials, only a handful of Americans would be eligible for targeting by U.S. intelligence or military operations. The DNI said that Internet and social media sites have become critical to terrorism recruitment efforts. "The homegrown radicalization of people in the United States is a relatively new thing." Blair said U.S. intelligence was rapidly working to counter the emerging problem.

Note: To read a valuable commentary on Director of National Intelligence Dennis Blair's claimed "war exception" to the Constitution, permitting assassination of American citizens by the US military and intelligence services without judicial review or legal process of any kind, click here. For the views of several legal experts, click here.


U.S. citizen in CIA's cross hairs
2010-01-31, Los Angeles Times
http://articles.latimes.com/2010/jan/31/world/la-fg-cia-awlaki31-2010jan31

The CIA sequence for a Predator strike ends with a missile but begins with a memo. Usually no more than two or three pages long, it bears the name of a suspected terrorist, the latest intelligence on his activities, and a case for why he should be added to a list of people the agency is trying to kill. No U.S. citizen has ever been on the CIA's target list. But that is expected to change as CIA analysts compile a case against a Muslim cleric who was born in New Mexico but now resides in Yemen. He is a U.S. citizen and until recently was mainly known as a preacher espousing radical Islamic views. Awlaki's status as a U.S. citizen requires special consideration, according to former officials familiar with the criteria for the CIA's targeted killing program. But while Awlaki has not yet been placed on the CIA list, the officials said it is all but certain that he will be. The CIA has carried out Predator attacks in Yemen since at least 2002, when a drone strike killed six suspected Al Qaeda operatives traveling in a vehicle across desert terrain. The agency knew that one of the operatives was an American, Kamal Derwish, who was among those killed. Derwish was never on the CIA's target list, officials said, and the strike was aimed at a senior Al Qaeda operative.

Note: As the last few sentences of this long report indicate, assassination of their own citizens by US military and intelligence agencies has been going on for years. For many key reports from reliable sources on assassination as state policy, click here.


Terror suspect allowed to keep visa by intelligence officials
2010-01-27, Detroit News
http://detnews.com/article/20100127/NATION/1270405/Terror-suspect-kept-visa-t...

The State Department didn't revoke the visa of foiled terrorism suspect Umar Farouk Abdulmutallab because federal counterterrorism officials had begged off revocation, a top State Department official revealed. Patrick F. Kennedy, an undersecretary for management at the State Department, said Abdulmutallab's visa wasn't taken away because intelligence officials asked his agency not to deny a visa to the suspected terrorist. "Revocation action would have disclosed what they were doing," Kennedy said in testimony before the House Committee on Homeland Security. Since the failed attack, criticism has swirled around leaders of the U.S. intelligence community who have indicated they were warned by the suspect's father about a month before the flight of a potential terror threat, but failed to stop Abdmutallab, despite other warning signs like the fact that he purchased a one-way ticket to Detroit with cash.

Note: So federal counterterrorism officials stopped the bomber's visa from being revoked. Hmmmm... Clearly there is more going on in this case than "failure to connect the dots." Why aren't other major media reporting this important story? Kurt Haskell, a key eyewitness passenger who almost lost his life, has written a powerfully revealing blog piece on what he thinks is really going on, available here. For more on this key case, click here.


U.S. military teams, intelligence deeply involved in aiding Yemen on strikes
2010-01-27, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2010/01/26/AR20100126042...

U.S. military teams and intelligence agencies are deeply involved in secret joint operations with Yemeni troops who in the past six weeks have killed scores of people. The operations, approved by President Obama, involve several dozen troops from the U.S. military's clandestine Joint Special Operations Command (JSOC), whose main mission is tracking and killing [targeted persons]. Obama approved a Dec. 24 strike against a compound where a U.S. citizen, Anwar al-Aulaqi, was thought to be. He has since been added to a shortlist of U.S. citizens specifically targeted for killing or capture by the JSOC. The combined efforts have resulted in more than two dozen ground raids and airstrikes. After the Sept. 11 attacks, Bush gave the CIA, and later the military, authority to kill U.S. citizens abroad. The Obama administration has adopted the same stance. Both the CIA and the JSOC maintain lists of individuals, called "High Value Targets" and "High Value Individuals," whom they seek to kill or capture. The JSOC list includes three Americans, including Aulaqi, whose name was added late last year. As of several months ago, the CIA list [also] included three U.S. citizens.

Note: For many reports from reliable sources on the growing governmental threats to civil liberties, click here.


SEC mulled national security status for AIG details
2010-01-24, CNN Money/Reuters
http://money.cnn.com/news/newsfeeds/articles/reuters/MTFH21979_2010-01-24_19-...

U.S. securities regulators [at the Securities and Exchange Commission] originally treated the New York Federal Reserve's bid to keep secret many of the details of the American International Group bailout like a request to protect matters of national security. The SEC ... agreed to limit the number of SEC employees who would review the document to just two and keep the document locked in a safe while the SEC considered AIG's confidentiality request. The SEC had also agreed that if it determined the document should not be made public, it would be stored "in a special area where national security related files are kept." Emails ... that have become public in recent weeks reveal that some at the New York Fed had gone to great lengths to keep the terms of the bailout private and the SEC may have played a role in contributing to some of the secrecy surrounding the AIG rescue package. "The New York Fed was orchestrating what can only be characterized as an extreme effort to ensure that details of the counterparty deal stayed secret," Rep. Darrell Issa ... said. "More and more it looks as if they would've kept the details of the deal secret indefinitely, it they could have."

Note: So now bank transactions are being considered a matter of "national security." What next? It's becoming ever more apparent that "national security" is used as a catch-all phrase for information that those in power don't want us to know about their secret dealings which benefit themselves at the expense of most of the rest of us.


The Anthrax Attacks Remain Unsolved
2010-01-24, Wall Street Journal
http://online.wsj.com/article/SB10001424052748704541004575011421223515284.html

The investigation of the 2001 anthrax attacks ended as far as the public knew on July 29, 2008, with the death of Bruce Ivins, a senior biodefense researcher at the U.S. Army Medical Research Institute of Infectious Diseases in Fort Detrick, Md. Less than a week after his apparent suicide, the FBI declared Ivins to have been the sole perpetrator of the 2001 Anthrax attacks. The FBI [had] turned the pressure up on him, isolating him at work and forcing him to spend what little money he had on lawyers to defend himself. He became increasingly stressed. Then came his suicide (which, as Eric Nadler and Bob Coen show in their documentary "The Anthrax War," was one of four suicides among American and British biowarfare researchers in past years). But there was still a vexing problem. Silicon was used in the 1960s to weaponize anthrax. Anthrax spores were coated with the substance to prevent them from clinging together so as to create a lethal aerosol. But since weaponization was banned by international treaties, research anthrax no longer contains silicon, and the [anthrax] at Fort Detrick contained none. Ivins, no matter how weird he may have been, had neither the set of skills nor the means to attach silicon to anthrax spores. If Ivins had neither the equipment or skills to weaponize anthrax with silicon, then some other party with access to the anthrax must have done it.

Note: As usual, the FBI tries to pin it on one wacko, when it is clear others most have been involved. Remember that the anthrax attacks occurred as Congress was considering the PATRIOT Act, and were directed in part at key senators opposed to the act. Congress was shut down for a period, and when it reconvened it passed the bill without discussion. For lots more on the antrax attacks as a likely false-flag operation, click here.


FBI broke law for years in phone record searches
2010-01-19, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2010/01/18/AR20100118039...

The FBI illegally collected more than 2,000 U.S. telephone call records between 2002 and 2006 by invoking terrorism emergencies that did not exist or simply persuading phone companies to provide records, according to internal bureau memos and interviews. FBI officials issued approvals after the fact to justify their actions. E-mails obtained by The Washington Post detail how counterterrorism officials inside FBI headquarters did not follow their own procedures that were put in place to protect civil liberties. A Justice Department inspector general's report due out this month is expected to conclude that the FBI frequently violated the law with its emergency requests. FBI officials said they thought that nearly all of the requests involved terrorism investigations. FBI general counsel Valerie Caproni said ... that the FBI technically violated the Electronic Communications Privacy Act when agents invoked nonexistent emergencies to collect records.

Note: The FBI, by admitting that "nearly all" of the phone records they obtained were related to "terrorism investigations," make it clear that some were not. But they used claims of "terrorism emergency" to obtain them. These they then assert were merely "technical" violations. For many disturbing reports from major media sources on the increasing threats to civil liberties under the pretext of the "war on terrorism," click here.


Meet Mikey, 8: U.S. Has Him on Watch List
2010-01-14, New York Times
http://www.nytimes.com/2010/01/14/nyregion/14watchlist.html

The Transportation Security Administration ... has on its web site a “mythbuster” that tries to reassure the public. Myth: The No-Fly list includes an 8-year-old boy. Buster: No 8-year-old is on a T.S.A. watch list. “Meet Mikey Hicks,” said Najlah Feanny Hicks, introducing her 8-year-old son, a New Jersey Cub Scout and frequent traveler who has seldom boarded a plane without a hassle because he shares the name of a suspicious person. “It’s not a myth.” Hicks’s mother initially sensed trouble when he was a baby and she could not get a seat for him on their flight to Florida at an airport kiosk; airline officials explained that his name “was on the list,” she recalled. The first time he was patted down, at Newark Liberty International Airport, Mikey was 2. He cried. After years of long delays and waits for supervisors at every airport ticket counter, this year’s vacation to the Bahamas badly shook up the family. Mikey was frisked on the way there, then more aggressively on the way home. “Up your arms, down your arms, up your crotch — someone is patting your 8-year-old down like he’s a criminal,” Mrs. Hicks recounted. It is true that Mikey is not on the federal government’s “no-fly” list, which includes about 2,500 people, less than 10 percent of them from the United States. But his name appears to be among some 13,500 on the larger “selectee” list, which sets off a high level of security screening.

Note: For many reports from major media sources on the extreme loss of liberties brought about by the highly touted "war on terrorism," click here.


C.I.A. Is Sharing Data With Climate Scientists
2010-01-05, New York Times
http://www.nytimes.com/2010/01/05/science/earth/05satellite.html

The nation’s top scientists and spies are collaborating on an effort to use the federal government’s intelligence assets — including spy satellites and other classified sensors — to assess the hidden complexities of environmental change. The collaboration ... has the strong backing of the director of the Central Intelligence Agency. Secrecy cloaks the monitoring effort ... because the United States wants to keep foes and potential enemies in the dark about the abilities of its spy satellites and other sensors. Controversy has often dogged the use of federal intelligence gear for environmental monitoring. About 60 scientists — mainly from academia but including some from industry and federal agencies — run the effort’s scientific side. All have secret clearances. The C.I.A. runs the program and arranges for the scientists to draw on federal surveillance equipment, including highly classified satellites of the National Reconnaissance Office. Officials said the effort to restart the program originated on Capitol Hill in 2008 after former Vice President Al Gore argued for its importance with Senator Dianne Feinstein, Democrat of California, who was then a member of the Senate Intelligence Committee; she became its chairwoman in early 2009.

Note: What happens to the public perception of science if research relies increasingly on secret data and collaboration with spy agencies? How could the results of important studies be verified by independent researchers? For lots more on the ever-expanding world of government secrecy, click here.


A Torture Timeline
2010-01-01, Newsweek
http://photo.newsweek.com/2009/4/photos-a-timeline-of-torture/_jcr_content.html

In 2009, the Justice Department began to release reports and top-secret memos detailing interrogation techniques ... used by CIA officers against suspected terror operatives. The list of brutal techniques, including holding prisoners in small boxes, staging mock executions, and water torture, is reminiscent of some of the worst human-rights abuses on record. In medieval Europe, torture was more than just a means of punishment. Many criminal trials of the era consisted of one or more 'ordeals,' painful tests designed to prove guilt or innocence through supernatural judgment. During waterboarding, a technique first used in the 14th century, torturers begin by pumping water directly into a victim's stomach or slowly flooding his throat with liquid. Used extensively during the Spanish Inquisition, the practice became less publicly acceptable during the Enlightenment, then experienced an underground resurgence in the 19th century. Since World War II, different forms of waterboarding have been employed by governments in Japan, Cambodia, the United Kingdom and the United States, among others. In addition to performing forced labor, prisoners at Nazi concentration camps became subjects in some of the cruelest medical experiments ever performed. They were often held at extreme altitudes and temperatures to help develop new survival strategies or exposed to deadly gases and diseases in order to test vaccines. Many of these tests, directed by the infamous Josef Mengele at Auschwitz, advanced Nazi ideology by establishing 'Jewish racial inferiority.'

Note: The above link leads to a revealing 12-part slide show on the history of torture. For more disturbing information on how Nazi torture techniques were eventually used by the CIA for mind control, click here.


Ex-Homeland Security chief head said to abuse public trust by touting body scanners
2010-01-01, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2009/12/31/AR20091231028...

Since the attempted bombing of a U.S. airliner on Christmas Day, former Homeland Security secretary Michael Chertoff has given dozens of media interviews touting the need for the federal government to buy more full-body scanners for airports. What he has made little mention of is that the Chertoff Group, his security consulting agency, includes a client that manufactures the machines. An airport passengers' rights group ... criticized Chertoff, who left office less than a year ago, for using his former government credentials to advocate for a product that benefits his clients. "Mr. Chertoff should not be allowed to ... privately gain from the sale of full-body scanners under the pretense that the scanners would have detected this particular type of explosive," said Kate Hanni, founder of FlyersRights.org, which opposes the use of the scanners. Chertoff's advocacy for the technology dates back to his time in the Bush administration. In 2005, Homeland Security ordered the government's first batch of the scanners. Today, 40 body scanners are in use at 19 U.S. airports. The number is expected to skyrocket at least in part because of the Christmas Day incident. The Transportation Security Administration this week said it will order 300 more machines.

Note: For lots more on the profiteering that underlies "the war on terror," click here.


Capability Surprise
2010-01-00, U.S. Office of the Under Secretary of Defense
http://www.acq.osd.mil/dsb/reports/2010-10-Capability_Suprise_Vol_2.pdf

Deception [is reliant] on the close control of information, running agents (and double-agents) and creating stories that adversaries will readily believe. In an era of ubiquitous information access, anonymous leaks and public demands for transparency, deception operations are extraordinarily difficult. Nevertheless, successful strategic deception has in the past provided the United States with significant advantages that translated into operational and tactical success. Successful deception also minimizes U.S. vulnerabilities, while simultaneously setting conditions to surprise adversaries. Thus, strategic deception capabilities and plans must perforce be highly classified. Deception cannot succeed in wartime without developing theory and doctrine in peacetime. In order to mitigate or impart surprise, the United States should develop more robust interagency deception planning and action prior to the need for military operations. To be effective, a permanent standing office with strong professional intelligence and operational expertise needs to be established.

Note: The above excerpts can be found on pages 77 and 78. For a powerful two-page summary of a top general's description of how the American public is deceived into supporting war, click here.


US forces mounted secret Pakistan raids
2009-12-21, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2009/dec/21/us-forces-secret-pakistan-raids

American special forces have conducted multiple clandestine raids into Pakistan's tribal areas as part of a secret war in the border region where Washington is pressing to expand its drone assassination programme. A former Nato officer said the incursions, only one of which has been previously reported, occurred between 2003 and 2008, involved helicopter-borne elite soldiers stealing across the border at night, and were never declared to the Pakistani government. "The Pakistanis were kept entirely in the dark about it. It was one of those things we wouldn't confirm officially with them," said the source, who had detailed knowledge of the operations. Such operations are a matter of sensitivity in Pakistan. While public opinion has grudgingly tolerated CIA-led drone strikes in the tribal areas, any hint of American "boots on the ground" is greeted with virulent condemnation. After the only publicly acknowledged special forces raid in September 2008, Pakistan's foreign office condemned it as "a grave provocation" while the military threatened retaliatory action. The military source said that was the fourth raid of previous years. The secretive nature of the raids underscores the suspicious nature of the relationship between the two allies as they argue about Washington's latest demands.

Note: For lots more from reliable sources on the secret realities of the "war on terrorism," click here.


CIA working with Palestinian security agents
2009-12-17, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2009/dec/17/cia-palestinian-security-agents

Palestinian security agents who have been detaining and allegedly torturing supporters of the Islamist organisation Hamas in the West Bank have been working closely with the CIA, the Guardian has learned. Less than a year after Barack Obama signed an executive order that prohibited torture and provided for the lawful interrogation of detainees in US custody, evidence is emerging the CIA is co-operating with security agents whose continuing use of torture has been widely documented by human rights groups. The relationship between the CIA and the two Palestinian agencies involved – Preventive Security Organisation (PSO) and General Intelligence Service (GI) – is said by some western diplomats and other officials in the region to be so close that the American agency appears to be supervising the Palestinians' work. One senior western official said: "The [Central Intelligence] Agency consider them as their property, those two Palestinian services." A diplomatic source added that US influence over the agencies was so great they could be considered "an advanced arm of the war on terror". Among the human rights organisations that have documented or complained about the mistreatment of detainees held by the PA in the West Bank are Amnesty International, Human Rights Watch, al-Haq and the Israeli watchdog B'Tselem.

Note: For many accounts from major media sources of the horrific abuses committed by military, intelligence and security forces in the wars of occupation in Palestine, Iraq and Afghanistan, click here.


Mumbai terror suspect David Headley was ‘rogue US secret agent’
2009-12-17, Times of London
http://www.timesonline.co.uk/tol/news/world/asia/article6960182.ece

A key terror suspect who allegedly helped to plan last year’s attacks in Mumbai and plotted to strike Europe was an American secret agent who went rogue, Indian officials believe. David Headley, 49, who was born in Washington to a Pakistan diplomat father and an American mother, was arrested in Chicago in October. He has denied the charges. He came to the attention of the US security services in 1997 when he was arrested in New York for heroin smuggling. He earned a reduced sentence by working for the US Drug Enforcement Agency (DEA) infiltrating Pakistan-linked narcotics gangs. Indian investigators, who have been denied access to Mr Headley, suspect that he remained on the payroll of the US security services — possibly working for the Central Intelligence Agency (CIA) — but switched his allegiance to LeT. “India is looking into whether Headley worked as a double agent,” an Indian Home Ministry official said yesterday. Mr Headley, who changed his name from Daood Gilani, was in Mumbai until two weeks before the attacks on the city. Despite being firmly on the radar of the US intelligence agencies, he was allowed to return to India as recently as March. Indian officials are furious that their American counterparts did not share details of that visit at the time. The Indian media has raised the possibility that Mr Headley was being protected by his American handlers — a theory that experts say is credible.

Note: For many other reports from major media sources that raise profound questions about the official account of "terrorism," click here.


Blackwater Guards Tied to Secret C.I.A. Raids
2009-12-11, New York Times
http://www.nytimes.com/2009/12/11/us/politics/11blackwater.html

Private security guards from Blackwater Worldwide participated in some of the C.I.A.’s most sensitive activities — clandestine raids with agency officers against people suspected of being insurgents in Iraq and Afghanistan and the transporting of detainees, according to former company employees and intelligence officials. The raids against suspects occurred on an almost nightly basis during the height of the Iraqi insurgency from 2004 to 2006, with Blackwater personnel playing central roles in what company insiders called “snatch and grab” operations. Several former Blackwater guards said that their involvement in the operations became so routine that the lines supposedly dividing the Central Intelligence Agency, the military and Blackwater became blurred. Instead of simply providing security for C.I.A. officers, they say, Blackwater personnel at times became partners in missions to capture or kill militants in Iraq and Afghanistan, a practice that raises questions about the use of guns for hire on the battlefield. The secret missions illuminate a far deeper relationship between the spy agency and the private security company than government officials had acknowledged. Blackwater’s ties to the C.I.A. have emerged in recent months, beginning with disclosures in The New York Times that the agency had hired the company as part of a program to assassinate leaders of Al Qaeda and to assist in the C.I.A.’s Predator drone program in Afghanistan and Pakistan.

Note: After this report was published, the CIA announced it had terminated contracts with Blackwater. The reality is that many of Blackwater's services are provided under classified contracts, with both the CIA and the Joint Special Operations Command, so the denial of "contracts" with Blackwater may be deceptive.


DNA Test Sparks Controversy Over Hitler's Remains
2009-12-09, ABC News/Spiegel Online
http://abcnews.go.com/WN/hitler-skull-russian-secret-service-custody/story?id...

The controversy surrounding Adolf Hitler's skull fragments is a little embarrassing for the Russian secret services. In 2000 they presented a skull fragment and a piece of jawbone that they claimed were the remains of the Nazi leader. It was an attempt to quash outlandish rumors that he had escaped alive at the end of World War II. But in October US researchers presented the results of DNA tests on the skull and said it definitely didn't belong to the dictator because it was from a female. Scientists had already harbored doubts about the authenticity of the piece of bone because it was thinner than a male's usually is. "The bone seemed very thin -- male bone tends to be more robust. It corresponds to a woman between the ages of 20 and 40," said Nick Bellantoni of the University of Connecticut. The position of the exit wound at the back of the skull also made scientists suspicious because eyewitnesses said Hitler had committed suicide by firing into his right temple. Bellantoni said he was allowed to work on the skull for an hour. When he flew home from Moscow he had two samples in his luggage: a sample from the skull fragment and one sample of blood from the sofa on which Hitler is said to have shot himself. Bellantoni was able to compare the bloodstains on the blood-stained fabric with photos the Soviets took after they seized Hitler's bunker in Berlin. The stains had matched those in the photos. The research showed that the sofa blood DNA did not match the skull DNA. The sofa blood was male and the skull belonged to a woman, claimed Bellantoni.

Note: For more on the mysteries surrounding the end of Hitler's life, click here.


Brussels gives CIA the power to search UK bank records
2009-12-06, Times of London
http://www.timesonline.co.uk/tol/news/uk/crime/article6945972.ece

The CIA is to be given broad access to the bank records of millions of Britons under a European Union plan to fight terrorism. The Brussels agreement, which will come into force in two months’ time, requires the 27 EU member states to grant requests for banking information made by the United States under its terrorist finance tracking programme. The EU said it had agreed that Europeans would be compelled to release the information to the CIA “as a matter of urgency”. The records will be kept in a US database for five years before being deleted. Critics say the system is “lopsided” because there is no reciprocal arrangement under which the UK authorities can easily access the bank accounts of US citizens. They also say the plan to sift through cross-border and domestic EU bank accounts gives US intelligence more scope to consult our bank accounts than is granted to law enforcement agencies in the UK or the rest of Europe. This weekend civil liberties groups and privacy campaigners said the surveillance programme, introduced as an emergency measure in 2001, was being imposed on Britain without a proper debate. Shami Chakrabarti, director of Liberty, said: “The massive scope for transferring personal information from Europe to the United States is extremely worrying, especially in the absence of public debate or parliamentary scrutiny either at EU or domestic level.

Note: For reports from major media sources on erosion of privacy by governments and corporations, click here.


C.I.A. to Expand Use of Drones in Pakistan
2009-12-04, New York Times
http://www.nytimes.com/2009/12/04/world/asia/04drones.html

The White House has authorized an expansion of the C.I.A.’s drone program in Pakistan’s lawless tribal areas. More C.I.A. drone attacks have been conducted under President Obama than under President George W. Bush. The political consensus in support of the drone program ... and its secrecy have obscured just how radical it is. For the first time in history, a civilian intelligence agency is using robots to carry out a military mission, selecting people for killing in a country where the United States is not officially at war. The drone warfare pioneered by the C.I.A. in Pakistan and the Air Force in Iraq and Afghanistan is the leading edge of a wave of push-button combat that will raise legal, moral and political questions around the world, said P. W. Singer, a scholar at the Brookings Institution and author of the book Wired for War: The Robotics Revolution and Conflict in the 21st Century. So far, only the United States and Israel have used the planes for strikes, but that number will grow. It is impossible to judge whether the program violates international law without knowing whether Pakistan permits the incursions, how targets are selected and what is done to minimize civilian casualties.

Note: For many revealing reports from reliable sources on the realities behind the "war on terror," click here.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"