Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption Media Articles
Excerpts of Key Intelligence Agency Corruption Media Articles in Major Media


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


Defense says NY synagogue-bomb plot was feds' idea
2010-03-19, Washington Post/Associated Press
http://www.washingtonpost.com/wp-dyn/content/article/2010/03/19/AR20100319017...

Four men accused of trying to bomb synagogues and shoot down planes in New York last spring did little more than go along with a fake plot proposed, directed and funded by the federal government, defense lawyers claim in asking the court to dismiss the case. A federal informant chose the targets, offered payment, provided maps and bought the only real weapon involved, a handgun, the attorneys said in a dismissal motion filed this week in federal court. They alleged the defendants were not inclined toward any crime until the informant began recruiting them. The dismissal motion identified the government's agent as Shaheed Hussain, a "professional informant" for the FBI. The defense alleged that Hussain tried to incite the defendants by blaming Jews for the world's evil and telling them that attacks against non-Muslims were endorsed by Islam. Nevertheless, they said, he failed to motivate the defendants to any action on their own. Hussain suggested the targets, paid for the defendants' groceries, bought a gun, provided the fake bombs and missile, assembled the explosive devices and acted as chauffeur, the defense said. "The alleged crimes were almost entirely the product of Hussain's labors and the enterprise would have immediately collapsed if Hussain's guiding hand had been removed," the defense motion said.

Note: For lots more evidence of fake terror plots used to maintain the "war on terror", click here.


Did the CIA test LSD in the New York City subway system?
2010-03-13, New York Post
http://nypost.com/2010/03/14/did-the-cia-test-lsd-in-the-new-york-city-subway...

On Nov. 28, 1953, Frank Olson, a ... 42-year-old government scientist, plunged to his death from room 1018A in New York's Statler Hotel. [Twenty-two] years later, the Rockefeller Commission report was released, detailing a litany of domestic abuses committed by the CIA. The ugly truth emerged: Olson's death was the result of his having been surreptitiously dosed with LSD days earlier by his colleagues. The belated 1975 [admission] ... generated more interest into a series of wildly implausible "mind control" experiments on an unsuspecting populace over three decades. Much of this plot unfolded here, in New York, according to H.P. Albarelli Jr., author of A Terrible Mistake: The Murder of Frank Olson and the CIA's Secret Cold War Experiments. Albarelli spent more than a decade sifting through more than 100,000 pages of government documents and his most startling chestnut might be his claim that the intelligence community conducted aerosol tests of LSD inside the New York City subway system. "The experiment was pretty shocking — shocking that the CIA and the Army would release LSD like that, among innocent unwitting folks," Albarelli told The Post. An Olson colleague, Dr. Henry Eigelsbach, confirmed to Albarelli that the LSD subway test did, in fact, occur in November 1950, albeit on a smaller scale than first planned. Little, however, is known about the test — what line, how many people and what happened.

Note: For lots more reliable information on CIA mind control experiments, click here and here.


Doctors Without Morals
2010-03-01, New York Times
http://www.nytimes.com/2010/03/01/opinion/01xenakis.html

After five years of investigation, the Justice Department has released its findings regarding the government lawyers who authorized waterboarding and other forms of torture during the interrogation of suspected terrorists at Guantánamo Bay and elsewhere. In contrast, the government doctors and psychologists who participated in and authorized the torture of detainees have escaped discipline, accountability or even internal investigation. It is hardly news that medical staff at the C.I.A. and the Pentagon played a critical role in developing and carrying out torture procedures. Psychologists and at least one doctor designed or recommended coercive interrogation methods including sleep deprivation, stress positions, isolation and waterboarding. The military’s Behavioral Science Consultation Teams evaluated detainees, consulted their medical records to ascertain vulnerabilities and advised interrogators when to push harder for intelligence information. Psychologists designed a program for new arrivals at Guantánamo that kept them in isolation to “enhance and exploit” their “disorientation and disorganization.”

Note: To learn about top doctors and psychiatrists who abused their positions to forward secret government mind control programs, click here.


The F.B.I.’s Anthrax Case
2010-02-28, New York Times
http://www.nytimes.com/2010/02/28/opinion/28sun2.html

The Federal Bureau of Investigation has issued a report that is supposed to clinch the case that a lone scientist mailed anthrax-laced letters in 2001, terrorizing a country already traumatized by the 9/11 attacks. The agency cites voluminous circumstantial evidence ... but its report leaves too many loose ends to be taken as a definitive verdict. The scientist — Dr. Bruce Ivins, an Army biodefense expert — killed himself in 2008 as the investigation moved ever closer to an indictment. That means the evidence and the F.B.I.’s conclusion that he was the culprit and acted alone will never be tested in court. Problematic is the investigative work that led the F.B.I. to conclude that only Dr. Ivins, among perhaps 100 scientists who had access to the same flask, could have sent the letters. The case has always been hobbled by a lack of direct evidence tying Dr. Ivins to the letters. No witnesses who saw him prepare the powdered anthrax or mail the letters. No anthrax spores in his house or car. No incriminating fingerprints, fibers or DNA. No confession to a colleague or in a suicide note, just opaque ramblings in e-mail that the F.B.I. interprets as evidence of guilt. The F.B.I. has a troubling history of building a circumstantial case against suspects who are later exonerated. We ... agree with Representative Rush Holt of New Jersey, who is calling for an independent assessment to validate the findings.

Note: For a recent Wall Street Journal report on the unsolved anthrax attacks, click here.


Daniel Ellsberg on the Limits of Knowledge
2010-02-27, Mother Jones
http://www.motherjones.com/kevin-drum/2010/02/daniel-ellsberg-limitations-kno...

[Here's a story] from Ellsberg's book Secrets. The setting is a meeting with Henry Kissinger in late 1968. In 1968 Ellsberg was a highly respected analyst ... who had worked for both the Pentagon and Rand, and Kissinger was just entering the government. Ellsberg told him, "Henry, there's something I would like to tell you. You've dealt a great deal with top secret information. But you're about to receive a whole slew of special clearances, maybe fifteen or twenty of them, that are higher than top secret. First, you'll be exhilarated by some of this new information. But second, ... you will feel like a fool for having studied, written, talked about these subjects, criticized and analyzed decisions made by presidents for years without having known of the existence of all this information. In particular, you'll feel foolish for having literally rubbed shoulders for over a decade with some officials and consultants who did have access to all this ... and you'll be stunned that they kept that secret from you so well. You will feel like a fool. Then, after you've ... become used to using what amounts to whole libraries of hidden information, ... you will forget there ever was a time when you didn't have it. You'll be aware only of the fact that you have it now and most others don't ... and that all those other people are fools. [In] a matter of two or three years — you'll eventually become aware of the limitations of this information. It's often inaccurate, and it can lead you astray. But that takes a while to learn. In the meantime ... you will deal with a person who doesn't have those clearances only from the point of view of what you want him to believe and what impression you want him to go away with. You'll have to lie carefully to him about what you know. In effect, you will have to manipulate him.

Note: Don't miss the entire fascinating, highly revealing article at the link above. To see this quote from Ellsberg's book on Google books, click here. For more on government secrets, see the deeply revealing reports from reliable major media sources available here.


The People We Pay to Look Over Our Shoulders
2010-02-23, New York Times
http://www.nytimes.com/2010/02/23/books/23watchers.html

The world of modern eavesdropping, or signals intelligence ... for many years ... operated in the shadows. The Puzzle Palace, the 1983 best seller by James Bamford that remains the benchmark study of the N.S.A., first pulled back the curtain to provide a glint of unwanted sunlight on the place. As each operation has come to light, an anxious public has wanted to know whether this powerful new surveillance model was undermining traditional notions of privacy and civil liberties. Just whom is the government watching? And who is watching the watchers? It has been left to outsiders — journalists, authors, civil rights advocates and privacy groups — to keep tabs on the watchers and to bring public scrutiny to once-secret programs. For the spymasters, this spotlight was decidedly unwelcome. Mike McConnell, a director of intelligence in the Bush administration, ... is one of the recurring characters in The Watchers: The Rise of America’s Surveillance State by Shane Harris. Mr. Harris, with some success, does what Mr. McConnell and others in the intelligence world have found so objectionable: he watches the watchers. At its best The Watchers provides an insightful glimpse into how Washington works and how ideas are marketed and sold in the back rooms of power, whether the product being peddled is widgets or a radical model for intelligence gathering.

Note: For more insights into the activities of Big Brother, click here.


F.B.I., Laying Out Evidence, Closes Anthrax Case
2010-02-20, New York Times
http://www.nytimes.com/2010/02/20/us/20anthrax.html

More than eight years after anthrax-laced letters killed five people and terrorized the country, the F.B.I. [has] closed its investigation, adding eerie new details to its case that the 2001 attacks were carried out by Bruce E. Ivins, an Army biodefense expert who killed himself in 2008. A 92-page report, which concludes what by many measures is the largest investigation in F.B.I. history, laid out the evidence against Dr. Ivins. The report disclosed for the first time the F.B.I.’s theory that Dr. Ivins embedded in the notes mailed with the anthrax a complex coded message, based on DNA biochemistry. Whether the voluminous documentation will convince skeptics about Dr. Ivins’s guilt was uncertain. Representative Rush D. Holt, a New Jersey Democrat and a physicist who has sharply criticized the bureau’s work, said the case should not have been closed. He said the F.B.I. report laid out “barely a circumstantial case” that “would not, I think, stand up in court.” Some of Dr. Ivins’s colleagues at the United States Army Medical Research Institute of Infectious Diseases in Frederick, including several supervisors who knew him well, publicly rejected the F.B.I.’s conclusion. They said he was eccentric but incapable of such a diabolical act, and they questioned whether he could have produced the deadly powder with the equipment in his lab.

Note: The FBI's "closure" of its anthrax investigation won't put an end to the unanswered questions about who the perpetrators of the attacks were. As described in this key Wall Street Journal report, the specific formulation of the anthrax used in the attacks was beyond Ivins' capabilities.


Law enforcement is tracking Americans' cell phones in real time
2010-02-19, Newsweek magazine
http://www.newsweek.com/id/233916

Law enforcement is tracking Americans' cell phones in real time—without the benefit of a warrant. Amid all the furor over the Bush administration's warrantless wiretapping program a few years ago, a mini-revolt was brewing over another type of federal snooping that was getting no public attention at all. Federal prosecutors were seeking what seemed to be unusually sensitive records: internal data from telecommunications companies that showed the locations of their customers' cell phones—sometimes in real time, sometimes after the fact. Prosecutors "were using the cell phone as a surreptitious tracking device," said Stephen W. Smith, a federal magistrate in Houston. "And I started asking the U.S. Attorney's Office, 'What is the legal authority for this? What is the legal standard for getting this information?'" Those questions are now at the core of a constitutional clash between President Obama's Justice Department and civil libertarians alarmed by what they see as the government's relentless intrusion into the private lives of citizens. There are numerous other fronts in the privacy wars—about the content of e-mails, for instance, and access to bank records and credit-card transactions. The Feds now can quietly get all that information. But cell-phone tracking is among the more unsettling forms of government surveillance, conjuring up Orwellian images of Big Brother secretly following your movements through the small device in your pocket.

Note: For many key reports from major media sources on the disturbing trend toward increasing government and corporate surveillance, click here.


U.S. data about Guantanamo detainee's treatment is revealed in Britain
2010-02-11, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2010/02/10/AR20100210019...

The British government [has] disclosed once-secret details of the United States' harsh treatment of a former Guantanamo Bay detainee after losing a lengthy legal battle to suppress the information. According to the information, from a judge's summary of a classified CIA report to British authorities, Binyam Mohamed was subjected to "cruel, inhuman and degrading" treatment during interrogations in Pakistan in 2002, including being shackled and deprived of sleep while interrogators played upon "his fears of being removed from United States custody and 'disappearing.' " Mohamed, 31, was born in Ethiopia and lives in Britain. Arrested in Pakistan in 2002, he says he was tortured by American authorities and others under U.S. instruction there and in Morocco. He says he was beaten with a leather strap, subjected to a mock execution and sliced with a scalpel on his chest and penis. Mohamed says Britain knew about his treatment because information used during his questioning could have come only from British intelligence. He spent seven years in detention, four of them at the U.S. military prison at Guantanamo Bay, Cuba. Reprieve, a legal organization representing Mohamed in a lawsuit against the British government, said in a statement that the disclosures show that "the U.S. documented their efforts to abuse Mr. Mohamed" and that British authorities "knew he was being abused and did nothing about it."

Note: For lots more from reliable sources on the illegal actions undertaken by the US and UK in the prosecution of the fraudulent "war on terror," click here.


2 Ex-Workers Accuse Blackwater Security Company of Defrauding the U.S. for Years
2010-02-11, New York Times
http://www.nytimes.com/2010/02/11/us/11suit.html

Two former employees of Blackwater Worldwide have accused the private security company of defrauding the government for years by filing bogus receipts, double billing for the same services and charging government agencies for strippers and prostitutes, according to court documents unsealed this week. In a December 2008 lawsuit, the former employees said top Blackwater officials had engaged in a pattern of deception as they carried out government contracts in Iraq and Afghanistan, and in Louisiana in the aftermath of Hurricane Katrina. The lawsuit, filed under the False Claims Act, also asserts that Blackwater officials turned a blind eye to “excessive and unjustified” force against Iraqi civilians by several Blackwater guards. Blackwater has earned billions of dollars from government agencies in the years since the Sept. 11 attacks, when the company won contracts to protect American diplomats in Iraq and Afghanistan. The former employees who filed the lawsuit, a married couple named Brad and Melan Davis, said there was little financial oversight of the money. The documents detailing the Davises’ accusations were unsealed after the Justice Department declined to join in the case against Blackwater, which last year changed its name to Xe Services.

Note: For lots more on corporate fraud and war profiteering from reliable sources, click here.


License to Kill? Intelligence Chief Says U.S. Can Take Out American Terrorists
2010-02-03, ABC News
http://abcnews.go.com/Politics/license-kill-intelligence-chief-us-american-te...

The director of national intelligence affirmed rather bluntly today that the U.S. intelligence community has authority to target American citizens for assassination if they present a direct terrorist threat to the United States. "We take direct actions against terrorists in the intelligence community; if we think that direct action will involve killing an American, we get specific permission to do that," Director of National Intelligence Dennis Blair told the House Intelligence Committee. "Whether that American is involved in a group that is trying to attack us, whether that American ... is a threat to other Americans. Those are the factors involved." Blair explained. According to U.S. officials, only a handful of Americans would be eligible for targeting by U.S. intelligence or military operations. The DNI said that Internet and social media sites have become critical to terrorism recruitment efforts. "The homegrown radicalization of people in the United States is a relatively new thing." Blair said U.S. intelligence was rapidly working to counter the emerging problem.

Note: To read a valuable commentary on Director of National Intelligence Dennis Blair's claimed "war exception" to the Constitution, permitting assassination of American citizens by the US military and intelligence services without judicial review or legal process of any kind, click here. For the views of several legal experts, click here.


U.S. citizen in CIA's cross hairs
2010-01-31, Los Angeles Times
http://articles.latimes.com/2010/jan/31/world/la-fg-cia-awlaki31-2010jan31

The CIA sequence for a Predator strike ends with a missile but begins with a memo. Usually no more than two or three pages long, it bears the name of a suspected terrorist, the latest intelligence on his activities, and a case for why he should be added to a list of people the agency is trying to kill. No U.S. citizen has ever been on the CIA's target list. But that is expected to change as CIA analysts compile a case against a Muslim cleric who was born in New Mexico but now resides in Yemen. He is a U.S. citizen and until recently was mainly known as a preacher espousing radical Islamic views. Awlaki's status as a U.S. citizen requires special consideration, according to former officials familiar with the criteria for the CIA's targeted killing program. But while Awlaki has not yet been placed on the CIA list, the officials said it is all but certain that he will be. The CIA has carried out Predator attacks in Yemen since at least 2002, when a drone strike killed six suspected Al Qaeda operatives traveling in a vehicle across desert terrain. The agency knew that one of the operatives was an American, Kamal Derwish, who was among those killed. Derwish was never on the CIA's target list, officials said, and the strike was aimed at a senior Al Qaeda operative.

Note: As the last few sentences of this long report indicate, assassination of their own citizens by US military and intelligence agencies has been going on for years. For many key reports from reliable sources on assassination as state policy, click here.


Terror suspect allowed to keep visa by intelligence officials
2010-01-27, Detroit News
http://detnews.com/article/20100127/NATION/1270405/Terror-suspect-kept-visa-t...

The State Department didn't revoke the visa of foiled terrorism suspect Umar Farouk Abdulmutallab because federal counterterrorism officials had begged off revocation, a top State Department official revealed. Patrick F. Kennedy, an undersecretary for management at the State Department, said Abdulmutallab's visa wasn't taken away because intelligence officials asked his agency not to deny a visa to the suspected terrorist. "Revocation action would have disclosed what they were doing," Kennedy said in testimony before the House Committee on Homeland Security. Since the failed attack, criticism has swirled around leaders of the U.S. intelligence community who have indicated they were warned by the suspect's father about a month before the flight of a potential terror threat, but failed to stop Abdmutallab, despite other warning signs like the fact that he purchased a one-way ticket to Detroit with cash.

Note: So federal counterterrorism officials stopped the bomber's visa from being revoked. Hmmmm... Clearly there is more going on in this case than "failure to connect the dots." Why aren't other major media reporting this important story? Kurt Haskell, a key eyewitness passenger who almost lost his life, has written a powerfully revealing blog piece on what he thinks is really going on, available here. For more on this key case, click here.


U.S. military teams, intelligence deeply involved in aiding Yemen on strikes
2010-01-27, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2010/01/26/AR20100126042...

U.S. military teams and intelligence agencies are deeply involved in secret joint operations with Yemeni troops who in the past six weeks have killed scores of people. The operations, approved by President Obama, involve several dozen troops from the U.S. military's clandestine Joint Special Operations Command (JSOC), whose main mission is tracking and killing [targeted persons]. Obama approved a Dec. 24 strike against a compound where a U.S. citizen, Anwar al-Aulaqi, was thought to be. He has since been added to a shortlist of U.S. citizens specifically targeted for killing or capture by the JSOC. The combined efforts have resulted in more than two dozen ground raids and airstrikes. After the Sept. 11 attacks, Bush gave the CIA, and later the military, authority to kill U.S. citizens abroad. The Obama administration has adopted the same stance. Both the CIA and the JSOC maintain lists of individuals, called "High Value Targets" and "High Value Individuals," whom they seek to kill or capture. The JSOC list includes three Americans, including Aulaqi, whose name was added late last year. As of several months ago, the CIA list [also] included three U.S. citizens.

Note: For many reports from reliable sources on the growing governmental threats to civil liberties, click here.


SEC mulled national security status for AIG details
2010-01-24, CNN Money/Reuters
http://money.cnn.com/news/newsfeeds/articles/reuters/MTFH21979_2010-01-24_19-...

U.S. securities regulators [at the Securities and Exchange Commission] originally treated the New York Federal Reserve's bid to keep secret many of the details of the American International Group bailout like a request to protect matters of national security. The SEC ... agreed to limit the number of SEC employees who would review the document to just two and keep the document locked in a safe while the SEC considered AIG's confidentiality request. The SEC had also agreed that if it determined the document should not be made public, it would be stored "in a special area where national security related files are kept." Emails ... that have become public in recent weeks reveal that some at the New York Fed had gone to great lengths to keep the terms of the bailout private and the SEC may have played a role in contributing to some of the secrecy surrounding the AIG rescue package. "The New York Fed was orchestrating what can only be characterized as an extreme effort to ensure that details of the counterparty deal stayed secret," Rep. Darrell Issa ... said. "More and more it looks as if they would've kept the details of the deal secret indefinitely, it they could have."

Note: So now bank transactions are being considered a matter of "national security." What next? It's becoming ever more apparent that "national security" is used as a catch-all phrase for information that those in power don't want us to know about their secret dealings which benefit themselves at the expense of most of the rest of us.


The Anthrax Attacks Remain Unsolved
2010-01-24, Wall Street Journal
http://online.wsj.com/article/SB10001424052748704541004575011421223515284.html

The investigation of the 2001 anthrax attacks ended as far as the public knew on July 29, 2008, with the death of Bruce Ivins, a senior biodefense researcher at the U.S. Army Medical Research Institute of Infectious Diseases in Fort Detrick, Md. Less than a week after his apparent suicide, the FBI declared Ivins to have been the sole perpetrator of the 2001 Anthrax attacks. The FBI [had] turned the pressure up on him, isolating him at work and forcing him to spend what little money he had on lawyers to defend himself. He became increasingly stressed. Then came his suicide (which, as Eric Nadler and Bob Coen show in their documentary "The Anthrax War," was one of four suicides among American and British biowarfare researchers in past years). But there was still a vexing problem. Silicon was used in the 1960s to weaponize anthrax. Anthrax spores were coated with the substance to prevent them from clinging together so as to create a lethal aerosol. But since weaponization was banned by international treaties, research anthrax no longer contains silicon, and the [anthrax] at Fort Detrick contained none. Ivins, no matter how weird he may have been, had neither the set of skills nor the means to attach silicon to anthrax spores. If Ivins had neither the equipment or skills to weaponize anthrax with silicon, then some other party with access to the anthrax must have done it.

Note: As usual, the FBI tries to pin it on one wacko, when it is clear others most have been involved. Remember that the anthrax attacks occurred as Congress was considering the PATRIOT Act, and were directed in part at key senators opposed to the act. Congress was shut down for a period, and when it reconvened it passed the bill without discussion. For lots more on the antrax attacks as a likely false-flag operation, click here.


FBI broke law for years in phone record searches
2010-01-19, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2010/01/18/AR20100118039...

The FBI illegally collected more than 2,000 U.S. telephone call records between 2002 and 2006 by invoking terrorism emergencies that did not exist or simply persuading phone companies to provide records, according to internal bureau memos and interviews. FBI officials issued approvals after the fact to justify their actions. E-mails obtained by The Washington Post detail how counterterrorism officials inside FBI headquarters did not follow their own procedures that were put in place to protect civil liberties. A Justice Department inspector general's report due out this month is expected to conclude that the FBI frequently violated the law with its emergency requests. FBI officials said they thought that nearly all of the requests involved terrorism investigations. FBI general counsel Valerie Caproni said ... that the FBI technically violated the Electronic Communications Privacy Act when agents invoked nonexistent emergencies to collect records.

Note: The FBI, by admitting that "nearly all" of the phone records they obtained were related to "terrorism investigations," make it clear that some were not. But they used claims of "terrorism emergency" to obtain them. These they then assert were merely "technical" violations. For many disturbing reports from major media sources on the increasing threats to civil liberties under the pretext of the "war on terrorism," click here.


Meet Mikey, 8: U.S. Has Him on Watch List
2010-01-14, New York Times
http://www.nytimes.com/2010/01/14/nyregion/14watchlist.html

The Transportation Security Administration ... has on its web site a “mythbuster” that tries to reassure the public. Myth: The No-Fly list includes an 8-year-old boy. Buster: No 8-year-old is on a T.S.A. watch list. “Meet Mikey Hicks,” said Najlah Feanny Hicks, introducing her 8-year-old son, a New Jersey Cub Scout and frequent traveler who has seldom boarded a plane without a hassle because he shares the name of a suspicious person. “It’s not a myth.” Hicks’s mother initially sensed trouble when he was a baby and she could not get a seat for him on their flight to Florida at an airport kiosk; airline officials explained that his name “was on the list,” she recalled. The first time he was patted down, at Newark Liberty International Airport, Mikey was 2. He cried. After years of long delays and waits for supervisors at every airport ticket counter, this year’s vacation to the Bahamas badly shook up the family. Mikey was frisked on the way there, then more aggressively on the way home. “Up your arms, down your arms, up your crotch — someone is patting your 8-year-old down like he’s a criminal,” Mrs. Hicks recounted. It is true that Mikey is not on the federal government’s “no-fly” list, which includes about 2,500 people, less than 10 percent of them from the United States. But his name appears to be among some 13,500 on the larger “selectee” list, which sets off a high level of security screening.

Note: For many reports from major media sources on the extreme loss of liberties brought about by the highly touted "war on terrorism," click here.


C.I.A. Is Sharing Data With Climate Scientists
2010-01-05, New York Times
http://www.nytimes.com/2010/01/05/science/earth/05satellite.html

The nation’s top scientists and spies are collaborating on an effort to use the federal government’s intelligence assets — including spy satellites and other classified sensors — to assess the hidden complexities of environmental change. The collaboration ... has the strong backing of the director of the Central Intelligence Agency. Secrecy cloaks the monitoring effort ... because the United States wants to keep foes and potential enemies in the dark about the abilities of its spy satellites and other sensors. Controversy has often dogged the use of federal intelligence gear for environmental monitoring. About 60 scientists — mainly from academia but including some from industry and federal agencies — run the effort’s scientific side. All have secret clearances. The C.I.A. runs the program and arranges for the scientists to draw on federal surveillance equipment, including highly classified satellites of the National Reconnaissance Office. Officials said the effort to restart the program originated on Capitol Hill in 2008 after former Vice President Al Gore argued for its importance with Senator Dianne Feinstein, Democrat of California, who was then a member of the Senate Intelligence Committee; she became its chairwoman in early 2009.

Note: What happens to the public perception of science if research relies increasingly on secret data and collaboration with spy agencies? How could the results of important studies be verified by independent researchers? For lots more on the ever-expanding world of government secrecy, click here.


A Torture Timeline
2010-01-01, Newsweek
http://photo.newsweek.com/2009/4/photos-a-timeline-of-torture/_jcr_content.html

In 2009, the Justice Department began to release reports and top-secret memos detailing interrogation techniques ... used by CIA officers against suspected terror operatives. The list of brutal techniques, including holding prisoners in small boxes, staging mock executions, and water torture, is reminiscent of some of the worst human-rights abuses on record. In medieval Europe, torture was more than just a means of punishment. Many criminal trials of the era consisted of one or more 'ordeals,' painful tests designed to prove guilt or innocence through supernatural judgment. During waterboarding, a technique first used in the 14th century, torturers begin by pumping water directly into a victim's stomach or slowly flooding his throat with liquid. Used extensively during the Spanish Inquisition, the practice became less publicly acceptable during the Enlightenment, then experienced an underground resurgence in the 19th century. Since World War II, different forms of waterboarding have been employed by governments in Japan, Cambodia, the United Kingdom and the United States, among others. In addition to performing forced labor, prisoners at Nazi concentration camps became subjects in some of the cruelest medical experiments ever performed. They were often held at extreme altitudes and temperatures to help develop new survival strategies or exposed to deadly gases and diseases in order to test vaccines. Many of these tests, directed by the infamous Josef Mengele at Auschwitz, advanced Nazi ideology by establishing 'Jewish racial inferiority.'

Note: The above link leads to a revealing 12-part slide show on the history of torture. For more disturbing information on how Nazi torture techniques were eventually used by the CIA for mind control, click here.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"