Intelligence Agency Corruption Media ArticlesExcerpts of Key Intelligence Agency Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
It was 1968, and Frank Rochelle was 20 years old and fresh out of Army boot camp when he saw notices posted around his base in Virginia asking for volunteers to test uniforms and equipment. That might be a good break after the harsh weeks of boot camp, he thought, and signed up. Instead of equipment testing, though, the Onslow county, North Carolina, native found himself in a bizarre, CIA-funded drug testing and mind-control programme, according to a lawsuit that he and five other veterans and Vietnam Veterans of America filed last week. The suit was filed in federal court in San Francisco against the US department of defence and the CIA. The plaintiffs seek to force the government to contact all the subjects of the experiments and give them proper healthcare. In 2003 the US department of veterans affairs released a pamphlet that said nearly 7,000 soldiers had been involved and more than 250 chemicals used on them, including hallucinogens such as LSD and PCP as well as biological and chemical agents. Lasting from 1950 to 1975, the experiments took place at Edgewood Arsenal in Maryland. According to the lawsuit, some of the volunteers were even implanted with electrical devices in an effort to control their behaviour. Rochelle, 60, [said] there were about two dozen volunteers when he was taken to Edgewood. Once there, they were asked to volunteer a second time, for drug testing. They were told that the experiments were harmless.
Note: For a powerful summary of the decades-long mind control experiment program conducted by the CIA and other US government agencies, click here.
The Maryland State Police surveillance of advocacy groups was far more extensive than previously acknowledged, with records showing that troopers monitored -- and labeled as terrorists -- activists devoted to such wide-ranging causes as promoting human rights and establishing bike lanes. Intelligence officers created a voluminous file on Norfolk-based People for the Ethical Treatment of Animals, calling the group a "security threat" because of concerns that members would disrupt the circus. Angry consumers fighting a 72 percent electricity rate increase in 2006 were targeted. The DC Anti-War Network, which opposes the Iraq war, was designated a white supremacist group, without explanation. One of the possible "crimes" in the file police opened on Amnesty International, a world-renowned human rights group: "civil rights." The [surveillance] ... confirmed the fears of civil liberties groups that have warned about domestic spying since the Sept. 11, 2001, attacks. "No one was thinking this was al-Qaeda," said Stephen H. Sachs, a former U.S. attorney and state attorney general appointed by Gov. Martin O'Malley (D) to review the case. "But 9/11 created an atmosphere where cutting corners was easier." Maryland has not been alone. The FBI and police departments in several cities, including Denver in 2002 and New York before the 2004 Republican National Convention, also responded to [dissent] by spying on activists.
Note: For wide coverage from reliable sources of disturbing threats to civil liberties, click here.
The National Security Agency (NSA) is developing a tool that George Orwell's Thought Police might have found useful: an artificial intelligence system designed to gain insight into what people are thinking. The device will be able to respond almost instantaneously to complex questions posed by intelligence analysts. As more and more data is collectedthrough phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records - it may one day be possible to know not just where people are and what they are doing, but what and how they think. The system is so potentially intrusive that at least one researcher has quit, citing concerns over the dangers in placing such a powerful weapon in the hands of a top-secret agency with little accountability. Known as Aquaint, which stands for "Advanced QUestion Answering for INTelligence," the project was run for many years by John Prange, an NSA scientist at the Advanced Research and Development Activity. A supersmart search engine, capable of answering complex questions ... would be very useful for the public. But that same capability in the hands of an agency like the NSA - absolutely secret, often above the law, resistant to oversight, and with access to petabytes of private information about Americans - could be a privacy and civil liberties nightmare. "We must not forget that the ultimate goal is to transfer research results into operational use," said ... Prange.
Note: Watch a highly revealing PBS Nova documentary providing virtual proof that the NSA could have stopped 9/11 but chose not to. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Vice President Dick Cheney said Monday that he was directly involved in approving severe interrogation methods used by the CIA, and that the prison at Guantanamo Bay, Cuba, should remain open indefinitely. Cheney's comments ... mark the first time that he has acknowledged playing a central role in clearing the CIA's use of an array of controversial interrogation tactics, including a ... method known as waterboarding. "I was aware of the program, certainly, and involved in helping get the process cleared," Cheney said in an interview with ABC News. Asked whether he still believes it was appropriate to use the waterboarding method on terrorism suspects, Cheney said: "I do." His comments come on the heels of disclosures by a Senate committee showing that high-level officials in the Bush administration were intimately involved in reviewing and approving interrogation methods that have since been explicitly outlawed and that have been condemned internationally as torture. Soon after the Sept. 11 attacks, Cheney said, the CIA "in effect came in and wanted to know what they could and couldn't do. And they talked to me, as well as others, to explain what they wanted to do. And I supported it." Waterboarding involves strapping a prisoner to a tilted surface, covering his face with a towel and dousing it to simulate the sensation of drowning. CIA Director Michael V. Hayden has said that the agency used the technique on three Al Qaeda suspects in 2002 and 2003. Cheney has long defended the technique. But he has not previously disclosed his role in pushing to give the CIA such authority.
Note: For lots more from major media sources on US torture and other war crimes committed in the Iraq and Afghan wars, click here.
With the help of CIA spotters, the Peruvian air force shot down 15 small civilian aircraft suspected of carrying drugs, in many cases without warning and within two to three minutes of being sighted, a U.S. lawmaker said Thursday. It was the first public disclosure of the number of planes shot down between 1995 and 2001 as part of the Airbridge Denial Program, a CIA counternarcotics effort that killed an innocent American missionary, Veronica Bowers, and her infant daughter in 2001. Michigan Rep. Pete Hoekstra, senior Republican on the Intelligence Committee of the House of Representatives, told The Associated Press most of the 15 planes shot down with the help of the CIA crashed in the jungle. The wreckage has not been or could not be examined to ascertain whether narcotics were aboard the aircraft. "The Bowers could have gone in the same category if they had crashed in the jungle," Hoekstra said, speaking of the missionary family from Hoekstra's state, Michigan. The Bowers' plane made an emergency river landing after it was hit. Excerpts from a CIA inspector general's report released in November raised questions about whether the missionaries' plane was the only craft mistakenly suspected of drug smuggling. The CIA report said that in most of the shootdowns, pilots fired on aircraft "without being properly identified, without being given the required warnings to land, and without being given time to respond to such warnings as were given to land."
Note: For many key reports from major media sources on government corruption, click here.
To friends in the protest movement, Lucy was an eager 20-something who attended their events and sent encouraging e-mails to support their causes. Only one thing seemed strange. "At one demonstration, I remember her showing up with a laptop computer and typing away," said Mike Stark, who helped lead the anti-death-penalty march in Baltimore that day. "We all thought that was odd." Not really. The woman was an undercover Maryland State Police trooper who between 2005 and 2007 infiltrated more than two dozen rallies and meetings of nonviolent groups. Maryland officials now concede that, based on information gathered by "Lucy" and others, state police wrongly listed at least 53 Americans as terrorists in a criminal intelligence database -- and shared some information about them with half a dozen state and federal agencies, including the National Security Agency. Among those labeled as terrorists: two Catholic nuns, a former Democratic congressional candidate, a lifelong pacifist and a registered lobbyist. One suspect's file warned that she was "involved in puppet making and allows anarchists to utilize her property for meetings." "There wasn't a scintilla of illegal activity" going on, said David Rocah, an attorney for the American Civil Liberties Union, which filed a lawsuit and in July obtained the first surveillance files. State police have released other heavily redacted documents. Investigators, the files show, targeted groups that advocated against abortion, global warming, nuclear arms, military recruiting in high schools and biodefense research, among other issues.
Note: For lots more on increasing threats to civil liberties, click here.
I should have felt triumphant when I returned from Iraq in August 2006. Instead, I was worried and exhausted. My mind was consumed with the unfinished business of our mission: fixing the deeply flawed, ineffective and un-American way the U.S. military conducts interrogations in Iraq. I'm still alarmed about that today. I'm not some ivory-tower type; I served for 14 years in the U.S. Air Force, began my career as a Special Operations pilot flying helicopters, saw combat in Bosnia and Kosovo, became an Air Force counterintelligence agent, then volunteered to go to Iraq to work as a senior interrogator. What I saw in Iraq still rattles me -- both because it betrays our traditions and because it just doesn't work. What I soon discovered about our methods astonished me. The Army was still conducting interrogations according to the Guantanamo Bay model: Interrogators were nominally using the methods outlined in the U.S. Army Field Manual, the interrogators' bible, but they were pushing in every way possible to bend the rules -- and often break them.These interrogations were based on fear and control; they often resulted in torture and abuse. I refused to participate in such practices, and a month later, I extended that prohibition to the team of interrogators I was assigned to lead. I personally conducted more than 300 interrogations, and I supervised more than 1,000. The methods my team used are not classified ... but the way we used them was, I like to think, unique. We got to know our enemies, we learned to negotiate with them, and we adapted criminal investigative techniques to our work.
Note: For revealing reports from reliable and verifiable sources on the realities of the Iraq and Afghan wars, click here.
Imagine someone watching your every move, hearing everything you say and knowing where you are at every moment. If you have a cell phone, it could happen to you. After four months of harassing phone calls, Courtney Kuykendall was afraid to answer her cell phone. The Tacoma, Washington, teenager was receiving graphic, violent threats at all hours. And when she and her family changed their cell phone numbers and got new phones, the calls continued. Using deep scratchy voices, anonymous stalkers literally took control of the Kuykendall's cell phones, repeatedly threatened Courtney with murder and rape, and began following the family's every move. "They're listening to us and recording us," Courtney's mother, Heather Kuykendall, told NBC's Today Show. "We know that because they will record us and play it back as a voicemail." How is something like this possible? Just take a look on the internet. That's where you'll find the latest spy technology for cell phones. Spyware marketers claim you can tap into someone's calls, read their text messages and track their movements "anywhere, anytime." Security experts say it's no internet hoax."It's real, and it is pretty creepy," said Rick Mislan, a former military intelligence officer who now teaches cyber forensics at Purdue University's Department of Computer and Information Technology. Mislan has examined thousands of cell phones inside Purdue's Cyber Forensics Lab, and he says spy software can now make even the most high-tech cell phone vulnerable. "I think a lot of people think their cell phone calls are very secure but our privacy isn't always what we think it is."
Note: For lots more on increasing corporate and governmental threats to privacy, click here.
President-elect Barack Obama is unlikely to radically overhaul controversial Bush administration intelligence policies, advisers say, an approach that is almost certain to create tension within the Democratic Party. Mr. Obama is being advised largely by a group of intelligence professionals ... who have supported Republicans. The intelligence-transition team is led by former National Counterterrorism Center chief John Brennan and former CIA intelligence-analysis director Jami Miscik, say officials close to the matter. Mr. Brennan is viewed as a potential candidate for a top intelligence post. Ms. Miscik left amid a slew of departures from the CIA under then-Director Porter Goss. Mr. Brennan is a leading contender for one of the two jobs, say some advisers. He declined to comment. Gen. James L. Jones, a former North Atlantic Treaty Organization commander; Thomas Fingar, the chief of analysis for the intelligence director; Joan A. Dempsey, who served in top intelligence and Pentagon posts; former Rep. Tim Roemer of Indiana, who served on the 9/11 Commission; and [Rep. Jane] Harman have also been mentioned. Ms. Harman has also been cited as a potential secretary of homeland security.
Note: According to the New York Times, John O. Brennan, president-elect Obama's intelligence-transition leader and a top candidate for director of national intelligence or the CIA in the Obama administration, "[was] a senior adviser to [CIA Director George] Tenet in 2002 [and] was present at the creation of the C.I.A.’s controversial detention and interrogation program." Jane Harman has been the principal Congressional proponent of the Violent Radicalization and Homegrown Terrorism Prevention Act, with its McCarthyesque provisions for criminalizing political thought. For more on increasing threats to civil liberties from reliable sources, click here.
Internet "black boxes" will be used to collect every email and web visit in the UK under the Government's plans for a giant "big brother" database, The Independent has learnt. Home Office officials have told senior figures from the internet and telecommunications industries that the "black box" technology could automatically retain and store raw data from the web before transferring it to a giant central database controlled by the Government. Plans to create a database holding information about every phone call, email and internet visit made in the UK have provoked a huge public outcry. Richard Thomas, the Information Commissioner, described it as "step too far" and the Government's own terrorism watchdog said that as a "raw idea" it was "awful". News that the Government is already preparing the ground by trying to allay the concerns of the internet industry is bound to raise suspicions about ministers' true intentions. Further details of the database emerged on Monday at a meeting of internet service providers (ISPs) in London where representatives from BT, AOL Europe, O2 and BSkyB were given a PowerPoint presentation of the issues and the technology surrounding the Government's Interception Modernisation Programme (IMP), the name given by the Home Office to the database proposal. "It was clear the 'back box' is the technology the Government will use to hold all the data. But what isn't clear is what the Home Secretary, GCHQ and the security services intend to do with all this information in the future," said a source close to the meeting.
Note: For lots more on threats to privacy from reliable sources, click here.
Interpol is planning to expand its role into the mass screening of passengers moving around the world by creating a face recognition database. Every year more than 800 million international travellers fail to undergo "the most basic scrutiny" to check whether their identity documents have been stolen, the global policing cooperation body has warned. Senior figures want a system that lets immigration officials capture digital images of passengers and immediately cross-check them against a database of pictures of [alleged] terror suspects, international criminals and fugitives. The UK's first automated face recognition gates -- matching passengers to their digital image in the latest generation of passports -- began operating at Manchester airport in August. Mark Branchflower, head of Interpol's fingerprint unit, will this week unveil proposals in London for the creation of biometric identification systems that could be linked to such immigration checks. The civil liberties group No2ID, which campaigns against identity cards, expressed alarm at the plans. "This is a move away from seeking specific persons to GCHQ-style bulk interception of information," warned spokesman Michael Parker. "This is the next step. Law enforcement agencies want the most efficient systems but there has to be a balance between security and privacy."
Note: For many disturbing reports on increasing threats to privacy, click here.
The Federal Bureau of Investigation is struggling to find enough agents and resources to investigate criminal wrongdoing tied to the country’s economic crisis, according to current and former bureau officials. The bureau slashed its criminal investigative work force to expand its national security role after the Sept. 11 attacks, shifting more than 1,800 agents, or nearly one-third of all agents in criminal programs, to terrorism and intelligence duties. The cutbacks have left the bureau seriously exposed in investigating areas like white-collar crime, which has taken on urgent importance in recent weeks because of the nation’s economic woes. So depleted are the ranks of the F.B.I.’s white-collar investigators that executives in the private sector say they have had difficulty attracting the bureau’s attention in cases involving possible frauds of millions of dollars. Since 2004, F.B.I. officials have warned that mortgage fraud posed a looming threat, and the bureau has repeatedly asked the Bush administration for more money to replenish the ranks of agents handling nonterrorism investigations. But each year, the requests have been denied, with no new agents approved for financial crimes, as policy makers focused on counterterrorism. According to previously undisclosed internal F.B.I. data, the cutbacks have been particularly severe in staffing for investigations into white-collar crimes like mortgage fraud, with a loss of 625 agents, or 36 percent of its 2001 levels.
Note: How fortunate for the financial fraudsters that the FBI doesn't have the resources to investigate them! Was it just a coincidence that first the "war on terror" and then the Wall Street bailout both have resulted in trillions of dollars going to a few well-positioned corporations? For more on government corruption from reliable sources, click here.
By exploring the current, post-9/11 operations of the NSA [National Security Agency, James] Bamford ... goes where congressional oversight committees and investigative journalists still struggle to go. [When] the Bush administration declared its ... global war on terror, Congress agreed to most of the White House's demands. According to Bamford, the NSA's expanded powers and resources enabled it to collect communications both inside and outside the United States. He quotes a former NSA employee as a witness to the agency's spying on the conversations of Americans who have no connection to terrorism. After suing the NSA for documents, [Bamford] obtained considerable evidence that telecommunication companies (with the notable exception of Qwest) knowingly violated U.S. law by cooperating with the NSA to tap fiber optic lines. In impressive detail, The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America tells how private contractors, including some little-known entities with foreign owners, have done the sensitive work of storing and processing the voices and written data of Americans and non-Americans alike. In the book, he offers new revelations about the National Security Agency's counterterrorism tactics, including its controversial domestic surveillance programs. Bamford warns of worse to come: 'There is now the capacity to make tyranny total in America. Only law ensures that we never fall into that abyss -- the abyss from which there is no return.'"
Note: Bamford is the author of two other books on the NSA: Body of Secrets and The Puzzle Palace.
Hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant National Security Agency (NSA) center in Fort Gordon, Georgia. "These were just really everyday, average, ordinary Americans who happened to be in the Middle East, in our area of intercept and happened to be making these phone calls on satellite phones," said Adrienne Kinne, a 31-year old US Army Reserves Arab linguist assigned to a special military program at the NSA's Back Hall at Fort Gordon from November 2001 to 2003. She said US military officers, American journalists and American aid workers were routinely intercepted and "collected on" as they called their offices or homes in the United States. Another intercept operator, former Navy Arab linguist, David Murfee Faulk, 39, said he and his fellow intercept operators listened into hundreds of Americans picked up using phones in Baghdad's Green Zone from late 2003 to November 2007. Both former intercept operators came forward at first to speak with investigative journalist [James] Bamford for a book on the NSA, The Shadow Factory, to be published next week. "It's extremely rare," said Bamford, who has written two previous books on the NSA, including the landmark Puzzle Palace which first revealed the existence of the super secret spy agency. "Both of them felt that what they were doing was illegal and improper, and immoral, and it shouldn't be done, and that's what forces whistleblowers."
Note: For many reports from major media sources of disturbing threats to privacy, click here.
US Attorney General Michael Mukasey has signed new guidelines for FBI operations he said are designed to better protect the country from terrorist attacks, but that raise concern of some lawmakers and civil rights groups. The new, revised regulations -- the original version met strong criticism from congressional committees last month -- comprise 50 pages dealing with five areas of FBI investigation, including criminal, national security and foreign intelligence. Despite Mukasey's assurances that the new regulations "reflect consultation with Congress as well as privacy and civil liberties groups," not all concerns over their effect on privacy rights were dispelled. [The] Senate Judiciary Committee chairman, Democrat Patrick Leahy, said the new guidelines expand the FBI's powers of surveillance. "It appears that with these guidelines, the attorney general is once again giving the FBI broad new powers to conduct surveillance and use other intrusive investigative techniques on Americans without requiring any indication of wrongdoing or any approval even from FBI supervisors," Leahy said in a statement. "The American people deserve a ... Justice Department that does not sacrifice or endanger their rights and privacy," he added. The American Civil Liberties Union, who had called for an investigation into the first version of the FBI regulations, said the new rules "reduce standards for beginning 'assessments.'" "More troubling still," it added, "the guidelines allow a person's race or ethnic background to be used as a factor in opening an investigation, a move that the ACLU believes may institute a racial profiling as a matter of policy."
Note: For many reports on increasing government surveillance and threats to privacy, click here.
The former No. 3 official at the CIA pleaded guilty Monday to defrauding the government, closing an investigation that linked the nation's preeminent spy service to the corruption scandal involving former Rep. Randy "Duke" Cunningham. In admitting that he abused his rank to steer lucrative contracts to cronies, Kyle Dustin "Dusty" Foggo, the agency's onetime executive director, became one of the highest-ranking officials in CIA history to be convicted of criminal charges. But the deal also involved major concessions from prosecutors, who allowed Foggo to admit guilt to a single fraud charge, wiping out 27 additional counts that included money laundering and conspiracy. Prosecutors indicated that they would recommend he serve no more than 37 months. The revelations of Foggo's crimes surfaced two years ago during one of the most tumultuous periods in recent agency history, and added to the pressure on the Bush administration to remove Porter J. Goss as CIA director in 2006. Goss selected Foggo for the agency's third-ranking position. Foggo had never served as a case officer or an analyst -- the jobs that typically garner the most respect within the CIA. But as a procurement officer at a secret CIA post in Frankfurt, Germany, he was in a position to cultivate contacts with members of Congress and other influential officials who visited during overseas trips to war zones.
Note: Interesting that a guilty plea for one count was exchanged for dismissing numerous other charges of fraud and money laundering. For an excellent analysis of the reasons behind this unusual prosecutorial strategy, click here. Buzzy Krongard, the previous #3 man at the CIA, has been linked to the millions of dollars in suspicious stock option trades made just prior to 9/11 that were never claimed, though this received little media coverage.
Bruce Ivins, the Army scientist accused of masterminding the 2001 anthrax attacks, e-mailed himself last year saying he knew who the killer was, according to court documents unsealed Wednesday. "Yes! Yes! Yes!!!!!!! I finally know who mailed the anthrax letters in the fall of 2001. I've pieced it together!" Ivins wrote in the e-mail dated Sept. 7, 2007, according to an FBI affidavit. "I'm not looking forward to everybody getting dragged through the mud, but at least it will all be over," Ivins allegedly wrote. "Finally! I should have it TOTALLY nailed down within the month. I should have been a private eye!!!!" The e-mail did not say who Ivins thought was the anthrax killer. Ivins committed suicide in July as prosecutors prepared to charge him in the mailings that killed five people and sickened 17 others. The e-mail was signed "bruce" and sent from an America Online address by the name of "KingBadger7." Authorities said it was one of at least six e-mail addresses registered to Ivins. The FBI affidavit was included in the final batch of court documents to be released by the government that shows how prosecutors built their case against Ivins. Ivins' lawyer, Paul Kemp, has maintained that Ivins was innocent and has predicted the scientist would have been cleared if the case had gone to trial. It was not unusual for Ivins to e-mail himself, according to the FBI document. "In addition, Ivins has sent at least one other e-mail to himself that details his opinion of who may have been the anthrax mailer," the affidavit states.
Note: Isn't it strange that the man the FBI accused of being the anthrax killer would send himself an e-mail saying he knew who the killer was? For many strange deaths of microbiologists that occurred shortly after the anthrax scare, click here.
Baggage searches are SOOOOOO early-21st century. Homeland Security is now testing the next generation of security screening — a body scanner that can read your mind. Most preventive screening looks for explosives or metals that pose a threat. But a new system called MALINTENT turns the old school approach on its head. This Orwellian-sounding machine detects the person — not the device — set to wreak havoc. MALINTENT, the brainchild of the cutting-edge Human Factors division in Homeland Security's directorate for Science and Technology, searches your body for non-verbal cues that predict whether you mean harm to your fellow passengers. It has a series of sensors and imagers that read your body temperature, heart rate and respiration for unconscious [tell-tale signs] invisible to the naked eye. But this is no polygraph test. Subjects do not get hooked up or strapped down for a careful reading; those sensors do all the work without any actual physical contact. It's like an X-ray for bad intentions. When the sensors identify that something is off, they transmit warning data to analysts, who decide whether to flag passengers for further questioning. The next step involves micro-facial scanning, which involves measuring minute muscle movements in the face for clues to mood and intention. Homeland Security has developed a system to recognize, define and measure seven primary emotions and emotional cues that are reflected in contractions of facial muscles. MALINTENT identifies these emotions and relays the information back to a security screener almost in real time.
Note: For many more major-media reports on threats to civil liberties, click here.
Scottish police had information that might have changed the outcome of the Lockerbie bombing trial, a BBC TV programme has learned. The information could have affected the credibility of key evidence, but was not passed to the defence team. Libyan national Abdelbaset ali Mohmed al-Megrahi is serving life for killing 270 people in the 1988 bombing. A prosecution witness had seen a picture linking al-Megrahi to the bombing before he identified him. Al-Megrahi, 56, who maintains he is the victim of a miscarriage of justice, has been granted leave to appeal against his conviction for a second time. Tony Gauci, who picked al-Megrahi out in a line-up, had looked at a magazine photograph of him just four days before he made the identification. BBC TV programme The Conspiracy Files: Lockerbie has now seen documentary evidence that Scottish police knew this was the case. That information should have been passed to the defence, but the disclosure did not take place. There have always been doubts expressed about who was behind the bombing and what was their motivation. In June last year the Scottish Criminal Cases Review Commission (SCCRC), which has been investigating the case, concluded that al-Megrahi could have suffered a miscarriage of justice and recommended that he should be granted a second appeal.
Note: For a revealing documentary showing a major cover-up involving the Lockerbie bombing, click here.
The controversy over a best-selling author's account of forgery and deception in the White House deepened yesterday with a new CIA denial that it helped the Bush administration produce phony documents suggesting past links between al-Qaeda and Saddam Hussein. Author Ron Suskind's book The Way of the World, released earlier this month, contends that the White House learned in early 2003 that the Iraqi president no longer possessed weapons of mass destruction but went to war regardless. Suskind wrote that the information was passed to British and U.S. intelligence officials in secret meetings with Tahir Habbush, Iraq's spy chief at the time. Moreover, in an allegation that implies potentially criminal acts by administration officials, the author wrote that White House officials ordered a forgery to influence public opinion about the war. The book contends that the CIA paid Habbush $5 million and resettled him in Jordan after the war. Then, it says, in late 2003, the White House ordered the CIA to enlist Habbush's help in concocting a fake letter that purported to show that Iraq helped train Mohamed Atta, the [alleged hijacker] in the Sept. 11, 2001, attacks. Such a letter surfaced in Iraq in December 2003, but its authenticity quickly came into question. Suskind ... yesterday continued to stand by his book and accused the CIA and White House of orchestrating a smear campaign. "It's the same old stuff," said Suskind, who said his findings are supported by hours of interviews, some of them taped. "There's not a shred of doubt about any of it."
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.