Intelligence Agency Corruption Media ArticlesExcerpts of Key Intelligence Agency Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
A large number of ex-officers from the FBI, CIA, NSC, and State Department have taken positions at Facebook, Twitter, and Google. The revelation comes amid fears the FBI operated control over Twitter censorship and the Hunter Biden laptop story. The Twitter files have revealed the close relationship with the FBI, how the Bureau regularly demanded accounts and tweets be banned and suspicious contact before the Hunter laptop story was censored. The documents detailed how so many former FBI agents joined Twitter's ranks over the past few years that they created their own private Slack channel. A report by Mint Press' Alan MacLeod identified dozens of Twitter employees, who had previously held positions at the Bureau. He also found that former CIA agents made up some of the top ranks in almost every politically-sensitive department at Meta, the parent company of Facebook, Instagram, and WhatsApp. And in another report, MacLeod detailed the extent to which former CIA agents started working at Google. DailyMail.com has now been able to track down nine former CIA agents who are working, or have worked, at Meta, including Aaron Berman, the senior policy manager for misinformation at the company who had previously written the president's daily briefings. Six others have worked for other intelligence agencies before joining the social media giant, many of whom have posted recently about Facebook's efforts to tamp down on so-called 'covert influence operations.'
Note: Explore a deeper analysis on the ex-CIA agents at Facebook and at Google. Additionally, read how Big Tech censors social media on behalf of corporate and government interests. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Among the intersections between [Lee Harvey] Oswald and the CIA, his time as a young Marine at the Atsugi naval air facility in Japan in 1957 is high among them. Atsugi was a launching pad for U-2 spy flights over the Soviet Union and was also a hub of the CIA's research into psychedelic drugs. "A CIA memo titled 'Truth Drugs in Interrogation' revealed the agency practice of dosing agents who were marked for dangerous overseas missions," wrote author David Talbot in "The Devil's Chessboard." A new document released in full last week relates directly to Oswald's time at Atsugi, revealing details about the CIA's response to testimony from a former agency accountant that the spy service had employed Oswald – who went on to be a gunman in the assassination of President John F. Kennedy in 1963. The CIA's claim to have had no contact with Oswald is undercut by the fact that George de Mohrenschildt, a CIA asset, became close friends with Oswald in the months before the assassination. According to documents found in the newly declassified files, at the same time as his trip, the CIA's Domestic Operations Division ran a search on de Mohrenschildt, "exact reason unknown," according to two documents created by a CIA analyst included in last week's declassification. The covert arm of the division was run at the time by E. Howard Hunt, a black ops specialist who confessed later in life to learning ahead of time of a conspiracy to assassinate Kennedy that involved high-level figures in the CIA.
Note: The CIA's MK-ULTRA program routinely administered drugs to unsuspecting victims. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
President Joe Biden's administration released more than 13,000 records of President John F. Kennedy's assassination Thursday, but it fell short of fully complying with the spirit of a 30-year-old law demanding transparency by now. With Thursday's action, about 98% of all documents related to the 1963 killing have now been released and just 3% of the records remain redacted in whole or in part, according to the National Archives, which controls the John F. Kennedy Assassination Records Collection. The records include more information on accused gunman Lee Harvey Oswald and his time spent in Mexico City. But about 4,300 records remain redacted in part. [CIA agent George] Joannides ... guided and monitored an anti-Fidel Castro group called Directorio Revolucionario Estudiantil (Revolutionary Student Directorate) in 1963 that came into contact with Oswald in New Orleans in the months before the assassination, leading some to speculate about CIA-related complicity in the killing. As Oswald interacted with DRE and became known as an activist who supported President Castro, the Pentagon was formulating a plan called Operation Northwoods to stage a false flag attack in the United States to blame on Cuba and justify a military confrontation to make up for the aborted Bay of Pigs fiasco two years before. The records and the CIA's deceit over Joannides' ties to Oswald spans decades and came to light only after the records act began to unearth information about him.
Note: While the mainstream narrative points to the CIA being complicit in the killing of Kennedy by a Communist lone gunman, there is overwhelming evidence not often talked about, that reveals how Kennedy was murdered by rogue elements within US government agencies as a result of his efforts towards peacemaking strategies over nuclear weapon warfare, among other reasons. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
Trust Lab was founded by a team of well-credentialed Big Tech alumni who came together in 2021 with a mission: Make online content moderation more transparent, accountable, and trustworthy. A year later, the company announced a "strategic partnership" with the CIA's venture capital firm. The quiet October 29 announcement of the partnership is light on details, stating that Trust Lab and In-Q-Tel – which invests in and collaborates with firms it believes will advance the mission of the CIA – will work on "a long-term project that will help identify harmful content and actors in order to safeguard the internet." Key terms like "harmful" and "safeguard" are unexplained, but the press release goes on to say that the company will work toward "pinpointing many types of online harmful content, including toxicity and misinformation." It's difficult to imagine how aligning the startup with the CIA is compatible with [Trust Lab co-founder Tom] Siegel's goal of bringing greater transparency and integrity to internet governance. What would it mean, for instance, to incubate counter-misinformation technology for an agency with a vast history of perpetuating misinformation? Placing the company within the CIA's tech pipeline also raises questions about Trust Lab's view of who or what might be a "harmful" online, a nebulous concept that will no doubt mean something very different to the U.S. intelligence community than it means elsewhere. Trust Lab's murky partnership with In-Q-Tel suggests a step toward greater governmental oversight of online speech.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
The Biden administration took a public stand last year against the abuse of spyware to target human rights activists, dissidents and journalists: It blacklisted the most notorious maker of the hacking tools, the Israeli firm NSO Group. But the global industry for commercial spyware – which allows governments to invade mobile phones and vacuum up data – continues to boom. Even the U.S. government is using it. The Drug Enforcement Administration is secretly deploying spyware from a different Israeli firm, according to five people familiar with the agency's operations, in the first confirmed use of commercial spyware by the federal government. The most sophisticated spyware tools – like NSO's Pegasus – have "zero-click" technology, meaning they can stealthily and remotely extract everything from a target's mobile phone, without the user having to click on a malicious link to give Pegasus remote access. They can also turn the mobile phone into a tracking and secret recording device, allowing the phone to spy on its owner. But hacking tools without zero-click capability, which are considerably cheaper, also have a significant market. Commercial spyware has been used by intelligence services and police forces to hack phones used by drug networks and terrorist groups. But it has also been abused by numerous authoritarian regimes and democracies to spy on political opponents and journalists. This has led governments to a sometimes tortured rationale for their use.
Note: Read about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.
Within ten days [of its release], the first-person military shooter video game [Call of Duty: Modern Warfare II] earned more than $1 billion in revenue. The Call of Duty franchise is an entertainment juggernaut, having sold close to half a billion games since it was launched in 2003. Its publisher, Activision Blizzard, is a giant in the industry. Details gleaned from documents obtained under the Freedom of Information Act reveal that Call of Duty is not a neutral first-person shooter, but a carefully constructed piece of military propaganda, designed to advance the interests of the U.S. national security state. Not only does Activision Blizzard work with the U.S. military to shape its products, but its leadership board is also full of former high state officials. Chief amongst these is Frances Townsend, Activision Blizzard's senior counsel. As the White House's most senior advisor on terrorism and homeland security, Townsend ... became one of the faces of the administration's War on Terror. Activision Blizzard's chief administration officer, Brian Bulatao ... was chief operating officer for the CIA, placing him third in command of the agency. Bulatao went straight from the State Department into the highest echelons of Activision Blizzard, despite no experience in the entertainment industry. [This] raises serious questions around privacy and state control over media. "Call of Duty ... has been flagged up for recreating real events as game missions and manipulating them for geopolitical purposes," [journalist Tom] Secker told MintPress.
Note: The latest US Air Force recruitment tool is a video game that allows players to receive in-game medals and achievements for drone bombing Iraqis and Afghans. For more on this disturbing "military-entertainment complex" trend, explore the work of investigative journalist Tom Secker, who recently produced a documentary, Theaters of War: How the Pentagon and CIA Took Hollywood, and published a new book, Superheroes, Movies and the State: How the U.S. Government Shapes Cinematic Universes.
An offshore company that is trusted by the major web browsers and other tech companies to vouch for the legitimacy of websites has connections to contractors for U.S. intelligence agencies and law enforcement, according to security researchers, documents and interviews. Google's Chrome, Apple's Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to act as what's known as a root certificate authority, a powerful spot in the internet's infrastructure that guarantees websites are not fake, guiding users to them seamlessly. The company's Panamanian registration records show that it has the identical slate of officers, agents and partners as a spyware maker identified this year as an affiliate of Arizona-based Packet Forensics, which ... has sold communication interception services to U.S. government agencies for more than a decade. TrustCor's products include an email service that claims to be end-to-end encrypted, though experts consulted by The Washington Post said they found evidence to undermine that claim. A test version of the email service also included spyware developed by a Panamanian company related to Packet Forensics. A person familiar with Packet Forensics' work confirmed that it had used TrustCor's certificate process and its email service, MsgSafe, to intercept communications and help the U.S. government catch suspected terrorists. The physical address in Toronto given in [TrustCor's] auditor's report, 371 Front St. West, houses a UPS Store mail drop.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.
The Department of Homeland Security launched a failed operation that ensnared hundreds, if not thousands, of U.S. protesters in what new documents show was as a sweeping, power-hungry effort before the 2020 election to bolster President Donald Trump's spurious claims about a "terrorist organization" he accused his Democratic rivals of supporting. An internal investigative report, made public this month by Sen. Ron Wyden ... details the findings of DHS lawyers concerning a previously undisclosed effort by Trump's acting secretary of homeland security, Chad Wolf, to amass secret dossiers on Americans in Portland attending anti-racism protests in summer 2020 sparked by the police murder of ... George Floyd. The report describes attempts by top officials to link protesters to an imaginary terrorist plot in an apparent effort to boost Trump's reelection odds, raising concerns now about the ability of a sitting president to co-opt billions of dollars' worth of domestic intelligence assets for their own political gain. DHS analysts recounted orders to generate evidence of financial ties between protesters in custody; an effort that, had they not failed, would have seemingly served to legitimize President Trump's false claims about "Antifa." The report describes the dossiers generated by DHS as having detailed the past whereabouts and the "friends and followers of the subjects, as well as their ... First Amendment speech activity."
Note: Read about the FBI's use of entrapment to manufacture terrorist plots. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
The United States has fought more than a dozen "secret wars" over the last two decades, according to a new report from the Brennan Center for Justice. Through a combination of ground combat, airstrikes, and operations by U.S. proxy forces, these conflicts have raged from Africa to the Middle East to Asia, often completely unknown to the American people and with minimal congressional oversight. These clandestine conflicts have been enabled by the 2001 Authorization for Use of Military Force, enacted in the wake of the September 11 attacks, as well as the covert action statute, which allows secret, unattributed operations, primarily conducted by the CIA. [The new] analysis is particularly illuminating in the case of Somalia, where the United States developed two key proxy forces, the Danab Brigade and the Puntland Security Force. The CIA began building the Puntland Security Force in 2002 to battle the Al Qaeda-affiliated al-Shabab and later the Islamic State in Somalia, or ISS. The force was transferred to U.S. military control around 2012 and went on to fight alongside U.S. Special Operations forces for a decade. [The Brennan Center's Katherine Yon] Ebright notes that the proxy fighters were "largely independent of the Somali government, despite being an elite armed brigade and one of Somalia's most capable special operations units. And their relationship with U.S. forces was long kept secret, with U.S. officials disavowing the presence of military advisers in Somalia until 2014."
Note: Since 2008, the US has supported at least nine coups in five African countries. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
The Department of Homeland Security is quietly broadening its efforts to curb speech it considers dangerous, an investigation by The Intercept has found. The work, much of which remains unknown to the American public, came into clearer view earlier this year when DHS announced a new "Disinformation Governance Board": a panel designed to police misinformation (false information spread unintentionally), disinformation (false information spread intentionally), and malinformation (factual information shared, typically out of context, with harmful intent) that allegedly threatens U.S. interests. While the board was widely ridiculed, immediately scaled back, and then shut down within a few months, other initiatives are underway as DHS pivots to monitoring social media now that its original mandate – the war on terror – has been wound down. Behind closed doors, and through pressure on private platforms, the U.S. government has used its power to try to shape online discourse. Discussions have ranged from the scale and scope of government intervention in online discourse to the mechanics of streamlining takedown requests for false or intentionally misleading information. There is also a formalized process for government officials to directly flag content on Facebook or Instagram and request that it be throttled or suppressed through a special Facebook portal that requires a government or law enforcement email to use. How disinformation is defined by the government has not been clearly articulated.
Note: The Department of Homeland Security's Disinformation Governance Board has been paused, not stopped. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
A U.S. senator is pressing the FBI for more information after a whistleblower alleged that an internal review found 665 FBI personnel have resigned or retired to avoid accountability in misconduct probes over the past two decades. The whistleblower told the office of Iowa Sen. Chuck Grassley ... that the Justice Department launched the review of the FBI's disciplinary database in 2020 following an Associated Press investigation into sexual misconduct allegations involving at least six senior FBI officials. The follow-up review found 665 FBI employees, including 45 senior-level officials, resigned or retired between 2004 and 2020 following a misconduct probe but before a final disciplinary letter could be issued, according to a letter this week from Grassley to FBI Director Christopher Wray and Attorney General Merrick Garland. It was not clear how many of those cases involved sexual misconduct. Grassley's office, which declined to make the whistleblower or underlying documents available to protect the person's identify, said that was the kind of information it was still seeking but estimated the number could be in the "hundreds." The AP investigation in December 2020 identified at least six sexual misconduct allegations involving senior FBI officials over the prior five years ranging from unwanted touching and advances to coercion. It found that several senior FBI officials have avoided discipline – quietly transferring or retiring with full benefits – even after claims of sexual misconduct against them were substantiated.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and sexual abuse scandals from reliable major media sources.
Harry Truman became President in April, 1945. Two years later, he signed the National Security Act, which established the C.I.A.. It was supposed to do what its name suggested: centralize the intelligence that various agencies gathered. "It was not intended as a â€Cloak and Dagger' Outfit!," Truman later wrote. In its charter, the C.I.A. was banned from domestic spying. There was no mention of covert action in the law that chartered the C.I.A., but Presidents–starting with Truman–began using it that way. One of the agency's first operations involved meddling in the 1948 Italian election. During the Vietnam War, the C.I.A. had discouraging intelligence to offer, and, when successive Administrations didn't want to hear it, focused on being helpful by providing ... supposedly quick fixes. That meant abetting a coup in 1963, spying on antiwar protesters, and launching the Phoenix Program, an anti-Vietcong campaign marked by torture and by arbitrary executions. More than twenty thousand people were killed under Phoenix's auspices. The C.I.A. has had a "defining failure" for every decade of its existence–sometimes more than one. In the nineteen-nineties, it was the lack of foresight about the Soviet Union; in the two-thousands, it was the phantom weapons of mass destruction, followed by torture and, in still evolving ways, by the drone-based program of targeted killings, with its high toll of civilian deaths. It's difficult to know, at this point, what the C.I.A.'s next defining failure ... will be.
Note: Read more about the CIA's Phoenix Program, which included the kidnapping, torture, and murder of civilians during the Vietnam War. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The Dallas-based biotechnology company Colossal Biosciences has a vision: "To see the Woolly Mammoth thunder upon the tundra once again." Founders George Church and Ben Lamm have already racked up an impressive list of high-profile funders and investors, including Peter Thiel, Tony Robbins, Paris Hilton, Winklevoss Capital – and, according to the public portfolio its venture capital arm released this month, the CIA. Colossal says it hopes to use advanced genetic sequencing to resurrect two extinct mammals – not just the giant, ice age mammoth, but also a mid-sized marsupial known as the thylacine, or Tasmanian tiger, that died out less than a century ago. In-Q-Tel, its new investor, is registered as a nonprofit venture capital firm funded by the CIA. On its surface, the group funds technology startups with the potential to safeguard national security. In addition to its long-standing pursuit of intelligence and weapons technologies, the CIA outfit has lately displayed an increased interest in biotechnology and particularly DNA sequencing. "Biotechnology and the broader bioeconomy are critical for humanity to further develop. It is important for all facets of our government to develop them and have an understanding of what is possible," Colossal co-founder Ben Lamm wrote. The embrace of this technology, according to In-Q-Tel's blog post, will help allow U.S. government agencies to read, write, and edit genetic material, and, importantly, to steer global biological phenomena that impact "nation-to-nation competition."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Under a post-9/11 surveillance program known as "Upstream", the NSA is systematically searching Americans' internet communications as they enter and leave the United States. The agency sifts through these streams of data looking for "identifiers" associated with its many thousands of foreign targets – identifiers like email addresses and phone numbers. The NSA does all of this without warrants, without any individual judicial approval, and without showing that any of the people it is surveilling – including countless Americans – have done anything wrong. This surveillance raises serious constitutional concerns, but no court has ever considered a legal challenge to it because the government has claimed that allowing a suit against Upstream surveillance to go forward would implicate "state secrets". In 2007, for example, an appeals court dismissed a lawsuit filed by Khaled El-Masri claiming that, in a case of mistaken identity, he had been kidnapped and tortured by the CIA. The court acknowledged the public evidence of El-Masri's mistreatment but held that state secrets were too central to the case to allow it to go forward. And in 2010, a different appeals court dismissed a lawsuit filed by five individuals who claimed that one of Boeing's subsidiary companies had flown the planes carrying them to the black sites where they were tortured by the CIA. This use of the state secrets privilege – to dismiss cases – departs from the supreme court's narrow framing of the privilege.
Note: For more along these lines, see concise summaries of deeply revealing news articles on court system corruption and the disappearance of privacy from reliable major media sources.
In early 2018, former National Security Agency chief Keith Alexander worked out a deal with Saudi Crown Prince Mohammed bin Salman and the cyber institute led by one of his closest aides, Saud al-Qahtani, to help the Saudi ruler train the next generation of Saudi hackers. The agreement between IronNet, founded by Alexander, and the cyber school ... faced no scrutiny for its association with Qahtani, after the brutal killing of Jamal Khashoggi he reportedly orchestrated just a few months later. Alexander officially inked the deal with the Prince Mohammed bin Salman College of Cyber Security, Artificial Intelligence, and Advanced Technologies – a school set up to train Saudi cyber intelligence agents – at a signing ceremony in Washington, D.C.. Saudi Arabia's agreement with IronNet was part of a host of moves to step up its cyber capabilities, coinciding with a campaign against the kingdom's critics abroad. Khashoggi, then a Washington Post columnist and prominent Salman critic, received a series of threatening messages, including one from Qahtani, warning him to remain silent. Khashoggi, whose family and close associates discovered listening malware electronically implanted on their smartphones, was then lured to the Saudi Embassy in Istanbul. It was there that a team dispatched by Qahtani detained and tortured the Saudi government critic. Qahtani, according to reports, beamed in through Skype to insult Khashoggi during the ordeal. Khashoggi was then dismembered with a bone saw.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Allegations by FBI Special Agent Steve Friend contained in a whistleblower complaint filed late Wednesday with the Department of Justice inspector general reveal a politicized Washington, DC, FBI field office cooking the books to exaggerate the threat of domestic terrorism, and using an "overzealous" January 6 investigation to harass conservative Americans and violate their constitutional rights. Friend, 37, a respected 12-year veteran of the FBI and a SWAT team member, was suspended Monday, stripped of his gun and badge, and escorted out of the FBI field office in Daytona Beach, Fla., after complaining to his supervisors about the violations. He was declared absent without leave last month for refusing to participate in SWAT raids that he believed violated FBI policy and were a use of excessive force against Jan. 6 subjects accused of misdemeanor offenses. "I have an oath to uphold the Constitution," he told supervisors when he asserted his conscientious objection to joining an Aug. 24 raid on a J6 subject. "I have a moral objection and want to be considered a conscientious objector." In his whistleblower complaint to DOJ Inspector General Michael Horowitz ... Friend lays out multiple violations of FBI policy involving J6 investigations in which he was involved. He says he was removed from active investigations into child sexual exploitation and human trafficking to work on J6 cases sent from DC. As a result, he believes his child exploitation investigations were harmed.
Note: Read how Facebook is silencing activity related to this whistleblower. Read also Matt Taibbi's reporting on this important case. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
The Pentagon has ordered a sweeping audit of how it conducts clandestine information warfare after major social media companies identified and took offline fake accounts suspected of being run by the U.S. military in violation of the platforms' rules. The takedowns in recent years by Twitter and Facebook of more than 150 bogus personas and media sites created in the United States was disclosed last month by internet researchers Graphika and the Stanford Internet Observatory. U.S. Central Command is among those whose activities are facing scrutiny. Some [takedowns] involved posts from the summer that advanced anti-Russia narratives. One fake account posted an inflammatory tweet claiming that relatives of deceased Afghan refugees had reported bodies being returned from Iran with missing organs. The tweet linked to a video that was part of an article posted on a U.S.-military affiliated website. In 2020 Facebook disabled fictitious personas created by Centcom to counter disinformation spread by China suggesting the coronavirus responsible for covid-19 was created at a U.S. Army lab in Fort Detrick, Md.. The pseudo profiles ... were used to amplify truthful information from the U.S. Centers for Disease Control and Prevention. Congress in late 2019 passed a law affirming that the military could conduct operations in the "information environment" to defend the United States. The measure, known as Section 1631, allows the military to carry out clandestine psychological operations.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
The British government targeted the American civil rights leader Stokely Carmichael and sought to weaken the Black Power movement with covert disinformation campaigns, recently declassified documents have revealed. The effort was the work of a secret unit known as the Information Research Department, based in London and part of the Foreign Office, which created and distributed literature from fake sources as part of a broader effort to destabilise cold war enemies. The effort against Carmichael, a firebrand orator who travelled to west Africa in part to escape harassment by US law enforcement agencies, aimed to portray the prominent Black Power leader as a foreign interloper in Africa who was contemptuous of the inhabitants of the continent. Based mainly in Guinea from July 1969, the 28-year-old activist had became a vocal advocate of socialist, pan-Africanist ideologies, which worried British officials. The IRD was particularly worried by the movement's potential influence in the Caribbean. In 1969, the IRD also created a new fake group: The Organisation of African Students for African Power. This was supposedly based in East Germany and adopted contemporary radical New Left ideas, "proclaiming a plague on both" the capitalist west and the Soviet bloc. The IRD felt this provided a better platform to "damage opponents" than the dated nationalist approach, while being difficult to trace back to Britain because many similar groups had genuinely sprung up in the late 1960s.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.
The FBI spent years surveilling the "Queen of Soul" Aretha Franklin, trying to gauge how involved she was with the civil rights movement, communism and the Black Power movement, a 270-page document shows. Franklin, who died in 2018, was monitored ahead of several performances and attendances she made for civil rights groups, such as the National Association for the Advancement of Colored People and the Southern Christian Leadership Conference, whose first president was Dr. Martin Luther King, Jr. Informants mentioned Franklin, a Detroit native, in separate memos for possibly appearing at the SCLC's 1967 and 1968 national conventions, in Atlanta and Memphis, respectively. The FBI mailed several copies of "The Atlanta Voice" newspaper, which reported on her visit to town, to FBI offices around the country, as well as the U.S. attorney general and the Secret Service. During this time, Franklin was, in fact, actively involved in the civil rights movement through her music and personal connections. She was identified in a 1969 memo titled "Possible Racial Violence, Urban Areas, Racial Matters" when, in the year before, Denver concertgoers rioted after she refused to perform at the Red Rocks amphitheater due to not being properly paid. In 1971, memos named the Black Panther Party of Los Angeles and the Boston Young Workers Liberation League as organizations who intended to book her for rallies.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.
It's actually a very large universe of people with access to Top Secret data. The Director of National Intelligence publishes what is described as an annual report, "Security Clearance Determinations," although the most recent one I could find was from 2017. In it, more than 2.8 million people are described as having security clearance as of October 2017 – more than 1.6 million have access to either Confidential or Secret information and nearly 1.2 million are described as having access to Top Secret information. There are additional people who have security clearance but don't currently have access to information. This includes civilian employees, contractors and members of the military. Each agency that deals in classification has its own system. Top Secret ... is the highest level of classification. Information is classified as Top Secret if it "reasonably could be expected to cause exceptionally grave damage to the national security," according to a 2009 executive order. A subset of Top Secret documents known as SCI, or sensitive compartmented information, is reserved for certain information derived from intelligence sources. Access to an SCI document can be even further restricted to a smaller group of people with specific security clearances. Information is classified as Secret if the information is deemed to be able to cause "serious damage" to national security if revealed. Confidential is the least sensitive level of classification.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.