Intelligence Agency Corruption Media ArticlesExcerpts of Key Intelligence Agency Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The United States paid over a million euros to the family of Giovanni Lo Porto, an Italian aid worker killed in a U.S. drone strike in January of last year, according to newly released documents. The 37-year-old Lo Porto died when CIA drones struck an al Qaeda compound where he was being held hostage along with Warren Weinstein, an American humanitarian worker. In a rare admission of responsibility, President Barack Obama acknowledged the strike and promised compensation for the families. The Intercept first reported that the family had reached a settlement with the U.S. government in July. The document also states that the agreement does not imply “a waiver of sovereign or personal immunity.” Lawyers for the Lo Porto family had pressed the Italian state prosecutor to consider a criminal case against the United States, while acknowledging that the chances of such a case going forward were slim. They also asked for more information from U.S. agencies about the strike and its aftermath. The U.S. has, in a few instances, paid hundreds of thousands of dollars to the families of civilians killed in attacks in Yemen, but has not publicly acknowledged doing so. Many human rights advocacy groups see a double standard in the silence of the U.S. government on the cases of non-Westerners who have died.
Note: The families of thousands of innocent citizens killed by US drones in the Middle East have received zero compensation. Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
I do my best to resist the thought that prison is a reflection of our society, but the comparisons are unavoidable. From the moment I crossed the threshold from freedom to incarceration because I was charged with, and a jury convicted me of, leaking classified information to a New York Times reporter, I needed no reminder that I was no longer an individual. Prison, with its “one size fits all” structure, is not set up to recognize a person’s worth; the emphasis is removal and categorization. Inmates are not people; we are our offenses. Considering the charges and conviction that brought me here, I’m not exactly sure to which category I belong. No matter. There is an overriding category to which I do belong, and it is this prison reality that I sadly “compare unto the world”: I’m not just an inmate, I’m a black inmate. Here, I am my skin color. Whenever, in my stubborn idealism, I refuse to acknowledge being racially categorized and question the submission to it, the other prisoners invariably respond, “Man, this is prison.” What I see in prison is sad, but what I’m seeing from prison is worse. During my time in the CIA it became clear, in the organization’s words and actions toward me, that they saw me not as an American who wanted to serve his country but as “a big black guy.” There is a black America, there is a white America, there are many Americas. The greatness and promise of this country lies in equality reinforced by our differences. When I am free, I don’t want to feel that I’m merely going from one prison to another.
Note: The above was written by Jeffrey Sterling, a former CIA agent targeted for prosecution as part of the Obama Administration's "crack down on the press and whistle-blowers." Author James Risen tried to help Sterling expose CIA racism, and later wrote an unrelated book exposing some questionable government practices. Sterling was then sent to prison for what Risen wrote. Risen's latest book exposes major government corruption related to the war on terror.
Years before anyone had ever heard of [Edward] Snowden, [Bill] Binney, a gifted cryptologist and mathematician, was pushing back against the NSA’s spying overreach. In October 2001 ... he resigned rather than participate in a clandestine, massively overpriced and questionably legal electronic spying system code-named Trailblazer. Eventually, the government came after him. [Binney] was thrilled by [Oliver] Stone’s powerful biopic of Snowden, who astounded the world with his massive exposure of the NSA’s global spying programs. "I think it will help people understand what is really going on behind the scenes. They are invading the privacy of everyone," he says. "They can turn on your cellphone and listen to you. They can turn on your camera and watch you." In 2013 ... James Clapper, the director of national intelligence, [lied] under oath during a congressional hearing about the NSA’s spying programs. Snowden was watching. He had also seen what had happened to Binney and fellow NSA executives Thomas Drake, Ed Loomis and Kirk Wiebe, whose homes were raided by FBI agents after The New York Times exposed the NSA’s secret spying programs in 2005. Drake, prosecuted under the 1917 Espionage Act, was eventually acquitted ... but his career was ruined. [Snowden's] critics insist he should have pursued his complaints internally, despite the persuasive examples of Binney and his comrades that such resistance is futile, even risky.
Note: Watch a free trailer or rent the whole documentary on this webpage. Read a revealing, detailed New York Times article on Oliver Stone and his profound work to expose corruption and manipulation through film. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
“The United States does not torture,” said George W Bush on 6 September 2006. Bush was, for the first time, acknowledging the existence of the program that Senate intelligence committee staff investigator Daniel Jones would later expose as taking power drills to the heads of captured men; making them stand with their arms stretched above their heads for days at a time; leaving at least one of them naked until he froze to death; waterboarding them to the point of catatonia as bubbles rose from their open mouths; and inserting pureed food into their rectums while claiming it was necessary for delivering nutrients. Details of those procedures were outlined in the 525 pages which CIA director John Brennan, Barack Obama and White House chief of staff Denis McDonough allowed to become public. The CIA’s response to Jones’s report was split into two corps, one official and one not. The agency itself would no longer defend torture outright. The second corps consisted of retired CIA directors, a group known colloquially as the “Formers”. They laid into the Senate committee, [and] savaged it as a Democratic witchhunt. Jones has regrets about the way the declassified report turned out. Most prominently, Jones wishes he had gotten declassified the nearly 100-page table of contents for the full 6,700-page torture report, so readers could understand from the headings and subheadings just what the full contours of the torture was. In May 2016, the CIA inspector general’s office destroyed its only copy of the classified torture report.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Oliver Stone has taken aim at the US government for deceiving people about the levels of surveillance that exist in the country. His new film Snowden, about the controversial NSA informant Edward Snowden, received its world premiere. The drama ... tells of the former CIA employee’s discovery that the agency had constructed a system to spy on the public. “Americans don’t know anything about it because the government lies about it all the time,” Stone said at a press conference. “What’s going on now is pretty shocking. This story not only deals with eavesdropping but mass eavesdropping, drones and cyberwarfare. As Snowden said himself the other day, ‘It’s out of control, the world is out of control.’” The film also features a cameo from Snowden himself, who still resides at an undisclosed location in Russia while he searches for asylum elsewhere. Stone hopes that he may return to US ground but is doubtful. “Obama could pardon him and we hope so,” he said. “But he has vigorously prosecuted eight whistleblowers under the espionage act, which is an all-time record for an American president, and he’s been one of the most efficient managers of this surveillance world. It is the most extensive and invasive surveillance state that has ever existed and he’s built it up.” The film-maker ... likens [the current situation] to a George Orwell novel. “I never thought this could happen,” he said. “But from 2001 on, it’s very clear that something radical has changed. There’s more to it that meets the eye and whatever they tell you, you’ve got to look beyond.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on questionable intelligence agency practices and the disappearance of privacy.
[Daniel] Jones, a counter-terrorism staffer, had become the chief investigator for the Senate intelligence committee, the CIA’s congressional overseer, on its biggest inquiry. For five years, he had been methodically sifting through internal CIA accounts of its infamous torture program. Having read millions of internal emails, cables and accounts of agency torture, Jones had come to believe everything the CIA had told Congress, the Bush and Obama White Houses and the public was a lie. Inside the small room in Virginia the CIA had set up for the Senate investigators, Jones ... slipped crucial printed-out passages of what he called the Panetta Review into [his] bag and secured its lock. Sometime after 1am, Jones walked out, carrying his bag as he always did. The Panetta Review saga would spur a furious CIA to take an extraordinary step: it would spy on its own legislative overseers – especially Jones. The episode would spill out publicly the following March, when top committee Democrat Dianne Feinstein ... accused the CIA on the Senate floor of triggering what she called a constitutional crisis. Both sides requested the justice department pursue a criminal investigation on the other. The bitterness would nearly overshadow a landmark report, a fraction of which was released to the public in December 2014, that documented in chilling detail the depravations CIA inflicted on terrorism suspects after 9/11. The CIA has gone beyond successfully suppressing the report. The agency’s inspector general ... destroyed its copy – allegedly an accident.
Note: For more, see this revealing report. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Over his two terms, Obama has created the most powerful surveillance state the world has ever seen. From 22,300 miles in space, where seven Advanced Orion [spy satellites] now orbit; to a 1-million-square-foot building in the Utah desert that stores data intercepted from personal phones, emails, and social media accounts; to taps along the millions of miles of undersea cables that encircle the Earth like yarn, U.S. surveillance has expanded exponentially since Obama’s inauguration on Jan. 20, 2009. The effort to wire the world ... has cost American taxpayers more than $100 billion. Yet has the president’s blueprint for spying succeeded on its own terms? An examination of the unprecedented architecture reveals that the Obama administration may only have drowned itself in data. Privacy hasn’t been traded for security, but for the government hoarding more data than it knows how to handle. A panel set up by Obama [in 2013] to review the NSA’s operations concluded that the agency had stopped no terrorist attacks. Beyond failures to create security, there is the matter of misuse or abuse of U.S. spying, the effects of which extend well beyond violations of Americans’ constitutional liberties. Obama, meanwhile, has taken virtually no steps to fix what ails his spying apparatus, [but] has gone after people blowing the whistle on intelligence abuses. The Justice Department has charged eight leakers — more than double the number under all previous presidents combined.
Note: The above was written by James Bamford, whistleblower and author of "The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America." Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
For two years after the accident, Yei Yang refused to leave his home. "I couldn't farm, I couldn't go to see friends, as they might be afraid of me," Yang tells CNN. "I didn't want to live." Yang was just 22 and burning rubbish near his village in the province of Xieng Khoung in north-eastern Laos, when a bomb blast tore off one of his eyelids, his top lip and an ear, mutilated one of his arms, and left him with severe scarring from the waist up. His wounds were not caused by a modern day conflict, but by the remnants of a war that was waged more than 40 years ago, and is still destroying lives in this small Southeast Asian nation. Some 80 million unexploded bombs are scattered across the country - the deadly legacy of what became known as America's "secret war" in Laos - a CIA-led mission during the Vietnam War. In total, between 1964 and 1973, the US dropped more than two million tons of bombs - one of the heaviest aerial bombardments in history. Most of the munitions dropped were cluster bombs, which splinter before impact, spreading hundreds of smaller bomblets. To this day, less than 1% of the bombs have been removed, according to US-based NGO Legacies of War, which is spearheading the campaign to clear them. More than 20,000 people have been killed or maimed by the unexploded ordnance (UXOs) since the war ended, and currently, 50 people are maimed or killed every year. Around 40% of those are children.
Note: Big banks profited immensely from the cluster bomb trade. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Bolivia’s president Evo Morales has opened a new “anti-imperialist” military academy to counter US policies and military influence in Latin America. “If the empire teaches domination of the world from its military schools, we will learn from this school to free ourselves from imperial oppression,” the country’s first indigenous president said. “We want to build anti-colonial and anti-capitalist thinking with this school that binds the armed forces to social movements and counteracts the influence of the School of the Americas that always saw the indigenous as internal enemies,” he told a crowd that included the defense ministers of Venezuela and Nicaragua. Some Latin American officers trained at the US-based School of the Americas went on to commit atrocities under 20th century military dictatorships. In 2000, the academy at Fort Benning, Georgia, was renamed the Western Hemisphere Institute for Security Cooperation. Morales, who expelled the US ambassador and counter-narcotics agents in 2008, accused Washington of encouraging “congressional coups” such as the impending impeachment trial of suspended President Dilma Rousseff in Brazil. He also said the US promotes global terrorism through military interventions, citing the rise of the Islamic State group as an example. The re-inaugurated school carries the name of General Juan Jose Torres, a leftist who was Bolivia’s de facto president in 1970 and who expelled the Peace Corps for allegedly sterilizing indigenous women.
Note: The Western Hemisphere Institute for Security Cooperation, formerly known as the School of the Americas, graduated more than 500 human rights abusers. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days. A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate. The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO). The exploits are not run-of-the-mill tools to target everyday individuals. They are expensive software used to take over firewalls, such as Cisco and Fortinet, that are used “in the largest and most critical commercial, educational and government agencies around the world,” said [former TAO operator] Blake Darche. Some former agency employees suspect that the leak was the result of a mistake by an NSA operator, rather than a successful hack by a foreign government of the agency’s infrastructure. It is not unprecedented for a TAO operator to accidentally upload a large file of tools ... one of the former employees said. “What’s unprecedented is to not realize you made a mistake,” he said. “You would recognize, ‘Oops, I uploaded that set’ and delete it.” Critics of the NSA have suspected that the agency, when it discovers a software vulnerability, frequently does not disclose it, thereby putting at risk the cybersecurity of anyone using that product.
Note: Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Federal drug agents regularly mine Americans’ travel information to profile people who might be ferrying money for narcotics traffickers - though they almost never use what they learn to make arrests or build criminal cases. Instead, that targeting has helped the Drug Enforcement Administration seize a small fortune in cash. The DEA surveillance is separate from the vast and widely-known anti-terrorism apparatus. DEA units assigned to patrol 15 of the nation’s busiest airports seized more than $209 million in cash from at least 5,200 people over the past decade “They count on this as part of the budget,” said Louis Weiss, a former [DEA group] supervisor. “Basically, you’ve got to feed the monster.” Federal law gives the government broad powers to seize cash and other assets if agents have evidence that they are linked to crime. That process, commonly known as asset forfeiture, has come under fire ... after complaints that police were using the law as a way to raise money rather than to protect the public or prevent crime. Court records show agents and informants flagged travelers for questioning based on whether they were traveling with one-way tickets, had paid in cash, had listed a non-working phone number on the reservation or had checked luggage. Agents said Zane Young fit that profile when they ... seized $36,000 from his bags. Young’s lawyer, Thomas Baker, said in a court filing that the drug agency’s profile was “vague, ambiguous, overbroad, and can be manipulated to include just about anyone.”
Note: Read about how the DEA stole a young man's life savings without ever charging him with a crime. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
As part of an ongoing effort to exploit medical intelligence, the National Security Agency teamed up with the military-focused Defense Intelligence Agency to extract medical SIGINT from the intercepted communications of nonprofit groups starting in the early 2000s, a top-secret document shows. Medical intelligence can include information about disease outbreaks; the ability of a foreign regime to respond to chemical, biological, and nuclear attacks; the capabilities of overseas drugs companies; advances in medical technology; medical research, and the medical response capabilities of various governments, according to the document and others like it, provided by NSA whistleblower Edward Snowden. One of the more prominent examples of focused medical spying came in 2010, when the agency crafted a plan to stow tracking devices with medical supplies bound for an ill Osama bin Laden in order to locate the terrorist leader. One article from August 2003 identifies an NSA project to keep an eye on the evolution of biotechnology in various countries. Can we ... determine the specific features that would distinguish a Bio Warfare Program from a benign civilian pharmaceutical production effort? the author wrote, identifying a suspect Iranian [biological warfare] facility as a target for inspection. Medical intelligence gathering has continued since then, according to the so-called black budget proposed for the 2013 fiscal year, published in February 2012.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and terrorism.
A specialist unit created by the British domestic counterintelligence and security agency MI5 to “get inside the heads” of terrorists has helped foil seven attacks in the past year. The Behavioural Science Unit at Thames House, the headquarters of MI5 [establishes] whether people flagged as potential threats are "talkers" or "walkers" - those who simply boast or those who are preparing to act. Research by MI5 shows that more than 60 per cent of so-called lone wolves unwittingly provide clues that they are preparing to strike. The BSU’s work involves picking up signs of such changing behaviour. Neil, an Arabic and Norwegian speaker who has worked for the unit for six years, said ... his team is passed intelligence by officers that is gleaned from a network of informants and the public. The BSU then looks for signs of unusual activity. The BSU team pays close attention to “lone-actor” terrorists. The number of experts working in the BSU, which was created in 2004, has more than doubled since ... 2013. “We deal with probabilities and that is the nature of our work,” said Neil, [adding that] some of those they profiled lied to themselves about their intention and the ultimate aim was to persuade them to abandon their radical ideology. He said the assumption that many extremists had mental health problems was wrong. “Only 2 per cent of members of terrorist organisations suffer from mental health problems, compared with an average of up to 30 per cent of members of the public,” Neil said.
Note: See the full text of this article on this webpage. If this article is accurate, MI5 is using very different tactics than those used by the FBI to fight the war on terror.
Days before an ISIS sympathizer attacked a cartoon contest in Garland, Texas, he received a text from an undercover FBI agent. “Tear up Texas,” the agent messaged Elton Simpson days before he opened fire at the Draw Muhammad event, according to an affidavit filed in federal court Thursday. “U know what happened in Paris,” Simpson responded. “So that goes without saying ... No need to be direct.” That revelation comes amidst a national debate about the use of undercover officers and human sources in terrorism cases. The texts were included in the indictment, released Thursday, of Erick Jamal Hendricks. He was charged with conspiring to provide material support to ISIS. [Hendricks] tried to recruit other Americans to form an ISIS cell on secret compounds and introduced an undercover agent to one of the Draw Muhammad attackers, according to the FBI. But Hendricks did more than make a connection. According to the court papers, he asked the undercover officer about the Draw Muhammad event’s security, size, and police presence, during the event, according to an affidavit filed in court. FBI spokeswoman Carol Cratty hung up on The Daily Beast after being asked about the “tear up Texas” text. But shortly after that exchange, Simpson and his accomplice, Nadir Soofi, drove up to the contest and opened fire. Both men were killed in the altercation, but Hendricks would remain free for another year. Every major U.S. attack was linked to FBI investigation before it happened.
Note: The FBI has been stepping up its use of stings in ISIS cases. Read how an FBI mole posing as a potential lover recently convinced a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
WikiLeaks published the DNC’s hacked emails. There has been a flurry of accusations – including from the Hillary Clinton campaign – that Russian president Vladimir Putin orchestrated both the hack and the leak, in an attempt to help Donald Trump win the presidency. It’s amazing how quickly the media are willing to forgo any skepticism and jump to conspiracy-tinged conclusions where Putin is involved. There is some circumstantial evidence that the hack may have originated in Russia, but there are also many questions that haven’t been resolved. As Adam Johnson detailed, when you look closely, the evidence is shoddy and often contradictory. The bulk of the “evidence” has come from the statements of cybersecurity firms FireEye and Crowdstrike, both of which have lucrative contracts with the US government. As FireEye’s CEO once made clear, his company has a financial stake in nation-state hacking tensions. As Edward Snowden pointed out ... with an accompanying NSA document, “Our government specifically authorized the hacking of political parties.” The US has also considered hacking and then releasing sensitive and embarrassing information in China in retaliation for cybersecurity attacks, as the New York Times reported last year. If the US wants to place blame at the feet of the Russians, they should do so transparently and in public, without leaving it to anonymous officials and cybersecurity firms to make claims without providing hard evidence.
Note: Wikileaks published thousands of documents which exposed significant elections corruption in the US. Why is the media glossing over this to focus so heavily on Russia?
One of the most tortured men in the history of Guantánamo Bay has received clearance from the wartime prison’s quasi-parole board to leave after nearly 14 years of detention without charge. Mohamedou Ould Slahi, a Mauritanian citizen whose harrowing account of his torture at Guantánamo Bay became an international bestseller in 2015, will soon leave behind the Cuban detention center where US military personnel contorted his body; bombarded him with noise; deprived him of sleep; stuffed his clothing with ice during a nighttime boat ride meant to to convince him he was headed to an even worse place; threatened his life; and threatened his mother with rape. A nonlegal panel representing various US security agencies tasked with assessing threats posed by Guantánamo’s 76 residual detainees, found Slahi to represent no “continuing significant threat to the security of the United States”. The consensus decision, reached on 14 July, was made public on Wednesday. A federal judge in 2010 [had previously] ordered him freed for lack of evidence untainted by torture to justify his detention, yet the US justice department appealed. In the summer of 2003, senior Guantánamo officials, believing Slahi was an important link to al-Qaida, sought and received permission from the Pentagon to torture him. US defense secretary Donald Rumsfeld personally approved Slahi’s torture. In his book, Slahi recalled ... that he would tell his tormentors whatever they wished to hear. “I don’t care, as long as you are pleased,” Slahi informed his interrogators.
Note: By the time Slahi's bestselling book Guantanamo Diary was published, leaked documents obtained by BBC News had revealed that more than 150 innocent people were detained at Guantanamo after being rounded up for no reason. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists.
When you listen to any member of our government state that the newly released 29 pages are no smoking gun - they are lying. Read the 29 pages and ... remember that they were written during 2002 and 2003. President Bush wanted to go to war in Iraq - not Saudi Arabia. So, 29 full pages that said “Saudi” and “Bandar” instead of “Hussein” and “Iraq” was a huge problem. There was a concerted effort by the FBI and the Bush Administration to keep incriminating Saudi evidence out of the Inquiry’s investigation. The Joint Inquiry was still able to write 29 full pages regarding Saudi complicity in the 9/11 attacks. No other nation is given such singular prominence in the Joint Inquiry’s Final Report. Not Iraq. Not Iran. Not Syria. Not Sudan. Not even Afghanistan or Pakistan. The 29 pages have been kept secret and suppressed from the American public for fifteen years - not for matters of genuine national security - but for matters of convenience, embarrassment, and cover-up. Instead of calling for an emergency session of Congress to immediately name the Kingdom of Saudi Arabia as a State Sponsor of Terrorism, President Obama continues to downplay, belittle, and ignore the truth leaving us vulnerable to terrorist attacks that are still to this very day being funded by our “ally”. The Kingdom of Saudi Arabia provided operational and financial support to the 9/11 hijackers. That is a fact. And, the U.S. government has been covering up that fact for fifteen years - even to this very day.
Note: Read these pages that they didn't want you to see on this webpage and explore good commentary at this link. Check out also five key revelations of these documents. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
The CIA has a long history of “spooking the news,” dating back to its earliest days when the legendary spymaster Allen Dulles and his top staff drank and dined regularly with the press elite of New York and Washington, and the agency boasted hundreds of U.S. and foreign journalists as paid and unpaid assets. In 1977, after this systematic media manipulation was publicly exposed by congressional investigations, the CIA created an Office of Public Affairs that was tasked with guiding press coverage of intelligence matters. The intelligence empire’s efforts to manufacture the truth and mold public opinion are more vast and varied than ever before. One of its foremost assets? Hollywood. The agency has established a very active spin machine in the heart of the entertainment capital, which works strenuously to make sure the cloak-and-dagger world is presented in heroic terms. Since the mid-1990s, but especially after 9/11, American screenwriters, directors, and producers have traded positive portrayal of the spy profession in film or television projects for ... favors at CIA headquarters. As Hollywood became increasingly embedded with Langley ... CIA employees often saw their public-affairs colleagues giving various celebrities personalized tours of the headquarters. “I can’t tell you how many times this happened,” recalled the former CIA officer John Kiriakou. There’s a revolving door between the CIA and Hollywood.
Note: Read how the Pentagon controls the script of hundreds of movies, some quite well known. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
The Obama administration just released numbers suggesting ... that drone strikes in countries excluding Iraq, Afghanistan and Syria have resulted in between at least 64 and 116 noncombatant deaths during his administration. The president also issued an executive order effectively directing his successor to ... publish this data going forward. The new executive order means it will be harder for the next president to kill in total secrecy. Obama’s use [of drones] over the last seven years set a disastrous global precedent: using a new weapons technology as an excuse to kill in secret and without regard for international law. Today’s developments are an incremental but important step away from the notion that new technology is a license for secrecy. The downside, though, is that the drone data could be completely misleading – and provide a veneer of legitimacy to unlawful killings. There are reports of hundreds of unidentified people killed in apparent “signature strikes,” where targeting decisions were made on the basis of patterns of behavior rather than identification of a specific individual. Amnesty International and other groups have also documented so-called rescuer strikes, where the US killed or injured individuals who were trying to help the victims of an initial strike. The CIA, an agency with an extremely poor record of accountability to the public, is still conducting strikes. Its continued role is likely one reason we aren’t getting fuller answers to our questions about drones.
Note: Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Secret FBI rules allow agents to obtain journalists’ phone records with approval from two internal officials - far less oversight than under normal judicial procedures. The classified rules ... govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a judge or informing the news organization being targeted. Obtaining a journalist’s records with a national security letter (or NSL) requires the signoff of the FBI’s general counsel and the executive assistant director of the bureau’s National Security Branch. The Obama administration has come under criticism for bringing a record number of leak prosecutions and aggressively targeting journalists in the process. In 2013, after it came out that the Justice Department had secretly seized records from phone lines at the Associated Press and surveilled ... reporter James Rosen, then-Attorney General Eric Holder tightened the rules. The FBI could not label reporters as co-conspirators in order to try to identify their sources - as had happened with Rosen - and it became more difficult to get journalists’ phone records without notifying the news organization first. Yet these changes did not apply to NSLs. Those are governed by a separate set of rules. The FBI issues thousands of NSLs each year, including nearly 13,000 in 2015. Over the years, a series of Inspector General reports found significant problems with their use, yet the FBI is currently pushing to expand the types of information it can demand with an NSL.
Note: The aggressive pursuit of leaks and journalists that report them led BBC to recently ask: "Is the US government at war with whistleblowers?" Read more about the FBI's use of secret National Security Letters. For more along these lines, see concise summaries of deeply revealing news articles on media manipulation and the disappearance of privacy.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.