Intelligence Agency Corruption Media ArticlesExcerpts of Key Intelligence Agency Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
In the space of a single primetime address on [September 10], Barack Obama dealt a crippling blow to a creaking, 40-year old effort to restore legislative primacy to American warmaking. The administration’s rationale, at odds with the war it is steadily expanding, is to forestall an endless conflict foisted upon it by a bloodthirsty legislature. Yet one of the main authorities Obama is relying on for avoiding Congress is the 2001 ... document known as the Authorization to Use Military Force (AUMF) that few think actually applies to ISIS. Taken together with the congressional leadership’s shrug, Obama has stripped the veneer off a contemporary fact of American national security: presidents make war on their own, and congresses acquiesce. An allergy to congressional authorisation is enmeshed with the president’s stated desire to end what he last year termed a “perpetual war” footing. It has led Obama in directions legal scholars consider highly questionable. Not only has Obama rejected restrictions of his warmaking power, he has also rejected legislative expansions of it - a more curious choice. Obama has been wary that Congress will offer up new laws that entrench and expand an amorphous war that, in his mind, he has waged with the minimum necessary amount of force. Obama last year advocated the eventual repeal of the 2001 authorisation - as well as the 2002 congressional approval of the Iraq war - to aid in turning a page on a long era of US warfare. [After Obama's address] a senior administration official told reporters that the 2001 authorisation covered the war against ISIS.
Note: The war machine marches on as the US presidency claims ever more power over Congress. For more on this, see concise summaries of deeply revealing war news articles from reliable major media sources.
A major FBI cover-up ... connects Sarasota and the 9/11 hijackers to the Saudi Arabian government. While still at Sarasota's Emma E. Booker Elementary on the day of the 2001 terrorist attacks, President George W. Bush said, "Terrorism against our nation will not stand." However, the president's visit wasn't the only thing to tie this Bay area county to the September 11th attacks. Within days, we learned three of the hijackers had been living in the area while taking flying lessons at Huffman Aviation and Florida Flight Training in Sarasota County... but there is even more than that. "There was a network supporting the hijackers," says former U.S. Senator and Florida governor Bob Graham. According to Graham, the FBI has been covering up that fact for years, and continues to try and hide it even now. Graham says he is convinced there was a direct line between some of the terrorists who carried out the September 11th attacks and the government of Saudi Arabia. According to Graham, the FBI was aware of the strong connection between hijackers and a Saudi Arabian family who were living in an upscale Sarasota gated community. Twelve days before 9/11, the family abandoned the house -- leaving behind valuable items including food, clothing, furnishings and three vehicles. "There are some things I can't talk about," Graham told us, "And there are others like what I know is involved in the investigation in Sarasota, which is diametrically opposed to what the FBI said publicly."
Note: For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.
The CIA brought top al-Qaeda suspects close “to the point of death” by drowning them in water-filled baths during interrogation sessions in the years that followed the September 11 attacks, a security source has told The Telegraph. The description of the torture meted out to at least two leading al-Qaeda suspects, including the alleged 9/11 mastermind Khalid Sheikh Mohammed, far exceeds the conventional understanding of waterboarding, or “simulated drowning” so far admitted by the CIA. “They weren’t just pouring water over their heads or over a cloth,” said the source who has first-hand knowledge of the period. “They were holding them under water until the point of death, with a doctor present to make sure they did not go too far. This was real torture.” The account of extreme CIA interrogation comes as the US Senate prepares to publish a declassified version of its so-called Torture Report – a 3,600-page report document based on a review of several million classified CIA documents. Publication of the report is currently being held up by a dispute over how much of the 480-page public summary should remain classified, but it is expected to be published within weeks. A second source who is familiar with the Senate report told The Telegraph that it contained several unflinching accounts of some CIA interrogations which – the source predicted – would “deeply shock” the general public.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
The spread of an aggressive brand of policing ... has spurred the seizure of hundreds of millions of dollars in cash from motorists and others not charged with crimes. Thousands of people have been forced to fight legal battles that can last more than a year to get their money back. Behind the rise in seizures is a little-known cottage industry of private police-training firms that teach the techniques of “highway interdiction” to departments across the country. [It has] enabled police nationwide to share detailed reports about American motorists — criminals and the innocent alike — including their Social Security numbers, addresses and identifying tattoos, as well as hunches about which drivers to stop. A thriving subculture of road officers on the network now competes to see who can seize the most cash and contraband, describing their exploits in the network’s chat rooms and sharing “trophy shots” of money and drugs. Some police advocate highway interdiction as a way of raising revenue for cash-strapped municipalities. Unexplored until now is the role of the federal government and the private police trainers in encouraging officers to target cash on the nation’s highways. There have been 61,998 cash seizures made on highways and elsewhere since 9/11 without search warrants ... totaling more than $2.5 billion. State and local authorities kept more than $1.7 billion of that while Justice, Homeland Security and other federal agencies received $800 million. 298 departments and 210 task forces have seized the equivalent of 20 percent or more of their annual budgets since 2008. In 400 federal court cases examined by The Post where people who challenged seizures and received some money back, the majority were black, Hispanic or another minority.
Note: Watch an excellent spoof on this unbelievable police practice. For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. [But] the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations. But a secret 2009 report issued by [Director of National Intelligence James Clapper's] office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies. One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence”.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
A prominent national security reporter for the Los Angeles Times routinely submitted drafts and detailed summaries of his stories to CIA press handlers prior to publication, according to documents obtained by The Intercept. Email exchanges between CIA public affairs officers and Ken Dilanian, now an Associated Press intelligence reporter who previously covered the CIA for the Times, show that Dilanian enjoyed a closely collaborative relationship with the agency, explicitly promising positive news coverage and sometimes sending the press office entire story drafts for review prior to publication. In at least one instance, the CIA’s reaction appears to have led to significant changes in the story that was eventually published in the Times. Dilanian’s emails were included in hundreds of pages of documents that the CIA turned over in response to two FOIA requests seeking records on the agency’s interactions with reporters. They include email exchanges with reporters for the Associated Press, Washington Post, New York Times, Wall Street Journal, and other outlets. In addition to Dilanian’s deferential relationship with the CIA’s press handlers, the documents show that the agency regularly invites journalists to its McLean, Va., headquarters for briefings and other events.
Note: For more on this, see concise summaries of deeply revealing major media corruption news articles from reliable major media sources.
Florida’s former U.S. Sen. Bob Graham ... has been fighting both the Bush and Obama administrations to declassify 28 pages of a 9/11 intelligence report that may detail and expose the efforts of members of the Saudi Arabian royal family in aiding and abetting [9/11] terrorists in Florida, many who were themselves Saudi. Graham is befuddled as to why the Obama administration does not release these documents, which he read when he was chair of the Senate Select Intelligence Committee and co-chair of a congressional inquiry into the 9/11 attacks. As a result, he has joined a Freedom of Information Act request alongside others, asking that 80,000 pages of information on a Saudi family that disappeared just before the attacks be made public. “It isn’t credible that 19 people — most [of whom] could not speak English well and did not have experience in the United States — could carry out such a complicated task without external assistance,” Graham insists. The Saudi family living in Sarasota fled to Saudi Arabia just prior to the 9/11 attacks. Were they tipped off that they should leave? If so, by whom? Graham believes that there was a deliberate effort to cover up Saudi involvement in the tragedy of 9/11 by the Bush administration, one, he says, that the Obama administration appears to support. The American public needs to know. The families of those who were lost to the 9/11 attacks or those who fought in Afghanistan and Iraq deserve an answer as well.
Note: For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.
America has raged against the appalling behavior of the local police in Ferguson, Missouri, and for good reason: automatic rifles pointed at protesters, tank-like armored trucks blocking marches, the teargassing and arresting of reporters, tactics unfit even for war zones. [But ire] should also be focused on the federal government agency that has enabled the rise of military police, and so much more: the Department of Homeland Security (DHS). The 240,000-employee [agency] has been the primary arms dealer for out-of-control local cops in Ferguson and beyond, handing out tens of billions of dollars in grants for military equipment in the last decade with little to no oversight. Police can act like paramilitary forces to combat the most mundane crimes without much worry of the consequences. But the problem with DHS is much larger than just combat gear: Homeland Security is also transferring tens or hundreds of millions of dollars in high-tech spying technology to local police through a sprawling backroom operation surveilling your neighborhood, much of which may be unconstitutional. DHS has its own fleet of Predator drones roaming the US border and far beyond, which it has loaned out to police over 500 times. Homeland Security is also handing out millions of dollars to local police to “accelerate and facilitate the adoption” of smaller drones that police can fly themselves. Cops claim they want these “middleman” drones for “emergencies,” but ... documents show they’ll end up using them for “crowd control” and “intelligence gathering”.
Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.
Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
A former federal cyber security chief was convicted [on August 26] on several charges related to accessing and distributing child pornography. Timothy DeFoggi, 56, was acting director of cyber security at the U.S. Department of Health and Human Services when he was detained in May 2013 as part of an investigation targeting three child pornography websites. The former Germantown, Md. resident registered as a member of one of the sites on March 2, 2012, according to a U.S. Department of Justice press release. He used the site to access and solicit child pornography, "and exchanged private messages with other members where he expressed an interest in the violent rape and murder of children," according to the DOJ. DeFoggi also suggested to one member of a message board that they meet in person to fulfill fantasies of violently raping and murdering children. He is the sixth person convicted in connection with the investigation. Sentencing is scheduled for Nov. 7.
Note: For powerful evidence from a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government, click here. For more on this, see concise summaries of deeply revealing sexual abuse scandals news articles from reliable major media sources.
Les Goldsmith, the CEO of ESD America [marketers of the Crytophone 500], points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device. “Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.” Who is running these interceptors and what are they doing with the calls? Goldsmith says we can’t be sure, but he has his suspicions. “Are some of them U.S. government interceptors?” [asks] Goldsmith. Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. For governments or other entities able to afford a price tag of “less than $100,000,” says Goldsmith, high-quality interceptors are quite realistic. Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example.
Note: Do you think the government might have put up fake cell towers to nab more data? For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. ICREACH [as the search engine is called] contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy. ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
A federal judge has ordered the FBI to scrutinize allegations that the agency pressured a witness not to testify in a trial about videos related to the Oklahoma City bombing. U.S. District Judge Clark Waddoups said the agency needs to get to the bottom of the claims from Utah lawyer Jesse Trentadue, who said that the FBI threatened to cut off a former government operative's benefits if he appeared in court. Waddoups decided the lawyer's report raises disturbing questions, and he wanted evidence that the agency has thoroughly investigated the matter. Waddoups ordered the attorneys to present the results of the witness-tampering investigation on Nov. 13. The hearing is the latest in a case that reignited questions about whether others were involved in the bombing that killed 168 people. Trentadue argues surveillance videos from 1995 show Timothy McVeigh had an accomplice. The agency says its investigators have done a reasonable search and found no evidence of additional unreleased videos. [John] Matthews was supposed to testify during a late July bench trial, but Trentadue argued that he backed out at the last minute because the FBI threatened to cut off his veteran's and disability benefits. Trentadue said Matthews was part of a stealth government operation before the Oklahoma City bombing tracking militia movements of which McVeigh was a part, and his testimony could support the idea that there was a second suspect. Matthews told him and a colleague that he had been pressured in phone calls just before and after he was supposed to testify, the lawyer said.
Note: Many aspects of the Oklahoma City bombing were covered up. For a compilation of media videos showing without doubt that there were other bombs in the building which later were completely ignored, click here. For other major media articles showing major manipulation, click here click here, here, and here.
A century has passed since the start of World War I, which many people at the time declared was “the war to end all wars.” Unfortunately, wars just kept happening. In influential research sponsored by the World Bank, the Oxford economist Paul Collier has shown that the best predictor of civil war, which is all too common in poor countries, is the availability of lootable resources like diamonds. Whatever other reasons rebels cite for their actions seem to be mainly after-the-fact rationalizations. If you’re a modern, wealthy nation, however, war — even easy, victorious war — doesn’t pay. And this has been true for a long time. In his famous 1910 book The Great Illusion, the British journalist Norman Angell argued that “military power is socially and economically futile.” As he pointed out, in an interdependent world (which already existed in the age of steamships, railroads, and the telegraph), war would necessarily inflict severe economic harm even on the victor. Modern nations can’t enrich themselves by waging war. Yet wars keep happening. Why? Governments all too often gain politically from war, even if the war in question makes no sense in terms of national interests. Nations almost always rally around their leaders in times of war, no matter how foolish the war or how awful the leaders. Argentina’s junta briefly became extremely popular during the Falklands war. For a time, the “war on terror” took President George W. Bush’s approval to dizzying heights, and Iraq probably won him the 2004 election. True to form, Mr. Putin’s approval ratings have soared since the Ukraine crisis began.
Note: For more on this, see this concise summary of War Is A Racket, a powerful book written by one of the most highly decorated US generals ever.
Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."
Note: Read the cover story from Wired magazine with a deep inside report on Snowden.
To many Americans, online eavesdropping by the U.S. National Security Agency is an outrage, a threat to privacy and freedom. To some, it's a business opportunity. A small but growing number of companies have introduced Internet and communications services designed to shield users from the government's eyes. A few even advertise their products as "NSA-proof." Many of the companies have been offering encrypted online services for years, scrambling their customers' data and communications in ways that require the right computer-generated "key" to decode. They are at least as concerned with thwarting private hackers and corporate spies as they are with blocking federal agents. But some entrepreneurs in the field found motivation in the NSA, after learning that the agency has been collecting troves of Internet and phone data on ordinary citizens for years. "Privacy and democracy go hand in hand - that's why this is so important," said Jason Stockman, one of the creators of ProtonMail, which began offering an encrypted e-mail service in May. "Our goal is to protect people against mass surveillance." But most companies will quickly admit that if the NSA - or some foreign intelligence service - really wants your data, they can't guarantee protection. Since the NSA conducts its business in secret, its full capabilities remain a matter of speculation. Most companies that invoke the NSA in their marketing focus on encryption.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Nearly 13 years after the 9/11 terrorist attacks, the extent of Saudi involvement in the deaths of almost 3,000 people remains unclear — but according to members of Congress and the families of victims, information about this has been suppressed ever since the publication of a 2002 congressional investigation into the plot. Prior to the release of the final report of the Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001, the Bush administration classified a 28-page section in the name of national security. The 28 pages make up part four of the report, a section titled “Finding, Discussion and Narrative Regarding Certain Sensitive National Security Matters.” They are widely believed to implicate Saudi officials or describe support from Saudi intelligence for the hijackers, 15 of whom were Saudi citizens. Former Senator Bob Graham of Florida, who co-chaired the joint Senate-House investigation, dispensed with the equivocation and told VICE News that the redactions are a “cover up.” “I’ve said this since the first classification of the 28 pages,” he remarked. “It’s become more and more inexplicable as to why two administrations have denied the American people information that would help them better understand what happened on 9/11.” Graham said that the 28 pages describe the financing of the attacks. “Follow the money,” he said. “That will illuminate other significant aspects of 9/11.” The Saudi kingdom has always denied any complicity in the attacks.”
Note: Watch a video of Congressman Massie telling how shocked he was to read these 28 pages. Why aren't the major media reporting this important news? For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.
The New York Times announced on [August 7] that it will use the word torture to describe the United States' controversial interrogation tactics on terror suspects. "From now on, The Times will use the word “torture” to describe incidents in which we know for sure that interrogators inflicted pain on a prisoner in an effort to get information," said Times executive editor Dean Baquet. In the past, the Times had been sharply criticized for not using the word torture. Instead, [it] had referred to torture as "brutal interrogation," or similar epithets. The Times is hardly the only major media outlet to avoid using the word "torture." Reuters referred to the tactics as "brutal interrogation methods" and the AP has called them "enhanced interrogation techniques." The media have been accused of following along with President Bush's denial that the U.S. does not use torture. Banquet [says] that "while the methods set off a national debate, the Justice Department insisted that the techniques did not rise to the legal definition of 'torture.'” Baquet said that reporters and editors had debated the issue in wake of the Senate Intelligence Committee's torture report, which has yet to be released. Last week, President Obama admitted that the CIA "tortured some folks" in post-9/11 anti-terror efforts.
Note: For more on this, see concise summaries of deeply revealing media cover-ups news articles from reliable major media sources.
The federal government has concluded there's a new leaker exposing national security documents in the aftermath of surveillance disclosures by former NSA contractor Edward Snowden, U.S. officials tell CNN. Proof of the newest leak comes from national security documents that formed the basis of a news story published [August 5] by the Intercept, the news site launched by Glenn Greenwald, who also published Snowden's leaks. The Intercept article focuses on the growth in U.S. government databases of known or suspected terrorist names during the Obama administration. The article cites documents prepared by the National Counterterrorism Center dated August 2013, which is after Snowden left the United States to avoid criminal charges. Government officials have been investigating to find out that identity. In a February interview with CNN's Reliable Sources, Greenwald said: "I definitely think it's fair to say that there are people who have been inspired by Edward Snowden's courage and by the great good and virtue that it has achieved." The biggest database, called the Terrorist Identities Datamart Environment, now has 1 million names, a U.S. official confirmed to CNN. The Intercept first reported the new TIDE database numbers, along with details of other databases. As of November, 2013, there were 700,000 people listed in the Terrorist Screening Database (TSDB), or the "Terrorist Watchlist, according to a U.S. official. The Intercept report said, citing the documents, that 40% on the "Terrorist Watchlist" aren't affiliated with terror groups.
Note: For more on this, see concise summaries of deeply revealing 'terror' manipulation news articles from reliable major media sources.
Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local law enforcement agencies, private contractors, and foreign governments—more than 40 percent are described by the government as having “no recognized terrorist group affiliation.” The documents, obtained from a source in the intelligence community, also reveal that the Obama Administration has presided over an unprecedented expansion of the terrorist screening system. Since taking office, Obama has boosted the number of people on the no fly list more than ten-fold, to an all-time high of 47,000. “If everything is terrorism, then nothing is terrorism,” says David Gomez, a former senior FBI special agent. The watchlisting system, he adds, is “revving out of control.” The classified documents were prepared by the National Counterterrorism Center, the lead agency for tracking individuals with suspected links to international terrorism. Stamped “SECRET” and “NOFORN” (indicating they are not to be shared with foreign governments), they offer the most complete numerical picture of the watchlisting system to date. The government adds names to its databases, or adds information on existing subjects, at a rate of 900 records each day.
Note: For more on this, see concise summaries of deeply revealing 'terror' manipulation news articles from reliable major media sources.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.