Intelligence Agency Corruption Media ArticlesExcerpts of Key Intelligence Agency Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
In the early years after Sept. 11, 2001, the CIA turned some Guantanamo Bay prisoners into double agents, sending them home to help the United States kill terrorists, current and former U.S. officials said. The CIA promised the prisoners freedom, safety for their families and millions of dollars from the agencys secret accounts. It was a gamble. Officials knew there was a chance that some prisoners might quickly spurn their deal and kill Americans. Nearly a dozen current and former U.S. officials described aspects of the program to the Associated Press. Dozens of prisoners were evaluated, but only a handful, from a variety of countries, were turned into spies who signed agreements to work for the CIA. Prisoners agreed to cooperate for a variety of reasons, officials said. Some received assurances that the United States would resettle their families. Another agreed to cooperate after the agency insinuated that it would harm his children, a former official said, a threat similar to those interrogators made to self-proclaimed Sept. 11 mastermind Khalid Sheik Mohammed. All were promised money. Exactly how much each received remains unclear. But altogether, the government paid millions for their services, officials said. The money came from a secret CIA account, code-named Pledge, that is used to pay informants, officials said. Officials said the program ended in 2006 as the flow of detainees to Guantanamo Bay slowed to a trickle. The last prisoner arrived there in 2008.
Note: There is no doubt that the CIA used mind control techniques to control and likely program some of the prisoners. To read verifiable documentation on the U.S. governments secret mind control programs, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Jimmy Wales, the founder of Wikipedia, has called on Barack Obama to rein in the National Security Agency as he described the whistleblower Edward Snowden as "a hero" whom history will judge "very favourably". Wales called for a "major re-evaluation" of the NSA, adding that the public "would have never approved this sweeping surveillance program" had it been put to a vote. The revelations, Wales said, had been "incredibly damaging and embarrassing to the US. It makes it very difficult for someone like me to go out, as I do, [to] speak to people in authoritarian countries, and say: 'You shouldn’t be spying on activists, you shouldn’t be censoring the internet', when we [in the US] are complicit in these acts of extraordinary intrusion into people’s personal lives. [Snowden] has exposed what I believe to be criminal wrongdoing, lying to Congress, and certainly [an] affront to the Fourth Amendment. I think that history will judge him very favourably. There is a growing sense of concern in Congress about this, a growing sense in Congress that public is angry about this, that they have been misled and I think we are going to see legislation to change this."
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Much has been made of Bobby Kennedy’s impossible burden following the assassination of his brother. A review of [documents released as recently as a few months ago] by the Globe, fortified by the work of historians and new interviews with former Kennedy aides, paints a picture of a brother responding to the assassination with equal parts crippling grief and growing suspicions. In the five years between his brother’s murder and his own assassination in 1968, Bobby Kennedy voiced public support for the findings of the Warren Commission, namely that a pathetic, attention-seeking gunman had alone been responsible for the murder of President Kennedy. Privately, though, Bobby was dismissive of the commission, seeing it ... as a public relations tool. After hearing the news out of Dallas, it’s clear that he quickly focused his attention on three areas of suspicion: Cuba, the Mafia, and the CIA. Crucially, Bobby had become his brother’s point man in managing all three of those highly fraught portfolios. And by the time the president was gunned down, Bobby understood better than anyone how all three had become hopelessly interwoven, and how much all three bore his own imprint. For while John Kennedy was the one gunned down, Bobby had reason to believe he may have been the ultimate target. Walking the grounds of Hickory Hill just an hour after receiving confirmation of his brother’s death, Bobby confided in an aide something truly unsettling. That aide, Edwin Guthman, would later recount it in his book “We Band of Brothers.” “I thought they would get one of us,” Bobby said, adding, “I thought it would be me.”
Note: In 2006, BBC reported that CIA operatives were directly involved in Robert Kennedy's assassination, and that Sirhan Sirhan may have been a programmed Manchurian Candidate. For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.
Despite the Cold War rhetoric of his campaign, JFK's greatest ambition as president was to break the militaristic ideology that has dominated our country since World War II. He told his close friend Ben Bradlee that he wanted the epitaph "He kept the peace," and said to another friend, William Walton, "I am almost a 'peace at any price' president." Hugh Sidey, a journalist and friend, wrote that the governing aspect of JFK's leadership was "a total revulsion" of war. Nevertheless, as James W. Douglass argues in his book JFK and the Unspeakable: Why He Died and Why It Matters, JFK's presidency would be a continuous struggle with his own military and intelligence agencies, which engaged in incessant schemes to trap him into escalating the Cold War into a hot one. His first major confrontation with the Pentagon, the Bay of Pigs catastrophe, came only three months into his presidency and would set the course for the next 1,000 days. From the start, JFK recoiled at the caper's stench, as CIA Director Allen Dulles has acknowledged, demanding assurances from CIA and Pentagon brass that there was no chance of failure and that there would be no need for U.S. military involvement. Dulles and the generals knowingly lied and gave him those guarantees. When the invasion failed, JFK refused to order airstrikes against Castro. JFK was realizing that the CIA posed a monumental threat to American democracy. As the brigade faltered, he told Arthur Schlesinger that he wanted to "splinter the CIA into a thousand pieces and scatter it to the winds."
Note: For more on the powerful social forces that assassinated JFK, see the deeply revealing reports from reliable major media sources available here.
The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden. In the first explicit confirmation that UK citizens have been caught up in US mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo ... says the material is being put in databases where it can be made available to other members of the US intelligence and military community. Until now, it had been generally understood that the citizens of each country were protected from surveillance by any of the others. But the Snowden material reveals that: • In 2007, the rules were changed to allow the NSA to analyse and retain any British citizens' mobile phone and fax numbers, emails and IP addresses swept up by its dragnet. • These communications were "incidentally collected" by the NSA, meaning the individuals were not the initial targets of surveillance operations and therefore were not suspected of wrongdoing. • The NSA has been using the UK data to conduct so-called "pattern of life" or "contact-chaining" analyses, under which the agency can look up to three "hops" away from a target of interest – examining the communications of a friend of a friend of a friend. Three hops for a typical Facebook user could pull the data of more than 5 million people into the dragnet.
Note: For more on government threats to privacy, see the deeply revealing reports from reliable major media sources available here.
A secret court order that authorised a massive trawl by the National Security Agency of Americans' email and internet data was published for the first time on [November 18], among a trove of documents that also revealed a judge's concern that the NSA "continuously" and "systematically" violated the limits placed on the program. Another later court order found that what it called "systemic overcollection" had taken place. In a heavily redacted opinion Colleen Kollar-Kotelly, the former presiding judge of the FISA court, placed legal weight on the methods of surveillance employed by the NSA, which had never before collected the internet data of “an enormous volume of communications”. The methods, known as pen registers and trap-and-trace devices, record the incoming and outgoing routing information of communications. Kollar-Kotelly ruled that acquiring the metadata, and not the content, of email and internet usage in bulk was harmonious with the “purpose” of Congress and prior court rulings – even though no surveillance statute ever authorized it and top officials at the Justice Department and the FBI threatened to resign in 2004 over what they considered its dubious legality. The type of data collected under the program included information on the "to", "from" and "bcc" lines of an email rather than the content. Metadata, wrote Kollar-Kotelly, enjoyed no protection under the fourth amendment to the US constitution, a precedent established by the Supreme Court in 1979 in a single case on which the NSA relies currently.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
[Thirteen] days before that dark day in Dallas, [police informant Willie Augustus] Somersett elicited a chilling, police tape-recorded threat from a right-wing racist who talked of how the President would soon be shot “from an office building with a high-powered rifle” and how “they’ll pick up somebody within hours after…just to throw the public off.” Extremist Joseph A. Milteer, of Quitman, Ga., made the threat against Kennedy in the kitchen of Somersett’s small apartment in downtown Miami. In the late 1970s, the House Assassinations Committee had experts analyze a photograph taken in Dealey Plaza moments before the first shot of an unidentified motorcade spectator “who bears a strong resemblance” to Milteer. The experts, however, concluded the man was not Milteer, who died in 1974. But now, a retired FBI agent who says that within hours of the assassination he was assigned to locate Milteer has [said] the man in the photograph is indeed Milteer. “I stood next to the man. I interviewed him and spent hours with him,” said Don Adams, who spent 20 years with the FBI before working as a police chief in Ohio. “There is no question in my mind. As soon as I saw that picture I almost fell off of my feet.” Congressional investigators never contacted Adams. Adams, now 82, says he saw the Dealey Plaza photograph for the first time a decade after his 1982 retirement from the FBI. The photograph renewed his interest in the case and ultimately led him to write the book, From an Office Building with a High-Powered Rifle. His insider’s account raises disturbing questions about the FBI’s investigation of Kennedy’s death.
Note: To watch a five-minute video of 20-year FBI agent Don Adams stating he has no doubt there was a major cover-up of the JFK assassination, click here. For more excellent, revealing videos on the assassination, click here and here. For more on the JFK assassination, see the deeply revealing reports from reliable major media sources available here.
The fifty years since the assassination of John F. Kennedy have done little to quell the public's interest or skepticism about who killed the president. In 1978 ... the House of Representatives Select Committee on Assassinations found that in addition to Oswald, there likely was a second gunman who fired at the president's motorcade. The commission concluded that the gunmen were part of a "conspiracy," without determining exactly who was behind it, opening the door to five decades and a cottage industry of theories. According to a 2003 ABC News Poll, 70 percent of Americans believe Kennedy's death was "the result of a plot, not the act of a lone killer." Fifty-one percent believe Oswald did not act alone, and 7 percent believe Oswald was not involved at all in the assassination. In the years since Kennedy's death more than 2,000 books have been written about the assassination, many of which espouse one or more conspiracy theories. In nearly every theory that involves American conspirators, be they wealthy industrialists or tough-as-nails mafiosi, one group is routinely represented – the CIA. One theory suggests that Oswald was a CIA operative and agents tampered with his FBI file before and after the investigation to make it appear he was a communist and lone wolf. [Another theory claims President Lyndon] Johnson was aided in the plot by another man who would become president, George H.W. Bush, a burgeoning CIA official who happened to be in Dallas on the day of the assassination.
Note: On the 50th anniversary of the Kennedy assassination see our powerful JFK assassination information center and the best videos and news articles on the topic. For an astonishing History Channel Video in which the attorney for Lyndon Johnson states he has no doubt Johnson was involved in the assassination, click here.
“The Brothers” is a riveting chronicle of government-sanctioned murder, casual elimination of “inconvenient” regimes, relentless prioritization of American corporate interests and cynical arrogance on the part of two men. John Foster Dulles and his brother, Allen, were ... lawyers, partners in the immensely powerful firm of Sullivan & Cromwell. John Foster Dulles served as secretary of state from 1953 to 1959; his brother ran the C.I.A. from 1953 to 1961. In his detailed, wellconstructed and highly readable book, Stephen Kinzer ... shows how the brothers drove America’s interventionist foreign policy. Kinzer highlights John Foster Dulles’s central role in channeling funds from the United States to Nazi Germany in the 1930s. Sullivan & Cromwell floated bonds for Krupp A. G., the arms manufacturer, and also worked for I. G. Farben, the chemicals conglomerate that later manufactured Zyklon B, the gas used to murder millions of Jews. For the Dulles brothers, and for much of the American government, threats to corporate interests were categorized as support for communism. There are also reminders in Kinzer’s book of dark events in the history of American intelligence. Sixty years ago, Frank Olson, a C.I.A. officer, was reported to have jumped to his death during mind-control experiments “in which psychoactive drugs were administered to unknowing victims.” But last year, Kinzer reports, Olson’s family filed suit, claiming he had actually been murdered after visiting secret C.I.A. prisons in Europe.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Doctors and psychologists working for the US military violated the ethical codes of their profession under instruction from the defence department and the CIA to become involved in the torture and degrading treatment of suspected terrorists, an investigation has concluded. The report of the Taskforce on Preserving Medical Professionalism in National Security Detention Centres concludes that after 9/11, health professionals working with the military and intelligence services "designed and participated in cruel, inhumane and degrading treatment and torture of detainees". The report lays blame primarily on the defence department (DoD) and the CIA, which required their healthcare staff to put aside any scruples in the interests of intelligence gathering and security practices that caused severe harm to detainees, from waterboarding to sleep deprivation and force-feeding. The two-year review by the 19-member taskforce, Ethics Abandoned: Medical Professionalism and Detainee Abuse in the War on Terror, supported by the Institute on Medicine as a Profession (IMAP) and the Open Society Foundations, says that the DoD termed those involved in interrogation "safety officers" rather than doctors. Doctors and nurses were required to participate in the force-feeding of prisoners on hunger strike, against the rules of the World Medical Association and the American Medical Association. Doctors and psychologists working for the DoD were required to breach patient confidentiality and share what they knew of the prisoner's physical and psychological condition with interrogators, and were used as interrogators themselves.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Lawyers acting for Jeremy Hammond, the Chicago-based hacktivist facing up to 10 years in prison for releasing internal emails from the private intelligence agency Stratfor, have lodged 265 letters of support with the federal judge who will determine his sentence on 15 November. The letters call on judge Loretta Preska ... to show leniency towards Hammond, a former member of the hacking network Anonymous who has become a cause célčbre for hacktivists, civil libertarians and those concerned about the rights of whistleblowers. Among the correspondents are Daniel Ellsberg, source of the 1970s Pentagon Papers leak on the Vietnam war, and Jesselyn Radack, a former Justice Department whistleblower who now works at the Government Accountability Project. Hammond, 28, has pleaded guilty to one count under the Computer Fraud and Abuse Act (CFAA) relating to a 2011 cyber attack on Strategic Forecasting, Inc, known as Stratfor – an information analysis company based in Austin, Texas. Working alongside a fellow hacker operating under the internet handle Sabu – who was later revealed to be an FBI informant – Hammond downloaded an email spool from Stratfor containing millions of files and sent the data to the anti-secrecy website WikiLeaks which released them as the “Global Intelligence Files”. The Stratfor emails revealed that [Stratfor] had been contracted by Dow Chemical, parent company of Union Carbide which owned the Bhopal pesticide plant where the world’s worst industrial catastrophe took place in 1984, to follow the activities of campaigners seeking redress for the victims.
Note: For an excellent follow-up article titled "The Revolutionaries in Our Midst," click here. For more on privatization of "intelligence", see the deeply revealing reports from reliable major media sources available here.
When Ban Ki-moon, the United Nations secretary general, sat down with President Obama at the White House in April to discuss Syrian chemical weapons, Israeli-Palestinian peace talks and climate change, it was a cordial, routine exchange. The National Security Agency nonetheless went to work in advance and intercepted Mr. Ban’s talking points for the meeting, a feat the agency later reported as an “operational highlight” in a weekly internal brag sheet. It was emblematic of an agency that for decades has operated on the principle that any eavesdropping that can be done on a foreign target of any conceivable interest — now or in the future — should be done. After all, American intelligence officials reasoned, who’s going to find out? From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as foes, as has become obvious in recent weeks; the agency’s official mission list includes using its surveillance powers to achieve “diplomatic advantage” over such allies as France and Germany and “economic advantage” over Japan and Brazil, among other countries. The scale of eavesdropping by the N.S.A., with 35,000 workers and $10.8 billion a year, sets it apart.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The German, French, Spanish and Swedish intelligence services have all developed methods of mass surveillance of internet and phone traffic over the past five years in close partnership with Britain's GCHQ eavesdropping agency. The bulk monitoring is carried out through direct taps into fibre optic cables and the development of covert relationships with telecommunications companies. A loose but growing eavesdropping alliance has allowed intelligence agencies from one country to cultivate ties with corporations from another to facilitate the trawling of the web, according to GCHQ documents leaked by the former US intelligence contractor Edward Snowden. The files also make clear that GCHQ played a leading role in advising its European counterparts how to work around national laws intended to restrict the surveillance power of intelligence agencies. US intelligence officials have insisted the mass monitoring was carried out by the security agencies in the countries involved and shared with the US. The Guardian revealed the existence of GCHQ's Tempora programme, in which the electronic intelligence agency tapped directly into the transatlantic fibre optic cables to carry out bulk surveillance. GCHQ officials expressed admiration for the technical capabilities of German intelligence to do the same thing, [saying] the Federal Intelligence Service (BND) had "huge technological potential and good access to the heart of the internet – they are already seeing some bearers running at 40Gbps and 100Gbps". Bearers is the GCHQ term for the fibre optic cables, and gigabits per second (Gbps) measures the speed at which data runs through them.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The widespread surveillance of Spanish citizens by the US National Security Agency, which caused outrage when it was reported this week, was the product of a collaboration with Spain's intelligence services, according to one Spanish newspaper. Spanish agents not only knew about the work of the NSA but also facilitated it, El Mundo reports. An NSA document entitled "Sharing computer network operations cryptologic information with foreign partners" reportedly shows how the US relies on the collaboration of many countries to give it access to intelligence information, including electronic metadata. According to the document seen by El Mundo, the US classifies cooperation with various countries on four different levels. In the first group – "Comprehensive Cooperation" – are the UK, Australia, Canada and New Zealand. The second group – "Focused Cooperation" – of which Spain is a member, includes 19 countries, all of them European, apart from Japan and South Korea. The third group – "Limited cooperation" – consists of countries such as France, Israel, India and Pakistan; while the fourth – "Exceptional Cooperation" – is made up of countries that the US considers to be hostile to its interests. The NSA documents [suggest] the Spanish intelligence services were working hand in hand with the NSA, as were other foreign agencies. But if there was any doubt as to who held the upper hand, the NSA documents make clear that any collaboration was always to serve the needs of protecting American interests.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
It has long been known that the Warren Commission ... was flawed in ways that led to generations of conspiracy theories about what happened on Nov. 22, 1963. A [new] book from former New York Times reporter Philip Shenon digs into exactly what the commission got wrong, both by intentional concealment, or, in Shenon's view, extensive attempts by both the CIA and FBI to withhold just how much they knew about Kennedy assassin Lee Harvey Oswald. "Much of the truth about the Kennedy assassination has still not been told, [and] much of the evidence about the president's murder was covered up or destroyed - shredded, incinerated, or erased - before it could reach the commission," Shenon writes in the prologue to A Cruel and Shocking Act: The Secret History of the Kennedy Assassination, which draws its title from the first sentence of the commission's report. Shenon tells the story of how Navy pathologist James Humes threw his blood-stained notes from Kennedy's autopsy into the fire after he transcribed a fresh copy of the report. He said that he wanted to keep the documents from falling into the hands of "ghouls," and gave a similar rationale for ordering that the sheets that covered Kennedy's head wounds in Dallas be laundered during the autopsy. The commission's investigators never even saw the photos and X-rays from the autopsy. Shenon also points to the CIA as having taken great steps to cover up their knowledge of Oswald's visit to Mexico City before the assassination.
Note: As the 50th anniversary of the Kennedy assassination approaches see our powerful JFK assassination information center and the best videos and news articles on the topic. For more on political assassinations, see the deeply revealing reports from reliable major media sources available here.
Recently, the US House of Representatives voted on an amendment ... that would have curbed the NSA's omnipresent and inescapable [spying] tactics. Despite furious lobbying by the intelligence industrial complex and its allies, and four hours of frantic and overwrought briefings by the NSA's General Keith Alexander, 205 of 422 Representatives voted for the amendment. The vote signaled a clear message to the NSA: we do not trust you. The vote also conveyed another, more subtle message: members of Congress do not trust that the House Intelligence Committee is providing the necessary oversight. On the contrary, "oversight" has become "overlook". Despite being a member of Congress possessing security clearance, I've learned far more about government spying on me and my fellow citizens from reading media reports than I have from "intelligence" briefings. My colleagues feel the same way. In fact, one long-serving conservative Republican told me that he doesn't attend such briefings anymore, because, "they always lie". Many of us worry that Congressional Intelligence Committees are more loyal to the "intelligence community" that they are tasked with policing, than to the Constitution. And the House Intelligence Committee isn't doing anything to assuage our concerns. Supporters of the NSA's vast ubiquitous domestic spying operation assure the public that members of Congress can be briefed on these activities whenever they want. Senator Saxby Chambliss says all a member of Congress needs to do is ask for information, and he'll get it. Well I did ask, and the House Intelligence Committee said "no", repeatedly. And virtually every other member not on the Intelligence Committee gets the same treatment.
Note: The above article was written by courageous U.S. Congressman Alan Grayson. For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden. The confidential memo reveals that the NSA encourages senior officials in its "customer" departments, such as the White House, State and the Pentagon, to share their "Rolodexes" so the agency can add the phone numbers of leading foreign politicians to their surveillance systems. The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately "tasked" for monitoring by the NSA. The revelation is set to add to mounting diplomatic tensions between the US and its allies, after the German chancellor Angela Merkel ... accused the US of tapping her mobile phone. The NSA memo obtained by the Guardian suggests that such surveillance was not isolated, as the agency routinely monitors the phone numbers of world leaders – and even asks for the assistance of other US officials to do so. The memo, dated October 2006 and which was issued to staff in the agency's Signals Intelligence Directorate (SID), was titled "Customers Can Help SID Obtain Targetable Phone Numbers". In the wake of the Merkel row, the US is facing growing international criticism that any intelligence benefit from spying on friendly governments is far outweighed by the potential diplomatic damage.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The United States is facing increasingly harsh criticism over its use of lethal drone strikes to target suspected terrorists. American drone strikes in Pakistan and Yemen may amount to war crimes, according to a pair of reports released by international human rights groups. Examining nine drone strikes in Pakistan, the Amnesty International report concludes that the attacks killed large numbers of innocent civilians, and accuses the U.S. of targeting rescuers who arrive in the aftermath of the strikes to aid the wounded. A report from Human Rights Watch states that the majority of people killed by six drone strikes in Yemen were civilians (57 out of the 82 killed). The groups’ findings that the United States has killed more civilians than it has admitted are bolstered by a UN report ... that stated U.S. drone strikes had killed as many as 400 civilians in Pakistan and almost 60 in Yemen. These reports clash with the U.S. government’s own assessment of the strikes. Officials have maintained that civilian casualties from drone strikes are minimal, even in the face of multiple third-party evaluations that state otherwise. Both groups are demanding that the Obama administration investigate allegations of civilian deaths, release more information about the legal basis for drone strikes on suspected terrorists, provide restitution to those unjustly harmed and reveal the identities of those who lost their lives in the attacks.
Note: If a single civilian in the US were killed by a foreign drone, the entire nation would be up in arms. Do we have a double standard here? For more on this, see concise summaries of deeply revealing war atrocities news articles from reliable major media sources.
The Transportation Security Administration is expanding its screening of passengers before they arrive at the airport by searching a wide array of government and private databases that can include records like car registrations and employment information. It is unclear precisely what information the agency is relying upon to make these risk assessments, given the extensive range of records it can access, including tax identification number, past travel itineraries, property records, physical characteristics, and law enforcement or intelligence information. The measures go beyond the background check the government has conducted for years, called Secure Flight, in which a passenger’s name, gender and date of birth are compared with terrorist watch lists. Now, the search includes using a traveler’s passport number, which is already used to screen people at the border, and other identifiers to access a system of databases maintained by the Department of Homeland Security. “I think the best way to look at it is as a pre-crime assessment every time you fly,” said Edward Hasbrouck, a consultant to the Identity Project, one of the groups that oppose the prescreening initiatives. “The default will be the highest, most intrusive level of search, and anything less will be conditioned on providing some additional information in some fashion.” Critics argue that the problem with what the agency calls an “intelligence-driven, risk-based analysis” of passenger data is that secret computer rules, not humans, make these determinations. Civil liberties groups have questioned whether the agency has the legal authority to make these assessments.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
What are we to make of Edward Snowden? I know what I once made of him. He was no real whistleblower, I wrote, but “ridiculously cinematic” and “narcissistic” as well. As time has proved, my judgments were just plain wrong. Whatever Snowden is, he is curiously modest and has bent over backward to ensure that the information he has divulged has done as little damage as possible. As a “traitor,” he lacks the requisite intent and menace. But traitor is what Snowden has been roundly called. Harry Reid: “I think Snowden is a traitor.” John Boehner: “He’s a traitor.” Rep. Peter King: “This guy is a traitor; he’s a defector.” And Dick Cheney not only denounced Snowden as a “traitor” but also suggested that he might have shared information with the Chinese. This innuendo, as with Saddam Hussein’s weapons of mass destruction, is more proof of Cheney’s unerring determination to be cosmically wrong. The early denunciations of Snowden now seem both over the top and beside the point. If he is a traitor, then which side did he betray and to whom does he now owe allegiance? Snowden seems to have sold out to no one. In fact, a knowledgeable source says that Snowden has not even sold his life story and has rebuffed offers of cash for interviews. Maybe his most un-American act is passing up a chance at easy money. Someone ought to look into this. Snowden’s residency in Russia has been forced upon him — he had nowhere else to go. Snowden insists that neither the Russians nor, before them, the Chinese have gotten their grubby hands on his top-secret material.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.