Intelligence Agency Corruption Media ArticlesExcerpts of Key Intelligence Agency Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic. The disclosure raises new questions about the boundaries of surveillance by GCHQ [Government Communications Headquarters] and its American sister organisation, the National Security Agency [NSA], whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. They reveal that during G20 meetings in April and September 2009 GCHQ used what one document calls "ground-breaking intelligence capabilities" to intercept the communications of visiting delegations. This included: • Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates' use of computers; • Penetrating the security on delegates' BlackBerrys to monitor their email messages and phone calls; • Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit.
Note: For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here
When a National Security Agency contractor revealed top-secret details this month on the government's collection of Americans' phone and Internet records, one select group of intelligence veterans breathed a sigh of relief. Thomas Drake, William Binney and J. Kirk Wiebe belong to a select fraternity: the NSA officials who paved the way. For years, the three whistle-blowers had told anyone who would listen that the NSA collects huge swaths of communications data from U.S. citizens. They had spent decades in the top ranks of the agency, designing and managing the very data-collection systems they say have been turned against Americans. When they became convinced that fundamental constitutional rights were being violated, they complained first to their superiors, then to federal investigators, congressional oversight committees and, finally, to the news media. They have been investigated as criminals and forced to give up careers, reputations and friendships built over a lifetime. Today, they feel vindicated. They say the documents leaked by Edward Snowden, the 29-year-old former NSA contractor who worked as a systems administrator, proves their claims of sweeping government surveillance of millions of Americans not suspected of any wrongdoing. They say those revelations only hint at the programs' reach. On [June 15], USA TODAY brought Drake, Binney and Wiebe together for the first time since the story broke to discuss the NSA revelations. With their lawyer, Jesselyn Radack of the Government Accountability Project, they weighed their implications and their repercussions.
Note: See the link above for a great interview of these courageous whistleblowers. For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here
The modern American surveillance state is not really the stuff of paranoid fantasies; it has arrived. The revelations about the National Security Agency’s PRISM data collection program have raised awareness ... about the reach and power of secret intelligence gatherers operating behind the facades of government and business. But those revelations ... have been partial — they primarily focus on one government agency and on the surveillance end of intelligence work, purportedly done in the interest of national security. What has received less attention is the fact that most intelligence work today is not carried out by government agencies but by private intelligence firms and that much of that work involves another common aspect of intelligence work: deception. That is, it is involved not just with the concealment of reality, but with the manufacture of it. Important insight into the world [of] these companies came from a 2010 hack by a group best known as LulzSec ... which targeted the private intelligence firm HBGary Federal. That hack yielded 75,000 e-mails. Team Themis (a group that included HBGary and the private intelligence and security firms Palantir Technologies, Berico Technologies and Endgame Systems) was effectively brought in to find a way to undermine the credibility of WikiLeaks and the journalist Glenn Greenwald (who recently broke the story of Edward Snowden’s leak of the N.S.A.’s Prism program), because of Greenwald’s support for WikiLeaks. The plan called for actions to “sabotage or discredit the opposing organization” including a plan to submit fake documents and then call out the error.
Note: For more on the games intelligence agencies play, see the deeply revealing reports from reliable major media sources available here.
Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.
Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
Senior State Department and Diplomatic Security officials may have covered up or stopped investigations of inappropriate or even criminal misconduct by staff, according to an internal memo from the department's Office of the Inspector General. An active U.S. ambassador "routinely ditched his protective security detail in order to solicit sexual favors from both prostitutes and minor children," the memo says. The ambassador's protective detail and others "were well aware of the behavior," the memo asserts. When a diplomatic security officer tried to investigate, undersecretary of state for management Patrick Kennedy allegedly ordered the investigator "not to open a formal investigation." A State Department security official in Beirut allegedly "engaged in sexual assaults" against foreign nationals working as embassy guards. The security official ... was also accused of committing "similar assaults during assignments in Baghdad, and possibly Khartoum and Monrovia." An inspector general's investigator who went to Beirut to try to conduct an investigation was not given enough time to complete the job. U.S. Rep. Ed Royce, R-California, chairman of the House Foreign Affairs Committee, said he has asked his staff to begin an investigation into the allegations, and sent a letter to Secretary of State John Kerry demanding an explanation. "The notion that any or all of these cases would not be investigated thoroughly by the Department is unacceptable," Royce wrote in his letter to Kerry.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Long before Edward Snowden walked out of the NSA with his trove of documents, whistleblowers there had been trying for years to bring attention to the massive turn toward domestic spying that the agency was making. Last year in my Wired cover story on the enormous new NSA data center in Utah, Bill Binney, the man who largely designed the agency’s worldwide eavesdropping system, warned of the secret, nationwide surveillance. He told how the NSA had gained access to billions of billing records not only from AT&T but also from Verizon. I also wrote about Adrienne J. Kinne, an NSA intercept operator who attempted to blow the whistle on the NSA’s illegal eavesdropping on Americans following the 9/11 attacks. She [attempted and failed] to end the illegal activity with appeals all the way up the chain of command to Major General Keith Alexander. The deception by General Alexander is especially troubling. In my new cover story for Wired’s July issue ...I show how he has become the most powerful intelligence chief in the nation’s history. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the U.S. Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.
Note: James Bamford, the author of this article, was the ABC producer responsible for breaking the story on Operation Northwoods, which proved a level of deception almost beyond belief at the very highest levels of the Pentagon. For more on this, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
Since 9/11, there has been, at first secretly but increasingly openly, a revocation of the bill of rights for which this country fought over 200 years ago. In particular, the fourth and fifth amendments of the US constitution, which safeguard citizens from unwarranted intrusion by the government into their private lives, have been virtually suspended. The United States is not now a police state. But given the extent of this invasion of people's privacy, we do have the full electronic and legislative infrastructure of such a state. These powers are extremely dangerous. There are legitimate reasons for ... secrecy about communications intelligence. But what is not legitimate is to use a secrecy system to hide programs that are blatantly unconstitutional. In 1975, Senator Frank Church spoke of the National Security Agency in these terms: "I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return." The dangerous prospect of which he warned was that America's intelligence gathering capability – which is today beyond any comparison with what existed in his pre-digital era – "at any time could be turned around on the American people and no American would have any privacy left." That has now happened. That is what [Edward] Snowden has exposed, with official, secret documents. We have fallen into Senator Church's abyss.
Note: The above was written by Daniel Ellsberg, a former US military analyst who in 1971 leaked the Pentagon Papers, showing how the US public had been misled about the Vietnam war. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
In 1982, long before most Americans ever had to think about warrantless eavesdropping, the journalist James Bamford published “The Puzzle Palace: A Report on N.S.A., America’s Most Secret Agency,” the first book to be written about the National Security Agency. In the book, Bamford describes the agency as “free of legal restrictions” while wielding “technological capabilities for eavesdropping beyond imagination.” He concludes with an ominous warning: “Like an ever-widening sinkhole, N.S.A.’s surveillance technology will continue to expand, quietly pulling in more and more communications and gradually eliminating more and more privacy.” Three decades later, this pronouncement feels uncomfortably prescient: we were warned. Incredibly enough, the Department of Justice, under Jimmy Carter, complied with Bamford’s Freedom of Information Act requests, supplying him with secret documents related to the Church Committee, the Senate group that, in 1975, investigated American intelligence agencies for potential transgression of their mandates. That the government would hand over sensitive information to Bamford predictably infuriated the N.S.A.; Reagan Administration lawyers tried to bully Bamford into ceding his goods, threatening him with the Espionage Act, while the N.S.A. attempted to sequester the documents he’d uncovered. But because he was a lawyer, Bamford knew that he had done nothing wrong.
Note: As a producer for ABC News, Bamford was also the one who obtained startling declassified documents showing that the top Pentagon generals signed off on plans in the early 1960s to blow up a US ship in the Havana harbor or incite violent terrorism in US cities and blame it on Cuba. Strangely, ABC's article "U.S. Military Wanted to Provoke War With Cuba" was the only media report on this incredibly revealing document release. For more along these lines, see concise summaries of revealing news articles on intelligence agency corruption and the disappearance of privacy.
The State Department may have covered up allegations of illegal and inappropriate behavior within their ranks. The Diplomatic Security Service, or the DSS, is the State Department's security force, charged with ... investigating any cases of misconduct. According to an internal State Department Inspector General's memo, several recent investigations were influenced, manipulated, or simply called off. The memo obtained by CBS News cited eight specific examples. Among them: allegations that a State Department security official in Beirut "engaged in sexual assaults" on foreign nationals hired as embassy guards. The memo also reveals details about an "underground drug ring" was operating near the U.S. Embassy in Baghdad and supplied State Department security contractors with drugs. Aurelia Fedenisn, a former investigator with the State Department's internal watchdog agency, the Inspector General, told Miller, "We also uncovered several allegations of criminal wrongdoing in cases, some of which never became cases." In such cases, DSS agents told the Inspector General's investigators that senior State Department officials told them to back off. In one specific and striking cover-up, State Department agents told the Inspector General they were told to stop investigating the case of a U.S. Ambassador who held a sensitive diplomatic post and was suspected of patronizing prostitutes in a public park.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs. The program, code-named PRISM, has not been made public until now. It may be the first of its kind. Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” GCHQ, Britain’s equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority. Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.
Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.
The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata — a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, it’s possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So it’s possible the NSA is using rooms like that to listen to everyone’s phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but it’s hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.
Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.
What if government officials have written laws that apply only to us and not to them? What if we gave them the power to protect our freedoms and our safety and they used that power to trick and trap some of us? What if government officials broke the laws we hired them to enforce? What if they prosecuted others for breaking the same laws they broke? What if the government enacted a law making it a crime to provide material assistance to terrorist organizations? What if the government looked at that law and claimed it applied to a dentist or a shopkeeper who sold services or goods to a terrorist organization, and not just to financiers and bomb makers? What if the Supreme Court ruled that the law is so broad that it covers backslapping, advocacy and free speech? What if the law is so broad that it punishes ideas and the free expression of those ideas, even if no one is harmed thereby? What if FBI agents pretended to be members of these terrorist organizations and set out to find people in America who were willing to join? What if the FBI arrested the people it found and encouraged just as they were about to leave the U.S. and then charged them with providing material assistance to terrorist organizations? What if the president boasted that in his mind these duped dopes were really terrorists and their arrests kept us all safer? What if offensive wars are illegal and morally wrong? What if killing is evil when not done in self-defense? What if those who kill not in self-defense are prosecuted and punished, except when they do so in large numbers and to the sounds of trumpets blaring? What do we do about a government that breaks the laws we have hired it to enforce?
Note: Andrew P. Napolitano, author of this opinion, is the senior judicial analyst at Fox News Channel. Judge Napolitano has written seven books on the U.S. Constitution. His latest is Theodore and Woodrow: How Two American Presidents Destroyed Constitutional Freedom.
Former U.S. Sen. Bob Graham has accused the FBI in court papers of having impeded Congress’s Joint Inquiry into 9/11 by withholding information about a Florida connection to the ... attacks that killed nearly 3,000 people. The information ... includes a recently declassified FBI report that ties a Saudi family who once lived in Sarasota “to individuals associated with the terrorist attacks on 9/11/2001.” “The FBI’s failure to call (to the Joint Inquiry’s attention) documents finding ‘many connections’ between Saudis living in the United States and individuals associated with the terrorist attack(s) … interfered with the Inquiry’s ability to complete its mission,” said Graham, co-chairman of the Joint Inquiry. Graham said the FBI kept the 9/11 Commission in the dark, too. He said co-chairmen Thomas Kean and Lee Hamilton and executive director Philip Zelikow all told him they were unaware of the FBI’s Sarasota investigation. Moreover, Graham stated that Deputy FBI Director Sean Joyce, the Bureau’s second in command, personally intervened to block him from speaking with the special agent-in-charge of the Sarasota investigation. “I am troubled by what appears to me to be a persistent effort by the FBI to conceal from the American people information concerning possible Saudi support of the Sept. 11 attacks,” Florida’s former governor said.
Note: For deeply revealing reports from reliable major media sources on the 9/11 attacks, click here.
[Daniel] Ellsberg is one of the most outspoken critics of the Obama administration’s prosecution of leakers. Under President Obama’s tenure, the government has prosecuted six individuals for releasing classified information to media organizations. Ellsberg is particularly fierce in his support of Bradley Manning, a young soldier who released a large amount of classified information to WikiLeaks. Manning was arrested in 2010, and his military court-martial began this week. Ellsberg considers Manning a hero, and he argues that there is little difference between what Manning did in 2010 and what Ellsberg did four decades earlier. [Q.}: In a 1973 interview, you said that a “secondary objective” of releasing the Pentagon Papers was “the hope of changing the tolerance of Executive secrecy that had grown up over the last quarter of a century both in Congress and the courts and in the public at large.” How has that “tolerance of secrecy” changed over the last four decades? DE: There’s been very great tolerance that if the magic words “national security,” or the new words “homeland security” are invoked, Congress has given the president virtually a free hand in deciding what information they will know as well as the public. I wouldn’t count on the current court with its current makeup making the same ruling with the Pentagon Papers as they did 40 years ago. I’m sure that President Obama would have sought a life sentence in my case. Various things that were counted as unconstitutional then have been put in the president’s hands now. He’s become an elected monarch. Nixon’s slogan, “when the president does it, it’s not illegal,” is pretty much endorsed now.
Note: To see key quotes showing the amazing courage and dedication of Snowden, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
The case of Stephen Jin-Woo Kim, the government adviser, and James Rosen, the chief Washington correspondent for Fox News, bears striking similarities to a sweeping leaks investigation disclosed last week in which federal investigators obtained records over two months of more than 20 telephone lines assigned to the Associated Press. At a time when President Obama’s administration is under renewed scrutiny for an unprecedented number of leak investigations, the Kim case provides a rare glimpse into the inner workings of one such probe. Court documents in the Kim case reveal how deeply investigators explored the private communications of a working journalist - and raise the question of how often journalists have been investigated as closely as Rosen was in 2010. The case also raises new concerns among critics of government secrecy about the possible stifling effect of these investigations on a critical element of press freedom: the exchange of information between reporters and their sources. “The latest events show an expansion of this law enforcement technique,” said attorney Abbe Lowell, who is defending Kim on federal charges filed in 2010 that he disclosed national defense information. “Individual reporters or small time periods have turned into 20 [telephone] lines and months of records with no obvious attempt to be targeted or narrow.” The Obama administration has pursued more such cases than all previous administrations combined.
Note: Read more about the Kim case in this article. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation.
The 9/11 Consensus Panel now offers four evidence-based points about the alleged phone calls from the 9/11 flights. The famous "let's roll" drama of the passenger revolt on UA 93 was relayed by passenger Todd Beamer's 13-minute unrecorded seat-back call to GTE telephone supervisor Lisa Jefferson, who reported Beamer as strangely tranquil, declining to speak to his wife. Eerily, Beamer's line remained open for 15 minutes after the crash. Oddly, the Verizon wireless record shows that 19 calls were made from Beamer's cell phone long after the crash of UA 93. Initial media reports and FBI interviews detailed more than a dozen cell phone calls from the planes at high elevation. Yet in 2001, a telephone spokesperson stated that sustained mobile calls were not possible above 10,000 feet. During the 2006 Moussaoui Trial, the FBI (under oath) reduced the number of cell phone calls to two calls made from 5,000 feet, and presented evidence of only one (not two) "unconnected" call from Barbara Olson, lasting "0 seconds." In another twist, two other women reported that Caller-ID showed their husband's cell numbers on their answering machines, which while lasting several minutes, had been made from elevations of 25,000 and 35,000 feet. Although the FBI conducted a massive investigation into the calls, none of the telephone billing, nor any of the cell phone location data stored in standard phone company records has been publicly released.
Note: The 9/11 Consensus Panel, consisting of scientists, pilots, professors, attorneys, and journalists, has developed 32 Points of evidence contradicting specific claims made by the official account of 9/11. For many unanswered questions about 9/11 raised by highly credible former government officials and professors, click here and here. For our 9/11 Information Center filled with reliable, verifiable 9/11 resources, click here.
The FBI did not initially share with Boston police the warnings it had received from Russia about one suspect in last month's marathon bombings, despite the work of four city police representatives on a federal terrorism task force, Boston's police commissioner told Congress on [May 9]. Boston police learned about the Russian security service warnings only later. The congressional hearing was the first in a series to review the government's initial response to the attacks, ask what information authorities received about Tsarnaev and his brother before the bombings and consider whether everything was handled correctly. Some lawmakers questioned whether Boston police could have more thoroughly investigated Tsarnaev after 2011, based on Russia's vague warnings then to the FBI and CIA or the discovery by the Homeland Security Department in 2012 that he was traveling to Russia for six months, and whether Justice Department rules intended to protect civil liberties constrained the FBI's own inquiry. Led by the FBI, Joint Terrorism Task Forces operate in many cities as a way to bring federal, state and local officials together to share information. The model has existed for decades but, after 9/11, task forces sprouted up in cities nationwide to ensure that police were not out of the loop on investigations like the one the FBI conducted into Tsarnaev.
Note: For a powerful 11-minute video presenting undeniable evidence that the Boston bombers' uncle was closely linked to both the CIA and terrorist organizations, click here. Many are questioning whether the recent Boston bombing was a false flag operation. Though it is not conclusive, you can find some very reliable evidence that this might be the case at this link and this one. For deeply revealing reports from reliable major media sources on the deceptions of intelligence agencies, click here.
For more than a decade, wads of American dollars packed into suitcases, backpacks and, on occasion, plastic shopping bags have been dropped off every month or so at the offices of Afghanistan’s president — courtesy of the Central Intelligence Agency. All told, tens of millions of dollars have flowed from the C.I.A. to the office of President Hamid Karzai, according to current and former advisers to the Afghan leader. “We called it ‘ghost money,’ ” said Khalil Roman, who served as Mr. Karzai’s deputy chief of staff from 2002 until 2005. “It came in secret, and it left in secret.” The C.I.A. ... has long been known to support some relatives and close aides of Mr. Karzai. But the new accounts of off-the-books cash delivered directly to his office show payments on a vaster scale, and with a far greater impact on everyday governing. Moreover, there is little evidence that the payments bought the influence the C.I.A. sought. Instead, some American officials said, the cash has fueled corruption and empowered warlords, undermining Washington’s exit strategy from Afghanistan. “The biggest source of corruption in Afghanistan,” one American official said, “was the United States.” Now, Mr. Karzai is seeking control over the Afghan militias raised by the C.I.A. to target ... insurgent commanders, potentially upending a critical part of the Obama administration’s plans for fighting militants as conventional military forces pull back this year. But the C.I.A. has continued to pay.
Note: For deeply revealing reports from reliable major media sources on government corruption, click here.
The initial debate over the treatment of Dzhokhar Tsarnaev focused on whether he should be advised of his Miranda rights or whether the "public safety exception" justified delaying it. Now, the Los Angeles Times ... reports something which, if true, would be a much more serious violation of core rights than delaying Miranda warnings - namely, that ... Tsarnaev had repeatedly asked for a lawyer, but the FBI simply ignored those requests, instead allowing the interagency High Value Detainee Interrogation Group to continue to interrogate him alone: "Tsarnaev has not answered any questions since he was given a lawyer and told he has the right to remain silent by Magistrate Judge Marianne B. Bowler on Monday, officials said. Until that point, Tsarnaev had been responding to the interagency High Value Detainee Interrogation Group, including admitting his role in the bombing, authorities said. A senior congressional aide said Tsarnaev had asked several times for a lawyer, but that request was ignored since he was being questioned under the public safety exemption to the Miranda rule." Denying him the right to a lawyer after he repeatedly requests one is ... as fundamental a violation of crucial guaranteed rights as can be imagined. To ignore the repeated requests of someone in police custody for a lawyer, for hours and hours, is just inexcusable and legally baseless. If the LA Times report is true, then it means that the DOJ did not merely fail to advise him of his right to a lawyer but actively blocked him from exercising that right.
Note: The government appears to be setting a precedent in seeing how far they can go with taking away our constitutionally guaranteed rights. For deeply revealing reports from reliable major media sources on civil liberties, click here.
Two U.S. officials say Dzhokhar Tsarnaev, the surviving suspect [in the Boston Marathon bombings], was unarmed when police captured him hiding inside a boat in a neighborhood back yard. Authorities originally said they had exchanged gunfire with Dzhokhar for more than one hour Friday evening before they were able to subdue him. The officials tell The Associated Press that no gun was found in the boat. Boston Police Commissioner Ed Davis said earlier that shots were fired from inside the boat. Investigators also believe the brothers helped finance their plot through drug sales. Sources say Tamerlan Tsarnaev, who was unemployed, made money selling marijuana. Police think the brothers killed a Massachusetts Institute of Technology campus police officer for his weapon while they were the subjects of last week's massive manhunt. The brothers only had one real gun and one pellet gun when they were on the run Thursday. Investigators now believe that Officer Sean Collier was killed Thursday because the two bombing suspects wanted to take his gun. Investigators believe because the officer's holster had a locking system, they apparently couldn't get the gun out. Collier was shot in the head execution-style while sitting in his patrol car. In his questioning in the hospital, Dzhokhar Tsarnaev said they were self-taught and self-radicalized.
Note: Don't these details released by investigators sound odd? If Dzhokhar was not armed, why did authorities say they exchanged gunfire for an hour? And previous reports claimed Dzhokhar was shot in the throat, so that he could not speak about his version of what happened. High strangeness here. For powerful evidence from a respected researcher that the uncle of the Boston bombers was a top CIA official, click here. This is evidence supporting the theory that the brothers may have been CIA-controlled Manchurian Candidates. For more on this, click here.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.