Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Findings of the Select Committee on Assassinations in the Assassination of President John F. Kennedy in Dallas, Tex., November 22, 1963. Scientific acoustical evidence establishes a high probability that two gunmen fired at President John F. Kennedy. Other scientific evidence does not preclude the possibility of two gunmen firing at the President. The committee believes, on the basis of the evidence available to it, that President John F. Kennedy was probably assassinated as a result of a conspiracy. The committee is unable to identify the other gunman or the extent of the conspiracy. The [original] investigation into the possibility of conspiracy in the assassination was inadequate. The conclusions of the investigations were arrived at in good faith, but presented in a fashion that was too definitive. The Department of Justice failed to exercise initiative in supervising and directing the investigation by the Federal Bureau of Investigation of the assassination. The Federal Bureau of Investigation failed to investigate adequately the possibility of a conspiracy to assassinate the President. The Central Intelligence Agency was deficient in its collection and sharing of information both prior to and subsequent to the assassination. The Warren Commission failed to investigate adequately the possibility of a conspiracy to assassinate the President.
Note: This same US Congressional report, on the subject of the Martin Luther King, Jr. assassination, states that "The committee believes, on the basis of the circumstantial evidence available to it, that there is a likelihood that James Earl Ray assassinated Dr. Martin Luther King as a result of a conspiracy." Why hasn't this information been widely reported and become public knowledge? Explore a possible answer. For more along these lines, see concise summaries of deeply revealing news articles on assassinations from reliable major media sources.
A posthypnotic of the night before (pointed finger, you will sleep) was enacted. Misses [deleted] and [deleted] immediately progressed to a deep hypnotic state with no further suggestion. Miss [deleted] was then instructed (having previously expressed a fear of firearms in any fashion) that she would use every method at her disposal to awaken Miss [deleted] (now in a deep hypnotic sleep) and failing this, she would pick up a pistol nearby and fire it at Miss [deleted]. She was instructed that her rage would be so great that she would not hesitate to kill [deleted] for failing to awaken. Miss [deleted] carried out these suggestions to the letter including firing the (unloaded) gun at [deleted] and then proceeding to fall into a deep sleep. Both were awakened and expressed complete amnesia for the entire sequence. Miss [deleted] was again handed the gun, which she refused (in an awakened state) to pick up or accept from the operator. She expressed absolute denial that the foregoing sequence had happened.
Note: This text is quoted from page 1 of declassified CIA document MORI ID 190691. To verify the statement in the text, make a FOIA (Freedom of Information Act) request as described here, or directly view a scanned copy online here. To access thousands of pages of declassified CIA mind control documents online, click here. For lots more reliable information on this crucial topic, click here. For many revealing news articles on mind control, click here.
For nearly nine months the congressional investigations of the Central Intelligence Agency have been conducted behind closed doors. In the old Senate caucus room the ten members of the select Senate committee were questioning CIA officials, including Director William Colby and the deputy director for science and technology, Sayre Stevens, about 11 gm. of shellfish toxin and 8 mg. of cobra venom discovered last May in a CIA storeroom. Colby revealed that the agency in 1952 began a supersecret research program, code-named M.K. Naomi, partly to find countermeasures to chemical and biological weapons that might be used by the Russian KGB. CIA researchers ... came up with an array of James Bond weaponry that could use the shellfish toxin and other poisons as ammunition. To illustrate his testimony, Colby handed a pistol to Committee Chairman Frank Church. Resembling a Colt .45 equipped with a fat telescopic sight, the gun fires a toxin-tipped dart, almost silently and accurately up to 250 ft. Moreover, the dart is so tinythe width of a human hair and a quarter of an inch longas to be almost indetectable, and the poison leaves no trace in a victim's body. Charles Senseney, an engineer for the Defense Department, told the Senators that he had devised dart launchers that were disguised as walking canes and umbrellas.
Note: This silent, lethal dart gun causes what looks like a natural heart attack. If this sophisticated assassination technology was available back in 1975, what kind of secret weapons do you think they have now? To watch an incredible one-minute video clip on this dart gun, click here. To watch the full, highly revealing Warner Brothers documentary Secrets of the CIA, click here. For other riveting major media articles along these lines, click here.
Project Blue Book was the code name for an Air Force program set up in 1952 ... to explain away or debunk as many [UFO] reports as possible in order to mitigate possible panic and shield the public from a genuine national security problem. The prominent astronomer J. Allen Hynek ... was recruited as Blue Books scientific consultant and was indeed initially committed to explaining away flying saucers as natural phenomena or mistaken identifications. Hynek, the former U.F.O. skeptic, eventually concluded that they were a real phenomenon in dire need of scientific attention, with hundreds of cases in the Blue Book files still unexplained. Even many of the closed cases were resolved with ridiculous, often infuriating explanations, sometimes by Hynek himself. Blue Book compiled reports of 12,618 sightings of unidentified flying objects, of which 701 remain unexplained to this day. The mystery of the elusive flying objects is still far from solved. In 1947. Lt. General Nathan Twining ... sent a secret memo on Flying Discs to the commanding general of the Army Air Forces at the Pentagon. Twining stated that the phenomenon reported is something real and not visionary or fictitious. Documents show the C.I.A. then devised a plan for a national policy, as to what should be told the public regarding the phenomenon, in order to minimize risk of panic. The C.I.A. issued a secret report recommending a broad educational program for all intelligence agencies, with the aim of training and debunking. When Blue Book closed in late 1969, the Air Force flatly lied to the American people.
Note: For more along these lines, see concise summaries of deeply revealing news articles on a UFO cover-up from reliable major media sources. Then explore the excellent, reliable resources provided in our UFO Information Center.
The U.S. government [planned] false flag attacks with Soviet aircraft to justify war with the USSR or its allies, newly declassified documents surrounding the assassination of President John F. Kennedy show. In a three-page memo, members of the National Security Council wrote, "There is a possibility that such aircraft could be used in a ... provocation operation in which Soviet aircraft would appear to attack US or friendly installations to provide an excuse for U.S. intervention." The memo shows that the department, along with the CIA, considered buying Soviet aircraft to stage the attacks, even getting estimates from the Air Force on how long it would take and how much it would cost to produce the planes domestically and covertly. The document also outlined the possibility of purchasing such aircraft from non-Soviet Bloc countries that had received planes from the USSR, or from pilots that had defected, instead of building them domestically. The CIA deemed those plans too risky. It is unclear when the memo was written or circulated. The NSC staff mention a meeting on March 22, 1962, when a "Special Group" discussed the attorney general's questions about acquiring Soviet aircraft. The document was last reviewed by the CIA in February 1998, and a stamp shows it was declassified in March 2016. But, strangely, the document's cover letter shows a date of "00/00/00."
Note: ABC News back in 2001 was the only major media to report on Operation Northwoods, which is the code name for a very similar plan, when the first documents on this were declassified. As these earlier documents show, the plan was approved by the top Pentagon chiefs to create a pretext for war with Cuba by sinking an American ship in the Havana harbor or creating a "terror campaign" in cities like Miami and Washington D.C. Why was this stunning news only reported by ABC? For a possible reason, see this excellent summary of testimony by major media whistleblowers.
Wikipedia is part of the very internet developed by the military with public money in the 1950s-60s, then called ARPANET. Generally speaking, corporations hope that the systems developed in the military that evolve in the public-corporate realm–satellites, computers, data analysis, etc.–will inspire new military-intelligence innovations in a permanent feedback loop. The overarching "values" [of Wikipedia] and its contributors–mainly young, white, middle-class liberals–will reflect those "values". They include progressive slogans but reactionary policies, humanitarianism but pro-war positions, and conformity to consensus opinion even when the consensus is wrong (e.g., "regime change" in Libya and Syria). By 2006, the Intelligence Community had developed its own Intellipedia. A Top Secret report released under a FOIA request instructed intelligence officers how to edit Wikipedia's entry on MK-ULTRA, the CIA's mind control program (1953-circa 1970s), for Intellipedia. Funded by weapons contractors like BAE Systems and Boeing, and until recently led by people like Katherine Maher, ex-World Banker and Fellow of the Truman National Security Project, which exists to promote "US values" at home and abroad, the Wikimedia Foundation that enables Wikipedia does not exist in a vacuum. Wikipedia does not present unbiased, scholarly encyclopedia entries. It is as much part of the military-industrial-complex as mainstream corporate media.
Note: Some Wikipedia entries have been professionally manipulated. Watch a fascinating video with Larry Sanger, the co-founder of Wikipedia, who now says he no longer trusts the website he's helped created. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Facial recognition has become a security feature of choice for phones, laptops, passports, and payment apps. Yet it is also, increasingly, a tool of state oppression and corporate surveillance. Immigration and Customs Enforcement and the FBI have deployed the technology as a digital dragnet, searching for suspects among millions of faces in state driver's license databases, sometimes without first seeking a court order. In early 1963, [Woody Bledsoe] proposed to conduct "a study to determine the feasibility of a simplified facial recognition machine." A recently declassified history of the CIA's Office of Research and Development mentions just such a project in 1965; that same year, Woody sent a letter on facial recognition to John W. Kuipers, the division's chief of analysis. In 1967 ... Woody took on one last assignment that involved recognizing patterns in the human face. The purpose of the experiment was to help law enforcement agencies quickly sift through databases of mug shots and portraits, looking for matches. As before, funding for the project appears to have come from the US government. A 1967 document declassified by the CIA in 2005 mentions an "external contract" for a facial-recognition system that would reduce search time by a hundredfold. Woody's work set an ethical tone for research on facial recognition that has been enduring and problematic. The potential abuses of facial-recognition technology were apparent almost from its birth.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
[We've] been narrowly saved from lethal terrorist plots in recent years — or so it has seemed. A would-be suicide bomber was intercepted on his way to the Capitol; a scheme to bomb synagogues and shoot Stinger missiles at military aircraft was developed by men in Newburgh, N.Y.; and a fanciful idea to fly explosive-laden model planes into the Pentagon and the Capitol was hatched in Massachusetts. But all these dramas were facilitated by the F.B.I., whose undercover agents and informers posed as terrorists offering a dummy missile, fake C-4 explosives, a disarmed suicide vest and rudimentary training. Suspects naively played their parts until they were arrested. When an Oregon college student ... thought of using a car bomb to attack a festive Christmas-tree lighting ceremony in Portland, the F.B.I. provided a van loaded with six 55-gallon drums of “inert material,” harmless blasting caps, a detonator cord and a gallon of diesel fuel. An undercover F.B.I. agent even did the driving, with Mr. Mohamud in the passenger seat. To trigger the bomb the student punched a number into a cellphone and got no boom, only a bust. Typically, the stings initially target suspects for pure speech – comments to an informer outside a mosque, angry postings on Web sites, e-mails with radicals overseas – then woo them into relationships with informers, who are often convicted felons [or] F.B.I. agents posing as members of Al Qaeda or other groups. This is legal, but is it legitimate? Without the F.B.I., would the culprits commit violence on their own? Is cultivating potential terrorists the best use of the manpower designed to find the real ones?
Note: Read the entire article to find out just how far the FBI will go to entrap incompetent individuals. To read a New York Times article showing that the 1993 World Trade Center bombing involved similar entrapment, only the bomber was not stopped by knowing FBI agents, click here. More on that available here. For reports on other crazy cases of FBI entrapment, click here and here. For reliable, verifiable information suggesting 9/11 may have been facilitated in some way click here.
The New York Times's explanation of its decision to report, after what it said was a one-year delay, that the National Security Agency is eavesdropping domestically without court-approved warrants was woefully inadequate. And I have had unusual difficulty getting a better explanation for readers, despite the paper's repeated pledges of greater transparency. For the first time since I became public editor, the executive editor and the publisher have declined to respond to my requests for information about news-related decision-making. My queries concerned the timing of the exclusive Dec. 16 article about President Bush's secret decision in the months after 9/11 to authorize the warrantless eavesdropping on Americans in the United States. I e-mailed a list of 28 questions to Bill Keller, the executive editor [of the New York Times], on Dec. 19, three days after the article appeared. He promptly declined to respond to them. I then sent the same questions to Arthur Sulzberger Jr., the publisher, who also declined to respond. They held out no hope for a fuller explanation in the future. The top Times people involved in the final decisions [are] refusing to talk and urging everyone else to remain silent.
Sidney Gottlieb, who presided over the Central Intelligence Agency's cold-war efforts to control the human mind and provided the agency poisons to kill Fidel Castro, died on Sunday. He ... spent his later years caring for dying patients ... and fighting lawsuits from survivors of his secret tests. He will always be remembered as the Government chemist who dosed Americans with psychedelics in the name of national security. Mr. Gottlieb joined the C.I.A. in 1951. Two years later, the agency established MKUltra and Mr. Gottlieb was running it. He served two decades as the senior scientist presiding over some of the C.I.A.'s darkest secrets. The first of these were the LSD experiments. Mr. Gottlieb was fascinated by the drug [and] took it hundreds of times. In the 1950's and early 1960's, the agency gave mind-altering drugs to hundreds of unsuspecting Americans in an effort to explore the possibilities of controlling human consciousness. In one case, a mental patient in Kentucky was dosed with LSD continuously for 174 days. Other experiments involved agency employees, military officers and college students. In all, the agency conducted 149 separate mind-control experiments, and as many as 25 involved unwitting subjects. At least one participant died, others went mad, and still others suffered psychological damage after participating in the project, known as MK Ultra. The C.I.A. ... deliberately destroyed most of the MKUltra records in 1973. Mr. Gottlieb was also involved in the C.I.A.'s assassination plots. [He] developed a poison handkerchief to kill an Iraqi colonel, an array of toxic gifts to be delivered to Fidel Castro, and a poison dart to kill a leftist leader in the Congo.
Note: Read more about the CIA's MK-ULTRA program. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources. Then explore the excellent, reliable resources provided in our Mind Control Information Center.
Four years ago ago, officers of the Central Intelligence Agency and National Security Agency participated in a series of unusual experiments run by Stanford Research Institute (SRI) to verify claims that certain people have psychic abilities. The results ... were astonishing. The SRI investigators, physicists Harold E. Puthoff (a former NSA research engineer) and Russell Targ, set out to demonstrate to their CIA sponsor that their subjects, a noted psychic named Ingo Swann and ... Pat Price, could describe distant locations merely by knowing which geographic coordinates to "look at." Puthoff and Targ [call this] "remote viewing." In one case, Swann described and sketched with reasonable accuracy a target island in the South Indian Ocean. In another instance, Pat Price gave an incredibly detailed description of a supposedly secret, underground military installation in Virginia. "Hell, there's no security left," a government security officer exclaimed upon hearing of Price's alleged success at psychic spying. One of Ingo Swann's remote viewing demonstrations at SRI was to pinpoint the location of Soviet submarines around the world. The CIA scientist monitoring the tests ... believed he had a potential class A espionage agent who could roam psychically anywhere in the world – in effect, the perfect spy. For the past 25 years, various branches of the military and intelligence communities have actively investigated this highly controversial field of parapsychology. There is particular concern ... that the Russians are able telepathically to influence the behavior of others, alter their emotions or health, knock them out or even kill. CIA psychologists are swamped with proposals for psychic studies.
Note: This article strangely is not to be found anywhere in the online archives of the Washington Post. It is still available for a fee in the archives of smaller newspapers which published the article. The amazing entire article can be found free at the link above. For lots more along these lines, see a wealth of reliable videos and information on remote viewing. And a great documentary "Third Eye Spies" on remote viewing can be found here. Then explore the excellent, reliable resources provided in our Mind Control Information Center.
A new biography by Stephen Kinzer ... "Poisoner in Chief: Sidney Gottlieb and the CIA Search for Mind Control" ... traces the life and career of Gottlieb. [He was] the brains behind ... MK-ULTRA, the notorious research endeavor that employed mind-altering drugs, including LSD. In 1952, Gottlieb led a team of scientists to a safehouse in Munich ... where prisoners of war were pumped full of drugs, interrogated and then allowed to die. [Back in the U.S.,] Gottlieb worked with a sadistic narcotics officer in opening a "national security whorehouse" to dose unwitting victims being serviced by prostitutes on the C.I.A. payroll. Drugging johns was easy, but when Gottlieb started dosing unwitting government colleagues the research hit turbulence. Frank Olson, an Army scientist working with MK-ULTRA who had been given LSD without his knowledge, jumped, or was possibly pushed, out of a hotel room window in New York in 1953. [Olson's story is] covered most recently in [the] docudrama "Wormwood." His death has overshadowed the "expendables." We just don't know most of their names since Gottlieb destroyed the records. Some of the details in the book, like the coercion of African-American prisoners to participate in C.I.A. experiments, are astounding. [MK-ULTRA] should be remembered for what it was: a vehicle for abominable experiments that often targeted the most vulnerable – drug users, prisoners and psychiatric patients, who were deprived of meaningful informed consent. Kinzer's book is also a good reminder that there is rarely legal accountability for the C.I.A.'s misdeeds.
Note: Explore concise excerpts from the astounding declassified CIA documents on MK-ULTRA. They reveal a very successful program to create Manchurian Candidates or spies who don't know they are spies. The Times' title of this article implies that the CIA is no longer into mind control. If you think that is true, think again. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources. Then explore the excellent, reliable resources provided in our Mind Control Information Center.
There are three basic problems with the CIA: its objectives, methods, and unaccountability. In effect, the CIA is a secret army of the U.S., capable of creating mayhem across the world with no accountability whatsoever. When President Dwight Eisenhower decided that Africa's rising political star, democratically elected Patrice Lumumba of Zaire (now the Democratic Republic of Congo), was the "enemy," the CIA conspired in his 1961 assassination, thus undermining the democratic hopes for Africa. The CIA has been held to serious public account just once, in 1975. In that year, Idaho Senator Frank Church led a Senate investigation that exposed the CIA's shocking rampage of assassinations, coups, destabilization, surveillance, and Mengele-style torture and medical "experiments." Since 1975, the CIA has run secretive operations backing Islamic jihadists in Afghanistan that utterly wrecked Afghanistan while giving rise to al-Qaeda. The CIA has likely run secretive operations in the Balkans against Serbia, in the Caucuses against Russia, and in Central Asia targeting China, all deploying CIA-backed jihadists. In the 2010s, the CIA ran deadly operations to topple Syria's Bashir al-Assad, again with Islamic jihadists. For at least 20 years, the CIA has been deeply involved in fomenting the growing catastrophe in Ukraine, including the violent overthrow of Ukraine's President Viktor Yanukovych in February 2014 that triggered the devastating war now engulfing Ukraine.
Note: Learn more about the rise of the CIA in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
A whistleblower has come forward with an explosive new trove of documents. They describe the activities of an "anti-disinformation" group called the Cyber Threat Intelligence League, or CTIL, that officially began as the volunteer project of data scientists and defense and intelligence veterans but whose tactics over time appear to have been absorbed into ... those of the Department of Homeland Security (DHS). In 2019, US and UK military and intelligence contractors ... developed the sweeping censorship framework. CTIL ... partnered with [Cybersecurity and Infrastructure Security Agency] (CISA) in the spring of 2020. CTIL's approach to "disinformation" went far beyond censorship. The group engaged in offensive operations to influence public opinion, discussing ways to promote "counter-messaging," co-opt hashtags, dilute disfavored messaging, create sock puppet accounts, and infiltrate private invite-only groups. The ambitions of the 2020 pioneers of the Censorship Industrial Complex went far beyond simply urging Twitter to slap a warning label on Tweets, or to put individuals on blacklists. The [Adversarial Misinformation and Influence Tactics and Techniques] framework calls for discrediting individuals as a necessary prerequisite of demanding censorship against them. It calls for training influencers to spread messages. And it calls for trying to get banks to cut off financial services to individuals who organize rallies or events. [CTIL] laments that governments and corporate media no longer have full control of information. "For a long time, the ability to reach mass audiences belonged to the nation-state (e.g. in the USA via broadcast licensing through ABC, CBS and NBC). Now, however, control of informational instruments has been allowed to devolve to large technology companies who have been blissfully complacent and complicit in facilitating access to the public for information operators at a fraction of what it would have cost them by other means."
Note: The extensive collusion between Big Tech and government officials to censor COVID information is barely beginning to come to light. For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
The "Twitter files" revealed an FBI operation to monitor and censor social media content. Dozens of FBI employees worked on the identification and removal of material on a wide range of subjects and that Twitter largely carried out their requests. Nor was it just the FBI, apparently. Emails reveal FBI figures like a San Francisco assistant special agent in charge asking Twitter executives to "invite an OGA" (or "Other Government Organization") to an upcoming meeting. A week later, Stacia Cardille, a senior Twitter legal executive, indicated the OGA was the CIA, an agency under strict limits regarding domestic activities. Twitter's own ranks included dozens of ex-FBI agents and executives. The dozens of disclosed emails ... do not include still-undisclosed but apparent government coordination with Facebook and other social media companies. Much of that work apparently was done through the multi-agency Foreign Influence Task Force (FITF), which operated secretly it seems to censor citizens. This is a First Amendment violation. The Twitter files have substantiated long-standing concerns over "censorship by surrogate" or proxy. As with other amendments like the Fourth Amendment, which protects against unreasonable searches or seizures, the government cannot use private agents to do indirectly what it cannot do directly. Just as a police officer cannot direct a security guard to break into an apartment and conduct a search, the FBI cannot use Twitter to censor Americans.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
A large number of ex-officers from the FBI, CIA, NSC, and State Department have taken positions at Facebook, Twitter, and Google. The revelation comes amid fears the FBI operated control over Twitter censorship and the Hunter Biden laptop story. The Twitter files have revealed the close relationship with the FBI, how the Bureau regularly demanded accounts and tweets be banned and suspicious contact before the Hunter laptop story was censored. The documents detailed how so many former FBI agents joined Twitter's ranks over the past few years that they created their own private Slack channel. A report by Mint Press' Alan MacLeod identified dozens of Twitter employees, who had previously held positions at the Bureau. He also found that former CIA agents made up some of the top ranks in almost every politically-sensitive department at Meta, the parent company of Facebook, Instagram, and WhatsApp. And in another report, MacLeod detailed the extent to which former CIA agents started working at Google. DailyMail.com has now been able to track down nine former CIA agents who are working, or have worked, at Meta, including Aaron Berman, the senior policy manager for misinformation at the company who had previously written the president's daily briefings. Six others have worked for other intelligence agencies before joining the social media giant, many of whom have posted recently about Facebook's efforts to tamp down on so-called 'covert influence operations.'
Note: Explore a deeper analysis on the ex-CIA agents at Facebook and at Google. Additionally, read how Big Tech censors social media on behalf of corporate and government interests. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
The Department of Homeland Security is quietly broadening its efforts to curb speech it considers dangerous, an investigation by The Intercept has found. The work, much of which remains unknown to the American public, came into clearer view earlier this year when DHS announced a new "Disinformation Governance Board": a panel designed to police misinformation (false information spread unintentionally), disinformation (false information spread intentionally), and malinformation (factual information shared, typically out of context, with harmful intent) that allegedly threatens U.S. interests. While the board was widely ridiculed, immediately scaled back, and then shut down within a few months, other initiatives are underway as DHS pivots to monitoring social media now that its original mandate – the war on terror – has been wound down. Behind closed doors, and through pressure on private platforms, the U.S. government has used its power to try to shape online discourse. Discussions have ranged from the scale and scope of government intervention in online discourse to the mechanics of streamlining takedown requests for false or intentionally misleading information. There is also a formalized process for government officials to directly flag content on Facebook or Instagram and request that it be throttled or suppressed through a special Facebook portal that requires a government or law enforcement email to use. How disinformation is defined by the government has not been clearly articulated.
Note: The Department of Homeland Security's Disinformation Governance Board has been paused, not stopped. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
While Facebook has long sought to portray itself as a "town square" that allows people from across the world to connect, a deeper look into its apparently military origins and continual military connections reveals that the world's largest social network was always intended to act as a surveillance tool to identify and target domestic dissent. LifeLog was one of several controversial post-9/11 surveillance programs pursued by the Pentagon's Defense Advanced Research Projects Agency (DARPA) that threatened to destroy privacy and civil liberties in the United States. LifeLog sought to .. build a digital record of "everything an individual says, sees, or does." In 2015, [DARPA architect Douglas] Gage told VICE that "Facebook is the real face of pseudo-LifeLog." He tellingly added, "We have ended up providing the same kind of detailed personal information without arousing the kind of opposition that LifeLog provoked." A few months into Facebook's launch, in June 2004, Facebook cofounders Mark Zuckerberg and Dustin Moskovitz [had] its first outside investor, Peter Thiel. Thiel, in coordination with the CIA, was actively trying to resurrect controversial DARPA programs. Thiel formally acquired $500,000 worth of Facebook shares and was added its board. Thiel's longstanding symbiotic relationship with Facebook cofounders extends to his company Palantir, as the data that Facebook users make public invariably winds up in Palantir's databases and helps drive the surveillance engine Palantir runs for a handful of US police departments, the military, and the intelligence community.
Note: Consider reading the full article by investigative reporter Whitney Webb to explore the scope of Facebook's military origins and the rise of mass surveillance. Read more about the relationship between the national security state and Google, Facebook, TikTok, and the entertainment industry. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. Today, [The Intercept is] publishing [a document from GCHQ's previously secret unit, JTRIG, the Joint Threat Research Intelligence Group], entitled "The Art of Deception: Training for Online Covert Operations." Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: "false flag operations" (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting "negative information" on various forums. Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House's former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-"independent" advocates to "cognitively infiltrate" online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into "chat rooms, online social networks, or even real-space groups" which spread what he views as false and damaging "conspiracy theories" about the government.
Note: To see a guidebook developed by intelligence agencies full of charts and information on how to infiltrate and deceive the public, click here. The Intercept is a media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for their independence. Note that Greenwald fails to mention that Sunstein's almost exclusive focus was on "conspiracy theories" advocated by the 9/11 truth movement. For more on his call for what amounts to a new COINTELPRO, see David Ray Griffin's book Cognitive Infiltration.
Imagine a global spying network that can eavesdrop on every single phone call, fax or e-mail, anywhere on the planet. It sounds like science fiction, but it's true. Two of the chief protagonists - Britain and America - officially deny its existence. But the BBC has confirmation from the Australian Government that such a network really does exist. The base is linked directly to the headquarters of the US National Security Agency (NSA) at Fort Mead in Maryland, and it is also linked to a series of other listening posts scattered across the world, like Britain's own GCHQ. The power of the network, codenamed Echelon, is astounding. Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. The network is so secret that the British and American Governments refuse to admit that Echelon even exists. But another ally, Australia, has decided not to be so coy. The man who oversees Australia's security services, Inspector General of Intelligence and Security Bill Blick, has confirmed to the BBC that their Defence Signals Directorate (DSD) does form part of the network. Asked if they are then passed on to countries like Britain and America, he said: "They might be in certain circumstances." They are looking for evidence of international crime, like terrorism. But the system is so widespread all sorts of private communications, often of a sensitive commercial nature, are hoovered up and analysed.
Note that this is a 1999 article, long before the revelations of Edward Snowden. The capability to monitor all communications has existed for a long time. For a powerful, well documented 20-page paper in the Federal Communications Law Journal providing strong evidence that this program is unconstitutional, click here.
The Justice Department is investigating allegations that officers of a special Venezuelan anti-drug unit funded by the CIA smuggled more than 2,000 pounds of cocaine into the United States with the knowledge of CIA officials - despite protests by the Drug Enforcement Administration. That is a huge amount of cocaine. But it was hardly a first. The agency has never been above using individuals or organizations with known links to drug trafficking. Until recently, no DEA country attach overseas was allowed to initiate an investigation into a suspected drug trafficker ... without clearance from the local CIA station chief. CIA ties to international drug trafficking date to the Korean War. Nowhere, however, was the CIA more closely tied to drug traffic than it was in Pakistan during the Afghan War. As its principal conduit for arms and money to the Afghan guerrillas, the agency chose the Pakistan military's Inter-Services Intelligence Bureau. The ISI in turn steered the CIA's support toward [an Islamic fundamentalist who] received almost half of the agency's financial support during the war. But many of his commanders were also major heroin traffickers. Soon the trucks that delivered arms to the guerrillas in Afghanistan were coming back ... full of heroin. The heroin traffic blossomed in the shadows of a CIA-sustained guerrilla war. The conflict and its aftermath have given the world another Golden Triangle: the Golden Crescent, sweeping through Afghanistan, Pakistan and parts of the former Soviet Union. Many of those involved in the drug traffic are men who were once armed, trained and financed by the CIA.
Note: The entire article at the link above is highy revealing. Read more about the CIA's ongoing involvement with Afghan heroin trafficking. The Taliban banned opium production in 2000 reducing the yield by 90%. Yet shortly after the U.S. defeated the Taliban, Afghanistan quickly returned to supplying 75% of the world's heroin. Do you think the U.S. is serious about stopping the drug trade? For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
During the early period of the Cold War, the CIA became convinced that communists had discovered a drug or technique that would allow them to control human minds. In response, the CIA began its own secret program, called MK-ULTRA, to search for a mind control drug that could be weaponized against enemies. MK-ULTRA, which operated from the 1950s until the early '60s, was created and run by a chemist named Sidney Gottlieb. Some of Gottlieb's experiments were covertly funded at universities and research centers ... while others were conducted in American prisons and in detention centers in Japan, Germany and the Philippines. Many of his unwitting subjects endured psychological torture ranging from electroshock to high doses of LSD. In the early 1950s, he arranged for the CIA to pay $240,000 to buy the world's entire supply of LSD. He brought this to the United States, and he began spreading it around to hospitals, clinics, prisons and other institutions, asking them, through bogus foundations, to carry out research projects and find out what LSD was, how people reacted to it and how it might be able to be used as a tool for mind control. MK-ULTRA, was essentially a continuation of work that began in Japanese and Nazi concentration camps. Not only was it roughly based on those experiments, but the CIA actually hired the vivisectionists and the torturers who had worked in Japan and in Nazi concentration camps to come and explain what they had found out so that we could build on their research.
Note: Read more about the CIA's MK-ULTRA program. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources.
American Amara Majeed was accused of terrorism by the Sri Lankan police in 2019. Robert Williams was arrested outside his house in Detroit and detained in jail for 18 hours for allegedly stealing watches in 2020. Randal Reid spent six days in jail in 2022 for supposedly using stolen credit cards in a state he'd never even visited. In all three cases, the authorities had the wrong people. In all three, it was face recognition technology that told them they were right. Law enforcement officers in many U.S. states are not required to reveal that they used face recognition technology to identify suspects. Surveillance is predicated on the idea that people need to be tracked and their movements limited and controlled in a trade-off between privacy and security. The assumption that less privacy leads to more security is built in. That may be the case for some, but not for the people disproportionately targeted by face recognition technology. As of 2019, face recognition technology misidentified Black and Asian people at up to 100 times the rate of white people. In 2018 ... 28 members of the U.S. Congress ... were falsely matched with mug shots on file using Amazon's Rekognition tool. Much early research into face recognition software was funded by the CIA for the purposes of border surveillance. More recently, private companies have adopted data harvesting techniques, including face recognition, as part of a long practice of leveraging personal data for profit.
Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy from reliable major media sources.
While nobody has offered hard evidence that intelligence agencies, and in particular the CIA or Mossad, were directly involved in Epstein and [Ghislaine] Maxwell's blackmailing of public figures, many of the journalists who investigated the Epstein case have concluded that they were running what is known in the intelligence community as a "honeypot" or "honeytrap" aimed at using sex to blackmail people. The current director of the Central Intelligence Agency, William Burns, had scheduled three meetings with Epstein in 2014. Epstein's private calendar showed that he had dozens of meetings with Kathryn Ruemmler, a former White House counsel under President Barack Obama. Meetings with many other wealthy, well-connected individuals occurred years after Epstein became a convicted sex offender. Reporter Vicky Ward ... wrote a story about the Justice Department's 2007 "non-prosecution agreement" with Epstein. Alexander Acosta was the U.S. Attorney for South Florida who arranged the lenient sentence. "I was told Epstein 'belonged to intelligence' and to leave it alone," Acosta said. In addition to his possible ties to American intelligence, Epstein may have also been connected to the Israeli Mossad. A former Israeli spy, Ari Ben-Menashe, said he was Robert Maxwell's "handler" and claimed to have introduced Epstein to Mossad. "They were agents of the Israeli Intelligence Services," said Ben-Menashe. The CIA has a long record of using sexual blackmail. In 1975, the Washington Post reported that for years, the CIA had "operated love traps in New York City and San Francisco, where foreign diplomats were lured by prostitutes in the pay of the CIA ...Through hidden one-way mirrors, CIA agents filmed the sexual adventures and later tried to blackmail the victims into becoming informants."
Note: Read more about former Israeli spy Ari Ben-Menashe's claims that Epstein was running a sexual blackmail operation on behalf of Israeli military intelligence. For more along these lines, see concise summaries of deeply revealing news articles on Jeffrey Epstein and intelligence agency corruption from reliable major media sources.
Silicon Valley techies are pretty sanguine about commercial surveillance. But they are much less cool about government spying. Government employees and contractors are pretty cool with state surveillance. But they are far less cool with commercial surveillance. What are they both missing? That American surveillance is a public-private partnership: a symbiosis between a concentrated tech sector that has the means, motive, and opportunity to spy on every person in the world and a state that loves surveillance as much as it hates checks and balances. The tech sector has powerful allies in government: cops and spies. No government agency could ever hope to match the efficiency and scale of commercial surveillance. Meanwhile, the private sector relies on cops and spies to go to bat for them, lobbying against new privacy laws and for lax enforcement of existing ones. Think of Amazon's Ring cameras, which have blanketed entire neighborhoods in CCTV surveillance, which Ring shares with law enforcement agencies, sometimes without the consent or knowledge of the cameras' owners. Ring marketing recruits cops as street teams, showering them with freebies to distribute to local homeowners. Google ... has managed to play both sides of the culture war with its location surveillance, thanks to the "reverse warrants" that cops have used to identify all the participants at both Black Lives Matter protests and the January 6 coup. Distinguishing between state and private surveillance is a fool's errand.
Note: For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.
He still remembers the first gunshot. Now, 60 years later, Paul Landis, one of the Secret Service agents just feet away from President John F. Kennedy on that fateful day in Dallas, is telling his story in full for the first time. His account differs from the official version. At age 88, he said, all he wants is to tell what he saw and what he did. He will leave it to everyone else to draw conclusions. What it comes down to is a copper-jacketed 6.5-millimeter projectile. The Warren Commission decided that one of the bullets fired that day struck the president from behind, exited from the front of his throat and continued on to hit Mr. Connally, somehow managing to injure his back, chest, wrist and thigh. It seemed incredible that a single bullet could do all that, so skeptics called it the magic bullet theory. Investigators came to that conclusion partly because the bullet was found on a stretcher believed to have held Mr. Connally at Parkland Memorial Hospital. In fact, [Mr. Landis] said, he was the one who found the bullet – and he found it not in the hospital near Mr. Connally but in the presidential limousine lodged in the back of the seat behind where Kennedy was sitting. "If what he says is true, which I tend to believe, it is likely to reopen the question of a second shooter, if not even more," [Historian James] Robenalt said. "If the bullet we know as the magic or pristine bullet stopped in President Kennedy's back, it means that the central thesis of the Warren Report, the single-bullet theory, is wrong."
Note: For more along these lines, see concise summaries of revealing news articles on the Kennedy assassination from reliable major media sources. For deeper exploration, check out our comprehensive Information Center on John F. Kennedy's assassination, which challenge mainstream narratives about his assassination and the events leading up to it.
Between 1955 and 1963, federal agents ran a hidden brothel in one of San Francisco's poshest neighborhoods and tested LSD on unsuspecting Bay Area residents. The apartment building is still there, although it has been converted from a CIA brothel into a four-story mansion. At the center of this wildly unethical program was George Hunter White ... who became one of the biggest crusaders of America's early war on drugs. In public, he railed against drug use and ruthlessly investigated jazz legends like Billie Holiday. Privately, however, he drank martinis by the pitcher and even used drugs like LSD and marijuana. White was the federal agent responsible for a top-secret CIA program called "Operation Midnight Climax." The CIA thought it could use hallucinogenic drugs like LSD as weapons of war against its enemies. To find out, the agency got Bay Area residents high without their consent. White outfitted rooms inside a Telegraph Hill apartment building, at 225 Chestnut St., into a safe house for testing LSD. He gave sex workers get-out-of-jail-free cards in exchange for luring unsuspecting johns to the apartment, where the men were dosed with acid while White watched from the other side of a one-way mirror. According to a letter unearthed by John Marks in his 1979 book "The Search for the 'Manchurian Candidate,'" it was nothing but "fun, fun, fun." "Where else could a red-blooded American boy lie, kill, cheat, steal, rape, and pillage with the sanction and blessing of the All-Highest?" White asked.
Note: Read more about Operation Midnight Climax and the larger MK-ULTRA project it was a part of. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and mind control from reliable major media sources.
Recent reports about the Secret Service and Immigration and Customs Enforcement playing fast and loose with rules regarding cellphone tracking and the FBI purchasing phone location data from commercial sources constitute an important wake-up call. They remind us that those handy mobile devices many people tote around are the most cost-effective surveillance system ever invented. "The United States Secret Service and U.S. Immigration and Customs Enforcement, Homeland Security Investigations (ICE HSI) did not always adhere to Federal statute and cellsite simulator (CSS) policies when using CSS during criminal investigations," the Department of Homeland Security's Office of the Inspector General reported last month. "Separately, ICE HSI did not adhere to Department privacy policies and the applicable Federal privacy statute when using CSS." The OIG report referred to the use of what is commonly called "stingray" technology–devices that simulate cellphone towers and trick phones within range into connecting and revealing their location. "They also gather information about the phones of countless bystanders who happen to be nearby," the ACLU warns. Even the most precise phone company location data remains available with court approval. The courts are currently mulling multiple cases involving "geofence warrants" whereby law enforcement seeks data not on individuals, but on whoever was carrying a device in a designated area at a specified time.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
In the month since veteran journalist Seymour Hersh published his bombshell report alleging that President Joe Biden personally authorized a covert action to bomb the Nord Stream pipelines, we've seen a frenzy of speculation, detailed dissection of Hersh's specific assertions, and the emergence of competing narratives both supporting and denouncing the report. On March 7, the New York Times and the German newspaper Die Zeit both published stories that thicken the plot. The Times story was based on a narrative clearly being pushed by U.S. intelligence sources that "a pro-Ukrainian group carried out the attack." If the bombing of the Nord Stream pipelines was, as Hersh alleges, directed by the U.S., then the leaked suggestion that the culprits were a "pro-Ukrainian group" could indicate a nascent effort at floating a cover story. No one has claimed responsibility for this attack, but there are recent precedents for foreign actors taking credit for U.S. operations to conceal Washington's involvement. Military officials have lied or misled the public ... throughout U.S. history. There is no U.S. law or rule prohibiting the government from promoting a false alternative explanation to conceal an operation. "This is an established practice in military operations and intelligence activities where it is often known as â€cover and deception,'" [said former Government Secrecy Project director Steven Aftergood]. "Sometimes, in order to maintain the operational security of X, you have to declare that it is actually Y."
Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
On the north side of Telegraph Hill is 225 Chestnut St., a swanky modernist building. From 1955 to 1965, this building was the site of “Operation Midnight Climax” - a top-secret mind-control program in which CIA agents used hookers to lure unsuspecting johns from North Beach bars to what they called “the pad,” then dosed the men with LSD and observed the X-rated goings-on through a two-way mirror. As John Marks notes in his 1977 book, “The Search for the ‘Manchurian Candidate’: The CIA and Mind Control,” the CIA’s ... predecessor, the Office of Strategic Services, set up a “truth drug” program whose purpose was to discover a substance that would make subjects reveal their secrets. When the CIA was created in 1947, it ... authorized covert mind and behavior control programs. Drugs were given to people deemed expendable, including North Korean POWs, mental patients, prisoners, addicts and prostitutes. Before the programs were shot down, hundreds of scientists would work on them. [In] 1953, CIA director Allen Dulles approved a program for “covert use of biological and chemical materials” with an initial budget of $300,000. Its name: MKULTRA. CIA operatives began dosing people with acid in restaurants, bars and beaches. They also used other, more exotic drugs. And the agency began using the prostitutes to lure men of all sorts, not just marginal figures, back to the safe house. Because the agency destroyed most of MKULTRA’s files, no one will ever know how many lives and minds [it] damaged or destroyed.
Note: Don't miss the entire, revealing article. For more on CIA mind control experiments, see the extensive documentation on this page. Then explore the excellent, reliable resources provided in our Mind Control Information Center.
Senior CIA officials have for years intentionally deceived parts of the agency workforce by transmitting internal memos that contain false information. The practice is known by the term eyewash. Officials said there is no clear mechanism for labeling eyewash cables or distinguishing them from legitimate records being examined by the CIAs inspector general, turned over to Congress or declassified for historians. Senate investigators uncovered apparent cases of eyewashing as part of a multi-year probe of the CIAs interrogation program, according to officials who said that the Senate Intelligence Committee found glaring inconsistencies in CIA communications about classified operations, including drone strikes. Former CIA officials ... acknowledged that the internal mechanisms for managing eyewash cables were largely informal. Skeptics described the safeguards as inadequate. When you introduce falsehoods into the communications stream then you can destabilize the whole system of intelligence oversight and compliance with the law, said Steven Aftergood, a government secrecy expert at the Federation of American Scientists. It wasnt that long ago that we had a CIA executive director who was engaged in criminal activity - you dont want someone like him preparing eyewash cables, Aftergood said, referring to Kyle Dusty Foggo, the former No. 3 executive at the agency.
Note: Read more about the strange case of Kyle "Dusty" Foggo, the CIA executive convicted of fraud in connection with secret CIA prisons. For more along these lines, see concise summaries of deeply revealing Intelligence agency corruption news articles from reliable major media sources.
For the fearmongers in the West and their allies, it’s always the scariest time ever. In February, former CIA Deputy Director Michael Morrell, arguing for renewal of the Patriot Act, warned that “the ‘lone wolf’ terrorist threat to the United States has never been greater.” In January, an anonymous senior aide to U.K. Prime Minister ... argued for a new “snooper” bill by saying that “the terrorist threat has never been greater.” In mid-2014, U.K. Prime Minister Cameron himself raised the threat level to “severe” and announced: “Britain faces the ‘greatest and deepest’ terror threat in the country’s history.” Throughout the Bush years ... officials raised their color-coded terror alerts and issued similar warnings so many times that it became a running joke. Years later, the face of that joke, Homeland Security Secretary Tom Ridge, admitted he was pressured to issue warnings for political gain. Here we are 14 years after 9/11, and it’s still always the worst threat ever in all of history. If we always face the greatest threat ever, then one of two things is true: 1) fearmongers serially exaggerate the threat for self-interested reasons, or 2) the threat is always getting more severe, year after year — which might mean we should evaluate the wisdom of “terrorism” policies that constantly make the problem worse. Whatever else is true, the people who should have the least credibility on the planet are [those] who have spent the last 15 years exploiting the terror threat in order to terrorize the American population into doing what they want.
Note: Read an excellent essay by a top US general exposing how war is a racket. For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
The Justice Department and FBI have formally acknowledged that nearly every examiner in an elite FBI forensic unit gave flawed testimony in almost all trials in which they offered evidence against criminal defendants over more than a two-decade period before 2000. Of 28 examiners with the FBI Laboratory’s microscopic hair comparison unit, 26 overstated forensic matches in ways that favored prosecutors in more than 95 percent of the 268 trials reviewed so far, according to the National Association of Criminal Defense Lawyers (NACDL) and the Innocence Project, which are assisting the government with the country’s largest post-conviction review of questioned forensic evidence. The cases include those of 32 defendants sentenced to death. Of those, 14 have been executed or died in prison, the groups said under an agreement with the government to release results after the review of the first 200 convictions. The admissions mark a watershed in one of the country’s largest forensic scandals, highlighting the failure of the nation’s courts for decades to keep bogus scientific information from juries, legal analysts said. The question now, they said, is how state authorities and the courts will respond to findings that confirm long-suspected problems with subjective, pattern-based forensic techniques — like hair and bite-mark comparisons — that have contributed to wrongful convictions in more than one-quarter of 329 DNA-exoneration cases since 1989.
Note: For more along these lines, see concise summaries of deeply revealing news articles on the threats to civil liberties posed by government corruption from reliable major media sources.
The Obama version of national security looks almost indistinguishable from the one he inherited. Critics tend to focus on Obama himself, but Tufts University political scientist Michael J. Glennon has a more pessimistic answer: Obama couldnt have changed policies much even if he tried. Our government no longer works that way. In a new book, National Security and Double Government, he catalogs the ways that the defence and national security apparatus is effectively self-governing, with virtually no accountability, transparency, or checks and balances of any kind. He uses the term double government: Theres the one we elect, and then theres the one behind it, steering huge swaths of policy almost unchecked. Elected officials end up serving as mere cover for the real decisions made by the bureaucracy. National Security and Double Government comes favorably blurbed by former members of the Defense Department, State Department, White House, and even the CIA. Glennon spoke with Ideas from his office. IDEAS: Where does the term double government come from? GLENNON: Walter Bagehot - the scholar who presided over the birth of The Economist magazine. IDEAS: What evidence exists for saying America has a double government? GLENNON: The documented evidence in the book is substantial there are 800 footnotes. I think the American people ... believe that when they vote for a president or member of Congress or succeed in bringing a case before the courts, that policy is going to change. Policy by and large in the national security realm is made by the concealed institutions.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
In March I received a call from the White House counsel’s office regarding a speech I had prepared for my boss at the State Department. The speech was about the impact ... of National Security Agency surveillance practices. The draft stated that “if U.S. citizens disagree with congressional and executive branch determinations about the proper scope of signals intelligence activities, they have the opportunity to change the policy through our democratic process.” But the White House counsel’s office told me that no, that wasn’t true. I was instructed to amend the line. Some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them. Public debate about the bulk collection of U.S. citizens’ data by the NSA has focused largely on Section 215 of the Patriot Act. Based in part on classified facts that I am prohibited by law from publishing, I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215. Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained. None of the reforms that Obama announced earlier this year will affect such collection.
Note: The above was written by John Napier Tye, former section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor. A 2014 Washington Post investigation sheds more light on the NSA's legally dubious domestic mass surveillance program. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Less than two weeks after the 2011 raid that killed Osama bin Laden, a top Pentagon official ordered all photos of bin Laden's corpse be destroyed or turned over to the CIA. In an e-mail dated May 13, 2011, Adm. William McRaven, the U.S. Special Operations commander, wrote: "One particular item that I want to emphasize is photos; particularly UBLs remains. At this point — all photos should have been turned over to the CIA; if you still have them destroy them immediately or get them to the (redacted)." Shortly after the raid in Pakistan, President Obama said he would not authorize the release of any images of the al-Qaeda leader's body. Days before the order to destroy the photos, watchdog group Judicial Watch and the Associated Press had separately filed a Freedom of Information Act request for photos, videos and documents regarding bin Laden during the raid. Typically, when a Freedom of Information Act request is filed to a government agency under the Federal Records Act, the agency is obliged to preserve the material sought — even if the agency later denies the request.
Note: Why would a top military commander order all photos of bin Laden's dead body destroyed? Why would Obama prevent the release of any images of the body? For powerful evidence that the dead body was not, in fact, bin Laden's, click here and here. For other solid evidence that the official story of 9/11 is riddles with holes, see our 9/11 Information Center available here.
After contradictory stories emerged about an F.B.I. agent’s killing last month of a Chechen man in Orlando, Fla., who was being questioned over ties to the Boston Marathon bombing suspects, the bureau reassured the public that it would clear up the murky episode. But if such internal investigations are time-tested, their outcomes are also predictable: from 1993 to early 2011, F.B.I. agents fatally shot about 70 “subjects” and wounded about 80 others — and every one of those episodes was deemed justified, according to interviews and internal F.B.I. records. The last two years have followed the same pattern: an F.B.I. spokesman said that since 2011, there had been no findings of improper intentional shootings. In most of the shootings, the F.B.I.’s internal investigation was the only official inquiry. In the Orlando case, for example, there have been conflicting accounts about basic facts like whether the Chechen man, Ibragim Todashev, attacked an agent with a knife, was unarmed or was brandishing a metal pole. But Orlando homicide detectives are not independently investigating what happened. Occasionally, the F.B.I. does discipline an agent. A typical punishment involved adding letters of censure to agents’ files. Critics say the fact that for at least two decades no agent has been disciplined for any instance of deliberately shooting someone raises questions about the credibility of the bureau’s internal investigations.
Note: For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here.
A Panel of 22 researchers into the history of 9/11 has uncovered evidence of fraud in the photographic images of Muslim hijackers prior to boarding the planes on 9/11. Court exhibits state that leader Mohamed Atta took a commuter flight from Portland, Maine, to connect to AA Flight 11 out of Boston, which hit the North Tower. The dubious images heighten the mystery of why Atta left Boston, where Flight 11 was to be hijacked, and risked the failure of his entire mission by driving to Portland September 10, staying overnight, and booking a tight connection back to Boston early September 11. The [9/11 Consensus] Panel's in-depth review shows the Portland story to be peppered with inconsistencies and revisions, placing the entire hijack theory in question. Similarly, at Washington's Dulles International Airport, five hijackers allegedly passed through security before flying AA Flight 77, carrying CNN correspondent Barbara Olson, into the Pentagon. Yet no images were released from the 300+ security cameras at Dulles that morning, nor were Arabic men reported in FBI interviews of airport staff. The Panel has produced 28 Consensus Points of "best evidence" regarding the official claims of 9/11 -- the trigger event for the Middle East wars of the last decade. Its investigations cover: explosives at the Twin Towers and Building WTC-7; the inadequate flying skills of the alleged Pentagon pilot; the missing debris from "Let's Roll" Flight 93; the [many] military drills coinciding on 9/11, and the allegedly absent political and military commanders.
Note: This article appears to have been removed from the MarketWatch website, though you can still read it using the Internet Archive. Don't miss the PBS special, "9/11 Explosive Evidence: Experts Speak Out", in which 40 whistle-blowing experts present evidence of controlled demolition at the World Trade Center. For many other major media articles which raise serious questions about the 9/11 official story, click here. For lots more verifiable evidence suggesting a major cover-up around 9/11, click here.
Flying saucer sightings? Reports of three-foot-tall aliens? Secret memos about suspicious objects recovered near Roswell, N.M.? They're all included in the thousands of declassified government documents posted to the FBI's new online "Vault." Among the so-called "X-files" are once-classified reports dating back to the 1940s and 1950s detailing Air Force investigations into "flying discs" and the "bodies of human shape" discovered inside them. In one report from March 1950, Guy Hottel, a special agent with the FBI, said he received information from an Air Force investigator about flying saucers found in New Mexico. "They were described as being circular in shape with raised centers, approximately 50-feet in diameter," he wrote. "Each one was occupied by three bodies of human shape but only 3 feet tall, dressed in a metallic cloth of a very fine texture. Each body was bandaged in a manner very similar to the blackout suits used by speed flyers and test pilots." The informant, whose name is redacted in the file, said he thought the saucer was spotted in New Mexico because a high-powered government radar in the area interfered with the saucer's controlling mechanism. Other reports once marked "restricted" and "confidential" detail sightings of mysterious flashing lights and other "unidentified aerial objects."
Note: You can view the declassified memorandum described above on the FBI website at this link. Or download this amazing document and view it on our website at this link. For lots more reliable information suggesting a major cover-up of the reality of ET visitation, click here.
Federal agent John Dodson says what he was asked to do was beyond belief. He was intentionally letting guns go to Mexico. An Alcohol, Tobacco and Firearms [ATF] senior agent assigned to the Phoenix office in 2010, Dodson's job is to stop gun trafficking across the border. Instead, he says he was ordered to sit by and watch it happen. Investigators call the tactic letting guns "walk." In this case, walking into the hands of criminals who would use them in Mexico and the United States. Dodson's bosses say that never happened. Agent Dodson and other sources say the gun walking strategy was approved all the way up to the Justice Department. The idea was to see where the guns ended up, build a big case and take down a cartel. And it was all kept secret from Mexico. ATF named the case "Fast and Furious." Documents show the inevitable result: The guns that ATF let go began showing up at crime scenes in Mexico. And as ATF stood by watching thousands of weapons hit the streets. The Fast and Furious group supervisor noted the escalating Mexican violence. One e-mail noted, "958 killed in March 2010 ... most violent month since 2005." Dodson feels that ATF was partly to blame for the escalating violence. Senior agents including Dodson ... confronted their supervisors over and over. Their answer ... "If you're going to make an omelette, you've got to break some eggs." On Dec. 14, 2010, Border Patrol Agent Brian Terry was gunned down. Two assault rifles ATF had let go nearly a year before were found at Terry's murder. Dodson said, "I felt guilty. I mean it's crushing." Dodson said they never did take down a drug cartel. However, he said thousands of Fast and Furious weapons are still out there and will be claiming victims on both sides of the border for years to come.
Note: Could it be that there are those in high positions of power who want this violence to keep us in fear? The fear industry brings huge profits. For more powerful information on this, click here and here.
Whistle-blower AT&T technician Mark Klein says his effort to reveal alleged government surveillance of domestic Internet traffic was blocked not only by U.S. intelligence officials but also by the top editors of the Los Angeles Times. Klein describes how he stumbled across "secret NSA rooms" being installed at an AT&T switching center in San Francisco and later heard of similar rooms in at least six other cities. Eventually, Klein says he decided to take his documents to the Los Angeles Times, to blow the whistle on what he calls "an illegal and Orwellian project." But after working for two months with LA Times reporter Joe Menn, Klein says he was told the story had been killed at the request of then-Director of National Intelligence John Negroponte and then-director of the NSA Gen. Michael Hayden. Klein says he then took his AT&T documents to The New York Times, which published its exclusive account last April [later removed from NY Times website]. In the court case against AT&T, Negroponte formally invoked the "state secrets privilege," claiming the lawsuit and the information from Klein and others could "cause exceptionally grave damage to the national security of the United States." The Los Angeles Times' decision was made by the paper's editor at the time, Dean Baquet, now the Washington bureau chief of The New York Times. As the new Washington bureau chief of The New York Times, Baquet now oversees the reporters who have broken most of the major stories involving the government surveillance program, often over objections from the government.
Note: This webpage was removed from the ABC website, but is still available through archive.org on thise webpage. So after the NY Times has the guts to report this important story, the man who was responsible for the censorship at the LA Times is transferred to the very position in the NY Times where he can now block future stories there. For why this case of blatant media censorship isn't making headlines, click here.
In December 1974, the New York Times reported that the CIA had conducted illegal domestic activities, including experiments on U.S. citizens during the 1960s. That report prompted investigations by both Congress (in the form of the Church Committee) and a presidential commission (known as the Rockefeller Commission) into the domestic activities of the CIA, the FBI, and intelligence-related agencies of the military. Congressional hearings and the Rockefeller Commission report revealed to the public for the first time that the CIA and the DOD had conducted experiments on both cognizant and unwitting human subjects as part of an extensive program to influence and control human behavior through the use of psychoactive drugs (such as LSD and mescaline) and other chemical, biological, and psychological means. They also revealed that at least one subject had died after administration of LSD. Frank Olson, an Army scientist, was given LSD without his knowledge or consent in 1953 as part of a CIA experiment and apparently committed suicide a week later. Subsequent reports would show that another person ... died as a result of a secret Army experiment involving mescaline. The CIA program, known principally by the codename MKULTRA, began in 1950 and was motivated largely in response to alleged Soviet, Chinese, and North Korean uses of mind-control techniques on U.S. prisoners of war in Korea. Most of the MKULTRA records were deliberately destroyed in 1973 by order of then-Director of Central Intelligence Richard Helms.
Note: This highly revealing article on a U.S. government website shows that the CIA was actively involved in mind control projects. Explore also an excellent summary based on thousands of pages of declassified CIA documents showing the secret creation of unknowing assassins or "Manchurian Candidates."
New video and photographic evidence ... puts three senior CIA operatives at the scene of Robert Kennedy's assassination. It reveals that the operatives and four unidentified associates were at the Ambassador Hotel, Los Angeles in the moments before and after the shooting on 5 June, 1968. The CIA had no domestic jurisdiction and some of the officers were based in South-East Asia at the time, with no reason to be in Los Angeles. Kennedy had just won the California Democratic primary on an anti-War ticket and was set to challenge Nixon for the White House. A 24-year-old Palestinian, Sirhan Sirhan, was arrested as the lone assassin. However, even under hypnosis, he has never been able to remember the shooting and defence psychiatrists concluded he was in a trance at the time. Witnesses placed Sirhan's gun several feet in front of Kennedy but the autopsy showed the fatal shot came from one inch behind. Dr Herbert Spiegel, a world authority on hypnosis at Columbia University, believes Sirhan may have been hypnotically programmed to act as a decoy for the real assassin. Three of these men have been positively identified as senior officers who worked together in 1963 at JMWAVE, the CIA's Miami base. David Morales was Chief of Operations and once told friends: "I was in Dallas when we got the son of a bitch and I was in Los Angeles when we got the little bastard." George Joannides was Chief of Psychological Warfare Operations. Now, we see him at the Ambassador Hotel the night a second Kennedy is assassinated.
Note: There is ample evidence that Sirhan Sirhan was a programmed Manchurian Candidate. Declassified CIA documents show that U.S. intelligence services were creating programmed assassins back as early as the 1950s. For reliable, verifiable information on this key topic, click here.
Michael Scheuer, a 22-year veteran of the CIA, wrote "Imperial Hubris: Why the West is Losing the War on Terror." Between January 1996 and June 1999 I was in charge of running operations against Al Qaeda from Washington. When it comes to this small slice of the large U.S. national security pie, I speak with firsthand experience (and for several score of CIA officers) when I state categorically that during this time senior White House officials repeatedly refused to act on sound intelligence that provided multiple chances to eliminate Osama bin Laden — either by capture or by U.S. military attack. I witnessed and documented, along with dozens of other CIA officers, instances where life-risking intelligence-gathering work of the agency's men and women in the field was wasted. I was never charged with deciding whether to act against Bin Laden. That decision properly belongs solely to senior White House officials. However, as a now-private American citizen, it is my right to question their judgment; I am entitled to know why the protection of Americans — most selfishly, my own children and grandchildren — was not the top priority of the senior officials who refused to act on the opportunities to attack Bin Laden provided by the clandestine service. Each of these officials have publicly argued that the intelligence was not "good enough" to act, but they almost always neglect to say that they were repeatedly advised that the intelligence was not going to get better and that Bin Laden was going to kill thousands of Americans if he was not stopped.
Note: If the above link fails, click here. For many other serious questions around the 9/11 attacks, click here.
In what the government describes as a bizarre coincidence, one U.S. intelligence agency was planning an exercise last Sept. 11 in which an errant aircraft would crash into one of its buildings. But the cause wasn't terrorism — it was to be a simulated accident. Officials at the Chantilly, Va.-based National Reconnaissance Office had scheduled an exercise that morning in which a small corporate jet would crash into one of the four towers at the agency's headquarters building. The agency is about four miles from the runways of Washington Dulles International Airport. "It was just an incredible coincidence that this happened to involve an aircraft crashing into our facility," [NRO spokesman Art] Haubold said. "As soon as the real world events began, we canceled the exercise." Adding to the coincidence, American Airlines Flight 77 — the Boeing 767 that was hijacked and crashed into the Pentagon — took off from Dulles at 8:10 a.m. on Sept. 11, 50 minutes before the exercise was to begin. It struck the Pentagon around 9:40 a.m., killing 64 aboard the plane and 125 on the ground. The National Reconnaissance Office operates many of the nation's spy satellites. It draws its personnel from the military and the CIA. In a promotion for speaker John Fulton, a CIA officer assigned as chief of NRO's strategic gaming division, the announcement says, "On the morning of September 11th 2001, Mr. Fulton and his team ... were running a pre-planned simulation to explore the emergency response issues that would be created if a plane were to strike a building."
Note: For many more disturbing coincindences and outright cover-ups around 9/11, click here. And for yet another amazing "coincidence" surrounding the London bombings, click here.
[An] FBI counter-terrorism agent [is] accusing the agency of prohibiting him from conducting his probe into terror financing activities because he complained about obstruction by bureau superiors. Chicago-based FBI Special Agent Robert Wright ... said the recent trajectory of his FBI career has taken a downward spiral since he complained about two incidents that inhibited his ability to continue terror funding and money laundering probes of members of ... Hamas and Hezbollah. The FBI has been under fire since it was revealed that FBI field alerts to Washington of Middle Eastern men training at U.S. flight schools during the summer of 2001 were buried in paperwork, and agents in Minneapolis who circumvented normal channels to contact the CIA about suspected "20th hijacker" Zacarias Moussaoui were reprimanded. Agents who have complained about bureaucratic barriers in the past have been punished, and Wright said that he is one of them. Wright has been demoted to "paper pusher" and "chief dishwasher" at the Chicago field office since he complained about the wrenches thrown into his probe. Wright is under threat of retribution should he talk to members of Congress about what he knows. Wright said throughout his six-year posting in counter-terrorism, he was involved in probes of Hamas and Hezbollah. His most successful 'get' netted $1.4 million in terrorist money in 1998, money that he said today was linked to Saudi businessman and financier Yassin Kadi, who was identified late last year as a close associate of Usama Bin Laden.
Note: For lots more on what happened with Robert Wright, click here. For many still-unanswered questions from highly respected government officials and professors about the behavior of the highest levels of the FBI and other US government agencies before, during and after the 9/11 attacks, click here and here.
GREG PALAST: The CIA and Saudi Arabia, the Bushes and the Bin Ladens. Did their connections cause America to turn a blind eye to terrorism? UNNAMED MAN: There is a hidden agenda at the very highest levels of our government. PETER ELSNER: How can it be that the former President of the US and the current President of the US have business dealings with characters that need to be investigated? PALAST: In the eight weeks since the attacks, over 1,000 suspects and potential witnesses have been detained. Yet, just days after the hijackers took off from Boston aiming for the Twin Towers, a special charter flight out of the same airport whisked 11 members of Osama Bin Laden's family off to Saudi Arabia. That did not concern the White House. Their official line is that the Bin Ladens are above suspicion - apart from Osama, the black sheep, who they say hijacked the family name. That's fortunate for the Bush family and the Saudi royal household, whose links with the Bin Ladens could otherwise prove embarrassing. But Newsnight has obtained evidence that the FBI was on the trail of other members of the Bin Laden family for links to terrorist organisations before and after September 11th. This document is marked "Secret". Case ID - 199-Eye WF 213 589. 199 is FBI code for case type. 9 would be murder. 65 would be espionage. 199 means national security. WF indicates Washington field office special agents were investigating ABL. ABL is Abdullah Bin Laden.
Note: For a Washington Post article showing that former President George H.W. Bush was meeting with a brother of Osama bin Laden the day before 9/11, click here. For lots more on the unanswered questions about the official account of 9/11, click here and here.
Security chiefs on both sides of the Atlantic repeatedly turned down the chance to acquire a vast intelligence database on Osama bin Laden and more than 200 leading members of his al-Qaeda terrorist network in the years leading up to the 11 September attacks. They were offered thick files, with photographs and detailed biographies of many of his principal cadres, and vital information about al-Qaeda's financial interests in many parts of the globe. On two separate occasions, they were given an opportunity to extradite or interview key bin Laden operatives who had been arrested in Africa because they appeared to be planning terrorist atrocities. None of the offers, made regularly from the start of 1995, was taken up. One senior CIA source admitted last night: 'This represents the worst single intelligence failure in this whole terrible business.' Bin Laden and his cadres came to Sudan in 1992 because at that time it was one of the few Islamic countries where they did not need visas. He used his time there to build a lucrative web of legitimate businesses, and to seed a far-flung financial network - much of which was monitored by the Sudanese. They also kept his followers under close surveillance. One US source who has seen the files on bin Laden's men in Khartoum said some were 'an inch and a half thick'. They included photographs, and information on their families, backgrounds and contacts.
Note: For many questions raised about the official account of the 9/11 attacks by highly credible professors and officials, click here and here.
Their names were flashed around the world as suicide hijackers who carried out the attacks on America. But yesterday four innocent men told how their identities had been stolen by Osama bin Laden's teams to cover their tracks. The men - all from Saudi Arabia - spoke of their shock at being mistakenly named by the FBI as suicide terrorists. None of the four was in the United States on September 11 and all are alive in their home country. The FBI released the list of 19 suicide terrorists three days after the attacks. The Saudi Airlines pilot, Saeed Al-Ghamdi, 25, and Abdulaziz Al-Omari, an engineer from Riyadh, are furious that the hijackers' "personal details" - including name, place, date of birth and occupation - matched their own. The other two men accused of being terrorists are Salem Al-Hamzi and Ahmed Al-Nami. Mr Al-Hamzi is 26 and had just returned to work at a petrochemical complex in the industrial eastern city of Yanbou ... when the hijackers struck. Mr Al-Nami, 33, from Riyadh, an administrative supervisor with Saudi Arabian Airlines, said that he was in Riyadh when the terrorists struck. The FBI admitted that there was some doubt about the identities of some of the suspects. A spokesman said: "The identification process has been complicated by the fact that many Arabic family names are similar. It is also possible that the hijackers used false identities." The spokesman declined to say whether the FBI would apologise but added: "If we have made mistakes then obviously that would be regrettable."
Note: The deceptions in the official story of 9/11 are nowhere more clearly shown than in this important story. The FBI never revised its list of alleged hijackers, and these four are all later listed in the official 9/11 Commission report as the hijackers. Click here and scroll down a little over half way to see their photos in the official report. For more on this, click here. For an abundance of reliable information suggesting a major 9/11 cover-up, click here. For other revealing news articles on 9/11, click here.
[In 1977's] Senate hearings about CIA abuses ... one of the witnesses described a government drug-testing programme known as MKULTRA, which had used innocent Americans selected as human guinea pigs. This CIA-sponsored 'research' directly violated the Nuremberg Code [which] stipulates that patients must give 'informed consent' before any experimentation may begin. [The] architect of MKULTRA, Sidney Gottlieb [testified] about the policy of spiking the drinks of unsuspecting Americans [with LSD]. Ultimately, Gottlieb would admit that MKULTRA tested an array of techniques and substances on dozens of unsuspecting people, and there may well have been hundreds. Gottlieb ... personally spiked the drinks of scientists working with him. An Army scientist, Frank Olson, was given a massive dose and ... ended up jumping through the 10th-floor window of a Manhattan hotel. Gottlieb asked a government narcotics agent named George White to begin testing hallucinogens on unsuspecting citizens. White, a hard-drinking, fast-living man ... began dosing unwitting guinea pigs in autumn 1952. He would later, with Gottlieb's approval, set up safe houses in New York and San Francisco where he played host to prostitutes, drug dealers and their customers and handed the unsuspecting guests drinks laced with LSD. In a 1953 memo to a researcher, Gottlieb gave an indication of the kinds of mind control issues he was interested in -- for both offensive and defensive purposes: 'Disturbance of memory; discrediting by aberrant behaviour; alteration of sex patterns; eliciting of information.' Gottlieb and his boss, Richard Helms -- in an unprecedented and controversial move -- ordered all MKULTRA records destroyed in 1973. A few financial records survived.
Note: Though the CIA denies that mind control techniques were successful, an abundance of evidence suggests otherwise. For a powerful two-page summary of this evidence, click here. For major media articles, key documentaries, and other verifiable information on the secret mind control programs, see our Mind Control Information Center available here.
It had been an entirely routine night watch for the Imperial Iranian Air Force's command post in the Tehran area [when] in quick succession, four calls arrived ... reporting a series of strange airborne objects. A senior officer ... immediately scrambled an IIAF F-4 to investigate. The F-4 pilot reported that the brilliant object was easily visible 70 miles away. When approximately 25 NM [nautical miles] distant, the interceptor lost all instrumentation and UHF/Intercom communications. Upon breaking off the intercept and turning towards his home base, all systems returned to normal, as if the strange object no longer regarded the aircraft as a threat. A second F-4 was scrambled ten minutes after the first. Upon reaching the 25 NM point, the object began rapidly moving away to maintain a constant separation distance. Visually, it resembled flashing strobe lights arranged in a rectangular pattern and alternating blue, green, red, and orange. Their sequence was so fast that all colors could be seen at once. As the F-4 continued pursuit south of Tehran, a second brightly-lit object (about one-half to one-third the size of the moon) detached from the original UFO and headed straight for the F-4 at a high rate of speed. The pilot attempted to fire an AIM-9 missile at the new object but was prevented by a sudden power loss in his weapons control panel. UHF and internal communications were simultaneously lost. The pilot promptly initiated a turn and negative G dive to escape. Continuing the turn, the pilot observed the second object turn inside of him and then away, subsequently returning to the primary UFO for a perfect rendezvous.
Note: This official report by U.S. Air Force Captain Henry Shields, taken from the NSA website at the link above, raises many questions. A copy of this document is available at this link. A 1976 report to the US Joint Chiefs of Staff on this remarkable incident is also available here. For astounding statements by other top government and military officials acknowledging a major cover-up of UFOs, click here.
Both subjects were placed in a very deep trance state and while in this state, the following instructions were given: [Deleted] was instructed that upon awakening, she would proceed to [deleted] room where she would wait at the desk for a telephone call. Upon receiving the call, a person known as "Jim" would engage her in normal conversation. During the course of the conversation, this individual would mention a code word. When she heard this code word, she would pass into a SI trance state, but would not close her eyes and remain perfectly normal and continue the telephone conversation. She was told that ... upon conclusion of the telephone conversation, she would carry out instructions: [Deleted] was shown an electric timing device. She was informed that this device was an incendiary bomb, and was then instructed how to attach and set the device. After [deleted] learned how to set and attach the device, she was told ... to take the timing device which was in a briefcase, and proceed to the ladies room. In the ladies room, she would be met by a girl whom she had never seen who would identify herself by the code word "New York." [Deleted] was then to show this individual how to attach and set the timing device and further instructions would be given ... that the timing device was to be carried in the briefcase to [deleted] room, placed in the nearest empty electric-light plug and concealed in the bottom, left-hand drawer of [deleted] desk, with the device set for 82 seconds and turned on. The experiment was carried out perfectly without any difficulty.
Note: This text is quoted from pages 1 and 2 of declassified CIA document MORI ID 190527. To verify the statement in the text, make a FOIA (Freedom of Information Act) request as described here, or directly view a scanned copy of page 1 here and page 2 here. For a two-page summary of highly revealing government mind control programs, click here. To access thousands of pages of declassified CIA mind control documents online, click here. For lots more reliable information on this crucial topic, click here.
An investigator for the Air Forces stated that three so-called flying saucers had been recovered in New Mexico. They were described as being circular in shape with raised centers, approximately 50 feet in diameter. Each one was occupied by three bodies of human shape but only three feet tall, dressed in metallic cloth of a very fine texture. Each body was bandaged in a manner similar to the blackout suits used by speed fliers and test pilots. The saucers were found in New Mexico due to the fact that the Government has a very high powered radar set-up in that area and it is believed the radar interferes with the controlling mechanism of the saucers.
Note: Download this amazing document and view it on our website at this link. For an ABC news article discussing this, click here. Another FBI document shows FBI chief J. Edgar Hoover wanted "full access to discs recovered" at Roswell. For numerous highly revealing major media reports presenting strong evidence on UFOs, click here. For other reliable and inspiring information on this topic, visit our UFO Information Center.
In 2010, the Washington Post reported that "every day, collection systems at the [NSA] intercept and store 1.7 billion emails, phone calls and other type of communications." In 2011, NSA expanded a program to provide real-time location information of every American with a cell phone, acquiring more than a billion cell phone records each day from AT&T. Later, newspapers around the world began publishing confidential documents leaked by [Edward] Snowden. Americans learned that the NSA can tap almost any cell phone in the world, exploit computer games like Angry Birds to poach personal data, access anyone's email and web browsing history [and] remotely penetrate almost all computers. The NSA used Facebook and Google apps to send malware to targeted individuals. NSA filched almost 200,000,000 records a month from private computer cloud accounts. Obama perpetuated perverse Bush-era legal doctrines to totally shield federal surveillance from judicial scrutiny. Obama's Justice Department secretly decreed that all phone records of all Americans were "relevant" to terrorism investigations and that the NSA could therefore justifiably seize everyone's personal data. Snowden revealed how the NSA had covertly carried out "the most significant change in the history of American espionage from the targeted surveillance of individuals to the mass surveillance of entire populations."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
It is shocking: The Bush administration is suppressing a CIA report on 9/11 until after the election, and this one names names. "It is infuriating that a report which shows that high-level people were not doing their jobs in a satisfactory manner before 9/11 is being suppressed," an intelligence official who has read the report told me. [The] release of the report, which represents an exhaustive 17-month investigation by an 11-member team within the agency, has been "stalled." First by acting CIA Director John McLaughlin and now by Porter J. Goss, the former Republican House member (and chairman of the Intelligence Committee) who recently was appointed CIA chief. The official stressed that the report was more blunt and more specific than the earlier bipartisan reports produced by the Bush-appointed Sept. 11 commission and Congress. "The report found very senior-level officials responsible." By law, the only legitimate reason the CIA director has for holding back such a report is national security. None of this should surprise us given the Bush administration's great determination since 9/11 to resist any serious investigation. The president fought against the creation of the Sept. 11 commission, for example, agreeing only after enormous political pressure was applied by a grass-roots movement led by the families of those slain. And then Bush refused to testify to the commission under oath. Instead he deigned only to chat with the commission members, with Vice President Dick Cheney present, in a White House meeting in which commission members were not allowed to take notes.
Note: If the above link fails, click here. For other reliable information on the 9/11 cover-up, click here.
The future of wearable technology, beyond now-standard accessories like smartwatches and fitness tracking rings, is ePANTS, according to the intelligence community. The federal government has shelled out at least $22 million in an effort to develop "smart" clothing that spies on the wearer and its surroundings. Similar to previous moonshot projects funded by military and intelligence agencies, the inspiration may have come from science fiction and superpowers, but the basic applications are on brand for the government: surveillance and data collection. Billed as the "largest single investment to develop Active Smart Textiles," the SMART ePANTS – Smart Electrically Powered and Networked Textile Systems – program aims to develop clothing capable of recording audio, video, and geolocation data, the Office of the Director of National Intelligence announced in an August 22 press release. Garments slated for production include shirts, pants, socks, and underwear, all of which are intended to be washable. There is already evidence that private industry outside of the national security community are interested in smart clothing. Meta, Facebook's parent company, is looking to hire a researcher "with broad knowledge in smart textiles and garment construction, integration of electronics into soft and flexible systems, and who can work with a team of researchers working in haptics, sensing, tracking, and materials science."
Note: Smart objects have been called a "train wreck in privacy and security." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Anthropologist Orisanmi Burton has blown the lid off a dark chapter in CIA history. Classified Agency files, recently obtained through Freedom of Information laws, expose shocking ties between the infamous MKULTRA program and nightmarish experiments on prisoners of color within the United States. Burton's findings expose MKULTRA's sinister mission to develop psychological warfare and behavioral manipulation tactics specifically aimed at people of color under the guise of "counterinsurgency." [In] 1968, the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders underwent an alarming update, adding "hostility" and "aggression" as prominent symptoms of schizophrenia. The implications were profound: civil rights activists daring to resist were at risk of being diagnosed and institutionalized. Prisoners refusing to bend to oppressive jail regimes could be conveniently labeled as "criminally insane." In August 2022, MintPress News revealed how Black Americans were disproportionately targeted by the CIA's monstrous mind control machinations. Many MKULTRA trials appeared to have been expressly conducted to gauge potentially varying reactions to psychedelic drugs in Black and White participants. The CIA had a specific – or greater – interest in the effect of certain substances on people of color, rather than the general civilian population. The CIA did indeed seek to determine optimal drugs for targeting Black Americans, if not other ethnic groups.
Note: The MKULTRA program was also used to create mind-controlled assassins. Government and business interests have a long history of experimenting on human beings. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and mind control from reliable major media sources.
Journalist Stephen Kinzer has spent several years investigating the CIA's mind control program, which was known as MKUltra. LSD was just one of the mind-altering drugs that were used in the program to see if and how they could be weaponized to control human behavior. Many of the unwitting subjects of these experiments were subjected to what amounts to psychological torture. The CIA basically set up phony philanthropic foundations which then funded university and college research, and it's through those research experiments that people like Ginsberg and Kesey and Robert Hunter got introduced to LSD. And the university researchers had no idea that their research was actually being funded by the CIA. Stanford University was running a program in which they asked for volunteers to come in and try this new substance. Allen Ginsberg was one of the volunteers; so was Robert Hunter. A similar set of experiments was going on at the Menlo Park Veterans Administration Hospital. That's where Ken Kesey took LSD for the first time. He was so excited about it he took a job in the hospital and began stealing the LSD to give it to his friends. That became the basis for "One Flew Over The Cuckoo's Nest." So all of these original strands that came together in the '60s to produce this great countercultural revolt based around LSD can be traced back through these bogus foundations to the CIA and, ultimately, the director of MKUltra, Sidney Gottlieb.
Note: Read more about the MKUltra program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and mind control from reliable major media sources.
Billionaire Elon Musk's brain-computer interface (BCI) company Neuralink made headlines earlier this year for inserting its first brain implant into a human being. Such implants ... are described as "fully implantable, cosmetically invisible, and designed to let you control a computer or mobile device anywhere you go." They can help people regain abilities lost due to aging, ailments, accidents or injuries, thus improving quality of life. Yet, great ethical concerns arise with such advancements, and the tech is already being used for questionable purposes. Some Chinese employers have started using "emotional surveillance technology" to monitor workers' brainwaves. Governments and militaries are already ... describing the human body and brain as war's next domain. On this new "battlefield," an era of neuroweapons ... has begun. The Pentagon's research arm DARPA directly or indirectly funds about half of invasive neural interface technology companies in the US. DARPA has initiated at least 40 neurotechnology-related programs over the past 24 years. As a 2024 RAND report speculates, if BCI technologies are hacked or compromised, "a malicious adversary could potentially inject fear, confusion, or anger into [a BCI] commander's brain and cause them to make decisions that result in serious harm." Academic Nicholas Evans speculates, further, that neuroimplants could "control an individual's mental functions," perhaps to manipulate memories, emotions, or even to torture the wearer. In a [military research paper] on neurowarfare: "Microbiologists have recently discovered mind-controlling parasites that can manipulate the behavior of their hosts according to their needs by switching genes on or off. Since human behavior is at least partially influenced by their genetics, nonlethal behavior modifying genetic bioweapons that spread through a highly contagious virus could thus be, in principle, possible.
Note: The CIA once used brain surgery to make six remote controlled dogs. For more, see important information on microchip implants and CIA mind control programs from reliable major media sources.
For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret. The company, Crypto AG ... made millions of dollars selling equipment to more than 120 countries well into the 21st century. Its clients included Iran, military juntas in Latin America, nuclear rivals India and Pakistan, and even the Vatican. But what none of its customers ever knew was that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence. These spy agencies rigged the company’s devices so they could easily break the codes that countries used to send encrypted messages. The decades-long arrangement, among the most closely guarded secrets of the Cold War, is laid bare in a classified, comprehensive CIA history of the operation obtained by The Washington Post and ZDF, a German public broadcaster, in a joint reporting project. The company always made at least two versions of its products — secure models that would be sold to friendly governments, and rigged systems for the rest of the world. Throughout the 1980s, the list of Crypto’s leading clients read like a catalogue of global trouble spots. In 1981, Saudi Arabia was Crypto’s biggest customer, followed by Iran, Italy, Indonesia, Iraq, Libya, Jordan and South Korea. To protect its market position, Crypto and its secret owners engaged in subtle smear campaigns against rival companies ... and plied government officials with bribes.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
In 1967, Israel attacked a US spy ship, killing 34 men and injuring many more. The Israelis claimed it was an accident, the Americans backed them up. Both governments concealed the horrific truth. As the [USS] Liberty sat within eyeshot of El Arish, eavesdropping on surrounding communications, Israeli soldiers turned the town into a slaughterhouse, systematically butchering their prisoners. In the shadow of the El Arish mosque, they lined up about 60 unarmed Egyptian prisoners, hands tied behind their backs, and then opened fire with machine guns until the pale desert sand turned red. This and other war crimes were just some of the secrets Israel had sought to conceal since the start of the conflict. An essential element in the Israeli battle plan seemed to have been to hide much of the war behind a carefully constructed curtain of lies: lies about the Egyptian threat, lies about who started the war, lies to the US. Into this sea of deception and slaughter sailed the USS Liberty, an enormous spy factory loaded with the latest eavesdropping gear. The order was given to kill her and at 12.05pm, three motor torpedo boats from the port of Ashdod, about 50 miles away, departed. Israeli air force fighters, loaded with 50mm cannon ammunition, rockets and napalm, followed. According to information, interviews and documents obtained, for nearly 35 years the NSA has hidden the fact that one of its planes - a Navy EC-121 ferret - was overhead at the time of the incident, eavesdropping on what was going on below.
Note: Watch an excellent documentary on this cruel attack. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
A new report from [FBI] inspector general, Michael Bromwich [says] that much of the vaunted laboratory's work was amateurish, and, worse, that lab officials who appeared at trials were overly eager to help the prosecution. It discovered, among other things, substandard performances by the laboratory's explosives, chemistry-toxicology and materials analysis units, forcing F.B.I. officials to review several hundred past and current cases -- including the Oklahoma City bombing case -- to determine how many might have been jeopardized by unprofessional work. The inquiry found numerous instances in which untrained F.B.I. agents had been allowed to take part in scientific work. In some cases lab reports were inadequately documented and exaggerated the evidence against defendants. Supervisors provided only the most cursory oversight, giving their subordinates freedom to reach unsupported findings, which then went unchallenged. Specifically, the F.B.I. apparently offered cooked testimony in at least two major cases. In the 1993 World Trade Center bombing case, an examiner in the explosives lab, David Williams, gave inaccurate testimony that ''exceeded his expertise, was unscientific and speculative, was based on improper nonscientific grounds and appeared to be tailored to correspond with his estimate of the amount of explosive used in the bombing.'' That should have been cause for Mr. Williams's dismissal. Instead he was assigned to the Oklahoma City bombing, where, the inspector general found, he committed ''many of the same errors.''
Note: For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here.
A former Central Intelligence Agency employee told a Senate subcommittee today that he and another C.I.A. employee were sent to San Francisco in 1959 to lure unsuspecting people to a party at which the two agents were to spray the air with LSD 25 as part of the agency's secret drug testing program. The test [was] part of a much larger drug testing program known by the cryptonym MK ULTRA,” David Rhodes told the Senate Subcommittee on Health and Scientific Research. Mr. Rhodes, two former C.I.A. employees, two former Bureau of Narcotics agents and Dr. Charles Geschickter, head of a foundation that channeled C.I.A. medical research funds to universities for nine or 10 years, were questioned this morning in the first of two days of hearings into C.I.A. testing of drugs on human beings. Today's testimony by Mr. Rhodes provided the first look the public has had at an LSD test inside a C.I.A. safehouse. The agency carried out other drug tests in both California and New York City from 1953 to 1966 in such safehouses, mainly apartments and motel rooms. These were secretly rented for the agency by George H. White, an official of the old Federal Bureau of Narcotics, which has since been supplanted by the Drug Enforcement Administration. Mr. Rhodes, a psychologist employed by the C.I.A. from 1957 to 1961, said he went to California in 1959 with Walter P. Pasternak. Mr. Pasternak, a former employee of the agency, was also an official with the Society for the Investigation of Human Ecology.
Note: Read more about the CIA's MK ULTRA program. Shortly before his death, George White summed up his CIA career by saying, 'It was fun, fun, fun. Where else could a red-blooded American boy lie, kill and cheat, steal, deceive, rape and pillage with the sanction and blessing of the all highest," as reported in this ABC documentary on MK ULTRA. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources.
Someone wrote to Wright Field recently, saying he understood this country had got together quite a collection of enemy war secrets, that many were now on public sale, and could he, please, be sent everything on German jet engines. 'The Army Air Forces' answered: "Sorry – but that would be fifty tons." Moreover, that fifty tons was just a small portion. Wright Field is working from a documents "mother lode" of fifteen hundred tons. It is estimated that over a million separate items ... very likely contain practically all the scientific, industrial, and military secrets of Germany. What did we find? The head of the communications unit ... showed me then what had been two of the most closely-guarded technical secrets of the war: the infra-red device which the Germans invented for seeing at night, and the remarkable diminutive generator which operated it. The diminutive generator – five inches across – stepped up current from an ordinary flashlight battery to 15,000 volts. It had a walnut-sized motor which spun a rotor at 10,000 rpm. The generator then ran 3,000 hours! "As for medical secrets in this collection," one Army-surgeon has remarked, "some of them will save American medicine years of research; some of them are revolutionary – like, for instance, the German technique for treatment after prolonged and usually fatal exposure to cold." This discovery ... reversed everything medical science thought about the subject. And in aeronautics and guided missiles [the secrets] proved to be downright alarming. Army Air Force experts declare publicly that in rocket power and guided missiles the Nazis were ahead of us by at least ten years.
Note: To read the entire fascinating article, click here. To verify this article on the Harper's Magazine website, click here. How can the Nazi technology have been so far superior to that of the allies? For the riveting testimony of numerous military officers on the back engineering of UFO technologies, click here.
According to the American Psychological Association, "Misinformation is false or inaccurate information – getting the facts wrong. Disinformation is false information which is deliberately intended to mislead – intentionally misstating the facts." What we've seen over the past several years is our government purveying disinformation – deliberately misleading the public. When our government peddles disinformation, it undermines the public trust. That's why only 22 percent of Americans say they trust the government. Hillary Clinton's campaign made and paid for the Russian collusion hoax, which asserted that Donald Trump had "worked with the Russians to try to rig the 2016 election," to quote then-House Judiciary Chairman Jerrold Nadler (D-N.Y.). Clinton and her campaign ... were working behind the scenes with government agents – including the FBI and elected Democrats – to spread disinformation. Several operatives within the FBI were promoting the hoax and giving it the appearance of fact, which allowed the media to cover the issue ad infinitum. One FBI agent, Kevin Clinesmith, even lied to the FISA Court so the government could continue monitoring the phone calls of U.S. citizens. The hoax cost taxpayers millions of dollars, first with the Mueller Report and then the Durham Report. Yet no collusion was found, just disinformation. Retired Dr. Anthony Fauci, who served as director of the National Institute of Allergy and Infectious Diseases ... [asserted] the natural origin of the COVID-19 virus. Several years later, there is a widespread assumption that the virus leaked from the Wuhan Virility Institute in China. Fauci did not want people to believe the lab-leak theory, perhaps because he and others had worked with and provided federal funds to that laboratory.
Note: Watch our 15-min Mindful News Brief video on the strong evidence that bioweapons research created COVID-19. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
High-level former intelligence and national security officials have provided crucial assistance to Silicon Valley giants as the tech firms fought off efforts to weaken online monopolies. John Ratcliffe, the former Director of National Intelligence, Brian Cavanaugh, a former intelligence aide in the White House, and [former White House National Security Advisor Robert] O'Brien jointly wrote to congressional leaders, warning darkly that certain legislative proposals to check the power of Amazon, Google, Meta, and Apple would embolden America's enemies. The letter left unmentioned that the former officials were paid by tech industry lobbyists at the time as part of a campaign to suppress support for the legislation. The Open App Markets App was designed to break Apple and Google's duopoly over the smartphone app store market. The companies use their control over the app markets to force app developers to pay as much as 30 percent in fees on every transaction. Breaking up Apple and Google's hold over the smartphone app store would enable greater free expression and innovation. The American Innovation and Choice Online Act similarly encourages competition by preventing tech platforms from self-preferencing their own products. The Silicon Valley giants deployed hundreds of millions of dollars in lobbying efforts to stymie the reforms. For Republicans, they crafted messages on national security and jobs. For Democrats, as other reports have revealed, tech giants paid LGBT, Black, and Latino organizations to lobby against the reforms, claiming that powerful tech platforms are beneficial to communities of color and that greater competition online would lead to a rise in hate speech.The lobbying tactics have so far paid off. Every major tech antitrust and competition bill in Congress has died over the last four years.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and Big Tech from reliable major media sources.
A disturbing trend of undercover federal agents engaging minors online to plan acts related to terrorism abroad, then arresting them shortly after they turn 18, ought to raise eyebrows as well as outrage, given that many of these targets are teens who have significant cognitive and intellectual disabilities. The most recent case in Colorado involves Humzah Mashkoor, an 18-year-old from Westminster charged with "attempting to provide material support to a designated foreign terrorist organization," according to a U.S. Department of Justice December 2023 press release. Months earlier, in July last year, FBI agents arrested Davin Daniel Meyer, 18, of Castle Rock, charged with the same crime, which can carry a stiff penalty of decades in prison. And in June, 18-year-old Mateo Ventura of Massachusetts was charged with a similar crime of intention after being in contact not with terrorists but with undercover FBI agents. A fourth case occurred last year in Philadelphia. When you look at the striking similarities of these cases, it's not unreasonable to conclude that federal agents are failing morally and ethically by seemingly coaxing and cajoling minors – including two Colorado children with limited intellectual capacity and no history of harming anyone – to cross a line. The FBI agents then "get their man" – even before these individuals are in fact men. Enough time has gone by to show the human element to this story, but no reporters seem to be interested.
Note: Read more about the FBI's manufacture of terrorist plots. For more along these lines, see concise summaries of deeply revealing news articles on law enforcement corruption and terrorism from reliable major media sources.
A flurry of reports picked up on the arrest of Mateo Ventura, an 18-year-old resident of the sleepy town of Wakefield, echoing government claims that an international terrorist financier and ISIS supporter had just been busted. The Department of Justice's own press release on the case likewise trumpeted Ventura's arrest for "knowingly concealing the source of material support or resources that he intended to go to a foreign terrorist organization." Ventura had never actually funded any terrorist group. The only "terrorist" he is accused of ever being in contact with was an undercover FBI agent who befriended him online as a 16-year-old, solicited small cash donations in the form of gift cards, and directed him not to tell anyone else. Mateo suffered from childhood developmental issues and had been forced to leave his school due to bullying. His case is less a serious terrorism bust than one of the many instances in which a troubled or mentally unfit young man was groomed by undercover FBI agents to commit a crime that would not have otherwise happened. This law enforcement tactic has been criticized by national security researchers who have scrutinized the FBI's role in manufacturing terrorism cases using vulnerable people who would have been unable to commit crimes without prolonged government assistance and encouragement. A 2014 Human Rights Watch report ... said, "In this way, the FBI may have created terrorists out of law-abiding individuals."
Note: Read more about the FBI's manufacture of terrorist plots. For more along these lines, see concise summaries of deeply revealing news articles on law enforcement corruption and terrorism from reliable major media sources.
A detainee held in the US prison camp at Guantánamo Bay who was used as a human guinea pig in the CIA's post-9/11 torture program has produced the most comprehensive and detailed account yet seen of the brutal techniques to which he was subjected. Abu Zubaydah has created a series of 40 drawings that chronicle the torture he endured in a number of CIA dark sites between 2002 and 2006 and at Guantánamo Bay. In the absence of a full official accounting of the torture program, which the CIA and the FBI have labored for years to keep secret, the images give a unique and searing insight into a grisly period in US history. The drawings, which Zubaydah has annotated with his own words, depict gruesome acts of violence, sexual and religious humiliation, and prolonged psychological terror committed against him and other detainees. Zubaydah's sketches provide a unique visual record of the US government's use of torture in the wake of 9/11. Videotapes of Zubaydah being tortured were filmed by the CIA but then destroyed in violation of a court order, while a 6,700-page torture report by the Senate intelligence committee remains secret almost a decade after it was completed. Though the full Senate report has never been made public, its conclusion is known: that the abuse of Zubaydah and other detainees failed to elicit any new intelligence. In other words, torture does not work. The US initially claimed [Zubaydah] was a top al-Qaida operative but was forced to concede he was not even a member of the terror group.
Note: Read the "10 Craziest Things in the Senate Report on Torture." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The Biden administration took a public stand last year against the abuse of spyware to target human rights activists, dissidents and journalists: It blacklisted the most notorious maker of the hacking tools, the Israeli firm NSO Group. But the global industry for commercial spyware – which allows governments to invade mobile phones and vacuum up data – continues to boom. Even the U.S. government is using it. The Drug Enforcement Administration is secretly deploying spyware from a different Israeli firm, according to five people familiar with the agency's operations, in the first confirmed use of commercial spyware by the federal government. The most sophisticated spyware tools – like NSO's Pegasus – have "zero-click" technology, meaning they can stealthily and remotely extract everything from a target's mobile phone, without the user having to click on a malicious link to give Pegasus remote access. They can also turn the mobile phone into a tracking and secret recording device, allowing the phone to spy on its owner. But hacking tools without zero-click capability, which are considerably cheaper, also have a significant market. Commercial spyware has been used by intelligence services and police forces to hack phones used by drug networks and terrorist groups. But it has also been abused by numerous authoritarian regimes and democracies to spy on political opponents and journalists. This has led governments to a sometimes tortured rationale for their use.
Note: Read about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.
The largest undercover force the world has ever known is the one created by the Pentagon over the past decade. Some 60,000 people now belong to this secret army, many working under masked identities and in low profile, all part of a broad program called "signature reduction." The force, more than ten times the size of the clandestine elements of the CIA, carries out domestic and foreign assignments ... sometimes hiding in private businesses and consultancies. The newest and fastest growing group is the clandestine army that never leaves their keyboards. These are the cutting-edge cyber fighters and intelligence collectors who assume false personas online ... or even engage in campaigns to influence and manipulate social media. Hundreds work in and for the NSA, but over the past five years, every military intelligence and special operations unit has developed some kind of "web" operations cell that both collects intelligence and tends to the operational security of its very activities. No one knows the program's total size, and the explosion of signature reduction has never been examined for its impact on military policies and culture. Congress has never held a hearing on the subject. And yet the military developing this gigantic clandestine force challenges U.S. laws, the Geneva Conventions, the code of military conduct and basic accountability. A major task of signature reduction is keeping all of the organizations and people, even the automobiles and aircraft involved in the clandestine operations, masked. The signature reduction industry also works to figure out ways of spoofing and defeating everything from fingerprinting and facial recognition at border crossings, to ensuring that undercover operatives can enter and operate in the United States, manipulating official records to ensure that false identities match up.
Note: Learn more about mission creep in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on corruption in the military and in the intelligence community from reliable major media sources.
The existence of a squad of police officers sent deep undercover in political groups was so top secret that many of the UK's most senior officers were completely oblivious until they began reading reports in the Guardian 10 years ago. When Lisa Jones ... and her friends established that [her boyfriend Mark] Kennedy was a police officer who had been spying on climate change activists, the story [collapsed] a major trial ... quashing the convictions of environmental activists who had been prosecuted for conspiring to shut down one of the UK's biggest power stations. The police spies initially belonged to the Special Demonstration Squad (SDS), which was created to control the restive protests of the late 1960s, including those opposed to the war in Vietnam, but continued to monitor protest groups for a further four decades. Their deployments typically lasted four to five years, with officers living alongside political campaigners, forming deep bonds of friendship, or romantic liaisons, with their targets. At least three of the police spies fathered children with women they met while undercover. Over more than four decades, at least 139 police officers were given fake identities to closely monitor the inner workings of more than 1,000 political groups. These police spies were tasked with gathering intelligence that could be used to disrupt and monitor political groups. Their targets included the black power movement, the anti-apartheid campaign, leftwing groups, and anarchists. Many ... were instructed by their superiors to adopt the identities of dead children to lend credibility to their aliases – with some, in a macabre ritual, even visiting the graves of the deceased children whose identities they were using. One of the most notorious police spies, Bob Lambert, who adopted the identity of a seven–year-old boy who had died of a congenital heart defect in 1959.
Note: Read more about the dozens of activists tricked into having romantic relationships with undercover police. For more along these lines, read our concise summaries of news articles on police corruption.
As white supremacists have carried out a growing number of deadly attacks in recent years, the FBI has come under mounting criticism for its failure to address the threat posed by far-right extremist ideologies, whose adherents account for most of the politically motivated violence in the U.S. At the same time, the bureau has also been heavily criticized for devoting large resources to surveilling political dissent by groups and individuals, often of color, who pose no threat but are critical of the government because they oppose official immigration policies or demand police accountability. The FBI’s preoccupation with policing nonviolent critical ideologies while neglecting to investigate ideologies tied to real, and increasing, violence was perhaps best captured in an infamous 2017 threat assessment report warning law enforcement agencies of the supposed rise of a “black identity extremist” movement targeting police. The black identity extremism category was a product of the FBI’s imagination. Last year ... bureau officials told legislators that they were doing away with a set of earlier domestic terrorism categories in favor of four larger ones. The FBI’s fictional black identity extremists would now be lumped together with white supremacists under a new “racially motivated violent extremism” category. That false equivalence made it virtually impossible for the public to know whether the FBI was devoting resources to investigating real threats of racist violence or social and racial justice groups critical of government.
Note: Read a revealing essay on COINTELPRO, the FBI program that targeted civil rights and anti-war activists from 1965-1975. For more along these lines, see concise summaries of deeply revealing news articles on civil liberties from reliable major media sources.
Annie Jacobsen [is] author of the book Area 51: An Uncensored History of America's Top Secret Military Base. To write the book, Jacobsen interviewed over 70 people who had first-hand knowledge of the secret facility, including 32 who lived and worked at Area 51. The result is basically the most comprehensive account of the history of Area 51 you can get without a super-high-level security clearance. "Area 51 was the birthplace of overhead espionage for the CIA," [said Jacobsen]. "It's where the U-2 spy plane was first built back in the 1950s, and it's where the intelligence community has worked with its military partners and others to work on espionage platforms. It's also a place where all elements of the Defense Department work on some of their most classified programs along with members of the intelligence community. There's also an element of Area 51 where the CIA trains its foreign paramilitary partners in counterterrorism tactics. They do this out on the wilds of Area 51 because they can bring some foreign fighters there who would otherwise not be welcomed into the country. I have interviewed scores of very smart, very highly placed government personnel who visited the base and believe the technology they saw is so advanced that they question whether or not it's manmade. That's intriguing to me. I don't report on that because there is no documentation to support that claim, but that is the opinion of many people that I know."
Note: Don't miss Jacobsen's engaging, educational book Area 51: An Uncensored History of America's Top Secret Military Base, which reveals how the public, U.S. Congress, and even presidents were lied to about what was going on at this mysterious facility. For more along these lines, see concise summaries of deeply revealing news articles on UFOs from reliable major media sources.
Newly released files from “behavior modification,” or mind control, projects conducted as part of the infamous Project MKUltra reveal the CIA experimented in more than controlling humans with psychotropic drugs, electrical shocks and radio waves—they also created field operational, remote-controlled dogs. The documents were provided under the Freedom of Information Act (FOIA) by John Greenewald, founder of The Black Vault, a site specializing in declassified government records. In one declassified letter (released as file C00021825) a redacted individual writes to a doctor (whose name has also been redacted) with advice about launching a laboratory for experiments in animal mind control. The writer of the letter is already an expert in the field, whose earlier work had culminated with the creation of six remote control dogs, which could be made to run, turn and stop. The letter writer characterizes the work with remote-controlling dogs as a success, describing “a demonstrated procedure for controlling the free-field behaviors of an unrestrained dog.” Attached to the letter is the writer’s final report from his earlier research, published in 1965, titled “Remote Control Behavior with Rewarding Electrical Stimulation of the Brain,” with the principle investigator’s name redacted. The prospect of a potential new laboratory seems to fire the letter writer’s imagination, who describes potential experimentation on “a range of species,” should they want to move past “basic research.”
Note: If the CIA had this level of sophistication in 1967, what do you think they are capable of now? Read more on the development of microchip implants. For more along these lines, see concise summaries of deeply revealing news articles on CIA mind control programs.
Robert F. Kennedy Jr. pulled up to the massive Richard J. Donovan Correctional Center, a California state prison complex. Kennedy was there to visit Sirhan B. Sirhan, the man convicted of killing his father, Sen. Robert F. Kennedy, nearly 50 years ago. It was the culmination of months of research by Kennedy into the assassination. He would not discuss the specifics of their conversation. But when it was over, Kennedy had joined those who believe there was a second gunman, and that it was not Sirhan who killed his father. He now supports the call for a re-investigation of the assassination led by Paul Schrade, who also was shot in the head as he walked behind Kennedy in the pantry of the Ambassador Hotel ... but survived. Though Sirhan admitted at his trial in 1969 that he shot Kennedy, he claimed from the start that he had no memory of doing so. And midway through Sirhan's trial, prosecutors provided his lawyers with an autopsy report that launched five decades of controversy: Kennedy was shot four times at point-blank range from behind, including the fatal shot behind his ear. But Sirhan, a 24-year-old Palestinian immigrant, was standing in front of him. Was there a second gunman? The debate rages to this day. Sirhan's appeals have been rejected ... as recently as 2016, even with the courts considering new evidence that has emerged over the years that as many as 13 shots were fired - Sirhan's gun held only eight bullets - and that Sirhan may have been subjected to coercive hypnosis, a real life "Manchurian candidate."
Note: In 2006, BBC described new evidence that placed "three senior CIA operatives at the scene of Robert Kennedy's assassination" and reported that Sirhan may have been a Manchurian Candidate programmed to act as a decoy for the real assassin. In 2011 the Boston Globe reported that RFK harbored suspicions that the CIA was behind his brother's murder. For more along these lines, see concise summaries of deeply revealing news articles on assassinations reported by reliable major media sources.
MuckRock, a news organization that specializes in filing Freedom of Information Act (FOIA) requests with state and federal government bodies, received mysterious documents about mind control, seemingly by accident. Journalist Curtis Waltman was writing to the Washington State Fusion Center (WSFC), a joint operation between Washington State law enforcement and the federal government to request information about Antifa and white supremacist groups. He got responses to the questions he asked, but also a file titled "EM effects on human body.zip." At least some of the images [in the file] appear to be part of an article in Nexus magazine describing a 1992 lawsuit brought by one John St. Clair Akewi against the NSA. Akewi claimed that the NSA had the "ability to assassinate US citizens covertly or run covert psychological control operations to cause subjects to be diagnosed with ill mental health" and was documenting their alleged methods. The federal government has absolutely experimented with mind control in a variety of methods, but the documents here do not appear to be official. Waltman had no idea why these documents were included in his request and isn't sure why the government is holding them. The WSFC did not respond to requests for more information.
Note: Text and images from the Nexus magazine article referenced above are available on this page. For more along these lines, see our resource-filled mind control information center and concise summaries of deeply revealing mind control news articles from reliable major media sources.
Ex-CIA Director James Woolsey said it himself. Yes, the U.S. meddles in other countries elections. But when we do it, it’s for the right reasons. “Only for a very good cause,” he says, because our government is ensuring foreign elections result in “democracy.” But doesn’t democracy demand that people decide for themselves? And how well has U.S. meddling actually worked out? According to Carnegie Mellon University researcher Dov Levin, the United States has attempted to sway elections in other countries more than 80 times worldwide between 1946 and 2000. But those 80+ instances of the U.S. interfering with other nations elections does not include regime change efforts. In the 1970s in Chile, the CIA conducted a botched kidnapping of General René Schneider, the Chilean Army’s commander-in-chief, that resulted in Schneider’s death. The plot was an effort to undermine the presidency of Salvador Allende, which may have fueled the violent coup that led to Allende’s overthrow. In 1974, Henry Kissinger was quoted in Newsweek, saying about Chile: “I don’t see why we have to let a country go communist due to the irresponsibility of its own people.” Levin’s tally also does not include covert coup d’etats where our government overthrows a foreign leader like the the U.S. did in Iran in 1953 or in Guatemala in 1954. In fact, Salon magazine documents 35 nations in which the United States has overthrown legitimate governments and or supported fascists, drug lords or terrorists. U.S. intervention is rarely about democracy.
Note: Truth in Media is one of the few media outlets speaking truth from a balanced place with reliable facts can be verified. Don't miss the excellent video at the webpage above. For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources.
The National Security Agency maintains a page on its website that outlines its mission statement. Since at least May 2016, the surveillance agency had featured honesty as the first of four “core values” listed on NSA.gov, alongside “respect for the law,” “integrity,” and “transparency.” On January 12, however, the NSA removed the mission statement page – which can still be viewed through the Internet Archive – and replaced it with a new version. Now, the parts about honesty and the pledge to be truthful have been deleted. The agency’s new top value is “commitment to service,” which it says means “excellence in the pursuit of our critical mission.” Those are not the only striking alterations. All references to “trust,” “honor,” and “openness” have disappeared. The agency previously stated on its website that it embraced transparency and claimed that all of its activities were aimed at “ensuring the safety, security, and liberty of our fellow citizens.” That has also been discarded. The new list of values includes the additions “respect for people” and “accountability.” But the section on respecting people is a reference to diversity within the NSA workforce, not a general commitment to members of the public. Accountability is defined as taking “responsibility for our decisions.” The one core value that remains essentially unchanged is “respect for the law,” which the agency says means it is “grounded in our adherence to the U.S. Constitution and compliance with the U.S. laws, regulations and policies that govern our activities.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
The relationship between US national security and Hollywood is much deeper and more political than anyone has ever acknowledged. It is a matter of public record that the Pentagon has had an entertainment liaison office since 1948. The Central Intelligence Agency (CIA) established a similar position in 1996. Although it was known that they sometimes request script changes in exchange for advice, permission to use locations, and equipment such as aircraft carriers, each appeared to have passive, and largely apolitical roles. Files we obtained, mainly through the US Freedom of Information Act, show that between 1911 and 2017, more than 800 feature films received support from the US Government’s Department of Defence (DoD), a significantly higher figure than previous estimates indicate. These included blockbuster franchises such as Transformers, Iron Man, and The Terminator. On television, we found over 1,100 titles received Pentagon backing – 900 of them since 2005, from Flight 93 to Ice Road Truckers to Army Wives. When we include individual episodes for long running shows like 24, Homeland, and NCIS, as well as the influence of other major organisations like the FBI and White House, we can establish unequivocally for the first time that the national security state has supported thousands of hours of entertainment. For its part, the CIA has assisted in 60 film and television shows since its formation in 1947. This is a much lower figure than the DoD’s but its role has nonetheless been significant.
Note: Read how the Pentagon controls the script of hundreds of movies, some quite well known. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
[The CIA] has since 1945 succeeded in deposing or killing a string of leaders, but was forced to cut back after a Senate investigation in the 1970s. Some of the most notorious of the CIAs operations to kill world leaders were those targeting the late Cuban president, Fidel Castro. Attempts ranged from snipers to imaginative plots worthy of spy movie fantasies. But although the CIA attempts proved fruitless in the case of Castro, the US intelligence agency has ... succeeded in deposing or killing a string of leaders elsewhere around the world either directly or, more often, using sympathetic local military, locally hired criminals or pliant dissidents. On Friday, [North Korea accused] the CIA and South Koreas intelligence service of being behind an alleged recent assassination attempt on its leader Kim Jong-un. Such a claim cannot be dismissed as totally outlandish given the long list of US involvement in coups and assassinations worldwide. The agency was forced to cut back on such killings after ... then president Gerald Ford signed in 1976 an executive order stating: No employee of the United States government shall engage in, or conspire in, political assassination. In spite of this, the US never totally abandoned the strategy, simply changing the terminology from assassination to targeted killings. A leaked document obtained by WikiLeaks and released earlier this year showed the CIA in October 2014 looking at hacking into car control systems, [potentially allowing] an agent to stage a car crash.
Note: Strong evidence suggests that courageous journalist Michael Hastings was killed when his car controls were hacked causing him to crash head on into a tree. For more along these lines, see concise summaries of deeply revealing news articles on verified or suspected assassinations from reliable major media sources.
Juan Pablo Escobar, the son of the most dangerous criminal in the history of Colombia, Pablo Escobar, has written a new book on the life and death of his father in which he said that the drug trafficker worked for the CIA. "In my book, I recount the story of my father working for the CIA selling cocaine to finance the fight against communism in Central America. There are names like George Bush Sr. and many more," said Escobar. "The drug business is very different from what you might imagine. The CIA was buying control of the drug supply going into each country and making huge profits. My father was a cog in their global drug trafficking network. When he no longer served them, they had him killed," said Juan Pablo Escobar. Remember that Bush was chief of the CIA in the administration of Richard Nixon. In his book Pablo Escobar Infraganti, the son of Escobar, known until 2009 by the name of Juan Sebastián Marroquín, reveals the corruption stories that made his father so "successful," despite the violence in which he immersed Colombia. Juan Pablo Escobar rejected the idea of glamorizing the drug trafficking business as portrayed in series like Narcos, of Netflix, which deal with the lives of the drug dealers and hitmen that worked for his father. "It is not true that a drug kingpin has riches, girls and power. The more power my father had, the poorer he lived, " he said.
Note: This article is in Spanish on the msn.com website at the link above, yet the English major media is completely ignoring it, including MSN, which has no English version of the article. For more, read this article. For excellent evidence of CIA involvement in drug running, see what two top journalists have written. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Carnegie Mellon University researcher Dov Levin [has compiled a] historical database that tracks U.S. involvement in meddling with foreign elections over the years. The U.S. has ... tried to influence the outcome of another country's election ... more than 80 times worldwide between 1946 and 2000. One example of that was our intervention in Serbia, Yugoslavia in the 2000 election there. Slobodan Milosevic was running for re-election, and we didn't want him to stay in power there. So we intervened in various ways for the opposition candidate, Vojislav Kostunica. And we gave funding to the opposition, and we gave them training and campaigning aide. That assistance was crucial in enabling the opposition to win. About one-third of [election interventions] are public, and two-third of them are covert. In other words, they're not known to the voters in the target before the election. Covert coup d'etats like the United States did in Iran in 1953 or in Guatemala in 1954 [were not counted, only times] when the United States [tried] directly to influence an election for one of the sides. The United States is the most common user of this technique. Russia or the Soviet Union since 1945 has used it half as much. My estimate has been 36 cases between 1946 to 2000. We know also that the Chinese have used this technique and the Venezuelans when the late Hugo Chavez was still in power in Venezuela and other countries.
Note: For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources.
Current and former members of Congress, U.S. officials, 9/11 Commissioners and the families of the attack's victims want 28 top-secret pages of a congressional report released. Bob Graham, the former Florida governor, Democratic U.S. Senator and onetime chairman of the Senate Select Committee on Intelligence, says the key section of a top secret report ... should be declassified to shed light on possible Saudi support for some of the 9/11 hijackers. Graham was co-chair of Congress' bipartisan "Joint Inquiry" into intelligence failures surrounding the attacks on Sept. 11, 2001, that issued the report in 2003. Graham and his Joint Inquiry co-chair in the House, former Representative Porter Goss (R-FL) - who went on to be director of the CIA - say the 28 pages were excised from their report by the Bush Administration in the interest of national security. Graham wouldn't discuss the classified contents, but says the 28 pages outline a network of people he believes supported hijackers in the US, [and] believes the hijackers were "substantially" supported by Saudi Arabia. Asked if the support was from government, rich people or charities, the former senator replies, "all of the above." Graham and others think the reason for classifying the pages was to protect the U.S. relationship with ally Saudi Arabia. In addition to Graham and Goss ... Tim Roemer, former Democratic U.S. Representative from Indiana who was the only person to serve on both Congress' Joint Inquiry and the 9/11 Commission [has] read the redacted pages. Roemer says it's time to let everyone know what's in the top secret documents.
Note: Watch this revealing video segment on the CBS website. Read more on the Saudi role in Sept. 11 and the hidden 9/11 report pages. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
The “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains [that] domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. This basically formalizes what was already happening. We’ve known for a couple of years now that the Drug Enforcement Administration and the IRS were getting information from the NSA. Because that information was obtained without a warrant, the agencies were instructed to engage in “parallel construction” when explaining to courts and defense attorneys how the information had been obtained. It certainly isn’t the only time that that national security apparatus has let law enforcement agencies benefit from policies that are supposed to be reserved for terrorism investigations in order to get around the Fourth Amendment, then instructed those law enforcement agencies to misdirect, fudge and outright lie about how they obtained incriminating information. This isn’t just a few rogue agents. The lying has been a matter of policy.
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
Scores of low-flying planes circling American cities are part of a civilian air force operated by the FBI and obscured behind fictitious companies. The aircraft are equipped with high-tech cameras, and ... technology capable of tracking thousands of cellphones. The surveillance equipment is used for ongoing investigations, the FBI says, generally without a judge's approval. The Drug Enforcement Administration has its own planes, also registered to fake companies, according to a 2011 Justice Department ... report. At the time, the DEA had 92 aircraft in its fleet. And since 2007, the U.S. Marshals Service has operated an aerial surveillance program with its own fleet equipped with technology that can capture data from thousands of cellphones. "These are not your grandparents' surveillance aircraft," said Jay Stanley, a senior policy analyst with the American Civil Liberties Union. Evolving technology can record higher-quality video from long distances, even at night, and can capture certain identifying information from cellphones using a device known as a "cell-site simulator" [to] trick pinpointed cellphones into revealing identification numbers of subscribers, including those not suspected of a crime. The Obama administration [has] been directing local authorities through secret agreements not to reveal their own use of the devices. During the past few weeks, the AP tracked planes from the FBI's fleet on more than 100 flights over at least 11 states plus the District of Columbia.
Note: For more along these lines, see concise summaries of deeply revealing news articles about the corrupt intelligence agencies that facilitate the erosion of privacy rights in the U.S. and elsewhere.
Joseph Rivers ... pulled together $16,000 in seed money to fulfill a lifetime dream of starting a music video company. Last month, Rivers took the first step in that voyage [by] boarding an Amtrak train headed for Los Angeles. He never made it. A DEA agent boarded the train at the Albuquerque Amtrak station and began asking various passengers, including Rivers, where they were going and why. When Rivers replied that he was headed to LA to make a music video, the agent asked to search his bags. Rivers complied. The agent found Rivers's cash, still in a bank envelope. He explained why he had it. The agents didn't believe him. Rivers let them call his mother back home to corroborate the story. They didn't believe her, either. The agents found nothing in Rivers's belongings that indicated that he was involved with the drug trade. They didn't arrest him or charge him with a crime. But they took his cash anyway, every last cent, under the authority of the Justice Department's civil asset forfeiture program. Rivers says he suspects he may have been singled out for a search because he was the only black person on that part of the train. According to a Washington Post investigation last year ... asset forfeiture is lucrative. In fiscal year 2014 Justice Department agencies made a total of $3.9 billion in civil asset seizures, versus only $679 million in criminal asset seizures. Asset forfeitures have more than doubled during President Obama's tenure.
Note: Read a New York Times article on this program which allows law enforcement agencies to seize money with impunity. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of civil liberties from reliable major media sources.
Drug Enforcement Administration agents allegedly had "sex parties" with prostitutes hired by local drug cartels overseas over a period of several years, according to a report released Thursday by the Justice Department's watchdog. The agents, some of whom had top-secret security clearances, received suspensions of two to 10 days. Former police officers in Colombia also alleged that three DEA supervisory special agents were provided with money, expensive gifts and weapons from drug cartel members, according to the report. The findings were part of a much broader investigation into the handling of allegations of sexual harassment and misconduct from fiscal 2009 to 2012 at federal law enforcement agencies. [Justice Department Inspector General Michael E.] Horowitz said the investigation was "significantly impacted and unnecessarily delayed" by repeated difficulties his office had in obtaining relevant information from the FBI and the DEA. When he did receive the information, he said, it "was still incomplete." Sen. Charles Grassley (R-Iowa), chairman of the Judiciary Committee, called on the Justice Department on Thursday to adopt a zero-tolerance policy for employees who purchase sex. "The Department of Justice may not be taking adequate steps to prevent its own employees from buying sex and thereby contributing to the demand for the human sex trade," Grassley wrote to Acting Deputy Attorney General Sally Quillian Yates.
Note: DEA agents caught being supplied prostitutes by drug cartels are merely suspended for a few days? What's up with that? Read the gripping stories of two award-winning journalists giving powerful evidence of direct DEA and CIA involvement in and support of drug running and drug cartels. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Gary Webb knew his story would cause a stir. The newspaper report he'd written suggested that a US-backed rebel army in Latin America was supplying the drugs responsible for blighting some of Los Angeles's poorest neighbourhoods and, crucially, that the CIA must have known about it. [Webb's report, titled] "Dark Alliance" has been called one of the most explosive and controversial exposs in American journalism. Nineteen years on, the story of Webbs investigation and its aftermath has been given the full Hollywood treatment. Kill the Messenger, based on his account of what happened and a book of the same name about the saga by journalist Nick Schou was recently released in cinemas. What Webb did that nobody else had was to follow the supply chain right to the poverty stricken streets of Los Angeles. Webb summed up the heart of his ... series thus: It is one of the most bizarre alliances in modern history. The union of a U.S. backed army attempting to overthrow a revolutionary socialist government and the uzi-toting gangstas of Compton and South-Central Los Angeles. Perhaps most damningly, Webb wrote that crack was virtually unobtainable in the citys black neighbourhoods before members of the CIAs army began supplying it. [In 1999], Webb said that after spending three years of his life looking into it, he was more convinced than ever that the U.S. Government's responsibility for the drug problems in South Central L.A. was greater than I ever wrote in the newspaper.
Note: Read an excellent, concise summary written by Gary Webb himself of what happened on this highly revealing Dark Alliance series. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The FBI and major media outlets yesterday trumpeted the ... latest counterterrorism triumph: the arrest of three Brooklyn men, ages 19 to 30, on charges of conspiring to travel to Syria to fight for ISIS. It appears that none of the three men was in any condition to travel or support the Islamic State, without help from the FBI informant. One of the frightening terrorist villains told the FBI informant that, beyond having no money, he had encountered a significant problem in following through on the FBI’s plot: his mom had taken away his passport. In this regard, this latest arrest appears to be quite similar to the overwhelming majority of terrorism arrests the FBI has proudly touted over the last decade. These cases ... end up sending young people to prison for decades for “crimes” which even their sentencing judges acknowledge they never would have seriously considered, let alone committed, in the absence of FBI trickery. We’re constantly bombarded with dire warnings about the grave threat of [terrorism]. But how serious of a threat can all of this be, at least domestically, if the FBI continually has to resort to manufacturing its own plots by trolling the Internet in search of young drifters and/or the mentally ill whom they target? Shouldn’t there be actual plots, ones that are created and fueled without the help of the FBI? The Justice Department is aggressively pressuring U.S. allies to employ these same entrapment tactics in order to create their own terrorists, who can then be paraded around as proof of the grave threat. The FBI’s terrorism strategy — keep fear alive — drives everything they do.
Note: Human Rights Watch has documented the government manufacture of fake "terrorism" plots being used to keep fear alive in war on terror. There is even evidence that the 1993 World Trade Center bombing was an F.B.I. entrapment plan gone awry. In 2012, the New York Times exposed the pattern of F.B.I. entrapment used to produce these fake "terrorism" plots. How can corrupt intelligence agencies continue to blatantly manipulate public perception like this?
Dean Baquet, the executive editor of the New York Times, believes his newspaper – in company with the US mainstream media – failed their audiences after 9/11. He told the German news magazine Der Spiegel that he agreed with the criticism originally made by an NYT reporter, James Risen, Baquet said: “The mainstream press was not aggressive enough after 9/11, was not aggressive enough in asking questions about a decision to go to war in Iraq, was not aggressive enough in asking the hard questions about the war on terror. I accept that for the Los Angeles Times and the New York Times”. Baquet, in charge of the NYT since May 2014, was previously editor-in-chief of the LA Times. In his wide-ranging interview with Der Spiegel, Baquet also spoke about the NSA whistleblower Edward Snowden having chosen to tell his story to the Guardian. He said he regards the Guardian as “a new competitor [for the NYT] in the digital age.” He said: “Does it make me nervous that they compete with us and in fact beat us on the Snowden story? Yes. "It hurt a lot. It meant two things. Morally, it meant that somebody with a big story to tell didn’t think we were the place to go, and that’s painful. And then it also meant that we got beaten on what was arguably the biggest national security story in many, many years.
Note: When asked about the New York Times' refusal to report on military drone base locations in the interview referenced above, Baquet recalls, "A high-ranking CIA official called me up and made the case to leave out where the drone base was. It was Saudi Arabia. I accepted it. And I was wrong." For more along these lines, see these concise summaries of deeply revealing articles about mass media manipulation.
28 still-classified pages pages in a congressional inquiry on 9/11 ... raise questions about Saudi financial support to the hijackers in the United States prior to the attacks. Both the administrations of George W. Bush and Barack Obama have refused to declassify the pages on grounds of national security. But [some] members of Congress who have read the pages ... say national security has nothing to do with it. Former Florida Senator Bob Graham, a Democrat who co-chaired the joint investigation of the House and Senate intelligence committees into the Sept. 11 attacks ... maintains that nothing in them qualifies as a legitimate national security secret. The 2002 joint congressional committee probe [Graham] co-chaired reported only that, “contacts in the United States helped hijackers ...” But in an interview with Newsweek, Graham said “the contacts” were Saudis with close connections to their government. The Florida Democrat charged that there has been “an organized effort to suppress information” about Saudi support for terrorism, which "started long before 9/11 and continued ... after 9/11. ISIS ... is a product of Saudi ideals, Saudi money and Saudi organizational support, although now they are making a pretense of being very anti-ISIS,” Graham added. The two co-chairman of ... the 9/11 Commission, likewise urged the White House to declassify the 28 pages. “I’m embarrassed that they’re not declassified,“ former Rep. Lee Hamilton (D-Ind) said at a press conference with his co-chair Tom Kean, the former Republican governor of New Jersey. Meanwhile, Washington and the Saudi royals still maintain their decades-long, cozy relationship.
Note: Several current and former government officials are trying to expose the Saudi government money behind ISIS and other terrorist groups. For more along these lines, read concise summaries of deeply revealing 9/11 investigation news from reliable major media sources.
U.S. violent crimes including murders fell 4.4 percent in 2013 to their lowest number since the 1970s, continuing a decades-long downturn, the FBI said on Monday. The law enforcement agency's annual Crime in the United States report showed the country had an estimated 1.16 million violent crimes last year, the lowest number since 1.09 million were recorded in 1978. All types of violent crimes were lower, with murder and non-negligent manslaughter off 4.4 percent to 14,196, the lowest figure since 1968. Rape was down 6.3 percent and robbery fell 2.8 percent, the Federal Bureau of Investigation data showed. The violent crime rate last year was 367.9 for each 100,000 in population, down 5.1 percent from 2012. The rate has fallen every year since at least 1994, the earliest year for readily accessible FBI data, and the 2013 figure was about half the 1994 rate. Property crimes fell 4.1 percent ... the 11th straight yearly decline. In an analysis, the non-profit Pew Charitable Trusts said the drop in crime coincided with a decline in the prison population, with the number of U.S. prisoners down 6 percent in 2013 from its peak in 2008. Thirty-two of the 50 states have seen a drop in crime rates as the rate of imprisonment fell, Pew said. California notched the largest drop in imprisonment rate over the five-year period, at 15 percent, and crime was down 11 percent. The state has been under court order to reduce prison overcrowding, and voters last week approved an initiative that reduced sentences for some crimes.
Note: Why isn't this inspiring news being broadcast widely by the media? And why hasn't the FBI website updated their data on this since 2010? The police and media appear to consistently downplay the huge drop in violent crime since 1994. According to the FBI's own statistics, violent crime has currently dropped to 1/3 or less what it was in 1994. See the revealing FBI graphs and charts here, here, and here. Yet some of these charts have now been removed and mention of this huge decrease downplayed. The obvious reason is that a large decrease in crime might cause people to want to decrease police and FBI budgets. More here.
The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.
Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
A century has passed since the start of World War I, which many people at the time declared was “the war to end all wars.” Unfortunately, wars just kept happening. In influential research sponsored by the World Bank, the Oxford economist Paul Collier has shown that the best predictor of civil war, which is all too common in poor countries, is the availability of lootable resources like diamonds. Whatever other reasons rebels cite for their actions seem to be mainly after-the-fact rationalizations. If you’re a modern, wealthy nation, however, war — even easy, victorious war — doesn’t pay. And this has been true for a long time. In his famous 1910 book The Great Illusion, the British journalist Norman Angell argued that “military power is socially and economically futile.” As he pointed out, in an interdependent world (which already existed in the age of steamships, railroads, and the telegraph), war would necessarily inflict severe economic harm even on the victor. Modern nations can’t enrich themselves by waging war. Yet wars keep happening. Why? Governments all too often gain politically from war, even if the war in question makes no sense in terms of national interests. Nations almost always rally around their leaders in times of war, no matter how foolish the war or how awful the leaders. Argentina’s junta briefly became extremely popular during the Falklands war. For a time, the “war on terror” took President George W. Bush’s approval to dizzying heights, and Iraq probably won him the 2004 election. True to form, Mr. Putin’s approval ratings have soared since the Ukraine crisis began.
Note: For more on this, see this concise summary of War Is A Racket, a powerful book written by one of the most highly decorated US generals ever.
An internal investigation by the C.I.A. has found that its officers penetrated a computer network used by the Senate Intelligence Committee in preparing its damning report on the C.I.A.’s detention and interrogation program. The report by the agency’s inspector general also found that C.I.A. officers read the emails of the Senate investigators and sent a criminal referral to the Justice Department based on false information. The investigation also discovered that the officers created a false online identity to gain access on more than one occasion to computers used by the committee staff. The inspector general’s account of how the C.I.A. secretly monitored a congressional committee charged with supervising its activities touched off angry criticism from members of the Senate and amounted to vindication for Senator Dianne Feinstein of California, the committee’s Democratic chairwoman, who excoriated the C.I.A. in March when the agency’s monitoring of committee investigators became public. Senator Mark Udall, Democrat of Colorado and another member of the Intelligence Committee, demanded Mr. Brennan’s resignation. “The C.I.A. unconstitutionally spied on Congress by hacking into the Senate Intelligence Committee computers,” he said in a written statement. “This grave misconduct not only is illegal but it violates the U.S. Constitution’s requirement of separation of powers,” he added.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
Nearly all of the highest-profile domestic terrorism plots in the United States since 9/11 featured the "direct involvement" of government agents or informants, a new report says. Some of the controversial "sting" operations "were proposed or led by informants", bordering on entrapment by law enforcement. Yet the courtroom obstacles to proving entrapment are significant, one of the reasons the stings persist. The lengthy report, released on [July 21] by Human Rights Watch, raises questions about the US criminal justice system's [respect for] civil rights and due process in post-9/11 terrorism cases. [The report] portrays a system that features not just the sting operations but secret evidence, anonymous juries, extensive pretrial detentions and convictions significantly removed from actual plots. "In some cases the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act," the report alleges. Out of the 494 cases related to terrorism the US has tried since 9/11, the plurality of convictions ... are not for thwarted plots but for "material support" charges, a broad category expanded further by the 2001 Patriot Act that permits prosecutors to pursue charges with tenuous connections to a terrorist act or group. Several cases featured years-long solitary confinement for accused terrorists before their trials. Some defendants displayed signs of mental incapacity. Jurors for the 2007 plot to attack the Fort Dix army base, itself influenced by government informants, were anonymous, limiting defense counsel's ability to screen out bias.
Note: Why was this important news not picked up by any major US media? For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
The former National Security Agency contractor Edward J. Snowden said in a wide-ranging interview ... that the oversight of surveillance programs was so weak that members of the United States military working at the spy agency sometimes shared sexually explicit photos they intercepted. He also said the British government often pioneered the most invasive surveillance programs because its intelligence services operate with fewer restrictions intended to protect individual privacy than its counterparts in the United States and other allies. “In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive,” he said. “So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: ‘Oh, hey, that’s great. Send that to Bill down the way.’ ” Mr. Snowden said that type of sharing ... was “seen as the fringe benefits of surveillance positions.” He said that this was never reported and that the system for auditing surveillance programs was “incredibly weak.” Mr. Snowden had particularly stark criticism for the British government’s surveillance programs, because in Britain the respect for individual privacy, he said, “is not strongly encoded in law or policy.” Because it has fewer restrictions, British intelligence platforms “are used as a testing ground” for programs of all five intelligence partners, a group referred to as “Five Eyes,” which includes Britain, Canada, Australia, New Zealand and the United States.”
Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.
Just weeks before Blackwater guards fatally shot 17 civilians at Baghdad’s Nisour Square in 2007, the State Department began investigating the security contractor’s operations in Iraq. But the inquiry was abandoned after Blackwater’s top manager there issued a threat: “that he could kill” the government’s chief investigator and “no one could or would do anything about it as we were in Iraq.” American Embassy officials in Baghdad sided with Blackwater rather than the State Department investigators as a dispute over the probe escalated in August 2007, the previously undisclosed documents show. The officials told the investigators that they had disrupted the embassy’s relationship with the security contractor and ordered them to leave the country. After returning to Washington, the chief investigator wrote a scathing report to State Department officials documenting misconduct by Blackwater employees and warning that lax oversight of the company, which had a contract worth more than $1 billion to protect American diplomats, had created “an environment full of liability and negligence.” “The management structures in place to manage and monitor our contracts in Iraq have become subservient to the contractors themselves,” the investigator, Jean C. Richter, wrote in an Aug. 31, 2007, memo to State Department officials. “Blackwater contractors saw themselves as above the law,” he said, adding that the “hands off” management resulted in a situation in which “the contractors, instead of Department officials, are in command and in control.”
Note: For more on this, see concise summaries of deeply revealing war crimes news articles from reliable major media sources.
Nearly half of American adults believe the federal government, corporations or both are involved in at least one conspiracy to cover up health information, a new survey finds. Conspiracy theories on everything from cancer cures to cellphones to vaccines are well known and accepted by sizable segments of the population, according to a research letter published this week in JAMA Internal Medicine. The findings reflect "a very low level of trust" in government and business, especially in pharmaceutical companies, says study co-author Eric Oliver, a professor of political science at the University of Chicago. The online survey of 1,351 adults found: • 37% agree the Food and Drug Administration is keeping "natural cures for cancer and other diseases" away from the public because of "pressure from drug companies." • 20% believe health officials are hiding evidence that cellphones cause cancer. • 20% believe doctors and health officials push child vaccines even though they "know these vaccines cause autism and other psychological disorders." • Smaller numbers endorse theories involving fluoride, genetically modified foods and the deliberate infection of African Americans with HIV. • 49% believe at least one of the theories and 18% believe at least three. The beliefs also go along with certain health behaviors, the survey found. Those who believe at least three health conspiracy theories are less likely to use sunscreen, get flu shots or get check-ups and are more likely to use herbal remedies and eat organic foods.
Note: For an intriguing list of 10 major health cover-ups with evidence to back it up, click here.
British spies have developed "dirty tricks" ... that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into "honey traps." Documents taken from the National Security Agency by Edward Snowden ... describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG). According to the documents ... the agency's goal was to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications. The propaganda campaigns use deception, mass messaging and "pushing stories" via Twitter, Flickr, Facebook and YouTube. JTRIG also uses "false flag" operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain's adversaries. Other documents ... show that JTRIG ... used a DDOS attack to shut down Internet chat rooms used by members of the hacktivist group known as Anonymous. A computer virus called Ambassadors Reception was "used in a variety of different areas" and was "very effective." When sent to adversaries ... the virus will "encrypt itself, delete all emails ... and block the computer user from logging on. Spies have long used sexual "honey traps" to snare, blackmail and influence targets. Most often, a male target is led to believe he has an opportunity for a romantic relationship or a sexual liaison with a woman, only to find that the woman is actually an intelligence operative.
Note: You can read the documents released by Snowden at this link and this one. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The British government can tap into the cables carrying the world’s web traffic at will and spy on what people are doing on some of the world’s most popular social media sites ... without the knowledge or consent of the companies. Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated a pilot program to their U.S. partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter. Called “Psychology A New Kind of SIGDEV" (Signals Development), the presentation includes a section that spells out “Broad real-time monitoring of online activity” of YouTube videos, URLs “liked” on Facebook, and Blogspot/Blogger visits. The monitoring program is called “Squeaky Dolphin.” Experts told NBC News the documents show the British had to have been either physically able to tap the cables carrying the world’s web traffic or able to use a third party to gain physical access to the massive stream of data. Representatives of Facebook and Google, which owns YouTube, said they ... were unaware the collection had occurred. The NSA does analysis of social media similar to that in the GCHQ demonstration. In 2010 ... GCHQ exploited unencrypted data from Twitter to identify specific users around the world and target them with propaganda.
Note: Read an article diving deeper and showing how online reputations are ruthlessly destroyed by powerful groups. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
On a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludgeoned each other over 15 rounds in a televised title bout viewed by millions around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with nearly every document inside. They were never caught, and the stolen documents that they mailed anonymously to newspaper reporters ... would become a flood of revelations about extensive spying and dirty-tricks operations by the F.B.I. against dissident groups. Perhaps the most damning document from the cache [was] a 1970 memorandum that ... urged agents to step up their interviews of antiwar activists and members of dissident student groups. “It will enhance the paranoia endemic in these circles and will further serve to get the point across there is an F.B.I. agent behind every mailbox.” Another document, signed by Hoover himself, revealed widespread F.B.I. surveillance of black student groups on college campuses. But the document that would have the biggest impact on reining in the F.B.I.’s domestic spying activities [included] a mysterious word: Cointelpro ... shorthand for Counterintelligence Program. Since 1956, the F.B.I. had carried out an expansive campaign to spy on civil rights leaders, political organizers and suspected Communists, and had tried to sow distrust among protest groups. Among the grim litany of revelations was a blackmail letter F.B.I. agents had sent anonymously to the Rev. Dr. Martin Luther King Jr., threatening to expose his extramarital affairs if he did not commit suicide. The intent of Cointelpro was to destroy lives and ruin reputations.
Note: To learn about the brave citizen burglars who have now revealed themselves and watch the engaging video covering this story, click on the link given above. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Recently, the US House of Representatives voted on an amendment ... that would have curbed the NSA's omnipresent and inescapable [spying] tactics. Despite furious lobbying by the intelligence industrial complex and its allies, and four hours of frantic and overwrought briefings by the NSA's General Keith Alexander, 205 of 422 Representatives voted for the amendment. The vote signaled a clear message to the NSA: we do not trust you. The vote also conveyed another, more subtle message: members of Congress do not trust that the House Intelligence Committee is providing the necessary oversight. On the contrary, "oversight" has become "overlook". Despite being a member of Congress possessing security clearance, I've learned far more about government spying on me and my fellow citizens from reading media reports than I have from "intelligence" briefings. My colleagues feel the same way. In fact, one long-serving conservative Republican told me that he doesn't attend such briefings anymore, because, "they always lie". Many of us worry that Congressional Intelligence Committees are more loyal to the "intelligence community" that they are tasked with policing, than to the Constitution. And the House Intelligence Committee isn't doing anything to assuage our concerns. Supporters of the NSA's vast ubiquitous domestic spying operation assure the public that members of Congress can be briefed on these activities whenever they want. Senator Saxby Chambliss says all a member of Congress needs to do is ask for information, and he'll get it. Well I did ask, and the House Intelligence Committee said "no", repeatedly. And virtually every other member not on the Intelligence Committee gets the same treatment.
Note: The above article was written by courageous U.S. Congressman Alan Grayson. For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show. Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth. The agency ... deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products [called "backdoors"].
Note: For an excellent article in the UK's respected Guardian on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.
The FBI gave its informants permission to break the law at least 5,658 times in a single year, according to newly disclosed documents that show just how often the nation's top law enforcement agency enlists criminals to help it battle crime. The U.S. Justice Department ordered the FBI to begin tracking crimes by its informants more than a decade ago, after the agency admitted that its agents had allowed Boston mobster James "Whitey" Bulger to operate a brutal crime ring in exchange for information about the Mafia. The FBI submits that tally to top Justice Department officials each year, but has never before made it public. Agents authorized 15 crimes a day, on average, including everything from buying and selling illegal drugs to bribing government officials and plotting robberies. FBI officials have said in the past that permitting their informants — who are often criminals themselves — to break the law is an indispensable, if sometimes distasteful, part of investigating criminal organizations. USA TODAY obtained a copy of the FBI's 2011 report under the Freedom of Information Act. The report does not spell out what types of crimes its agents authorized, or how serious they were. It also did not include any information about crimes the bureau's sources were known to have committed without the government's permission. Crimes authorized by the FBI almost certainly make up a tiny fraction of the total number of offenses committed by informants for local, state and federal agencies each year.
Note: As reported in this USA Today article, the DEA and ATF don't even track crimes committed by their informants. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
The 9/11 Consensus Panel now offers four evidence-based points about the alleged phone calls from the 9/11 flights. The famous "let's roll" drama of the passenger revolt on UA 93 was relayed by passenger Todd Beamer's 13-minute unrecorded seat-back call to GTE telephone supervisor Lisa Jefferson, who reported Beamer as strangely tranquil, declining to speak to his wife. Eerily, Beamer's line remained open for 15 minutes after the crash. Oddly, the Verizon wireless record shows that 19 calls were made from Beamer's cell phone long after the crash of UA 93. Initial media reports and FBI interviews detailed more than a dozen cell phone calls from the planes at high elevation. Yet in 2001, a telephone spokesperson stated that sustained mobile calls were not possible above 10,000 feet. During the 2006 Moussaoui Trial, the FBI (under oath) reduced the number of cell phone calls to two calls made from 5,000 feet, and presented evidence of only one (not two) "unconnected" call from Barbara Olson, lasting "0 seconds." In another twist, two other women reported that Caller-ID showed their husband's cell numbers on their answering machines, which while lasting several minutes, had been made from elevations of 25,000 and 35,000 feet. Although the FBI conducted a massive investigation into the calls, none of the telephone billing, nor any of the cell phone location data stored in standard phone company records has been publicly released.
Note: The 9/11 Consensus Panel, consisting of scientists, pilots, professors, attorneys, and journalists, has developed 32 Points of evidence contradicting specific claims made by the official account of 9/11. For many unanswered questions about 9/11 raised by highly credible former government officials and professors, click here and here. For our 9/11 Information Center filled with reliable, verifiable 9/11 resources, click here.
For more than a decade, wads of American dollars packed into suitcases, backpacks and, on occasion, plastic shopping bags have been dropped off every month or so at the offices of Afghanistan’s president — courtesy of the Central Intelligence Agency. All told, tens of millions of dollars have flowed from the C.I.A. to the office of President Hamid Karzai, according to current and former advisers to the Afghan leader. “We called it ‘ghost money,’ ” said Khalil Roman, who served as Mr. Karzai’s deputy chief of staff from 2002 until 2005. “It came in secret, and it left in secret.” The C.I.A. ... has long been known to support some relatives and close aides of Mr. Karzai. But the new accounts of off-the-books cash delivered directly to his office show payments on a vaster scale, and with a far greater impact on everyday governing. Moreover, there is little evidence that the payments bought the influence the C.I.A. sought. Instead, some American officials said, the cash has fueled corruption and empowered warlords, undermining Washington’s exit strategy from Afghanistan. “The biggest source of corruption in Afghanistan,” one American official said, “was the United States.” Now, Mr. Karzai is seeking control over the Afghan militias raised by the C.I.A. to target ... insurgent commanders, potentially upending a critical part of the Obama administration’s plans for fighting militants as conventional military forces pull back this year. But the C.I.A. has continued to pay.
Note: For deeply revealing reports from reliable major media sources on government corruption, click here.
In October, the Washington Post's Greg Miller reported that the administration was instituting a "disposition matrix" to determine how terrorism suspects will be disposed of, all based on this fact: "among senior Obama administration officials, there is broad consensus that such operations are likely to be extended at least another decade." As Miller puts it: "That timeline suggests that the United States has reached only the midpoint of what was once known as the global war on terrorism." The polices adopted by the Obama administration ... leave no doubt that they are accelerating, not winding down, the war apparatus that has been relentlessly strengthened over the last decade. In the name of the War on Terror, the current president has diluted decades-old Miranda warnings; codified a new scheme of indefinite detention on US soil; plotted to relocate Guantanamo to Illinois; increased secrecy, repression and release-restrictions at the camp; minted a new theory of presidential assassination powers even for US citizens; renewed the Bush/Cheney warrantless eavesdropping framework for another five years, as well as the Patriot Act, without a single reform; and just signed into law all new restrictions on the release of indefinitely held detainees. Does that sound to you like a government anticipating the end of the War on Terror any time soon? Or does it sound like one working feverishly to make their terrorism-justified powers of detention, surveillance, killing and secrecy permanent? There's a good reason US officials are assuming the "War on Terror" will persist indefinitely: namely, their actions ensure that this occurs.
Note: For deeply revealing reports from reliable major media sources on the War on Terror, click here.
New documents prove what was once dismissed as paranoid fantasy: totally integrated corporate-state repression of dissent. It was more sophisticated than we had imagined: new documents show that the violent crackdown on Occupy last fall – so mystifying at the time – was not just coordinated at the level of the FBI, the Department of Homeland Security, and local police. The crackdown, which involved, as you may recall, violent arrests, group disruption, canister missiles to the skulls of protesters, people held in handcuffs so tight they were injured, people held in bondage till they were forced to wet or soil themselves – was coordinated with the big banks themselves. The Partnership for Civil Justice Fund, in a groundbreaking scoop that should once more shame major US media outlets (why are nonprofits now some of the only entities in America left breaking major civil liberties news?), filed this request. The document – reproduced here in an easily searchable format – shows a terrifying network of coordinated DHS, FBI, police, regional fusion center, and private-sector activity so completely merged into one another that the monstrous whole is, in fact, one entity: in some cases, bearing a single name, the Domestic Security Alliance Council. And it reveals this merged entity to have one centrally planned, locally executed mission. The documents, in short, show the cops and DHS working for and with banks to target, arrest, and politically disable peaceful American citizens.
Note: For analysis of these amazing documents revealing the use of joint government and corporate counterterrorism structures against peaceful protestors of financial corruption, click here and here. For a Democracy Now! video segment on this, click here.
On 20 November, district court Judge David D Dowd Jr sentenced three anarchists with the Occupy Cleveland movement to prison terms ranging from 8 to 11.5 years for attempting to bomb a highway bridge last spring. Shaquille Azir, a paid FBI informant with a 20-year criminal record, facilitated every step in the plot. Azir molded the five's childish bravado and drunken fantasies into terrorism. He played father figure to the lost men, providing them with jobs, housing, beer and drugs. Every time the scheme threatened to collapse into gutterpunk chaos, he kept it on track. FBI tapes reveal Azir led the brainstorming of targets, showed them bridges to case out, pushed them to buy C-4 military-grade explosives, provided the contact for weapons, gave them money for the explosives and demanded they develop a plan because "we on the hook" for the weapons. This case could have put on trial the post-September 11 strategy of "preventative prosecution", in which the FBI dispatches provocateurs to infiltrate targeted religious and political groups to see what they can stir up. Anarchists are inherently suspect. A recent FBI document calls anarchists "criminals seeking an ideology to justify their activities." Pardiss Kebriaei, a senior attorney specializing in national security at the Center for Constitutional Rights, claims standard operating procedure in terror cases "starts with surveillance and profiling on the basis of religion, politics and national origin". She notes parallels between the Cleveland anarchists and the "Newburgh Four", named for the upstate New York town in which the plot was hatched.
Note: For information on how to contact Brandon Baxter, Joshua Stafford, Connor Stevens and Douglas Wright, see cleveland4solidarity.org. For the Newburgh Four, see projectsalam.org For deeply revealing reports from reliable major media sources on entrapment operations and other manipulations by the FBI and intelligence agencies, click here.
A paid informant for the New York Police Department's intelligence unit was under orders to "bait" Muslims into saying inflammatory things as he lived a double life, snapping pictures inside mosques and collecting the names of innocent people attending study groups on Islam. Shamiur Rahman, a 19-year-old American of Bangladeshi descent who has now denounced his work as an informant, said police told him to embrace a strategy called "create and capture." He said it involved creating a conversation about jihad or terrorism, then capturing the response to send to the NYPD. For his work, he earned as much as $1,000 a month and goodwill from the police after a string of minor marijuana arrests. Rahman's account shows how the NYPD unleashed informants on Muslim neighborhoods, often without specific targets or criminal leads. Much of what Rahman said represents a tactic the NYPD has denied using. The AP corroborated Rahman's account through arrest records and weeks of text messages between Rahman and his police handler. Informants like Rahman are a central component of the NYPD's wide-ranging programs to monitor life in Muslim neighborhoods since the 2001 terrorist attacks. Police officers have eavesdropped inside Muslim businesses, trained video cameras on mosques and collected license plates of worshippers. Informants who trawl the mosques — known informally as "mosque crawlers" — tell police what the imam says at sermons and provide police lists of attendees, even when there's no evidence they committed a crime. The programs were built with unprecedented help from the CIA.
Note: For deeply revealing reports from reliable major media sources on the games intelligence agencies and units play, click here.
The rightwing transparency group, Judicial Watch, released [on August 28] a new batch of documents showing how eagerly the Obama administration shoveled information to Hollywood film-makers about the Bin Laden raid. Obama officials did so to enable the production of a politically beneficial pre-election film about that "heroic" killing, even as administration lawyers insisted to federal courts and media outlets that no disclosure was permissible because the raid was classified. The newly released emails [were] between Mark Mazzetti, the New York Times's national security and intelligence reporter, and CIA spokeswoman Marie Harf. The CIA had evidently heard that [NY Times columnist] Maureen Dowd was planning to write a column on the CIA's role in pumping the film-makers with information about the Bin Laden raid in order to boost Obama's re-election chances, and was apparently worried about how Dowd's column would reflect on them. This exchange ... is remarkably revealing of the standard role played by establishment journalists and the corruption that pervades it. Here we have a New York Times reporter who covers the CIA colluding with its spokesperson to plan for the fallout from the reporting by his own newspaper ("nothing to worry about"). Beyond this, that a New York Times journalist – ostensibly devoted to bringing transparency to government institutions – is pleading with the CIA spokesperson, of all people, to conceal his actions and to delete the evidence of collusion is so richly symbolic.
Note: For deeply revealing reports from reliable sources on corruption in the major media, click here.
A USA TODAY reporter and editor investigating Pentagon propaganda contractors have themselves been subjected to a propaganda campaign of sorts, waged on the Internet through a series of bogus websites. Fake Twitter and Facebook accounts have been created in their names, along with a Wikipedia entry and dozens of message board postings and blog comments. Websites were registered in their names. The timeline of the activity tracks USA TODAY's reporting on the military's "information operations" program, which spent hundreds of millions of dollars on marketing campaigns in Iraq and Afghanistan — campaigns that have been criticized even within the Pentagon as ineffective and poorly monitored. For example, Internet domain registries show the website TomVandenBrook.com was created Jan. 7 — just days after Pentagon reporter Tom Vanden Brook first contacted Pentagon contractors involved in the program. Two weeks after his editor Ray Locker's byline appeared on a story, someone created a similar site, RayLocker.com, through the same company. If the websites were created using federal funds, it could violate federal law prohibiting the production of propaganda for domestic consumption. Some postings ... accused them of being sponsored by the Taliban. "They disputed nothing factual in the story about information operations," Vanden Brook said.
Note: For more on a proposed amendment to a U.S. bill which would make it legal to use propaganda and lie to the American public, click here.
Expert comparisons of hair, handwriting, marks made by firearms on bullets, and patterns such as bite marks and shoe and tire prints are in some ways unscientific and subject to human bias, a National Academy of Sciences panel chartered by Congress found. Even fingerprint identification is partly a subjective exercise that lacks research into the role of unconscious bias or even its error rate, the panel’s 328-page report said. Since 2002, failures have been reported at about 30 federal, state and local crime labs serving the FBI, the Army and eight of the nation’s 20 largest cities. A 2009 study of post-conviction DNA exonerations — now up to 289 nationwide — found invalid testimony in more than half the cases. FBI examiners claimed until recently that they can match fingerprints to the exclusion of any other person in the world with 100 percent certainty. The academy report found that assertion was “not scientifically plausible” and had chilled research into error rates. In 1999, a Justice Department official, Richard Rau, told a federal court that the department delayed such a study because of the legal ramifications. Meanwhile, errors occur. In 2004, DNA for the first time exonerated a person convicted with a fingerprint match and, separately, the FBI made its first publicly acknowledged fingerprint misidentification. Brandon Mayfield, a Portland, Ore., lawyer, mistakenly was arrested in connection with the terrorist train bombings in Madrid that killed 191 people.
Note: A Washington Post investigation recently found that over a 20 year period, "nearly every examiner in an elite FBI forensic unit gave flawed testimony in almost all trials in which they offered evidence". For more along these lines, see concise summaries of deeply revealing news articles about the corrupt prison industry built upon by systematic violations of civil rights.
On April 19, 1995, a huge truck bomb destroyed a large part of the Alfred P. Murrah Federal Building in Oklahoma City ... killing 168 people, including 19 children. In a matter of days the FBI established that the bombing was the work of a conspiracy. The first conspirator arrested was Timothy McVeigh, a 27-year-old Army veteran. The second conspirator arrested was Terry Nichols. "Oklahoma City," an extraordinarily well-researched book, asserts that the FBI investigation of the bombing was badly flawed and missed, or disregarded, evidence of a larger conspiracy. The authors, Andrew Gumbel and Roger Charles, are both highly regarded investigative reporters who have been immersed in this case for more than a decade. They were given access to vast amounts of material assembled by the defense teams, including 18,000 FBI witness interviews. The book ... outlines how federal prosecutors, eager to wrap up the McVeigh and Nichols cases, avoided raising questions about possible co-conspirators that the defense could use to confound a jury. Among the glaring gaps in the investigation was the failure of the FBI to attempt to match the more than 1,000 unidentified latent fingerprints found in the investigation. [And] almost all the eyewitnesses to the crime claimed that McVeigh was not alone. No fewer than 24 witnesses said that they saw McVeigh, just before and after the crime, with a man who could not have been ... Mr. Nichols. The FBI concluded that these witnesses had all been confused. Certainly eyewitness testimony can be unreliable, but 24 mistaken witnesses—and no accurate ones?
Note: Many aspects of the Oklahoma City bombing were covered up. For a compilation of media videos showing without doubt there were other bombs in the building which later were completely ignored, click here. For other major media articles showing major manipulation, click here click here, here, and here.
A man whose lies helped to make the case for invading Iraq – starting a nine-year war costing more than 100,000 lives and hundreds of billions of pounds – will come clean in his first British television interview tomorrow [click here for interview]. "Curveball", the Iraqi defector who fabricated claims about Iraq's weapons of mass destruction, smiles as he confirms how he made the whole thing up. It was a confidence trick that changed the course of history, with Rafid Ahmed Alwan al-Janabi's lies used to justify the Iraq war. The chemical engineer claimed to have overseen the building of a mobile biological laboratory when he sought political asylum in Germany in 1999. His lies were presented as "facts and conclusions based on solid intelligence" by Colin Powell, US Secretary of State, when making the case for war at the UN Security Council in February 2003. But Mr Janabi ... says none of it was true. US officials "sexed up" Mr Janabi's drawings of mobile biological weapons labs to make them more presentable, admits Colonel Lawrence Wilkerson, General Powell's former chief of staff. "I brought the White House team in to do the graphics," he says, adding how "intelligence was being worked to fit around the policy". Another revelation ... is the real reason why the FBI swooped on Russian spy Anna Chapman in 2010. Top officials feared the glamorous Russian agent wanted to seduce one of US President Barack Obama's inner circle. The fear that Chapman would compromise a senior US official in a "honey trap" was a key reason for the arrest and deportation of the Russian spy ring of 10 people.
Note: For a Washington Post blog on this important development, click here. For a revealing essay by a top U.S. general on major war manipulations, click here. For many major media articles on this topic, click here.
Imam Salahuddin Muhammad could hardly miss Shahed Hussain when he first appeared three years ago at his mosque in the dilapidated town of Newburgh, just 60 miles up the Hudson River from New York. Hussain was flash, drove expensive cars and treated people to gifts of cash and food. Hussain would make Newburgh's Muslim community famous when earlier this year four other black Newburgh Muslims were jailed for 25 years for a 2009 plot to fire a Stinger missile at US military planes. All four followed the instructions of Hussain, who meticulously organised the scheme: from getting the missile and bombs, to reconnaissance missions, to teaching the tenets of radical Islam. Hussain was a fake. In fact, Hussain worked for the FBI as an informant trawling mosques in hope of picking up radicals. Yet far from being active militants, the four men he attracted were impoverished individuals struggling with Newburgh's grim epidemic of crack, drug crime and poverty. Hussain offered the men huge financial inducements to carry out the plot – including $250,000 to one man – and free holidays and expensive cars. The Newburgh Four ... represent the most extreme form of a controversial FBI policy to use invented terrorist plots to lure targets. "There has been no case as egregious as this. It is unique in the incentive the government provided. A quarter million dollars?" said Professor Karen Greenberg, a terrorism expert at Fordham University.
Note: For a powerful BBC documentary showing clearly that much of the war on terror is a fabrication to forward a political agenda, watch Power of Nightmares at this link. For many reports from major media sources on the fake terror behind the "global war on terror", click here.
The CIA’s armed drones and paramilitary forces have killed dozens of al-Qaeda leaders and thousands of its foot soldiers. But there is another mysterious organization that has killed even more of America’s enemies in the decade since the 9/11 attacks. Troops from this other secret organization have imprisoned and interrogated 10 times as many [suspects as has the CIA], holding them in jails that it alone controls in Iraq and Afghanistan. Since the Sept. 11, 2001, attacks, this secretive group of men (and a few women) has grown tenfold while sustaining a level of obscurity that not even the CIA managed. “We’re the dark matter. We’re the force that orders the universe but can’t be seen,” a strapping Navy SEAL, speaking on the condition of anonymity, said in describing his unit. The SEALs are just part of the U.S. military’s Joint Special Operations Command, known by the acronym JSOC, which has grown from a rarely used hostage rescue team into America’s secret army, routinely [used] to mount intelligence-gathering missions and lethal raids, mostly in Iraq and Afghanistan, but also in countries with which the United States was not at war, including Yemen, Pakistan, Somalia, the Philippines, Nigeria and Syria. The president has also given JSOC the rare authority to select individuals for its kill list — and then to kill, rather than capture, them. JSOC has grown from 1,800 troops prior to 9/11 to as many as 25,000. It has its own intelligence division, its own drones and reconnaissance planes, even its own dedicated satellites.
Note: This article describing JSOC’s spectacular rise, much of which has not been publicly disclosed before, is adapted from a chapter of the newly released Top Secret America: The Rise of the New American Security State, by Washington Post reporters Dana Priest and William M. Arkin. For lots more on the secret realities of the "Endless War" launched by the 9/11 false-flag operation, click here.
Some 36 hours after the world first learnt of the US commando raid that killed Osama bin Laden, the White House changed parts of its story. A woman was killed, its spokesman said, but she was not Bin Laden's wife – who survived after being shot in the leg. Bin Laden did not, as had earlier been claimed, use his wife as a human shield; she was injured when she tried to challenge one of the US commandos. And Bin Laden was not, after all, armed, although he did, the spokesman said, put up some resistance. The new version – no wife as human shield, no weapon – makes [bin Laden] more ordinary and more vulnerable. It also raises further questions. If the first version was incorrect, perhaps even to an extent "spun" for a certain effect, might there not be room for doubt about other aspects of the official narrative? About, say, whether the crucial intelligence about Bin Laden was extracted from al-Qa'ida operatives under torture, which might appear to justify such methods and lift some of the opprobrium from the previous US administration and the CIA. A no less pertinent question that the new version raises is whether Bin Laden was ever actually given a chance to surrender and whether he might have been taken alive rather than dead. When President Obama said that justice had been done, was this – strictly speaking – justice, or was it cold-blooded retribution?
Note: WantToKnow team member David Ray Griffin's book establishing the likelihood that Osama bin Laden died in December 2001, Osama bin Laden: Dead or Alive?, is available here. For many other major media news articles showing clear deception and more by government officials, click here.
Undercover police officers routinely adopted a tactic of "promiscuity" with the blessing of senior commanders, according to a former agent who worked in a secretive unit of the Metropolitan police for four years. The former undercover policeman claims that sexual relationships with activists were sanctioned for both men and women officers infiltrating anarchist, leftwing and environmental groups. Sex was a tool to help officers blend in, the officer claimed, and was widely used as a technique to glean intelligence. He said undercover officers, particularly those infiltrating environmental and leftwing groups, viewed having sex with a large number of partners "as part of the job". His comments contradict claims last week from the Association of Chief Police Officers that operatives were absolutely forbidden to sleep with activists. The claims follow the unmasking of undercover PC Mark Kennedy, who had sexual relationships with several women during the seven years he spent infiltrating a ring of environmental activists. Another two covert officers have been named in the past fortnight who also had sex with the protesters they were sent to spy on, fuelling allegations that senior officers had authorised sleeping around as a legitimate means of gathering intelligence.
Note: For a comprehensive overview of the still-ongoing revelations about police provocateur Mark Kennedy and his cohorts in the UK police infiltration of environmental and related activist groups, click here.
A secret history of the United States government's Nazi-hunting operation concludes that American intelligence officials created a "safe haven" in the United States for Nazis and their collaborators after World War II. The 600-page report, which the Justice Department has tried to keep secret for four years, provides new evidence about more than two dozen of the most notorious Nazi cases of the last three decades. It describes the government's ... pursuit of Dr. Josef Mengele, the so-called Angel of Death at Auschwitz. The report catalogs both the successes and failures of the band of lawyers, historians and investigators at the Justice Department's Office of Special Investigations, which was created in 1979 to deport Nazis. The report's most damning disclosures come in assessing the Central Intelligence Agency's involvement with Nazi emigres. Scholars and previous government reports had acknowledged the C.I.A.'s use of Nazis for postwar intelligence purposes. But this report goes further in documenting the level of American complicity and deception in such operations. The Justice Department has resisted making the report public since 2006. Under the threat of a lawsuit, it turned over a heavily redacted version last month to a private research group, the National Security Archive, but even then many ... portions were omitted. A complete version was obtained by The New York Times.
Note: To read the complete Justice Department report obtained by The New York Times, click here. For a brief comparison with the heavily redacted version previously available, click here. For a more detailed analysis by the the National Security Archive, click here.
A secret history of the United States government’s Nazi-hunting operation concludes that American intelligence officials created a “safe haven” in the United States for Nazis and their collaborators after World War II. The 600-page report, which the Justice Department has tried to keep secret for four years, provides new evidence about more than two dozen of the most notorious Nazi cases of the last three decades. Perhaps the report’s most damning disclosures come in assessing the Central Intelligence Agency’s involvement with Nazi émigrés. Scholars and previous government reports had acknowledged the C.I.A.’s use of Nazis for postwar intelligence purposes. But this report goes further in documenting the level of American complicity and deception in such operations. The Justice Department report, describing what it calls “the government’s collaboration with persecutors,” says that O.S.I. investigators learned that some of the Nazis “were indeed knowingly granted entry” to the United States, even though government officials were aware of their pasts. “America, which prided itself on being a safe haven for the persecuted, became — in some small measure — a safe haven for persecutors as well,” it said. The Justice Department has resisted making the report public since 2006. Under the threat of a lawsuit, it turned over a heavily redacted version last month.
Note: US agencies used at least 1,000 ex-Nazis as spies and informants during the Cold War. Nazi doctors were also used used to teach the CIA mind control methods it perfected. See the astounding declassified CIA documents on this program.
In the Department of Defense, where more than two-thirds of the intelligence programs reside, only a handful of senior officials - called Super Users - have the ability to even know about all the department's activities. Most [sources for this story] requested anonymity either because they are prohibited from speaking publicly or because, they said, they feared retaliation at work for describing their concerns. Beyond redundancy, secrecy within the intelligence world hampers effectiveness in other ways. For the Defense Department, [the] problem goes back to an ultra-secret group of programs for which access is extremely limited and monitored by specially trained security officers. These are called Special Access Programs - or SAPs - and the Pentagon's list of code names for them runs 300 pages. The intelligence community has hundreds more of its own, and those hundreds have thousands of sub-programs with their own limits on the number of people authorized to know anything about them. All this means that very few people have a complete sense of what's going on. Such secrecy can undermine the normal chain of command when senior officials use it to cut out rivals or when subordinates are ordered to keep secrets from their commanders. One military officer involved in one such program said he was ordered to sign a document prohibiting him from disclosing it to his four-star commander, with whom he worked closely every day, because the commander was not authorized to know about it
Note: To read the full text of this important article, please make sure to press the "Continue Reading" button at the end of the first webpage to access all of the fascinating information provided. For lots more on government secrecy, click here.
Law enforcement is tracking Americans' cell phones in real time—without the benefit of a warrant. Amid all the furor over the Bush administration's warrantless wiretapping program a few years ago, a mini-revolt was brewing over another type of federal snooping that was getting no public attention at all. Federal prosecutors were seeking what seemed to be unusually sensitive records: internal data from telecommunications companies that showed the locations of their customers' cell phones—sometimes in real time, sometimes after the fact. Prosecutors "were using the cell phone as a surreptitious tracking device," said Stephen W. Smith, a federal magistrate in Houston. "And I started asking the U.S. Attorney's Office, 'What is the legal authority for this? What is the legal standard for getting this information?'" Those questions are now at the core of a constitutional clash between President Obama's Justice Department and civil libertarians alarmed by what they see as the government's relentless intrusion into the private lives of citizens. There are numerous other fronts in the privacy wars—about the content of e-mails, for instance, and access to bank records and credit-card transactions. The Feds now can quietly get all that information. But cell-phone tracking is among the more unsettling forms of government surveillance, conjuring up Orwellian images of Big Brother secretly following your movements through the small device in your pocket.
Note: For many key reports from major media sources on the disturbing trend toward increasing government and corporate surveillance, click here.
The State Department didn't revoke the visa of foiled terrorism suspect Umar Farouk Abdulmutallab because federal counterterrorism officials had begged off revocation, a top State Department official revealed. Patrick F. Kennedy, an undersecretary for management at the State Department, said Abdulmutallab's visa wasn't taken away because intelligence officials asked his agency not to deny a visa to the suspected terrorist. "Revocation action would have disclosed what they were doing," Kennedy said in testimony before the House Committee on Homeland Security. Since the failed attack, criticism has swirled around leaders of the U.S. intelligence community who have indicated they were warned by the suspect's father about a month before the flight of a potential terror threat, but failed to stop Abdmutallab, despite other warning signs like the fact that he purchased a one-way ticket to Detroit with cash.
Note: So federal counterterrorism officials stopped the bomber's visa from being revoked. Hmmmm... Clearly there is more going on in this case than "failure to connect the dots." Why aren't other major media reporting this important story? Kurt Haskell, a key eyewitness passenger who almost lost his life, has written a powerfully revealing blog piece on what he thinks is really going on, available here. For more on this key case, click here.
The Transportation Security Administration ... has on its web site a “mythbuster” that tries to reassure the public. Myth: The No-Fly list includes an 8-year-old boy. Buster: No 8-year-old is on a T.S.A. watch list. “Meet Mikey Hicks,” said Najlah Feanny Hicks, introducing her 8-year-old son, a New Jersey Cub Scout and frequent traveler who has seldom boarded a plane without a hassle because he shares the name of a suspicious person. “It’s not a myth.” Hicks’s mother initially sensed trouble when he was a baby and she could not get a seat for him on their flight to Florida at an airport kiosk; airline officials explained that his name “was on the list,” she recalled. The first time he was patted down, at Newark Liberty International Airport, Mikey was 2. He cried. After years of long delays and waits for supervisors at every airport ticket counter, this year’s vacation to the Bahamas badly shook up the family. Mikey was frisked on the way there, then more aggressively on the way home. “Up your arms, down your arms, up your crotch — someone is patting your 8-year-old down like he’s a criminal,” Mrs. Hicks recounted. It is true that Mikey is not on the federal government’s “no-fly” list, which includes about 2,500 people, less than 10 percent of them from the United States. But his name appears to be among some 13,500 on the larger “selectee” list, which sets off a high level of security screening.
Note: For many reports from major media sources on the extreme loss of liberties brought about by the highly touted "war on terrorism," click here.
When Sept. 11, 2001, dawned, the Northeast Air Defense Sector in Rome, N.Y., went on full alert — to prepare for a training exercise that envisioned a sneak attack by Russian planes flying over the North Pole to bomb the United States, a prospect that Defense Secretary Robert McNamara had dismissed as outdated in 1966. Later that morning, ... three F-16 fighter jets were scrambled from Langley Air Force Base to form a combat air patrol over Washington. But degraded radio transmission quality meant that the pilots were left clueless about the nature of their mission. On seeing the Pentagon in flames, the lead fighter pilot later explained, “I reverted to the Russian threat. I’m thinking cruise missile threat from the sea. You know, you look down and see the Pentagon burning, and I thought the bastards snuck one by us. You couldn’t see any airplanes, and no one told us anything.” As senior counsel to the 9/11 Commission, [Farmer] investigated the derelict conduct of the national security apparatus. Now that numerous transcripts and tapes have been declassified, [in his book The Ground Truth] Farmer draws on them to assail the government’s official depiction of 9/11 as so much public relations flimflam. Both Deputy Defense Secretary Paul Wolfowitz and Vice President Dick Cheney, Farmer says, provided palpably false versions that touted the military’s readiness to shoot down United 93 before it could hit Washington. Planes were never in place to intercept it. Farmer ... was the attorney general of New Jersey and is the dean of the Rutgers School of Law,
Note: For more on Farmer's book, see a summary of this Time magazine article. For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.
Every phone call, text message, email and website visit made by private citizens is to be stored for a year and will be available for monitoring by government bodies. All telecoms companies and internet service providers will be required by law to keep a record of every customer's personal communications, showing who they have contacted, when and where, as well as the websites they have visited. Despite widespread opposition to the increasing amount of surveillance in Britain, 653 public bodies will be given access to the information, including police, local councils, the Financial Services Authority, the ambulance service, fire authorities and even prison governors. They will not require the permission of a judge or a magistrate to obtain the information, but simply the authorisation of a senior police officer or the equivalent of a deputy head of department at a local authority. The Government announced yesterday it was pressing ahead with privately held "Big Brother" databases that opposition leaders said amounted to "state-spying" and a form of "covert surveillance" on the public. It is doing so despite its own consultation showing that it has little public support. The new rules ... will not only force communications companies to keep their records for longer, but to expand the type of data they keep to include details of every website their customers visit.
Note: For many more reports from major media sources on the disturbing trend toward increasing government and corporate surveillance and loss of privacy, click here.
OLBERMANN: It has taken less than 24 hours after the Bush presidency ended for a former analyst at the National Security Agency to come forward to reveal new allegations about how this nation was spied on by its own government. Russell Tice [reveals] that under the collar of fighting terrorism, the Bush administration was also targeting specific groups of Americans for surveillance. TICE: The National Security Agency had access to all Americans‘ communications, faxes, phone calls, and their computer communications. They monitored all communications. What was done was a sort of an ability to look at the meta data, the signaling data for communications, and ferret that information to determine what communications would ultimately be collected. Basically, filtering out sort of like sweeping everything with that meta data, and then cutting down ultimately what you are going to look at and what is going to be collected, and in the long run have an analyst look at, you know, needles in a haystack for what might be of interest. OLBERMANN: I mention that you say specific groups were targeted. What group or groups can you tell us about? TICE: [Some of the groups they] collected on were U.S. news organizations and reporters and journalists. The collection ... was 24/7, and you know, 365 days a year, and it made no sense.
Note: To watch this revealing clip on video, click here. For many reports on government surveillance and invasions of privacy, click here.
The C.I.A. monitoring of journalists in 1963, 1971 and 1972, including wiretapping their phones and setting up observation posts across the street from their offices to track their comings and goings and their visitors, was a practice that the White House itself employed during the Nixon administration. The description of Project Mockingbird [details] C.I.A. wiretapping of two Washington reporters (unnamed) from March 12, 1963 to June 15, 1963. As with other questionable or illegal C.I.A. activities that were endorsed by top government officials, this account shows that spying on reporters was approved at the highest levels of the Kennedy administration. According to the transcripts of the tapes that President John F. Kennedy secretly recorded in the Oval Office, shortly after 6 p.m. on August 22,1962, JFK and Director of Central Intelligence John McCone discussed a plan for the CIA to wiretap members of the Washington press corps. The president told McCone to set up a domestic task force to stop the flow of secrets from the government to the newspapers. The order violated the agency’s charter, which specifically prohibits domestic spying. By ordering the director of central intelligence to conduct a program of domestic surveillance, Kennedy set a precedent that Presidents Johnson, Nixon, and George W. Bush would follow.
Note: This fascinating report discusses only a limited aspect of Operation Mockingbird, which included as well the placing of CIA agents in news organizations in decision-making positions for purposes of propaganda and information control.
In 1996, the award-winning journalist Gary Webb uncovered CIA links to Los Angeles drug dealers. The link between drug-running and the Reagan regime's support for the right-wing terrorist group throughout the 1980s had been public knowledge for over a decade. What was new about Webb's reports, published under the title "Dark Alliance" in the Californian paper the San Jose Mercury News, was that for the first time it brought the story back home. His series of articles ... incited fury among the African-American community, many of whom took his investigation as proof that the White House saw crack as a way of bringing genocide to the ghetto. Webb's reports prompted three official investigations, including one by the CIA itself which ... confirmed the substance of his findings. Webb undeniably made mistakes. But his central thesis - that the CIA, having participated in narcotics trafficking in central America, had, at best, turned a blind eye to the activities of drug dealers in LA - has never been in question. [A 1998] CIA Inspector General's report, commissioned in response to the allegations in "Dark Alliance" ... found that CIA officials ignored information about possible Contra drug dealing; that they continued to work with Contra supporters despite allegations that they were trafficking drugs, and further asserted that officials from the CIA instructed Drug Enforcement Agency officers to refrain from investigating alleged dealers connected with the Contras.
Note: For those interested in the Gary Webb story, this article is possibly the best single summary out there. Read an excellent, concise summary written by Gary Webb himself of what happened on this highly revealing Dark Alliance series. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
During the 2004 presidential campaign, George W. Bush and John Kerry battled about whether Osama bin Laden had escaped from Tora Bora in the final days of the war in Afghanistan. Bush asserted that U.S. commanders on the ground did not know if bin Laden was at the mountain hideaway along the Afghan border. But in a forthcoming book, the CIA field commander for the agency's Jawbreaker team at Tora Bora, Gary Berntsen, says he and other U.S. commanders did know that ... bin Laden was holed up at Tora Bora ... and could have been caught. Asked to comment on Berntsen's remarks, National Security Council spokesman Frederick Jones passed on 2004 statements from former CENTCOM commander Gen. Tommy Franks. "We don't know to this day whether Mr. bin Laden was at Tora Bora in December 2001," Franks wrote in an Oct. 19 New York Times op-ed. [CIA Commander] Berntsen says Franks is "a great American. But he was not on the ground out there. I was." In his book—titled "Jawbreaker"—the decorated career CIA officer criticizes Donald Rumsfeld's Defense Department for not providing enough support to the CIA and the Pentagon's own Special Forces teams in the final hours of Tora Bora. Berntsen ... has sued the agency over what he calls unacceptable delays in approving his book. "They're just holding the book," which is scheduled for October release, he says. "CIA officers, Special Forces and U.S. air power drove the Taliban out in 70 days. The CIA has taken roughly 80 days to clear my book."
Note: For a concise summary of reliable, verifiable information questioning the official account of 9/11, click here.
Eric Olson now has a new verb for what happened to his father, Frank Olson, who worked for the Army's top-secret Special Operations Division at Fort Detrick, where he developed bioweapons and experimented with mind-control drugs. Eric Olson found the verb in a 1950s CIA manual. The verb is "dropped." And the manual is a how-to guide for assassins. "The most efficient accident, in simple assassination, is a fall of 75 feet or more onto a hard surface," the manual says, adding helpfully: "It will usually be necessary to stun or drug the subject before dropping him." Eric Olson believes his father -- who developed misgivings about his work and tried to resign -- was murdered by government agents to protect dark government secrets. "No assassination instructions should ever be written or recorded," says the CIA assassination manual. "Decision and instructions should be confined to an absolute minimum of persons." It adds: "For secret assassination the contrived accident is the most effective technique. When successfully executed, it causes little excitement and is only casually investigated." William P. Walter, 78, who supervised anthrax production at Detrick, says Olson's colleagues were divided about his death. "Some say he jumped. Some say he had help," Walter says. "I'm one of the 'had-help' people." So is James Starrs, a George Washington University forensic pathologist who ... called the evidence "rankly and starkly suggestive of homicide." In a report to the CIA on the death, [Harold] Abramson, [a doctor who had experimented with LSD] wrote that the LSD experiment was designed "especially to trap (Olson)." This ... raised a troubling possibility: that the LSD experiment was actually designed to see whether Olson could still be trusted to keep the agency's dark secrets.
Note: Frank Olson was just one of many tragic casualties of the CIA's mind-control programs. For revealing information on this secret history, click here.
Sibel Edmonds, a translator who worked at the FBI's language division, says [that hundreds, if not thousands, of foreign language intelligence documents] weren't translated because the division was riddled with incompetence and corruption. Edmonds was fired after reporting her concerns to FBI officials. Because she is fluent in Turkish and other Middle Eastern languages, Edmonds, a Turkish-American, was hired by the FBI soon after Sept. 11 and given top-secret security clearance to translate some of the reams of documents seized by FBI agents who have been rounding up suspected terrorists across the United States and abroad. In its rush to hire more foreign language translators after Sept. 11, the FBI admits it has had difficulty performing background checks to detect translators who may have loyalties to other governments, which could pose a threat to U.S. national security. Take the case of Jan Dickerson, a Turkish translator who worked with Edmonds. The FBI has admitted that when Dickerson was hired, the bureau didn't know that she had worked for a Turkish organization being investigated by the FBI's own counter-intelligence unit. They also didn't know she'd had a relationship with a Turkish intelligence officer stationed in Washington who was the target of that investigation. According to Edmonds, Dickerson tried to recruit her into that organization, and insisted that Dickerson be the only one to translate the FBI's wiretaps of that Turkish official. “She got very angry, and later she threatened me and my family's life,” says Edmonds, when she decided not to go along with the plan. “She said, ‘Why would you want to place your life and your family's life in danger by translating these tapes?’” Edmonds says that when she reviewed Dickerson's translations of those tapes, she found that Dickerson had left out information crucial to the FBI's investigation - information that Edmonds says would have revealed that the Turkish intelligence officer had spies working for him inside the U.S. State Department and at the Pentagon.
Note: This article should be read in its entirety. For many revealing articles on the ongoing efforts by longtime whistleblower Sibel Edmonds to tell her story, click here.
Your commission ... has now issued its "9/11 Commission Report". After [9/11] we, the translators at the FBI's largest and most important translation unit, were told to slow down, even stop, translation of critical information related to terrorist activities. This issue has been confirmed by the Senate Judiciary Committee. Melek Can Dickerson, with the assistance of her direct supervisor, forged signatures on top-secret documents related to certain 9/11 detainees. Not only does the supervisor facilitating these criminal conducts remain in a supervisory position, he has been promoted. In April 2001, a long-term FBI informant/asset ... received information that: 1) Osama Bin Laden was planning a major terrorist attack in the United States targeting 4-5 major cities, 2) the attack was going to involve airplanes [and] the attack was going to be carried out soon. No action was taken. After 9/11, the agents and the translators were told to 'keep quiet' regarding this issue. The translator who was present ... reported this incident to Director Mueller in writing. Why did your report choose to exclude the information ... despite the public confirmation by the FBI, witnesses provided to your investigators, and briefings you received directly? As you are fully aware, these issues and incidents were found confirmed by a Senior Republican Senator, Charles Grassley, and a Senior Democrat Senator, Patrick Leahy. Even FBI officials 'confirmed all my allegations and denied none' during their unclassified meetings with the Senate Judiciary staff. However, neither your commission's hearings, nor your commission's five hundred sixty seven-page report ... include these serious issues, major incidents, and systemic problems.
Note: If the above link fails, click here. Sibel Edmonds is one of the great heroes of our day. She has been gagged directly by the U.S. Attorney General from telling what she knows. The above letter was not published in any major U.S. media, though widely reported in alternative new sources. To understand how such vital information is hidden from the public, click here. For lots more on Ms. Edmonds, click here.
Twice each week, a top-secret report with distinctive red stripes lands on the desks of select policymakers in Washington. Called the "Red Cell," it is the work of a CIA unit by the same name, set up after the 9/11 attacks. "Some of it is really wacky, even scary," says an insider. "Like bombing Iran." The "Red Cell," in a very real sense, is emblematic of the trouble the U.S. intelligence community finds itself in today. Created in 1947, the U.S. intelligence community has grown enormously in terms of bodies and dollars but also in the number and complexity of its responsibilities. It has also, for many reasons, grown into a mess. After 9/11, Americans had good reason to assume the nation's intelligence capabilities were being improved. But then came the Iraq war and the subsequent revelations that the CIA's "slam dunk" intelligence on Saddam Hussein's stockpiles of banned weapons was a complete air ball, a casualty of badly forged documents, eager exiles with outlandish stories, and analysis that, in the most charitable sense, could be described as flawed. The Senate Intelligence Committee's 511-page Iraq report documents how on the country's weightiest issue – whether to launch a pre-emptive war – the U.S. intelligence community ended up wrong on virtually every critical point. "In short," laments Sen. Jay Rockefeller, the intelligence panel's ranking Democrat, "we went to war in Iraq based on false claims." When Harry Truman signed into law the National Security Act of 1947, creating the CIA, he wanted precisely what the name implied: a central agency for intelligence. "The CIA was set up by me for the sole purpose of getting all the available information to the president," Truman wrote. "It was not intended to operate as an international agency engaged in strange activities." Within months, of course, Truman himself was ordering the CIA to engage in "strange activities," such as staving off a Communist takeover in Italy.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The former chief internal watchdog at the FBI has pleaded guilty to sexually assaulting a 6-year-old girl and has admitted he had a history of molesting other children before he joined the bureau for what became a two-decade career. John H. Conditt Jr., 53, who retired in 2001, was sentenced last week ... to 12 years in prison after he admitted he molested the daughter of two FBI agents after he retired. He acknowledged molesting at least two other girls before he began his law enforcement career, his lawyer said. Conditt headed the internal affairs unit, which investigates agent wrongdoing, for the Office of Professional Responsibility at FBI headquarters in Washington from 1999 until June 2001, the FBI said. FBI officials said yesterday they had no information suggesting Conditt had any problems during his career and he was never the subject of an investigation. Assistant District Attorney Mitch Poe of Tarrant County, who prosecuted the case, said he wanted a longer prison sentence and was skeptical of Conditt's claim that his molestation of children subsided during his FBI career.
Note: For powerful evidence in a Discovery Channel documentary that many top politicians are involved in sophisticated child sex abuse rings, click here.
The Justice Department is investigating allegations that officers of a special Venezuelan anti-drug unit funded by the CIA smuggled more than 2,000 pounds of cocaine into the United States with the knowledge of CIA officials – despite protests by the Drug Enforcement Administration. That is a huge amount of cocaine. But it was hardly a first for the CIA. The agency has never been above using individuals or organizations with known links to drug trafficking if it thought they could help it further its national security mission. In Costa Rica, when the war against Nicaragua's Sandinista government was at its peak and cocaine was beginning to pour into the United States, the DEA attaché wanted to place cameras at clandestine airstrips from which he suspected drugs were being flown to the United States. The CIA resident gave him a list of airstrips on which he was not to place cameras. They were the strips into which the CIA was flying arms for the contras. Some were also strips from which the DEA agent suspected drugs were being flown to the United States. Shortly after the kidnapping and brutal murder of the DEA's Enrique Camarena in Mexico, Francis Mullen, the DEA administrator, was taken by the CIA station chief in Mexico City to Mexico's director of federal security, a man who, the station chief confided, was a CIA asset. The gentleman ... denied any knowledge of the affair. He was lying. A DEA investigation revealed that he had been connected ... to the murder. CIA ties to international drug trafficking date to the Korean War.
Note: The above was written by Larry Collins, author of the book, "Black Eagles," which deals with the CIA, cocaine traffic and Central America in the mid-'80s. Read the account of Mike Levine, a 25-year veteran of the DEA who personally witnessed large-scale drug smuggling by the government. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The Defense Department is dramatically expanding its 'black world' of covert operations. The Bush administration has turned to what the Pentagon calls the "black world" to press the war on terrorism and weapons of mass destruction. The increasingly dominant role of the military ... reflects the desire of Secretary of Defense Donald Rumsfeld to gain greater overall control of the war on terror. "Our task is to find and destroy the enemy before they strike us." Though covert action can bring quick results, because it is isolated from the normal review processes it can just as quickly bring mistakes and larger problems. The epicenter of the Pentagon's covert operations remains the North Carolina-based Joint Special Operations Command, often referred to as Delta Force. The super-secret command is still not officially acknowledged to exist. Rumsfeld's influential Defense Science Board ... recommends creation of a super-Intelligence Support Activity, an organization it dubs the Proactive, Preemptive Operations Group, (P2OG), to bring together CIA and military covert action, information warfare, intelligence, and cover and deception. This body would launch secret operations aimed at "stimulating reactions" among terrorists and states possessing weapons of mass destruction -- that is, for instance, prodding terrorist cells into action and exposing themselves to "quick-response" attacks by U.S. forces. The Air Force is designing its own Global Response Task Force ... capable of delivering a "worldwide attack within an hour."
Note: For an amazing exposé by a highly decorated U.S. general on the hidden reasons behind war, click here.
Startling new evidence revealed in a BBC documentary shows that President Lyndon Johnson had no doubts that the Israeli attack on American spy ship USS Liberty, which left 34 American servicemen dead and 171 wounded, had been a deliberate attack. The incident happened ... during the Arab-Israeli Six Day War. Unmarked Israeli planes attacked and nearly sank the USS Liberty. Israel has always claimed that the affair was a tragic accident. The government of President Lyndon Johnson publicly accepted this explanation. In fact ... those at the very top never believed the Israeli version. The picture that emerges is of a daring ploy by Israel to fake an Egyptian attack on the American spy ship, and thereby provide America with a reason to officially enter the war against Egypt. Intercepts recorded during the incident reveal how America was convinced the attack was intentional, and the minutes of a White House meeting clearly suggest that President Johnson believed the attack had been deliberate. The Liberty survivors have continued to argue that the attack was intentional and that the US government colluded in a cover-up. Today, the veterans are still calling for a full investigation by Congress. It remains the only case of an attack on a US ship without a full Congressional enquiry. [The documentary] offers evidence of a secret collaboration between America and Israel before and during the war - a covert alliance of intelligence agencies that has always been denied by both sides.
Note: The complete BBC documentary can be viewed here. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Dear Director Mueller: I feel that certain facts, including the following, have, up to now, been omitted, downplayed, glossed over and/or mis-characterized in an effort to avoid or minimize personal and/or institutional embarrassment on the part of the FBI and/or perhaps even for improper political reasons: ... 5) The fact is that key FBIHQ personnel whose job it was to assist and coordinate with field division agents ... continued to, almost inexplicably, throw up roadblocks and undermine Minneapolis' by-now desperate efforts to obtain a FISA search warrant. In all of their conversations and correspondence, HQ personnel never disclosed to the Minneapolis agents that the Phoenix Division had, only approximately three weeks earlier, warned of Al Qaeda operatives in flight schools seeking flight training for terrorist purposes! Nor did FBIHQ personnel do much to disseminate the information about Moussaoui to other appropriate intelligence/law enforcement authorities. When, in a desperate 11th hour measure to bypass the FBIHQ roadblock, the Minneapolis Division undertook to directly notify the CIA's Counter Terrorist Center (CTC), FBIHQ personnel actually chastised the Minneapolis agents for making the direct notification without their approval!
Note: If the above link fails, click here. For many more serious questions about the official account of 9/11 raised by former officials like Colleen Rowley, click here. For more solid information suggesting a major cover-up, click here.
[There are] many examples of "missed leads" that the Bush administration was given prior to Sept. 11. An Iranian in custody in New York City told local police last May of a plot to attack the World Trade Center. German intelligence alerted the Central Intelligence Agency, Britain's MI-6 intelligence service, Israel's Mossad in June 2001 that Middle Eastern terrorists were training for hijackings and targeting American and Israeli interests. Based on its own intelligence, the Israeli government provided "general" information to the United States in the second week of August that an Al Qaeda attack was imminent. Russian President Vladimir Putin has said publicly that he ordered his intelligence agencies to alert the United States last summer that suicide pilots were training for attacks on U.S. targets. An Islamic terrorist conspiracy was uncovered in 1996 in the Philippines to hijack a dozen airplanes and fly them into CIA headquarters and other buildings. U.S. investigators confirmed in October that a 29-year-old Iranian ... made phone calls to U.S. police from his deportation cell that an attack on the World Trade Center was imminent in "the days before the attack." [A] memo from the FBI Phoenix office about Arabs training in U.S. flight schools never reached headquarters. In 1999, the Federal Research Division at the Library of Congress published its own report ... which described that "Suicide bomber(s) belonging to Al Qaeda's Martyrdom Battalion could crash-land an aircraft packed with high explosives (C-4 and semtex) into the Pentagon, the headquarters of the [CIA], or the White House."
Note: For lots more evidence that suggest 9/11 at the very least may have been allowed to happen, click here.
Key congressional leaders say they didn't know President Bush had established a "shadow government," moving dozens of senior civilian managers to secret underground locations outside Washington. Senate Majority Leader Thomas A. Daschle (D-S.D.) [said] he had not been informed by the White House about the role, location or even the existence of the shadow government that the administration began to deploy the morning of the Sept. 11 hijackings. Among Congress's GOP leadership, aides to House Speaker J. Dennis Hastert (Ill.), second in line to succeed the president if he became incapacitated, and to Senate Minority Leader Trent Lott (Miss.) said they were not sure whether they knew. Mr. Bush acknowledged yesterday that the administration had taken extensive measures to guarantee "the continuity of government," adding, "This is serious business." Such an operation was conceived as a Cold War precaution against nuclear attack during the Eisenhower administration but never used until now. It went into effect in the first hours after the terror attacks [and] is an extension of a policy that has kept Vice President Dick Cheney in secure, undisclosed locations away from Washington. Cheney has moved in and out of public view as threat levels have fluctuated.
Note: For lots more on government secrecy from reliable sources, click here. For an abundance of solid information suggesting a major cover-up around 9/11, click here.
German computer experts are working round the clock to unlock the truth behind an unexplained surge in financial transactions made just before two hijacked planes crashed into New York's World Trade Center Sept. 11. Were criminals responsible for the sharp rise in credit card transactions that moved through some computer systems at the WTC shortly before the planes hit the twin towers? Or was it coincidence that unusually large sums of money, perhaps more than $100 million, were rushed through the computers as the disaster unfolded? A world leader in retrieving data, German-based firm Convar is trying to answer those questions. Using a pioneering laser scanning technology to find data on damaged computer hard drives and main frames found in the rubble of the World Trade Center and other nearby collapsed buildings, Convar has recovered information from 32 computers that support assumptions of dirty doomsday dealings. "The suspicion is that inside information about the attack was used to send financial transaction commands and authorizations in the belief that amid all the chaos the criminals would have, at the very least, a good head start,'' said Convar director Peter Henschel. "Not only the volume but the size of the transactions was far higher than usual for a day like that. There is a suspicion that these were possibly planned to take advantage of the chaos.''
Note: For a CNN article on this most bizarre news, click here. A German news broadcast from March 11, 2002 at this link reveals that the results are being kept secret. But why? And why hasn't there been any follow-up news on this astounding information? Could it be that key government insiders knew there was going to be an attack? For lots more reliable, verifiable information on 9/11 raising serious questions, click here.
Osama bin Laden underwent treatment in July at the American Hospital in Dubai where he met a US Central Intelligence Agency official, French daily Le Figaro and Radio France International reported today. Quoting "a witness, a professional partner of the administrative management of the hospital," they said the man suspected by the United States of being behind the September 11 terrorist attacks had arrived in Dubai on July 4 by air from Quetta, Pakistan. He was immediately taken to the hospital for kidney treatment. He left the establishment on July 14, Le Figaro said. During his stay, the daily said, the local CIA representative was seen going into bin Laden's room and "a few days later, the CIA man boasted to some friends of having visited the Saudi-born millionaire." Quoting "an authoritative source," Le Figaro and the radio station said the CIA representative had been recalled to Washington on July 15. Bin Laden ... was admitted to the urology department of Dr Terry Callaway, who specialises in kidney stones and male infertility. Telephoned several times, the doctor declined to answer questions. Several sources had reported that bin Laden had a serious kidney infection. He had a mobile dialysis machine sent to his Kandahar hideout in Afghanistan in the first half of 2000, according to "authoritative sources" quoted by Le Figaro and RFI.
Note: This article has disappeared from the Herald website. To read the full original as we copied it, click here. For excerpts from many major media articles suggesting a 9/11 cover-up, click here.
Two of them were American-trained Saudi fighter pilots. One graduated from America's foremost flight university. One drank Stoli and orange juice and one advertised for a Mexican bride. The 19 men identified by the FBI as suspects in the World Trade Center and Pentagon hijack attacks ... studied flying, lived in nondescript suburban apartments and seldom called attention to themselves. Most lived for a time in Florida. Others were scattered in Massachusetts, New Jersey, Arizona and Southern California. Then, in the last several weeks, they began disappearing from their neighborhoods. They reappeared Friday on a list of suspects in the deadliest terrorist attack in U.S. history. The FBI said it did not know for certain where most of the men came from, exactly where they lived in the United States or how old they were. Several had names so common in the Middle East that tracking them down might never be possible. A defense official said two of the [9/11] hijackers were former Saudi fighter pilots who had studied in exchange programs at the Defense Language School at Lackland Air Force Base in Texas and the Air War College at Maxwell Air Force Base in Alabama.
Note: Can you beleive that two of the alleged 9/11 hijackers trained at a US Air Force base? For other major media reports showing as many as seven of the hijackers trained at US military bases, click here.
Remote viewers have been in the headlines recently because it's come to light that several of them worked on the "Stargate" program, a top-secret, multimillion-dollar project at Fort Meade, Md. [They helped] locate American hostages, enemy submarines, strategic buildings in foreign countries and who knows what else. [Joseph] McMoneagle, 49, defended remote viewing, which he explained as the act of describing or drawing details about a place, person or thing without having any prior knowledge. He said that true remote viewing, unlike crystal-ball gazing and tea-leaf reading, is always conducted under "strict scientific protocols." He put his skills on the line last week on national television when ABC became, for an hour, the other psychic network and the demonstration was impressive. "My career was destroyed in the Army," said McMoneagle, who joined in 1964. He said he knew when he first joined the Stargate project which was then called Grillflame in 1978 that he would never again be taken seriously for any other job in the military. But he felt the assignment was too important to national security to decline. The government was ... using remote viewers, about 15 of them, who operated under strict guidelines developed in the laboratories at SRI International, a California contractor, to provide additional information to be used in conjunction with intelligence gathered by satellites or spies or any other traditional means. Research has shown that remote viewing works 14 percent of the time or more. He said, "There is a huge percentage of intelligence collection systems that don't do as well." He helped the Army locate hostages in Iran. He said he predicted almost precisely where Skylab was going to fall, 11 months before the spacecraft returned to Earth in 1979.
Note: The U.S. government completely denied the existence of this program for decades. For a free copy of this entire, fascinating article, click here. For a four-minute newscast video showing how remote viewing works, click here. For an excellent, albeit overly dramatized documentary on remote viewing, click here.
Law-enforcement officials were told that terrorists were building a bomb that was eventually used to blow up the World Trade Center. The informer was to have helped the plotters build the bomb and supply the fake powder, but the plan was called off by an F.B.I. supervisor who had other ideas about how the informer, Emad A. Salem, should be used. The account, which is given in the transcript of hundreds of hours of tape recordings Mr. Salem secretly made of his talks with law-enforcement agents, portrays the authorities as in a far better position than previously known to foil the Feb. 26 bombing of New York City's tallest towers. The explosion left six people dead, more than 1,000 injured and damages in excess of half a billion dollars. The transcript quotes Mr. Salem as saying that he wanted to complain to F.B.I. headquarters in Washington about the bureau's failure to stop the bombing, but was dissuaded by an agent identified as John Anticev. "He said, I don't think that the New York people would like the things out of the New York office to go to Washington, D.C." Another agent ... does not dispute Mr. Salem's account, but rather, appears to agree with it. Other Salem tapes and transcripts were being withheld pending Government review, of "security and other issues." William M. Kunstler, a defense lawyer in the case, accused the Government this week of improper delay in handing over all the material. The transcripts he had seen, he said, "were filled with all sorts of Government misconduct." But citing the judge's order, he said he could not provide any details.
Note: If the above link fails, click here. For a two-minute CBS News clip the same day giving more information on this little-known story, click here.
Eight elderly Canadians who were victims of CIA-funded brainwashing experiments in the 1950s reached a tentative out-of-court settlement Tuesday in their multimillion-dollar damage suit against the U.S. spy agency. The Canadian plaintiffs, who say they suffered permanent mental and physical damage as a result of the bizarre experiments performed on them at a Montreal psychiatric hospital, will divide a $750,000 payment among them, according to their attorney, James Turner. The Canadians, all patients of the late Dr. Ewen Cameron at Montreal's Allan Memorial Institute in the late 1950s, were injected with repeated doses of mind-altering LSD, deprived of sleep, subjected to massive electroshock treatments and forced to listen to thousands of repetitions of taped messages taken from the most sensitive moments of their therapy sessions.
Note: Dr. Cameron was once President of the American and World Psychiatric Associations. For more on the severe abuses of doctors in serving the CIA's mind control programs, click here. For lots more reliable, verifiable information on CIA mind control experiments and programs, click here. The link above provides this abstract of the complete article, which can be accessed by payment of a small fee.
The Secret Government is an interlocking network of official functionaries, spies, mercenaries, ex-generals, profiteers and superpatriots, who, for a variety of motives, operate outside the legitimate institutions of government. The Russians had been our ally against the Nazis, an expedient alliance for the sake of war. Now they were our enemy. To fight them we turned to some of the very men who had inflicted on humanity the horrors of Hitlers madness. We hired Nazis as American spies. Admiral Gene La Rocque: That National Security Act of 1947 changed dramatically the direction of this great nation. It established the framework for a national security state. Never have we had a National Security Council so concerned about the nations security that were always looking for threats and looking how to orchestrate our society to oppose those threats. National Security was invented, almost, in 1947, and now it has become the prime mover of everything we do. The National Security Act also gave us the Central Intelligence Agency." In 1975 ... Congress took its first public look at the Secret Government. Senator Frank Church chaired the Select Committee to study government operations. The hearings opened the books on a string of lethal activities. From the use of electric pistols and poison pellets, to Mafia connections and drug experiments. And they gave us a detailed account of assassination plots against foreign leaders and the overthrowing of sovereign governments. This is a system easily corrupted. While freedom does have enemies in the world, it can also be undermined here at home, in the dark, by those posing as its friends.
Note: This highly revealing PBS documentary is available for free viewing on the Internet. For the link, written text, and much more on this amazingly revealing documentary, click here.
The Pentagon has spent millions of dollars, according to three new reports, on secret projects to investigate extrasensory phenomena and to see if the sheer power of the human mind can be harnessed to perform various acts of espionage and war - penetrating secret files, for example, locating submarines or blowing up guided missiles in midflight. The Pentagon denies that it is spending money on psychic research. The assertions to the contrary appear in a trio of new books, one just published and two scheduled to be released this spring, and in a series of interviews in which past Pentagon officials and scientists who study the paranormal have discussed what they contend is the military's decades-long psychic quest. What emerges is a picture of [the Pentagon] trying to master such esoteric arts as ESP (extrasensory perception), telepathy (thought transfer), clairvoyance (seeing things that are out of sight), and psychokinesis (mental influence over objects or events) - all in the name of the national defense. A Pentagon spokesman went so far as to deny that the Department of Defense today ''spent a nickel'' on psychic research, but he also suggested that he could not acknowledge the existence of highly classified projects. The most detailed study of an actual set of psychic experiments comes from The Mind Race, by Russell Targ and Keith Harary.
Note: This is one of many examples of blatant lying by the Pentagon on secret projects. The Pentagon consistently denied the existence of a remote viewing project (called Stargate) until the documents from the project were declassified in 1995. You can find the documents online at this link. For a long period of time, the US government denied the existence of the NSA, so that the moniker "No Such Agency" was jokingly used.
In 1953, Joseph Alsop, then one of America’s leading syndicated columnists, went to the Philippines to cover an election. He did not go because he was asked to do so by his syndicate. He did not go because he was asked to do so by the newspapers that printed his column. He went at the request of the CIA. Alsop is one of more than 400 American journalists who in the past twenty-five years have secretly carried out assignments for the Central Intelligence Agency, according to documents on file at CIA headquarters. Journalists provided a full range of clandestine services—from simple intelligence gathering to serving as go-betweens with spies in Communist countries. Reporters shared their notebooks with the CIA. Editors shared their staffs. Some of the journalists were Pulitzer Prize winners, distinguished reporters who considered themselves ambassadors-without-portfolio for their country. Most were less exalted: foreign correspondents who found that their association with the Agency helped their work; stringers and freelancers who were as interested in the derring-do of the spy business as in filing articles; and, the smallest category, full-time CIA employees masquerading as journalists abroad. In many instances, CIA documents show, journalists were engaged to perform tasks for the CIA with the consent of the managements of America’s leading news organizations.
Note: To understand how the CIA and others manipulate the major media is in its news coverage, see the brilliant summary of the work of 20 award-winning journalists on this key topic at this link.
We are not alone in the universe. A few years ago, this notion seemed farfetched; today, the existence of extraterrestrial intelligence is taken for granted by most scientists. Even the staid National Academy of Sciences has gone on record that contact with other civilizations "is no longer something beyond our dreams but a natural event in the history of mankind that will perhaps occur in the lifetime of many of us." Sir Bernard Lovell, one of the worlds leading radio astronomers, has calculated that, even allowing for a margin of error of 5000%, there must be in our own galaxy about 100 million stars which have planets of the right chemistry, dimensions, and temperature to support organic evolution. Unless we are terribly conceited, we must assume that the "others" are far more advanced than we are. Even a 50 year gap would be tremendous; a 500-year gap staggers the imagination, and as for a 5000-year gap... It is quite possible that "others" have satellite probes in space, retransmitting to "them" anything that sounds nonrandom to the probe. But they have probably called us several thousand years ago, and are waiting for an answer; or worse yet, they have given up; or, more probably, they have reached such impressive technological advances that they have destroyed themselves. After we resolve our pressing scientific questions, it might be appropriate to make discreet inquiries as to how we could live in harmony and peace with our fellow man. [We] must keep a level head ... and be prepared to cope with problems the like of which he has never seen - out of this world, so to speak.
Note: You can find this article on the NSA website in a fascinating list of NSA Technical Journal articles at this link. The existence of the NSA itself was kept secret for years after its founding in 1952. This powerful organization discussed the implications of ET intelligence throughout the universe at least as early as 1966, as revealed in this document. Yet the disinformation campaigns of the NSA and other intelligence agencies have led to ridicule of any who believe in such things even today. For powerful, verifiable testimony from top government and military officials on a major government cover-up around the UFO issues, click here.
[Many questions] have dogged the [CIA] for years. This secret body [is] known to have overthrown governments and installed others, raised armies, staged an invasion of Cuba, spied and counterspied, established airlines, radio stations and schools. Was it in fact damaging, while it sought to advance, the national interest? Former President Truman, whose administration established the CIA in 1947, said In 1963 that by then he saw "something about the way the CIA has been functioning that is casting a shadow over our historic positions." President Kennedy, as the enormity of the Bay of Pigs disaster came home to him, said to one of the highest officials of his administration that he wanted "to splinter the CIA in a thousand pieces and scatter it to the winds." In the 19 years that the CIA has been in existence, 150 resolutions for tighter congressional control have been introduced - and put aside. Few persons in or out of the American Government know much about its work, its organization, its supervision or its relationship to the other arms of the executive branch. In 1960, CIA agents in Laos, disguised as "military advisers," stuffed ballot boxes and engineered local uprisings to help a hand-picked strongman ... set up a "pro-American" government. It was the CIA that built up Ngo Dinh Diem as the pro-American head of South Vietnam after the French ... had found him in a monastery cell in Belgium and brought him back to Saigon as Premier. The revelation that CIA agents served among Michigan State University scholars in South Vietnam from 1955 to 1959 has contributed to the fear [of infiltration of universities].
Note: For a longer, even more revealing summary of this very lengthy article, click here. To see a full copy of this article, click here. For more on the secret and illegal activities of major intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
It has become necessary to take another look at the purpose and operations of our Central Intelligence Agency – CIA. At least, I would like to submit here the original reason why I thought it necessary to organize this Agency during my Administration. It was to operate as an arm of the President. For some time I have been disturbed by the way CIA has been diverted from its original assignment. It has become an operational and at times a policy-making arm of the Government. This has led to trouble. I never had any thought that when I set up the CIA that it would be injected into peacetime cloak and dagger operations. Some of the complications and embarrassment I think we have experienced are in part attributable to the fact that this quiet intelligence arm of the President has been so removed from its intended role that it is being interpreted as a symbol of sinister and mysterious foreign intrigue – and a subject for cold war enemy propaganda. I, therefore, would like to see the CIA be restored to its original assignment as the intelligence arm of the President, and that whatever else it can properly perform in that special field – and that its operational duties be terminated or properly used elsewhere. We have grown up as a nation, respected for our free institutions and for our ability to maintain a free and open society. There is something about the way the CIA has been functioning that is casting a shadow over our historic position and I feel that we need to correct it.
Note: Written by former US President Harry Truman just one month after the assassination of John Kennedy, the full text of this Washington Post article is available for a small fee at the link given above. You can also find the text free of charge on this webpage. Do you think Truman had suspicions about CIA involvement in JFK's murder? Read a more in-depth article on this written by former CIA analyst Ray McGovern. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
At request of Brigadier General George F. Schulgen, Chief of the Requirements Intelligence Branch of Army Air Corps Intelligence, Special Agent [deleted] discussed the above captioned matter with him on July 9, 1947. General Schulgen indicated to [deleted] that the Air Corps has taken the attitude that every effort must be undertaken in order to run down and ascertain whether or not the flying disks are a fact and, if so, to learn all about them. He advised that to complete the picture he desired the assistance of the Federal Bureau of Investigation in locating and questioning the individuals who first sighted the so-called flying disks in order to ascertain whether or not they are sincere in their statements that they saw these disks. [Deleted] indicated that it was his attitude that the flying disks are not the result of any Army or Navy experiments. He stated that he was of the opinion that the Bureau, if at all possible, should accede to General Schulgen's request. [FBI Director J. Edgar Hoover's handwritten response:] I would do it but before agreeing to it we must insist upon full access to discs recovered. For instance in the Sa. case the army grabbed it and would not let us have it for cursory investigation.
Note: The excerpt above is from pages 44 and 45 of the rich collection of declassified FBI documents on UFOs at the link above. If the link fails, click here. Note that this was just days after the Roswell crash. For lots more solid evidence of a major UFO cover-up, see our UFO Information Center at this link. Why hasn't this been widely reported and become public knowledge? For a possible answer, click here.
President Trump ordered the release of more than 2,800 records related to the John F. Kennedy assassination on Thursday, but bowed to pressure from the CIA, FBI and other agencies to delay disclosing some of the most sensitive documents. Even so, the thousands of pages that were published online by the National Archives ... describe decades of spies and surveillance, informants and assassination plots. In an internal FBI report from May 1964, an informant told the FBI that the Ku Klux Klan said it “had documented proof that President Johnson was formerly a member of the Klan in Texas during the early days of his political career.” The records also reveal a deposition given before the presidential Commission on CIA Activities in 1975 by Richard Helms, who had served as the agency’s director. After a discussion of Vietnam, David Belin, an attorney for the commission, turned to whether the CIA was involved in Kennedy’s killing. “Well, now, the final area of my investigation relates to charges that the CIA was in some way conspiratorially involved with the assassination of President Kennedy. During the time of the Warren Commission, you were Deputy Director of Plans, is that correct?” Belin asked. After Helms replied that he was, Belin then asked: “Is there any information involved with the assassination of President Kennedy which in any way shows that Lee Harvey Oswald was in some way a CIA agent or agent…” Then, suddenly, the document cuts off.
Note: Watch the banned final segment of a History Channel series titled "The Men Who Killed Kennedy." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and assassinations from reliable major media sources.
The biggest Al Qaeda plot the FBI claimed to have foiled in the years following the 9/11 attacks involved no weapons, no plot, and no Al Qaeda. Instead, the vague, implausible threat by a group of construction workers in Florida to blow up U.S. buildings, including Chicago's Sears Tower, was mostly the making of the FBI, whose undercover operatives sought out the men, promised them money, and coached them over months to implicate themselves in a conspiracy to commit violent acts they never actually intended or had the means to carry out. The "Liberty City Seven" case – known by its connection to the poor, violence-ridden Miami neighborhood where the men involved lived – was the most high-profile FBI investigation of a supposed terrorist cell after the attacks in New York City and Washington, D.C. The ordeal of the seven Black men, most of them Haitian American, who were manipulated by two paid FBI informants into pledging allegiance to Al Qaeda is recounted in a new Frontline documentary, "In the Shadow of 9/11," by British director Dan Reed. The case set the stage for hundreds of FBI sting operations in the following years, as the bureau continued to frame individuals who were often poor, credulous, and had dubious ability to independently plan any attacks. Rather than abandoning stings as pointless and harmful ... the FBI doubled down on them, in some cases even providing weapons to the individuals they set up.
Note: Read more about how the FBI uses stings to manufacture terrorism cases. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism from reliable major media sources.
It's been over 50 years, but Wayne Ritchie says he can still remember how it felt to be dosed with acid. Ritchie may be among the last of the living victims of MK-ULTRA, a Central Intelligence Agency operation that covertly tested lysergic acid diethylamide (LSD) on unwitting Americans in San Francisco and New York City from 1953 to 1964. Seymour Hersh first exposed MK-ULTRA in a New York Times article in 1974 that documented CIA illegalities, including the use of its own citizens as guinea pigs. There were at least three CIA safe houses in the Bay Area where experiments went on. Chief among them was 225 Chestnut. Inside, prostitutes paid by the government to lure clients to the apartment served up acid-laced cocktails to unsuspecting johns, while martini-swilling secret agents observed their every move from behind a two-way mirror. The main man behind the mirror was ... George H. White, a Bureau of Narcotics maverick. He oversaw the San Francisco program, gleefully dubbing it Operation Midnight Climax. But, as a 1976 Senate Select Committee on Intelligence Activities noted, there was no medical pre-screening. White [wrote] in a 1971 letter to [Sidney] Gottlieb, "Of course I was a very minor missionary, actually a heretic, but I toiled wholeheartedly in the vineyards because it was fun, fun, fun. Where else could a red-blooded American boy lie, kill and cheat, steal, deceive, rape and pillage with the sanction and blessing of the All-Highest?"
Note: Read more about MK-ULTRA. This is just one of many programs that treated human beings like guinea pigs. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Despite the Cold War rhetoric of his campaign, JFK's greatest ambition as president was to break the militaristic ideology that has dominated our country since World War II. He told his close friend Ben Bradlee that he wanted the epitaph "He kept the peace," and said to another friend, William Walton, "I am almost a 'peace at any price' president." Hugh Sidey, a journalist and friend, wrote that the governing aspect of JFK's leadership was "a total revulsion" of war. Nevertheless, as James W. Douglass argues in his book JFK and the Unspeakable: Why He Died and Why It Matters, JFK's presidency would be a continuous struggle with his own military and intelligence agencies, which engaged in incessant schemes to trap him into escalating the Cold War into a hot one. His first major confrontation with the Pentagon, the Bay of Pigs catastrophe, came only three months into his presidency and would set the course for the next 1,000 days. From the start, JFK recoiled at the caper's stench, as CIA Director Allen Dulles has acknowledged, demanding assurances from CIA and Pentagon brass that there was no chance of failure and that there would be no need for U.S. military involvement. Dulles and the generals knowingly lied and gave him those guarantees. When the invasion failed, JFK refused to order airstrikes against Castro. JFK was realizing that the CIA posed a monumental threat to American democracy. As the brigade faltered, he told Arthur Schlesinger that he wanted to "splinter the CIA into a thousand pieces and scatter it to the winds."
Note: For more on the powerful social forces that assassinated JFK, see the deeply revealing reports from reliable major media sources available here.
Did you know that the United States, Canada, Britain, Australia, and New Zealand participate together in an electronic eavesdropping cooperative called "The Five Eyes Alliance"? Or that Britain "has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency"? One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects. This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites - all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets. Say you're the NSA. By law, there are certain sorts of spying you're not lawfully allowed to do on Americans. (And agency rules constraining you too.) But wait. Allied countries have different laws and surveillance rules. Put bluntly, intelligence agencies have an incentive to make themselves complicit in foreign governments spying on their own citizens.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
On June 1, 1951, top military and intelligence officials of the United States, Canada and Great Britain, alarmed by frightening reports of communist success at "intervention in the individual mind," summoned a small group of eminent psychologists to a secret meeting at the Ritz-Carlton Hotel in Montreal. By the following September, U.S. government scientists, spurred on by reports that American prisoners of war were being brainwashed in North Korea, were proposing an urgent, top-secret research program on behavior modification. Drugs, hypnosis, electroshock, lobotomy - all were to be studied as part of a vast U.S. effort to close the mind-control gap. From the end of World War II well into the 1970s, the Atomic Energy Commission, the Defense Department, the military services, the CIA and other agencies used prisoners, drug addicts, mental patients, college students, soldiers, even bar patrons, in a vast range of government-run experiments to test the effects of everything from radiation, LSD and nerve gas to intense electric shocks and prolonged "sensory deprivation." Some of the human guinea pigs knew what they were getting into; many others did not. With the cold war safely over, Energy Secretary Hazel O'Leary has ordered the declassification of millions of pages of documents on the radiation experiments. But the government has long ignored thousands of other cold war victims, rebuffing their requests for compensation and refusing to admit its responsibility for injuries they suffered.
Note: Read more about the disturbing history of government and industry experiments on human guinea pigs. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources.
Honduras's former president Juan Orlando Hernández has been jailed in the US for drug trafficking. But the narco-state he ran was a product of US foreign policy and of the US-backed coup against Manuel Zelaya's left-wing government. By the time Hernández was extradited to the United States on April 22, 2022, the former director of the Honduran police was already in US custody. Juan Carlos Bonilla, known as "El Tigre" and trained and educated at Fort Moore, Georgia, was on August 2 sentenced to nineteen years in prison in the United States. Bonilla had been a "highly trusted" torpedo loyal to the Hernández tribe. According to a Justice Department press release, the president and his brother had "El Tigre" shielding their drug shipments while also conducting "special assignments, including murder" of a rival trafficker. In heading the Honduran police, Bonilla also organized the return of death squads, tasked with "socially cleansing" Honduras of environmental activists, indigenous spokespersons, and investigative reporters. Hernández began his second term in 2017 atop a heap of killed and tear-gased protesters. [Honduras] was, according to Honduras scholar Dana Frank, "the first domino that the United States pushed over to counteract the new governments in Latin America." After Honduras, a parliamentary coup took place against Paraguay's progressive president Fernando Lugo in 2012, Brazilian president Dilma Rousseff was impeached in 2015, and Brazil's current president Luiz Inácio Lula da Silva was sentenced to a now-annulled prison sentence in 2017. Obama, hailed as the US president of "hope" and "change," oversaw all three modern coups that overthrew left-leaning governments in favor of undemocratic, conservative, and US-friendly replacements.
Note: Bonilla was trained at the School of the Americas at Fort Moore, Georgia (now known as The Western Hemisphere Institute for Security Cooperation), which graduated more than 500 human rights abusers all over the world. For more along these lines, watch our latest Mindful News Brief on who's really behind the deadly war on drugs.
Project Gunrunner [was] a nationwide initiative launched in Laredo, Texas, in 2005, which sought to reduce the smuggling of firearms across the U.S. southern border. But while the primary tactic of Gunrunner was the interdiction of buyers and sellers who were violating the laws, [ATF] agents in Phoenix had other plans. They wanted to see where the guns went if they were allowed to cross the border – to follow the small fish until they caught bigger ones. Agents named their operation "Fast and Furious," after the popular movie about car racing. Between September 2009 and December 2010, a joint task force comprised of federal officials from ATF, FBI, DEA, and ICE, working under the U.S. Attorney's Office for the District of Arizona, let over two thousand guns "walk" to Mexico. The murder that made the flawed operation public and political in the United States was of an American citizen on US soil: the killing of US Border Patrol agent Brian Terry. Though the investigators could not identify the specific gun that fired the bullet, two AK-47 style WASR-10 rifles were recovered at the scene. Both were traced to ... one of the straw purchasers the agents were monitoring under the Fast and Furious operation. ATF agents who shared their experiences during interviews conducted by a congressional committee admitted they knew that the only way they would learn the whereabouts of the guns they let go would be when Mexican law enforcement recovered them at crime scenes.
Note: Read more about the thousands of illegal guns American officials allowed into Mexico during Operation Fast and Furious. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
Humzah Mashkoor had just cleared security at Denver International Airport when the FBI showed up. The agents had come to arrest the 18-year-old, who is diagnosed with a developmental disability, and charge him with terror-related crimes. Mashkoor had gone to the airport ... as part of his alleged plot to join the Islamic State. The trip had been spurred by over a year of online exchanges starting when Mashkoor was 16 years old with four people he believed were members of ISIS. According to the Justice Department's criminal complaint, the four were actually undercover FBI agents. As a result of his conversations with the FBI, Mashkoor could face a lengthy sentence for attempting to provide material support to a terrorist organization. Law enforcement agents first became aware of Mashkoor's online activities in support of ISIS in November 2021. But instead of alerting his family ... FBI agents posing as ISIS members befriended him a year later and strung him along until he became a legal adult. Almost all of the conduct he is alleged to have committed took place when he was a juvenile. "This case appears consistent with a common fact pattern seen in tens, if not hundreds, of terrorism-related cases in which the FBI has effectively manufactured terrorist prosecutions," said Sahar Aziz, a national security expert. "If there was a serious terrorist threat in America, the FBI would not be spending its time entrapping a mentally ill minor."
Note: Read more about the FBI's manufacture of terrorist plots. For more along these lines, see concise summaries of deeply revealing news articles on law enforcement corruption and terrorism from reliable major media sources.
A second whistleblower has come forward with Slack messages showing far greater government and military involvement in the Cyber Threat Intelligence League (CTIL) than we had previously discovered. The CTIL Slack "disinformation" channel and the "law enforcement escalation" channel included current and former FBI employees, as well as personnel from the Michigan Cyber Command Center, the US Defense Digital Service (DDS), and at least one European government. Some of the military's involvement in censoring information and shaping opinion has been out in the open. In 2017, the DOD added "information" as the seventh joint function of the military. With the addition of "information" as a function of defense, DOD effectively declared that citizens' perceptions, attitudes, decisions, and behaviors were subject to military scrutiny and manipulation. The Censorship Industrial Complex ... aims to undermine and denigrate populist actors and movements through allegations that anti-government sentiment is linked to hate, conspiracy theories, or Russia. Supposed attempts to stop "disinformation" are really attempts to prevent opposition and challenges to the international political and military order. The new files suggest that the US and UK military and intelligence officials and contractors created the Censorship Industrial Complex's to defeat populist sentiment, not just individuals.
Note: The extensive collusion between Big Tech and government officials to censor COVID information is barely beginning to come to light. For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
Information confirming an extraterrestrial presence on Earth ... has the potential to be a genuine Pandora's box. When I first became publicly involved in the UAP topic, the alleged recovery of ET technology was not an issue. My immediate goal was to alert policymakers to a dangerous intelligence failure, namely, the fact of serious and recurring intrusions into restricted DoD airspace by strange, unidentified aircraft. It was shocking to learn our vaunted multi-billion-dollar intelligence system was paralyzed by ineffable stigma, as effectively as any electromagnetic warfare (EW) weapon, placing US personnel and the nation at risk. This situation reminded me of both Pearl Harbor, where vital warning information was not forwarded up the chain of command, as well as 9/11, when intelligence agencies failed to share vital information that could have saved the lives of thousands of innocent civilians. Having survived the attack on the Pentagon myself, this was not a purely theoretical consideration. Our military is encountering intelligently controlled, solid objects invading restricted military airspace, sometimes even flying in formation, on an almost daily basis. Multiple credible reports indicate that UAP has rendered segments of our nuclear deterrent inoperable. I penned an article for Politico titled, "If the US Government has UFO Crash Materials It is Time to Reveal Them." In the article, I made several points, including the following: Democracy requires transparency. The American people own any materials recovered by our government. The public can handle disclosure. The government cannot forever stifle the truth, so it is better to get ahead of it. Secrecy stifles Science. There is no evidence of an imminent threat. If there is a threat, we need to know so we can prepare.
Note: The author of this article is Christopher Mellon, former deputy Assistant Secretary of Defense for Intelligence. For more along these lines, see concise summaries of deeply revealing news articles on UFOs from reliable major media sources. Then explore the excellent, reliable resources provided in our new UFO Information Center.
Never in its 63 years of independence has Congo experienced a peaceful and democratic transfer of power. On June 30, 1960, after 75 years of Belgian rule, Congo became an independent country. At the helm as prime minister was Patrice Lumumba. On Aug. 18, 1960, Dwight D. Eisenhower became the first U.S. president known to order the assassination of a sitting foreign leader. During a National Security Council meeting, an official note taker ... recalled, President Eisenhower said "something – I can no longer remember his words– that came across to me as an order for the assassination of Lumumba." The CIA's top chemist procured a poison to kill Lumumba, flew it to Congo, and instructed the CIA station chief there, Larry Devlin, to put it in the prime minister's food or toothpaste. But by that time, Lumumba had been removed from office and put under house arrest, so the plot fizzled. Lumumba was flown to the breakaway province of Katanga and shot dead ... by Congolese soldiers commanded by Belgian officers and answering to the separatist government. The CIA ... had blood on its hands for the death of Lumumba. It played a role in every event leading to his downfall. As part of what came to be known as "Project Wizard," the CIA subsidized at least two opposition senators, and the agency received White House authorization to pay the president as well. CIA cash also paid for anti-Lumumba radio propaganda and street protests.
Note: Learn more about the rise of the CIA in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
When I joined the CIA in January 1990, I did it to serve my country. My whole world, like the worlds of all Americans, changed dramatically and permanently on September 11, 2001. Within months of the attacks, I found myself heading to Pakistan as the chief of CIA counterterrorism operations in Pakistan. Almost immediately, my team began capturing al-Qaeda fighters at safehouses all around Pakistan. Just a month after the September 11 attacks, the CIA leadership gathered its army of lawyers and black ops people and came up with a plan to legalize torture. This was despite the fact that torture has long been patently illegal in the United States. But it didn't matter. In the end, I was the only person associated with the CIA's torture program who was prosecuted and imprisoned. I never tortured anybody. But I was charged with five felonies, including three counts of espionage, for telling ABC News and the New York Times that the CIA was torturing its prisoners, that torture was official U.S. government policy, and that the policy had been approved by the president himself. I served 23 months in a federal prison. Former CIA Director George Tenet, former CIA Deputy Director John McLaughlin, former CIA Deputy Director for Operations Jose Rodriguez, former CIA Executive Director John Brennan, and CIA [contractors] James Mitchell and Bruce Jessen ... weakened our democracy by pretending that the Constitution and the rule of law didn't exist.
Note: This article was written by CIA whistleblower John Kiriakou. For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
In the early days of America's war on terror, U.S. authorities detained Ahmed Rabbani thinking he was someone else. They soon realized their mistake. Rabbani ... was never charged with a crime. Rabbani's lawyer says he ... was taken by Pakistani authorities who misidentified him and handed him over to U.S. intelligence officers for a $5,000 reward. Rabbani [was] a taxi driver in Karachi. He spoke three languages–Urdu, Arabic and English. When he was detained, on Sept. 10, 2002, Rabbani didn't know his wife was pregnant. He said he found out about it three years later from a letter–the first communication he had received from her since his detention. He met his 20-year-old son, Jawwad, for the first time upon his return to Pakistan in February. After 18˝ years at Guantanamo Bay, he stepped off a plane in Pakistan in February–a free but broken man. Years of hunger strikes and force feeding have left him unable to eat most solid food. "I never, never, ever sleep at night," he said. His only means of escape was art. By the time of his release, he had made hundreds of paintings. In May, 20 of Rabbani's paintings were shown at a gallery in the Pakistani city of Karachi. Rabbani said he was transferred several times to camps in Pakistan and Afghanistan known as black sites–secret CIA interrogation facilities. There, he said, he was tortured until he told his captors anything he thought they wanted to hear. A total of 779 men were at some point detained [at Guantanamo]. Like Rabbani, most were eventually released without ever having been charged with a crime. Rabbani says he doesn't expect he will ever fully recover, physically or mentally. "Some things will never be fixed," he said.
Note: Read more about Guantanamo Bay's horrors. Check out the incredible ships created by Moath al-Alwi, another prisoner held at Guantánamo Bay without charges since 2002. The Pentagon has declared that art produced at Guantánamo Bay belongs to the US government, and not the artists. Authorities have refused to release the artworks from prison.
The Taliban government in Afghanistan – the nation that until recently produced 90% of the world's heroin – has drastically reduced opium cultivation across the country. Western sources estimate an up to 99% reduction in some provinces. This raises serious questions about the seriousness of U.S. drug eradication efforts in the country over the past 20 years. And, as global heroin supplies dry up, experts tell MintPress News that they fear this could spark the growing use of fentanyl – a drug dozens of times stronger than heroin that already kills more than 100,000 Americans yearly. A similar attempt by the Taliban to eliminate the drug occurred in 2000, the last full year that they were in power. It was extraordinarily successful, with opium reduction dropping from 4,600 tons to just 185 tons. However, as soon as the United States invaded in 2001, poppy cultivation shot back up to previous levels and the supply chain recommenced. Afghanistan's transformation into a preeminent narco-state owes a significant debt to Washington's actions. Poppy cultivation in the 1970s was relatively limited. However, the tide changed in 1979 with the inception of Operation Cyclone, a massive infusion of funds to Afghan Mujahideen factions aimed at exhausting the Soviet military. The U.S. directed billions toward the insurgents, yet their financial needs persisted. Consequently, the Mujahideen delved into the illicit drug trade. By the culmination of Operation Cyclone, Afghanistan's opium production had soared twentyfold.
Note: Read powerful evidence that the CIA and US military are directly involved in the drug trade. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
Public health leaders like Rochelle Walensky and Anthony Fauci make false claims, or contradict themselves repeatedly, on subjects related to the pandemic response, while leading scientists, like Peter Hotez in the US and Christian Drosten in Germany, are equally susceptible to such flip-flops and lies. All of these figures publicly and aggressively promoted anti-public health policies, including universal masking, social distancing, mass testing and quarantining of healthy people, lockdowns and vaccine mandates. All the top pro-lockdown scientists and public health experts – in perfect lockstep – suddenly started (and continue to this day) to misread studies and advocate policies that they had claimed in the past were unnecessary. The public health experts were not responsible for pandemic response policy. The military-intelligence-biodefense leadership was in charge. The most startling switch was the replacement of the public health agencies by the National Security Council and Department of Homeland Security at the helm of pandemic policy and planning. As part of the secret switch, all communications – defined in every previous pandemic planning document as the responsibility of the CDC – were taken over by the National Security Council under the auspices of the White House Task Force. The CDC was not even allowed to hold its own press conferences!
Note: Read more about how the national security state was involved in COVID public health policies. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the coronavirus from reliable major media sources.
In early 1973 ... the head of the Central Intelligence Agency (CIA) ordered the destruction of all documents related to MK Ultra. MK Ultra involved a range of grotesque experiments on unwitting test subjects within and beyond U.S. borders. In October of 2021, new evidence surfaced linking disappeared Indigenous children to MK Ultra experiments conducted by CIA-sponsored researchers. A white Winnipeg resident named Lana Ponting testified in Quebec's Superior Court that in 1958, when she was 16 years old, doctors from the Allan Memorial Institute, a former psychiatric hospital ... held her against her will, drugged her with LSD and other substances, subjected her to electroshock treatments, and exposed her to auditory indoctrination: playing a recording telling Ponting over and over again, that she was either "a bad girl" or "a good girl." Ponting recalls sneaking out at night and happening upon "people standing over by the cement wall" with shovels and flashlights. She and other children had heard rumors that bodies were buried on the property. The CIA, along with the U.S. and Canadian military and powerful U.S. charitable foundations, are directly implicated in this ordeal. The Memorial Institute was home to MK Ultra "Subproject 68." Under the leadership of psychiatrist Ewen Cameron, whom Ponting accused of raping her, experiments in this subproject sought to "depattern" people's minds using violent methods Cameron termed "psychic driving."
Note: Read the complete article for a glimpse into how CIA mind control programs were used in US prisons. Government and business interests have a long history of experimenting on human beings. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and mind control from reliable major media sources.
The United States government has been secretly amassing a "large amount" of "sensitive and intimate information" on its own citizens, a group of senior advisers informed Avril Haines, the director of national intelligence. The government effort to accumulate data revealing the minute details of Americans' lives [is] described soberly and at length by the director's own panel of experts in a newly declassified report. The report states that the government believes it can "persistently" track the phones of "millions of Americans" without a warrant, so long as it pays for the information. It is often trivial "to deanonymize and identify individuals" from data that was packaged ... for commercial use. Such data may be useful, it says, to "identify every person who attended a protest or rally based on their smartphone location or ad-tracking records." Such civil liberties concerns are prime examples of how "large quantities of nominally 'public' information can result in sensitive aggregations." What's more, information collected for one purpose "may be reused for other purposes," which may "raise risks beyond those originally calculated," an effect called "mission creep." "In the wrong hands," [Office of the Director of National Intelligence] advisers warn, the same mountain of data the government is quietly accumulating could be turned against Americans to "facilitate blackmail, stalking, harassment, and public shaming." These are all offenses that have been committed by intelligence agencies and White House administrations in the past.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
A signed affidavit from Guantanamo military commission investigator Don Canestraro ... outlines the findings of a 2016 investigation by Canestraro, a longtime veteran of the Drug Enforcement Administration (DEA), into Saudi and CIA complicity in the [9/11] terrorist attacks, findings that are squarely at odds with the story given to the public in their wake. Relaying the information gathered from dozens of interviews he conducted with former FBI and CIA personnel, members of the 9/11 Commission, and US government officials, Canestraro's affidavit outlines a sequence of events that, if true, suggest a botched and illegal domestic CIA operation was at the heart of the intelligence failure that enabled the attacks. More than that, it suggests there was a concerted cover-up of the grave blunder after the fact by both the CIA and the George W. Bush administration. The CIA impeded law enforcement efforts that could have prevented the attacks. Several former agents recalled being blocked by the agency from sharing intelligence about the hijackers with the rest of the FBI. A "former senior FBI official" likewise told Canestraro that the CIA sat on the news that the hijackers had entered the United States in 2000. Why did the CIA so intensely gatekeep information on the future hijackers? One former agent recalled the FBI faced "diplomatic pressure" not to investigate the Saudi links to the attacks, while another ... charged that agents were told not to interview Saudi nationals.
Note: Read the full article for more important details on this alleged cover-up, including the close relationship between the CIA and Saudi intelligence agency. For more along these lines, see concise summaries of revealing news articles on intelligence agency corruption and explore our comprehensive 9/11 Information Center.
The secret contract was finalized on Nov. 8, 2021, a deal between a company that has acted as a front for the United States government and the American affiliate of a notorious Israeli hacking firm. Under the arrangement, the Israeli firm, NSO Group, gave the U.S. government access to one of its most powerful weapons – a geolocation tool that can covertly track mobile phones around the world without the phone user's knowledge or consent. Only five days earlier, the Biden administration had announced it was taking action against NSO, whose hacking tools for years had been abused by governments around the world to spy on political dissidents, human rights activists and journalists. The White House placed NSO on a Commerce Department blacklist, declaring the company a national security threat. The secret contract ... violates the Biden administration's public policy, and still appears to be active. The contract, reviewed by The Times, stated that the "United States government" would be the ultimate user of the tool, although it is unclear which government agency authorized the deal and might be using the spyware. Elements of America's expansive national security apparatus in recent years have bought the weapons, deployed them against drug traffickers, and have quietly pushed to consolidate control of them into the hands of the United States and its closest allies. The F.B.I. purchased access in 2019 to NSO's most powerful hacking tool, known as Pegasus, which invades mobile phones and mines their contents.
Note: Read how journalists and activists have been targeted with NSO Group spyware. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
In June 2017, The Intercept published a leaked N.S.A. document, which it claimed revealed "a months-long Russian hacking effort against the U.S. election infrastructure." Ever since, it has been an article of faith in the mainstream media and among Democratic politicians that Russian G.R.U. cyberwarriors "hacked" the 2016 election. Moreover, Reality Winner, the N.S.A. analyst who leaked the document and ended up in jail as a result, has been elevated to the status of a heroic whistleblower. There are strong grounds to believe Winner unwittingly walked into a trap laid by the C.I.A. Winner has always claimed she acted alone, and there is no reason to doubt that she felt it was her patriotic duty to release the document. But her clumsiness, naivety and incompetence suggest she may well be easily manipulable, and a great many individuals and organizations had an interest in the dud intelligence report's release. Foremost among them, elements of the C.I.A. loyal to John Brennan, Agency director between 2013 and January 2017. Brennan fudged ... findings to keep the F.B.I. Trump-Russia "collusion" investigation alive. Launched by the Bureau in 2016, it found no evidence Trump or members of his campaign were conspiring with Moscow. It is an obvious question whether Winner's leak – in addition to furthering the RussiaGate fiction and damaging Trump – also served to discredit the N.S.A. by creating the illusion it had been asleep at the wheel over Kremlin meddling.
Note: Listen to audio of renowned journalist Seymour Hersch debunking the intelligence agency lie that Russia was responsible for the 2016 DNC email leaks, which exposed corruption in the party. Reality Winner's leak gave credence to this lie. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Among the intersections between [Lee Harvey] Oswald and the CIA, his time as a young Marine at the Atsugi naval air facility in Japan in 1957 is high among them. Atsugi was a launching pad for U-2 spy flights over the Soviet Union and was also a hub of the CIA's research into psychedelic drugs. "A CIA memo titled 'Truth Drugs in Interrogation' revealed the agency practice of dosing agents who were marked for dangerous overseas missions," wrote author David Talbot in "The Devil's Chessboard." A new document released in full last week relates directly to Oswald's time at Atsugi, revealing details about the CIA's response to testimony from a former agency accountant that the spy service had employed Oswald – who went on to be a gunman in the assassination of President John F. Kennedy in 1963. The CIA's claim to have had no contact with Oswald is undercut by the fact that George de Mohrenschildt, a CIA asset, became close friends with Oswald in the months before the assassination. According to documents found in the newly declassified files, at the same time as his trip, the CIA's Domestic Operations Division ran a search on de Mohrenschildt, "exact reason unknown," according to two documents created by a CIA analyst included in last week's declassification. The covert arm of the division was run at the time by E. Howard Hunt, a black ops specialist who confessed later in life to learning ahead of time of a conspiracy to assassinate Kennedy that involved high-level figures in the CIA.
Note: The CIA's MK-ULTRA program routinely administered drugs to unsuspecting victims. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
Erik Prince, the security contractor with close ties to the Trump administration, has in recent years helped recruit former American and British spies for secretive intelligence-gathering operations that included infiltrating Democratic congressional campaigns, labor organizations and other groups considered hostile to the Trump agenda. One of the former spies, an ex-MI6 officer named Richard Seddon, helped run a 2017 operation to copy files and record conversations in a Michigan office of ... one of the largest teachers unions in the nation. The next year, the same undercover operative infiltrated the congressional campaign of Abigail Spanberger, then a former C.I.A. officer who went on to win an important House seat in Virginia as a Democrat. Both operations were run by Project Veritas, a conservative group that has gained attention using hidden cameras and microphones for sting operations. Mr. Prince, the former head of Blackwater Worldwide ... appears to have become interested in using former spies to train Project Veritas operatives in espionage tactics sometime during the 2016 presidential campaign. In 2017, he met with White House and Pentagon officials to pitch a plan to privatize the Afghan war. Mr. Prince invited Project Veritas operatives ... to his familys Wyoming ranch for training in 2017. [They] shared social media photos of taking target practice with guns at the ranch, including one post ... saying that with the training, Project Veritas will be the next great intelligence agency.
Note: Mr. Prince's Blackwater operation got caught systematically defrauding the government. Then Blackwater changed its name to Academi and made over $300 million off the Afghan drug trade. For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption from reliable major media sources.
The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government [is] a new book by Salon founder David Talbot. As Talbot explains, “What I was really trying to do was a biography on the American power elite from World War II up to the 60s.” Dulles ... served as CIA director from 1953 to 1961. Dulles would have had no moral qualms about killing any politician, including Americans. He went on to wield far greater power than most elected officials ever have. The Devil's Chessboard ... includes detailed reexaminations of Dulles's most notorious failures, such as the Bay of Pigs in 1961 and the nightmarish mind control program MK-ULTRA, as well as his most notorious "successes," the CIA's overthrow of democratic governments in Iran in 1953 and in Guatemala in 1954. As the Swiss director of the Office of Strategic Services during World War II, Dulles – whose law firm had represented German corporations and many U.S. corporations with German interests – quietly attempted to undermine Franklin D. Roosevelt's demand that Germany surrender unconditionally, going so far as to order the rescue of an SS general surrounded by Italian partisans. Dulles also led the push to save Reinhard Gehlen, Nazi head of intelligence on the Eastern Front and a genuine monster, from any post-war justice. Dulles then made certain Gehlen and his spies received a cozy embrace from the CIA, and helped push him to the top of West Germany's Federal Intelligence Service.
Note: Read more about the CIA Nazi link. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
Human rights activists, journalists and lawyers across the world have been targeted by authoritarian governments using hacking software sold by the Israeli surveillance company NSO Group, according to an investigation into a massive data leak. The investigation by the Guardian and 16 other media organisations suggests widespread and continuing abuse of NSO's hacking spyware, Pegasus. Pegasus is a malware that infects iPhones and Android devices to enable operators of the tool to extract messages, photos and emails, record calls and secretly activate microphones. The leak contains a list of more than 50,000 phone numbers that, it is believed, have been identified as those of people of interest by clients of NSO since 2016. The numbers of more than 180 journalists are listed in the data, including reporters, editors and executives at the Financial Times, CNN, the New York Times, France 24, the Economist, Associated Press and Reuters. The phone number of a freelance Mexican reporter, Cecilio Pineda Birto, was found in the list, apparently of interest to a Mexican client in the weeks leading up to his murder, when his killers were able to locate him at a carwash. He was among at least 25 Mexican journalists apparently selected as candidates for surveillance. The broad array of numbers in the list belonging to people who seemingly have no connection to criminality suggests some NSO clients are breaching their contracts with the company, spying on pro-democracy activists and journalists.
Note: Read more about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Even before he became director of the FBI, [J. Edgar] Hoover was conducting secret intelligence operations against U.S. citizens he suspected were anarchists, radical leftists or communists. After a series of anarchist bombings went off across the United States in 1919, Hoover sent five agents to infiltrate the newly formed Communist Party. "From that day forward, he planned a nationwide dragnet of mass arrests to round up subversives, round up communists, round up Russian aliens," [author Tim] Weiner says. On Jan. 1, 1920, Hoover sent out the arrest orders, and at least 6,000 people were arrested and detained throughout the country. "When the dust cleared, maybe 1 in 10 was found guilty of a deportable offense," says Weiner. Hoover, Attorney General Mitchell Palmer and Secretary of the Navy Franklin Delano Roosevelt all came under attack for their role in the raids. Hoover started amassing secret intelligence on "enemies of the United States" – a list that included terrorists, communists, spies – or anyone Hoover or the FBI had deemed subversive. Later on, anti-war protesters and civil rights leaders were added to Hoover's list. "Hoover saw the civil rights movement from the 1950s onward and the anti-war movement from the 1960s onward, as presenting the greatest threats to the stability of the American government since the Civil War," [Weiner] says. "These people were enemies of the state, and in particular Martin Luther King [Jr.] was an enemy of the state."
Note: Read more about the FBI's COINTELPRO program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.
Lots of questions have been raised about 9/11: Why does it look like there is no plane at the crash site in Pennsylvania where flight United 93 came down? Why did a building called World Trade Centre Building 7 collapse even though it was never hit by an aircraft? And why was America so unprepared when terror attack warnings had been received? Through the internet and the media generally, allegations of complicity by the US government in the 9/11 attacks are intensifying. We found that simple requests, such as asking to see the plane wreckage of flight United 93 at Shanksville, or flight American Airlines 77 at the Pentagon, were refused after months of delay by the authorities. Yet if we had been able to film the wreckage from flight AA77 we would have had extremely strong evidence that a Boeing 757 hit the Pentagon. Trying to prove or disprove these alternative theories is not easy. Officials are loathe to engage, thinking that any response will only fan the flames of popular conspiracy theories, and yet no response seems to be worse still. Senator Bob Graham ... co-chaired the Congressional Inquiry into 9/11 which detailed the failure of the CIA and FBI to use intelligence it had received about Al Qaeda before the attacks. Senator Graham told us there was a “collaboration of efforts among agencies and the administration to keep information out of the public’s hands.”
Note: For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
An explosive leak of tens of thousands of documents from the defunct data firm Cambridge Analytica is set to expose the inner workings of the company that collapsed after the Observer revealed it had misappropriated 87 million Facebook profiles. More than 100,000 documents relating to work in 68 countries that will lay bare the global infrastructure of an operation used to manipulate voters on “an industrial scale” are set to be released over the next months. The documents were revealed to have come from Brittany Kaiser, an ex-Cambridge Analytica employee turned whistleblower, and to be the same ones subpoenaed by Robert Mueller’s investigation into Russian interference in the 2016 presidential election. Kaiser ... decided to go public after last month’s election in Britain. “It’s so abundantly clear our electoral systems are wide open to abuse,” she said. “I’m very fearful about what is going to happen in the US election later this year.” Kaiser said the Facebook data scandal was part of a much bigger global operation that worked with governments, intelligence agencies, commercial companies and political campaigns to manipulate and influence people. The unpublished documents contain material that suggests the firm was working for a political party in Ukraine in 2017 even while under investigation as part of Mueller’s inquiry and emails that Kaiser says describe how the firm helped develop a “sophisticated infrastructure of shell companies that were designed to funnel dark money into politics”.
Note: For more along these lines, see concise summaries of deeply revealing news articles on elections corruption from reliable major media sources.
The FBI opened a “domestic terrorism” investigation into a civil rights group in California, labeling the activists “extremists” after they protested against neo-Nazis in 2016. Federal authorities ran a surveillance operation on By Any Means Necessary (Bamn), spying on [the] group’s movements in an inquiry that came after one of Bamn’s members was stabbed at the white supremacist rally. The FBI’s Bamn files reveal: The FBI investigated Bamn for potential “conspiracy” against the “rights” of the “Ku Klux Klan” and white supremacists. The FBI considered the KKK as victims and the leftist protesters as potential terror threats, and downplayed the threats of the Klan. The FBI ... cited Bamn’s advocacy against “rape and sexual assault” and “police brutality” as evidence in the terrorism inquiry. The FBI’s 46-page report ... presented an “astonishing” description of the KKK, said Mike German, a former FBI agent. The FBI launched its terrorism investigation and surveillance of Bamn after white supremacists armed with knives faced off with hundreds of counter-protesters, including Bamn activists, at a June 2016 neo-Nazi rally in Sacramento. Although numerous neo-Nazis were suspected of stabbing at least seven anti-fascists in the melee... the FBI chose to launch a inquiry into the activities of the leftwing protesters. California law enforcement subsequently worked with the neo-Nazis to identify counter-protesters, pursued charges against stabbing victims and other anti-fascists, and decided not to prosecute any men on the far-right for the stabbings. In a redacted October 2016 document, the FBI labeled its Bamn investigation a “DT [domestic terrorism] – ANARCHIST EXTREMISM” case.
Note: Why was Newsweek the only major media outlet in the U.S. to write an article on this mind-boggling story? The article states, "Yvette Felarca, a Berkeley teacher and member of BAMN, was stabbed at the rally. Felcara has now been charged with assault and rioting. Police also wanted to bring six charges against Cedric O’Bannon, an independent journalist at the rally who was stabbed by a pole while filming." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
A secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documents taken from the National Security Agency by Edward Snowden and obtained by NBC News. The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous. A division of Government Communications Headquarters (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack. The documents ... show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder - and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms. Among the methods listed in the document were jamming phones, computers and email accounts and masquerading as an enemy in a "false flag" operation. A British hacktivist known as T-Flow, who was prosecuted for hacking, [said] no evidence of how his identity was discovered ever appeared in court documents.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
On Sept. 24, 2007, a red, white, and blue Gulfstream II fell from the sky over the Yucatán Peninsula. From the wreckage, [Mexican commandos] removed 132 industrial trash bags, weighing around 4 tons. The bags were filled with cocaine. The Gulfstream ... had flown for the CIA's rendition program. When it went down, it belonged to a newly-formed company near Boca Raton, Florida, called Donna Blue Aircraft ... an "undercover company" of Immigration and Customs Enforcement. A Rolling Stone investigation into thousands of pages of government documents, flight logs, court filings, and local news reports ... confirmed there was a secret ICE operation called Mayan Jaguar. According to classified reports, ICE bought private planes from 2004 to 2007, intending to tag them with hidden tracking beacons and, through front companies like Donna Blue, sell them to drug traffickers. ICE agents would draw "approximately 20 planes" into Operation Mayan Jaguar. ICE stopped none of them, while other governments thwarted some, without ICE. The Drug Enforcement Administration, convinced that traffickers controlled Mayan Jaguar, ordered ICE to shut it down. "ICE Headquarters advised the agents … to continue working," according to another agent's IG testimony. Operation Mayan Jaguar would be "a coordinated interagency task force developed by the intelligence community," according to an internal ICE memo. The narcotics trade was largely legal until global prohibition began in the early 20th century. Waves of drug planes and state-sponsored trafficking weren't far behind. From the 1950s to the 1970s, CIA proprietary airlines flew arms into the Golden Triangle for anti-communist guerillas, and were suspected of flying out with the guerillas' opium. It was allegedly the same deal in the Eighties, but in Central America, with cocaine. In Asia, the CIA paid Afghan heroin lords to fight the Soviets, and later to fight the Taliban. In 1998, the CIA's marquee aviation front, Southern Air Transport, declared bankruptcy a week before the CIA's inspector general implicated the company in cocaine trafficking.
Note: Our investigative Substack article explores the dark truths behind the US war on drugs that the mainstream media ignores. For more, watch our Mindful News Brief on who's really behind the war on drugs. Check out our database of concise and revealing news summaries on the war on drugs from reliable media sources.
Meta CEO Mark Zuckerberg told the House Judiciary Committee that his company's moderators faced significant pressure from the federal government to censor content on Facebook and Instagram–and that he regretted caving to it. In a letter to Rep. Jim Jordan (R–Ohio), the committee's chairman, Zuckerberg explained that the pressure also applied to "humor and satire" and that in the future, Meta would not blindly obey the bureaucrats. The letter refers specifically to the widespread suppression of contrarian viewpoints relating to COVID-19. Email exchanges between Facebook moderators and CDC officials reveal that the government took a heavy hand in suppressing content. Health officials did not merely vet posts for accuracy but also made pseudo-scientific determinations about whether certain opinions could cause social "harm" by undermining the effort to encourage all Americans to get vaccinated. But COVID-19 content was not the only kind of speech the government went after. Zuckerberg also explains that the FBI warned him about Russian attempts to sow chaos on social media by releasing a fake story about the Biden family just before the 2020 election. This warning motivated Facebook to take action against the New York Post's Hunter Biden laptop story when it was published in October 2020. In his letter, Zuckerberg states that this was a mistake and that moving forward, Facebook will never again demote stories pending approval from fact-checkers.
Note: For more along these lines, see concise summaries of deeply revealing news articles on censorship and government corruption from reliable major media sources.
Justified by the Monroe Doctrine – the United States' claim to unchallenged dominance over the Western Hemisphere – the United States has criminalized asylum seekers, militarized the southern border, and intervened directly in Latin America. Everyone Who Is Gone Is Here: The United States, Central America, and the Making of a Crisis ... is a harrowing indictment of the United States' criminal role in Latin America, a region in which it has sown crisis for over a century with scant regard for the lives of millions. Ronald Reagan ... was keen on avoiding another nation falling into the sphere of influence of Cuba and the Soviet Union. To prevent a drift away from the United States' orbit, he pumped military aid to El Salvador's caudillismo military. The result was carnage and mass displacement. In 1992, three million Salvadoreans were living in Los Angeles, a tenfold growth. [Guatemala's] General Fernando Romeo Lucas GarcĂa adopted El Salvador's El Mozote strategy of "cleansing" ... indigenous Mayans. By 1984 around 1.5 million people were internally displaced. Thousands would flee to the United States. Two hundred thousand civilians had been killed; there were 669 massacres; 93 percent of the crimes involved the US-funded and -trained military. The Reagan administration "transformed Honduras from a banana republic where the United Fruit Company picked the country presidents . . . into a virtual US military base." By the 1990s, the states of Guatemala, El Salvador, and Honduras were heavily militarized. The armed forces acted with impunity, civil organizations had been hollowed out or were nonexistent, and gross inequality and racism were rampant. The CIA decided that the cocaine and heroin coming through Central America could be trafficked by various local military forces. The Northern Triangle countries [El Salvador, Guatemala, and Honduras] were used by the CIA to generate illicit earnings that financed the Contras – right-wing militias of Nicaragua – and Iran during its war against Iraq, an episode that came to be known as the Iran-Contra affair.
Note: This article also goes into how Reagan's war on drugs and the crack epidemic in Los Angeles fueled rampant gang violence, creating conditions that formed the Mara Salvatrucha (MS-13) gang. Watch our Mindful News Brief videos on how the US government facilitates child trafficking at the border and who's really behind the deadly war on drugs.
The New York Times on February 25 published an explosive story of what purports to be the history of the CIA in Ukraine from the Maidan coup of 2014 to the present. The story, "The Spy War: How the CIA Secretly Helps Ukraine Fight Putin" ... relied on more than 200 interviews in Ukraine, the US, and "several European countries." There is a CIA listening post in the forest along the Russian border, one of 12 "secret" bases the US maintains there. Beginning in 2016, the CIA trained an "elite Ukrainian commando force known as Unit 2245, which captured Russian drones and communications gear so that CIA technicians could reverse-engineer them." One of the reasons that I believe the Times article was "authorized" by the intelligence community is because of what isn't in it. There's no mention, for example, that the United Nations has deemed Ukraine to be one of the most corrupt countries in the world, where money just seems to disappear into foreign accounts and the pockets of Ukrainian government officials. There's no mention that Ukraine has become a "supermarket" for black market weapons and that western weapons meant for the war effort have popped up all over the world. And there is no mention at all that it was the CIA and the State Department that were responsible for the 2014 overthrow of the Ukrainian government in the first place, an action that resulted in Russia's decision to invade eight years later.
Note: John Kiriakou is a whistleblower, former CIA counter-terrorism officer, and former senior investigator on the Senate Foreign Relations Committee. In our War Failures and Lies section in our comprehensive Military-Intelligence Corruption Information Center, we discuss how the CIA has supported Neo-Nazis in Ukraine since at least 2014, the year of the far-right coup that incorporated the Nazi group Azov Battalion into the country's National Guard. Since then, declassified government documents show that Ukraine was systematically developed as a proxy for US war against Russia. In 2016, Congress removed a ban on funding Ukrainian neo-fascist groups, effectively paving the way for American arms and weapons to fall in the hands of Ukraine's Nazi organizations.
A secretive CIA office has been coordinating the retrieval of crashed UFOs around the world for decades, multiple sources told DailyMail.com. One source said that at least nine apparent 'non-human craft' have been recovered by the US government – some wrecked from a crash, and two completely intact. Three sources briefed on those alleged top secret operations [said] that the Office of Global Access (OGA), a wing of the Central Intelligence Agency's Science and Technology Directorate, has played a central role since 2003 in orchestrating the collection of what could be alien spacecraft. 'There's at least nine vehicles. There were different circumstances for different ones,' one source briefed by UFO program insiders [said]. 'It has to do with the physical condition they're in. If it crashes, there's a lot of damage done. Others, two of them, are completely intact.' The source said the CIA has a 'system in place that can discern UFOs while they're still cloaked,' and that if the 'non-human' craft land, crash or are brought down to earth, special military units are sent to try to salvage the wreckage. Sources said the CIA office then often hands the wreckage or material over to private aerospace contractors for analysis, where it is not subject to rigorous government audits and can be shielded with protections for trade secrets. Multiple sources said that many of the people involved in these programs may not even realize they are dealing with non-human craft.
Note: Read the riveting testimonies of 60 government and military witnesses of UFO phenomenon, which include astronauts, generals, admirals, and other top government and military officials. For more along these lines, see concise summaries of revealing news articles on UFOs from reliable major media sources. Then explore the excellent resources provided in our UFO Information Center.
Fort Benning, the infamous Georgia U.S. military base, is once again in the news, changing its name to Fort Moore, thereby ditching its Confederate name. Across Latin America, the very name of Fort Benning is enough to strike terror into the hearts of millions, bringing back visions of massacres and genocides. This is because the fort is home to the School of the Americas (now known as Western Hemisphere Institute for Security Cooperation or WHINSEC), a shadowy academy where around 84,000 Latin American soldiers and police officers have been taught on the U.S. dime on how to kill, torture and how to stamp out political activists. "The school is controversial partly because of its role in promoting US hegemony in Latin America," James Jordan, national co-coordinator at Alliance for Global Justice, told MintPress, adding, "But even worse, it is how the school has promoted this: teaching methods of torture – even publishing torture manuals, counterintelligence, psyops, repression of political voices that don't meet the approval of Washington DC. If one looks at cases of human rights abuses by the military throughout Latin America, the number of those responsible who were trained at the School of the Americas is simply staggering." In 1996, the Pentagon was pressured into releasing the school's official training manuals. Even a casual glance through the nearly 1200 pages of instructions makes for sobering reading and dispels the myth forever that the U.S. is a benevolent global force.
Note: The School of the Americas graduated more than 500 human rights abusers. The identities of many other US-trained troops operating in other countries remain hidden by US courts. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
[CIA station chief Richard] Welch's assassination was huge news and struck a painful political nerve in Washington, coming at the end of a year of stunning disclosures about the CIA and the rest of the U.S. intelligence community by the Senate's Church Committee ... throughout 1975. The Church Committee's unprecedented investigation marked the first effort by Congress to unearth decades of abusive and illegal acts secretly committed by the CIA. [The Church Committee] is responsible for bringing the CIA, the FBI, the National Security Agency, and the rest of the government's intelligence apparatus under the rule of law. The White House and CIA quickly realized that the Welch killing, which occurred just as the Church Committee was finishing its investigations and preparing its final report ... could be used as a political weapon. President Gerald Ford's White House and the agency falsely sought to blame the Church Committee for Welch's murder, claiming, without any evidence, that its investigations had somehow exposed Welch's identity and left him vulnerable to assassination. There was absolutely no truth to the claims. Welch had been murdered by Greek terrorists. The false narrative that Welch had been murdered because of reckless disclosures in Washington remained powerful for years afterward, ultimately leading to legislation that made it illegal to publish the names of covert CIA officers, a law that has since often been abused by the government to crack down on whistleblowers and dissent.
Note: Read more on how US intelligence agencies are intentionally designed to not have oversight over the blatant human rights violations they take a part of. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
A MintPress News investigation has found dozens of ex-U.S. State Department officials working in key positions at TikTok. Many more individuals with backgrounds in the FBI, CIA and other departments of the national security state also hold influential posts at the social media giant, affecting the content that over one billion users see. The influx of State Department officials into TikTok's upper ranks is a consequence of "Project Texas," an initiative the company began in 2020 in the hopes of avoiding being banned altogether in the United States. During his time in office, Secretary of State Mike Pompeo led the charge to shut the platform down, frequently labeling it a "spying app" and a "propaganda tool for the Chinese Communist Party." It was widely reported that the U.S. government had forced the sale of TikTok to Walmart and then Microsoft. But in late 2020, as Project Texas began, those deals mysteriously fell through, and the rhetoric about the dangers of TikTok from officials evaporated. Project Texas is a $1.5 billion security operation to move the company's data to Austin. In doing so, it announced that it was partnering with tech giant Oracle, a corporation that, as MintPress has reported on, is the CIA in all but name. Evidently, Project Texas also secretly included hiring all manner of U.S. national security state personnel to oversee the company's operations – and not just from the State Department. Virtually every branch of the national security state is present at TikTok.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in intelligence agencies and in the corporate world from reliable major media sources.
In March 2003, the newly christened Department of Homeland Security, or DHS, opened its doors. The department took everything from immigration enforcement and counterterrorism to airport security and disaster response under one gargantuan bureaucracy. Despite these wide-ranging missions, the department's unifying logic in the post 9/11 era has been to wage the so-called war on terror at home. The result has been systemic abuse of minority communities, a dangerous militarization of American life, and a massive waste of money that sapped resources from addressing the real threats to our homeland. DHS agencies have militarized U.S. streets, sending officers in tactical gear to respond to civilian protests and conducting surveillance of U.S. citizens engaged in constitutionally protected activities. There are stories of DHS drones surveilling Indigenous water and land protectors and DHS forces spying on Black Lives Matter protesters. DHS even monitored journalists who reported on the department's tactics. None of these abuses have come cheap. Since its founding in 2003, the U.S. has spent $1.4 trillion on the agency. That's more than seven times what the government spent over the same period on the Centers for Disease Control and Prevention (CDC), including the CDC's COVID-19 pandemic response–and more than five times more than on the Environmental Protection Agency. The [DHS] was supposed to be about making the U.S. safer. But it has failed.
Note: A thorough investigation reveals details on the DHS "Disinformation Governance Board," an unsuccessful effort in 2022 to police online speech it considers inaccurate and dangerous. Now, the DHS board and its key subcommittees are undergoing sweeping changes as public concern grows over social media censorship and government overreach.
It has now been one week since Seymour Hersh published an in-depth report claiming that the Biden administration deliberately blew up the Nord Stream II gas pipeline without Germany's consent or even knowledge – an operation that began planning long before the Russian invasion of Ukraine. Hersh – the journalist who broke the stories of the My Lai Massacre, the CIA spying program and the Abu Ghraib torture scandal – claims that in June, U.S. Navy divers traveled to the Baltic Sea and attached C4 explosive charges to the pipeline. President Biden himself ordered its destruction. All understood ... that, if caught, it would be seen as a flagrant "act of war" against their allies. Despite this, corporate media have overwhelmingly ignored the Pulitzer Prize-winning reporter's bombshell. A MintPress News study analyzed the 20 most influential publications in the United States, according to analytics company Similar Web, and found only four mentions of the report between them. This lack of interest cannot be explained due to the report's irrelevance. If the Biden administration really did work closely with the Norwegian government to blow up Nord Stream II, causing billions of dollars worth of immediate damage and plunging an entire region of the world into a freezing winter without sufficient energy, it ranks as one of the worst terrorist attacks in history. The Nord Stream attack was also one of the world's worst ecological disasters, constituting the largest single leak of methane in history.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
Within ten days [of its release], the first-person military shooter video game [Call of Duty: Modern Warfare II] earned more than $1 billion in revenue. The Call of Duty franchise is an entertainment juggernaut, having sold close to half a billion games since it was launched in 2003. Its publisher, Activision Blizzard, is a giant in the industry. Details gleaned from documents obtained under the Freedom of Information Act reveal that Call of Duty is not a neutral first-person shooter, but a carefully constructed piece of military propaganda, designed to advance the interests of the U.S. national security state. Not only does Activision Blizzard work with the U.S. military to shape its products, but its leadership board is also full of former high state officials. Chief amongst these is Frances Townsend, Activision Blizzard's senior counsel. As the White House's most senior advisor on terrorism and homeland security, Townsend ... became one of the faces of the administration's War on Terror. Activision Blizzard's chief administration officer, Brian Bulatao ... was chief operating officer for the CIA, placing him third in command of the agency. Bulatao went straight from the State Department into the highest echelons of Activision Blizzard, despite no experience in the entertainment industry. [This] raises serious questions around privacy and state control over media. "Call of Duty ... has been flagged up for recreating real events as game missions and manipulating them for geopolitical purposes," [journalist Tom] Secker told MintPress.
Note: The latest US Air Force recruitment tool is a video game that allows players to receive in-game medals and achievements for drone bombing Iraqis and Afghans. For more on this disturbing "military-entertainment complex" trend, explore the work of investigative journalist Tom Secker, who recently produced a documentary, Theaters of War: How the Pentagon and CIA Took Hollywood, and published a new book, Superheroes, Movies and the State: How the U.S. Government Shapes Cinematic Universes.
A resurfaced documentary is exposing a series of horrific accusations made by alleged victims of a 1988 child sex trafficking ring in 1988, who claim they were flown around the US to abused by high-ranking officials - alleging that FBI 'covered up' the shocking crimes. Back in the 1980s, several alleged victims claimed that a man named Lawrence King ran an underground club in Omaha, Nebraska, through which he, along with well-known politicians, businessmen, and media moguls, are said to have forced children as young as eight years old to have sex with them. In 1990, a Nebraska county grand jury concluded that the claims were a 'hoax,' and a federal grand jury later agreed. However, in 1993 ... alleged victims told documentary makers that the government forced them into silence by threatening those who spoke out, using scare tactics, and even murder. 'Obviously, the FBI was protecting something ... significant,' [lawyer John] DeCamp concluded. 'They were protecting some very prominent politicians, some very powerful and wealthy individuals associated with those politicians and the political system, up to and including the highest political people in this entire country. 'Every victim-witness who stepped forward in any way, or even was a potential witness that somebody heard about, has either been killed, put in jail under some theory or other, terrified or run out of the state, or discredited.'
Note: For an in-depth look at this disturbing crime ring, read The Franklin Cover-Up by John W. DeCamp or watch the suppressed Discovery Channel documentary Conspiracy of Silence. For more, see concise summaries of deeply revealing news articles on sexual abuse scandals from reliable major media sources.
The Justice Department’s Inspector General, Michael Horowitz, will soon release a much-anticipated assessment of Democratic and Republican charges that officials at the FBI interfered in the 2016 presidential campaign. That year-long probe ... is expected to come down particularly hard on former FBI director James Comey. An earlier [report] in April by Horowitz ... showed that the ousted deputy director of the FBI, Andrew McCabe, had lied to the bureau’s internal investigations branch to cover up a leak he orchestrated about Clinton’s family foundation less than two weeks before the election. Another IG report in March found that FBI retaliation against internal whistle-blowers was continuing despite years of bureau pledges to fix the problem. There have been other painful, more public failures as well: missed opportunities to prevent mass shootings that go beyond the much-publicized overlooked warnings in the Parkland, Fla., school killings; an anguishing delay in the sexual-molestation probe into Olympic gymnastics doctor Larry Nassar; and evidence of misconduct by agents in the aftermath of standoffs with armed militias in Nevada and Oregon. FBI agents are facing criminal charges ranging from obstruction to leaking classified material. And then there’s ... the FBI’s miss of the Russian influence operation against the 2016 election. Jeffrey Danik, a retired FBI agent ... blames the state of affairs on “a severe lack of leadership” and transparency at headquarters.
Note: A New York Times article titled "Terrorist Plots, Hatched by the FBI" sheds further light on questionable practices within The Bureau. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
In the 1970s, a handsome ex-Israeli army paratrooper popularized extrasensory perception, or ESP. Uri Geller claimed he could ... see inside sealed containers, and even read other people's minds. Geller ... caught the eye of the intelligence community. "Scientists would consider, 'Wait a minute, maybe we can read the minds of other government officials, [or] see inside a nuclear facility in Russia,'" said national security reporter Annie Jacobsen. Jacobsen has written about the U.S. government's ... attempts to use Uri Geller, and others like him, for psychic espionage. "It's sort of like a highly-classified black program inside of a black program," Jacobsen said. "One, because you don't want the Russians or the Chinese to know what we are doing; and two, because a lot of scientists didn't want their colleagues to know what they were doing." In the 1980s, the Defense Intelligence Agency began "Project Star Gate," which was, according to Dean Radin, a scientist who worked on the program, top secret. The program employed about a dozen psychics and mediums. Its aim: espionage. Angela Ford was with Project Star Gate for nine years. She calls herself a medium; the Defense Department preferred "remote viewer." Her assignment? To look for missing hostages and fugitives without ever leaving a building at Fort Meade in Maryland. She recalled one assignment, in 1989, when she says she was able to psychically track down a former customs agent who had allegedly gone rogue.
Note: Explore lots more solid information on remote viewing – the government's psychic spying program. Could it be that key elements in government don't want us to know of the unlimited powers contained within each of us? See undeniable evidence that remote viewing was quite successful.
An NSA staffer deployed to Iraq led a counterterrorism and counterintelligence mission involving forensic investigations on computers seized in raids. The staffer's "Media Exploitation" team found pornographic videos and photos alongside thousands of audio files of the Quran and sermons, and recruitment and training CDs with video of bombings, torture, and beheadings. The team "jokingly" referred to the content as the "three big â€P's – porn, propaganda and prayer." Reports and files were distributed to the NSA and other intelligence agencies. Among the customers of the material ... were the military units interrogating captured insurgents. Special Forces interrogators found the pornography "extremely useful in breaking down detainees who maintained that they were devout Muslims, but had porn on their computers," according to an account by the NSA staffer. As the conflict with insurgents escalated in Fallujah ... NSA staff with "top-secret" clearances were deployed to the combat zone. Marines gave the NSA staff seized computers, CDs, phones, and radios directly from the battlefield, some "covered in blood." This material, too, was used in interrogations. A former interrogator at the U.S. detention center at Guantánamo Bay, Cuba, has said ... that pornography was used at the facility to reward some detainees and as a tool against others, who were forced to look at the material. The Associated Press has also reported on the use of pornography at Guantánamo.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The Obama administration was demanding that I reveal the confidential sources I had relied on for a chapter about a botched CIA operation in my 2006 book, State of War. I had also written about the CIA operation for the New York Times, but the papers editors had suppressed the story at the governments request. It wasnt the only time they had done so. My case was part of a broader crackdown on reporters and whistleblowers that had begun during the presidency of George W. Bush and continued far more aggressively under the Obama administration, which had already prosecuted more leak cases than all previous administrations combined. I started covering the CIA in 1995. Success as a reporter on the CIA beat inevitably meant finding out government secrets, and that meant plunging headlong into the classified side of Washington, which had its own strange dynamics. I discovered that there was, in effect, a marketplace of secrets in Washington, in which White House officials and other current and former bureaucrats, contractors, members of Congress, their staffers, and journalists all traded information. This informal black market helped keep the national security apparatus running smoothly, limiting nasty surprises for all involved. The revelation that this secretive subculture existed, and that it allowed a reporter to glimpse the governments dark side, was jarring. It felt a bit like being in the Matrix.
Note: Article author James Risen is a courageous hero who shared two Pulitzer Prizes for his reporting around 9/11 and massive government surveillance. If you read the entire article at the link above, you will learn in detail how the New York Times and other media bow to government pressure and filter what information reaches the public. They also have a strong, but secretive agenda to support war and the military-industrial complex. You will also see how government keeps the media from reporting some of the most important stories.
Forty years after revelations that the U.S. Central Intelligence Agency funded brainwashing experiments on unsuspecting Canadians, the Trudeau government is continuing a pattern of silencing the victims. A recent Department of Justice gag order in an out-of-court settlement was designed to avoid responsibility and avert compensation to more victims and their families, said Alan Stein, [a lawyer] who has represented numerous survivors who were once patients at the Allan Memorial Institute in Montreal. Successive federal governments have demanded confidentiality agreements in at least five of the cases he has settled. The Trudeau government's quiet non-disclosure payment in March 2017 to the daughter of a now-deceased victim is just the latest development in a decades-old scandal that saw both the CIA and the Canadian government fund brutal science experiments on unsuspecting patients. Revelations of mental torture on hundreds of Canadian patients first surfaced in the late 1970s. At the centre of the controversy was Dr. Ewen Cameron, a respected psychiatrist and first director of the Allan Memorial Institute, the psychiatric facility at McGill University where the brainwashing experiments took place from 1950 to 1965. Cameron ... ran experiments called "psychic driving" and "depatterning" that attempted to erase a patient's memories and reprogram them with new thoughts. To this day, neither the CIA nor the Canadian government has apologized for its role in the experiments.
Note: Read more on the court cases stemming from Dr Ewen Cameron's CIA-funded experiments in this Times of London article. Read also an excellent summary on the involvement of doctors in the CIA's brainwashing experiments. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
The blaring, grinding noise jolted the American diplomat from his bed. He moved just a few feet, and there was silence. He climbed back into bed. The agonizing sound hit him again. It was as if he’d walked through some invisible wall cutting straight through his room. Soon came the hearing loss, and the speech problems, symptoms both similar and altogether different from others among at least 21 US victims in an astonishing international mystery still unfolding in Cuba. New details learned by the Associated Press indicate at least some of the incidents were confined to specific rooms or even parts of rooms with laser-like specificity, baffling US officials who say the facts and the physics don’t add up. Suspicion initially focused on a sonic weapon. Yet the diagnosis of mild brain injury, considered unlikely to result from sound, has confounded the FBI, the state department and US intelligence agencies involved in the investigation. Some victims now have problems concentrating or recalling specific words, several officials said, the latest signs of more serious damage than the US government initially realized. The United States first acknowledged the attacks in August – nine months after symptoms were first reported. The cases vary deeply: different symptoms, different recollections of what happened. In several episodes recounted by US officials, victims knew it was happening in real time, and there were strong indications of a sonic attack.
Note: Sound weapons developed for war and increasingly used against civilian populations are well-documented. For more along these lines, see concise summaries of deeply revealing non-lethal weapons news articles from reliable major media sources.
Once expunged from official State Department history, the U.S.-backed 1953 coup in Iran and what led up to it can be glimpsed in documents that the department has quietly published. The operation ultimately pushed the country toward its Islamic Revolution and hostility with the West. The CIA's role in the coup, which toppled Prime Minister Mohammed Mosaddegh and cemented the control of the shah, was well known when the State Department offered its first compendium on the era in 1989. But any trace of American involvement in the putsch had been wiped from the report, causing historians to call it a fraud. The 1,007-page report [released this month] shows U.S. officials discussing a coup up to a year before it took place. The CIA at one point "stockpiled enough arms and demolition material to support a 10,000-man guerrilla organization for six months" and paid out $5.3 million for bribes and other costs, which would be equivalent to $48 million today. One CIA document [states] that "several leading members of these (Iranian) security services are paid agents of this organization." The CIA also described hoping to use "powerfully influential clergy" in Shiite Iran to back the coup. To this day, Iran's clerical leaders portray the U.S. as a hostile foreign power bent on subverting and overthrowing its government. As President Dwight Eisenhower wrote ... in 1953, if knowledge of the coup became public, "We would not only be embarrassed in that region, but our chances to do anything of like nature in the future would almost totally disappear."
Note: The complete collection of State Department documents on this CIA-backed coup is available here. More recently, US policy reportedly fuelled the rise of Isis in Syria and Iraq. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Muhammad Yunus, the Bangladeshi economist, microfinancing pioneer and founder of the grassroots Grameen Bank, has not been resting on his laurels since wining the Nobel peace prize in 2006. The idea behind his multi award-winning idea of microcredit is that everyone is a natural entrepreneur. “Human beings are not born to work for anybody else,” he says. “For millions of years that we were on the planet, we never worked for anybody. We are go-getters. So this is our tradition. There are roughly 160 million people all over the world in microcredit, mostly women. And they have proven one very important thing: that we are all entrepreneurs. Illiterate rural women in the villages ... take tiny little loans - $30, $40 - and they turn themselves into successful entrepreneurs.” In the mid 70s, as a young economics professor, Yunus experimented with lending a mere $27 to 42 women in the village ... near his university. Banks would not lend to the poor ... and moneylenders charged extortionate rates. His experiment was a success, and he began to develop ... the Grameen Bank. The Grameen Bank today has nine million borrowers, 97% of them women. “They own the bank. It is a bank owned by poor women,” he says. “The repayment rate is 99.6%, and it has never fallen below that in our eight years of experience.” Part of his expansion into rich countries includes a program in the US: 19 branches in 11 cities, including eight in New York.
Note: Learn more about the inspiring microcredit movement helping to reduce inequality while securing financial returns for investors.
WikiLeaks has alleged that the CIA looked into vehicle interference methods that could potentially enable it to assassinate people without detection. According to the whistle-blowing organisation, the CIA explored the tactic in October 2014. It hasn’t included any more details about the alleged practice. WikiLeaks included the claim in its release announcing ‘Vault 7’, a huge batch of documents, which Julian Assange claims to account for the CIA’s “entire hacking capacity”. “As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks,” reads a passage in the release. “The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.” The CIA has also been accused of using malware and hacking tools to turn TVs into covert microphones and remotely break into smartphones. The latter, according to WikiLeaks, allowed it to bypass encryption on a number of popular messaging apps, including WhatsApp. WikiLeaks describes Vault 7 as “the largest intelligence publication in history” and says that the initial batch of 8,761 files is just the first in a series of releases.
Note: See the wikileaks webpage summarizing this most important leak. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The dozens of American diplomats taken hostage by revolutionary students who seized the U.S. Embassy in Iran in 1979 might have had some secret company during their 15-month captivity: U.S. intelligence agencies had a squad of military-trained psychics using ESP to watch them, according to declassified documents in a newly available CIA database. In an operation code-named Grill Flame, half a dozen psychics ... on more than 200 occasions tried to peer through the ether to see where the hostages were being held, how closely they were guarded and the state of their health. Whether the psychics provided any useful intelligence was the subject of a debate among intelligence officials as heated as it was secret. The debate continues today. “The stuff that the CIA has declassified is garbage,” one of the Grill Flame psychics, Joseph McMoneagle, told the Miami Herald. “They haven’t declassified any of the stuff that worked.” Agreed Edwin May, a physicist who oversaw parapsychology research for government intelligence agencies for 20 years: “The psychics were able to tell, in some cases, where the hostages were moved to. They were able to see the degree of their health.” Operation Grill Flame was just one part of a broader U.S. intelligence project involving psychics and ESP that continued for 20 years. It went through as many as 10 different code names as its management shifted from agency to agency ... and carried out 26,000 telepathic forays by 227 psychics before the government shut it down in 1995.
Note: Read more on McMoneagle's work as a psychic for the US military. For more excellent, well resourced material on remote viewing and why the intelligence community continues to deny its successes, see this webpage.
“The United States does not torture,” said George W Bush on 6 September 2006. Bush was, for the first time, acknowledging the existence of the program that Senate intelligence committee staff investigator Daniel Jones would later expose as taking power drills to the heads of captured men; making them stand with their arms stretched above their heads for days at a time; leaving at least one of them naked until he froze to death; waterboarding them to the point of catatonia as bubbles rose from their open mouths; and inserting pureed food into their rectums while claiming it was necessary for delivering nutrients. Details of those procedures were outlined in the 525 pages which CIA director John Brennan, Barack Obama and White House chief of staff Denis McDonough allowed to become public. The CIA’s response to Jones’s report was split into two corps, one official and one not. The agency itself would no longer defend torture outright. The second corps consisted of retired CIA directors, a group known colloquially as the “Formers”. They laid into the Senate committee, [and] savaged it as a Democratic witchhunt. Jones has regrets about the way the declassified report turned out. Most prominently, Jones wishes he had gotten declassified the nearly 100-page table of contents for the full 6,700-page torture report, so readers could understand from the headings and subheadings just what the full contours of the torture was. In May 2016, the CIA inspector general’s office destroyed its only copy of the classified torture report.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Federal drug agents regularly mine Americans’ travel information to profile people who might be ferrying money for narcotics traffickers - though they almost never use what they learn to make arrests or build criminal cases. Instead, that targeting has helped the Drug Enforcement Administration seize a small fortune in cash. The DEA surveillance is separate from the vast and widely-known anti-terrorism apparatus. DEA units assigned to patrol 15 of the nation’s busiest airports seized more than $209 million in cash from at least 5,200 people over the past decade “They count on this as part of the budget,” said Louis Weiss, a former [DEA group] supervisor. “Basically, you’ve got to feed the monster.” Federal law gives the government broad powers to seize cash and other assets if agents have evidence that they are linked to crime. That process, commonly known as asset forfeiture, has come under fire ... after complaints that police were using the law as a way to raise money rather than to protect the public or prevent crime. Court records show agents and informants flagged travelers for questioning based on whether they were traveling with one-way tickets, had paid in cash, had listed a non-working phone number on the reservation or had checked luggage. Agents said Zane Young fit that profile when they ... seized $36,000 from his bags. Young’s lawyer, Thomas Baker, said in a court filing that the drug agency’s profile was “vague, ambiguous, overbroad, and can be manipulated to include just about anyone.”
Note: Read about how the DEA stole a young man's life savings without ever charging him with a crime. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
When you listen to any member of our government state that the newly released 29 pages are no smoking gun - they are lying. Read the 29 pages and ... remember that they were written during 2002 and 2003. President Bush wanted to go to war in Iraq - not Saudi Arabia. So, 29 full pages that said “Saudi” and “Bandar” instead of “Hussein” and “Iraq” was a huge problem. There was a concerted effort by the FBI and the Bush Administration to keep incriminating Saudi evidence out of the Inquiry’s investigation. The Joint Inquiry was still able to write 29 full pages regarding Saudi complicity in the 9/11 attacks. No other nation is given such singular prominence in the Joint Inquiry’s Final Report. Not Iraq. Not Iran. Not Syria. Not Sudan. Not even Afghanistan or Pakistan. The 29 pages have been kept secret and suppressed from the American public for fifteen years - not for matters of genuine national security - but for matters of convenience, embarrassment, and cover-up. Instead of calling for an emergency session of Congress to immediately name the Kingdom of Saudi Arabia as a State Sponsor of Terrorism, President Obama continues to downplay, belittle, and ignore the truth leaving us vulnerable to terrorist attacks that are still to this very day being funded by our “ally”. The Kingdom of Saudi Arabia provided operational and financial support to the 9/11 hijackers. That is a fact. And, the U.S. government has been covering up that fact for fifteen years - even to this very day.
Note: Read these pages that they didn't want you to see on this webpage and explore good commentary at this link. Check out also five key revelations of these documents. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
The F.B.I. has significantly increased its use of stings in terrorism cases, employing agents and informants to pose as jihadists, bomb makers, gun dealers or online “friends” in hundreds of investigations. Undercover operations, once seen as a last resort, are now used in about two of every three prosecutions involving people suspected of supporting the Islamic State, a sharp rise in the span of just two years. F.B.I. operatives coax suspects into saying and doing things that they might not otherwise do - the essence of entrapment. “They’re manufacturing terrorism cases,” said Michael German, a former undercover agent with the F.B.I.. Despite dozens of challenges to undercover terrorism cases brought since the Sept. 11, 2001, attacks, a judge has yet to throw one out on the grounds of entrapment. Not that some judges have not considered it. “I believe beyond a shadow of a doubt that there would have been no crime here, except the government instigated it, planned it and brought it to fruition,” Judge Colleen McMahon of the United States District Court ... said in 2011 in a case involving four Muslim men in Newburgh, N.Y. The F.B.I. planted an undercover informant inside a mosque in Newburgh as part of what became an elaborate, nearly yearlong plot. The F.B.I. even built a fake Stinger missile and had it delivered to the men. Judge McMahon said she was troubled by the F.B.I.’s conduct, but she upheld the charges.
Note: For more, see how an FBI mole posing as a potential lover recently convinced a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
Prime ministers, finance ministers, leading entrepreneurs and a former spy chief are among the attendees at this year’s influential Bilderberg conference ... which begins on Thursday in Dresden. The German military has been drafted in to oversee security. They’re working with corporate security from Airbus to make sure the politicians are kept safely away from the press for the entire three-day conference. Every year, a major corporation with links to the Bilderberg steering committee coordinates security for the event with the police. Which makes the whole conference even more obviously the corporate lobbying event that it is - with giant corporations handling everything from security to dry ice. And it makes the silence of the politicians who attend even more egregious. These high-level talks between policymakers and the heads of transnational oil companies ... take place in heavily guarded privacy, with no press oversight whatsoever. [This is] especially great if you’re on the board of BP. Like, for example, Sir John Sawers. As well as being a director of BP, the silken, Blairish former MI6 boss is a member of Bilderberg’s steering committee, and the chairman of Macro Advisory Partners, a global advisory group with heavy links to the transatlantic intelligence community, very much in the style of Kissinger Associates. And speak of the devil! The ageless 93-year-old former US secretary of state will be holding court at Dresden, croaking out his wisdom from the throne of bones he has shipped everywhere he goes.
Note: This entire article is a must read if you want to know how the power elite work together to manipulate global politics. For more along these lines, see concise summaries of deeply revealing news articles on the Bilderberg Group and other elite secret societies.
Bradley Birkenfeld is the most significant financial whistleblower of all time, so you might think he'd be cheering on the disclosures in the new Panama Papers leaks. [He] was a banker working at UBS in Switzerland when he approached the U.S. government with information on massive amounts of tax evasion by Americans with secret accounts in Switzerland. By the end of his whistleblowing career, Birkenfeld had served more than two years in a U.S. federal prison, been awarded $104 million by the IRS for his information and shattered the foundations of more than a century of Swiss banking secrecy. In an exclusive interview Tuesday from Munich, Birkenfeld said he doesn't think the source of the 11 million documents stolen from [Panama City-based law firm Mossack Fonseca] should automatically be considered a whistleblower like himself. Instead, he said, the hacking ... could have been done by a U.S. intelligence agency. "The CIA I'm sure is behind this, in my opinion," Birkenfeld said, [pointing] to the fact that the political uproar created by the disclosures have mainly impacted countries with tense relationships with the United States. "If you've got NSA and CIA spying on foreign governments they can certainly get into a law firm like this," Birkenfeld said. "They selectively bring the information to the public domain that doesn't hurt the U.S.. That's wrong. And there's something seriously sinister here behind this."
Note: See this article for more. Read concise summaries of deeply revealing news articles about corruption in banking and in the intelligence community.
Syrian militias armed by different parts of the U.S. war machine have begun to fight each other on the plains between the besieged city of Aleppo and the Turkish border. The fighting has intensified over the last two months, as CIA-armed units and Pentagon-armed ones have repeatedly shot at each other while maneuvering through contested territory on the northern outskirts of Aleppo. Last year, the Pentagon helped create a new military coalition, the Syrian Democratic Forces ... to take territory away from the Islamic State. The group is dominated by Kurdish outfits known as People's Protection Units or YPG. It has received air-drops of weapons and supplies and assistance from U.S. Special Forces. The U.S. backing for a heavily Kurdish armed force has been a point of tension with the Turkish government, which has a long history of crushing Kurdish rebellions. The CIA, meanwhile, has its own operations center inside Turkey from which it has been directing aid to rebel groups in Syria, providing them with TOW antitank missiles from Saudi Arabian weapons stockpiles. While the Pentagon's actions are part of an overt effort by the U.S. and its allies against Islamic State, the CIA's backing of militias is part of a separate covert U.S. effort aimed at keeping pressure on the Assad government. Over the last several months ... Kurdish-led groups [expanded] their zone of control to the outskirts of Aleppo, bringing them into more frequent conflict with the CIA-backed outfits.
Note: Explore powerful evidence that ISIS is aided and was possibly even created by covert US support. Watch this video which shows how the US and its allies stoke war in order to pad the pockets of mega-corporations which profit greatly from arms sales. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
The Associated Press sued the U.S. Department of Justice Thursday over the FBI's failure to provide public records related to the creation of a fake news story used to plant surveillance software on a suspect's computer. At issue is a 2014 Freedom of Information request seeking documents related to the FBI's decision to send a web link to the fake article to a 15-year-old boy suspected of making bomb threats to a high school. The FBI has used spyware before to pursue suspected criminals. AP strongly objected to the ruse, which was uncovered last year. AP General Counsel Karen Kaiser [wrote] in a 2014 letter to then-Attorney General Eric Holder, "It is improper and inconsistent with a free press for government personnel to masquerade as The Associated Press or any other news organization. The FBI may have intended this false story as a trap for only one person. However, the individual could easily have reposted this story to social networks, distributing to thousands of people, under our name, what was essentially a piece of government disinformation." In a November opinion piece in the New York Times, FBI Director James Comey revealed that an undercover FBI agent had also impersonated an AP reporter. AP's records request also seeks an accounting of how many times since 2000 the FBI has impersonated media organizations to deliver malicious software. In a response to AP, the FBI indicated it might take nearly two years to find and copy the requested records.
Note: According to The Guardian, the FBI forced an informant to hack into and compromise the computer systems of a major UK newspaper in 2011. For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of mass media.
Mark Rossini, a former FBI special agent at the center of an enduring mystery related to [9/11] says he is "appalled" by the newly declassified statements by former CIA Director George Tenet defending the spy agency's efforts to detect and stop the plot. Rossini, who was assigned to the CIA's Counterterrorism Center (CTC) at the time of the attacks, has long maintained that the U.S. government has covered up secret relations between the spy agency and Saudi individuals who may have abetted the plot. Fifteen of the 19 hijackers who flew commercial airliners (on 9/11) were Saudis. A heavily redacted 2005 CIA inspector general's report, parts of which had previously been released, was further declassified earlier this month. The Obama administration has [still] refused to declassify 28 pages dealing with Saudi connections. Rossini and another FBI agent assigned to the CTC, Doug Miller, learned in January 2000 that one of the future hijackers ... had a multi-entry visa to enter the U.S. But when Miller and Rossini attempted to warn FBI headquarters that al-Mihdhar could be loose in the U.S., a CIA supervisor ordered them to remain silent. Rossini says he is "deeply concerned" by how the agency continues to suppress information related to contacts between the CIA and Saudi Arabia, particularly when the spy agency is declassifying other portions of documents to show that it did everything possible to thwart the September 11, 2001 plot. "There would have not been a 9/11 if Doug's CIR [Central Intelligence Report] on al-Mihdhar was sent," he told Newsweek in an email. "Period. End of story."
Note: Read a Times of London article showing that some of the hijackers listed in the final 9/11 report are still alive. Several major media articles also reported that some of the 9/11 hijackers may have trained at US military bases. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore other excellent, reliable resources provided in our 9/11 Information Center.
The New York Times reported on Sunday that many of those in charge of the CIA’s torture program – the same people whose names were explicitly redacted from the Senate’s torture report in order to avert accountability – “have ascended to the agency’s powerful senior ranks” and now run the CIA drone program. Rather than being fired and prosecuted, they have been rewarded with promotions. The longtime Counterterrorism Center chief who just stepped down, Michael D’Andrea, was previously in charge of the notorious CIA prison known as the Salt Pit, where prisoners were regularly tortured and some died. His replacement, Chris Wood, was also “central to the interrogation program”, according to the Times. The only reason we know D’Andrea and Wood’s names is because the New York Times’ executive editor Dean Baquet commendably decided to publish them. The CIA asked them not to. Adding to the disturbing nature of the CIA’s ability to kill people in complete secrecy, the agency apparently now has a carte blanche to conduct drone strikes on its own. President Obama doesn’t individually approve them anymore – he lets the CIA unilaterally decide to kill people. The Obama administration has promised more transparency around drone strikes, yet at the same time, won’t even acknowledge that the controversial drone strike it’s apologizing for even happened - just because such admission might force courts to hold the government accountable for its actions.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
An undercover police unit that monitored political groups over 40 years gathered intelligence on members of at least five trade unions, a whistleblower has revealed. Peter Francis, who spent four years undercover infiltrating political activists, has named five trade unions whose members he spied on: Unison, the Fire Brigades Union, Communication Workers Union, National Union of Teachers, and the National Union of Students. Francis, who has become a whistleblower in recent years ... was part of the covert Metropolitan police unit, the Special Demonstration Squad (SDS), that monitored hundreds of political groups between 1968 and 2008. Francis gave a statement to a packed meeting in Parliament that marked the launch of a new book about the blacklisting of thousands of workers by multi-national construction firms. This month, the Daily Mirror revealed that one of the undercover officers in the SDS, Mark Jenner, posed as a joiner and was a member of the construction workers union, UCATT, for three years. Jenner’s involvement in trade unions is detailed here by the Undercover Research Group, a resource on covert infiltration of political groups. It describes how he attended meetings of UCATT and other unions, regularly went on pickets and ferried trade unionists to demonstrations. In his statement ... Francis said, ”Let me state very clearly that Mark Jenner was 100% one of my fellow undercover SDS police officers deployed alongside me in the 1990s.”
Note: While undercover, Mark Jenner had a four-year relationship with a woman who did not know his real identity. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Mark Rossini [was] a high-flying FBI official in Washington a decade ago, when he was a special assistant to the bureau's chief spokesman. A boneheaded move ... cost him his career in 2008. He's making a determined effort ... to close some of the gaping holes in the official 9/11 narrative. Rossini [has] been at the center of one of the enduring mysteries of 9/11: Why the CIA refused to share information with the FBI ... about the arrival of at least two well-known Al-Qaeda operatives in the United States in 2000, even though the spy agency had been tracking them closely for years. The CIA did block him and Doug Miller, a fellow FBI agent assigned to the ... CIA's Osama bin Laden unit, from notifying bureau headquarters about the terrorists. Rossini and Miller [had] learned earlier from the CIA that one of the terrorists (and future hijacker), Khalid al-Mihdhar, had multi-entry visas on a Saudi passport to enter the United States. When Miller drafted a report for FBI headquarters, a CIA manager in the top-secret unit told him to hold off. Incredulous, Miller and Rossini had to back down. Years later, Rossini still regrets complying with that command. If he had disobeyed the gag order, the nearly 3,000 Americans slaughtered on 9/11 would probably still be alive. The CIA has long insisted it shared intelligence about [this] with the FBI, but records gathered by the 9/11 Commission contradict this assertion. No one has come up with a plausible explanation. When the first 9/11 report came out ... all the people who were responsible for not sharing information [had] their names ... taken out. They were commended and moved up.
Note: A 2009 Nova documentary on PBS, “The Spy Factory,” explored and confirmed Rossini's allegations in depth. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. See also the excellent, reliable resources provided in our 9/11 Information Center.
In the largest opium harvest in Afghanistan's history; with a record 224,000 hectares under cultivation this year, the country produced an estimated 6,400 tons of opium, or around 90 percent of the world's supply. In Afghanistan today, according to U.N. estimates, the opium industry accounts for 15 percent of the economy. The Afghan narcotics trade has gotten undeniably worse since the U.S.-led invasion: The country produces twice as much opium as it did in 2000. In the provincial capital of Lashkar Gah, I arrange an interview with a drug smuggler. I'll call him Sami. He grew up in a camp near the border town of Chagai, in Pakistan. After finishing 11th grade, he got work as a driver and began ... smuggling opium through the desert. Baramcha, a smuggling hub on the Afghan side of the border ... functions as a kind of switching station for much of the opium trade. "The security situation is good ... the drug smugglers and the ISI are tight together," he says, referring to Pakistan's intelligence service. The United States' alliances with opium traffickers in Afghanistan go back to the 1980s, when the CIA waged a dirty war to undermine the Soviet occupation of the country. Large-scale cultivation was introduced [with] support from the ISI and the CIA. U.S. counternarcotics programs, which have cost nearly $8 billion to date, and the Afghan state-building project in general, are perversely part of ... the drug trade.
Note: Read the complete article above for an in depth look at the Afghan narcotics trade. For more, read this 2002 news article, which shows that the Taliban had nearly eliminated opium production in Afghanistan prior to the US led invasion. Yet once the allies defeated the Taliban, opium production hit new records. Today, Afghanistan produces 90% of the global opium supply. This huge source of income is used to fund all kinds of secret projects. Read powerful evidence that the CIA and US military are directly involved in the drug trade.
America’s Nazi transplants: scientists, academics and thinkers who were employed by the U.S. government, despite résumés full of horrid atrocities. Washington worked to protect them from the consequences of their horrible pasts. This information, revealed in detail for the first time in [Eric] Lichtblau’s book, “The Nazis Next Door: How America Became a Safe Haven for Hitler’s Men,” traces the legal battles and moral struggles surrounding the ... Operation Paperclip program, which brought former Nazi scientists to America to bolster the nation’s scientific community. Among the Third Reich transplants was the late Wernher von Braun, considered a legendary NASA space scientist who ... oversaw Hitler’s Mittelwerk slave labor factory. Another was the late Dr. Hubertus Strughold, who is still considered the “father of space medicine." Strughold ... helped orchestrate science experiments on human guinea pigs at the Dachau concentration camp. Even while the White House and its intelligence agencies were quietly employing some of the Nazis’ best minds in the nation’s scientific circles, mostly in a Huntsville, Alabama, military community, the Justice Department was secretly building cases against them. A deal was struck that allowed [Arthur] Rudolph to renounce his American citizenship and go quietly back to Germany in 1984. He was never charged with a war crime. No other Paperclip scientists were prosecuted for their past atrocities or complicity in Nazi war crimes.
Note: What this article fails to mention is the Nazi doctors secretly used to teach the CIA mind control methods it perfected. Read an amazing, eye-opening summary on this. Then see the astounding declassified CIA documents on this program.
At the height of the Cold War in the 1950s, law enforcement and intelligence leaders like J. Edgar Hoover at the F.B.I. and Allen Dulles at the C.I.A. aggressively recruited onetime Nazis of all ranks. They believed the ex-Nazis’ intelligence value against the Russians outweighed what one official called “moral lapses” in their service to the Third Reich. The agency hired one former SS officer as a spy in the 1950s, for instance, even after concluding he was probably guilty of “minor war crimes.” In 1994, a lawyer with the C.I.A. pressured prosecutors to drop an investigation into an ex-spy outside Boston implicated in the Nazis’ massacre of tens of thousands of Jews in Lithuania. In 1980, F.B.I. officials refused to tell even the Justice Department’s own Nazi hunters what they knew about 16 suspected Nazis living in the United States. The bureau balked at a request from prosecutors for internal records on the Nazi suspects, memos show, because the 16 men had all worked as F.B.I. informants, providing leads on Communist “sympathizers.” Five of the men were still active informants. In all, the American military, the C.I.A., the F.B.I. and other agencies used at least 1,000 ex-Nazis and collaborators as spies and informants after the war, according to Richard Breitman, a Holocaust scholar at American University. The full tally ... is probably much higher. But many records remain classified even today, making a complete count impossible.
Note: What this article fails to mention is the Nazi doctors secretly used to teach the CIA mind control methods it perfected. Read an amazing, eye-opening summary on this. Then see the astounding declassified CIA documents on this program.
My biggest battle with the NSA came before my book [The Puzzle Palace] was even published. I had obtained the criminal file that the Justice Department had opened on the NSA. Marked as Top Secret, the file was so sensitive that only two original copies existed. Never before or since has an entire agency been the subject of a criminal investigation. Senior officials at the NSA were even read their Miranda rights. Issued on June 6, 1975, the report noted that both the NSA and CIA had engaged in questionable and possibly illegal electronic surveillance. As a result, Attorney General Edward Levi established a secret internal task force to look into the potential for criminal prosecution. Focusing particularly on NSA, the task force probed more deeply into domestic eavesdropping than any part of the executive branch had ever done before. The report’s prosecutive summary also pointed to the NSA’s top-secret “charter” issued by the Executive Branch, which exempts the agency from legal restraints placed on the rest of the government. This ... meant the NSA did not have to follow any restrictions placed on electronic surveillance “unless it was expressly directed to do so.” In short, the report asked, how can you prosecute an agency that is above the law? More than three decades later, the NSA, like a mom-and-pop operation that has exploded into a global industry, now employs sweeping powers of surveillance that Frank Church could scarcely have imagined in the days of wired phones and clunky typewriters. At the same time, the Senate intelligence committee he once chaired has done an about face, protecting the agencies from the public rather than the public from the agencies. Without adequate oversight, or penalties for abuse, the only protection that citizens have comes not from Congress or the courts, but from whistleblowers.
Note: James Bamford is the courageous ABC producer and investigative reporter who first exposed the declassified Operation Northwoods files in the May of 2001. These files showed beyond a shadow of a doubt that the top Pentagon generals were willing to carry out false flag terrorism activities which would kill innocent civilians in order to foment war fever against Cuba. Yet only ABC News out of all the major media outlets was willing to report this most shocking news. Don't miss the entire, highly revealing article by Bamford at the link above.
A major FBI cover-up ... connects Sarasota and the 9/11 hijackers to the Saudi Arabian government. While still at Sarasota's Emma E. Booker Elementary on the day of the 2001 terrorist attacks, President George W. Bush said, "Terrorism against our nation will not stand." However, the president's visit wasn't the only thing to tie this Bay area county to the September 11th attacks. Within days, we learned three of the hijackers had been living in the area while taking flying lessons at Huffman Aviation and Florida Flight Training in Sarasota County... but there is even more than that. "There was a network supporting the hijackers," says former U.S. Senator and Florida governor Bob Graham. According to Graham, the FBI has been covering up that fact for years, and continues to try and hide it even now. Graham says he is convinced there was a direct line between some of the terrorists who carried out the September 11th attacks and the government of Saudi Arabia. According to Graham, the FBI was aware of the strong connection between hijackers and a Saudi Arabian family who were living in an upscale Sarasota gated community. Twelve days before 9/11, the family abandoned the house -- leaving behind valuable items including food, clothing, furnishings and three vehicles. "There are some things I can't talk about," Graham told us, "And there are others like what I know is involved in the investigation in Sarasota, which is diametrically opposed to what the FBI said publicly."
Note: For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.
The spread of an aggressive brand of policing ... has spurred the seizure of hundreds of millions of dollars in cash from motorists and others not charged with crimes. Thousands of people have been forced to fight legal battles that can last more than a year to get their money back. Behind the rise in seizures is a little-known cottage industry of private police-training firms that teach the techniques of “highway interdiction” to departments across the country. [It has] enabled police nationwide to share detailed reports about American motorists — criminals and the innocent alike — including their Social Security numbers, addresses and identifying tattoos, as well as hunches about which drivers to stop. A thriving subculture of road officers on the network now competes to see who can seize the most cash and contraband, describing their exploits in the network’s chat rooms and sharing “trophy shots” of money and drugs. Some police advocate highway interdiction as a way of raising revenue for cash-strapped municipalities. Unexplored until now is the role of the federal government and the private police trainers in encouraging officers to target cash on the nation’s highways. There have been 61,998 cash seizures made on highways and elsewhere since 9/11 without search warrants ... totaling more than $2.5 billion. State and local authorities kept more than $1.7 billion of that while Justice, Homeland Security and other federal agencies received $800 million. 298 departments and 210 task forces have seized the equivalent of 20 percent or more of their annual budgets since 2008. In 400 federal court cases examined by The Post where people who challenged seizures and received some money back, the majority were black, Hispanic or another minority.
Note: Watch an excellent spoof on this unbelievable police practice. For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
A former federal cyber security chief was convicted [on August 26] on several charges related to accessing and distributing child pornography. Timothy DeFoggi, 56, was acting director of cyber security at the U.S. Department of Health and Human Services when he was detained in May 2013 as part of an investigation targeting three child pornography websites. The former Germantown, Md. resident registered as a member of one of the sites on March 2, 2012, according to a U.S. Department of Justice press release. He used the site to access and solicit child pornography, "and exchanged private messages with other members where he expressed an interest in the violent rape and murder of children," according to the DOJ. DeFoggi also suggested to one member of a message board that they meet in person to fulfill fantasies of violently raping and murdering children. He is the sixth person convicted in connection with the investigation. Sentencing is scheduled for Nov. 7.
Note: For powerful evidence from a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government, click here. For more on this, see concise summaries of deeply revealing sexual abuse scandals news articles from reliable major media sources.
The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call. The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users. A newly released top-secret GCHQ document called “JTRIG Tools and Techniques” provides a comprehensive, birds-eye view of just how underhanded and invasive this unit’s operations are. The document—available in full here—is designed to notify other GCHQ units of JTRIG’s “weaponised capability” when it comes to the dark internet arts, and serves as a sort of hacker’s buffet for wreaking online havoc.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. [90% of] account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided in full to The Post, were not the intended surveillance targets but were caught in a net the agency had cast for somebody else. Many of them were Americans. [Many] files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless. The cache Snowden provided came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act. FISA content is generally stored in closely controlled data repositories, and for more than a year. The files offer an unprecedented vantage point on the changes wrought by Section 702 of the FISA amendments, which enabled the NSA to make freer use of methods that for 30 years had required probable cause and a warrant from a judge.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Contradicting an earlier assertion made under oath by a senior FBI official, an attorney for the Justice Department said [on April 30] that the FBI has identified four more boxes of “classified” 9/11 documents held by its Tampa field office. The government, however, has yet to comply with a federal judge’s orders ... that it turn over copies of that massive 9/11 file — now said to total 27 boxes — for his personal inspection. U.S. District Judge William J. Zloch issued those orders in a Freedom of Information lawsuit brought by BrowardBulldog.org seeking records about the FBI’s investigation into apparent pre-9/11 terrorist activity in Sarasota. Former Florida Sen. Bob Graham, who co-chaired Congress’ Joint Inquiry into the 9/11 attacks, has said that the FBI did not disclose the existence of the Sarasota investigation to either the Joint Inquiry or the subsequent 9/11 Commission. The documents state that the Sarasota Saudis had “many connections” to “individuals associated with the terrorist attacks on 9/11/2001.” One document lists three individuals, with names blacked out, and ties them to the Venice, Fla., flight school where suicide hijackers Atta and Marwan al-Shehhi trained.
Note: For solid evidence that many more were involved in 9/11 than is generally admitted, see the revealing newspaper article at this link. For an excellent documentary focused on the Venice, Florida flight school which all but proves a major cover-up involving US citizens involved in the planning of 9/11, click here. And for a treasure trove of reliable information showing a major cover-up around 9/11, click here.
Senate Intelligence Committee Chair Dianne Feinstein accused the CIA on [March 11] of violating the law and the Constitution of the United States by interfering in a committee investigation into Bush-era torture of terror suspects. Feinstein said the CIA had removed documents provided to the committee through a special, segregated network set up by the agency for the committee to pursue its investigation. Among the documents removed was an internal review of CIA interrogation techniques conducted by then-CIA Director Leon Panetta, which committee members have said corroborated committee findings critical of the agency’s interrogation program. “The CIA just went and searched the committee’s computers,” Feinstein said on the Senate floor. “This was done without the knowledge or approval of committee members or staff, and in violation of our written agreements. Further, this type of behavior would not have been possible had the CIA allowed the committee to conduct the review of documents here in the Senate,” Feinstein said. Feinstein said that the CIA’s activities may have violated the Fourth Amendment, the Computer Fraud and Abuse Act, and executive order 12333, which bars the CIA from conducting domestic surveillance. Feinstein also said the CIA’s activities violated the separation of powers principles in the Constitution by interfering with congressional oversight of the executive branch.
Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal. GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not. In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally. Yahoo ... denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy". Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012. The system, eerily reminiscent of the telescreens evoked in George Orwell's Nineteen Eighty-Four, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs. Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds ... to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
In the years after the end of WWII, CIA and US intelligence operatives tested LSD and other interrogation techniques on captured Soviet spies—all with the help of former Nazi doctors. It was 1946. The Joint Chiefs of Staff were preparing for ‘total war’ with the Soviets. They even set an estimated start date of 1952. U.S. military officers had been capturing and then hiring Hitler’s weapons makers in a Top Secret program that would become known as Operation Paperclip. Soon, more than 1,600 of these men and their families would be living the American dream, right here in the United States. In 1948, Operation Paperclip’s Brigadier General Charles E. Loucks ... was working with Hitler’s former chemists when one of the scientists [shared] information about a drug with military potential ... LSD. Documents obtained through the Freedom of Information Act (FOIA) reveal that the U.S. developed its post-war enhanced interrogation techniques ... under the CIA code name Operation Bluebird. The CIA teamed up with the Army Chemical Corps at Camp Detrick, in Maryland, to conduct further research and development on the chemistry of mind-altering drugs. One [Detrick agent was] Dr. Frank Olson, a former army officer and bacteriologist turned agency operative whose sudden demise—by covert LSD poisoning—in 1953 would nearly bring down the CIA. In one of the rare, surviving official documents from the program, Deputy Director of Central Intelligence Allen Dulles sent a secret memo to Richard Helms: “In our conversation of 9 February 1951, I outlined to you the possibilities of augmenting the usual interrogation methods by the use of drugs, hypnosis, shock, etc., and emphasized the defensive aspects as well as the offensive opportunities.”
Note: To read excerpts from incredibly revealing declassified CIA documents on these programs, click here. For more on secret government mind control programs which have had a powerful hidden influence on global politics, see our Mind Control Information Center available here.
James Clapper is very worried. It's not the first time. Last week the man who serves as America's Director of National Intelligence [told] assembled members of the Senate Select Intelligence Committee that the annual worldwide threat assessment ... has filled him with dread. Last year he appeared before Congress for a similar purpose. He was very, very concerned then too. [And the same] in 2012. Of course, one must consider the possibility that over the past five decades the world has never been as dangerous, complex and challenging as it's been over the past three years, [even though the] whole "threat of nuclear holocaust" ... defined much of the 60s, 70s and 80s. Clapper's alarmist tone is hardly matched by the threats he cites. Significantly more Americans die each year from falling furniture [than from terrorist acts]. To listen to Clapper and others in the intelligence community one might never know that inter-state war has largely disappeared and that wars in general are in the midst of a multi-decade decline. 2013 was a landmark year for non-proliferation with important progress made in slowing down Iran's nuclear aspirations and enforcing the norm on chemical weapons usage. There are real threats to the US, but Clapper should be able to talk about them in sober, evidence-based, non-hysterical terms. It's almost as if Clapper and the intelligence community that he helms are playing up foreign threats in order to justify bloated post-9/11 budgets. [Remember that] he allegedly lied to Congress over the extent to which the National Security Agency was collecting phone and e-mail records of individual Americans. [Sadly,] threat mongering and exaggeration is the norm rather than the exception.
Note: For a dramatic BBC documentary showing how many politicians literally promote fear for their own self benefit, watch Power of Nightmares at this link. For more on intense deception perpetrated by the intelligence community, see the deeply revealing reports from reliable major media sources available here.
The U.S. National Security Agency is involved in industrial espionage and will grab any intelligence it can get its hands on regardless of its value to national security, former NSA contractor Edward Snowden told a German TV network. ARD TV quoted Snowden saying the NSA does not limit its espionage to issues of national security and he cited German engineering firm, Siemens as one target. "If there's information at Siemens that's beneficial to U.S. national interests - even if it doesn't have anything to do with national security - then they'll take that information nevertheless," Snowden said. Snowden's claim the NSA is engaged in industrial espionage follows a New York Times report earlier this month that the NSA put software in almost 100,000 computers around the world, allowing it to carry out surveillance on those devices and could provide a digital highway for cyberattacks. The NSA planted most of the software after gaining access to computer networks, but has also used a secret technology that allows it entry even to computers not connected to the Internet, the newspaper said, citing U.S. officials, computer experts and documents leaked by Snowden. Frequent targets of the programme, code-named Quantum, included units of the Chinese military and industrial targets.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The White House's expert NSA panel may have made headlines ... for telling President Barack Obama to knock off the collection of Americans' meta-data, but surveillance experts said they were surprised that the panel also took to task some controversial non-NSA-related spy tactics as well. One recommendation was to impose much stricter oversight on the FBI's ability to issue National Security Letters (NSLs), which have been used to obtain telephone call records and credit reports in terrorism and espionage cases. Another even more peculiar recommendation by the five national security experts ... was their advice that "governments" shouldn't hack into bank accounts and drain funds. "Governments should not use their offensive cyber capabilities to change the amounts held in financial accounts or otherwise manipulate the financial systems," the unanimous Review Group on Intelligence and Communications Technologies report warned Obama. "That was a strangely specific recommendation for something nobody was talking about," Kel McClanahan, executive director of government transparency group National Security Counselors, told ABC News. Michelle Richardson, the American Civil Liberties Union's legislative council in Washington, also said the findings on "NSLs" and government hacking were unexpected -- but welcomed.
Note: The fact that this expert panel would even mention governments manipulating financial accounts suggests that if it hasn't already happened, some were seriously considering this. For lots more on this strange news, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
British and American intelligence agencies had a comprehensive list of surveillance targets that included the EU's competition commissioner, German government buildings in Berlin and overseas, and the heads of institutions that provide humanitarian and financial help to Africa, top-secret documents reveal. The papers show GCHQ [and the NSA were] targeting organisations such as the United Nations development programme, the UN's children's charity Unicef and Médecins du Monde, a French organisation that provides doctors and medical volunteers to conflict zones. The head of the Economic Community of West African States (Ecowas) also appears in the documents, along with text messages he sent to colleagues. One GCHQ document, drafted in January 2009, makes clear that the agencies were targeting an email address listed as belonging to another important American ally – the "Israeli prime minister". Ehud Olmert was in office at the time. Three further Israeli targets appeared on GCHQ documents, including another email address understood to have been used to send messages between the then Israeli defence minister, Ehud Barak, and his chief of staff, Yoni Koren. The names and details are the latest revelations to come from documents leaked by the whistleblower Edward Snowden. They provoked a furious reaction. The disclosures reflect the breadth of targets sought by the agencies, which goes far beyond the desire to intercept the communications of potential terrorists and criminals, or diplomats and officials from hostile countries.
Note: Later reports revealed that GHCQ also targeted the global human rights organization Amnesty International. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
“The Brothers” is a riveting chronicle of government-sanctioned murder, casual elimination of “inconvenient” regimes, relentless prioritization of American corporate interests and cynical arrogance on the part of two men. John Foster Dulles and his brother, Allen, were ... lawyers, partners in the immensely powerful firm of Sullivan & Cromwell. John Foster Dulles served as secretary of state from 1953 to 1959; his brother ran the C.I.A. from 1953 to 1961. In his detailed, wellconstructed and highly readable book, Stephen Kinzer ... shows how the brothers drove America’s interventionist foreign policy. Kinzer highlights John Foster Dulles’s central role in channeling funds from the United States to Nazi Germany in the 1930s. Sullivan & Cromwell floated bonds for Krupp A. G., the arms manufacturer, and also worked for I. G. Farben, the chemicals conglomerate that later manufactured Zyklon B, the gas used to murder millions of Jews. For the Dulles brothers, and for much of the American government, threats to corporate interests were categorized as support for communism. There are also reminders in Kinzer’s book of dark events in the history of American intelligence. Sixty years ago, Frank Olson, a C.I.A. officer, was reported to have jumped to his death during mind-control experiments “in which psychoactive drugs were administered to unknowing victims.” But last year, Kinzer reports, Olson’s family filed suit, claiming he had actually been murdered after visiting secret C.I.A. prisons in Europe.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
When Ban Ki-moon, the United Nations secretary general, sat down with President Obama at the White House in April to discuss Syrian chemical weapons, Israeli-Palestinian peace talks and climate change, it was a cordial, routine exchange. The National Security Agency nonetheless went to work in advance and intercepted Mr. Ban’s talking points for the meeting, a feat the agency later reported as an “operational highlight” in a weekly internal brag sheet. It was emblematic of an agency that for decades has operated on the principle that any eavesdropping that can be done on a foreign target of any conceivable interest — now or in the future — should be done. After all, American intelligence officials reasoned, who’s going to find out? From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as foes, as has become obvious in recent weeks; the agency’s official mission list includes using its surveillance powers to achieve “diplomatic advantage” over such allies as France and Germany and “economic advantage” over Japan and Brazil, among other countries. The scale of eavesdropping by the N.S.A., with 35,000 workers and $10.8 billion a year, sets it apart.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden. The confidential memo reveals that the NSA encourages senior officials in its "customer" departments, such as the White House, State and the Pentagon, to share their "Rolodexes" so the agency can add the phone numbers of leading foreign politicians to their surveillance systems. The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately "tasked" for monitoring by the NSA. The revelation is set to add to mounting diplomatic tensions between the US and its allies, after the German chancellor Angela Merkel ... accused the US of tapping her mobile phone. The NSA memo obtained by the Guardian suggests that such surveillance was not isolated, as the agency routinely monitors the phone numbers of world leaders – and even asks for the assistance of other US officials to do so. The memo, dated October 2006 and which was issued to staff in the agency's Signals Intelligence Directorate (SID), was titled "Customers Can Help SID Obtain Targetable Phone Numbers". In the wake of the Merkel row, the US is facing growing international criticism that any intelligence benefit from spying on friendly governments is far outweighed by the potential diplomatic damage.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The problem and the risk [with surveillance by GCHQ] comes in the area of mass capture of data, or strategic surveillance. This is the kind of intelligence gathering that sucks in data from everyone, everywhere: from phones, internet use from email to website visits, social networking, instant messaging and video calls, and even areas such as video gaming; in short, everything digital. In the US, the Prism programme may have given the NSA access to the servers of companies such as Google and Facebook; in the UK, GCHQ has gained a similar degree of access via its Tempora programme, and the two of them together have a cable- and network-tapping capabilities collectively called Upstream, which have the ability to intercept anything that travels over the internet. This data is fed into a database called XKeyscore, which allows analysts to extract information "in real time", ie immediately. What this adds up to is a new thing in human history: with a couple of clicks of a mouse, an agent of the state can target your home phone, or your mobile, or your email, or your passport number, or any of your credit card numbers, or your address, or any of your log-ins to a web service. Using that "selector", the state can get access to all the content of your communications, via any of those channels; can gather information about anyone you communicate with, can get a full picture of all your internet use, can track your location online and offline. It can, in essence, know everything about you, including – thanks to the ability to look at your internet searches – what's on your mind.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The owner of the e-mail service [Lavabit, Ladar Levison,] said he closed it down after the government, in pursuit of Edward J. Snowden, sought untrammeled access to the protected messages of all his customers. Mr. Levison was willing to allow investigators with a court order to tap Mr. Snowden’s e-mail account; he had complied with similar narrowly targeted requests involving other customers about two dozen times. But they wanted more, he said: the passwords, encryption keys and computer code that would essentially allow the government untrammeled access to the protected messages of all his customers. That, he said, was too much. On Aug. 8, Mr. Levison closed Lavabit rather than, in his view, betray his promise of secure e-mail to his customers. On [October 2], a federal judge unsealed documents in the case, allowing the tech entrepreneur to speak candidly for the first time about his experiences. He had been summoned to testify to a grand jury in Virginia; forbidden to discuss his case; held in contempt of court and fined $10,000 for handing over his private encryption keys on paper and not in digital form; and, finally, threatened with arrest for saying too much when he shuttered his business. While Mr. Levison’s struggles have been with the F.B.I., hovering in the background is the N.S.A., which has worked secretly for years to undermine or bypass encrypted services like Lavabit so that their electronic message scrambling cannot obstruct the agency’s spying. Mr. Levison’s case shows how law enforcement officials can use legal tools to pry open messages, no matter how well protected.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The US National Security Agency spied on civil rights leader Martin Luther King and boxer Muhammad Ali during the height of the Vietnam War protests, declassified documents reveal. The documents show the NSA also tracked journalists from the New York Times and the Washington Post and two senators. Some NSA officials later described the programme as "disreputable if not outright illegal", the documents show. The operation, dubbed "Minaret", was originally exposed in the 1970s. However, the names of those on the phone-tapping "watch list" had been kept secret until now. The secret papers were published after a government panel ruled in favour of researchers at George Washington University. The university's National Security Archive - a research institute that seeks to check government secrecy - described the names on the NSA's watch-list as "eye-popping". The agency eavesdropped on civil rights leaders Martin Luther King and Whitney Young as well as boxing champion Muhammad Ali, New York Times journalist Tom Wicker and Washington Post columnist Art Buchwald. The NSA also monitored the overseas phone calls of two prominent US senators - Democrat Frank Church and Republican Howard Baker. In 1967 the strength of the anti-war campaign led President Lyndon Johnson to ask US intelligence agencies to find out if some protests were being stoked by foreign governments. Many of those targeted were considered to be critics of US involvement in the Vietnam War. The NSA worked with other spy agencies to draw up the "watch lists" of anti-war critics, tapping their phone calls. The programme continued after Richard Nixon entered the White House in 1969.
Note: These names were kept secret until now allegedly for reason of "national security." Note how this term is repeatedly used to cover up illegal government activity solely to protect those who commit these crimes. For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
One of the most overlooked aspects of the NSA reporting in the US has been just how global of a story this has become. Last week it was revealed that Belgium's largest telecom, Belgacom, was the victim of a massive hacking attack which systematically compromised its system for as long as two years. Last week, using documents obtained from NSA whistleblower Edward Snowden, Laura Poitras and other Der Spiegel journalists reported in that paper that it was the GCHQ, Britain's intelligence agency, that was behind the attack. According to that report, the attack was carried out by targeting individual engineers at the telecom with malware that allowed GCHQ agents to "own" their computer and thus exploit their access to the telecommunications system. As the US and UK run around the world protesting the hacking activities of others and warning of the dangers of cyber-attacks, that duo is one of the most aggressive and malicious, if not the most aggressive and malicious, perpetrators of those attacks of anyone on the planet. Nobody hacks as prolifically and aggressively as the two countries who most vocally warn of the dangers of hacking. A coalition called Stop Watching Us has been formed by privacy and civil liberties groups from across the political spectrum. On October 26, the 12th anniversary of the enactment of the Patriot Act, they will hold an anti-surveillance rally in Washington DC.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
GCHQ has received at least Ł100 million from the US to help fund intelligence gathering, raising questions over American influence on the British agencies. The money was paid across a range of projects over three years and resulted in GCHQ spying on behalf of America, according to leaked documents. It also emerged that the intelligence agency wants the ability to “exploit any phone, anywhere, any time” and that some staff have raised concerns over the “morality and ethics” of their operational work. The payments from the US National Security Agency (NSA) are detailed in GCHQ’s annual “investment portfolios”, leaked by Mr Snowden to The Guardian. The NSA paid GCHQ Ł22.9 million in 2009, Ł39.9 million in 2010 and Ł34.7 million in 2011/12. The 2010 funding included ... Ł17.2 million for the agency’s “Mastering the Internet” project, which gathers “raw” information from the web to be analysed. In return, GCHQ has to have the American view in mind when prioritising work, the papers claim. One strategy briefing disclosed the pressure on GCHQ to meet NSA demands, saying: “GCHQ must pull its weight and be seen to pull its weight.” In another document, from 2010, GCHQ apparently acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Former FBI supervisor John Morris thought he had left his sordid relationship with James "Whitey" Bulger back in Boston along with the envelopes of money, the cases of expensive wine, the home-cooked meals he had prepared for the accused mob boss. Then the phone rang one night. It was 1995 and Bulger had become a fugitive from justice. It was Bulger on the phone. And he was livid. A Boston newspaper had reported that Bulger was a longtime FBI informant, and Bulger wanted Morris to have the story retracted. "He said if he was going to jail ... I was going with him." Morris testified in the trial of Bulger, 83, who is accused of a string of crimes, including 19 murders. Testimony during the trial has stated Bulger ran a criminal enterprise with the help of corrupt FBI agents [John] Connolly and Morris, and that Bulger was an FBI informant concerning his criminal rivals. Morris' testimony put a spotlight on a staggering amount of corruption in the Boston FBI field office that included cash bribes and tip-offs to wiretaps. Connolly's relationship with Bulger extended into the Massachusetts State House, Morris testified. His friendship with Bulger's brother, then Senate President William Bulger, [could] land him a job as the Boston police commissioner upon his retirement from the bureau. Connolly's behavior did not raise any eyebrows with the Special Agents in Charge of the Boston FBI field office, Morris told the court. In fact it was quite the opposite. FBI bosses sought Connolly's friendship, Morris testified. "He had tremendous access across the board to everything including sports events, political figures," Morris testified.
Note: For more on major corruption within the FBI and other intelligence services, see the deeply revealing reports from reliable major media sources available here.
The peculiar circumstances of journalist Michael Hastings' death in Los Angeles last week have unleashed a wave of conspiracy theories. Now there's another theory to contribute to the paranoia: According to a prominent security analyst, technology exists that could [have] allowed someone to hack his car. Former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarke [said] that what is known about the single-vehicle crash is "consistent with a car cyber attack." Clarke said, "There is reason to believe that intelligence agencies for major powers" -- including the United States -- know how to remotely seize control of a car. "It's relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn't want acceleration, to throw on the brakes when the driver doesn't want the brakes on, to launch an air bag," Clarke told The Huffington Post. Hastings was driving a 2013 Mercedes C250 coupe when he crashed into a tree on Highland Ave. in Los Angeles at approximately 4:30 am on June 18. Video posted online showed the car in flames, and one neighbor told a local news crew she heard a sound like an explosion. Another eyewitness said the car's engine had been thrown 50 to 60 yards from the car. There were no other vehicles involved in the accident. The fire was so all-consuming that it took the Los Angeles County coroner's office two days to identify Hastings' body, but Clarke said a cyber attack on the vehicle would have been nearly impossible to trace "even if the dozen or so computers on board hadn't melted."
Note: For a video of a DARPA specialist talking about how any computerized function of a car can be taken over, click here. This news article shows how a university test proved a car's onboard computer can be hacked. For an excellent video presenting powerful evidence that Hastings' death was anything but suicide, click here. For a Fox News video showing other evidence of premeditated murder, click here. In this video, a good friend states he had just received an email from Hastings that he had a story on the CIA that would be the biggest story yet. A later email then said he was worried as he was now under FBI investigation.
[Barrett] Brown is not a household name like Edward Snowden or Bradley Manning. But after helping expose a dirty tricks plot, he faces jail. Brown made a splash in February 2011 by helping to uncover "Team Themis", a project by intelligence contractors retained by Bank of America to demolish the hacker society known as Anonymous. The Team Themis story began in late 2010, when Julian Assange warned WikiLeaks would release documents outlining an "ecosystem of corruption [that] could take down a bank or two." Bank of America went into damage-control mode and, as the New York Times reported, assembled "a team of 15 to 20 top Bank of America officials … scouring thousands of documents in the event that they become public." Days later, Bank of America retained the well-connected law firm of Hunton & Williams [which] "proposed various schemes to attack" WikiLeaks. Its partners suggested creating false documents and fake personas to damage progressive organizations. The tech companies' emails – which Anonymous hacked and Barrett Brown helped publicize – listed planned tactics: "Feed[ing] the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error." Brown [has] been cooling his heels in a jail outside Dallas ... awaiting two separate trials that could put him on ice for more than 100 years. In contrast to the FBI's aggressive pursuit of Brown, no probe of the Team Themis project was launched – despite a call from 17 US House representatives to investigate a possible conspiracy to violate federal laws.
Note: With the wide focus on the privatized national security state by the leaks from Edward Snowden, there is renewed interest in Brown's plight and the campaign for justice in his case. For more on this and to support Barret Brown, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.
Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA). The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate. One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects. This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets. The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden. Britain's technical capacity to tap into the cables that carry the world's communications ... has made GCHQ an intelligence superpower. A total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.
Note: For solid evidence spy agencies targeted even top politicians, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.
Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic. The disclosure raises new questions about the boundaries of surveillance by GCHQ [Government Communications Headquarters] and its American sister organisation, the National Security Agency [NSA], whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. They reveal that during G20 meetings in April and September 2009 GCHQ used what one document calls "ground-breaking intelligence capabilities" to intercept the communications of visiting delegations. This included: • Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates' use of computers; • Penetrating the security on delegates' BlackBerrys to monitor their email messages and phone calls; • Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit.
Note: For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here
Since 9/11, there has been, at first secretly but increasingly openly, a revocation of the bill of rights for which this country fought over 200 years ago. In particular, the fourth and fifth amendments of the US constitution, which safeguard citizens from unwarranted intrusion by the government into their private lives, have been virtually suspended. The United States is not now a police state. But given the extent of this invasion of people's privacy, we do have the full electronic and legislative infrastructure of such a state. These powers are extremely dangerous. There are legitimate reasons for ... secrecy about communications intelligence. But what is not legitimate is to use a secrecy system to hide programs that are blatantly unconstitutional. In 1975, Senator Frank Church spoke of the National Security Agency in these terms: "I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return." The dangerous prospect of which he warned was that America's intelligence gathering capability – which is today beyond any comparison with what existed in his pre-digital era – "at any time could be turned around on the American people and no American would have any privacy left." That has now happened. That is what [Edward] Snowden has exposed, with official, secret documents. We have fallen into Senator Church's abyss.
Note: The above was written by Daniel Ellsberg, a former US military analyst who in 1971 leaked the Pentagon Papers, showing how the US public had been misled about the Vietnam war. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs. The program, code-named PRISM, has not been made public until now. It may be the first of its kind. Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” GCHQ, Britain’s equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority. Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.
Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.
Former U.S. Sen. Bob Graham has accused the FBI in court papers of having impeded Congress’s Joint Inquiry into 9/11 by withholding information about a Florida connection to the ... attacks that killed nearly 3,000 people. The information ... includes a recently declassified FBI report that ties a Saudi family who once lived in Sarasota “to individuals associated with the terrorist attacks on 9/11/2001.” “The FBI’s failure to call (to the Joint Inquiry’s attention) documents finding ‘many connections’ between Saudis living in the United States and individuals associated with the terrorist attack(s) … interfered with the Inquiry’s ability to complete its mission,” said Graham, co-chairman of the Joint Inquiry. Graham said the FBI kept the 9/11 Commission in the dark, too. He said co-chairmen Thomas Kean and Lee Hamilton and executive director Philip Zelikow all told him they were unaware of the FBI’s Sarasota investigation. Moreover, Graham stated that Deputy FBI Director Sean Joyce, the Bureau’s second in command, personally intervened to block him from speaking with the special agent-in-charge of the Sarasota investigation. “I am troubled by what appears to me to be a persistent effort by the FBI to conceal from the American people information concerning possible Saudi support of the Sept. 11 attacks,” Florida’s former governor said.
Note: For deeply revealing reports from reliable major media sources on the 9/11 attacks, click here.
A dozen years after the terrorist attacks of Sept. 11, 2001, an independent, nonpartisan panel’s examination of the interrogation and detention programs carried out in their aftermath by the Bush administration ... provides a valuable, even necessary reckoning. The work of the [11-member task force convened by the Constitution Project, a legal research and advocacy group] is informed by interviews with dozens of former American and foreign officials, as well as with former prisoners. It is the fullest independent effort so far to assess the treatment of detainees at Guantánamo Bay, in Afghanistan and Iraq, and at the C.I.A.’s secret prisons. The report’s authoritative conclusion that “the United States engaged in the practice of torture” is impossible to dismiss. The report found that those methods violated international legal obligations with “no firm or persuasive evidence” that they produced valuable information that could not have been obtained by other means. The task force found that using torture — like waterboarding, slamming prisoners into walls, and chaining them in uncomfortable stress position for hours — had “no justification”. And in engineering “enforced disappearances” and secret detentions, the United States violated its international treaty obligations. As the panel notes, there never was before “the kind of considered and detailed discussions that occurred after 9/11 directly involving a president and his top advisers on the wisdom, propriety and legality of inflicting pain and torment on some detainees in our custody.”
Note: For another informative article on this from the Times, click here.
The FBI suspected within days of the Sept. 11, 2001, terrorist attacks that the American Muslim cleric Anwar al-Awlaki may have purchased tickets for some of the hijackers for air travel in advance of the attacks, according to newly released documents. The heavily redacted records – obtained by Judicial Watch through a [FOIA] request – suggest the FBI held evidence tying the American-born cleric to the hijackers just 16 days after the attack that killed nearly 3,000 Americans. “We have FBI documents showing that the FBI knew that al-Awlaki had bought three tickets for three of the hijackers to fly into Florida and into Las Vegas, including the lead hijacker, Mohammad Atta,” Tom Fitton, president of Judicial Watch, told Fox News. He added that the records show the cleric, killed in September 2011 by a U.S. drone strike in Yemen, “was a central focus of the FBI's investigation of 9/11. They show he wasn't cooperative. And they show that he was under surveillance.” The cleric was a guest speaker on moderate Islam at a Pentagon executive dining room in February 2002. The newly released documents now suggest the FBI knew five months earlier of al-Awlaki’s probable link to the hijackers. Al-Awlaki was held at New York City’s JFK airport on Oct. 10, 2002, under a warrant for passport fraud, a felony punishable by 10 years. However, ... an FBI agent, Wade Ammerman, from the bureau’s Washington field office ordered the cleric be released from custody, even though there was an active warrant for his arrest.
Note: Click here to view the more than 200 pages of documents obtained by Judicial Watch. Isn't it quite strange that the continuously monitored Al-Awlaki was breakfasting with the Pentagon brass and was released from custody by the FBI, after the 9/11 attacks? Could his assassination by drone have been for the purpose of keeping him quiet about what he knew concerning 9/11?
Through Freedom of Information Act requests and interviews with officials at numerous agencies, The Wall Street Journal has reconstructed the clash over the counterterrorism program within the administration of President Barack Obama. The attorney general [has] signed the changes into effect. The rules now allow the little-known National Counterterrorism Center to examine the government files of U.S. citizens for possible criminal behavior, even if there is no reason to suspect them. That is a departure from past practice, which barred the agency from storing information about ordinary Americans unless a person was a terror suspect or related to an investigation. Now, NCTC can copy entire government databases—flight records, casino-employee lists, the names of Americans hosting foreign-exchange students and many others. The agency has new authority to keep data about innocent U.S. citizens for up to five years, and to analyze it for suspicious patterns of behavior. Previously, both were prohibited. Data about Americans "reasonably believed to constitute terrorism information" may be permanently retained. "It's breathtaking" in its scope, said a former senior administration official. The Fourth Amendment of the Constitution says that searches of "persons, houses, papers and effects" shouldn't be conducted without "probable cause" that a crime has been committed.
Note: This article requires subscription to view at the link above. To read it for free, click here. For analysis of this sweeping increase in government privacy invasions, click here. For deeply revealing reports from reliable major media sources on government privacy invasions, click here.
Last week, Stanford University and New York University released a major study about the use of drones in the ever-evolving but never-ending war on terror. Drones are terrorizing an entire civilian population. [We] spent weeks in Pakistan interviewing more than 60 people from North Waziristan. Many were survivors of strikes. Others had lost loved ones and family members. All of them live under the constant threat of annihilation. What my colleagues and I learned from these unnamed and unknown victims of America's drone warfare gave the report its title: "Living Under Drones." Drones are a constant presence in the skies above the North Waziristan tribal area in Pakistan, with as many as six hovering over villages at any one time. People hear them day and night. They are an inescapable presence, the looming specter of death from above. And that presence is steadily destroying a community twice the size of Rhode Island. The routines of daily life have been ripped to shreds. Indisputably innocent people cower in their homes, afraid to assemble on the streets. "Double taps," or secondary strikes on the same target, have stopped residents from aiding those who have been injured. A leading humanitarian agency now delays assistance by an astonishing six hours. What makes this situation even worse is that no one can tell people in these communities what they can do to make themselves safe. No one knows who is on the American kill list, no one knows how they got there and no one knows what they can do to get themselves off. It's all terrifyingly random. Suddenly, and without warning, a missile launches and obliterates everyone within a 16-yard radius.
Note: The author of this report, Jennifer Gibson, is a staff attorney with Reprieve, a London-based legal charity that represents dozens of Pakistani drone victims. For an excellent, seven-minute video by professors exploring the tragic reality of drone strikes in Pakistan, click here. For the "Living Under Drones" website where you can read a summary and download this report by Stanford University and the New York Times, click here. To learn about a beautiful movement to place large photos of children's faces in target areas to stop drone operators from killing innocents, click here.
Revelations that prominent radical activist Richard Aoki was an FBI informant have prompted angry denials among his supporters, but newly released records confirm he was secretly providing information to agents during the period he gave the Black Panthers guns and firearms training. The documents from Aoki's FBI informant file - totaling 221 pages - were released after a court challenge under the Freedom of Information Act and show that Aoki was an informant from 1961 to 1977, with only brief interruptions. The records say that at various points, he provided information that was "unique" and of "extreme value." The records chronicle Aoki's 16-year career as an informant, including years in which he was a student at Merritt College in Oakland and at UC Berkeley, participating in the Black Panthers and other radical groups. They also cover years during which Aoki was a teacher at those universities. An early FBI report says Aoki was assigned the alias "Richard Ford" to use when signing reports, as well as a permanent informant number, which the FBI redacted. It notes his date of birth, his parents' names and his address. "Coverage furnished by this informant is unique and not available from any other source," the FBI report says. "Many activist individuals seek informant's advice and counseling since informant is considered as a militant who has succeeded within the establishment without surrending (sic) to it."
Note: Here is undeniable evidence that the FBI was involved in infiltrating movements and radicalizing them with guns and weapons. Why isn't this being discussed widely in the media, particularly as it is likely this is still going on, most recently with the Occupy movement? The revelation that Aoki was an informant was first made last month in a news report and video by the Center for Investigative Reporting, based on the new book Subversives: The FBI's War on Student Radicals, and Reagan's Rise to Power.
A cycle of overhyped terror plots involving government agency entrapment feeds a multimillion-dollar surveillance industry. The news stories ... quickly surface, long enough to cause scary headlines, then vanish before people can learn how often the cases are thrown out. These are stories about "bumbling fantasists", hapless druggies, the aimless, even the virtually homeless and mentally ill, and other marginal characters with not the strongest grip on reality, who have been lured into discourses about violence against America only after assiduous courting, and in some cases outright payment, by undercover FBI or police informants. But the tales of entrapment and terror hype continue apace – ten years after 9/11. Now we have another "underwear bomber" – declared by the Pentagon to have been about to launch a major attack via a US-bound plane, but who appears, reportedly, to have been a CIA-run double agent. What is the evidence that the "device", which is supposedly so sophisticated that there is doubt as to whether existing surveillance technologies in US airports would have caught it, actually exists? It is important to note that we can no longer assume that the FBI and the CIA and the NSA work ... for the safety of the American people; they [now] represent a revolving door of government officials who become security industry lobbyists and manufacturers, which, in turn, get the multimillion-dollar contracts for tackling the very problems these stories [hype].
Note: For more on this bizarre news, see the CBS report at this link. Isn't it amazing how many terrorist groups have undercover FBI and CIA agents involved in actually pushing plots forward? One has to wonder how far the plots would go without prompting by intelligence insiders. For a powerful BBC documentary suggesting that terrorism is pushed and sold by politicians for a deeper agenda, click here.
An FBI special agent was testifying in the government's high-profile terrorism trial against Omar Abdel Rahman, the "blind sheik" suspected of plotting the first attack on the World Trade Center. Frederic Whitehurst, a chemist and lawyer who worked in the FBI's crime lab, testified that he was told by his superiors to ignore findings that did not support the prosecution's theory of the bombing. "There was a great deal of pressure put upon me to bias my interpretation," Whitehurst said in U.S. District Court in New York in 1995. After the Justice Department's inspector general began a review of Whitehurst's claims, Attorney General Janet Reno and FBI Director Louis J. Freeh decided to launch a task force to dig through thousands of cases involving discredited agents. The task force took nine years to complete its work and never publicly released its findings. Officials never notified many defendants of the forensic flaws in their cases and never expanded their review to catch similar mistakes. If the Justice Department was secretive, the agency's independent inspector general was not. Michael R. Bromwich's probe culminated in a devastating 517-page report in April 1997 on misconduct at the FBI lab. He concluded that FBI managers failed – in some cases for years – to respond to warnings about the scientific integrity and competence of agents. The chief of the lab's explosives unit, for example, "repeatedly reached conclusions that incriminated the defendants without a scientific basis" in the 1995 Oklahoma City bombing.
Note: Read more about the FBI's mishandling of forensic evidence in the Oklahoma City bombing case. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
Private intelligence firm Stratfor ... sells what clients and subscribers consider some of the best geopolitical analysis that money can buy. Now the Texas-based think tank is the latest target of WikiLeaks chief Julian Assange, who says his anti-secrecy group has more than 5 million of Stratfor's emails and is promising to release damaging material in the coming weeks. The first, small batch published [on February 27] revealed clients that Stratfor has long safeguarded and refused to disclose. They range from local universities to megacorporations like Coca-Cola. An initial examination of the emails turned up a mix of the innocuous and the embarrassing. But Assange has accused Stratfor of serious deeds, such as funneling money to informants through offshore tax havens, monitoring activist groups on behalf of big corporations and making investments based on its secret intelligence. "What we have discovered is a company that is a private intelligence Enron," Assange told London's Frontline Club, referring to the Texas energy giant whose spectacular bankruptcy turned it into a byword for corporate malfeasance. In December, Stratfor founder George Friedman gave advice on handling sources to one of his analysts gathering information on the health of Venezuela President Hugo Chavez. "If this is a source you suspect may have value, you have to take control (of) him. Control means financial, sexual or psychological control to the point where he would reveal his sourcing and be tasked," the email read.
Note: For more powerful information on this most recent release of revealing documents by Wikileaks, click here. For verifiable information on astounding secret methods used to gain control of people as reported in declassified U.S. government documents, click here.
As auto manufacturers imagine a future of self-driving and always-connected cars, they'll need to worry about something else—electronic malfunctions and cyberattacks, according to a report released by the Transportation Research Board. "Automobiles today are literally 'computers on wheels,'" says the report. Current auto software uses more than a million lines of code. In the coming years, onboard computers will become even more important. Like a computer, a car's internal software can be infected with a virus or hacked. Last year, researchers at the University of Washington and the University of California, San Diego, proved that computers could be hacked with either physical access to the car or wirelessly using technology such as Bluetooth. A hacker could then disable the brakes, stop the engine, or worse. According to the report, "automotive manufacturers have designed their networks without giving sufficient attention to such cybersecurity vulnerabilities because automobiles have not faced adversarial pressures."
Note: A New York Times article goes into more detail. The article doesn't mention the obvious possibility that the FBI, NSA, or other intelligence agencies could hack into any car's computer system and cause an accident. There is even a term, "Boston Brakes," for staged car wrecks, allegedly because the CIA first started experimenting with this in Boston. For an article delving into this, click here. Could this be what happened to courageous reporter Michael Hastings and others? For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.
The FBI’s Joint Terrorism Task Force has recommended for many years that animal activists who carry out undercover investigations on farms could be prosecuted as domestic terrorists. New documents obtained through a Freedom of Information Act request by activist Ryan Shapiro show the FBI advising that activists – including Shapiro – who walked onto a farm, videotaped animals there and “rescued” an animal had violated terrorism statutes. The documents ... were issued by the Joint Terrorism Task Force in 2003 in response to an article in an animal rights publication in which Shapiro and two other activists (whose names were redacted from the document), openly claimed responsibility for shooting video and taking animals from a farm. The FBI notes discuss the videotaping, illegal entry and the removal of animals, then concludes with “there is a reasonable indication that [Subject 1] and other members of the [redacted] have violated the Animal Enterprise Terrorism Act, 18 USC Section 43 (a).” The penalties for such a conviction can include terrorism enhancements which can add decades to a sentence. “It’s simply outrageous to consider civil disobedience as terrorism,” Shapiro [said]. “Civil disobedience is not terrorism. It has a long and proud place in our nation’s history, from Martin Luther King to Occupy Wall Street, and the [Animal Enterprise Terrorism Act] takes that kind of advocacy that we celebrate from the civil rights movement and turns it into a terrorist event.”
Note: As the Animal Enterprise Terrorism Act shows, the animal experimentation lobby has demonstrated its considerable clout by getting Congress to pass legislation making principled demonstrations against animal torture and killing into a form of "terrorism". Do you think that Wall Street might lobby for a similar law making "terrorists" out of Occupiers?
Three Massachusetts State Police officers once staked out organized-crime chief Whitey Bulger for months, all the while not knowing that he was an FBI informant who was tipped to their surveillance. James “Whitey” Bulger, now 82, is the Al Capone of Boston. A fugitive since 1995 who seemed untouchable, he is also compared to the “Teflon Don” of New York, John Gotti. His brother, Billy Bulger, was once the most powerful political figure in Massachusetts. "Whitey" was an FBI informant for decades while ruling the Irish organized-crime world. He made millions from rackets and drugs and committed an untold number of murders to keep his empire safe. On June 22, he was arrested in Santa Monica, California. The seizure of weapons and more than $800,000 in cash was no surprise. Recently, I spoke with three of the best—Bob Long, Rick Fraelick, and Jack O’Malley. Intrepid Bob Long was in charge. Bob Long says that if Bulger and Flemmi had not been protected by the FBI, “then ... nine murders would have never taken place. Long said he believes that Agents Morris and Connolly identified more than a dozen individuals to Bulger and Flemmi as FBI informants or could-be FBI informants and all of those people were killed. Connolly is now in prison; Morris received a grant of immunity for testimony.
Note: For lots more from major media sources on government corruption, click here.
It was early afternoon on Friday, Aug. 17, 2001. Special Agent Harry Samit of the FBI’s Minneapolis field office [sat] across from ... Zacarias Moussaoui, a 33-year-old French-born student arrested the day before for overstaying his visa. Samit, a former intelligence officer at the Navy’s celebrated Top Gun flight school, felt sure the man across the desk from him was a Muslim extremist who was part of a plot to hijack a commercial jetliner filled with passengers. That same day [at] FBI headquarters ... in Washington, counterterrorism supervisors were treating Samit’s first reports about Moussaoui with skepticism, even contempt. New disclosures about Samit’s story suggest that FBI agents in Minneapolis were much closer to unraveling the 9/11 plot than previously known. The officials directly involved in the case were denied access to a key internal memo —- prepared for outgoing FBI Director Louis Freeh —- that could have allowed the Minneapolis field office to connect the dots and possibly preempt the attacks. Their efforts were thwarted by a group of arrogant, slow-moving supervisors at FBI headquarters. There is no clear reference to the Freeh memo in the 9/11 commission’s report.
Note: For questions raised about the official story of 9/11 by hundreds of highly-respected citizens from all walks of life, click here and here.
[The top counterterrorism adviser to President Clinton and Mr. Bush, Richard Clarke will] be featured in a documentary advancing [a] theory that the Central Intelligence Agency tried to turn two of the 9/11 hijackers into double agents while they resided in the United States in the years leading up to the attacks. During the 9/11 Commission's investigation of the attacks, the CIA said it didn't know the location of the hijackers Clarke refers to, Nawaf al-Hazmi and Khalid al-Mihdhar. In the documentary, Clarke ... concludes that the CIA director at the time, George Tenet, ordered the cover-up after the recruitment effort failed. In response to that accusation, Tenet released a written statement saying that Clarke has "suddenly invented baseless allegations which are belied by the record and unworthy of serious consideration."
Note: Richard Clarke is not the only highly-credible and respected former government official to question the official acount of 9/11. For the questions raised by many more, click here.
More than 700 leaked secret files on the Guantánamo detainees lay bare the inner workings of America's controversial prison camp in Cuba. The US military dossiers ... reveal how ... many prisoners were flown to the Guantánamo cages and held captive for years on the flimsiest grounds, or on the basis of lurid confessions extracted by maltreatment. The 759 Guantánamo files, classified "secret", cover almost every inmate since the camp was opened in 2002. More than two years after President Obama ordered the closure of the prison, 172 are still held there. The files depict a system often focused less on containing dangerous terrorists or enemy fighters, than on extracting intelligence. Among inmates who proved harmless were an 89-year-old Afghan villager, suffering from senile dementia, and a 14-year-old boy who had been an innocent kidnap victim. The documents also reveal: • US authorities listed the main Pakistani intelligence service, the Inter-Services Intelligence Directorate (ISI), as a terrorist organisation. • Almost 100 of the inmates who passed through Guantánamo are listed by their captors as having had depressive or psychotic illnesses. Many went on hunger strike or attempted suicide. • A number of British nationals and residents were held for years even though US authorities knew they were not Taliban or al-Qaida members.
Note: For many key reports on government secrecy from major media sources, click here.
In December 2003, security forces boarded a bus in Macedonia and snatched a German citizen named Khaled el-Masri. For the next five months, el-Masri was a ghost. Only a select group of CIA officers knew he had been whisked to a secret prison for interrogation in Afghanistan. But he was the wrong guy. In the years since the Sept. 11, 2001, terrorist attacks, officers who committed serious mistakes that left people wrongly imprisoned or even dead have received only minor admonishments or no punishment at all. Many officers who made significant missteps are now the senior managers fighting the president's spy wars. The AP investigation of the CIA's actions revealed a disciplinary system that takes years to make decisions, hands down reprimands inconsistently and is viewed inside the agency as prone to favoritism and manipulation. When people are disciplined, the punishment seems to roll downhill, sparing senior managers even when they were directly involved in operations that go awry. Two officers involved in the death of a prisoner in Afghanistan, for instance, received no discipline and have advanced into Middle East leadership positions. Other officers were punished after participating in a mock execution in Poland and playing a role in the death of a prisoner in Iraq. Those officers retired, then rejoined the intelligence community as contractors. Since 9/11, retired CIA officers have published a variety of books opining on what ails the CIA. Their conclusions differ, but they are in nearly unanimous agreement that the system of accountability is broken.
Note: It is great news that the media is now revealing some of the craziness at the CIA, a topic that was almost taboo for the press in the past.
After World War II, American counterintelligence recruited former Gestapo officers, SS veterans and Nazi collaborators to an even greater extent than had been previously disclosed and helped many of them avoid prosecution or looked the other way when they escaped, according to thousands of newly declassified documents. With the Soviet Union muscling in on Eastern Europe, settling scores with Germans or German collaborators ... appeared counterproductive, said a government report published Friday by the National Archives. In chilling detail, the report also elaborates on the close working relationship between Nazi leaders and the grand mufti of Jerusalem, Haj Amin al-Husseini, who ... recruited Muslims for the SS, the Nazi Partys elite military command, [and] was allowed to flee after the war to Syria. The report, Hitlers Shadow: Nazi War Criminals, U.S. Intelligence and the Cold War, grew out of an interagency group created by Congress to identify, declassify and release federal records on Nazi war crimes and on Allied efforts to hold war criminals accountable. It is drawn from a sampling of 1,100 C.I.A. files and 1.2 million Army counterintelligence files that were not declassified until ... 2007. Hitlers Shadow adds a further dimension to a separate Justice Department history of American Nazi-hunting operations, which the government has refused to release ... and which concluded that American intelligence officials created a safe haven in the United States for certain other former Nazis.
Note: Following World War Two, more than 1500 Nazi's, including many war criminals, were brought to the US by "Operation Paperclip" and secretly embedded in the US scientific community and intelligence establishment. For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
A report to Congress reveals details on how U.S. intelligence officials used and protected some Nazi Gestapo agents after World War II. The report was authored by historians hired by the U.S. National Archives and Records Administration. The report draws from an unprecedented trove of records on clandestine operations that the CIA was persuaded to declassify and from previously inaccessible Army intelligence files. "The CIA records give us a much better picture of the movements of Nazi war criminals in the postwar period. The Army records are voluminous, and will be keeping people busy for many years," said Richard Breitman, of the American University in Washington, D.C., who co-authored the report with Norman J.W. Goda, of the University of Florida. The records were made available under the Nazi War Crimes Disclosure Act of 1998. Nazi hunters and lawmakers have long raised questions about what U.S. government knew and its involvement with war criminals during the Cold War. The Nazi War Crimes Disclosure Act has so far resulted in more than 8 million documents being declassified; a landmark 2005 book on U.S. Intelligence and the Nazis in part authored by Breitman and Goda; and a final report to Congress.
Note: The CIA would never have declassified these documents were it not for pressure from caring citizens which caused Congress to act. For details of the CIA employment of Nazis in its post-war mind-control experimentation on humans without their consent, click here.
Before the sun rose, the informant donned a white Islamic robe. A tiny camera was sewn into a button, and a microphone was buried in a device attached to his keys. The undercover FBI informant - a convicted forger named Craig Monteilh - then drove off for 5 a.m. prayers at the Islamic Center of Irvine, where he says he spied on dozens of worshipers in a quest for potential terrorists. Monteilh's mission as an informant backfired. Muslims were so alarmed by his talk of violent jihad that they obtained a restraining order against him. He had helped build a terrorism-related case against a mosque member, but that also collapsed. The Justice Department recently took the extraordinary step of dropping charges against the worshiper, who Monteilh had caught on tape agreeing to blow up buildings, law enforcement officials said. Prosecutors had portrayed the man as a dire threat. Compounding the damage, Monteilh has gone public, revealing secret FBI methods and charging that his "handlers" trained him to entrap Muslims as he infiltrated their mosques, homes and businesses. He is now suing the FBI. Officials ... confirm that he was a paid FBI informant. Court records and interviews corroborate not only that Monteilh worked for the FBI - he says he made $177,000, tax-free, in 15 months - but that he provided vital information on a number of cases.
Note: For lots more from reliable sources on the long series of fake terror scares used by governments to control their domestic populations by fear, click here.
The Pentagon has burned 9,500 copies of Army Reserve Lt. Col. Anthony Shaffer's memoir Operation Dark Heart, his book about going undercover in Afghanistan. A Department of Defense official tells Fox News that the department purchased copies of the first printing because they contained information which could cause damage to national security. The U.S. Army originally cleared the book for release. The U.S. Defense Intelligence Agency attempted to block the book about the tipping point in Afghanistan and a controversial pre-9/11 data mining project called "Able Danger." In a letter obtained by Fox News, the DIA says national security could be breached if Operation Dark Heart is published in its current form. The agency also attempted to block key portions of the book that claim "Able Danger" successfully identified hijacker Mohammed Atta as a threat to the United States before the Sept. 11, 2001, terror attacks.
Note: Able Danger was the program which identified Mohamed Atta and three other alleged 9/11 hijackers as a potential terror threat before 9/11. To read major media reports on the intense controversy around this program (which is likely why the book is being burned), click here.
At the height of the Cold War, the CIA conducted covert, illegal scientific research on human subjects. Known as Project MK-ULTRA, the program subjected humans to experiments with drugs such as LSD and barbiturates, hypnosis and (some reports indicate) radiological and biological agents. In 1973, CIA Director Richard Helms ordered all documents from Project MK-ULTRA destroyed. Nevertheless, late the following year, the New York Times reported on the illegal activities. In 1975, the Church Committee, headed by Senator Frank Church, and a commission headed by Vice President Nelson Rockefeller investigated the project. They found that over more than two decades, the CIA spent nearly $20 million, enlisted the services of researchers at more than 30 universities and conducted experiments on subjects without their knowledge. Some of the research was performed in Canada. Some historians argue that the goal of the program was to create a mind-control system by which the CIA could program people to conduct assassinations. In 1953, Richard Condon dramatized the idea in the thriller The Manchurian Candidate, which was adapted into a film starring Frank Sinatra. Such ultimately wacky ideas were also dramatized in the recent George Clooney film The Men Who Stare at Goats.
Note: For more on CIA mind control experiments, see the extensive documentation available here.
It wasn't his daredevil stunt [on his motorcycle] that has [Anthony Graber] facing the possibility of 16 years in prison. For that, he was issued a speeding ticket. It was the video that Graber posted on YouTube one week later -- taken with his helmet camera -- of a plainclothes state trooper cutting him off and drawing a gun during the traffic stop near Baltimore. In early April, state police officers raided Graber's parents' home in Abingdon, Md. They confiscated his camera, computers and external hard drives. Graber was indicted for allegedly violating state wiretap laws by recording the trooper without his consent. Arrests such as Graber's are becoming more common along with the proliferation of portable video cameras and cell-phone recorders. Videos of alleged police misconduct have become hot items on the Internet. YouTube still features Graber's encounter along with numerous other witness videos. "The message is clearly, 'Don't criticize the police,'" said David Rocah, an attorney for the American Civil Liberties Union of Maryland who is part of Graber's defense team. "With these charges, anyone who would even think to record the police is now justifiably in fear that they will also be criminally charged." Carlos Miller, a Miami journalist who runs the blog "Photography Is Not a Crime," said he has documented about 10 arrests since he started keeping track in 2007. Miller himself has been arrested twice for photographing the police.
Note: To our knowledge, no one has ever been prosecuted for videotaping police doing good things, which they often do, yet many have been arrested for catching police doing bad things. Where's the justice here?
On Nov. 28, 1953, Frank Olson, a ... 42-year-old government scientist, plunged to his death from room 1018A in New York's Statler Hotel. [Twenty-two] years later, the Rockefeller Commission report was released, detailing a litany of domestic abuses committed by the CIA. The ugly truth emerged: Olson's death was the result of his having been surreptitiously dosed with LSD days earlier by his colleagues. The belated 1975 [admission] ... generated more interest into a series of wildly implausible "mind control" experiments on an unsuspecting populace over three decades. Much of this plot unfolded here, in New York, according to H.P. Albarelli Jr., author of A Terrible Mistake: The Murder of Frank Olson and the CIA's Secret Cold War Experiments. Albarelli spent more than a decade sifting through more than 100,000 pages of government documents and his most startling chestnut might be his claim that the intelligence community conducted aerosol tests of LSD inside the New York City subway system. "The experiment was pretty shocking — shocking that the CIA and the Army would release LSD like that, among innocent unwitting folks," Albarelli told The Post. An Olson colleague, Dr. Henry Eigelsbach, confirmed to Albarelli that the LSD subway test did, in fact, occur in November 1950, albeit on a smaller scale than first planned. Little, however, is known about the test — what line, how many people and what happened.
Note: For lots more reliable information on CIA mind control experiments, click here and here.
[Here's a story] from Ellsberg's book Secrets. The setting is a meeting with Henry Kissinger in late 1968. In 1968 Ellsberg was a highly respected analyst ... who had worked for both the Pentagon and Rand, and Kissinger was just entering the government. Ellsberg told him, "Henry, there's something I would like to tell you. You've dealt a great deal with top secret information. But you're about to receive a whole slew of special clearances, maybe fifteen or twenty of them, that are higher than top secret. First, you'll be exhilarated by some of this new information. But second, ... you will feel like a fool for having studied, written, talked about these subjects, criticized and analyzed decisions made by presidents for years without having known of the existence of all this information. In particular, you'll feel foolish for having literally rubbed shoulders for over a decade with some officials and consultants who did have access to all this ... and you'll be stunned that they kept that secret from you so well. You will feel like a fool. Then, after you've ... become used to using what amounts to whole libraries of hidden information, ... you will forget there ever was a time when you didn't have it. You'll be aware only of the fact that you have it now and most others don't ... and that all those other people are fools. [In] a matter of two or three years — you'll eventually become aware of the limitations of this information. It's often inaccurate, and it can lead you astray. But that takes a while to learn. In the meantime ... you will deal with a person who doesn't have those clearances only from the point of view of what you want him to believe and what impression you want him to go away with. You'll have to lie carefully to him about what you know. In effect, you will have to manipulate him.
Note: Don't miss the entire fascinating, highly revealing article at the link above. To see this quote from Ellsberg's book on Google books, click here. For more on government secrets, see the deeply revealing reports from reliable major media sources available here.
U.S. securities regulators [at the Securities and Exchange Commission] originally treated the New York Federal Reserve's bid to keep secret many of the details of the American International Group bailout like a request to protect matters of national security. The SEC ... agreed to limit the number of SEC employees who would review the document to just two and keep the document locked in a safe while the SEC considered AIG's confidentiality request. The SEC had also agreed that if it determined the document should not be made public, it would be stored "in a special area where national security related files are kept." Emails ... that have become public in recent weeks reveal that some at the New York Fed had gone to great lengths to keep the terms of the bailout private and the SEC may have played a role in contributing to some of the secrecy surrounding the AIG rescue package. "The New York Fed was orchestrating what can only be characterized as an extreme effort to ensure that details of the counterparty deal stayed secret," Rep. Darrell Issa ... said. "More and more it looks as if they would've kept the details of the deal secret indefinitely, it they could have."
Note: So now bank transactions are being considered a matter of "national security." What next? It's becoming ever more apparent that "national security" is used as a catch-all phrase for information that those in power don't want us to know about their secret dealings which benefit themselves at the expense of most of the rest of us.
The investigation of the 2001 anthrax attacks ended as far as the public knew on July 29, 2008, with the death of Bruce Ivins, a senior biodefense researcher at the U.S. Army Medical Research Institute of Infectious Diseases in Fort Detrick, Md. Less than a week after his apparent suicide, the FBI declared Ivins to have been the sole perpetrator of the 2001 Anthrax attacks. The FBI [had] turned the pressure up on him, isolating him at work and forcing him to spend what little money he had on lawyers to defend himself. He became increasingly stressed. Then came his suicide (which, as Eric Nadler and Bob Coen show in their documentary "The Anthrax War," was one of four suicides among American and British biowarfare researchers in past years). But there was still a vexing problem. Silicon was used in the 1960s to weaponize anthrax. Anthrax spores were coated with the substance to prevent them from clinging together so as to create a lethal aerosol. But since weaponization was banned by international treaties, research anthrax no longer contains silicon, and the [anthrax] at Fort Detrick contained none. Ivins, no matter how weird he may have been, had neither the set of skills nor the means to attach silicon to anthrax spores. If Ivins had neither the equipment or skills to weaponize anthrax with silicon, then some other party with access to the anthrax must have done it.
Note: As usual, the FBI tries to pin it on one wacko, when it is clear others most have been involved. Remember that the anthrax attacks occurred as Congress was considering the PATRIOT Act, and were directed in part at key senators opposed to the act. Congress was shut down for a period, and when it reconvened it passed the bill without discussion. For lots more on the antrax attacks as a likely false-flag operation, click here.
Deception [is reliant] on the close control of information, running agents (and double-agents) and creating stories that adversaries will readily believe. In an era of ubiquitous information access, anonymous leaks and public demands for transparency, deception operations are extraordinarily difficult. Nevertheless, successful strategic deception has in the past provided the United States with significant advantages that translated into operational and tactical success. Successful deception also minimizes U.S. vulnerabilities, while simultaneously setting conditions to surprise adversaries. Thus, strategic deception capabilities and plans must perforce be highly classified. Deception cannot succeed in wartime without developing theory and doctrine in peacetime. In order to mitigate or impart surprise, the United States should develop more robust interagency deception planning and action prior to the need for military operations. To be effective, a permanent standing office with strong professional intelligence and operational expertise needs to be established.
Note: The above excerpts can be found on pages 77 and 78. For a powerful two-page summary of a top general's description of how the American public is deceived into supporting war, click here.
Palestinian security agents who have been detaining and allegedly torturing supporters of the Islamist organisation Hamas in the West Bank have been working closely with the CIA, the Guardian has learned. Less than a year after Barack Obama signed an executive order that prohibited torture and provided for the lawful interrogation of detainees in US custody, evidence is emerging the CIA is co-operating with security agents whose continuing use of torture has been widely documented by human rights groups. The relationship between the CIA and the two Palestinian agencies involved – Preventive Security Organisation (PSO) and General Intelligence Service (GI) – is said by some western diplomats and other officials in the region to be so close that the American agency appears to be supervising the Palestinians' work. One senior western official said: "The [Central Intelligence] Agency consider them as their property, those two Palestinian services." A diplomatic source added that US influence over the agencies was so great they could be considered "an advanced arm of the war on terror". Among the human rights organisations that have documented or complained about the mistreatment of detainees held by the PA in the West Bank are Amnesty International, Human Rights Watch, al-Haq and the Israeli watchdog B'Tselem.
Note: For many accounts from major media sources of the horrific abuses committed by military, intelligence and security forces in the wars of occupation in Palestine, Iraq and Afghanistan, click here.
The controversy surrounding Adolf Hitler's skull fragments is a little embarrassing for the Russian secret services. In 2000 they presented a skull fragment and a piece of jawbone that they claimed were the remains of the Nazi leader. It was an attempt to quash outlandish rumors that he had escaped alive at the end of World War II. But in October US researchers presented the results of DNA tests on the skull and said it definitely didn't belong to the dictator because it was from a female. Scientists had already harbored doubts about the authenticity of the piece of bone because it was thinner than a male's usually is. "The bone seemed very thin -- male bone tends to be more robust. It corresponds to a woman between the ages of 20 and 40," said Nick Bellantoni of the University of Connecticut. The position of the exit wound at the back of the skull also made scientists suspicious because eyewitnesses said Hitler had committed suicide by firing into his right temple. Bellantoni said he was allowed to work on the skull for an hour. When he flew home from Moscow he had two samples in his luggage: a sample from the skull fragment and one sample of blood from the sofa on which Hitler is said to have shot himself. Bellantoni was able to compare the bloodstains on the blood-stained fabric with photos the Soviets took after they seized Hitler's bunker in Berlin. The stains had matched those in the photos. The research showed that the sofa blood DNA did not match the skull DNA. The sofa blood was male and the skull belonged to a woman, claimed Bellantoni.
Note: For more on the mysteries surrounding the end of Hitler's life, click here.
The secret overseas "black sites" where the CIA conducted the interrogations are empty now, if not already dismantled. They were never examined by a congressional committee, nor inspected by the international Red Cross. The black sites not only imprisoned men but reduced them to a near helpless state. The aim, as outlined in one document, was to teach every detainee "to perceive and value his personal welfare, comfort and immediate needs more than the information he is protecting." The prisoners' arrival -- almost always in diapers -- was engineered to achieve that end. After being shaved, stripped and photographed nude, detainees were examined by CIA medical and psychological personnel. Then came a preliminary interrogation that would determine the prisoners' fate. Only those considered extremely cooperative would avoid a trio of techniques designed to produce a "baseline, dependent" state: the deprivation of clothes, solid food and sleep. Follow-up sessions would start with the prisoner standing with his back against a wall and a towel or collar to prevent whiplash wrapped around his neck. He could be thrown against the wall just once "to make a point, or 20 to 30 times consecutively." Prisoners so abhorred the repeated slamming that they would remain in so-called stress positions, such as painful kneeling postures, for hours to avoid a return to the wall, according to one Dec. 30, 2004, memo that amounts to a CIA blueprint for breaking a detainee's will. Earlier this year, the Obama administration released a series of Justice Department memos laying out legal rationales for the array of coercive interrogation methods the CIA employed.
Note: For further revelations from major media sources on the illegal methods used by the US government in its wars around the world, click here.
The Justice Department ... made public detailed memos describing brutal interrogation techniques used by the Central Intelligence Agency, as President Obama sought to reassure the agency that the C.I.A. operatives involved would not be prosecuted. In dozens of pages of dispassionate legal prose, the methods approved by the Bush administration for extracting information from senior operatives of Al Qaeda are spelled out in careful detail — like keeping detainees awake for up to 11 straight days, placing them in a dark, cramped box or putting insects into the box to exploit their fears. The interrogation methods were authorized beginning in 2002, and some were used as late as 2005 in the C.I.A.’s secret overseas prisons. The United States prosecuted some Japanese interrogators at war crimes trials after World War II for waterboarding and other methods detailed in the memos. Together, the four memos give an extraordinarily detailed account of the C.I.A.’s methods and the Justice Department’s long struggle, in the face of graphic descriptions of brutal tactics, to square them with international and domestic law. Passages describing forced nudity, the slamming of detainees into walls, prolonged sleep deprivation and the dousing of detainees with water as cold as 41 degrees alternate with elaborate legal arguments concerning the international Convention Against Torture. The revelations may give new momentum to proposals for a full-blown investigation into Bush administration counterterrorism programs and possible torture prosecutions.
Note: For many revealing reports from major media sources on increasing threats to civil liberties, click here.
Most Americans have never heard of Sibel Edmonds, and if the U.S. government has its way, they never will. The former FBI translator turned whistle-blower tells a chilling story of corruption at Washington's highest levels – sale of nuclear secrets, shielding of terrorist suspects, illegal arms transfers, narcotics trafficking, money laundering, espionage. Ms. Edmonds' account is full of dates, places and names. And if she is to be believed, a treasonous plot to embed moles in American military and nuclear installations and pass sensitive intelligence to Israeli, Pakistani and Turkish sources was facilitated by figures in the upper echelons of the State and Defense Departments. Her charges could be easily confirmed or dismissed if classified government documents were made available to investigators. But Congress has refused to act, and the Justice Department has shrouded Ms. Edmonds' case in the state-secrets privilege, a rarely used measure so sweeping that it precludes even a closed hearing attended only by officials with top-secret security clearances. Ms. Edmonds' revelations have attracted corroboration in the form of anonymous letters apparently written by FBI employees. There have been frequent reports of FBI field agents being frustrated by the premature closure of cases dealing with foreign spying, particularly when those cases involve Israel, and the State Department has frequently intervened to shut down investigations based on "sensitive foreign diplomatic relations." Curiously, the state-secrets gag order binding Ms. Edmonds, while put in place by DOJ in 2002, was not requested by the FBI but by the State Department and Pentagon – which employed individuals she identified as being involved in criminal activities. If her allegations are frivolous, that order would scarcely seem necessary.
Note: The author of this article, Philip Giraldi, is a retired career CIA officer. For further powerful details of Sibel Edmonds' revelations, click here.
When the CIA destroyed those prisoner interrogation videotapes, were they also destroying the truth about Sept. 11, 2001? After all, according to the 9/11 Commission report, the basic narrative of what happened on that day - and the nature of the enemy in this war on terror that Bush launched in response to the tragedy - comes from the CIA's account of what those prisoners told their torturers. The commission was never allowed to interview the prisoners, or speak with those who did, and was forced to rely on what the CIA was willing to relay instead. On the matter of the existence of the tapes, we know the CIA deliberately lied. Why should we believe what we've been told about what may turn out to be the most important transformative event in our nation's history? On the basis of what the CIA claimed the tortured prisoners said, President Bush launched ... an endless war that threatens to bankrupt our society both financially and morally. How important were those "key witnesses" to the 9/11 Commission report? Check out the disclaimer on page 146 about the commission's sourcing of the main elements laid out in its narrative: "Chapters 5 and 7 rely heavily on information obtained from captured al Qaeda members ... Assessing the truth of statements by these witnesses ... is challenging. Our access to them has been limited to the review of intelligence reports. We submitted questions for use in the interrogations, but ... were told that our requests might disrupt the sensitive interrogation process." Videos were made of those "sensitive" interrogations, which were accurately described as "torture" by one of the agents involved, John Kiriakou, in an interview with ABC News. Yet when the 9/11 Commission and federal court judges specifically asked for such tapes, they were destroyed by the CIA, which then denied their existence.
Note: Author Robert Scheer goes on to ask what did House Speaker Nancy Pelosi and other key Congressional Democrats know about the torture techniques used by the CIA, and when did they know it? For a powerful summary of many major-media reports raising questions about what really happened on 9/11, click here.
Easily lost, on page 425, in the mass of the CIA's notorious "Family Jewels" files is a short paragraph outlining "potentially embarrassing Agency activities". "Experiments in influencing human behaviour through the administration of mind- or personality-altering drugs to unwitting subjects." Of all the heinous acts committed by the CIA in the name of national security, these experiments, done on the agency's behalf by prominent psychiatrists on innocent victims - including children as young as four - may be the darkest. "We have no answer to the moral issue," former director Richard Helms infamously said when asked about the nature of the projects. The release of the Family Jewels documents revealed the CIA handsomely funded these real-life Dr Strangeloves and engaged pharmaceutical companies to help its experiments. The agency appealed to Big Pharma to pass on any drugs that could not be marketed because of "unfavourable side effects" to be tested on mice and monkeys. Any drugs that passed muster would then be used ... on volunteer US soldiers. The Family Jewels files do not provide further detail into the numerous mind-control programs, such as MKULTRA, covertly propped up by the agency. In 1953, MKULTRA was given 6 per cent of the total CIA budget without any oversight. The nature of the experiments, gathered from government documents and testimony in numerous lawsuits brought against the CIA, is shocking, from testing LSD on children to implanting electrodes in victims' brains to deliberately poisoning people with uranium. "The CIA bought my services from my grandfather in 1952 starting at the tender age of four," wrote Carol Rutz of her experiences.
Note: The entire body of the CIA's "Family Jewels" documents have been posted online by the National Security Archives, and can be read by clicking here. And for a 10-page summary of Carol Rutz's riveting book on her experiences as a government-created Manchurian candidate, click here.
New charges have been filed alleging that a former top CIA official pushed a proposed $100 million government contract for his best friend in return for lavish vacations, private jet flights and a lucrative job offer. The indictment [brings] charges ... against Kyle “Dusty” Foggo, who resigned from the spy agency a year ago, and ... defense contractor Brent Wilkes. The charges grew from the bribery scandal that landed former U.S. Rep. Randy “Duke” Cunningham in prison. The pair now face 30 wide-ranging counts of fraud, conspiracy and money laundering [including that] Foggo provided Wilkes with “sensitive, internal information related to ... national security,” including classified information, to help him prepare proposals for providing undercover flights for the CIA under the guise of a civil aviation company and armored vehicles for agency operations. Then, he pushed his CIA colleagues to hire Wilkes’ companies without disclosing their friendship, prosecutors allege. In a June 2005 e-mail to the head of CIA air operations quoted in the indictment, Foggo offered to “use some ’EXDIR grease”’ on Wilkes’ behalf. Foggo was the agency’s executive director at the time. In return, Wilkes offered to hire Foggo after he retired from government service. [An] initial indictment in February charged the pair with 11 counts of the same charges in connection with a $1.7 million water-supply contract Foggo allegedly helped win for one of Wilkes’ companies while he was working as a logistics coordinator at a CIA supply hub overseas. Foggo, the former No. 3 official at the CIA, resigned from the spy agency after his house and office were raided by federal agents.
Note: Until just a few years ago, there was a virtual blackout in the media on any negative coverage of the CIA. The prosecution of the #3 man in the CIA is an external manifestation of huge shake-ups going on behind the scenes. Buzzy Krongard, the previous #3 at the CIA has been linked to the millions of dollars in suspicious stock option trades made just prior to 9/11 that were never claimed, though this received little media coverage.
The Taliban ... briefly banned poppy cultivation in 2000 in an effort to gain U.S. diplomatic recognition and aid. When the Bush administration invaded Afghanistan in October 2001, poppies were grown on only 7,600 hectares. Under the American occupation ... poppy cultivation spread to every province, and overall production has increased exponentially ever since -- this year by 60 percent. Within Afghanistan, where perhaps 3 million people draw direct income from poppy, profits may reach $3 billion this year. In-country profit adds up to an estimated 60 percent of Afghanistan's gross domestic product, or more than half the country's annual income. Afghanistan provides 92 percent of the world's heroin. Through many administrations, the U.S. government has been implicated in the Afghan drug trade. Before the American and Pakistani-sponsored mujahedeen took on the Soviets in 1979, Afghanistan produced a very small amount of opium for regional markets, and no heroin at all. By the end of the jihad against the Soviet army, it was the world's top producer of both drugs. The CIA made it all possible by providing legal cover for these operations. The United States [encouraged] Islamist extremists (then "our" soldiers) and ... set the stage for the Taliban. [Currently,] President Hamid Karzai['s] strategy is to avoid confrontation, befriend potential adversaries and give them offices, often in his Cabinet. The trade penetrates even the elected Parliament. Among the 249 members of the Wolesi Jirga (lower house) are at least 17 known drug traffickers, in addition to 40 commanders of armed militias, 24 members of criminal gangs, and 19 men facing serious allegations of war crimes.
Note: Could it be that some U.S. officials are turning a blind eye, or even supporting this drug trade? For some very strong evidence of this from a former award-winning DEA agent turned journalist and author, click here.
Nearly all members of the House of Representatives opted out of a chance to read this year's classified intelligence bill, and then voted on secret provisions they knew almost nothing about. The bill, which passed by 327 to 96 in April, authorized the Bush administration's plans for fighting the war on terrorism. Many members say they faced an untenable choice: Either consent to a review process so secretive that they could never mention anything about it in House debates, under the threat of prosecution, or vote on classified provisions they knew nothing about. Most chose to know nothing. A Globe survey sent to all members of the House, [revealed] the vast majority of the respondents ... said they typically don't read the classified parts of intelligence bills. The failure to read the bill, however, calls into question the vows of many House members to provide greater oversight of intelligence. The rules make open debate on intelligence policy and funding nearly impossible, lawmakers say. Revealing classified secrets has long been a crime, punishable by expulsion from the House and criminal prosecution. Operating largely in secret, the intelligence panels have a limited staff because of the security clearances involved. Further, committee members can't go to outside experts to vet policies or give advice, leaving members with no way to fact-check the administration's assertions. Democratic and Republican leaders are no longer briefed together, raising questions about whether the two leaders are being told the same things.
Note: If above link fails, click here. If you want to understand how U.S. Congressional representatives are kept in the dark and easily manipulated when it comes to intelligence matters, this article is a must read.
The Department of Defense forbade a military intelligence officer to testify Wednesday about a secret military unit that the officer says identified four Sept. 11 hijackers as terrorists more than a year before the attacks, according to the man's attorney. The Judiciary Committee was hearing testimony about the work of a classified unit code named "Able Danger." Zaid, appearing on behalf of Shaffer and contractor John Smith [stated] that Able Danger, using data mining techniques, identified four of the terrorists who struck on Sept. 11, 2001 - including mastermind Mohamed Atta. "At least one chart, and possibly more, featured a photograph of Mohamed Atta," Zaid said. Maj. Paul Swiergosz, a Defense Department spokesman, said Wednesday that open testimony would not be appropriate. "There's nothing more to say than that," Swiergosz said. "It's not possible to discuss the Able Danger program because there are security concerns." Zaid also charged that records associated with the unit were destroyed during 2000 and March 2001, and copies were destroyed in spring 2004. Former members of the Sept. 11 commission have dismissed the "Able Danger" assertions.
John K. Vance [was] a member of the Central Intelligence Agency inspector general's staff in the early 1960s who discovered that the agency was running a research project that included administering LSD and other drugs to unwitting human subjects. Code-named MKULTRA (and pronounced m-k-ultra), the project Mr. Vance uncovered was the brainchild of CIA Director Allen Dulles, who was intrigued by reports of mind-control techniques allegedly conducted by Soviet, Chinese and North Korean agents on U.S. prisoners of war during the Korean War. The CIA wanted to use similar techniques on its own POWs and perhaps use LSD or other mind-bending substances on foreign leaders, including Cuba's Fidel Castro a few years after the project got underway in 1953. Heading MKULTRA was a CIA chemist named Sidney Gottlieb. In congressional testimony, Gottlieb, who died in 1999, acknowledged that the agency had administered LSD to as many as 40 unwitting subjects, including prison inmates and patrons of brothels set up and run by the agency. At least one participant died when he jumped out of a 10th-floor window in a hotel; others claimed to have suffered serious psychological damage. Mr. Vance learned about MKULTRA in the spring of 1963 during a wide-ranging inspector general survey of the agency's technical services division. The inspector general's report said: "The concepts involved in manipulating human behavior are found by many people both within and outside the agency to be distasteful and unethical." MKULTRA came to public light in 1977 as a result of hearings conducted by a Senate committee on intelligence chaired by Sen. Frank Church (D-Idaho).
Note: If the above link fails, click here. For an excellent two-page summary of reliable verifiable information on CIA mind control programs which clearly violated ethical and moral standards, click here.
The FBI has moved to fire a veteran agent who alleged that the bureau had mishandled domestic investigations. On Thursday, Robert Wright was ordered by superiors at an FBI counterterrorism command office in Washington to hand over his badge and weapon, was suspended and was told he would be fired within 30 days, said an official with Judicial Watch, a government watchdog group whose attorneys represent Wright. Wright was told he was being dismissed for, among other things, publicly discussing sensitive FBI matters in 2003, the official said. Wright has been under disciplinary investigation for almost three years. He has two lawsuits pending against the FBI. Yesterday, Sens. Charles E. Grassley (R-Iowa) and Patrick J. Leahy (D-Vt.) sent FBI Director Robert S. Mueller III a letter repeating their support for Wright and expressing concern that the FBI was retaliating against him for his public statements.
Note: What the Post article completely fails to mention is that Robert Wright was hot on the trail of key terrorists before 9/11, yet he was ordered to stop the investigation by his FBI supervisors. For past media stories on this with links to original sources, click here, here, and here. Mr. Wright is one of the FBI agents who approached renowned attorney David Schippers just weeks before 9/11 to warn that a major terrorist attack was going to take place in lower Manhattan. For more, click here.
In the frenzied days after Sept. 11, 2001, when some flights were still grounded, dozens of well-connected Saudis, including relatives of Osama bin Laden, managed to leave the United States on specially chartered flights. Newly released government records show previously undisclosed flights ... and point to a more active role by the Federal Bureau of Investigation in aiding some of the Saudis in their departure. The F.B.I. gave personal airport escorts to two prominent Saudi families who fled the United States, and several other Saudis were allowed to leave the country without first being interviewed. The material ... provides details about the F.B.I.'s interaction with at least 160 Saudis who were living in or visiting the United States and were allowed to leave the country. Some of the departing Saudis were related to Osama bin Laden. In several ... cases, Saudi travelers were not interviewed before departing the country, and F.B.I. officials sought to determine how what seemed to be lapses had occurred. "From these documents, [the Saudi interviews that did occur] look like they were courtesy chats, without the time that would have been needed for thorough debriefings," said Christopher J. Farrell, who is ... a former counterintelligence interrogator for the Army. "It seems as if the F.B.I. was more interested in achieving diplomatic success than investigative success." The F.B.I. documents left open the possibility that some departing Saudis had information relevant to the Sept. 11 investigation.
Note: For lots more crucial, verifiable information suggesting a 9/11 cover-up, click here.
The F.B.I. has failed to aggressively investigate accusations of espionage against a translator at the bureau and fired the translator's co-worker in large part for bringing the accusations, the Justice Department's inspector general concluded. In a long-awaited report that the Justice Department sought for months to keep classified, the inspector general issued a sharp rebuke to the F.B.I. over its handling of claims of espionage and ineptitude made by Sibel Edmonds, a bureau translator who was fired in 2002 after superiors deemed her conduct "disruptive." The report [came] from the office of Glenn A. Fine, the Justice Department's inspector general. Mr. Fine's investigation found that many of Ms. Edmonds's accusations "were supported, that the F.B.I. did not take them seriously enough and that her allegations were, in fact, the most significant factor in the F.B.I.'s decision to terminate her services." Ms. Edmonds's case has become a cause célčbre for critics who accused the bureau of retaliating against her and other whistle-blowers who have sought to expose management problems related to the campaign against terrorism. The American Civil Liberties Union joined her cause earlier this week, asking an appellate court to reinstate a whistle-blower lawsuit she brought against the government. The suit was dismissed last year after Attorney General John Ashcroft, invoking a rarely used power, declared her case to be a matter of "state secret" privilege, and the Justice Department retroactively classified a 2002 Congressional briefing about it.
Note: What this article completely fails to mention is that Ms. Edmonds has claimed repeatedly that she has key information revealing major corruption related to 9/11. For a highly revealing report written by Ms. Edmonds to the 9/11 Commission chairman, click here. Another highly revealing article is available here. The Times link above requires payment. To view the above article free, click here.
The FBI used murderers as informants in Boston for three decades, even allowing innocent men to be sentenced to death to protect the secret operation, a government report has found. The FBI's policy "must be considered one of the greatest failures in the history of federal law enforcement" and had "disastrous consequences", the report by the House Committee on Government Reform said. More than 20 people were murdered by FBI informants in Boston from 1965, often with the help of FBI agents, it said. But no FBI agent or official has ever been disciplined. The FBI's policy of using murderers grew out of a belated effort by a former director, J. Edgar Hoover, to go after the Mafia, which Hoover had earlier denied even existed. In the early 1960s, the bureau began recruiting underworld informers in its new campaign. The report focuses heavily on one episode, the 1965 murder of Edward Deegan, a small-time hoodlum who was killed by Jimmy Flemmi and Joseph Barboza, who had just been recruited by an FBI agent in Boston. The FBI knew the two men were the killers because it had been using an unauthorised wire tap and had heard Flemmi ask the Mafia boss, Raymond Patriarca, for permission to kill Deegan. A few days later, Deegan was shot dead. Four men who had nothing to do with the killing were tried and convicted, with two sentenced to death and two to life in prison. Two of the men died in prison and two had their sentences commuted and were freed after serving 30 years behind bars. Hoover was kept fully informed about this murder and the wrongful convictions, the report said.
A 12-year veteran FBI agent is under investigation for alleged insubordination following his appearances on ABC News programs and a recent press conference in Washington, D.C., in which he criticized the bureau's efforts to combat terrorism, according to the agent's attorney. Special Agent Robert Wright ... began tracking terrorists in the Chicago area in the mid-1990s for the Terrorism Task Force. He says he soon became frustrated when he was ordered by his superiors at the FBI Intelligence Division not to make any arrests of suspected terrorists. According to Wright, he was ordered to drop his investigation into a suspected terror financier whose name had arisen during the investigation into the bombings of two American embassies in East Africa in 1998, in which at least 224 people were killed. Wright and his partner John Vincent, who has since retired from the FBI, said that the money trail uncovered in the embassy bombing probe led to, among others, a powerful Saudi Arabian businessman, Yassin Qadi, who had extensive business and financial ties in Chicago. "Two months after the embassies are hit in Africa they want to shut down the criminal investigation. They wanted to kill it," Wright said. Last year, Wright told ABC News that he had more to say about the failures of the Terrorism Task Force. "There's so much more," he said. "God, there's so much more."
Note: For other media articles giving more detailed information on Wright's allegations, click here and here. For deeply revealing reports from reliable major media sources on intelligence agency corruption, click here.
Weeks before the terrorist attacks on 11 September, the United States and the United Nations ignored warnings from a secret Taliban emissary that Osama bin Laden was planning a huge attack on American soil. The warnings were delivered by an aide of Wakil Ahmed Muttawakil, the Taliban Foreign Minister at the time, who was known to be deeply unhappy with the foreign militants in Afghanistan, including Arabs. The minister then ordered him to alert the US and the UN about what was going to happen. The message was disregarded because of what sources describe as "warning fatigue". At the same time, the FBI and the CIA failed to take seriously warnings that Islamic fundamentalist students had enrolled in flight schools across the US. Mr Muttawakil's aide, who has stayed on in Kabul and who has to remain anonymous for his security, described in detail to The Independent how he alerted first the Americans and then the United Nations of the coming calamity of 11 September.
Note: If the above link fails, click here. For many other revealing major media articles raising serious questions about what happened on 9/11, click here.
Millions saw the horrific images of the World Trade Center attacks. But a New Jersey homemaker saw something that morning that prompted an investigation into five young Israelis and their possible connection to Israeli intelligence. Maria ... had a view of the World Trade Center from her New Jersey apartment building. But as she watched the disaster, something else caught her eye. She saw three young men kneeling on the roof of a white van in the parking lot of her apartment building. "They seemed to be taking a movie," Maria said. The men were taking video or photos of themselves with the World Trade Center burning in the background, she said. "They were like happy ... I thought it was very strange," she said. She found the behavior so suspicious that she wrote down the license plate number of the van and called the police. A statewide bulletin was issued on the van. The plate number was traced to a ... company called Urban Moving. A police officer pulled the van over, finding five men, between 22 and 27 years old, in the vehicle. Arresting officers said they saw a lot that aroused their suspicion. One of the passengers had $4,700 in cash hidden in his sock. Another was carrying two foreign passports. The five men identified themselves as Israeli citizens. The case was transferred ... into the [FBI's] Foreign Counterintelligence Section, which is responsible for espionage cases. The FBI believed Urban Moving may have been providing cover for an Israeli intelligence operation.
Note: Yet a later Washington Post article states the five were eventually released, even though "when authorities arrested them they had box-cutters in their moving van, the types of weapons used by the terrorist hijackers." For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
Two months before September 11 Osama bin Laden flew to Dubai for 10 days for treatment at the American hospital, where he was visited by the local CIA agent, according to the French newspaper Le Figaro. Bin Laden is reported to have arrived in Dubai on July 4 from Quetta in Pakistan with his own personal doctor, nurse and four bodyguards, to be treated in the urology department. While there he was visited by several members of his family and Saudi personalities, and the CIA. The CIA chief was seen in the lift, on his way to see Bin Laden, and later, it is alleged, boasted to friends about his contact. Intelligence sources say that another CIA agent was also present; and that Bin Laden was also visited by Prince Turki al Faisal, then head of Saudi intelligence, who had long had links with the Taliban, and Bin Laden. The American hospital in Dubai emphatically denied that Bin Laden was a patient there. Washington last night also denied the story. Bin Laden has often been reported to be in poor health. Some accounts claim that he is suffering from Hepatitis C, and can expect to live for only two more years. According to Le Figaro, last year he ordered a mobile dialysis machine to be delivered to his base at Kandahar in Afghanistan.
Note: For many unanswered questions about the official account of 9/11 asked by highly-respected professors and officials, click here and here.
In the first days after the terror attacks on New York and Washington, Saudi Arabia supervised the urgent evacuation of 24 members of Osama bin Laden's extended family from the United States, fearing that they might be subjected to violence. Most of Mr. bin Laden's relatives were attending high school and college. They are among the 4,000 Saudi students in the United States. King Fahd, the ailing Saudi ruler, sent an urgent message to his embassy here saying there were "bin Laden children all over America" and ordered, "Take measures to protect the innocents," the ambassador said. The young members of the bin Laden clan were driven or flown under F.B.I. supervision to a secret assembly point in Texas and then to Washington from where they left the country on a private charter plane when airports reopened three days after the attacks. A majority of the men who hijacked four airliners in the attacks carried Saudi passports. Surprisingly, Osama bin Laden was not a stranger even to a royal family member like Prince Bandar. In the early 1980's, bin Laden came to greet the prince and thank him for helping to build the coalition that fought against the Soviet occupation in Afghanistan. Mr. bin Laden is one of 52 children of a Yemeni-born migrant who made a vast fortune building roads and palaces in Saudi Arabia.
Note: Should the above link fail to function, click here. For a Boston Globe article on this key topic, click here. For more detailed information which both the Times and Globe neglected to report, click here.
Federal authorities have been aware for years that suspected terrorists with ties to Osama bin Laden were receiving flight training at schools in the United States and abroad, according to interviews and court testimony. Three days after the attack on the Pentagon and the World Trade Center, FBI Director Robert S. Mueller III described reports that several of the hijackers had received flight training in the United States as "news, quite obviously," adding, "If we had understood that to be the case, we would have -- perhaps one could have averted this." A senior government official yesterday acknowledged law enforcement officials were aware that ... a dozen people with links to bin Laden had attended U.S. flight schools. Abdul Hakim Murad ... was arrested in Manila in 1995 and later convicted in New York of plotting to blow up a dozen U.S. airliners over the Pacific, then crash a suicide plane into CIA headquarters. According to law enforcement officials and press reports, the 19 suspected terrorists received flight training from at least 10 U.S. flight schools. At least 44 people sought by the FBI for questioning received some flight instruction.
Note: Why did the upper levels of the FBI "not know" about the suspicious people in US flight schools, when so many lower-level FBI personnel were desperately trying to inform them of these facts? For many other unanswered questions about the official account of 9/11 from highly respected professionals, click here and here.
The disclosure that the Federal Bureau of Investigation withheld documents from Timothy McVeigh's lawyers seems certain to ignite a controversy that will burn for years, perhaps decades. ''If any questions or doubts remain about this case, it would cast a permanent cloud over justice,'' said Attorney General John D. Ashcroft in delaying Mr. McVeigh's execution until at least June 11. But for some people the cloud has been there all along, and always will be. They will never accept the government's assertion that the withholding of the documents was simple human, bureaucratic error. And so the 1995 bombing of a federal office building in Oklahoma City seems likely to join the assassinations of John F. Kennedy and the Rev. Dr. Martin Luther King Jr. as events whose truth -- in the eyes of some Americans -- is forever untold. ''Gee, how did that happen?'' Charles Key, a former member of the Oklahoma House of Representatives, said in sarcastic response to the news that the McVeigh defense team had been denied evidence held by the government. Mr. Key, who lives in Oklahoma City, said he has always been convinced that Mr. McVeigh had accomplices beyond Terry Nichols, the other person convicted in the bombing. The government has not pursued the case aggressively, he said, because the full truth would be too damning.
Note: There is an abundance of solid information that the Oklahoma City bombing was manipulated in major ways. For two revealing AP articles on the FBI concealing evidence, click here and here. For news reports that there were undetonated bombs in the building, sharply contradicting the official story click here and here.
For a quarter of a century, [Eric Olson] has believed that the Central Intelligence Agency murdered his father, a United States government scientist. On Nov. 28, 1953, around 2 a.m. [the] night manager at the Statler Hotel ... in New York rushed out the front door ... to find a middle-aged man lying on the sidewalk. The man had fallen from the 10th floor -- apparently after crashing through a closed window. [In late July, 1975] the C.I.A.'s director, William Colby [provided Olson's] family ... declassified documents relating to Frank Olson's death. Olson had not been a civilian employee of the Department of the Army. He had been a C.I.A. employee working at Fort Detrick. Olson's specialty, it turned out, had been the development of aerosols for the delivery of anthrax. The Colby documents were ... full of unexplained terms like the ''Artichoke'' and ''Bluebird'' projects. These turned out to be the precursors of what became known as MK-ULTRA, a C.I.A. project, beginning in the Korean War, to explore the use of drugs like LSD as truth serums, as well as botulism and anthrax, for use in covert assassination. The documents claimed that during a meeting between the C.I.A. and Fort Detrick scientists ... on Nov. 19,1953, Sidney Gottlieb of the C.I.A. slipped LSD into Olson's glass of Cointreau. Olson, a scientist by training, would have known that he was working for a government that had put Nazi scientists on trial at Nuremberg for immoral experiments on human beings. Now, in the late summer of 1953, [Olson] faced up to the possibility that his own government was doing the same thing. Slipping LSD into Olson's Cointreau was ... designed to get him to talk ... to assess what kind of risk he posed and then eliminate him if necessary.
Note: For those interested in this vital, yet disturbing topic, the entire Times article is well worth reading. For further verifiable information on the CIA mind control programs mentioned in this article, click here.
The CIA is acknowledging for the first time the extent of its deep involvement in Chile, where it dealt with coup-plotters, false propagandists and assassins. The agency [released] a declassified report required by the U.S. Congress. Despite the disclosures, the CIA report admits to no abuses or cover-up by CIA agents. But it chronicles clandestine contacts authorized by then-U.S. President Richard Nixon and other top U.S. officials which it said would violate standards now upheld by the agency. Among the disclosures: The CIA had prior knowledge of the plot that overthrew Allende three years later. The CIA supported a kidnapping attempt of Chile's army chief in October 1970, as part of a plot to prevent the congressional confirmation of Allende as president. The kidnapping attempt failed, and Gen. Rene Schneider was shot and killed. The CIA later paid $35,000 to the kidnappers in what it termed "humanitarian" assistance. The CIA made a one-time payment to secret police head Gen. Manuel Contreras Sepulveda, the head of the military regime's feared secret police. He was sentenced in 1993 for killing Chilean socialist leader Orlando Letelier in Washington in 1976. Contreras has said the CIA was behind the assassination. The report also describes efforts to influence news media in Chile against Allende and to continue anti-leftist propaganda efforts by successor Pinochet, "including support for news media committed to creating a positive image for the military Junta" now accused of an array of abuses during his 17-year rule, including more than 3,000 killings.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
The Central Intelligence Agency's secret history of its covert operation to overthrow Iran's government in 1953 offers an inside look at how the agency stumbled into success, despite a series of mishaps that derailed its original plans. Written in 1954 by one of the coup's chief planners, the history details how United States and British officials plotted the military coup that returned the shah of Iran to power and toppled Iran's elected prime minister, an ardent nationalist. The document shows that: * The C.I.A. and S.I.S., the British intelligence service, handpicked Gen. Fazlollah Zahedi to succeed Prime Minister Mohammed Mossadegh and covertly funneled $5 million to General Zahedi's regime two days after the coup prevailed. * Iranians working for the C.I.A. and posing as Communists harassed religious leaders and staged the bombing of one cleric's home in a campaign to turn the country's Islamic religious community against Mossadegh's government.
Note: For the complete text of this major report in single-page format, click here.
A handful of military personnel from the 4th Psychological Operations Group, based at Fort Bragg, NC, have until recently been working in CNN's headquarters in Atlanta. [A] Dutch journalist named Abe de Vries came up with this important story ... and remains properly astounded that no mainstream news medium in the US has evinced any interest in it. De Vries ... originally [came] upon the story [following] a military symposium in Arlington, VA that discussed the use of the press in military operations. De Vries saw a good story, picked up the phone, and finally reached Maj. Thomas Collins of the US Army Information Service, who duly confirmed the presence of these Army psy-ops experts at CNN. "Psy-ops personnel, soldiers, and officers," De Vries quoted Collins as telling him, "have been working in CNN's headquarters ... through our program, training with industry. They helped in the production of news." Eason Jordan, who identified himself as CNN's president of news-gathering and international networks, [confirmed] that CNN had hosted a total of five interns from US Army psy-ops. Jordan said the program began ... just before the end of the war against Serbia and only recently terminated. Executives at CNN now describe the Army psy-ops intern tours at CNN as having been insignificant. The commanding officer of the psy-ops group certainly thought them of sufficient significance to mention at that high-level Pentagon powwow in Arlington about propaganda and psychological warfare.
Note: This article strangely has been removed from the Los Angeles Times archives. The link above shows a scanned image of the actual newspaper. The article was first published in the San Jose Mercury News on March 23, 2000, though the article is also strangely not available in their archives. U.S. Congressional testimony in the 1970s revealed that the CIA paid employees of major media networks to influence public opinion. The CIA's Operation Mockingbird revealed blatant efforts by the CIA to manipulate public opinion in the U.S., thus violating its charter.
Melvin Goodman was a senior analyst in Soviet affairs at the Central Intelligence Agency, where he worked for two decades (1966-1986). He currently is professor of international studies at the National War College. [In the CIA], not only do you have political assassinations -- attempts at least -- throughout the Fifties and the Sixties ... but you even have assassination attempts against international leaders: the Mongoose operation in Cuba [and] assassination attempts in Chile, where you were dealing with a country that wasn't even in the vital national interests or concerns of the United States. All of these assassination attempts were done with the authorization of the White House. I think the major problem at the CIA -- and it exists to this day -- is that you have two cultures. You have an intelligence or analytical culture that must remain open. The opposite of that is the clandestine side: it's secret, it's a policy branch of the government. The White House basically uses the operational component of the CIA to do its bidding. It's very useful to have a clandestine corps to carry out military or paramilitary actions very cheaply, without the hand of the United States or a particular president being obvious. In many ways, you're getting worst-case assessments, because quite often the contacts of the CIA are people on the CIA payroll, telling the CIA what these people believe the CIA wants to know -- in return for payment. So the whole tradecraft is somewhat suspicious and somewhat corrupt from the very outset.
Note: Melvin Goodman is one of many senior government officials who question the government's 9/11 story. For his comments on this, click here. For other senior officials with similar sentiments, click here.
For decades in art circles it was either a rumour or a joke, but now it is confirmed as a fact. The Central Intelligence Agency used American modern art - including the works of such artists as Jackson Pollock, Robert Motherwell, Willem de Kooning and Mark Rothko - as a weapon in the Cold War. The CIA fostered and promoted American Abstract Expressionist painting around the world for more than 20 years. This was a period, in the 1950s and 1960s, when the great majority of Americans disliked or even despised modern art. Why did the CIA support them? Because in the propaganda war with the Soviet Union, this new artistic movement could be held up as proof of the creativity, the intellectual freedom, and the cultural power of the US. Russian art, strapped into the communist ideological straitjacket, could not compete. The existence of this policy, rumoured and disputed for many years, has now been confirmed for the first time by former CIA officials. The decision to include culture and art in the US Cold War arsenal was taken as soon as the CIA was founded in 1947. Dismayed at the appeal communism still had for many intellectuals and artists in the West, the new agency set up a division, the Propaganda Assets Inventory, which at its peak could influence more than 800 newspapers, magazines and public information organisations. They joked that it was like a Wurlitzer jukebox: when the CIA pushed a button it could hear whatever tune it wanted playing across the world. Unknown to the artists, the new American art was secretly promoted under a policy known as the "long leash." [This] centrepiece of the CIA campaign ... a vast jamboree of intellectuals, writers, historians, poets, and artists ... was set up with CIA funds in 1950 and run by a CIA agent. At its height, it had offices in 35 countries and published more than two dozen magazines.
Note: Read the entire article at the link above to learn how the CIA secretly funnels money through cooperative millionaires. To this day, the CIA has agents in key press positions to stop stories they don't want or to promote their own pieces widely in the media. For more along these lines, see concise summaries of deeply revealing media corruption news articles and intelligence agency news articles, all from reliable major media sources.
Canada has agreed to compensate victims of psychiatric experiments carried out mainly in the 1950s and financed in part by the Central Intelligence Agency. An institute at McGill University in Montreal, headed by Dr. D. Ewen Cameron, a psychiatrist, ... was one of the centers where such experiments were carried out. Now, the Canadian Government says the 80 or so patients who underwent the so-called "psychic driving" treatment in Montreal ... can receive almost $80,000 each. The patients at the Allan Memorial Institute at McGill were put into a drugged sleep for weeks or months, subjected to electroshock therapy until they were "de-patterned," knowing neither who or where they were, and forced to listen repeatedly to recorded messages broadcast from speakers on the wall or under their pillows. Linda Macdonald, 55 years old, an employment counselor now in Vancouver, is one of those who sued for compensation. "I walked through those doors with a husband on one arm and a guitar on the other and was a healthy person and coherent," she said. She spent 86 days in the "sleep room" and was subjected to 109 shock treatments and megadoses of barbiturates and other drugs. When she got out of the experiment, she could not read or write, had to be toilet-trained and could not remember her husband, her five children or any part of the first 26 years of her life. John Marks, a former State Department official whose 1979 book, The Search For the Manchurian Candidate, called attention to the experiments, said that a C.I.A. front called the Society for the Investigation of Human Ecology funneled more than $60,000 to Dr. Cameron for the studies. Ottawa gave him more than $200,000.
Note: Dr. Cameron was once President of the American and World Psychiatric Associations. For a concise summary of the CIA's mind control experiments, click here.
REPRESENTATIVE JACK BROOKS, Democrat of Texas. Colonel North, in your work at the N.S.C., were you not assigned, at one time, to work on plans for the continuity of government in the event of a major disaster? SENATOR DANIEL K. INOUYE, Democrat of Hawaii. I believe that question touches upon a highly sensitive and classified area so may I request that you not touch upon that. MR. BROOKS. I was particularly concerned, Mr. Chairman, because I read in Miami papers, and several others, that there had been a plan developed, by that same agency, a contingency plan in the event of emergency, that would suspend the American Constitution. And I was deeply concerned about it and wondered if that was the area in which he had worked. I believe that it was, and I wanted to get his confirmation. MR. INOUYE. May I most respectfully request that that matter not be touched upon, at this stage. If we wish to get into this, I'm certain arrangements can be made for an executive session.
Note: Why was the chairman not allowing a discussion of the fact that plans were being made in the event of an emergency for the suspension of the U.S. Constitution? To watch a two-minute video which includes this testimony, click here.
Some of President Reagan’s top advisers have operated a virtual parallel government outside the traditional Cabinet departments and agencies almost from the day Reagan took office, congressional investigators and administration officials have concluded. Investigators believe that the advisers’ activities extended well beyond the secret arms sales to Iran and aid to the contras now under investigation. Lt. Col. Oliver North, for example, helped draw up a controversial plan to suspend the Constitution in the event of a national crisis, such as nuclear war, violent and widespread internal dissent or national opposition to a U.S. military invasion abroad. The advisers conducted their activities through secret contacts throughout the government with persons who acted at their direction but did not officially report to them. The activities of those contacts were coordinated by the National Security Council, the officials and investigators said. There appears to have been no formal directive for the advisers’ activities, which knowledgeable sources described as a parallel government. In a secret assessment of the activities, the lead counsel for the Senate Iran-contra committee called it a “secret government-within-a-government.” The arrangement permitted Reagan administration officials to claim that they were not involved in controversial or illegal activities, the officials said. “It was the ultimate plausible deniability,” said a well-briefed official who has served the Reagan administration since 1982 and who often collaborated on covert assistance to the Nicaraguan contras.
Note: See a downloaded copy of this article and the amazing full text. A recent Boston Globe article suggests that US national security policy continues to be made by concealed, unaccountable institutions within a corrupt government.
Delphi Associates ... is a struggling three-man partnership formed to cash in on the fruits of its founders' psychic research. "This is not just an amusing exercise," says Anthony R. White, a Stanford University M.B.A., art investor and manager of a family fortune. The research heavyweight is Russell Targ, a physicist who built sophisticated lasers for GTE Sylvania Inc. until 1972, then spent the next 10 years doing hush-hush, still "classified," psychic research for the federal government at SRI [Stanford Research Institute], the sober California think tank. At SRI, [Targ] concentrated on remote-viewing, the ability of one viewer to "see" what another person -- the "beacon" -- is looking at even though the beacon may be thousands of miles away. By 1982, Mr. Targ says, "We'd shown unequivocally that people could describe distant locations as well as events that lie in the future." One of Delphi's first commercial ventures was its foray into the silver-futures market. Delphi tried to forecast roughly how much silver prices would change between Thursday's closing and Monday's closing prices. In all of the first nine tries, Keith Harary, the most psychic partner, made correct predictions. The investors ... made "in the middle six figures," and Delphi got a commission. Alas, the power proved fickle. "Our major client suffered an attack of hubris and started pressing us for more predictions," says Mr. White. Delphi failed on the next two tries. "It was a difficult blow for all of us," Mr. White says. "The existence of psychic functioning shows that there is something fundamentally incorrect about the prevailing view of how space and time are understood," Mr. Targ says.
Note: The above link requires a small payment. To view the full article free, click here. For a great Washington Post article with valuable information on remote viewing, click here. For other amazing and intriguing information on the now-declassified government remote viewing program, click here.
Agents of the Federal Bureau of Investigation committed widespread acts of unauthorized lawlessness including the burning of automobiles, assaults and illegal wiretapping, while conducting internal security investigations in the last five years, law enforcement sources said. Militant antiwar activists at Queens College in Flushing were one target of illegal and unauthorized electronic surveillance. Agents placed illegal "wildcat" telephone taps and electronic bugs, the sources said, ... because these were often the best methods of getting intelligence on militant leftist activity. Agents would disguise the source of the information in their reports to make it appear that it came from live informants. One source said, however, that he believed that supervisory F.B.I. personnel were "aware" that information was coming from taps but did nothing about it. Car burnings and assaults upon individuals in the radical left were efforts to disrupt antiwar activity. The cars were set afire with "Molotov cocktails" made from glass bottles filled with gasoline. This was done in such a manner as to appear to have been an attack by another extremist group. Cars were also disabled to strand suspects during a surveillance. Agents, the sources said, from time to time "roughed up" radical antiwar figures to frighten them or to disrupt a demonstration or protest activity. At least one radical was kidnapped for the same reason. One source said that the victim of a beating was never seriously hurt because agents did not want to create a situation that might be traced to the bureau. The victim, this source said, would not know he was attacked by bureau men.
Note: The above link requires a small payment to view the article on the Times website. To view it free, click here. For deeply revealing reports from reliable major media sources on intelligence agency corruption, click here.
The Central Intelligence Agency is getting a very bad press in dispatches from Vietnam to American newspapers and in articles originating in Washington. The agency is precluded from [giving] information to the press, under a seal of confidence, that challenges or refutes the critics ... because to do so would require some disclosure of its activities. Every President since the C.I.A. was created has protected this secrecy. This Presidential policy has not, however, always restrained other executive units from going confidentially to the press with attacks on C.I.A. operations. The peak of the practice has recently been reached in Vietnam and in Washington. This is revealed almost every day now in dispatches from reporters ... with excellent reputations for reliability. One reporter in this category is Richard Starnes, [who] related that, "according to a high United States source here, twice the C.I.A. flatly refused to carry out instructions from Ambassador Henry Cabot Lodge ... [and] in one instance frustrated a plan of action Mr. Lodge brought from Washington because the agency disagreed with it." Among the views attributed to United States officials on the scene, including one described as a "very high American official ... are the following: The C.I.A.'s growth was "likened to a malignancy" which the "very high official was not sure even the White House could control ... any longer." "If the United States ever experiences [an attempt at a coup to overthrow the Government] it will come from the C.I.A. and not the Pentagon." The agency "represents a tremendous power and total unaccountability to anyone.
Note: The NY Times requires payment to view the above article in full. You can find it available free of charge on this webpage. Note the date of this article, just weeks before JFK was assassinated. Watch an excellent documentary titled "The Killing of a President," which presents huge amounts of evidence, including eye-witness testimony, which shows that JFK could not have been killed by Oswald. You can find an abundance of reliable resources on the JFK assassination in our information center on this topic.
OSI [Office of Scientific Intelligence] has investigated the work currently being performed on flying saucers. Since 1947, ATIC [Air Technical Intelligence Center] has received approximately 1500 official reports of sightings plus an enormous volume of letters, phone calls and press reports. During the month of July 1952 alone, official reports totaled 250. Of the 1500 reports, Air Force carries 20% as unexplained. A study should be instituted to determine what, if any, utilization could be made of these phenomena by United States psychological warfare planners, and what, if any, defenses should be planned in anticipation of Soviet attempts to utilize them. A national policy should be established as to what should be told the public regarding the phenomena, in order to minimize risk of panic. It is recommended that: a. The Director of Central Intelligence advise the National Security Council of the security implications inherent in the flying saucer problem. b. CIA, under its assigned responsibilities, and in cooperation with the psychological strategy board, immediately investigate possible offensive or defensive utilization of the phenomena for psychological warfare purposes both for and against the United States.
Note: To access this document on the CIA website, click on the link above and then click on the first link listed, with the title "FLYING SAUCERS," or see a full copy with comments at this link. Why was the CIA interested in using the UFO phenomenon for psychological warfare? How did that play out? For lots more reliable, verifiable information on this intriguing topic, click here.
The Pentagon has ordered a sweeping audit of how it conducts clandestine information warfare after major social media companies identified and took offline fake accounts suspected of being run by the U.S. military in violation of the platforms' rules. The takedowns in recent years by Twitter and Facebook of more than 150 bogus personas and media sites created in the United States was disclosed last month by internet researchers Graphika and the Stanford Internet Observatory. U.S. Central Command is among those whose activities are facing scrutiny. Some [takedowns] involved posts from the summer that advanced anti-Russia narratives. One fake account posted an inflammatory tweet claiming that relatives of deceased Afghan refugees had reported bodies being returned from Iran with missing organs. The tweet linked to a video that was part of an article posted on a U.S.-military affiliated website. In 2020 Facebook disabled fictitious personas created by Centcom to counter disinformation spread by China suggesting the coronavirus responsible for covid-19 was created at a U.S. Army lab in Fort Detrick, Md.. The pseudo profiles ... were used to amplify truthful information from the U.S. Centers for Disease Control and Prevention. Congress in late 2019 passed a law affirming that the military could conduct operations in the "information environment" to defend the United States. The measure, known as Section 1631, allows the military to carry out clandestine psychological operations.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
It was the evening of June 9, 2006. Three [Guantánamo Bay] detainees were declared dead. The Navy says the men killed themselves by hanging, in separate nonadjoining cells, in the same way, at the same time, under video surveillance, with no guards noticing and no prisoners calling for the guards to intervene. They tell us that each of the men had bound their wrists and ankles with fabric and shoved fabric down their own throats – and then ask us to believe that they hung themselves. Despite explosive reporting by Scott Horton for Harper's Magazine in which multiple sources ... refuted the official narrative and gave evidence that a cover-up had taken place, no independent official investigation of the incident was ordered. This disturbing episode quickly turned unspeakably dark: Independent autopsies ordered by the families of the dead were useless since the bodies, which showed signs of torture, had been sent home with missing parts. The men's throats – the larynx, the hyoid bone, and the thyroid cartilage – had been removed. Even after this shocking finding ... there would be no investigations. The narrative that these men did something terrible and deserved to be imprisoned for it defines the very nature of the post-9/11 response. It doesn't matter that the original accusations against many of them were flimsy and easily disproved. Due process and the presumption of innocence, the defining values of the American ideal of justice, would be forever denied them.
Note: Read a troubling letter by Sharqawi Al Hajj, a Yemeni citizen detained at Guantanamo Bay. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
In early days of America's space program, two men met over a bottle of Jack Daniel's. It was roughly 1959, when the future of America's young space program was clouded by technological disagreements. On one side of the bottle was Wernher von Braun, the engineering genius who had developed the world's first ballistic missile for Adolf Hitler during World War II. He had once been a member of Hitler's Schutzstaffel, or SS, but now ran NASA's Marshall Space Flight Center. On the other side was Abraham Silverstein, who had grown up in a poor Jewish family in Indiana. He was NASA's space flight chief. One former Nazi, one American Jew. Little more than a decade separated them from the Holocaust. Looming before two of America's top rocket engineers were many critical decisions, including what kind of fuel would be needed to blast off astronauts to the moon. The collaboration between Von Braun and Silverstein was not unique. During the Apollo program, which landed Americans on the moon six times between 1969 and 1972, NASA was filled with both Jewish scientists and a large group of Germans who had worked for Hitler before and during World War II. In recent years, a deeper analysis has focused on America's decision to bring 125 German rocket scientists and engineers to the U.S. after World War II under a secret program approved by President Truman and code-named Operation Paperclip. Much of the history of the underground factory was held secret from the American public until the 1970s.
Note: Learn more about Operation Paperclip which secretly brought hundreds of Nazi scientists to the U.S. And more in a New York Times article about the Nazis given safe haven in the US. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
Since 9/11, the government has been building a huge anti-terror apparatus. In the first few days, the entire blueprint for what would happen over the next decade was written, all in secret. The public didn't know. The media didn't know. And it would take us years to find out. In secret, the administration had authorized the CIA to use what they called "enhanced interrogation techniques." They can do a lot of things that used to be considered torture. Waterboarding, for example. By any definition, it's torture. The Justice Department called it "enhanced interrogation methods" and it approved seven of them, including waterboarding. It took reporter Dana Priest years to piece together where prisoners like Khalid Sheikh Mohammed were. They had been hidden in a secret network of CIA prisons known as "black sites." For the first time, the White House had approved the building of an international prison system entirely in secret. The Terrorist Surveillance Program authorized the NSA to intercept certain telephone calls and emails of American citizens without a warrant. The NSA created a global electronic dragnet capable of reaching into America's communication networks, capturing 1.7 billion intercepts every day. The NSA turned to a new force in the covert war, private contractors. You had this boom in the corporate intelligence world, as well, companies like CACI, Lockheed Martin, General Dynamics. The NSA spent billions of dollars on more than 480 private companies.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and 9/11 from reliable major media sources.
A devastating new Defense Department inspector general report finds that ... the Army, the primary Defense Department proponent for battlefield influence and deception, has failed to staff its own psyops units. Recent revelations about the Pentagon's psyops call into question just how effective these programs really are. In 2022, an extensive report by the Washington Post revealed widespread concern inside DOD that psychological operations were being waged both recklessly and ineffectively by the armed services. The report was spurred by research from the Stanford Internet Observatory which detailed over 150 instances of Facebook and Twitter removing accounts linked to U.S. military influence campaigns. The 2019 National Defense Authorization Act gave the Defense Department a green light to engage in offensive psyops campaigns, including clandestine operations that align with the same definition as covert, meaning that the armed forces can carry out influence operations that deny an American connection. After the congressional authorization, an unnamed defense official said, "Combatant commanders got really excited" and were "eager to utilize these new authorities. The defense contractors were equally eager to land lucrative classified contracts to enable clandestine influence operations." Researchers at Stanford ultimately found that despite the dozens of Defense Department obscured accounts spreading misinformation, the effect on foreign populations was far less than information conveyed overtly from self-identified U.S. sources.
Note: Read about the Pentagon's secret army of 60,000 undercover operatives that manipulate public perception. Learn more about the history of military-intelligence influence on the media in our comprehensive Military-Intelligence Corruption Information Center.
On the morning of 10 June 2013 ... the journalist Glenn Greenwald and film-maker Laura Poitras published on the Guardian site a video revealing the identity of the NSA whistleblower behind one of the most damning leaks in modern history. It began: "My name is Ed Snowden." William Fitzgerald, then a 27-year-old policy employee at Google, knew he wanted to help. Fitzgerald found himself waiting in the lobby of the Hong Kong W Hotel to meet Greenwald and introduce him to Robert Tibbo and Jonathan Man – the men who became Snowden's legal representatives and hid him in the homes of Tibbo's refugee clients. The Snowden files told a ... sinister story, revealing mass surveillance by the US National Security Agency (NSA). The NSA files suggested that some tech firms, including Google, Facebook and Apple, were aware. Google and other tech firms worked to distance themselves from the NSA's efforts. But over time [Google's] culture appeared to shift, reflecting the changing needs of various governments. Google stopped promoting its transparency report to the media, free expression advocates were replaced by more traditional business-focused executives, and then there was Project Maven – the controversial Department of Defense drone project that Google signed on to build artificial intelligence for. Google isn't alone in vying for government contracts – Microsoft, Amazon, IBM have all since made a play for or struck multimillion-dollar deals to build tools of surveillance for various entities including the Pentagon.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Trust Lab was founded by a team of well-credentialed Big Tech alumni who came together in 2021 with a mission: Make online content moderation more transparent, accountable, and trustworthy. A year later, the company announced a "strategic partnership" with the CIA's venture capital firm. The quiet October 29 announcement of the partnership is light on details, stating that Trust Lab and In-Q-Tel – which invests in and collaborates with firms it believes will advance the mission of the CIA – will work on "a long-term project that will help identify harmful content and actors in order to safeguard the internet." Key terms like "harmful" and "safeguard" are unexplained, but the press release goes on to say that the company will work toward "pinpointing many types of online harmful content, including toxicity and misinformation." It's difficult to imagine how aligning the startup with the CIA is compatible with [Trust Lab co-founder Tom] Siegel's goal of bringing greater transparency and integrity to internet governance. What would it mean, for instance, to incubate counter-misinformation technology for an agency with a vast history of perpetuating misinformation? Placing the company within the CIA's tech pipeline also raises questions about Trust Lab's view of who or what might be a "harmful" online, a nebulous concept that will no doubt mean something very different to the U.S. intelligence community than it means elsewhere. Trust Lab's murky partnership with In-Q-Tel suggests a step toward greater governmental oversight of online speech.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
The Dallas-based biotechnology company Colossal Biosciences has a vision: "To see the Woolly Mammoth thunder upon the tundra once again." Founders George Church and Ben Lamm have already racked up an impressive list of high-profile funders and investors, including Peter Thiel, Tony Robbins, Paris Hilton, Winklevoss Capital – and, according to the public portfolio its venture capital arm released this month, the CIA. Colossal says it hopes to use advanced genetic sequencing to resurrect two extinct mammals – not just the giant, ice age mammoth, but also a mid-sized marsupial known as the thylacine, or Tasmanian tiger, that died out less than a century ago. In-Q-Tel, its new investor, is registered as a nonprofit venture capital firm funded by the CIA. On its surface, the group funds technology startups with the potential to safeguard national security. In addition to its long-standing pursuit of intelligence and weapons technologies, the CIA outfit has lately displayed an increased interest in biotechnology and particularly DNA sequencing. "Biotechnology and the broader bioeconomy are critical for humanity to further develop. It is important for all facets of our government to develop them and have an understanding of what is possible," Colossal co-founder Ben Lamm wrote. The embrace of this technology, according to In-Q-Tel's blog post, will help allow U.S. government agencies to read, write, and edit genetic material, and, importantly, to steer global biological phenomena that impact "nation-to-nation competition."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Over time, the CIA upper echelon has secretly developed all kinds of policy statements and legal rationales to justify routine, widespread surveillance on U.S. soil of citizens who arent suspected of terrorism or being a spy. Newly declassified documents from 2014 ... reveal the CIA not only intercepted emails of U.S. citizens but they were emails of the most sensitive kind written to Congress and involving whistleblowers reporting alleged wrongdoing within the Intelligence Community. The disclosures, kept secret until now, are two letters of congressional notification from the Intelligence Community inspector general at the time, Charles McCullough. He stated that during routine counterintelligence monitoring of government computer systems, the CIA collected emails between congressional staff and the CIAs head of whistleblowing and source protection. McCullough added that he was concerned about the CIAs potential compromise to whistleblower confidentiality and the consequent chilling effect. The March 2014 intercepts ... happened amid whats widely referred to as the Obama administrations war on whistleblowers and mass surveillance scandals. The evidence points to bad actors targeting candidate Donald Trump and his associates in part to keep them - and us - from learning about and digging into an even bigger scandal: our Intelligence Community increasingly spying on its own citizens, journalists, members of Congress and political enemies for the better part of two decades.
Note: The above article was written by Emmy award winning investigative journalist and former news anchor for CBS and CNN Sharyl Attkisson. She has been attacked numerous times for investigating too deeply into the lives of certain politicians. Her top-selling book Stonewalled describes her fight for truth against powerful political forces. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
The leader of the far-right Proud Boys group was a "prolific" informer for federal and local law enforcement, reports say. Enrique Tarrio worked undercover for authorities after he was arrested in 2012, according to a 2014 federal court document obtained by Reuters. During a Miami court hearing a federal prosecutor, an FBI agent and Mr Tarrio's lawyer described his work for law enforcement and said that he had helped convict more than a dozen people in drugs, gambling and human smuggling cases. He has become an increasingly high-profile figure as his violent group gained an elevated profile during the Trump administration. The ex-president infamously told the group to "stand back and stand by" when asked to denounce them during a presidential debate last September. They have been involved in a string of high-profile clashes in Washington DC, including the 6 January pro-Trump Capitol riot. [Mr Tarrio] was arrested in Washington DC in January two days before the riot and charged with possession of two high-capacity rifle magazines, and setting fire to a Black Lives Matter banner during a December pro-Trump demonstration in the city. Mr Tarrio was ordered to leave the city and has a June court date. During the 2014 court case Reuters says that Mr Tarrio's lawyer and prosecutors asked a judge to reduce his prison sentence after he and two defendants pleaded guilty in a fraud case related to stolen diabetes test kits. The prosecutor told the judge that Mr Tarrio had provided information that resulted in the prosecution of 13 people.
Note: For more along these lines, see concise summaries of deeply revealing news articles from reliable major media sources.
The most probable cause of a series of mysterious afflictions that sickened American spies and diplomats abroad in the past several years was radiofrequency energy, a type of radiation that includes microwaves, the National Academies of Sciences, Engineering, and Medicine has concluded in a report. The conclusion by a committee of 19 experts in medicine and other fields cited "directed, pulsed radiofrequency energy" as "the most plausible mechanism" to explain the illness, which came to be known as Havana syndrome. The report, which was commissioned by the State Department, provides the most definitive explanation yet of the illness that struck scores of government employees, first at the U.S. Embassy in Havana in 2016, and then in China and other countries. Many of the officers suffered from dizziness, fatigue, headaches, and loss of hearing, memory and balance, and some were forced into permanent retirement. C.I.A. officers visiting overseas stations also experienced similar symptoms. The new report reveals strong evidence that the incidents were the result of a malicious attack. It attributes the illnesses to "directed" and "pulsed" – rather than "continuous" – energy, implying that the victims' exposure was targeted and not the result of more common sources of microwave energy. It also said the committee found the immediate symptoms that patients reported ... were more consistent with a directed "attack" of radiofrequency energy.
Note: Many have belittled the possibility of directed energy beam weapons being used to cause harm and alter consciousness. We have been reporting on this for many years. For excellent, reliable information on this disturbing trend, see this essay and these news summaries.
On 12 June 1975, the Washington Post ran a story about an army scientist who had been drugged with LSD by the CIA, reacted badly and jumped out of the window of a New York hotel. This story, with its lurid mix of drugs, death and the CIA, proved irresistible. For the next several days, reporters barraged the CIA with demands to know more. The Olson family called a press conference in the familys back yard. Alice read a statement saying that the family had decided to file a lawsuit against the CIA, perhaps within two weeks, asking several million dollars in damages. Since 1953, we have struggled to understand Frank Olsons death as an inexplicable suicide, she said. The true nature of his death was concealed for 22 years. White House lawyers offered the Olson family $750,000 in exchange for dropping its legal claims. After some hesitation, the family accepted. On 8 August 2002, [Eric Olson] announced that he had reached a new conclusion about what had happened to his father. The death of Frank Olson on 28 November 1953 was a murder, not a suicide, he declared. This is not an LSD drug-experiment story, as it was represented in 1975. This is a biological warfare story. Frank Olson did not die because he was an experimental guinea pig who experienced a bad trip. He died because of concern that he would divulge information concerning a highly classified CIA interrogation program in the early 1950s, and concerning the use of biological weapons by the United States in the Korean War.
Note: Read more about the CIA's MK-ULTRA program which Frank Olson was a part of. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources.
By now, almost everyone knows what Edward Snowden did. He leaked top-secret documents revealing that the National Security Agency was spying on hundreds of millions of people. The key to Snowden’s effectiveness, according to Thomas Devine, the legal director of the Government Accountability Project (GAP), was that he practised “civil disobedience” rather than “lawful” whistleblowing. “None of the lawful whistleblowers who tried to expose the government’s warrantless surveillance ... had any success,” Devine told me. “They came forward ... but the government just said, ‘They’re lying. We’re not doing those things.’ And the whistleblowers couldn’t prove their case because the government had classified all the evidence.” The NSA whistleblowers were not leftwing peace nuts. They had spent their professional lives inside the US intelligence apparatus – devoted, they thought, to the protection of the homeland and defense of the constitution. They were political conservatives, highly educated, respectful of evidence, careful with words. And they were saying, on the basis of personal experience, that the US government was being run by people who were willing to break the law and bend the state’s awesome powers to their own ends. They were saying that laws and technologies had secretly been put in place that threatened to overturn the democratic governance Americans took for granted and shrink their liberties to a vanishing point.
Note: The article above was is adapted from Mark Hertsgaard’s book, Bravehearts: Whistle Blowing in the Age of Snowden. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
FBI crime laboratory experts gave inaccurate testimony at the trials of defendants in the World Trade Center blast and the 1989 bombing of Avianca Flight 203 in Colombia, and lab scientists and technicians used shoddy analysis and did not follow procedures in scores of other cases, the Justice Department's inspector general concluded. Those findings, coupled with serious problems in the way lab officials conducted themselves in the Oklahoma City bombing and the O.J. Simpson case, are part of a sweeping, 18-month investigation into significant failures at the lab at FBI headquarters in Washington. In addition to conclusions about how lab officials have performed in court, the inspector general also found that the bureau's scientists and technicians did not properly document their test results and poorly prepared lab reports. Overall, in investigating work at the lab's three key sections - the chemistry-toxicology, explosives and materials analysis units - [Inspector General Michael] Bromwich said: "We found significant instances of testimonial errors, substandard analytical work and deficient practices." Investigators also discovered instances where dictation on lab reports was altered and lab supervisors did not properly manage their agents. Bromwich's report does not say when or why the problems began at the lab, but some of the cases studied date back to the 1980s. As early as 1991, top FBI management was alerted to failures at the lab.
Note: Read more about major issues with the Oklahoma City bombing investigation. More recently, the FBI has admitted to problems in its forensics unit leading to decades of flawed testimony in criminal trials. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
The Justice Department inspector general's office has determined that the FBI crime laboratory working on the Oklahoma City bombing case made "scientifically unsound" conclusions that were "biased in favor of the prosecution," The Los Angeles Times reported. The still-secret draft report ... also concludes that supervisors approved lab reports that they "cannot support" and that FBI lab officials may have erred about the size of the blast, the amount of explosives involved and the type of explosives used in the bombing. The draft report shows that FBI examiners could not identify the triggering device for the truck bomb or how it was detonated. It also indicates that a poorly maintained lab environment could have led to contamination of critical pieces of evidence. The investigation into the crime lab practices began in 1996 following complaints from FBI chemist and whistle-blower Frederic Whitehurst. The draft report's harshest criticism was of David Williams, a supervisory agent in the explosives unit. "We are deeply troubled by Williams' report, which contains several serious flaws," the report said. "These errors are all tilted in favor of the prosecution's theory of the case. We conclude that Williams failed to present an objective, unbiased, competent report." Those flaws reportedly include the basis of his determination that the main charge of the explosion was ammonium nitrate. The inspector general called such a determination "inappropriate," the Times said.
Note: For lots more undeniable evidence the official story of the Oklahoma City bombing is seriously flawed, see this webpage. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism from reliable major media sources.
The United States' secretive Special Operations Command is looking for companies to help create deepfake internet users so convincing that neither humans nor computers will be able to detect they are fake. Academic and private sector researchers have been engaged in a race ... to create undetectable deepfakes. The plan, mentioned in a new 76-page wish list by the Department of Defense's Joint Special Operations Command, or JSOC, outlines advanced technologies desired for country's most elite, clandestine military efforts. "Special Operations Forces (SOF) are interested in technologies that can generate convincing online personas for use on social media platforms, social networking sites, and other online content." JSOC wants the ability to create online user profiles that "appear to be a unique individual that ... does not exist in the real world," with each featuring "multiple expressions" and "Government Identification quality photos." The document notes that "the solution should include facial & background imagery, facial & background video, and audio layers." JSOC hopes to be able to generate "selfie video" from these fabricated humans. Each deepfake selfie will come with a matching faked background, "to create a virtual environment undetectable by social media algorithms." A joint statement by the NSA, FBI, and CISA warned [that] the global proliferation of deepfake technology [is] a "top risk" for 2023. An April paper by the U.S. Army's Strategic Studies Institute was similarly concerned: "Experts expect the malicious use of AI, including the creation of deepfake videos to sow disinformation to polarize societies and deepen grievances, to grow over the next decade."
Note: Why is the Pentagon investing in advanced deepfake technology? Read about the Pentagon's secret army of 60,000 operatives who use fake online personas to manipulate public discourse. For more along these lines, see concise summaries of deeply revealing news articles on AI and media corruption from reliable major media sources.
A whistleblower group is suing the Department of Justice over its efforts to "secretly surveil" congressional staff conducting oversight on the FBI's Trump-Russia investigation. Empower Oversight Whistleblowers and Research says in a civil suit filed Tuesday that the DOJ has repeatedly stonewalled records requests involving the "undisputed" surveillance. Its suit seeks to force the Justice Department to hand over records related to the alleged unconstitutional surveillance. Empower's founder, Jason Foster, discovered in October that he was one of those congressional staff members surveilled by the Justice Department while serving as Iowa GOP Sen. Chuck Grassley's chief investigative counsel. "Last fall, @Google told me @TheJusticeDept forced it to secretly turn over my comms records in 2017," Foster posted on X, referencing a Sept. 12 subpoena that year for his private cell phone and email communications. Foster confirmed the DOJ and FBI also "targeted a dozen or so other Capitol Hill attorneys' personal accounts – from both political parties" who were looking into the FBI misconduct that included Foreign Intelligence Surveillance Act abuses as well. Both federal law-enforcement agencies later imposed non-disclosure orders for six years on Google and other big tech giants such as Apple and Verizon that had been subpoenaed for congressional staff communications.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
Surveillance technologies have evolved at a rapid clip over the last two decades – as has the government's willingness to use them in ways that are genuinely incompatible with a free society. The intelligence failures that allowed for the attacks on September 11 poured the concrete of the surveillance state foundation. The gradual but dramatic construction of this surveillance state is something that Republicans and Democrats alike are responsible for. Our country cannot build and expand a surveillance superstructure and expect that it will not be turned against the people it is meant to protect. The data that's being collected reflect intimate details about our closely held beliefs, our biology and health, daily activities, physical location, movement patterns, and more. Facial recognition, DNA collection, and location tracking represent three of the most pressing areas of concern and are ripe for exploitation. Data brokers can use tens of thousands of data points to develop a detailed dossier on you that they can sell to the government (and others). Essentially, the data broker loophole allows a law enforcement agency or other government agency such as the NSA or Department of Defense to give a third party data broker money to hand over the data from your phone – rather than get a warrant. When pressed by the intelligence community and administration, policymakers on both sides of the aisle failed to draw upon the lessons of history.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
After government officials like former White House advisers Rob Flaherty and Andy Slavitt repeatedly harangued platforms such as Facebook to censor Americans who contested the government's narrative on COVID-19 vaccines, Missouri and Louisiana sued. They claimed that the practice violates the First Amendment. Following years of litigation, the Supreme Court threw cold water on their efforts, ruling in Murthy v. Missouri that states and the individual plaintiffs lacked standing to sue the government for its actions. The government often disguised its censorship requests by coordinating with ostensibly "private" civil society groups to pressure tech companies to remove or shadow ban targeted content. According to the U.S. House Weaponization Committee's November 2023 interim report, the Cybersecurity and Infrastructure Security Agency requested that the now-defunct Stanford Internet Observatory create a public-private partnership to counter election "misinformation" in 2020. This consortium of government and private entities took the form of the Election Integrity Partnership (EIP). EIP's "private" civil society partners then forwarded the flagged content to Big Tech platforms like Facebook, YouTube, TikTok and Twitter. These "private" groups ... receive millions of taxpayer dollars from the National Science Foundation, the State Department and the U.S Department of Justice. Legislation like the COLLUDE Act would ... clarify that Section 230 does not apply when platforms censor legal speech "as a result of a communication" from a "governmental entity" or from an non-profit "acting at the request or behest of a governmental entity."
Note: For more along these lines, see concise summaries of deeply revealing news articles on censorship and government corruption from reliable sources.
The FBI is abusing its security clearance process to "purge" political conservatives from the bureau, according to recent whistleblower disclosures. The federal law enforcement agency's Security Division has been suspending or revoking clearances for employees whose political affiliation or COVID-19 vaccination status are suspect, a supervisory special agent who formerly worked in the division alleges. he unnamed agent, who is described as "a registered Democrat" and is represented by the nonprofit Empower Oversight, further claims that high-ranking officials in the division believed "if an FBI employee fit a certain profile as a political conservative, they were viewed as security concerns and unworthy to work at the FBI." In the case of Marcus Allen, a former FBI staff operations specialist (SOS) suspended without pay for more than two years, the officials ignored "possibly exculpatory information" and overruled investigators who "concluded [that] the suspension of his security clearance was not warranted." That decision came after Allen informed his supervisors ... that he did not intend to take the COVID-19 vaccine. "The FBI has used the clearance process as a means to force employees out of the FBI by inflicting severe financial distress: suspending their clearance, suspending them from duty without pay, [and] requiring them to obtain permission to take any other job while stuck in this unpaid limbo," [Empower President Tristan Leavitt] told House Judiciary Committee chairman Jim Jordan.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
Few Navy officers entangled themselves in the Fat Leonard corruption scandal more than Steve Shedd. In court documents and testimony, the former warship captain confessed to leaking military secrets on 10 occasions for prostitutes, vacations, luxury watches and other bribes worth $105,000. Shedd might avoid punishment for his crimes. The reason: a pattern of prosecutorial misconduct in the Fat Leonard investigation that has caused several cases to unravel so far and is threatening to undermine more. The cases collapsed after defense attorneys alleged that prosecutors from the U.S. attorney's office in San Diego relied on flawed evidence and withheld information favorable to the defense during the 2022 bribery trial of five other officers who had served in the Navy's 7th Fleet in Asia. After Francis's arrest in 2013, nearly 1,000 individuals came under scrutiny, including 91 admirals. Federal prosecutors brought criminal charges against 34 defendants. Twenty-nine of them, including Shedd, pleaded guilty. Legal analysts said it is possible that even Francis might catch a break, though he has already pleaded guilty to bribing "scores" of military officers and defrauding the Navy of tens of millions of dollars. During the 2022 trial ... the prosecution team led by Assistant U.S. Attorney Mark Pletcher withheld a witness statement that contradicted some of the government's allegations and did not divulge that one of its lead investigators had made inaccurate statements.
Note: Read more about the massive bribery scheme that Leonard Francis used to compromise the US Navy. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
Leonard Glenn Francis, and his company, Glenn Defense Marine Asia, held $200 million in contracts to resupply U.S. Navy ships and provide port security in Asia. But Francis had recently been arrested. Federal agents were shocked to discover ... that he had obtained reams of classified information from corrupt Navy officers about the itineraries of U.S. warships and submarines. Francis, a high school dropout with a prior felony record, penetrated the Navy's elaborate counterintelligence defenses with astonishing ease – and far more extensively than the Pentagon has publicly acknowledged – by bribing ... officers for classified material. Navy counterintelligence officials failed to detect hemorrhaging leaks of military secrets to Francis while he exploited the information for his company's bottom line. Since 2015, 10 Navy officers have admitted to leaking classified material to Francis and his firm in exchange for prostitutes, cash and other favors, the records show, making the Malaysian defense contractor among the most prolific espionage agents in modern history. After a lengthy investigation and the suspension of [Vice Adm. Ted Branch and Rear Adm. Bruce Loveless'] access to classified information, the Navy determined that Branch violated federal ethics rules and committed official misconduct by accepting meals and other gifts from Francis. Loveless was indicted and tried on bribery charges, though prosecutors dropped the case against him.
Note: Read more about the massive bribery scheme that Leonard Francis used to compromise the US Navy. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
The House of Representatives voted on Friday to extend Section 702 of the Foreign Intelligence Surveillance Act (FISA) for two years. Section 702 permits the US government to wiretap communications between Americans and foreigners overseas. Hundreds of millions of calls, texts, and emails are intercepted by government spies each with the "compelled assistance" of US communications providers. The government argues that Americans are not themselves being targeted and thus the wiretaps are legal. Nevertheless, their calls, texts, and emails may be stored by the government for years, and can later be accessed by law enforcement without a judge's permission. The House bill also dramatically expands the statutory definition for communication service providers. "They're pushing for a major expansion of warrantless spying on Americans," US senator Ron Wyden tells WIRED. "Their amendment would force your cable guy to be a government spy and assist in monitoring Americans' communications without a warrant." "Section 702 has been abused under presidents from both political parties, and it has been used to unlawfully surveil the communications of Americans across the political spectrum," says Kia Hamadanchy, senior policy counsel at the American Civil Liberties Union. "The Senate must add a warrant requirement and rein in this out-of-control government spying."
Note: For more along these lines, see concise summaries of important news articles on government corruption and the disappearance of privacy from reliable major media sources.
United States officials fought to conceal details of arrangements between US spy agencies and private companies tracking the whereabouts of Americans. Obtaining location data from US phones normally requires a warrant, but police and intelligence agencies routinely pay companies instead for the data, effectively circumventing the courts. Ron Wyden, the US senator from Oregon, informed the nation's intelligence chief, Avril Haines, on Thursday that the Pentagon only agreed to release details about the data purchases, which had always been unclassified, after Wyden hindered the Senate's efforts to appoint a new director of the National Security Agency. "The secrecy around data purchases was amplified," Wyden wrote, "because intelligence agencies have sought to keep the American people in the dark." Pentagon offices known to have purchased location data from these companies include the Defense Intelligence Agency and the NSA, among others. Wyden's letter ... indicates that the NSA is also "buying Americans' domestic internet metadata." Wyden's disclosure comes amid a fight in the US House of Representatives over efforts to outlaw the purchases. Members of the House Judiciary Committee attached legislation doing so ... to a bill reauthorizing a contentious surveillance program known as Section 702. Biden administration officials and members of the intelligence committee staged a campaign against the privacy-enhancing measures.
Note: Learn more about mission creep in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on military corruption and the disappearance of privacy from reliable major media sources.
An offshoot of the conservative Heritage Foundation is suing the Central Intelligence Agency, accusing it of withholding records detailing payoffs to analysts to bury findings that a lab leak was the most likely explanation for the COVID-19 pandemic. The think tank's Oversight Project filed a federal lawsuit against the CIA Dec. 22, alleging the agency did not comply with its Freedom of Information Act (FOIA) request about analysts who allegedly "received monetary incentives to change their position on the origins of the virus," according to a copy of the complaint. A senior-level CIA agent told House Republican committee chairmen in September that the agency offered payments to six analysts tasked with determining the origins of SARS-CoV-2 if they said that the virus jumped from animals to humans. The Sept. 12 letter from Select Subcommittee on the Coronavirus Pandemic Chairman Brad Wenstrup (R-Ohio) and Permanent Select Committee on Intelligence Chairman Mike Turner (R-Ohio) to CIA Director William Burns also demanded documentation ... about the payments. "According to the whistleblower, at the end of its review, six of the seven members of the Team believed the intelligence and science were sufficient to make a low confidence assessment that COVID-19 originated from a laboratory in Wuhan, China," the House panel chairmen wrote. In February, the FBI became the first US intelligence agency to conclude the coronavirus pandemic most likely began with a lab leak.
Note: Former chief White House medical adviser Anthony Fauci will testify before Congress on COVID origins in early 2024. For more along these lines, see concise summaries of deeply revealing news articles on COVID and intelligence agency corruption from reliable major media sources. Then explore the excellent, reliable resources provided in our COVID Information Center.
In March 2020, Dr. Robert Kadlec addressed a House committee to confirm his role and responsibilities as the federal government's top preparedness official coordinating the government's COVID-19 response. As assistant secretary for preparedness and response at the Department of Health and Human Services, Kadlec offered a lengthy statement to lawmakers on the "four principal functions" of his role. None of those functions involved downplaying without scientific evidence a theory that the virus emerged from a laboratory in the Wuhan Institute of Virology. But that's what Kadlec now says he did by assisting Dr. Anthony Fauci ... in his effort to suppress the lab leak theory. Kadlec says it's a decision that keeps him up at night. "I wake up at usually about 2 or 3 a.m. and think about it honestly, because it's something that we all played a role in," Kadlec [said]. For much of 2020 and 2021, anyone who brought up the possibility that COVID-19 emerged from Wuhan risked being labeled a conspiracy theorist by legacy media and "fact-checkers." In September, the chairman of the House Select Subcommittee on the Coronavirus Pandemic revealed that Fauci was secretly admitted to CIA headquarters while the agency conducted its analysis of the virus's origins, allegedly to "â€influence' the Agency's review." A ... CIA whistleblower claims the agency attempted to bribe six analysts tasked with assessing the origin of the virus.
Note: For more along these lines, see concise summaries of deeply revealing news articles on COVID and government corruption from reliable major media sources.
In the 1970s, congressional investigators revealed that the FBI, NSA, and CIA had spent decades illegally surveilling and harassing the civil rights and anti-war movements. These abuses shocked the American public and led Congress to implement a series of intelligence reforms, including the Foreign Intelligence Surveillance Act (FISA), which set strict limitations on when and how intelligence agencies could perform domestic spying. In the decades since the 9/11 attacks, changing laws and aggressive executive branch lawyering have significantly relaxed the rules that govern surveillance of Americans. We are once again seeing abuses of these powers, including instances of intelligence agents seeking access to the communications of politicians, protesters, and journalists. Today, a bipartisan group of lawmakers ... introduced the Government Surveillance Reform Act of 2023 (GSRA) to reverse this erosion of privacy rights. The GSRA begins by tackling Section 702, a controversial surveillance law that expires at the end of this year. Section 702 allows the government to collect the communications of non-Americans located abroad without a warrant. But Americans' private phone calls, emails, and text messages are inevitably captured, too – and intelligence officials frequently perform warrantless searches for them. Intelligence officials conducted more than 200,000 of these "backdoor searches" for Americans' communications last year alone.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
For two decades, the CIA ran mind-control experiments in Montreal that later influenced modern "enhanced interrogation" techniques such as those used at Abu Ghraib. The experiments have not only crossed ethical boundaries but also raised profound questions of accountability and justice. This is particularly true in light of the ongoing class-action lawsuits initiated by those who suffered through the Montreal experiments. Established in 1940, the Allan Memorial Institute (known as "the Allan") used to be a psychiatric institute and research facility. The majority of the Montreal experiments were orchestrated and implemented by a man named Donald Ewen Cameron ... the first director of the Allan. Cameron received funds brokered by then CIA director Allen Dulles to subject his unwitting "patients" to high-voltage electroshock treatments, insulin-induced comas, sensory deprivation, and large doses of hallucinogenic drugs like LSD. To justify these treatments, Cameron touted his psychiatric techniques as innovative and experimental. The CIA obtained their desired test results from Cameron, whose patients unknowingly paid for the operation with the loss of their memories and cognitive abilities. Even though countless individuals who left the Allan were reduced to childlike states and unable to recognize their own family members, the US government has yet to be held accountable.
Note: Read more about the disturbing experiments of Ewen Cameron. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and mind control from reliable major media sources.
The Central Intelligence Agency offered to pay off analysts in order to bury their findings that COVID-19 most likely leaked from a lab in Wuhan, China, new whistleblower testimony to Congress alleges. A senior-level CIA officer told House committee leaders that his agency tried to pay off six analysts who found SARS-CoV-2 likely originated in a Wuhan lab if they changed their position and said the virus jumped from animals to humans, according to a letter sent Tuesday to CIA Director William Burns. Select Subcommittee on the Coronavirus Pandemic Chairman Brad Wenstrup (R-Ohio) and Permanent Select Committee on Intelligence Chairman Mike Turner (R-Ohio) requested all documents, communications and pay info from the CIA's COVID Discovery Team by Sept. 26. "According to the whistleblower, at the end of its review, six of the seven members of the Team believed the intelligence and science were sufficient to make a low confidence assessment that COVID-19 originated from a laboratory in Wuhan, China," the House panel chairmen wrote. "The seventh member of the Team, who also happened to be the most senior, was the lone officer to believe COVID-19 originated through zoonosis." "The whistleblower further contends that to come to the eventual public determination of uncertainty, the other six members were given a significant monetary incentive to change their position," they said, noting that the analysts were "experienced officers with significant scientific expertise."
Note: Explore more revealing articles we've summarized about the COVID origin story. For more along these lines, see concise summaries of news articles on intelligence agency corruption and the coronavirus from reliable major media sources.
The FBI has amassed 21.7 million DNA profiles – equivalent to about 7 percent of the U.S. population – according to Bureau data reviewed by The Intercept. The FBI aims to nearly double its current $56.7 million budget for dealing with its DNA catalog with an additional $53.1 million, according to its budget request for fiscal year 2024. "The requested resources will allow the FBI to process the rapidly increasing number of DNA samples collected by the U.S. Department of Homeland Security," the appeal for an increase says. "When we're talking about rapid expansion like this, it's getting us ever closer to a universal DNA database," Vera Eidelman, a staff attorney at the American Civil Liberties Union, [said]. "I think the civil liberties implications here are significant." The rapid growth of the FBI's sample load is in large part thanks to a Trump-era rule change that mandated the collection of DNA from migrants who were arrested or detained by immigration authorities. Until recently, the U.S. DNA database surpassed even that of authoritarian China, which launched an ambitious DNA collection program in 2017. That year, the BBC reported, the U.S. had about 4 percent of its population's DNA, while China had about 3 percent. While DNA has played an important role in prosecuting crimes, less than 3 percent of the profiles have assisted in cases, the Bureau's data reveals. By comparison, fingerprints collected by the FBI from current and former federal employees linked them to crimes at a rate of 12 percent each year.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The FBI colluded with a Ukrainian intelligence agency to pressure social media companies into taking down accounts accused of spreading Russian disinformation – some of which belonged to Americans, a House committee said. The report issued by the House Judiciary Committee and the Select Subcommittee on the Weaponization of the Federal Government ... is based on documents subpoenaed from Meta – the parent company of Facebook and Instagram – and Alphabet – the parent company of Google and YouTube. It alleges that the "FBI violated the First Amendment rights of Americans and potentially undermined our national security." The committees found that following Russia's invasion of Ukraine, the Security Service of Ukraine (SBU) enlisted the FBI in support of an effort to combat the spread of "Russian disinformation" on social media. As part of the effort, the SBU transmitted lists of social media accounts to the FBI that it wanted to be banned and the bureau, in turn, "routinely relayed these lists to the relevant social media platforms." The committee claims that "the authentic accounts of Americans, including a verified US State Department account and those belonging to American journalists" were ensnared in the censorship effort and flagged for social media companies to take down. The State Department's Russian-language Instagram account ... was one of the authentic American accounts flagged for removal in a list composed by the SBU and transmitted to Big Tech companies by the FBI.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
On Monday, the House Judiciary Committee released a report on how the Cybersecurity and Infrastructure Security Agency (CISA) "colluded with Big Tech and 'disinformation' partners to censor Americans." The 36-page report raises three familiar issues: first, government actors worked with third parties to overturn the First Amendment; second, censors prioritized political narratives over truthfulness; and third, an unaccountable bureaucracy hijacked American society. The House Report reveals that CISA, a branch of the U.S. Department of Homeland Security, worked with social media platforms to censor posts it considered dis-, mis- or malinformation. Brian Scully, the head of CISA's censorship team, conceded that this process, known as "switchboarding," would "trigger content moderation." Additionally, CISA funded the nonprofit EI-ISAC in 2020 to bolster its censorship operations. In launching the nonprofit, the government boasted that it "leverage[d] DHS CISA's relationship with social media organizations to ensure priority treatment of misinformation reports." The switchboard programs directly contradict sworn testimony from CISA Director Jen Easterly. The report outlines how CISA censored "malinformation – truthful information that, according to the government, may carry the potential to mislead." Dr. Kate Starbird, a member of CISA's "Misinformation & Disinformation" subcommittee, lamented that many Americans seem to "accept malinformation as 'speech' and within democratic norms."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
A MintPress investigation has found that a host of Western government officials, intelligence agents and assets have been directly involved in intimate collaboration with Nazi groups and individuals since at least 2014. This has included involvement in creating and operating the Nazi-run kill list in Ukraine. While Western media have belatedly been forced to concede that there are Nazi influences in Ukraine, many journalists have insisted that the visible fascist patches on uniforms are only there to troll Russians and that they are insignificant and a gift to Russian propaganda. Still, other journalists admit to asking Ukrainian service members to cover up their Nazi symbols. Last May, The Irish Independent claimed that [former adviser to Ukraine's foreign minister Cormac] Smith is "an unlikely key player in the information war," who "estimates he has given about 100 TV, radio and print interviews with the international media in the past few months to tell Kyiv's side of the story." Smith has a nice line in outrageous propaganda gambits, claiming that Russians are the actual Nazis and that they murder, rape and pillage, including the rape of children. As it turns out, the source of many of the allegations ... was the Ukraine parliamentary commissioner for human rights, Lyudmila Denisova. Last year, it was comprehensively demonstrated that her stories had little evidential basis. She ... admitted to "promoting fake news to persuade Western countries to send more arms and aid." Smith nonetheless carried on making vague allegations of rape for months afterward.
Note: US agencies used at least 1,000 ex-Nazis as spies and informants during the Cold War. Nazi doctors were also used used to teach the CIA mind control methods. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the war machine from reliable major media sources.
In 1979 the Sandinista revolution overthrew the Somoza dictatorship in Nicaragua. As a Spanish speaking Latino, [Enrique] Prado ... was recruited as a CIA officer responsible for overseeing the development of the Contra army based in Honduras and conducting cross border attacks on communities in Nicaragua. Prado believes they [were] the "good guys". The International Court of Justice thought otherwise. In 1986 the court ruled the US attacks on Nicaragua were violations of international law. The Reagan administration and media largely ignored the ruling. Later, journalist Gary Webb documented the catastrophic social damage inside the US caused by the cheap cocaine flooding some US cities. Webb was attacked by establishment media. In 1998 the CIA Inspector General acknowledged, "There are instances where C.I.A. did not, in an expeditious or consistent fashion, cut off relationships with individuals supporting the contra program who were alleged to have engaged in drug-trafficking activity, or take action to resolve the allegations." The US deployed Nicaraguans, Afghans and extremist Arab recruits in proxy wars across the globe. "The attacks of September 11 descend in a direct line from events in 1979, the year in which the CIA, with full presidential authority, began carrying out its largest ever clandestine operation - the secret arming of Afghan freedom fighters (mujaheddin) to wage a proxy war against the Soviet Union," [said author Chalmers Johnston].
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
On April 20, former acting CIA Director Michael Morell admitted he orchestrated the joint letter that torpedoed the New York Post's bombshell reporting on Hunter Biden's laptop in the weeks leading up to the November 2020 US Presidential election, at the direct request of Joe Biden's campaign team. That letter ... asserted the leaked material bore unambiguous hallmarks of a Kremlin "information operation." In all, 51 former senior intelligence officials endorsed the declaration. This intervention was sufficient for Twitter to block all sharing of the NY Post's exposĂ©s and ban the outlet's official account. Twitter's public suppression of the NY Post's disclosures was complemented by a covert operation to identify and neutralize anyone discussing the contents of Hunter Biden's laptop, courtesy of Dataminr, a social media spying tool heavily connected to British and American intelligence services. In-Q-Tel [is] the CIA's venture capital arm. In 2016, The Intercept revealed In-Q-Tel was financing at least 38 separate social media spying tools, to surveil "erupting political movements, crises, epidemics, and disasters." Among them was Dataminr, which enjoys privileged access to Twitter's "firehose" – all tweets published in real time – in order to track and visualize trends as they happen. [In 2020], the U.S. was ... engulfed by incendiary large-scale protests. Dataminr kept a close eye on this upheaval every step of the way, tipping off police to the identities of demonstrators.
Note: While Hunter Biden was indicted for three felony gun charges and nine counts of tax-related crimes, his laptop also revealed suspicious business dealings with corrupt overseas firms. Learn more about the history of military-intelligence influence on the media in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on corporate corruption and media manipulation from reliable sources.
We have long known about the F.B.I. director J. Edgar Hoover's animus toward the Rev. Dr. Martin Luther King Jr. Hoover built an extensive apparatus of surveillance and disruption designed to destroy King. It's time to ... recognize the power structure that supported the F.B.I.'s campaign. Many Americans – starting with the president – thought movement activists like King posed threats to the established order and needed to be watched and controlled. Members of the press could have exposed the bureau's campaign. And many government officials who could have stopped, curtailed or exposed the F.B.I.'s attack on King instead enabled or encouraged it. F.B.I. records declassified in the past several years and documents from the Johnson archives released in 2022 force us to reconsider the nature of Johnson's involvement in the F.B.I.'s campaign against King. White House documents ... suggest that Johnson, from the beginning of his presidency in 1963 to King's assassination in 1968, was apprised almost weekly by Hoover himself on the F.B.I.'s surveillance of King. Johnson did nothing to stop or rein in the F.B.I., even after at least one top administration official expressed concern. In addition to the president and the media, other officials at the F.B.I. ... worked to ruin King. Scores of ranking officials and agents at the F.B.I., dozens of elected officials and several informants embedded in King's inner circles knew what was going on, and none, as far as the public records indicate, blew a whistle on the campaign.
Note: Few people know about the 1999 King Family civil trial in Memphis, where it took a jury only one hour to find the U.S. government guilty for the assassination of Martin Luther King Jr. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
The story of Bruno BrĂ©guet, one the most enigmatic figures of the shadowy battle between western security services and international violent extremists during the so-called "golden age of terrorism" in the 1970s and 1980s, has been given a new twist. A new book has revealed that in his later years BrĂ©guet served not only the infamous Illich RamĂrez Sánchez, better known as Carlos the Jackal, but the US government too. BrĂ©guet's spying for the CIA earned him tens of thousands of dollars, and contributed to the capture of his erstwhile boss by French secret services in 1994. The news that the CIA was prepared to hire as an agent a man like BrĂ©guet, who had been twice convicted by Israel and France for his terrorist activities and is believed to have bombed a pro-democracy radio station in Munich funded by the US government, underlines the moral and ethical questions facing intelligence services when it comes to recruiting such individuals. If anyone in the CIA balked at employing BrĂ©guet as an agent, there is no record of their concerns. For the next four years, BrĂ©guet appears to have supplied information to the CIA, possibly indirectly contributing key elements to the French intelligence operation that successfully grabbed Carlos from a clinic in Khartoum in 1994. Breguet's final mystery remains unresolved however. In 1995, the veteran extremist turned CIA agent disappeared definitively after boarding a ferry from a Greece to Italy. Was he murdered? Or did he commence a new life under a false identity?
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and terrorism from reliable major media sources.
The United States Federal Bureau of Investigation has acknowledged for the first time that it purchased US location data rather than obtaining a warrant. The disclosure came today during a US Senate hearing. Senator Ron Wyden ... put the question of the bureau's use of commercial data to its director, Christopher Wray: "Does the FBI purchase US phone-geolocation information?" Wray said his agency was not currently doing so. "To my knowledge, we do not currently purchase commercial database information that includes location data derived from internet advertising," Wray said. "I understand that we previously–as in the past–purchased some such information for a specific national security pilot project. But that's not been active for some time." In its landmark Carpenter v. United States decision, the Supreme Court held that government agencies accessing historical location data without a warrant were violating the Fourth Amendment's guarantee against unreasonable searches. The decision left open a glaring loophole that allows the government to simply purchase whatever it cannot otherwise legally obtain. US Customs and Border Protection (CBP) and the Defense Intelligence Agency are among the list of federal agencies known to have taken advantage of this loophole. The Department of Homeland Security ... purchased the geolocations of millions of Americans from private marketing firms. The data were derived from ... benign sources, such as mobile games and weather apps.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
After flying under the radar for years, the case of Genaro GarcĂa Luna is finally raising alarms in Congress, with one of the Senate's top Republicans demanding answers about how Mexico's highest-ranking cop was able to partner with DEA and FBI, "at the time that he funneled roughly 103,000 pounds of cocaine into the United States" for the Sinaloa Cartel. GarcĂa Luna became the most senior Mexican law enforcement official ever convicted of narco-corruption when a Brooklyn federal jury delivered a unanimous guilty verdict on a five-count indictment that charged him with taking massive bribes to enable cartel drug smuggling, kidnappings, and murders while he was in office from 2001 to 2012. GarcĂa Luna's position involved close collaboration with U.S. anti-narcotics agencies that operate in Mexico, and it gave him discretion over the spending of hundreds of millions in American tax dollars delivered as security aid. That money was supposed to go toward fighting the cartels, but his trial showed he was leaking sensitive intelligence, protecting drug shipments, and disrupting efforts to capture ... cartel leaders. On Feb. 22, a day after the guilty verdict, Iowa Sen. Chuck Grassley sent a letter to the heads of the DEA and FBI asking what the agencies knew about GarcĂa Luna and when, and demanding evidence ... that could shed new light on the relationship. In short, Grassley wants to know if American tax dollars were being sent to Mexico while the DEA and FBI were tolerating GarcĂa Luna's corruption.
Note: This case adds to the evidence that the War on Drugs is a trillion dollar failure. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
Genaro GarcĂa Luna, Mexico's former top law enforcement official known as the "architect" of the Mexican side of the drug war, was found guilty in New York federal court of collaborating with the Sinaloa cartel, the biggest organized crime group in North America. For years, GarcĂa Luna was the U.S. government's most trusted ally in the war on drugs. As public security secretary, he wielded incredible power, overseeing Mexico's Federal Police, the prison network, and a vast intelligence-gathering infrastructure, while working with the Drug Enforcement Administration, FBI, CIA, and Department of Homeland Security in the fight against Mexican cartels. The case portrayed GarcĂa Luna and his network of corrupt officials as a handful of bad apples, and what U.S. officials knew about GarcĂa Luna's illicit activities went mostly unexplored, despite the government's role in providing funding, equipment, and training that has fueled drug-related violence. GarcĂa Luna was found guilty of all five charges, including drug trafficking and continuing a criminal enterprise. Prosecutors alleged that he received around $274 million in bribes from the cartel from 2001 to 2012, first as head of the Federal Investigative Agency, the Mexican equivalent of the FBI, and then as secretary of public security. GarcĂa Luna left public office in 2012 following a change in presidency and moved to Miami where he started a security consulting company and lived a lavish lifestyle.
Note: The War on Drugs has been described as a trillion dollar failure. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in intelligence agencies from reliable major media sources.
In 2017, the CIA had plotted to kidnap or assassinate Julian Assange, the founder of WikiLeaks, who had taken refuge five years earlier in the Ecuador embassy in London. A senior US counter-intelligence official said that plans for the forcible rendition of Assange to the US were discussed "at the highest levels" of the Trump administration. The informant was one of more than 30 US officials – eight of whom confirmed details of the abduction proposal – quoted in a 7,500-word investigation by Yahoo News into the CIA campaign against Assange. The plan was to "break into the embassy, drag [Assange] out and bring him to where we want", recalled a former intelligence official. Another informant said that he was briefed about a meeting in the spring of 2017 at which President Trump had asked if the CIA could assassinate Assange and provide "options" about how this could be done. The Trump-appointed head of the CIA, Mike Pompeo, said publicly that he would target Assange and WikiLeaks as the equivalent of "a hostile intelligence service". Top intelligence officials intended to decide themselves who is and who is not a journalist, and lobbied the White House to redefine other high-profile journalists as "information brokers", who were to be targeted as if they were agents of a foreign power. In 2013 ... a team of 120 counter-intelligence officers ... failed to find a single person in Iraq and Afghanistan who had died because of the disclosures by WikiLeaks.
Note: CIA interest in assassinating Assange coincided with Wikileaks' publication of leaked CIA hacking tools. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Louis Armstrong, his wife and a diplomat from the US embassy were out for dinner in a restaurant in what was still Léopoldville, capital of the newly independent Congo. The [musician] was in the middle of a tour of Africa ... organised and sponsored by the State Department. What Armstrong did not know was that his host that night in November 1960 was not the political attaché as described, but the head of the CIA in Congo. "Armstrong was basically a Trojan horse for the CIA," said Susan Williams ... author of White Malice, a new book which exposes the astonishing extent of the CIA's activities across central and west Africa. Armstrong's host, CIA station chief Larry Devlin, and other US intelligence officers posted to Congo used the cover of the musicians's visit to get access to the strategically important and very wealthy province of Katanga, which had recently seceded. There was much of interest to the CIA in Katanga, ranging from senior officials with whom they could not otherwise meet to crucial mining infrastructure, with 1,500 tons of uranium and vast potential to procure more. The CIA in the Congo, led by Devlin, was trying to kill the Congo's first democratically elected prime minister, 35-year-old Patrice Lumumba, fearful that he would lead the country into the Soviet camp. A mile or so from where Armstrong and Devlin had dined, the charismatic Lumumba was being held prisoner ... by soldiers loyal to Joseph-Désiré Mobutu, the young military chief with a close working relationship with the CIA, who had effectively seized power some weeks earlier. Within two months of Armstrong's tour, Lumumba was murdered in Katanga. Devlin later claimed that the CIA was responsible, telling a US Congressional investigation "that the coup of Mobutu … was arranged and supported, and indeed, managed, by the CIA".
Note: Read how the CIA used modern art and other cultural figures as weapons during the Cold War in our Military-Intelligence Corruption Information Center. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The Pentagon is running a 60,000-strong secret army made up of soldiers, civilians and contractors, who travel the world under false identities embedded in consultancies and name-brand companies – without the knowledge of the American people or most of Congress. The top-secret army was created by the Pentagon over the past 10 years as part of a program called "signature reduction," and operates both domestically and internationally using a low-profile force of clandestine warriors who sometimes wear civilian clothes as they carry out their assignments, Newsweek reported. The force is 10 times the size of the covert elements of the CIA, comes with a cost of more than $900 million, and engages about 130 private companies in operations in locales like the Middle East and Africa. About half of the "signature reduction" force is made up of special forces. Military intelligence specialists comprise the second-largest element inside the force. But the ... fastest-growing group in the unit is made up of cyber-warriors who use false personas and "nonattribution" or "misattribution" techniques online to disguise themselves so they can track high-value targets, collect "publicly accessible information" and engage in influence campaigns to manipulate social media. One recently retired senior officer who oversaw one of the programs said no one is fully aware of their extent or the implications they have for military warfare.
Note: Learn more about mission creep in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on corruption in the military and in the intelligence community from reliable major media sources.
Civil rights attorney Ben Crump announced he has filed a $100 million lawsuit against multiple government and law enforcement agencies for an alleged conspiracy that led to the 1965 assassination of civil rights activist and religious leader Malcolm X. Crump was joined by one of Malcolm X's daughters, Ilyasah Shabazz, in announcing the news on the family's behalf. The suit accuses the U.S. government, the Department of Justice, the FBI, the CIA and the New York Police Department of being involved in the events that led to Malcolm X's assassination and a decadeslong cover-up. It includes claims of excessive use of force against Malcolm X, deliberate creation of danger, failure to protect, denial of access to the courts for Malcolm X's family, conspiracy, fraudulent concealment and wrongful death. Malcolm X was 39 when he was shot 21 times by multiple gunmen who opened fire at him during a speech at the Audubon Ballroom in New York on Feb. 21, 1965. His wife and children were in the crowd at the time. The suit claims that the government agencies had knowledge of credible threats to Malcolm X's life and didn't act to prevent the assassination. The suit claims the FBI coordinated with undercover informants within the Nation of Islam, from which Malcolm X separated. It accuses the agencies of removing security personnel from the ballroom, encouraging the assassination and failing to intervene, later taking steps to conceal their involvement after the assassination.
Note: Malcolm X was one of four prominent figures killed for speaking truth to power during this era. Read our Substack to learn more about the undeniable evidence that connects these same abuses of power to Dr. Martin Luther King's assassination. For more along these lines, explore concise summaries of news articles on assassinations and intelligence agency corruption.
A House committee revealed Friday that the Pentagon, other US agencies and the European Union – in addition to the State Department – have funded a for-profit "fact-checking" firm that allegedly served "as a nontransparent agent of censorship campaigns." House Oversight Committee Chairman James Comer (R-Ky.) wrote a letter to the firm, NewsGuard, demanding more details about the public-private collaboration that led last year to the State Department being sued by conservative outlets that were labeled more "risky" than their liberal counterparts. NewsGuard has briefed committee staff on contracts it had with the Defense Department in 2021, including the Cyber National Mission Force within US Cyber Command; the State Department and its Global Engagement Center; and the EU's Joint Research Centre. The Oversight panel in June opened its investigation into NewsGuard's apparent participation in a government-funded "censorship campaign" to allegedly discredit and even demonetize news outlets by sharing its ratings of their reliability with advertisers. "These wide-ranging connections with various government agencies are taking place as the government is rapidly expanding into the censorship sphere," the chairman wrote. "One search of government grants and contracts from 2016 through 2023 revealed that there were 538 separate grants and 36 different government contracts specifically to address â€misinformation' and â€disinformation.'"
Note: For more along these lines, read our concise summaries of news articles on censorship and intelligence agency corruption.
Rapper and activist Chuck D appeared at the White House earlier this summer, announcing that he was joining forces with YouTube and Antony Blinken's State Department to become one of Washington's "global music ambassadors." Throughout the Cold War, the United States ... spent vast sums sending famous artists such as Nina Simone, Louis Armstrong, Dizzy Gillespie and Ella Fitzgerald overseas. The CIA deliberately chose to front the campaign with black musicians, helping to soften America's image and promote a (false) message of racial harmony. Despite the official end of the Cold War, the United States has never stopped using music and musicians to foment unrest and spark regime change. The partnership between YouTube and the State Department will see the platform push pro-U.S. music and messaging across the world. This is far from YouTube's only connection to the U.S. national security state. Its parent company, Google, is essentially a creation of the CIA. Both the CIA and the NSA bankrolled the Ph.D. research of Google founder Sergey Brin, and senior CIA officials oversaw the evolution of Google during its pre-launch phase. As late as 2005, the CIA was still a major shareholder in Google. These shares resulted from Google's acquisition of Keyhole, Inc., a CIA-backed surveillance firm whose software eventually became Google Earth – the civilian offshoot of a spying software the U.S. government uses.
Note: Learn more about the CIA's longstanding propaganda network in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Nearly 25 years ago, a group of suicide bombers attacked the U.S.S. Cole off Aden, Yemen, with the loss of 17 U.S. sailors. A Saudi, Abd al-Rahim al-Nashiri, believed to be the mastermind of the attack, was captured in 2002, and was officially charged in 2011 with leading the attack. He has become the longest-running capital murder case at Guantanamo. Al-Nashiri, like so many captives at Guantanamo, was subjected to secret imprisonment by the CIA as well as waterboarding, rectal abuse, and prolonged sleep deprivation. A previous judge at Guantanamo excluded the confessions of al-Nashiri and others because of CIA's torture and abuse. The al-Nashiri case was particularly egregious because his interrogators found him to be compliant, but a senior CIA official ordered the reinstatement of torture and abuse to include waterboarding. The CIA has always maintained that secret memoranda of George W. Bush's Department of Justice permitted the use of "enhanced interrogation techniques" to include waterboarding in order to break the will of the captives. The CIA also had the support of psychologists and the American Psychological Association (APA) in conducting the coercive interrogation of terror suspects in Guantanamo and its secret prisons in East Europe and Southeast Asia. Two former military psychologists developed the CIA's sadistic techniques, which were based on Chinese efforts to obtain false confessions from American prisoners in the 1950s.
Note: Read more about how the American Psychological Association supported CIA torture operations. Learn more about US torture programs in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The CIA has for the first time acknowledged that the 1953 coup it backed in Iran that overthrew its prime minister and cemented the rule of Shah Mohammad Reza Pahlavi was undemocratic. The CIA in 2013 admitted its role in the coup that brought down Iran's then prime minister, Mohammad Mosaddeq, but until now has not publicly acknowledged that the move was undemocratic. Much of the agency's official history of the coup remains classified, complicating the public's understanding of an event that still resonates, as tensions remain high between Tehran and Washington. Iran's mission to the United Nations described the 1953 coup as marking "the inception of relentless American meddling in Iran's internal affairs" and dismissed the US acknowledgments. "The US admission never translated into compensatory action or a genuine commitment to refrain from future interference, nor did it change its subversive policy towards the Islamic Republic of Iran," the mission said in a statement. Seven decades later, the 1953 coup remains as hotly debated as ever in Iran, where many see a straight line leading from the coup to the 1979 Islamic Revolution that ultimately toppled the shah. The coup also prompted the CIA into a series of further actions in other countries, including Guatemala, where US clandestine operations in 1954 installed a military dictator and sparked a 40-year civil war that likely killed approximately 245,000 people.
Note: This admission came in the CIA's official podcast. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Louis Milione retired from the DEA a second time this summer amid reporting by The Associated Press on potential conflicts caused by his prior consulting for the pharmaceutical industry. Less than three months later, Milione again landed a plum job at Guidepost Solutions, a New York-based firm hired by some of the same companies he had been tasked with regulating when he returned to the DEA in 2021. Milione had spent four years at Guidepost prior to his return, leveraging his extensive experience and contacts from a 21-year DEA career. Milione is the most senior of a slew of DEA officials to have traded their badge and gun for a globe-trotting consulting job. His career stands out for two cycles through the revolving door between government and industry, raising questions about the potential impact on the DEA's mission to police drug companies blamed for tens of thousands of American overdose deaths. Milione's private-sector clientele also included Morris & Dickson Co., the nation's fourth-largest wholesale drug distributor, as it tried to stave off DEA sanctions for disregarding thousands of suspicious, high-volume orders. The DEA allowed the company to continue shipping drugs for nearly four years after a judge recommended its license be revoked for "cavalier disregard" of rules aimed at preventing opioid abuse. It was not until AP began asking questions this spring that the DEA moved to finally strip the Shreveport, Louisiana-based company of its license to distribute highly addictive painkillers.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the pharmaceutical industry from reliable major media sources.
A new investigation reveals the extent of the CIA's involvement in the war in Ukraine, where the agency operates clandestinely in what, under a formal declaration of war, would be the domain of the military. The author of the investigation [is] William Arkin, a national security reporter and senior editor at Newsweek, who says that the CIA has "got its hand in a little bit of everything" in Ukraine. "This might come as a surprise to some people, but, as my sources explained it to me, the reality is that Ukraine is not an ally of the United States," [said Arkin]. "We have no treaty obligations towards Ukraine. And the United States is not at war with Russia. So this is a particularly unique battlefield in which the CIA is playing an outsize role, but it is playing an outsize role because the Biden administration has been firm in saying that the U.S. military will not be involved in any direct way in the fighting or on the battlefield or, indeed, inside Ukraine." The CIA is no stranger to Ukraine. Clearly, in the post-World War II period, it was involved in developing right-wing groups within Ukraine that were opposing the Soviet Union, a lot of them former neo-Nazis. "I don't see much movement or much interest even on the part of the U.S. government in Washington ... to find a peaceful resolution" [said Arkin]. "So, really, no one is playing that role. The United Nations is not playing that role. There is no neutral party that really is playing the role of trying to end the conflict between the two parties."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The last time a trove of leaked documents exposed U.S. spying operations around the world, the reaction from allied governments was swift and severe. In Berlin, thousands of people protested in the streets, the C.I.A. station chief was expelled, and the German chancellor told the American president that "spying on friends is not acceptable." In Paris, the American ambassador was summoned for a dressing-down. That was a decade ago, after an enormous leak of classified documents detailing American surveillance programs by ... Edward Snowden. The latest leak of classified documents that appeared online this year, the motive behind which remains unknown, has again illustrated the broad reach of U.S. spy agencies, including into the capitals of friendly countries such as Egypt, South Korea, Ukraine and the United Arab Emirates. Though the documents mainly focus on the war in Ukraine, they include C.I.A. intelligence briefs describing conversations and plans at senior levels of government in those countries, in several cases attributed to "signals intelligence," or electronic eavesdropping. Unlike in 2013, however, U.S. allies appear to be mostly shrugging off the latest examples of apparent spying. So far, the only evident political fallout from the latest leaks has occurred in South Korea, where one classified U.S. document described a debate among senior national security officials about whether to send artillery shells abroad that might wind up in Ukraine, potentially angering Russia.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The FBI and the Defense Department were actively involved in research and development of facial recognition software that they hoped could be used to identify people from video footage captured by street cameras and flying drones, according to thousands of pages of internal documents that provide new details about the government's ambitions to build out a powerful tool for advanced surveillance. The documents, revealed in response to an ongoing Freedom of Information Act lawsuit the American Civil Liberties Union filed against the FBI, show how closely FBI and Defense officials worked with academic researchers to refine artificial-intelligence techniques that could help in the identification or tracking of Americans without their awareness or consent. Many of the records relate to the Janus program, a project funded by the Intelligence Advanced Research Projects Agency, or IARPA. The improved facial recognition system was ultimately folded into a search tool, called Horus, and made available to the Pentagon's Combating Terrorism Technical Support Office, which helps provide military technologies to civilian police forces. No federal laws regulate how facial recognition systems can be used. The tool's use in domestic mass surveillance would be a "nightmare scenario," said Nathan Wessler, a deputy director at the ACLU. "It could give the government the ability to pervasively track as many people as they want for as long as they want. There's no good outcome for that in a democratic society."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
A war between China and Taiwan will be extremely good for business at America's Frontier Fund ... according to audio from a February 1 event. The remarks occurred at a tech finance symposium hosted at the Manhattan offices of Silicon Valley Bank. "If the China-Taiwan situation happens, some of our investments will 10x, like overnight," [a] person who identified as "Tom" said. "So I don't want to share the name, but the one example I gave was a critical component that ... the total market value is $200 million, but it is a critical component to a $50 billion market cap. That's like a choke point, right. And so if it's only produced in China, for example, and there's a kinetic event in the Pacific, that would 10x overnight, like no question about it. There's a couple of different things like that." AFF is surely not the only venture fund that would see stratospheric returns throughout their portfolio in the case of a destabilizing global crisis, like a "kinetic event in the Pacific" – that is to say, war. Gilman Louie, AFF's co-founder and current CEO, serves as chair of the National Intelligence University, advises Biden through his Intelligence Advisory Board, and was tapped for the State Department's Foreign Affairs Policy Board. Louie previously ran In-Q-Tel, the CIA's venture capital arm. In other words, AFF stands to massively profit from a geopolitical crisis while its CEO advises the Biden administration on geopolitical crises. AFF was founded last year with support from former Google CEO Eric Schmidt.
Note: While the detection of a Chinese spy balloon drums up significant fear and outrage over hostile foreign "threats," an incisive article reveals how US surveillance of foreign countries is quite common, including their recent expansion of military bases in Southeast Asia to monitor and surveil China. Furthermore, many independent journalists are questioning the war-fueling narrative that China is a threat to national security. Watch an insightful analysis uncovering the deeper story of what's behind the growing tensions between the US and China.
Under a post-9/11 surveillance program known as "Upstream", the NSA is systematically searching Americans' internet communications as they enter and leave the United States. The agency sifts through these streams of data looking for "identifiers" associated with its many thousands of foreign targets – identifiers like email addresses and phone numbers. The NSA does all of this without warrants, without any individual judicial approval, and without showing that any of the people it is surveilling – including countless Americans – have done anything wrong. This surveillance raises serious constitutional concerns, but no court has ever considered a legal challenge to it because the government has claimed that allowing a suit against Upstream surveillance to go forward would implicate "state secrets". In 2007, for example, an appeals court dismissed a lawsuit filed by Khaled El-Masri claiming that, in a case of mistaken identity, he had been kidnapped and tortured by the CIA. The court acknowledged the public evidence of El-Masri's mistreatment but held that state secrets were too central to the case to allow it to go forward. And in 2010, a different appeals court dismissed a lawsuit filed by five individuals who claimed that one of Boeing's subsidiary companies had flown the planes carrying them to the black sites where they were tortured by the CIA. This use of the state secrets privilege – to dismiss cases – departs from the supreme court's narrow framing of the privilege.
Note: For more along these lines, see concise summaries of deeply revealing news articles on court system corruption and the disappearance of privacy from reliable major media sources.
Allegations by FBI Special Agent Steve Friend contained in a whistleblower complaint filed late Wednesday with the Department of Justice inspector general reveal a politicized Washington, DC, FBI field office cooking the books to exaggerate the threat of domestic terrorism, and using an "overzealous" January 6 investigation to harass conservative Americans and violate their constitutional rights. Friend, 37, a respected 12-year veteran of the FBI and a SWAT team member, was suspended Monday, stripped of his gun and badge, and escorted out of the FBI field office in Daytona Beach, Fla., after complaining to his supervisors about the violations. He was declared absent without leave last month for refusing to participate in SWAT raids that he believed violated FBI policy and were a use of excessive force against Jan. 6 subjects accused of misdemeanor offenses. "I have an oath to uphold the Constitution," he told supervisors when he asserted his conscientious objection to joining an Aug. 24 raid on a J6 subject. "I have a moral objection and want to be considered a conscientious objector." In his whistleblower complaint to DOJ Inspector General Michael Horowitz ... Friend lays out multiple violations of FBI policy involving J6 investigations in which he was involved. He says he was removed from active investigations into child sexual exploitation and human trafficking to work on J6 cases sent from DC. As a result, he believes his child exploitation investigations were harmed.
Note: Read how Facebook is silencing activity related to this whistleblower. Read also Matt Taibbi's reporting on this important case. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
The Central Intelligence Agency has for years been collecting in bulk, without a warrant, some kind of data that can affect Americans' privacy. At the same time, [the C.I.A.] declared that a report about the same topic, which had prompted the letter, must remain fully classified. That report, called "Deep Dive II," was part of a set of studies by a watchdog board scrutinizing intelligence community operations under Executive Order 12333. In March 2021, the Senate Intelligence Committee received a copy of the report. Two Democrats on the panel, Senators Ron Wyden of Oregon and Martin Heinrich of New Mexico, urged Avril D. Haines, the director of national intelligence, and William J. Burns, the C.I.A. director, to declassify the activity. The senators suggested that its hidden existence cut against Americans' understanding that various pieces of legislation enacted in recent years "limit and, in some cases, prohibit the warrantless collection of Americans' records." In 2015, Congress banned bulk collection of telecommunications metadata under the Patriot Act and limited other types of bulk collection by the F.B.I. under laws governing domestic activities like the Foreign Intelligence Surveillance Act, or FISA. Yet "the C.I.A. has secretly conducted its own bulk program" under Executive Order 12333, the senators wrote. "It has done so entirely outside the statutory framework that Congress and the public believe govern this collection, and without any of the judicial, congressional or even executive branch oversight."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Right up until his death in 2018, Ferik Duka dreamed of seeing his three eldest sons, Shain, Dritan, and Eljvir, freed from prison. In 2009, the three brothers were sentenced to life for their role in an alleged plot to attack the Fort Dix military base in New Jersey. The convictions followed a terrorism sting ... that ran for over a year and involved multiple government informants. The investigation into the "Fort Dix Five," as the case became known, was marred by outrageous law enforcement and legal abuses, documented in a 2015 investigation and documentary by The Intercept. Their case was just one of many in which zealous FBI officials and prosecutors, operating in the heated atmosphere of post-9/11 America, branded individuals who posed no appreciable threat to the country as enemies of the state. Many of them, like the Duka brothers, were given long prison sentences or otherwise had their lives ruined after being convicted on material support for terrorism charges. "There hasn't been any reckoning with the legacy of this era," said Ramzi Kassem, a ... Law professor. Kassem said, "It is alarming when you look across these cases and see an overrepresentation of suspects who were mentally deficient, marginalized, or otherwise vulnerable. Informants proposed so-called terrorism plots, funded them, provided means of execution, coaching, and even coaxed the targets of stings over prolonged periods of time in order to enable prosecutors to paint their conduct as criminally punishable."
Note: Read more about terrorism plots hatched by the FBI. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism from reliable major media sources.
Less than six months into the Biden administration, more than 15 consultants from the firm WestExec Advisors have fanned out across the White House, its foreign policy apparatus, and its law enforcement institutions. Five, some of whom already have jobs with the administration, have been nominated for high-ranking posts, and four others served on the Biden-Harris transition team. Even by Washington standards, it's a remarkable march through the revolving door, especially for a firm that only launched in 2017. The pipeline has produced a dominance of WestExec alums throughout the administration, installed in senior roles as influential as director of national intelligence and secretary of state. WestExec clients, meanwhile, have controversial interests in tech and defense that intersect with the policies their former consultants are now in a position to set and execute. The creeping monopolization of foreign policymaking by a single boutique consulting firm has gone largely unnoticed. The firm describes one of its chief selling points as its "unparalleled geopolitical risk analysis," now confirmed by the saturation of its employees in positions of power. WestExec has also succeeded in getting tech startups into defense contracts. Deputy Director of the CIA David S. Cohen was an early member of WestExec's "core team." But it's impossible to know who his clients were, because an exemption for the spy agencies' officials means that his disclosure is not publicly available.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
A former Gestapo general who sent tens of thousands of Jews to their deaths was protected from prosecution by US and West German intelligence after the Second World War. SS-General Franz Josef Huber served as head of the Gestapo in Vienna and much of Austria following the Nazi takeover. He worked closely with Adolf Eichmann, the architect of the Holocaust, and personally ordered the deportation of Austrian Jews to concentration camps. Yet while Eichmann was captured by Israel and sentenced to death ... Huber was released by US forces following the war and spent the rest of his life as a free man in his native Munich, where he was a minor employee at a local business. That was a cover arranged for him by West German intelligence. It now appears Huber was protected by the US because it believed he could be a useful asset against the Soviet Union. "Although we are by no means unmindful of the dangers involved in playing around with a Gestapo general, we also believe, on the basis of the information now in our possession, that Huber might be profitably used by this organization," a CIA memo from 1953 obtained by the New York Times reads. Declassified files obtained by German ARD television's Munich Report show that US and West German intelligence conspired to hide Huber's past and protect him from prosecution. In the US, the CIA, FBI and other intelligence agencies recruited more than 1,000 ex-Nazis as agents in the years following the war.
Note: Read about the Nazi scientists secretly brought to the US to work after WWII. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
As chief investigator for the Senate intelligence committee, Daniel Jones spent five years poring over internal CIA accounts of the agency’s “enhanced interrogation techniques” programme adopted in the “war on terror”, which Congress demanded to see after it emerged that agency officials had destroyed videotapes of the brutal questioning of terrorist suspects. The Amazon movie, The Report, tells the story of what Jones ... and his colleagues found out about the torture programme: the systematic use of waterboarding, sleep deprivation and “stress positions”, and the extraordinary fact that the CIA itself had conducted a review that showed none of it was working. The programme did not provide useful intelligence – and yet the CIA hid that conclusion. None of the officials responsible for the torture or the cover-up had been held accountable. Gina Haspel, who ran one of the CIA’s black sites and who wrote a cable calling for the destruction of the torture videotapes, is now director of the CIA. When Obama was elected, he called an end to the torture, but stopped short of confronting the intelligence community. In a famously oddly worded admission in 2014, Obama said: “We tortured some folks.” The 44th president went on to say: “It’s important for us not to feel too sanctimonious in retrospect about the tough job that those folks had. A lot of those folks were working hard under enormous pressure and are real patriots.” The line still infuriates Jones, who says the real patriots were the CIA whistleblowers.
Note: A former CIA counterterrorism officer who was imprisoned for blowing the whistle on the CIA torture referred to CIA director Gina Haspel's actions as "war crimes, crimes against humanity". For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
A memo written by FBI director J. Edgar Hoover, released among 2,800 declassified records relating to the assassination of President John F. Kennedy, has shown how in the days after Lee Harvey Oswald was shot, the FBI planned to convince the public that he was the real assassin as soon as possible. In the document, dictated shortly after Oswald was shot by Dallas nightclub owner Jack Ruby, Hoover explains. “The thing I am concerned about, and so is [Attorney General Nicholas] Katzenbach, is having something issued so we can convince the public that Oswald is the real assassin,” Hoover said in the 1963 memo. The former FBI director went on to explain that establishing which facts could and could not be made public was important because of the possible foreign policy implications. “There are several aspects which would complicate our foreign relations,” Hoover says in the memo. These were namely that the FBI was aware Oswald had contacted both the Cuban embassy in Mexico City and the Soviet Embassy in Washington. Hoover explained that having the interception of these messages - one of them to the “man in the Soviet Embassy in charge of assassinations and similar activities on the part of the Soviet government” - made public would have “muddied the waters internationally.” Roughly 300 documents of the tranche of what would have been 3,100 documents pertaining to the assassination of President Kennedy have been withheld [by] President Donald Trump.
Note: Why are documents related to the JFK assassination still classified over 50 years after that fact? Why did Trump backtrack on his campaign promise to release all of these files? For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and assassinations.
More than six years after the FBI crime laboratory was rocked by controversy, the Justice Department has identified about 3,000 criminal cases that could have been affected by flawed science and skewed testimony. Government officials told The Associated Press they are aware of between 100 and 150 cases in which prosecutors have alerted defendants of problems they concluded were material to verdicts. None has resulted in overturned convictions, they said. The identification of cases and prosecutorial reviews are the final stages of a scandal that shook the FBI during the mid-1990s when a senior chemist at the famed crime lab went public with allegations of shoddy work, tainted evidence and skewed testimony. A Justice Department internal investigation concluded in 1997 that 13 lab technicians made scientific errors in cases or slanted testimony to help prosecutors. Several were reprimanded, but none was fired or prosecuted. Some criminal defense lawyers are concerned by the Justice Department's decision to let federal, state and local prosecutors decide whether to notify defendants of problems. "That's like asking the fox to guard the hen house," said former federal prosecutor Neal Sonnett. He is past president of the National Association of Criminal Defense Lawyers. "If there is a possibility that evidence has been tainted, then the Department of Justice or prosecutors should not be the arbiter of whether it's material," Sonnett said.
Note: In 2015, the FBI admitted its scientists used flawed evidence for decades to help prosecutors wrongfully convict defendants. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
The Justice Department inspector general's office has determined that the FBI crime laboratory made "scientifically unsound" conclusions in the Oklahoma City bombing case, finding that supervisors approved lab reports they "cannot support" and many analyses were "biased in favor of the prosecution." The still-secret draft report, obtained by The Times, also concludes that FBI lab officials may have erred about the size of the blast and the amount of explosives involved and may not know for certain that ammonium nitrate was used for the main charge that killed 168 people and injured more than 850 others. The draft report shows that FBI examiners could not identify the triggering device for the truck bomb or how it was detonated on April 19, 1995, and it warns that a poorly maintained lab environment could have led to contamination of critical pieces of evidence, such as debris found on the clothing of defendant Timothy J. McVeigh. If entered into evidence at McVeigh's trial ... the draft report could provide a measure of doubt about whether bomb residue evidence was properly handled and professionally examined by experts at the Washington lab. The Justice investigation began after complaints were made by Frederic Whitehurst, an FBI chemist and the principal whistle blower on problems at the lab. While confirming many accusations made by Whitehurst and others, the report also knocks down a number of Whitehurst's charges.
Note: Read more about major issues with the Oklahoma City bombing investigation. More recently, the FBI has admitted to problems in its forensics unit leading to decades of flawed testimony in criminal trials. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
From the headlines, [Sidney] Gottlieb had emerged as a kind of Dr. Strangelove. He had overseen a vast network of psychological and medical experiments conducted in hospitals, universities, research labs, prisons and safe houses, many of them carried out on unsuspecting subjects – mental patients, prostitutes and their johns, drug addicts, and anyone else who stumbled into the CIA's web. Some had been subjected to electroshock therapy in an effort to alter their behavior. Some endured prolonged sensory deprivation. Some were doped and made to sleep for weeks in an attempt to induce an amnesia-like state. Others suffered a relentless loop of audiotape playing the same message hundreds of thousands of times. As the CIA's sorcerer, Gottlieb had also attempted to raise assassination to an art form. Out of his labs had come a poisoned handkerchief designed to do in a Libyan colonel, a bacteriological agent for a Congolese leader and debilitating potions intended for Cuba's Fidel Castro. The name Sidney Gottlieb is but an obscure footnote. Yet for a generation of Americans who came of age in the Cold War, his experiments came to define the CIA as a rogue agency. The most notorious project was MK-ULTRA, created in 1953. It was, in Gottlieb's words, intended to explore 'various techniques of behavior control in intelligence operations.' It funded an array of research, including electric-shock treatments, hypnosis and experiments designed to program or deprogram a subject's memory.
Note: Read more about the CIA's MK-ULTRA program. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources.
Even for those familiar with parts of the stories about women who were deceived into intimate relationships with undercover police officers, the evidence that has emerged in recent weeks has been shocking. The litany of destructive behaviour either carried out by, or caused by, officers deployed to spy on campaigners, who were mostly active in leftwing causes, is being laid bare as never before: self-harm, heroin use, unprotected sex leading to emergency contraception, coercive control and the sudden abandonment of female partners and children. On Tuesday, Belinda Harvey told the public inquiry how she was manipulated by Bob Lambert, who tricked at least three other women into relationships as well. Next week, Mr Lambert will face questions about who authorised the tactic of targeting and seducing young, female activists – and why he employed it so many times. Last month, another undercover officer testified that Mr Lambert had "bragged" about fathering a child. In their jointly authored book, Deep Deception, five women described how they found out that they had been systematically lied to by former partners – in some cases after decades of confusion and self-doubt. Mr Lambert stands out not only for the number of secret relationships he initiated and his alleged involvement in an arson plot, but also because his five-year deployment as a police spy in the 1980s was treated as a triumph. He was given a commendation and went on to run covert operations.
Note: Read more about the dozens of activists tricked into having romantic relationships with undercover police. For more along these lines, read our concise summaries of news articles on police corruption.
Malcolm X (El-Hajj Malik El-Shabazz) was more than a leader – he was a force, a relentless advocate who confronted an entrenched culture of injustice with courage and strength. Malcolm X set the stage for me and many others who were called to continue the fight against injustice. His fight was cut short by a horrific assassination carried out in front of his wife and children, followed by a cover-up that his family believes involved some of the most highly regarded agencies in our country at the time. On Nov. 15, I joined some of our nation's foremost attorneys in filing a lawsuit on behalf of the Shabazz family, seeking to uncover the truth surrounding Malcolm's assassination on Feb. 21, 1965, in New York City. Through this lawsuit, we plan to prove in court the accusation that government agencies, including the FBI, the CIA and the New York Police Department, actively facilitated and then covered up Malcolm X's assassination through several coordinated actions. We believe the FBI and the NYPD engaged in a cover-up after the assassination, concealing key documents, manipulating witness testimony and wrongfully prosecuting innocent men to divert attention from their own roles in his death. Our case is being brought forward in the wake of a public apology from former Manhattan District Attorney Cyrus R. Vance Jr., who, in November 2021, acknowledged that ... two of three men who'd been convicted of murdering Malcolm X, hadn't committed the crime.
Note: The above was written by civil rights attorney Ben Crump. Malcolm X was one of four prominent figures killed for speaking truth to power during this era. For more along these lines, explore concise summaries of news articles on assassinations and intelligence agency corruption. Read our Substack to learn more about the undeniable evidence that connects these same abuses of power to Dr. Martin Luther King's assassination.
On a chilly, early morning in January 2019, a group of animal rights activists descended upon a poultry farm in central Texas. Activists with Meat the Victims, a decentralized, global movement to abolish animal exploitation, later uploaded gruesome photos of injured and dead chicks to social media platforms. The police identified [Sarah Weldon] and issued a warrant for her arrest, along with 14 other activists. She was charged with criminal trespassing. The local police weren't the only ones paying attention. An FBI agent in Texas had been secretly monitoring the demonstration. His focus? Weapons of mass destruction. The FBI has been collaborating with the meat industry to gather information on animal rights activism, including Meat the Victims, under its directive to counter weapons of mass destruction, or WMD, according to agency records. The records also show that the bureau has explored charging activists who break into factory farms under federal criminal statutes that carry a possible sentence of up to life in prison – including for the "attempted use" of WMD – while urging meat producers to report encounters with activists to its WMD program. "This ... is textbook escalation by government actors against successful efforts by social movements that they disagree with or find subversive," said Justin Marceau, a law professor. "Framing of civil disobedience against factory farms as terrorism is a form of government repression."
Note: Animal rights activists are relentlessly prosecuted while the evidence of animal cruelty they uncover is ruthlessly suppressed. For more along these lines, see concise summaries of deeply revealing news articles on corruption in law enforcement and in the food system from reliable major media sources.
Two decades ago, Shahawar Matin Siraj started to feel uneasy about a plan to bomb a subway station in Manhattan. Osama Eldawoody, a New York City Police Department informant recruited after 9/11, had established himself as a father figure to Siraj, who was 21 when they met. But as it started to feel real, Siraj tried to back out – insisting about 18 times that he was not willing to place bombs in the station. "I have to, you know, ask my mom's permission," he had said. Siraj [was] arrested a week later ... and was sentenced in 2007 to 30 years in prison after three years of pretrial detention. Siraj is one of almost 1,000 terrorism defendants prosecuted by the U.S. since 9/11. More than 350 defendants' cases involved FBI stings with an informant or undercover agent. The fear of this kind of surveillance transformed the social fabric of Muslim communities and made them more insular. "You didn't know if the person you're talking to was an informant or undercover," says Fahd Ahmed, executive director of Desis Rising Up and Moving, or DRUM. (Siraj's family are members.) A 2014 Human Rights Watch report closely reviewed 27 federal prosecutions involving 77 defendants and found that in some instances, "the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act." The report also described a pattern of targeting people with mental or intellectual disabilities in these stings.
Note: Read more about the FBI's manufacture of terrorist plots. For more along these lines, see concise summaries of deeply revealing news articles on law enforcement corruption and terrorism from reliable major media sources.
On Oct. 14, 2020, three weeks out from the election, with Joe and President Donald Trump neck and neck in the polls, the New York Post's first story about Hunter Biden's abandoned laptop exploded like a bomb. The front page featured an email from Hunter's Burisma paymaster, Vadym Pozharskyi, thanking him for "the opportunity to meet your father." It was hard to square with Joe's assertions throughout the campaign that he knew nothing about Hunter's seeming international influence-peddling operation. Even as Twitter and Facebook, in collusion with the FBI, censored The Post, and the mainstream media collectively looked the other way, the Biden campaign knew that the sheer weight of the evidence would eventually be impossible to ignore. [Antony] Blinken's solution was to set in motion one of the most brazen dirty tricks in US electoral history. Using the intelligence community to sound the false alarm of "Russian disinformation," ground already prepared by corrupt elements inside the FBI, he set out to discredit the whole laptop story. CIA veteran Mike Morell [organized] 50 intelligence colleagues to sign a letter falsely insinuating that the damning material from Hunter's laptop published by The Post was Russian disinformation. The Dirty 51 letter, as it came to be known, was timed to appear on the eve of the final presidential debate, to maximize its benefit to Joe, by giving him a "talking point to push back on [President] Trump on this issue," as Morell put it.
Note: For more along these lines, see concise summaries of deeply revealing news articles on censorship and intelligence agency corruption from reliable major media sources.
From the start of U.S. investigations into the terrorist attacks of Sept. 11, 2001, the question of whether the Saudi government might have been involved has hovered over the case. New evidence has emerged to suggest more strongly than ever that at least two Saudi officials deliberately assisted the first Qaida hijackers. Most of the evidence has been gathered in a long-running federal lawsuit against the Saudi government by survivors of the attacks and relatives of those who died. The court files also raise questions about whether the FBI and CIA, which repeatedly dismissed the significance of Saudi links to the hijackers, mishandled or deliberately downplayed evidence of the kingdom's possible complicity in the attacks. The plaintiffs' account still leaves significant gaps in the story of how two known al-Qaida operatives, Nawaf al-Hazmi and Khalid al-Mihdhar, avoided CIA surveillance overseas, flew into Los Angeles under their own names and then ... settled in Southern California. Still, the lawsuit has exposed layers of contradictions and deceit in the Saudi government's portrayal of Omar al-Bayoumi. FBI agents identified Bayoumi as having helped the two young Saudis rent an apartment, set up a bank account and take care of other needs. Bayoumi, then 42, was arrested on Sept. 21, 2001, in Birmingham, England. After pressure from Saudi diplomats, Bayoumi was freed by the British authorities without being charged. U.S. officials did not try to have him extradited.
Note: For more along these lines, see concise summaries of deeply revealing news articles on 9/11 from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
Federal and state Homeland Security grants allow local law enforcement agencies to surveil American citizens with technology more commonly found in war zones and foreign espionage operations. At least two Texas communities along the U.S.-Mexico border have purchased a product called "TraffiCatch," which collects the unique wireless and Bluetooth signals emitted by nearly all modern electronics to identify devices and track their movements. The product is also listed in a federal supply catalog run by the U.S. government's General Services Administration, which negotiates prices and contracts for federal agencies. Combining license plate information with data collected from wireless signals is the kind of surveillance the U.S. military and intelligence agencies have long used, with devices mounted in vehicles, on drones or carried by hand to pinpoint the location of cell phones and other electronic devices. Their usage was once classified and deployed in places like Afghanistan and Iraq. Today, similar devices are showing up in the streets of American cities. The Supreme Court has said that attaching a GPS tracking device to a car or getting historical location data from a cell carrier requires a search warrant. However, law enforcement has found ways around these prohibitions. Increasingly, as people walk around with headphones, fitness wearables and other devices ... their data can be linked to a car, even after they have ditched the car. Courts have not definitively grappled with the question: Under what circumstances can law enforcement passively capture ambient signal information and use it as a tracking tool?
Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy from reliable major media sources.
At CIA, we find inspiration in all kinds of places. From robotic catfish to real-life spy birds, animals and their look-alikes have helped Agency officers perform a variety of critical duties, including eavesdropping, intelligence gathering, security, covert communications, and photo surveillance. During the Cold War ... CIA's Office of Research and Development created a camera so tiny and lightweight that a pigeon could carry it. The camera was strapped to the bird's chest with a little harness, and the bird would be released over a secret area ... that we wanted to know more about. The camera would snap pictures as the bird flew back home to us. During the Vietnam War ... CIA scientists invented what is known as the seismic intruder detection device. It could be strategically placed to monitor movements up to 300 meters away. However, our scientists had to disguise the technology. Since tigers are native to Vietnam ... they provided the ideal cover. The detection device was designed to look like tiger droppings. In the 1970s, CIA's Office of Research and Development created "Insectothopter," the first insect-sized unmanned aerial vehicle (UAV) of its kind! It was disguised as an everyday dragon fly. CIA's Office of Technical Services thought rats would be a great way to conceal things during the Cold War. They treated the rat's carcass with a preservation agent, cut it open, and created a hollow cavity where our officers could hide things like money, notes, or even film. The rat would then be sewn back up, placed at a pre-determined dead drop location, and then left for the asset to retrieve. During testing phases, the rats went missing because stray cats had stolen them.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Hardware that breaks into your phone; software that monitors you on the internet; systems that can recognize your face and track your car: The New York State Police are drowning in surveillance tech. Last year alone, the Troopers signed at least $15 million in contracts for powerful new surveillance tools. Surveillance technology has far outpaced traditional privacy laws. In New York, lawmakers launched a years-in-the-making legislative campaign last year to rein in police intrusion. None of their bills have made it out of committee. A report from the U.S. Office of the Director of National Intelligence, put it succinctly: "The government would never have been permitted to compel billions of people to carry location tracking devices on their persons at all times, to log and track most of their social interactions, or to keep flawless records of all their reading habits." That report called specific attention to the "data broker loophole": law enforcement's practice of obtaining data for which they'd otherwise have to obtain a warrant by buying it from brokers. The New York State Police have taken greater and greater advantage of the loophole in recent years. They've also spent millions on mobile device forensic tools, or MDFTs, powerful hacking hardware and software that allow users to download full, searchable copies of a cellphone's data, including social media messages, emails, web and search histories, and minute-by-minute location information.
Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy from reliable major media sources.
The FBI spends "every day, all day long" interrogating people over their Facebook posts. At least, that's what agents told Stillwater, Oklahoma, resident Rolla Abdeljawad when they showed up at her house to ask her about her social media activity. Three FBI agents came to Abdeljawad's house and said that they had been given "screenshots" of her posts by Facebook. Her lawyer Hassan Shibly posted a video of the incident. "Facebook gave us a couple of screenshots of your account," one agent in a gray shirt said in the video. "So we no longer live in a free country and we can't say what we want?" replied Abdeljawad. "No, we totally do. That's why we're not here to arrest you or anything," a second agent in a red shirt added. "We do this every day, all day long. It's just an effort to keep everybody safe and make sure nobody has any ill will." Shibly says that he doesn't know which Facebook post caught the agents' attention, and that it was the first time he had heard of Facebook's parent company, Meta, preemptively reporting posts to law enforcement. [Abdeljawad] made multiple angry posts per day about the war in Gaza, referring to Israel as "Israhell." But none of the posts on her feed call for violence. Ironically, Abdeljawad had also posted a warning about exactly the kind of government monitoring she was later subjected to. "Don't fall for their games. Our community is being watched & they are just waiting for any reason to round us up," Abdeljawad wrote.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
The Haitian Bald Headed Party (PHTK) has tyrannically ruled Haiti since 2011. The U.S. State Department, who unilaterally picked Ariel Henry to be Haiti's prime minister in July of 2021, has now decided Henry no longer fits their interests and has forced him to step down. Henry was prevented from returning to Haiti on March 5 by paramilitary gangs who attempted to take the Toussaint Louverture International Airport, opening fire and hitting a plane bound for Cuba. The imperial forces responsible for over half a million illegal U.S. guns in Haiti that fuel this unparalleled violence are now preparing their next move to keep Haiti subdued. For the past 18 months, the Biden administration has sought to facilitate what will be the fourth U.S.-led foreign invasion and occupation of Haiti in the last 100 years by deputizing Kenya, Benin, the Bahamas, and other western neocolonies to carry out the occupation. The CIA remains active as well seeking a neocolony the U.S. can deputize to carry out this invasion. The only Haitian representatives that can be considered for the U.S.-led transitional government have to agree to the occupation. U.S. policy empowers and works with corrupt political leadership in Haiti because they can be relied upon to do the U.S.'s bidding. Meanwhile, those leaders who refuse to sell out to imperial interests are repressed and murdered. The ruling PHTK [has] bragged about being "legal bandits" above the law and employing ... government death squads armed with hundreds of thousands of U.S. weapons.
Note: The US government wants Ariel Henry out to purportedly prevent a full scale civil war. Is the US now trying to address Haitian stability and violence that US policies have helped create? Read about US involvement in the assassination of Haitian President Jovenel MoĂŻse. Learn more about the role the arms industry plays in global conflicts in our comprehensive Military-Intelligence Corruption Information Center.
On March 8, the Department of Defense published the most significant report on UFOs in at least two generations – a congressionally mandated historical review of U.S. government involvement with unidentified anomalous phenomena or UAP. Unfortunately, the report from the Pentagon's All-domain Anomaly Resolution Office (AARO) contains an array of striking omissions and one particularly egregious misrepresentation. The result is a misleading report which, like so much government UFO-related propaganda over seven decades, tells the reader just to move on, nothing to see here. AARO has not provided a plausible explanation for naval aviators' more recent encounters – including one harrowing near-collision – with spherical objects exhibiting extraordinary flight characteristics. Worst of all, AARO's review misrepresents the most exhaustive, comprehensive historical analysis of UFO incidents, conducted on behalf of the Air Force by the Battelle Memorial Institute in the early 1950s. According to AARO, the resulting report found that "all cases that had enough data were resolved and explainable." But this is not what Battelle's analysis found at all, and AARO's misrepresentation of its conclusions speaks volumes. According to the Battelle analysis ... of the UFO cases considered "Excellent" and with sufficient data to draw a conclusion, 33 percent were categorized as having "unknown" origin.
Note: For more along these lines, see concise summaries of deeply revealing news articles on UFOs from reliable major media sources. Then explore the excellent, reliable resources provided in our new UFO Information Center.
Wikileaks founder Julian Assange, as of this writing, faces a final attempt to appeal his extradition from the U.K. to the U.S. If he fails, he faces Espionage Act charges that could lead to living out the remainder of his life in federal prison. If Assange is extradited and successfully prosecuted for espionage, it would create a dangerous precedent for the government to suppress future reporting. The New York Times has a long and storied record of publishing classified materials going back to the 1971 Pentagon Papers, which showed the true history of the Vietnam War. More recently, the Washington Post and other outlets reported on the Discord intelligence leaks, revealing that Pentagon officials had suspected that the Ukrainian counter-offensive against Russia would fail ... among many other revelations. In 2013, DOJ officials noted that the legal theory used to prosecute Assange would apply almost equally to most major newspapers with a history of reporting on government secrets, such as the many news outlets that covered Edward Snowden's disclosures about warrantless NSA mass surveillance of Americans. It's not hard to see how the U.S. views Assange as an enemy of the state. He has exposed secrets and hypocrisy of American policymakers on the highest level. Diplomatic cables show the extent to which the State Department often acts as an extension of narrow multinational corporate interests. Wikileaks has published many documents that go well beyond the diplomatic cables and Democratic emails. The Afghanistan war documents disclosed by Wikileaks show extensive civilian deaths and Taliban militancy, far beyond what the Pentagon had previously acknowledged.
Note: The US prosecution of Assange undermines press freedom. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
Unidentified anomalous phenomena (UAP) have not only fueled public curiosity but have underscored the urgency for enhanced transparency from our government and its agencies. There is [a] need for Congress to initiate thorough public hearings on UAP, following explosive testimony last summer from intelligence officer-turned-whistleblower David Grusch regarding above top-secret crash retrieval and reverse engineering programs of technologies of unknown origin and nonhuman intelligence. Drawing inspiration from the historic U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, commonly known as the Church Committee, Congress could adopt a similar, no-nonsense approach, which would unearth government secrets about UAP, establish unprecedented transparency and instill unwavering accountability in the process. The Church Committee, led by then-Senator Frank Church (D-ID) in 1975, was pivotal in investigating and exposing US intelligence agency abuses. Taking a cue from this historic success, a Church-style Select Committee on UAP is not just advisable but imperative. Such a committee would compel government agencies and officials to testify openly about their knowledge of UAP encounters. The committee would unearth the extent to which the intelligence community engaged in a disinformation campaign against the American people to keep its UAP secrets buried.
Note: For more along these lines, see concise summaries of deeply revealing news articles on UFOs from reliable major media sources. Then explore the excellent, reliable resources provided in our new UFO Information Center.
In 2021, bullets flew outside a 7-Eleven during a Bureau of Alcohol, Tobacco, Firearms and Explosives operation in Colorado Springs, Colorado. The same year, U.S. Marshals fired shots inside a barbecue restaurant in the Chicago area, and a firefight erupted during a Drug Enforcement Administration search aboard an Amtrak passenger train in Tucson, Arizona. Three suspects and a federal officer were killed. Miraculously, no bystanders were struck. Had they been local police shootings, they might have generated public demands to release body camera video and use-of-force investigation reports. But they were federal operations, conducted by agents and task forces with four federal law enforcement agencies – the FBI, the ATF, the DEA and the U.S. Marshals Service – in which the use of force remains largely a black box, free from public scrutiny. Those four agencies overseen by the Justice Department, among the most prestigious in the country, have been slow to adopt reforms long embraced by big-city police departments, such as the use of body cameras and the release of comprehensive use-of-force data. From 2018 to 2022, 223 people were shot by an on-duty federal officer, a member of a federal task force or a local officer participating in an operation with federal agents, according to an NBC News analysis. A total of 151 were killed. More than 100 of the shootings were investigated by local prosecutors, with only two resulting in criminal charges for officers.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in intelligence agencies and in police departments from reliable major media sources.
A new nonfiction streaming series, "Four Died Trying" ... investigates not only the JFK liquidation, but also the people and players allegedly behind the assassinations of Malcolm X on Feb. 21, 1965; Rev. Martin Luther King Jr., on April 4, 1968; and Sen. Robert Francis Kennedy on June 6, 1968. Each of these killings is a false mystery. We know what happened to these guys. Each of these leaders in the 1960s were killed by the powers-that-be because of what they were doing at the time. Who planned it? It's a combination of people within the Pentagon, the CIA, Johnson, elements of the mob. There's continually more evidence to show that all of these groups were involved. They were each of them, in their own ways, working for a better world. President Kennedy ... was trying to end the Cold War. Malcolm was going to bring charges against the U.S. in the U.N., in the World Court. Martin Luther King came out against the Vietnam War and was planning the occupation of Washington, D.C. [with the Poor People's Campaign]. Bobby was becoming the candidate of the poor and disenfranchised and was talking about investigating his brother's death and pulling out of Vietnam. We haven't had any president since then who hasn't been a creature of this military-industrial-intelligence-complex. This is the profound warning Eisenhower gives us. He worries that a technocracy, a scientific elite, could control American democracy. It's a profound warning from a general and a president to the American public that we unfortunately did not heed as we should have.
Note: Listen to an excellent podcast with the filmmakers about what these tragic assassinations had in common. For more along these lines, read our in-depth essay on the MLK assassination, along with concise summaries of revealing news articles on assassinations.
For Palestinians in Gaza, Israel's eyes are never very far away. Surveillance drones buzz constantly from the skies. The highly-secured border is awash with security cameras and soldiers on guard. But Israel's eyes appeared to have been closed in the lead-up to an unprecedented onslaught by the militant Hamas group, which broke down Israeli border barriers and sent hundreds of militants into Israel to carry out a brazen attack that has killed hundreds. Israel withdrew troops and settlers from the Gaza Strip in 2005. But even after Hamas overran Gaza in 2007, Israel appeared to maintain its edge, using technological and human intelligence. It claimed to know the precise locations of Hamas leadership and appeared to prove it through the assassinations of militant leaders in surgical strikes, sometimes while they slept in their bedrooms. Israel has known where to strike underground tunnels used by Hamas to ferry around fighters and arms. Despite those abilities, Hamas was able to keep its plan under wraps. The ferocious attack, which likely took months of planning and meticulous training and involved coordination among multiple militant groups, appeared to have gone under Israel's intelligence radar. An Egyptian intelligence official said Egypt, which often serves as a mediator between Israel and Hamas, had spoken repeatedly with the Israelis about "something big," without elaborating. He said Israeli officials were focused on the West Bank and played down the threat from Gaza.
Note: According to Efrat Fenigson, a former Israeli soldier who served on the Gaza border, "A cat moving alongside the fence is triggering all forces." How could Israeli intelligence not have known that this attack was coming? For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and war from reliable major media sources.
Paul Landis was one of two Secret Service agents tasked with guarding first lady Jacqueline Kennedy on November 22, 1963–the day President John F. Kennedy was assassinated. In a new book, The Final Witness, to be published in October, Landis claims to have seen something that afternoon that he had never publicly admitted before. Landis was approximately 15 feet away when Kennedy was mortally wounded. Landis saw and did something that he has kept secret for six decades, he says now. He claims he spotted a bullet resting on the top of the back of the seat. He says he picked it up, put it in his pocket, and brought it into the hospital. Then, upon entering Trauma Room No. 1 (at that stage, he was the only nonmedical person in the room besides Mrs. Kennedy, and both stayed for only a short period), he insists, he placed the bullet on a white cotton blanket on the president's stretcher. This secret, as it turns out, may upend key conclusions of the Warren Commission, the body created by President Lyndon Johnson to investigate the assassination. Landis ... never sat for an interview before the FBI and never testified before the commission. There have been endless theories surrounding the assassination, but not one of them considered that a Secret Service agent might have brought a fully intact bullet, found on top of the rear seat of the limousine, into Parkland Memorial Hospital and placed it on the president's stretcher. Not one.
Note: For more along these lines, see concise summaries of revealing news articles on the Kennedy assassination from reliable major media sources. For deeper exploration, check out our comprehensive Information Center on John F. Kennedy's assassination, which challenge mainstream narratives about his assassination and the events leading up to it.
An effort by United States lawmakers to prevent government agencies from domestically tracking citizens without a search warrant is facing opposition internally from one of its largest intelligence services. Officials at the National Security Agency (NSA) have approached lawmakers charged with its oversight about opposing an amendment that would prevent it from paying companies for location data instead of obtaining a warrant in court. Introduced by US representatives Warren Davidson and Sara Jacobs, the amendment ... would prohibit US military agencies from "purchasing data that would otherwise require a warrant, court order, or subpoena" to obtain. The ban would cover more than half of the US intelligence community, including the NSA, the Defense Intelligence Agency, and the newly formed National Space Intelligence Center, among others. A government report declassified by the Office of the Director of National Intelligence last month revealed that US intelligence agencies were avoiding judicial review by purchasing a "large amount" of "sensitive and intimate information" about Americans, including data that can be used to trace people's whereabouts over extended periods of time. The sensitivity of the data is such that "in the wrong hands," the report says, it could be used to "facilitate blackmail," among other undesirable outcomes. The report also acknowledges that some of the data being procured is protected under the US Constitution's Fourth Amendment.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Fox News host Jesse Watters claimed during a Wednesday airing of The Five that the Federal Bureau of Investigation and Central Intelligence Agency can use information found on the Hunter Biden laptop to blackmail President Joe Biden. Watters' monologue was preceded by talks of the recent plea deal that the president's son reached with federal prosecutors earlier this week to avoid jail time on three federal charges. He failed to pay $1 million in taxes and faced a gun felony count. Conservative politicians and pundits in the media have used this to claim the Department of Justice is creating a two-tiered justice system. Earlier this month, former President Donald Trump was formally indicted by the DOJ for 37 charges related to his handling of classified material. "The feds are never going to crack open the laptop as long as Joe Biden's president. His administration is not going to investigate corruption in the Biden family. It's just not going to happen," Watters told the Fox panel. "Plus, the FBI in the CIA has this is blackmail. They can just dangle it in front of Joe and he has to do whatever they say or else â€boop!'" Watters then called the former president an "outsider" in Washington. "But the bottom line is that insiders protect insiders. You said it the other day, Trump's an outsider. He goes to prison, his people go to prison. But if you're a Washington insider, you get to Hunter Biden treatment," Watters concluded.
Note: If the article fails to load, here's an alternate source. Read about how the intelligence agencies infiltrated the media to censor the Hunter Biden laptop story and other important topics. While Hunter Biden was indicted for three felony gun charges and nine counts of tax-related crimes, his laptop also revealed suspicious business dealings with corrupt overseas firms.
The Pentagon's intelligence branch is developing new tech to help it track the mass movement of people around the globe and flag "anomalies." The project is called the Hidden Activity Signal and Trajectory Anomaly Characterization (HAYSTAC) program and it "aims to establish â€normal' movement models across times, locations, and populations and determine what makes an activity atypical," according to a press release from the Office of the Director of National Intelligence (DNI). HAYSTAC will be run by the DNI's Intelligence Advanced Research Projects Activity (IARPA). It's kind of like DARPA, the Pentagon's blue-sky research department, but with a focus on intelligence projects. According to the agency, the project will analyze data from internet-connected devices and "smart city" sensors using AI. "An ever-increasing amount of geospatial data is created every day," Jack Cooper, HAYSTAC's program manager, said. Cooper also mentioned privacy, or rather a lack of it. "Today you might think that privacy means going to live off the grid in the middle of nowhere," he said. "That's just not realistic in today's environment. Sensors are cheap. Everybodys got one. There's no such thing as living off the grid." In one project, [contractor] AIS simulated a cyber attack. "Devices included traditional desktop systems, laptops, tablets, and mobile platforms," the firm said. "The technology tracks users through biometric features, including keystroke biometrics, mouse movement behavior, and gait detection."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The special counsel-led investigation looking into the FBI's probe of Russian interference in the 2016 Trump campaign has ended, the Department of Justice announced Monday, and in a 306-page final report, concludes the FBI did not have enough intelligence to merit a full Trump-Russia investigation. The report says that investigation – which was originally called the "Crossfire Hurricane" – was treated different from how cases related to Donald Trump's then-opponent, Democratic candidate Hillary Clinton, had been handled. "The speed and manner in which the FBI opened and investigated Crossfire Hurricane during the presidential election season based on raw, unanalyzed and uncorroborated intelligence also reflected a noticeable departure from how it approached prior matters involving possible attempted foreign election interference plans aimed at the Clinton campaign," the report says. The report concludes that the DOJ and FBI "failed to uphold their important mission of strict fidelity to the law." "Our investigation also revealed that senior FBI personnel displayed a serious lack of analytical rigor towards the information they they received, especially information received from politically affiliated persons and entities," the report says. In particular, there was a significant reliance on investigative leads provided by, or funded by, political opponents of Trump. "The Department did not adequately examine or question thee materials and the motivations of those providing them," the report says.
Note: Explore a much more in-depth analysis of this important news by crack reporter Matt Taibbi. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
In 2010, Chelsea Manning shocked the world with leaked documents that exposed abuses and crimes committed by the United States military in Iraq. These revelations also made the publisher of those documents, Julian Assange, and his organization, WikiLeaks, household names. The U.S. government [is] charging Assange – a publisher – with violating the Espionage Act. Under the Espionage Act, one does not have the ability to make a public interest defense. All prosecutors have to do is show that a whistleblower possessed documents or transferred "national defense information" to a member of the press. Damage has already been done, but the future of journalism is in further jeopardy if the U.S. government holds a trial against Assange, convicts him, and shows the world that it has the final say over who is and is not a journalist. CIA Director Mike Pompeo and other officials sketched plans to target Assange that included poisoning or kidnapping him. This, along with the disruption campaign against WikiLeaks, represented the CIA's all-out war against a dissident media organization. The agency went so far as to redefine the organization as a "non-state hostile intelligence service" to carry out operations that it could never get away with against a group of journalists. It should be the subject of an intense investigation in Congress, and the Justice Department should be dropping the charges after publicly conceding that the CIA's actions mean Assange could never have a fair trial.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Rep. Rashida Tlaib, D-Mich., is circulating a letter among her House colleagues that calls on the Department of Justice to drop charges against Julian Assange and end its effort to extradite him from his detention in Belmarsh prison in the United Kingdom. The Justice Department has charged Assange, the publisher of WikiLeaks, for publishing classified information. The Obama administration had previously decided not to prosecute Assange, concerned with what was dubbed internally as the "New York Times problem." The Times had partnered with Assange when it came to publishing classified information and itself routinely publishes classified information. Publishing classified information is a violation of the Espionage Act, though it has never been challenged in the Supreme Court, and constitutional experts broadly consider that element of the law to be unconstitutional. The Obama administration could not find a way to charge Assange without also implicating standard journalistic practices. The Trump administration, unburdened by such concerns around press freedom, pushed ahead with the indictment and extradition request. The Biden administration, driven by the zealous prosecutor Gordon Kromberg, has aggressively pursued Trump's prosecution. Tlaib noted that the Times, The Guardian, El PaĂs, Le Monde, and Der Spiegel had put out a joint statement condemning the charges, and alluded to the same problem that gave the Obama administration pause.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
People for the Ethical Treatment of Animals on Monday implored the U.S. military to reinstate a ban on the intentional wounding of animals in experiments and to stop radiation testing in an attempt to determine the cause of the mystery ailment popularly known as "Havana syndrome" that has afflicted U.S. government officials posted at diplomatic facilities in Washington, D.C. and several foreign countries. PETA argues that the military's decision to use live animals in testing related to Havana syndrome is "counterproductive" due to biological differences between humans and species subjected to the experiments, as well as the widespread availability of non-wounding research methods and the likelihood that radio frequency waves did not cause the mysterious ailment. The U.S. government has a long history of radiation experiments not only on animals but also on human beings. Scores of institutions, including some of North America's most prominent universities, laboratories, and hospitals hosted government and military experimentation on both volunteers and unwitting test subjects in the MK-ULTRA mind control experiments and other highly unethical and sometimes deadly programs. People suffering from Havana syndrome–so named because it was first identified by U.S. and Canadian diplomats and embassy staff in the Cuban capital–experienced what The Lancet described as "an abrupt onset of unusual clinical symptoms."
Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and non-lethal weapons from reliable major media sources.
We are stuck in a never ending cycle of disaster that has led to one giant sense-making crises. False flag terrorism ... refers to governments creating, supporting, or staging events, like acts of terrorism in their own country and on their own citizenry, and then blaming it on someone else. Sometimes events can be created and even staged, and other times events are completely real yet the narrative we receive is where the deception lies. Either way, in many cases these events are used for control and/or political and financial gain. Take, for example, Operation Northwoods. This was a plan hatched by the US government in the early 1960s to fool the American public and the international community into supporting a war against Cuba in order to oust Fidel Castro. The plan included blowing up a US ship, attacking a US military base, sinking and blowing up boats of Cuban refugees, hijacking planes, and orchestrating violent terrorism in multiple US cities against American citizens. And of course, blaming Cuba for these actions. 9/11 could perhaps be one of the best examples of false flag terrorism, but the evidence that has lead the majority of people to feel this sentiment has not seen the light of day within the mainstream. There are many similarities between 9/11 and COVID, and in my mind COVID has been a clear act of bioterrorism by the same entities who proposed the â€solution.' These included vaccine mandates, mask mandates and more, which we are likely to see resurface again in the future.
Note: Read more about false flag terrorism. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
New details about the FBI's failures to comply with restrictions on the use of foreign intelligence for domestic crimes have emerged. Section 702 of the Foreign Intelligence Surveillance Act (FISA) ... grants the government the ability to intercept the electronic communications of overseas targets who are unprotected by the Fourth Amendment. That authority is set to expire at the end of the year. But errors in the FBI's secondary use of the data–the investigation of crimes on US soil–are likely to inflame an already fierce debate over whether law enforcement agents can be trusted with such an invasive tool. Central to this tension has been a routine audit by the Department of Justice's (DOJ) national security division and the office of the director of national intelligence (ODNI) ... which unearthed new examples of the FBI failing to comply with rules limiting access to intelligence ostensibly gathered to protect US national security. Such "errors," they said, have occurred on a "large number" of occasions. A report on the audit, only recently declassified, found that in the first half of 2020, FBI personnel unlawfully searched raw FISA data on numerous occasions. In one incident, agents reportedly sought evidence of foreign influence linked to a US lawmaker. In another, an inappropriate search pertained to a local political party. In what privacy and civil liberties lawyers have termed a "backdoor search," the FBI regularly searches through unminimized data during investigations, and routinely prior to launching them.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
President Joe Biden's administration released more than 13,000 records of President John F. Kennedy's assassination Thursday, but it fell short of fully complying with the spirit of a 30-year-old law demanding transparency by now. With Thursday's action, about 98% of all documents related to the 1963 killing have now been released and just 3% of the records remain redacted in whole or in part, according to the National Archives, which controls the John F. Kennedy Assassination Records Collection. The records include more information on accused gunman Lee Harvey Oswald and his time spent in Mexico City. But about 4,300 records remain redacted in part. [CIA agent George] Joannides ... guided and monitored an anti-Fidel Castro group called Directorio Revolucionario Estudiantil (Revolutionary Student Directorate) in 1963 that came into contact with Oswald in New Orleans in the months before the assassination, leading some to speculate about CIA-related complicity in the killing. As Oswald interacted with DRE and became known as an activist who supported President Castro, the Pentagon was formulating a plan called Operation Northwoods to stage a false flag attack in the United States to blame on Cuba and justify a military confrontation to make up for the aborted Bay of Pigs fiasco two years before. The records and the CIA's deceit over Joannides' ties to Oswald spans decades and came to light only after the records act began to unearth information about him.
Note: While the mainstream narrative points to the CIA being complicit in the killing of Kennedy by a Communist lone gunman, there is overwhelming evidence not often talked about, that reveals how Kennedy was murdered by rogue elements within US government agencies as a result of his efforts towards peacemaking strategies over nuclear weapon warfare, among other reasons. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
The United States has fought more than a dozen "secret wars" over the last two decades, according to a new report from the Brennan Center for Justice. Through a combination of ground combat, airstrikes, and operations by U.S. proxy forces, these conflicts have raged from Africa to the Middle East to Asia, often completely unknown to the American people and with minimal congressional oversight. These clandestine conflicts have been enabled by the 2001 Authorization for Use of Military Force, enacted in the wake of the September 11 attacks, as well as the covert action statute, which allows secret, unattributed operations, primarily conducted by the CIA. [The new] analysis is particularly illuminating in the case of Somalia, where the United States developed two key proxy forces, the Danab Brigade and the Puntland Security Force. The CIA began building the Puntland Security Force in 2002 to battle the Al Qaeda-affiliated al-Shabab and later the Islamic State in Somalia, or ISS. The force was transferred to U.S. military control around 2012 and went on to fight alongside U.S. Special Operations forces for a decade. [The Brennan Center's Katherine Yon] Ebright notes that the proxy fighters were "largely independent of the Somali government, despite being an elite armed brigade and one of Somalia's most capable special operations units. And their relationship with U.S. forces was long kept secret, with U.S. officials disavowing the presence of military advisers in Somalia until 2014."
Note: Since 2008, the US has supported at least nine coups in five African countries. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
Harry Truman became President in April, 1945. Two years later, he signed the National Security Act, which established the C.I.A.. It was supposed to do what its name suggested: centralize the intelligence that various agencies gathered. "It was not intended as a â€Cloak and Dagger' Outfit!," Truman later wrote. In its charter, the C.I.A. was banned from domestic spying. There was no mention of covert action in the law that chartered the C.I.A., but Presidents–starting with Truman–began using it that way. One of the agency's first operations involved meddling in the 1948 Italian election. During the Vietnam War, the C.I.A. had discouraging intelligence to offer, and, when successive Administrations didn't want to hear it, focused on being helpful by providing ... supposedly quick fixes. That meant abetting a coup in 1963, spying on antiwar protesters, and launching the Phoenix Program, an anti-Vietcong campaign marked by torture and by arbitrary executions. More than twenty thousand people were killed under Phoenix's auspices. The C.I.A. has had a "defining failure" for every decade of its existence–sometimes more than one. In the nineteen-nineties, it was the lack of foresight about the Soviet Union; in the two-thousands, it was the phantom weapons of mass destruction, followed by torture and, in still evolving ways, by the drone-based program of targeted killings, with its high toll of civilian deaths. It's difficult to know, at this point, what the C.I.A.'s next defining failure ... will be.
Note: Read more about the CIA's Phoenix Program, which included the kidnapping, torture, and murder of civilians during the Vietnam War. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
NSO Group [is] the world's most notorious maker of spyware. The F.B.I. had bought a version of Pegasus, NSO's premier spying tool. It could ... crack the encrypted communications of any iPhone or Android smartphone. Since NSO had introduced Pegasus to the global market in 2011, it had helped Mexican authorities capture JoaquĂn Guzmán Loera, the drug lord known as El Chapo. European investigators have quietly used Pegasus to thwart terrorist plots, fight organized crime and, in one case, take down a global child-abuse ring. Mexico deployed the software not just against gangsters but also against journalists and political dissidents. The United Arab Emirates used the software to hack the phone of a civil rights activist. Saudi Arabia used it against women's rights activists. During a presentation to officials in Washington, the company demonstrated a new system, called Phantom, that could hack any number in the United States that the F.B.I. decided to target. A slick brochure ... says that Phantom allows American law enforcement and spy agencies to get intelligence "by extracting and monitoring crucial data from mobile devices." It is an "independent solution" that requires no cooperation from AT&T, Verizon, Apple or Google. The system, it says, will "turn your target's smartphone into an intelligence gold mine." The Phantom presentation triggered a discussion among government lawyers. Last summer ... the F.B.I. finally decided not to deploy the NSO weapons.
Note: Read more about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Ali Alzabarah was an engineer who rose through the ranks at Twitter to a job that gave him access to personal information and account data of the social media service’s millions of users. Ahmad Abouammo was a media partnerships manager at the company who could see the email addresses and phone numbers of Twitter accounts. On Wednesday, the Justice Department accused the two men of using their positions and their access to Twitter’s internal systems to aid Saudi Arabia by obtaining information on American citizens and Saudi dissidents who opposed the policies of the kingdom and its leaders. Mr. Alzabarah and Mr. Abouammo were charged with acting as agents of a foreign power inside the United States, in the first complaint of its kind involving Saudis in the country. The case raised questions about the security of American technology companies already under scrutiny for spreading disinformation and influencing public opinion, showing that these firms can be penetrated from the inside as well. It also underscored the broad effort that Crown Prince Mohammed bin Salman of Saudi Arabia and his close advisers have conducted to silence critics both inside the kingdom and abroad. Jamal Khashoggi, a columnist for The Washington Post who was critical of the way Saudi Arabia is run, was murdered last year by Saudi agents in Istanbul.
Note: Read more on Saudi Arabia's extreme efforts to silence its critics. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable major media sources.
Even after spending a year and a half in prison in Tehran, I knew that if I wanted to go on writing about Iran, I would be a target for plenty of public attacks. But I never imagined the U.S. State Department would be funding my attackers. Last week, several astute Iran watchers drew attention to a series of inflammatory tweets associated with the Iran Disinformation Project, a State Department-funded initiative that its website claims "brings to light disinformation emanating from the Islamic Republic of Iran via official rhetoric, state propaganda outlets, social media manipulation and more." The targets of the tweets included think-tank analysts, human rights activists and journalists. The common thread is that we are all perceived by regime change proponents and supporters of the Trump administration's so-called maximum pressure policy to be soft on Iran because we are critical of crushing economic sanctions and the threat of the use of military force. For these thought crimes, we are branded by @IranDisinfo and similar social media accounts as Tehran's "mouthpieces," "apologists," "collaborators," and "lobbyists" in the West. We're faced with the irony that an initiative aimed at combating Tehran's disinformation campaigns is resorting to disinformation campaigns of its own, using taxpayer funds to spread lies about U.S. citizens. We need programs that fight the spread of falsehoods and propaganda, but such efforts shouldn't combat lies with other lies.
Note: For lots more on this eye-opening event, see this excellent article by Matt Taibbi. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
Attorney-General nominee William P. Barr figured prominently in arguments to limit CIA responsibility to provide notification to Congress about covert actions during the 1980s, according to a review of declassified materials published today by the National Security Archive. As the Iran-Contra scandal played out, Barr, who held senior posts at the Justice Department, provisionally supported the idea of the president’s “virtually unfettered discretion” in foreign policy and downplayed Congress’s power. The issue of notification of Congress about imminent clandestine activities was at the heart of the Iran-Contra scandal when President Ronald Reagan and CIA Director William Casey specifically ordered that lawmakers be kept in the dark about the infamous, covert arms-for-hostages deals with Iran. Barr was by no means alone in pushing these views, the documents show. Other notable proponents during the Iran-Contra aftermath included then-Congressman Dick Cheney and John R. Bolton, who was also at the Justice Department. After Cheney became defense secretary he continued to press for extraordinarily broad Executive Branch authority, advising then-President George H. W. Bush to veto the Senate’s intelligence appropriations bill on the grounds it “attacked” presidential prerogatives – resulting in the only known such veto since the CIA’s creation.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Bloomberg Businessweek published an alarming story: Operatives working for China's People's Liberation Army had secretly implanted microchips into motherboards made in China and sold by U.S.-based Supermicro. This allegedly gave Chinese spies clandestine access to servers belonging to over 30 American companies, including Apple, Amazon, and various government suppliers, in an operation known as a "supply chain attack," in which malicious hardware or software is inserted into products before they are shipped to surveillance targets. U.S. spy agencies ... assessed that China was adept at corrupting the software bundled closest to a computer's hardware at the factory, threatening some of the U.S. government's most sensitive machines, according to documents provided by National Security Agency whistleblower Edward Snowden. The documents also detail how the U.S. and its allies have themselves systematically targeted and subverted tech supply chains, with the NSA conducting its own such operations, including in China, in partnership with the CIA and other intelligence agencies. The documents also disclose supply chain operations by German and French intelligence. Computer hardware can be altered at various points along the supply chain, from design to manufacturing to storage to shipment. The U.S. is among the small number of countries that could, in theory, compromise devices at many different points in this pipeline, thanks to its resources and geographic reach.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
“My father was the chief law enforcement officer in this country,” Robert F. Kennedy Jr. recently told The Washington Post. “I think it would have disturbed him if somebody was put in jail for a crime they didn’t commit.” Kennedy’s second oldest son now believes ... that his father was killed by a second gunman. RFK Jr. even visited Sirhan Sirhan, the man convicted of shooting and killing his father, because he was “curious and disturbed by what I had seen in the evidence.” He isn’t the only one. “If you believe the LAPD reports about this case, there is no way that Sirhan did it and did it alone,” Dan Moldea, an investigative journalist and author of The Killing of Robert F. Kennedy, told Boston.com. Kennedy was assassinated ... on June 5, 1968, at the Ambassador Hotel in Los Angeles. Kennedy was walking through the hotel kitchen pantry [and] was shot from behind at point-blank range. Sirhan approached from the front, on Kennedy’s right. His gun never got closer than about a foot-and-a-half away [and] carried a maximum of just eight bullets. And yet, there’s evidence that suggests more than eight shots were fired. Who would the second gunman have been? Theorists most commonly point to ... Thane Eugene Cesar. Cesar was a security guard who hated the Kennedys. Cesar was also walking with Kennedy when the shooting occurred and ... owned a .22-caliber similar to Sirhan’s gun, which he initially told police he sold before the assassination, but had actually, it was later found, sold three months after the shooting.
Note: For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.
The father of the 29-year-old who killed 49 people at an Orlando nightclub in the summer of 2016 was an FBI informant who came under scrutiny himself after investigators found receipts for money transfers to Turkey and Afghanistan in the wake of the mass shooting. The revelation came in documents filed by attorneys for the shooter’s wife, Noor Salman, who is on trial in Orlando on allegations that she aided and abetted her husband’s attack and obstructed law enforcement’s investigation into it. Salman’s trial has been underway for weeks, but defense attorneys argued that they were not informed until Saturday of the father’s work for the FBI. That, they argued, is grounds to dismiss the charges. Seddique Mateen - the father of Omar Mateen - was an FBI informant at various points between January 2005 and June 2016, court documents say. Salman’s attorneys argued in court filings that if they had known of Seddique Mateen’s work for the bureau, they might have explored ... whether the FBI’s interviews with Salman were an attempt at “evading the negligence they exercised with their own informant,” and whether their “unwavering focus on Noor Salman, rather than Seddique Mateen, could have been designed to find a culprit other than the father.” The FBI has previously come under criticism for investigating Omar Mateen for 10 months starting in 2013 and ultimately concluding he was not a threat.
Note: Noor Salman was acquitted shortly after this information came out. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Saudi Crown Prince Mohammed bin Salman said Thursday it would be “really insane” for him to trade classified information with presidential son-in-law and White House adviser Jared Kushner. Speaking in a meeting with Washington Post editors and reporters, Mohammed denied U.S. media reports that he had claimed Kushner was “in his pocket,” or that ... he had sought or received a green light from Kushner for massive arrests of allegedly corrupt members of the royal family and Saudi businessmen that took place in the kingdom. The detentions were solely a domestic issue and had been in the works for years, the prince said. The son of King Salman and heir to the Saudi throne, Mohammed, 32, met with President Trump on Tuesday in the Oval Office and over lunch. He also spoke with a number of congressional leaders. Even as Trump has said he is seeking increased investment and purchases of U.S. military equipment and other products from Saudi Arabia, Mohammed has made clear that his primary mission here is to win U.S. investor confidence in his country. Asked about the Saudi-funded spread of Wahhabism, the austere faith ... that some have accused of being a source of global terrorism, Mohammed said that investments in mosques and madrassas overseas were rooted in the Cold War, when allies asked Saudi Arabia to use its resources to prevent inroads in Muslim countries by the Soviet Union. Successive Saudi governments lost track of the effort, he said.
Note: 531,525 diplomatic cables from 1979 published by Wikileaks shed light on how Saudi Arabia and the CIA fueled the rise of modern Islamic terrorism. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism.
I was inside the CIA’s Langley, Va., headquarters on Sept. 11, 2001. I headed counterterrorism operations in Pakistan from January to May 2002. My team captured dozens of al-Qaeda fighters, including senior training-camp commanders. One of the fighters whom I played an integral role in capturing was Abu Zubaida, mistakenly thought at the time to be the third-ranking person in the militant group. By that May, the CIA had decided to torture him. When I returned to CIA headquarters that month, a senior officer in the Counterterrorism Center asked me if I wanted to be “trained in the use of enhanced interrogation techniques.” I declined. I said that I had a moral and ethical problem with torture and that - the judgment of the Justice Department notwithstanding - I thought it was illegal. Unfortunately, there were plenty of people in the U.S. government who were all too willing to allow the practice to go on. One of them was Gina Haspel, whom President Trump nominated Tuesday as the CIA’s next director. Putting Haspel in charge of the CIA would undo attempts by the agency - and the nation - to repudiate torture. The message this sends to the CIA workforce is simple: Engage in war crimes, in crimes against humanity, and you’ll get promoted. Don’t worry about the law. Don’t worry about ethics. Don’t worry about morality or the fact that torture doesn’t even work. Go ahead and do it anyway. We’ll cover for you. And you can destroy the evidence, too.
Note: The above was written by former CIA counterterrorism officer John Kiriakou, who was imprisoned for blowing the whistle on the CIA’s illegal torture program. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
The National Security Agency has apparently been way ahead of Apple or Amazon. The agency has at its disposal voice recognition technology that it employs to identify terrorists, government spies, or anyone they choose — with just a phone call, according to a report by The Intercept. By using recorded audio, the NSA is able to create a "voiceprint," or a map of qualities that mark a voice as singular, and identify the person speaking. According to a classified memo ... the agency has employed this technology since at least 2006, with the document referencing technology "that identifies people by the sound of their voices." In fact, the NSA used such technology during Operation Iraqi Freedom, when analysts were able to verify audio thought to be of Saddam Hussein speaking. It suggests that national security operatives had access to high-level voice technology long before Amazon, Apple and Google's solutions became cultural touchstones. A "voiceprint" is "a dynamic computer model of the individual's vocal characteristics," the publication explained, created by an algorithm analyzing features like pitch and mouth shape. Then, using the NSA's formidable bank of recorded audio files, the agency is able to match the speaker to an identity. Identifying people through their voiceprints is a skill at which the "NSA reigns supreme," according to a leaked document from 2008. And, they're only getting better.
Note: As this BBC article from 1999 shows, mass surveillance systems with voice recognition capability have been in use for many years. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Two New York Times reporters learned in 2004 that the George W. Bush administration was secretly wiretapping Americans, and collecting their phone and email records. The reporters’ attempt to publish their findings were thwarted by the administration’s intense and successful lobbying of their editors. That effort ... had an unlikely ally: Rep. Jane Harman of Los Angeles, the senior Democrat on the House Intelligence Committee. Details of the far-reaching, legally unauthorized surveillance program remained secret until the Times published the article in late 2005. The newspaper’s interactions with administration officials, and Harman’s role, were described by former Times reporter James Risen this month in the Intercept, the investigative publication where he now works. The story on the program known as Stellar Wind was ready for publication before the November 2004 election, when Bush was on the ballot, but NSA Director Michael Hayden and other administration officials told Times editors, in phone calls and face-to-face meetings, that publication would damage national security and endanger lives, Risen said. He said the officials were joined in that effort by Harman, one of a handful of congressional leaders who had been briefed on the program and were enlisted by the White House to contact the Times. Members of Congress learned later that the NSA had not been seeking warrants from a secret court, as required by law, before wiretapping calls.
Note: James Risen is a courageous hero who shared two Pulitzer Prizes for his reporting around 9/11 and massive government surveillance. His recent article in The Intercept describes how a "marketplace of secrets in Washington" supports the US national security apparatus, and is used by corrupt government officials to manipulate the news.
Jake Williams, [a] cybersecurity expert, was dismayed to discover that ... the Shadow Brokers, a mysterious group that had somehow obtained many of the hacking tools the United States used to spy on other countries [had] identified him - correctly - as a former member of the National Security Agency’s hacking group, Tailored Access Operations, or T.A.O., a job he had not publicly disclosed. Then the Shadow Brokers astonished him by dropping technical details that made clear they knew about highly classified hacking operations that he had conducted. America’s largest and most secretive intelligence agency had been deeply infiltrated. Current and former agency officials say the Shadow Brokers disclosures, which began in August 2016, have been catastrophic for the N.S.A., calling into question its ability to protect potent cyberweapons and its very value to national security. Fifteen months into a wide-ranging investigation by the agency’s counterintelligence arm, known as Q Group, and the F.B.I., officials still do not know whether the N.S.A. is the victim of a brilliantly executed hack ... an insider’s leak, or both. Three employees have been arrested since 2015 for taking classified files, but there is fear that one or more leakers may still be in place. There is broad agreement that the damage from the Shadow Brokers already far exceeds the harm to American intelligence done by Edward J. Snowden, the former N.S.A. contractor who fled with four laptops of classified material in 2013. For decades after its creation in 1952, the N.S.A. — No Such Agency, in the old joke — was seen as all but leakproof. But since Mr. Snowden flew away with hundreds of thousands of documents in 2013, that notion has been shattered.
Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
In the summer of 1977, Capitol Hill was gripped by revelations of the CIA’s top-secret MK-Ultra mind control research program, targeting unsuspecting American citizens, in some cases by luring them to brothels to be fed LSD-laced cocktails. Hearings that summer, chaired by Sen. Edward M. Kennedy ... touched some of the country’s rawest nerves. The August 1977 MK-Ultra hearings specifically explored what seemed like an outlandish idea straight out of science fiction: the possibility of government mind control. Kennedy ... had a complex relationship with the CIA, given what the agency knew about the assassinations of his brothers Robert and John in the 1960s. One MK-Ultra project involved CIA-run brothels in San Francisco and New York City, established specifically to study LSD’s effects on unsuspecting adults. Project Midnight Climax ran in San Francisco from 1955 to 1965. Operatives reported that it helped refine sexual blackmail tactics, surveillance technology, LSD’s use in interrogations and how to better use empathy as an investigation tactic. Brothel operatives later [admitted] that they had dosed unsuspecting subjects at nearby restaurants, bars and beaches. In one case, a U.S. marshal held up a San Francisco bar with his service revolver after an MK-Ultra agent slipped LSD into his bourbon and soda. In the early 1970s, CIA Director Richard Helms, who ran the agency from 1966 to 1973, along with one of MK-Ultra’s architects, Sidney Gottlieb, ordered all the relevant paperwork destroyed.
Note: Read more about Midnight Climax and the CIA's MK ULTRA program. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
British intelligence agency MI5 was reportedly warned by its US counterpart that Salman Abedi was planning an attack on UK soil, three months before he blew himself up outside an Ariana Grande concert in Manchester. FBI agents are said to have informed British officials that the 22-year-old was part of a North African Islamic State cell based in the north west of England that was plotting an attack in the UK. “In early 2017 the FBI told MI5 that Abedi belonged to a North African terror gang based in Manchester, which was looking for a political target in this country," a security source [said]. “The information came from the interception of his communications by US federal agents, who had been investigating Abedi since the middle of 2016, and from information unearthed in Libya, where his family was linked to terrorist groups. “Following this US tip-off, Abedi and other members of the gang were scrutinised by MI5. It was thought at the time that Abedi was planning to assassinate a political figure. But nothing came of this investigation and, tragically, he slipped down the pecking order of targets.” MI5 has faced questions over the fact that Abedi was on its radar but slipped through the net in order to carry out the attack that killed 22 people and seriously injured 64. Police have so far arrested 14 people on suspicion of terror offences in conjunction with the Manchester attack, two of whom have since been released.
Note: Read this revealing article for more evidence that the Manchester atrocity was possibly allowed to happen, or worse. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
The C.I.A. developed tools to spy on Mac computers by injecting software into the chips that control the computers’ fundamental operations, according to the latest cache of classified government documents published on Thursday by WikiLeaks. All of the surveillance tools that have been disclosed were designed to be installed on individual phones or computers. But the effects could be much wider. Cisco Systems, for example, warned customers this week that many of its popular routers, the backbone of computer networks, could be hacked using the C.I.A.’s techniques. Julian Assange, the founder of WikiLeaks, has offered to share the precise software code used by the C.I.A.’s cyberweapons with the affected companies. But major tech companies have been reluctant to directly engage with him for fear of violating American laws. The spy software described in the latest documents was designed to be injected into a Mac’s firmware, a type of software preloaded in the computer’s chips. It would then act as a “listening post,” broadcasting the user’s activities to the C.I.A. whenever the machine was connected to the internet. Tools that operate at the chip level can hide their existence and avoid being wiped out by routine software updates. Under an agreement struck during the Obama administration, intelligence agencies were supposed to share their knowledge of most security vulnerabilities with tech companies. The C.I.A. documents suggest that some key vulnerabilities were kept secret.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
In a heavily protected military base some 15 miles south of Washington, D.C., sits the massive headquarters of a spy agency few know exists. The [National Geospatial-Intelligence Agency, or] NGA remains by far the most shadowy member of the Big Five spy agencies, which include the CIA and the National Security Agency. Despite its lack of name recognition, the NGA’s headquarters is the third-largest building in the Washington metropolitan area. The NGA is to pictures what the NSA is to voices. Its principal function is to analyze the billions of images and miles of video captured by drones ... and spy satellites. The agency has never been involved in domestic spy scandals. However, there’s reason to believe that this will change. In March 2016, the Pentagon released the results of an investigation initiated by the Department of Defense’s Office of Inspector General to examine military spy drones in the United States. The report ... revealed that the Pentagon used unarmed surveillance drones over American soil. The investigation also quoted from an Air Force law review article pointing out the growing concern that technology designed to spy on enemies abroad may soon be turned around to spy on citizens at home. In 2016, unbeknownst to many city officials, police in Baltimore began conducting persistent aerial surveillance using a system developed for military use in Iraq. Few civilians have any idea how advanced these military eye-in-the-sky drones have become.
Note: This article was written by former ABC News producer James Bamford, whose 2001 article on Operation Northwoods revealed that the top Pentagon generals signed off on top-secret plans which stated, "We could blow up a U.S. ship in Guantanamo Bay and blame Cuba," and, "casualty lists in U.S. newspapers would cause a helpful wave of national indignation." And showing the level of major media complicity, only ABC News reported on this. For more, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Leaked court documents raise concerns that the murder of the Honduran environmentalist Berta Cáceres was an extrajudicial killing planned by military intelligence specialists linked to the country’s US–trained special forces. Cáceres was shot dead a year ago while supposedly under state protection after receiving death threats over her opposition to a hydroelectric dam. The murder of Cáceres, winner of the prestigious Goldman environmental prize in 2015, prompted international outcry and calls for the US to revoke military aid to Honduras, a key ally in its war on drugs. Eight men have been arrested in connection with the murder, including one serving and two retired military officers. Officials have denied state involvement in the activist’s murder, and downplayed the arrest of the serving officer Maj Mariano Díaz. But ... Díaz, a decorated special forces veteran, was appointed chief of army intelligence in 2015. Another suspect, Lt Douglas Giovanny Bustillo joined the military on the same day as Díaz. Díaz and Bustillo both received military training in the US. A third suspect, Sgt Henry Javier Hernández, was a former special forces sniper, who had worked under the direct command of Díaz. Last year, the Guardian reported that a former Honduran soldier said he had seen Cáceres’s name on a hitlist that was passed to US-trained units. Sgt Rodrigo Cruz said that two elite units were given lists featuring the names and photographs of activists – and ordered to eliminate each target.
Note: The Western Hemisphere Institute for Security Cooperation, formerly known as the School of the Americas, reportedly graduated more than 500 human rights abusers. The identities of many other US-trained troops operating in other countries remain hidden by US courts. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
The Department of Justice proudly announced the first FBI terror arrest of the Trump administration on Tuesday: an elaborate sting operation that snared a 25-year-old Missouri man who had no terrorism contacts besides the two undercover FBI agents who paid him to buy hardware supplies they said was for a bomb - and who at one point pulled a knife on him and threatened his family. Robert Lorenzo Hester of Columbia, Missouri, didn’t have the $20 he needed to buy the 9-volt batteries, duct tape, and roofing nails his new FBI friends wanted him to get, so they gave him the money. The agents noted in a criminal complaint that Hester, who at one point brought his two small children to a meeting because he didn’t have child care, continued smoking marijuana despite professing to be a devout Muslim. But according to the DOJ press release, Hester had plans to conduct an “ISIS-sponsored terrorist attack” on President’s Day that would have resulted in mass casualties had it succeeded. News reports breathlessly echoed the government’s depiction of Hester as a foiled would-be terrorist. But the only contact Hester had with ISIS was with the two undercover agents. There appears to be little to suggest that [Hester] had the wherewithal or capacity to carry out a terrorist attack. His case is similar to many others in which individuals in financial, legal, or psychological distress have been befriended by undercover FBI agents or government informants and coaxed into developing a terrorist plot.
Note: The FBI has been stepping up its use of stings in ISIS cases. Read how an FBI mole posing as a potential lover recently convinced a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
Using loopholes it has kept secret for years, the FBI can in certain circumstances bypass its own rules in order to send undercover agents or informants into political and religious organizations, as well as schools, clubs, and businesses. If the FBI had its way, the infiltration loopholes would still be secret. They are detailed in a mammoth document obtained by The Intercept, an uncensored version of ... the Domestic Investigations and Operations Guide, or DIOG. If an undercover agent wants to pose as a university student and take classes, or if an FBI handler wants to tell an informant to attend religious services - two examples straight out of the rulebook - he or she must obtain a supervisor’s approval and attest both to the operation’s importance and to its compliance with constitutional safeguards. But all those rules go out the window if an agent decides the group is “illegitimate” or an informant spies on the group of his or her own accord. Civil rights groups ... worry that the FBI has made use of precisely these kinds of loopholes, silently undermining cherished freedoms enshrined after a dark chapter of FBI history: the COINTELPRO program in the 1950s and ’60s, when the FBI spied on, harassed, and tried to discredit leftists, civil rights leaders, and anti-war protestors. The exposure of COINTELPRO led to a famous Senate investigation and to institutional reform. The DIOG, despite being hundreds of pages of dense bureaucracy, actually documents a loosening of the standards enacted to rein in the FBI after COINTELPRO and other scandals ... after the 9/11 attacks.
Note: Read a detailed essay on the FBI's COINTELPRO program from the well-researched online book Lifting the Veil. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the erosion of civil liberties.
About 13 million pages of declassified documents from the US Central Intelligence Agency (CIA) have been released online. Among the more unusual records are documents from the Stargate Project, which dealt with psychic powers and extrasensory perception. Those include records of testing on celebrity psychic Uri Geller in 1973. Memos detail how Mr Geller was able to partly replicate pictures drawn in another room with varying - but sometimes precise - accuracy, leading the researchers to write that he "demonstrated his paranormal perceptual ability in a convincing and unambiguous manner". Other unusual records include a collection of reports on flying saucers. While much of the information has been technically publicly available since the mid-1990s, it has been very difficult to access. The records were only available on four physical computers ... at the National Archives in Maryland. A non-profit freedom of information group, MuckRock, sued the CIA to force it to upload the collection. At the same time, journalist Mike Best crowd-funded more than $15,000 to visit the archives to print out and then publicly upload the records, one by one. "By printing out and scanning the documents at CIA expense, I was able to begin making them freely available to the public and to give the agency a financial incentive to simply put the database online," Best wrote.
Note: The entire declassified archive of the Stargate Project is now available on the CIA Library website. Explore a treasure trove of excellent resources on remote viewing. For decades, officials denied the existence of remote viewing programs and UFO investigations. What other intelligence agency lies will be exposed as more information like this comes to light?
The watchdog wing of Congress has quietly launched an investigation into the “integrity” of the Pentagon’s whistleblower protection program. The Government Accountability Office, which serves as the investigative arm of Congress, has been looking into the extent to which Department of Defense whistleblower policies ... reassure employees of their rights to raise concerns “without fear of reprisal.” The investigation will also likely target senior Pentagon officials accused of destroying evidence that would have exculpated former senior NSA official Thomas Drake, who raised internal complaints about what he believed to be NSA misconduct and waste before ultimately approaching journalists. Rather than having his concerns acknowledged, Drake spent months fighting charges against him under the Espionage Act. His career in the intelligence community was ended. “Bureaucratic abuses of power are the primary reason otherwise circumspect national security whistleblowers leak to the media. It is too dangerous to work within an untrustworthy system,” Tom Devine, legal director of the Government Accountability Project, wrote in a statement. John Crane, formerly the assistant inspector general in the Pentagon, revealed his role in attempting to protect Drake’s identity and investigate the document destruction involved in his case last May - an effort he claims cost him his job. The implications of the investigation may eventually be important for evaluating the actions of former NSA contractor Edward Snowden.
Note: Mass surveillance whistleblower Thomas Drake attempted to work within the system and was was targeted for prosecution. John Crane was forced out of the Pentagon in 2013. His story is told in a new book, titled, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Do the committees that oversee the vast U.S. spying apparatus take intelligence community whistleblowers seriously? For the last 20 years, the answer has been a resounding “no.” My own experience in 1995-96 is illustrative. Over a two-year period working with my wife, Robin (who was a CIA detailee to a Senate committee at the time), we discovered that, contrary to the public statements by then-Chairman of the Joint Chiefs Colin Powell and other senior George H. W. Bush administration officials ... American troops had in fact been exposed to chemical agents during and after the 1991 war with Saddam Hussein. Officials at the Pentagon and CIA were working to bury it. The agency didn’t care about helping to find out why hundreds of thousands of American Desert Storm veterans were ill. Seeing the writing on the wall, I began working on what would become a book about our experience: “Gassed in the Gulf.” The agency tried to block publication of the book and attempted to reclassify hundreds of previously declassified Department of Defense and CIA intelligence reports that helped us make our case. Our story [became] a front-page sensation just days before the 1996 presidential election. Within six months, the CIA was forced to admit that it had indeed been withholding data on such chemical exposures, which were a possible cause of the post-war illnesses that would ultimately affect about one-third of the nearly 700,000 U.S. troops who served in Kuwait and Iraq. None of the CIA or Pentagon officials who perpetrated the cover-up were fired or prosecuted.
Note: The above article was written by whistleblower and former CIA analyst Patrick Eddington. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the manipulation of public perception.
The problem of racial bias among police [has] been a concern of the FBI for at least a decade. 10 years ago ... the FBI warned of the potential consequences - including bias - of white supremacist groups infiltrating local and state law enforcement, indicating it was a significant threat to national security. In the 2006 bulletin, the FBI detailed the threat of white nationalists and skinheads infiltrating police in order to disrupt investigations against fellow members and recruit other supremacists. The bulletin was released during a period of scandal for many law enforcement agencies throughout the country, including a neo-Nazi gang formed by members of the Los Angeles County Sheriff’s Department. Similar investigations revealed officers and entire agencies with hate group ties in Illinois, Ohio and Texas. Much of the bulletin has been redacted, but in it, the FBI ... warned of “ghost skins,” hate group members who don’t overtly display their beliefs. “At least one white supremacist group has reportedly encouraged ghost skins to seek positions in law enforcement for the capability of alerting skinhead crews of pending investigative action against them,” the report read. Neither the FBI nor state and local law enforcement agencies have established systems for vetting personnel for potential supremacist links. That task is left primarily to everyday citizens and nonprofit organizations like the Southern Poverty Law Center, one of few that tracks the growing number of hate groups in America.
Note: For more along these lines, see concise summaries of deeply revealing news articles about police corruption and the erosion of civil liberties.
The Pentagon gave a controversial U.K. PR firm over half a billion dollars to run a top secret propaganda program in Iraq, the Bureau of Investigative Journalism can reveal. Bell Pottinger’s output included short TV segments made in the style of Arabic news networks and fake insurgent videos which could be used to track the people who watched them, according to a former employee. The agency’s staff worked alongside high-ranking U.S. military officers in their Baghdad Camp Victory headquarters. Bell Pottinger reported to the Pentagon, the CIA, and the National Security Council on its work in Iraq. In the first media interview any Bell Pottinger employee has given about the work for the U.S. military in Iraq, video editor Martin Wells told the Bureau his time in Camp Victory was “shocking, eye-opening, life-changing.” The firm’s output was signed off by former General David Petraeus - then commander of the coalition forces in Iraq - and on occasion by the White House, he said. Bell Pottinger’s work in Iraq was a huge media operation which cost over a hundred million dollars a year on average. The ... most sensitive program described by Wells was the production of fake al Qaeda propaganda films. U.S. marines would take the CDs on patrol and drop them in the chaos when they raided targets. Wells explained how the team embedded a code into the CDs which linked to a Google Analytics account, giving a list of IP addresses where the CDs had been played.
Note: So the Pentagon made propaganda films to recruit for Al Qaeda, bombed a place upsetting the people there, then seeded these films to try to capture anyone who was interested in the propaganda they spread. For more along these lines, see concise summaries of deeply revealing news articles about war corruption and the manipulation of public perception.
An ongoing review shows the U.S. intelligence community has been debunking long-held myths about some of the “worst of the worst” at Guantánamo, some of them still held today. The retreat emerges in a series of unclassified prisoner profiles released by the Pentagon in recent years, snapshots of much larger dossiers the public cannot see, prepared for the Periodic Review Board examining the Pentagon’s “forever prisoner” population. “It was clear early on that the intelligence was grossly wrong,” said Mark Fallon, a retired 30-year federal officer who between 2002 and 2004 was Special Agent in Charge of the Department of Defense’s Criminal Investigation Task Force. Most “weren’t battlefield captives,” he said, calling many “bounty babies” - men captured by Afghan warlords or Pakistani security forces and sent to Guantánamo “on the sketchiest bit of intelligence with nothing to corroborate.” They ended up with “a lot of false information based on some pretty poor interrogations being done partly by military interrogators in that time frame.” Fallon ... is in the final stages of publishing a book of his criticisms and said in a recent interview that it’s no surprise that early prisoner profiles are imploding under Periodic Review Board scrutiny. In the early years, according to one analyst who worked there, Guantánamo’s Joint Intelligence Group was “looking for anything you can pin on these guys.” The intelligence unit was “picking up on one or two things and holding on to it tightly like it was gospel.”
Note: US officials have been aware for years that many Guantánamo detainees were innocent or only low-level operatives. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
I do my best to resist the thought that prison is a reflection of our society, but the comparisons are unavoidable. From the moment I crossed the threshold from freedom to incarceration because I was charged with, and a jury convicted me of, leaking classified information to a New York Times reporter, I needed no reminder that I was no longer an individual. Prison, with its “one size fits all” structure, is not set up to recognize a person’s worth; the emphasis is removal and categorization. Inmates are not people; we are our offenses. Considering the charges and conviction that brought me here, I’m not exactly sure to which category I belong. No matter. There is an overriding category to which I do belong, and it is this prison reality that I sadly “compare unto the world”: I’m not just an inmate, I’m a black inmate. Here, I am my skin color. Whenever, in my stubborn idealism, I refuse to acknowledge being racially categorized and question the submission to it, the other prisoners invariably respond, “Man, this is prison.” What I see in prison is sad, but what I’m seeing from prison is worse. During my time in the CIA it became clear, in the organization’s words and actions toward me, that they saw me not as an American who wanted to serve his country but as “a big black guy.” There is a black America, there is a white America, there are many Americas. The greatness and promise of this country lies in equality reinforced by our differences. When I am free, I don’t want to feel that I’m merely going from one prison to another.
Note: The above was written by Jeffrey Sterling, a former CIA agent targeted for prosecution as part of the Obama Administration's "crack down on the press and whistle-blowers." Author James Risen tried to help Sterling expose CIA racism, and later wrote an unrelated book exposing some questionable government practices. Sterling was then sent to prison for what Risen wrote. Risen's latest book exposes major government corruption related to the war on terror.
[Daniel] Jones, a counter-terrorism staffer, had become the chief investigator for the Senate intelligence committee, the CIA’s congressional overseer, on its biggest inquiry. For five years, he had been methodically sifting through internal CIA accounts of its infamous torture program. Having read millions of internal emails, cables and accounts of agency torture, Jones had come to believe everything the CIA had told Congress, the Bush and Obama White Houses and the public was a lie. Inside the small room in Virginia the CIA had set up for the Senate investigators, Jones ... slipped crucial printed-out passages of what he called the Panetta Review into [his] bag and secured its lock. Sometime after 1am, Jones walked out, carrying his bag as he always did. The Panetta Review saga would spur a furious CIA to take an extraordinary step: it would spy on its own legislative overseers – especially Jones. The episode would spill out publicly the following March, when top committee Democrat Dianne Feinstein ... accused the CIA on the Senate floor of triggering what she called a constitutional crisis. Both sides requested the justice department pursue a criminal investigation on the other. The bitterness would nearly overshadow a landmark report, a fraction of which was released to the public in December 2014, that documented in chilling detail the depravations CIA inflicted on terrorism suspects after 9/11. The CIA has gone beyond successfully suppressing the report. The agency’s inspector general ... destroyed its copy – allegedly an accident.
Note: For more, see this revealing report. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Over his two terms, Obama has created the most powerful surveillance state the world has ever seen. From 22,300 miles in space, where seven Advanced Orion [spy satellites] now orbit; to a 1-million-square-foot building in the Utah desert that stores data intercepted from personal phones, emails, and social media accounts; to taps along the millions of miles of undersea cables that encircle the Earth like yarn, U.S. surveillance has expanded exponentially since Obama’s inauguration on Jan. 20, 2009. The effort to wire the world ... has cost American taxpayers more than $100 billion. Yet has the president’s blueprint for spying succeeded on its own terms? An examination of the unprecedented architecture reveals that the Obama administration may only have drowned itself in data. Privacy hasn’t been traded for security, but for the government hoarding more data than it knows how to handle. A panel set up by Obama [in 2013] to review the NSA’s operations concluded that the agency had stopped no terrorist attacks. Beyond failures to create security, there is the matter of misuse or abuse of U.S. spying, the effects of which extend well beyond violations of Americans’ constitutional liberties. Obama, meanwhile, has taken virtually no steps to fix what ails his spying apparatus, [but] has gone after people blowing the whistle on intelligence abuses. The Justice Department has charged eight leakers — more than double the number under all previous presidents combined.
Note: The above was written by James Bamford, whistleblower and author of "The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America." Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Days before an ISIS sympathizer attacked a cartoon contest in Garland, Texas, he received a text from an undercover FBI agent. “Tear up Texas,” the agent messaged Elton Simpson days before he opened fire at the Draw Muhammad event, according to an affidavit filed in federal court Thursday. “U know what happened in Paris,” Simpson responded. “So that goes without saying ... No need to be direct.” That revelation comes amidst a national debate about the use of undercover officers and human sources in terrorism cases. The texts were included in the indictment, released Thursday, of Erick Jamal Hendricks. He was charged with conspiring to provide material support to ISIS. [Hendricks] tried to recruit other Americans to form an ISIS cell on secret compounds and introduced an undercover agent to one of the Draw Muhammad attackers, according to the FBI. But Hendricks did more than make a connection. According to the court papers, he asked the undercover officer about the Draw Muhammad event’s security, size, and police presence, during the event, according to an affidavit filed in court. FBI spokeswoman Carol Cratty hung up on The Daily Beast after being asked about the “tear up Texas” text. But shortly after that exchange, Simpson and his accomplice, Nadir Soofi, drove up to the contest and opened fire. Both men were killed in the altercation, but Hendricks would remain free for another year. Every major U.S. attack was linked to FBI investigation before it happened.
Note: The FBI has been stepping up its use of stings in ISIS cases. Read how an FBI mole posing as a potential lover recently convinced a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
The CIA has a long history of “spooking the news,” dating back to its earliest days when the legendary spymaster Allen Dulles and his top staff drank and dined regularly with the press elite of New York and Washington, and the agency boasted hundreds of U.S. and foreign journalists as paid and unpaid assets. In 1977, after this systematic media manipulation was publicly exposed by congressional investigations, the CIA created an Office of Public Affairs that was tasked with guiding press coverage of intelligence matters. The intelligence empire’s efforts to manufacture the truth and mold public opinion are more vast and varied than ever before. One of its foremost assets? Hollywood. The agency has established a very active spin machine in the heart of the entertainment capital, which works strenuously to make sure the cloak-and-dagger world is presented in heroic terms. Since the mid-1990s, but especially after 9/11, American screenwriters, directors, and producers have traded positive portrayal of the spy profession in film or television projects for ... favors at CIA headquarters. As Hollywood became increasingly embedded with Langley ... CIA employees often saw their public-affairs colleagues giving various celebrities personalized tours of the headquarters. “I can’t tell you how many times this happened,” recalled the former CIA officer John Kiriakou. There’s a revolving door between the CIA and Hollywood.
Note: Read how the Pentagon controls the script of hundreds of movies, some quite well known. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
The Obama administration just released numbers suggesting ... that drone strikes in countries excluding Iraq, Afghanistan and Syria have resulted in between at least 64 and 116 noncombatant deaths during his administration. The president also issued an executive order effectively directing his successor to ... publish this data going forward. The new executive order means it will be harder for the next president to kill in total secrecy. Obama’s use [of drones] over the last seven years set a disastrous global precedent: using a new weapons technology as an excuse to kill in secret and without regard for international law. Today’s developments are an incremental but important step away from the notion that new technology is a license for secrecy. The downside, though, is that the drone data could be completely misleading – and provide a veneer of legitimacy to unlawful killings. There are reports of hundreds of unidentified people killed in apparent “signature strikes,” where targeting decisions were made on the basis of patterns of behavior rather than identification of a specific individual. Amnesty International and other groups have also documented so-called rescuer strikes, where the US killed or injured individuals who were trying to help the victims of an initial strike. The CIA, an agency with an extremely poor record of accountability to the public, is still conducting strikes. Its continued role is likely one reason we aren’t getting fuller answers to our questions about drones.
Note: Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
A CIA tip off to South Africa's apartheid regime which led to Nelson Mandela's arrest and 27-year imprisonment was condemned as a "betrayal of our nation" by the grandson and heir of the former president. Mandla Mandela called on US President Barack Obama to apologise and make a "full disclosure" of the events leading up to his grandfather's arrest in 1962 ... after a former CIA agent confirmed that he told the apartheid police how to find [Nelson] Mandela. "The USA put its imperial interests above the struggle for liberation of millions of people," said Mr Mandela, the former statesman's eldest grandson who is also an ANC MP. Donald Rickard said he and his handlers believed Mr Mandela was "the world's most dangerous communist outside of the Soviet Union" and he had no qualms about tipping the authorities off about his whereabouts in 1962, the height of the Cold War. The CIA's involvement in his detention after 17 years on the run has long been suspected but has never been confirmed until now. Mr Rickard ... broke his silence about his involvement in netting the "Black Pimpernel" as Mandela was known in an interview in March with researchers for a new film by British director John Irvin. Mr Rickard, who retired from the CIA in 1978 and spent the rest of his life in a remote spot in Colorado, died two weeks after the interview. Zizi Kodwa, a spokesman for the ANC, echoed claims by the ANC's secretary-general that the CIA was still interfering in South African politics.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
From 2013 to 2015, the NSA and CIA doubled the number of warrantless searches they conducted for Americans’ data in a massive NSA database ostensibly collected for foreign intelligence purposes, according to a new intelligence community transparency report. The estimated number of search terms “concerning a known U.S. person” to get contents of communications within what is known as the 702 database was 4,672 - more than double the 2013 figure. And that doesn’t even include the number of FBI searches on that database. A recently released ... court ruling confirmed that the FBI is allowed to run any number of searches it wants on that database, not only for national security probes but also to hunt for evidence of traditional crimes. No estimates have ever been released of how often that happens. The missing data from the FBI is of great concern to privacy advocates. The USA Freedom Act, passed in June 2015, “conspicuously exempts the FBI” from disclosing how often it searches the 702 database, the Project on Government Oversight (POGO) wrote in a letter to the Director of National Intelligence, James Clapper, in October 2015. “There is every reason to believe the number of FBI queries far exceeds those of the CIA and NSA,” POGO wrote. “It is essential that you work with the attorney general to release statistics on the FBI’s use of U.S. person queries.” The new report also leaves unanswered how many Americans’ communications are collected in the first place.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
After one woman broke his heart, Khalil Abu Rayyan, a 21-year-old Michigan man, contemplated suicide. Then, when he confided his dark thoughts to another woman, she suggested he steer his violence toward other people. Both women ... were FBI honeypots, and one of the recorded conversations with Rayyan entered into ongoing court proceedings provides a rare glimpse into how federal informants work. The U.S. government now alleges that Rayyan, who has been indicted on federal gun charges, is an Islamic State sympathizer who talked of attacking a church. Federal prosecutors ... are handling Rayyan’s indictment with the secrecy of a national security investigation. The first FBI informant to enter Rayyan’s life was “Ghaada.” They struck up an intense relationship online, and even talked about marriage, children, and a life together. When Ghaada called off the relationship, Rayyan was heartbroken. The FBI then introduced “Jannah Bride.” To impress his new romantic interest, who appeared preoccupied with jihad, Rayyan claimed to have an AK-47 (he didn’t), and to have attempted travel to Syria (there’s no evidence he even bought a ticket). An FBI recording of a conversation between Rayyan and Bride ... shows how the FBI used Rayyan’s suicidal thoughts to manipulate him. After the phone call, FBI agents searched Rayyan’s home and business, [and] found no trace of the assault rifle [he had mentioned to Bride]. Rayyan appears to have made up the story entirely to impress Bride.
Note: Click the link above and listen to how this FBI mole posing as a potential lover convinces a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
Two senior intelligence analysts at U.S. Central Command say the military has forced them out of their jobs because of their skeptical reporting on U.S.-backed rebel groups in Syria. It’s the first known instance of possible reprisals against CENTCOM personnel after analysts accused their bosses of manipulating intelligence reports about the U.S.-led campaign against ISIS in order to paint a rosier picture of progress in the war. One of the analysts alleging reprisals is the top analyst in charge of Syria issues at CENTCOM. He and a colleague doubted rebels’ capabilities and their commitment to U.S. objectives in the region. [Their] views put them at odds with military brass, who last year had predicted that a so-called moderate opposition would make up a 15,000-man ground force to take on ISIS. An initial $500 million program to train and arm those fighters failed spectacularly. And until the very end, Pentagon leaders claimed the operation was more or less on track. The Pentagon inspector general and a congressional task force are investigating allegations of doctored intelligence reports about ISIS. More than 50 CENTCOM analysts have said that senior officials gave more scrutiny and pushback on reports that suggested U.S. efforts to destroy ISIS weren’t progressing. The Defense Department inspector general is also looking into ... "whether there was any falsification, distortion, delay, suppression, or improper modification of intelligence information.”
Note: Explore powerful evidence that ISIS is aided and was possibly even created by covert US support. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
Khalil Abu Rayyank was a lonely young man in Detroit, eager to find a wife. Jannah Bride claimed she was a 19-year-old Sunni Muslim whose husband was killed in an airstrike in Syria. The two struck up a romantic connection ... online. Now, Rayyan, a 21-year-old Michigan man, is accused by federal prosecutors of supporting the Islamic State. Jannah Bride, not a real name, was in fact an FBI informant hired to communicate with Rayyan. The FBI and federal prosecutors have treated his case as a national security concern, making numerous references in court filings and at a detention hearing to statements Rayyan made about the Islamic State and his supposed aspirations for violence. According to transcripts ... Rayyan had fallen in love with Bride and had even proposed marriage. The FBI informant initiated conversations about violence on several occasions, and when she did, Rayyan would tell her that he didn’t want to hurt anyone. Eventually, Rayyan found a way to capture the woman’s interest, describing his plans for an attack. The story appears to be fantasy, however. Psychologist ... Lyle D. Danuloff assessed Rayyan’s level of dangerousness as “very low,” according to a report filed Tuesday. Danuloff wrote: “His verbalization was the result of an effort to keep the attention with hopes of a future. They were not the result of radicalization or representative of terrorist intentions.”
Note: If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success? Read an essay from Timothy Silver's profound book Lifting the Veil that suggests the "War on Terror" is a fraud.
The Obama administration on Thursday announced new rules that will let the NSA share vast amounts of private data gathered without warrant, court orders or congressional authorization with 16 other agencies, including the FBI, the Drug Enforcement Agency, and the Department of Homeland Security. The new rules allow ... those agencies to sift through raw data collected under a broad, Reagan-era executive order that gives the NSA virtually unlimited authority to intercept communications abroad. Previously, NSA analysts would filter out information they deemed irrelevant and mask the names of innocent Americans before passing it along. The last-minute adoption of the procedures is one of many examples of the Obama administration making new executive powers established by the Bush administration permanent, on the assumption that the executive branch could be trusted to police itself. Executive Order 12333 ... serves as authorization for the NSA’s most massive surveillance programs. In 2014, a former state department official described NSA surveillance under 12333 as a “universe of collection and storage” beyond what Congress has authorized. This massive database inevitably includes vast amount of American’s communications — swept up when they speak to people abroad, when they go abroad themselves, or even if their domestic communications are simply routed abroad. That’s why access was previously limited to data that had already been screened to remove unrelated information and information identifying U.S. persons.
Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss this provocative article by Glenn Greenwald and this interview he gave to Fox News. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The Wall Street Journal reported yesterday that the NSA under President Obama targeted Israeli Prime Minister Benjamin Netanyahu and his top aides for surveillance. In the process, the agency ended up eavesdropping on ... U.S. lawmakers and American-Jewish groups. People who spent many years cheering for and defending ... programs of mass surveillance are suddenly indignant now that they know the eavesdropping included them. Long-time GOP chairman of the House Intelligence Committee and unyielding NSA defender Pete Hoekstra last night was truly indignant: "WSJ report that NSA spied on Congress and Israel communications very disturbing. Actually outrageous. Maybe unprecedented abuse of power ... NSA and Obama officials need to be investigated and prosecuted. NSA loses all credibility. Scary." This pattern - whereby political officials who are vehement supporters of the Surveillance State transform overnight into crusading privacy advocates once they learn that they themselves have been spied on - is one that has repeated itself over and over. So now, with yesterday’s WSJ report, we witness the tawdry spectacle of large numbers of people who for years were fine with, responsible for, and even giddy about NSA mass surveillance suddenly objecting. Overnight, privacy is of the highest value because now it’s their privacy, rather than just yours, that is invaded.
Note: Read the full Wall Street Journal article on how the US government is secretly spying on Israeli leaders and more. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Months after the Obama administration declared combat operations over in Afghanistan, the CIA continues to run a shadow war in the eastern part of the country, overseeing an Afghan proxy called the Khost Protection Force [KPF], according to local officials, former commanders of that militia and Western advisers. The highly secretive paramilitary unit has been implicated in civilian killings, torture, questionable detentions, arbitrary arrests and use of excessive force in controversial night raids. In several attacks, witnesses described hearing English being spoken by armed men who had interpreters with them, suggesting American operatives were present during assaults where extreme force was used. Afghan government officials acknowledge that the KPF has killed civilians and committed other abuses. In Khost, the KPF is more influential than the Afghan army and police, and is unaccountable to the provincial government. The CIA [directs] the KPF’s operations, paying fighters’ salaries, and training and equipping them. The CIA is not bound by the Bilateral Security Agreement between Afghanistan and Washington that, among other rules, limits the ability of U.S. military forces to enter Afghan homes. The KPF was one of several large paramilitary forces created by the CIA in the months after the Taliban was ousted following the 9/11 attacks.
Note: Read a fascinating article titled "Does the Pentagon Want Nuclear War Against Russia?" Key leaders in both the CIA and Pentagon seem to want war at all costs, particularly as war fills their coffers and those of their big business buddies. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.
In 2009, not long after his historic election and seven years after the first U.S. drone strike, President Barack Obama accepted the Nobel Peace Prize. Since then, however, deadly U.S. drone strikes have increased sharply, as have doubts about the program’s reliability and effectiveness. The latest criticism comes from Drone, a new documentary about the CIA’s covert drone war. To help promote the film and inveigh against the agency’s drone program ... four former operators - Stephen Lewis, Michael Haas, Cian Westmoreland and Brandon Bryant - appeared at a press conference. Speaking out can lead to veiled threats and prosecution. Which is why for years Bryant was the only drone veteran who openly rebuked the drone war. But his persistence and his appearance in the film, the other three say, inspired them to come forward. On multiple occasions, the men say they complained to their superiors about their concerns to no avail. Drone strikes kill far more civilians than the government admits. These deaths, they argue, wind up helping militant groups recruit new members and hurt the U.S.’s long-term security. By distancing soldiers from the battlefield, the operators suggest the people carrying out strikes may become even more desensitized to killing than their counterparts on the front lines. On some occasions, Haas says operators referred to children as “fun-sized terrorists” or “TITS,” terrorists in training.
Note: A human rights attorney has stated the four former Air Force drone operators-turned-whistleblowers mentioned above have had their credit cards and bank accounts frozen. How many more have not spoken out against these abuses for fear of retaliation like this? Read more about the major failings of US drone attacks. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
It’s a wretched yet predictable ritual after each new terrorist attack: Certain politicians and government officials waste no time exploiting the tragedy for their own ends. The remarks on Monday by John Brennan, the director of the Central Intelligence Agency, took that to a new and disgraceful low ... after coordinated terrorist attacks in Paris killed 129. Mr. Brennan complained about ... the sustained national outrage following the 2013 revelations by Edward Snowden, a former National Security Agency contractor, that the agency was using provisions of the Patriot Act to secretly collect information on millions of Americans’ phone records. It is hard to believe anything Mr. Brennan says. Last year, he bluntly denied that the C.I.A. had illegally hacked into the computers of Senate staff members conducting an investigation into the agency’s detention and torture programs when, in fact, it did. In 2011 ... he claimed that American drone strikes had not killed any civilians, despite clear evidence that they had. And his boss, James Clapper Jr., the director of national intelligence, has admitted lying to the Senate on the N.S.A.’s bulk collection of data. Even putting this lack of credibility aside, it’s not clear what extra powers Mr. Brennan is seeking. Most of the men who carried out the Paris attacks were already on the radar of intelligence officials in France and Belgium, where several of the attackers lived. The problem in this case was not a lack of data. In fact, indiscriminate bulk data sweeps have not been useful.
Note: The above is an excellent article by the New York Times editorial board. Yet the role of the largely subservient media, which strongly supported Bush's campaign to go to war in Iraq is ignored. Read this analysis to go even deeper. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
The U.S. closely monitored Israel’s military bases and eavesdropped on secret communications in 2012, fearing its longtime ally might try to carry out a strike on Fordow, Iran’s most heavily fortified nuclear facility. Nerves frayed at the White House after senior officials learned Israeli aircraft had flown in and out of Iran in what some believed was a dry run for a commando raid on the site. Worried that Israel might ignite a regional war, the White House sent a second aircraft carrier to the region and readied attack aircraft, a senior U.S. official said, “in case all hell broke loose.” The two countries, nursing a mutual distrust, each had something to hide. Instead of talking to each other, the allies kept their intentions secret. To figure out what they weren’t being told, they turned to their spy agencies to fill gaps. They employed deception, not only against Iran, but against each other. After working in concert for nearly a decade to keep Iran from an atomic bomb, the U.S. and Israel split over the best means: diplomacy, covert action or military strikes. In 2010, the risk of covert action became clear. A computer virus dubbed Stuxnet, deployed jointly by the U.S. and Israel to destroy Iranian centrifuges ... had inadvertently spread across the Internet. The Israelis wanted to launch cyberattacks against a range of Iranian institutions, according to U.S. officials. But the breach made Mr. Obama more cautious, officials said, for fear of triggering Iranian retaliation, or damaging the global economy if a virus spread uncontrollably.
Note: This article is also available at this link. When the Stuxnet computer virus got loose, it began attacking European companies. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Confidential files containing evidence of violations committed during El Salvador’s civil war have been stolen from a Washington-based human rights group days after it launched legal proceedings against the CIA over classified files on a former US-backed military commander implicated in massacres, death squads and forced disappearances. A computer and hard drive containing testimonies from survivors were stolen from the office of the director of the University of Washington Center for Human Rights (UWCHR) last week. The director’s office was the only one raided, there were no signs of forced entry, and items of monetary value were left behind. The stolen files contained details of investigations related to the 1980-1992 civil war, which left at least 75,000 people dead, 8,000 missing and a million displaced. The vast majority of crimes were committed by US-backed military dictatorships against civilians ... suspected of supporting the leftist guerrillas, according to the UN. Perpetrators were granted immunity from prosecution by a 1993 amnesty law, which remains intact despite being ruled illegal by the Inter American Court of Human Rights. The UWCHR has uncovered previously unseen information held by federal agencies such as the CIA and DEA, which it has shared with relatives of victims. The group filed a freedom of information suit against the CIA on 2 October. The sensitive files were stolen two weeks later. Several rights groups in El Salvador investigating war crimes have suffered similarly suspicious robberies.
Note: Several military human rights abusers in El Salvador were trained by the US Army's School of the Americas, along with over 500 known human rights abusers.
A French secret service diver who took part in the operation to sink Greenpeace ship the Rainbow Warrior 30 years ago has spoken publicly for the first time to apologise for his actions. Jean-Luc Kister ... was one of two divers serving with the French intelligence service, the Direction générale de la sécurité extérieure (DGSE), who attached limpet mines to the hull of the vessel moored in Auckland in 1985. The Rainbow Warrior was heading for the Mururoa Atoll in the South Pacific in French Polynesia where France was planning a series of nuclear tests. French agents posing as Swiss tourists had earlier visited the ship ... to gather information for the operation. The first mine ... blew a large hole in the ship. Paris initially denied any involvement in the sinking, [which killed photographer Fernando Pereira], and described it as a “terrorist attack”. Documents released in 2005 and published in the Guardian, showed that France [also] tried to blame British intelligence for the sinking. The French government’s responsibility, however, was quickly established. In 1987, under international pressure, France paid $8.2m damages to Greenpeace. It also paid an undisclosed sum to the Pereira family. Kister claims politicians in Paris turned down other suggestions for dealing with the Greenpeace protest. He said it was “an unfair clandestine operation conducted in an allied, friendly and peaceful country” ... and accused French politicians of “high treason” for having leaked his name and role in the operation after the sinking.
Note: By posing as Swiss tourists to spy on the Greenpeace ship, attacking this ship, and then blaming the attack on "terrorists", the French carried out a "false flag" attack. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T. The N.S.A.’s top-secret budget in 2013 for the AT&T partnership was more than twice that of the next-largest such program, [and] the company installed surveillance equipment in at least 17 of its Internet hubs on American soil, far more than its similarly sized competitor, Verizon. After the terrorist attacks of Sept. 11, 2001, AT&T ... began turning over emails and phone calls “within days” after the warrantless surveillance began in October 2001. In 2011, AT&T began handing over 1.1 billion domestic cellphone calling records a day to the N.S.A. after “a push to get this flow operational prior to the 10th anniversary of 9/11,” according to an internal agency newsletter. In a 2006 lawsuit, a retired AT&T technician named Mark Klein claimed that ... he had seen a secret room in a company building in San Francisco where the N.S.A. had installed equipment. Mr. Klein claimed that AT&T was providing the N.S.A. with access to Internet traffic that AT&T transmits for other telecom companies. Such cooperative arrangements, known in the industry as “peering,” mean that communications from customers of other companies could end up on AT&T’s network.
Note: The story of Klein's lawsuit was initially suppressed by the NSA and major media including the L.A. Times. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
Retired Army Gen. Mike Flynn, a top intelligence official in the post-9/11 wars in Iraq and Afghanistan, says in a forthcoming interview ... that the drone war is creating more terrorists than it is killing. He also asserts that the U.S. invasion of Iraq helped create the Islamic State. Flynn, who in 2014 was forced out as head of the Defense Intelligence Agency, has in recent months become an outspoken critic of the Obama administrations Middle East strategy. The former three star general ... describes the present approach of drone warfare as a failed strategy. What we have is this continued investment in conflict, the retired general says. The more weapons we give, the more bombs we drop, that just fuels the conflict. In 2010, [Flynn] published a controversial report on intelligence operations in Afghanistan, stating in part that the military could not answer fundamental questions about the country and its people despite nearly a decade of engagement there. Earlier this year, Flynn commended the Senate Intelligence Committee report on CIA torture saying that torture had eroded American values and that in time, the U.S. will look back on it, and it wont be a pretty picture.
Note: Drone strikes almost always miss their intended targets. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing news articles about military corruption.
An investigation by the German parliament is raising questions on whether the Obama administration not only spied on journalists in that country, but also interfered in the exercise of the free press. On Thursday, Germany's intelligence coordinator, Günter Heiss, testified before a parliamentary investigative committee of the German parliament, the Bundestag, focused on the activities of the U.S. National Security Agency's spying on Germany and whether the German intelligence agency BND had any knowledge of it. In 2013, the German magazine Der Spiegel ... first reported that the NSA was intercepting German Chancellor Angela Merkel's cell phone communications. On Thursday, WikiLeaks released more information, presumably from that surveillance, from a conversation between Merkel and her personal assistant in October 2011. The WikiLeaks release also suggested that the NSA was spying on German ministers in addition to Merkel. Less observed this week was news that the NSA was eavesdropping not only on Merkel, but also in some capacity on Germany's free press, specifically Der Spiegel. "It feels bitter to learn that American intelligence agencies spied on reporters in another country and denounced alleged sources to the government," said one reporter involved, who asked not to be identified for fear of repercussions from his government or the U.S. government. "This is something I expected to happen in authoritarian states like Russia or China, but not in a democracy."
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
[One spy unit is] responsible for some of the United Kingdom's most controversial tactics of surveillance, online propaganda and deceit. Documents ... demonstrate how the Joint Threat Research Intelligence Group (JTRIG), a unit of the signals intelligence agency Government Communications Headquarters (GCHQ), is involved in efforts against political groups it considers "extremist". Though its existence was secret until last year, JTRIG quickly developed a distinctive profile [after] Edward Snowden revealed that the unit had engaged in "dirty tricks" like deploying sexual "honey traps" designed to discredit targets, launching denial-of-service attacks to shut down Internet chat rooms, pushing veiled propaganda onto social networks and generally warping discourse online. Particularly revealing is a fascinating 42-page document from 2011 detailing JTRIG's activities. The document lays out the tactics the agency uses to manipulate public opinion, its scientific and psychological research into how human thinking and behavior can be influenced. Many GCHQ documents describing the "missions" of the "customers" for which it works make clear that the agency has a wide mandate far beyond national security, including providing help on intelligence to the Bank of England, ... to various departments on agriculture and whaling activities, to government financial divisions to enable good investment decisions. Beyond JTRIG's targeting of Anonymous, other parts of GCHQ targeted political activists deemed to be "radical," even monitoring the visits of people to the WikiLeaks website. [The document] includes detailed discussions of how to foster "obedience" and "conformity".
Note: Read amazing excerpts of this report at the link above showing how JTRIG plays an active role on the Internet in directly manipulating many political discussions and websites. For more along these lines, see concise summaries of deeply revealing news articles on corruption in intelligence agencies from reliable major media sources.
The Obama administration is again allowing the CIA to use drone strikes to secretly kill people that the spy agency does not know the identities of in multiple countries - despite repeated statements to the contrary. Apparently the drone operators didn't even know at the time who they were aiming at - only that they thought the target was possibly a terrorist hideout. It's what's known as a "signature" strike. Signature strikes has led to scores of civilians being killed over the past decade, including two completely innocent hostages ... one of whom was a US citizen ... less than two months ago. It's a way of killing that's been roundly condemned by human rights organizations and that some members of Congress have tried to outlaw. Here's how the New York Times described it: "The joke was that when the CIA sees "three guys doing jumping jacks," the agency thinks it is a terrorist training camp, said one senior official. Men loading a truck with fertilizer could be bombmakers – but they might also be farmers." It has become increasingly clear that the "rules" are virtually meaningless. As is typical with the US government's extrajudicial killing policy, there was no public debate about any of the changes to the supposed rules, or even announcement that they ever changed - only an unofficial leak to a journalist after the latest killing. Beyond the enormous human rights consequences related to such a dangerous policy, these types of strikes backfire on the United States, sowing hatred in the populations of bombed countries and breeding sympathy for al-Qaida where there was none before.
Note: For more along these lines, see concise summaries of deeply revealing news articles on terrorism from reliable major media sources. Then explore the excellent, reliable resources provided in our War Information Center.
Two years ago, the first story based on the Snowden archive was published in The Guardian, revealing a program of domestic mass surveillance, which, at least in its original form, ended this week. To commemorate that anniversary, Edward Snowden himself reflected in a New York Times op-ed on the “power of an informed public”. The debate provoked by these disclosures [examined] the role journalism ought to play in a democracy and the proper relationship of journalists to those who wield the greatest political and economic power. Of all the revelations over the last two years, one of the most illuminating and stunning has been the reaction of many in the American media to Edward Snowden as a source. There was plenty of journalistic support for the disclosures. But huge numbers of journalists went on the warpath against transparency. The Los Angeles Times ... believes leaking is criminal and those who do it belong in prison. The LA Times itself constantly publishes illegal leaks, though the ones it publishes usually come from top government officials. Have the LA Times editors called for the criminal prosecution of Leon Panetta, and John Brennan, and the endless number of senior officials who leak not (as Snowden did) to inform the public but in order to propagandize them? Of course not, and therein lies the key media lesson from all of this. These journalists are literally agents of political power.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
On Monday the trial in London of a Swedish man, Bherlin Gildo, accused of terrorism in Syria, collapsed after it became clear British intelligence had been arming the same rebel groups the defendant was charged with supporting. The prosecution abandoned the case, apparently to avoid embarrassing the intelligence services. Reports were cited that MI6 had cooperated with the CIA on a “rat line” of arms transfers from Libyan stockpiles to the Syrian rebels in 2012 after the fall of the Gaddafi regime. Terrorism is now squarely in the eye of the beholder. A revealing light on how we got here has now been shone by a recently declassified secret US intelligence report, written in August 2012, which uncannily predicts – and effectively welcomes – the prospect of a “Salafist principality” in eastern Syria and an al-Qaida-controlled Islamic state in Syria and Iraq. In stark contrast to western claims at the time, the Defense Intelligence Agency document identifies al-Qaida in Iraq (which became Isis) and fellow Salafists as the “major forces driving the insurgency in Syria” – and states that “western countries, the Gulf states and Turkey” were supporting the opposition’s efforts to take control of eastern Syria. A year into the Syrian rebellion, the US and its allies weren’t only supporting and arming ... extreme sectarian groups; they were prepared to countenance the creation of some sort of “Islamic state” – despite the “grave danger” to Iraq’s unity – as a Sunni buffer to weaken Syria.
Note: An article in The Atlantic reveals that the US Congress takes a very strange stance on ISIS. Read more excellent information on the covert origins of ISIS in this revealing essay.
Last summer ... I spent three days in Moscow hanging out with Edward Snowden for a Wired cover story. He told me that what finally drove him to leave his country and become a whistleblower was his conviction that the National Security Agency was conducting illegal surveillance on every American. Thursday, the Second Circuit Court of Appeals in New York ... ruled that the NSA program that secretly intercepts the telephone metadata of every American — who calls whom and when — was illegal. It’s now up to Congress to vote on whether or not to modify the law ... by June 1, when they need to reauthorize the Patriot Act. A PEW survey in March revealed that 52 percent of the public is now concerned about government surveillance, while 46 percent is not. There is now a sort of acceptance of highly intrusive surveillance as the new normal, [while] the American public [remains] unaware of many of the agency’s long list of abuses. It is little wonder that only slightly more than half the public is concerned. For that reason, I agree with Frederick A. O. Schwartz Jr., the former chief counsel of the Church Committee, which conducted a yearlong probe into intelligence abuses in the mid-1970s, that we need a similarly thorough ... investigation today. “Now it is time for a new committee to examine our secret government closely again,” he wrote in a recent Nation magazine article, “particularly for its actions in the post-9/11 period.”
Note: The author of this excellent article is James Bamford, the former ABC News producer who broke the story on Operation Northwoods and has written landmark books on the NSA. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the erosion of privacy rights from reliable major media sources.
Edward Snowden’s most famous leak has just been vindicated. Since June 2013, when he revealed that the telephone calls of Americans are being logged en masse, his critics have charged that he took it upon himself to expose a lawful secret. They insisted that Congress authorized the phone dragnet when it passed the U.S.A. Patriot Act. A panel of judges on the Second Circuit Court of Appeals ruled last week that the program Snowden exposed was never legal. The Patriot Act does not authorize it, contrary to the claims of George W. Bush, Barack Obama, Michael Hayden, Keith Alexander, and James Clapper. “Statutes to which the government points have never been interpreted to authorize anything approaching the breadth of the sweeping surveillance at issue here,” Judge Gerard E. Lynch declared. Consider what this means. For many years, the executive branch carried out a hugely consequential policy change that the legislature never approved. Tens of millions of innocent U.S. citizens were thus subject to invasions of privacy that no law authorized. Officials classified the program as a state secret, keeping it out of Article III courts. By doing so, they prevented the judiciary from reviewing the statutory legitimacy of NSA surveillance, subverting a core check in our system of government. The consequence: An illegal program persisted for years. This is a perfect illustration of why secret government programs are an abomination in our democracy.
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of privacy rights from reliable major media sources.
When Bruce E. Ivins, an Army microbiologist, took a fatal overdose of Tylenol in 2008, the government declared that he had been responsible for the anthrax letter attacks of 2001, which killed five people and set off a nationwide panic, and closed the case. Now, a former senior F.B.I. agent who ran the anthrax investigation for four years says that the bureau gathered a staggering amount of exculpatory evidence regarding Dr. Ivins that remains secret. The former agent, Richard L. Lambert, who spent 24 years at the F.B.I., says he believes it is possible that Dr. Ivins was the anthrax mailer, but he does not think prosecutors could have convicted him had he lived to face criminal charges. In a lawsuit filed in federal court in Tennessee last Thursday, Mr. Lambert accused the bureau of trying to railroad the prosecution of Ivins and, after his suicide, creating an elaborate perception management campaign to bolster its claim that he was guilty. Mr. Lamberts lawsuit accuses the bureau and the Justice Department of forcing his dismissal from a job as senior counterintelligence officer ... in retaliation for his dissent on the anthrax case. The anthrax letters were mailed to United States senators and news organizations in the weeks after the Sept. 11, 2001, terrorist attacks. The bureaus investigation ... focused on a former Army scientist and physician, Dr. Steven J. Hatfill, who was subsequently cleared and given a $4.6 million settlement to resolve a lawsuit.
Note: There is more strong evidence that the anthrax scare was fabricated by inside sources. Read an excellent article with more on this strange case.
An anti-Iranian group calling itself “United Against Nuclear Iran” (UANI) ... is very likely a front for some combination of the Israeli and U.S. intelligence services. When launched, NBC described its mission as waging “economic and psychological warfare” against Iran. The group was founded and is run and guided by a roster of ... neocon extremists such as Joe Lieberman, former Bush Homeland Security adviser (and current CNN “analyst”) Fran Townsend, former CIA Director James Woolsey, and former Mossad Director Meir Dagan. In May 2013, UANI launched a “name and shame” campaign designed to publicly identify — and malign — any individuals or entities enabling trade with Iran. One of the accused was the shipping company of Greek billionaire Victor Restis, who ... sued UANI for defamation in a New York federal court. Then something quite extraordinary happened: In September of last year, the U.S. government, which was not a party, formally intervened in the lawsuit, and demanded that the court ... dismiss the lawsuit against UANI before it could even start, on the ground that allowing the case to proceed would damage national security. Why would such a group like this even possess “state secrets”? It would be illegal to give them such material. The U.S. government provide no clue as to what the supposedly endangered “state secrets” are. As a result of the DOJ’s protection, UANI cannot be sued. This group of neocon extremists now has a license to defame anyone they want.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
A member of the late Chilean dictator Augusto Pinochet’s brutal secret police who’s been accused of murder taught for more than a decade at the Pentagon’s premier university, despite repeated complaints by his colleagues about his past. Jaime Garcia Covarrubias is charged in criminal court in Santiago with being the mastermind in the execution-style slayings of seven people in 1973, according to court documents. An accuser ... identified Garcia Covarrubias as the person who sexually tortured him. Despite knowing of the allegations, State and Defense department officials allowed Garcia Covarrubias to retain his visa and continue working at a school affiliated with the National Defense University until last year. Human rights groups also question the school’s selection of a second professor, Colombia’s former top military commander. Some Latin America experts said the hirings by the William J. Perry Center for Hemispheric Defense Studies reflected a continuing inclination by the U.S government to overlook human rights violations in Latin America, especially in countries where it funded efforts to quash leftists. Those experts were especially troubled by Garcia Covarrubias’ long tenure at one of the nation’s most renowned defense institutions. His case is one of 108 involving tortured, disappeared or murdered supporters of the deposed elected president, Salvador Allende. More than 3,000 people died at the hands of the regime. Despite very graphic torture accusations against Garcia Covarrubias, U.S. officials are rallying behind him.
Note: The Pinochet regime successfully carried out an assassination in Washington D.C. in 1976 despite US Government foreknowledge of the plot. The Western Hemisphere Institute for Security Cooperation, formerly known as the School of the Americas, graduated more than 500 human rights abusers. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Jane Turner loved being a FBI agent. But once she became a whistleblower, the FBI turned on her. The Government Accountability Office (GAO) cites [Turner's] case in a report that will be the focus of a Senate hearing Wednesday. Compared with other feds, FBI whistleblowers have less protection against retaliation by management, the GAO says, and current procedures could discourage whistleblowing. “Anytime a whistleblower is punished for pointing out waste or misconduct, it sends the signal to other employees that doing the right thing will be met with potentially harsh repercussions,” Sen. Charles E. Grassley (R-Iowa), chairman of the Judiciary Committee, told Federal Diary. “Unfortunately, many who come to me express fear of reprisal for raising the alarm and are even unclear of their rights as whistleblowers. In fact, one potential witness for Wednesday’s hearing backed out for fear of retaliation.” Another problem the GAO identified [is] the time it takes to resolve some complaints. In 2002, Turner, based in Minneapolis, blew the whistle on colleagues who allegedly stole items from Ground Zero after the Sept. 11, 2001, terrorist attacks. How did her bosses respond? “After making this whistleblower disclosure, she was ... placed on leave, and given a notice of proposed removal,” the GAO reported. Like a tenacious FBI agent, Turner fought back and won. But not until 2013, when the Justice Department ruled in her favor — more than a decade after her complaint.
Note: Jane Turner was one of several people that courageously stepped forward to expose the cover-up of federal employee misconduct after 9/11. For more along these lines, see concise summaries of deeply revealing news articles about the 9/11 cover-up and government corruption from reliable major media sources.
American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden. The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data. The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands. With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted.
Note: In an article that updates the story above, The Intercept reports that Gemalto has now acknowledged this security breach, but is misrepresenting its significance to prevent client and investor fears from harming the company's profitability. For more along these lines, see concise summaries of deeply revealing news articles about corruption in intelligence agencies and government.
A 13-year-old boy killed in Yemen last month by a CIA drone strike had told the Guardian just months earlier that he lived in constant fear of the “death machines” in the sky that had already killed his father and brother. “I see them every day and we are scared of them,” said Mohammed Tuaiman. He died two weeks ago. In 2011 an unmanned combat drone killed his father and teenage brother as they were out herding the family’s camels. The drone that would kill Mohammed struck on 26 January in Hareeb, about an hour from his home. The drone hit the car carrying the teenager, his brother-in-law Abdullah Khalid al-Zindani and a third man. “I saw all the bodies completely burned, like charcoal,” Mohammed’s older brother Maqded said. US government officials told Reuters that the strike had been carried out by the CIA and had killed “three men believed to be al-Qaida militants”. Maqdad said the family had been wrongly associated with al-Qaida. Speaking from al-Zur the day after his brother’s death, Meqdad said: “After our father died, al-Qaida came to us to offer support. But we are not with them. We will do anything – go to court, whatever – in order to prove that [Mohammed] was not with al-Qaida.” When the Guardian interviewed Mohammed last September, he spoke of his anger towards the US government: “They tell us that these drones come from bases in Saudi Arabia and also from bases in the Yemeni seas and America sends them to kill terrorists, but they always kill innocent people. We don’t know why they are killing us."
Note: How is it that the US gets away with killing so many innocent civilians and there is not an uproar? For a possible answer, read what a top US general had to say in this article . For more, read a summary of the revealing Los Angeles Times report "Living with death by drone".
“There is something about the way the CIA has been functioning that is casting a shadow over our historic position and I feel that we need to correct it.” President Harry S. Truman wrote those words in an op-ed for the Washington Post on Dec. 22, 1963. This was exactly one month after the assassination of President John F. Kennedy and a bit more than 10 years before the ... Church Committee [formed] to study abuses in the intelligence committee. Sadly, we seem to slip back into the same old patterns where ... the CIA goes off in secret to “do its thing.” Whether it was overthrowing governments beginning in the 1950s, the attempted assassination of Fidel Castro ... or creating secret prisons for torture in the 2000s, the pattern is truly disturbing; in some cases, it was so disturbing that the CIA conducted internal reviews of its own actions. After the Church Committee investigation in 1975, our intelligence agencies were prohibited from assassinating foreign leaders and illegally spying on Americans, and the Foreign Intelligence Surveillance Court was created to further ensure prevention of unreasonable searches and seizures. In addition, permanent congressional oversight committees were established to do just what Sen. Dianne Feinstein’s, D-Calif., committee did last year to investigate the CIA on torture. It is ... doubtful that we will be holding the perpetrators accountable. We need a new Church Committee or serious presidential commission, [because] the new world in which we live ... demands far greater oversight.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Former CIA officer [Jeffrey Sterling] was convicted Monday of providing classified information about his work to a New York Times reporter. Guilty verdicts were read on all nine criminal counts. The prosecution ... spawned a First Amendment confrontation between a Pulitzer Prize-winning reporter and the Justice Department. It might be one of the greatest courtroom successes of a presidential administration that has pursued more leak cases than all of its predecessors combined. Other leak cases have resulted in pleas, at least one with terms favorable to the defendant. Sterling ... faced charges under the Espionage Act. [He] was first accused in 2010 of giving classified information to New York Times reporter and author James Risen for his 2006 book, “State of War.” Sterling, who was fired in the early 2000s, had sued the agency over alleged discrimination and also sparred with officials about publishing a memoir describing some of his work. The trial itself was something of a spectacle, with CIA officers testifying behind a retractable gray screen. The case against Sterling was largely circumstantial. There were no recorded phone conversations or captured e-mail exchanges that show that he leaked classified information to Risen. Defense attorneys posited several people other than Sterling who could have served as Risen’s sources, and ... argued that some information in the book could not have come from Sterling, because it addressed things that happened after he left the CIA.
Note: James Risen tried to help Jeffrey Sterling expose CIA racism, and later wrote an unrelated book exposing some questionable government practices. Now Sterling is going to prison for what Risen wrote then. Risen's journalistic courage remains intact, and his latest book exposes major government corruption related to the war on terror.
Journalist and former Anonymous member ... Barrett Brown was sentenced to 63 months in prison by a federal judge in Dallas on Thursday. The judge also ordered him to pay more than $890,000 in restitution and fines. An investigative journalist, essayist and satirist who has written for the Onion, Vanity Fair and the Huffington Post, as well as for the Guardian, Brown claims to have split with Anonymous in 2011. Brown also founded Project PM, a crowdsourced investigative thinktank dedicated to looking into abuses by companies in the area of surveillance. In September 2012, Brown was arrested by the FBI. In October 2012, after being held for two weeks without charge, he was indicted on charges of making an online threat, retaliating against a federal officer and conspiring to release personal information about a government employee. Two months later, he was indicted on 12 further charges related to the hacking of private intelligence contractor Stratfor in 2011. Jeremy Hammond, the hacker who actually carried out the Stratfor breach, was sentenced to the maximum possible 10 years. Brown, who was accused of sharing a link to the data Hammond obtained from the breach ... at one point faced a possible sentence of 105 years. He will reportedly be eligible for supervised release after one year, and once released will have his computer equipment monitored. The $890,250 in restitution payments will go to Stratfor and other companies targeted by Anonymous.
Note: Even after being targeted by a high level conspiracy, jailed on spurious charges, and forced to pay nearly a million dollars to Stratfor for merely writing about the hack of their private spy agency, Brown states that he remains committed to exposing corruption as a journalist from within the US prison system.
John Kiriakou is the only CIA employee to go to prison in connection with the agency's torture program. Not because he tortured anyone, but because he revealed information on torture to a reporter. Kiriakou is the Central Intelligence Agency officer who told ABC News in 2007 that the CIA waterboarded suspected al-Qaeda prisoners after the September 11 attacks. Kiriakou was sentenced in January 2013 to 30 months in prison. That sentence made him the second CIA employee ever to be locked up under the Intelligence Identities Protection Act. The first was Sharon Scranage, who in 1985 pled guilty to disclosing the identities of intelligence agents in Ghana after giving classified information to a Ghanaian, reportedly her lover. Kiriakou is not without support. His friend and former boss, Bruce Riedel, sent a letter to President Obama, signed by other CIA officers, urging him to commute Kiriakou's prison sentence. That did not happen. A father of five children, Kiriakou says the CIA asked his wife to resign from her job at the agency immediately following his arrest, and he is in major debt. "As part of this conviction, I lost my pension. I had $770,000 saved in that pension. And it's just gone. And I still owe my lawyers almost a million dollars."
Note: Kiriakou himself was misled about the extent and effectiveness of the torture program, but still felt the moral obligation to reveal its existence. The CIA spun his revelation into a pro-torture media narrative, took his money, put him in prison, and fired his wife from her job. Are the many ethical intelligence agents working for the U.S. able to trust their corrupt bosses after this? Watch the powerful documentary "Secrets of the CIA" in which five CIA agents describe how their initial pride at serving their nation turned to anguish and remorse, as they realized that they were actually subverting democracy and killing innocent civilians.
The U.S. House Intelligence Committee has denied [Rep. Alan Grayson, D-Orlando], a Florida congressman ... access to 28 classified pages from the 2002 report of Congress’ Joint Inquiry into the 9/11 terrorist attacks. [Grayson] made his request at the suggestion of House colleagues who have read them. The 28 pages concern ... “the role of Saudi Arabia in funding 9/11,” according to former Florida Senator Bob Graham, who co-chaired the Joint Inquiry and helped write the 28 pages. Graham has long called for declassifying those pages. House Resolution 428 ... asks President Obama to release the 28 pages of the Joint Inquiry’s report. In 2003, 46 senators — including now Vice President Joe Biden, Sam Brownback, Hillary Rodham Clinton and John Kerry – wrote to President Bush asking him to declassify the pages. In a party line vote, the House Intelligence Committee voted 8-4 on Dec. 1 to deny Democrat Grayson access to the 28 pages. The same day, the committee unanimously approved requests to access classified committee documents — not necessarily the 28 pages — by 11 other House members. Grayson, an outspoken liberal and a member of the House Committee on Foreign Affairs, said his denial was engineered by outgoing Chairman Mike Rogers, R-Mich. “Chairman Rogers told the committee that I had discussed classified information on the floor. I was discussing what was reported in the newspaper,” said Grayson. “He clearly misled the committee.”
Note: Alan Grayson questions the lies that intelligence agencies tell congress, and has made it clear to the public how common such lies are. He is now being prevented from helping those who are trying to expose the Saudi government money behind terrorism. For more along these lines, read concise summaries of deeply revealing 9/11 investigation news from reliable major media sources.
Last March, Senator Dianne Feinstein accused the CIA of spying on the Senate intelligence committee as it labored to finalize its report on the torture of prisoners. CIA Director John Brennan denied the charge. “Nothing could be further from the truth,” he said. “We wouldn’t do that. That’s just beyond the scope of reason in terms of what we’d do.” His denial was publicly proved false. "An internal investigation by the C.I.A. has found that its officers penetrated a computer network used by the Senate Intelligence Committee in preparing its damning report on the C.I.A.’s detention and interrogation program," The New York Times reported. "The report ... found that C.I.A. officers read the emails of the Senate investigators and sent a criminal referral to the Justice Department based on false information." "A panel investigating the C.I.A.’s search of a computer network used by staff members of the Senate Intelligence Committee ... will recommend against punishing anyone," The New York Times reports. "The panel will make that recommendation after the five C.I.A. officials who were singled out by the agency’s inspector general this year for improperly ordering and carrying out the computer searches staunchly defended their actions, saying that they were ... done at the behest of John O. Brennan."
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
Drone strikes and "targeted killings" of terror targets by the United States can be counterproductive and bolster the support of extremist groups, the CIA has admitted in a secret report released by WikiLeaks. The document, by the intelligence agency's Directorate of Intelligence, said that despite the effectiveness of "high value targeting" (HVT), air strikes and special forces operations had a negative impact by boosting the popular support of terror organisations. The CIA report is dated 2009 and talks of operations conducted in countries such as Iraq, Pakistan, Somalia, Afghanistan and Yemen. Operations against terror targets "may increase support for the insurgents, particularly if these strikes enhance insurgent leaders' lore, if non-combatants are killed in the attacks, if legitimate or semi-legitimate politicians aligned with the insurgents are targeted, or if the government is already seen as overly repressive or violent," the report said. "Senior Taliban leaders' use of sanctuary in Pakistan has also complicated the HVT effort," it reveals. "Moreover, the Taliban has a high overall ability to replace lost leaders ... especially at the middle levels." It speaks of drone strikes also having limited effect in Iraq. According to the Bureau of Investigative Journalism, US drone strikes have killed between 2,400 and 3,888 people in Pakistan in the years 2004 to 2014 and between 371 and 541 people in Yemen in the years 2002 to 2014.
Note: This report proves that the CIA has been aware that drone strikes are ineffective since at least 2009. If drones help terrorists, almost always miss their intended targets, and may be used to target people in the US in the future, what are the real reasons for the US government's drone program?
Ever since the torture report was released last week, U.S. television outlets have endlessly featured American torturers and torture proponents. But there was one group that was almost never heard from: the victims of their torture. The War on Terror generally has been “reported” for 13 years and counting by completely silencing those whose lives are destroyed or ended by U.S. crimes. In 2002, Maher [Arar], a Canadian citizen of Syrian descent who worked as an engineer, was travelling back home to Ottawa when he was abducted by the U.S. Government at JFK Airport, [secretly] interrogated for weeks, then “rendered” to Syria where the U.S. arranged to have him brutally tortured ... for 10 months. He was completely innocent, [and was] unceremoniously released back to his life in Canada as though nothing had happened. U.S. courts refused even to hear his case, accepting the Obama DOJ’s claim that it was too secret to safely adjudicate. The Canadian government ... publicly apologized for its role, and paid him $9 million. There are hundreds if not thousands of Maher Arars the U.S. media could easily and powerfully interview. The detainees held without charges, tortured, and then unceremoniously released from Guantanamo and Bagram are rarely if ever heard from on U.S. television, even when the U.S. Government is forced to admit that they were guilty of nothing.
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption that is supported by equally corrupt mass media.
The release of the Feinstein report [places] the end of the American "torture" regime in January of 2009. I'm not sure I'm buying that the U.S. government suddenly got religion about mistreatment of terror suspects once Obama took office, particularly since this government massively accelerated a drone-assassination program. Still, the end result [shows] that we approved behaviors far worse, and far weirder, than was ever admitted to previously. CIA detainees were subjected to "rectal rehydration" or rectal feeding ... to put them in a talking mood. The interrogators gave pet names to all of their ... permitted techniques, as outlined in the report: (1) attention grasp, (2) walling, (3) facial hold, (4) facial slap (insult slap), (5) cramped confinement, (6) wall standing, (7) stress positions, (8) sleep deprivation, (9) insects placed in a confinement box, and (10) the waterboard. A small confinement box ... had a width of 21 inches, a depth of 2.5 feet, and a height of 2.5 feet. They didn't just put people in these boxes. They [added] insects. Detainees at COBALT were subjected to what was described as a "rough takedown" [wherein] five CIA officers would scream at a detainee, drag him outside of his cell, cut his clothes off, and secure him with Mylar tape. The detainee would then be hooded and [repeatedly] slapped and punched. Gul Rahman was said to have died after one of these choreographed scare-scenes.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
The report released by the Senate Select Committee on Intelligence discloses new details about the C.I.A.’s torture practices. 1. The C.I.A.’s interrogation techniques were more brutal and employed more extensively than the agency portrayed. The report also describes detainees being subjected to sleep deprivation for up to a week, medically unnecessary “rectal feeding” and death threats. Conditions at one prison, described by a clandestine officer as a “dungeon,” were blamed for the death of a detainee, and the harsh techniques were described as leading to “psychological and behavioral issues, including hallucinations, paranoia, insomnia, and attempts at self-harm and self-mutilation.” 2. The C.I.A. interrogation program was mismanaged and was not subject to adequate oversight. 3. The C.I.A. misled members of Congress and the White House about the effectiveness and extent of its brutal interrogation techniques. 4. Interrogators in the field who tried to stop the brutal techniques were repeatedly overruled by senior C.I.A. officials. 5. The C.I.A. repeatedly underreported the number of people it detained. It also underreported the number of detainees who were subjected to torture. 6. At least 26 detainees were wrongfully held and did not meet the government’s standard for detention. 7. The C.I.A. leaked classified information to journalists, exaggerating the success of interrogation methods in an effort to gain public support.
Note: Efforts to bury this report have been ongoing. For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Former CIA officer John Kiriakou is the only CIA employee connected to its interrogation program to go to prison. But he was prosecuted for providing information to reporters, not for anything connected to ... “torture.” No other person connected to the program has been charged with a crime, after the Justice Department said their actions had been approved legally or that there was not sufficient admissible evidence in a couple cases of potential wrongdoing, even in light of the death of two detainees in the early 2000s. Kiriakou was the first person with direct knowledge of the CIA interrogation program to publicly reveal its existence, in an interview with ABC News in 2007. He is now serving a nearly-three-year prison sentence for violating the Intelligence Identities Protection Act, but he says that’s only what the government wants people to believe. “In truth, this is my punishment for blowing the whistle on the CIA’s illegal torture program and for telling the public that torture was official U.S. government policy,” Kiriakou said in a letter last May from a prison in Loretto, Penn. In his groundbreaking interview with ABC News and later with other news outlets, Kiriakou described the details of the program. In some cases, it turned out that even Kiriakou ... was misled or kept in the dark about the extent of the program.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
The intelligence services have routinely been intercepting legally privileged communications ... according to internal MI5, MI6 and GCHQ documents. The information obtained may even have been exploited unlawfully and used by the agencies in the fighting of court cases in which they themselves are involved, the Investigatory Powers Tribunal (IPT) has been told. MP David Davis, a former shadow home secretary, said past practice was to delete such material immediately if it was ever picked up. 28 extracts of internal intelligence policies showing how legally privileged material is handled by security officials were released to lawyers pursuing a claim through the IPT. The claim has been brought by two Libyans, Abdel-Hakim Belhaj and Sami Al Saadi. They were abducted in a joint MI6-CIA operation and ... tortured by Colonel Muammar Gaddafi’s regime in 2004. Belhaj has been given permission to sue the government for his mistreatment. Davis, who attended the hearing, said: “In the past, when a bug or intercept on a criminal accidentally picked up a conversation with the criminal’s lawyer, the rule was that it was immediately deleted. Today’s hearing shows that is no longer the case. Agencies are clearly keeping records of legal privileged material, and have explicit policies to handle it. In the case of MI5 that policy includes concealing ... that they have the material. This change has been carried out without changing the law or telling parliament. This is an enormous breach of defendants’ judicial rights.”
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable sources.
Declassified US records reveal the nation's intelligence chiefs used hundreds of Nazis as spies and informants after World War Two. Academics studying the documents say America used at least 1,000 ex-Nazis. Some had served at the highest levels of the Nazi Party, and were recruited to work as spies for the US in Europe. Former SS officer Otto von Bolschwing reportedly wrote policy papers on how to terrorise Jews, but was hired by the CIA to spy in Europe after World War Two. The agency is said to have relocated him and his family to New York in the 1950s as a reward for loyal service. Nazi collaborator Aleksandras Lileikis - linked to the massacres of tens of thousands of Jews in Lithuania - was recruited by the US as a spy in East Germany and later brought over to Boston. There is evidence the CIA even tried to intervene when Mr Lileikis became the subject of a war crimes investigation. Records indicate long-time FBI director J Edgar Hoover not only approved of the use of ex-Nazis as spies, he also dismissed the horrific acts they had been involved in during the war as Soviet propaganda. The revelations come one week after an Associated Press investigation found the US government had paid dozens of suspected Nazi war criminals millions of dollars in Social Security benefits.
Note: Explore powerful evidence that the CIA secretly smuggled Nazi war criminals into the US to teach them mind control techniques.
Dozens of suspected Nazi war criminals and SS guards collected millions of dollars in U.S. Social Security benefits after being forced out of the United States. Among those receiving benefits were armed SS troops who guarded the network of Nazi camps where millions of Jews perished; a rocket scientist who used slave laborers to advance his research in the Third Reich; and a Nazi collaborator who engineered the arrest and execution of thousands of Jews in Poland. The deals allowed the Justice Department's former Nazi-hunting unit, the Office of Special Investigations, to skirt lengthy deportation hearings. Social Security benefits became tools, U.S. diplomatic officials said, to secure agreements. The Social Security Administration expressed outrage in 1997 over the use of benefits. Austrian authorities were furious upon learning after the fact about a deal made with Martin Bartesch, a former SS guard at the Mauthausen concentration camp in Austria. "It was not upfront, it was not transparent, it was not a legitimate process," said James Hergen, an assistant legal adviser at the State Department from 1982 until 2007. "This was not the way America should behave." Neal Sher, a former OSI director, said the State Department cared more about diplomatic niceties than holding former members of Adolf Hitler's war machine accountable.
Note: Explore powerful evidence that the CIA secretly smuggled Nazi war criminals into the US to teach them mind control techniques.
Prime Minister John Key ... has denied that New Zealand’s spy agency GCSB engages in mass surveillance, mostly as a means of convincing the country to enact a new law vesting the agency with greater powers. Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. If you live in New Zealand, you are being watched. At the NSA I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called “XKEYSCORE.” It allows total, granular access to the database of communications collected in the course of mass surveillance. It is not limited to or even used largely for the purposes of cybersecurity, as has been claimed, but is instead used primarily for reading individuals’ private email, text messages, and internet traffic. I know this because it was my full-time job in Hawaii, where I worked every day in an NSA facility with a top secret clearance. The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks. It means they have the ability see every website you visit, every text message you send, every call you make, every ticket you purchase, every donation you make, and every book you order online. From “I’m headed to church” to “I hate my boss” to “She’s in the hospital,” the GCSB is there. Your words are intercepted, stored, and analyzed by algorithms long before they’re ever read by your intended recipient.
Note: New Zealand's prime minister has acknowledged that Snowden may be right, as reported in this article. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. [But] the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations. But a secret 2009 report issued by [Director of National Intelligence James Clapper's] office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies. One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” How could U.S. intelligence agencies solve that problem? The report recommends “a multi-pronged, systematic effort to gather open source and proprietary information through overt means, clandestine penetration (through physical and cyber means), and counterintelligence”.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
Les Goldsmith, the CEO of ESD America [marketers of the Crytophone 500], points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone. Interceptors look to a typical phone like an ordinary tower. Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device. “Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says. “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip. We even found one at South Point Casino in Las Vegas.” Who is running these interceptors and what are they doing with the calls? Goldsmith says we can’t be sure, but he has his suspicions. “Are some of them U.S. government interceptors?” [asks] Goldsmith. Interceptors vary widely in expense and sophistication – but in a nutshell, they are radio-equipped computers with software that can use arcane cellular network protocols and defeat the onboard encryption. For governments or other entities able to afford a price tag of “less than $100,000,” says Goldsmith, high-quality interceptors are quite realistic. Some interceptors are limited, only able to passively listen to either outgoing or incoming calls. But full-featured devices like the VME Dominator, available only to government agencies, can not only capture calls and texts, but even actively control the phone, sending out spoof texts, for example.
Note: Do you think the government might have put up fake cell towers to nab more data? For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. ICREACH [as the search engine is called] contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy. ICREACH has been accessible to more than 1,000 analysts at 23 U.S. government agencies that perform intelligence work, according to a 2010 memo. Information shared through ICREACH can be used to track people’s movements, map out their networks of associates, help predict future actions, and potentially reveal religious affiliations or political beliefs.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Nearly 13 years after the 9/11 terrorist attacks, the extent of Saudi involvement in the deaths of almost 3,000 people remains unclear — but according to members of Congress and the families of victims, information about this has been suppressed ever since the publication of a 2002 congressional investigation into the plot. Prior to the release of the final report of the Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001, the Bush administration classified a 28-page section in the name of national security. The 28 pages make up part four of the report, a section titled “Finding, Discussion and Narrative Regarding Certain Sensitive National Security Matters.” They are widely believed to implicate Saudi officials or describe support from Saudi intelligence for the hijackers, 15 of whom were Saudi citizens. Former Senator Bob Graham of Florida, who co-chaired the joint Senate-House investigation, dispensed with the equivocation and told VICE News that the redactions are a “cover up.” “I’ve said this since the first classification of the 28 pages,” he remarked. “It’s become more and more inexplicable as to why two administrations have denied the American people information that would help them better understand what happened on 9/11.” Graham said that the 28 pages describe the financing of the attacks. “Follow the money,” he said. “That will illuminate other significant aspects of 9/11.” The Saudi kingdom has always denied any complicity in the attacks.”
Note: Watch a video of Congressman Massie telling how shocked he was to read these 28 pages. Why aren't the major media reporting this important news? For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.
The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist. The “March 2013 Watchlisting Guidance,” a 166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire “categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted. The rulebook ... was developed behind closed doors by representatives of the nation’s intelligence, military, and law-enforcement establishment, including the Pentagon, CIA, NSA, and FBI. Emblazoned with the crests of 19 agencies, it offers the most complete and revealing look into the secret history of the government’s terror list policies to date.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
William Binney is one of the highest-level whistleblowers [to] emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance. On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations. “At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.” Binney ... described a future where surveillance is ubiquitous and government intrusion unlimited. “The ultimate goal of the NSA is total population control”, Binney said. He praised the revelations and bravery of former NSA contractor Edward Snowden. Unlike Snowden, Binney didn’t take any documents with him when he left the NSA. He now says that hard evidence of illegal spying would have been invaluable. The latest Snowden leaks, featured in the Washington Post, detail private conversations of average Americans with no connection to extremism. It shows that the NSA is not just pursuing terrorism, as it claims, but ordinary citizens going about their daily communications. “The NSA is mass-collecting on everyone”, Binney said, “and it’s said to be about terrorism but inside the US it has stopped zero attacks.”
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
His CIA career included assignments in Africa, Afghanistan and Iraq, but the most perilous posting for Jeffrey Scudder turned out to be a two-year stint in a sleepy office that looks after the agency’s historical files. It was there that Scudder discovered a stack of articles, hundreds of histories of long-dormant conflicts and operations that he concluded were still being stored in secret years after they should have been shared with the public. To get them released, Scudder submitted a request under the Freedom of Information Act — a step that any citizen can take, but one that is highly unusual for a CIA employee. Four years later, the CIA has released some of those articles and withheld others. It also has forced Scudder out. His request set in motion a harrowing sequence. He was confronted by supervisors and accused of mishandling classified information while assembling his FOIA request. His house was raided by the FBI and his family’s computers seized. Stripped of his job and his security clearance, Scudder said he agreed to retire last year after being told that if he refused, he risked losing much of his pension. “I submitted a FOIA and it basically destroyed my entire career,” Scudder said. Scudder’s case .. highlights the risks to workers who take on their powerful spy-agency employers. Scudder’s actions appear to have posed no perceptible risk to national security, but he found himself in the cross hairs of the CIA and FBI.
Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
A classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well. The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency. The documents underscore the remarkable breadth of potential “foreign intelligence” collection. An affidavit in support of the 2010 foreign-government certification said the NSA believes that foreigners who will be targeted for collection “possess, are expected to receive and/or are likely to communicate foreign intelligence information concerning these foreign powers.” That language could allow for surveillance of academics, journalists and human rights researchers. A Swiss academic who has information on the German government’s position in the run-up to an international trade negotiation, for instance, could be targeted if the government has determined there is a foreign-intelligence need for that information. If a U.S. college professor e-mails the Swiss professor’s e-mail address or phone number to a colleague, the American’s e-mail could be collected as well, under the program’s court-approved rules.
Note: For more on this, see concise summaries of deeply revealing intelligence agency news articles from reliable major media sources.
Robert David Steele, former Marine, CIA case officer, and US co-founder of the US Marine Corps intelligence activity, is ... widely recognised as the leader of the Open Source Intelligence (OSINT) paradigm. In 1992, despite opposition from the CIA, he obtained Marine Corps permission to organise a landmark international conference on open source intelligence – the paradigm of deriving information to support policy decisions not through secret activities, but from open public sources available to all. The conference was such a success it brought in over 620 attendees from the intelligence world. But the CIA ... ensured that Steele was prohibited from running a second conference, [prompting] him to resign from his position as second-ranking civilian in Marine Corps intelligence. Last month, Steele presented a startling paper at the Libtech conference in New York. Drawing on principles set out in his latest book, The Open-Source Everything Manifesto ... he told the audience that all the major preconditions for revolution – set out in his 1976 graduate thesis – were now present in the United States and Britain. Steele's book ... connects up the increasing corruption, inefficiency and unaccountability of the intelligence system and its political and financial masters with escalating inequalities and environmental crises. But he also offers a comprehensive vision of hope. "Sharing, not secrecy, is the means by which we ... can create a nonzero win-win Earth that works for one hundred percent of humanity."
Note: Watch an excellent video showing Mr. Steele believes that most terrorist attacks are false flag operations.
The Obama administration has been quietly advising local police not to disclose details about surveillance technology they are using to sweep up basic cellphone data from entire neighborhoods. Citing security reasons, the U.S. has intervened in routine state public records cases and criminal trials regarding use of the technology. This has resulted in police departments withholding materials or heavily censoring documents in rare instances when they disclose any [information] about the purchase and use of such powerful surveillance equipment. One well-known type of this surveillance equipment is known as a Stingray. The equipment tricks cellphones into identifying some of their owners' account information, like a unique subscriber number, and transmitting data to police as if it were a phone company's tower. That allows police to obtain cellphone information without having to ask for help from service providers ... and can locate a phone without the user even making a call or sending a text message. The Obama administration is asking agencies to withhold common information about the equipment, such as how the technology is used and how to turn it on. "These extreme secrecy efforts are in relation to very controversial, local government surveillance practices using highly invasive technology," said Nathan Freed Wessler, a staff attorney with the American Civil Liberties Union, which has fought for the release of these types of records. "People should have the facts about what the government is doing to them."
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
As President Obama ushers in the end of what he called America’s “long season of war,” the former tools of combat — M-16 rifles, grenade launchers, silencers and more — are ending up in local police departments, often with little public notice. During the Obama administration, according to Pentagon data, police departments have received tens of thousands of machine guns; nearly 200,000 ammunition magazines; thousands of pieces of camouflage and night-vision equipment; and hundreds of silencers, armored cars and aircraft. The equipment has been added to the armories of police departments that already look and act like military units. Police SWAT teams are now deployed tens of thousands of times each year, increasingly for routine jobs. Police departments ... are adding more firepower and military gear than ever. Some, especially in larger cities, have used federal grant money to buy armored cars and other tactical gear. And the free surplus program remains a favorite of many police chiefs who say they could otherwise not afford such equipment. The number of SWAT teams has skyrocketed since the 1980s, according to studies by Peter B. Kraska, an Eastern Kentucky University professor who has been researching the issue for decades. Recruiting videos feature clips of officers storming into homes with smoke grenades and firing automatic weapons. In Springdale, Ark., a police recruiting video is dominated by SWAT clips, including officers throwing a flash grenade into a house and creeping through a field in camouflage.
Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Government agencies are able to listen to phone conversations live and even track the location of citizens without warrants using secret cables connected directly to network equipment, admits Vodafone today. The company said that secret wires have been connected to its network and those belonging to competitors, giving government agencies the ability to tap in to phone and broadband traffic. In many countries this is mandatory for all telecoms companies, it said. Vodafone is today publishing its first Law Enforcement Disclosure Report which will describe exactly how the governments it deals with are eavesdropping on citizens. It is calling for an end to the use of “direct access” eavesdropping and transparency on the number of warrants issued giving access to private data. Gus Hosein, executive director of Privacy International, said: "Vodafone is taking a commendable step by taking this issue on at an international scale. And they are trying to identify the legal basis for governments' claimed powers. Governments around the world are unashamedly abusing privacy by demanding access to communications and data, and alarmingly, sometimes granting themselves direct access to the networks. Now that Vodafone has been more open, the entire industry has cover to take the necessary next step of pushing back. Pushing back against bad requests is a start, pushing back against bad laws is the next step. The usefulness of transparency reports hinges on governments abiding by the rule of law. We now know that these reports only provide a limited picture of what is going on.”
Note: For more on government surveillance of the world's population, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has never said what it was seeking when it invaded the computers of Petrobras, Brazil’s huge national oil company, but angry Brazilians have guesses: the company’s troves of data on Brazil’s offshore oil reserves, or perhaps its plans for allocating licenses for exploration to foreign companies. Nor has the N.S.A. said what it intended when it got deep into the computer systems of China Telecom, one of the largest providers of mobile phone and Internet services in Chinese cities. But documents released by Edward J. Snowden, the former agency contractor now in exile in Russia, leave little doubt that the main goal was to learn about Chinese military units, whose members cannot resist texting on commercial networks. The agency’s interest in Huawei, the giant Chinese maker of Internet switching equipment, and Pacnet, the Hong Kong-based operator of undersea fiber optic cables, is more obvious: Once inside those companies’ proprietary technology, the N.S.A. would have access to millions of daily conversations and emails that never touch American shores. The [US] government does not deny it routinely spies to advance American economic advantage, which is part of its broad definition of how it protects American national security. While the N.S.A. cannot spy on Airbus and give the results to Boeing, it is free to spy on European or Asian trade negotiators and use the results to help American trade officials — and, by extension, ... American industries.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Britain’s electronic surveillance agency, Government Communications Headquarters [GCHQ], has long presented its collaboration with the National Security Agency’s massive electronic spying efforts as proportionate, carefully monitored, and well within the bounds of privacy laws. But according to a top-secret document in the archive of material provided to The Intercept by NSA whistleblower Edward Snowden, GCHQ secretly coveted the NSA’s vast troves of private communications and sought “unsupervised access” to its data as recently as last year. The document, dated April 2013, reveals that GCHQ requested broad new authority to tap into data collected under a law that authorizes a variety of controversial NSA surveillance initiatives, including the PRISM program. PRISM is a system used by the NSA and the FBI to obtain the content of personal emails, chats, photos, videos, and other data processed by nine of the world’s largest internet companies, including Google, Yahoo!, Microsoft, Apple, Facebook, and Skype. The arrangement GCHQ proposed would also have provided the British agency with greater access to millions of international phone calls and emails that the NSA siphons directly from phone networks and the internet. The Snowden files do not indicate whether NSA granted GCHQ’s request, but they do show that the NSA was “supportive” of the idea, and that GCHQ was permitted extensive access to PRISM during the London Olympics in 2012. The request for the broad access was communicated at “leadership” level.
Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.
The federal government’s spy-satellite agency failed to alert authorities after some of its employees and contractors admitted during polygraph tests to crimes including child molestation and lying on security-clearance questionnaires, according to a watchdog. The intelligence community’s inspector general released two reports ... saying the National Reconnaissance Office did not refer some of the cases because of confusion about reporting expectations and requirements. According to one of the reports, an Air Force lieutenant colonel admitted during a 2010 lie-detector test to touching a child in a sexual way and downloading child pornography on his work computer. The NRO only reported that case to the Air Force division that oversees security clearances instead of the Justice Department or the Air Force’s special-investigations office, the inspector general said. The NRO is not legally required to report certain state crimes such as child molestation. Thirty individuals who took NRO lie-detector tests from 2009 through 2012 admitted to child abuse or using child pornography, according to the report. The NRO failed to report three of those cases. Sen. Chuck Grassley (R-Iowa), who requested the review after a McClatchy news investigation raised concerns about the matter in 2012, said the NRO showed a “complete lack of common sense in failing to require reporting of serious state crimes of this sort.”
Note: The NRO is the agency that was running a drill on the morning of 9/11 of an airplane crashing into one of its Washington, DC buildings, as reported in this USA Today article. It has also allegedly been involved in the UFO cover-up, as reported in this testimony.
US intelligence chiefs have confirmed that the National Security Agency has [performed] warrantless searches on Americans’ communications. The NSA's collection programs are ostensibly targeted at foreigners, but in August the Guardian revealed a secret rule change allowing NSA analysts to search for Americans' details within the databases. Now, in a letter to Senator Ron Wyden, an Oregon Democrat on the intelligence committee, the director of national intelligence, James Clapper, has confirmed the use of this legal authority to search for data related to “US persons”. The legal authority to perform the searches, revealed in top-secret NSA documents provided ... by Edward Snowden, was denounced by Wyden as a “backdoor search loophole.” Many of the NSA's most controversial programs collect information under the law affected by the so-called loophole. These include Prism, which allows the agency to collect data from Google, Apple, Facebook, Yahoo and other tech companies, and the agency's Upstream program – a huge network of internet cable taps. Confirmation that the NSA has searched for Americans’ communications in its phone call and email databases complicates President Barack Obama’s initial defenses of the broad surveillance in June. Wyden and Udall [said] “Today’s admission by the Director of National Intelligence is further proof that meaningful surveillance reform must include closing the back-door searches loophole and requiring the intelligence community to show probable cause before deliberately searching through ... the communications of individual Americans."
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Secret documents newly disclosed by the German news magazine Der Spiegel ... shed more light on how aggressively the National Security Agency and its British counterpart have targeted Germany for surveillance. A series of classified files from the archive provided to reporters by NSA whistleblower Edward Snowden ... reveal that the NSA appears to have included Merkel in a surveillance database alongside more than 100 other foreign leaders. The documents also confirm for the first time that, in March 2013, the NSA obtained a top-secret court order against Germany as part of U.S. government efforts to monitor communications related to the country. [A] document, dated 2009, indicates that Merkel was targeted in a broader NSA surveillance effort. She appears to have been placed in the NSA’s so-called “Target Knowledge Base“ (TKB), which Der Spiegel described as the central agency database of individual targets. An internal NSA description states that employees can use it to analyze “complete profiles“ of targeted people. But the NSA’s surveillance of Germany has extended far beyond its leader. A separate document from the NSA’s Special Source Operations unit ... shows that the Obama administration obtained a top-secret court order specifically permitting it to monitor communications related to Germany. Special Source Operations is the NSA department that manages what the agency describes as its “corporate partnerships” with major US companies, including AT&T, Verizon, Microsoft, and Google.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage. At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.
Note: Though technically it is illegal for the NSA to snoop on Americans without good cause, all they have to do is to share this technology with another country like the UK, and then ask the UK to do the snooping and send the results back to them, thereby circumventing the law. For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.
Malaysia's prime minister says the disappearance of Malaysia Airlines Flight 370 appears to be "deliberate." The latest evidence suggests the plane didn't experience a catastrophic incident over the South China Sea as was initially suspected. Prime Minister Najib Razak said the investigation has refocused onto the crew and passengers aboard the missing plane. He added that ... all possibilities are still being investigated. A Malaysian government official who is involved in the investigation said investigators have concluded that one of the pilots or someone else with flying experience hijacked the missing Malaysia Airlines jet. The official said that hijacking was no longer a theory. "It is conclusive." A Malaysian official, who also declined to be identified because he is not authorized to brief the media, said only a skilled aviator could navigate the plane the way it was flown after its last confirmed location over the South China Sea. The official said it had been established with a "more than 50 percent" degree of certainty that military radar had picked up the missing plane after it dropped off civilian radar. Malaysian officials have said radar data suggest it may have turned back and crossed back over the Malaysian peninsula westward, after setting out toward the Chinese capital. The flight altered its course more than once after it lost contact with ground control and that it made significant changes in altitude. Investigators say there's further evidence suggesting the jet did not crash immediately after being lost on radar; a transmitter on the plane tried for another four hours to ping satellites.
Note: Why is the military radar 50% certain? How could a transmitter on the plane ping for four hours, yet no one on the plane made a phone call? Remember that after Flight 93 was hijacked on 9/11, many phone calls were made by passengers on the plane. There is an abundance of high strangeness to this airplane's disappearance. For valuable speculation on the missing flight not well covered in the major media, click here. For some very unusual radar evidence of its disappearance, click here.
Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic. In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Former NSA contractor Edward Snowden accused Sen. Dianne Feinstein of hypocrisy ... for complaining about alleged CIA spying on U.S. senators while tolerating government spying on private citizens. "It's clear the CIA was trying to play 'keep away' with documents relevant to an investigation by their overseers in Congress, and that's a serious constitutional concern,” said Snowden in a statement to NBC News. “But it's equally if not more concerning that we're seeing another 'Merkel Effect,' where an elected official does not care at all that the rights of millions of ordinary citizens are violated by our spies, but suddenly it's a scandal when a politician finds out the same thing happens to them." Snowden was ... referring to German Chancellor Angela Merkel’s indignation at reports that the U.S. had listened in on her personal conversations, but her failure to condemn the NSA for mass surveillance of communications of German citizens. Both were revealed by the release of documents that Snowden took from NSA computers and distributed to journalists.
Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
The confirmation in December that former CIA Director Leon Panetta let classified information slip to "Zero Dark Thirty" screenwriter Mark Boal during a speech at the agency headquarters should result in a criminal espionage charge if there is any truth to Obama administration claims that it isn't enforcing the Espionage Act only against political opponents. I'm one of the people the Obama administration charged with criminal espionage, one of those whose lives were torn apart by being accused, essentially, of betraying [their] country. The president and the attorney general have used the Espionage Act against more people than all other administrations combined, but not against real traitors and spies. The law has been applied selectively, often against whistle-blowers and others who expose illegal, corrupt government actions. After I blew the whistle on the CIA's waterboarding torture program in 2007, I was the subject of a years-long FBI investigation. In 2012, the Justice Department charged me with "disclosing classified information to journalists, including the name of a covert CIA officer and information revealing the role of another CIA employee in classified activities." I had revealed no more than others who were never charged, about activities ... that were hardly secret. I am serving a 30-month sentence. The Espionage Act, the source of the most serious charges against me, was written and passed during World War I and... is so outdated that it refers only to "national defense information" rather than "classified information," because the classification system had not yet been invented.
Note: The author of this article, John Kiriakou, is a former CIA counter-terrorism officer and former senior investigator on the Senate Foreign Relations Committee. He is incarcerated in the Federal Correctional Institution in Loretto, Pa. You can read about his case at http://www.defendjohnk.com. For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
As staff for the Senate Intelligence Committee gathered information to conduct oversight of the CIA, the CIA was secretly monitoring them, according to reports from McClatchy [News] and the New York Times. The committee staff was reviewing documents in a secure room at CIA headquarters as part of its investigation into the CIA's now-defunct detention and interrogation program, but the agency was secretly monitoring their work, according to reports. Complaints about the spying have reportedly prompted the CIA inspector general -- the agency's internal watchdog -- to look into the agency's behavior. Sen. Mark Udall, D-Colo., seemed to reference the surveillance in a letter to President Obama ... in which he urged the president to support the fullest declassification of the committee's CIA report. "As you are aware, the C.I.A. has recently taken unprecedented action against the committee in relation to the internal C.I.A. review, and I find these actions to be incredibly troubling for the committee's oversight responsibilities and for our democracy," Udall wrote. "It is essential that the Committee be able to do its oversight work -- consistent with our constitutional principle of the separation of powers -- without the CIA posing impediments or obstacles as it is today." Sen. Martin Heinrich, D-N.M., another member of the intelligence committee, declared in a statement Wednesday, "The Senate Intelligence Committee oversees the CIA, not the other way around."
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
The list of those caught up in the global surveillance net cast by the National Security Agency and its overseas partners, from social media users to foreign heads of state, now includes another entry: US lawyers. A top-secret document, obtained by former NSA contractor Edward J. Snowden, shows that a US law firm was monitored while representing a foreign government in trade disputes with the United States. The disclosure offers a rare glimpse of a specific instance of Americans ensnared by the eavesdroppers and is of particular interest because US lawyers with clients overseas have expressed growing concern that their confidential communications could be compromised by such surveillance. The government of Indonesia had retained the law firm for help in trade talks, according to the February 2013 document. The NSA’s Australian counterpart, the Australian Signals Directorate, notified the agency that it was conducting surveillance of the talks, including communications between Indonesian officials and the US law firm, and offered to share information. The NSA is banned from targeting Americans, including businesses, law firms, and other organizations based in the United States, for surveillance without warrants, and intelligence officials have repeatedly said the NSA does not use spy services of its partners in the so-called Five Eyes alliance — Australia, Britain, Canada, and New Zealand — to skirt the law. The Australians told officials at an NSA liaison office in Canberra, that “information covered by attorney-client privilege may be included” in the intelligence gathering. Most attorney-client conversations do not get special protections under US law from NSA eavesdropping.
Note: For more on intense deception perpetrated by the intelligence community, see the deeply revealing reports from reliable major media sources available here.
An independent federal privacy watchdog has concluded that the National Security Agency’s program to collect bulk phone call records has provided only “minimal” benefits in counterterrorism efforts, is illegal and should be shut down. The findings are laid out in a 238-page report [that represents] the first major public statement by the Privacy and Civil Liberties Oversight Board, which Congress made an independent agency in 2007 and only recently became fully operational. The Obama administration has portrayed the bulk collection program as useful and lawful. But in its report, the board lays out what may be the most detailed critique of the government’s once-secret legal theory behind the program: that a law known as Section 215 of the Patriot Act, which allows the F.B.I. to obtain business records deemed “relevant” to an investigation, can be legitimately interpreted as authorizing the N.S.A. to collect all calling records in the country. The program “lacks a viable legal foundation under Section 215, implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value,” the report said. “As a result, the board recommends that the government end the program.” The report also sheds light on the history of the once-secret bulk collection program. It contains the first official acknowledgment that the Foreign Intelligence Surveillance Court produced no judicial opinion detailing its legal rationale for the program until last August, even though it had been issuing orders to phone companies for the records and to the N.S.A. for how it could handle them since May 2006.
Note: The PCLOB report is titled "Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court," and is available here. For more on government attacks to privacy, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents. The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets. The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity. On average, each day the NSA was able to extract: • More than 5 million missed-call alerts, for use in contact-chaining analysis (working out someone’s social network from who they contact and when) • Details of 1.6 million border crossings a day, from network roaming alerts • More than 110,000 names, from electronic business cards, which also included the ability to extract and save images. • Over 800,000 financial transactions, either through text-to-text payments or linking credit cards to phone users The agency was also able to extract geolocation data from more than 76,000 text messages a day, including from “requests by people for route info” and “setting up meetings”.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
A federal agent who exposed the Justice Departments flawed gun-trafficking investigation known as Operation Fast and Furious says the FBI played a key role in events leading to the 2010 murder near Nogales, Ariz., of U.S. Border Patrol Agent Brian Terry. John Dodson, a special agent with the Bureau of Alcohol, Tobacco, Firearms and Explosives, contends that the bandits who killed Terry were working for FBI operatives and were sent to the border to do a drug rip-off using intelligence from the federal Drug Enforcement Administration. I dont think the (FBI) assets were part of the rip-off crew, Dodson said. I think they were directing the rip crew. Dodsons comments to The Arizona Republic amplify assertions he made in his recently released book, The Unarmed Truth, about his role as a whistle-blower in the Fast and Furious debacle. In his book, Dodson uses cautious language to characterize his account of circumstances surrounding Terrys death, saying the information is based on firsthand knowledge, personal opinion and press reports. He asserts that the DEA had information about, and may have orchestrated, a large drug shipment through Peck Canyon that December night. He alleges that DEA agents shared that intelligence with FBI counterparts, who advised criminal informants from another cartel that the load would be theirs for the taking. Stealing such a shipment would increase the clout of the FBI informants in the cartel organization they had penetrated, Dodson wrote, and thus lead to better intel for them in the future.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products. Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year. The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Suspected Boston Marathon bomber Tamerlan Tsarnaev heard voices inside his head and had an alter-ego, a report published in The Boston Globe claimed yesterday. Donald Larking, 67, who attended the same Boston mosque as the suspected bomber, said Tsarnaev believed the voices were part of a “majestic mind control”, which was “a way of breaking down a person and creating an alternative personality with which they must coexist." Larking also told the Globe that Tsarnaev was “torn” between himself and an alter-ego. “You can give a signal, a phrase or a gesture, and bring out the alternate personality and make them do things,” he said; “Tamerlan thought someone might have done that to him.” According to the report, the voices “came to [Tsarnaev] at unexpected times, an internal rambling that he alone could hear. Alarmed, he confided to his mother that the voice 'felt like two people inside of me. “As he got older, the voice became more authoritative, its bidding more insistent. Tamerlan confided in a close friend that the voice had begun to issue orders and to require him to perform certain acts, though he never told his friend specifically what those acts were.” Tamerlan, 26, and his younger brother Dzhokhar, 20, are alleged to have planted the two pressure cooker bombs that killed three and injured more than 260 at the Boston Marathon in April. While Tamerlan was later killed in a shootout with police, his brother was captured and now potentially faces the death penalty under charges of terrorism.
Note: Many have long suspected that most mass murderers are mind control victims subject to top secret mind control programs, like those revealed in declassified government documents on this webpage. For the full investigative report in the Boston Globe, click here. For lots more verifiable information on these mind control programs, click here.
A 36-year NSA veteran, William Binney resigned from the agency and became a whistleblower after discovering that elements of a data-monitoring program he had helped develop - nicknamed ThinThread - were being used to spy on Americans. So 2005, December, The New York Times article comes out. ... How important was it? "It touched on that real issues," [said Binney]. "The warrantless wiretapping was not really a major component of it, but it touched on the data mining, which is really, really the big issue, data mining of the metadata and content. That was really the big issue, because that's how you can monitor the entire population simultaneously, whereas the warrantless wiretaps were isolated cases. You could pick an isolated number of them and do them, whereas in the mining process, you would do the entire population." The administration [used] this article to start an aggressive whistleblowing hunt. "[On July 22, 2005] the FBI was in my house ... pointing a gun at me when I was coming out of the shower. The raid took about seven hours. At the time we didn't know that Tom Drake had gone to The Baltimore Sun," [said Binney]. "Material [Tom Drake was indicted for] was clearly marked unclassified, and all they did was draw a line through it and classified that material, and then they charged him with having classified material. It's like framing him. The judge in the court ... knew they were framing him," [said Biney].
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Pulitzer Prize-winning journalist Seymour Hersh accused the Obama administration ... of having “cherry-picked intelligence” regarding the Aug. 21 chemical attack in Syria that served as evidence for an argument in favor of striking President Bashar Assad's government. Though President Barack Obama eventually decided not to strike Syria, the administration made a public case for war by saying that Assad’s regime was responsible for a poison gas attack in the outskirts of Damascus. The U.N. later concluded the attack had involved the nerve agent sarin. In his piece -- titled "Whose Sarin?" -- Hersh reported that al-Nusra, a jihadi group fighting in Syria’s long-running civil war, had also "mastered the mechanics of creating sarin and was capable of manufacturing it in quantity.” Therefore, he wrote, “Obama did not tell the whole story” when stating with certainty that Assad had to be responsible, crossing a so-called "red line" that would trigger U.S. retaliation. Hersh is a freelancer, but he's best known these days for his work in The New Yorker, where he helped break the Abu Ghraib scandal in 2004. In an email, Hersh wrote that “there was little interest” for the story at The New Yorker. Hersh then took the story to The Washington Post. Hersh wrote that he was told by email that Executive Editor Marty Baron decided “that the sourcing in the article did not meet the Post's standards.” Hersh [then] sent the Syria story to editors at the London Review of Books, LRB Senior Editor Christian Lorentzen [said]. Lorentzen said the piece was not only edited, but thoroughly fact checked by a former New Yorker fact checker who had worked with Hersh in the past.
Note: For more on government lies to provide pretexts for war, see the deeply revealing reports from reliable major media sources available here.
The federal government’s main terrorist watch list has grown to at least 700,000 people, with little scrutiny over how the determinations are made or the impact on those marked with the terrorist label. The government refuses to confirm or deny whether someone is on the list, officially called the Terrorist Screening Database, or divulge the criteria used to make the decisions. Even less is known about the secondary watch lists that are derived from the main one, including the no-fly list (used to prevent people from boarding aircraft), the selectee and expanded selectee lists (used to flag travelers for extra screening at airport checkpoints), the TECS database (used to vet people entering or leaving the United States), the Consular Lookout and Support System (used to screen visa applications) and the known or suspected terrorists list (used by law enforcement in routine police encounters). For people who have landed on these lists, the terrorist designation has been difficult to challenge legally. The Terrorist Screening Center, which administers the main terrorist watch list, declined to discuss its procedures, or to release current data about the number of people on various watch lists, and how many of them are American citizens.
Note: For more on government threats to civil liberties, see the deeply revealing reports from reliable major media sources available here.
British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said. One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm. U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories. "The worst is yet to come," said one former U.S. official who follows the investigation closely. Snowden ... is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents. [It is] estimated that the total number of Snowden documents made public so far is over 500. Glenn Greenwald, who met with Snowden in Hong Kong and was among the first to report on the leaked documents for the Guardian newspaper, said the former NSA contractor had "taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published."
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
In the early years after Sept. 11, 2001, the CIA turned some Guantanamo Bay prisoners into double agents, sending them home to help the United States kill terrorists, current and former U.S. officials said. The CIA promised the prisoners freedom, safety for their families and millions of dollars from the agencys secret accounts. It was a gamble. Officials knew there was a chance that some prisoners might quickly spurn their deal and kill Americans. Nearly a dozen current and former U.S. officials described aspects of the program to the Associated Press. Dozens of prisoners were evaluated, but only a handful, from a variety of countries, were turned into spies who signed agreements to work for the CIA. Prisoners agreed to cooperate for a variety of reasons, officials said. Some received assurances that the United States would resettle their families. Another agreed to cooperate after the agency insinuated that it would harm his children, a former official said, a threat similar to those interrogators made to self-proclaimed Sept. 11 mastermind Khalid Sheik Mohammed. All were promised money. Exactly how much each received remains unclear. But altogether, the government paid millions for their services, officials said. The money came from a secret CIA account, code-named Pledge, that is used to pay informants, officials said. Officials said the program ended in 2006 as the flow of detainees to Guantanamo Bay slowed to a trickle. The last prisoner arrived there in 2008.
Note: There is no doubt that the CIA used mind control techniques to control and likely program some of the prisoners. To read verifiable documentation on the U.S. governments secret mind control programs, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
The German, French, Spanish and Swedish intelligence services have all developed methods of mass surveillance of internet and phone traffic over the past five years in close partnership with Britain's GCHQ eavesdropping agency. The bulk monitoring is carried out through direct taps into fibre optic cables and the development of covert relationships with telecommunications companies. A loose but growing eavesdropping alliance has allowed intelligence agencies from one country to cultivate ties with corporations from another to facilitate the trawling of the web, according to GCHQ documents leaked by the former US intelligence contractor Edward Snowden. The files also make clear that GCHQ played a leading role in advising its European counterparts how to work around national laws intended to restrict the surveillance power of intelligence agencies. US intelligence officials have insisted the mass monitoring was carried out by the security agencies in the countries involved and shared with the US. The Guardian revealed the existence of GCHQ's Tempora programme, in which the electronic intelligence agency tapped directly into the transatlantic fibre optic cables to carry out bulk surveillance. GCHQ officials expressed admiration for the technical capabilities of German intelligence to do the same thing, [saying] the Federal Intelligence Service (BND) had "huge technological potential and good access to the heart of the internet – they are already seeing some bearers running at 40Gbps and 100Gbps". Bearers is the GCHQ term for the fibre optic cables, and gigabits per second (Gbps) measures the speed at which data runs through them.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
It has long been known that the Warren Commission ... was flawed in ways that led to generations of conspiracy theories about what happened on Nov. 22, 1963. A [new] book from former New York Times reporter Philip Shenon digs into exactly what the commission got wrong, both by intentional concealment, or, in Shenon's view, extensive attempts by both the CIA and FBI to withhold just how much they knew about Kennedy assassin Lee Harvey Oswald. "Much of the truth about the Kennedy assassination has still not been told, [and] much of the evidence about the president's murder was covered up or destroyed - shredded, incinerated, or erased - before it could reach the commission," Shenon writes in the prologue to A Cruel and Shocking Act: The Secret History of the Kennedy Assassination, which draws its title from the first sentence of the commission's report. Shenon tells the story of how Navy pathologist James Humes threw his blood-stained notes from Kennedy's autopsy into the fire after he transcribed a fresh copy of the report. He said that he wanted to keep the documents from falling into the hands of "ghouls," and gave a similar rationale for ordering that the sheets that covered Kennedy's head wounds in Dallas be laundered during the autopsy. The commission's investigators never even saw the photos and X-rays from the autopsy. Shenon also points to the CIA as having taken great steps to cover up their knowledge of Oswald's visit to Mexico City before the assassination.
Note: As the 50th anniversary of the Kennedy assassination approaches see our powerful JFK assassination information center and the best videos and news articles on the topic. For more on political assassinations, see the deeply revealing reports from reliable major media sources available here.
What are we to make of Edward Snowden? I know what I once made of him. He was no real whistleblower, I wrote, but “ridiculously cinematic” and “narcissistic” as well. As time has proved, my judgments were just plain wrong. Whatever Snowden is, he is curiously modest and has bent over backward to ensure that the information he has divulged has done as little damage as possible. As a “traitor,” he lacks the requisite intent and menace. But traitor is what Snowden has been roundly called. Harry Reid: “I think Snowden is a traitor.” John Boehner: “He’s a traitor.” Rep. Peter King: “This guy is a traitor; he’s a defector.” And Dick Cheney not only denounced Snowden as a “traitor” but also suggested that he might have shared information with the Chinese. This innuendo, as with Saddam Hussein’s weapons of mass destruction, is more proof of Cheney’s unerring determination to be cosmically wrong. The early denunciations of Snowden now seem both over the top and beside the point. If he is a traitor, then which side did he betray and to whom does he now owe allegiance? Snowden seems to have sold out to no one. In fact, a knowledgeable source says that Snowden has not even sold his life story and has rebuffed offers of cash for interviews. Maybe his most un-American act is passing up a chance at easy money. Someone ought to look into this. Snowden’s residency in Russia has been forced upon him — he had nowhere else to go. Snowden insists that neither the Russians nor, before them, the Chinese have gotten their grubby hands on his top-secret material.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Federal grants of $7 million, initially intended to help thwart terror attacks at the port in Oakland, Calif., are instead going to a police initiative that will collect and analyze reams of surveillance data. The new system ... is the latest example of how cities are compiling and processing large amounts of information, known as big data, for routine law enforcement. And the system underscores how technology has enabled the tracking of people in many aspects of life. Like the Oakland effort, other pushes to use new surveillance tools in law enforcement are supported with federal dollars. The New York Police Department, aided by federal financing, has a big data system that links 3,000 surveillance cameras with license plate readers, radiation sensors, criminal databases and terror suspect lists. Police in Massachusetts have used federal money to buy automated license plate scanners. And police in Texas have bought a drone with homeland security money. [Critics] of the Oakland initiative, formally known as the Domain Awareness Center, [say] the program, which will create a central repository of surveillance information, will also gather data about the everyday movements and habits of law-abiding residents. Oakland has a contract with the Science Applications International Corporation, or SAIC, to build its system. That company has earned the bulk of its $12 billion in annual revenue from military contracts.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
[Seymour] Hersh, the investigative journalist who has been the nemesis of US presidents since the 1960s and who was once described by the Republican party as "the closest thing American journalism has to a terrorist", ... is angry about the timidity of journalists in America, their failure to challenge the White House and be an unpopular messenger of truth. Don't even get him started on the ... death of Osama bin Laden. "Nothing's been done about that story, it's one big lie, not one word of it is true," he says of the dramatic US Navy Seals raid in 2011. Hersh is writing a book about national security and has devoted a chapter to the bin Laden killing. He says a recent report put out by an "independent" Pakistani commission about life in the Abottabad compound in which Bin Laden was holed up would not stand up to scrutiny. "The Pakistanis put out a report, don't get me going on it. Let's put it this way, it was done with considerable American input. It's a bullshit report," he says hinting of revelations to come in his book. The Obama administration lies systematically, he claims, yet none of the leviathans of American media, the TV networks or big print titles, challenge him. He is certain that NSA whistleblower Edward Snowden "changed the whole nature of the debate" about surveillance. "But I don't know if it's going to mean anything in the long [run] because the polls I see in America – the president can still say to voters 'al-Qaida, al-Qaida' and the public will vote two to one for this kind of surveillance, which is so idiotic," he says.
Note: For a powerful analysis by scholar David Ray Griffin of the years-long Osama bin Laden psyop, arguing that bin Laden probably died in December 2001, see his book Osama Bin Laden: Dead or Alive?. For more on media cover-ups of important realities, see the deeply revealing reports from reliable major media sources available here.
A Department of Justice memo [distributed by the FBI] instructs local police, under a program named "Communities Against Terrorism," to consider anyone who harbors "conspiracy theories" about 9/11 to be a potential terrorist. The memo thus adds 9/11-official-story skeptics to a growing list of targets described by federal law enforcement [as] security threats, such as those who express "libertarian philosophies," "Second Amendment-oriented views," interest in "self-sufficiency," "fears of Big Brother or big government," and "Declarations of Constitutional rights and civil liberties." A newly released national poll shows that 48 percent of Americans either have some doubts about the official account of 9/11, or do not believe it at all. The FBI memo entitled "Potential Indicators of Terrorist Activities Related to Sleepers" says that people who should be 'considered suspicious' [for] possible involvement in "terrorist activity" include those who hold the "attitude" described as "Conspiracy theories about Westerners." The memo continues: "e.g. (sic) the CIA arranged for 9/11 to legitimize the invasion of foreign lands." "Sleepers" refers to "sleeper cells," in FBI jargon, which are terrorists awaiting orders to be activated into terrorist activity. According to the polling firm YouGov, 38% of Americans have some doubts about the official account of 9/11, 10% do not believe it at all, and 12% are unsure about it. Among well-known doubters of the official 9/11 account are many military officers, law enforcement personnel, firefighters, and pilots.
Note: We don't normally use Digital Journal as a news source, but this article is too important to not include, and no major media source is covering the story. For evidence that search engines are actively blocking 9/11 truth videos, click here. For more on the questions raised about the official explanation of the 9/11 events by highly respected professors and former government and military officials, click here and here.
Twelve years after the 9/11 attacks that included three hijacker pilots trained in Venice [FL], the terrorists' alleged interaction with a high-echelon Saudi family that lived in Sarasota remains shrouded in secrecy. But Sunshine law and Freedom of Information Act requests filed by an independent South Florida news organization have chipped away at the FBI's position that information related to the family remain secret. Broward Bulldog editor Dan Christensen and former U.S. Sen. Bob Graham say the documents could shed light on how the locally trained terrorists were managed and supported. Graham, former Florida governor and a co-chair of [the] Congressional body that investigated the attacks, believes the FBI has covered up Saudi support of the terrorists. The former senator wants more disclosure about what happened in Sarasota because he feels it may add to a bigger, largely censored subject: Who financed and supported the 9/11 terror attacks? "The FBI is aggressively resisting the release of any additional documents," he said. "The question is, why are they doing this? What interest does the FBI have in denying the existence of its own documents? Beyond that, they have thrown a blanket of national security over virtually everything, and why are they doing that for an event that occurred, soon to be, 12 years ago?" At the time of the 9/11 attacks, President George W. Bush was visiting a school in Sarasota. Then came the revelation that three of the hijackers learned to fly at Venice Airport.
Note: For lots more reliable information suggesting a major cover-up around the events of 9/11, click here and here.
US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves. Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software. "Backdoors are fundamentally in conflict with good security," said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. "Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise."
Note: For an excellent article in the New York Times on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.
U.S. spy agencies have built an intelligence-gathering colossus since the attacks of Sept. 11, 2001, but remain unable to provide critical information to the president on a range of national security threats, according to the government’s top-secret budget. The $52.6 billion “black budget” for fiscal 2013, obtained by The Washington Post from former intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny. Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses the money or how it performs against the goals set by the president and Congress. The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the U.S. intelligence community, which has 107,035 employees. Among the notable revelations in the budget summary: Spending by the CIA has surged past that of every other spy agency, with $14.7 billion in requested funding for 2013. The figure vastly exceeds outside estimates and is nearly 50 percent above that of the National Security Agency, which conducts eavesdropping operations and has long been considered the behemoth of the community. The CIA and the NSA have begun aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as “offensive cyber operations.”
Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.
The New York Police Department has secretly labeled entire mosques as terrorism organizations, a designation that allows police to use informants to record sermons and spy on imams, often without specific evidence of criminal wrongdoing. Designating an entire mosque as a terrorism enterprise means that anyone who attends prayer services there is a potential subject of an investigation and fair game for surveillance. Since the 9/11 attacks, the NYPD has opened at least a dozen "terrorism enterprise investigations" into mosques, according to interviews and confidential police documents. Many TEIs stretch for years, allowing surveillance to continue even though the NYPD has never criminally charged a mosque or Islamic organization with operating as a terrorism enterprise. The documents show in detail how, in its hunt for terrorists, the NYPD investigated countless innocent New York Muslims and put information about them in secret police files. As a tactic, opening an enterprise investigation on a mosque is so potentially invasive that while the NYPD conducted at least a dozen, the FBI never did one, according to interviews with federal law enforcement officials. The revelations about the NYPD's massive spying operations are in documents recently obtained by The Associated Press and part of a new book, Enemies Within: Inside the NYPD's Secret Spying Unit... The book ... is based on hundreds of previously unpublished police files and interviews with current and former NYPD, CIA and FBI officials.
Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.
Newly declassified documents obtained [by] Judicial Watch, are raising questions over the U.S. government's handling of Anwar al-Awlaki, and whether it [recruited] the radical American cleric as an intelligence source in 2002. Director Robert Mueller did not dismiss the possibility. "I am not personally familiar with any effort to recruit Anwar al-Awlaki as an asset -- that does not mean to say there was not an effort at some level of the Bureau (FBI) or another agency to do so," Mueller said. Fox's ongoing reporting ... shows that in 2002 he was released from custody at JFK international airport -- despite an active warrant for his arrest -- with the okay of FBI Agent Wade Ammerman. Within days of his re-entry, al-Awlaki showed up in Ammerman's counter-terrorism investigation in Virginia into Ali al-Timimi, who is now serving a life sentence on non-terrorism charges. None of the information about al-Awlaki's release from federal custody at JFK, a sudden decision by the Justice Department in October 2002 to rescind an arrest warrant for the cleric, nor the cleric's connection to Ammerman was provided to the defense during Timimi’s 2005 trial. Documents ... show the FBI Director was more deeply involved in the post-9/11 handling of al-Awlaki than previously known. One memo from Mueller to then-Attorney General John Ashcroft on Oct. 3, 2002 -- seven days before the cleric re-entered the U.S. and was detained at JFK -- is marked "Secret" and titled "Anwar Aulaqi: IT-UBL/AL-QAEDA." "Why would al-Awlaki get the attention of the FBI Director? Why would a warrant for his arrest be pulled when he's trying to reenter the country?" asked Judicial Watch President Tom Fitton.
Note: Al-Awlaki, who was born in New Mexico and was a US citizen, died in a U.S. drone attack in Yemen nearly two years ago, the first American targeted for death by the CIA, by its own admission. With the confirmation that he had been an intelligence asset for the US government as early as 2002, his assassination takes on new significance. For more on the murky background of Al-Awlaki, click here and here.
Five decades after President John F. Kennedy was fatally shot and long after official inquiries ended, thousands of pages of investigative documents remain withheld from public view. The contents of these files are partially known — and intriguing — and conspiracy buffs are not the only ones seeking to open them for a closer look. Some serious researchers believe the off-limits files could shed valuable new light on nagging mysteries of the assassination — including what U.S. intelligence agencies knew about accused assassin Lee Harvey Oswald before Nov. 22, 1963. It turns out that several hundred of the still-classified pages concern a deceased CIA agent, George Joannides, whose activities just before the assassination and, fascinatingly, during a government investigation years later, have tantalized researchers for years. "This is not about conspiracy, this is about transparency," said Jefferson Morley, a former Washington Post reporter and author embroiled in a decade-long lawsuit against the CIA, seeking release of the closed documents. "I think the CIA should obey the law. I don't think most people think that's a crazy idea." But so far, the Joannides files and thousands more pages primarily from the CIA remain off-limits at a National Archives center in College Park, Md. Anthony Summers, a British author whose sequel to his JFK book Not In Your Lifetime will be released this year, [said] "By withholding Joannides material, the agency continues to encourage the public to believe they're covering up something more sinister."
Note: For more on the strange secrecy around Joannides and his checkered past, see the New York Times article summarized here. For more on political assassinations, see the deeply revealing reports from reliable major media sources available here.
A Texas-based encrypted email service recently revealed to be used by Edward Snowden - Lavabit - announced yesterday it was shutting itself down in order to avoid complying with what it perceives as unjust secret US court orders to provide government access to its users' content. "After significant soul searching, I have decided to suspend operations," the company's founder, Ladar Levinson, wrote in a statement to users posted on the front page of its website. He said the US directive forced on his company "a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit." He chose the latter. CNET's Declan McCullagh ... speculates that Lavabit was served "with [a] federal court order to intercept users' passwords" to allow ongoing monitoring of emails; specifically: "the order can also be to install FedGov-created malware." After challenging the order in district court and losing - all in a secret court proceeding, naturally - Lavabit shut itself down to avoid compliance while it appeals to the Fourth Circuit. What is particularly creepy about the Lavabit self-shutdown is that the company is gagged by law even from discussing the legal challenges it has mounted and the court proceeding it has engaged. In other words, the American owner of the company believes his Constitutional rights and those of his customers are being violated by the US Government, but he is not allowed to talk about it. Lavabit has been told that they would face serious criminal sanctions if they publicly discuss what is being done to their company.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The CIA has been subjecting operatives to monthly polygraph tests in an attempt to suppress details of a reported US arms smuggling operation in Benghazi that was ongoing when its ambassador was killed by a mob in the city last year, according to reports. Up to 35 CIA operatives were working in the city during the attack last September on the US consulate that resulted in the death of Ambassador Chris Stevens and three other Americans, according to CNN. The television network said that a CIA team was working in an annex near the consulate on a project to supply missiles from Libyan armouries to Syrian rebels. Sources said that more Americans were hurt in the assault ... than had been previously reported. CIA chiefs were actively working to ensure the real nature of its operations in the city did not get out. So only the losses suffered by the State Department in the city had been reported to Congress. Frank Wolf, a US congressman who represents the district that contains CIA headquarters in Langley, Virginia, is one of 150 members of Congress for a new investigation into the failures in Benghazi. "I think it is a form of a cover-up, and I think it's an attempt to push it under the rug," he said. "We should have the people who were on the scene come in, testify under oath, do it publicly, and lay it out. And there really isn't any national security issue involved with regards to that."
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Computers and networks inherently produce data, and our constant interactions with them allow corporations to collect an enormous amount of intensely personal data about us as we go about our daily lives. Sometimes we produce this data inadvertently simply by using our phones, credit cards, computers and other devices. Sometimes we give corporations this data directly on Google, Facebook, [or] Apple’s iCloud ... in exchange for whatever free or cheap service we receive from the Internet in return. The NSA is also in the business of spying on everyone, and it has realized it’s far easier to collect all the data from these corporations rather than from us directly. The result is a corporate-government surveillance partnership, one that allows both the government and corporations to get away with things they couldn’t otherwise. There are two types of laws in the U.S., each designed to constrain a different type of power: constitutional law, which places limitations on government, and regulatory law, which constrains corporations. Historically, these two areas have largely remained separate, but today each group has learned how to use the other’s laws to bypass their own restrictions. The government uses corporations to get around its limits, and corporations use the government to get around their limits. This partnership manifests itself in various ways. The government uses corporations to circumvent its prohibitions against eavesdropping domestically on its citizens. Corporations rely on the government to ensure that they have unfettered use of the data they collect.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Pop quiz: Name a state residential school where children were enrolled in medical experiments over an almost 20-year period, in which they were unknowingly fed a steady diet of radioactive isotopes, subjected to regular blood draws, and placed in solitary confinement if they refused to cooperate. Answer: the Walter E. Fernald State School in Waltham [Mass.} during the mid 20th century. Unfortunately, as Allen Hornblum, Judith Newman, and Gregory Dober painfully describe in their chilling new book, Against Their Will: The Secret History of Medical Experimentation on Children in Cold War America, Fernald was not the only institution in the country, or even in the state, where children were conscripted into sometimes deadly medical experiments. These were conducted by ambitious physicians and scientists whose belief in what they were trying to accomplish often blinded them to the potentially horrific consequences of their actions. “Against Their Will’’ opens with an overview of the eugenics movement in the United States, which found sympathizers among many luminaries of American medicine in the 19th and early 20th centuries. With its disdain for the disabled, who were considered genetically inferior, the movement paved the way for use of “defective’’ children in research. The book then provides multiple examples of medical experiments perpetrated on developmentally delayed and physically disabled children at multiple institutions across the country over the course of decades, often reading like case studies straight out of the 1947 Nazi doctors’ trial.
Note: For a long list of verifiable incidents where unknowing citizens were used as guinea pigs on a massive scale, click here.
The top U.S. special operations commander, Adm. William McRaven, ordered military files about the Navy SEAL raid on Osama bin Laden's hideout to be purged from Defense Department computers and sent to the CIA, where they could be more easily shielded from ever being made public. The secret move, described briefly in a draft report by the Pentagon's inspector general, set off no alarms within the Obama administration even though it appears to have sidestepped federal rules and perhaps also the U.S. Freedom of Information Act. The CIA, noting that the bin Laden mission was overseen by then-CIA Director Leon Panetta before he became defense secretary, said that the SEALs were effectively assigned to work temporarily for the CIA, which has presidential authority to conduct covert operations. The records transfer was part of an effort by McRaven to protect the names of the personnel involved in the raid, according to the inspector general's draft report. But secretly moving the records allowed the Pentagon to tell The Associated Press that it couldn't find any documents inside the Defense Department that AP had requested more than two years ago, and would represent a new strategy for the U.S. government to shield even its most sensitive activities from public scrutiny. "Welcome to the shell game in place of open government," said Thomas Blanton, director of the National Security Archive, a private research institute at George Washington University. "Guess which shell the records are under. If you guess the right shell, we might show them to you. It's ridiculous."
Note: For a powerful analysis of the strong evidence that Osama bin Laden most likely died in Afghanistan in December 2001, long before he was "killed" by the SEALs raid in Pakistan, read David Ray Griffin's Osama bin Laden: Dead or Alive? For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans. The rulings, some nearly 100 pages long, reveal that the court has taken on a much more expansive role by regularly assessing broad constitutional questions and establishing important judicial precedents, with almost no public scrutiny. The 11-member Foreign Intelligence Surveillance Court, known as the FISA court, was once mostly focused on approving case-by-case wiretapping orders. But since major changes in legislation and greater judicial oversight of intelligence operations were instituted six years ago, it has quietly become almost a parallel Supreme Court, serving as the ultimate arbiter on surveillance issues and delivering opinions that will most likely shape intelligence practices for years to come. In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures. Unlike the Supreme Court, the FISA court hears from only one side in the case — the government — and its findings are almost never made public.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Leslie James Pickering noticed something odd in his mail last September: a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home. “Show all mail to supv” — supervisor — “for copying prior to going out on the street,” read the card. It included Mr. Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green. “It was a bit of a shock to see it,” said Mr. Pickering, who with his wife owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service. Mr. Pickering was targeted by a longtime surveillance system called mail covers, a forerunner of a vastly more expansive effort, the Mail Isolation Control and Tracking program, in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year. It is not known how long the government saves the images. The Mail Isolation Control and Tracking program was created after the anthrax attacks in late 2001. It enables the Postal Service to retrace the path of mail at the request of law enforcement. No one disputes that it is sweeping.
Note: The exposure by whistleblower Edward Snowden of the NSA's massive domestic and global spying operations seems to have triggered a series of other revelations about surveillance of the US population, like this report on the US Postal Service's photographing all mail. Hardly a week goes by without another major revelation, such as a new digital photo-ID database utilized by the FBI and police forces, and the development by US police of a national DNA database on all "potential suspects". Since very few US citizens are terrorists, what is the real purpose behind this total surveillance?
The Army is blocking all access to The Guardian newspaper's reports about the National Security Agency's sweeping collection of data about Americans' email and phone communications, an Army spokesman said Thursday. The Monterey (Calif.) Herald reported that employees at the Presidio of Monterey, an Army public affairs base about 100 miles south of San Francisco, were unable to gain access to The Guardian's articles on former NSA contractor Edward Snowden and his professed leaks of classified information about the intelligence programs. Late Thursday, an Army spokesman told The Herald by email that the newspaper's NSA reports were, in fact, being blocked across the entire Army. He wrote that it's routine for the Defense Department to take "network hygiene" action to prevent disclosure of classified information, The Herald reported. "We make every effort to balance the need to preserve information access with operational security," the newspaper quoted the spokesman as saying. "However there are strict policies and directives in place regarding protecting and handling classified information."
Note: To read the full story in the Monterey Herald, click here. For the Guardian's coverage of this, click here. Does the military have the right to censor its members' access to information?
A cadre of six government and non-government experts who served the National Transportation Safety Board when that independent federal agency investigated the explosion of a Boeing 747 off the coast of Long Island in July 1996 ... are the protagonists of a new documentary, "TWA Flight 800". After four years of investigation, the NTSB claimed the cause of Flight 800's explosion was a mechanical defect, but the new documentary, written and directed by journalist Kristina Borjesson, claims the FBI, NTSB and other government agencies may have covered up that the plane was brought down by a missile strike. Participants in the film have called on the NTSB to reopen the case based on altered physical evidence, suppressed data, and unexamined testimony from hundreds of eyewitnesses. [The] book Attention All Passengers: The Airlines’ Dangerous Descent—and How to Reclaim Our Skies ... published last year ... thanked “the brave men and women who are Federal Aviation Administration, Transportation Security Administration, and airline whistleblowers.” These whistleblowers confirmed such problems as defective airline maintenance outsourcing, FAA oversight failures, TSA waste, and many other important findings. After watching the documentary, I believe there are enough smoking guns to warrant an unbiased reexamination. Last week one major news site was in near hysterics about the documentary, employing the term “conspiracy” ten times. Kristina Borjesson ... wasn’t surprised, noting that reexamining hot topics “discredits previous reporting.”
Note: Kristina Borjesson is a long-time supporter of WantToKnow.info who has written a great piece on Flight 800, which we have posted at this link. She's also the editor of what may be the best book ever on media corruption and manipulation, Into the Buzzsaw. You can find an excellent two-page summary of the book at this link. For the engaging trailer to this film, click here.
Russ Tice, a former intelligence analyst and Bush-era NSA whistleblower, claimed Wednesday that the intelligence community has ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats. “They went after – and I know this because I had my hands literally on the paperwork for these sort of things – they went after high-ranking military officers. They went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees," [said] Tice. “But they went after other ones, too. They went after lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House.” Then Tice dropped the bombshell about Obama. "In summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois ... that’s the president of the United States now.” FBI whistleblower Sibel Edmonds and Tice agreed that such wide-ranging surveillance of officials could provide the intelligence agencies with unthinkable power to blackmail their opponents. “I was worried that the intelligence community now has sway over what is going on,” Tice said. Tice first blew the whistle on ... domestic spying across multiple agencies in 2005.
Note: Listen to Tice's shocking revelations in this interview. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.
Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.
Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
In 1982, long before most Americans ever had to think about warrantless eavesdropping, the journalist James Bamford published “The Puzzle Palace: A Report on N.S.A., America’s Most Secret Agency,” the first book to be written about the National Security Agency. In the book, Bamford describes the agency as “free of legal restrictions” while wielding “technological capabilities for eavesdropping beyond imagination.” He concludes with an ominous warning: “Like an ever-widening sinkhole, N.S.A.’s surveillance technology will continue to expand, quietly pulling in more and more communications and gradually eliminating more and more privacy.” Three decades later, this pronouncement feels uncomfortably prescient: we were warned. Incredibly enough, the Department of Justice, under Jimmy Carter, complied with Bamford’s Freedom of Information Act requests, supplying him with secret documents related to the Church Committee, the Senate group that, in 1975, investigated American intelligence agencies for potential transgression of their mandates. That the government would hand over sensitive information to Bamford predictably infuriated the N.S.A.; Reagan Administration lawyers tried to bully Bamford into ceding his goods, threatening him with the Espionage Act, while the N.S.A. attempted to sequester the documents he’d uncovered. But because he was a lawyer, Bamford knew that he had done nothing wrong.
Note: As a producer for ABC News, Bamford was also the one who obtained startling declassified documents showing that the top Pentagon generals signed off on plans in the early 1960s to blow up a US ship in the Havana harbor or incite violent terrorism in US cities and blame it on Cuba. Strangely, ABC's article "U.S. Military Wanted to Provoke War With Cuba" was the only media report on this incredibly revealing document release. For more along these lines, see concise summaries of revealing news articles on intelligence agency corruption and the disappearance of privacy.
The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata — a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, it’s possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So it’s possible the NSA is using rooms like that to listen to everyone’s phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but it’s hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.
Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.
Two U.S. officials say Dzhokhar Tsarnaev, the surviving suspect [in the Boston Marathon bombings], was unarmed when police captured him hiding inside a boat in a neighborhood back yard. Authorities originally said they had exchanged gunfire with Dzhokhar for more than one hour Friday evening before they were able to subdue him. The officials tell The Associated Press that no gun was found in the boat. Boston Police Commissioner Ed Davis said earlier that shots were fired from inside the boat. Investigators also believe the brothers helped finance their plot through drug sales. Sources say Tamerlan Tsarnaev, who was unemployed, made money selling marijuana. Police think the brothers killed a Massachusetts Institute of Technology campus police officer for his weapon while they were the subjects of last week's massive manhunt. The brothers only had one real gun and one pellet gun when they were on the run Thursday. Investigators now believe that Officer Sean Collier was killed Thursday because the two bombing suspects wanted to take his gun. Investigators believe because the officer's holster had a locking system, they apparently couldn't get the gun out. Collier was shot in the head execution-style while sitting in his patrol car. In his questioning in the hospital, Dzhokhar Tsarnaev said they were self-taught and self-radicalized.
Note: Don't these details released by investigators sound odd? If Dzhokhar was not armed, why did authorities say they exchanged gunfire for an hour? And previous reports claimed Dzhokhar was shot in the throat, so that he could not speak about his version of what happened. High strangeness here. For powerful evidence from a respected researcher that the uncle of the Boston bombers was a top CIA official, click here. This is evidence supporting the theory that the brothers may have been CIA-controlled Manchurian Candidates. For more on this, click here.
One of the two ethnic Chechens suspected by U.S. officials of being behind the Boston Marathon bombings had been under FBI surveillance for at least three years, his mother said. Zubeidat Tsarnaeva told the English-language Russia Today state television station in a phone interview, a recording of which was obtained by Reuters, that she believed her sons were innocent and had been framed. Tamerlan Tsarnaev, 26, was killed in a shootout with police and his 19-year-old brother Dzhokhar was captured after a day-long manhunt. "He (Tamerlan) was controlled by the FBI, like, for three to five years," she said, speaking in English. "They knew what my son was doing, they knew what sites on the Internet he was going to," she said. Tsarnaeva echoed the boys' father, Anzor, who said ... that he believed they had been framed. Tsarnaeva suggested FBI officers had visited her home when she still lived in the United States and told her that Tamerlan "was really an extremist leader and that they were afraid of him. It is really, really a hard thing to hear. And being a mother, what I can say is that I am really sure, I am, like, 100 percent sure, that this is a set-up," she said. U.S. government officials have said the brothers were not under surveillance as possible militants. But the FBI said in a statement on Friday that in 2011 it interviewed Tamerlan at the request of a foreign government, which it did not identify. The FBI statement was the first evidence that the family had come to security officials' attention after they emigrated to the United States from Dagestan about a decade ago.
Note: For a sharp analysis of unanswered questions raised by the official account of the bombings in Boston, click here. For the local NBC station report that bomb-sniffing dogs were present at the finish line of the Boston Marathon before the bombs exploded, watch this video clip. And for a Washington Times article raising more questions on the bombing, including government agents seen at the scene with suspicious backpacks, click here.
I’ve been detained at Guantánamo for 11 years and three months. I have never been charged with any crime. I have never received a trial. Last month, on March 15, I was sick in the prison hospital and refused to be fed. A team from the E.R.F. (Extreme Reaction Force), a squad of eight military police officers in riot gear, burst in. They tied my hands and feet to the bed. They forcibly inserted an IV into my hand. I spent 26 hours in this state, tied to the bed. During this time I was not permitted to go to the toilet. They inserted a catheter, which was painful, degrading and unnecessary. I was not even permitted to pray. I will never forget the first time they passed the feeding tube up my nose. I can’t describe how painful it is to be force-fed this way. As it was thrust in, it made me feel like throwing up. I wanted to vomit, but I couldn’t. There was agony in my chest, throat and stomach. I had never experienced such pain before. I would not wish this cruel punishment upon anyone. I am still being force-fed. Two times a day they tie me to a chair in my cell. My arms, legs and head are strapped down. When they come to force me into the chair, if I refuse to be tied up, they call the E.R.F. team. So I have a choice. Either I can exercise my right to protest my detention, and be beaten up, or I can submit to painful force-feeding. The only reason I am still here is that President Obama refuses to send any detainees back to Yemen. This makes no sense. I am a human being ... and I deserve to be treated like one.
Note: Samir Naji al Hasan Moqbel, has been a prisoner at Guantánamo Bay since 2002. For an illuminating analysis of this situation by the Washington Post, click here.
One of the major governmental abuses denounced by the 1976 final report of the Church Committee was the FBI's domestic counter intelligence programs (COINTELPRO). Under that program, the FBI targeted political groups and individuals it deemed subversive and dangerous ... and infiltrated them with agents who, among other things, attempted to manipulate members into agreeing to commit criminal acts so that the FBI could arrest and prosecute them. What made the program so controversial was that the FBI was attempting to create and encourage crimes rather than find actual criminals - all in order to punish those whose constitutionally protected political activism the US government found threatening. Over the past decade, US Muslims have been routinely targeted with precisely this same tactic of preemptive or anticipatory prosecution. It's all designed to take people engaged in political and religious advocacy which the US government dislikes ... and use paid informants to trick them into saying just enough to turn them into criminals who are then prosecuted and imprisoned for decades. The same pattern repeats itself over and over. The FBI ensnares some random Muslim in a garden-variety criminal investigation involving financial fraud or drugs. Rather than prosecute him, the FBI puts the Muslim criminal suspect on its payroll, sending him into Muslim communities and mosques in order not only to spy on American Muslims, but to befriend them and then actively manipulate them into saying just enough to make their prosecution possible.
Note: For deeply revealing reports from reliable major media sources on illegal activities of intelligence agencies, click here.
Last month a three-year-long federal prosecution of Blackwater collapsed. The government’s 15-felony indictment—on such charges as conspiring to hide purchases of automatic rifles and other weapons from the Bureau of Alcohol, Tobacco, Firearms, and Explosives—could have led to years of jail time for Blackwater personnel. In the end, however, the government got only misdemeanor guilty pleas by two former executives, each of whom were sentenced to four months of house arrest, three years’ probation, and a fine of $5,000. Prosecutors dropped charges against three other executives named in the suit and abandoned the felony charges altogether. But the most noteworthy thing about the largely failed prosecution wasn’t the outcome. It was the tens of thousands of pages of documents—some declassified—that the litigation left in its wake. These documents illuminate Blackwater’s defense strategy: to defeat the charges it was facing, Blackwater built a case not only that it worked with the CIA—which was already widely known—but that it was in many ways an extension of the agency itself. [CEO Erik] Prince [said] recently, “Blackwater’s work with the CIA began when we provided specialized instructors and facilities that the Agency lacked. In the years that followed, the company became a virtual extension of the CIA because we were asked time and again to carry out dangerous missions, which the Agency either could not or would not do in-house.”
Note: For deeply revealing reports from reliable major media sources on the growing privatization of intelligence agency functions, click here.
The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document. The proposed plan represents a major step by U.S. intelligence agencies to spot and track down [targeted persons] by bringing together financial databanks, criminal records and military intelligence. Financial institutions that operate in the United States are required by law to file reports of "suspicious customer activity," such as large money transfers or unusually structured bank accounts, to Treasury's Financial Crimes Enforcement Network (FinCEN). The Federal Bureau of Investigation already has full access to the database. However, intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, currently have to make case-by-case requests for information to FinCEN. The Treasury plan would give spy agencies the ability to analyze more raw financial data than they have ever had before. Financial institutions file more than 15 million "suspicious activity reports" every year, according to Treasury. Banks, for instance, are required to report all personal cash transactions exceeding $10,000.
Note: For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.
Commencing immediately upon the 9/11 attack, the US government ... has spent 12 straight years inventing and implementing new theories of government power in the name of Terrorism. Every year since 9/11 has ushered in increased authorities of exactly the type Americans are inculcated to believe only exist in those other, non-free societies: ubiquitous surveillance, impenetrable secrecy, and the power to imprison and even kill without charges or due process. The Obama administration has already exercised the power to target even its own citizens for execution far from any battlefield. [This] has prompted almost no institutional resistance from the structures designed to check executive abuses: courts, the media, and Congress. Last week's 13-hour filibuster of John Brennan's confirmation as CIA director by GOP Sen. Rand Paul was one of the first ... Congressional efforts to dramatize and oppose just how radical these Terrorism-justified powers have become. For the first time since the 9/11 attack, even lowly cable news shows were forced ... to extensively discuss the government's extremist theories of power. All of this put Democrats ... in a very uncomfortable position. The politician who took such a unique stand in defense of these principles was not merely a Republican but a leading member of its dreaded Tea Party wing. Some Democrats, to their credit, publicly supported Paul. But most Democratic Senators ran away as fast as possible from having anything to do with the debate. Paul was doing nothing more than voicing concerns that have long been voiced by leading civil liberties groups such as the ACLU. But almost without exception, progressives who defend Obama's Terrorism policies steadfastly ignore the fact that they are embracing policies that are vehemently denounced by the ACLU.
Note: For deeply revealing reports from reliable major media sources on the loss of civil liberties in the US, click here.
A trove of recently declassified documents leads to several inescapable conclusions about the FBI’s role in protecting both proven and alleged Nazi war criminals in America. First, there can be no doubt that J. Edgar Hoover collected Nazis and Nazi collaborators like pennies from heaven. Unlike the military and its highly structured Operation Paperclip — with its specific targets, systematic falsification of visa applications, and creation of bogus biographies — Hoover had no organized program to find, vet, and recruit alleged Nazis and Nazi collaborators as confidential sources, informants, and unofficial spies in émigré communities around the country. Each Nazi collaborator that his agents stumbled upon, or learned about from the CIA, was both a potential spy and a potential anticommunist leader. Once they were discovered, Hoover sought them out, used them, and protected them. He had no interest in reporting alleged Nazi war criminals to the Immigration and Naturalization Service (INS), the Justice Department, or the State Department for possible deportation or extradition. He appeared smug in his simplistic division of Americans into shadeless categories of bad guys and good guys, communists and anticommunists. Hoover was careful about the number of former Nazis and Nazi collaborators he placed on the FBI payroll. If Congress or its investigative arm, the Government Accountability Office, ever insisted on a tally, he could say with a straight face that there were only a handful of paid confidential sources and informants. But if one adds the war criminals he informally cultivated and used, the number ranges well into the hundreds.
Note: This essay is adapted from Useful Enemies: John Demjanjuk and America's Open-Door Policy for Nazi War Criminals by Richard Rashke. For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.
Attorney General Eric Holder has said in a letter to Sen. Rand Paul that the president could in an "entirely hypothetical" situation authorize the military to use lethal force within U.S. territory. The letter to Paul came in response to three inquiries the Kentucky Republican sent to John Brennan, President Obama's nominee for CIA director. Paul's letters asked if it was legal for the U.S. government to use lethal force, including in the form of drone strikes, on Americans inside the country. Here's Holder's response, in part: "As members of this Administration have previously indicated, the U.S. government has not carried out drone strikes in the United States and has no intention of doing so. The question you have posed is therefore entirely hypothetical, unlikely to occur, and one we hope no President will ever have to confront. It is possible, I suppose, to imagine an extraordinary circumstance in which it would be necessary and appropriate for the President to authorize the military to use lethal force within the territory of the United States. For example, the President could conceivably have no choice but to authorize the military to use such force if necessary to protect the homeland in the circumstances of a catastrophic attack like the ones suffered on December 7, 1941, and September 11, 2001."
Note: For deeply revealing reports from reliable major media sources on the loss of civil liberties in the US, click here.
The Federal Bureau of Investigation has a track record of attacking the undesirables of the time. In the early part of the 20th century, immigrants from Italy were the focus; in the 1940s, it was Japanese-Americans; in the 1950s, it was Americans who questioned U.S. foreign policy; in the 1960s, civil rights activists. Today, it's ... the Arab. It's the South Asian. And often, the FBI uses entrapment to create a terror case out of thin air and then claim to have foiled it. San Jose resident Matthew Llaneza, who converted to Islam in 2011, is accused of attempting to bomb a bank building in Oakland. However, many feel that the FBI used entrapment, which, in criminal law, is a legal defense. It is the act by law enforcement officers of inducing or encouraging a person to commit a crime when the potential criminal is not otherwise predisposed to committing the crime. Over the past several years, the FBI has repeatedly manufactured terror plots by targeting vulnerable members of the Arab, South Asian and Muslim communities. The target is usually an individual or a small group of people with a troubled past, psychological issues or financial problems. Llaneza's is a classic case of entrapment. [It] closely follows the pattern. [He] has a history of psychological problems. This presumed inability to make sound judgment is perfect for entrapment. His bombing plot seems to first emerge in a conversation with law enforcement, and his history of mental illness indicates he didn't have the capacity to commit acts of terror on his own.
Note: For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.
Britain's largest police force stole the identities of an estimated 80 dead children and issued fake passports in their names for use by undercover police officers. The Metropolitan police secretly authorised the practice for covert officers infiltrating protest groups without consulting or informing the children's parents. Over three decades generations of police officers trawled through national birth and death records in search of suitable matches. Undercover officers created aliases based on the details of the dead children and were issued with accompanying identity records such as driving licences and national insurance numbers. Some of the police officers spent up to 10 years pretending to be people who had died. The technique of using dead children as aliases has remained classified intelligence for several decades, although it was fictionalised in Frederick Forsyth's novel The Day of the Jackal. As a result, police have internally nicknamed the process of searching for suitable identities as the "jackal run". One former undercover agent compared an operation on which he was deployed to the methods used by the Stasi. The practice was introduced 40 years ago by police to lend credibility to the backstory of covert operatives spying on protesters, and to guard against the possibility that campaigners would discover their true identities. Since then dozens of SDS [Special Demonstration Squad] officers, including those who posed as anti-capitalists, animal rights activists and violent far-right campaigners, have used the identities of dead children.
Note: For deeply revealing reports from reliable major media sources on police corruption, click here.
In Strasbourg, France, a 17-judge panel of the European Court of Human Rights ruled unanimously on Thursday that U.S. intelligence did in fact kidnap a German citizen in Macedonia. The court said he was locked in a hotel room for 23 days, then handed over to a C.I.A. rendition team at an airport, where he was “severely beaten, sodomized, shackled and hooded.” Later he was sent to Afghanistan and illegally detained for months. The German citizen, Khaled el-Masri, had no connection to terrorism, unless you count the fact that U.S. officials were seeking an Al Qaeda operative with a similar name. The court ordered Macedonia to pay Mr. Masri $78,000 in damages. He has been refused a day in American courts on flimsy claims of national secrets (that the names of the men who broke the law brutalizing him might be revealed). No official has been held accountable for his illegal detention and torture – or for that matter for the similar beastly treatment of other prisoners. The detention camp in Guantanamo Bay remains open, an indelible stain on the American justice system. There is no plausible reason to keep the prison open. There has been no official accounting of the Bush administration’s detention policies, and perhaps there never will be – because in 2009, when he took office, President Obama decided to sweep that whole period of lawlessness and brutality under the rug. Disclosure did not suit his political agenda. He wanted, we were all told ad nauseam, to “look forward and not back.” The torturers, and the men who gave orders to torture, have been absolved of responsibility.
Note: For deeply revealing reports from reliable major media sources on illegal activities of intelligence agencies, click here.
The Petraeus scandal is receiving intense media scrutiny. Several of the emerging revelations are genuinely valuable, particularly those involving the conduct of the FBI and the reach of the US surveillance state. The FBI investigation began when Jill Kelley - a Tampa socialite friendly with Petraeus (and apparently very friendly with Gen. John Allen, the four-star U.S. commander of the war in Afghanistan) - received a half-dozen or so anonymous emails that she found vaguely threatening. She then informed a friend of hers who was an FBI agent, and a major FBI investigation was then launched that set out to determine the identity of the anonymous emailer. What is most striking is how sweeping, probing and invasive the FBI's investigation then became, all without any evidence of any actual crime - or the need for any search warrant. The FBI traced all of [Paula] Broadwell's physical locations, learned of all the accounts she uses, ended up reading all of her emails, investigated the identity of her anonymous lover (who turned out to be Petraeus), and then possibly read his emails as well. They also discovered "alleged inappropriate communication" to Kelley from Gen. Allen, who is not only the top commander in Afghanistan but was also just nominated by President Obama to be the Commander of US European Command and Supreme Allied Commander Europe (a nomination now "on hold"). This is a surveillance state run amok. It also highlights how any remnants of internet anonymity have been all but obliterated by the union between the state and technology companies.
Note: For deeply revealing reports from reliable major media sources on government surveillance, click here.
A Navy SEAL's firsthand account of the raid that killed Osama bin Laden pulls back the veil on the secret operations conducted almost nightly by elite American forces against terrorist suspects. Former SEAL Matt Bissonnette's account contradicted in key details the account of the raid presented by administration officials in the days after the May 2011 raid in Abbotabad, Pakistan. Bissonnette wrote that the SEALs spotted bin Laden at the top of a darkened hallway and shot him in the head even though they could not tell whether he was armed. Administration officials have described the SEALs shooting bin Laden only after he ducked back into a bedroom because they assumed he might be reaching for a weapon. Bissonnette wrote the book, No Easy Day, under the pseudonym Mark Owen, as one of the men in the room when they killed bin Laden. In [one] scene, a terrified mother clutches her child and a young girl identifies the dead man as Osama bin Laden. The SEAL author says he did "not disclose confidential or sensitive information that would compromise national security in any way."
Note: Isn't it interesting that the SEAL team "spotted bin Laden at the top of a darkened hallway and shot him in the head." If it was a darkened hallway, how did they know it was bin Laden? The articles states "a young girl identifies the dead man as Osama bin Laden." Is that really how they ID'd this guy? And why did they then dump his body into the ocean, so that there could never be definitive proof that the body was indeed bin Laden? So many questions remain. For more evidence bin Laden was not killed by SEALs, click here.
The man who gave the Black Panther Party some of its first firearms and weapons training – which preceded fatal shootouts with Oakland police in the turbulent 1960s – was an undercover FBI informer, according to a former bureau agent and an FBI report. One of the Bay Area’s most prominent radical activists of the era, Richard Masato Aoki was known as a fierce militant who touted his street-fighting abilities. He was a member of several radical groups before joining and arming the Panthers. But unbeknownst to his fellow activists, Aoki had served as an FBI intelligence informant, covertly filing reports on a wide range of Bay Area political groups, according to the bureau agent who recruited him, [Burney Threadgill Jr.]. Aoki’s work for the FBI ... was uncovered and verified during research for the book, Subversives: The FBI’s War on Student Radicals, and Reagan’s Rise to Power. The FBI ... released records about Aoki in response to a Freedom of Information Act request. A Nov. 16, 1967, intelligence report on the Black Panthers lists Aoki as an “informant” with the code number “T-2.” Aoki gave the Panthers some of their first guns. As [Bobby] Seale recalled in his memoir, Seize the Time, the group approached Aoki, “a Third World brother we knew, a Japanese radical cat. He had guns … .357 Magnums, 22’s, 9mm’s, what have you.” In early 1967, Aoki joined the Black Panther Party and gave them more guns, Seale wrote. Aoki also gave Panther recruits weapons training.
Note: For a Democracy Now! video report on the discovery that Aoki was an FBI infiltrator, informer and provocateur, click here. This is more solid evidence that elements within government have consistently instigated violence within progressive movements in order to discredit them. Sadly, this policy appears to continue up to the present.
F.B.I. agents on a hunt for leakers have interviewed current and former high-level government officials from multiple agencies in recent weeks, casting a distinct chill over press coverage of national security issues as agencies decline routine interview requests and refuse to provide background briefings. The criminal investigation, which has reached into the White House, the Pentagon, the National Security Agency and the C.I.A., appears to be the most sweeping inquiry into intelligence disclosures in years. It coincides with Senate consideration of new legislation designed to curb intelligence officials’ exchanges with reporters. The legislation approved last week by the Senate Intelligence Committee would reduce to a handful the number of people at each agency permitted to speak to reporters on “background,” or condition of anonymity; require notice to the Senate and House intelligence committees of authorized disclosures of intelligence information; and permit the government to strip the pension of an intelligence officer who illegally discloses classified information. The Obama administration has set a record for prosecuting leaks of classified information to the news media, with six cases to date, more than under all previous presidents combined. The F.B.I. appears to be focused on recent media disclosures on American cyberattacks on Iran, a terrorist plot in Yemen that was foiled by a double agent and the so-called “kill list” of terrorist suspects approved for drone strikes.
Note: For deeply revealing reports from reliable major media sources on government secrecy, click here.
The FBI, for the first time, has admitted publicly that it knew the radical Muslim cleric Anwar al-Awlaki was returning to the U.S. in October 2002 and that an FBI agent discussed the American's return with a U.S. attorney before he was detained and then abruptly released from federal custody. Al-Awlaki, who would become the first American targeted for death by the CIA, eventually was killed last September in Yemen by a U.S. drone strike. Mark Giuliano, the FBI's assistant director for national security, testified [on August 1] that the FBI knew in advance that he was making his way back to the United States. Al-Awlaki was detained at New York City's JFK airport because a customs database flagged him based on an outstanding arrest warrant. Former FBI agents say there are only likely two explanations: The bureau let the cleric into the country to track him for intelligence, or the bureau wanted to work with him as a friendly contact. The FBI has never explained why it let al-Awlaki walk free at a time when dozens of young Muslim men were being held in detention centers on material witness warrants in the wake of the Sept. 11 terrorist attacks. Al-Awlaki was under a full FBI investigation by the Washington office when he was invited to lunch at an executive dining room at the Pentagon in February 2002.
Note: For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here.
The Justice Department is going through thousands of cases from the days before DNA testing to see whether the government exaggerated the significance of the FBI's hair analysis. The review, the largest in U.S. history, will focus on work by FBI Laboratory hair and fiber examiners since at least 1985, the Washington Post reported. A reporter at the Post had been working on a story about Donald Gates, a D.C. man released after DNA evidence proved his innocence, when he learned about Frederic Whitehurst, an FBI lab chemist who blew the whistle on the FBI Laboratory in the mid-1990s. Whitehurst said he watched colleagues contaminate evidence and, in court, overstate the significance of their matches. When Whitehurst, a chemist with a doctoral degree from Duke, arrived at the FBI crime lab in 1986, the first thing he noticed was that the place was, as he called it, a pigsty. The equipment was outdated and there was a film of black soot coating the counters – a dust from the vents that the agents called “black rain.” After the first World Trade Center bombing, Whitehurst testified that supervisors pressured him to concoct misleading scientific reports. When he refused to testify that a urea nitrate bomb had been the source of the explosion, the FBI found another lab technician to testify. He learned that an agent had, for the previous nine years, rewritten his scientific reports to support the prosecution.
Note: For deeply revealing reports from reliable major media sources on intelligence agency corruption, click here.
A Republican-run House committee voted today to cite Attorney General Eric Holder for contempt after President Obama asserted executive privilege over documents in the "Fast and Furious" operation. The "decision to invoke executive privilege implies that White House officials were either involved in the Fast and Furious operation or the cover-up that followed," said Michael Steel, a spokesman for House Speaker John Boehner, R-Ohio. "The administration has always insisted that wasn't the case. Agents involved in Operation Fast and Furious lost track of some weapons. Two guns were later found at the scene of the killing of a U.S. border patrol agent, Brian Terry. In a statement issue by their attorney, Terry's parents condemned the Obama administration for invoking executive privilege. "Our son, Border Patrol Agent Brian Terry, was killed by members of a Mexican drug cartel armed with weapons from this failed Justice Department gun trafficking investigation," said Josephine Terry and Kent Terry Sr. "For more than 18 months we have been asking our federal government for justice and accountability." The Terrys also said that "our son lost his life protecting this nation, and it is very disappointing that we are now faced with an administration that seems more concerned with protecting themselves rather than revealing the truth behind Operation Fast and Furious." The investigation into the operation was spurred after Sen. Charles Grassley, R-Iowa, inquired into whistle-blower allegations that the government had allowed the transfer of illegally purchased weapons.
Note: For more about the Fast and Furious ATF operation that provided US guns to criminal gangs, see this news summary from a reliable major media source.
In 1953 ... the Central Intelligence Agency began a top-secret program called MK Ultra. It included exotic projects that decades later provided much critical fodder for commentators and comedians: exploding cigars, poison-laced toothpaste, hallucinogenic serums. And as [revealed] in a video interview with professional spies at the exhibition "Spy: The Secret World of Espionage," ... at Discovery Times Square, it even included the hiring of a magician, John Mulholland, as a C.I.A. consultant. Drawn from the immense private collection of the intelligence historian H. Keith Melton, and the collections of the C.I.A., the Federal Bureau of Investigation and the National Reconnaissance Office, are objects ranging from a poisoned needle, hidden inside a coin, to [a] well-preserved rat with a velcroed body cavity that was used by Americans in Moscow for exchanges of information without agents' actually meeting. The rodent, treated with hot pepper sauce to discourage scavenging cats, was easily tossed from a passing car for these "dead drops." The gadgets here are full of concealments and misdirection; nothing is what it seems. But the objects selected by Mr. Melton - whose collection of over 9,000 spy devices, books and papers has also helped stock the International Spy Museum in Washington - are not presented simply for sensation's sake. We end up glimpsing what these ordinary objects actually accomplished and what was at stake when they were used. The show could have been stronger if that context had been made clearer, but even with its gadget-centered focus, we learn that this great bag of tricks was no mere game.
Note: For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.
FBI director Robert S. Mueller III today disclosed that the FBI is investigating leaks to the news media about the recently disrupted plot by Al Qaeda’s Yemen affiliate to smuggle a bomb designed to be concealed in underwear onto a U.S. bound jet. The plans for the attack, which featured a more sophisticated version of the device the “underwear bomber” of Christmas 2009 was arrested with, were first revealed by the AP. But a day later, it was revealed that the individual at the center of the plot was a double agent working for Britain’s MI-6 secret intelligence service and the CIA along with Saudi Arabian intelligence assets. “We have initiated an investigation into this leak,” Mueller testified before the Senate Judiciary Committee on Wednesday. Justice Department officials and an FBI spokesman declined to comment on the nature of the investigation. The CIA also declined comment. Matthew Olsen, director of the National Counterterrorism Center, addressed the issue of media leaks relating to the plot and called it “devastating.”
Note: Yes, it's devastating to the image of the FBI to be caught aiding terrorist plots. Now why isn't the government investigating why the FBI is doing such things? For lots more from reliable sources on the games intelligence agencies play, click here.
A would-be "underwear bomber" involved in a plot to attack a US-based jet was in fact working as an undercover informer with Saudi intelligence and the CIA, it has emerged. The revelation is the latest twist in an increasingly bizarre story about the disruption of an apparent attempt by al-Qaida to strike at a high-profile American target using a sophisticated device hidden in the clothing of an attacker. The news that the individual at the heart of the bomb plot was in fact an informer for US intelligence is likely to raise just as many questions as it answers. Citing US and Yemeni officials, Associated Press reported that the unnamed informant was working under cover for the Saudis and the CIA when he was given the bomb, which was of a new non-metallic type aimed at getting past airport security. The informant then turned the device over to his handlers and has left Yemen, the officials told the news agency.
Note: For more on this bizarre news, see the CBS report at this link. Isn't it amazing how many terrorist groups have undercover FBI and CIA agents involved in actually pushing plots forward? One has to wonder how far the plots would go without prompting by intelligence insiders. For a powerful BBC documentary suggesting that terrorism is pushed and sold by politicians for a deeper agenda, click here.
Several congressional committees want the FBI director to explain why one of his agents ordered the release of Anwar al-Awlaki from federal custody on Oct. 10, 2002, when there was an outstanding warrant for the American Muslim cleric’s arrest. The cleric was held by customs agents at JFK International Airport in New York City in early morning of Oct. 10, 2002, until FBI Agent Wade Ammerman ordered his release – even though a warrant for the cleric’s arrest on passport fraud was still active. The warrant was generated by the Joint Terrorism Task Force in San Diego, which considered the cleric a “tier one” target because of his connections to at least three of the 9/11 hijackers. The passport fraud warrant was described ... as a holding charge that would allow federal investigators to pressure al-Awlaki over his 9/11 contacts. The warrant was pulled by a judge in Colorado, after the cleric entered the U.S.. After al-Awlaki re-entered the U.S. in the fall of 2002 with the FBI’s help, the cleric then appeared in a high-profile investigation, in which Agent Ammerman was a lead investigator. Former FBI agents say Ammerman would have needed permission from higher up in the bureau to let al-Awlaki go. Former FBI agents, familiar with al-Awlaki’s re-entry in October 2002, say only two scenarios seem to explain what happened. The FBI was tracking the cleric for intelligence or the FBI was working with the cleric and saw him as a “friendly contact.”
Note: For further details of the FBI's release of al-Awlaki, click here. How interesting that "al-Awlaki re-entered the U.S. in 2002 with the FBI’s help." What may be happening is that individuals like al-Awlaki are CIA assets programmed to be Manchurian Candidates using mind control techniques perfected by intelligence agencies. They are then released to do what they've been programmed to do to forward a hidden shadow-government agenda. Many terrorists and mass murderers may actually be Manchurian Candidates programmed to engage in acts which keep the public in fear. For more on this, click here.
At one point in the 1970s there were more than 1,000 people in the Danbury area working on The Secret. And though they worked long hours under intense deadlines, sometimes missing family holidays and anniversaries, they could tell no one — not even their wives and children — what they did. They were engineers, scientists, draftsmen and inventors. It was dubbed “Big Bird’’ and it was considered the most successful space spy satellite program of the Cold War era. From 1971 to 1986 a total of 20 satellites were launched, each containing 60 miles of film and sophisticated cameras that orbited the earth snapping vast, panoramic photographs of the Soviet Union, China and other potential foes. The film was shot back through the earth’s atmosphere in buckets that parachuted over the Pacific Ocean, where C-130 Air Force planes snagged them with grappling hooks. The scale, ambition and sheer ingenuity of Hexagon KH-9 was breathtaking. So too is the human tale of the 45-year-old secret that many took to their graves. Hexagon was declassified in September. “The question became, how do you hide an elephant?’’ a National Reconnaissance Office report stated at the time. It decided on a simple response: “What elephant?’’ Employees were told to ignore any questions from the media, and never confirm the slightest detail about what they worked on.
Note: This is another excellent example of how government is able to keep huge projects secret, and how top secret military technology is often decades ahead of anything which has been publicly revealed. Note that even the existence of the National Reconnaissance Office, founded in 1960, was completely denied until it's existence was declassified in 1992. Does government lie to us? Without a doubt.
Police organizations across the country co-operated to spy on community organizations and activists in what the RCMP [Royal Canadian Mounted Police] called one of the largest domestic intelligence operations in Canadian history, documents reveal. Information about the extensive police surveillance in advance of last year's G8 and G20 meetings in southern Ontario comes from evidence presented in the case of 17 people accused of orchestrating street turmoil during the summits. Two undercover police officers ... spent 18 months infiltrating southern Ontario community groups ahead of the June 26-27, 2010, gathering of world leaders. They were part of a much larger so-called joint intelligence group (JIG) operation [which] employed more than 500 people at its peak. "The 2010 G8 summit in Huntsville ... will likely be subject to actions taken by criminal extremists motivated by a variety of radical ideologies," reads a JIG report. "The important commonality is that these ideologies ... place these individuals and/or organizations at odds with the status quo and the current distribution of power in society." The RCMP-led intelligence team made a series of presentations to private-sector corporations, including one to "energy sector stakeholders" in November 2011. Other corporations that received intelligence from police included Canada’s major banks, telecom firms, airlines, downtown property companies and other businesses seen to be vulnerable to the effects of summit protests.
Note: For lots more from major media sources on government attacks on civil liberties, click here.
In May, 2009, David Williams was arrested ... and hit with a 25-year jail sentence. Williams and three other struggling ... men beset by drug, criminal and mental health issues were convicted of an Islamic terrorist plot to blow up Jewish synagogues and shoot down military jets with missiles. Even more shocking was that the organisation, money, weapons and motivation for this plot did not come from real Islamic terrorists. It came from the FBI, and an informant paid to pose as a terrorist mastermind paying big bucks for help in carrying out an attack. Lawyers for the so-called Newburgh Four have now launched an appeal that will be held early next year. Advocates hope the case offers the best chance of exposing the issue of FBI "entrapment" in terror cases. "We have as close to a legal entrapment case as I have ever seen," said Susanne Brody, who represents another Newburgh defendant, Onta Williams. "The target, the motive, the ideology and the plot were all led by the FBI," said Karen Greenberg, a law professor at Fordham University in New York, who specialises in studying the new FBI tactics. But the issue is one that stretches far beyond Newburgh. Critics say the FBI is running a sting operation across America, targeting – to a large extent – the Muslim community by luring people into fake terror plots.
Note: For a powerful BBC documentary showing clearly that much of the war on terror is a fabrication to forward a political agenda, watch Power of Nightmares at this link. For many reports from major media sources on the fake terror behind the "global war on terror", click here.
In September, news about a previously unknown FBI investigation into possible ties between 9/11 hijackers and a Saudi family living near Sarasota led the agency to deny there was any connection and assert that it made all of its files available to congressional investigators a decade ago. But two months later, the FBI has been unable or unwilling to substantiate that it disclosed any information regarding its Sarasota investigation to Congress, says former Florida U.S. Sen. Bob Graham. He has long contended the FBI stonewalled Congress about what it knows about possible Saudi support for the 9/11 hijackers. The FBI investigation began shortly after 9/11 when residents of the gated community of Prestancia, south of Sarasota, called to report the abrupt departure from their luxury home of a Saudi family about two weeks before [9/11]. The most important information came when the FBI examined gatehouse security logs and photographs of license plates, according to then-homeowner’s association administrator Larry Berberich and a counterterrorism agent involved in the investigation. They said the security records revealed that the home was visited by vehicles used by 9/11 terrorist leader Mohamed Atta and fellow hijacker-pilot Ziad Jarrah.
Note: For key questions about the official account of 9/11 raised by respected government officials and academics, click here and here.
One week after a U.S. military airstrike killed a 16-year-old American citizen in Yemen, no one in the Obama administration, Pentagon or Congress has taken responsibility for his death, or even publicly acknowledged that it happened. The absence of official accountability for the demise of Abdulrahman al-Awlaki, a Denver native and the son of [Anwar al-Awlaki], deepens the legal and ethical murkiness of the Obama administration’s campaign to kill alleged enemies of the state outside of traditional war zones. Officials throughout the U.S. government ... have refused to answer questions for the record about how or why Awlaki was killed Oct. 14 in a remote part of Yemen, along with eight other people. The official silence about the death of the American teenager contrasts with the Obama administration’s eagerness to trumpet another airstrike in Yemen two weeks earlier. In that case, armed drones controlled by the CIA killed the teen’s father, Anwar al-Awlaki. [A] U.S. official said the airstrike was launched by the military’s secretive Joint Special Operations Command, or JSOC. The younger Awlaki was the third U.S. citizen killed by the U.S. government in Yemen in recent weeks.
Note: For deep background on reasons why the US government may have wanted to eliminate Anwar al-Awlaki and his son, click here.
Working inside the New York Police Department is one of the CIA's most experienced clandestine operatives. He arrived in July as the special assistant to the deputy commissioner of intelligence. While his title is clear, his job responsibilities are not. Federal and city officials have offered differing explanations for why this top CIA officer was assigned to a municipal police department. The CIA is prohibited from spying domestically, and its unusual partnership with the NYPD has troubled top lawmakers and prompted an internal investigation. The last time a CIA officer worked so closely with the NYPD, beginning in the months after the 9/11 attacks, he became the architect of aggressive police programs that monitored Muslim neighborhoods. With that earlier help from this CIA official, the police put entire communities under a microscope based on ethnicity rather than allegations of wrongdoing. On Monday, New York Mayor Michael Bloomberg defended the arrangement. "If the CIA can help us I'm all for getting any information they have and then letting the police department use it," he said. All of this has troubled lawmakers, including Sen. Dianne Feinstein, D-Calif., the chairwoman of the Senate Intelligence Committee, who has said the CIA has "no business or authority in domestic spying, or in advising the NYPD how to conduct local surveillance."
Note: While it is quite amazing that this information was reported in the major media, well-informed people have known that CIA operatives are secretly inserted in police stations across the US. They are also deployed in key positions in every major media outlet in the U.S. and many around the world, where they can stop reporting of information which reveals too much. To read the fascinating accounts of two award-winning journalist providing clear evidence of this, click here.
The former chief of Bolivia's anti-narcotics police has been jailed by an American court for cocaine trafficking. A Miami federal judge imposed the 14-year sentence on Rene Sanabria, 54. Gen Sanabria was head of Bolivia's anti-drug agency until 2009, and was an intelligence adviser to the government at the time of his arrest. He pleaded guilty in June to taking part in a conspiracy to ship hundreds of kilograms of cocaine from Bolivia to Chile and then on to Miami. The court heard the plot was set up by the US Drug Enforcement Administration (DEA), as an undercover sting operation. Sanabria was detained in Panama and taken to the United States by DEA agents for trial. He had served for 32 years in Bolivia's police force. The charge carries a required minimum 10-year sentence. But US District Judge Ursula Ungaro said he was giving Sanabria a higher sentence because of his leadership role, and to send an anti-corruption message to other government officials.
Note: So the former chief of anti-narcotics was dealing drugs. What does this say about the war on drugs? For powerful evidence from award-winning reporters that elements within the CIA and DEA are involved in the drug trade, click here.
A court case against a translator who leaked US government secrets was conducted in secret because it centred on the revelation that the FBI had eavesdropped on Israeli embassy phone calls, it was revealed yesterday. The extraordinary limitations in place for the prosecution of Shamai Leibowitz, who was sentenced to 20 months in prison for disseminating classified information, meant that even the judge sentencing him did not know what he was supposed to have leaked. "All I know is that it's a serious case," Judge Alexander Williams said last year. "I don't know what was divulged other than some documents, and how it compromised things, I have no idea." But now Richard Silverstein, the blogger to whom Leibowitz passed his information, has come forward to defend his source. Leibowitz passed him about 200 pages of verbatim records of phone calls and conversations between embassy officials, saying that he believed the documents revealed Israeli officials trying unlawfully to influence US policy and edging towards military action against Iran. There has been dismay among civil liberties and open government advocates who point to pledges made by Mr Obama before his election to seek new transparency in Washington. Instead, his administration has launched a record number of prosecutions under the Espionage Act – five including the Leibowitz case. Previously, there had been only four such prosecutions opened by all previous administrations.
Note: For lots more on government secrecy from reliable sources, click here.
A once-secret CIA history of the Bay of Pigs invasion lays out in unvarnished detail how the American spy agency came to the rescue of and cut deals with authoritarian governments in Central America, largely to hide the U.S. role in organizing and controlling the hapless Cuban exile invasion force. The most powerful people in Central American embassies were the CIA station chiefs. Ambassadors step aside and allow the CIA to negotiate deals for covert paramilitary bases in a newly released portion of the CIA’s “Official History of the Bay of Pigs Operation.” “What you’re reading in this report shows again that in the hypocritical name of democracy the United States and CIA were willing to prop up some of the most cut-throat dictatorships,” says researcher Peter Kornbluh of the National Security Archive at George Washington University. He sued the CIA for release of the Top Secret document that dissects one of the agency’s greatest failures. Using secret interviews, cables and memos, CIA historian Jack B. Pfeiffer wrote the classified account of the disastrous operation to topple Fidel Castro. It’s unusually candid because nobody except spies were expected read it. Both the Eisenhower and Kennedy governments wanted to be able to deny responsibility for the invasion.
Note: To read the formerly-secret CIA history of the Bay of Pigs operation, just released by the National Security Archive, click here.
Since the Sept. 11 terrorist attacks, the New York Police Department has become one of the nation's most aggressive domestic intelligence agencies, targeting ethnic communities in ways that would run afoul of civil liberties rules if practiced by the federal government. The operations have benefited from unprecedented help from the CIA, a partnership that has blurred the line between foreign and domestic spying. The department has dispatched undercover officers, known as "rakers," into minority neighborhoods as part of a human mapping program, according to officials directly involved in the program. They've monitored daily life in bookstores, bars, cafes and nightclubs. Police have also used informants, known as "mosque crawlers," to monitor sermons, even when there's no evidence of wrongdoing. Many of these operations were built with help from the CIA, which is prohibited from spying on Americans but was instrumental in transforming the NYPD's intelligence unit. A veteran CIA officer, while still on the agency's payroll, was the architect of the NYPD's intelligence programs. The CIA trained a police detective at the Farm, the agency's spy school in Virginia, then returned him to New York, where he put his new espionage skills to work inside the United States. And just last month, the CIA sent a senior officer to work as a clandestine operative inside police headquarters.
Note: For more on this important story from NPR, click here. For lots more from reliable sources on government threats to civil liberties, click here.
A helicopter was shot down today by Afghan insurgents as it was rushing to aid troops in a firefight, killing 30 Americans, including 22 Navy SEALs, most of whom belonged to Team 6, the unit whose members were involved in the raid that killed Osama bin Laden, U.S. officials said. It's unclear how far away the helicopter was from the initial firefight when it went down and unclear how the troops in the firefight got to the crash location, the official said. Although the Taliban have claimed to have shot the helicopter down, U.S. officials have only identified the attackers as insurgents. The last worst one-day U.S. casualty record in Afghanistan was on June 28, 2005 when 16 U.S. soldiers were killed in Kunar province after a helicopter was shot down by Taliban insurgents.
Note: Many scholars claim Osama bin Laden was already dead long before he was allegedly killed by the Navy Seal Team 6. Isn't it strange the his body was buried at sea, so that the identity of the dead body could never be certain, when those in charge knew about theories that bin Laden wasn't dead. And now, many members of the team that took part in the raid may be dead, so that they can't tell their side of the story. For more evidence that bin Laden died long before the raid, see BBC articles here and here, a Washington Post article, and an article in New Zealand's leading newspaper showing the published death photo was a fake.
Early one morning, 50 years ago today, while his wife, Mary, slept upstairs, Ernest Hemingway went into the vestibule of his Ketchum, Idaho, house, selected his favorite shotgun from the rack, inserted shells into its chambers and ended his life. There were many differing explanations at the time: that he had terminal cancer or money problems, that it was an accident, that he’d quarreled with Mary. None were true. As his friends knew, he’d been suffering from depression and paranoia for the last year of his life. This man, who had stood his ground against charging water buffaloes, who had flown missions over Germany, who had refused to accept the prevailing style of writing but, enduring rejection and poverty, had insisted on writing in his own unique way, this man, my deepest friend, was afraid — afraid that the F.B.I. was after him. Decades later, in response to a Freedom of Information petition, the F.B.I. released its Hemingway file. It revealed that beginning in the 1940s J. Edgar Hoover had placed Ernest under surveillance because he was suspicious of Ernest’s activities in Cuba. Over the following years, agents filed reports on him and tapped his phones. In the years since, I have tried to reconcile Ernest’s fear of the F.B.I., which I regretfully misjudged, with the reality of the F.B.I. file. I now believe he truly sensed the surveillance, and that it substantially contributed to his anguish and his suicide.
Note: The view that FBI harassment contributed to Hemingway's suicide is similar to the conclusion of many observers that the FBI hounded microbiologist Bruce Ivins to death by investigating him for involvement in the anthrax attacks that occurred just after 9/11. For an important analysis of the reality of the anthrax attacks by Prof. Graeme MacQueen of McMaster University, which makes it clear they could not have been carried out by a "lone nut" as claimed by the FBI, click here.
Four decades ago, [Daniel Ellsberg] leaked a top-secret study packed with damaging revelations about U.S. conduct of the Vietnam War. On [June 13] that study, dubbed the Pentagon Papers, finally came out in complete form. The National Archives and a trio of presidential libraries released the papers 40 years after The New York Times published the first in its series on the report. Most of the 7,000-page study has been out for years. Monday's release draws it together for the first time, and online. The study reveals a pattern of deception as the Johnson, Kennedy and prior administrations secretly escalated the Vietnam conflict. The declassified report includes 2,384 pages missing from what was regarded as the most complete version of the Pentagon Papers, published in 1971 by Democratic Sen. Mike Gravel of Alaska. Ellsberg served with the Marines in Vietnam and came back disillusioned. A protegé of Nixon adviser Henry Kissinger, who called the young man his most brilliant student, Ellsberg served the administration as an analyst, tied to the Rand Corporation. The report was by a team of analysts. To this day, Ellsberg regrets staying mum for as long as he did. "I was part, on a middle level, of what is best described as a conspiracy by the government to get us into war," he said. His message to whistleblowers now: Speak up sooner. "Don't do what I did. Don't wait until the bombs start falling."
Note: Forty years later, both Democratic and Republican administrations continue to escalate war expenses while telling the public they are doing the opposite. For the powerful revelations of a top US general exposing the manipulations behind the war machine, click here. Senator Gravel is spearheading the call for an independent 9/11 investigation and prosecution of Bush and Cheney. For more on this, click here and here.
One of the reactors at the crippled Fukushima Daiichi power plant did suffer a nuclear meltdown, Japanese officials admitted for the first time today, describing a pool of molten fuel at the bottom of the reactor's containment vessel. Engineers from the Tokyo Electric Power company (Tepco) entered the No.1 reactor at the end of last week for the first time and saw the top five feet or so of the core's 13ft-long fuel rods had been exposed to the air and melted down. Now the company is worried that the molten pool of radioactive fuel may have burned a hole through the bottom of the containment vessel, causing water to leak. Tepco has not clarified what other barriers there are to stop radioactive fuel leaking if the steel containment vessel has been breached. Greenpeace said the situation could escalate rapidly if "the lava melts through the vessel". However, an initial plan to flood the entire reactor core with water to keep its temperature from rising has now been abandoned because it might exacerbate the leak. Tepco said ... that it had sealed a leak of radioactive water from the No.3 reactor after water was reportedly discovered to be flowing into the ocean. A similar leak had discharged radioactive water into the sea in April from the No.2 reactor. Greenpeace said significant amounts of radioactive material had been released into the sea and that samples of seaweed taken from as far as 40 miles of the Fukushima plant had been found to contain radiation well above legal limits.
Note: Why hasn't the Japanese government's admission of the meltdown of nuclear reactors at Fukushima been more widely reported in the press? Are the major media burying this story because of the potential harm it will do to plans for the expansion of the nuclear power industry?
A U.S. missile strike in Pakistan's North Waziristan region killed at least 25 people on [April 22], sending a clear sign that Washington's use of drones against militants along the Afghan border will continue despite rising opposition from Islamabad's top civilian and military leaders. The strike in the village of Spinwam came two days after Adm. Mike Mullen, chairman of the U.S. Joint Chiefs of Staff, held tense talks with Pakistani army chief Gen. Ashfaq Kayani amid a pall of mistrust that has weakened relations between Washington and Islamabad in recent months. Pakistan intensified its criticism of the drone campaign after a March 17 strike killed more than 40 people in the North Waziristan village of Datta Khel. Pakistani military leaders said that missile strike killed civilian tribal elders meeting to discuss a dispute over local mining rights, though the U.S. maintains that the people killed were militants. The Datta Khel strike came a day after the release of Raymond Davis, the CIA contractor whose arrest in connection with the shooting deaths of two Pakistanis brought relations between Washington and Islamabad to one of their lowest points in years. Officials in North Waziristan said [the April 22] strike killed 18 suspected militants, though seven of the dead were civilians - three women and four children. Four missiles were fired, two of which struck a guest house with the suspected militants, the officials said. The other two missiles hit another building where the women and children were.
Note: Imagine if another country were flying unmanned flights in the US and killing US citizens who they suspected were terrorists along with innocent civilians as collateral damage. There would be an uproar. Why isn't anyone talking about the legality of a foreign country killing citizens of another country without any judicial process at all, especially when the government of the invaded country opposes the attacks?
South of El Paso, Texas, on Mexico's side of the border, lies Juarez - the most dangerous city in the world. ATF [U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives] Special Agent Rene Jaquez has been stationed there for the past year, trying to keep U.S. guns from being trafficked into Mexico. "That's what we do as an agency," Jaquez said. "ATF's primary mission is to make sure that we curtail gun trafficking." That's why Jaquez tells CBS News he was so alarmed to hear his own agency may have done the opposite: encouraged U.S. gun dealers to sell to suspected traffickers for Mexico's drug cartels. Apparently, ATF hoped that letting weapons "walk" onto the street - to see where they'd end up - would help them take down a cartel. Jaquez is so opposed to the strategy, he's speaking out. "You don't let guns walk. I've never let a gun walk." Yet ATF agents told us they were ordered to let thousands of weapons walk. But ATF wasn't working alone on the case known as "Fast and Furious." Documents show ATF had conference calls with "DHS" (Homeland Security). "USMS" (U.S. Marshals) and DEA. An "ICE," or Customs agent, was on ATF's Fast and Furious team. They were advised by an "AUSA," or Assistant U.S. Attorney under the Justice Department. Jaquez says he's left wondering whether runaway violence in Mexico can be partly blamed on the agency tasked with stopping it.
Note: For many reports from reliable sources on government corruption, click here.
The US military is developing software that will let it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda. A Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an "online persona management service" that will allow one US serviceman or woman to control up to 10 separate identities based all over the world. Critics are likely to complain that it will allow the US military to create a false consensus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives. The discovery that the US military is developing false online personalities – known to users of social media as "sock puppets" – could also encourage other governments, private companies and non-government organisations to do the same. Once developed, the software could allow US service personnel, working around the clock in one location, to respond to emerging online conversations with any number of co-ordinated messages, blogposts, chatroom posts and other interventions.
Note: The Pentagon claims that the "fake persona" software will not be used on social networks in the United States, because that would break laws against using propaganda on US citizens. How much credence should be given to this assurance?
Three Metropolitan Police officers are under investigation after they were alleged to have inadvertently recorded themselves arranging to falsely arrest a protester during the student fees demonstrations. The officers, who have not been named, are alleged to have conspired to arrest a 20-year-old man who had broken through the police cordon during the protests at Parliament Square in December. The man was chased and caught and, it is alleged, was then struck in the face with a police riot shield which chipped his tooth. The officers are then alleged to have discussed how to arrest the man and are believed to have concocted a story in which they claimed the man had threatened to cause criminal damage to a nearby building. However one of the officers was wearing sound recording equipment which recorded the chase and arrest of the man and the subsequent conversation between the officers. The officers have each been served with letters telling them that they are now being investigated for gross misconduct and criminal matters – believed to be assault and false arrest. A total of 113 complaints were received by the IPCC about police officers behaviour during the four demonstrations. One of them concerns 20-year-old student Alfie Meadows, who needed brain surgery after he was allegedly struck on the head during a protest in December.
Note: For lots more on government corruption, click here.
The top U.S. military commander in Afghanistan intends to order an investigation into whether a three-star general responsible for training Afghan security forces inappropriately used members of a psychological operations team to influence visiting U.S. senators into providing more funding for the war. The U.S. command in Kabul issued a statement Thursday saying Gen. David H. Petraeus "is preparing to order an investigation to determine the facts and circumstances surrounding the issue." The investigation stems from an article published ... on the Web site of Rolling Stone magazine alleging that Lt. Gen. William Caldwell, the head of the U.S. and NATO training operation for Afghan forces, used an "information operations" team to "manipulate visiting American senators" and other visitors, including the chairman of the Joint Chiefs of Staff, Adm. Mike Mullen. The article is based on the claims of a lieutenant colonel who served on a psychological operations team in Afghanistan last year and who alleges he was subjected to retribution when he resisted the assignment.
Note: To read Rolling Stone's fascinating report on how the US military used a secret program to pressure Senators to support the war, click here.
Leaked U.S. diplomatic cables appear to show that the United States has been snooping on NATO's top official using secret sources on his own staff. Confidential cables from the U.S. mission to NATO released [on February 11] by WikiLeaks, ... said American diplomats received information on the private conversations of Secretary-General Anders Fogh Rasmussen from "a member of the NATO international staff." Instead of the staffer's name, the phrase "strictly protect" was inserted in a cable dated Sept. 10, 2009. The cable dealt with Fogh Rasmussen's proposal to improve ties with Russia by establishing contacts with the Collective Security Treaty Organization, a Russia-dominated security alliance. The cable was signed off by U.S. ambassador Ivo Daalder. There has been no known [previous] case in the past of a nation spying on the secretary-general.
Duane R. [Dewey] Clarridge parted company with the Central Intelligence Agency more than two decades ago, but from poolside at his home near San Diego, he still runs a network of spies. Over the past two years, he has fielded operatives in the mountains of Pakistan and the desert badlands of Afghanistan. Since the United States military cut off his funding in May, he has relied on like-minded private donors to pay his agents to continue gathering information about militant fighters [and] Taliban leaders. Mr. Clarridge, 78, ... was indicted on charges of lying to Congress in the Iran-contra scandal and later pardoned. His dispatches — an amalgam of fact, rumor, analysis and uncorroborated reports — have been sent to military officials who, until last spring at least, found some credible enough to be used in planning strikes against militants in Afghanistan. They are also fed to conservative commentators, including Oliver L. North, a compatriot from the Iran-contra days and now a Fox News analyst, and Brad Thor, an author of military thrillers and a frequent guest of Glenn Beck. Mr. Clarridge’s operation ... is a startling demonstration of how private citizens can exploit the chaos of combat zones and rivalries inside the American government to carry out their own agenda. It also shows how the outsourcing of military and intelligence operations has spawned legally murky clandestine operations.
Note: For key reports from reliable sources on the role of private contractors in the illegal US wars of aggression in Afganistan and Iraq, click here.
A video [that went viral] featured footage of a mid-1950s housewife on an acid trip during an LSD experiment. In the film, a researcher, Dr. Sidney Cohen, is shown interviewing, and then dosing, a volunteer at the Veteran's Administration Hospital in Los Angeles. The woman, who is identified only as the wife of a hospital employee, is in her late 20s or early 30s and appears fairly typical of her time. LSD was a legal pharmaceutical drug until 1966. Journalist Don Lattin says he came across the video in the archives of philosopher Gerald Heard while researching a group biography on him, the British writer Aldous Huxley, and Bill Wilson, co-founder of Alcoholics Anonymous. In the video that Lattin posted online, [the housewife] is clearly under the influence and appears to be rather enjoying it. She says: "Everything is alive. This is reality. I wish you could see it. I wish I could talk in technicolor." "This shows that very early on in the 1950s, researchers were aware that there were possible beneficial uses, rather than military or more nefarious uses," he says. In the early 1950s and into the '60s the Army and CIA secretly funded a lot of research to see if LSD could be used as a chemical weapon or a truth serum, says Lattin. But Cohen and his ilk were pursuing a different line of study. They wanted to understand how it works, how the mind works and the connection between the psychotic state and a spiritually enlightened state." Indeed, Wilson, the AA co-founder, did a fair amount of LSD in the 50s , says Lattin. "This surprises people, but he wasn't doing it to get high," he adds. "It was to achieve that spiritual awakening."
Note: The video of this session is quite inspiring. See it at this link. For more on mind-altering drugs, see the deeply revealing reports from reliable major media sources available here.
A seven-year effort by the Central Intelligence Agency to hide its relationship with a Swiss family who once acted as moles inside the world’s most successful atomic black market hit a turning point on [December 23] when a Swiss magistrate recommended charging the men with trafficking in technology and information for making nuclear arms. The prospect of a prosecution, and a public trial, threatens to expose some of the C.I.A.’s deepest secrets if defense lawyers try to protect their clients by revealing how they operated on the agency’s behalf. The three men — Friedrich Tinner and his two sons, Urs and Marco — helped run the atomic smuggling ring of A. Q. Khan, an architect of Pakistan’s nuclear bomb program, officials in several countries have said. In return for millions of dollars, according to former Bush administration officials, the Tinners secretly worked for the C.I.A. as well, not only providing information about the Khan network’s manufacturing and sales efforts, which stretched from Iran to Libya to North Korea, but also helping the agency introduce flaws into the equipment sent to some of those countries. A trial ... could also expose in court a tale of C.I.A. break-ins in Switzerland, and of a still unexplained decision by the agency not to seize electronic copies of a number of nuclear bomb designs found on the computers of the Tinner family. Ultimately, copies of those blueprints were found around the globe on the computers of members of the Khan network.
Note: This report establishes yet another connection between a secret nuclear materials network linking both Khan and US government officials, parts of which were divulged by FBI whistleblower Sibel Edmonds, who identified moles working with Khan in both the US State Department and the Pentagon. For more on these highly suspicious networks, click here.
Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators. The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing. The months-long investigation [by The Washington Post], based on nearly 100 interviews and 1,000 documents, found that: * Technologies and techniques honed for use on the battlefields of Iraq and Afghanistan have migrated into the hands of law enforcement agencies in America. * The FBI is building a database with the names and certain personal information, such as employment history, of thousands of U.S. citizens and residents whom a local police officer or a fellow citizen believed to be acting suspiciously. * Law enforcement agencies have hired as trainers self-described experts whose extremist views on Islam and terrorism are considered inaccurate and counterproductive by the FBI and U.S. intelligence agencies. * The Department of Homeland Security sends its state and local partners intelligence reports with little meaningful guidance, and state reports have sometimes inappropriately reported on lawful meetings.
Note: This report is part of a series, "Top Secret America," by The Washington Post. For more, click here.
WikiLeaks' publication starting Nov. 28 of more than 250,000 diplomatic cables was the largest unauthorized release of contemporary classified information in history. It contained 11,000 documents marked secret. The WikiLeaks revelations could change history. The number of documents and other communications [classified as secret] has skyrocketed nearly 10 times, from 5,685,462 in 1996 to 54,651,765 in 2009. Governments are calling more things secret when they are really not. The number of people with access to that Everest of information has grown too. In its deep investigation of American secrecy earlier this year, the Washington Post found that some 854,000 people inside and out of government had top-secret clearance, the highest classification. [Julian Assange] has launched a crusade predicated on the idea that nearly all information should be free and that confidentiality in government affairs is an affront to the governed. In the process, he has published everything from a video of U.S. troops killing civilians in Iraq to the documents behind the so-called Climategate scandal. "When trusted insiders no longer have faith in the judgment of government regarding secrets, then they start to substitute their own judgment," says William J. Bosanko, head of the Information Security Oversight Office. "The world is moving irreversibly in the direction of openness, and those who learn to operate with fewer secrets will ultimately have the advantage over those who futilely cling to a past in which millions of secrets can be protected," says a former intelligence-community official.
Note: For an abundance of major media articles showing the problems with excessive secrecy, click here.
The latest one snared Osman Mohamud, a Somali-American teenager in Portland, Oregon. The Associated Press report by William Mall and Nedra Pickler (11-27-10) ... makes it clear that it was a plot orchestrated by federal agents. Two sentences into the news report we have this: "The bomb was an elaborate fake supplied by the [FBI] agents and the public was never in danger, authorities said." The teenager was supplied with a fake bomb and a fake detonator. Documents released by US Attorney Dwight Holton "show the sting operation began in June." Obviously, the targeted Portland teenager was not hot to trot. The FBI had to work on him for six months. The reporters compare "the Portland sting" to the recent arrest in Virginia of Faroque Ahmed who was ensnared in a "bombing plot that was a ruse conducted over the past six months by federal officials." Think about this. The FBI did a year's work in order to convince two people to participate in fake plots. When the US government has to go to such lengths to create "terrorists" out of hapless people, an undeclared agenda is being served. What could this agenda be? The answer is many agendas. One agenda is to justify wars of aggression that are war crimes under the Nuremberg standard created by the US government itself. Another agenda is to create a police state. A police state can control people who object to their impoverishment for the benefit of the superrich much more easily than can a democracy endowed with constitutional civil liberties. Another agenda is to get rich. Terror plots, whether real or orchestrated, have created a market for security.
Note: Though the source of this article is not considered major media, the writer, Paul Craig Roberts, served as an Assistant Secretary of the Treasury in the Reagan administration, earning fame as a co-founder of Reaganomics. He is a former editor and columnist for the Wall Street Journal, Business Week, and Scripps-Howard News Service. Roberts has been a critic of both Democratic and Republican administrations.
[Introduction] An internal history of the United States government’s Nazi-hunting operation provides gripping new evidence about some of the most notorious Nazi cases of the last three decades. The Justice Department kept the 600-page report secret for the last four years, releasing a heavily redacted version last month to a private research group that sued to force its release. A complete version was obtained by The New York Times. [From the document] In the 1970s, the public was shocked to leam that some Nazi persecutors had emigrated to the United States. There were calls for their expulsion and legislation was passed to facilitate their deportation. OSI was created in 1979 to handle the caseload. The Office of Special Investigations (OSI) is often referred to as the government's "Nazi-hunting" organization. While the cases and projects are individually fascinating, this report was not written simply to recount a series of unrelated but interesting undertakings. It is designed to serve as a teaching and research tool for historians, the media, academics, policy makers and the general public. While one would hope that the Holocaust was such an aberration that its like would never recur, the world has since learned of new and horrific genocidal undertakings. Bosnia, Cambodia, Croatia, Iraq, Rwanda, Serbia and Sudan are among the all too-many countries involved. These societies will inevitably have to confront some of the same issues which faced OSI.
Note: This suppressed report contains clear evidence that top Nazi war criminals were given aliases and allowed to escape prosection by elements both outside and inside of government. For even more powerful evidence from released US government documents that top government leaders felt the need for mind control techniques developed by the Nazi's warranted secretly protecting and eventually working with some of the most heartless of the Nazis, click here.
A secret internal history of the Justice Department’s Nazi-hunting unit, the Office of Special Investigations, chronicles numerous hidden chapters in the office’s 31-year-existence. But a heavily redacted version of the report turned over by the Justice Department in response to a lawsuit deletes more than 1,000 passages in the report, including many of the most intriguing references. Here is a sampling of the original passages in the unredacted report, obtained by the New York Times, as compared with the deleted versions. The full report details how the United States became a “safe haven” for some Nazis, with some American officials actively working to help persecutors gain entry to the United States and conceal their identities and crimes. But the redacted version prepared by the Justice Department omits many of the central elements of these cases. The redacted report omits the debate within the CIA in 1953 over what Otto von Bolschwing, a Nazi associate of Adolph Eichmann who became a CIA asset, should tell immigration officials or others in the United States if confronted about his Nazi past. It also deletes references to what American officials knew about his atrocities, including the assertion from a Justice Department officials that he might “be guilty of acts more heinous than anyone else currently under investigation.” [many additional examples follow]
Note: This suppressed report contains clear evidence that top Nazi war criminals were given aliases and allowed to escape prosecution by elements both outside and inside of government. For even more powerful evidence from released US government documents that top government leaders felt the need for mind control techniques developed by the Nazi's warranted secretly protecting and eventually working with some of the most heartless of the Nazis, click here.
A special prosecutor cleared CIA employees ... of any criminal charges for destroying videotapes that showed waterboarding of terror suspects, even though two sources close to the case say a key witness was never questioned. The sources, who spoke on condition of anonymity, said that special counsel John Durham never issued a grand jury subpoena for testimony from Jose Rodriguez, the CIA's former top clandestine officer, who approved the destruction of the tapes. Rodriguez' lawyer, Bob Bennett, had made clear that his client would not testify without a grant of immunity. But Durham's failure to call Rodriguez, or even question him as a witness, surprised one lawyer close to the case, indicating it could raise questions about the special counsel's claim that he had conducted a "thorough" investigation. The decision not to prosecute anyone in the videotape destruction came five years to the day after the CIA destroyed its cache of 92 videos of two al-Qaida operatives, Abu Zubaydah and Abd al-Nashiri, being subjected to waterboarding, which evokes the sensation of drowning. The deadline for prosecuting someone under most federal laws is five years. Jamell Jaffer, a lawyer for the ACLU, criticized the decision. "The problem here is not just the destruction of the tapes, but what the tapes depicted – interrogators using barbaric methods endorsed at the highest levels of the government."
Note: It appears that the courts are not willing to put a stop to the increasing criminality and usurpations of power of the National Security State. For abundant documentation from major media sources of the illegalities and atrocities committed by US intelligence and military in the GWOT, click here.
American authorities sent David C. Headley, a small-time drug dealer and sometime informant, to work for them in Pakistan months after the Sept. 11, 2001, attacks, despite a warning that he sympathized with radical Islamic groups. Not long after Mr. Headley arrived there, he began training with terrorists, eventually playing a key role in the 2008 attacks that left 164 people dead in Mumbai. The October 2001 warning was dismissed, the authorities said, as the ire of a jilted girlfriend and for lack of proof. Less than a month later, those concerns did not come up when a federal court in New York granted Mr. Headley an early release from probation so that he could be sent to work for the United States Drug Enforcement Administration in Pakistan. It is unclear what Mr. Headley was supposed to do in Pakistan for the Americans. Two of the former drug dealer's ex-wives had gone to American authorities between 2005 and 2008, before the Mumbai attacks, to say they feared he was plotting with terrorists. Combined with the earlier warning from the former girlfriend, three of the women in Mr. Headley's life reported his ties to terrorists, only to have those warnings dismissed. An examination of Mr. Headley's story shows that his government ties ran far deeper and longer than previously known. One senior American official knowledgeable about the case said he believed that Mr. Headley was a D.E.A. informant until at least 2003, meaning that he was talking to American agencies even as he was learning to deal with explosives and small arms in terrorist training camps.
Note: This story certainly raises the question whether the Mumbai attacks were not in fact a false-flag operation. For many reports from reliable sources that reveal similar ties between government agencies running clandestine operations and terrorist attacks, click here.
The British military has been training interrogators in techniques that include threats, sensory deprivation and enforced nakedness in an apparent breach of the Geneva conventions. Training materials drawn up secretly in recent years tell interrogators they should aim to provoke humiliation, insecurity, disorientation, exhaustion, anxiety and fear in the prisoners they are questioning, and suggest ways in which this can be achieved. A manual prepared in April 2008 suggests that "Cpers" – captured personnel – be kept in conditions of physical discomfort and intimidated. Sensory deprivation is lawful, it adds, if there are "valid operational reasons". It also urges enforced nakedness. More recent training material says blindfolds, earmuffs and plastic handcuffs are essential equipment for military interrogators, and says that while prisoners should be allowed to sleep or rest for eight hours in each 24, they need be permitted only four hours unbroken sleep. It also suggests that interrogators tell prisoners they will be held incommunicado unless they answer questions. The 1949 Geneva conventions prohibit any "physical or moral coercion", in particular any coercion employed to obtain information. All the British classified training material was produced after the death of Baha Mousa, the Iraqi hotel receptionist tortured to death by British troops in Basra in September 2003.
Note: For a survey of historic and contemporary uses of torture, click here. For more disturbing information on how Nazi torture techniques were eventually used by the CIA for mind control, click here.
Ahmed Wali Karzai, the half-brother of Afghanistan’s president and boss of the strategically important Kandahar province, has been on the CIA payroll for over a decade, Bob Woodward writes in his new book, Obama’s Wars. By the fall of 2008, Woodward says, “Ahmed Wali Karzai had been on the CIA payroll for years, beginning before 9/11. He had belonged to the CIA's small network of paid agents and informants inside Afghanistan. In addition, the CIA paid him money through his half-brother, the president.” Hamid Karzai was plucked from obscurity and installed as president after U.S.-backed Afghan forces chased the Taliban from power following the Sept. 11, 2001, attacks. There have been many accounts of his brother’s relationship with the CIA over the years, leaving the impression that he is a CIA “agent,” i.e., a controlled asset of the spy agency. But Woodward’s account of the CIA’s relationship with Karzai, who has also been accused repeatedly -- but not charged with -- protecting the illicit opium trade, is more nuanced. “He was not in any sense a controlled agent who always responded to U.S. and CIA requests and pressure,” Woodward writes. “He was his own man, playing all sides against the others -- the United States, the drug dealers, the Taliban and even his brother if necessary.”
Note: What this article fails to mention is that President Karzai was also an employee of the major oil company Unocal, as reported in this Chicago Tribune article.
That photo of the Rev. Dr. Martin Luther King, Jr. riding one of the first desegregated buses in Montgomery, Ala.? He took it. The well-known image of black sanitation workers carrying “I Am a Man” signs in Memphis? His. He was there in Room 306 of the Lorraine Hotel, Dr. King’s room, on the night he was assassinated. But now an unsettling asterisk must be added to the legacy of Ernest C. Withers, one of the most celebrated photographers of the civil rights era: He was a paid F.B.I. informer. On [September 12], The Commercial Appeal in Memphis published the results of a two-year investigation that showed Mr. Withers, who died in 2007 at age 85, had collaborated closely with two F.B.I. agents in the 1960s to keep tabs on the civil rights movement. From at least 1968 to 1970, Mr. Withers, who was black, provided photographs, biographical information and scheduling details to two F.B.I. agents in the bureau’s Memphis domestic surveillance program, Howell Lowe and William H. Lawrence, according to numerous reports summarizing their meetings. The reports were obtained by the newspaper under the Freedom of Information Act and posted on its Web site. While he was growing close to top civil rights leaders, Mr. Withers was also meeting regularly with the F.B.I. agents, disclosing details about plans for marches and political beliefs of the leaders, even personal information like the leaders’ car tag numbers.
Note: For a fascinating CNN interview with civil rights leader and former Atlanta mayor Andrew Young on this issue, click here. For key reports from reliable sources raising unanswered questions about the assassination of Martin Luther King and other major US political leaders, click here.
Germany’s intelligence service has turned over thousands of files on top Nazi Adolf Eichmann’s whereabouts after World War II to a journalist who sued for them. But with so many passages blacked out and pages missing, she’s taking the matter back to court. An attorney for freelance reporter Gabriele Weber said ... he was confident that she would win greater access eventually, even though Chancellor Angela Merkel’s office has argued that some Eichmann files should stay secret. Last week, Weber went to see the government files on the man known as the “architect of the Holocaust” for coordinating the Nazi’s genocide policy. She was surprised to find some 1,000 pages missing, despite a federal court’s order in April that the intelligence agency, the BND, could not keep all of the documents secret. Of the pages she did receive, much of the information was blacked out. Weber hopes the files will shed more light on missing pieces of the [Eichmann] puzzle. Who helped him escape? How much did Germany know about where he was? Is there more to the story of his capture?
Note: Why are these documents from over 60 years ago still being censored? Could it be that the Vatican and allies were secretly working together to allow key German leaders to escape? For lots more on this learn about Operation Paperclip here and here.
With Mir Hossein Mousavi as the de facto leader of the opposition movement, the mass executions of the 1980s have become a hot topic among Iranians and Iran watchers, including many readers of this site. Mousavi was prime minister in that decade. Though this article was first published in 1986, it lends a new perspective to the issue, at least with respect to the thousands of executions that took place in the early 1980s. The CIA's assistance to Ayatollah Khomeini, which apparently prompted the executions, is not a well-known fact: The Reagan administration's secret overtures and arms shipments to Iran are part of a seven-year-long pattern of covert Central Intelligence Agency operations -- some dating back to the Carter administration -- that were designed both to curry favor with the regime of Ayatollah Ruhollah Khomeini and support Iranian exiles who seek to overthrow it, according to informed sources. In 1983, for example, the CIA participated in a secret operation to provide a list of Soviet KGB agents and collaborators operating in Iran to the Khomeini regime, which then executed up to 200 suspects. Khomeini also expelled 18 Soviet diplomats, imprisoned the Tudeh party leaders and publicly thanked God for "the miracle" leading to the arrests of the "treasonous leaders." At the same time, secret presidential intelligence orders, called "findings," authorized the CIA to support Iranian exiles opposed to the Khomeini regime, the sources said.
The aide to President Hamid Karzai of Afghanistan at the center of a politically sensitive corruption investigation is being paid by the Central Intelligence Agency, according to Afghan and American officials. Mohammed Zia Salehi, the chief of administration for the National Security Council, appears to have been on the payroll for many years, according to officials in Kabul and Washington. It is unclear exactly what Mr. Salehi does in exchange for his money, whether providing information to the spy agency, advancing American views inside the presidential palace, or both. Mr. Salehi’s relationship with the C.I.A. underscores deep contradictions at the heart of the Obama administration’s policy in Afghanistan, with American officials simultaneously demanding that Mr. Karzai root out the corruption that pervades his government while sometimes subsidizing the very people suspected of perpetrating it. Other prominent Afghans who American officials have said were on the C.I.A.’s payroll include the president’s half brother, Ahmed Wali Karzai, suspected by investigators of playing a role in Afghanistan’s booming opium trade. Over the course of the nine-year-old war, the C.I.A. has enmeshed itself in the inner workings of Afghanistan’s national security establishment. From 2002 until just last year, the C.I.A. paid the entire budget of Afghanistan’s spy service, the National Directorate of Security.
Note: For key reports on the corruption and profiteering that are the real fuels for war, click here.
Nearly 60 years ago, a French town was hit by a sudden outbreak of hallucinations, which left five people dead and many seriously ill. On 16 August 1951, postman Leon Armunier was doing his rounds in the southern French town of Pont-Saint-Esprit when he was suddenly overwhelmed by nausea and wild hallucinations. "It was terrible. I had the sensation of shrinking and shrinking, and the fire and the serpents coiling around my arms," he remembers. Leon, now 87, fell off his bike and was taken to the hospital in Avignon. Over the coming days, dozens of other people in the town fell prey to similar symptoms. Doctors at the time concluded that bread at one of the town's bakeries had become contaminated by ergot, a poisonous fungus that occurs naturally on rye. That view remained largely unchallenged until 2009, when an American investigative journalist, Hank Albarelli, revealed a CIA document labelled: "Re: Pont-Saint-Esprit and F.Olson Files. SO Span/France Operation file, inclusive Olson. Intel files. Hand carry to Belin - tell him to see to it that these are buried." F. Olson is Frank Olson, a CIA scientist who, at the time of the Pont St Esprit incident, led research for the agency into the drug LSD. David Belin, meanwhile, was executive director of the Rockefeller Commission created by the White House in 1975 to investigate abuses carried out worldwide by the CIA. Albarelli believes the Pont-Saint-Esprit and F. Olson Files, mentioned in the document, would show - if they had not been "buried" - that the CIA was experimenting on the townspeople, by dosing them with LSD.
Note: Frank Olson later had his drink spiked with LSD and allegedly committed suicide shortly thereafter. Yet many believe he was "suicided" as he was having misgivings about his involvement in this program and considering spilling the beans, as reported in this news article. For an overview of CIA mind-control experimentation, click here.
For six years, Nicholas Merrill has lived in a surreal world of half-truths, where he could not tell even his fiancee, his closest friends or his mother that he is "John Doe" -- the man who filed the first-ever court challenge to the FBI's ability to obtain personal data on Americans without judicial approval. No one knew he was the plaintiff challenging the FBI's authority to issue "national security letters," as they are known, and its ability to impose a gag on the recipient. Now, following the partial lifting of his gag order 11 days ago as a result of an FBI settlement, Merrill can speak openly for the first time about the experience, although he cannot disclose the full scope of the data demanded. "One of the most dangerous and troubling things about the FBI's national security letter powers is how much it has been shrouded in secrecy," said Melissa Goodman, a lawyer with the American Civil Liberties Union who helped Merrill sue the government in April 2004 and was one of only a handful of people outside the FBI -- all lawyers -- who knew Merrill had received a letter. The FBI between 2003 and 2006 issued more than 192,500 letters -- an average of almost 50,000 a year. The Justice Department inspector general in 2007 faulted the bureau for failing to adequately justify the issuance of such letters.
Note: For key reports from major media sources on the erosion of civil liberties by government, click here.
The Obama administration has significantly expanded a largely secret U.S. war against al-Qaeda and other radical groups, according to senior military and administration officials. Special Operations forces have grown both in number and budget, and are deployed in 75 countries, compared with about 60 at the beginning of last year. In addition to units that have spent years in the Philippines and Colombia, teams are operating in Yemen and elsewhere in the Middle East, Africa and Central Asia. Plans exist for preemptive or retaliatory strikes in numerous places around the world. Obama, one senior military official said, has allowed "things that the previous administration did not." Special Operations commanders have also become a far more regular presence at the White House than they were under George W. Bush's administration. The Special Operations capabilities requested by the White House go beyond unilateral strikes and include the training of local counterterrorism forces and joint operations with them. Obama has made such forces a far more integrated part of his global security strategy. He has asked for a 5.7 percent increase in the Special Operations budget for fiscal 2011, for a total of $6.3 billion, plus an additional $3.5 billion in 2010 contingency funding.
Note: For an analysis, click here. For lots more from reliable sources about the war crimes committed ongoingly by the US military and Special Forces worldwide, click here.
The CIA received secret permission to attack a wider range of targets, including suspected militants whose names are not known, as part of a dramatic expansion of its campaign of drone strikes in Pakistan's border region. The expanded authority, approved two years ago by the Bush administration and continued by President Obama, permits the agency to rely on what officials describe as "pattern of life" analysis ... to target suspected militants, even when their full identities are not known, the officials said. Previously, the CIA was restricted in most cases to killing only individuals whose names were on an approved list. Instead of just a few dozen attacks per year, CIA-operated unmanned aircraft now carry out multiple missile strikes each week against safe houses, training camps and other hiding places used by militants in the tribal belt bordering Afghanistan. "There are a lot of ethical questions here about whether we know who the targets are," said Loch Johnson, an intelligence scholar at the University of Georgia and a former congressional aide. President Bush secretly decided in his last year in office to expand the program. Obama has continued and even streamlined the process, so that CIA Director Leon E. Panetta can sign off on many attacks without notifying the White House beforehand, an official said.
Note: How can the CIA be allowed to kill people whose names aren't even known? Why are they allowed to kill anyone without some form of judicial process? For more on this secret and expanding CIA assassination program, click here. For analysis, click here.
Porter J. Goss, the former director of the Central Intelligence Agency, in 2005 approved of the decision by one of his top aides to destroy dozens of videotapes documenting the brutal interrogation of two detainees, according to an internal C.I.A. document released [on April 15]. Shortly after the tapes were destroyed at the order of Jose A. Rodriguez Jr., then the head of the C.I.A.�s clandestine service, Mr. Goss told Mr. Rodriguez that he �agreed� with the decision, according to the document. He even joked after Mr. Rodriguez offered to �take the heat� for destroying the tapes. �PG laughed and said that actually, it would be he, PG, who would take the heat,� according to one document. A number of documents released Thursday provide the most detailed glimpse yet of the deliberations inside the C.I.A. surrounding the destroyed tapes, and of the concern among officials at the spy agency that the decision might put the C.I.A. in legal jeopardy. The documents detailing those deliberations, including two e-mail messages from a C.I.A. official whose name has been excised, were released as part of a Freedom of Information Act lawsuit filed by the American Civil Liberties Union. According to one of the e-mail messages released Thursday, Mr. Rodriguez told Mr. Goss that the tapes ... would make the C.I.A. �look terrible; it would be devastating to us.�
Note: For lots more on the realities of the "war on terror", click here.
The director of national intelligence affirmed rather bluntly today that the U.S. intelligence community has authority to target American citizens for assassination if they present a direct terrorist threat to the United States. "We take direct actions against terrorists in the intelligence community; if we think that direct action will involve killing an American, we get specific permission to do that," Director of National Intelligence Dennis Blair told the House Intelligence Committee. "Whether that American is involved in a group that is trying to attack us, whether that American ... is a threat to other Americans. Those are the factors involved." Blair explained. According to U.S. officials, only a handful of Americans would be eligible for targeting by U.S. intelligence or military operations. The DNI said that Internet and social media sites have become critical to terrorism recruitment efforts. "The homegrown radicalization of people in the United States is a relatively new thing." Blair said U.S. intelligence was rapidly working to counter the emerging problem.
Note: To read a valuable commentary on Director of National Intelligence Dennis Blair's claimed "war exception" to the Constitution, permitting assassination of American citizens by the US military and intelligence services without judicial review or legal process of any kind, click here. For the views of several legal experts, click here.
The CIA sequence for a Predator strike ends with a missile but begins with a memo. Usually no more than two or three pages long, it bears the name of a suspected terrorist, the latest intelligence on his activities, and a case for why he should be added to a list of people the agency is trying to kill. No U.S. citizen has ever been on the CIA's target list. But that is expected to change as CIA analysts compile a case against a Muslim cleric who was born in New Mexico but now resides in Yemen. He is a U.S. citizen and until recently was mainly known as a preacher espousing radical Islamic views. Awlaki's status as a U.S. citizen requires special consideration, according to former officials familiar with the criteria for the CIA's targeted killing program. But while Awlaki has not yet been placed on the CIA list, the officials said it is all but certain that he will be. The CIA has carried out Predator attacks in Yemen since at least 2002, when a drone strike killed six suspected Al Qaeda operatives traveling in a vehicle across desert terrain. The agency knew that one of the operatives was an American, Kamal Derwish, who was among those killed. Derwish was never on the CIA's target list, officials said, and the strike was aimed at a senior Al Qaeda operative.
Note: As the last few sentences of this long report indicate, assassination of their own citizens by US military and intelligence agencies has been going on for years. For many key reports from reliable sources on assassination as state policy, click here.
President Obama will maintain a lid of secrecy on millions of pages of military and intelligence documents that were scheduled to be declassified by the end of the year. The missed deadline spells trouble for the White House’s promises to introduce an era of government openness, say advocates, who believe that releasing historical information enforces a key check on government behavior. They cite as an example the abuses by the Central Intelligence Agency during the Cold War, including domestic spying and assassinations of foreign officials, that were publicly outlined in a set of agency documents known as the "family jewels." The White House has given the agencies ... an extension beyond Dec. 31 of an undetermined length - possibly years. It will be the third such extension: Clinton granted one in 2000 and Bush granted one in 2003. The documents, dating from World War II to the early 1980s, cover the gamut of foreign relations, intelligence activities, and military operations. The records in question are held by the Central Intelligence Agency; the National Security Agency; the departments of Justice, State, Defense, and Energy; and other security and intelligence agencies. None of the agencies involved responded to requests for comment. Steven Aftergood, a specialist on government secrecy at the Federation of American Scientists in Washington [said] "If binding deadlines can be extended more or less at will, then any new declassification requirements will be similarly subject to doubt or defiance."
Note: These documents are all more than 25 years old. Why can't the public know what their government is trying to hide from them? For lots more on government secrecy, click here.
Just a few years ago Ed Munyak, a fire protection engineer for the city of San Jose, seemed like a lonely, out-there figure, a sometimes-target because of his outspoken position on the events of Sept. 11, 2001. These days, hundreds of other building trade professionals have joined him in challenging the official narrative about the collapse of three buildings at New York's World Trade Center (WTC) on that fateful, traumatic day. Munyak, of Los Altos Hills, is a mechanical and fire engineer whose job is to review building plans to ensure they comply with the California Building and Fire Code. In 2007, after speaking out on his own for a few years, Munyak signed on with a then-fledging organization called Architects and Engineers for 911 Truth, founded by Bay Area architect Richard Gage. Today, far from being isolated, Munyak now counts as allies 804 professional architects and building engineers from around the country. Collectively, they have joined Munyak's call for an independent technical investigation of the causes of the WTC buildings collapse. In doing so, they reject the federal government's conclusions that two airplanes alone brought the buildings down—without the aid of pre-planted explosives. Munyak and his fellow AE911 supporters recently received acknowledgement from the FBI's counterterrorism division, which concluded that the organization's core evidence deserves—and will get—FBI scrutiny. In a letter, Deputy Director Michael J. Heimbach assessed AE911's presentation as "backed by thorough research and analysis."
Note: WantToKnow Team member David Ray Griffin has just published a detailed critique of the fraudulent "science" in the latest government publication defending the official account of the collapse of WTC 7.
The murder of President Kennedy was a seminal event for me and for millions of Americans. It changed the course of history. It was a crushing blow to our country and to millions of people around the world. Today, ... profound doubts persist about how President Kennedy was killed and why. My film "JFK" was a metaphor for all those doubts, suspicions and unanswered questions. Now an extraordinary new book offers the best account I have read of this tragedy and its significance. That book is James Douglass's JFK and the Unspeakable: Why He Died and Why It Matters. In his beautifully written and exhaustively researched treatment, Douglass lays out the "motive" for Kennedy's assassination. Simply, he traces a process of steady conversion by Kennedy from his origins as a traditional Cold Warrior to his determination to pull the world back from the edge of destruction. Many of these steps are well known, such as Kennedy's disillusionment with the CIA after the disastrous Bay of Pigs Invasion, and his refusal to follow the reckless recommendations of the Joint Chiefs of Staff in resolving the Cuban Missile Crisis. But many of his steps remain unfamiliar: Kennedy's back-channel dialogue with Khrushchev and their shared pursuit of common ground; his secret opening to dialogue with Fidel Castro (ongoing the very week of his assassination); and his determination to pull out of Vietnam after his probable re-election in 1964. All of these steps caused him to be regarded as a virtual traitor by elements of the military-intelligence community. These were the forces that planned and carried out his assassination.
Note: For more on this important book, click here. For an excellent collection of the best information, videos, books, and essays on the John F. Kennedy assassination, click here.
Five Muslim community workers have accused MI5 of waging a campaign of blackmail and harassment in an attempt to recruit them as informants. The men claim they were given a choice of working for the Security Service or face detention and harassment in the UK and overseas. They have made official complaints to the police, to the body which oversees the work of the Security Service and to their local MP Frank Dobson. Now they have decided to speak publicly about their experiences in the hope that publicity will stop similar tactics being used in the future. Three of the men say they were detained at foreign airports on the orders of MI5 after leaving Britain on family holidays last year. After they were sent back to the UK, they were interviewed by MI5 officers who, they say, falsely accused them of links to Islamic extremism. On each occasion the agents said they would lift the travel restrictions and threat of detention in return for their co-operation. When the men refused some of them received what they say were intimidating phone calls and threats. Two other Muslim men say they were approached by MI5 at their homes after police officers posed as postmen. Each of the five men, aged between 19 and 25, was warned that if he did not help the security services he would be considered a terror suspect. A sixth man was held by MI5 for three hours after returning from his honeymoon in Saudi Arabia. He too claims he was threatened with travel restrictions if he tried to leave the UK."
Note: For lots more on the "war on terror" from reliable sources, click here.
The National Security Agency (NSA) is developing a tool that George Orwell's Thought Police might have found useful: an artificial intelligence system designed to gain insight into what people are thinking. The device will be able to respond almost instantaneously to complex questions posed by intelligence analysts. As more and more data is collectedthrough phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records - it may one day be possible to know not just where people are and what they are doing, but what and how they think. The system is so potentially intrusive that at least one researcher has quit, citing concerns over the dangers in placing such a powerful weapon in the hands of a top-secret agency with little accountability. Known as Aquaint, which stands for "Advanced QUestion Answering for INTelligence," the project was run for many years by John Prange, an NSA scientist at the Advanced Research and Development Activity. A supersmart search engine, capable of answering complex questions ... would be very useful for the public. But that same capability in the hands of an agency like the NSA - absolutely secret, often above the law, resistant to oversight, and with access to petabytes of private information about Americans - could be a privacy and civil liberties nightmare. "We must not forget that the ultimate goal is to transfer research results into operational use," said ... Prange.
Note: Watch a highly revealing PBS Nova documentary providing virtual proof that the NSA could have stopped 9/11 but chose not to. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Over the past week the media was gripped by the news that the FBI was about to charge Bruce Ivins, a leading anthrax expert, as the man responsible for the anthrax letter attacks in September/October 2001. But despite the seemingly powerful narrative that Ivins committed suicide because investigators were closing in, this is still far from a shut case. The FBI needs to explain why it zeroed in on Ivins, how he could have made the anthrax mailed to lawmakers and the media, and how he (or anyone else) could have pulled off the attacks, acting alone. The spores could not have been produced at the U.S. Army Medical Research Institute of Infectious Diseases, where Ivins worked, without many other people being aware of it. Furthermore, the equipment to make such a product does not exist at the institute. The product contained essentially pure spores. The particle size was 1.5 to 3 microns in diameter. There are several methods used to produce anthrax that small. But most of them require milling the spores to a size small enough that it can be inhaled into the lower reaches of the lungs. In this case, however, the anthrax spores were not milled. They were also tailored to make them potentially more dangerous. The spores were coated with a polyglass which tightly bound hydrophilic silica to each particle. Each particle was given a weak electric charge, thereby causing the particles to repel each other at the molecular level. This made it easier for the spores to float in the air, and increased their retention in the lungs. In short, the potential lethality of anthrax in this case far exceeds that of any powdered product found in the now extinct U.S. Biological Warfare Program.
Nearly 40 years ago, the FBI was roundly criticized for investigating Americans without evidence [that] they had broken any laws. Now, critics fear the FBI may be gearing up to do it again. Tentative Justice Department guidelines, to be released later this summer, would let agents investigate people whose backgrounds -- and potentially their race or ethnicity -- match the traits of terrorists. Such profiling ... echoes the FBI's now-defunct COINTELPRO, an operation under Director J. Edgar Hoover in the 1950s and 1960s to monitor and disrupt groups with communist and socialist ties. Before it was shut down in 1971, the domestic spying operation -- formally known as Counterintelligence Programs -- had expanded to include civil rights groups, anti-war activists, ... state legislators and journalists. Among the FBI's targets were Martin Luther King Jr., Malcolm X, and John Lennon, along with members of black [political] groups ... and student protesters. The new proposal to allow investigations of Americans with no evidence of wrongdoing is "COINTELPRO for the 21st century," said Barry Steinhardt of the American Civil Liberties Union. "But this is much more insidious because it could involve more people. In the days of COINTELPRO, they were watching only a few people. Now they could be watching everyone."
Note: For many disturbing reports on threats to civil liberties, click here.
On the morning of 9 February 2004, The New York Times carried an exclusive and alarming story. The paper's Baghdad correspondent, Dexter Filkins, reported that US officials had obtained a 17-page letter, believed to have been written by the notorious terrorist Abu Musab al Zarqawi to the "inner circle" of al-Qa'ida's leadership, urging them to accept that the best way to beat US forces in Iraq was effectively to start a civil war. The story went on to news agency wires and, within 24 hours, it was running around the world. There is very good reason to believe that that letter was a fake – and a significant one because there is equally good reason to believe that it was one product among many from a new machinery of propaganda which has been created by the United States and its allies since the terrorist attacks of September 2001. For the first time in human history, there is a concerted strategy to manipulate global perception. And the mass media are operating as its compliant assistants, failing both to resist it and to expose it. The sheer ease with which this machinery has been able to do its work reflects a creeping structural weakness which now afflicts the production of our news. The "Zarqawi letter" which made it on to the front page of The New York Times in February 2004 was one of a sequence of highly suspect documents which were said to have been written either by or to Zarqawi and which were fed into news media. This material is being generated, in part, by intelligence agencies who continue to work without effective oversight; and also by a new ... structure of "strategic communications" which was originally designed ... in the Pentagon and Nato.
Note: This article is an edited excerpt from investigative journalist Nick Davies' new book, Flat Earth News: an award-winning reporter exposes falsehood, distortion and propaganda in the global media. To read about or purchase it, click here. For a highly revealing two-page summary of 20 award-winning journalists describing how huge stories they tried to report were shut down by corporate media ownership, click here.
The FBI is embarking on a $1 billion effort to build the world's largest computer database of peoples' physical characteristics, a project that would give the government unprecedented abilities to identify individuals in the United States and abroad. Digital images of faces, fingerprints and palm patterns are already flowing into FBI systems. Next month, the FBI intends to award a 10-year contract that would significantly expand the amount and kinds of biometric information it receives. And in the coming years, law enforcement authorities around the world will be able to rely on iris patterns, face-shape data, scars and perhaps even the unique ways people walk and talk, to ... identify [people]. The increasing use of biometrics for identification is raising questions about the ability of Americans to avoid unwanted scrutiny. It is drawing criticism from those who worry that people's bodies will become de facto national identification cards. "It's going to be an essential component of tracking," said Barry Steinhardt, director of the Technology and Liberty Project of the American Civil Liberties Union. "It's enabling the Always On Surveillance Society." The FBI's biometric database ... communicates with the Terrorist Screening Center's database of suspects and the National Crime Information Center database, which is the FBI's master criminal database of felons, fugitives and terrorism suspects. At the West Virginia University Center for Identification Technology Research (CITeR) ... researchers are working on capturing images of people's irises at distances of up to 15 feet, and of faces from as far away as 200 yards. Soon, those researchers will do biometric research for the FBI. Covert iris- and face-image capture is several years away, but it is of great interest to government agencies.
Note: For many important major-media reports on threats to privacy, click here.
CIA Director Michael Hayden has mounted a highly unusual challenge to his agency's chief watchdog, ordering an internal investigation of an inspector general who has issued a series of reports sharply critical of top CIA officials. Hayden is seeking to rein in an inspector general who has used the office to bring ... scrutiny upon CIA figures from former Director George Tenet to undercover operatives running secret overseas prison sites. The investigation is focused on ... CIA Inspector General John Helgerson and his office, particularly whether they were fair and impartial in their scrutiny of the agency's terrorist detention and interrogation programs. Officials said that the investigation also will span other subjects and that it already has expanded since its start months ago. U.S. intelligence officials concerned about the inquiry said it is unprecedented and could threaten the independence of the inspector general position. The investigation "could at least lead to appearances he's trying to interfere with the IG, or intimidate the IG, or get the IG to back off," one U.S. official familiar with the investigation said. Frederick Hitz, who served as the CIA's inspector general from 1990 to 1998, said the move will be perceived as an attempt by Hayden "to call off the dogs." "What it would lead to is an undercutting of the inspector general's authority and his ability to investigate allegations of wrongdoing," Hitz said. "The rank and file will become aware of it, and it will undercut the inspector general's ability to get the truth from them." Hayden has been a staunch defender of the Bush administration's counterterrorism programs.
Note: What does it say about an agency when they accuse their own internal investigator of being corrupt?
Bryce Lockwood, Marine staff sergeant, Russian-language expert, recipient of the Silver Star for heroism: "I'm angry! I'm seething with anger! Forty years, and I'm seething with anger!" Lockwood was aboard the USS Liberty, a super-secret spy ship on station in the eastern Mediterranean, when four Israeli fighter jets flew out of the afternoon sun to strafe and bomb the virtually defenseless vessel on June 8, 1967, the fourth day of what would become known as the Six-Day War. Four decades later, many of the more than two dozen Liberty survivors located and interviewed by the Tribune cannot talk about the attack without shouting or weeping. Their anger has been stoked by the declassification of government documents and the recollections of former military personnel. In declassifying the most recent and largest batch of materials last June 8, the 40th anniversary of the attack, the NSA ... acknowledged that the attack had "become the center of considerable controversy." It was not the agency's intention, it said, "to prove or disprove any one set of conclusions, many of which can be drawn from a thorough review of this material." Air Force Capt. Richard Block was ... monitoring Middle Eastern communications [on June 8, 1967]. "Some of the pilots did not want to attack," Block said. "The pilots said, 'This is an American ship. Do you still want us to attack?'" And ground control came back and said, 'Yes, follow orders.'"
Note: The Jerusalem Post has now confirmed that Israel knew the USS Liberty was American. Watch the powerfully incriminating documentary "The Day Israel Attacked America" about the 1967 intentional attack on the USS Liberty which was virtually erased from all historical accounts.
The most intriguing secrets of the "war on terror" have nothing to do with al-Qaeda and its fellow travelers. They're about the mammoth private spying industry that all but runs U.S. intelligence operations today. In April, Director of National Intelligence Mike McConnell was poised to publicize a year-long examination of outsourcing by U.S. intelligence agencies. But the report was inexplicably delayed -- and suddenly classified a national secret. What McConnell doesn't want you to know is that the private spy industry has succeeded where no foreign government has: It has penetrated the CIA and is running the show. Over the past five years (some say almost a decade), there has been a revolution in the intelligence community toward wide-scale outsourcing. Private companies now perform key intelligence-agency functions, to the tune ... of more than $42 billion a year. Intelligence professionals [say] that more than 50 percent of the National Clandestine Service (NCS) -- the heart, brains and soul of the CIA -- has been outsourced to private firms such as Abraxas, Booz Allen Hamilton, Lockheed Martin and Raytheon. These firms recruit spies, create non-official cover identities and control the movements of CIA case officers. They also provide case officers and watch officers at crisis centers and regional desk officers who control clandestine operations worldwide. As The Los Angeles Times first reported last October, more than half the workforce in two key CIA stations -- Baghdad and Islamabad, Pakistan -- is made up of industrial contractors, or "green badgers," in CIA parlance. Intelligence insiders say that entire branches of the NCS have been outsourced to private industry.
The depositions of the parents of Columbine killers Eric Harris and Dylan Klebold will be kept under seal in the National Archives for 20 years, a federal judge ruled Monday. No one, including violence prevention experts, will be able to see them until they are unsealed, U.S. District Judge Lewis Babcock ruled. They will be kept permanently in the National Archives, where they are considered to be of historical value. The depositions of the parents took place in 2003 in connection with a lawsuit filed by the families of five slain Columbine High School students. Brian Rohrbough, the father of slain student Daniel Rohrbough, said he was angered by the ruling. Rohrbough, who watched as attorneys interviewed the parents during the deposition sessions, said there is nothing in them that would cause any harm. Instead, their release could prevent further school shootings, he said. Rohrbough is under court order not to divulge details. "There is no rational reason to lock them up," Rohrbough said. "It's just the idea that it would be OK in 20 years, and can't be OK today."
Note: Why all the secrecy? Could it be to hide evidence showing it could have been stopped?
For at least a year before the 2004 Republican National Convention, teams of undercover New York City police officers traveled to cities across the country, Canada and Europe to conduct covert observations of people who planned to protest at the convention, according to police records and interviews. From Albuquerque to Montreal, San Francisco to Miami, undercover New York police officers attended meetings of political groups, posing as sympathizers or fellow activists. They made friends, shared meals, swapped e-mail messages and then filed daily reports with the department’s Intelligence Division. In hundreds of reports stamped “N.Y.P.D. Secret,” the Intelligence Division chronicled the views and plans of people who had no apparent intention of breaking the law. These included members of street theater companies, church groups and antiwar organizations. Three New York City elected officials were cited in the reports. In at least some cases, intelligence on what appeared to be lawful activity was shared with police departments in other cities. In addition to sharing information with other police departments, New York undercover officers were active themselves in at least 15 places outside New York — including California, Connecticut, Florida, Georgia, Illinois, Massachusetts, Michigan, Montreal, New Hampshire, New Mexico, Oregon, Tennessee, Texas and Washington, D.C. — and in Europe. To date, as the boundaries of the department’s expanded powers continue to be debated, police officials have provided only glimpses of its intelligence-gathering.
The FBI man in charge of collecting evidence from the government building destroyed by the Oklahoma bomb has called for the case to be reopened. Former deputy assistant director Danny Coulson ... said a federal grand jury is now needed to find out what really happened. He argues this is the only way to prove whether other people were involved in the bombing in a wider conspiracy beyond Timothy McVeigh and Terry Nichols. Mr Coulson spent 31 years in the FBI. Between 1991 and 1997 he was the deputy assistant director of the Criminal Division of the FBI in Washington, responsible for all violent crime cases in the United States. Mr Coulson said there were some "very strong indicators" that other people were involved with Timothy McVeigh. The FBI interviewed 24 people who claimed to have seen McVeigh in Oklahoma City with someone else on the morning of the attack, yet the only known accomplice of McVeigh, Terry Nichols, was at home in Kansas over 200 miles away on that day. The FBI's investigation concluded that the eyewitnesses were unreliable. However, Danny Coulson says they were "extremely credible" and had no reason to make it up. "If only one person had seen it, or two of three, but 24?" he said. "I know FBI headquarters told [agents] to close down the investigation in Elohim City which has some very significant connections to Mr McVeigh. "Never in my career did I have FBI headquarters tell me not to investigate something." Last December a US Congressional report found no conclusive evidence of a wider conspiracy, but the report concluded that "questions remain unanswered and mysteries remain unsolved."
Note: Don't miss a highly revealing four-minute video-clip showing live media coverage of the Oklahoma City bomb available here. The official story is that one truck with a huge bomb was parked in front of the Oklahoma City federal building and only Timothy McVeigh and his partner were involved. The news footage proves that others must have been involved, as multiple unexploded bombs were recovered from points inside the building. Yet none of this was questioned in later testimony.
Patients were put in isolation, tied down or drugged, and subjected to hours and hours of taped recordings meant to brainwash them at the behest of the Central Intelligence Agency. They were subjected to massive electroshocks, experimental drugs and LSD, most of them unwilling and unknowingly part of the U.S. spy agency's experimentation. Now it's time for the federal government to compensate those victims, lawyer Alan Stein argued. Mr. Stein is seeking court approval for a class-action lawsuit on behalf of his client, Janine Huard, one of the hundreds of patients of Ewen Cameron to be subjected to the Cold War-era experiments. "She never knew ... that she was being used by Dr. Cameron and his staff as a guinea pig," Mr. Stein told the court. The CIA ... recruited Dr. Cameron to experiment with mind-control techniques beginning in 1950. The experiments ... were jointly funded by the CIA and the Canadian government. They were part of a larger CIA program called MK-ULTRA, which also saw LSD administered to U.S. prison inmates and patrons of brothels without their knowledge. Ms. Huard was one of nine Canadian victims who received nearly $67,000 (U.S.) from the CIA in 1988 to compensate her for her suffering. But her claim for compensation from the federal government ... was rejected three times. In 1994, 77 patients were awarded $100,000 each from the federal government, but more than 250 others were denied compensation because they were not "totally depatterned."
Note: What this article fails to mention is that Dr. Cameron was also the president of both the American Psychicatric Association and the World Psychiatric Association. For more reliable information, click here.
A two-year congressional inquiry into the Oklahoma City bombing concludes that the FBI didn't fully investigate whether other suspects may have helped Timothy McVeigh and Terry Nichols with the deadly 1995 attack, allowing questions to linger a decade later. The House International Relations investigative subcommittee [declared that] there is no conclusive evidence of a foreign connection to the attack, but that far too many unanswered questions remain. The report also sharply criticizes the FBI for failing to be curious enough to pursue credible information that foreign or U.S. citizens may have had contact with Nichols or McVeigh and could have assisted their plot. "We did our best with limited resources, and I think we moved the understanding of this issue forward a couple of notches even though important questions remain unanswered," Rep. Dana Rohrabacher, R-Calif., the subcommittee chairman, said in an interview with The Associated Press. Rohrabacher's subcommittee saved its sharpest words for the Justice Department, saying officials there exhibited a mindset of thwarting congressional oversight and did not assist the investigation fully.
Note: Should you choose to explore the deadly Oklahoma City bombing, you will find that there are many strange inconsistencies suggesting a major cover-up. If you are interested in more, you might start here.
Under a secret Bush administration program initiated weeks after the Sept. 11 attacks, counterterrorism officials have gained access to financial records from a vast international database and examined banking transactions involving thousands of Americans and others in the United States. The program, run out of the Central Intelligence Agency and overseen by the Treasury Department ... is a significant departure from typical practice in how the government acquires Americans' financial records. Treasury officials did not seek individual court-approved warrants or subpoenas to examine specific transactions, instead relying on broad administrative subpoenas for millions of records. That access to large amounts of confidential data was highly unusual, several officials said, and stirred concerns inside the administration about legal and privacy issues. "The capability here is awesome or, depending on where you're sitting, troubling," said one former senior counterterrorism official who considers the program valuable. While tight controls are in place, the official added, "the potential for abuse is enormous." The program is separate from the National Security Agency's efforts to eavesdrop without warrants and collect domestic phone records, operations that have provoked fierce public debate and spurred lawsuits against the government and telecommunications companies.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Dozens of members of the Bush administration's domestic-security team...are collecting bigger paychecks in different roles: working on behalf of companies that sell security products, many directly to the federal agencies the officials once helped run. At least 90 officials at the Department of Homeland Security or the White House Office of Homeland Security...are executives, consultants or lobbyists for companies that collectively do billions of dollars' worth of domestic-security business. Former Homeland Security Secretary Tom Ridge...stands to profit now that Savi Technology, a maker of radio-frequency-identification equipment that the department pushed while he was secretary, is being bought by Lockheed Martin. He was appointed to the Savi board three months after resigning from the department. Former Homeland Security undersecretary Asa Hutchinson...the biggest potential for profit among Hutchinson's ventures appears to come from his role as an investor in Fortress America Acquisition. Hutchinson, before the [company's] stock was sold publicly, bought 200,000 shares for $25,000. At Friday's trading price the stock was worth more than $1.2 million. More than two-thirds of the department's most senior executives in its first years have moved through the revolving door. Federal law prohibits senior executive-branch officials from lobbying former government colleagues or subordinates for at least a year after leaving public service. But by exploiting loopholes in the law...it is often easy for former officials to do just that.
Sixty years ago the US hired Nazi scientists to lead pioneering projects, such as the race to conquer space. These men provided the US with cutting-edge technology which still leads the way today, but at a cost. Major-General Hugh Knerr, deputy commander of the US Air Force in Europe, wrote: "Occupation of German scientific and industrial establishments has revealed the fact that we have been alarmingly backward in many fields of research. "If we do not take the opportunity to seize the apparatus and the brains that developed it...we will remain several years behind." Thus began Project Paperclip, the US operation which saw von Braun and more than 700 others spirited out of Germany from under the noses of the US's allies. Its aim was simple: "To exploit German scientists for American research and to deny these intellectual resources to the Soviet Union." President Truman authorised Paperclip in August 1945 and, on 18 November, the first Germans reached America. All of these men were cleared to work for the US, their alleged crimes covered up and their backgrounds bleached by a military which saw winning the Cold War, and not upholding justice, as its first priority.
A federal appeals court rejected a fired FBI contractor's bid to revive her lawsuit against the government. Sibel Edmonds said she was fired from her job as a wiretap translator because she told superiors she suspected that a co-worker was leaking information to targets of an ongoing FBI investigation. The FBI said it fired her because she committed security violations and disrupted the office. The Justice Department's inspector general said Edmonds's allegations about a coworker "raised serious concerns that, if true, could potentially have extremely damaging consequences for the FBI."
Note: This article doesn't even mention 9/11, yet Ms. Edmonds has stated publicly that her testimony would put top government officials behind bars for their role in blocking information which could have stopped the 9/11 attacks. For more eye-opening information, click here and here. Read Ms. Edmond's open letter to the chairman of the 9/11 Commission to find out what key people in government don't want you to know about her testimony. See also her excellent website http://www.justacitizen.com She was also instrumental in forming a National Security Whistleblowers Coalition.
On its Web site and newsletters, the North American Man/Boy Love Association advocates sex between men and boys and cites ancient Greece to justify the practice. It goes by the acronym NAMBLA, and the FBI has been following it for years, linking it to pedophilia and recently infiltrating it with an agent successful enough to be asked to join the group's steering committee. While NAMBLA's membership numbers are small, the group has a dangerous ripple effect through the Internet by sanctioning the behavior of those who would abuse children. San Diego police Sgt. Dave Jones, who oversees a group of investigators working on Internet crimes against children, says NAMBLA's Web site often pops up in computers on which they find child pornography. Saturday, the FBI arrested three NAMBLA members at Harbor Island as they waited for a boat that undercover agents told them would sail to Ensenada for a sex retreat over Valentine's Day with boys as young as 9. The NAMBLA investigation is part of a crackdown on people authorities have termed sex tourists, those who cross state and national borders for illicit sex. On its Web site, NAMBLA says ... children should have the right to have sex with older men and that such relationships are "benevolent." The 26-year-old organization wants to overturn statutory rape laws and free molesters from prison. Critics say NAMBLA's public face hides a network of child molesters who trade seduction techniques and child pornography and organize overseas trips for illicit sex.
Note: To see a four-minute video clip of the FBI agent's investigation, click here. If you are ready to see how investigations into a massive child sex abuse ring have led to the highest levels of government, watch the suppressed Discovery Channel documentary "Conspiracy of Silence," available here.
The Central Intelligence Agency is refusing to provide hundreds of thousands of pages of documents sought by a government working group under a 1998 law that requires full disclosure of classified records related to Nazi war criminals. Some made public last year showed a closer relationship between the United States government and Nazi war criminals than had previously been understood, including the C.I.A.'s recruitment of war criminal suspects or Nazi collaborators. For nearly three years, the C.I.A. has interpreted the 1998 law narrowly and rebuffed requests for additional records. The dispute has not previously been made public. The American government worked closely with Nazi war criminals and collaborators, allowing many of them to live in the United States after World War II. Historians who have studied the documents made public so far have said that at least five associates of the Nazi leader Adolf Eichmann, the architect of Hitler's campaign to exterminate Jews, had worked for the CIA. The records also indicate that the CIA tried to recruit two dozen more war criminals or Nazi collaborators. Among former Nazis who were given refuge in the United States was Wernher von Braun, the German scientist who developed the V-2 rocket in World War II for the Nazis and played a major role in the development of the American space program.
Note: Operation Paperclip involved secretly importing hundreds of Nazi scientists into the U.S. and providing them with aliases and influential work in U.S. government and intelligence services. Some of them were known experts in mind control techniques. For more reliable information, click here.
A former translator for the FBI with top-secret security clearance says she has provided information to the panel investigating the 11 September attacks which proves senior officials knew of al-Qa'ida's plans to attack the US with aircraft months before the strikes happened. She said the claim [made by National Security Adviser Condoleezza Rice] that there was no such information was "an outrageous lie". Sibel Edmonds said she spent more than three hours in a closed session with the commission's investigators providing information that was circulating within the FBI in the spring and summer of 2001 suggesting that an attack using aircraft was just months away and the terrorists were in place. The Bush administration, meanwhile, has sought to silence her and has obtained a gagging order from a court by citing the rarely used "state secrets privilege". Mrs Edmonds, 33, says she gave her evidence to the commission in a specially constructed "secure" room at its offices in Washington on 11 February. She was hired as a translator for the FBI's Washington field office on 13 September 2001, just two days after the al-Qa'ida attacks. Her job was to translate documents and recordings from FBI wire-taps. She said said it was clear there was sufficient information during the spring and summer of 2001 to indicate terrorists were planning an attack.
Note: Watch the amazing, well documented documentary "Kill the Messenger" on courageous 9/11 whistleblower Sibel Edmonds, the most gagged citizen in U.S. history, who exposes the 9/11 Commission Report as irreparably flawed. For more along these lines, read concise summaries of deeply revealing 9/11 investigation news from reliable major media sources.
FBI Director Robert Mueller, acknowledging serious lapses in how the FBI mishandled some information prior to Sept. 11, suggested for the first time that investigators might have detected the terrorist plot if they had pursued leads more diligently. Mueller's acknowledgment came amid two new disclosures of what could be missed hints about Sept. 11. The first was a warning from another agency to the FBI that a Middle Eastern country was seeking to buy commercial flight simulators. The second was a memo from an Oklahoma City FBI agent who reported observing large numbers of Middle Eastern pilots and flight students in his area. Neither memo apparently drew much attention at the time. Mueller's remarks came after his announcement of a broad reorganization of the FBI, partly because of its failure to predict the attacks. Attorney General John Ashcroft announced loosened restrictions on domestic spying, handing the FBI authority to monitor Internet sites and libraries. The American Civil Liberties Union has criticized the loosening of restrictions on domestic spying, saying they could renew abuses of the past. Mueller, who took over as FBI director just days before Sept. 11, is the first senior official in the Bush administration to say that counterterrorism investigators might have detected and averted the attacks if they had recognized what they were collecting.
Note: Yet no one in the US government was held accountable for these failures.
A.B. "Buzzy" Krongard, a ... former investment banker ... was named yesterday executive director of the CIA, bringing a fast-paced management style to the agency's No. 3 job. Central Intelligence Agency Director George J. Tenet announced the appointment, saying he treasures Krongard's "wise counsel and 'no-nonsense' business-like views." Krongard, 64, former head of Alex. Brown & Co., an investment bank based in Baltimore, joined the agency three years ago as a counselor to Tenet. He switched careers shortly after helping engineer the $2.5 billion merger of Alex. Brown and Bankers Trust New York Corp., gaining $71 million in Bankers Trust stock. Few of his former colleagues were surprised by his decision to trade a $4 million salary and stock options for the far less remunerative job of Tenet's consigliere. A graduate of Princeton and the University of Maryland Law School, Krongard has a fondness for extreme military-style activities. Even as a banking executive, he trained with police SWAT teams for recreation and worked out with a kung fu master. He maintained a shooting range on the park-like grounds of his home on the northern edge of Baltimore. In an interview yesterday, Krongard described his past duties as those of a "minister without portfolio" whom senior managers felt comfortable talking to about "sticky subjects." But Krongard exhibited the requisite secretiveness when asked to explain his interest in intelligence and how he came to land a job in Tenet's inner circle. If you go back to the CIA's origins during World War II in the Office of Strategic Services, he explained, "the whole OSS was really nothing but Wall Street bankers and lawyers."
Note: Buzzy Krongard was the executive director of the CIA on 9/11. His past ties to the investment firm which placed most of the extraordinarily high volume of "put options" on United and American Airlines stocks the week before the attacks is one of many strange "coincidences" unexplained by the official story of what happened on that horrific day. For more on this, click here. To read the entire article free of charge, click here.
An internal Justice Department investigation into the F.B.I. crime laboratory has uncovered numerous complaints by laboratory employees about the handling of forensic evidence in one of the Government's most important criminal cases, against two men charged with the bombing of the Oklahoma City Federal Building in April 1995. The criticism of the F.B.I.'s conduct emerged in a series of interviews conducted by investigators from the inspector general's office. Laboratory examiners in Oklahoma shipped critical items to the laboratory, like the faded black jeans worn by Timothy J. McVeigh ... in a brown paper sack instead of a sealed plastic evidence bags, one employee said. At one point, visitors to the laboratory placed travel cases that were potentially contaminated with residue of the explosion in an area where bomb debris had been stored awaiting testing, another employee said. As a result, none of the material could be tested. Mr. Williams, the chief laboratory examiner in Oklahoma City, was transferred from his job and was withdrawn as a prosecution witness in Oklahoma City. Mr. Williams had been responsible for conclusions about several major issues in the case, like the size of the bomb that tore the front off the Federal Building. His opinion that the bomb contained 4,000 pounds of ammonium nitrate was an estimate based not on scientific studies but in part on searches of the defendants' houses. Two laboratory workers said Mr. Williams had changed their dictated reports, in violation of F.B.I. policy.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism from reliable major media sources.
Why has the United States decided to crack down on suspected Japanese war criminals 50 years after granting them immunity from prosecution? Japanese scratched their heads last week at the unexpected announcement that the U.S. Justice Department had included former members of an infamous bacterial warfare research unit on a "watch list" of 16 suspected Japanese World War II war criminals prohibited from entering the United States. The United States has been aware of the identities of the Unit 731 leaders and of their gruesome experiments on human subjects since the end of the war. Details of Unit 731 atrocities have appeared in the Western and Japanese media for more than a decade. In secret laboratories in occupied China, Unit 731 researchers tested poison gas and biological weapons on prisoners; froze and defrosted victims' limbs to study frostbite; and vivisected humans without anesthetic. After the war, the United States concluded that the results of these experiments were "of the highest intelligence value." Fearful that those results would fall into Soviet hands, the U.S. occupation authorities gave the head of Japan's bacterial warfare program, Dr. Shiro Ishii, and his colleagues immunity from prosecution ... in exchange for their secret data. Many of Ishii's colleagues went on to distinguished careers in postwar Japan, holding posts in the National Institute of Health, serving as medical school deans and laboratory heads.
Note: The military has repeatedly condoned horrendous research on live subjects. For a revealing list of highly unethical experimentation on human over the past 75 years, click here. For a concise summary of the government's secret quest to control the mind and human behavior no matter what the cost, click here.
For 20 years, US intelligence agencies have been experimenting with ESP. It may have helped locate American hostages in Iran [and] mapped a secret Soviet nuclear facility. At the height of the Cold War, everyone was worried about keeping up with the Soviets. Reports that the Soviets were using psychics to spy on us prompted us to do the same to them. Now that the Cold War is over ... Congress has asked the CIA to review the 20-year $20 million program to see what we got out of it. ABC News has obtained a copy of that report which is critical of psychic spying, saying that, "continued use in intelligence gathering operations is not warranted". That negative conclusion has the caused psychic spies ... to speak publicly for the first time. Joe McMoneagle was an Army officer and for the past 17 years one of the intelligence community's most successful psychic spies. McMoneagle claims to be able to describe ... people, places, and things he's never seen before, hundreds, even thousands of miles away. ABC news was told that psychic spying was used in about 500 cases. One case where psychic spies say they played a critical role was in 1989. Charles Jordan was a US Customs agent gone bad, a dangerous fugitive who had eluded police for 2 years. The collective wisdom at the time was that he was probably in the Caribbean. [One psychic spy] started describing him in North Wyoming ... at a campground. Using this and other information, Jordan was finally caught.
Note: The original CIA link above now takes you back to the CIA Reading Room homepage. Here is an Internet Archive link that provides access to the declassified CIA document. Explore an excellent compilation of reliable material suggesting that remote viewing is very real.
The U.S. government conducted experiments with Bay Area researchers to determine whether extrasensory perception, telepathy, clairvoyance and precognition could be used as "psychic spy tools" against the Soviet Union and other countries, according to a newly released study of the project. Psychic spies were used to try to pinpoint the location of Moammar Gadhafi before the U.S. bombing of Libya in 1986 ... University of Oregon psychology Professor Ray Hyman, one of the authors of the study, said. Dale Graff, a former director of the Defense Intelligence Agency's ESP program, told ABC's "Nightline" that psychics had provided the name of the city and the building where the Red Brigades terrorist group was holding kidnapped Brig. Gen. James Dozier in Italy in 1981. Dozier was freed by Italian police after 42 days. News reports at the time said the police were assisted by an undisclosed number of U.S. State and Defense Department specialists. Hyman and UC-Davis statistician Jessica Utts were commissioned by the CIA to evaluate the psychic spying project, code-named "Stargate." The government spent $20 million over two decades on the project. Several of the psychics' powers were tested in the Bay Area before the spies were put to work ... Hyman said. Experiments here focused largely on "remote viewing," which involved psychic communication between a "sender" and a "viewer". The government psychics were accurate about 15 percent of the time in their remote viewing experiments.
Note: Explore an excellent compilation of reliable material suggesting that remote viewing is very real.
A clandestine operation code-named Gladio [was] created decades ago to arm and train resistance fighters in case the Soviet Union and its Warsaw Pact allies invaded. There have been disclosures of similar organizations in virtually all Western European countries. Gladio ... was originally an Italian creation [that] evolved into a branch of an extensive network, operated within NATO and abetted by a 1956 agreement between the United States and Italian secret services. 622 Italians belonged to the operation - civilians who were trained by intelligence operatives. Germany, France, Belgium, the Netherlands, Greece and Luxembourg have all acknowledged that they maintained Gladio-style networks to prepare guerrilla fighters to leap into action. Similar programs have also existed in Britain, Norway, Portugal, Spain, Austria, Turkey and Denmark, and even in neutral countries like Switzerland and Sweden. These would-be fighters had stockpiles of weapons and explosives. In [Italy], secret arms deposits were dismantled as far back as 1972 but ... the secret services could not find 12 of them. Their disappearance has fueled speculation here that the weapons ended up in terrorist hands. Some of the underground "gladiators," as they have been dubbed, had close links to neo-Fascist groups and to intelligence organizations. New "gladiators" are still recruited. The major unsolved acts of terrorism that rocked Italy in the 1970's are all presumed to be the work of people on the far right. Left-wing terrorists like the moribund Red Brigades somehow were caught and imprisoned.
Note: Following WWII, the US government actively recruited and protected former nazis. For an abundance of excellent, reliable information on Operation Gladio and its ongoing operations, read the excellent chapter on this in Lifting the Veil. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.
The Supreme Court today gave the Central Intelligence Agency broad discretion to withhold the identities of its sources of intelligence information from public disclosure. The exemption applies regardless of whether the information is shown to have a bearing on national security and regardless of whether the source of the information is a newspaper or magazine in general circulation. The decision, written by Chief Justice Warren E. Burger, overturned a ruling by the United States Court of Appeals for the District of Columbia. That court, in ordering the release of the names of researchers who participated in a long-running C.I.A. study of the control of human behavior, had adopted a considerably narrower definition of the ''intelligence sources'' entitled to exemption. The C.I.A. project, code-named MKULTRA, was in existence from 1953 to 1966 and was designed to develop techniques for controlling human behavior. At least 185 private researchers and 80 institutions participated in the research. Officials of two organizations ... filed requests under the Freedom of Information Act in 1977 for the names of the researchers. Last fall Congress partly excluded from the Freedom of Information Act the C.I.A.'s ''operational files,'' which involve intelligence methods and sources.
Note: The official story is that all of the experiments to control human behavior failed. Yet if this is true, why did they spend so much money and so many years on it? And why is it necessary to keep secret who the researchers were? For reliable, verifiable information suggesting not only that the experiments were quite successful, but that they may be ongoing to this day, click here.
The United States said today that Soviet authorities in recent months had sharply reduced the level of microwave radiation beamed at the American Embassy in Moscow. But in its first detailed public account of the situation the State Department nonetheless rebuked the Russians for continuing the radiation even at the current insignificant level. It said this showed “a lack of concern for living and working conditions of our people in Moscow.” Robert L. Funseth, the department spokesman ... refused to comment on why the Soviet Union was beaming the rays, a practice that officials have said began about 16 years ago. Soviet officials have justified the beams as necessary to curtail American electronic listening devices on the roof of upper floors of the embassy building. American officials have privately conceded that these devices exist to monitor Soviet radio and telephone transmissions. They have also said that the monitoring effort was being impaired by the jamming waves. What has irritated American officials was that the Soviet Embassy [in] Washington also carries out similar interceptions ... has not been subject to the countermeasures because of concern for Americans working in the area. The beaming of radiation against the embassy in Moscow was known only to a few American officials until last February when Ambassador Walter J. Stoessel Jr. briefed his staff on the situation ... because State Department medical officers feared that the radiation might pose a health hazard.
Note: Our investigations have indicated that there is a hidden war going on using microwaves which can damage health. The microwaves can target places as well as individuals. Learn more about this hidden war in this excellent, well documented essay. For more, see excerpts from major media news articles on nonlethal weapons and the dangers of microwave cell phone technology.
A U.S. senator is pressing the FBI for more information after a whistleblower alleged that an internal review found 665 FBI personnel have resigned or retired to avoid accountability in misconduct probes over the past two decades. The whistleblower told the office of Iowa Sen. Chuck Grassley ... that the Justice Department launched the review of the FBI's disciplinary database in 2020 following an Associated Press investigation into sexual misconduct allegations involving at least six senior FBI officials. The follow-up review found 665 FBI employees, including 45 senior-level officials, resigned or retired between 2004 and 2020 following a misconduct probe but before a final disciplinary letter could be issued, according to a letter this week from Grassley to FBI Director Christopher Wray and Attorney General Merrick Garland. It was not clear how many of those cases involved sexual misconduct. Grassley's office, which declined to make the whistleblower or underlying documents available to protect the person's identify, said that was the kind of information it was still seeking but estimated the number could be in the "hundreds." The AP investigation in December 2020 identified at least six sexual misconduct allegations involving senior FBI officials over the prior five years ranging from unwanted touching and advances to coercion. It found that several senior FBI officials have avoided discipline – quietly transferring or retiring with full benefits – even after claims of sexual misconduct against them were substantiated.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and sexual abuse scandals from reliable major media sources.
Mysterious episodes that caused brain injuries in spies, diplomats, soldiers and other U.S. personnel overseas starting five years ago now number more than 130 people, far more than previously known, according to current and former officials. The number of cases within the C.I.A., the State Department, the Defense Department and elsewhere spurred broad concern in the Biden administration. The initial publicly confirmed cases were concentrated in China and Cuba and numbered about 60, not including a group of injured C.I.A. officers whose total is not public. Since December, at least three C.I.A. officers have reported serious health effects from episodes overseas. One occurred within the past two weeks, and all have required the officers to undergo outpatient treatment at Walter Reed National Military Medical Center or other facilities. And in one case in 2019 that has not previously been reported, a military officer serving overseas pulled his vehicle into an intersection, then was overcome by nausea and headaches. His 2-year-old son, sitting in the back seat, began crying. After the officer pulled away from the intersection, his nausea stopped, and the child stopped crying. In a report released in December, the National Academy of Sciences said a microwave weapon probably caused the injuries. Some officials believe a microwave or directed-energy device is the most likely cause. The severity of the brain injuries has ranged widely. Some victims have chronic, potentially irreversible symptoms.
Note: Read more about these mysterious attacks on spies and diplomats. Read very little-known, yet astounding information on sophisticated technologies which can project music and clear voices into people's heads in these concise summaries of deeply revealing news articles on non-lethal weapons from reliable major media sources.
The Senate Select Committee on Intelligence submitted its 6,700-page "torture report" about the CIA to the White House in April 2014. More than 10 years later, the full report remains secret after a federal appellate court dismissed a lawsuit I filed in the hopes of forcing its release. The document "includes comprehensive and excruciating detail" about the CIA's "program of indefinite secret detention and the use of brutal interrogation techniques," the late Sen. Dianne Feinstein, who chaired the Senate intelligence committee at the time, wrote in a 2014 summary. "The full report details how the CIA lied to the public, the Congress, the president, and to itself about the information produced by the torture program," said Tom Blanton, director of the National Security Archive at George Washington University. So far, efforts to obtain the torture report using the federal Freedom of Information Act have been unsuccessful. In late 2016, despite the CIA director's objections, former President Barack Obama placed a copy in his presidential papers. But that copy is not subject to FOIA until 2029 – 12 years after Obama left office. The CIA and a handful of federal agencies also have copies of the torture report, although the Trump administration returned several of these to the Senate intelligence committee vaults in 2017. The Obama, Trump, and Biden administrations all fought strenuously against FOIA requests for these agencies' copies.
Note: The above was written by media law attorney Shawn Musgrave. No one been charged in connection with the unethical CIA torture program. Many of the architects and enablers of the program are now in powerful and esteemed positions in academia, high levels of government, the federal judiciary, and more. For more, read the "10 Craziest Things in the Senate Report on Torture" and check out our summary on US torture programs in our comprehensive Military-Intelligence Corruption Information Center.
Hunter Biden was hit with a double whammy Wednesday. First, a new filing by the prosecution in his upcoming gun-felony trial in Delaware poured scorn on Hunter's legal team's bizarrely persistent denial that his laptop and its contents are authentic. Then IRS whistleblowers Gary Shapley and Joe Ziegler delivered 100 pages of new bombshell evidence showing Hunter lied repeatedly to investigators in his sworn congressional testimony in February, prompting House Ways and Means Committee Chairman Jason Smith to raise the prospect of perjury charges against the first son. Shapley also produced a document that adds further weight to the suspicion that Hunter's "sugar brother" ... Kevin Morris, was under CIA protection. Hunter lied about his shakedown WhatsApp message to CEFC employee Raymond Zhao on July 30, 2017, said Smith, when his committee voted to publicly release the new whistleblower documents. "These documents make clear that Hunter Biden was using his father's name to shake down a Chinese businessman – and it worked. And when confronted by congressional investigators about it, he lied," the panel said. The CIA's shadowy hand can be seen elsewhere in the Hunter Biden story, including in the rapid approval of the "Dirty 51" letter signed by 51 former intelligence operatives (mainly from the CIA) before the 2020 election that falsely claimed that Hunter's laptop was Russian disinformation.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Last year, the Republican chairman of the US House Permanent Select Committee on Intelligence (HPSCI) presented an image of Americans protesting the war in Gaza while implying possible ties between the protesters and Hamas, an allegation that was used to illustrate why surveillance reforms may prove detrimental to national security. In December, as many as 200 Republican staffers gathered behind closed doors to hear a presentation ... aimed at shoring up support for a US surveillance program known as Section 702. Section 702 authorizes the government to surveil foreigners located physically overseas ... but not Americans or individuals on US soil. While eavesdropping on foreigners is permitted, doing so for the explicit purpose of gaining access to an American's communications–a practice commonly referred to as "reverse targeting"–is strictly forbidden. "Yes, it's true, you cannot â€target' protesters under 702," one aide, a legislative director for a Republican lawmaker, says. "But that doesn't mean the FBI doesn't still have the power to access those emails or listen to their calls if it wants." Between 2020 and early 2021, the FBI conducted "tens of thousands" of queries related to "civil unrest" in the United States. "Political protest is literally how America was founded. It's in our DNA," says Jason Pye, senior policy analyst at the nonprofit FreedomWorks. "Whether you agree with these protesters or not is irrelevant."
Note: The FBI has a long history of spying on political activists. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
The United States Defense Department announced Friday that it found no evidence that the government is covering up contact with extraterrestrials. The report was issued by the Pentagon's All-domain Anomaly Resolution Office (AARO), the unit created and tasked in recent years with studying UAP sightings. The report in its own way raises as many new questions as it answers. AARO investigators, for instance, dug through the claims of witnesses and whistleblowers and successfully traced back the underlying research projects, Special Access Programs (SAPs), and classified compartments. As the report says, "AARO investigated numerous named, and described, but unnamed programs alleged to involve UAP exploitation conveyed to AARO through official interviews," and ultimately, "conclude[d] many of these programs represent authentic, current and former sensitive, national security programs, but none of these programs have been involved with capturing, recovering, or reverse-engineering off-world technology or material." What exactly are the secret compartmentalized programs that the whistleblowers and government witnesses misidentified as being related to UAP technology? What, exactly, are the Pentagon, intelligence community, or defense contractors working on that ... looks and sounds like reverse-engineering out-of-this-world technology or even studying so-called "non-human biologics"?
Note: For more along these lines, see concise summaries of deeply revealing news articles on UFOs from reliable major media sources. Then explore the excellent, reliable resources provided in our new UFO Information Center.
During a Senate briefing last week, a federal counterterrorism official cited the October 7 Hamas attack while urging Congress to reauthorize a sprawling and controversial surveillance program repeatedly used to spy on U.S. citizens on U.S. soil. "As evidenced by the events of the past month, the terrorist threat landscape is highly dynamic and our country must preserve [counterterrorism] fundamentals to ensure constant vigilance," said Director of the National Counterterrorism Center Christine Abizaid. She pointed to Section 702 of the Foreign Intelligence Surveillance Act, which enables the U.S. government to gather vast amounts of intelligence – including about U.S. citizens ... without first seeking a warrant. Section 702 "provides key indications and warning on terrorist plans and ... gives us strategic insight into foreign terrorists and their networks overseas," Abizaid said. "I respectfully urge Congress to reauthorize this vital authority." The controversial program is set to expire at the end of the year, and lawmakers sympathetic to the intelligence community are scrambling to protect it. Sean Vitka ... at the civil liberties group Demand Progress [said] that now is the time to enact lasting and dramatic oversight of the 702 authority. "The government has completely failed to demonstrate that any of the privacy protections reformers have called for would impair national security ... so now we're seeing people grasping at straws trying to turn everything into an excuse for reauthorization," Vitka said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
In March of 2021 a nonprofit group called the Center for Countering Digital Hate (CCDH) released a report about online misinformation. Founded [by] Imran Ahmed, the CCDH ... provides the White House with a powerful weapon to use against critics including RFK Jr. and [Elon] Musk, while also pressuring platforms like Facebook and Twitter to enforce the administration's policies. One rumor that came up ... is that [Ahmed] works for British intelligence. "There's nothing surprising about this," said Mike Benz, a former State Department official who now runs the Foundation for Freedom Online, a free-speech watchdog. "This is not the first rodeo of British and U.S. intelligence services creating a cutout for the purpose of influencing the online news economy, to rig public debate in favor of political speech that supports agency agendas." CCDH's ... chairman is Simon Clark, a former senior fellow at the Center for American Progress (CAP), a D.C. think tank aligned with the corporate arm of the Democratic Party. One might conclude that CCDH functions as an arm of the corporate wing of the Democratic Party, to be deployed against the perceived enemies of corporate Democrats, whether they come from the left or the right. Clark was also a senior fellow at the Atlantic Council's Digital Forensics Lab. "The Atlantic Council, in the past several years, has had seven CIA directors on its board of directors or board of advisers," said Benz. "And it's one of the premier architects of online censorship."
Note: Read an excellent piece on what gave rise to the modern censorship regime. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
An advisory board to President Biden has recommended limiting the F.B.I.'s ability to use a controversial warrantless surveillance program to hunt for information about Americans, even as it urged lawmakers to renew the law that authorizes it. The panel, known as the President's Intelligence Advisory Board, suggested barring the bureau from searching a database of intercepted information when looking for evidence about Americans in criminal investigations that do not involve foreign intelligence. The board ... delivered the recommendation in a declassified 39-page report. It came as Congress was debating whether to extend the law authorizing the program, known as Section 702. Under Section 702, the government can collect – from American companies like Google and AT&T and without a warrant – the communications of targeted foreigners abroad, even when they are talking to or about Americans. The notion that Section 702 creates a backdoor to the Fourth Amendment by allowing the F.B.I. to read private communications to or from an American without a warrant in ordinary criminal contexts has raised particular alarm. But the board rejected as unjustified the more sweeping reform proposal: to require the government to obtain a court warrant before using Americans' identifiers to search the repository. Requiring a court order before doing so, the board said, would prevent intelligence agencies from discovering threats to the country in a timely manner.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The U.S. carpet bombing of Cambodia between 1969 and 1973 has been well documented, but its architect, former national security adviser and Secretary of State Henry Kissinger ... bears responsibility for more violence than has been previously reported. An investigation by The Intercept provides evidence of previously unreported attacks that killed or wounded hundreds of Cambodian civilians during Kissinger's tenure in the White House. "You can trace a line from the bombing of Cambodia to the present," said Greg Grandin, author of "Kissinger's Shadow." "The covert justifications for illegally bombing Cambodia became the framework for the justifications of drone strikes and forever war." Kissinger bears significant responsibility for attacks in Cambodia that killed as many as 150,000 civilians, according to Ben Kiernan, former director of the Genocide Studies Program at Yale University and one of the foremost authorities on the U.S. air campaign in Cambodia. That's up to six times the number of noncombatants thought to have died in U.S. airstrikes in Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, and Yemen during the first 20 years of the war on terror. Grandin estimated that, overall, Kissinger – who also helped to prolong the Vietnam War and facilitate genocides in Cambodia, East Timor, and Bangladesh; accelerated civil wars in southern Africa; and supported coups and death squads throughout Latin America – has the blood of at least 3 million people on his hands.
Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and war from reliable major media sources.
FBI officials repeatedly violated their own standards when they searched a vast repository of foreign intelligence for information related to the January 6 insurrection and racial justice protests in 2020, according court order released Friday. The violations were detailed in a secret court order issued last year by the foreign intelligence surveillance (Fisa) court, which has legal oversight of the US government's spy powers. At issue are improper queries of foreign intelligence information collected under section 702 of the Foreign Intelligence Surveillance Act, which enables the government to gather the communications of targeted foreigners outside the US. That program, which is set to expire at the end of the year, creates a database of intelligence that US agencies can search. FBI searches must have a foreign intelligence purpose or be aimed at finding evidence of a crime. But congressional critics of the program have long raised alarm about what they say are unjustified searches of the database for information about Americans, along with more general concerns about surveillance abuses. In repeated episodes disclosed on Friday, the FBI's own standards were not followed. The April 2022 order, for instances, details how the FBI queried the section 702 repository using the name of someone who was believed to have been at the Capitol during the January 6 riot. Officials obtained the information despite it not having any "analytical, investigative or evidentiary purpose", the order said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Antiterrorist moral fervor and ideological blinders propelled the U.S. into its biggest foreign policy blunder since World War Two. The U.S. government constantly embellished the storyline to demonize the communist opposition. A CIA operative provided materials for a massive bomb that ripped through a main square in Saigon in 1952. A Life magazine photographer was waiting on the scene, and his resulting snap appeared with a caption blaming the carnage on Viet Minh Communists. The Kennedy administration sought credibility by profoundly deceiving the American people and Congress regarding its Vietnam policy. In August 1963, South Vietnamese Special Forces "carried out midnight raids against Buddhist pagodas throughout the country. More than 1400 people, mostly monks were arrested and many of them were beaten," according to the Pentagon Papers. The CIA was bankrolling these Special Forces, which were supposed to be used for covert operations against the Viet Cong or North Vietnam, not for religious repression. The Johnson administration exploited the terrorist label to sway Americans to support greater U.S. Involvement in Vietnam. In a special message to Congress on May 18, 1964 seeking additional fund for Vietnam, LBJ declared, "the Viet Cong guerrillas, under orders from their Communist masters in the North, have intensified terrorist actions against the peaceful people of South Vietnam. This increased terrorism requires increased response."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and terrorism from reliable major media sources.
An offshore company that is trusted by the major web browsers and other tech companies to vouch for the legitimacy of websites has connections to contractors for U.S. intelligence agencies and law enforcement, according to security researchers, documents and interviews. Google's Chrome, Apple's Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to act as what's known as a root certificate authority, a powerful spot in the internet's infrastructure that guarantees websites are not fake, guiding users to them seamlessly. The company's Panamanian registration records show that it has the identical slate of officers, agents and partners as a spyware maker identified this year as an affiliate of Arizona-based Packet Forensics, which ... has sold communication interception services to U.S. government agencies for more than a decade. TrustCor's products include an email service that claims to be end-to-end encrypted, though experts consulted by The Washington Post said they found evidence to undermine that claim. A test version of the email service also included spyware developed by a Panamanian company related to Packet Forensics. A person familiar with Packet Forensics' work confirmed that it had used TrustCor's certificate process and its email service, MsgSafe, to intercept communications and help the U.S. government catch suspected terrorists. The physical address in Toronto given in [TrustCor's] auditor's report, 371 Front St. West, houses a UPS Store mail drop.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.
The Department of Homeland Security launched a failed operation that ensnared hundreds, if not thousands, of U.S. protesters in what new documents show was as a sweeping, power-hungry effort before the 2020 election to bolster President Donald Trump's spurious claims about a "terrorist organization" he accused his Democratic rivals of supporting. An internal investigative report, made public this month by Sen. Ron Wyden ... details the findings of DHS lawyers concerning a previously undisclosed effort by Trump's acting secretary of homeland security, Chad Wolf, to amass secret dossiers on Americans in Portland attending anti-racism protests in summer 2020 sparked by the police murder of ... George Floyd. The report describes attempts by top officials to link protesters to an imaginary terrorist plot in an apparent effort to boost Trump's reelection odds, raising concerns now about the ability of a sitting president to co-opt billions of dollars' worth of domestic intelligence assets for their own political gain. DHS analysts recounted orders to generate evidence of financial ties between protesters in custody; an effort that, had they not failed, would have seemingly served to legitimize President Trump's false claims about "Antifa." The report describes the dossiers generated by DHS as having detailed the past whereabouts and the "friends and followers of the subjects, as well as their ... First Amendment speech activity."
Note: Read about the FBI's use of entrapment to manufacture terrorist plots. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
The Supreme Court ruled Thursday that the federal government can shield former government contractors from testifying about the torture of a post-9/11 detainee. The decision likely will make it harder for victims to expose secret government misconduct in the future. Abu Zubaydah was the first prisoner held by the CIA to undergo what, at the time, was euphemistically called "enhanced interrogation." During one 20-day period, he was waterboarded 83 times, 24 hours a day. During that period, the suspected terrorist was also slammed against walls, put in a coffin-like box for hours at a time to simulate live burial, and subjected to something the government called "rectal rehydration." In the end, the two CIA contractors who supervised Zubaydah's interrogation concluded that they had the wrong man. But when lawyers for Zubaydah subpoenaed them, the U.S. government blocked the move by invoking the so-called "state secrets" privilege. In this case, both the Trump and Biden administrations argued that even though the information about the torture program is widely known, confirming the existence of CIA black sites in Poland would jeopardize the U.S. government's relationship with foreign intelligence services. Josh Colangelo-Bryan, a lawyer who represents other Guantanamo Bay detainees, was ... critical. "There has been no accountability for the U.S. program that subjected people to torture," he said in a statement.
Note: Read more about the CIA's torture program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Russia invaded Ukraine. For years now the Central Intelligence Agency has been preparing for such a moment, not only with prescient intelligence gathering and analysis but also by preparing Ukrainians to mount an insurgency against a Russian occupation. The agency has been training Ukrainian special forces and intelligence officers at a secret facility in the U.S. since 2015. Because the CIA training program is now publicly known, Russia can persuasively claim that Ukrainian insurgents are CIA proxies – a useful statement as propaganda to pro-Russian separatists in eastern Ukraine and as a justification for any harsh measures it takes against Ukrainian civilians. The CIA needs to be honest with the Ukrainians – and itself – about the real intent. In the first U.S.-backed insurgency, according to top secret documents later declassified, American officials intended to use the Ukrainians as a proxy force to bleed the Soviet Union. This time, is the primary goal of the paramilitary program to help Ukrainians liberate their country or to weaken Russia over the course of a long insurgency that will undoubtedly cost as many Ukrainian lives as Russian lives, if not more? Even if a Ukrainian insurgency bleeds Russia over years, the conflict could cause instability to spread across Central and Eastern Europe. This is a pattern in the history of U.S. paramilitary operations – from the Cold War to Afghanistan and Iraq today.
Note: For an alternative view of Ukraine's Zelensky, don't miss this excellent presentation by intrepid reporter Ben Swann (skip to 1:45 to avoid advertisement). For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and war from reliable major media sources.
On April 17, 2018, Terry Albury appeared in a federal court in Minneapolis, where he pleaded guilty to charges of leaking classified information to the press. The allegations – that Albury downloaded, printed and photographed internal F.B.I. documents on his office computer, sending some of them electronically to a journalist and saving others on external devices found in his home – resulted from a 17-month-long internal investigation by the F.B.I., prompted by two Freedom of Information Act requests by a news organization ... in March 2016. Nine months after these FOIA requests were made, a trove of internal F.B.I. documents shedding new light on the vast and largely unrestricted power of the post-9/11 F.B.I. was posted on the investigative-journalism site The Intercept. The cache included hundreds of pages of unredacted policy manuals, including the F.B.I.'s byzantine rule book, the Domestic Investigations and Operations Guide, exposing the hidden loopholes that allowed agents to violate the bureau's own rules against racial and religious profiling and domestic spying as they pursued the domestic war on terror. In October 2018, he was sentenced to four years in prison. Albury says he felt a moral imperative to make his disclosures, motivated by his belief that the bureau had been so fundamentally transformed by Sept. 11 that its own agents were compelled to commit civil and human rights violations.
Note: Listen to Albury talk about his experiences in this podcast. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
Haiti was born in 1804 out of a 13-year revolution in which the enslaved people of the then French colony of Saint-Domingue dismantled their chains, defeated, in succession, the armies of France, Britain and Spain, and established a new nation. Elites in Europe and America, meanwhile, fearful that the Haitian example might embolden others struggling for freedom, sought to isolate the new nation, refusing for decades even to recognise it. In 1825, France demanded, as the price of recognition, reparations of 150m francs. France was compelling enslaved people and their descendants to pay their former masters ... forcing [Haiti] to take out loans from French banks at exorbitant rates. By 1914, 80% of the government budget went to repaying the debt. Western nations have not only impoverished Haiti, they have also constantly intervened. Jean-Bertrand Aristide [was] a leftwing priest with mass support among Haiti's working class and poor. Twice, in 1990 and 2001, waves of public support propelled Aristide to the presidency. And twice, in 1991 and 2004, he was ousted in bloody coups. After the first coup, Aristide returned to power with US support. Nevertheless, many of the coup leaders were on the CIA payroll and the agency did not hide its hostility. A decade later, opposition to Aristide's economic and social policies led America to force him out of office. Today, the Haitian state barely exists.
Note: In 2021, Colombian mercenaries who had received training in the US assassinated Haitian President Jovenel MoĂŻse. For more along these lines, see concise summaries of important news articles on intelligence agency corruption from reliable major media sources.
We celebrate World Press Freedom Day in May as a reminder that the role of news organizations is to speak truth to power. It's an occasion to remember three people who exemplify the need to speak the truth: Daniel Ellsberg of Pentagon Papers fame and Julian Assange of WikiLeaks; and also of Chelsea Manning, without whom we would not have the proof of what the United States was doing, not only in Iraq and Afghanistan but all across the globe. Ellsberg's Pentagon Papers were a mere 7,000 pages, and he photocopied them by hand. Chelsea Manning's "papers", which Assange outed, earning the U.S. government's enmity, consisted of about 750,000 documents. Assange and WikiLeaks that made possible for Manning's information to reach people across the globe. And even when he and Manning have been arrested, jailed and isolated, the information on Wikileaks still continues to be accessible to all of us. Even today the Baghdad video of Collateral Murder, posted on WikiLeaks, was seen across the world and brought home that the United States was lying and involved in a massive cover-up of its war crimes. The Diplomatic Cables on Wikileaks informed the Tunisian people about the kleptocratic rule of the Ben Ali family and started what was later named as Arab Spring. Just as the surveillance state has invaded every nook and corner of our lives, the pathological need of the surveillance state to access and store all this information also makes the state porous and vulnerable.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
In early 2018, former National Security Agency chief Keith Alexander worked out a deal with Saudi Crown Prince Mohammed bin Salman and the cyber institute led by one of his closest aides, Saud al-Qahtani, to help the Saudi ruler train the next generation of Saudi hackers. The agreement between IronNet, founded by Alexander, and the cyber school ... faced no scrutiny for its association with Qahtani, after the brutal killing of Jamal Khashoggi he reportedly orchestrated just a few months later. Alexander officially inked the deal with the Prince Mohammed bin Salman College of Cyber Security, Artificial Intelligence, and Advanced Technologies – a school set up to train Saudi cyber intelligence agents – at a signing ceremony in Washington, D.C.. Saudi Arabia's agreement with IronNet was part of a host of moves to step up its cyber capabilities, coinciding with a campaign against the kingdom's critics abroad. Khashoggi, then a Washington Post columnist and prominent Salman critic, received a series of threatening messages, including one from Qahtani, warning him to remain silent. Khashoggi, whose family and close associates discovered listening malware electronically implanted on their smartphones, was then lured to the Saudi Embassy in Istanbul. It was there that a team dispatched by Qahtani detained and tortured the Saudi government critic. Qahtani, according to reports, beamed in through Skype to insult Khashoggi during the ordeal. Khashoggi was then dismembered with a bone saw.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The United States is stepping up digital incursions into Russia’s electric power grid in a warning to President Vladimir V. Putin and a demonstration of how the Trump administration is using new authorities to deploy cybertools more aggressively, current and former government officials said. In interviews over the past three months, the officials described the previously unreported deployment of American computer code inside Russia’s grid and other targets as a classified companion to more publicly discussed action directed at Moscow’s disinformation and hacking units around the 2018 midterm elections. In August of 2018, President Trump signed [an] executive order ... called National Security Presidential Memorandum 13. Its contents are still classified, but essentially it allows the Cyber Command to go ahead and conduct all kinds of operations inside foreign networks without going back to the president for prior approval. The first thing it did was go after those units in Russia that were responsible for a lot of the election-hacking. They went after the G.R.U., the Russian military intelligence unit that had been responsible for breaking into the D.N.C.. A lot of that ... was made public. What wasn’t made public was a parallel effort to go inside the Russian power grid, to put some code in places where the Russians ... wouldn’t see it, in case the U.S. ever needed to act against Russia’s utilities as the Russians were putting malware in our systems.
Note: A 2007 New York Times article describes the formation of the Air Force Cyberspace Command to arm the US military in anticipation of widespread computer-based warfare. A more recent Guardian article says, "we might already be living through the first world cyberwar." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The CIA's chief technology officer outlined the agency's endless appetite for data in a far-ranging speech. Ira "Gus" Hunt said that the world is increasingly awash in information from text messages, tweets, and videos - and that the agency wants all of it. "The value of any piece of information is only known when you can connect it with something else that arrives at a future point in time," Hunt said. "Since you can't connect dots you don't have, it drives us into a mode of, we fundamentally try to collect everything and hang on to it forever." Hunt's comments come two days after Federal Computer Week reported that the CIA has committed to a massive, $600 million, 10-year deal with Amazon for cloud computing services. "It is really very nearly within our grasp to be able to compute on all human generated information," Hunt said. After that mark is reached, Hunt said, the agency would also like to be able to save and analyze all of the digital breadcrumbs people don't even know they are creating. "You're already a walking sensor platform," he said, noting that mobiles, smartphones and iPads come with cameras, accelerometers, light detectors and geolocation capabilities. "Somebody can know where you are at all times, because you carry a mobile device, even if that mobile device is turned off," he said. Hunt also spoke of mobile apps that will be able to control pacemakers - even involuntarily - and joked about a "dystopian" future. Hunt's speech barely touched on privacy concerns.
Note: The Internet of Things makes mass surveillance even easier. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
A federal jury held a defense contractor legally responsible for contributing to the abuse of detainees at Abu Ghraib for the first time. The jury awarded a total of $42 million to three Iraqi men – a journalist, a middle school principal, and fruit vendor – who were held at the notorious prison two decades ago. The plaintiffs' suit accused Virginia-based CACI, which was hired by the U.S. government to provide interrogation services at Abu Ghraib, of conspiring with American soldiers to torture detainees. CACI had argued that while abuses did occur at Abu Ghraib, it was ultimately the Army who was responsible for this conduct, even if CACI employees may have been involved. The defense contractor also argued there was no definitive evidence that their staff abused the three Iraqi men who filed the case – and that it could have been American soldiers who tortured them. The jury did not find that argument persuasive. The case was filed 16 years ago but got caught up in procedural hurdles, as CACI tried more than 20 times to dismiss the lawsuit. The plaintiffs – Suhail Najim Abdullah Al Shimari, Salah Hasan Nusaif Al-Ejaili, and Asa'ad Hamza Hanfoosh Zuba'e – had testified about facing sexual abuse and harassment, as well as being beaten and threatened with dogs at Abu Ghraib. "My body was like a machine, responding to all external orders," [said] Al-Ejaili, a former journalist with Al Jazeera. "The only part I owned was my brain."
Note: Read more about the horrors of Abu Ghraib. Learn more about US torture programs in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
Following Iran's missile barrage into Israel last week, carried out in retaliation for Israel's assassinations of Hamas and Hezbollah leaders, vice president and Democratic presidential nominee Kamala Harris called Iran a "destabilizing, dangerous force" in the Middle East, opening a new chapter in a long history of US hawkishness against Iran. This past Monday, she went even further, calling Iran the United States' "greatest adversary." It's hard to hear such statements without hearkening back to New Year's Eve, 1977, a year before the Iranian Revolution broke out. In the heat of growing civil unrest in Iran, US president Jimmy Carter attended a lavish state dinner with the shah of Iran, Mohammad Reza Pahlavi. Twenty-four years earlier, during "Operation Ajax," the CIA, in collaboration with the British MI6, had orchestrated a coup that ousted the democratically elected Iranian prime minister Mohammed Mossadegh, who had won on a platform of nationalizing Iranian oil and taking it back from Western control. The coup set into motion the destruction of the country's budding democracy and would haunt Iranians for decades. The United States has worked to destabilize Iran for nearly a century. With the Democratic presidential nominee once again trotting out hawkish tirades against Iran while backing Israel's new assault on Lebanon, American officials seem to have learned nothing from history.
Note: Read more about the CIA-backed 1953 coup in Iran. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
In February 2023, government recruiters came to the student union at the University of Michigan Ann Arbor. Activists had come to protest the expansion of Camp Grayling, already the largest National Guard training facility in the country. "Want blood on your hands?" read the flyers activists distributed on recruiting tables. "Sign up for a government job." When the recruiters returned from lunch, two protesters rushed in, dousing the NSA recruiting table and two Navy personnel with fake blood sprayed out of a ketchup container. The local sheriff's office in Oakland County, Michigan, documented the incident in a case report as a hate crime against law enforcement. The FBI recorded the incident as part of a terrorism investigation. Treating the Stop Camp Grayling protesters as terrorists is the latest episode in a worldwide trend of governments smearing climate and environmental activists as terrorists. Misapplication of the terrorism label frequently serves as pretext for invasive surveillance and sustained scrutiny. Stop Camp Grayling – like most other movements organized around environmental activism – is not engaged in any type of systematic criminal activity. Movement adherents have never endangered human life. Yet the FBI saw fit to share an activist zine with military intelligence, drag in other alphabet agencies, and justify physical surveillance operations – all underpinned by the designation of the movement as worthy of a domestic terrorism investigation.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.
Edward Snowden wrote on social media to his nearly 6 million followers, "Do not ever trust @OpenAI ... You have been warned," following the appointment of retired U.S. Army General Paul Nakasone to the board of the artificial intelligence technology company. Snowden, a former National Security Agency (NSA) subcontractor, was charged with espionage by the Justice Department in 2013 after leaking thousands of top-secret records, exposing the agency's surveillance of private citizens' information. In a Friday morning post on X, formerly Twitter, Snowden reshared a post providing information on OpenAI's newest board member. Nakasone is a former NSA director, and the longest-serving leader of the U.S. Cyber Command and chief of the Central Security Service. In [a] statement, Nakasone said, "OpenAI's dedication to its mission aligns closely with my own values and experience in public service. I look forward to contributing to OpenAI's efforts to ensure artificial general intelligence is safe and beneficial to people around the world." Snowden wrote in an X post, "They've gone full mask-off: do not ever trust @OpenAI or its products (ChatGPT etc.) There is only one reason for appointing an @NSAGov Director to your board. This is a willful, calculated betrayal of the rights of every person on Earth." Snowden's post has received widespread attention, with nearly 2 million views, 43,500 likes, 16,000 reposts and around 1,000 comments as of Friday afternoon.
Note: For more along these lines, see concise summaries of deeply revealing news articles on AI and intelligence agency corruption from reliable major media sources.
OpenAI on Thursday announced its newest board member: Paul M. Nakasone, a retired U.S. Army general and former director of the National Security Agency. Nakasone was the longest-serving leader of the U.S. Cyber Command and chief of the Central Security Service. The company said Nakasone will also join OpenAI's recently created Safety and Security Committee. The committee is spending 90 days evaluating the company's processes and safeguards before making recommendations to the board and, eventually, updating the public, OpenAI said. OpenAI is bolstering its board and its C-suite as its large language models gain importance across the tech sector and as competition rapidly emerges in the burgeoning generative artificial intelligence market. While the company has been in hyper-growth mode since late 2022, when it launched ChatGPT, OpenAI has also been riddled with controversy and high-level employee departures. The company said Sarah Friar, previously CEO of Nextdoor and finance chief at Square, is joining as chief financial officer. OpenAI also hired Kevin Weil, an ex-president at Planet Labs, as its new chief product officer. Weil was previously a senior vice president at Twitter and a vice president at Facebook and Instagram. Weil's product team will focus on "applying our research to products and services that benefit consumers, developers, and businesses," the company wrote.
Note: For more along these lines, see concise summaries of deeply revealing news articles on AI and intelligence agency corruption from reliable major media sources.
Starting in 2016, United States government intelligence agencies, news media, and establishment leaders in both political parties warned of a vast Russian conspiracy to interfere in elections. Every major allegation proved to be wrong or profoundly misleading. According to every serious political scientist, Russia had no measurable influence in the 2016 elections. According to intelligence and security services, the news media, and establishment political leaders across the Western World, Russia is currently interfering in European elections by secretly bribing conservative politicians. Yesterday, the Washington Post repeated the claim. But neither the government agencies nor the news media have produced any evidence to support their accusations, and every single individual accused of taking money from the Russians has denied it. What we are witnessing appears to be establishment politicians weaponizing government intelligence agencies to interfere in Europe's elections, with the active participation of mainstream German NGOs and news media companies. The weaponization of government by politicians and intelligence agencies should terrify us all. Just because you're not the victim in this particular case, either because you're not European or conservative, is no reason to think that what's happening couldn't affect you and the people you love and care about in the future.
Note: Read about the 2016 leak of DNC documents that was blamed on Russian Hackers. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The violent crackdown carried out on Columbia University students protesting Israel's genocidal assault on the Gaza Strip was led by a member of the school's own faculty, New York City Mayor Eric Adams has declared. During a May 1 press conference, just hours after the New York Police Department arrested nearly 300 people on university grounds, Adams praised adjunct Columbia professor Rebecca Weiner, who moonlights as the head of the NYPD counter-terrorism bureau, for giving police the green light to clear out anti-genocide students by force. Weiner maintained an office at Columbia's School of International and Public Affairs (SIPA). Her SIPA bio describes her as an "Adjunct Associate Professor of International and Public Affairs" who simultaneously serves as the "civilian executive in charge of the New York City Police Department's Intelligence & Counterterrorism Bureau." In that role ... Weiner "develops policy and strategic priorities for the Intelligence & Counterterrorism Bureau and publicly represents the NYPD in matters involving counterterrorism and intelligence." A 2011 AP investigation revealed that a so-called "Demographics Unit" operated secretly within the NYPD's Counterterrorism and Intelligence Bureau. This shadowy outfit spied on Muslims around the New York City area. The unit was developed in tandem with the CIA. As a former police official told the AP, the unit attempted to "map the city's human terrain" through a program "modeled in part on how Israeli authorities operate in the West Bank."
Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the erosion of civil liberties from reliable major media sources.
SpaceX is building a network of hundreds of spy satellites under a classified contract with a U.S. intelligence agency, five sources familiar with the program said. The network is being built by SpaceX's Starshield business unit under a $1.8 billion contract signed in 2021 with the National Reconnaissance Office (NRO), an intelligence agency that manages spy satellites. The plans show the extent of SpaceX's involvement in U.S. intelligence and military projects and illustrate a deeper Pentagon investment into vast, low-Earth orbiting satellite systems aimed at supporting ground forces. If successful, the sources said the program would significantly advance the ability of the U.S. government and military to quickly spot potential targets almost anywhere on the globe. Reuters reporting discloses for the first time that the SpaceX contract is for a powerful new spy system with hundreds of satellites bearing Earth-imaging capabilities that can operate as a swarm in low orbits. The planned Starshield network is separate from Starlink, SpaceX's growing commercial broadband constellation that has about 5,500 satellites in space. The classified constellation of spy satellites represents one of the U.S. government's most sought-after capabilities in space because it is designed to offer the most persistent, pervasive and rapid coverage of activities on Earth. "No one can hide," one of the sources said of the system's potential capability, when describing the network's reach.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Under ... Section 702 [of the Foreign Intelligence Surveillance Act], the US government collects hundreds of millions of phone calls, emails, and text messages each year. An inestimable chunk belongs to American citizens, permanent residents, and others in the United States neither suspected nor accused of any crime. Police and intelligence agencies buy their way around the Fourth Amendment by paying US companies for information that they'd otherwise demand a warrant to disclose. The House Intelligence Committee's bill–the FISA Reform and Reauthorization Act, or FRRA–does nothing to address this privacy threat. What the FRRA does appear to do, despite its name, is explode the number of companies the US government may compel to cooperate with wiretaps under Section 702. That was the assessment on Friday of Marc Zwillinger, amicus curiae to the Foreign Intelligence Surveillance Court of Review (FISCR). Section 702 currently allows the government to compel a class of companies called "electronic communications providers" to collect communications. If the FRRA becomes law, according to Zwillinger, that category would be greatly expanded to include a slew of new businesses, including "data centers, colocation providers, business landlords, and shared workspaces," as well as, he says, "hotels where guests connect to the internet." Communications may be seized under 702 and only years later dug up for an entirely different reason.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
When Edward Snowden blew the whistle on mass surveillance by the US government, he traded a comfortable existence in Hawaii, the paradise of the Pacific, for indefinite exile in Russia, now a pariah in much of the world. But 10 years after Snowden was identified as the source of the biggest National Security Agency (NSA) leak in history, it is less clear whether America underwent a similarly profound transformation in its attitude to safeguarding individual privacy. Was his act of self-sacrifice worth it – did he make a difference? On 6 June 2013, the Guardian published the first story based on Snowden's disclosures, revealing that a secret court order was allowing the US government to get Verizon to share the phone records of millions of Americans. The impact was dramatic. James Clapper, the director of national intelligence, who earlier that year had testified to Congress that the NSA did not collect data on millions of Americans, was forced to apologise and admit that his statement had been "clearly erroneous". The American Civil Liberties Union (ACLU) filed a constitutional lawsuit in federal court. It eventually led to a ruling that held the NSA telephone collection program was and always had been illegal, a significant breakthrough given that national security surveillance programs had typically been insulated from judicial review. You will not find any coherent statement by any US security official that says clearly what harm was done by these disclosures.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Frank Forrester Church sat in the US Senate for 24 years. He battled for civil rights and came to oppose the Vietnam war. He believed Americans were citizens, not subjects. Chairing the intelligence select committee was his most enduring accomplishment. James Risen, a Pulitzer-winning reporter now with the Intercept, sees him as a hero. The Last Honest Man is both paean and lament. "For decades ... the CIA's operations faced only glancing scrutiny from the White House, and virtually none from Congress," Risen writes. "True oversight would have to wait until 1975, and the arrival on the national stage of a senator from Idaho, Frank Church." For 16 months, Church and his committee scrutinized the CIA, FBI and National Security Agency and their many abuses. Political assassinations, covert operations and domestic surveillance finally received scrutiny and oversight. A plot to kill Fidel Castro, with an assist from organized crime, made headlines. So did the personal ties that bound John F Kennedy, mob boss Sam Giancana and their shared mistress, Judith Campbell Exner. Giancana was murdered before he testified. Before John Rosselli, another mobster, could make a third appearance, his decomposed body turned up in a steel fuel drum near Miami. Against this grizzly but intriguing backdrop, Risen's book is aptly subtitled: The CIA, the FBI, the Mafia, and the Kennedys – And One Senator's Fight to Save Democracy.
Note: Read more about James Risen's courageous reporting on the intelligence community. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
A set of secret national security documents burst into public view last week. The intelligence documents appear to have entered the public domain in an unusual way – someone began sharing them, starting late last year, on an obscure Discord server called Thug Shaker Central. The alleged leaker, Jack Teixeira, a member of the Massachusetts Air National Guard, was arrested. It is traditional for the government to exaggerate the alleged harms of classified information becoming public, and this appears to be happening again. The real problem isn't what's leaked, but what's classified. Almost every news story about the latest disclosures has noted that the Pentagon and other government agencies will now put tighter lids on secret documents, even though, as historian Matthew Connelly points out in his new book, "The Declassification Engine," the government already puts way too much material behind its moat. In fact, the human harm caused by unauthorized leaks is almost always inflicted by the government itself in the form of egregious prosecutions of leakers. Although Snowden, [Chelsea] Manning, and, more recently, Reality Winner, revealed secrets that the public had a right to know, the government charged all of them under the draconian Espionage Act. While Snowden sought safety in Russia, Manning served seven years in prison (she was originally sentenced to 35 years), and Winner was sentenced to more than five years for leaking just a single document.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
It's actually a very large universe of people with access to Top Secret data. The Director of National Intelligence publishes what is described as an annual report, "Security Clearance Determinations," although the most recent one I could find was from 2017. In it, more than 2.8 million people are described as having security clearance as of October 2017 – more than 1.6 million have access to either Confidential or Secret information and nearly 1.2 million are described as having access to Top Secret information. There are additional people who have security clearance but don't currently have access to information. This includes civilian employees, contractors and members of the military. Each agency that deals in classification has its own system. Top Secret ... is the highest level of classification. Information is classified as Top Secret if it "reasonably could be expected to cause exceptionally grave damage to the national security," according to a 2009 executive order. A subset of Top Secret documents known as SCI, or sensitive compartmented information, is reserved for certain information derived from intelligence sources. Access to an SCI document can be even further restricted to a smaller group of people with specific security clearances. Information is classified as Secret if the information is deemed to be able to cause "serious damage" to national security if revealed. Confidential is the least sensitive level of classification.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
On June 28, Ghislaine Maxwell was sentenced to 20 years in prison for conspiring with Jeffrey Epstein to recruit, groom and abuse underage girls. In Maxwell's defense, lawyer Bobbi C. Sternheim said that Ms. Maxwell's life had been clouded by two men: "her narcissistic, brutish father" Robert Maxwell, wealthy British media tycoon and former member of parliament, and "the controlling, demanding, manipulative" Jeffrey Epstein. What [Maxwell] could not say was that she was the one to take the fall for a sexual blackmail operation sponsored by Western intelligence agencies. That operation appears to have originated with her father Robert back in the 1980s. Ari Ben-Menashe, a former Israeli intelligence official, claimed to have seen Jeffrey Epstein in Robert's office in the early 1980s. Robert was a long-time operative for Israeli intelligence. Ben-Menashe [said] that Epstein "was the simple idiot who was going around providing girls to all kinds of politicians in the United States. He was taking photos of politicians fucking fourteen year old girls. They would just blackmail people like this." Maxwell ... claims she has copies of everything that Epstein had and a secret stash of pedophile sex tapes that could implicate the world's most powerful and will try to use them to save herself. The flight logs from [Epstein's] Lolita Express reveal a "who's who" of early 1990s high society, including ... lawyer Alan Dershowitz, conservative billionaire David Koch; and politicians such as Tony Blair.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and Jeffrey Epstein from reliable major media sources.
The FBI raised eyebrows on Tuesday when the agency announced that it would not be accepting electronic Freedom of Information Act (FOIA) requests due to the ongoing coronavirus outbreak. As the spread of the virus continues to disrupt normal functions of society like schools, restaurants and sporting events, not many could have predicted that the electronic requests for FBI documents would be affected. "Due to the emerging COVID-19 situation, the FBI is not accepting electronic Freedom of Information/Privacy Act requests or sending out electronic responses through the eFOIPA portal at this time. You may still submit a FOIPA request via standard mail. We apologize for this inconvenience and appreciate your understanding," a red-bolded disclaimer stated on the FBI website. The sudden halt of electronic FOIA requests sparked puzzled reactions on social media. "This is crazy but, then again, FBI and FOIA is a disastrous combo," BuzzFeed senior investigative Jason Leopold tweeted. "The FBI is responding to coronavirus by using it as an opportunity to kill off journalists who really want transparency." They would prefer to receive only those requests laden with all of our germs and whatnot?" Reuters reporter Brad Heath asked.
Note: You can verify this information on the FBI website at this link. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the coronavirus pandemic from reliable major media sources.
Katharine Gun and Martin Bright could be forgiven for fielding Hollywood’s overtures with a degree of skepticism. Ever since their story was documented in Marcia and Thomas Mitchell’s 2008 book “The Spy Who Tried to Stop a War,” Gun, the British whistleblower who attempted to prevent the Iraq War, and Bright, an investigative journalist who broke the leak, had sat down with many a filmmaker interested in translating their tale. So when veteran South African director Gavin Hood expressed interest, Gun and Bright took the development with a grain of salt. When Gun met with Hood, however, she was struck by his engagement. The end result, “Official Secrets,” opens locally Friday with Keira Knightley playing Gun and Matt Smith as Bright. The movie depicts the decision Gun made in 2003, while working for British intelligence agency GCHQ, to leak a secret memo exposing plans by the American government to potentially blackmail members of the U.N. Security Council into supporting the Iraq War. “Official Secrets” probes myriad issues that remain resonant a decade and a half later, including government overreach and accountability, the toxicity of anti-Muslim sentiment, and the merits of an intrepid free press. By positioning Gun as an everywoman, “Official Secrets” asks its audience to ponder the moral dilemma at its core. “I didn’t set out to be a whistleblower,” Gun says. “Hopefully people will see it and come away with the thought, ‘What would I do if I was in a similar situation?’”
Note: Explore more on this courageous whistleblower in this revealing article. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Redactions ... symbolize the ongoing tug-of-war between discretion and truth, between a government that knows what we don’t need to know and a citizenry that desires the whole story. That desire is inflamed after two years of theorizing about the Mueller report. “I think it’s going to be more disappointing than not, and frustrating to many,” says D.C. attorney Mark S. Zaid, who handles cases involving national security and the Freedom of Information Act (FOIA). Zaid once sued the government for records related to the death of Princess Diana and the FBI surrendered reams of material. Zaid was thrilled, until he opened the boxes. Two thousand pages of redactions. Every page, blacked out. In 2003 the Department of Justice released a 186-page report on its hiring practices, and half of it was blacked out. American leaders brag about transparency but their agencies historically have cultivated a “culture of caution.” By the turn of last century at least 1.5 billion documents over 25 years old were kept from the public because of national security concerns. Classification cost the federal government $18.49 billion in fiscal year 2017 alone. Redactions can be cosmetic, or historic [like] the 14 blank pages of a 2002 Pentagon assessment of Iraq’s nuclear-weapons program. [Yet] when 19,045 documents related to the John F. Kennedy assassination were released last year, Nate Jones of the National Security Archive was struck by the banality of the information the government had insisted on keeping secret for years.
Note: Why was so much material around the death of Princess Diana redacted? Explore some of the strangeness around the killing of Princess Diana in this news article. For more along these lines, see concise summaries of deeply revealing news articles on secrecy from reliable major media sources.
An ex-CIA technician believed to be behind one of the worst leaks in agency history says the conditions at the federal jail in lower Manhattan are so bad that he’d rather be a prisoner in North Korea. Joshua Schulte ... described the Metropolitan Correctional Center as a living hell where inmates are “dragged from their cages and beaten and maced,” forced to bathe in “s–t-filled showers,” thrown into solitary confinement for no reason and improperly barred from communicating with their lawyers. “They even refuse us pens and stamps so we can’t even write,” Schulte told a judge in a letter that he says he was only able to write after he borrowed a pen from a medical assistant. The ex-CIA software engineer has been in the MCC since last year after the feds raided his New York apartment on suspicion that he had leaked classified documents to WikiLeaks. Immediately following the raid, he was ... charged with possession of kiddie porn. It wasn’t until this year that the feds slapped Schulte with a 13-count superseding indictment for leaking classified information, including national defense information, that he believed could be used “to the injury of the United States and the advantage of a foreign nation.” The MCC has been the target of numerous complaints in recent months. Reputed mobster John “Porky” Zancocchio recently got sprung from the lockup, where he was sent for a bail violation, after his lawyer complained that the food there was hurting his client’s already failing health.
Note: Read more on the "Vault 7" CIA files Schulte is accused of leaking. For more along these lines, see concise summaries of deeply revealing prison system corruption news articles from reliable major media sources.
During the Cold War, the CIA funded a series of secret brainwashing experiments at a prestigious psychiatric clinic. No method was too bizarre, including using LSD, hypnosis, prolonged periods of induced sleep, and electrical shocks to the brain. Patients were given the treatment without explanation or consent, and even decades later complained that they had never completely recovered. Bob Logie was admitted to Allen Memorial hospital at age 18 to treat psychosomatic leg pain. He was repeatedly given LSD as a test subject without his consent, [and was] exposed to massive doses of electroshock therapy and kept asleep for up to a month at a time. Tape messages were played repeatedly while he slept. Logie said the effect of the treatments stayed with him. No one knows how many patients were exposed to the program of chemical and electro-shock treatments. But documents and testimony have revealed that the Montreal experiments were part of a series of psychological projects given code names such as MK Ultra and run by the CIA in a quest to understand how to brainwash people. Many years passed before there was any public or official acknowledgment of what patients at Allen Memorial had been through. [In 1998] the CIA agreed to pay some of the patients an out of court settlement of $750 thousand. It emerged that during that time Ottawa helped suppress evidence that CIA officials had apologized to the Canadian government when the CIA experiments were first revealed.
Note: Watch the complete Fifth Estate report at the link above. The Canadian government has been actively attempting to silence victims of this program for over forty years. Read more on the court cases stemming from Dr Ewen Cameron's CIA-funded experiments in this Times of London article. Read also an excellent summary on the involvement of doctors in the CIA's brainwashing experiments. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
Spies for centuries have trained their sights on those who shape destinies of nations: presidents, prime ministers, kings. And in the 21st century, most of them carry smartphones. Such is the underlying logic for some of the most tantalizing discoveries for an international investigation that in recent months scrutinized a list of more than 50,000 phone numbers that included – according to forensic analyses of dozens of iPhones – at least some people targeted by Pegasus spyware licensed to governments worldwide. The list contained the numbers of politicians and government officials by the hundreds. But what of heads of state and governments, arguably the most coveted of targets? Fourteen. Or more specifically: three presidents, 10 prime ministers and a king. Forensic testing that might have revealed infection by NSO's signature spyware, Pegasus, was not possible. Nor was it possible to determine whether any NSO client attempted to deliver Pegasus to the phones of these country leaders – much less whether any succeeded in turning these highly personal devices into pocket spies capable of tracking a national leader's nearly every movement, communication and personal relationship. According to NSO marketing materials and security researchers, Pegasus is designed to collect files, photos, call logs, location records, communications and other private data from smartphones, and can activate cameras and microphones as well for real-time surveillance at key moments.
Note: Read how this Pegasus spyware was used to target activists and journalists in Mexico. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
The Associated Press sought answers Monday from the Department of Homeland Security on its use of sensitive government databases for tracking international terrorists to investigate as many as 20 American journalists, including an acclaimed AP reporter. In a letter to DHS Secretary Alejandro Mayorkas, AP Executive Editor Julie Pace urged the agency to explain why the name of Pulitzer Prize-winning investigative reporter Martha Mendoza was run through the databases and identified as a potential confidential informant during the Trump administration, as detailed in a report by Homeland Security's inspector general. The DHS investigation of U.S. journalists, as well as congressional staff and perhaps members of Congress ... represents the latest apparent example of an agency created in the wake of the 9/11 attacks using its vast capabilities to target American citizens. The AP's letter ... called for "assurances that these improper practices and apparent abuse of power will not continue going forward." That would be in line with recent order from Attorney General Merrick Garland prohibiting the seizing of records of journalists in leak investigations. That followed an outcry over revelations that the Justice Department under former President Donald Trump had obtained records belonging to journalists, as well as Democratic members of Congress. During the Obama administration, federal investigators secretly seized phone records for some reporters and editors at the AP.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable major media sources.
One shows the prisoner nude and strapped to a crude gurney, his entire body clenched as he is waterboarded by an unseen interrogator. Another shows him with his wrists cuffed to bars so high above his head he is forced on to his tiptoes. They are sketches drawn in captivity by the Guantánamo Bay prisoner known as Abu Zubaydah, self-portraits of the torture he was subjected to during the four years he was held in secret prisons by the C.I.A.. In each illustration, Mr. Zubaydah ... portrays the particular techniques as he says they were used on him at a C.I.A. black site in Thailand in August 2002. They demonstrate how, more than a decade after the Obama administration outlawed the program — and then went on to partly declassify a Senate study that found the C.I.A. lied about both its effectiveness and its brutality — the final chapter of the black sites has yet to be written. Mr. Zubaydah, 48, drew them this year at Guantánamo for inclusion in a 61-page report, “How America Tortures,” by his lawyer, Mark P. Denbeaux, a professor at the Seton Hall University School of Law in Newark, and some of Mr. Denbeaux’s students. The report uses firsthand accounts, internal Bush administration memos, prisoners’ memories and the 2014 Senate Intelligence Committee report to analyze the interrogation program. The program was initially set up for Mr. Zubaydah, who was mistakenly believed to be a top Qaeda lieutenant. He has never been charged with a crime.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The FBI has come under intense criticism after a 2017 leak exposed that its counterterrorism division had invented a new, unfounded domestic terrorism category it called “black identity extremism.” A number of civil rights groups have filed public records requests to try to better understand who exactly the FBI is investigating under that designation. The latest batch of FBI documents ... reveals that between 2015 and 2018, the FBI dedicated considerable time and resources to opening a series of “assessments” into the activities of individuals and groups it mostly labeled “black separatist extremists.” This designation was eventually folded into the category of “black identity extremism.” Assessments differ from full-blown investigations - or “predicated investigations,” in the bureau’s lingo - because they do not need to be predicated on a factual basis. As a new report by the civil liberties group Defending Rights & Dissent notes, when choosing targets for an assessment, agents are allowed to use ethnicity, religion, or speech protected by the First Amendment as a factor, “as long as it is not the only one.” As the report notes, “Even though the standards for opening an assessment are extraordinarily low, the FBI is allowed to use extremely intrusive investigative techniques in performing them, including physical surveillance, use of informants, and pretextual interviews.” The bureau has in recent years shifted its target from those espousing “separatist” views to the much larger group of those protesting police violence.
Note: Read more about the FBI's use of "Black Identity Extremism" as a label in its terrorism investigations. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
One of the very first things I was taught when I joined the C.I.A. was that we do not conduct assassinations. It was drilled into new recruits over and over again. Today, it seems that all that is left of this policy is a euphemism. We don’t call them assassinations anymore. Now, they are “targeted killings,” most often performed by drone strike, and they have become America’s go-to weapon in the war on terror. There have been many who have objected, claiming that the killings inspire more attacks on the United States, complicate our diplomacy and undermine our moral authority in the world. Yet the targeted killings drone on with no end in sight. Just counting the campaigns in Pakistan, Yemen and Somalia, the Bush administration conducted at least 47 targeted killings by drones, while under the Obama administration that number rose to 542. America’s difficult relationship with targeted killing and the dilemmas we may face in the future are beautifully illuminated by the longer story of Israel’s experiences with assassination in its own endless war against terrorism. Israel has always been just a bit farther down this slippery slope than the United States. Americans now have a terrific new introduction to that story with the publication of Ronen Bergman’s “Rise and Kill First: The Secret History of Israel’s Targeted Assassinations.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on war and assassinations.
John Bolton, a former U.S. ambassador to the United Nations and former White House national security adviser, said on Tuesday that he had helped plan attempted coups in foreign countries. Bolton made the remarks to CNN after the day's congressional hearing into the Jan 6, 2021, attack on the U.S. Capitol. The panel's lawmakers ... accused former President Donald Trump of inciting the violence in a last-ditch bid to remain in power after losing the 2020 election. Speaking to CNN anchor Jake Tapper, however, Bolton suggested Trump was not competent enough to pull off a "carefully planned coup d'etat," later adding: "As somebody who has helped plan coups d'etat - not here but you know (in) other places - it takes a lot of work. And that's not what he (Trump) did." Tapper asked Bolton which attempts he was referring to. "I'm not going to get into the specifics," Bolton said, before mentioning Venezuela. "It turned out not to be successful. Not that we had all that much to do with it but I saw what it took for an opposition to try and overturn an illegally elected president and they failed," he said. "I feel like there's other stuff you're not telling me (beyond Venezuela)," the CNN anchor said, prompting a reply from Bolton: "I'm sure there is." Many foreign policy experts have over the years criticized Washington's history of interventions in other countries, from its role in the 1953 overthrowing of then Iranian nationalist prime minister Mohammad Mosaddegh and the Vietnam war, to its invasions of Iraq and Afghanistan this century.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in intelligence services from reliable major media sources.
Almost 40 years after his death following a bar brawl in Key Biscayne, Ricardo Morales, known as "Monkey" – contract CIA worker, anti-Castro militant, counter-intelligence chief for Venezuela, FBI informant and drug dealer – returned to the spotlight Thursday morning when one of his sons made a startling claim on Spanish-language radio: Morales, a sniper instructor in the early 1960s in secret camps where Cuban exiles and others trained to invade Cuba, realized in the hours after President John F. Kennedy was assassinated in Dallas in 1963 that the accused killer, Lee Harvey Oswald, had been one of his sniper trainees. Morales also told his two sons that two days before the assassination, his CIA handler told him and his "clean-up" team to go to Dallas for a mission. But after the tragic events, they were ordered to go back to Miami without learning what the mission was about. The claims ... add to one of the long-held theories about the JFK assassination – that Cuban exiles working for the CIA had been involved. But the claims also point the finger at the CIA, which some observers believe could help explain why President Joe Biden backed off last week on declassifying the remaining documents in the case. Morales Jr. said his father told them he did not know of the plans to assassinate Kennedy. "He knew Kennedy was coming to Dallas, so he imagines something is going to happen, but he doesn't know the plan," he said. "In these kinds of conspiracies ... nobody knows what the other is doing."
Note: For more along these lines, see concise summaries of deeply revealing news articles on the JFK assassination from reliable major media sources.
It is widely regarded as the world's most potent spyware, capable of reliably cracking the encrypted communications of iPhone and Android smartphones. The software, Pegasus, made by an Israeli company, NSO Group, has been able to track terrorists and drug cartels. It has also been used against human rights activists, journalists and dissidents. Now, an investigation published Friday by The New York Times Magazine has found that Israel, which controls the export of the spyware ... has made Pegasus a key component of its national security strategy, using it to advance its interests around the world. The F.B.I. bought and tested NSO software for years with plans to use it for domestic surveillance until the agency finally decided last year not to deploy the tools. The F.B.I., in a deal never previously reported, bought the spyware in 2019. It also spent two years discussing whether to deploy a newer product, called Phantom, inside the United States. The discussions at the Justice Department and the F.B.I. continued until last summer. But Pegasus equipment is still in a New Jersey building used by the F.B.I. And the company also gave the agency a demonstration of Phantom, which could hack American phone numbers. A brochure ... says that Phantom allows American law enforcement and spy agencies to "turn your target's smartphone into an intelligence gold mine." In 2018 ... the C.I.A. bought Pegasus to help Djibouti, an American ally, fight terrorism, despite longstanding concerns about human rights abuses there.
Note: Read about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
In January 2010 Israeli agents converged on a luxury hotel in Dubai: their target was Mahmoud al-Mabhouh, an arms supplier for Hamas, the Palestinian Islamist movement which controls the Gaza Strip. The mission involved 27 operatives of the Mossad secret service who were posing as tourists or tennis players. The hit team and their watchers flew in from different European airports using false passports. Communications were routed via Austria to avoid surveillance. Mabhouh was killed in his room using a paralysing drug and his body left to be discovered by hotel staff the next day. The snag was that the killing exposed the Mossad to global scrutiny – and angered an Arab country with a record of quiet cooperation with Israel. CCTV caught the agents changing disguises and stalking their prey – seen as a legitimate candidate for extrajudicial execution as he had killed an Israeli soldier and, more importantly, was a logistical link with Iran, sworn enemy of the Jewish state. Ronen Bergman’s account of his country’s targeted assassinations contains a wealth of detail about this and other killings. In recent years Israel has assassinated more people than any other country in the western world. Bergman’s long view sharpens understanding of the asymmetrical nature of the conflict – and of the limits of force. Bergman’s style tends to the sensational but that does not mask a critical strand that questions the morality and effectiveness of Israel’s approach to dealing with the enemy in its own backyard.
Note: Rise and Kill First by Ronen Bergman is available here. For more along these lines, see concise summaries of deeply revealing news articles on war and assassinations.
From 2008 to 2010, as Edward Snowden has revealed, the National Security Agency (NSA) collaborated with the British Government Communications Headquarters to intercept the webcam footage of over 1.8 million Yahoo users. The agencies were analyzing images they downloaded from webcams and scanning them for known terrorists who might be using the service to communicate, matching faces from the footage to suspects with the help of a new technology called face recognition. In attempting to find faces, the Pentagon's Optic Nerve program recorded webcam sex by its unknowing targets–up to 11 percent of the material the program collected was "undesirable nudity" that employees were warned not to access. And that's just the beginning of what face recognition technology might mean for us in the digital era. The U.S. government is in the process of building the world's largest cache of face recognition data, with the goal of identifying every person in the country. The creation of such a database would mean that anyone could be tracked wherever his or her face appears, whether it's on a city street or in a mall. Today's laws don't protect Americans from having their webcams scanned for facial data. "If cameras connected to databases can do face recognition, it will become impossible to be anonymous in society," [attorney Jennifer] Lynch says. That means every person in the U.S. would be passively tracked at all times.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
More than 60 years ago, in his "Foundation" series, the science fiction novelist Isaac Asimov invented a new science – psychohistory – that combined mathematics and psychology to predict the future. Now social scientists are trying to mine the vast resources of the Internet – Web searches and Twitter messages, Facebook and blog posts, the digital location trails generated by billions of cellphones – to do the same thing. The government is showing interest in the idea. This summer a little-known intelligence agency began seeking ideas from academic social scientists and corporations for ways to automatically scan the Internet in 21 Latin American countries for "big data," according to a research proposal. The three-year experiment ... is being financed by the Intelligence Advanced Research Projects Activity, or Iarpa. The automated data collection system is to focus on patterns of communication, consumption and movement of populations. It will use publicly accessible data, including Web search queries, blog entries, Internet traffic flow, financial market indicators, traffic webcams and changes in Wikipedia entries. It is intended to be an entirely automated system, a "data eye in the sky" without human intervention. Some social scientists and advocates of privacy rights are deeply skeptical of the project, saying it evokes queasy memories of Total Information Awareness, a post-9/11 Pentagon program that proposed hunting for potential attackers by identifying patterns in vast collections of public and private data.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The British government targeted the American civil rights leader Stokely Carmichael and sought to weaken the Black Power movement with covert disinformation campaigns, recently declassified documents have revealed. The effort was the work of a secret unit known as the Information Research Department, based in London and part of the Foreign Office, which created and distributed literature from fake sources as part of a broader effort to destabilise cold war enemies. The effort against Carmichael, a firebrand orator who travelled to west Africa in part to escape harassment by US law enforcement agencies, aimed to portray the prominent Black Power leader as a foreign interloper in Africa who was contemptuous of the inhabitants of the continent. Based mainly in Guinea from July 1969, the 28-year-old activist had became a vocal advocate of socialist, pan-Africanist ideologies, which worried British officials. The IRD was particularly worried by the movement's potential influence in the Caribbean. In 1969, the IRD also created a new fake group: The Organisation of African Students for African Power. This was supposedly based in East Germany and adopted contemporary radical New Left ideas, "proclaiming a plague on both" the capitalist west and the Soviet bloc. The IRD felt this provided a better platform to "damage opponents" than the dated nationalist approach, while being difficult to trace back to Britain because many similar groups had genuinely sprung up in the late 1960s.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.
Two large-scale, coordinated attacks this week rocked Lebanon – the latest iteration in a historical pattern of booby-trapping electronics. On Tuesday, one attack caused pagers to explode across Lebanon and Syria, injuring thousands of people and killing at least 12. A second wave of bombings unfolded on Wednesday, when explosives detonated inside a slew of hand-held radios across the country, leaving nine dead and 300 wounded. Israel, which is widely assumed to be behind both attacks, reportedly booby-trapped pagers used by Hezbollah members, carrying out a similar feat with the hand-held radios. The bombings appear to be supply-chain attacks – meaning the gadgets were tampered with or outright replaced with rigged devices containing explosives and a detonator at some point prior to arriving in the hands of the targets. The tactic of turning an electronic gadget into an explosive device ... dates back at least half a century. Field Manual 5-31, titled simply "Boobytraps" and first published by the U.S. Department of the Army in 1965, describes the titular objects as explosive charges "cunningly contrived to be fired by an unsuspecting person who disturbs an apparently harmless object or performs a presumably safe act." In 1996, the Israeli Security Agency, also known as Shin Bet, is said to used a similar technique to detonate a small charge of explosives near the ear of Hamas bomb-maker Yahya Ayyash.
Note: Learn more about emerging warfare technology in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
Body camera footage from a police officer who responded to the assassination attempt on former President Donald Trump last month in Pennsylvania shows the intra-cop quarrels in the immediate aftermath of the attack. Video footage from body cameras on Butler Township Police Department officers, obtained by The Intercept, shed light on the chaos among law enforcement officials responding to the assassination attempt. The videos confirm previous reporting that a lack of communication and coordination between federal, state, and local police led to confusion at the rally and reflected insufficient preparation. Additional body camera footage shows one officer telling his colleagues minutes after the shooting that he warned the Secret Service well ahead of the rally to post agents at the building used by the shooter. One Butler Township police officer started to help other law enforcement teams climb onto a plastic shed to access the roof. As police teams scattered around the building debriefed on what happened, two Butler officers and the Secret Service agent stood looking at the storage shed. "Is that how he got up?" one police officer asked. "I have no idea," the other said. "I fucking told them they need to post the guys fucking over here," the first officer said to his colleague. "I told them that – the Secret Service – I told them that fucking Tuesday. I told them to post fucking guys over here." "I thought you guys were on the roof?" the other cop responded.
Note: For more along these lines, see concise summaries of deeply revealing news articles on assassinations and government corruption from reliable major media sources.
State House Republicans defended former colleague, presidential candidate and U.S. Rep. Tulsi Gabbard in a letter sent Sunday to the Transportation Security Administration demanding she be removed from the federal government's terrorist watch list. The letter, sent to David P. Pekoske, TSA's director in Washington, D.C., noted that one of their "former Hawaii State House colleagues, one of Hawaii's â€favorite daughters', former Congresswoman, former Presidential Candidate, and combat veteran is on your TSA terrorist watch list." "We understand that you are harassing her with your Air Marshals from flight to flight. We strongly urge you to immediately withdraw her name from the Quiet Skies program and/or provide full public transparency of the TSA's reasons for maligning her name and reputation," read the letter. Gabbard ... said that her inclusion on the watch list "is clearly an act of political retaliation." "It's no accident that I was placed on the Quiet Skies list the day after I did a prime-time interview warning the American people about ... why Kamala Harris would be bad for our country if elected as President and Commander in Chief. What hurts me the most is the fact that like so many Americans I enlisted because of the terrorist attack on 9/11, deployed to war zones to go after those terrorists, still serve in the US Army for over 21 years, and now my government is surveilling me as a potential domestic terrorist," Gabbard said. "The real pain this has caused is the stress of forever looking over my shoulder, wondering if and how I am being watched, what secret terror watch list I'm on, and having no transparency or due process."
Note: Why is the government targeting individuals who are simply exercising their First Amendment rights? For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
On June 28, 2009, democratically elected Honduran President Manuel Zelaya was ousted by a military coup. The coup led to nearly 13 years of right-wing rule, marked by collusion with drug trafficking organizations, widespread privatization, violence, repression, and a significant migrant exodus. "During these 13 years that the right wing was in power, they were fully supported by the U.S. government," [said Zelaya]. "There was a lot of repression. There were killings of activists and land defenders throughout the country. Also, a lot of right-wing neoliberal policies that were put in place. We have no preference in [US] elections, between the Republican Party and the Democratic Party. In the end, they act the same. They act in the interest of Wall Street, the military industrial complex, the interest of a global elite that, through capitalism, has already taken over all the assets of wealth: the rivers, the seas, the forests, oil – the world elite manages it all through the speculative financial system. The planet's main resources, of raw economic goods, are those that influence the United States' government. Here, the coup plotters don't even get a traffic ticket – not even a slap on the wrist. Instead, they are offered political parties as if they are a democratic option. It is so absurd: the Honduran right, which put the generals in office who carried out the coup, proclaim themselves to be a democratic alternative. Those who murdered, those who looted, are democratic alternatives – totally absurd."
Note: Read more about the narco-state that the US supported in Honduras. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Israel's military was aware of Hamas ' plan to launch an attack on Israeli soil over a year before the devastating Oct. 7 operation that killed hundreds of people, The New York Times reported Friday. It was the latest in a series of signs that top Israeli commanders either ignored or played down warnings that Hamas was plotting the attack, which triggered a war against the Islamic militant group that has devastated the Gaza Strip. The Times said Israeli officials were in possession of a 40-page battle plan, code-named "Jericho Wall," that detailed a hypothetical Hamas attack on southern Israeli communities. The document was seen by many Israeli military and intelligence officials, the report said, though it was unclear if Prime Minister Benjamin Netanyahu or other top leaders had seen it. The document predicted that Hamas would bombard Israel with rockets, use drones to disable Israel's security and surveillance abilities at the border wall, and take over southern communities and military bases. Another 2016 Israeli defense memo obtained by the Times said Hamas intended to take hostages back to Gaza. The Oct. 7 attack – in which 1,200 people were killed and 240 people were abducted and taken to Gaza – would uncannily mirror the one outlined in the battle plan. But Israeli officials had brushed off the plan, the report said, dismissing it as "aspirational" rather than something that could practically take place, the report said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on war and intelligence agency corruption from reliable major media sources.
The FBI spent years surveilling the "Queen of Soul" Aretha Franklin, trying to gauge how involved she was with the civil rights movement, communism and the Black Power movement, a 270-page document shows. Franklin, who died in 2018, was monitored ahead of several performances and attendances she made for civil rights groups, such as the National Association for the Advancement of Colored People and the Southern Christian Leadership Conference, whose first president was Dr. Martin Luther King, Jr. Informants mentioned Franklin, a Detroit native, in separate memos for possibly appearing at the SCLC's 1967 and 1968 national conventions, in Atlanta and Memphis, respectively. The FBI mailed several copies of "The Atlanta Voice" newspaper, which reported on her visit to town, to FBI offices around the country, as well as the U.S. attorney general and the Secret Service. During this time, Franklin was, in fact, actively involved in the civil rights movement through her music and personal connections. She was identified in a 1969 memo titled "Possible Racial Violence, Urban Areas, Racial Matters" when, in the year before, Denver concertgoers rioted after she refused to perform at the Red Rocks amphitheater due to not being properly paid. In 1971, memos named the Black Panther Party of Los Angeles and the Boston Young Workers Liberation League as organizations who intended to book her for rallies.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.
Looking Glass Factory, a company based in the Greenpoint neighborhood of Brooklyn, New York, revealed its latest consumer device: a slim, holographic picture frame that turns photos taken on iPhones into 3D displays. Looking Glass received $2.54 million of "technology development" funding from In-Q-Tel, the venture capital arm of the CIA, from April 2020 to March 2021 and a $50,000 Small Business Innovation Research award from the U.S. Air Force in November 2021 to "revolutionize 3D/virtual reality visualization." Across the various branches of the military and intelligence community, contract records show a rush to jump on holographic display technology, augmented reality, and virtual reality display systems as the latest trend. Critics argue that the technology isn't quite ready for prime time, and that the urgency to adopt it reflects the Pentagon's penchant for high-priced, high-tech contracts based on the latest fad in warfighting. Military interest in holographic imaging, in particular, has grown rapidly in recent years. Military planners in China and the U.S. have touted holographic technology to project images "to incite fear in soldiers on a battlefield." Other uses involve the creation of three-dimensional maps of villages of specific buildings and to analyze blast forensics. Palmer Luckey, who founded the technology startup Anduril Industries ... has received secretive Air Force contracts to develop next-generation artificial intelligence capabilities under the so-called Project Maven initiative.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
While President Biden signed an executive order last fall to declassify 9/11 evidence, the families of some 9/11 victims say they had to go through the British courts to get records and videos seized two decades ago from an alleged Saudi government operative that have never been public until now. Buried inside the trove is a home video from 2000. The event was described in 9/11 Commission records as a party at the San Diego apartment of Nawaf al-Hazmi and Khalid al-Mihdhar, the first two hijackers to arrive in the U.S. in January 2000. A handful of frames captured Mihdhar in the kitchen. Along with Hazmi, their team would later commandeer Flight 77 that slammed into the Pentagon. The party's host, Saudi national Omar al-Bayoumi, was arrested by British police less than two weeks after the attack. British police seized the videos and documents from Bayoumi. A newly declassified and heavily redacted FBI memo from 2017 stated, "In the late 1990s and up to September 11, 2001, Omar al-Bayoumi was paid a monthly stipend as a cooptee of the Saudi General Intelligence Presidency (GIP) via then Ambassador Prince Bandar bin Sultan." The memo continued, "Allegations of al-Bayoumi's involvement with Saudi Intelligence were not confirmed at the time of the 9/11 Commission Report. The above information confirms these allegations." Another recently declassified FBI memo ... said, "There is a 50/50 chance Omar al-Bayoumi had advanced knowledge the 9/11 terrorist attacks were to occur."
Note: For more along these lines, see concise summaries of deeply revealing news articles on 9/11 from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
In the torturous history of the U.S. government's black sites, the F.B.I. has long been portrayed as acting with a strong moral compass. Its agents, disgusted with the violence they saw at a secret C.I.A. prison in Thailand, walked out, enabling the bureau to later deploy "clean teams" untainted by torture to interrogate the five men accused of conspiring in the attacks of Sept. 11, 2001. But new information that emerged this week in the Sept. 11 case undermines that F.B.I. narrative. The two intelligence agencies secretly arranged for nine F.B.I. agents to temporarily become C.I.A. operatives in the overseas prison network where the spy agency used torture to interrogate its prisoners. The once-secret program came to light in pretrial proceedings in the death penalty case. The proceedings are currently examining whether the accused mastermind of the Sept. 11 plot, Khalid Shaikh Mohammed, and his four co-defendants voluntarily confessed after years in the black site network, where detainees were waterboarded, beaten, deprived of sleep and isolated to train them to comply with their captors' wishes. At issue is whether the military judge will exclude from the eventual trial the testimony of F.B.I. agents who questioned the defendants. Earlier testimony showed the F.B.I. participating remotely in the C.I.A. interrogations through requests sent by cables to the black sites seeking certain information from specific detainees, including Mr. Mohammed after he was waterboarded 183 times to force him to talk.
Note: Read more about the CIA torture program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Senior CIA officials during the Trump administration discussed abducting and even assassinating WikiLeaks founder, Julian Assange. The discussions on kidnapping or killing Assange took place in 2017, Yahoo News reported, when the fugitive Australian activist was entering his fifth year sheltering in the Ecuadorian embassy. The then CIA director, Mike Pompeo, and his top officials were furious about WikiLeaks' publication of "Vault 7", a set of CIA hacking tools, a breach which the agency deemed to be the biggest data loss in its history. Some senior officials inside the CIA and the Trump administration went as far as to request "sketches" or "options" for killing Assange. "There seemed to be no boundaries," a former senior counterterrorist official was quoted as saying. The kidnapping or murder of a civilian accused of publishing leaked documents, with no connection to terrorism, would have triggered global outrage. Pompeo raised eyebrows in 2017 by referring to WikiLeaks as a "non-state hostile intelligence service". It was a significant designation, as it implied a green light for a more aggressive approach to the pro-transparency group by CIA operatives, who could treat it as an enemy espionage organization. Barry Pollack, Assange's US lawyer ... told Yahoo News: "As an American citizen, I find it absolutely outrageous that our government would be contemplating kidnapping or assassinating somebody without any judicial process simply because he had published truthful information."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Vice President Kamala Harris' trip to Hanoi, Vietnam, was delayed by a few hours after her office was made aware of a "recent possible anomalous health incident" among U.S. officials in Hanoi. "Anomalous health incident" is how the United States government refers to the mysterious "Havana syndrome." First reported in 2016 by United States officials in Cuba, Havana syndrome has afflicted more than 130 U.S. officials over the past five years stationed in several countries overseas. Victims of the syndrome typically report strange experiences, like feelings of pressure or vibration and a screeching sound, and debilitating symptoms, including headaches, nausea, cognitive deficits, and trouble with seeing, hearing, or balancing. The vice president's office said that after "careful consideration," her team opted to continue with her Vietnam trip. A couple hours after the announcement, NBC News reported that a medical evacuation was called for two U.S. officials in Hanoi. The NBC report noted that "strange sounds" were involved in the incidents, and that Vietnam has seen past reports of possible Havana syndrome cases. NBC News reported in June that some U.S. officials believe that unknown adversaries used "devices intended to extract information from cellphones and other personal devices" that emitted electromagnetic waves powerful enough to cause debilitating symptoms. After realizing such devices had that effect, they then "weaponized the tactic to intentionally cause physical harm."
Note: Read more about these mysterious attacks on spies and diplomats. Read very little-known, yet astounding information on sophisticated technologies which can project music and clear voices into people's heads in these concise summaries of deeply revealing news articles on non-lethal weapons from reliable major media sources.
Few pause to think that their phones can be transformed into surveillance devices, with someone thousands of miles away silently extracting their messages, photos and location, activating their microphone to record them in real time. Such are the capabilities of Pegasus, the spyware manufactured by NSO Group, the Israeli purveyor of weapons of mass surveillance. The Guardian will be revealing the identities of many innocent people who have been identified as candidates for possible surveillance by NSO clients in a massive leak of data. Without forensics on their devices, we cannot know whether governments successfully targeted these people. But the presence of their names on this list indicates the lengths to which governments may go to spy on critics, rivals and opponents. Journalists across the world were selected as potential targets by these clients prior to a possible hack using NSO surveillance tools. People whose phone numbers appear in the leak ... include lawyers, human rights defenders, religious figures, academics, businesspeople, diplomats, senior government officials and heads of state. One phone that has contained signs of Pegasus activity belonged to our esteemed Mexican colleague Carmen Aristegui, whose number was in the data leak and who was targeted following her exposÄ‚© of a corruption scandal involving her country's former president Enrique PeÄ‚±a Nieto. At least four of her journalist colleagues appear in the leak
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
For a second year, the nation's surveillance court has pointed with concern to "widespread violations" by the F.B.I. of rules intended to protect Americans' privacy when analysts search emails gathered without a warrant. In a 67-page ruling ... James E. Boasberg, the presiding judge on the Foreign Intelligence Surveillance Court, recounted several episodes uncovered by an F.B.I. audit where the bureau's analysts improperly searched for Americans' information in emails that the National Security Agency collected without warrants. Still, Judge Boasberg said he was willing to issue a legally required certification for the National Security Agency's warrantless surveillance program to operate for another year. [The program] grew out of the once-secret Stellarwind project, which President George W. Bush started after the Sept. 11, 2001, attacks. In 2008, Congress legalized the practice. The surveillance is carried out by the National Security Agency, but three other entities – the C.I.A., the National Counterterrorism Center and the F.B.I. – also receive access to streams of "raw" messages. The F.B.I. receives only a small portion of the messages that the National Security Agency vacuums up: The bureau gets copies of intercepts to and from targets who are deemed relevant to a full and active F.B.I. national security investigation. In 2019, the most recent year for which data is public, the program had more than 200,000 targets.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Deep in the Sahara, the C.I.A. is continuing to conduct secret drone flights from a small but steadily expanding air base, even as the Biden administration has temporarily limited drone strikes against suspected terrorists outside conventional war zones, such as Afghanistan. Soon after it set up the base in northern Niger three years ago, the C.I.A. was poised to launch drone strikes from the site. But there is no public evidence that the agency has carried out anything but surveillance missions so far. New satellite imagery shows that the air base in Dirkou, Niger, has grown significantly since The New York Times first reported the C.I.A. operations there in 2018, to include a much longer runway and increased security. The new imagery also shows for the first time what appears to be an MQ-9 Reaper drone taxiing to or from a clamshell hangar. Under a directive that Mr. Biden's national security adviser, Jake Sullivan, quietly imposed on Jan. 20, Inauguration Day, the military and the C.I.A. must now obtain White House permission to attack terrorism suspects in poorly governed places where there are scant or no American ground troops, such as Somalia, Yemen and Libya. Under the Trump administration, they had been allowed to decide for themselves whether circumstances on the ground met certain conditions and an attack was justified. A recent report by the International Crisis Group concluded that the military-first strategy of France and its allies, including the United States, has failed.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
I am guilty of violating the Espionage Act, Title 18, U.S. Code Sections 793 and 798. If charged and convicted, I could spend the rest of my life in prison. This is not a hypothetical. Right now, the United States government is prosecuting a publisher under the Espionage Act. The case could set a precedent that would put me and countless other journalists in danger. I confess that I – alongside journalists at The Guardian, The Washington Post and other news organizations – reported on and published highly classified documents from the National Security Agency provided by the whistle-blower Edward Snowden, revealing the government's global mass surveillance programs. This reporting was widely recognized as a public service. Last year ... the Justice Department indicted Julian Assange, the founder and publisher of WikiLeaks, with 17 counts of violating the Espionage Act. None of the architects of the "war on terror," including the C.I.A.'s torture programs, have been brought to justice. Mr. Assange is facing a possible sentence of up to 175 years in prison. I spoke to one of the best First Amendment lawyers in the country. He read the Espionage Act out loud and said it had never been used against a journalist, but there is always a first time. It is impossible to overstate the dangerous precedent Mr. Assange's indictment under the Espionage Act and possible extradition sets: Every national security journalist who reports on classified information now faces possible Espionage Act charges.
Note: The above was written by award-winning journalist Laura Poitras. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
Seven years after former National Security Agency contractor Edward Snowden blew the whistle on the mass surveillance of Americans' telephone records, an appeals court has found the program was unlawful. The U.S. Court of Appeals for the Ninth Circuit said the warrantless telephone dragnet that secretly collected millions of Americans' telephone records violated the Foreign Intelligence Surveillance Act and may well have been unconstitutional. Snowden, who fled to Russia in the aftermath of the 2013 disclosures and still faces U.S. espionage charges, said on Twitter that the ruling was a vindication of his decision to go public with evidence of the National Security Agency's domestic eavesdropping operation. "I never imagined that I would live to see our courts condemn the NSA's activities as unlawful and in the same ruling credit me for exposing them," Snowden said. Evidence that the NSA was secretly building a vast database of U.S. telephone records ... was the first and arguably the most explosive of the Snowden revelations published by the Guardian newspaper in 2013. Up until that moment, top intelligence officials publicly insisted the NSA never knowingly collected information on Americans at all. After the program's exposure, U.S. officials fell back on the argument that the spying had played a crucial role in fighting domestic extremism. But the Ninth Circuit ruled Wednesday that those claims were "inconsistent with the contents of the classified record."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Concerns about what is now known to be the novel coronavirus pandemic were detailed in a November intelligence report by the military's National Center for Medical Intelligence (NCMI), according to two officials familiar with the document’s contents. The report ... raised alarms because an out-of-control disease would pose a serious threat to U.S. forces in Asia - forces that depend on the NCMI’s work. And it paints a picture of an American government that could have ramped up mitigation and containment efforts far earlier. "Analysts concluded it could be a cataclysmic event," one of the sources said of the NCMI’s report. "It was then briefed multiple times to" the Defense Intelligence Agency, the Pentagon’s Joint Staff and the White House. From that warning in November, the sources described repeated briefings through December for policy-makers and decision-makers across the federal government as well as the National Security Council at the White House. All of that culminated with a detailed explanation of the problem that appeared in the President’s Daily Brief of intelligence matters in early January. The NCMI report was made available widely to people authorized to access intelligence community alerts. Other intelligence community bulletins began circulating through confidential channels across the government around Thanksgiving. Those analyses said China’s leadership knew the epidemic was out of control even as it kept such crucial information from foreign governments and public health agencies.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the coronavirus pandemic from reliable major media sources.
James “Whitey” Bulger terrorized Boston from the 1970s into the 1990s with a campaign of murder, extortion and drug trafficking. In 2013, Janet Uhlar was one of 12 jurors who found Bulger guilty in a massive racketeering case, including involvement in 11 murders. But now Uhlar says she regrets voting to convict Bulger on any of the murder charges. Her regret stems from a cache of more than 70 letters Bulger wrote to her from prison, some of which describe his unwitting participation in a secret CIA experiment with LSD. The agency dosed Bulger with the powerful hallucinogen more than 50 times when he was serving his first stretch in prison, in Atlanta. Uhlar has spoken publicly about her regret before but says her belief that the gangster was wrongly convicted on the murder charges was reinforced after reading a new book by Brown University professor Stephen Kinzer: “Poisoner in Chief: Sidney Gottlieb and the CIA Search for Mind Control.” Gottlieb’s secret program, known at MK-ULTRA, enlisted doctors and other subcontractors to administer LSD in large doses to prisoners, addicts and others unlikely to complain. Uhlar reviewed the 1977 hearings by the U.S. Senate Committee on Intelligence, which was looking into MK-ULTRA, and found testimony where CIA director Stansfield Turner acknowledged evidence showing that the agency had been searching for a drug that could prepare someone for “debilitating an individual or even killing another person.”
Note: Read more about the CIA's MK-ULTRA program. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources.
Four years ago, for an embarrassingly modest price, Russia pulled off one of the more audacious acts of election interference in modern history. The Internet Research Agency, the team of Kremlin-backed online propagandists, spent $15 million to $20 million and wreaked havoc on the psyche of the American voter. Russian intelligence agents carried out the digital version of Watergate, infiltrating the Democratic Party and the Clinton campaign, stealing tens of thousands of emails, and weaponizing them in the days and weeks before the election. Russian-based hackers tested election websites in all 50 states for weak spots. “The Russians were testing whether our windows were open, rattling our doors to see whether they were locked, and found the windows and doors wide open,” says Sen. Mark Warner (D-Va.), the top Democrat on the Intelligence Committee. The Russians ... recently hacked the Ukrainian natural-gas company at the center of the Trump impeachment scandal to potentially find damaging material about the Biden family. Other foreign nations, including Iran, North Korea, Saudi Arabia, and China, are getting in on the act. They’ll be joined, analysts say, by domestic actors — American consultants and candidates and click merchants borrowing and adapting Russia’s tactics to influence an election or make a quick buck. “We’re still in a situation going into 2020 where there are significant gaps left in the security of election infrastructure,” says J. Alex Halderman ... who studies voting equipment.
Note: The private companies that supply elections software are very vulnerable to hacking. For more along these lines, see concise summaries of deeply revealing news articles on elections corruption from reliable major media sources.
The acting director of national intelligence is withholding a secret whistleblower complaint from the House intelligence committee because it involves conduct by someone outside the spy agencies and doesn’t meet the legal requirement for disclosure to Congress, according to letters obtained by NBC News. But in doing so, acting DNI Joseph Maguire acknowledges he is overruling the intelligence community’s independent watchdog, which thinks the complaint should be turned over. The letters, written by Jason Klitenic, the DNI’s general counsel, provide Maguire’s side of the story in what has quickly become an acrimonious dispute with Rep. Adam Schiff, chairman of the House intelligence committee. On Friday night, Schiff went public about the matter in dramatic fashion, announcing that he had issued a subpoena for a classified whistleblower complaint that he charged was being illegally withheld to shield President Donald Trump. On Tuesday, Schiff said Maguire has refused to comply with the subpoena. Current and former intelligence officials told NBC News they were taken aback by Schiff’s public escalation and his suggestion that they acting in bad faith at Trump’s behest. Schiff has declined to say whether he is aware of the nature of the complaint. A committee staffer who declined to be named said that Schiff went public because he wanted to send a message that “under no circumstances can there be any reprisals against this whistleblower.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
In 2016 and 2017, 25 Americans, including CIA agents, who worked in the U.S. Embassy in Cuba suffered serious brain injuries causing impaired vision and memory loss among other persistent problems. At least 15 American officials in China suffered unexplained brain trauma soon after. As we first reported in March, the FBI is now investigating whether these Americans were attacked by a mysterious weapon that leaves no trace. Mark Lenzi is a State Department security officer who worked in the U.S. Consulate in Guangzhou, China. He says that he and his wife began to suffer after hearing strange sounds in their apartment. Mark Lenzi believes he was targeted because of his work. He uses top secret equipment to analyze electronic threats to diplomatic missions. "It was a weapon," [said Lenzi]. "I believe it's RF, radio frequency energy, in the microwave range." A clue that supports that theory was revealed by the National Security Agency in 2014. This NSA statement describes such a weapon as a "high-powered microwave system weapon that may have the ability to weaken, intimidate, or kill an enemy over time without leaving evidence." The statement goes on to say "... this weapon is designed to bathe a target's living quarters in microwaves." The NSA disclosed this in a worker's compensation case filed by former NSA employee Mike Beck. In the 1990's Beck and an NSA co-worker were on assignment overseas. Years later, he says they developed Parkinson's Disease at the same time.
Note: Read more on the mysterious "sonic attacks" in Cuba. For more along these lines, see concise summaries of deeply revealing news articles on non-lethal weapons from reliable major media sources.
Commerce Department trade officer Catherine Werner used to promote American business from the U.S. consulate in Guangzhou, China. Today she says she suffers from bouts of nausea, dizziness, and headaches. Robyn Garfield, also a trade officer with the Commerce Department, was posted in Shanghai. Along with nausea, dizziness, and headaches, he says he has trouble remembering words. State Department security officer Mark Lenzi used to work in the consulate in Guangzhou. When he did, he said the splitting pain in his head was debilitating. The three are among at least 15 American officials in China who say they suffered unexplained brain trauma after being attacked by a mysterious weapon. Previously, 25 Americans who worked in the U.S. embassy in Cuba said they also experienced an attack and have similar symptoms. The government employees weren't the only ones targeted. Their spouses, children, and family pets also exhibited neurological symptoms after hearing strange sounds in their homes. In July, a University of Pennsylvania medical team published a study on the brains of U.S. government personnel who developed neurological symptoms in Cuba. The study used advanced brain imaging and found "significant differences in brain tissue and connectivity" in the diplomats' brains. It is the first scientific evidence showing the diplomats had physical damage to the structure of their brains.
Note: Read more on the mysterious "sonic attacks" in Cuba. For more along these lines, see concise summaries of deeply revealing news articles on non-lethal weapons from reliable major media sources.
While we all live under extensive surveillance, for government employees and contractors - especially those with a security clearance - privacy is virtually nonexistent. Everything they do on their work computers is monitored. Even when they try to outsmart their work computer by taking photos directly of their screen, video cameras in their workplace might be recording their every move. Government workers with security clearance promise “never [to] divulge classified information to anyone” who is not authorized to receive it. But for many whistleblowers, the decision to go public results from troubling insights into government activity, coupled with the belief that as long as that activity remains secret, the system will not change. The growing use of the Espionage Act, a 1917 law that criminalizes the release of “national defense” information by anyone “with intent or reason to believe that it is to be used to the injury of the United States or to the advantage of a foreign nation,” shows how the system is rigged against whistleblowers. Government insiders charged under the law are not allowed to defend themselves by arguing that their decision to share what they know was prompted by an impulse to help Americans confront and end government abuses. “The act is blind to the possibility that the public’s interest ... might outweigh the government’s interest,” Jameel Jaffer, head of the Knight First Amendment Institute, wrote recently. “It is blind to the difference between whistle-blowers and spies.”
Note: The above article includes the stories of four whistleblowers charged under the Espionage act. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Wikileaks founder Julian Assange was arrested on Thursday at Ecuador's London embassy, where he had been granted asylum since 2012. The United States alleges that he conspired with Chelsea Manning to access classified information on Department of Defense computers. Since it launched in 2006, Wikileaks has become renowned for publishing thousands of classified documents covering everything from the film industry to national security and wars. In 2010, Wikileaks published a video from a US military helicopter showing the killing of civilians in Baghdad, Iraq. A voice on the transmission urged the pilots to "light 'em all up" and the individuals on the street were fired at from the helicopter. When a van arrived on the scene to pick up the wounded, it too was fired at. Reuters photographer Namir Noor-Eldeen and his assistant Saeed Chmagh were both killed in the attack. Wikileaks has published hundreds of thousands of documents leaked by former US Army intelligence analyst Chelsea Manning. Documents relating to the war in Afghanistan revealed how the US military had killed hundreds of civilians in unreported incidents. Further documents from the Iraq war revealed that 66,000 civilians had been killed - more than previously reported. The documents also showed that prisoners had been tortured by Iraqi forces. Among the leaks were more than 250,000 messages sent by US diplomats. They revealed that the US wanted to collect "biographic and biometric" information ... of key officials at the UN.
Note: Read more about Wikileaks' effort to promote openness over secrecy. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
The United States has revoked the visa of the International Criminal Court’s chief prosecutor because of her attempts to investigate allegations of war crimes in Afghanistan, including any that may have been committed by American forces. Ms. Bensouda, a Gambian lawyer for the court, which is based in The Hague, formally requested an investigation more than a year ago into war crimes in Afghanistan. The inquiry would mostly focus on large-scale crimes against civilians attributed to the Taliban and Afghan government forces. But it would also examine alleged C.I.A. and American military abuse in detention centers in Afghanistan in 2003 and 2004, and at sites in Poland, Lithuania and Romania, putting the court directly at odds with the United States. The United States is not a member state of the I.C.C. and does not recognize the court’s authority to prosecute Americans. In the past, though, the United States has cooperated with the court on other investigations, and Washington played a central role in establishing international criminal law at the Nuremberg trials. [Secretary of State Mike] Pompeo, in a March news briefing in Washington, said investigators “should not assume that you will still have or will get a visa, or that you will be permitted to enter the United States” if they are part of a I.C.C. investigation. “These visa restrictions will not be the end of our efforts,” Mr. Pompeo said at the time. “We are prepared to take additional steps, including economic sanctions if the I.C.C. does not change its course.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Joined by relatives of Robert F. Kennedy, the Rev. Martin Luther King Jr. and Malcolm X, a group of more than 60 authors and investigators have called for a new congressional investigation into the assassinations of the three men and President John F. Kennedy, saying that the four slayings were not resolved. In a public statement, they demanded a public tribunal modeled on South Africa’s “Truth and Reconciliation” process to persuade either Congress or the Justice Department to revisit all four assassinations. Robert F. Kennedy Jr. and former Maryland lieutenant governor Kathleen Kennedy Townsend (D), two of Robert Kennedy’s children, signed the statement, as did Isaac N. Farris, a nephew of King and former president of the Southern Christian Leadership Conference, and the Rev. James M. Lawson Jr., a Memphis pastor and mentor to King. The statement was written in part by Adam Walinsky, a former top aide to Robert Kennedy, with input from other assassination scholars. He cited the “wreckage” from the slayings as the reasons to revisit them. “What a profound effect these assassinations had on this country,” Walinsky said. “These people, and the forces who were responsible for these murders, are still among us. The institutions are still there. And they’re still doing all the same things. So that’s the problem.” A news release and the full statement with a list of signers is here.
Note: In 1999, a civil trial implicated the US government in King's killing. In 2006, BBC described new evidence that placed "three senior CIA operatives at the scene of Robert Kennedy's assassination" and reported that Sirhan may have been a Manchurian Candidate programmed to act as a decoy for the real assassin. In 2011 the Boston Globe reported that RFK harbored suspicions that the CIA was behind his brother's murder. For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.
America’s finest Republicans and Democrats [are] condemning the Crown Prince of Saudi Arabia for murdering Jamal Khashoggi. CIA director Gina Haspel, who was happy to sign off on the torture of her Muslim captives ... knew what she was talking about when she testified about Mohammed bin Salman and the agony of Jamal Khashoggi. A generation ago, the CIA’s “Operation Phoenix” torture and assassination programme in Vietnam went way beyond the imaginations of the Saudi intelligence service. In spook language, Khashoggi was merely “terminated with maximum prejudice”. If the CIA could sign off on mass murder in Vietnam, why shouldn’t an Arab dictator do the same on a far smaller scale? But there is something more than this ... 15 of those 9/11 hijackers were Saudis, that Osama bin Laden was a Saudi, that George W Bush secretly flew bin Laden family members out of the US after 9/11, that the Saudis themselves are heir to a blighted, rural, cruel version of Sunni Islam ... which has inspired the Taliban, al-Qaeda, Isis and all the other killer cults whom we have proclaimed to be the West’s Enemy No 1. Nailing Mohammed Bin Salman to a crucifix – a method of execution favoured by the Wahhabis – is an easy kill for US senators, of course. You hit the president and smash those unhappy historical details all in one fell swoop.
Note: Jamal Khashoggi's uncle was the notorious billionaire arms dealer and decadent playboy Adnan Khashoggi. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and assassinations.
Omar Abdulaziz hit record on his phone and slipped it into the breast pocket of his jacket, he recalled, taking a seat in a Montreal cafe to wait for two men who said they were carrying a personal message from Saudi Crown Prince Mohammed bin Salman. When they arrived, Abdulaziz, a 27-year-old Saudi opposition activist, asked why they had come all the way to Canada to see him. “There are two scenarios,” one of the emissaries said, speaking of Abdulaziz in the third person. In the first, he can go back home to Saudi Arabia, to his friends and family. In the second: “Omar goes to prison.” To drive home what was at stake, the visitors brought one of Abdulaziz’s younger brothers from Saudi Arabia to the meeting. The clandestine recordings - more than 10 hours of conversation - were provided to The Washington Post by Abdulaziz, a close associate of the missing Saudi journalist Jamal Khashoggi. They offer a chilling depiction of how Saudi Arabia tries to lure opposition figures back to the kingdom with promises of money and safety. These efforts have sharply escalated since Mohammed became crown prince last year. Khashoggi’s friends said that senior Saudi officials close to the crown prince had contacted him in recent months, even offering him a high-level job ... if he returned to the kingdom. He didn’t trust the offer, fearing it was a ruse. Khashoggi has not been heard from since he visited the Saudi Consulate in Istanbul on Oct. 2. Turkish investigators have concluded he was killed ... and then dismembered.
Note: There is much more than meets the eye on this Khashoggi case. Read this fascinating article for a taste. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the manipulation of public perception.
The disappearance, and possible murder, of Jamal Khashoggi, a high-profile critic of the Saudi regime, is the latest, disturbing addition to the rising toll of state-directed, extra-territorial kidnappings, abductions and killings around the world. So here’s the question: why do more and more governments think they can get away with murder, figuratively if not literally? It’s a problem that should concern everybody – because everybody is at risk. It’s tempting to blame the US, a country that ... has come to epitomise the problem. In January 1986, worried about American hostages in Lebanon, Ronald Reagan signed a top-secret covert action directive. The presidential “finding” authorized the CIA to kidnap suspected terrorists anywhere, any place. Reagan’s “snatch and grab” operations inaugurated the modern-day practice of state abduction, leading ineluctably to extraordinary rendition. They set a fateful precedent. George W Bush massively expanded rendition after the 2001 terror attacks. Although the UN classifies one country’s abduction of another country’s citizens as a crime against humanity ... the US and its accomplices have in practice faced no substantive sanction or penalty to date. This grim lesson in impunity has been absorbed and digested by governments everywhere. The Khashoggi disappearance, almost certainly ordered and planned in Riyadh, is the very sort of illegal action that has been normalised ... by very recent American practice from Afghanistan and Iraq to Libya and Cuba.
Note: For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The torture of a suspected al-Qaeda terrorist, including waterboarding, is described in meticulous detail in newly-declassified cables that CIA Director Gina Haspel sent to agency headquarters in late 2002, when she headed a secret U.S. detention facility in Thailand. The suspect, Abd al-Rahim al-Nashiri, was believed to have been involved in planning the USS Cole bombing in Yemen in 2000. Nashiri’s treatment during interrogation — forced nudity, shackling, being slammed against walls, being confined in a small box and mock executions, as well as waterboarding — has been previously mentioned in broad terms in official reports, hearings, court cases and news reports. But many specifics about what happened to Nashiri during his several-week stay at the Thailand facility, while Haspel was briefly in charge, have not been made public. They are contained in 11 cables obtained under the Freedom of Information Act by the National Security Archive, a private research institute. On the 12th day of his detention, one cable to the home office reported, “interrogation escalated rapidly from subject being aggressively debriefed by interrogators to multiple applications of the walling technique, and ultimately, multiple applications of the watering technique.” The interrogators, it later said, “covered subject’s head with the hood and left him on the water board, moaning, shaking and asking God to help him repeatedly.”
Note: The above article contains graphic descriptions of torture overseen and then covered up by Gina Haspel. Another article, by a former CIA counterterrorism officer who was imprisoned for blowing the whistle on the CIA torture, referred to Haspel's actions as "war crimes, crimes against humanity". For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The FBI doesn’t want the public to know more about how its agents pose as journalists during undercover investigations. But, in a federal court case, Justice Department lawyers ... acknowledged in a court filing that FBI agents who pretend to be journalists create a chilling effect, making it harder for real journalists to gain trust and cooperation from sources. The astonishing admission came as the FBI attempted to fend off litigation from Reporters Committee for Freedom of the Press, which has filed requests for documents under the Freedom of Information Act. The Reporters Committee’s litigation involves documents related to an FBI undercover operation in which agents posed as documentary filmmakers from a fake company called Longbow Productions to investigate Nevada rancher Cliven Bundy and his supporters. In a motion filed July 23, Assistant U.S. Attorney Johnny H. Walker argued that providing FBI documents about the Bundy investigation and others in which a journalistic cover may have been used would not only disclose sensitive investigative techniques but also ... “would allow criminals to judge whether they should completely avoid any contacts with documentary film crews, rendering the investigative technique ineffective.” The FBI has previously disclosed that agents have pretended to be news reporters to further investigations. But questions remain about how often such covers are used and what policies are in place to govern the deployment of fake reporters.
Note: A mistrial was recently declared in the case against Cliven Bundy and others after the Justice Department was found to have withheld "massive amounts of evidence undermining federal charges". For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
Thousands of people pass by the buildings each day and rarely give them a second glance, because their function is not publicly known. They are an integral part of one of the world’s largest telecommunications networks – and they are also linked to a controversial National Security Agency surveillance program. Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C.. In each of these cities, The Intercept has identified an AT&T facility containing networking equipment that transports large quantities of internet traffic across the United States and the world. A body of evidence – including classified NSA documents, public records, and interviews with several former AT&T employees – indicates that the buildings are central to an NSA spying initiative that has for years monitored billions of emails, phone calls, and online chats passing across U.S. territory. The NSA considers AT&T to be one of its most trusted partners and has lauded the company’s “extreme willingness to help.” Little known, however, is that its scope is not restricted to AT&T’s customers. According to the NSA’s documents, it values AT&T not only because it “has access to information that transits the nation,” but also because it maintains unique relationships with other phone and internet providers. The NSA exploits these relationships for surveillance purposes, commandeering AT&T’s massive infrastructure and using it as a platform to covertly tap into communications processed by other companies.
Note: The NSA was authorized in 2016 to share communications data it collected without warrants on Americans with 16 intelligence and law enforcement agencies. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Several U.S victims of alleged "health attacks" in Cuba have hired a lawyer out of concern over how the U.S. government will handle their long-term medical treatment. "That's not at all clear," said lawyer Mark Zaid, who represents eight of the at least 24 U.S. diplomats, intelligence officers and relatives affected by the incidents in Havana. "Some already had to spend their own money" on treatment. "Are they being treated or are they being studied? It's not entirely clear what is happening," the lawyer said, adding that some of the victims had problems accessing their medical records at the UPenn treatment center because the records are government property. Zaid added that ... the cases have placed the government in a predicament because of the mystery not just on the so-called attacks but the injuries experienced. For example, federal employees who have been injured by incidents such as explosions, "the wounds have been specific and concrete, not strange brain and neurological damages. It's much more complicated." In a separate case, another Zaid client - Mike Beck, a retired National Security Agency counterintelligence officer - suffered a "potentially similar attack" in the 1990s when he traveled to an unidentified country. Years later, Beck and a companion on the trip were found to be suffering from Parkinson's disease. A confidential report convinced him that his illness was linked to a covert attack with a weapon that used microwaves, Beck told The Washington Post last year.
Note: There is no doubt that the US has electromagnetic weapons that can cause neurological disorders like this. We suspect this was a false flag attack to turn the American public against the recently opened U.S. embassy in Havana. To learn about how electromagnetic weapons can be used to torture anyone without legal recourse, listen to this revealing interview. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and non-lethal weapons.
When Robert F. Kennedy was assassinated just minutes after winning California's 1968 Democratic primary, the United States was fiercely divided. Many looked to him to help heal that divide. That's part of an unfulfilled legacy his son, Robert Kennedy Jr., describes in his new book, "American Values." It's a history of the ... 40-year tension between my family and the CIA," he said. The Kennedy feud with the CIA was multi-generational. The family patriarch, Joseph Kennedy, sat on a commission that called for an end to the CIA's paramilitary operations. And his sons John and Robert Kennedy both railed against the CIA's role in Vietnam. "The first thing [my father] was gonna do was to remove the clandestine services from the CIA and make the CIA ... an intelligence gathering organization," he said. But the seeds of doubt about who killed his father weren't planted by that notion. "I never suspected at any level that anybody other than Sirhan Sirhan had killed my father until maybe three years ago," he said. What changed for Kennedy? "Well, Paul Schrade." Schrade was a close friend of Robert Kennedy and was with the candidate the night he was shot. Schrade ... has insisted for decades that Sirhan could not have acted alone. He's now raised serious questions in Kennedy Jr.'s mind as well. "It's hard to believe that Sirhan shot my dad, that his bullets hit my dad. Because Sirhan was always in front of my father. And yet, all shots, all the four shots that hit my father came from behind him," he said.
Note: For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.
Survivors and families of those who allegedly underwent brainwashing experiments at McGill University in Montreal are planning a class-action lawsuit against the Quebec and federal governments because of what they claim had been done to them decades ago. Dr. Ewen Cameron, a former psychiatrist at McGill University’s Alan Memorial Institute, conducted CIA-funded experiments in the 1950s and 1960s involving sleeping drugs, electroshock therapy and the powerful hallucinogenic LSD to see if the brain could be reprogrammed. Patients entered the program - known as Project MKUltra - with relatively minor mental health issues, such as anxiety. “These were innocent people that went in for mild depression… They came out completely ravaged and their life was ruined,” Marlene Levenson, whose aunt was admitted to the facility, told CTV Montreal. Many victims of these experiments have since passed away, but some family members have documents that share first-hand accounts of what allegedly transpired at the facility. Angela Bardosh’s mother Nancy Layton showed CTV Montreal a letter from her mother that read in part: "They destroyed many parts of me. I'm lucky to be alive." Bardosh said Layton was admitted to the facility at age 18 due to depression. Within six months of Cameron’s treatment, her mother developed acute schizophrenia. The victims and their families have now banded together in the hopes of filing a class-action lawsuit against the Quebec and federal governments, and maybe even McGill too, seeking damages and an apology for what they had to endure.
Note: The Canadian government has been actively attempting to silence victims of this program for over forty years. Read more on the court cases stemming from Dr Ewen Cameron's CIA-funded experiments in this Times of London article. Read also an excellent summary on the involvement of doctors in the CIA's brainwashing experiments. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
In 1956, Velma Orlikow checked herself into a renowned Canadian psychiatric hospital, the Allan Memorial Institute in Montreal. Instead of improving, her condition deteriorated – and her personality underwent jarring changes. More than two decades passed before ... her family had an explanation, and it was much stranger than any of them could imagine: in 1977 it emerged that the CIA had been funding experiments in mind-control brainwashing at the institute as part of a North America-wide project known as MK Ultra. Orlikow was one of several hundred patients who became unwitting subjects of these experiments in Montreal in the late 1950s and early 60s. “It’s almost impossible to believe,” said her granddaughter, Sarah Anne Johnson. “Some of the things [psychiatrist Ewen Cameron] did to his patients are so horrible and unbelievable that it sounds like the stuff of nightmares.” Patients were subjected to high-voltage electroshock therapy several times a day, forced into drug-induced sleeps that could last months and injected with megadoses of LSD. After reducing them to a childlike state ... Cameron would attempt to reprogram them by bombarding them with recorded messages for up to 16 hours at a time. Years later, Johnson found out that the experiments had wreaked havoc on Orlikow’s brain; it could take her three weeks to read a newspaper, months to write a letter, and years to read a book. Similar scenes played out across Canada as former patients of the institute attempted to return to their lives. “It tainted our whole family,” said Alison Steel, whose mother was admitted to the institute in 1957.
Note: The Canadian government has been actively attempting to silence victims of this program for over forty years. Read more on the court cases stemming from Dr Ewen Cameron's CIA-funded experiments in this Times of London article. Read also an excellent summary on the involvement of doctors in the CIA's brainwashing experiments. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
President Trump vowed last year to release all the long-secret files related to the JFK assassination, but the administration announced Thursday that some documents will remain redacted until October 2021 for national security reasons. Trump gave the CIA, FBI and other agencies a deadline of April 26 to release documents related to the investigation into President John F. Kennedy’s assassination by Lee Harvey Oswald on Nov. 22, 1963, in Dallas. Trump ... had promised to release the entirety of the 5 million pages of records, most of which have been available since the late 1990s. Jefferson Morley, a former Washington Post staff writer ... said in an interview that he was disappointed by Trump’s decision to delay the full release for another three years and, possibly, beyond. “Trump said that all the JFK files will be released, but the truth is that thousands of JFK files are still secret. The clear intent of Congress was to have these released last October and now we’re talking about 2021,” Morley said. “The point is that the CIA wants to keep this secret forever. It’s a very clear statement of intent.” Morley also said that the Trump administration is not complying with the stipulations of the Kennedy Records Act, which requires that the administration provide declassified explanations for withheld documents. Morley, who has been fighting the CIA in federal court for the last 15 years ... said he was quickly going through the 19,000 files that were released Thursday and came across redactions that made little sense to him.
Note: See this USA Today article for a summary of files released in 2017 on the JFK assassination. For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.
Bloomberg Government reports on a FedBizOpps.gov posting by the Department of Homeland Security (DHS) with the relatively benign-sounding subject “Media Monitoring Services.” The details of the attached Statement of Work, however, outline a plan to gather and monitor the public activities of media professionals and influencers and are enough to cause nightmares of constitutional proportions, particularly as the freedom of the press is under attack worldwide. As part of its "media monitoring," the DHS seeks to track more than 290,000 global news sources as well as social media. The successful contracting company will have "24/7 access to a password protected, media influencer database" ... in order to "identify any and all media coverage related to the Department of Homeland Security or a particular event." The database will be browsable by "location, beat and type of influencer," and for each influencer, the chosen contractor should "present contact details and ... an overview of the previous coverage published by the media influencer." Increasing government encroachment on the freedom of the press is the sinister backdrop to all of this. Freedom House ... recently concluded that global media freedom has reached its lowest level in the past 13 years. The independent watchdog organization blames "new threats to journalists and media outlets in major democracies" as well as "further crackdowns on independent media in authoritarian countries like Russia and China."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
The U.S. military took more than four years to process a Freedom of Information Act request for a copy of the Guantánamo guidelines for censoring prison library material - and censored the guidelines when it processed the request. The paperwork the military released appeared to leave out three pages of the prison’s procedure for handling the Quran. The Miami Herald sought the Nov. 27, 2013, document in a Dec. 10, 2013, FOIA request. The U.S. Southern Command apparently released the document, with redactions, on March 21 but didn’t put it in the mail for five more days. It arrived at the Herald newsroom, which is next door to Southcom, on Tuesday. The Guantánamo prison is a Law of War detention site run by the Pentagon; left unclear was the U.S. military’s law enforcement or prosecution function related to the Detainee Library, which circulates books among 26 of the prison’s 41 detainees. Of those 26, only two have been convicted of war crimes. Former CIA captives at the clandestine Camp 7 prison, including those accused of plotting the 9/11 attacks, don’t have privileges at the main library but can draw from a different, secret collection. In May 2016, a U.S. Army officer in charge of detainee diversionary programs told reporters that “negative screening criteria” included military topics, extreme graphic violence, nudity, sexuality and extremism. Many of the prison’s current detainees were held by the CIA for weeks or years before their transfer to U.S. military custody.
Note: A letter titled, "Will I Die At Guantanamo Bay? After 15 Years, I Deserve Justice" was recently published by Newsweek. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
The Florida sheriff whose department responded to this month's high school massacre defended his leadership Sunday while insisting that only one of his deputies was on the scene as the gunman killed 14 students and three staff members. Broward County Sheriff Scott Israel told CNN that investigators are looking into claims that three other deputies were on the scene but failed to enter the school when the chance to save lives still existed. Israel and the sheriff's office have come under withering scrutiny after last week's revelation that deputy Scot Peterson did not go in to confront the suspected shooter, 19-year-old Nikolas Cruz, during the Valentine's Day attack. It is also facing backlash for apparently mishandling some of the 18 tipster calls related to the suspected shooter. The tips were among a series of what authorities now describe as the clearest missed warning signs that Cruz ... posed a serious threat. The FBI has acknowledged that it failed to investigate the tip about Cruz that the agency received on Jan. 5. A transcript of the phone call [to the FBI] spanned more than 13 minutes. During the call, the woman described a teenager prone to anger with the "mental capacity of a 12 to 14 year old" that deteriorated after his mother died last year. She pointed the FBI to several Instagram accounts where Cruz had posted photos of sliced-up animals and rifles and ammunition he apparently purchased with money from his mother's life insurance policy. "He's thrown out of all these schools because he would pick up a chair and just throw it at somebody, a teacher or a student, because he didn't like the way they were talking to him."
Note: The above article describes problems in government organizations that allowed a threat to become a tragedy, but does not mention the well-documented connection between prescription drugs and mass shootings.
Broward County deputies received at least 18 calls warning them about Nikolas Cruz from 2008 to 2017, including concerns that he "planned to shoot up the school" and other threats and acts of violence before he was accused of killing 17 people at a high school. The warnings, made by concerned people close to Cruz, came in phone calls to the Broward County Sheriff's Office, records show. At least five callers mentioned concern over his access to weapons, according to the documents. None of those warnings led to direct intervention. In February 2016, neighbors told police that they were worried he “planned to shoot up the school”. The new details add to the growing list of red flags missed by law enforcement officials, including the FBI, in the months leading up to last week's mass shooting at Marjory Stoneman Douglas High School. The FBI is reviewing why a tip last month called into the agency about Cruz's desire to kill people was not forwarded to Miami agents for investigation. The Sheriff’s Office has since opened two internal affairs investigations looking into whether its deputies followed the department’s standards after receiving two phone calls. After the February 2016 call, a deputy forwarded the information to the Stoneman Douglas School Resource Officer, Deputy Scot Peterson. Peterson, 54, retired after an internal investigation was launched into why he sat outside the school for about four minutes and never entered as the shooter killed students and staff.
Note: The above article describes problems in government organizations that allowed a threat to become a tragedy, but does not mention the well-documented connection between prescription drugs and mass shootings.
A group of American diplomats stationed in Havana appear to have symptoms of concussion without ever having received blows to their heads, medical experts have found. The diplomats originally were said to have been victims of a “sonic attack,” a possibility that the Federal Bureau of Investigation reportedly ruled out. The experts’ report, published late Wednesday in the journal JAMA, does not solve the mystery, instead raising even more questions about what could have caused the brain injuries. The incidents occurred in 2016, when 18 of the 21 affected diplomats reported they heard strange sounds in their homes or hotel rooms. All but one reported immediate symptoms: headache, pain in one ear, loss of hearing. Days or weeks later, other symptoms emerged. The State Department asked researchers at the University of Pennsylvania to investigate. Their report confirmed neurological problems in the diplomats, including signs of what appear to be concussions. The study’s lead author, Dr. Douglas H. Smith [said], “This is ... concussion without blunt head trauma.” Like concussion patients, some of the diplomats improved on their own, while others recovered only after therapy. Dr. Smith and his colleagues do not think audible sound caused the injuries. Perhaps, they speculated, a device that produced another sort of harmful energy also produced an audible sound. Low-frequency infrasound, high-frequency ultrasound and microwaves have all been shown to damage the brain, the researchers noted.
Note: Was this a false flag attack using non-lethal weapons to get the US out of Cuba? More here.
The White House can now direct US intelligence agencies to spend money and take covert action without approval of congressional oversight committees under a provision slipped into the bill that ended the government shutdown, leaders of the Senate intelligence committee say. A provision in the bill - requested by the White House and Pentagon - gives intelligence agencies an exemption from the law that requires them to get authorization from the intelligence committees before they spend taxpayer money, said Sen. Richard Burr, R-N.C., and chairman of the Senate panel. Section 504 of the National Security Act gives the committees the power to withhold money from the intelligence agencies if they object to surveillance programs or other intelligence activities. Burr and [Sen. Mark] Warner said the provision to weaken their oversight power comes just after they promised civil liberties advocates in the Senate that they would ensure that the FBI and other intelligence agencies don't overstep their bounds in carrying out a controversial surveillance program recently renewed by Congress. That surveillance program, Section 702 of the Foreign Intelligence Surveillance Act ... sweeps up emails, text messages, photos and other communication from an unknown number of Americans, and allows federal agents to search that data without a warrant. Burr and Warner both supported a six-year renewal of the program earlier this month.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Ecuador has granted citizenship to WikiLeaks founder Julian Assange, Ecuador's Foreign Minister Maria Fernanda Espinosa announced Thursday. She called the measure "one more ring of protection" for Assange, who has been holed up at the Ecuadorian Embassy in London since 2012 in an effort to avoid a Swedish arrest warrant. Sweden dropped the charges in May 2017, but Assange remains the subject of a UK arrest warrant. Assange ... has previously expressed concern that if he leaves the Ecuadorian embassy in London he could end up being extradited to the US, where he fears facing the death penalty over allegations of revealing government secrets through WikiLeaks. In December, the Ecuadorian government requested diplomatic status for Assange. But the UK rebuffed the request. Espinosa said Ecuador will continue to pursue a dialogue with the UK to eventually remove Assange from the embassy. "We will continue to protect Julian Assange while his physical and psychological integrity are at risk," Espinosa said. "We are a country that defends human rights and ... respects international law." A 2016 United Nations report concluded that the WikiLeaks founder had been arbitrarily detained by Sweden and the United Kingdom.
Note: Read more about the "legal limbo" and propaganda campaign carried out against Assange and Wikileaks. A 2016 United Nations panel found that authorities in Sweden and the UK have acted unlawfully with regard to Assange. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Half-a-dozen 2017 releases of long-secret documents about the assassination of President John F. Kennedy have given plenty of new leads to those who don’t believe alleged gunman Lee Harvey Oswald acted alone. The 34,963 documents ... have fed the fire tended by researchers and others who believe there is much more to the story how a U.S. president was assassinated in Dallas 54 years ago. One particular document from the August release has created much buzz. It that shows that Earle Cabell, mayor of Dallas at the time of the Nov. 22, 1963, shooting, became a CIA asset in late 1956. Another revelatory JFK document released in full on Dec. 15 was the transcript of a 1978 interview by the House Select Committee on Assassinations with Orest Pena. According to Pena, a bar owner in New Orleans, Lee Harvey Oswald was a U.S. government agent or informant. How did he know? Because Pena himself was an informant. He had given details to the Warren Commission in July 1964 but, as the new document shows, later revealed much more detail about Warren de Brueys, an FBI agent in New Orleans to whom Pena said he reported. Oswald, he claimed, frequented a breakfast place regularly not only with de Brueys but with agents from U.S. Customs and Immigration. Pena believed Oswald had an office in the same government complex. Pena also testified to the House panel that de Brueys had threatened him if he shared with investigators details of their meetings and training of anti-Castro instigators.
Note: Watch an excellent five-minute segment of the History Channel's "Men Who Killed Kennedy," For more along these lines, see our excellent resource center filled with reliable information questions what really happened in the JFK assassination.
The secret letter was tucked inside the pages of an old book. It had been written by FBI Director J. Edgar Hoover to a top lieutenant, condemning civil rights leader Martin Luther King Jr. [in] 1964. Hoover the previous day had assailed King at a news conference as “the most notorious liar in the country.” Now he was writing a colleague privately to say he hoped King was getting his “just deserts.” Four years later, King would be assassinated. And the letter ... sheds yet more light on the historic malice the FBI director had toward King. Washington scholar James L. Swanson said he found the letter ... clipped to a page in [a book] he purchased. “This is a hitherto unknown and unpublished letter,” Swanson said. “What happened was this: It was announced [the previous month] that Dr. King had been awarded the Nobel Peace Prize, and that provoked Hoover,” he said. Hoover believed that King and his movement were threats to the social order. The FBI had begun wiretapping King’s home and office, and bugging his hotel rooms. No serious links to communism were uncovered, but hints about King’s sexual dalliances allegedly were. Days after Hoover’s news conference, a salacious anonymous letter was delivered to King’s wife. This letter was ... in a package that also [contained] a tape recording that allegedly captured evidence of King’s sexual misconduct. King suspected that the FBI was behind the letter. Sullivan ... later admitted his involvement in the plan during testimony before a Senate committee.
Note: Watch an excellent, six-minute clip from Canada's PBS giving powerful evidence based on the excellent work of William Pepper that King was assassinated by factions in government that wanted his movement stopped. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and assassinations.
The FBI’s background-check system is missing millions of records of criminal convictions, mental illness diagnoses and other flags that would keep guns out of potentially dangerous hands. Experts who study the data say government agencies responsible for maintaining such records have long failed to forward them into federal databases used for gun background checks. As the shooting at a Texas church on Sunday showed, what the FBI doesn’t know can get people killed. In that case, the gunman had been convicted at a court-martial of charges stemming from a domestic violence case. Officials say the Air Force never notified the FBI of his conviction, so when he purchased weapons at a retail store, he cleared the background check. The FBI said it doesn’t know the scope of the problem, but the National Rifle Association says about 7 million records are absent from the system, based on a 2013 report [which] determined that “at least 25% of felony convictions "are not available" to the National Instant Criminal Background Check System maintained by the FBI. In light of the Texas shooting, Air Force officials have ... faulted the staff at an air base for not sending the necessary information to the FBI, but federal officials who work in the database effort say the problem of military nonreporting of domestic violence cases extends far beyond a single base or service branch. A large number of people convicted of misdemeanor domestic violence - who also are prohibited from buying guns - are absent from the FBI database as well.
Note: For more, see concise summaries of deeply revealing news articles on corruption in government and in the military.
The Trump administration has declared all-out war on leakers. But the administration is battling the wrong enemy with the wrong weapons. Digital secrets stolen from the National Security Agency represent the real ... security problem. More than half a billion pages have been swiped. The stolen data includes some of the NSA’s most prized cyber weapons. Most were created by the agency’s own hacker team, the Tailored Access Operations (TAO) unit. Government hackers search for ways to crack into widely used computer operating systems, such as Microsoft Windows. When they discover a way in ... rather than notify the companies that their products are dangerously flawed, the NSA often secretly stores these vulnerabilities and later converts them into powerful cyber weapons, known as “exploits.” Like burglar’s tools, the exploits can secretly open a crack in a system, such as Windows, and insert an “implant” containing NSA malware - enabling the agency to take control of any computer using that Windows program. Unknown to the public, the NSA has for years been negligent in protecting its top-secret material, including these cyber weapons. Meanwhile, the Trump administration continues searching for someone who passed a few tidbits about White House bickering to a reporter, rather than focus on the NSA losing potentially deadly cyber weapons.
Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The FBI counterterrorism division’s identification of a movement it calls “black identity extremists” is the latest addition to the list of protesters and dissidents the agency puts under the “domestic terrorism” umbrella. But many national security experts say the designation [is] simply a label that allows the FBI to conduct additional surveillance on “basically anyone who’s black and politically active,” said Michael German, who left the FBI in 2004. While the practice of labeling certain protest groups as domestic terrorists is not unique to President Trump’s administration, Hina Shamsi ... at the American Civil Liberties Union, said there’s concern that “abusive and unjustified investigations” by the FBI are rising. The problem, Shamsi said, is partly in the overly broad definition of domestic terrorism in the Patriot Act as a violation of the criminal laws ... intended to “influence the policy of a government by intimidation or coercion.” Eighty-four members of Congress cited that intention to intimidate or coerce in a letter to the Justice Department last week that asked whether the department had labeled Dakota Access Pipeline protesters domestic terrorists. The Justice Department did not respond to questions about the letter. The FBI report that focused on black identity extremists ... had interest groups questioning whether the designation has been used to single out members of Black Lives Matter.
Note: The Department of Homeland Security has reportedly been monitoring the Black Lives Matter movement since 2014, in some cases producing "minute-by-minute reports on protesters’ movements". For more along these lines, read about Cointelpro, the program used by corrupt intelligence agencies to spy on and attack the U.S. civil rights movement beginning in the 1960's. See also concise summaries of deeply revealing news articles about the erosion of civil liberties.
For more than two decades during the Cold War, the public was bombarded by an enormous publicity campaign to shape American views of Russia. The campaign may have been the largest and most consistent source of political advertising in American history. And it was orchestrated by a big, powerful intelligence service: the Central Intelligence Agency. In 1950, [the CIA] created Radio Free Europe, a government-sponsored broadcasting station. Ostensibly, it provided unbiased news for Eastern Europeans, but in fact the agency used it to wage a subversive campaign to weaken Communist governments. But how to hide the agency’s hand? Simple: pretend that ordinary Americans are paying the bills. A well-heeled and well-connected front group, the National Committee for a Free Europe ... ran an enormous fund-raising campaign ... that implored Americans to donate “freedom dollars” to combat Kremlin lies. The donations barely covered the cost of running the “fund-raising drives,” to say nothing of Radio Free Europe’s $30 million annual budgets. But that wasn’t the point. Declassified documents reveal that almost from the start, the CIA saw that it could exploit the fund-raising campaign as a conduit for domestic propaganda. It was a way to rally public support for the Cold War. Our post-truth media environment [carries] voices from this past. The crusade blasted all information from enemy sources as lies and deceit — fake news, we could say.
Note: The US government was legally prevented from broadcasting propaganda to domestic audiences for many years. This prohibition ended when new rules were adopted in 2013. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
In perhaps its most audacious and elaborate incursion into academia, the CIA has secretly spent millions of dollars staging scientific conferences around the world. Its purpose was to lure Iranian nuclear scientists out of their homeland and into an accessible setting, where its intelligence officers could approach them individually and press them to defect. While a university campus might have only one or two professors of interest to an intelligence service, the right conference – on drone technology, perhaps, or Isis – could have dozens. The FBI and CIA swarm conferences. At gatherings in the US, says one former FBI agent, “foreign intelligence officers try to collect Americans; we try to collect them”. The CIA is involved with conferences in various ways: it sends officers to them; it hosts them through front companies in the Washington area, so that the intelligence community can tap academic wisdom; and it mounts sham conferences to reach potential defectors from hostile countries. Scientific conferences have become such a draw for intelligence agents that one of the biggest concerns for CIA operatives is interference from agency colleagues trapping the same academic prey. “We tend to flood events like these,” a former CIA officer who writes under the pseudonym Ishmael Jones observed in his 2008 book, The Human Factor: Inside the CIA’s Dysfunctional Intelligence Culture.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in science and in the intelligence community.
A settlement in a landmark lawsuit against two psychologists who helped design the CIA's harsh interrogation methods used in the war on terror marked the first time the agency or its private contractors have been held accountable for the program, legal experts said. The deal in the lawsuit from the American Civil Liberties Union also makes it unlikely the CIA will again pursue the tactics, said Deborah Pearlstein, professor at the Cardozo Law School in New York. “This sends a signal to those who might consider doing this in the future,” Pearlstein said, adding, “This puts an exclamation mark at the end of ‘don't torture.’” Terms of the settlement were not disclosed, but it avoided a civil trial set for Sept. 5 in federal court. The ACLU sued psychologists James Mitchell and John “Bruce” Jessen on behalf of three former detainees, including one who died in custody, who contended they were tortured at secret CIA prisons overseas. Mitchell and Jessen were under contract with the federal government following the Sept. 11 terror attacks. The lawsuit claimed they designed, implemented and personally administered an experimental torture program. The techniques they developed included waterboarding, slamming the three men into walls, stuffing them inside coffin-like boxes, exposing them to extreme temperatures, starving them and keeping them awake for days, the ACLU said. A U.S. Senate investigation in 2014 found that Mitchell and Jessen's techniques produced no useful intelligence. They were paid $81 million for their work.
Note: Prior to condemning torture, some of the American Psychological Association’s top officials sought to curry favor with Pentagon officials by supporting the CIA's brutal interrogation methods. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
A former chief investigator at the Guantanamo Bay detention center is accusing the Pentagon of blocking publication of his book on the use of brutal interrogation techniques and top U.S. officials' advocacy of what he calls "torture." Mark Fallon, a Naval Criminal Investigative Service (NCIS) veteran, said his book "Unjustifiable Means" reveals no classified information or new detainee abuse cases but details internal deliberations about interrogation methods, identifies officials who advocated "torture" and describes how he and others objected. "This is more of an inside view of the fight to try to stop torture," he said. "There was a tremendous opposition within the government itself believing these were war crimes, and I name names." The use of the brutal interrogation methods made the country less safe, he said. Fallon said that he was told it would take no more than six weeks for the Defense Department office that scrubs manuscripts for unauthorized information to review his book. That was more than seven months ago. He has since missed his submission deadline, had to cancel a book tour and enlisted the American Civil Liberties Union and Columbia University's Knight First Amendment Institute to fight what he contends is a Pentagon effort to suppress his work and stifle his right to free speech. Now the ACLU and the Columbia University institute are taking Fallon's case to Congress.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
For nearly four years, Syrian rebels have clung to a programme of CIA assistance as a symbol of US support in their battle against Bashar al-Assad’s regime. So reports that Donald Trump’s administration will stop the limited scheme to arm and train Syria’s opposition forces have sparked anger and confusion. Rebels say they have not been informed of any changes to the policy introduced ... in 2013 as part of efforts to put pressure on Syria’s president. According to ... the Washington Post newspaper, Mr Trump decided last month to end funding for the CIA programme. Rebels contacted by the Financial Times say their CIA interlocutors had not confirmed any change, and political opposition figures who met US officials this week say they, too, were given no hint of any change. One rebel commander who asked not to be named said US support had been waning for months but noted that the rebels had been given their salaries as normal last month. The CIA funding for rebel groups fed into two internationally backed operations that supported an array of rebel groups. Many observers and even rebels themselves criticised the programme for turning a blind eye to its funding ending up with jihadis. Rebels who received support would return to volatile territories in Syria, only to be pressed by an al-Qaeda-linked jihadi group to hand over a cut. “Frankly so much of the weapons and ammunition were going to [Syria’s al-Qaeda affiliate] that it’s probably a good thing,” [an] opposition figure said.
Note: What is the CIA doing paying the salaries of rebels in Syria? For more, see this informative article. Then, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
The Federal Reserve’s little-known role housing the assets of other central banks comes with a unique benefit to the United States: It serves as a source of foreign intelligence for Washington. Senior officials from the U.S. Treasury and other government departments have turned to these otherwise confidential accounts several times a year to analyze the asset holdings of the central banks of Russia, China, Iraq, Turkey, Yemen, Libya and others, according to more than a dozen current and former senior Fed and Treasury officials. The U.S. central bank keeps a tight lid on information contained in these accounts. But according to the officials interviewed by Reuters, U.S. authorities regularly use a “need to know” confidentiality exception in the Fed’s service contracts with foreign central banks. Some 250 foreign central banks and governments keep $3.3 trillion of their assets at the Federal Reserve Bank of New York, about half of the world’s official dollar reserves, using a service advertised in a 2015 slide presentation as “safe and confidential.” Other major central banks and some commercial banks offer similar services. But only the Fed offers direct access to U.S. debt markets and to the world’s reserve currency, the dollar. In all, the people interviewed by Reuters identified seven instances in the last 15 years in which the accounts gave U.S. authorities insights into the actions of foreign counterparts or market movements, at times leading to a specific U.S. response.
Note: It's quite telling that no other major media picked up this important piece. For more along these lines, see concise summaries of deeply revealing news articles on financial industry corruption and the disappearance of privacy.
Hundreds of men swept up in the hunt for al-Qaida militants have disappeared into a secret network of prisons in southern Yemen where abuse is routine and torture extreme - including the "grill," in which the victim is tied to a spit like a roast and spun in a circle of fire, an Associated Press investigation has found. Senior American defense officials acknowledged Wednesday that U.S. forces have been involved in interrogations of detainees in Yemen but denied any participation in or knowledge of human rights abuses. Interrogating detainees who have been abused could violate international law, which prohibits complicity in torture. The secret prisons are inside military bases, ports, an airport, private villas and even a nightclub. Some detainees have been flown to an Emirati base across the Red Sea in Eritrea, according to Yemen Interior Minister Hussein Arab and others. Several U.S. defense officials, speaking on condition of anonymity to discuss the topic, told AP that American forces do participate in interrogations of detainees at locations in Yemen, provide questions for others to ask, and receive transcripts of interrogations from Emirati allies. They said U.S. senior military leaders were aware of allegations of torture at the prisons in Yemen, looked into them, but were satisfied that there had not been any abuse when U.S. forces were present. Inside war-torn Yemen, however ... nearly 2,000 men have disappeared into the clandestine prisons, a number so high that it has triggered near-weekly protests.
Note: Saudi Arabia's military campaign in Yemen has strong US military support, and flagrantly violates international law. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
People connected to the Russian government tried to hack election-related computer systems in 21 states. Samuel Liles, the Department of Homeland Security’s acting director of the Office of Intelligence and Analysis Cyber Division, said vote-tallying mechanisms were unaffected and that the hackers appeared to be scanning for vulnerabilities — which Liles likened to walking down the street and looking at homes to see who might be inside. Liles was testifying before the Senate Intelligence Committee, which is investigating Russia’s efforts to meddle in the 2016 presidential election. Officials in Arizona and Illinois had previously confirmed that hackers targeted their voter registration system. In a separate hearing ... former Department of Homeland Security secretary Jeh Johnson testified that Russia’s meddling ... was “unprecedented, the scale and the scope of what we saw them doing.” He said the severity of Russia’s efforts persuaded him to sign onto an Oct. 7 statement publicly blaming the Kremlin for what had happened. “We needed to do it, and we needed to do it well before the election to inform American voters of what we saw,” Johnson said. FBI Assistant Director of Counterintelligence Bill Priestap ... said Russia for years has tried to influence U.S. elections but that the “scale” and “aggressiveness” of its efforts in 2016 made the attempts more significant.
Note: Many who follow elections closely have known and spread the word for years about serious vulnerabilities in US electronic voting, yet only now that Russia is involved is it getting widespread coverage. Do you really think the Russians are the only ones who have hacked US elections? Read an enlightening analysis of elections hacking in the US which raises many serious questions. And don't miss the critically important information provided in our Elections Information Center.
Russia’s cyberattack on the U.S. electoral system before [the recent] election was far more widespread than has been publicly revealed, including incursions into voter databases and software systems in almost twice as many states as previously reported. In Illinois, investigators found evidence that cyber intruders tried to delete or alter voter data. The hackers accessed software designed to be used by poll workers on Election Day, and in at least one state accessed a campaign finance database. Details of the wave of attacks, in the summer and fall of 2016, were provided by three people with direct knowledge of the U.S. investigation into the matter. In all, the Russian hackers hit systems in a total of 39 states. The scope and sophistication so concerned Obama administration officials that they took an unprecedented step -- complaining directly to Moscow over a modern-day “red phone.” In October, two of the people said, the White House contacted the Kremlin on the back channel to offer detailed documents of what it said was Russia’s role in election meddling and to warn that the attacks risked setting off a broader conflict. The new details, buttressed by a classified National Security Agency document recently disclosed by the Intercept ... paint a worrisome picture for future elections: [This is] the newest portrayal of potentially deep vulnerabilities in the U.S.’s patchwork of voting technologies.
Note: Many who follow elections closely have known and spread the word for years about serious vulnerabilities in US electronic voting, yet only now that Russia is involved is it getting widespread coverage. Do you really think the Russians are the only ones who have hacked US elections? Read an enlightening analysis of elections hacking in the US which raises many serious questions. And don't miss the critically important information provided in our Elections Information Center.
Members of a congressional committee at a public hearing Wednesday blasted former President Barack Obama and his attorney general for allegedly covering up an investigation into the death of a Border Patrol agent killed as a result of a botched government gun-running project known as Operation Fast and Furious. The House Oversight Committee also Wednesday released a scathing, nearly 300-page report that found Holder’s Justice Department tried to hide the facts. Terry died in a gunfight. [His] death exposed Operation Fast and Furious, a Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) operation in which the federal government allowed criminals to buy guns in Phoenix-area shops with the intention of tracking them as they were transported into Mexico. But the agency lost track of more than 1,400 of the 2,000 guns they allowed smugglers to buy. Two of those guns were found at the scene of Terry's killing. Sen. Charles Grassley, R-Iowa, testified Wednesday in front of the committee, accusing DOJ and ATF officials of obstructing the investigation and working to silence ATF agents who informed the Senate of Fast and Furious. One of those silenced ATF agents, John Dodson, testified Wednesday that he remains “in a state of purgatory” since objecting to Fast and Furious and has been the subject of reprisals. Grassley's and Dodson's testimony reinforced findings of the report, which states that the Justice Department knew before Terry’s death that the ATF was “walking” firearms to Mexico and knew the day after the agent’s death that Fast and Furious guns were involved in the shootout -- despite denying these facts.
Note: The Obama administration invoked executive privilege in an unsuccessful attempt to cover this story up. Whistleblower John Dodson published a book on this scandal in 2013. The ATF tried and failed to silence him, then lied about the whole thing. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Russian military intelligence attempted to cyber-attack a U.S. voting software supplier and more than 100 local election officials in the days leading up to the 2016 presidential election, The Intercept reported Monday. According to an NSA document ... Russian military intelligence cyber-attacked a U.S. voting software supplier, using information gained in that attack to “launch a voter registration-themed spear-phishing campaign targeting U.S. local government organizations. Russian General Staff Main Intelligence Directorate actors … executed cyber espionage operations against a named U.S. company in August 2016, evidently to obtain information on elections-related software and hardware solutions,” the document states. The operation gave the hackers “persistent access” to the targeted computers, allowing them to “survey the victims for items of interest.” But Pamela Smith, president of election integrity watchdog Verified Voting, said the hacking might have kept some Americans from voting. “If someone has access to a state voter database, they can take malicious action by modifying or removing information,” she told The Intercept. “This could affect whether someone has the ability to cast a regular ballot or be required to cast a ‘provisional’ ballot — which ... may mean the voter has to jump through certain hoops such as proving their information to the election official before their eligibility is affirmed.”
Note: Why have those who set up our elections allowed private companies to develop software which can be hacked? For undeniable evidence our voting systems have not been safe for years, read summaries of these major media news articles.
Approximately half of adult Americans’ photographs are stored in facial recognition databases that can be accessed by the FBI, without their knowledge or consent, in the hunt for suspected criminals. About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports. The algorithms used to identify matches are inaccurate about 15% of the time, and are more likely to misidentify black people than white people. These are just some of the damning facts presented at last week’s House oversight committee hearing, where politicians and privacy campaigners criticized the FBI and called for stricter regulation of facial recognition technology at a time when it is creeping into law enforcement and business. The FBI first launched its advanced biometric database ... in 2010, augmenting the old fingerprint database with further capabilities including facial recognition. The bureau did not inform the public ... nor did it publish a privacy impact assessment, required by law, for five years. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos. Last year, the US government accountability office (GAO) analyzed the FBI’s use of facial recognition technology and found it to be lacking in accountability, accuracy and oversight. “It doesn’t know how often the system incorrectly identifies the wrong subject,” explained the GAO’s Diana Maurer. “Innocent people could bear the burden of being falsely accused.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
US President Donald Trump has given the Central Intelligence Agency new authority to conduct drone attacks against suspected militants. The move would be a change from the policy of former President Barack Obama's administration of limiting the CIA's paramilitary role. The United States was the first to use unmanned aircraft fitted with missiles to kill militant suspects in the years after the September 11, 2001, attacks on New York and Washington. Strikes by missile-armed Predator and Reaper drones against overseas targets began under former President George W. Bush and were expanded by Obama. Critics of the targeted killing program question whether the strikes create more militants than they kill. They cite the spread of jihadist organisations and militant attacks throughout the world as evidence that targeted killings may be exacerbating the problem. In July, the US government accepted responsibility for inadvertently killing up to 116 civilians in strikes in countries where America is not at war.
Note: Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
WikiLeaks on Tuesday released a significant cache of documents that it said came from a high-security network inside the Central Intelligence Agency. WikiLeaks called the documents Vault 7, and they lay out the capabilities of the agency’s global covert hacking program. By the end of 2016, the C.I.A. program had 5,000 registered users, including government employees and contractors, [and] had produced more than a thousand hacking systems. The files have circulated among former United States government hackers and contractors in “an unauthorized manner, one of whom provided WikiLeaks with portions of the archive,” WikiLeaks said. The software targeted by the hacking program included the most popular smartphone operating systems. Apple’s iPhone software ... was a particular target, including the development of several “zero day” exploits - a term for attacking coding flaws the company would not have known about. Google’s Android ... received even more attention. By 2016, the C.I.A. had 24 weaponized Android “zero day” software programs. The C.I.A. also targeted ... internet-connected computers and home and industrial devices running the Linux operating system. In 2010, the Obama administration promised to disclose newly discovered vulnerabilities to companies like Apple, Google and Microsoft. But the WikiLeaks documents indicate that the agency found security flaws, kept them secret and then used them for surveillance and intelligence gathering.
Note: See the wikileaks webpage summarizing this most important leak. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The FBI is investigating political activists campaigning against the Dakota Access pipeline, diverting agents charged with preventing terrorist attacks to instead focus their attention on indigenous activists and environmentalists. Officers within the FBI’s joint terrorism taskforce have attempted to contact at least three people tied to the Standing Rock “water protector” movement in North Dakota. “The idea that the government would attempt to construe this indigenous-led non-violent movement into some kind of domestic terrorism investigation is unfathomable to me,” said Lauren Regan, a civil rights attorney. “It’s outrageous, it’s unwarranted … and it’s unconstitutional.” Regan ... said she learned of three cases in which officers with the taskforce, known as the JTTF, tried to talk to activists in person. She described the encounters as attempted “knocks and talks”, meaning law enforcement showed up at people’s doors without a subpoena or warrant and tried to get them to voluntarily cooperate with an interview. The three individuals ... asserted their fifth amendment rights and did not respond to the officers, according to Regan. All three contacts were made in recent weeks after Trump’s inauguration. Trump, a former investor in Energy Transfer Partners, the Texas-based firm behind the pipeline, took executive action in his first week in office to expedite the project. On Wednesday, workers began drilling to complete the pipeline.
Note: The FBI has a long history of violating activists' rights. The 2011 National Defense Authorization Bill broadened the definition of "supporter of terrorism" to include peaceful activists, authors, academics and even journalists. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
For months, the CIA, with unprecedented clarity, overtly threw its weight behind Hillary Clinton’s candidacy. In August, former acting CIA Director Michael Morell announced his endorsement of Clinton in the New York Times and claimed that “Mr. Putin had recruited Mr. Trump as an unwitting agent of the Russian Federation.” The CIA and NSA director under George W. Bush, Gen. Michael Hayden, also endorsed Clinton and went to the Washington Post to warn, in the week before the election, that “Donald Trump really does sound a lot like Vladimir Putin.” It is not hard to understand why the CIA preferred Clinton over Trump. Clinton was critical of Obama for restraining the CIA’s proxy war in Syria and was eager to expand that war. Clinton clearly wanted a harder line than Obama took against the CIA’s long-standing foes in Moscow. In general, Clinton defended and intended to extend the decadeslong international military order on which the CIA and Pentagon’s preeminence depends, while Trump - through a still-uncertain mix of instability and extremist conviction - posed a threat to it. The claims about Russia’s interference in U.S. elections and ties to Trump should be fully investigated. But until then, assertions that are unaccompanied by evidence and disseminated anonymously should be treated with the utmost skepticism. Venerating the intelligence community ... and equating its dark and dirty assertions [with] Truth ... cannot possibly achieve any good and is already doing much harm.
Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss the above provocative article by Glenn Greenwald and this interview he gave to Fox News.
We might already be living through the first world cyberwar – it’s just that we haven’t acknowledged or named it yet. What might a timeline of that war look like? Well, 2007 seems like a good bet as a starting point – with a concerted series of cyber-attacks on Estonia. In 2008 there were events that a historian might weave into a narrative of a global cyberwar, when several underwater internet cables were cut during the course of the year, interrupting internet communication and particularly affecting the Middle East. In 2010 the Stuxnet worm was used to attack Iran’s nuclear program. Another event from 2010, the WikiLeaks American embassy cables release ... would be irresistible for a historian to refer to in this context. One of the things that makes the first world cyberwar different from conventional warfare [is] the mix of nation states being involved with pressure groups, whistleblowers and hackers. Historians will be unable to ignore ... the 2016 US election campaign being influenced by alleged hacked and leaked emails. What reason is there to suppose that these events might eventually be grouped together as a single world cyberwar by historians? It is the idea that hostilities might formally come to an end. You can envisage a scenario where Russia, China and the US can see a mutual benefit in de-escalating cyber-attacks between the three of them.
Note: A 2007 New York Times article describes the formation of the Air Force Cyberspace Command to arm the US military in anticipation of widespread computer-based warfare. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
The US "got it wrong" about Saddam Hussein and Iraq, the CIA analyst who interrogated the former dictator has said. John Nixon had numerous conversations with the deposed leader and now says that America was critically mistaken about their intervention Iraq. In particular, he claims, the CIA’s view of Hussein’s attitude to using chemical weapons was wrong. During the interrogations, Mr Nixon asked Hussein if he’d ever thought of engaging in a pre-emptive strike with WMDs against US troops based in Saudi Arabia. According to Mr Nixon ... the former dictator’s reply was: “We never thought about using weapons of mass destruction. It was not discussed. Use chemical weapons against the world? Is there anyone with full faculties who would do this?” Mr Nixon admitted this was “not what we had expected to hear”. The main reason the American and British governments used to justify the controversial invasion of Iraq was the supposed risk posed by the WMDs possessed by the country. Nearly 200,000 people have died in the conflicts that followed. Iraq is now widely regarded as a failed state, and still suffers from widespread violence. Thirteen years on, at least 5,000 American troops remain in the country. Mr Nixon also spoke out against Mr Bush, who was rude towards him and reportedly made inappropriate jokes about the missing WMDs. Mr Bush blamed the CIA for Iraq’s failures, Mr Nixon said, adding that he “called its analysis ‘guesswork’ while hearing only what he wanted to hear”.
Note: Have you noticed how every Arabic nation to which the U.S. has sent armed forces has ended up not with a stronger democracy, but in a situation of chaos? Do you think this might be intentional? The war machine makes huge profits from conditions of chaos. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
US intelligence agencies have concluded that Russia interfered in last month’s presidential election. Officials ... were told that intelligence agencies had found that individuals linked to the Russian government had provided WikiLeaks with thousands of confidential emails stolen from the Democratic National Committee (DNC) and others. The emails were steadily leaked via WikiLeaks ... revealing that DNC figures had colluded to harm the chances of [Clinton’s] nomination rival Bernie Sanders, and later giving examples of collusion between her campaign and figures in the media to blindside Trump in debates. The Kremlin has rejected the hacking accusations. WikiLeaks founder Julian Assange has previously said the DNC leaks were not linked to Russia. A ... senior official cited by the Washington Post conceded that intelligence agencies did not have specific proof that the Kremlin was “directing” the hackers. Craig Murray, the former UK ambassador to Uzbekistan, who is a close associate of Assange, [said of] the CIA claims: “They are absolutely making it up ... I know who leaked them. “They are certainly not Russian and it’s an insider. It’s a leak, not a hack; the two are different things. “If ... the CIA’s statement refers to people who are known to be linked to the Russian state, they would have arrested someone. America has not been shy about arresting whistleblowers and it’s not been shy about extraditing hackers. They plainly have no knowledge whatsoever.”
Note: The Guardian newspaper's website removed all front page links to the above article just three hours after it was published. In its place, the Guardian ran a new article that was entirely supportive of what Wikileaks affiliate Craig Murray calls "the CIA’s blatant lie" about the leaked DNC emails. A short essay by WantToKnow.info team member Mark Bailey explores this apparent media manipulation.
The CIA has concluded in a secret assessment that Russia intervened in the 2016 election to help Donald Trump win the presidency, rather than just to undermine confidence in the U.S. electoral system, according to officials briefed on the matter. Intelligence agencies have identified individuals with connections to the Russian government who provided WikiLeaks with thousands of hacked emails from the Democratic National Committee and others. “It is the assessment of the intelligence community that Russia’s goal here was to favor one candidate over the other, to help Trump get elected,” said a senior U.S. official. “That’s the consensus view.” The CIA shared its latest assessment with key senators in a closed-door briefing on Capitol Hill last week. The CIA presentation ... fell short of a formal U.S. assessment produced by all 17 intelligence agencies. A senior U.S. official said there were minor disagreements among intelligence officials about the agency’s assessment, in part because some questions remain unanswered. For example, intelligence agencies do not have specific intelligence showing officials in the Kremlin “directing” the identified individuals to pass the Democratic emails to WikiLeaks. Some key ... lawmakers have continued to question the quality of evidence supporting Russian involvement. “I’ll be the first one to come out and point at Russia if there’s clear evidence, but there is no clear evidence - even now,” said [chairman of the House Intelligence Committee] Devin Nunes.
Note: The above article comes on the heels of the Washington Post's promotion of an anti-Russian "McCarthyite blacklist" which smeared dozens of U.S. news sites as “routine peddlers of Russian propaganda.” For more along these lines, see concise summaries of deeply revealing news articles on elections corruption and the manipulation of public perception.
Vladimir K. Bukovsky, a tireless opponent of Soviet leaders and President Vladimir V. Putin of Russia, is not a man easily put off his stride. But he got knocked sideways when British police officers banged on the front door of his home ... and informed him that they had “received information about forbidden images” in his possession. He faced five charges of making indecent images of children, five charges of possession of indecent images of children and one charge of possession of a prohibited image. After Mr. Bukovsky, 73, entered a not-guilty plea, [the case] was delayed [following] a prosecution request for more time to review an independent forensic report on what had been found on Mr. Bukovsky’s computers and how an unidentified third party had probably put it there. Mr. Bukovsky ... insisted that he was the victim of a new and particularly noxious form of an old K.G.B. dirty trick known as kompromat, the fabrication and planting of compromising or illegal material. Old-style kompromat featured ... a wide range of other primitive entrapment techniques. Today, however, kompromat has become allied with the more sophisticated tricks of cybermischief-making. Hacking is not only a good way to get real information ... but a relatively easy and usually untraceable way to plant fake information. This blurring of all boundaries between truth and falsehood in the service of operational needs has created a climate in Russia in which even the most serious and grotesque accusations ... are simply a currency for settling scores.
Note: Hackers from any country's intelligence services could plant child porn on anyone's computer so that they would then be arrested and convicted. What a wild world we live in! For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
In the trove of documents provided by former National Security Agency contractor Edward Snowden is a treasure. It begins with a riddle: "What do the President of Pakistan, a cigar smuggler, an arms dealer, a counterterrorism target, and a combatting proliferation target have in common? They all used their everyday GSM phone during a flight." This riddle appeared in 2010 in SIDtoday, the internal newsletter of the NSA's Signals Intelligence Directorate, or SID, and it was classified "top secret." It announced the emergence of a new field of espionage that had not yet been explored: the interception of data from phone calls made on board civil aircraft. In a separate internal document from a year earlier, the NSA reported that 50,000 people had already used their mobile phones in flight as of December 2008, a figure that rose to 100,000 by February 2009. In a 2012 presentation, Government Communications Headquarters, or GCHQ ... disclosed a program called "Southwinds," which was used to gather all the cellular activity, voice communication, data, metadata, and content of calls on board commercial aircraft. To spy on a telephone, all that was required was that the aircraft be cruising at an altitude above 10,000 feet. Today, approximately 100 companies permit in-flight use of telephones. This will further extend the scope of espionage by providing a pool of potential targets comprising several hundreds of thousands of people. This implies a population that goes far beyond terrorist targets.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
In your Monday editorial, “Russia’s roulette,” you mentioned the “alarming evidence” of my government’s alleged involvement in the U.S. presidential elections. I do believe that it’s just nonsense, but if you insist that it’s true, then it would be interesting and necessary to see the evidence. I am sure that your respected newspaper meticulously worked through all the proofs before publishing the above-mentioned editorial. Unfortunately, nobody, including my government, despite numerous official requests, has never been presented with the onus probandi. The latter will not come from just repeating the unsubstantiated accusations over and over again or referring to unknown “independent researchers.” As far as I know, (National Security Agency Director) Adm. Michael Rogers in his recent interview with Wall Street Journal has never mentioned RUSSIA, while the official statement of Oct. 7 that has been repeatedly referred to, has never INDICTED Russia (“believing” and even being “confident” is something very different). Without evidence, in every state of law, with the United States being one of them, the principle of the presumption of innocence prevails. And accusations remain pure speculation. In this case, ill-intentioned.
Note: The above was written by Maxim Goncharov, a press attaché with the Russian Consulate in San Francisco. For more along these lines, see concise summaries of deeply revealing elections news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our Elections Information Center.
The heads of the Pentagon and the nation’s intelligence community have recommended to President Obama that the director of the National Security Agency, Adm. Michael S. Rogers, be removed. The recommendation, delivered to the White House last month, was made by Defense Secretary Ashton B. Carter and Director of National Intelligence James R. Clapper Jr.. The news comes as Rogers is being considered by President-elect Donald Trump to be his nominee for director of national intelligence to replace Clapper as the official who oversees all 17 U.S. intelligence agencies. In a move apparently unprecedented for a military officer, Rogers, without notifying superiors, traveled to New York to meet with Trump on Thursday at Trump Tower. That caused consternation at senior levels of the administration, according to the officials, who spoke on the condition of anonymity. Carter has concerns with Rogers’s performance, officials said. The driving force for Clapper ... was the separation of leadership roles at the NSA and U.S. Cyber Command, and his stance that the NSA should be headed by a civilian. The expectation had been that Rogers would be replaced before the Nov. 8 election. Meanwhile, in February, Rogers ... merged the agency’s spying and hacking arms with its computer-security division into one Directorate of Operations. That reorganization has only intensified the discontent that has marked Rogers’s tenure at the agency. “The morale is horrible,” one former senior official said.
Note: Edward Snowden tweeted this article stating, "The real story you're not hearing about is a revolt within the US Intelligence Community." For more along these lines, see concise summaries of deeply revealing news articles on corruption in the military and in intelligence agencies.
Investigators pursuing what they believe to be the largest case of mishandling classified documents in United States history have found that the huge trove of stolen documents in the possession of a National Security Agency contractor included top-secret N.S.A. hacking tools that two months ago were offered for sale on the internet. They have been hunting for electronic clues that could link those cybertools - computer code posted online for auction by an anonymous group calling itself the Shadow Brokers - to the home computers of the contractor, Harold T. Martin III, who was arrested in late August. But so far, the investigators have been frustrated in their attempt to prove that Mr. Martin deliberately leaked or sold the hacking tools. Mr. Martin ... has insisted that he got in the habit of taking material home so he could improve his skills and be better at his job. The material the F.B.I. found in his possession added up to “many terabytes” of information ... which would make it by far the largest unauthorized leak of classified material from the classified sector. That volume dwarfs the hundreds of thousands of N.S.A. documents taken by Edward J. Snowden. [Mr. Martin] long held a high-level clearance and for a time worked with the N.S.A.’s premier hacking unit, called Tailored Access Operations, which breaks into the computer networks of foreign countries and which developed the hacking tools.
Note: It was reported in 2014 that the NSA had developed specialized tools to covertly hack into computers on a mass scale by using automated systems. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
An alleged accomplice in the Sept. 11 terror attacks is to undergo surgery this week for decade-old damage from his “sodomy” in CIA custody, his attorney says. Defense attorney Walter Ruiz, a Navy Reserve officer, disclosed the upcoming surgery for his client, Mustafa al Hawsawi, 48, on the eve of pretrial hearings Tuesday in the case that accuses the Saudi Arabian Hawsawi and four other men of orchestrating the Sept. 11, 2001, terror attacks. Ruiz said a case prosecutor informed him of the procedure over the weekend. Defense lawyers have been litigating over conditions at the remote prison and, in the case of their client, have specifically sought medical intervention to treat a rectal prolapse that has caused Hawsawi to bleed for more than a decade. The disclosure comes days after The New York Times published a detailed account of former CIA and Guantánamo captives grappling with the aftereffects of torture. Hawsawi was denied a request to have a member of his legal team on standby near the surgery. He has sat gingerly on a pillow at the war court since his first appearance in 2008. But the reason was not publicly known until release of a portion of the so-called Senate Torture Report on the CIA program ... which described agents using quasi-medical techniques called “rectal rehydration” and “rectal re-feeding.” Former CIA captives like Hawsawi are segregated in a clandestine lockup called Camp 7 that has been described ... as having its own medical facility, the capabilities of which are not known.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
The United States paid over a million euros to the family of Giovanni Lo Porto, an Italian aid worker killed in a U.S. drone strike in January of last year, according to newly released documents. The 37-year-old Lo Porto died when CIA drones struck an al Qaeda compound where he was being held hostage along with Warren Weinstein, an American humanitarian worker. In a rare admission of responsibility, President Barack Obama acknowledged the strike and promised compensation for the families. The Intercept first reported that the family had reached a settlement with the U.S. government in July. The document also states that the agreement does not imply “a waiver of sovereign or personal immunity.” Lawyers for the Lo Porto family had pressed the Italian state prosecutor to consider a criminal case against the United States, while acknowledging that the chances of such a case going forward were slim. They also asked for more information from U.S. agencies about the strike and its aftermath. The U.S. has, in a few instances, paid hundreds of thousands of dollars to the families of civilians killed in attacks in Yemen, but has not publicly acknowledged doing so. Many human rights advocacy groups see a double standard in the silence of the U.S. government on the cases of non-Westerners who have died.
Note: The families of thousands of innocent citizens killed by US drones in the Middle East have received zero compensation. Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Years before anyone had ever heard of [Edward] Snowden, [Bill] Binney, a gifted cryptologist and mathematician, was pushing back against the NSA’s spying overreach. In October 2001 ... he resigned rather than participate in a clandestine, massively overpriced and questionably legal electronic spying system code-named Trailblazer. Eventually, the government came after him. [Binney] was thrilled by [Oliver] Stone’s powerful biopic of Snowden, who astounded the world with his massive exposure of the NSA’s global spying programs. "I think it will help people understand what is really going on behind the scenes. They are invading the privacy of everyone," he says. "They can turn on your cellphone and listen to you. They can turn on your camera and watch you." In 2013 ... James Clapper, the director of national intelligence, [lied] under oath during a congressional hearing about the NSA’s spying programs. Snowden was watching. He had also seen what had happened to Binney and fellow NSA executives Thomas Drake, Ed Loomis and Kirk Wiebe, whose homes were raided by FBI agents after The New York Times exposed the NSA’s secret spying programs in 2005. Drake, prosecuted under the 1917 Espionage Act, was eventually acquitted ... but his career was ruined. [Snowden's] critics insist he should have pursued his complaints internally, despite the persuasive examples of Binney and his comrades that such resistance is futile, even risky.
Note: Watch a free trailer or rent the whole documentary on this webpage. Read a revealing, detailed New York Times article on Oliver Stone and his profound work to expose corruption and manipulation through film. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Oliver Stone has taken aim at the US government for deceiving people about the levels of surveillance that exist in the country. His new film Snowden, about the controversial NSA informant Edward Snowden, received its world premiere. The drama ... tells of the former CIA employee’s discovery that the agency had constructed a system to spy on the public. “Americans don’t know anything about it because the government lies about it all the time,” Stone said at a press conference. “What’s going on now is pretty shocking. This story not only deals with eavesdropping but mass eavesdropping, drones and cyberwarfare. As Snowden said himself the other day, ‘It’s out of control, the world is out of control.’” The film also features a cameo from Snowden himself, who still resides at an undisclosed location in Russia while he searches for asylum elsewhere. Stone hopes that he may return to US ground but is doubtful. “Obama could pardon him and we hope so,” he said. “But he has vigorously prosecuted eight whistleblowers under the espionage act, which is an all-time record for an American president, and he’s been one of the most efficient managers of this surveillance world. It is the most extensive and invasive surveillance state that has ever existed and he’s built it up.” The film-maker ... likens [the current situation] to a George Orwell novel. “I never thought this could happen,” he said. “But from 2001 on, it’s very clear that something radical has changed. There’s more to it that meets the eye and whatever they tell you, you’ve got to look beyond.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on questionable intelligence agency practices and the disappearance of privacy.
Bolivia’s president Evo Morales has opened a new “anti-imperialist” military academy to counter US policies and military influence in Latin America. “If the empire teaches domination of the world from its military schools, we will learn from this school to free ourselves from imperial oppression,” the country’s first indigenous president said. “We want to build anti-colonial and anti-capitalist thinking with this school that binds the armed forces to social movements and counteracts the influence of the School of the Americas that always saw the indigenous as internal enemies,” he told a crowd that included the defense ministers of Venezuela and Nicaragua. Some Latin American officers trained at the US-based School of the Americas went on to commit atrocities under 20th century military dictatorships. In 2000, the academy at Fort Benning, Georgia, was renamed the Western Hemisphere Institute for Security Cooperation. Morales, who expelled the US ambassador and counter-narcotics agents in 2008, accused Washington of encouraging “congressional coups” such as the impending impeachment trial of suspended President Dilma Rousseff in Brazil. He also said the US promotes global terrorism through military interventions, citing the rise of the Islamic State group as an example. The re-inaugurated school carries the name of General Juan Jose Torres, a leftist who was Bolivia’s de facto president in 1970 and who expelled the Peace Corps for allegedly sterilizing indigenous women.
Note: The Western Hemisphere Institute for Security Cooperation, formerly known as the School of the Americas, graduated more than 500 human rights abusers. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
As part of an ongoing effort to exploit medical intelligence, the National Security Agency teamed up with the military-focused Defense Intelligence Agency to extract medical SIGINT from the intercepted communications of nonprofit groups starting in the early 2000s, a top-secret document shows. Medical intelligence can include information about disease outbreaks; the ability of a foreign regime to respond to chemical, biological, and nuclear attacks; the capabilities of overseas drugs companies; advances in medical technology; medical research, and the medical response capabilities of various governments, according to the document and others like it, provided by NSA whistleblower Edward Snowden. One of the more prominent examples of focused medical spying came in 2010, when the agency crafted a plan to stow tracking devices with medical supplies bound for an ill Osama bin Laden in order to locate the terrorist leader. One article from August 2003 identifies an NSA project to keep an eye on the evolution of biotechnology in various countries. Can we ... determine the specific features that would distinguish a Bio Warfare Program from a benign civilian pharmaceutical production effort? the author wrote, identifying a suspect Iranian [biological warfare] facility as a target for inspection. Medical intelligence gathering has continued since then, according to the so-called black budget proposed for the 2013 fiscal year, published in February 2012.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and terrorism.
One of the most tortured men in the history of Guantánamo Bay has received clearance from the wartime prison’s quasi-parole board to leave after nearly 14 years of detention without charge. Mohamedou Ould Slahi, a Mauritanian citizen whose harrowing account of his torture at Guantánamo Bay became an international bestseller in 2015, will soon leave behind the Cuban detention center where US military personnel contorted his body; bombarded him with noise; deprived him of sleep; stuffed his clothing with ice during a nighttime boat ride meant to to convince him he was headed to an even worse place; threatened his life; and threatened his mother with rape. A nonlegal panel representing various US security agencies tasked with assessing threats posed by Guantánamo’s 76 residual detainees, found Slahi to represent no “continuing significant threat to the security of the United States”. The consensus decision, reached on 14 July, was made public on Wednesday. A federal judge in 2010 [had previously] ordered him freed for lack of evidence untainted by torture to justify his detention, yet the US justice department appealed. In the summer of 2003, senior Guantánamo officials, believing Slahi was an important link to al-Qaida, sought and received permission from the Pentagon to torture him. US defense secretary Donald Rumsfeld personally approved Slahi’s torture. In his book, Slahi recalled ... that he would tell his tormentors whatever they wished to hear. “I don’t care, as long as you are pleased,” Slahi informed his interrogators.
Note: By the time Slahi's bestselling book Guantanamo Diary was published, leaked documents obtained by BBC News had revealed that more than 150 innocent people were detained at Guantanamo after being rounded up for no reason. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists.
The push by congressional Democrats to bar suspected terrorists from acquiring guns and explosives has focused renewed attention on the government’s secretive terrorist watch lists, which have grown exponentially since the 9/11 attacks. Since the mass shooting in a gay nightclub in Orlando on June 12, Democrats have endorsed various measures to get weapons out of the hands of people on the lists. The Orlando shooter, Omar Mateen, had been on the FBI’s terrorist watch list but was removed in 2014. His was one of approximately 800,000 names in that database, the most prominent of at least seven overlapping watch lists. The government does not release the exact number of watch lists or the specific criteria for getting on them. The no-fly list ... contained 16 people on Sept. 11, 2001. By 2014, it had grown to about 64,000 people. Civil liberties advocates [say] the watch lists are riddled with inaccurate and outdated information, nearly impossible to get off and stigmatize the people on them. The largest watch list is The Terrorist Identities Datamart Environment (TIDE), maintained by the National Counterterrorism Center. As of August 2014, it contained about 1.1 million names. The FBI’s Terrorist Screening Center ... maintains what is known as the government’s "consolidated Terrorist Watchlist." It contains about 800,000 names. Last year, [a] federal judge ruled that the government’s lack of effective procedures for people to challenge their inclusion on the no-fly list was unconstitutional.
Note: A 2013 New York Times article further describes the rapid expansion of these mysterious lists, which are made according to secret rules. Some people have reportedly been added to watch lists by federal air marshals simply to meet quotas. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
June 6 will be the third anniversary of The Guardian’s publication of top-secret documents provided by [Edward] Snowden that showed that the National Security Agency was collecting the telephone records of tens of millions of Americans. Mr. Snowden [has been] denounced ... as a traitor. [Former Secretary of State Hillary] Clinton said in a Democratic presidential debate [that], “He could have gotten all of the protections of being a whistle-blower.” Thomas Drake would disagree. Mr. Drake was a senior N.S.A. official who had also complained, 12 years earlier, about warrantless surveillance. He went up the chain of command [to] the Defense Department’s Office of Inspector General. Things did not go well. F.B.I. agents raided his house. He was forced to resign and was indicted on 10 felony charges arising from an alleged “scheme” to improperly “retain and disclose classified information.” He ultimately pleaded guilty to a misdemeanor for “exceeding authorized use of a government computer” in exchange for the government’s dropping the other charges. He now works at an Apple store. Mr. Snowden followed the Drake case closely in the news media and drew the obvious conclusion: Going through [official] channels was worse than a dead end. [John] Crane, a former assistant inspector general in the Defense Department who oversaw the whistle-blower program, has now come forward alleging that Mr. Drake was persecuted by the very officials in his office who were supposed to protect him.
Note: John Crane was forced out of the Pentagon in 2013. His story is told in a new book, titled, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Edward Snowden has called for a complete overhaul of US whistleblower protections after a new source from deep inside the Pentagon came forward with a startling account of how the system became a “trap” for those seeking to expose wrongdoing. The account of John Crane ... appears to undermine Barack Obama, Hillary Clinton and [others] who argue that there were established routes for Snowden other than leaking to the media. Crane, a longtime assistant inspector general at the Pentagon, has accused his old office of retaliating against a major surveillance whistleblower, Thomas Drake. Not only did Pentagon officials provide Drake’s name to criminal investigators, Crane told the Guardian, they destroyed documents relevant to his defence. Thomas Drake’s legal ordeal ruined him financially. His case served as a prologue to Snowden’s. In 2002, Drake and NSA colleagues contacted the Pentagon inspector general to blow the whistle on [a] tool, Trailblazer, for mass-data analysis. Crane, head of the office’s whistleblower unit, assigned investigators. For over two years, with Drake as a major source, they ... prepared a lengthy secret report [that] eventually [helped] to kill the program. As far as Crane was concerned, the whistleblower system was working. But after an aspect of the NSA’s warrantless mass surveillance leaked to the New York Times, Drake himself came under investigation and eventually indictment [for] hoarding documentation – exactly what inspector-general investigators tell their whistleblowers to do.
Note: John Crane was forced out of the Pentagon in 2013. His story is told in a new book, titled, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Of the 19 hijackers who carried out the Sept. 11 attacks, 15 were citizens of Saudi Arabia. What does that fact signify? According to senior U.S. officials, little or nothing. From the outset, they treated the national identity of the terrorists as incidental, connoting nothing of importance. Imagine if 15 Iraqis had perpetrated the attacks... In its final report, the 9/11 Commission said it “found no evidence that the Saudi government as an institution or senior Saudi officials individually” had funded Al Qaeda. This artfully crafted passage was ... designed to preserve the existing U.S.-Saudi relationship from critical scrutiny. The effort never fully succeeded, skeptics suspecting that there might be more to the story. Today those doubts find expression in demands to declassify 28 pages of a congressional investigation said to detail Saudi relations with and support for the Al Qaeda terrorist network before September 2001. Whether the 28 pages sustain or refute suspicions of Saudi involvement in the Sept. 11 attacks will remain impossible to say absent ... executive action. Yet implicit in this dispute is an issue of even greater moment: Who ultimately exercises jurisdiction over truth? The foreign policy establishment insists that the 28 pages remain secret; not only might the document challenge the state's preferred Sept. 11 narrative, but the demands for its declassification also call into question the establishment's very authority to control that narrative.
Note: Read more on the Saudi role in Sept. 11 and the hidden 9/11 report pages. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
House Minority Leader Nancy Pelosi on Sunday said she wants 28 redacted pages declassified from a 2003 congressional report on the intelligence community's preparedness for and response to the 9/11 attacks. "As the former Ranking Democrat on the House Intelligence Committee and top the House Democrat on the Joint Congressional investigation looking into the 9/11 attacks, I agree with former Senator Bob Graham that these documents should be declassified and made public, and that the Bush Administration's refusal to do so was a mistake," Pelosi said in a statement. Her statement came the same day that "60 Minutes" aired a story featuring Graham and other current and former government officials who want the report's top secret pages declassified. Graham, who declined to detail the redacted section, helped author the report and he now says the redacted portion could highlight possible Saudi support for the 9/11 hijackers. He also suggested that it sheds light on a network of people he believes supported the hijackers in the US. There is ... tension between the the Saudis and the U.S. over doubts about the Saudi commitment to combating violent Islamist extremism.
Note: Read more on the Saudi role in Sept. 11 and the hidden 9/11 report pages. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
The CIA took naked photographs of people it sent to its foreign partners for torture. A former US official who had seen some of the photographs described them as “very gruesome”. In some of the photos, which remain classified, CIA captives are blindfolded, bound and show visible bruises. Some photographs also show people believed to be CIA officials or contractors alongside the naked detainees. It is not publicly known how many people ... were caught in the CIA’s web of so-called “extraordinary renditions”, extra-judicial transfers of detainees to foreign countries, many of which practised even more brutal forms of torture than the US came to adopt. Human rights groups over the years have identified at least 50 people the CIA rendered, going back to Bill Clinton’s presidency. “Is the naked photography a form of sexual assault? Yes. It’s a form of sexual humiliation,” said Dr Vincent Iacopino, the medical director of Physicians for Human Rights. “It’s cruel, inhumane and degrading treatment at a minimum and may constitute torture,” he said. International human rights law, to include the Geneva conventions, forbids photographing prisoners except in extremely limited circumstances related to their detention, to include anything that might compromise their dignity. The CIA is known to have employed nudity in other aspects of its custody of terrorism suspects. Often the nudity occurred in tandem with other torture techniques, such as shackling and frigid conditions, leading in at least one case to a detainee’s death.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Newly published classified documents show the National Security Agency spied on a 2010 conversation between Italian Prime Minister Silvio Berlusconi and Israeli Prime Minister Benjamin Netanyahu as the two discussed ways to improve Israel’s relationship with the United States. The Italian-Israeli conversation is included in one of five NSA documents released Tuesday by WikiLeaks. Two of the documents focus on climate change, one relates to trade talks, and two report on Italian government communications. The intelligence reports date from 2007 through 2011, [and] provide additional details on U.S. efforts to spy on countries taking part in the 2009 Copenhagen Climate Change Conference, which failed to reach an agreement. One ... contains details of a confidential discussion about climate change negotiations between U.N. Secretary General Ban Ki-moon and the German Chancellor Angela Merkel in the lead-up to the conference. The NSA report is stamped “U.N. diplomatic,” “German leadership,” and Top Secret Gamma, the “Gamma” indicating an extremely sensitive spying operation. The interception methods stated on the latest leaked intelligence reports are “Unconventional” and “SCS,” which stands for Special Collection Service. SCS involves joint NSA and CIA eavesdropping operations run covertly inside U.S. and allied foreign embassy buildings in foreign capitals.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Before Julian Assange, the WikiLeaks founder, and Edward Snowden, the intelligence whistleblower, there was Katharine Gun. The former GCHQ employee ... was a young Mandarin specialist at the British government’s eavesdropping agency in Cheltenham. In early 2003 she received an email asking her and her colleagues to help the US government spy on UN security council delegations in New York. It was a critical moment, as Washington was seeking UN backing for its invasion of Iraq. Gun decided the world had to know, whatever the cost to her life and career. She leaked the memo to the Observer and was arrested, lost her job and faced trial under the Official Secrets Act. Thirteen years later, as bloodshed continues in Iraq, the almost forgotten story is to be brought to a new audience in Official Secrets, a movie [that] will chart Gun’s unlikely bid – courageous self-sacrifice to supporters, treachery in the view of critics – to block George W Bush and Tony Blair’s march to war. Unlike many whistleblowers who leak thousands of documents after the event, Gun was intervening in an active operation and trying to stop a war. The US National Security Agency memo told employees of GCHQ to gather “the whole gamut of information that could give American policymakers an edge in obtaining results favourable to US goals or to head off surprises”. “I saw the email and my gut reaction was pretty instantaneous, that it was highly explosive information and that it should be out in the public domain,” she recalled.
Note: The US has spent several trillion dollars pursuing a policy of endless war since 9/11. Great Britain did not believe Iraq to be a global security threat, but backed the US-led invasion on this false pretense for political reasons. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
The CIA has released hundreds of declassified documents detailing investigations into possible alien life. The Central Intelligence Agency posted documents of reported Unidentified Flying Objects that range in date from the late 1940s to the 1950s. While playing off the hype of the TV show reboot "The X-Files," the CIA broke down the cases into two categories, whether you side with Agent Mulder or Agent Scully. For believers in alien life ... one case you can choose to investigate is the case of a flying saucer in Germany in 1952. An eyewitness told investigators that an object "resembling a huge flying pan" landed in a forest clearing in the Soviet zone of Germany in 1952. The eyewitness said once he was closer to the area where it landed, he saw two men dressed in shiny metallic clothing. Spooked by the eyewitness ... the mysterious men jumped into the large flying pan object and it spun out into the sky. "The whole object then began to rise slowly from the ground and rotate like a top," the eyewitness told the CIA. The man told a judge he thought he was dreaming but said there was a circular imprint on the ground where the object had landed. If that case intrigues you, there are four more listed on the CIA blog post. But if you are more of a skeptic like Scully, and believe there is a simple explanation for flying saucer sightings, then the documents from the scientific advisory panel on UFOs in 1953 will help you prove your case.
Note: Explore these intriguing 'X-Files' on the CIA website at this link. For more along these lines, see concise summaries of deeply revealing UFO cover-up and disclosure news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our UFO Information Center.
U.S. intelligence agencies recently fought off a move by Congress to require the CIA and other spy services to disclose more details about high-ranking employees who have been promoted or fired. Under a provision drafted by the Senate Intelligence Committee this year, intelligence agencies would have been required to regularly provide names of those being promoted to top positions and disclose any “significant and credible information to suggest that the individual is unfit or unqualified.” But that language faced intense opposition from Director of National Intelligence James R. Clapper Jr.. As a result, the wording was watered down by Congress this month and now requires Clapper only to furnish “information the Director determines appropriate.” U.S. spy chiefs chafed at the idea of subjecting their top officials to such congressional scrutiny and went so far as to warn that candidates for certain jobs would probably withdraw. Former CIA director Michael Hayden said he [opposed the provision] “for simply being too invasive.”
Note: As a vocal advocate of intrusive spying, former CIA director Michael Hayden's claim that congressional oversight of spy agency personnel could be "too invasive" is ironic. The unaccountable US intelligence agencies were recently called a "secret government" in the Boston Globe. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
On a snowy afternoon in February 2004, an FBI agent came to Nick Merrill’s door, bearing a letter that would change his life. At the time, Merrill was running a small internet service provider. The envelope that the agent carried contained what is known as a “national security letter”, or NSL. It demanded details on one of his company’s clients; including cellphone tower location data, email details and screen-names. It also imposed a non-disclosure agreement which was only lifted this week, when – after an 11-year legal battle by Merrill and the American Civil Liberties Union, he was finally allowed to reveal the contents of the letter to the world. The NSL which Merrill was given was a new use for what was a relatively old tool. The FBI had long – if sparingly – used them, [but] the Patriot Act vastly expanded the scope of what an NSL could be applied to. The FBI greatly increased the number issued; according to a 2007 inspector general’s report, the NSL that Merrill was handed by the agent was one of nearly 57,000 issued that year. All of those thousands of NSLs were accompanied by a non-disclosure agreement, or “gag order” – which barred recipients were ever disclosing that they had received an NSL – even to the person whose records were being sought. With the ACLU, Merrill went to court to challenge the constitutionality of the letter, especially of the gag order. In 2014, Merrill sued again, helped by ... the Yale Law Clinic. Finally, [a] judge ... ruled that the gag order be completely lifted. It had taken Merrill almost 12 years.
Note: A 2007 Washington Post article summary sheds more light on Merrill's long struggle.
The Federal Bureau of Investigation has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individual’s complete web browsing history and records of all online purchases, a court filing released Monday shows. The documents are believed to be the first time the government has provided details of its so-called national security letters, which are used by the FBI to conduct electronic surveillance without the need for court approval. National security letters have been available as a law enforcement tool since the 1970s, but their frequency and breadth expanded dramatically under the USA Patriot Act, which was passed shortly after the Sept. 11, 2001 attacks. They are almost always accompanied by an open-ended gag order barring companies from disclosing the contents of the demand for customer data. The secretive orders have long drawn the ire of tech companies and privacy advocates, who argue NSLs allow the government to snoop on user content without appropriate judicial oversight. Last year, the Obama administration announced it would permit Internet companies to disclose more about the number of NSLs they receive. But they can still only provide a range such as between 0 and 999 requests. Twitter has sued in federal court seeking the ability to publish more details in its semi-annual transparency reports. Several thousand NSLs are now issued by the FBI every year. At one point that number eclipsed 50,000 letters annually.
Note: Read more about the FBI's use of these controversial secret letters. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
David Talbot despises Allen Dulles. As director of the CIA, Talbot declares, Dulles exemplified the “frightening amorality that prevailed at the pinnacle of American power” at the height of the Cold War. As a lawyer for Sullivan and Cromwell in the 1930s, Dulles protected and promoted Nazi-controlled cartels. He used his influence in the Office of Strategic Services and the CIA to shield former Nazis from prosecution for war crimes in the ’40s and ’50s. Dulles organized the disastrous Bay of Pigs invasion of Cuba, [and was] willing to manipulate and undercut American presidents. In “The Devil’s Chessboard,” David Talbot, the founder and former editor in chief of Salon and former senior editor at Mother Jones, examines Dulles’ career and adds several more “achievements” to his dark resume. Talbot’s indictment is long. He suggests that had President Franklin D. Roosevelt lived, Dulles might well have faced criminal charges for hiding the U.S. assets of German corporations and destroying incriminating evidence. By 1963, Talbot insists, a clear consensus had emerged among corporate leaders “and within America’s deep state” that Kennedy was a threat to national security and had to be removed. Dulles, they concluded, “was the only man with the stature, connections, and decisive will to make something of this enormity happen." [Dulles] then lobbied Lyndon Johnson to appoint him to the Warren Commission, where he saw to it that Lee Harvey Oswald would take the fall as the “lone gunman.”
Note: Read another good article on Talbot's book revealing evidence in the JFK killing. And isn't it interesting that no other major media seemed to find this book worth a review, even though Talbot is well known as the founder of the website Salon.
General Augusto Pinochet directly ordered the 1976 assassination of a Chilean diplomat who was killed in a car bomb in Washington DC, according top secret US intelligence documents declassified by the Obama administration. The documents ... also show that the former dictator was so concerned with covering up his role in the murder that he planned to assassinate his own head of intelligence, General Manuel Contreras. Orlando Letelier, a former defence and foreign minister under President Salvador Allende, was tortured and incarcerated after Pinochet’s 1973 coup. He later fled to the US and worked at the Institute of Policy Studies in Washington DC. Letelier, who had once been Chile’s ambassador to the US, was murdered on 21 September 1976 by a car bomb planted under the driver’s seat of his vehicle just a mile from the White House. Ronni Moffitt, an American colleague, was also killed in the blast. Letelier’s son, Senator Juan Pablo Letelier, confirmed to the Guardian that he had received copies of the newly released documents, which ... include papers from the CIA. Speculation that the CIA was aware of the plot to kill Letelier is based on previously declassified records showing that Manuel Contreras was paid by the CIA before the bombing and was in regular contact with top officials at the spy agency. Contreras, who died in August, always denied responsibility and blamed the CIA for the bombing.
Note: Members of Pinochet's brutal regime were strongly supported by Washington until very recently. George H.W. Bush was head of the CIA when the assassination described above was carried out. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption.
Five years ago this week, FBI agents raided the homes of six political activists of the Freedom Road Socialist Organization (FRSO) in Minnesota, Illinois and Wisconsin, as well as the office of the nonprofit Anti-War Committee. A series of FBI documents left behind at Mick Kelly’s Minneapolis home shed more light on the FBI’s activities. What is especially illuminating is the mindset the documents reveal, particularly some of the questions FBI agents were instructed to ask those being served with the search warrants, such as “What did you do with the proceeds from the Revolutionary Lemonade Stand?” In February 2014, as a result of further legal action ... the search warrants for the raids [were] unsealed. The FBI began surveilling the FRSO shortly after the protests at the 2008 GOP convention, using a confidential informant. Despite the FBI’s collection of over a hundred hours of recordings and its multiyear [investigation], to date none of the activists have been charged with any crime. Just four days prior to the FBI raids against the Anti-War Committee and the FRSO, the Department of Justice Inspector General [IG] released the results of an investigation into post-9/11 surveillance of peace groups and other domestic dissidents up through 2006, [which] found that the bureau “engaged in tactics and strategies toward those groups and their members that were inappropriate, misleading and in some cases counterproductive, [and] accused FBI witnesses of ... offering ‘incomplete and inconsistent accounts of events.’”
Note: By 2011, the legal definition of "supporter of terrorism" had come to include peaceful activists, authors, academics and journalists. For more along these lines, read about Cointelpro, the program used by corrupt intelligence agencies to spy on and attack U.S. activists beginning in the 1960's.
It was the spring of 2002. Pakistani authorities burst into the house [Emad Hassan] shared with 14 other foreign students and brought them to a nearby prison. After two months of beatings and interrogation, the Pakistanis handed him over to the U.S. military. They stripped him of his clothes and put him in a diaper. Then they blindfolded him, placed earmuffs over his head and marched him onto a plane. When the aircraft landed, he soon learned he was in the U.S. prison at Guantánamo Bay, Cuba. For years, the White House has been trying to close Gitmo. As of early September, 52 of the 116 prisoners who remain at the U.S. facility have been cleared to be set free, a tacit admission, critics say, that they should never have been imprisoned. The Pakistani forces who took Hassan from his student housing, his lawyers say, received $5,000 from the U.S. military. This was typical. According to a 2006 analysis ... the vast majority of detainees at Guantánamo Bay were arrested by local groups eager to profit from the counterterrorism gold rush. His lawyers claim much of the U.S. government’s incriminating information comes from a small group of informants at Guantánamo who told interrogators what they wanted to hear. Many sold out their fellow detainees for small rewards. [In 2009] Obama’s task force cleared Hassan for release - a process that requires six federal agencies to agree that a prisoner doesn’t pose a national security threat.
Note: In 2015, Hassan was freed from Gitmo and granted asylum by Oman. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
Hamid Karzai, the former president of Afghanistan, has questioned the existence of al-Qaida, and denied that the 9/11 terror attacks ... were planned in Afghanistan. On the eve of the anniversary of the 2001 attacks, Karzai, who left office last year after 12 years, used an interview with al Jazeera to express his doubt that the terrorist group led by the late Osama bin Laden was responsible for the operation which prompted the invasion of Afghanistan. Karzai ... also claimed in the interview that Islamic State fighters in Afghanistan are “definitely” members of “Pakistani militias”. When asked if he agreed that al-Qaida in Afghanistan had been behind the 9/11 attacks ... Karzai replied: “I can tell you for a fact that the operation was neither conducted from Afghanistan, nor were the Afghan people responsible for that.” A daring and bloody operation involving US special forces and the CIA put Karzai back in Afghanistan in the last weeks of the 2001 war and then into power as a supposed consensus candidate. But Karzai quickly proved himself independent and contrarian. Officials from the US, the UK, Nato and the UN all repeatedly criticised Karzai for failing to crack down on rampant corruption and the booming narcotics trade in Afghanistan. By 2009, according to Robert Gates, the former US defence secretary, Washington was so keen to oust the Afghan president that officials connived in delaying an Afghan presidential election and then tried to manipulate the outcome in a “clumsy and failed putsch”.
Note: By 2000, the Taliban had mostly stopped heroin production in Afghanistan. But once former Unocal employee Hamid Karzai was installed into power by the US, bags of CIA cash helped transform Afghanistan into a narco state.
A new book, The WikiLeaks Files: The World According to U.S. Empire ... explains how the leaked U.S. documents have lifted the veil on the imperialist nature of American foreign policy. At the time of writing, WikiLeaks has published 2,325,961 diplomatic cables and other US State Department records. To randomly pick up isolated diplomatic records that intersect with known entities and disputes, as some daily newspapers have done, is to miss “the empire” for its cables. Diplomatic cables are not produced in order to manipulate the public, but are aimed at elements of the rest of the US state apparatus and are therefore relatively free from the distorting influence of public relations. When WikiLeaks publishes US government documents with classification markings ... two parallel campaigns begin: first, the public campaign of downplaying, diverting attention from and reframing any revelations that are a threat to the prestige of the national security class; and, second, an internal campaign within the national security state itself to digest what has happened. Publicly, the US government has claimed, falsely, that anyone without a security clearance distributing “classified” documents is violating the Espionage Act of 1917. The response of the United States to the release of the WikiLeaks materials betrays a belief that its power resides in a disparity of information: ever more knowledge for the empire, ever less for its subjects.
Note: Wikileaks has published everything from suspicious messages about 9/11 to cables showing US diplomats working directly for companies such as Monsanto to drafts of secret trade deals that big banks use to grow their power. PFC Manning is currently serving a 35 year prison sentence for leaking the data analysed in the book mentioned above.
The Obama administration has ruled that inspectors general have to get permission from the agency they’re monitoring for access to wiretaps, grand jury and credit information, a decision that immediately was denounced by watchdogs and lawmakers. The Justice Department’s inspector general said the 58-page ruling ... will undermine his ability to do his job rooting out fraud and corruption. “Without such access, our office’s ability to conduct its work will be significantly impaired,” Inspector General Michael E. Horowitz said in a statement. His disapproval was followed by a bipartisan condemnation from four congressional leaders whose committees have oversight over DOJ. [In] 2010 ... the FBI started restricting the DOJ inspector general’s access to documents whose confidentiality is protected by law, including grand jury testimony and wiretaps. The IG’s review of the controversial Fast and Furious case, the failed sting operation that lost track of more than 1,000 government-issued guns, one of which was used to kill a U.S. Border Patrol agent, was delayed. Other investigations have lagged, Horowitz testified before Congress last February, complaining that the FBI has failed to turn over key records in several whistleblower cases. “Imagine if we had a DOJ (inspector general) during Watergate looking at the FBI’s conduct and the Attorney General had this opinion to deny or delay access to this kind of information,” said Brian Miller, the former inspector general at the General Services Administration.
Note: Last year, President Obama invoked executive privilege in an attempt to cover up the Fast and Furious scandal. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The Department of Homeland Security has been monitoring the Black Lives Matter movement since anti-police protests erupted in Ferguson, Missouri last summer, according to hundreds of documents obtained by The Intercept through a Freedom of Information Act request. The reports confirm social media surveillance of the protest movement and ostensibly related events in the cities of Ferguson, Baltimore, Washington, DC, and New York. The tracking of domestic protest groups and peaceful gatherings raises questions over whether DHS ... has allowed its mission to creep beyond the bounds of useful security activities as its annual budget has grown beyond $60 billion. In an email to The Intercept, DHS spokesman S.Y. Lee wrote: “The DHS National Operations Center statutory authority ... is limited to providing situational awareness." Baher Azmy, a legal director at the Center for Constitutional Rights, however, argues that, “What they call situational awareness is Orwellian speak for watching and intimidation. Some of the documents show that the DHS has produced minute-by-minute reports on protesters’ movements in demonstrations. Surveillance of [an] April 29th protest, which the bulletin explicitly refers to as a “First Amendment-protected event,” raises questions about the potentially compromised state of protesters’ civil liberties — a worry that also surfaced after it was revealed in 2012 that the DHS was monitoring Occupy Wall Street.
Note: For more along these lines, read about Cointelpro, the program used by corrupt intelligence agencies to spy on and attack the U.S. civil rights movement beginning in the 1960's. For more, see concise summaries of deeply revealing news articles about the erosion of civil liberties.
The torture scandal consuming the US’s premiere professional association of psychologists has cost three senior officials their jobs. As the American Psychological Association copes with the damage reaped by an independent investigation that found it complicit in US torture, the group announced on Tuesday that its chief executive officer, its deputy CEO and its communications chief are no longer with the APA. All three were implicated in the 542-page report issued this month by former federal prosecutor David Hoffman, who concluded that APA leaders “colluded” with the US department of defense and aided the CIA in loosening professional ethics and other guidelines to permit psychologist participation in torture.. Despite rumors ... the APA framed the departures of longtime executive officials Norman Anderson and Michael Honaker as “retirements”. Rhea Farberman, who served as APA’s communications director for 22 years, “resigned”, the APA said in a statement. Anderson, Honaker and Farberman join Stephen Behnke, the APA’s former ethics chief also implicated in torture, in the first wave of APA departures as the organization seeks to rebuild its credibility. A call to end all psychologist participation in US interrogation and detention operations is slated for APA consideration at a major conference next month.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
The Oscar-winning documentary film-maker Laura Poitras is suing the US government. Poitras, 51, said she had been held at borders more than 50 times between 2006 and 2012, often for hours at a time. At various times she alleges being told by officials that she was on a “no fly” list, having her electronic equipment confiscated ... and being threatened with handcuffs for taking notes. The latter incident took place when she was working on a film about the WikiLeaks founder Julian Assange. Poitras [is] launching the legal action "because the government uses the US border to bypass the rule of law,” said the film-maker. She was repeatedly stopped until 2012, when the journalist Glenn Greenwald wrote an article about her experiences. Poitras’s reporting on the NSA whistleblower Edward Snowden, along with work by Greenwald, Ewen MacAskill and Barton Gellman contributed to the Pulitzer prize for public service won jointly by the Washington Post and the Guardian in 2014. Her film on Snowden, Citizenfour, won the 2015 Oscar for best documentary. The director is being represented by lawyers from digital-rights advocacy group the Electronic Frontier Foundation. “The well-documented difficulties Ms Poitras experienced while traveling strongly suggest that she was improperly targeted by federal agencies as a result of her journalistic activities,” senior counsel David Sobel told the Intercept. “Those agencies are now attempting to conceal information that would shed light on tactics that appear to have been illegal.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and attempts to manipulate mass media.
The Central Intelligence Agency’s health professionals repeatedly criticized the agency’s post-Sept. 11 interrogation program, but their protests were rebuffed by prominent outside psychologists who lent credibility to the program, according to a new report. The 542-page report ... raises repeated questions about the collaboration between psychologists and officials at both the C.I.A. and the Pentagon, [and] concludes that some of the [American Psychological] Association’s top officials ... sought to curry favor with Pentagon officials by seeking to keep the association’s ethics policies in line with the Defense Department’s interrogation policies. The association’s ethics office “prioritized the protection of psychologists — even those who might have engaged in unethical behavior — above the protection of the public,” the report said. Two former presidents of the psychological association were on a C.I.A. advisory committee, the report found. One of them gave the agency an opinion that sleep deprivation did not constitute torture, and later held a small ownership stake in a consulting company founded by two men who oversaw the agency’s interrogation program. The association’s ethics director, Stephen Behnke, coordinated the group’s public policy statements on interrogations with a top military psychologist, the report said, and then received a Pentagon contract to help train interrogators while he was working at the association, without the knowledge of the association’s board.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger. With security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds, encryption has emerged as a major issue in the debate over privacy rights. Technology companies ... have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data. The [technology group's] new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers. In the report, the group said any effort to give the government “exceptional access” to encrypted communications ... would leave confidential data and critical infrastructure like banks and the power grid at risk. With government agency breaches now the norm, the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corrupt intelligence agencies that erode privacy rights in the U.S. and elsewhere
Three days after the New York Times revealed that the U.S. government was secretly monitoring the calls and emails of people inside the United States without court-approved warrants, the National Security Agency issued a top-secret assessment of the damage done to intelligence efforts by the story. The conclusion: the information could lead terrorists to try to evade detection. Yet the agency gave no specific examples of investigations that had been jeopardized. The December 2005 bombshell story, by James Risen and Eric Lichtblau, set off a debate about the George W. Bush administration's expansion of spying powers after the 9/11 attacks, and also about the Times editors' decision to delay its publication for a year. White House officials had warned the Times that revealing the program would have grave consequences for national security. "To this day we've never seen any evidence – despite all the claims they made to keep us from publishing – that it did any tangible damage to national security, " Lichtblau told The Intercept. "The reality was that the story ... didn't tell terrorists anything that they didn't know," he said. The NSA's damage assessment on the article ... is among the files provided by former NSA contractor Edward Snowden. The memo recounts meetings in 2004 and 2005 in which administration officials disclosed "certain details of the special program to select individuals from the New York Times to dissuade them from publishing a story on the program at that time."
Note: You can read the revealing memo mentioned at the link above. For more along these lines, see concise summaries of deeply revealing news articles on civil liberties from reliable major media sources. Then explore the excellent, reliable resources provided in our Media Information Center.
Last week in the Boston area, a 26-year-old black Muslim man was shot and killed by agents of the FBI and Boston Police Department. A surveillance video ... was finally released on Monday. It’s virtually impossible to know what happened from this highly touted video, other than the fact that [Usaamah] Rahim appears to have been walking peacefully when he was approached by multiple individuals, wearing no police uniforms, in a threatening, military-style formation. Rahim’s family issued a statement detailing the numerous questions raised by the video. Early reports claimed that there was a third conspirator beyond Rahim and [his nephew and accused co-conspirator David] Wright. The FBI affidavit filed against Wright repeatedly references a “third person” who plotted with Rahim and Wright and met with them. Yet there has been no further mention of this “third person,” and apparently no arrest of him. Why not? Is that third person an FBI informant? Is this yet another case where the director and prime mover of a scary “terror plot” is in fact the FBI itself. What basis exists for the highly inflammatory claim that Rahim was “linked to” or “inspired by” ISIS? He was not only wary of being set up by the FBI, but specifically said he was “preaching AGAINST violence and terrorism.” As AP noted, on social media Rahim “spoke out against the kind of violence Islamic State extremists are fomenting across the Middle East,” and “made none of the violent calls to arms many supporters of armed extremist groups espouse on social media.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about the erosion of civil liberties and the manipulation of public perception.
The US Central Intelligence Agency used a wider array of sexual abuse and other forms of torture than was disclosed in a Senate report last year, according to a Guantánamo Bay detainee turned government cooperating witness. Majid Khan said interrogators poured ice water on his genitals, twice videotaped him naked and repeatedly touched his “private parts” – none of which was described in the Senate report. Khan’s is the first publicly released account from a high-value al-Qaida detainee who experienced [these] “enhanced interrogation techniques”. The 35-year-old Khan ... is awaiting sentencing after [confessing] to delivering $50,000 to al-Qaida operatives in Indonesia. Khan was captured in Pakistan and held at an unidentified CIA “black site” from 2003 to 2006, according to the Senate report. In the interviews with his lawyers, Khan described a carnival-like atmosphere of abuse when he arrived at the CIA detention facility. He said that he experienced excruciating pain when hung naked from poles and that guards repeatedly held his head under ice water. In a July 2003 session, Khan said, CIA guards hooded and hung him from a metal pole for several days and repeatedly poured ice water on his mouth, nose and genitals. When a doctor arrived to check his condition, Khan begged for help. Instead, Khan said, the doctor instructed the guards to again hang him from the metal bar. After hanging from the pole for 24 hours, Khan was forced to write a “confession” while being videotaped naked.
Note: For more, read about the 10 Craziest Things in the Senate Report on Torture and many other questionable intelligence agency practices.
The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals. The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia. The top-secret document, obtained from NSA whistleblower Edward Snowden ... outlines a series of tactics that the NSA and its counterparts in the Five Eyes were [using, which included] a method to hack and hijack phone users’ connections to app stores so that they would be able to send malicious “implants” to targeted devices. The implants could then be used to collect data from the phones without their users noticing. The agencies ... were also keen to find ways to hijack [app stores] as a way of sending “selective misinformation to the targets’ handsets” as part of so-called “effects” operations that are used to spread propaganda or confuse adversaries. Moreover, the agencies wanted to gain access to companies’ app store servers so they could secretly use them for “harvesting” information about phone users. The revelations are the latest to highlight tactics adopted by the Five Eyes agencies. Last year, The Intercept reported that the NSA ... was shown to have masqueraded as a Facebook server in order to hack into computers.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
The FBI breached its own internal rules when it spied on campaigners against the Keystone XL pipeline, failing to get approval before it cultivated informants and opened files on individuals protesting against the construction of the pipeline in Texas. Internal agency documents show for the first time how FBI agents have been closely monitoring anti-Keystone activists, in violation of guidelines designed to prevent the agency from becoming unduly involved in sensitive political issues. The hugely contentious Keystone XL pipeline, which is awaiting approval from the Obama administration, would transport tar sands oil from Canada to the Texas Gulf coast. It has been strongly opposed for years by a coalition of environmental groups ... who have been monitored by federal law enforcement agencies. Mike German, a former FBI agent ... said [the documents] indicated the agency had opened a category of investigation that is known in agency parlance as an “assessment”. Introduced as part of an expansion of FBI powers after 9/11, assessments allow agents to open intrusive investigations into individuals or groups, even if they have no reason to believe they are breaking the law. German ... said the documents also raised questions over collusion between law enforcement and TransCanada. “These documents suggest the FBI interprets its national security mandate as protecting private industry from political criticism,” he said.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the erosion of civil liberties from reliable major media sources.
Four years after the death of Al Qaeda leader Osama bin Laden at the hands of US Navy Seals in Abottabad, Pakistan, a new report ... by journalist Seymour Hersh questions the Obama administration’s account of the killing of Osama bin Laden. The report claims that, among the lies, the biggest was the idea that the raid in May 2011 that killed bin Laden was an all-American event. "The most blatant lie was that Pakistan’s two most senior military leaders – General Ashfaq Parvez Kayani, chief of the army staff, and General Ahmed Shuja Pasha, director general of the ISI – were never informed of the US mission," the report says. The report also says that Pakistan’s Inter-Services Intelligence agency had been holding bin Laden as a prisoner since 2006, and that the US learned about the Al Qaeda leader’s location through a former senior Pakistani intelligence officer, who gave the information in return for the reward being offered by American officials. The White House has said bin Laden was found through tracking his couriers. Hersh’s primary US source for his story is "a retired senior intelligence official who was knowledgeable about the initial intelligence about bin Laden’s presence in Abbottabad." White House spokesman Josh Earnest ... dismissed the Hersh piece, saying it was "riddled with inaccuracies." Hersh, a longtime contributor to The New Yorker, is an award-winning journalist who has won numerous prizes for his investigative reporting, including the Pulitzer Prize.
Note: There are many big problems with the official story of the killing of bin Laden. For starters, read the review on the London Review of Books website. For more, see this ABC News article, this BBC article and this AP article.
The targets of the deadly drone strikes that killed two hostages and two suspected American members of al-Qaida were “al-Qaida compounds” rather than specific terrorist suspects, the White House disclosed on Thursday. The lack of specificity suggests that despite a much-publicized 2013 policy change by Barack Obama restricting drone killings by, among other things, requiring “near certainty that the terrorist target is present”, the US continues to launch lethal operations without the necessity of knowing who specifically it seeks to kill. Josh Earnest, the White House spokesman, acknowledged that the January deaths of hostages Warren Weinstein and Giovanni Lo Porto might prompt the tightening of targeting standards. Earnest [confirmed that] the two US civilians killed, longtime English-language propagandist Adam Gadahn and Ahmed Farouq of al-Qaida in the Indian subcontinent, were not “high-value targets” marked for death. In a May 2013 speech, Obama indicated that drone strikes were only permissible when the administration possessed “near certainty that no civilians will be killed or injured, the highest standard we can set”. Human-rights observers see little indication, two years after Obama’s speech, that the US meets its own stated standards. Reprieve, looking at US drone strikes in Yemen and Pakistan, concluded last year that the US killed nearly 1,150 people while targeting 41 individuals.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
It’s been over two years since President Obama promised new transparency and accountability rules when it comes to drone strikes. Virtually no progress has been made. The criteria for who gets added to the unaccountable ‘kill list’ is still shrouded in secrecy – even when the US government is targeting its own citizens. We know because a Texas-born man named Mohanad Mahmoud Al Farekh recently captured overseas was arraigned in federal court this week. It turns out, as the Times reported, that in 2013 “his government debated whether he should be killed by a drone strike in Pakistan.” The CIA and military were reportedly pushing hard to send drones to kill Al Farekh, but the Justice Department didn’t think there was enough evidence. An important new report released by the Open Society Justice Initiative this week also shows that - despite the Obama administration’s internal requirements for drone strikes that supposedly require a “near certainty” that civilians won’t get killed - the government quite often just disregards its own rules, which has led to the death of dozens of civilians in Yemen in the past two years. Though without Open Society’s study, the public would have no clue, since the Obama administration still steadfastly refuses to officially release any information on drone strikes in Yemen. The administration has said for years it prefers capturing to killing – but the data indicates that they practice the opposite.
Note: The CIA has been aware that drone strikes are ineffective since at least 2009. If drones help terrorists, almost always miss their intended targets, and may be used to target people in the US in the future, what are the real reasons for the US government's drone program?
Human rights campaigners have prepared a federal lawsuit aiming to permanently shut down the bulk collection of billions of US phone records – not, this time, by the National Security Agency, but by the Drug Enforcement Agency. The program ... served as a template for the NSA’s gigantic and ongoing bulk surveillance of US phone data after 9/11. The revelation of mass phone-records collection in the so-called “war on drugs” raises new questions about whether the Obama administration or its successors believe US security agencies continue to have legal leeway for warrantless bulk surveillance on American citizens. Starting in 1992, the so-called “USTO” effort operated without judicial approval, despite the US constitution’s warrant requirement. Attorney general Eric Holder ended USTO in September 2013 out of fear of scandal following Snowden’s disclosures. While Snowden did not expose USTO, several NSA programs he has exposed referenced the DEA as an NSA partner, giving the DEA another secret pathway to massive amounts of US communications records. The warrantless bulk records collection provides prosecutors the ability to enter into evidence incriminating material that could otherwise be thrown out of court, [and] has not stopped the upward growth of domestic narcotics consumption.
Note: In order to deny due process to people accused of crimes, the DEA's Special Operations Division constructs lies about the origins of data obtained from warrantless mass surveillance. Award-winning journalists have presented powerful evidence of direct DEA and CIA involvement in and support of drug running and drug cartels. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
In a war full of failures, the US counternarcotics mission in Afghanistan stands out: opiate production has climbed steadily over recent years to reach record-high levels last year. One clear winner in the anti-drug effort is ... the infamous mercenary company formerly known as Blackwater. Statistics released on Tuesday reveal that the rebranded private security firm, known since 2011 as Academi, reaped over a quarter billion dollars from the futile Defense Department push to eradicate Afghan narcotics, some 21% of the $1.5 bn in contracting money the Pentagon has devoted to the job since 2002. The company is the second biggest beneficiary of counternarcotics largesse in Afghanistan. Only the defense giant Northrop Grumman edged it out, with $325m. According to the US inspector general for Afghanistan reconstruction, the $309m Academi got from US taxpayers paid for training, equipment, and logistical support to Afghan forces conducting counternarcotics. Far from eradicating the deep-rooted opiate trade, US counternarcotics efforts have ... contributed to the opium boom. In December, the United Nations reported a 60% growth in Afghan land used for opium poppy cultivation since 2011, up to 209,000 hectares. The estimated $3bn value of Afghan heroin and morphine represents some 15% of Afghan GDP. Academi and its former Blackwater incarnation have an infamous history in Afghanistan. It once set up shell companies to disguise its business practices, according to a Senate report, so that its contracts would be unimpeded by company employees killings of Iraqi and Afghan civilians.
Note: Blackwater, now called Academi, got caught systematically defrauding the US government, while serving as a "virtual extension of the CIA". The CIA has been linked to the Afghan heroin trade for decades. In 2000, the Taliban had all but eradicated Afghan opium production. Once Afghanistan was under US control, opium production surged to record levels.
German Vice Chancellor Sigmar Gabriel said this week in Homburg that the U.S. government threatened to cease sharing intelligence with Germany if Berlin offered asylum to NSA whistleblower Edward Snowden or otherwise arranged for him to travel to that country. "They told us they would stop notifying us of plots and other intelligence matters," Gabriel said. The vice chancellor delivered a speech in which he praised the journalists who worked on the Snowden archive, and then lamented the fact that Snowden was forced to seek refuge in "Vladimir Putin's autocratic Russia" because no other nation was willing and able to protect him from threats of imprisonment by the U.S. government. [When pressed] as to why the German government could not and would not offer Snowden asylum - which, under international law, negates the asylee's status as a fugitive - [the vice chancellor said] that the U.S. government had aggressively threatened the Germans that if they did so, they would be "cut off" from all intelligence sharing. That would mean, if the threat were carried out, that the Americans would literally allow the German population to remain vulnerable to a brewing attack discovered by the Americans by withholding that information from their government.
Note: While treated as a dangerous criminal by US authorities, Edward Snowden has been called a hero in the UK's Guardian for exposing government corruption and intelligence agency lies.
When Yonas Fikre stepped off a luxury private jet at Portland airport last month, the only passenger on a $200,000 flight from Sweden, he braced for the worst. The 36-year-old Eritrean-born American was finally back in Portland at the end of a five-year odyssey that began with a simple business trip but landed him in an Arab prison where he alleges he was tortured at the behest of US anti-terrorism officials because he refused to become an informant at his mosque in Oregon. Fikre is suing the FBI, two of its agents and other American officials for allegedly putting him on the US’s no-fly list – a roster of suspected terrorists barred from taking commercial flights – to pressure him to collaborate. When that failed, the lawsuit said, the FBI had him arrested, interrogated and tortured for 106 days in the United Arab Emirates. As shocking as the claims are, they are not the first to emanate from worshippers at Fikre’s mosque in Portland, where at least nine members have been barred from flying by the US authorities. “The no-fly list gives the FBI an extrajudicial tool to coerce Muslims to become informants,” said Gadeir Abbas, a lawyer who represents other clients on the list. “There’s definitely a cluster of cases like this at the FBI’s Portland office. Fikre has not been charged with any terrorism related crimes or even questioned as a potential threat on his return to the US. He remains on the no-fly list.
Note: For more along these lines, see concise summaries of deeply revealing articles about questionable intelligence agency practices from reliable sources.
In the spring of 2010, Afghan officials struck a deal to free an Afghan diplomat held hostage by Al Qaeda. But the price was steep — $5 million. To come up with the money, [senior security officials] turned to a secret fund that the Central Intelligence Agency bankrolled with monthly cash deliveries to the presidential palace in Kabul, according to several Afghan officials. The Afghan government, they said, had already squirreled away about $1 million from that fund. Within weeks, that money ... was handed over to Al Qaeda, replenishing its coffers after a relentless C.I.A. campaign of drone strikes in Pakistan had decimated the militant network’s upper ranks. The C.I.A.’s contribution to Qaeda’s bottom line, though, was no well-laid trap. It was just another in a long list of examples of how the United States, largely because of poor oversight and loose financial controls, has sometimes inadvertently financed the very militants it is fighting. While refusing to pay ransoms for Americans kidnapped by Al Qaeda, the Taliban or, more recently, the Islamic State, the United States has spent hundreds of billions of dollars over the last decade at war in Iraq and Afghanistan, some of which has been siphoned off to enemy fighters. The C.I.A., meanwhile, continued dropping off bags of cash — ranging each time from a few hundred thousand dollars to more than $1 million — at the presidential palace every month until last year, when Mr. Karzai stepped down. The money was used to buy the loyalty of warlords, legislators and other prominent — and potentially troublesome — Afghans, helping the palace finance a vast patronage network that secured Mr. Karzai’s power base.
Note: A 2013 New York Times article called the US the "biggest source of corruption in Afghanistan" for its CIA bankrolling of Afghan warlords. Meanwhile, over a billion dollars of Iraqi "reconstruction" cash disappeared and was later tracked to a bunker in Lebanon. For more along these lines, see concise summaries of deeply revealing war corruption news articles from reliable major media sources.
A senior American climate scientist has spoken of the fear he experienced when US intelligence services apparently asked him about the possibility of weaponising the weather as a major report on geo-engineering is to be published this week. During a debate on the use of geo-engineering to combat climate change ... Prof Robock said: “I got a phone call from two men who said we work as consultants for the CIA and we'd like to know if some other country was controlling our climate, would we know about it? ”I told them, after thinking a little bit, that we probably would because if you put enough material in the atmosphere to reflect sunlight we would be able to detect it and see the equipment that was putting it up there. “At the same time I thought they were probably also interested in if we could control somebody else's climate, could they detect it?” Professor Robock, who has investigated the potential risks and benefits of using stratospheric particles to simulate the climate-changing effects of volcanic eruptions, said he felt “scared” when the approach was made. “I'd learned of lots of other things the CIA had done that haven't followed the rules and I thought that wasn't how I wanted my tax money spent. Professor Robock’s concerns come as a major report on geo-engineering is to be published this week by the US National Academy of Sciences. Among the report’s list of sponsors is the “US intelligence community." The professor alleges that ... the US government had a proven history of using the weather in a hostile way.
Note: The National Academy of Science's two-part report says that geoengineering technologies "present serious known and possible unknown environmental, social, and political risks, including the possibility of being deployed unilaterally." With a deeply corrupt scientific establishment being guided by corrupt intelligence agencies to meddle with the planet's total ecology, and with low public awareness about the messy history of mysterious atmospheric experiments over cities in the U.S. and elsewhere, what could possibly go wrong? For solid evidence the military has used the weather as a weapon, read about HAARP.
A still-classified section of the investigation by congressional intelligence committees into the Sept. 11, 2001, attacks has taken on an almost mythic quality over the past 13 years. Now new claims by Zacarias Moussaoui, a convicted former member of Al Qaeda, that he had high-level contact with officials of the Saudi government in the prelude to Sept. 11 have brought renewed attention to the inquiry’s withheld findings. Representative Stephen F. Lynch, Democrat of Massachusetts [has authored] a bipartisan resolution encouraging President Obama to declassify the section. Mr. Lynch and his allies have been joined by former Senator Bob Graham of Florida, who as chairman of the Senate Intelligence Committee was a leader of the inquiry. He has called for the release of the report’s [28 page] Part 4, which dealt with Saudi Arabia, since President George W. Bush ordered it classified when the rest of the report was released in December 2002. Mr. Graham has repeatedly said it shows that Saudi Arabia was complicit in the Sept. 11 attacks. “The 28 pages primarily relate to who financed 9/11, and they point a very strong finger at Saudi Arabia as being the principal financier,” Mr. Graham said last month as he pressed for the pages to be made public. Proponents of releasing Part 4, titled “Finding, Discussion and Narrative Regarding Certain National Security Matters,” have suggested that the Bush and Obama administrations have held it back for fear of alienating an influential military and economic partner rather than for any national security consideration.
Note: Several prominent current and former US politicians are working to expose the Saudi government money behind terrorism by declassifying this material. Moussaoui's new claims suggest that they are on the right track. For more along these lines, read concise summaries of deeply revealing 9/11 investigation news from reliable major media sources.
The outrageous legal attack on WikiLeaks and its staffers ... is an attack on freedom of the press itself. WikiLeaks has had their Twitter accounts secretly spied on, been forced to forfeit most of their funding after credit card companies unilaterally cut them off, had the FBI place an informant inside their news organization, watched their supporters hauled before a grand jury, and been the victim of the UK spy agency GCHQ hacking of their website and spying on their readers. Now we’ve learned that, as The Guardian reported on Sunday, the Justice Department got a warrant in 2012 to seize the contents – plus the metadata on emails received, sent, drafted and deleted – of three WikiLeaks’ staffers personal Gmail accounts. The tactics used against WikiLeaks by the Justice Department in their war on leaks [are] also used against mainstream news organizations. For example, after the Washington Post revealed in 2013 the Justice Department had gotten a warrant for the personal Gmail account of Fox News reporter James Rosen in 2010 without his knowledge. Despite the ongoing legal pressure, WikiLeaks has continued to publish important documents in the public interest.
Note: In recent years, Wikileaks' radical transparency has made draft texts of the Trans-Pacific Partnership public, and uncovered a secret CIA report that suggests the US government’s policy of assassinating foreign 'terrorists' does more harm than good. So who is the real problem here?
Libyan government papers pieced together by [a] team of London lawyers show [that] Tony Blair wrote to Colonel Muammar Gaddafi to thank him for the “excellent cooperation” between the two countries’ counter-terrorism agencies. The letter, written in 2007, followed a period in which the dictator’s intelligence officers were permitted to operate in the UK, approaching and intimidating Libyan refugees. Addressed “Dear Mu’ammar” and signed “Best wishes yours ever, Tony”, the letter was among hundreds of pages of documents recovered from Libyan government offices following the 2011 revolution. Six Libyan men, the widow of a seventh, and five British citizens of Libyan and Somali origin are bringing claims against the British government on the basis of the recovered documents, alleging false imprisonment, blackmail, misfeasance in public office and conspiracy to assault. The recovered documents show that MI5 and MI6 submitted more than 1,600 questions to be put to two opposition leaders after they had been kidnapped with British assistance and flown to one of Gaddafi’s prisons. Both men say they suffered appalling torture. On Thursday an attempt by government lawyers to have the case struck out without admitting liability failed when the high court ruled the allegations “are of real potential public concern” and should be heard and dealt with by the courts.
Note: British intelligence agencies have been trying to silence the lawyers filing this lawsuit, and got caught illegally spying on them. For more along these lines, see concise summaries of deeply revealing news articles about corruption in intelligence agencies and government.
Former CBS News correspondent Sharyl Attkisson has sued the Justice Department over the hacking of her computers, officially accusing the Obama administration of illegal surveillance while she was reporting on administration scandals. In a series of legal filings that seek $35 million in damages, Attkisson alleges that three separate computer forensic exams showed that hackers used sophisticated methods to surreptitiously monitor her work between 2011 and 2013. The intruders installed and periodically refreshed software to steal data and obtain passwords on her home and work computers. She also charges that the hackers monitored her audio using a Skype account. The award-winning reporter says she and her attorneys have "pretty good evidence" that these efforts were "connected" to the Justice Department. She said she was caught in a "Catch-22," forcing her to use the lawsuit and an administrative complaint to discover more about the surveillance through the discovery process and to learn the identities of the "John Does" named in the complaints. Attkisson learned through a Freedom of Information request that the FBI opened an investigation of the hacking case in May 2013, but says the bureau never interviewed her or even notified her of the probe. Attkisson resigned from CBS last March after complaining that she was increasingly unable to get her investigative stories on the air. She has published a best-selling book, "Stonewalled," about her battles against the network and the administration.
Note: Fox News was the only major media to cover this important case. Read a judge's supportive comments about this important case on Ms. Attkisson's website. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
The combined cost of the “war on terror” comes to an estimated $1.6 trillion. A lot of former senior government officials who played important roles in this debacle have done quite well for themselves. [Former CIA director George Tenet] missed multiple signs of a major Al Qaeda attack directed against the United States [prior to 9/11] and approved the Bush administration’s torturing of terror suspects. He got the Presidential Medal of Freedom. He [also] received a $4 million advance to write a memoir. Tenet has received millions more in his current role as ... a board director and advisor to intelligence and military contractors. Louis Freeh, Tenet’s counterpart at the FBI during the run-up to 9/11 [also mishandled] “significant and urgent” intelligence of “serious operational planning” for terrorism attacks by Islamic radicals. Freeh resigned from the FBI two months before 9/11. In 2008, [a businessman named Nasser Kazeminy] was accused of bribing former Senator Norm Coleman, [and] hired Freeh to conduct a “thorough investigation” of the allegations against him in the hopes of clearing his name. In 2011, Freeh issued a public statement saying that his investigation had “completely vindicated” both Kazeminy and Coleman. Freeh also met with the Justice Department – which was investigating the bribery charges but declined to bring a case — on Kazeminy’s behalf. [Today, Freeh has a $3 million] Palm Beach penthouse. Freeh’s wife co-owns it with Kazeminy. The quit claim deed giving Freeh’s wife one-half ownership of the penthouse was signed nine days after Freeh’s vindication of Kazeminy.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in intelligence agencies and government.
President Obama [has thus far] failed to bring to justice anyone responsible for the ... official government [torture] program conceived and carried out in the years after the attacks of Sept. 11, 2001. He did allow his Justice Department to investigate the C.I.A.'s destruction of videotapes of torture sessions and those who may have gone beyond the torture techniques authorized by President George W. Bush. But the investigation did not lead to any charges being filed. The American Civil Liberties Union and Human Rights Watch are ... calling for appointment of a special prosecutor to investigate what appears increasingly to be “a vast criminal conspiracy, under color of law, to commit torture and other serious crimes.” The question everyone will want answered, of course, is: Who should be held accountable? Any credible investigation should include former Vice President Dick Cheney; Mr. Cheney’s chief of staff, David Addington; the former C.I.A. director George Tenet; and John Yoo and Jay Bybee, the Office of Legal Counsel lawyers who drafted what became known as the torture memos. There are many more names that could be considered. Because of the Senate’s report, we now know the distance officials in the executive branch went to rationalize, and conceal, the crimes they wanted to commit. The question is whether the nation will stand by and allow the perpetrators of torture to have perpetual immunity for their actions.
Note: Some have called for prosecuting those responsible as violators of international rules against human experimentation. For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices and widespread government corruption.
Hardly a week goes by without a new report of some massive data theft that has put financial information, trade secrets or government records into the hands of computer hackers. The best defense against these attacks is clear: strong data encryption and more secure technology systems. U.S. intelligence agencies hold a different view. James Comey, the FBI director, is lobbying Congress to require that electronics manufacturers create intentional security holes — so-called back doors — that would enable the government to [easily] access data on every American's cellphone and computer. Building a back door into every cellphone, tablet, or laptop means deliberately creating weaknesses that hackers and foreign governments can exploit. What these officials are proposing would be bad for personal data security and bad for business. Built-in back doors have ... disastrous results. The U.S. House of Representatives recognized how dangerous this idea was and in June approved [an] amendment [to] prohibit the government from mandating that technology companies build security weaknesses into any of their products. I introduced legislation in the Senate to accomplish the same goal. Advances in technology always pose a new challenge to law enforcement agencies. But curtailing innovation on data security is no solution, and certainly won't restore public trust in tech companies or government agencies.
Note: Ron Wyden, a member of the Senate Intelligence Committee, wrote the article summarized above. The NSA routinely creates and exploits security holes in commercial encryption software and devices to spy on people, and shares the personal data it obtains with the CIA, FBI, IRS, and others through the DEA's Special Operations Division. What exactly is the FBI director asking congress for now?
One quiet consequence of this week’s sensational release of the Senate Intelligence Committee’s report on the C.I.A. detention program was a telephone call that a human rights lawyer, Meg Satterthwaite, placed to a client in Yemen, Mohamed Bashmilah. For eight years since Mr. Bashmilah, 46, was released from C.I.A. custody, Ms. Satterthwaite ... had been trying without success to get the United States government to acknowledge that it had held him in secret prisons for 19 months and to explain why. In the phone call on Wednesday, she told him that the Senate report listed him as one of 26 prisoners who, based on C.I.A. documents, had been “wrongfully detained.” After learning the news, Mr. Bashmilah pressed Ms. Satterthwaite, who heads the global justice program at New York University Law School, to tell him what might follow from the Senate’s recognition. Would there be an apology? Would there be some kind of compensation? Among the others mistakenly held for periods of months or years, according to the report, were an “intellectually challenged” man held by the C.I.A. solely to pressure a family member to provide information; two people who were former C.I.A. informants; and two brothers who were falsely linked to Al Qaeda. Ms. Satterthwaite was not able to answer Mr. Bashmilah’s question about an apology or reparation. No apology was forthcoming from the C.I.A., which declined to comment on specific cases.
Note: An ACLU lawsuit filed on behalf of Mr. Bashmilah and others flown to prisons on C.I.A. aircraft was dismissed on the grounds that it might expose state secrets. For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
The UN and human rights groups have called for the prosecution of US officials involved in what a Senate report called the "brutal" CIA interrogation of al-Qaeda suspects. UN Special Rapporteur on Human Rights and Counter-Terrorism Ben Emmerson said that senior officials from the administration of George W Bush who planned and sanctioned crimes must be prosecuted, as well as CIA and US government officials responsible for torture. "As a matter of international law, the US is legally obliged to bring those responsible to justice," Mr Emmerson said in a statement made from Geneva. Correspondents say that the chances of prosecuting members of the Bush administration are unlikely. Several countries suspected to have hosted [CIA torture] sites reacted strongly to the publication. Poland's former president [Aleksander Kwasniewski] has publicly acknowledged for the first time [that] his country hosted a secret CIA prison. Lithuanian Prime Minister Algirdas Butkevicius called on the US to say whether CIA used his country to interrogate prisoners. Afghanistan's President Ashraf Ghani called the report "shocking", saying the actions "violated all accepted norms of human rights in the world".
Note: Read revealing excerpts from this most disturbing report. For more, read how the CIA teamed up with the UK's MI6 to kidnap people and deliver them to be tortured at a Libyan site in 2004. Could this US program have happened without strong international support?
Months before the operation that killed Osama bin Laden in 2011, the Central Intelligence Agency secretly prepared a public-relations plan that would stress that information gathered from its disputed interrogation program had played a critical role in the hunt. Starting the day after the raid, agency officials in classified briefings made that point to Congress. But in page after page of previously classified evidence, the Senate Intelligence Committee report on C.I.A. torture, released Tuesday, rejects the notion that torturing detainees contributed to finding Bin Laden. The crucial breakthrough in the hunt was the identification of ... Abu Ahmed al-Kuwaiti. The United States had started wiretapping a phone number associated with Mr. Kuwaiti by late 2001. It was in 2004 that the C.I.A. came to realize that it should focus on finding Mr. Kuwaiti as part of the hunt for Bin Laden. [A man named] Hassan Ghul, who had been captured in Iraqi Kurdistan ... provided “the most accurate” intelligence that the agency produced about Mr. Kuwaiti’s role and ties to Bin Laden. Mr. Ghul provided all the important information about [Mr. Kuwaiti] before he was subjected to any torture techniques. During that [initial] two-day period in January 2004, “He opened up right away and was cooperative from the outset.” Nevertheless, the C.I.A. then decided to torture Mr. Ghul. During and after that treatment, he provided “no actionable threat information.”
Note: Read revealing excerpts from this most disturbing report.
The FBI confirmed Tuesday it faked an Associated Press story to catch a bomb threat suspect in 2007. Police in Lacey, near Olympia, sought the FBI's help as repeated bomb threats prompted a week of evacuations at Timberline High School in June 2007. The agency obtained a warrant from a federal magistrate judge to send a "communication" to a social media account ... which contained a software tool that could verify Internet addresses, (and) turned out to be a link to a phony AP story about the bomb threats posted on a Web page created by the FBI. The 15-year-old suspect clicked on the link, revealing his computer's location. The FBI did not initially respond to AP's request earlier Tuesday for further detail about the fake story, beyond saying the ruse was necessary. AP spokesman Paul Colford said Tuesday the FBI's "ploy violated AP's name and undermined AP's credibility." "We are extremely concerned and find it unacceptable that the FBI misappropriated the name of The Associated Press and published a false story attributed to AP." Kathy Best, editor of The Seattle Times, said in a statement that, "The FBI, in placing the name of The Associated Press on a phony story sent to a criminal suspect, crossed a line and undermined the credibility of journalists everywhere — including at The Times." The documents revealing the deception were publicized Monday on Twitter by Christopher Soghoian, the principal technologist for the American Civil Liberties Union.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
The director of the FBI savaged tech companies for their recent embrace of end-to-end encryption and suggested rewriting laws to ensure law enforcement access to customer data in a speech on Thursday. James Comey said data encryption such as that employed on Apple’s latest mobile operating system would deprive police and intelligence companies. Privacy advocates contend Comey is demagoguing the issue. It took a June supreme court ruling, they point out, for law enforcement to abandon its contention that it did not require warrants at all to search through smartphones or tablets, and add that technological vulnerabilities can be exploited by hackers and foreign intelligence agencies as well as the US government. Tech companies contend that their newfound adoption of encryption is a response to overarching government surveillance, much of which occurs ... without a warrant, subject to a warrant broad enough to cover indiscriminate data collection, or under a gag order following a non-judicial subpoena. Comey did not mention such subpoenas, often in the form of National Security Letters, in his remarks. Comey acknowledged that the Snowden disclosures caused “justifiable surprise” among the public about the breadth of government surveillance, but hoped to mitigate it through greater transparency and advocacy. Yet the FBI keeps significant aspects of its surveillance reach hidden even from government oversight bodies. Intelligence officials said in a June letter to a US senator that the FBI does not tally how often it searches through NSA’s vast hoards of international communications, without warrants, for Americans’ identifying information. Comey frequently described himself as being technologically unprepared to offer specific solutions, and said he meant to begin a conversation, even at the risk of putting American tech companies at a competitive disadvantage.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
The FBI is facing questions over its role in a 2011 hacking attack on Rupert Murdoch’s Sun newspaper in the UK after the publication of chat logs showed that a man acting as an agency informant played a substantial role in the operation. The attack was so successful that the publisher took down the websites of the Sun and the Times while technicians worked out the scale of the hack. Unsealed documents ... seen by the Guardian, show Hector Xavier Monsegur – known widely online as “Sabu” and frequently referred to as the leader of Lulzsec – played an active role in the operation. The chat records show Monsegur encouraging others to break further into News International systems, claiming to have sources at the Sun, and even apparently helping to break staff’s passwords and to source files for stealing. Monsegur was, however, at that time operating under the direction of the FBI. The close involvement of an FBI asset working under extraordinarily close supervision in a hacking attack on a media outlet ultimately owned by a US-listed company is set to raise further questions about the agency’s approach to tackling online crime. The logs also show Sabu on multiple occasions offering detailed technical help to find additional records on different servers, breaking in to new servers, or obtaining more files – which could easily have included those belonging to journalists at either the Sun or Times. The Sun, which is challenging the UK government over police accessing the phone records of one of its reporters, declined to comment on the apparent FBI involvement in attacks on its servers.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources. For an in-depth look at how these practices have been shown to interfere with a free press, see these excellent, reliable Mass Media Resources.
[National security letters], the reach of which was expanded under the Patriot Act in 2001, let the FBI get business records from telephone, banking, and Internet companies with just a declaration that the information is relevant to a counterterrorism investigation. The FBI can get such information with a subpoena or another method with some judicial oversight. Can the government make demands for data entirely in secret? That was the question yesterday before a federal appeals court in San Francisco, where government lawyers argued that National Security Letters — FBI requests for information that are so secret they can’t be publicly acknowledged by the recipients — were essential to counterterrorism investigations. One of the judges seemed to question why there was no end-date on the gag orders, and why the burden was on the recipients of NSLs to challenge them. “It leaves it to the poor person who is subject to those requirements to just constantly petition the government to get rid of it,” said the judge, N. Randy Smith. The FBI sends out thousands of NSLs each year – 21,000 in fiscal year 2012. Google, Yahoo, Facebook and Microsoft filed a brief in support of the NSL challenge, arguing that they want to “publish more detailed aggregate statistics about the volume, scope and type of NSLs that the government uses to demand information about their users.” Twitter also announced this week that it was suing the U.S. government over restrictions on how it can talk about surveillance orders. Tech companies can currently make public information about the number of NSLs or Foreign Intelligence Surveillance Court orders they receive in broad ranges, but Twitter wants to be more specific.
Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
As part of their insurgency against the Sandinista government in Nicaragua, some of the C.I.A.-backed contras made money through drug smuggling, transgressions noted in a little-noticed 1988 Senate subcommittee report. Gary Webb, a journalist at The San Jose Mercury News, thought it was a far-fetched story to begin with, but in 1995 and 1996, he dug in and produced a deeply reported and deeply flawed three-part series called Dark Alliance. That groundbreaking series was among the first to blow up on the nascent web, and he was initially celebrated, then investigated and finally discredited. Pushed out of journalism in disgrace, he committed suicide in 2004. [The movie] Kill the Messenger ... suggests that he told a truth others were unwilling to. Mr. Webb was not the first journalist to come across [such matters]. In December 1985, The Associated Press reported that three contra groups had engaged in cocaine trafficking, in part to help finance their war against Nicaragua. Major news outlets mostly gave the issue a pass. Peter Landesman, an investigative journalist who wrote the screenplay, was struck by the reflex to go after Mr. Webb. Planeloads of weapons were sent south from the U.S., and everyone knows that those planes didnt come back empty, but the C.I.A. made sure that they never knew for sure what was in those planes, he said. But instead of going after that, they went after Webb." In 1998, Frederick P. Hitz, the C.I.A. inspector general, testified before the House Intelligence Committee that after looking into the matter at length, he believed the C.I.A. was a bystander or worse in the war on drugs. However dark or extensive, the alliance Mr. Webb wrote about was a real one.
Note: Webb's story was not deeply flawed, as reported in this article. His editor even commented that four Washington Post writers could not find one significant factual error, but then changed his mind after CIA leaders threatened the paper. Read a Sacrament Bee newspaper article for more on Webb and his story. For more along these lines, see the excellent, reliable resources provided in our Mass Media Information Center.
Australia has changed radically since last week though it might not look like it on the surface. Late Thursday night the Senate passed the National Security Amendment Bill (No.1) 2014 giving unlimited power to spies and secret police. Now officials can break the law with immunity from prosecution - and without having to answer to a court. They can act in total secrecy. They will decide what they do and to whom and when. They do not have to ask permission. They will choose when to interfere in your life and when they won't. They can dip into your most private communications and they don't need a warrant to do so. Sometimes they will do it because it is necessary to fight crime. Sometimes because they enjoy it. If they mess up your life and you tell anybody, you will get 10 years' jail – even if it doesn't harm security. When a Special Intelligence Operation (SIO) is declared then any participant can break the law on you with no consequences, according to Schedule 3 section 35k. There are broad limits. They cannot kill or torture you, or cause significant physical injury. Minor injury or mental torment is fine. Anyone involved in an SIO will have these powers – but who are they? ASIO, with 1778 staff. The Australian Federal Police, with more than 6900 staff. NSW Police with about 16,370 officers and a spy database called COPS which has more than 30 million entries on the people of NSW. But not just them. Anyone involved in an SIO enjoys legal immunity, including affiliates and subcontractors – whoever they are. Many Senators clearly hadn't read the 128 pages of major legal changes in the NSA Bill. The citizen needs protection from the state built into the laws and that is what they smashed on Thursday.
Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
A massive, $7.2 billion Army intelligence contract signed just 10 days ago underscores the central role to be played by the National Security Agency and its army of private contractors in the unfolding air war being carried out by the United States and its Gulf States allies against the Islamic State in Iraq and Syria. INSCOM’s “global intelligence support” contract will place the contractors at the center of this fight. Under its terms, 21 companies, led by Booz Allen Hamilton, BAE Systems, Lockheed Martin and Northrop Grumman, will compete over the next five years to provide “fully integrated intelligence, security and information operations” in Afghanistan and “future contingency operations” around the world. INSCOM announced the global intelligence contract two days after President Obama, in a speech to the nation, essentially declared war on ISIS in Iraq and Syria and outlined a campaign of airstrikes and combat actions to “degrade and ultimately destroy” the terrorist group. The top contractors on the INSCOM contract are already involved in the war. Lockheed Martin, for example, makes the Hellfire missiles that are used extensively in U.S. drone strikes. Northrop Grumman makes the Global Hawk surveillance drone. Both companies have large intelligence units. 70 percent of the U.S. intelligence budget is spent on private contractors. This spending [is] estimated at around $70 billion a year. [There is a] revolving door between INSCOM and its contractors. The system is corrupted by the close relationships between the companies and their agencies, said [Tom] Drake, who as a whistle-blower was nearly sent to prison for exposing the waste, fraud and abuse in a contracted program at the NSA that ended up losing over $7 billion.
Note: Read a powerful essay written by a top US general showing how he was fooled into supporting wars that were generated by the powerful global elite who want never-ending war in order to keep their profits flowing.
The United States has conducted an escalating campaign of deadly airstrikes against the extremists of the Islamic State. But that appears to have done little to tamp down the conspiracy theories still circulating from the streets of Baghdad to the highest levels of Iraqi government that the CIA is secretly behind the same extremists that it is now attacking. “We know about who made Daesh,” said Bahaa al-Araji, a deputy prime minister, using an Arabic shorthand for the Islamic State ... at a demonstration called by the Shiite cleric Moktada al-Sadr. Mr. Sadr publicly blamed the CIA for creating the Islamic State in a speech last week, and interviews suggested that most of the few thousand people at the demonstration, including dozens of members of Parliament, subscribed to the same theory. The prevalence of the theory in the streets underscored the deep suspicions of the American military’s return to Iraq more than a decade after its invasion, in 2003. The casual endorsement by a senior official, though, was also a pointed reminder that the new Iraqi government may be an awkward partner for the American-led campaign to drive out the extremists.
Note: A carefully researched report on the covert origins of ISIS suggests the creation of terrorists is useful for Washington's elite. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
The rise of ISIS has been aided by the failure of the US government to investigate the connection between the Saudi Arabian government and jihadist networks, said former senator Bob Graham. Senator Graham, who chaired the Senate Intelligence Committee, said that successive administrations had failed to examine the connections between the Saudis and Sunni militant groups. "I believe that the failure to shine a full light on Saudi actions ... has contributed to the Saudi ability to continue to engage in actions that are damaging to the US – and in particular their support for ISIS," he said. The Saudis have been accused of using Sunni militant groups as proxies, channeling money to Islamist groups battling the forces of president Bashar al-Assad in the Syrian civil war, as Sunni and Shia battle for hegemony in the Middle East. The Shia Iranians are chief backers of Assad, and Nouri al Maliki's Shia-dominated government which collapsed following ISIS' onslaught in Iraq, accused the Saudi Arabia and Qatar of funding ISIS, and facilitating "genocide". [Graham] said that Saudi Arabia gives support to the "the most extremist elements among the Sunni". Al-Qaida leader Osama bin Laden was the son of a wealthy construction magnate, who had close ties to the Saudi royal family. It is alleged that redacted pages of the [Joint Congressional 9/11 inquiry] report establish links between Saudi government officials and al-Qaida.
Note: Watch the highly illuminating BBC documentary "Power of Nightmares" that reveals that al-Qaida, under the control of Osama bin Laden, has never actually existed, but is a US/UK-government psychological operation to launch the "Global War on Terror". For more on this, read Prof. David Ray Griffin's deeply revealing book Osama bin Laden: Dead or Alive?
The rise of the Islamic State of Iraq and the Levant (Isis) has been aided by the continuing failure of the US Government to investigate the role of Saudi Arabia in the 9/11 attacks and its support of jihadi movements such as al-Qaeda in the years since, says former Senator Bob Graham, the co-chairman of the official inquiry into 9/11. Senator Graham, who chaired the Senate Intelligence Committee, said that successive administrations in Washington had turned a blind eye to Saudi support for Sunni extremists. He added: “I believe that the failure to shine a full light on Saudi actions and particularly its involvement in 9/11 has contributed to the Saudi ability to continue to engage in actions that are damaging to the US – and in particular their support for Isis.” Senator Graham does not suggest that the Saudis are directly running Isis, but that their support for Sunni extremists in Iraq and Syria opened the door to jihadis including Isis. Similar points were made by Sir Richard Dearlove, the former head of the British Secret Intelligence Service, and MI6, who said ... that rulers of the Kingdom tended to oppose jihadis at home as enemies of the House of Saud, but promote them abroad in the interests of Saudi foreign policy. The US and other Western governments have yet to explain why their “war on terror” has so demonstrably failed with the rise of Isis, but tolerance of Saudi complicity in 9/11 will surely be part of the answer.
Note: Explore solid, verifiable evidence that rogue elements in the US government may have been involved in the creation of Isis. By 2009, US officials were aware that Saudi Arabia was funding ISIS. Saudi officials have long spent lavishly on charming American policymakers and journalists. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
A prominent national security reporter for the Los Angeles Times routinely submitted drafts and detailed summaries of his stories to CIA press handlers prior to publication, according to documents obtained by The Intercept. Email exchanges between CIA public affairs officers and Ken Dilanian, now an Associated Press intelligence reporter who previously covered the CIA for the Times, show that Dilanian enjoyed a closely collaborative relationship with the agency, explicitly promising positive news coverage and sometimes sending the press office entire story drafts for review prior to publication. In at least one instance, the CIA’s reaction appears to have led to significant changes in the story that was eventually published in the Times. Dilanian’s emails were included in hundreds of pages of documents that the CIA turned over in response to two FOIA requests seeking records on the agency’s interactions with reporters. They include email exchanges with reporters for the Associated Press, Washington Post, New York Times, Wall Street Journal, and other outlets. In addition to Dilanian’s deferential relationship with the CIA’s press handlers, the documents show that the agency regularly invites journalists to its McLean, Va., headquarters for briefings and other events.
Note: For more on this, see concise summaries of deeply revealing major media corruption news articles from reliable major media sources.
America has raged against the appalling behavior of the local police in Ferguson, Missouri, and for good reason: automatic rifles pointed at protesters, tank-like armored trucks blocking marches, the teargassing and arresting of reporters, tactics unfit even for war zones. [But ire] should also be focused on the federal government agency that has enabled the rise of military police, and so much more: the Department of Homeland Security (DHS). The 240,000-employee [agency] has been the primary arms dealer for out-of-control local cops in Ferguson and beyond, handing out tens of billions of dollars in grants for military equipment in the last decade with little to no oversight. Police can act like paramilitary forces to combat the most mundane crimes without much worry of the consequences. But the problem with DHS is much larger than just combat gear: Homeland Security is also transferring tens or hundreds of millions of dollars in high-tech spying technology to local police through a sprawling backroom operation surveilling your neighborhood, much of which may be unconstitutional. DHS has its own fleet of Predator drones roaming the US border and far beyond, which it has loaned out to police over 500 times. Homeland Security is also handing out millions of dollars to local police to “accelerate and facilitate the adoption” of smaller drones that police can fly themselves. Cops claim they want these “middleman” drones for “emergencies,” but ... documents show they’ll end up using them for “crowd control” and “intelligence gathering”.
Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."
Note: Read the cover story from Wired magazine with a deep inside report on Snowden.
The New York Times announced on [August 7] that it will use the word torture to describe the United States' controversial interrogation tactics on terror suspects. "From now on, The Times will use the word “torture” to describe incidents in which we know for sure that interrogators inflicted pain on a prisoner in an effort to get information," said Times executive editor Dean Baquet. In the past, the Times had been sharply criticized for not using the word torture. Instead, [it] had referred to torture as "brutal interrogation," or similar epithets. The Times is hardly the only major media outlet to avoid using the word "torture." Reuters referred to the tactics as "brutal interrogation methods" and the AP has called them "enhanced interrogation techniques." The media have been accused of following along with President Bush's denial that the U.S. does not use torture. Banquet [says] that "while the methods set off a national debate, the Justice Department insisted that the techniques did not rise to the legal definition of 'torture.'” Baquet said that reporters and editors had debated the issue in wake of the Senate Intelligence Committee's torture report, which has yet to be released. Last week, President Obama admitted that the CIA "tortured some folks" in post-9/11 anti-terror efforts.
Note: For more on this, see concise summaries of deeply revealing media cover-ups news articles from reliable major media sources.
The federal government has concluded there's a new leaker exposing national security documents in the aftermath of surveillance disclosures by former NSA contractor Edward Snowden, U.S. officials tell CNN. Proof of the newest leak comes from national security documents that formed the basis of a news story published [August 5] by the Intercept, the news site launched by Glenn Greenwald, who also published Snowden's leaks. The Intercept article focuses on the growth in U.S. government databases of known or suspected terrorist names during the Obama administration. The article cites documents prepared by the National Counterterrorism Center dated August 2013, which is after Snowden left the United States to avoid criminal charges. Government officials have been investigating to find out that identity. In a February interview with CNN's Reliable Sources, Greenwald said: "I definitely think it's fair to say that there are people who have been inspired by Edward Snowden's courage and by the great good and virtue that it has achieved." The biggest database, called the Terrorist Identities Datamart Environment, now has 1 million names, a U.S. official confirmed to CNN. The Intercept first reported the new TIDE database numbers, along with details of other databases. As of November, 2013, there were 700,000 people listed in the Terrorist Screening Database (TSDB), or the "Terrorist Watchlist, according to a U.S. official. The Intercept report said, citing the documents, that 40% on the "Terrorist Watchlist" aren't affiliated with terror groups.
Note: For more on this, see concise summaries of deeply revealing 'terror' manipulation news articles from reliable major media sources.
Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local law enforcement agencies, private contractors, and foreign governments—more than 40 percent are described by the government as having “no recognized terrorist group affiliation.” The documents, obtained from a source in the intelligence community, also reveal that the Obama Administration has presided over an unprecedented expansion of the terrorist screening system. Since taking office, Obama has boosted the number of people on the no fly list more than ten-fold, to an all-time high of 47,000. “If everything is terrorism, then nothing is terrorism,” says David Gomez, a former senior FBI special agent. The watchlisting system, he adds, is “revving out of control.” The classified documents were prepared by the National Counterterrorism Center, the lead agency for tracking individuals with suspected links to international terrorism. Stamped “SECRET” and “NOFORN” (indicating they are not to be shared with foreign governments), they offer the most complete numerical picture of the watchlisting system to date. The government adds names to its databases, or adds information on existing subjects, at a rate of 900 records each day.
Note: For more on this, see concise summaries of deeply revealing 'terror' manipulation news articles from reliable major media sources.
A U.S. Senate committee report will conclude that the CIA's use of harsh interrogation after the Sept. 11, 2001, attacks yielded no critical intelligence on terrorist plots that could not have been obtained through non-coercive methods, U.S. officials familiar with the document said. [The] report [is] expected to suggest that the "enhanced" techniques were unnecessary and also to accuse some CIA officers of misleading Congress about the effectiveness of the program. Officials said the Senate Intelligence Committee was unlikely to release the report to the public without some additional review. "A preliminary review of the report indicates there have been significant redactions. We need additional time to understand the basis for these redactions and determine their justification. Therefore the report will be held until further notice and released when that process is completed," Democratic Sen. Dianne Feinstein, the committee's chair, said. Committee investigators also concluded that the agency misled other executive branch agencies and Congress by claiming that only by using harsh methods did the agency achieve ... counter-terrorism breakthroughs that otherwise would not have been possible. The report will criticize some CIA officials by name, the officials said.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
The FBI thoroughly searched its archives and found no evidence that more videos of the Oklahoma City bombing exist, agency employees told a judge [on July 28] in a trial that has rekindled questions about whether any others were involved in the 1995 attack. Additional searches for videos that Salt Lake City lawyer Jesse Trentadue believes are being withheld would be burdensome and fruitless, FBI attorney Kathryn Wyer argued during the first day of a bench trial. Trentadue says the agency is refusing to release videos that show a second person was with Timothy McVeigh when he parked a truck outside the Oklahoma City federal building and detonated a bomb that killed 168 people. The government says McVeigh was alone. [But] the 30 video recordings the FBI has released don't show the explosion or McVeigh's arrival in a rental truck. Unsatisfied by the FBI's previous explanations and citing the public importance of the tapes, U.S. District Judge Clark Waddoups has ordered the agency to explain why it can't find videos that are mentioned in evidence logs. Trentadue believes the presence of a second suspect explains why his brother, Kenneth Trentadue, was flown to Oklahoma several months after the bombing, where he died in a federal holding cell. Kenneth Trentadue bore a striking resemblance to a police sketch based on witness descriptions of the enigmatic suspect "John Doe No. 2," who was never identified..
Note: There is strong evidence of a major cover-up in the Oklahoma City bombing. See this Wall Street Journal article, this Associated Press article, this ABC News article, and this Deseret News article for examples.
Bill Binney worked at the National Security Agency [for] nearly three decades as one of its leading crypto-mathematicians. He then became one of its leading whistleblowers. The NSA is overseen by Congress, the courts and other government departments. It's also supposed to be watched from the inside by its own workers. But over the past dozen years, whistleblowers like Binney have had a rough track record. Those who tried unsuccessfully to work within the system say Edward Snowden — the former National Security Agency contractor who shared top-secret documents with reporters — learned from their bitter experience. For Binney, the decision to quit the NSA and become a whistleblower began a few weeks after the terrorist attacks of Sept. 11, 2001, when he says he discovered the spy agency had begun using software he'd created to scoop up information on Americans — all without a court order. "I had to get out of there, because they were using the program I built to do domestic spying, and I didn't want any part of it, I didn't want to be associated with it," he says. "I look at it as basically treason. They were subverting the Constitution." Binney says he and two other NSA colleagues who also quit tried sounding the alarm with congressional committees. But because they did not have documents to prove their charges, nobody believed them. Snowden, he says, did not repeat that mistake. "He recognized right away, it was very clear to me, that if he wanted anybody to believe him, he'd have to take a lot of documentation with him — which is what he did," Binney says.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
The intelligence community is about to get the equivalent of an adrenaline shot to the chest. This summer, a $600 million computing cloud developed by Amazon Web Services for the Central Intelligence Agency over the past year will begin servicing all 17 agencies that make up the intelligence community. If the technology plays out as officials envision, it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks. For the first time, agencies within the intelligence community will be able to order a variety of on-demand computing and analytic services from the CIA and National Security Agency. What's more, they'll only pay for what they use. For the risk-averse intelligence community, the decision to go with a commercial cloud vendor is a radical departure from business as usual. It is difficult to underestimate the cloud contract's importance. In a recent public appearance, CIA Chief Information Officer Douglas Wolfe called it "one of the most important technology procurements in recent history," with ramifications far outside the realm of technology. The importance of the cloud capabilities the CIA gets through leveraging Amazon Web Services' horsepower is best exemplified in computing intelligence data. Instead of each agency building out its own systems, select agencies ... are responsible for governing its major components.
Note: The CIA tries to "collect everything and hold on to it forever." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The home of an MP who compiled a dossier alleging paedophile activity within Westminster was burgled twice in suspicious circumstances around the time he took it to the authorities, his son has said. Barry Dickens said nothing was taken in what appeared to be two "very professional" intrusions into his father Geoffrey's home in 1983, leading to suspicions they may have been related to his attempt to expose alleged abuse. He said he did not know what had happened to an apparent second copy of the dossier after the Home Office admitted one which it received for investigation at the time appeared to have been destroyed. "My parents had two burglaries at the time close to it without anything being taken, which seemed a very professional job the way they were carried out," Mr Dickens – whose father died in 1995 – [said]. He said the dossier contained concerns and worries expressed to the MP about the behaviour of ''those with a high profile, in an office or high status'' and questioned its subsequent disappearance. He said his father had been motivated to take on the cause of vulnerable young people by his own difficult childhood in a succession of foster homes and that he would be pleased that the case had become public now. Backing a public inquiry, [he] added: "A lot of people came forward with facts. I think it does need doing and finishing."
Note: See powerful evidence from a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government
The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents. The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed. The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. It is not clear how many people around the world, and how many Americans, might have been caught up in the effort. Neither federal privacy laws nor the nation’s surveillance laws provide specific protections for facial images. Civil-liberties advocates and other critics are concerned that the power of the improving technology, used by government and industry, could erode privacy. “Facial recognition can be very invasive,” said Alessandro Acquisti, a researcher on facial recognition technology at Carnegie Mellon University.
Note: For another New York Times article showing how the NSA is using mobile phone apps to "snatch data revealing the player’s location, age, sex and other personal information," see this article.
A new book by Gareth Porter, an American historian and researcher specializing in U.S. national security, shows how the actual state of the Iranian nuclear program does not match the Iranian threat narrative. Manufactured Crisis: The Untold Story of the Nuclear Scare ... is a highly detailed and well-documented book for all interested in understanding how we arrived at the Iranian nuclear crisis, and the “attack scenarios” and invented facts and intelligence reports. The story begins with U.S. support for the Iraqis during the 1980s Iraq-Iran war. The critical point [came] with the collapse of the Soviet empire. According to Porter, that event and the end of the Cold War pulled out the rug from under the CIA’s raison d’ętre. The solution the Americans found to continue providing the [CIA] with a tremendous budget was the invention of a new threat – the merging of weapons of mass destruction (an ambiguous term in itself) and terror. Iran ... provided the threat that “saved” the CIA. Running through Porter’s book is the well-substantiated claim that U.S. and Israeli policies on Iran derived from their political and organizational interests, and not necessarily from careful factual analysis of the Iranian nuclear program, which was subject to IAEA monitoring, or of the intentions of the Iranian leadership. According to Porter, no systematic analysis was made of the goals of the Iranian nuclear program, and neither U.S. nor Israeli policy makers devoted any thought to why all of Iran’s official declarations on the subject were in line with the Treaty on the Non-Proliferation of Nuclear Weapons.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
A year after Obama laid out new conditions for drone attacks around the world, U.S. forces are failing to comply fully with the rules he set for them: to strike only when there is an imminent threat to Americans and when there is virtually no danger of taking innocent lives. Although Obama promised greater transparency in his speech at the National Defense University, U.S. lawmakers are increasingly critical of the secrecy surrounding the operations. There are growing concerns in Washington that the net effect of the targeted-killing program may be counterproductive. [Obama] is showing no sign of relinquishing what has become his counterterrorism weapon of choice since he took office in 2009. Drones are spreading to new areas ... in far-flung places like Somalia and in Nigeria. "Here we are, a year later, asking 'what has really changed?'" said University of Notre Dame law professor Mary Ellen O'Connell, a leading expert on extrajudicial killings who has testified before U.S. congressional committees. "The drones are still flying and the president still sees the attractiveness of this cold and antiseptic means of killing." Obama's vision of shifting control of the drone program from the shadowy paramilitary arm of the Central Intelligence Agency to the more publicly accountable Pentagon is moving at what one national security source described as a "glacial pace." The Pentagon's Joint Special Operations Command is widely believed to have been behind the December 12 drone strike in a remote part of Yemen that hit a convoy later identified as a wedding procession, killing 15 people.
Note: For more on the expansion of drones in skies worldwide, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. SOMALGET is part of a broader NSA program called MYSTIC, which ... is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The opportunity those in power have to characterise political opponents as "national security threats" or even "terrorists" has repeatedly proven irresistible. In the past decade, the government ... has formally so designated environmental activists, broad swaths of anti-government rightwing groups, anti-war activists, and associations organised around Palestinian rights. One document from the Snowden files, dated 3 October 2012, chillingly underscores the point. It revealed that the agency has been monitoring the online activities of individuals it believes express "radical" ideas and who have a "radicalising" influence on others. Among the information collected about the individuals, at least one of whom is a "US person", are details of their online sex activities and "online promiscuity." The agency discusses ways to exploit this information to destroy their reputations and credibility. The record is suffused with examples of groups and individuals being placed under government surveillance by virtue of their dissenting views and activism – Martin Luther King, the civil rights movement, anti-war activists, environmentalists. The NSA's treatment of Anonymous ... is especially troubling and extreme. Gabriella Coleman, a specialist on Anonymous at McGill University, said that [Anonymous] "is not a defined" entity but rather "an idea that mobilises activists to take collective action and voice political discontent. It is a broad-based global social movement with no centralised or official organised leadership structure. Some have rallied around the name to engage in digital civil disobedience, but nothing remotely resembling terrorism."
Note: This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
When NSA contractor Edward Snowden downloaded tens of thousands of top-secret documents from a highly secure government network, it led to the largest leak of classified information in history — and sparked a fierce debate over privacy, technology and democracy in the post-9/11 world. Now, in "United States Of Secrets," FRONTLINE goes behind the headlines to reveal the dramatic inside story of how the U.S. government came to monitor and collect the communications of millions of people around the world—including ordinary Americans—and the lengths they went to trying to hide the massive surveillance program from the public. “This is as close to the complete picture as anyone has yet put together — and it’s bigger and more pervasive than we thought,” says veteran FRONTLINE filmmaker Michael Kirk. In part one ... Kirk [pieces] together the secret history of the unprecedented surveillance program that began in the wake of September 11 and continues today – even after the revelations of its existence by Edward Snowden. Then, in part two, premiering Tuesday, May 20 ..., veteran FRONTLINE filmmaker Martin Smith continues the story, exploring the secret relationship between Silicon Valley and the National Security Agency, and investigating how the government and tech companies have worked together to gather and warehouse your data. “Through in-depth interviews with more than 60 whistleblowers, elected officials, journalists, intelligence insiders and cabinet officials, we have woven together the secret narrative that reveals the scale and scope of the government’s spying program,” says Kirk.
Note: Don't miss this engaging program, available at this link. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
On Sunday 9 June 2013, the Guardian published the story that revealed [Edward] Snowden to the world. The article told Snowden's story, conveyed his motives, and proclaimed that "Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley [now Chelsea] Manning." We quoted [a note from Snowden that said:] "I understand that I will be made to suffer for my actions … but I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant." The reaction to the article and the video was more intense than anything I had experienced as a writer. Ellsberg himself, writing the following day in the Guardian, proclaimed that "there has not been in American history a more important leak than Edward Snowden's release of NSA material – and that definitely includes the Pentagon Papers 40 years ago". Several hundred thousand people posted the link to their Facebook accounts in the first several days alone. Almost three million people watched the interview on YouTube. Many more saw it on the Guardian's website. The overwhelming response was shock and inspiration at Snowden's courage.
Note: Don't miss the full, exciting story of how Snowden originally came to leak his stunning information at the link above. This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
9/11 [activist] and investigative journalist Michael Ruppert has reportedly committed suicide. The 63-year-old former narcotics investigator with the LAPD shot himself after his radio show, according to an announcement by author Carolyn Baker who was a guest on his final broadcast on [April 13]. Mr Ruppert was famous for his litany of conspiracy theories which encompassed the CIA to drugs, international politics, the oil industry, Wall Street and 9/11. On her Facebook page, Ms Baker wrote: 'This was not a ''fake'' suicide. It was very well planned by Mike who gave us few clues but elaborate instructions for how to proceed without him.' After leaving the LAPD, Mr Ruppert started a website From The Wilderness which claimed to expose government corruption. It included his claims that he had seen drug-dealing at the CIA. Mr Ruppert gained notoriety by confronting then-CIA Director John Deutch during a meeting in 1995 and telling him that he had seen CIA officers involved in drug-dealing. He later claimed on his website that the CIA and American government was involved in 9/11. In 2004, he published Crossing the Rubicon: The Decline of the American Empire at the End of the Age of Oil. The book alleged that former VP Dick Cheney had conspired with Wall Street and other government officials over the September 11 World Trade Center attacks. In 2009, he starred in a documentary called Collapse where he spoke about his theories involving the demise of mankind following the economic and energy crises.
Note: Mike Ruppert was a great hero who courageously reported reliable information the mainstream media would not touch. For a five-minute video of his public testimony on CIA drug running, click here. For a 10-minute video showing his great despair about the condition of the world, click here. Thank you, Mike, for opening the eyes of so many to the deeper realities in our world. Another courageous hero of the 9/11 movement, John Judge, also died, from complications of a stroke, on April 15. For more on his great work, click here. For a great 8-minute video of his revealing powerful information you may not know, click here.
Two news organizations' stories about National Security Agency surveillance, based upon documents leaked by Edward Snowden, have been awarded the Pulitzer Prize for public service, often described as the highest prize in American journalism. The Washington Post and ... The Guardian each received the prize on [April 14]. The recognition of the NSA reporting was most significant because of the questions raised by Snowden's leaks and the reaction to them. Snowden, who has been living in Russia while seeking asylum from U.S. prosecution, said in a statement that the Pulitzer board's recognition of the coverage was "vindication for everyone who believes that the public has a role in government." "We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance." While Snowden provided a trove of documents, reporters including Glenn Greenwald, working for the Guardian; Barton Gellman, working for The Post; and Laura Poitras, who worked with both, pored over the raw information, decided with their editors what parts were ethical to publish, and turned the information into stories that stunned readers around the world.
Note: For more on the historic Snowden revelations, see the deeply revealing reports from reliable major media sources available here.
This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. This sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda. Those programs, carried out in secrecy and with little accountability ... threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.
Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.
It was early December when the Central Intelligence Agency began to suspect it had suffered what it regarded as an embarrassing computer breach. Investigators for the Senate Intelligence Committee, working in the basement of a C.I.A. facility in Northern Virginia, had obtained an internal agency review summarizing thousands of documents related to the agency’s detention and interrogation program. Parts of the C.I.A. report cast a particularly harsh light on the program, the same program the agency was in the midst of defending in a prolonged dispute with the intelligence committee. What the C.I.A. did next opened a new and even more rancorous chapter in the struggle over how the history of the interrogation program will be written. Agency officials began scouring the digital logs of the computer network used by the Senate staff members to try to learn how and where they got the report. Their search not only raised constitutional questions about the propriety of an intelligence agency investigating its congressional overseers, but has also resulted in two parallel inquiries by the Justice Department — one into the C.I.A. and one into the committee. Each side accuses the other of spying on it, with the Justice Department now playing the uneasy role of arbitrator in the bitter dispute. “It’s always been a dicey proposition to be investigating Congress,” said W. George Jameson, a C.I.A. lawyer for decades. “You don’t do it lightly.”
Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
In the early morning hours of February 5, a group of armed men – some dressed in Pakistani police uniforms – appeared at Kareem Khan’s home, awoke him and his family at gunpoint, and took him away in an unmarked vehicle. Khan was hooded, shackled around the wrists and ankles, and driven for hours, eventually arriving at a building where he was thrown into a windowless holding cell. There he stayed for more than a week, during which he was subjected to sensory deprivation and physical abuse. Khan says he was repeatedly beaten on the soles of his feet and threatened with death by his captors. He was kept hooded and shackled for most of the day, and fed only dry bread and water. Khan has no doubts about why he was targeted. He is the first person to attempt a legal challenge to the CIA drone program in Pakistan, after his son and brother were killed in a drone strike near his home in North Waziristan on December 31st 2009. His abduction and detention occurred just over a week before Khan was to travel with [his Pakistani lawyer, Shahzad] Akbar and Jennifer Gibson, a lawyer with the UK-based legal charity Reprieve, to speak with European parliamentarians about the CIA drone program. Among the topics of discussion were the extralegal nature of the program, as well as covert intelligence sharing by European spy agencies. While in captivity, Khan was interrogated by men who refused to identify themselves, and who questioned him repeatedly about his plans to speak with the media and about the cases of others who had been killed by drones. Since the start of the “War on Terror” it has been estimated by local human rights groups that as many as 8,000 Pakistani citizens have been “disappeared” by local intelligence agencies, often at the behest of their American counterparts.
Note: The Intercept is the new media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for their independence. For more on the atrocities committed by the US and UK in the illegal "global war on terror", see the deeply revealing reports from reliable major media sources available here.
A federal judge in Newark has thrown out a lawsuit against the New York Police Department for spying on New Jersey Muslims, saying if anyone was at fault, it was the Associated Press for telling people about it. In his ruling ... U.S. District Court Judge William J. Martini simultaneously demonstrated the willingness of the judiciary to give law enforcement alarming latitude in the name of fighting terror, greenlighted the targeting of Muslims based solely on their religious beliefs, and blamed the media for upsetting people by telling them what their government was doing. The NYPD’s clandestine spying on daily life in Muslim communities in the region — with no probable cause, and nothing to show for it — was exposed in a Pulitzer-Prize winning series of stories by the AP. The stories described infiltration and surveillance of at least 20 mosques, 14 restaurants, 11 retail stores, two grade schools, and two Muslim student associations in New Jersey alone. In a cursory, 10-page ruling issued before even hearing oral arguments, Martini essentially said that what the targets didn’t know didn’t hurt them: "None of the Plaintiffs’ injuries arose until after the Associated Press released unredacted, confidential NYPD documents and articles expressing its own interpretation of those documents. Nowhere in the Complaint do Plaintiffs allege that they suffered harm prior to the unauthorized release of the documents by the Associated Press. This confirms that Plaintiffs’ alleged injuries flow from the Associated Press’s unauthorized disclosure of the documents. The harms are not “fairly traceable” to any act of surveillance."
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone. The former JSOC drone operator ... states that innocent people have “absolutely” been killed as a result. Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. The Obama administration has repeatedly insisted that its operations kill terrorists with the utmost precision. Within the NSA ... a motto quickly caught on at Geo Cell: ‘We Track ’Em, You Whack ’Em.’” In December 2009, utilizing the NSA’s metadata collection programs, the Obama administration dramatically escalated U.S. drone and cruise missile strikes in Yemen. The first strike in the country known to be authorized by Obama targeted an alleged Al Qaeda camp in the southern village of al-Majala. The strike, which included the use of cluster bombs, resulted in the deaths of 14 women and 21 children.
Note: For an in-depth interview on this important topic, click here. Would anyone in a developed country tolerate their citizens being killed by the drones of a foreign government? Note also that The Intercept is the new media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for the their independence.
The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
Sigurdur "Siggi" Thordarson, [is a] cherubic, blond 21-year-old who has been called everything in the [Icelandic] press from "attention seeker" to "traitor" to "psychopath". Four years ago, just as WikiLeaks was winning international notoriety, the then-17-year-old hacking prodigy became Assange's youngest and most trusted sidekick. But as Assange became more embattled and besieged, the protégé turned on his mentor in the most shocking of ways: becoming the first FBI informant inside the group. His tale reveals not only the paranoia and strife within WikiLeaks, but just how far the feds were willing to go to get Assange. The revelation of Siggi's role as an FBI snitch has polarized WikiLeaks insiders. WikiLeaks spokesman Kristinn Hrafnsson [dismissed] Siggi as "a pathological liar." While other WikiLeaks insiders also question Siggi's credibility, they insist that his story can't be discounted, and there's more to it than the organization is letting on. The truth, it seems, may be held in the leaks. Siggi has provided Rolling Stone with more than a terabyte of secret files he claims to have taken from WikiLeaks before he left in November 2011 and gave to the FBI: thousands of pages of chat logs, videos, tapped phone calls, government documents and more than a few bombshells from the organization's most heated years. Whatever their origins, the SiggiLeaks are a deep and revealing portal into one of the most guarded and influential organizations of the 21st century – and the extreme measures its embattled leader is willing to take.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Whenever I read comments by politicians defending the Unmanned Aerial Vehicle Predator and Reaper program – aka drones – I wish I could ask them a few questions. I'd start with: "How many women and children have you seen incinerated by a Hellfire missile?" Few of these politicians who so brazenly proclaim the benefits of drones have a real clue of what actually goes on. I, on the other hand, have seen these awful sights first hand. What the public needs to understand is that the video provided by a drone is not usually clear enough to detect someone carrying a weapon, even on a crystal-clear day. This makes it incredibly difficult for the best analysts to identify if someone has weapons for sure. One example comes to mind: "The feed is so pixelated, what if it's a shovel, and not a weapon?" I felt this confusion constantly, as did my fellow UAV analysts. We always wonder if ... we destroyed an innocent civilian's life all because of a bad image or angle. I know the feeling you experience when you see someone die. Horrifying barely covers it. When you are exposed to it over and over again it becomes like a small video, embedded in your head, forever on repeat, causing psychological pain and suffering. UAV troops are victim to not only the haunting memories of this work that they carry with them, but also the guilt of always being a little unsure of how accurate their confirmations of weapons or identification of hostile individuals were. The UAVs in the Middle East are used as a weapon, not as protection, and as long as our public remains ignorant to this, this serious threat to the sanctity of human life – at home and abroad – will continue.
Note: For more on war crimes committed by the US and UK in the illegal "global war on terror", see the deeply revealing reports from reliable major media sources available here.
National Security Agency leaker Edward Snowden wrote in a lengthy “open letter to the people of Brazil” that he has been inspired by the global debate ignited by his release of thousands of documents and that the NSA’s culture of indiscriminate global espionage “is collapsing.” In the letter, Snowden commended the Brazilian government for its strong stand against U.S. spying. He wrote that he would be willing to help the South American nation investigate NSA spying on its soil but could not fully participate in doing so without being granted political asylum, because the U.S. “government will continue to interfere with my ability to speak.” The documents revealed that Brazil is the top NSA target in Latin America, in spying that has included the monitoring of Brazilian President Dilma Rousseff’s cellphone and hacking into the internal network of the state-run oil company Petrobras. In his letter, Snowden dismissed U.S. explanations to the Brazilian government and others that the bulk metadata gathered on billions of e-mails and calls was more “data collection” than surveillance. “There is a huge difference between legal programs, legitimate spying ... and these programs of dragnet mass surveillance that put entire populations under an all-seeing eye and save copies forever,” he wrote. “These programs were never about terrorism: they’re about economic spying, social control, and diplomatic manipulation. They’re about power.” Brazilian senators have asked for Snowden’s help during hearings about the NSA’s targeting of Brazil, an important transit hub for transatlantic fiber-optic cables that are hacked.
Note: To read Snowden's full, inspiring letter, click here.
The battle between the U.S. and the Soviet Union during the Cold War, for technological and scientific one-upmanship, included a costly effort that involved the two superpowers' attempts to develop mind-control weapons, according to a new study. A blog post at the Physics arXiv Blog, citing a new paper by researcher Serge Kernbach, said that both the U.S. and the Soviet Union experimented with parapsychology, mind control and remote influence. And, while some of the work conducted by the U.S. on these topics is now public, much less is known about the Soviet body of knowledge, which reportedly cost about a billion dollars to gather. “The Soviets had a similar program. This included experiments in parapsychology, which the Soviets called psychotronics,” the blogpost said. “The work built on a long-standing idea in Soviet science that the human brain could receive and transmit a certain kind of high frequency electromagnetic radiation and that this could influence other objects too.” Kernbach provided an overview of the Soviet Union’s efforts in unconventional research between 1917 and 2003, [based] on publications in Russian technical journals and recently declassified documents. The U.S. developed a 20-year CIA program, called Project MKULTRA, which began in the early 1950s to study ways of manipulating people’s minds and altering their brain functions. The Soviets too focused on a similar program and developed a device called a "cerpan" that could generate and store high-frequency electromagnetic radiation produced by the human brain in hopes of influencing other objects.
Note: For an excellent two-page summary of reliable information on secret government mind control programs, click here. For more on mind control research and operations by the CIA, see the deeply revealing reports from reliable major media sources available here.
A participant in a White House-sponsored review of surveillance activities described as “shameful” an apparent decision to leave most of the National Security Agency’s controversial bulk spying intact. Sascha Meinrath, director of the Open Technology Institute, said [on December 13] that ... “The review group was searching for ways to make the most modest pivot necessary to continue business as usual.” Should the review group’s report resemble descriptions that leaked ... the report “does nothing to alter the lack of trust the global populace has for what the US is doing, and nothing to restore our reputation as an ethical internet steward,” said Meinrath, who met with the advisory panel and White House officials twice to discuss the bulk surveillance programs that have sparked international outrage. Leaks about the review group’s expected recommendations to the New York Times and Wall Street Journal strengthened Meinrath and other participants’ long-standing suspicions that much of the NSA’s sweeping spy powers would survive. The Times quoted an anonymous official familiar with the group saying its report “says we can’t dismantle these programs, but we need to change the way almost all of them operate”. According to the leaks, the review group will recommend that bulk collection of every American’s phone call data continue, possibly by the phone companies instead of the NSA, with tighter restrictions than the “reasonable, articulable suspicion” standard for searching through them that the NSA currently employs.
Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency isn't the only government entity secretly collecting data from people's cellphones. Local police are increasingly scooping it up, too. Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information about thousands of cellphone users at a time, whether they are targets of an investigation or not. The records, from more than 125 police agencies in 33 states, reveal [that] about one in four law-enforcement agencies have used a tactic known as a "tower dump," which gives police data about the identity, activity and location of any phone that connects to the targeted cellphone towers over a set span of time, usually an hour or two. A typical dump covers multiple towers, and wireless providers, and can net information from thousands of phones. At least 25 police departments own a Stingray, a suitcase-size device that costs as much as $400,000 and acts as a fake cell tower. The system, typically installed in a vehicle so it can be moved into any neighborhood, tricks all nearby phones into connecting to it and feeding data to police. In some states, the devices are available to any local police department via state surveillance units. Organizations such as the American Civil Liberties Union and Electronic Privacy Information Center say the swelling ability by even small-town police departments to easily and quickly obtain large amounts of cellphone data raises questions about the erosion of people's privacy as well as their Fourth Amendment protections against unreasonable search and seizure.
Note: For more on massive government intrusions of citizens' privacy, see the deeply revealing reports from reliable major media sources available here.
Canada allowed the U.S. National Security Agency (NSA) to conduct widespread surveillance during the 2010 Group of 20 summit in Toronto, according to a media report that cited documents from former NSA contractor Edward Snowden. The report by the Canadian Broadcasting Corp ... cited briefing notes it said showed the United States turned its Ottawa embassy into a security command post during a six-day spying operation by the top-secret U.S. agency as President Barack Obama and other world leaders met that June. One of the bylines on the CBC report was Glenn Greenwald, the U.S. journalist who has worked with Snowden on several other NSA stories. CBC ... quoted an NSA briefing note describing the operation as "closely coordinated with the Canadian partner". The Canadian equivalent of the NSA is the Communications Security Establishment Canada, or CSEC. CBC said the documents did not reveal the targets of the NSA operation, but described part of the U.S. eavesdropping agency's mandate at the Toronto summit as "providing support to policymakers". CSEC, which has a very low public profile, employs about 2,000 people. It is part of the so-called Five Eyes intelligence-sharing network that also includes the United States, Britain, New Zealand and Australia. Last month, Brazil angrily demanded an explanation for media reports which said CSEC agents had targeted its mines and energy industry.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Much has been made of Bobby Kennedy’s impossible burden following the assassination of his brother. A review of [documents released as recently as a few months ago] by the Globe, fortified by the work of historians and new interviews with former Kennedy aides, paints a picture of a brother responding to the assassination with equal parts crippling grief and growing suspicions. In the five years between his brother’s murder and his own assassination in 1968, Bobby Kennedy voiced public support for the findings of the Warren Commission, namely that a pathetic, attention-seeking gunman had alone been responsible for the murder of President Kennedy. Privately, though, Bobby was dismissive of the commission, seeing it ... as a public relations tool. After hearing the news out of Dallas, it’s clear that he quickly focused his attention on three areas of suspicion: Cuba, the Mafia, and the CIA. Crucially, Bobby had become his brother’s point man in managing all three of those highly fraught portfolios. And by the time the president was gunned down, Bobby understood better than anyone how all three had become hopelessly interwoven, and how much all three bore his own imprint. For while John Kennedy was the one gunned down, Bobby had reason to believe he may have been the ultimate target. Walking the grounds of Hickory Hill just an hour after receiving confirmation of his brother’s death, Bobby confided in an aide something truly unsettling. That aide, Edwin Guthman, would later recount it in his book “We Band of Brothers.” “I thought they would get one of us,” Bobby said, adding, “I thought it would be me.”
Note: In 2006, BBC reported that CIA operatives were directly involved in Robert Kennedy's assassination, and that Sirhan Sirhan may have been a programmed Manchurian Candidate. For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.
The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden. In the first explicit confirmation that UK citizens have been caught up in US mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo ... says the material is being put in databases where it can be made available to other members of the US intelligence and military community. Until now, it had been generally understood that the citizens of each country were protected from surveillance by any of the others. But the Snowden material reveals that: • In 2007, the rules were changed to allow the NSA to analyse and retain any British citizens' mobile phone and fax numbers, emails and IP addresses swept up by its dragnet. • These communications were "incidentally collected" by the NSA, meaning the individuals were not the initial targets of surveillance operations and therefore were not suspected of wrongdoing. • The NSA has been using the UK data to conduct so-called "pattern of life" or "contact-chaining" analyses, under which the agency can look up to three "hops" away from a target of interest – examining the communications of a friend of a friend of a friend. Three hops for a typical Facebook user could pull the data of more than 5 million people into the dragnet.
Note: For more on government threats to privacy, see the deeply revealing reports from reliable major media sources available here.
A secret court order that authorised a massive trawl by the National Security Agency of Americans' email and internet data was published for the first time on [November 18], among a trove of documents that also revealed a judge's concern that the NSA "continuously" and "systematically" violated the limits placed on the program. Another later court order found that what it called "systemic overcollection" had taken place. In a heavily redacted opinion Colleen Kollar-Kotelly, the former presiding judge of the FISA court, placed legal weight on the methods of surveillance employed by the NSA, which had never before collected the internet data of “an enormous volume of communications”. The methods, known as pen registers and trap-and-trace devices, record the incoming and outgoing routing information of communications. Kollar-Kotelly ruled that acquiring the metadata, and not the content, of email and internet usage in bulk was harmonious with the “purpose” of Congress and prior court rulings – even though no surveillance statute ever authorized it and top officials at the Justice Department and the FBI threatened to resign in 2004 over what they considered its dubious legality. The type of data collected under the program included information on the "to", "from" and "bcc" lines of an email rather than the content. Metadata, wrote Kollar-Kotelly, enjoyed no protection under the fourth amendment to the US constitution, a precedent established by the Supreme Court in 1979 in a single case on which the NSA relies currently.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The fifty years since the assassination of John F. Kennedy have done little to quell the public's interest or skepticism about who killed the president. In 1978 ... the House of Representatives Select Committee on Assassinations found that in addition to Oswald, there likely was a second gunman who fired at the president's motorcade. The commission concluded that the gunmen were part of a "conspiracy," without determining exactly who was behind it, opening the door to five decades and a cottage industry of theories. According to a 2003 ABC News Poll, 70 percent of Americans believe Kennedy's death was "the result of a plot, not the act of a lone killer." Fifty-one percent believe Oswald did not act alone, and 7 percent believe Oswald was not involved at all in the assassination. In the years since Kennedy's death more than 2,000 books have been written about the assassination, many of which espouse one or more conspiracy theories. In nearly every theory that involves American conspirators, be they wealthy industrialists or tough-as-nails mafiosi, one group is routinely represented – the CIA. One theory suggests that Oswald was a CIA operative and agents tampered with his FBI file before and after the investigation to make it appear he was a communist and lone wolf. [Another theory claims President Lyndon] Johnson was aided in the plot by another man who would become president, George H.W. Bush, a burgeoning CIA official who happened to be in Dallas on the day of the assassination.
Note: On the 50th anniversary of the Kennedy assassination see our powerful JFK assassination information center and the best videos and news articles on the topic. For an astonishing History Channel Video in which the attorney for Lyndon Johnson states he has no doubt Johnson was involved in the assassination, click here.
Doctors and psychologists working for the US military violated the ethical codes of their profession under instruction from the defence department and the CIA to become involved in the torture and degrading treatment of suspected terrorists, an investigation has concluded. The report of the Taskforce on Preserving Medical Professionalism in National Security Detention Centres concludes that after 9/11, health professionals working with the military and intelligence services "designed and participated in cruel, inhumane and degrading treatment and torture of detainees". The report lays blame primarily on the defence department (DoD) and the CIA, which required their healthcare staff to put aside any scruples in the interests of intelligence gathering and security practices that caused severe harm to detainees, from waterboarding to sleep deprivation and force-feeding. The two-year review by the 19-member taskforce, Ethics Abandoned: Medical Professionalism and Detainee Abuse in the War on Terror, supported by the Institute on Medicine as a Profession (IMAP) and the Open Society Foundations, says that the DoD termed those involved in interrogation "safety officers" rather than doctors. Doctors and nurses were required to participate in the force-feeding of prisoners on hunger strike, against the rules of the World Medical Association and the American Medical Association. Doctors and psychologists working for the DoD were required to breach patient confidentiality and share what they knew of the prisoner's physical and psychological condition with interrogators, and were used as interrogators themselves.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The United States is facing increasingly harsh criticism over its use of lethal drone strikes to target suspected terrorists. American drone strikes in Pakistan and Yemen may amount to war crimes, according to a pair of reports released by international human rights groups. Examining nine drone strikes in Pakistan, the Amnesty International report concludes that the attacks killed large numbers of innocent civilians, and accuses the U.S. of targeting rescuers who arrive in the aftermath of the strikes to aid the wounded. A report from Human Rights Watch states that the majority of people killed by six drone strikes in Yemen were civilians (57 out of the 82 killed). The groups’ findings that the United States has killed more civilians than it has admitted are bolstered by a UN report ... that stated U.S. drone strikes had killed as many as 400 civilians in Pakistan and almost 60 in Yemen. These reports clash with the U.S. government’s own assessment of the strikes. Officials have maintained that civilian casualties from drone strikes are minimal, even in the face of multiple third-party evaluations that state otherwise. Both groups are demanding that the Obama administration investigate allegations of civilian deaths, release more information about the legal basis for drone strikes on suspected terrorists, provide restitution to those unjustly harmed and reveal the identities of those who lost their lives in the attacks.
Note: If a single civilian in the US were killed by a foreign drone, the entire nation would be up in arms. Do we have a double standard here? For more on this, see concise summaries of deeply revealing war atrocities news articles from reliable major media sources.
Edward J. Snowden, the former National Security Agency contractor, said in an extensive interview this month that he did not take any secret N.S.A. documents with him to Russia when he fled there in June, assuring that Russian intelligence officials could not get access to them. He also asserted that he was able to protect the documents from China’s spies because he was familiar with that nation’s intelligence abilities, saying that as an N.S.A. contractor he had targeted Chinese operations and had taught a course on Chinese cybercounterintelligence. “There’s a zero percent chance the Russians or Chinese have received any documents,” he said. Mr. Snowden added that inside the spy agency “there’s a lot of dissent.” But he said that people were kept in line through “fear and a false image of patriotism,” which he described as “obedience to authority.” He said he believed that if he tried to question the N.S.A.’s surveillance operations as an insider, his efforts “would have been buried forever,” and he would “have been discredited and ruined.” Mr. Snowden said he finally decided to act when he discovered a copy of a classified 2009 inspector general’s report on the N.S.A.’s warrantless wiretapping program during the Bush administration. After reading about the program, which skirted the existing surveillance laws, he concluded that it had been illegal, he said. “If the highest officials in government can break the law without fearing punishment or even any repercussions at all,” he said, “secret powers become tremendously dangerous.”
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials. The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor. The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners. Almost everything about the agency’s operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nation’s intelligence court or any public debate.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
This week Elise Jordan, wife of famed journalist Michael Hastings, who recently died under suspicious circumstances, corroborated this reporter's sources that CIA Director John Brennan was Hastings next exposé project. Last month a source provided San Diego 6 News with an alarming email hacked from super-secret CIA contractor Stratfor’s President Fred Burton. The email was posted on WikiLeaks and alleged that then Obama counter-terrorism czar Brennan was in charge of the government's continued crackdown or witch-hunt on investigative journalists. The release of a new surveillance video from a nearby Italian restaurant by Michael Krikorian, an author, freelance blogger who also writes for LA Weekly, reveals a lot of information about Hastings’ final seconds. A University professor told San Diego 6 News that calculating the speed of Hastings car follows a simple mathematic equation. By using the video and the distance traveled (195 feet) as well as the seconds that lapsed prior to the explosion – the car was traveling roughly 35 mph. That revelation is important because Jose, an employee [at] a nearby business and a witness to the accident told KTLA ... the car was traveling at a high rate of speed and he saw sparks coming from the car and saw it explode before hitting the tree. The pre-explosion could possibly explain the flash of light on the video that preceded the appearance of the car in the video. The pre-explosion and slower speed could also explain the minimal damage to the palm tree. It also provides an explanation for the location of the engine and drive train at more than 100 feet from the tree impact area.
Note: Michael Hastings' wife Elise Jordan, in the interview at the first link in the text above, said that his research into CIA Director Brennan will be published soon in Rolling Stone. For further analysis of these revelations, click here. For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin—not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence—information that could reveal entrapment, mistakes or biased witnesses. "I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers. "It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
Glenn Greenwald – the reporter who broke the story about the National Security Agency’s surveillance programs – claimed that those NSA programs allowed even low-level analysts to search the private emails and phone calls of Americans. “The NSA has trillions of telephone calls and emails in their databases that they’ve collected over the last several years,” Greenwald told ABC News’ George Stephanopoulos. “All an analyst has to do is enter an email address or an IP address, and [the program] searches that database and lets them listen to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you’ve entered.” Greenwald explained that ... these programs still allow analysts to search through data with little court approval or supervision. Greenwald said "these systems allow analysts to listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it’s all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst,” he added. Greenwald said the existence of these analyst search programs are in line with the claims of Edward Snowden, who first leaked details of the NSA’s surveillance programs last month. “It’s an incredibly powerful and invasive tool, exactly of the type that Mr. Snowden described,” Greenwald said. “NSA officials are going to be testifying before the Senate on Wednesday, and I defy them to deny that these programs work exactly as I just said,” Greenwald said.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
A former CIA officer has broken the U.S. silence around the 2003 abduction of a radical Islamist cleric in Italy, charging that the agency inflated the threat the preacher posed and that the United States then allowed Italy to prosecute her and other Americans to shield President George W. Bush and other U.S. officials from responsibility for approving the operation. Confirming for the first time that she worked undercover for the CIA in Milan when the operation took place, Sabrina De Sousa provided new details about the “extraordinary rendition” that led to the only criminal prosecution stemming from the secret Bush administration rendition and detention program launched after the Sept. 11, 2001, attacks. The cleric, Osama Mustapha Hassan Nasr, was snatched from a Milan street by a team of CIA operatives and flown to Egypt, where he was held for the better part of four years without charges and allegedly tortured. An Egyptian court in 2007 ruled that his imprisonment was “unfounded” and ordered him released. Among the allegations made by De Sousa in a series of interviews with McClatchy: – The former CIA station chief in Rome, Jeffrey Castelli, whom she called the mastermind of the operation, exaggerated Nasr's terrorist threat to win approval for the rendition and misled his superiors [to believe] that Italian military intelligence had agreed to the operation. – Senior CIA officials, including then-CIA Director George Tenet, approved the operation even though Nasr wasn’t wanted in Egypt and wasn’t on the U.S. list of top al Qaida terrorists. – Condoleezza Rice, then the White House national security adviser, ... agreed to it and recommended that Bush approve the abduction.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
As the 50th anniversary of the 1963 March on Washington approaches ... where Martin Luther King Jr gave his famous "I have a dream" speech, it is important to recall the extent to which King was targeted by the government. The FBI operation against King is one of the most shameful episodes in the long history of our government's persecution of dissenters. In a heavily redacted, classified FBI memo dated 4 January 1956 – just a little more than a month after Rosa Parks was arrested for refusing to give up her seat on a bus to a white passenger – stated that an agent "had been assigned ... to find out all he could about Reverend Martin L King, colored minister in Montgomery and leader in the bus boycott … to uncover all the derogatory information he could about King." [FBI] director, J Edgar Hoover ... was deploying the vast resources he controlled against any and all perceived critics of the United States. The far-reaching clandestine surveillance, infiltration and disruption operation Hoover ran was dubbed "COINTELPRO", for counterintelligence program. The FBI's COINTELPRO activities ... were thoroughly investigated in 1975 by the Church Committee, [which] reported that the FBI "conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of first amendment rights of speech and association." Among COINTELPRO's perverse activities was an FBI effort to threaten Martin Luther King Jr with exposure of an alleged extramarital affair, including the suggestion, made by the FBI to King, that he avoid embarrassment by killing himself. Deeply concerned about the crackdown on dissent happening under Obama, scholar Cornel West ... wondered if [King] "would not be invited to the very march in his name."
Note: This article fails to mention a key fact. At a 1999 court trial held in Memphis, the family of Rev. King accused elements of the U.S. government of complicity in King's death. After one month of hearings from 70 witnesses, a jury composed of six white and six black jurors took only one hour to find the U.S. government, the state of Tennessee, the city of Memphis, the Memphis police, and several individuals guilty of murdering King. Yet the mainstream media completely boycotted this trial. Thankfully, CBC (Canada's PBS) gave it some coverage. To see a six-minute CBC clip of this highly revealing trial, click here.
A Florida medical examiner’s office said [on July 16] that the FBI has ordered the office not to release its autopsy report of a Chechen man fatally shot by a Boston FBI agent in May. The medical examiner’s office said it completed the autopsy report on Ibragim Todashev, a friend of [a] suspected Boston Marathon bomber, on July 8 and that the report was “ready for release.” The agent shot and killed Todashev on May 22 in his Orlando apartment during an interrogation related to the Boston Marathon bombings. Critics have called for an independent inquiry, questioning the blanket of secrecy surrounding the case. The FBI and the Massachusetts State Police sought out Todashev after the Marathon bombings, but have refused to release details of the shooting. Media reports have provided conflicting accounts: Some said Todashev attacked the agent with a blade during an interrogation, while others said Todashev was unarmed. Another said he lunged at the agent with a metal pole or a broomstick. The agent shot Todashev multiple times, according to family members who released photos of Todashev’s dead body as part of their call for an inquiry into his death. Family members and advocacy groups have questioned the media accounts, pointing out that Todashev had repeatedly cooperated with the FBI. The Council on American-Islamic Relations and the ACLU have called for independent inquiries into the shooting. According to CAIR in Florida, which is conducting its own investigation into Todashev’s slaying, Todashev had spoken to the FBI at least three times at their offices after the Marathon bombings.
Note: What are they hiding here?
Members of a congressional committee [on July 10] accused the FBI of stalling an inquiry into the Boston Marathon bombings, saying the bureau had no grounds for withholding what it knew about Tamerlan Tsarnaev prior to the attacks. “The information requested by this committee belongs to the American people,’’ said Representative Michael McCaul, a Texas Republican who chairs the House Homeland Security Committee. “It does not belong solely to the FBI.” The frustrations, aired publicly after FBI officials rebuffed an invitation to appear before the committee, stemmed from the FBI’s unwillingness to detail how it handled a security review of Tsarnaev nearly two years before the Marathon bombings. “The FBI continues to refuse this committee’s appropriate requests for information and documents crucial to our investigation into what happened in Boston,” McCaul declared as he opened a committee hearing. Tsarnaev died after a firefight with police in Watertown within hours of being identified as a suspect. Members were particularly frustrated by a July 3 letter to the committee from the FBI. The letter, reviewed by the Globe, said the bureau would not be responding to all the committee’s requests for information. “The fact that the FBI is not sharing information with this committee with jurisdiction over homeland security I think is just totally unacceptable,” said Representative Peter King, a New York Republican.
Note: For more strangeness around the Boston bombing with a key witness being deported, click here. For more on the realities of intelligence agency manipulations, see the deeply revealing reports from reliable major media sources available here.
South America's leftist leaders rallied to support Bolivian President Evo Morales after his plane was rerouted amid suspicions that NSA leaker Edward Snowden was on board and they demanded an apology from France, Italy, Portugal and Spain. The presidents of Argentina, Ecuador, Suriname, Venezuela and Uruguay joined Morales in the Bolivian city of Cochabamba ... to denounce the treatment of Morales, who warned that he would close the U.S. Embassy in Bolivia if necessary. Morales again blamed Washington for pressuring European countries to refuse to allow his plane to fly through their airspace on Tuesday, forcing it to land in Vienna, Austria, in what he called a violation of international law. He had been returning from a summit in Russia during which he had suggested he would be willing to consider a request from Snowden for asylum. Spanish Foreign Minister Jose Manuel Garcia-Margallo said Friday that his nation and other European countries were told Snowden was aboard the Bolivian presidential plane. He did not say who supplied the information and declined to say whether he had been in contact with the United States. Ecuadorean President Rafael Correa said that he and other leaders were offering full support to Morales following the rerouting of the plane, calling it an aggression against the Americas. Venezuelan President Nicolas Maduro protested alleged attempts by Spanish officials to search the Bolivian presidential plane and accused the CIA of encouraging several European countries to deny the presidential plane their airspace.
Note: The subservience of European governments to the US attempt to apprehend Snowden by forcing Pres. Morales' plane down is logical given the recent revelations that they are also engaging in total surveillance of their own populations. For information on this click here (France), here (the UK), and here (Germany).
Have you noticed anything missing in the political discourse about the National Security Administration's unprecedented mass surveillance? There's at least been some conversation about the intelligence community's potential criminality and constitutional violations. But there have only been veiled references to how cash undoubtedly tilts the debate against those who challenge the national security state. Those indirect references have come in stories about Booz Allen Hamilton, the security contractor that employed Edward Snowden. CNN/Money notes that 99 percent of the firm's multibillion-dollar annual revenues now come from the federal government. Those revenues are part of a larger and growing economic sector within the military-industrial complex - a sector that, according to author Tim Shorrock, is "a $56 billion-a-year industry." Yet few in the Washington press corps mention that politicians' attacks on surveillance critics may have nothing to do with principle and everything to do with shilling for campaign donors. For a taste of what that kind of institutionalized corruption looks like, peruse the Influence Explorer site to see how much Booz Allen Hamilton and its parent company, the Carlyle Group, spend. As you'll see, from Barack Obama to John McCain, many of the politicians publicly defending the surveillance state have taken huge sums of money from the firms. Simply put, there are corporate forces with a vested financial interest in making sure the debate over security is tilted toward the surveillance state and against critics of that surveillance state.
Note: Tim Shorrock, quoted above, is the author of Spies for Hire: The Secret World of Intelligence Outsourcing.
Four Central Intelligence Agency officers were embedded with the New York Police Department in the decade after Sept. 11, 2001, including one official who helped conduct surveillance operations in the United States, according to a newly disclosed C.I.A. inspector general’s report. That officer believed there were “no limitations” on his activities, the report said, because he was on an unpaid leave of absence, and thus exempt from the prohibition against domestic spying by members of the C.I.A. Another embedded C.I.A. analyst — who was on its payroll — said he was given “unfiltered” police reports that included information unrelated to foreign intelligence, the C.I.A. report said. The once-classified review, completed by the C.I.A. inspector general in December 2011, found that the four agency analysts — more than had previously been known — were assigned at various times to “provide direct assistance” to the local police. The report also raised a series of concerns about the relationship between the two organizations. The C.I.A. inspector general, David B. Buckley, found that the collaboration was fraught with “irregular personnel practices,” that it lacked “formal documentation in some important instances,” and that “there was inadequate direction and control” by agency supervisors. The declassification of the executive summary, in response to a Freedom of Information Act suit, comes ... comes amid lawsuits against the Police Department alleging unconstitutional surveillance of Muslim communities and mosques in New Jersey and New York.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
FBI Director Robert Mueller acknowledged [to the Senate Judiciary Committee on June 19 that] the law enforcement agency uses drone aircraft in the United States for surveillance. He did not say how many unmanned surveillance vehicles (UAVs) the FBI has or how often they have been used. But a law enforcement official told CNN the FBI has used them a little more than a dozen times but did not say when that started. The official said drones are useful in hostage and barricade situations because they operate more quietly and are less visible than traditional aircraft such as helicopters. Bureau spokesman Paul Bresson said their use allows "us to learn critical information that otherwise would be difficult to obtain without introducing serious risk to law enforcement personnel." Bresson said the aircraft can only be used to perform surveillance on stationary subjects and the FBI must first get approval from the Federal Aviation Administration to fly in a "very confined geographic area." Senate Intelligence Committee Chairman Dianne Feinstein expressed concern over drone use domestically. "I think the greatest threat to the privacy of Americans is the drone and the use of the drone, and the very few regulations that are on it today and the booming industry of commercial drones," the California Democrat said. The FAA forecasts some 10,000 civilian drones will be in use in the United States within five years, including those for law enforcement and commercial purposes.
Note: For more on domestic US drone surveillance, click here. For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here.
During the weeks before he was killed in a car crash in Los Angeles, reporter Michael Hastings was researching a story about a privacy lawsuit brought by Florida socialite Jill Kelley against the Department of Defense and the FBI. Hastings, 33, was scheduled to meet with a representative of Kelley next week in Los Angeles to discuss the case, according to a person close to Kelley. Hastings wrote for Rolling Stone and the website BuzzFeed. The story about Kelley, Broadwell and the Petraeus affair would have been consistent with topics that Hastings has focused on during his reporting career, including his 2010 Rolling Stone profile of Gen. Stanley McChrystal, the top American commander in Afghanistan, which led to McChrystal's resignation. The story described the disdain that the general's staff had for President Obama and Vice President Joe Biden. Since Hastings' death early Tuesday, wild conspiracy theories have bloomed on the Internet, implying that he was murdered by powerful forces wanting to silence him. On Wednesday night, the antisecrecy website WikiLeaks [published] a message on Twitter that Hastings had contacted a lawyer for the organization hours before his car smashed into a tree on North Highland Avenue in Los Angeles. The message read: "Michael Hastings contacted WikiLeaks lawyer Jennifer Robinson just a few hours before he died, saying that the FBI was investigating him."
Note: For a more in-depth article in New York Magazine raising serious questions, click here. Among other key evidence, the article quotes an automotive writer saying that the fire caused by the crash was virtually impossible. A U.S. News & World Report article also states, "researchers at the University of Washington and the University of California, San Diego, proved that computers could be hacked with either physical access to the car or wirelessly using technology such as Bluetooth. A hacker could then disable the brakes, stop the engine, or worse." A revealing video shows the engine was thrown 50 yards from the car.
Former investigators of the 1996 TWA Flight 800 crash are urging the National Transportation Safety Board to reopen its review of the nearly 17-year-old case. In a new documentary about the crash that is scheduled to air next month, several former investigators on the case suggest that missiles brought down the New York-to-Paris plane, killing 230 people when it exploded near Long Island just minutes after it took off. This new evidence could resurrect conspiracy theories that began circulating within days of the crash. However, the NTSB concluded after four years investigating the crash that the plane's center fuel tank exploded "most likely" from a short circuit, ruling out the possibility of a missile, according to the board's report. But the retired investigators claim that those findings were "falsified." "Early on in the investigation there was indication that the evidence was being tampered with," said Hank Hughes, a former senior accident investigator with NTSB, during a conference call with reporters. Hughes and others cited possible missing parts of the plane, possible explosive material and other findings that could corroborate their theory that a missile came from the north. The documentary's co-producer Tom Stalcup told CNN that the film offers "solid proof that there was an external detonation," and that a number of people have come forward confirming these claims.
Note: For powerful evidence from an Emmy-award winning journalist that this investigation was manipulated, click here. To watch the powerful documentary Shadows of Liberty on major media manipulation, including that of TWA flight 800 (minute 14) at this link.
When a National Security Agency contractor revealed top-secret details this month on the government's collection of Americans' phone and Internet records, one select group of intelligence veterans breathed a sigh of relief. Thomas Drake, William Binney and J. Kirk Wiebe belong to a select fraternity: the NSA officials who paved the way. For years, the three whistle-blowers had told anyone who would listen that the NSA collects huge swaths of communications data from U.S. citizens. They had spent decades in the top ranks of the agency, designing and managing the very data-collection systems they say have been turned against Americans. When they became convinced that fundamental constitutional rights were being violated, they complained first to their superiors, then to federal investigators, congressional oversight committees and, finally, to the news media. They have been investigated as criminals and forced to give up careers, reputations and friendships built over a lifetime. Today, they feel vindicated. They say the documents leaked by Edward Snowden, the 29-year-old former NSA contractor who worked as a systems administrator, proves their claims of sweeping government surveillance of millions of Americans not suspected of any wrongdoing. They say those revelations only hint at the programs' reach. On [June 15], USA TODAY brought Drake, Binney and Wiebe together for the first time since the story broke to discuss the NSA revelations. With their lawyer, Jesselyn Radack of the Government Accountability Project, they weighed their implications and their repercussions.
Note: See the link above for a great interview of these courageous whistleblowers. For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here
Senior State Department and Diplomatic Security officials may have covered up or stopped investigations of inappropriate or even criminal misconduct by staff, according to an internal memo from the department's Office of the Inspector General. An active U.S. ambassador "routinely ditched his protective security detail in order to solicit sexual favors from both prostitutes and minor children," the memo says. The ambassador's protective detail and others "were well aware of the behavior," the memo asserts. When a diplomatic security officer tried to investigate, undersecretary of state for management Patrick Kennedy allegedly ordered the investigator "not to open a formal investigation." A State Department security official in Beirut allegedly "engaged in sexual assaults" against foreign nationals working as embassy guards. The security official ... was also accused of committing "similar assaults during assignments in Baghdad, and possibly Khartoum and Monrovia." An inspector general's investigator who went to Beirut to try to conduct an investigation was not given enough time to complete the job. U.S. Rep. Ed Royce, R-California, chairman of the House Foreign Affairs Committee, said he has asked his staff to begin an investigation into the allegations, and sent a letter to Secretary of State John Kerry demanding an explanation. "The notion that any or all of these cases would not be investigated thoroughly by the Department is unacceptable," Royce wrote in his letter to Kerry.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
What if government officials have written laws that apply only to us and not to them? What if we gave them the power to protect our freedoms and our safety and they used that power to trick and trap some of us? What if government officials broke the laws we hired them to enforce? What if they prosecuted others for breaking the same laws they broke? What if the government enacted a law making it a crime to provide material assistance to terrorist organizations? What if the government looked at that law and claimed it applied to a dentist or a shopkeeper who sold services or goods to a terrorist organization, and not just to financiers and bomb makers? What if the Supreme Court ruled that the law is so broad that it covers backslapping, advocacy and free speech? What if the law is so broad that it punishes ideas and the free expression of those ideas, even if no one is harmed thereby? What if FBI agents pretended to be members of these terrorist organizations and set out to find people in America who were willing to join? What if the FBI arrested the people it found and encouraged just as they were about to leave the U.S. and then charged them with providing material assistance to terrorist organizations? What if the president boasted that in his mind these duped dopes were really terrorists and their arrests kept us all safer? What if offensive wars are illegal and morally wrong? What if killing is evil when not done in self-defense? What if those who kill not in self-defense are prosecuted and punished, except when they do so in large numbers and to the sounds of trumpets blaring? What do we do about a government that breaks the laws we have hired it to enforce?
Note: Andrew P. Napolitano, author of this opinion, is the senior judicial analyst at Fox News Channel. Judge Napolitano has written seven books on the U.S. Constitution. His latest is Theodore and Woodrow: How Two American Presidents Destroyed Constitutional Freedom.
The initial debate over the treatment of Dzhokhar Tsarnaev focused on whether he should be advised of his Miranda rights or whether the "public safety exception" justified delaying it. Now, the Los Angeles Times ... reports something which, if true, would be a much more serious violation of core rights than delaying Miranda warnings - namely, that ... Tsarnaev had repeatedly asked for a lawyer, but the FBI simply ignored those requests, instead allowing the interagency High Value Detainee Interrogation Group to continue to interrogate him alone: "Tsarnaev has not answered any questions since he was given a lawyer and told he has the right to remain silent by Magistrate Judge Marianne B. Bowler on Monday, officials said. Until that point, Tsarnaev had been responding to the interagency High Value Detainee Interrogation Group, including admitting his role in the bombing, authorities said. A senior congressional aide said Tsarnaev had asked several times for a lawyer, but that request was ignored since he was being questioned under the public safety exemption to the Miranda rule." Denying him the right to a lawyer after he repeatedly requests one is ... as fundamental a violation of crucial guaranteed rights as can be imagined. To ignore the repeated requests of someone in police custody for a lawyer, for hours and hours, is just inexcusable and legally baseless. If the LA Times report is true, then it means that the DOJ did not merely fail to advise him of his right to a lawyer but actively blocked him from exercising that right.
Note: The government appears to be setting a precedent in seeing how far they can go with taking away our constitutionally guaranteed rights. For deeply revealing reports from reliable major media sources on civil liberties, click here.
The father of the Boston Marathon bombing suspects said he was present at the family house in Cambridge, Mass., when the FBI interviewed his older son in 2011. Anzor Tsarnaev, speaking ... from Makhachkala in Russia's Republic of Dagestan, said Federal Bureau of Investigation agents came to talk to his older son, Tamerlan, as a "person of interest." "Yes, I was there. Of course I was there," Mr. Tsarnaev said. "It was in Cambridge. 410 Norfolk Street, Cambridge." He said U.S. authorities visited the house for what he described as "prevention" activities that involved Tamerlan. "They said: We know what sites you are on, we know where you are calling, we know everything about you. Everything," Mr. Tsarnaev recalled. "They said we are checking and watching—that's what they said." The father of the pair said he wasn't nervous that the FBI showed up at his home. "I knew what he was doing, where he was going. I raised my children right," he said of his sons. He said he is sure Tamerlan and his brother Dzhokhar must have been framed for the Boston bombing. "This is all lies. These are my children. I know my children," Mr. Tsarnaev said. He said his own brother, Ruslan, called his sons "losers" in an American television interview Friday because of a family feud. Asked if it was possible Tamerlan encountered Muslim fundamentalists while in Dagestan, he said there was no way. "There aren't even any of those here anymore," Mr. Tsarnaev said.
Note: Another article in the UK's respected Independent states, "the men's mother, Zubeidat Tsarnaeva said: 'I am 100% sure that this is a set-up.'" Could this have been yet another case of FBI entrapment like this and this? Or could they even have been programmed to do this using mind control using techniques described at this link? And for a Washington Times article raising more questions on the bombing, click here.
The use of drones by domestic US law enforcement agencies is growing rapidly, both in terms of numbers and types of usage. As a result, civil liberties and privacy groups led by the ACLU ... have been devoting increasing efforts to publicizing their unique dangers and agitating for statutory limits. The belief that weaponized drones won't be used on US soil is patently irrational. Police departments are already speaking openly about how their drones "could be equipped to carry nonlethal weapons such as Tasers or a bean-bag gun." The drone industry has already developed and is now aggressively marketing precisely such weaponized drones for domestic law enforcement use. Domestic weaponized drones will be much smaller and cheaper, as well as more agile - but just as lethal [as the large missile-firing drones used by the US military overseas]. The nation's leading manufacturer of small "unmanned aircraft systems" (UAS) ... is AeroVironment, Inc. (AV). AV is now focused on drone products - such as the "Qube" - that are so small that they can be "transported in the trunk of a police vehicle or carried in a backpack." AV's website ... touts a February, 2013 Defense News article describing how much the US Army loves [its] "Switchblade" [drone]. Time Magazine heralded this tiny drone weapon as "one of the best inventions of 2012", gushing: "the Switchblade drone can be carried into battle in a backpack. It's a kamikaze: the person controlling it uses a real-time video feed from the drone to crash it into a precise target. Its tiny warhead detonates on impact."
Note: This important article also discusses drones used by government agencies such as police for purposes of continuous surveillance. But it misses entirely another major dimension: privately owned and controlled drones, which are becoming dirt cheap and within the reach of virtually anyone. Will the new "DroneWorld" in the making combine the worst features of the Police State with the Wild West?
Sen. Rand Paul, R-Ky., is filibustering the nomination of John Brennan to be director of the CIA, delivering a protracted speech on the Senate floor in protest of the Obama administration's controversial drone program, of which Brennan has been a key architect. Paul, speaking during the debate surrounding Brennan's nomination on the Senate floor, said he would "speak until I can no longer speak" in order to get his point across. "I will speak as long as it takes, until the alarm is sounded from coast to coast that our Constitution is important, that your rights to trial by jury are precious, that no American should be killed by a drone on American soil without first being charged with a crime, without first being found to be guilty by a court," he said. Yesterday, Attorney General Eric Holder clarified to Paul in a letter that the U.S. drone policy does authorize the use of military force on against Americans on U.S. soil in cases of "extraordinary circumstance." Paul, a longstanding opponent of the administration's controversial targeted killing policy, expressed his outrage in a statement following his receipt of the letter and continued that tirade on the floor today. "That Americans could be killed in a cafe in San Francisco or in a restaurant in Houston or at their home in bowling green, Kentucky, is an abomination," Paul said. "I object to people becoming so fearful they gradually give up their rights."
Note: For deeply revealing reports from reliable major media sources on the loss of civil liberties in the US, click here.
Argentina began a long-awaited human rights trial [on March 5] focused on Operation Condor, the 1970s conspiracy launched by Chilean dictator Augusto Pinochet to enlist South America’s dictators in a combined effort to leave no refuge for their leftist critics. The 25 defendants include former Argentine junta leaders Rafael Videla, 87, and Reynaldo Bignone, 85, both already serving life sentences for multiple human rights violations during the 1976-1983 dictatorship. This time, the charges include criminal association, kidnapping and torture. Also on trial is a former Uruguayan army colonel, Manuel Cordero, who allegedly tortured prisoners inside Automotores Orletti, the Buenos Aires repair shop where many captured leftists were taken to be interrogated under orders from their home countries. More than 400 witnesses are expected to be called in the two-year trial, which involves 106 victims from at least four countries who were killed in Argentina. A key piece of evidence is a declassified FBI agent’s cable, sent in 1976, that described in detail the conspiracy to share intelligence and eliminate leftists across South America. The actual conspiracy went further than that: the U.S. government later determined that Chilean agents involved in Condor killed the country’s former ambassador Orlando Letelier and his U.S. aide Ronni Moffitt in Washington, D.C., in September 1976. Operation Condor grew to include the military governments of six countries: Chile, Argentina, Bolivia, Brazil, Paraguay and Uruguay.
Note: For deeply revealing reports from reliable major media sources on US intelligence operations, click here.
The Justice Department "white paper" purporting to authorize Obama's power to extrajudicially execute US citizens was leaked three weeks ago. Since then, the administration - including the president himself and his nominee to lead the CIA, John Brennan - has been repeatedly asked whether this authority extends to US soil, i.e., whether the president has the right to execute US citizens on US soil without charges. In each instance, they have refused to answer. Brennan has been asked the question several times as part of his confirmation process. Each time, he simply pretends that the question has not been asked, opting instead to address a completely different issue. It's really worth pausing to remind ourselves of how truly radical and just plainly unbelievable this all is. What's more extraordinary: that the US Senate is repeatedly asking the Obama White House whether the president has the power to secretly order US citizens on US soil executed without charges or due process, or whether the president and his administration refuse to answer? That this is the "controversy" surrounding the confirmation of the CIA director - and it's a very muted controversy at that - shows just how extreme the degradation of US political culture is.
Note: For a revealing 27-minute documentary on drones which operate in swarms and pose serious ethical questions in both peace and war, click here.
Cyber-threats are the new pretext to justify expansion of power and profit for the public-private National Security State. The Washington Post [reports] "a major expansion of [the Pentagon's] cybersecurity force over the next several years, increasing its size more than fivefold." Specifically, ... "the expansion would increase the Defense Department's Cyber Command by more than 4,000 people, up from the current 900." The Post describes this expansion as "part of an effort to turn an organization that has focused largely on defensive measures into the equivalent of an Internet-era fighting force." This Cyber Command Unit operates under the command of Gen. Keith Alexander, who also happens to be the head of the National Security Agency, the highly secretive government network that spies on the communications of foreign nationals - and American citizens. These activities pose a wide array of serious threats to internet freedom, privacy, and international law that, as usual, will be conducted with full-scale secrecy and with little to no oversight and accountability. And, as always, there is a small army of private-sector corporations who will benefit most from this expansion. The fear-mongering rhetoric from government officials has relentlessly intensified, all devoted to scaring citizens into believing that the US is at serious risk of cataclysmic cyber-attacks from "aggressors". This all culminated when Defense Secretary Leon Panetta, last October, warned of what he called a "cyber-Pearl Harbor". This "would cause physical destruction and the loss of life, an attack that would paralyze and shock the nation and create a profound new sense of vulnerability."
Note: Defense Secretary Panetta's warning of a 'cyber-Pearl Harbor' will surely serve as a reminder for many of the Project for the New American Century's call for a 'new Pearl Harbor' just a few months before 9/11. Is it likely that he was unaware of the baggage such language carries at present? For more on WantToKnow team member Prof. David Ray Griffin's epochal book The New Pearl Harbor, click here.
Recently released FBI files about the Occupy movement do not reveal the kind of dirty tricks J. Edgar Hoover's bureau used against demonstrators in the Bay Area during the '60s, but they present some striking parallels to those dark days and have rightly raised concern among civil libertarians. The records ... show that over the decades the machinery of surveillance remains much the same, even as expanded intelligence powers and technological advances magnify potential abuse. As in the '60s, the FBI reports use sweeping language like "potential terrorist threat" to characterize nonviolent dissent. As then, the bureau exchanges information with a vast network of federal agencies, state and local police, campus cops and corporate security. And once again the FBI is invoking great secrecy. Such activity, Congress found in the '70s, contributed to massive intelligence abuses. The FBI released 99 heavily redacted pages and withheld 288 more in response to a Freedom of Information Act request from the Partnership for Civil Justice Fund, a public-interest legal organization in Washington, D.C. Even while noting Occupy organizers do "not condone the use of violence," the records show that FBI field offices across the nation collected information on the premise [that] the protests posed a potential "terrorist" or "criminal" threat. The bureau shared information on Occupy with police on joint terrorism task forces, which have raised concerns about skirting local surveillance restrictions, and with fusion centers, regional intelligence hubs recently criticized by Congress as violating civil liberties.
Note: The writer of this article, Seth Rosenfeld, is the author of Subversives: The FBI's War on Student Radicals, and Reagan's Rise to Power. For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.
The Federal Bureau of Investigation used counterterrorism agents to investigate the Occupy Wall Street movement, including its communications and planning, according to newly disclosed agency records. The F.B.I. records show that as early as September 2011, an agent from a counterterrorism task force in New York notified officials of two landmarks in Lower Manhattan — Federal Hall and the Museum of American Finance — “that their building was identified as a point of interest for the Occupy Wall Street.” In the following months, F.B.I. personnel around the country were routinely involved in exchanging information about the movement with businesses, local law-enforcement agencies and universities. An October 2011 memo from the bureau’s Jacksonville, Fla., field office was titled Domain Program Management Domestic Terrorist. The memo said agents discussed “past and upcoming meetings” of the movement, and its spread. It said agents should contact Occupy Wall Street activists to ascertain whether people who attended their events had “violent tendencies.” Since the Sept. 11, 2001, attacks, the F.B.I. has come under criticism for deploying counterterrorism agents to conduct surveillance and gather intelligence on organizations active in environmental, animal-cruelty and poverty issues. The records were obtained by the Partnership for Civil Justice Fund, a civil-rights organization in Washington, through a Freedom of Information request to the F.B.I.
Note: For analysis of these amazing documents revealing the use of joint government and corporate counterterrorism structures against peaceful protestors of financial corruption, click here and here. For a Democracy Now! video segment on this, click here.
Thousands of criminal cases at the state and local level may have relied on exaggerated testimony or false forensic evidence to convict defendants of murder, rape and other felonies. The forensic experts in these cases were trained by the same elite FBI team whose members gave misleading court testimony about hair matches and later taught the local examiners to follow the same suspect practices, according to interviews and documents. In July, the Justice Department announced a nationwide review of all cases handled by the FBI Laboratory's hair and fibers unit before 2000 — at least 21,000 cases — to determine whether improper lab reports or testimony might have contributed to wrongful convictions. But about three dozen FBI agents trained 600 to 1,000 state and local examiners to apply the same standards that have proved problematic. None of the local cases is included in the federal review. As a result, legal experts say, although the federal inquiry is laudable, the number of flawed cases at the state and local levels could be even higher, and those are going uncorrected. The FBI review was prompted by a series of articles in The Washington Post about errors at the bureau's renowned crime lab involving microscopic hair comparisons. The articles highlighted the cases of two District of Columbia men who each spent more than 20 years in prison based on false hair matches by FBI experts. Since The Post's articles, the men have been declared innocent by D.C. Superior Court judges.
Note: For deeply revealing reports from reliable major media sources on government corruption, click here.
CIA agents tortured a German citizen, sodomising, shackling, and beating him, as Macedonian state police looked on, the European court of human rights said in a historic judgment released on [December 13]. In a unanimous ruling, it also found Macedonia guilty of torturing, abusing, and secretly imprisoning Khaled el-Masri, a German of Lebanese origin allegedly linked to terrorist organisations. Masri was seized in Macedonia in December 2003 and handed over to a CIA "rendition team" at Skopje airport and secretly flown to Afghanistan. It is the first time the court has described CIA treatment meted out to terror suspects as torture. "The grand chamber of the European court of human rights unanimously found that Mr el-Masri was subjected to forced disappearance, unlawful detention, extraordinary rendition outside any judicial process, and inhuman and degrading treatment," said James Goldston, executive director of the Open Society Justice Initiative. He described the judgment as "an authoritative condemnation of some of the most objectionable tactics employed in the post-9/11 war on terror". Jamil Dakwar, of the American Civil Liberties Union, described the ruling as "a huge victory for justice and the rule of law". The Strasbourg court said it found Masri's account of what happened to him "to be established beyond reasonable doubt".
Note: For deeply revealing reports from reliable major media sources on illegal acts by US intelligence agencies, click here.
The Senate intelligence committee approved a long-awaited report ... concluding that harsh interrogation measures used by the CIA did not produce significant intelligence breakthroughs. The 6,000-page document ... is the most detailed independent examination to date of the agency’s efforts to “break” dozens of detainees through physical and psychological duress. Officials familiar with the report said it makes a detailed case that subjecting prisoners to “enhanced” interrogation techniques did not help the CIA find Osama bin Laden and often [was] counterproductive in the broader campaign against al-Qaeda. It could be months, if not years, before the public gets even a partial glimpse of the report or its 20 findings and conclusions. When that is completed, the committee will need to vote again on whether to release even a portion of the report, a move likely to face opposition from the CIA, which has fought to keep details of the interrogation program classified. Earlier this year, the Justice Department closed investigations of alleged abuses, eliminating the prospect that CIA operatives who had gone beyond the approved methods would face criminal charges. Civil liberties groups praised the report.
Note: For deeply revealing reports from reliable major media sources on illegal activities of intelligence agencies, click here.
Imagine that you have a Top Secret clearance and are privy to some of our country’s most sensitive national security information. In that capacity, you discover that some of the highest elected and appointed political leaders in the land are engaged in espionage and treason, accepting bribes and selling weapons and information (including nuclear weapons secrets) to foreign powers, including our enemies. Moreover, you learn that some of your co-workers are in league with these conspirators, covering up the evidence trail and misdirecting those tasked with preventing such security breaches. In her book Classified Woman: A Memoir, Edmonds recounts the incredible story of her efforts, for more than a decade, to warn her adopted country of imminent perils, only to be slapped down, harassed, smeared, and threatened. To prevent her explosive testimony from seeing the light of day, President George W. Bush and Attorney General John Ashcroft invoked the rarely used (until recently) “state secrets privilege” to gag not only Edmonds, but also committees of Congress that were investigating her case, as well as the Department of Justice’s Office of Inspector General and the FBI’s own Office of Professional Review. The preposterousness of the government’s position is palpable. This is an effort not to protect legitimate state secrets, but to protect criminality that has prospered in secrecy for far too long. Sibel Edmonds is decidedly non-partisan in her scorn; she shows equal disdain for Republicans and Democrats who sell out their country and betray their oaths of office. She names names.
Note: For other major media articles showing how Ms. Edmonds has been targeted and suffered for courageously speaking her truth, click here. This is the first major website to publish a review of this most amazing book by a true hero. Though we don't support all of the objectives of the John Birch Society, which publishes this website, we strongly support any efforts to reveal the truth through people like Sibel Edmonds. The book has a very rare five-star rating on Amazon.com. To get a copy, click here.
The Pentagon will send hundreds of additional spies overseas as part of an ambitious plan to assemble an espionage network that rivals the CIA in size, U.S. officials said. The project is aimed at transforming the Defense Intelligence Agency ... into a spy service focused on emerging threats and more closely aligned with the CIA and elite military commando units. When the expansion is complete, the DIA is expected to have as many as 1,600 “collectors” in positions around the world, an unprecedented total. They will be trained by the CIA and often work with the U.S. Joint Special Operations Command, but they will get their spying assignments from the Department of Defense. Among the Pentagon’s top intelligence priorities, officials said, are Islamist militant groups in Africa, weapons transfers by North Korea and Iran, and military modernization underway in China. The Pentagon’s plan to create what it calls the Defense Clandestine Service, or DCS, reflects the military’s latest and largest foray into secret intelligence work. The DIA overhaul — combined with the growth of the CIA since the Sept. 11, 2001, terrorist attacks — will create a spy network of unprecedented size. The expansion of the agency’s clandestine role is likely to heighten concerns that it will be accompanied by an escalation in lethal strikes and other operations outside public view. Because of differences in legal authorities, the military isn’t subject to the same congressional notification requirements as the CIA.
Note: For deeply revealing reports from reliable major media sources on secret operations by the DIA and CIA in the "global war on terror", click here.
Central Intelligence Agency employees murdered military scientist Frank Olson in 1953 after he raised concerns about testing chemical and biological weapons on human subjects without their consent, according to a lawsuit brought by his two sons. Eric and Nils Olson, in a complaint filed against the U.S. yesterday in Washington, said the agency has covered up the cause of their father’s death for 59 years. Frank Olson, who the CIA admitted was given LSD a few days before his death, didn’t jump from a 13th floor window of the Statler Hotel in New York City, but rather was pushed, they claim. “The circumstances surrounding the death mirrored those detailed in an assassination manual that, upon information and belief, the CIA had drafted that same year,” Scott Gilbert, a lawyer for the Olsons, wrote in the complaint. Olson’s family has tried to piece together how Frank Olson died and the circumstances surrounding his death ever since a 1975 government report on CIA activities in the U.S. said that he committed suicide after being given LSD without his knowledge. Preston Golson, a CIA spokesman, said ... that the agency’s covert behavioral research program known as MK-ULTRA was investigated in 1975 by the Rockefeller Commission and the Church Committee, and in 1977 by the Senate Select Committee on Intelligence and the Senate Subcommittee on Health and Scientific Research. Olson’s sons said in the suit they have asked repeatedly “to be told the truth” about their father’s death. “Each time, the government has responded with falsehoods,” they said.
Note: For lots more on the CIA's Operation MK Ultra, click here. For more on Frank Olson and secret government mind control programs, click here. For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.
[There have been] more than 300 drone strikes and some 2,500 people killed by the Central Intelligence Agency and the military since Mr. Obama first took office. Mr. Obama and his advisers are still debating whether remote-control killing should be a measure of last resort against imminent threats to the United States, or a more flexible tool, available to help allied governments attack their enemies or to prevent militants from controlling territory. Though publicly the administration presents a united front on the use of drones, behind the scenes there is longstanding tension. The administration is still pushing to make the rules formal and resolve internal uncertainty and disagreement about exactly when lethal action is justified. The Defense Department and the C.I.A. continue to press for greater latitude to carry out strikes. The administration’s legal reasoning has not persuaded many other countries that the strikes are acceptable under international law. For years before the Sept. 11, 2001, attacks, the United States routinely condemned targeted killings of suspected terrorists by Israel, and most countries still object to such measures. Partly because United Nations officials know that the United States is setting a legal and ethical precedent for other countries developing armed drones, the U.N. plans to open a unit in Geneva early next year to investigate American drone strikes.
Note: For deeply revealing reports from reliable major media sources on atrocities carried out by the US in its illegal wars of aggression in the Middle East, Asia and Africa, click here.
Over the past two years, the Obama administration has been secretly developing a new blueprint for pursuing terrorists, a next-generation targeting list called the “disposition matrix.” The matrix contains the names of terrorism suspects arrayed against an accounting of the resources being marshaled to track them down, including sealed indictments and clandestine operations. U.S. officials said the database is designed to go beyond existing kill lists, mapping plans for the “disposition” of suspects beyond the reach of American drones. The government expects to continue adding names to kill or capture lists for years. Among senior Obama administration officials, there is a broad consensus that such operations are likely to be extended at least another decade. That timeline suggests that the United States has reached only the midpoint of what was once known as the global war on terrorism. Targeting lists that were regarded as finite emergency measures after the attacks of Sept. 11, 2001, are now fixtures of the national security apparatus. The rosters expand and contract with the pace of drone strikes but never go to zero. Obama has institutionalized the highly classified practice of targeted killing, transforming ad-hoc elements into a counterterrorism infrastructure capable of sustaining a seemingly permanent war. Privately, officials acknowledge that the development of the matrix is part of a series of moves, in Washington and overseas, to embed counterterrorism tools into U.S. policy for the long haul.
Note: Through the drone program, the U.S. has license to kill in foreign countries without those being killed given any sort of trial or rights. Is it any wonder some countries are highly critical of this program? For deeply revealing reports from reliable major media sources on the secret and illegal operations of the "global war on terror," click here.
A multibillion-dollar information-sharing program created in the aftermath of 9/11 has improperly collected information about innocent Americans and produced little valuable intelligence on terrorism, a Senate report concludes. It portrays an effort that ballooned far beyond anyone's ability to control. What began as an attempt to put local, state and federal officials in the same room analyzing the same intelligence has instead cost huge amounts of money for data-mining software, flat screen televisions and, in Arizona, two fully equipped Chevrolet Tahoes that are used for commuting, investigators found. The report underscores a reality of post-9/11 Washington: National security programs tend to grow, never shrink, even when their money and manpower far surpass the actual subject of terrorism. When fusion centers did address terrorism, they sometimes did so in ways that infringed on civil liberties. The centers have made headlines for circulating information about Ron Paul supporters, the ACLU, activists on both sides of the abortion debate, war protesters and advocates of gun rights. One fusion center cited in the Senate investigation wrote a report about a Muslim community group's list of book recommendations. Others discussed American citizens speaking at mosques or talking to Muslim groups about parenting. No evidence of criminal activity was contained in those reports. The government did not circulate them, but it kept them on government computers. The federal government is prohibited from storing information about First Amendment activities not related to crimes.
Note: For deeply revealing reports from reliable major media sources on civil liberties, click here.
Two Portland residents say they will appear before a federal grand jury in Seattle Thursday in an investigation of anarchist activity, according to a statement they released on [August 1]. Grand jury subpoenas have also been served to activists in Olympia and Seattle ... according to the Seattle Chapter of the National Lawyers Guild, which identifies itself as an association of progressive lawyers. The guild urged the U.S. Attorney’s Office to drop the subpoenas [because] they were being used “as a pretext for harassing political activists.” “It concerns us any time there are law-enforcement raids that target political literature, first amendment-protected materials,” [guild spokesman Neil] Fox said. Two weeks before a heavily armed, July 25 FBI raid that Dennison Williams and Leah-Lynn Plante said took place at their Portland home, the Seattle Police Department SWAT team seized evidence connected to the May Day investigation from a Judkins Park apartment of Occupy Seattle members. In both cases, those searched told media that law-enforcement charged into their homes [with a battering-ram] early in the morning and used a stun grenade, a non-lethal object that creates a disorienting loud bang and bright light. Williams told The Oregonian that the FBI took his laptop computer, cell phone, two thumb drives, multiple pieces of black clothing, and a T-shirt that read on the front “Multi Death Corporations.”
Note: Amazingly, the FBI raids on political activists in Seattle and Portland have gone completely unreported by the mass media. For analysis of the FBI's attacks on dissenters, click here, here and here. For a Democracy Now! video report, click here. For deeply revealing reports from reliable major media sources on civil liberties, click here.
Bolstered by eyewitness accounts and the Internet, the explosion of TWA Flight 800 off the coast of New York 10 years ago spawned a slew of sinister conspiracy theories, most notably the belief that a missile from a U.S. Navy ship was responsible. So prevalent were these theories that the term "Pierre Salinger Syndrome" -- the belief that everything on the Internet is true -- entered the lexicon. Some witness accounts seemed to support the missile theory. It quickly became a hot topic on the young but quickly growing Internet. It might have stayed simply an Internet conspiracy had it not been for Pierre Salinger, President Kennedy's press secretary who had worked as a network news correspondent for a time. Three months after the TWA tragedy, while working as a freelance public relations director, he claimed to have verified the friendly fire cover-up. "It's a document I got about five weeks ago -- came from ... an intelligence agent of France. He had been given this document from an American Secret Service agent based in France," Salinger said at the time. "He had been doing an inquiry and had some contacts with the U.S. Navy." Salinger took to the news airwaves, including CNN, touting his theory. But as baseless as it sounded, Salinger could not be ignored. His accusations gave conspiracy theorists a voice of distinction and credibility.
Note: For powerful evidence from an Emmy-award winning journalist that this investigation was manipulated, click here. To watch the powerful documentary Shadows of Liberty on major media manipulation, including that of TWA flight 800 (minute 14) at this link.
Revelations that top officials are targeting people to be assassinated abroad, including American citizens, are only the most recent, disturbing proof of how far our nation’s violation of human rights has extended. This development began after [9/11] and has been sanctioned and escalated by bipartisan executive and legislative actions. While the country has made mistakes in the past, the widespread abuse of human rights over the last decade has been a dramatic change from the past. With leadership from the United States, the Universal Declaration of Human Rights was adopted in 1948 as “the foundation of freedom, justice and peace in the world.” This was a bold and clear commitment that power would no longer serve as a cover to oppress or injure people, and it established equal rights of all people to life, liberty, security of person, equal protection of the law and freedom from torture, arbitrary detention or forced exile. It is disturbing that, instead of strengthening these principles, our government’s counterterrorism policies are now clearly violating at least 10 of the declaration’s 30 articles, including the prohibition against “cruel, inhuman or degrading treatment or punishment.” Recent legislation has made legal the president’s right to detain a person indefinitely on suspicion of affiliation with terrorist organizations or “associated forces,” a broad, vague power that can be abused without meaningful oversight from the courts or Congress. This law violates the right to freedom of expression and to be presumed innocent until proved guilty, two other rights enshrined in the declaration.
Note: For revealing reports from major media sources on war crimes committed by US forces in the "global war on terror," click here.
Former Florida Sen. Bob Graham, who co-chaired Congress’ Joint Inquiry into the 9/11 terrorist attacks, has seen two classified FBI documents that he says are at odds with the bureau’s public statements that there was no connection between the hijackers and Saudis then living in Sarasota, Fla. “There are significant inconsistencies between the public statements of the FBI in September and what I read in the classified documents,” Graham said. “One document adds to the evidence that the investigation was not the robust inquiry claimed by the FBI,” Graham said. “An important investigative lead was not pursued and unsubstantiated statements were accepted as truth.” Congress’s bipartisan inquiry released its public report in July 2003. The final 28 pages, regarding possible foreign support for the terrorists, were censored in their entirety -- on President George W. Bush’s instructions. Graham said the two classified FBI documents that he saw, dated 2002 and 2003, were prepared by an agent who participated in the Sarasota investigation. He said the agent suggested that another federal agency be asked to join the investigation, but that the idea was “rejected.” Graham attempted in recent weeks to contact the agent, he said, only to find the man had been instructed by FBI headquarters not to talk.
Note: Much evidence exists implicating not only Saudi Arabia, but also Pakistan, Israel and the UK in the 9/11 attacks. Could the purpose behind these high-profile claims from former US senators be to deflect attention from the key perpetrators, rogue elements within the US government? As WantToKnow team member Prof. David Ray Griffin has exhaustively demonstrated, almost all of the evidence for Muslim hijackers vanishes on close examination. For more serious questions on 9/11, click here.
In the space of three years, the [Obama] administration has built an extensive apparatus for using drones to carry out targeted killings of suspected terrorists and stealth surveillance of other adversaries. The apparatus involves dozens of secret facilities, including two operational hubs on the East Coast, virtual Air Force cockpits in the Southwest and clandestine bases in at least six countries on two continents. No president has ever relied so extensively on the secret killing of individuals to advance the nation’s security goals. Lethal operations are increasingly assembled a la carte, piecing together personnel and equipment in ways that allow the White House to toggle between separate legal authorities that govern the use of lethal force. In Yemen, for instance, the CIA and the military’s Joint Special Operations Command pursue the same adversary with nearly identical aircraft. But they alternate taking the lead on strikes to exploit their separate authorities, and they maintain separate kill lists that overlap but don’t match. CIA and military strikes this fall killed three U.S. citizens, two of whom were suspected al-Qaeda operatives. Although human rights advocates and others are increasingly critical of the drone program, the level of public debate remains muted. [One] reason for the lack of extensive debate is secrecy. The White House has refused to divulge details about the structure of the drone program or, with rare exceptions, who has been killed.
Note: Not that the US citizens killed were not given their constitutional rights for a fair trail before being assassinated. For lots more from major media sources on government secrecy, click here.
Armed with a search warrant, Nelson County Sheriff Kelly Janke went looking for six missing cows on the Brossart family farm in [eastern North Dakota]. He called in reinforcements from the state Highway Patrol, a regional SWAT team, a bomb squad, ambulances and deputy sheriffs from three other counties. He also called in a Predator B drone. Sophisticated sensors under the nose helped pinpoint the three suspects and showed they were unarmed. Police rushed in and made the first known arrests of U.S. citizens with help from a Predator, the spy drone that has helped revolutionize modern warfare. But that was just the start. Local police say they have used two unarmed Predators based at Grand Forks Air Force Base to fly at least two dozen surveillance flights since June. The FBI and Drug Enforcement Administration have used Predators for other domestic investigations, officials said. The drones belong to U.S. Customs and Border Protection, which operates eight Predators on the country's northern and southwestern borders to search for illegal immigrants and smugglers. The previously unreported use of its drones to assist local, state and federal law enforcement has occurred without any public acknowledgment or debate.
Note: "Looking for six cows," the Sheriff called in "a regional SWAT team, a bomb squad, ambulances and deputy sheriffs from three other counties. He also called in a Predator B drone." Does that sound like a reasonable response to the problem of missing cows? Or could there be an agenda to establish aerial surveillance by drones as the norm in the US?
Prominent international human rights lawyer Clive Stafford Smith was impressed by the 16-year-old boy who wanted to draw attention to civilian deaths caused by U.S. drone strikes in Pakistan. Tariq Aziz had volunteered to take pictures of people killed by the remotely piloted aircraft to help Stafford Smith highlight what he calls illegal killings. Three days later, on October 31, he and his 12-year-old cousin were themselves killed by a drone missile strike in the North Waziristan region on the Afghan border, Stafford Smith said. For the veteran lawyer, the deaths highlighted major flaws in the CIA-run drone campaign, which U.S. officials say is invaluable in the war on militants. He considers the drones as "scandalous" as the secret U.S. bombing of Cambodia during the Vietnam War. "What we are seeing in Waziristan is a process that is alienating the population just as napalm in Vietnam did and it's achieving very little benefit." Stafford Smith [also] drew parallels between Guantanamo and the drone campaign in Pakistan, arguing both detentions and strikes were often based on dubious intelligence. He suspects the death of Aziz was a prime example of that. "We as America offer large bounties to different informants and these informants would sell their own mothers," said Stafford Smith, 52, a dual U.S.-British citizen who is the director of Reprieve, an organization that advocates for prisoners' rights.
Note: For key reports from major media sources on the killing of innocent people by US drones, click here.
U.S. officials last week acknowledged that unmanned predator aircraft killed two U.S. citizens, Anwar al-Awlaki and Samir Khan, in Yemen. Yet, U.S. media outlets have chosen to refer to them as "American born" or "U.S.-born," as in "the American-born cleric Anwar al-Awlaki was killed by U.S. armed drones." No concrete proof of their guilt has been furnished beyond what the government and multiple media outlets have reported. In the case of the al-Awlaki killing, U.S. officials said, "Al-Awlaki played a 'significant operational role' in plotting and inspiring attacks on the United States," as they justified the killing of an American citizen. In the post-9/11 world, such reporting garners little attention from the public. But those who believe in the rule of law find such mundane pronouncements frightening. The Sixth Amendment guarantees the accused the right to a public trial by an impartial jury, regardless of his or her ethnic background or previous alleged activities. Government-sanctioned assassinations of U.S. citizens without due process should be discussed rather than blindly accepted as a victory in the war on terror. The obvious follow-up question is: What about other U.S. citizens? Might they also be targeted for assassination without due process? The targeted killings of al-Awlaki and Khan should shock Americans reared on the rule of law, justice, liberty and freedom.
Note: State assassination of a citizen without due process would seem to be the ultimate attack on civil liberties. For lots more on such threats from reliable sources, click here.
Britain and other European governments have helped the US commit “countless” crimes by colluding with torture and illegal rendition operations in America’s war on terror, Europe’s human rights watchdog has said. Thomas Hammarberg, the Council of Europe’s rights commissioner, accused governments of being “deeply complicit” in illegal activities carried out by the US over the last 10 years, since the September 11 2001 terrorist attacks on New York and Washington. “In attempting to combat crimes attributed to terrorists, countless further crimes have been committed in the course of the US-led 'global war on terror’,” he said. “Many of those crimes have been carefully and deliberately covered up.” A 2007 Council of Europe (COE) report by Dick Marty, Swiss MP, accused Britain and 13 other European governments of allowing the CIA to run secret detention centres, of turning a blind eye to torture and the illegal abductions of terror suspects. Mr Hammerberg accused Europe’s governments of blocking investigations into rendition in line with Washington’s wishes. “So far Europe has granted effective impunity to those who committed crimes in implementing the rendition policy. An urgent rethink is required to prevent this misjudged and failed counter terrorism approach from having a sad legacy of injustice,” said Mr Hammerberg.
Note: For lots more from reliable sources on the hidden realities behind the "Global War on Terror", click here.
U.S. officials ... defended a tactic used by the CIA to attempt to verify the whereabouts of Osama bin Laden — the covert creation of a vaccine program in Abbottabad, the town in Pakistan where he was later killed in a U.S. raid. The vaccine drive was conducted shortly before the raid in early May ... and was overseen by a Pakistani doctor who traveled to Abbottabad. A senior U.S. official said the campaign involved actual hepatitis vaccine and should not be construed as a “fake public health effort. The vaccination campaign was part of the hunt for the world’s top terrorist, and nothing else.” The doctor who oversaw the effort has since been arrested by Pakistan’s Inter-Services Intelligence agency for cooperating with the CIA. U.S. officials have said they are seeking to have him released. The senior U.S. official declined to say whether DNA from bin Laden’s relatives was collected as part of the vaccine program. Officials have previously said, however, that they used DNA analysis to confirm bin Laden’s identify after he was killed. In doing so, they used samples taken from known relatives.
Note: For information about a disturbing Pentagon program using vaccinations to combat religious fundamentalism, click here.
The Obama administration approved the secret detention of a Somali terror suspect on board a US navy ship, where for two months he was subjected to military interrogation in the absence of a lawyer and without charge. The capture and treatment of Ahmed Abdulkadir Warsame has rekindled the debate within the US about the appropriate handling of terror suspects. Civil rights groups have objected to the secret questioning of Warsame on board a navy vessel, an innovation that they fear could see a new form of the CIA's widely discredited "black site" detention centres around the world. The US government is turning to detention at sea as a way of avoiding legal and political impediments in the treatment of terror suspects, both domestically and on the international stage. Last week Admiral William McRaven, soon to become head of US Special Operations Command, told his confirmation hearing that militants captured outside Afghanistan were often "put on a naval vessel" to be held until they could be sent to a third country or a case was compiled against them for prosecution in the US courts. Officials told the Washington Post that Warsame was interrogated on "all but a daily basis" on board the ship. The right to a lawyer was withheld along with other habeas corpus rights known in the US as Miranda rights. Civil rights groups have said the secret interrogation was a blatant violation of the Geneva conventions that prohibit prolonged detention of suspects at sea.
Note: For key reports from major media sources on the illegal actions taken by the US government in its "global war on terror", click here.
A former senior C.I.A. official says that officials in the Bush White House sought damaging personal information on a prominent American critic of the Iraq war in order to discredit him. Glenn L. Carle, a former Central Intelligence Agency officer who was a top counterterrorism official during the administration of President George W. Bush, said the White House at least twice asked intelligence officials to gather sensitive information on Juan Cole, a University of Michigan professor who writes an influential blog that criticized the war. In an interview, Mr. Carle said his supervisor at the National Intelligence Council told him in 2005 that White House officials wanted “to get” Professor Cole. Since a series of Watergate-era abuses involving spying on White House political enemies, the C.I.A. and other spy agencies have been prohibited from collecting intelligence concerning the activities of American citizens inside the United States. “These allegations, if true, raise very troubling questions,” said Jeffrey H. Smith, a former C.I.A. general counsel. “The statute makes it very clear: you can’t spy on Americans.” Mr. Smith added that a 1981 executive order that prohibits the C.I.A. from spying on Americans places tight legal restrictions not only on the agency’s ability to collect information on United States citizens, but also on its retention or dissemination of that data.
Note: For important reports from major media sources on a wide array of threats to civil liberties by out-of-control government agencies and officials, click here.
FBI agents took box after box of address books, family calendars, artwork and personal letters in their 10-hour raid in September of the ... house shared by Stephanie Weiner and her husband. The agents seemed keenly interested in Weiner’s home-based business, the Revolutionary Lemonade Stand, which sells silkscreened baby outfits and other clothes with socialist slogans, phrases like “Help Wanted: Revolutionaries.” The search was part of a mysterious, ongoing nationwide terrorism investigation with an unusual target: prominent peace activists and politically active labor organizers. Investigators, according to search warrants, documents and interviews, are examining possible “material support” for Colombian and Palestinian groups designated by the U.S. government as terrorists. The apparent targets, all vocal and visible critics of U.S. foreign policy in the Middle East and South America, deny any ties to terrorism. They say the government, using its post-9/11 focus on terrorism as a pretext, is targeting them for their political views. The activists have formed the Committee to Stop FBI Repression, organized phone banks to flood Attorney General Eric H. Holder Jr.’s office and the White House with protest calls, solicited letters from labor unions and faith-based groups and sent delegations to Capitol Hill to gin up support from lawmakers.
Note: For lots more from reliable sources on government attacks on civil liberties, click here.
Leon Panetta, director of the CIA, revealed there was a 25 minute blackout during which the live feed from cameras mounted on the helmets of the US special forces was cut off. A photograph released by the White House appeared to show President Barack Obama and his aides in the situation room watching the action as it unfolded. In fact they had little knowledge of what was happening in the compound. In an interview with PBS, Mr Panetta said: "Once those teams went into the compound I can tell you that there was a time period of almost 20 or 25 minutes where we really didn't know just exactly what was going on. We had some observation of the approach there, but we did not have direct flow of information as to the actual conduct of the operation itself as they were going through the compound." The President only knew the mission was successful after the Navy Seals commander heard the word “Geronimo” on the radio, a code word from commandos reporting that they had killed bin Laden. The absence of footage of the raid has led to conflicting reports about what happened in the compound.
Note: The White House photo was fake and the original news was quite distorted. Hmmmm. Who do we trust here? WantToKnow team member David Ray Griffin's book establishing the likelihood that Osama bin Laden died in December 2001, Osama bin Laden: Dead or Alive?, is available here. For a brief summary of reliable information from major media sources raising serious questions about what happened on 9/11, click here.
Files obtained by the website Wikileaks have revealed that the US believed many of those held at Guantanamo Bay were innocent or only low-level operatives. The files, published in US and European newspapers, are assessments of all 780 people ever held at the facility. They show that about 220 were classed as dangerous terrorists, but 150 were innocent Afghans and Pakistanis. The Detainee Assessment Briefs (DABs) ... give little information on the allegations of harsh treatment and interrogation techniques at the camp. But the files show that US military analysts considered only 220 of those ever detained at Guantanamo to be dangerous extremists. Another 380 detainees were deemed to be low-ranking guerrillas. At least 150 people were revealed to be innocent Afghans or Pakistanis - including drivers, farmers and chefs - rounded up during intelligence gathering operations in the aftermath of 9/11. The detainees were then held for years owing to mistaken identity or because they were in the wrong place at the wrong time, the memos say. In many cases, US commanders concluded there was "no reason recorded for transfer".
Note: For key reports from reliable sources on the prison at Guantanamo and other black sites where torture and false allegations are the norm, click here.
An Afghan warlord backed by US special forces faces persistent allegations that he launched a two-year spate of violence involving burglary, rape and murder of civilians, desecration of mosques and mutilation of corpses. Yet, despite repeated warnings about the atrocities Commander Azizullah is alleged to have committed, he has remained on the payroll of the US military as an "Afghan security guard", a select band of mercenaries. Interviews with religious leaders, tribal elders, villagers, contractors and Western and Afghan officials all pointed to a reign of terror in which they believe 31-year-old Azizullah, an ethnic Tajik, targeted Pashtun civilians while fighting the Taliban. The testimony also tallied with several independent reports documenting the allegations against Azizullah. The allegations of persistent abuses are embarrassing for Nato, and not just because of the closeness with an alleged war criminal. They also showcase the biggest drawbacks of militias, which US commander General David Petraeus wants to expand aggressively across Afghanistan. He wants to triple the size of "local defence initiatives" [militias] to 30,000 members nationwide.The consequences are too awful to contemplate: resurgent warlords, deepening ethnic tensions, widespread bloodletting and the erosion of what little authority the government in Kabul has left.
Note: For many reports from reliable sources on atrocities and illegal activities by US military forces in Afghanistan and Iraq, click here.
Police officer perjury in court to justify illegal dope searches is commonplace. One of the dirty little not-so-secret secrets of the criminal justice system is undercover narcotics officers intentionally lying under oath. It is a perversion of the American justice system that strikes directly at the rule of law. Yet it is the routine way of doing business in courtrooms everywhere in America. Why do police ... show contempt for the law by systematically perjuring themselves? The first reason is because they get away with it. They know that in a swearing match between a drug defendant and a police officer, the judge always rules in favor of the officer. Another reason is the nature of most drug cases and the likely type of person involved. The defendant is poor, uneducated, frequently a minority, with a criminal record, and he does have drugs. But the main reason is that the job of these cops is chasing drugs. Their professional advancement depends on nabbing dopers. It's reinforced by San Francisco's own sorry history of infamous undercover narcotics officers promoted to top levels in the department despite contempt for the law shown by bullying, brutality and perjury in carrying out illegal searches and arrests. So the modern narcotics officer is just following a well-worn path.
Note: For lots more on government corruption, click here.
A review of the Federal Bureau of Investigations scientific work on the investigation of the anthrax letters of 2001 concludes that the bureau overstated the strength of genetic analysis linking the mailed anthrax to a supply kept by Bruce E. Ivins, the Army microbiologist whom the investigators blamed for the attacks. The review, by a panel convened by the National Academy of Sciences, says the genetic analysis did not definitively demonstrate that the mailed anthrax spores were grown from a sample taken from Dr. Ivinss laboratory at Fort Detrick in Frederick, Md. The academys report faults the F.B.I. as failing to take advantage of scientific methods developed between the mailings in 2001 and its conclusion after Dr. Ivinss suicide in 2008 that he was the sole perpetrator. The academy panel, which was paid $1.1 million by the F.B.I. for its review, assessed only the scientific aspects of the investigation and not the traditional detective work. Representative Rush D. Holt, a New Jersey Democrat and physicist who has followed the case, said he thought the academys review showed that the F.B.I. attached too much certainty to the scientific parts of the case. I also think it shows the case was closed prematurely, Mr. Holt said. He said he was reintroducing a bill to create a national commission, similar to the Sept. 11 panel, to take a more comprehensive look at the anthrax case and its implications.
Note: The government has seemed eager to pin this on Ivins, when evidence appears to point to the U.S. military. For more strange evidence on anthrax and dead researchers, click here.
The FBI disclosed to a presidential board that it was involved in nearly 800 violations of laws, regulations or policies governing national security investigations from 2001 to 2008, but the government won't provide details or say whether anyone was disciplined, according to a report by a privacy watchdog group. The San Francisco-based Electronic Frontier Foundation sued under the Freedom of Information Act to obtain about 2,500 documents that the FBI submitted to the President's Intelligence Oversight Board. Most of the records were so heavily censored that they couldn't be properly evaluated. Nevertheless, the documents "constitute the most complete picture of post-9/11 FBI intelligence abuses available to the public," says the report. "The documents suggest," the report says, "that FBI intelligence investigations have compromised the civil liberties of American citizens far more frequently, and to a greater extent, than was previously assumed." The records obtained by the foundation go beyond national security letters. About a third of the reports of violations involved rules governing internal oversight of intelligence investigations, and about a fifth involved potential violations of the Constitution, the Foreign Intelligence Surveillance Act or other laws governing criminal investigations or intelligence-gathering activities, the report says.
Note: For lots more from major media sources on government attacks on civil liberties, click here.
An Italian appeals court on [December 15] increased the sentences against 23 Americans convicted in the kidnapping of an Egyptian terror suspect who was part of the CIA's extraordinary renditions program. In upholding the convictions, the court added one year to the eight-year term handed down to former Milan CIA station chief Robert Seldon Lady and two years to the five-year terms given to 22 other Americans convicted along with him, defense lawyers said. They were never in Italian custody and were tried and convicted in absentia but risk arrest if they travel to Europe. The Americans and two Italians were convicted last year of involvement in the kidnapping of ... Abu Omar from a Milan street on Feb. 17, 2003 — the first convictions anywhere in the world against people involved in the CIA's practice of abducting terror suspects and transferring them to third countries where torture was permitted. The cleric was transferred to U.S. military bases in Italy and Germany before being moved to Egypt, where he says he was tortured. He has since been released. Amnesty International praised [the] decision as a step toward demanding greater accountability in Europe for the CIA's extraordinary rendition program. Julia Hall, an Amnesty counter-terrorism expert, said in a statement, "The Italian courts have acknowledged that the chain of events leading to such serious abuses cannot go unanswered. Kidnapping is a crime, not a 'state secret.' "
Note: This is amazing news which shows that the CIA is losing its former status as immune in courts of law.
In 1961, a top CIA scientist reported in an internal memo that "the feasibility of remote control of activities in several species of animals has been demonstrated ... Special investigations and evaluations will be conducted toward the application of selected elements of these techniques to man," according to The Search for the "Manchurian Candidate: The CIA and Mind Control, a 1979 book by former State Department intelligence officer John Marks. “[T]his cold-blooded project,” Marks wrote, “was designed ... for the delivery of chemical and biological agents or for ‘executive action-type operations,’ according to a document. ‘Executive action’ was the CIA's euphemism for assassination.” Victims have sought justice for years, in vain. Now, almost 40 years later, a federal magistrate has ordered the CIA to produce records and witnesses about the LSD and other experiments “allegedly conducted on thousands of soldiers from 1950 through 1975.” U.S. Magistrate Judge John Larsen’s Nov. 17 order exempted the agency from having to testify about electrode tests on humans, but Gordon P. Erspamer, lead attorney for the veterans, says “we are pursuing this as well.” Papers filed in the case describe “electrical devices implanted in brain tissue with electrodes in various regions, including the hippocampus, the hypothalamus, the frontal lobe (via the septum), the cortex and various other places,” Erspamer said.
Note: For a revealing summary of CIA mind-control experimentation, click here.
It started with a fingerprint of a 25-year-old college professor who opposed the Vietnam War and ended with a search for his remains, 32 years later, in a wooded area near Eveleth, Minn. The FBI's files on Paul and Sheila Wellstone [show that] the FBI initially took interest in Wellstone as part of the broader surveillance of the American left ... and, in the end, [sifted] through the wreckage of the fatal plane crash that killed Wellstone and seven others eight years ago. Wellstone's surviving sons declined to comment on the documents, which were obtained in response to a Freedom of Information Act request filed by MPR News. The FBI did not include 76 pages related to the National Transportation Safety Board, the agency that investigated the crash. A request for those records is pending. Coleen Rowley, the 9/11 whistleblower and former chief legal advisor in the FBI's Minneapolis office, said the documents from 1970 shed light on the FBI's far-reaching efforts to quash political dissent. "I think this really is valuable … because it's basically history repeating what we have right now," she said, noting the recent FBI raids at the homes of several anti-war organizers in Minneapolis. Wellstone's arrest occurred less than a year before the official end of Cointelpro, a series of secret domestic surveillance programs created by FBI Director J. Edgar Hoover to monitor and disrupt groups deemed to be a threat to national security.
Note: For insights into the deeper implications of Senator Wellstone's mysterious plane crash, click here.
A CIA lawsuit threatens to turn a little-known two-year-old tell-all by a disgruntled former spy into a bestseller. Within hours of the lawsuit's filing [on October 19], The Human Factor: Inside the CIA's Dysfunctional Intelligence Culture, had rocketed up the Amazon rankings. The Human Factor, written by an ex-agent using the pseudonym Ishmael Jones, went largely unnoticed when it was first published in July 2008. In the book, "Jones" charges the CIA with waste, fraud and abuse as he details his career over two decades working under non-official cover, or NOC, mainly in Europe. The agency is seeking any money Jones received for the publication or sales of the book. The suit, which does not allege that Jones revealed any classified information, raises questions about why the agency would bring a case two years after publication and where both sides agree no sensitive secrets were revealed. Steven Aftergood, an expert on government secrecy, said "This is a bone-headed move. You'll make an obscure book by an unknown author into a national news story." But Aftergood said the agency's real aim is internal discipline. "The government is not simply concerned about protecting secrets. It is also concerned about Jones' overt defiance of established security rules." Jones and other former CIA officers have complained in the past that the CIA's publication review consistently favors former spies who tell stories flattering to the agency. Jones suggested that the antipathy towards the book focused on his message, a sharp critique of the CIA.
Note: For a highly informative documentary on the secrets of the CIA, click here.
A privacy watchdog has uncovered a government memo that encourages federal agents to befriend people on a variety of social networks, to take advantage of their readiness to share -- and to spy on them. In response to a Freedom of Information request, the government released a handful of documents, including a May 2008 memo detailing how social-networking sites are exploited by the Office of Fraud Detection and National Security (FDNS). Facebook, Twitter, MySpace, and Digg had not commented on the report, which details the official government program to spy via social networking. Other websites the government is spying on include ... Craigslist and Wikipedia, according to the Electronic Frontier Foundation (EFF), which filed the FOIA request. "Narcissistic tendencies in many people fuel a need to have a large group of 'friends' link to their pages, and many of these people accept cyber-friends that they don't even know," stated one of the documents obtained by the EFF. "This provides an excellent vantage point for FDNS to observe the daily life of [members]," it said. Among the networks specifically cited for analysis "were general social networking sites like Facebook, MySpace, Twitter, and Flickr, as well as sites that focus specifically on certain demographic groups such as MiGente and BlackPlanet, news sites such as NPR, and political commentary sites DailyKos," the EFF wrote.
Note: For more information, read the full report at the Electronic Frontier Foundation.
News that the US is buying custom-made vans packed with something called backscatter X-ray capacity has riled privacy advocates and sparked internet worries about "feds radiating Americans." American Science & Engineering, a Billerica, Mass.-company, tells Forbes it [has] sold more than 500 ZBVs, or Z Backscatter Vans, to US and foreign governments. The Department of Defense has bought the most for war zone use, but US law enforcement has also deployed the vans to [use] inside the US, according to Joe Reiss, a company spokesman. On [September 28], a counterterror operation snarled truck traffic on I-20 near Atlanta, where Department of Homeland Security teams used mobile X-ray technology to check the contents of truck trailers. Authorities said the inspections weren't prompted by any specific threat. Backscatter X-ray is already part of an ongoing national debate about its use in so-called full body scanners being deployed in many US airports. [Critics] worry that radiating Americans without their knowledge is evidence of gradually eroding constitutional protections in the post-9/11 age. "This is another way in which the government is capturing information they may lose control over. I just have some real problems with the idea of even beginning a campaign of rolling surveillance of American citizens, which is what this essentially is said [Vermont-based privacy expert Frederick Lane, author of American Privacy.]
Note: For further reports from reliable sources on the militarization of US police forces, click here.
The National Security Agency, headquarters for the government’s eavesdroppers and code breakers, has been located at Fort Meade, Md., for half a century. Its nickname, the Fort, has been familiar for decades to neighbors and government workers alike. Yet that nickname is one of hundreds of supposed secrets Pentagon reviewers blacked out in the new, censored edition of an intelligence officer’s Afghan war memoir. The Defense Department is buying and destroying the entire uncensored first printing of Operation Dark Heart, by Anthony Shaffer, a lieutenant colonel in the Army Reserve and former Defense Intelligence Agency officer, in the name of protecting national security. Another supposed secret removed from the second printing: the location of the Central Intelligence Agency’s training facility — Camp Peary, Va., a fact discoverable from Wikipedia. And the name and abbreviation of the Iranian Revolutionary Guard Corps, routinely mentioned in news articles. And the fact that Sigint means “signals intelligence.” Not only did the Pentagon black out Colonel Shaffer’s cover name in Afghanistan, Chris Stryker, it deleted the source of his pseudonym: the name of John Wayne’s character in the 1949 movie “The Sands of Iwo Jima.” The redactions offer a rare glimpse behind the bureaucratic veil that cloaks information the government considers too important for public airing.
Note: Interesting that this NY Times article fails to even mention the "Able Danger" program which Shaffer publicly revealed had identified some of the hijackers before 9/11. For powerful information suggesting government foreknowledge of 9/11 through this program, click here. Yet a Fox News article available here gives all the details. For lots more from major media sources on government secrecy, click here.
A federal appeals court ... dismissed a lawsuit [on September 8] accusing a Bay Area aviation-planning company of arranging CIA flights of [captives] to overseas dungeons. The ruling is a victory for both President George W. Bush's administration, which directed the rendition program and acknowledged its existence, and the Obama administration, which ... argued that it was too sensitive to be litigated in court. The American Civil Liberties Union said it would appeal to the Supreme Court. The high court has refused to review two rulings by other appeals courts dismissing suits against the government by men who said they were abducted by the CIA and flown to foreign torture chambers. "Not a single victim of the Bush administration's torture program has had his day in court," ACLU lawyer Ben Wizner said. Jeppesen, a Boeing Co. subsidiary, was described in a 2007 Council of Europe report as the CIA's aviation services provider. In a court declaration in the current suit, a company employee quoted a director as telling staff members in 2006 that Jeppesen handled the CIA's "torture flights." Dissenting Judge Michael Hawkins said the courts should decide legal disputes rather than "permitting the executive to police its own errors." He also said the court should have kept the case alive and required the government to show why specific evidence should remain secret.
Note: The ruling in this case can be read here. For analysis, click here and here.
The United States has long been an exporter of terrorism, according to a secret CIA analysis released [August 25] by the Web site WikiLeaks. And if that phenomenon were to become a widely held perception, the analysis said, it could damage relations with foreign allies and dampen their willingness to cooperate in "extrajudicial" activities, such as the rendition and interrogation of terrorism suspects. That is the conclusion of the three-page classified paper produced in February by the CIA's Red Cell, a think tank set up after the Sept. 11, 2001, attacks by then-CIA Director George J. Tenet to provide "out-of-the-box" analyses on "a full range of analytic issues." The paper cites Pakistani American David Headley, among others, to make its case that the nation is a terrorism exporter. Headley pleaded guilty this year to conducting surveillance in support of the 2008 Lashkar-i-Taiba attacks in Mumbai, which killed more than 160 people. Such exports are not new, the paper said. In 1994, an American Jewish doctor [Baruch Goldstein, a member of the militant group Kach founded by the late Meir Kahane,] who had emigrated from New York to Israel years earlier, opened fire at a mosque at the Tomb of the Patriarchs in Hebron, killing 29 Palestinian worshippers.
Note: For reports from major media sources that illuminate the realities of state-sponsored terrorism, click here.
The CIA has tapes of [alleged] 9/11 plotter Ramzi Binalshibh being interrogated in a secret overseas prison. Discovered under a desk, the recordings could provide an unparalleled look at how foreign governments aided the U.S. in holding and questioning suspected terrorists. CIA officials believed they had wiped away all of the agency's interrogation footage. But in 2007, a staff member discovered a box tucked under a desk in the CIA's Counterterrorism Center and pulled out the Binalshibh tapes. A Justice Department prosecutor ... is now ... probing why the Binalshibh tapes were never disclosed. Twice, the government told a federal judge they did not exist. The tapes could complicate U.S. efforts to prosecute Binalshibh, 38. If the tapes surfaced at trial, they could clearly reveal Morocco's role in the counterterrorism program known as Greystone, which authorized the CIA to hold terrorists in secret prisons and shuttle them to other countries. More significantly to his defense, the tapes also could provide evidence of Binalshibh's mental state within the first months of his capture. In court documents, defense lawyers have been asking for medical records to see whether Binalshibh's years in CIA custody made him mentally unstable. He is being treated for schizophrenia with a potent cocktail of anti-psychotic medications.
Note: For lots more from reliable sources on the torture used by the CIA and US military in the global "Long War", click here.
Created during World War II as [one of America's most secretive espionage agencies] the Pond existed for 13 years and was shrouded in secrecy for more than 50 years. It used sources that ranged from Nazi officials to Stalinists and, at one point, a French serial killer. It operated under the cover of multinational corporations, including American Express, Chase National Bank and Philips, the Dutch-based electronic giant. One of its top agents was a female American journalist. Now the world can finally get a deeper look at the long-hidden roots of American espionage as tens of thousands of once-secret documents found in locked safes and filing cabinets in a barn near Culpeper, Virginia, in 2001 have ... become public. The papers, which the Pond's leader tried to keep secret long after the organization was dissolved, were placed in the National Archives in College Park, Maryland, in 2008 but only opened to the public in April. Those records plus documents obtained by The Associated Press in the past two years from the FBI, CIA and other agencies under the Freedom of Information Act portray a sophisticated organization obsessed with secrecy that operated a network of 40 chief agents and more than 600 sources in 32 countries. The AP has also interviewed former officials, family members, historians and archivists.
Note: For an illuminating video on the CIA, click here.
A huge cache of secret US military files today provides a devastating portrait of the failing war in Afghanistan. The disclosures come from more than 90,000 records of incidents and intelligence reports about the conflict obtained by the whistleblowers' website Wikileaks in one of the biggest leaks in US military history. The files, which were made available to the Guardian, the New York Times and the German weekly Der Spiegel, give a blow-by-blow account of the fighting over the last six years. The war logs [detail]: • How a secret "black" unit of special forces hunts down Taliban leaders for "kill or capture" without trial. • How the US covered up evidence that the Taliban have acquired deadly surface-to-air missiles. • How the coalition is increasingly using deadly Reaper drones to hunt and kill Taliban targets by remote control from a base in Nevada. The logs detail, in sometimes harrowing vignettes, the toll on civilians exacted by coalition forces: events termed "blue on white" in military jargon. The logs reveal 144 such incidents. Some of these casualties come from the controversial air strikes ... but a large number of previously unknown incidents also appear to be the result of troops shooting unarmed drivers or motorcyclists. Rachel Reid, who investigates civilian casualty incidents in Afghanistan for Human Rights Watch, said: "These files bring to light what's been a consistent trend by US and Nato forces: the concealment of civilian casualties."
Note: To check out WikiLeak's Afghan War Diary website, click here. Despite the media attention the logs have received, with many comparisons to the Pentagon Papers, some observers have noted that, unlike the Pentagon Papers, very few of the "revelations" in the Afghan War Logs have revealed anything previously unknown.
An Iranian scientist who says he was abducted and taken to the United States by the CIA returned to Tehran yesterday to a hero's welcome and claimed that he had been pressured into lying about his country's nuclear programme. Shahram Amiri said that he was on the hajj pilgrimage when he was seized at gunpoint in the city of Medina, drugged and taken to the US, where he says Israel was involved in his interrogation. In the US, officials were reported to have admitted that Mr Amiri was paid more than $5m (Ł3.2m) by the CIA for information about Iran's nuclear ambitions. The offer of a large bribe is reportedly part of a special US programme to get Iranian nuclear scientists to defect. "Americans wanted me to say that I defected to America of my own will, to use me for revealing some false information about Iran's nuclear work," Mr Amiri said at Tehran airport. "I was under intensive psychological pressure by [the] CIA... the main aim of this abduction was to stage a new political and psychological game against Iran." At his press conference at Tehran airport, Mr Amiri stressed that he had acted under compulsion. "Israeli agents were present at some of my interrogation sessions and I was threatened to be handed over to Israel if I refused to cooperate with Americans," he said. He says he was offered $50m to stay in the US.
Note: For key reports on CIA kidnappings and other methods employed in the bogus "global war on terror", click here.
A former Army microbiologist who worked for years with Bruce E. Ivins, whom the F.B.I. has blamed for the anthrax letter attacks that killed five people in 2001, told a National Academy of Sciences panel on [April 22] that he believed it was impossible that the deadly spores had been produced undetected in Dr. Ivins�s laboratory, as the F.B.I. asserts. Asked by reporters after his testimony whether he believed that there was any chance that Dr. Ivins, who committed suicide in 2008, had carried out the attacks, the microbiologist, Henry S. Heine, replied, �Absolutely not.� At the Army�s biodefense laboratory in Maryland, where Dr. Ivins and Dr. Heine worked, he said, �among the senior scientists, no one believes it.� Dr. Heine told the 16-member panel, which is reviewing the F.B.I.�s scientific work on the investigation, that producing the quantity of spores in the letters would have taken at least a year of intensive work using the equipment at the army lab. Such an effort would not have escaped colleagues� notice, he added later, and lab technicians who worked closely with Dr. Ivins have told him they saw no such work. �Whoever did this is still running around out there,� Dr. Heine said. �I truly believe that.�
Note: For more on the still-unsolved anthrax attacks, click here.
Activists behind a website dedicated to revealing secret documents have complained of harassment by police and intelligence services as they prepare to release a video showing an American attack in which 97 civilians were killed in Afghanistan. Julian Assange, one of the founders of Wikileaks, has claimed that a restaurant where the group met in Reykjavik, the capital of Iceland, came under surveillance in March and one of the group�s volunteers was detained for 21 hours by police. Assange, an Australian, says he was followed on a flight from Reykjavik to Copenhagen by two American agents. The group has riled governments by publishing documents leaked by whistleblowers. Assange claims surveillance has intensified as he and his colleagues prepare to put out their Afghan film. It is said to concern the so-called �Granai massacre�, when American aircraft dropped 500lb and 1,000lb bombs ... in Farah province on May 4 last year. Assange complained of �covert following and hidden photography� by police and foreign intelligence services. There have been thinly veiled threats, he says, from �an apparent British intelligence agent� in a car park in Luxembourg. �Computers were also seized,� another member of Wikileaks said ..., raising alarm among supporters: �If anything happens to us, you know why ... and you know who is responsible.�
Note: It's not surprising that US intelligence agencies are intimidating Wikileaks activists reporting on the atrocities committed in the wars of aggression in Iraq and Afghanistan. As explained by Marine Corps General Smedley Butler in this excellent summary, modern US wars are the ruling elite's "get rich quick" scheme, and they don't want you to know.
A federal judge ruled [on March 31] that the National Security Agency�s program of surveillance without warrants was illegal, rejecting the Obama administration�s effort to keep shrouded in secrecy one of the most disputed counterterrorism policies of former President George W. Bush. In a 45-page opinion, Judge Vaughn R. Walker ruled that the government had violated a 1978 federal statute requiring court approval for domestic surveillance when it intercepted phone calls of Al Haramain, a now-defunct Islamic charity in Oregon, and of two lawyers representing it in 2004. Declaring that the plaintiffs had been �subjected to unlawful surveillance,� the judge said the government was liable to pay them damages. The ruling by Judge Walker, the chief judge of the Federal District Court in San Francisco, rejected the Justice Department�s claim � first asserted by the Bush administration and continued under President Obama � that the charity�s lawsuit should be dismissed without a ruling on the merits because allowing it to go forward could reveal state secrets. The judge characterized that expansive use of the so-called state-secrets privilege as amounting to �unfettered executive-branch discretion� that had �obvious potential for governmental abuse and overreaching.�
Note: For illumination of the dark world of state secrecy, click here.
Four men accused of trying to bomb synagogues and shoot down planes in New York last spring did little more than go along with a fake plot proposed, directed and funded by the federal government, defense lawyers claim in asking the court to dismiss the case. A federal informant chose the targets, offered payment, provided maps and bought the only real weapon involved, a handgun, the attorneys said in a dismissal motion filed this week in federal court. They alleged the defendants were not inclined toward any crime until the informant began recruiting them. The dismissal motion identified the government's agent as Shaheed Hussain, a "professional informant" for the FBI. The defense alleged that Hussain tried to incite the defendants by blaming Jews for the world's evil and telling them that attacks against non-Muslims were endorsed by Islam. Nevertheless, they said, he failed to motivate the defendants to any action on their own. Hussain suggested the targets, paid for the defendants' groceries, bought a gun, provided the fake bombs and missile, assembled the explosive devices and acted as chauffeur, the defense said. "The alleged crimes were almost entirely the product of Hussain's labors and the enterprise would have immediately collapsed if Hussain's guiding hand had been removed," the defense motion said.
Note: For lots more evidence of fake terror plots used to maintain the "war on terror", click here.
More than eight years after anthrax-laced letters killed five people and terrorized the country, the F.B.I. [has] closed its investigation, adding eerie new details to its case that the 2001 attacks were carried out by Bruce E. Ivins, an Army biodefense expert who killed himself in 2008. A 92-page report, which concludes what by many measures is the largest investigation in F.B.I. history, laid out the evidence against Dr. Ivins. The report disclosed for the first time the F.B.I.’s theory that Dr. Ivins embedded in the notes mailed with the anthrax a complex coded message, based on DNA biochemistry. Whether the voluminous documentation will convince skeptics about Dr. Ivins’s guilt was uncertain. Representative Rush D. Holt, a New Jersey Democrat and a physicist who has sharply criticized the bureau’s work, said the case should not have been closed. He said the F.B.I. report laid out “barely a circumstantial case” that “would not, I think, stand up in court.” Some of Dr. Ivins’s colleagues at the United States Army Medical Research Institute of Infectious Diseases in Frederick, including several supervisors who knew him well, publicly rejected the F.B.I.’s conclusion. They said he was eccentric but incapable of such a diabolical act, and they questioned whether he could have produced the deadly powder with the equipment in his lab.
Note: The FBI's "closure" of its anthrax investigation won't put an end to the unanswered questions about who the perpetrators of the attacks were. As described in this key Wall Street Journal report, the specific formulation of the anthrax used in the attacks was beyond Ivins' capabilities.
U.S. military teams and intelligence agencies are deeply involved in secret joint operations with Yemeni troops who in the past six weeks have killed scores of people. The operations, approved by President Obama, involve several dozen troops from the U.S. military's clandestine Joint Special Operations Command (JSOC), whose main mission is tracking and killing [targeted persons]. Obama approved a Dec. 24 strike against a compound where a U.S. citizen, Anwar al-Aulaqi, was thought to be. He has since been added to a shortlist of U.S. citizens specifically targeted for killing or capture by the JSOC. The combined efforts have resulted in more than two dozen ground raids and airstrikes. After the Sept. 11 attacks, Bush gave the CIA, and later the military, authority to kill U.S. citizens abroad. The Obama administration has adopted the same stance. Both the CIA and the JSOC maintain lists of individuals, called "High Value Targets" and "High Value Individuals," whom they seek to kill or capture. The JSOC list includes three Americans, including Aulaqi, whose name was added late last year. As of several months ago, the CIA list [also] included three U.S. citizens.
Note: For many reports from reliable sources on the growing governmental threats to civil liberties, click here.
In 2009, the Justice Department began to release reports and top-secret memos detailing interrogation techniques ... used by CIA officers against suspected terror operatives. The list of brutal techniques, including holding prisoners in small boxes, staging mock executions, and water torture, is reminiscent of some of the worst human-rights abuses on record. In medieval Europe, torture was more than just a means of punishment. Many criminal trials of the era consisted of one or more 'ordeals,' painful tests designed to prove guilt or innocence through supernatural judgment. During waterboarding, a technique first used in the 14th century, torturers begin by pumping water directly into a victim's stomach or slowly flooding his throat with liquid. Used extensively during the Spanish Inquisition, the practice became less publicly acceptable during the Enlightenment, then experienced an underground resurgence in the 19th century. Since World War II, different forms of waterboarding have been employed by governments in Japan, Cambodia, the United Kingdom and the United States, among others. In addition to performing forced labor, prisoners at Nazi concentration camps became subjects in some of the cruelest medical experiments ever performed. They were often held at extreme altitudes and temperatures to help develop new survival strategies or exposed to deadly gases and diseases in order to test vaccines. Many of these tests, directed by the infamous Josef Mengele at Auschwitz, advanced Nazi ideology by establishing 'Jewish racial inferiority.'
Note: The above link leads to a revealing 12-part slide show on the history of torture. For more disturbing information on how Nazi torture techniques were eventually used by the CIA for mind control, click here.
A key terror suspect who allegedly helped to plan last year’s attacks in Mumbai and plotted to strike Europe was an American secret agent who went rogue, Indian officials believe. David Headley, 49, who was born in Washington to a Pakistan diplomat father and an American mother, was arrested in Chicago in October. He has denied the charges. He came to the attention of the US security services in 1997 when he was arrested in New York for heroin smuggling. He earned a reduced sentence by working for the US Drug Enforcement Agency (DEA) infiltrating Pakistan-linked narcotics gangs. Indian investigators, who have been denied access to Mr Headley, suspect that he remained on the payroll of the US security services — possibly working for the Central Intelligence Agency (CIA) — but switched his allegiance to LeT. “India is looking into whether Headley worked as a double agent,” an Indian Home Ministry official said yesterday. Mr Headley, who changed his name from Daood Gilani, was in Mumbai until two weeks before the attacks on the city. Despite being firmly on the radar of the US intelligence agencies, he was allowed to return to India as recently as March. Indian officials are furious that their American counterparts did not share details of that visit at the time. The Indian media has raised the possibility that Mr Headley was being protected by his American handlers — a theory that experts say is credible.
Note: For many other reports from major media sources that raise profound questions about the official account of "terrorism," click here.
The CIA is to be given broad access to the bank records of millions of Britons under a European Union plan to fight terrorism. The Brussels agreement, which will come into force in two months’ time, requires the 27 EU member states to grant requests for banking information made by the United States under its terrorist finance tracking programme. The EU said it had agreed that Europeans would be compelled to release the information to the CIA “as a matter of urgency”. The records will be kept in a US database for five years before being deleted. Critics say the system is “lopsided” because there is no reciprocal arrangement under which the UK authorities can easily access the bank accounts of US citizens. They also say the plan to sift through cross-border and domestic EU bank accounts gives US intelligence more scope to consult our bank accounts than is granted to law enforcement agencies in the UK or the rest of Europe. This weekend civil liberties groups and privacy campaigners said the surveillance programme, introduced as an emergency measure in 2001, was being imposed on Britain without a proper debate. Shami Chakrabarti, director of Liberty, said: “The massive scope for transferring personal information from Europe to the United States is extremely worrying, especially in the absence of public debate or parliamentary scrutiny either at EU or domestic level.
Note: For reports from major media sources on erosion of privacy by governments and corporations, click here.
The White House has authorized an expansion of the C.I.A.’s drone program in Pakistan’s lawless tribal areas. More C.I.A. drone attacks have been conducted under President Obama than under President George W. Bush. The political consensus in support of the drone program ... and its secrecy have obscured just how radical it is. For the first time in history, a civilian intelligence agency is using robots to carry out a military mission, selecting people for killing in a country where the United States is not officially at war. The drone warfare pioneered by the C.I.A. in Pakistan and the Air Force in Iraq and Afghanistan is the leading edge of a wave of push-button combat that will raise legal, moral and political questions around the world, said P. W. Singer, a scholar at the Brookings Institution and author of the book Wired for War: The Robotics Revolution and Conflict in the 21st Century. So far, only the United States and Israel have used the planes for strikes, but that number will grow. It is impossible to judge whether the program violates international law without knowing whether Pakistan permits the incursions, how targets are selected and what is done to minimize civilian casualties.
Note: For many revealing reports from reliable sources on the realities behind the "war on terror," click here.
At a covert forward operating base run by the US Joint Special Operations Command (JSOC) in the Pakistani port city of Karachi, members of an elite division of Blackwater are at the center of a secret program in which they plan targeted assassinations of suspected Taliban and Al Qaeda operatives, "snatch and grabs" of high-value targets and other sensitive action inside and outside Pakistan. The Blackwater operatives also assist in gathering intelligence and help direct a secret US military drone bombing campaign that runs parallel to the well-documented CIA predator strikes, according to a well-placed source within the US military intelligence apparatus. The previously unreported program, the military intelligence source said, is distinct from the CIA assassination program. "This is a parallel operation to the CIA," said the source. "They are two separate beasts." Blackwater's presence in Pakistan is "not really visible, and that's why nobody has cracked down on it," said the source. Blackwater's operations in Pakistan, he said, are not done through State Department contracts or publicly identified Defense contracts. "It's Blackwater via JSOC, and it's a classified no-bid [contract] approved on a rolling basis. Some of these strikes are attributed to [the CIA], but in reality it's JSOC. So when you see some of these hits, especially the ones with high civilian casualties, those are almost always JSOC strikes."
Note: Don't miss this key report in it's entirety. Why haven't other major media outlets mentioned the Joint Special Operations Command (JSOC) drone operations in Pakistan, running parallel to the CIA's?
Newly released FBI data offer evidence of the broad scope and complexity of the nation's terrorist watch list, documenting a daily flood of names nominated for inclusion to the controversial list. During a 12-month period ended in March this year, for example, the U.S. intelligence community suggested on a daily basis that 1,600 people qualified for the list because they presented a "reasonable suspicion," according to data provided to the Senate Judiciary Committee by the FBI in September and made public last week. The ever-churning list is said to contain more than 400,000 unique names and over 1 million entries. Nine percent of those on the terrorism list, the FBI said, are also on the government's "no fly" list. Before the attacks of Sept. 11, 2001, the FBI needed initial information that a person or group was engaged in wrongdoing before it could open a preliminary investigation. Under current practice, no such information is needed. The inquiries can be opened by individual agents "proactively," meaning on his or her own or in response to a lead about a threat.
Note: For lots more from major media sources on the growing government threats to civil liberties, click here.
Scientists in Israel have demonstrated that it is possible to fabricate DNA evidence, undermining the credibility of what has been considered the gold standard of proof in criminal cases. The scientists fabricated blood and saliva samples containing DNA from a person other than the donor of the blood and saliva. They also showed that if they had access to a DNA profile in a database, they could construct a sample of DNA to match that profile without obtaining any tissue from that person. “You can just engineer a crime scene,” said Dan Frumkin, lead author of the paper, which has been published online by the journal Forensic Science International: Genetics. “Any biology undergraduate could perform this.” Dr. Frumkin is a founder of Nucleix, a company based in Tel Aviv that has developed a test to distinguish real DNA samples from fake ones that it hopes to sell to forensics laboratories. The planting of fabricated DNA evidence at a crime scene is only one implication of the findings. A potential invasion of personal privacy is another. Using some of the same techniques, it may be possible to scavenge anyone’s DNA from a discarded drinking cup or cigarette butt and turn it into a saliva sample that could be submitted to a genetic testing company that measures ancestry or the risk of getting various diseases. Tania Simoncelli, science adviser to the American Civil Liberties Union, said the findings were worrisome. “DNA is a lot easier to plant at a crime scene than fingerprints,” she said. “We’re creating a criminal justice system that is increasingly relying on this technology.”
Note: For lots more on government threats to civil liberties, click here.
Last month, police and the FBI arrested four Newburgh men on charges that they had plotted to bomb synagogues in the Riverdale neighborhood of the Bronx and fire a missile at a military jet. As more details emerged, however, the less the four defendants sounded like men with the skills to plan a sophisticated terror plot. They were small-time crooks, felons with long criminal records. What the indictment didn't say, and what the initial news reports didn't fill in, was the extent to which the fifth man in the plot, an unnamed FBI informant, had provided the glue to hold the Newburgh 4 together. That informant was a Pakistani man named Shahed Hussain, code-named "Malik," who agreed to work for the FBI to obtain leniency after he was arrested in 2002 for fraud. Over a period of about a year, Malik met with [the] defendants ... while under FBI surveillance. The Newburgh bomb plot isn't the first of Malik's operations for the government. He played a similar role four years ago in an Albany case, in which he helped the FBI arrest a man named Mohammed Hossain, a cash-poor pizzeria owner, and his imam, Yassin Aref, after persuading them to launder $50,000 in a made-up plot to bring a missile to the U.S. and assassinate the Pakistani prime minister. In both cases, Malik did not stumble upon active terror cells plotting to bring destruction on American soil. Instead, in both Newburgh and Albany, he needed long periods of time to recruit his Muslim contacts, spin elaborate tales about his terror contacts, and develop solid plans of action, all the while providing the defendants with large amounts of resources and cash incentives. In each case, the question remains: Would either set of defendants have done anything remotely like plant bombs or launder money for terrorists if not for the prodding and plotting and encouragement of Malik and the FBI?
Note: For lots more from major media sources on the hidden realities behind the never-ending "war on terror", click here.
Medical personnel were deeply involved in the abusive interrogation of terrorist suspects held overseas by the Central Intelligence Agency, including torture, and their participation was a “gross breach of medical ethics,” a long-secret report by the International Committee of the Red Cross concluded. Based on statements by 14 prisoners who belonged to Al Qaeda and were moved to Guantánamo Bay, Cuba, in late 2006, Red Cross investigators concluded that medical professionals working for the C.I.A. monitored prisoners undergoing waterboarding, apparently to make sure they did not drown. Medical workers were also present when guards confined prisoners in small boxes, shackled their arms to the ceiling, kept them in frigid cells and slammed them repeatedly into walls, the report said. Facilitating such practices, which the Red Cross described as torture, was a violation of medical ethics even if the medical workers’ intentions had been to prevent death or permanent injury, the report said. But it found that the medical professionals’ role was primarily to support the interrogators, not to protect the prisoners, and that the professionals had “condoned and participated in ill treatment.” At times, according to the detainees’ accounts, medical workers “gave instructions to interrogators to continue, to adjust or to stop particular methods.” The Red Cross report was completed in 2007. It was obtained by Mark Danner, a journalist who has written extensively about torture, and posted Monday night with an article by Mr. Danner on the Web site of The New York Review of Books.
Note: Much of content of the Red Cross report was revealed in a March article by Mr. Danner and in a 2008 book, The Dark Side, by Jane Mayer, but the reporting of the Red Cross investigators’ conclusions on medical ethics and other issues are new.
The Maryland State Police surveillance of advocacy groups was far more extensive than previously acknowledged, with records showing that troopers monitored -- and labeled as terrorists -- activists devoted to such wide-ranging causes as promoting human rights and establishing bike lanes. Intelligence officers created a voluminous file on Norfolk-based People for the Ethical Treatment of Animals, calling the group a "security threat" because of concerns that members would disrupt the circus. Angry consumers fighting a 72 percent electricity rate increase in 2006 were targeted. The DC Anti-War Network, which opposes the Iraq war, was designated a white supremacist group, without explanation. One of the possible "crimes" in the file police opened on Amnesty International, a world-renowned human rights group: "civil rights." The [surveillance] ... confirmed the fears of civil liberties groups that have warned about domestic spying since the Sept. 11, 2001, attacks. "No one was thinking this was al-Qaeda," said Stephen H. Sachs, a former U.S. attorney and state attorney general appointed by Gov. Martin O'Malley (D) to review the case. "But 9/11 created an atmosphere where cutting corners was easier." Maryland has not been alone. The FBI and police departments in several cities, including Denver in 2002 and New York before the 2004 Republican National Convention, also responded to [dissent] by spying on activists.
Note: For wide coverage from reliable sources of disturbing threats to civil liberties, click here.
To friends in the protest movement, Lucy was an eager 20-something who attended their events and sent encouraging e-mails to support their causes. Only one thing seemed strange. "At one demonstration, I remember her showing up with a laptop computer and typing away," said Mike Stark, who helped lead the anti-death-penalty march in Baltimore that day. "We all thought that was odd." Not really. The woman was an undercover Maryland State Police trooper who between 2005 and 2007 infiltrated more than two dozen rallies and meetings of nonviolent groups. Maryland officials now concede that, based on information gathered by "Lucy" and others, state police wrongly listed at least 53 Americans as terrorists in a criminal intelligence database -- and shared some information about them with half a dozen state and federal agencies, including the National Security Agency. Among those labeled as terrorists: two Catholic nuns, a former Democratic congressional candidate, a lifelong pacifist and a registered lobbyist. One suspect's file warned that she was "involved in puppet making and allows anarchists to utilize her property for meetings." "There wasn't a scintilla of illegal activity" going on, said David Rocah, an attorney for the American Civil Liberties Union, which filed a lawsuit and in July obtained the first surveillance files. State police have released other heavily redacted documents. Investigators, the files show, targeted groups that advocated against abortion, global warming, nuclear arms, military recruiting in high schools and biodefense research, among other issues.
Note: For lots more on increasing threats to civil liberties, click here.
The former No. 3 official at the CIA pleaded guilty Monday to defrauding the government, closing an investigation that linked the nation's preeminent spy service to the corruption scandal involving former Rep. Randy "Duke" Cunningham. In admitting that he abused his rank to steer lucrative contracts to cronies, Kyle Dustin "Dusty" Foggo, the agency's onetime executive director, became one of the highest-ranking officials in CIA history to be convicted of criminal charges. But the deal also involved major concessions from prosecutors, who allowed Foggo to admit guilt to a single fraud charge, wiping out 27 additional counts that included money laundering and conspiracy. Prosecutors indicated that they would recommend he serve no more than 37 months. The revelations of Foggo's crimes surfaced two years ago during one of the most tumultuous periods in recent agency history, and added to the pressure on the Bush administration to remove Porter J. Goss as CIA director in 2006. Goss selected Foggo for the agency's third-ranking position. Foggo had never served as a case officer or an analyst -- the jobs that typically garner the most respect within the CIA. But as a procurement officer at a secret CIA post in Frankfurt, Germany, he was in a position to cultivate contacts with members of Congress and other influential officials who visited during overseas trips to war zones.
Note: Interesting that a guilty plea for one count was exchanged for dismissing numerous other charges of fraud and money laundering. For an excellent analysis of the reasons behind this unusual prosecutorial strategy, click here. Buzzy Krongard, the previous #3 man at the CIA, has been linked to the millions of dollars in suspicious stock option trades made just prior to 9/11 that were never claimed, though this received little media coverage.
Baggage searches are SOOOOOO early-21st century. Homeland Security is now testing the next generation of security screening — a body scanner that can read your mind. Most preventive screening looks for explosives or metals that pose a threat. But a new system called MALINTENT turns the old school approach on its head. This Orwellian-sounding machine detects the person — not the device — set to wreak havoc. MALINTENT, the brainchild of the cutting-edge Human Factors division in Homeland Security's directorate for Science and Technology, searches your body for non-verbal cues that predict whether you mean harm to your fellow passengers. It has a series of sensors and imagers that read your body temperature, heart rate and respiration for unconscious [tell-tale signs] invisible to the naked eye. But this is no polygraph test. Subjects do not get hooked up or strapped down for a careful reading; those sensors do all the work without any actual physical contact. It's like an X-ray for bad intentions. When the sensors identify that something is off, they transmit warning data to analysts, who decide whether to flag passengers for further questioning. The next step involves micro-facial scanning, which involves measuring minute muscle movements in the face for clues to mood and intention. Homeland Security has developed a system to recognize, define and measure seven primary emotions and emotional cues that are reflected in contractions of facial muscles. MALINTENT identifies these emotions and relays the information back to a security screener almost in real time.
Note: For many more major-media reports on threats to civil liberties, click here.
The United States is operating "floating prisons" to house those arrested in its war on terror, according to human rights lawyers, who claim there has been an attempt to conceal the numbers and whereabouts of detainees. Details of ships where detainees have been held and sites allegedly being used in countries across the world have been compiled as the debate over detention without trial intensifies on both sides of the Atlantic. Information about the operation of prison ships has emerged through a number of sources, including statements from the US military, the Council of Europe and related parliamentary bodies, and the testimonies of prisoners. The analysis, due to be published this year by the human rights organisation Reprieve, also claims there have been more than 200 new cases of rendition since 2006, when President George Bush declared that the practice had stopped. According to research carried out by Reprieve, the US may have used as many as 17 ships as "floating prisons" since 2001. Detainees are interrogated aboard the vessels and then rendered to other, often undisclosed, locations. Ships that are understood to have held prisoners include the USS Bataan and USS Peleliu. A further 15 ships are suspected of having operated around the British territory of Diego Garcia in the Indian Ocean, which has been used as a military base by the UK and the Americans. Clive Stafford Smith, Reprieve's legal director, said: "They choose ships to try to keep their misconduct as far as possible from the prying eyes of the media and lawyers. We will eventually reunite these ghost prisoners with their legal rights."
Note: For many other investigations of the reality of the "war on terror", click here.
Sometime in the next few years, if a memorandum signed by President Bush this month ever goes into effect, one government official talking to another about information on terrorists will have to begin by saying: "What I am about to tell you is controlled unclassified information enhanced with specified dissemination." That would mean, according to the memo, that the information requires safeguarding because "the inadvertent or unauthorized disclosure would create risk of substantial harm." Bush's memorandum ... introduced "Controlled Unclassified Information" as a new government category that will replace "Sensitive but Unclassified." Such information -- though it does not merit the well-known national security classifications "confidential," "secret" or "top secret" -- is nonetheless "pertinent" to U.S. "national interests" or to "important interests of entities outside the federal government," the memo says. Left undefined are which laws or policies generated the requirement for protecting such information, and which interests are pertinent. But Bush's memo does refer to the "global nature of the threats facing the United States" and to the need to ensure that the "entire network of defenders be able to share information more rapidly." Some critics described it as continuing an expansion of secrecy in government and a potential bureaucratic nightmare. The White House "seems to have used the crafting of new rules as an opportunity to expand the range of government secrecy," said Michael Clark, a contributing editor to the blog Daily Kos, who first wrote about the Bush memorandum.
Note: For many revealing reports of increasing government secrecy from reliable sources, click here.
The FBI has withdrawn a secret administrative order seeking the name, address and online activity of a patron of the Internet Archive after the San Francisco-based digital library filed suit to block the action. It is one of only three known instances in which the FBI has backed off from such a data demand, known as a "national security letter," or NSL, which is not subject to judicial approval and whose recipient is barred from disclosing the order's existence. NSLs are served on phone companies, Internet service providers and other electronic communications service providers, but because of the gag order provision, the public has little way to know about them. FBI officials now issue about 50,000 such orders a year. The order against the Internet Archive was served Nov. 26, and the nonprofit challenged it based on a provision of the reauthorized USA Patriot Act, which protects libraries from such requests. The privacy advocacy group Electronic Frontier Foundation represented the archive in the suit, which was joined by the American Civil Liberties Union. The archive also alleged that the gag order that accompanied the data demand violated the Constitution. As part of their settlement, the FBI agreed to drop the gag order and the archive agreed to withdraw the complaint. The case was unsealed Monday. Yesterday, redacted versions of key documents were filed, allowing the parties to discuss the case. "We see this as an unqualified success," said Brewster Kahle, the archive's co-founder and digital librarian. "The goal here was to help other recipients of NSLs to understand that you can push back."
Note: The Internet Archive has now posted excellent information on how to deal with cases like this at http://government.zdnet.com/?p=3795. Three cheers for the Internet Archive!
So far as I know, I have never taken money from the C.I.A.. The same can’t be said for any number of prominent writers and artists, from Arthur Schlesinger Jr. to Jackson Pollock. During the early years of the cold war, they were supported, sometimes lavishly, always secretly, by the C.I.A. as part of its propaganda war against the Soviet Union. Yet once the facts came out in 1967 the episode became a source of scandal and controversy. How close should presumably independent intellectuals get to their government? Many books and articles were written about all this until 1999, when one book, Frances Stonor Saunders’ “Cultural Cold War,” swept the field. Saunders was highly critical of the “octopus-like C.I.A.” and those intellectuals who allowed themselves to be used as pawns in the government’s cold war game. But though her book was diligently researched and vigorously argued, it can hardly be considered the last word. Now the historian Hugh Wilford has come out with “The Mighty Wurlitzer,” and it can be seen as a direct rejoinder to Saunders. The story, Wilford says, is complicated. Far from being pawns, the intellectuals on the C.I.A. payroll were willing participants in what they understood as the legitimate cause of opposing Soviet tyranny. They took money for what they would have done anyway; the C.I.A. simply allowed them to be more effective at doing it.
Note: For lots more evidence on how the U.S. government has used propaganda against the American people, read this excellent article. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
The FBI has been accused of covering up a key case file detailing evidence against corrupt government officials and their dealings with a network stealing nuclear secrets. The assertion follows allegations made in The Sunday Times two weeks ago by Sibel Edmonds, an FBI whistleblower, who worked on the agency’s investigation of the network. She says the FBI was investigating a Turkish- and Israeli-run network that paid high-ranking American officials to steal nuclear weapons secrets. These were then sold on the international black market to countries such as Pakistan and Saudi Arabia. One of the documents relating to the case was marked 203A-WF-210023. Last week, however, the FBI responded to a freedom of information request for a file of exactly the same number by claiming that it did not exist. But The Sunday Times has obtained a document signed by an FBI official showing the existence of the file. The freedom of information request ... was made ... by an American human rights group called the Liberty Coalition, acting on a tip-off it received from an anonymous correspondent. Edmonds [said] that members of the Turkish political and diplomatic community in the US had been actively acquiring nuclear secrets. They often acted as a conduit, she said, for Inter-Services Intelligence (ISI), Pakistan’s spy agency, because they attracted less suspicion. She claimed corrupt government officials helped the network, and venues such as the American-Turkish Council in Washington were used as drop-off points. Edmonds is the subject of a number of state-secret gags preventing her from talking further about the investigation she witnessed. “[These gags were] invoked not to protect sensitive diplomatic relations but criminal activities involving US officials who were endangering US national security,” she said.
Note: For an important commentary by Pentagon Papers whistleblower Daniel Ellsberg on this Sunday Times story, click here. For other excellent media articles on the courageous Ms. Edmonds, click here.
A whistleblower has made a series of extraordinary claims about how corrupt government officials allowed Pakistan and other states to steal nuclear weapons secrets. Sibel Edmonds, a 37-year-old former Turkish-language translator for the FBI, listened into hundreds of sensitive intercepted conversations while based at the agency’s Washington field office. Edmonds described how foreign intelligence agents had enlisted the support of US officials to acquire a network of moles in sensitive military and nuclear institutions. Among the hours of covert tape recordings, she says she heard evidence that one well-known senior official in the US State Department was being paid by Turkish agents in Washington who were selling the information on to black market buyers, including Pakistan. The name of the official – who has held a series of top government posts – is known to The Sunday Times. He strongly denies the claims. However, Edmonds said: “He was aiding foreign operatives against US interests by passing them highly classified information, not only from the State Department but also from the Pentagon, in exchange for money, position and political objectives.” She claims that the FBI was also gathering evidence against senior Pentagon officials – including household names – who were aiding foreign agents. “If you made public all the information that the FBI have on this case, you will see very high-level people going through criminal trials,” she said. Her story shows just how much the West was infiltrated by foreign states seeking nuclear secrets. It illustrates how western government officials turned a blind eye to, or were even helping, countries such as Pakistan acquire bomb technology.
Note: Although not naming the high-level individuals it acknowledges were identified by Edmonds, this important exposé in the London Sunday Times should be read in its entirety for the many other details of her allegations that it reveals. For an excellent commentary on these new revelations, click here. For many revealing articles on the ongoing efforts by longtime whistleblower Sibel Edmonds to tell her story, click here.
A newly declassified document shows that J. Edgar Hoover, the longtime director of the Federal Bureau of Investigation, had a plan to suspend habeas corpus and imprison some 12,000 Americans he suspected of disloyalty. Hoover sent his plan to the White House on July 7, 1950, 12 days after the Korean War began. It envisioned putting suspect Americans in military prisons. Hoover wanted President Harry S. Truman to proclaim the mass arrests necessary to “protect the country against treason, espionage and sabotage.” The F.B.I would “apprehend all individuals potentially dangerous” to national security, Hoover’s proposal said. The arrests would be carried out under “a master warrant attached to a list of names” provided by the bureau. The names were part of an index that Hoover had been compiling for years. “The index now contains approximately twelve thousand individuals, of which approximately ninety-seven per cent are citizens of the United States,” he wrote. “In order to make effective these apprehensions, the proclamation suspends the Writ of Habeas Corpus,” it said. Habeas corpus, the right to seek relief from illegal detention, has been a fundamental principle of law for seven centuries. Hoover’s plan called for “the permanent detention” of the roughly 12,000 suspects at military bases as well as in federal prisons. The prisoners eventually would have had a right to a hearing under the Hoover plan. The hearing board would have been a panel made up of one judge and two citizens. But the hearings “will not be bound by the rules of evidence,” his letter noted. The only modern precedent for Hoover’s plan was the Palmer Raids of 1920, named after the attorney general at the time. The raids, executed in large part by Hoover’s intelligence division, swept up thousands of people suspected of being communists and radicals.
Note: For understandable reasons, many are concerned at how the current administration has weakened habeas corpus in recent years. Any cititzen who is declared an enemy combatant is no longer protected.
The CIA made videotapes in 2002 of its officers administering harsh interrogation techniques to two al-Qaeda suspects but destroyed the tapes three years later, CIA Director Michael V. Hayden said. Captured on tape were interrogations of Abu Zubaydah ... and a second high-level al-Qaeda member who was not identified. Zubaydah [was] subjected to "waterboarding" ... while in CIA custody. All the tapes were destroyed in November 2005 on the order of Jose A. Rodriguez Jr., then the CIA's director of clandestine operations. The destruction came after the Justice Department had told a federal judge in the case of al-Qaeda operative Zacarias Moussaoui that the CIA did not possess videotapes of a specific set of interrogations sought by his attorneys. The startling disclosures came on the same day that House and Senate negotiators reached an agreement on legislation that would prohibit the use of waterboarding and other harsh interrogation tactics by the CIA. The measure ... would effectively set a government-wide standard for legal interrogations by explicitly outlawing the use of [waterboarding], forced nudity, hooding, military dogs and other harsh tactics against prisoners by any U.S. intelligence agency. Civil liberties advocates denounced the CIA's decision to destroy the tapes. Jameel Jaffer, a national security lawyer at the American Civil Liberties Union, said the tapes were destroyed at a time when a federal court had ordered the CIA to comply with a Freedom of Information Act request by the ACLU seeking records related to interrogations. "The CIA appears to have deliberately destroyed evidence that would have allowed its agents to be held accountable for the torture of prisoners," Jaffer said. "They are tapes that should have been released to the courts and Congress, but the CIA apparently believes that its agents are above the law."
The Prince Group, the holding company that owns Blackwater Worldwide, has been building an operation that will [develop] intelligence ... for clients in industry and government. The operation, Total Intelligence Solutions, has assembled a roster of former ... high-ranking figures from agencies such as the CIA and defense intelligence. Its chairman is Cofer Black, the former head of counterterrorism at CIA known for his leading role in many of the agency's more controversial programs, including the rendition and interrogation of ... suspects and the detention of some of them in secret prisons overseas. Its chief executive is Robert Richer, a former CIA associate deputy director of operations who was heavily involved in running the agency's role in the Iraq war. Because of its roster and its ties to owner Erik Prince, the multimillionaire former Navy SEAL, the company's thrust into this world highlights the blurring of lines between government, industry and activities formerly reserved for agents operating in the shadows. Richer, for instance, once served as the chief of the CIA's Near East division and is said to have ties to King Abdullah of Jordan. The CIA had spent millions helping train Jordan's intelligence service in exchange for information. Now Jordan has hired Blackwater to train its special forces. "Cofer can open doors," said Richer, who served 22 years at the CIA. "I can open doors. We can generally get in to see who we need to see. We ... can deal with the right minister or person." "They have the skills and background to do anything anyone wants," said RJ Hillhouse, who writes a national security blog called The Spy Who Billed Me. "There's no oversight. They're an independent company offering freelance espionage services. They're rent-a-spies."
Four Air Force colonels have been relieved of their commands and more than 65 lower-ranking officers and airmen have been disciplined over a series of errors that led to a B-52 flight from North Dakota to Louisiana with six nuclear-armed cruise missiles that no one realized were under the wing. The Fifth Bomb Wing commander at Minot, Colonel Bruce Emig, was removed from command, along with his chief munitions officer and the operations officer of the B-52 unit at Barksdale. The munitions squadron commander at Minot was relieved of command shortly after the incident. The problems began with a breakdown in the formal scheduling process used to prepare the AGM-129 cruise missiles in question for decommissioning. In March, the Pentagon decided to retire it in favor of an older AGM-86. Part of the preparation involved removing the W-80 nuclear warhead and replacing it with a steel dummy on missiles to be flown aboard B-52s to Barksdale for destruction. On the morning of Aug. 29, the loading crew at Minot used a paper schedule that was out of date when members picked up 12 missiles from a guarded weapons-storage hangar, six with dummy warheads and six they did not realize had nuclear warheads. The trailer that would carry the pylons to the B-52 arrived early, and its crew did not inspect the missiles as it should have before loading them on the trailer. The driver called the munitions control center to verify the numbers, but the staff there failed to check them. At the aircraft, the crew that loaded the pylons, one under each wing, failed again to check the missiles, which have a small glass porthole to view whether a dummy or nuclear warhead is installed. The next morning, Aug. 30, the plane's navigator failed to do a complete check of the missiles, as required, looking under only one wing and not the one where the nuclear-armed missiles were.
Note: How is it possible that 65 military people were involved in this? Could it be that they were part of a rogue operation that was uncovered? There's more here than meets the eye.
A Montreal senior who survived Cold War-era brainwashing experiments picked up a cheque for compensation from the [Canadian] federal government on Tuesday. Janine Huard, 79, accepted an offer to end her class-action lawsuit against the federal government, which jointly funded the experiments with the [U.S.] Central Intelligence Agency. The terms of the settlement are confidential, but Huard says it will allow her to live out her days in peace, with some peace of mind. "I was really so exhausted from fighting for so many years,'' Huard told The Canadian Press in an interview. Huard was a young mother of four suffering from post-partum depression when she checked herself into McGill's renowned Allen Memorial Institute in 1950. On and off for the next 15 years, she was one of hundreds of patients of Dr. Ewan Cameron subjected to experimental treatments that included massive electroshock therapy, experimental pills and LSD. The patients were induced into comas and exposed to repetitive messages for days on end to brainwash them. Cameron pioneered a technique called psychic driving, which he believed could erase harmful memories and rebuild psyches without psychiatric defect. The idea intrigued the CIA, which recruited him to experiment with mind control beginning in 1950. Until 1964, Cameron conducted a range of experiments at the McGill institute, often without the knowledge or the permission of his patients. The experiments were part of a larger CIA program called MK-ULTRA, which saw LSD administered to U.S. prison inmates and patrons of brothels without their knowledge. Huard said the treatment left her unable to care for her children. She suffered memory loss and migraines for many years.
Note: For a powerful summary of MK-ULTRA and other CIA mind-control experiments, click here.
A terrorist watch list compiled by the FBI has apparently swelled to include more than half a million names. Privacy and civil liberties advocates say the list is growing uncontrollably, threatening its usefulness in the war on terror. The bureau says the number of names on its terrorist watch list is classified. A portion of the FBI's unclassified 2008 budget request posted to the Department of Justice Web site, however, refers to "the entire watch list of 509,000 names." A spokesman for the interagency National Counterterrorism Center (NCTC), which maintains the government's list of all suspected terrorists with links to international organizations, said they had 465,000 names covering 350,000 individuals. Many names are different versions of the same identity. In addition to the NCTC list, the FBI keeps a list of U.S. persons who are believed to be domestic terrorists - abortion clinic bombers, for example, or firebombing environmental extremists, who have no known tie to an international terrorist group. Combined, the NCTC and FBI compendia comprise the watch list used by federal security screening personnel on the lookout for terrorists. While the NCTC has made no secret of its terrorist tally, the FBI has consistently declined to tell the public how many names are on its list. "It grows seemingly without control or limitation," said ACLU senior legislative counsel Tim Sparapani of the terrorism watch list. Sparapani called the 509,000 figure "stunning. If we have 509,000 names on that list, the watch list is virtually useless," he told ABC News. "You'll be capturing innocent individuals with no connection to crime or terror." U.S. lawmakers and their spouses have been detained because their names were on the watch list.
In demanding a congressional investigation into the aborted rescue during the attack of the USS Liberty and subsequent alleged cover-up [the following] conclusions [were] submitted in October 2003 to the Office of the U.S. Secretary of Defense by the USS Liberty Veterans Association, Inc.: 1. That on June 8, 1967 ... Israel launched a two-hour air and naval attack against USS Liberty ... inflicting 34 dead and 173 wounded American servicemen; 2. That ... unmarked Israeli aircraft dropped napalm canisters on USS Liberty's bridge and fired 30mm cannons and rockets into [the] ship; 3. That the torpedo boat attack involved not only the firing of torpedoes, but the machine-gunning of Liberty's firefighters and stretcher-bearers as they struggled to save their ship and crew; the Israeli torpedo boats later returned to machine-gun at close range three of the Liberty's life rafts that had been lowered into the water by survivors to rescue the most seriously wounded; 4. That there is compelling evidence that Israel's attack was a deliberate attempt to destroy an American ship and kill her entire crew; evidence of such intent is supported by statements from Secretary of State Dean Rusk, Undersecretary of State George Ball, former CIA Director Richard Helms, former NSA Directors Lt. Gen. William Odom, USA (Ret.), Adm. Bobby Ray Inman, USN (Ret.), and Marshal Carter; former NSA deputy directors Oliver Kirby and Maj. Gen. John Morrison, USAF (Ret.); 6. The White House deliberately prevented the U.S. Navy from coming to the defense of USS Liberty by recalling Sixth Fleet military rescue support while the ship was under attack.
Note: To view the BBC documentary about the USS Liberty attack, "Dead in the Water," click here. For more information about the USS Liberty, click here.
Former CIA director George J. Tenet bitterly complains in a forthcoming television interview that White House officials set him up as a scapegoat when they revealed that he had assured President Bush the intelligence on Iraq's suspected weapons arsenal was a "slam dunk." Tenet, who was one of the longest-serving CIA directors in U.S. history, resigned abruptly in June 2004 after administration infighting over the flawed intelligence in the run-up to the Iraq war. Bush awarded him the Medal of Freedom six months later. Tenet then remained publicly silent about his role in the presentation of prewar intelligence that turned out to be wrong. CBS News's "60 Minutes" released excerpts of its Tenet interview. In the interview, Tenet acknowledged that he used the phrase "slam dunk" during a conversation with Bush and other key advisers in December 2002. But Tenet said the phrase was an offhand remark used to describe the ease with which a public case for war could be made. Washington Post Assistant Managing Editor Bob Woodward first wrote about the conversation between Tenet and Bush in his 2004 book "Plan of Attack." Bush told Woodward then that Tenet's "slam dunk" assurance had been "very important" as he weighed decisions about the invasion. In the television interview, Tenet takes special exception with Bush's comments. Tenet initially denied having used the phrase "slam dunk." But, in a 2005 speech at Kutztown University in Pennsylvania, he said he regretted using the phrase to describe the case against Iraq. "Those were the two dumbest words I ever said," Tenet said.
Note: The head of the CIA admits he lied about something as vital as the use of a phrase involving gross manipulation of the public in support of war. Who else is lying here?
When the old spymaster thought he was dying, his eldest son came to visit him. In the CIA, [Howard Hunt] had helped to mastermind the violent removal of a duly elected leftist president in Guatemala and assisted in subterfuges that led to the murder of Che Guevara. But his first-born son, [Saint] was by his side now. For years, he and Saint had hardly spoken. Then Saint came to him wanting to know if he had any information about JFK’s assassination. His father had sworn in two government investigations that he didn’t. But now, in August 2003, propped up in his sick bed, he began to write down the names of men who participated in a plot to kill the president. He scribbled the initials “LBJ”, standing for Kennedy’s vice-president, Lyndon Johnson. Under “LBJ”, connected by a line, he wrote the name Cord Meyer. Meyer was a CIA agent whose wife had an affair with JFK; later she was murdered, a case that has never been solved. Next, his father connected to Meyer’s name the name Bill Harvey, another CIA agent; also connected to Meyer’s name was the name David Morales, another CIA man and a well-known, vicious black-operations specialist. Then his father connected to Morales’s name, with a line, the framed words “French Gunman Grassy Knoll”. So there it was: according to Hunt, LBJ had Kennedy killed. And that Lee Harvey Oswald wasn’t the only shooter in Dallas. There was also, on the grassy knoll, a French gunman, presumably the Corsican mafia assassin Lucien Sarti. A few weeks later, Saint received in the mail a tape recording from his dad. Hunt’s voice on the cassette is weak and grasping, but he essentially remakes the same points he made in his handwritten narrative.
Note: Though this article interesting refers to Saint as a "conspiracy nut," if you take the time to read it, you will find it raises many serious questions about the Kennedy assassination. The History Channel has an excellent documentary series showing beyond doubt there was more than one gunman. To order, click here. For the banned final episode of this series, which presents powerful evidence LBJ was directly involved in the JFK assassination, click here
An extraordinary 95 percent of all Americans have at least heard or read something about Unidentified Flying Objects (UFOs), and 57 percent believe they are real. Former US Presidents Carter and Reagan claim to have seen a UFO.... In January 1953, [CIA Deputy Director H. Marshall] Chadwell and H. P. Robertson, a noted physicist from the California Institute of Technology, put together a distinguished panel of nonmilitary scientists to study the UFO issue. The panel ... worried that potential enemies contemplating an attack on the United States might exploit the UFO phenomena and use them to disrupt US air defenses. To meet these problems, the panel recommended that the National Security Council debunk UFO reports and institute a policy of public education to reassure the public of the lack of evidence behind UFOs. It suggested using the mass media, advertising, business clubs, schools, and even the Disney corporation to get the message across. Reporting at the height of McCarthyism, the panel also recommended that such private UFO groups as the Civilian Flying Saucer Investigators in Los Angeles and the Aerial Phenomena Research Organization in Wisconsin be monitored for subversive activities.
Note: Though this compilation largely debunks the UFO phenomenon, it also contains a few revealing facts. Why was the CIA involved in debunking the phenomenon? And why would they start this paper with the statement "at least 95 percent of all Americans have at least heard or read something about UFOs," when that number is clearly 100 percent, and is not extraordinary. Of course, everyone has heard of UFOs. Could this document itself be a form of government disinformation meant to further muddy the waters?
Col. Masanobu Tsuji was a fanatical Japanese militarist and brutal warrior, hunted after World War II for massacres of Chinese civilians. And then he became a U.S. spy. Newly declassified CIA records ... document more fully than ever how Tsuji and other suspected Japanese war criminals were recruited by U.S. intelligence in the early days of the Cold War. The records [were] declassified in 2005 and 2006 under an act of Congress in tandem with Nazi war crime-related files. In addition to Tsuji ... conspicuous figures in U.S.-funded operations included [a] mob boss and war profiteer [and] former private secretary to Hideki Tojo, the wartime prime minister hanged as a war criminal in 1948. The assessments ... show evidence that other U.S. agencies, such as the Air Force, were also looking into using some of the same people as spies, and that the CIA itself had contacts with former Japanese war criminals. Historians long ago concluded that the Allies turned a blind eye to many Japanese war crimes, particularly those committed against other Asians. Some of Japan's most notorious wartime killers [came] under U.S. sponsorship. Tsuji, for instance, was wanted for involvement in the Bataan Death March of early 1942, in which thousands of Americans and Filipinos perished. The U.S. Air Force attempted unsuccessfully to recruit him after he was taken off the war crimes list in 1949. The Army considered him a potentially valuable source. [Yet] a CIA assessment from 1954 ... says: "Tsuji is the type of man who, given the chance, would start World War III without any misgivings."
Note: Those who claimed the U.S. government had links to former Nazi and Japanese war criminals were once called "conspiracy theorists." Why does it take over 50 years for the truth to come out? For more, click here.
The only surviving convicted criminal in the April 19, 1995, bombing of the Alfred P. Murrah Federal Building in Oklahoma City is saying his co-conspirator, Timothy McVeigh, told him he was taking orders from a top FBI official in orchestrating the bombing. A declaration from Terry Lynn Nichols ... was filed as part of Salt Lake City attorney Jesse Trentadue's pending wrongful death suit against the government for the death of his brother in a federal corrections facility in Oklahoma City. Trentadue claims his brother was killed during an interrogation by FBI agents when agents mistook his brother for a suspect in the Oklahoma City bombing investigation. The most shocking allegation in the 19-page signed declaration is Nichols' assertion that the whole bombing plot was an FBI operation and that McVeigh let slip during a bout of anger that he was taking instruction from former FBI official Larry Potts. Potts was no stranger to anti-government confrontations, having been the lead FBI agent at Ruby Ridge in 1992, which led to the shooting death of Vicki Weaver, the wife of separatist Randy Weaver. Potts also was reportedly involved in the 51-day siege of the Branch Davidian compound in Waco, Texas in 1993, which resulted in a fire that killed 81 Branch Davidian followers. Potts retired from the FBI under intense pressure and criticism for the cover-up of an order to allow agents to shoot anyone seen leaving the Weaver cabin at Ruby Ridge.
Note: For an excellent article and video clearly showing major deception around the Oklahoma City bombing, click here. For lots more from reliable sources on the deceptive manipulations of intelligence agencies, click here.
Col. Masanobu Tsuji was a fanatical Japanese militarist and brutal warrior, hunted after World War II for massacres of Chinese civilians and complicity in the Bataan Death March. And then he became a U.S. spy. Newly declassified CIA records, released by the U.S. National Archives and examined by The Associated Press, document more fully than ever how Tsuji and other suspected Japanese war criminals were recruited by U.S. intelligence in the early days of the Cold War. In addition to Tsuji, who escaped Allied prosecution and was elected to parliament in the 1950s, conspicuous figures in U.S.-funded operations included mob boss and war profiteer Yoshio Kodama, and Takushiro Hattori, former private secretary to Hideki Tojo, the wartime prime minister hanged as a war criminal in 1948. The CIA also cast a harsh eye on its counterparts — and institutional rivals — at G-2, the occupation's intelligence arm, providing evidence for the first time that the Japanese operatives often bilked gullible American patrons, passing on useless intelligence and using their U.S. ties to boost smuggling operations and further their efforts to resurrect a militarist Japan.
A Montreal woman is seeking to launch a class-action lawsuit more than 50 years after she says she was subjected to controversial psychiatric treatments funded by the Canadian government and the CIA. Janine Huard, 78, was a patient at McGill University's Allan Memorial Institute when a doctor there was conducting brainwashing experiments. Dr. Ewen Cameron, an American doctor who believed he could erase the memories of patients and rebuild their psyches, was recruited by the CIA to experiment with mind-control techniques beginning in 1950. Cameron gave patients LSD and subjected them to massive and multiple electroshock treatments. Some underwent sleep deprivation or total sensory deprivation. Others were kept in drug-induced comas for months on end while speakers under their pillows broadcast messages for up to 16 hours a day. The experiments were part of a larger CIA program called MK-ULTRA, which also saw LSD administered to U.S. prison inmates and patrons of brothels without their knowledge, according to testimony before a 1977 U.S. Senate committee. The CIA eventually settled a class-action lawsuit by test subjects, including Huard, and the Canadian government ordered a judicial report into Cameron's experiments. The McGill experiments were jointly funded by the U.S. spy agency and the Canadian government.
Note: What this article fails to mention is that Dr. Cameron was also the president of both the American Psychicatric Association and the World Psychiatric Association. For more reliable information, click here.
The investigation into the assassination of Bulgarian dissident Georgi Markov, murdered with a poison-filled pellet shot into his leg (possibly with a converted "umbrella gun") at a bus stop in Britain in 1978, was the most unusual and significant case that medical doctor and forensic specialist Christopher C. Green participated in during his twenty year career as an investigative officer with the Central Intelligence Agency. The reason it was so unique, he says, is that "we had pretty much all of the story from a forensic point of view. We had the body, the thing in the body that he was hit with -- the pellet -- and the stuff from the pellet. We knew that the material used to kill him, ricin, had been under development by a foreign service linked to the incident. We also knew that he had been a target of assassination attempts in the past. The story of him being a target was very well known. So we had information on the means, motive, and the opportunity." In the Markov case, "we had 80 percent of the story," says Green, who is now a professor of diagnostic radiology and psychiatry and behavioral neurosciences at Wayne State University's Detroit Medical Center, where he uses brain imaging techniques to watch how the brain functions as people make decisions. His current work, he says, is a logical outgrowth of his service at the CIA -- where he still serves as a consultant. At the CIA, Green studied how the brain responds to chemicals and neurological agents.
Note: For more on this bizarre case, click here. A 2008 Reuters article on the case is also available here, as is a 2006 New York Times article at this link.
Ten years ago today, one of the most controversial news articles of the 1990s quietly appeared on the front page of the San Jose Mercury News. Titled "Dark Alliance"...the three-part series by reporter Gary Webb linked the CIA and Nicaragua's Contras to the crack cocaine epidemic that ripped through South Los Angeles in the 1980s. Most of the nation's elite newspapers at first ignored the story. A public uproar, especially among urban African Americans, forced them to respond. What followed was one of the most bizarre, unseemly and ultimately tragic scandals in the annals of American journalism. Top news organizations closed ranks to debunk claims Webb never made, ridicule assertions that turned out to be true and ignore corroborating evidence when it came to light. The whole shameful cycle was repeated when Webb committed suicide in December 2004. At first, the Mercury News defended the series, but after nine months, Executive Editor Jerry Ceppos wrote a half-apologetic letter to readers that defended "Dark Alliance" while acknowledging obvious mistakes. Webb privately (and accurately) predicted the mea culpa would universally be misperceived as a total retraction, and he publicly accused the paper of cowardice. He resigned a few months later. Meanwhile, spurred on by Webb's story, the CIA conducted an internal investigation that acknowledged in March 1998 that the agency had covered up Contra drug trafficking for more than a decade. History will tell if Webb receives the credit he's due for prodding the CIA to acknowledge its shameful collaboration with drug dealers.
Note: Many thanks to the Los Angeles Times for the courage to report this story. For more on this incredibly revealing, yet very tragic case which reveals corruption in both the government and media at the highest levels: http://www.WantToKnow.info/mediacover-up#webb
President George W. Bush has bestowed on his intelligence czar, John Negroponte, broad authority, in the name of national security, to excuse publicly traded companies from their usual accounting and securities-disclosure obligations. Notice of the development came in a brief entry in the Federal Register, dated May 5, 2006, that was opaque to the untrained eye. Unbeknownst to almost all of Washington and the financial world, Bush and every other President since Jimmy Carter have had the authority to exempt companies working on certain top-secret defense projects from portions of the 1934 Securities Exchange Act. Administration officials told BusinessWeek that they believe this is the first time a President has ever delegated the authority to someone outside the Oval Office. It couldn't be immediately determined whether any company has received a waiver under this provision. The timing of Bush's move is intriguing. On the same day the President signed the memo, Porter Goss resigned as director of the Central Intelligence Agency. Only six days later ... USA Today reported that the National Security Agency had obtained millions of calling records of ordinary citizens provided by three major U.S. phone companies. Negroponte oversees both the CIA and NSA in his role as the administration's top intelligence official. In addition to refusing to explain why Bush decided to delegate this authority to Negroponte, the White House declined to say whether Bush or any other President has ever exercised the authority and allowed a company to avoid standard securities disclosure and accounting requirements.
Note: For many revealing reports on government secrecy from major media sources, click here.
Russell Tice, a longtime insider at the National Security Agency, is now a whistleblower the agency would like to keep quiet. For 20 years, Tice worked in the shadows as he helped the United States spy on other people's conversations around the world. "I specialized in what's called special access programs," Tice said of his job. "We called them 'black world' programs and operations." But now, Tice tells ABC News that some of those secret "black world" operations run by the NSA were operated in ways that he believes violated the law. He is prepared to tell Congress all he knows about the alleged wrongdoing in these programs run by the Defense Department and the NSA. Tice says the technology exists to track and sort through every domestic and international phone call...and to search for key words or phrases that a terrorist might use. President Bush has admitted that he gave orders that allowed the NSA to eavesdrop on a small number of Americans without the usual requisite warrants. But Tice disagrees. He says the number of Americans subject to eavesdropping by the NSA could be in the millions. The NSA revoked Tice's security clearance in May of last year based on what it called psychological concerns and later dismissed him. Tice calls that bunk and says that's the way the NSA deals with troublemakers and whistleblowers.
Note: For many years, both the U.S. and U.K. denied the existence of Echelon, which according to the BBC article below is a "spying network that can eavesdrop on every single phone call, fax or e-mail, anywhere on the planet." http://news.bbc.co.uk/1/hi/world/503224.stm
The FBI, while waging a highly publicized war against terrorism, has spent resources gathering information on antiwar and environmental protesters and on activists who feed vegetarian meals to the homeless, the agency's internal memos show. For years, the FBI's definition of terrorism has included violence against property. That definition has led FBI investigations to online discussion boards, organizing meetings and demonstrations of a wide range of activist groups. The FBI's encounters with activists are described in hundreds of pages of documents obtained by the American Civil Liberties Union under the Freedom of Information Act after agents visited several activists before the 2004 political conventions. ACLU attorneys acknowledge that the FBI memos are heavily redacted and contain incomplete portraits of some cases. Still, the attorneys say, the documents show that the FBI has monitored groups that were not suspected of any crime. FBI officials respond that there is nothing improper about agents attending a meeting or demonstration.
The FBI agent who arrested Zacarias Moussaoui in August 2001 testified Monday he spent almost four weeks trying to warn U.S. officials about the radical Islamic student pilot but "criminal negligence" by superiors in Washington thwarted a chance to stop the 9/11 attacks. Samit told MacMahon he couldn't persuade FBI headquarters or the Justice Department to take his fears seriously. Samit's complaints echoed those raised in 2002 by Coleen Rowley, the bureau's agent-lawyer in the Minneapolis office. Rowley went public with her frustrations, was named a Time magazine person of the year for whistleblowing. Samit revealed far more than Rowley of the details of the investigation. For each nugget of information, MacMahon asked Samit if Washington officials called to assess the implications. Time after time, Samit said no.
MI5 is facing an internal revolt by officers alarmed about intelligence failures and the lack of resources to fight Islamic terrorism. To illustrate their concern, agents have leaked more topsecret documents to The Sunday Times because they want a public inquiry into the “missed intelligence” leading up to the July attacks in London. They believe ministers have withheld information from the public about what the security services knew about the suspects before the bombing of July 7 and the abortive attacks of July 21. The documents include an admission by John Scarlett, head of SIS, the secret intelligence service (also known as MI6), that one of the July 21 suspects was tracked on a trip to Pakistan just months before the attempted bombings. MI5, which is responsible for national security, allowed the July 21 suspect to travel to Pakistan after he was detained and interviewed at a British airport. It stopped monitoring him because it said “the Pakistani authorities assessed that he was doing nothing of significance”. They are critical of Blair, who has ruled out an inquiry saying it would distract the security services from fighting terrorism. The assessment echoes a decision by MI5 to halt surveillance on two of the July 7 bombers 16 months before the attacks. Both were filmed and taped by MI5 agents as they met two men allegedly plotting to carry out a terrorist attack in England.
Military and intelligence officers told spellbound lawmakers Tuesday that their careers had been ruined by superiors because they refused to lie about Able Danger, Abu Ghraib and other national security controversies. Lt. Col. Anthony Shaffer ... told a House Government Reform subcommittee that he and other intelligence officers and contractors working on the top-secret program code-named "Able Danger" had identified Mohammed Atta, ringleader of the Sept. 11 attacks, but were prevented from passing their findings to the FBI. "Many of us have a personal commitment to ... going forward to expose the truth and wrongdoing of government officials who, before and after the 9/11 attacks, failed to do their job." Shaffer contradicted recent statements by Philip Zelikow, former executive director of the Sept. 11 commission, who denied having met with Shaffer and other Able Danger operatives in Afghanistan in October 2003. "I did meet with him," Shaffer said. "I have the business card he gave me. I find it hard to believe that he could not remember meeting me." The commission's chairman and vice chairman, former New Jersey Gov. Thomas Kean and former Rep. Lee Hamilton, released a statement saying the panel had looked into the work of Able Danger and found it "historically insignificant."
Note: Though Able Danger received wide media coverage when it first came out six months ago, CNN was the only major media outlet to give significant coverage to this most important news. Yet CNN did not post the text of the program on their website. Why isn't our media covering this vital topic? For lots more on this, see http://www.WantToKnow.info/911information and http://www.WantToKnow.info/abledanger911
The White House asked The New York Times not to publish this article, arguing that it could jeopardize continuing investigations and alert would-be terrorists that they might be under scrutiny. After meeting with senior administration officials to hear their concerns, the newspaper delayed publication for a year to conduct additional reporting. Some information that administration officials argued could be useful to terrorists has been omitted. While many details about the program remain secret, officials familiar with it said the N.S.A. eavesdropped without warrants on up to 500 people in the United States at any given time.
Note: The above quote is from page two of a ten-page article on the Times website. Isn't it interesting that the White House can keep vital news from being reported? See Media Information Center for more.
The media center in Fayetteville, N.C., would be the envy of any global communications company. The center is not part of a news organization, but a military operation, and [its] writers and producers are soldiers. The 1,200-strong psychological operations unit based at Fort Bragg turns out what its officers call "truthful messages" to support the United States government's objectives, though its commander acknowledges that those stories are one-sided and their American sponsorship is hidden. Army psychological operations units sometimes pay to deliver their message, offering television stations money to run unattributed segments. The United States does not ban the distribution of government propaganda overseas, as it does domestically. Typically, Lincoln [a company under government contractor] paid newspapers from $40 to $2,000 to run the articles as news articles or advertisements. More than 1,000 articles appeared in 12 to 15 Iraqi and Arab newspapers, according to Pentagon documents. The publications did not disclose that the articles were generated by the military.
Note: For an abundance of reliable information on major cover-ups around war, visit our War Information Center at http://www.WantToKnow.info/warinformation
The first annual National Security Whistleblowers Conference...has to be one of the more unusual gatherings of intelligence veterans in recent years. The nearly 20 current or former officials from the FBI, CIA, Defense Intelligence Agency, and even the supersecret National Security Agency who make up the core of the conference share an unusual distinction: They are all deeply out of favor with their longtime employers. Most cannot discuss the allegations they are making in detail because the specifics are highly classified. The agencies they work for also refuse to answer questions. The current and former officials at the conference said that today's climate in Washington has never been worse for whistleblowers. One of the biggest names of the conference never even uttered a word. Lt. Col. Anthony Shaffer is the military intelligence operative who...went public with a controversial claim that a year before September 11, his top-secret task force "Able Danger" was able to identify the man who later turned out to be the lead hijacker [on 9/11]. Shaffer was slated to speak but instead sat quietly by as his lawyer, Mark Zaid, spoke for him. "Tony is not allowed to talk," Zaid said. "He is gagged from talking to Congress." The conference was organized by Sibel Edmonds, a former FBI translator who was pushed out of the bureau after raising accusations of wrongdoing by other FBI translators. She has been barred from discussing the details of her case by the FBI. She created the National Security Whistleblowers Coalition www.nswbc.org to bring whistleblowers like her together to push for legal reforms.
Note: For a detailed article in Vanity Fair on Sibel Edmonds' courageous efforts to expose the truth, click here. For the whistleblowing action which drew international media attention by WantToKnow.info founder Fred Burks, click here.
I have rarely seen the Commons so full and so silent as when it met yesterday to hear of the London bombings. Perhaps the loss is hardest to bear because it is so difficult to answer the question why it should have happened. We may be offered a website entry or a video message attempting to justify the impossible, but there is no language that can supply a rational basis for such arbitrary slaughter. In the absence of anyone else owning up to yesterday's crimes, we will be subjected to a spate of articles analysing the threat of militant Islam. Osama bin Laden is [not] a true representative of Islam. Bin Laden was, though, a product of a monumental miscalculation by western security agencies. Throughout the 80s he was armed by the CIA and funded by the Saudis to wage jihad against the Russian occupation of Afghanistan. Al-Qaida ... was originally the computer file of the thousands of mujahideen who were recruited and trained with help from the CIA to defeat the Russians. Inexplicably, and with disastrous consequences, it never appears to have occurred to Washington that once Russia was out of the way, Bin Laden's organisation would turn its attention to the west. The danger now is that the west's current response to the terrorist threat compounds that original error. So long as the struggle against terrorism is conceived as a war that can be won by military means, it is doomed to fail. Whatever else can be said in defence of the war in Iraq today, it cannot be claimed that it has protected us from terrorism on our soil.
Note: The above article was written by Robin Cook, who served as both the Foreign Secretary of the UK and the leader of the House of Commons. Less than one month after this article was written (which was also the day after the 7/7 London bombings), Mr. Cook died of a heart attack while taking a walk. For proof that the CIA developed a silent gun which shot a poison to mimic a heart attack in a way that was not traceable, watch this short video which presents the testimony of a former CIA secretary and Congressional testimony on this secret weapon.
In the wake of 9/11, Saudi authorities came under criticism in the U.S. for sluggishness in investigating the attacks, in which 15 of the 19 hijackers were Saudi citizens. Now it appears that the U.S. bears some responsibility for the slackness with which leads were pursued. According to several former employees of the U.S. embassy in Riyadh, the FBI legal attaché's office housed within the embassy was often in disarray during the months that followed 9/11. When an FBI supervisor arrived to clean up the mess, she found a mountain of paper and, for security reasons, ordered wholesale shredding that resulted in the destruction of unprocessed documents relating to the 9/11 investigations. In 2001 the FBI's Saudi office comprised a secretary and two agents. The FBI sent reinforcements within two weeks of 9/11, but it appears that the bureau's team never got on top of the thousands of leads flowing in from the U.S. and Saudi governments. When the senior FBI supervisor was sent to the Riyadh office nearly a year after 9/11, she found secret documents literally falling out of file drawers, stacked in binders on tables and wedged behind cabinets, according to an FBI briefing to Congress. The process of sending classified material to the U.S. had fallen so far behind that a backlog of boxes, each filled with three feet of paper containing secret, time-sensitive leads, had built up. The supervisor ordered the shredding of hundreds, perhaps thousands of pages, many of them related directly to the ongoing 9/11 investigation, an FBI briefer told Congress.
Note: For deeply revealing reports from reliable major media sources on questions surrounding the official explanations of the 9/11 attacks, click here.
ONE of Hitler’s top intelligence officers, who ordered the murders of more than 100 British secret agents in concentration camps, was spared execution as a war criminal and selected to work for MI6. Newly opened papers contain startling evidence that...British Intelligence “turned” Horst Kopkow, faked his death and used him to fight the Cold War. The Atkins documents have been corroborated by newly declassified secret papers in the British and American National Archives. Britain has denied that it engaged in the dark arts used by the Americans, whose employment of Nazis to catch Communists has been well-documented. British intelligence sources pointed out that Kopkow was not in the league of “the butcher of Lyons”, a reference to Klaus Barbie, the most notorious war criminal employed by the Americans. The Kopkow case is uniquely chilling because the MI6 men who spared him were colleagues and “handlers” of his victims. Among those whose torture and death he sanctioned were men and women of the SOE and MI6 agents.
A San Jose man who claimed the CIA secretly had given him LSD in 1957 as part of a mind-control experiment -- causing him to try to hold up a San Francisco bar ... offered enough evidence of possible drugging to go to trial on his $12 million damages suit. The decision by Chief U.S. District Judge Marilyn Hall Patel cited what appeared to be an admission by a former operative in the CIA program ... that he had slipped LSD into one of Wayne Ritchie's drinks. "I drugged guys involved in about 10, 12 (instances)," former federal narcotics agent Ira Feldman, who worked for the CIA's Project MKULTRA, told Ritchie's lawyer. The [MKULTRA] program ... was an attempt to find chemicals or techniques that could control human consciousness. The CIA and federal narcotics agents started giving mind-altering drugs to unsuspecting government employees, private citizens and prison volunteers in the early 1950s. Ritchie believes he was drugged during an office Christmas party. He ... was overcome with depression and a feeling that everyone had turned against him. He ... drove to a Fillmore District bar, demanded money ... and was hit over the head and knocked unconscious. He pleaded guilty to attempted robbery. Ritchie quit his job in disgrace, found work as a housepainter and spent years fighting off suicidal urges. Then in 1999, he read the obituary of MKULTRA's director, Sidney Gottlieb, and began to believe he had been one of the program's guinea pigs -- especially after the diary of a now-deceased MKULTRA agent showed he might have attended the same Christmas party.
Note: Though Ritchie lost the first round in court, he plans to appeal. For an abundance of reliable, verifiable information on secret government mind control programs, click here.
Last month, Sonoma Saveurs [restaurant] was spray-painted and flooded by vandals because of a delicacy that will appear on its menu and in its store: foie gras, the fat-engorged liver of force-fed ducks and geese. Connoisseurs consider foie gras the epitome of culinary civilization. But animal rights activists who claimed responsibility for the destruction ... call foie gras the ''delicacy of despair,'' born of cruelty to animals. The Federal Bureau of Investigation called the attacks here acts of ''domestic terrorism.'' With its associations of gastronomic elitism -- foie gras retails for around $20 to $25 a quarter-pound -- its production has long been high on the hit list of animal protectionists. Israel, the world's fourth-largest supplier of goose foie gras, recently banned the force-feeding of geese and ducks, as have Denmark, Norway, Poland, Austria and Germany, all after pressure by animal rights activists. Switzerland and the United Kingdom now discourage its production, said Paul Waldau, a clinical assistant professor at the Center for Animals and Public Policy at Tufts University. Organizations like In Defense of Animals and People for the Ethical Treatment of Animals contend force-feeding is inherently inhumane. ''Migratory fat bears no resemblance whatsoever to ramming a pipe down ducks' necks, pumping pounds of corn mash down their gullets and distending their livers,'' said Ingrid Newkirk, the president of PETA. ''These geese and ducks can't fly up the garden path, let alone migrate.''
Note: For a more recent article on how those taking action to defend ducks have been officially labelled terrorists, click here. For a six-minute video showing the incredible cruelty being inflicted on these animals, click here.
[Famed US novelist] Gore Vidal has launched the most scathing attack to date on George W Bush's Presidency, calling for an investigation into the events of 9/11 to discover whether the Bush administration deliberately chose not to act on warnings of Al-Qaeda's plans. Vidal's highly controversial 7000 word polemic titled 'The Enemy Within' - published in the print edition of The Observer today - argues that what he calls a 'Bush junta' used the terrorist attacks as a pretext to enact a pre-existing agenda to invade Afghanistan and crack down on civil liberties at home. Vidal writes: 'We still don't know by whom we were struck that infamous Tuesday, or for what true purpose.' Vidal argues that the real motive for the Afghanistan war was to control the gateway to Eurasia and Central Asia's energy riches. But, Vidal argues, US administrations, both Democrat and Republican, were aware that the American public would resist any war in Afghanistan without a truly massive and widely perceived external threat. 'Osama was chosen on aesthetic grounds to be the frightening logo for our long-contemplated invasion and conquest of Afghanistan ... [because] the administration is convinced that Americans are so simple-minded that they can deal with no scenario more complex than the venerable, lone, crazed killer ... who does evil just for the fun of it 'cause he hates us because we're rich 'n free 'n he's not.' Vidal also attacks the American media's failure to discuss 11 September and its consequences: 'Apparently, "conspiracy stuff" is now shorthand for unspeakable truth. It is an article of faith that there are no conspiracies in American life.
Note: "The Enemy Within" by Gore Vidal is available here. For more on Vidal's writings on the 9/11 attacks and the reasons behind them, click here. For a video clip of Vidal recommending The New Pearl Harbor by David Ray Griffin, which reveals a major 9/11 cover-up, click here.
Osama bin Laden and the Taliban received threats of possible American military strikes against them two months before the terrorist assaults on New York and Washington, which were allegedly masterminded by the Saudi-born fundamentalist, a Guardian investigation has established. The threats of war unless the Taliban surrendered Osama bin Laden were passed to the regime in Afghanistan by the Pakistani government, senior diplomatic sources revealed yesterday. The warning to the Taliban originated at a four-day meeting of senior Americans, Russians, Iranians and Pakistanis at a hotel in Berlin in mid-July. The conference, the third in a series dubbed "brainstorming on Afghanistan", was part of a classic diplomatic device known as "track two". "The Americans indicated to us that in case the Taliban does not behave and in case Pakistan also doesn't help us to influence the Taliban, then the United States would be left with no option but to take an overt action against Afghanistan," said Niaz Naik, a former foreign minister of Pakistan, who was at the meeting. "I told the Pakistani government, who informed the Taliban via our foreign office and the Taliban ambassador here." The three Americans at the Berlin meeting were Tom Simons, a former US ambassador to Pakistan, Karl "Rick" Inderfurth, a former assistant secretary of state for south Asian affairs, and Lee Coldren, who headed the office of Pakistan, Afghan and Bangladesh affairs in the state department until 1997.
Note: For many questions raised about the official account of 9/11 by highly respected individuals, click here and here.
Britain's nuclear industry was involved in a top secret international operation to steal dead babies for up to three decades, according to newly declassified documents. The papers, released by the American Department of Energy, show that scientists from the UK Atomic Energy Authority removed children's bones and bodies to ship to the United States for classified nuclear experiments. Letters exchanged between American and British government scientists ... discuss levels of radiation in the ribs of stillborn babies and lists of dead children's bodies ... spirited to American nuclear laboratories. The human 'guinea pigs' are not named, but assigned codenames. Baby B-1102, for example, is listed as a boy who died aged eight months. Baby B-595 was a girl who was 13 months old when she died. The report listing them [was] stamped 'top secret'. Although the US government has released hundreds of documents about the operation, it has retained even more sensitive papers thought to detail some of the most embarrassing aspects of collusion between the British and American authorities. An investigation into the 'body snatching' programme - codenamed Project Sunshine - ordered by former President Bill Clinton, was scathing: 'Researchers employed deception in the solicitation of bones of deceased babies from intermediaries with access to human remains.' Among the documents obtained ... is the transcript of a secret meeting in Washington of Project Sunshine's keenest minds. They show that Willard Libby, a renowned scientist who later won the Nobel prize ... instructed colleagues to skirt the law in their search for bodies.
Note: For a highly revealing list of military and government sponsored experiments on human guinea pigs with links for verification, click here.
US intelligence services instigated and abetted rightwing terrorism in Italy during the 1970s, a former Italian secret service general has claimed. The allegation was made by General Gianadelio Maletti, a former head of military counter-intelligence, at the trial last week of rightwing extremists accused of killing 16 people in the bombing of a Milan bank in 1969 - the first time such a charge has been made in a court of law by a senior Italian intelligence figure. Gen Maletti, commander of the counter-intelligence section of the military intelligence service from 1971 to 1975, said his men had discovered that a rightwing terrorist cell in the Venice region had been supplied with military explosives from Germany. Those explosives may have been obtained with the help of members of the US intelligence community, an indication that the Americans had gone beyond the infiltration and monitoring of extremist groups to instigating acts of violence, he said. "The CIA ... following the directives of its government, wanted to create an Italian nationalism capable of halting what it saw as a slide to the left and, for this purpose, it may have made use of rightwing terrorism," Gen Maletti told the Milan court. "I believe this is what happened in other countries as well."
Note: For an excellent overview of false-flag operations, click here.
In the darkest days of the cold war, the military lied to the American public about the true nature of many unidentified flying objects in an effort to hide its growing fleets of spy planes, a Central Intelligence Agency study says. The deceptions were made in the 1950's and 1960's amid a wave of U.F.O. sightings that alarmed the public and parts of official Washington. The C.I.A. study says the Air Force knew that most reports by citizens and aviation experts were based on fleeting glimpses of U-2 and SR-71 spy planes, which fly extremely high. Rather than acknowledging the existence of the top-secret flights or saying nothing about them publicly, the Air Force decided to put out false cover stories, the C.I.A. study says. For instance, unusual observations that were actually spy flights were attributed to atmospheric phenomena like ice crystals and temperature inversions. ''Over half of all U.F.O. reports from the late 1950's through the 1960's were accounted for by manned reconnaissance flights'' over the United States, the C.I.A. study says. ''This led the Air Force to make misleading and deceptive statements to the public in order to allay public fears and to protect an extraordinarily sensitive national security project.'' The admission of Federal deception on the issue appears to be a first, experts said in interviews. ''It's very significant,'' said Richard Hall, chairman of the Fund for U.F.O. Research, a group in Washington.
Note: For key resources on the UFO controversy, see our UFO Information Center.
The Federal Bureau of Investigation acknowledged today that its agents plotted in 1970 to besmirch the reputation of Jean Seberg, the actress who committed suicide last week, by planting a rumor with news organizations that she was pregnant by [a] high-ranking member of the Black Panther Party. The action against Miss Seberg, part of the F.B.I.'s counterintelligence program COINTELPRO, was intended to discredit her support of the black nationalist movement. According to a document dated April 27, 1970, the Los Angeles office of the F.B.I. requested permission from J. Edgar Hoover, then Director of the bureau, to publicize Miss Seberg's pregnancy, saying it was “felt the possible publication of Seberg's plight could cause her embarrassment and serve to cheapen her image with the general public.” Romain Gary, the prominent French author and diplomat who was Miss Seberg's husband in 1970, said at a news conference in Paris last week that the baby was his and that the F.B.I. had destroyed the actress's life. The bureau could not say today how many celebrities or others had been harassed or otherwise adversely affected by COINTELPRO activities similar to those directed at Miss Seberg. However, the bureau's animus toward the Rev. Dr. Martin Luther King Jr. and its activities against him are well documented. As with all documents released by the F.B.I., those relating to Miss Seberg were issued with names of all other living persons deleted.
Note: Read more on te FBI's COINTELPRO program. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
A voluminous Senate report documenting the C.I.A.’s use of torture in secret prisons — set for release days later — could lead to riots, attacks on American embassies and the killing of American hostages overseas, James R. Clapper Jr., the director of national intelligence, told members of the Senate Intelligence Committee during a conference call in December 2014, citing a classified assessment. This episode is omitted from a new film treatment of the labyrinthine saga involving the Senate report — making a rare case of real life sometimes being more dramatic than the Hollywood portrayal. But the film, “The Report” ... is the first effort at a popular recounting of the tumultuous events surrounding the congressional investigation into the C.I.A. program and the inquiry’s conclusions, which found that the agency’s brutal interrogation methods — sometimes including torture — produced little or no intelligence of value. The senators believed that the intelligence assessment Clapper was quoting flagrantly distorted what the Senate report had said, predicting dire consequences from the release of information that wasn’t even in the report. In their anger, they decided to push ahead and release the report. Only the 528-page executive summary of the 6,000-page volume has been made public. Yet it is the closest thing to date to a public accounting for the C.I.A. interrogation program, the first time in history the government authorized the use of methods the United States had long considered to be illegal torture.
Note: Read an article titled, "10 Craziest Things in the Senate Report on Torture". For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The Office of the Director of National Intelligence has informed the House and Senate Select Committees on Intelligence that it'll no longer be briefing in-person on election security issues, according to letters obtained by CNN. Instead, ODNI will primarily provide written updates to the congressional panels, a senior administration official said. The abrupt announcement is a change that runs counter to the pledge of transparency and regular briefings on election threats by the intelligence community. It also comes after the top intelligence official on election security issued a statement earlier this month saying China, Russia and Iran are seeking to interfere in the 2020 US election. US officials charged with protecting the 2020 election also said last week that they have "no information or intelligence" foreign countries, including Russia, are attempting to undermine any part of the mail-in voting process, contradicting President Donald Trump, who has repeatedly pushed false claims that foreign adversaries are targeting mail ballots as part of a "rigged" presidential race. Senate Intelligence Vice Chairman Mark Warner called the decision to stop in-person briefings an "unprecedented attempt to politicize an issue - protecting our democracy from foreign intervention - that should be non-partisan. Congress and the American public need to know more information about the election interference threat — not less," the Virginia Democrat said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on elections corruption from reliable major media sources.
Donald Trump’s administration is targeting Julian Assange as “an enemy of the America who must be brought down” and his very life could be at risk if he is sent to face trial in the US, the first day of the WikiLeaks founder’s extradition hearing has been told. Lawyers for Assange intend to call as a witness a former employee of a Spanish security company who says surveillance was carried out for the US on Assange while he was at Ecuador’s London embassy and that conversations had turned to potentially kidnapping or poisoning him. Assange, 48, is wanted in the US to face 18 charges of attempted hacking and breaches of the Espionage Act. They relate to the publication a decade ago of hundreds of thousands of diplomatic cables and files covering areas including US activities in Afghanistan and Iraq. The Australian, who could face a 175-year prison sentence if found guilty, is accused of working with the former US army intelligence analyst Chelsea Manning to leak classified documents. Key parts of the evidence related to the claim, which emerged last week, that a then US Republican congressman offered Assange a pardon if he denied Russian involvement in the leaking of US Democratic party emails during the 2016 US presidential contest. The court was told that Dana Rohrabacher, who claims to have made the proposal on his own initiative, had presented it as a “win-win” scenario that would allow Assange to leave the embassy and get on with his life.
Note: Read more about the strange prosecution of Assange. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
Prosecutors in Sweden have dropped an investigation into a rape allegation made against Wikileaks co-founder Julian Assange in 2010. Assange, who denies the accusation, has avoided extradition to Sweden for seven years after seeking refuge at the Ecuadorean embassy in London in 2012. The 48-year-old Australian was evicted in April and sentenced to 50 weeks in jail for breaching his bail conditions. He is currently being held at Belmarsh prison in London. The Swedish investigation had been shelved in 2017 but was re-opened earlier this year. With the end of Julian Assange's legal troubles in Sweden, one long chapter in the saga is over. But another one, in the United States, has barely begun. The Wikileaks founder always argued that his fear of being extradited from Sweden to the US was why he had taken refuge in the Ecuadorean embassy in London. That political refuge ended unceremoniously in April, when he was dragged out by British police. Now Assange faces 18 criminal charges in the US, including conspiring to hack government computers and violating espionage laws. If convicted, he could face decades in jail. From behind bars in Belmarsh jail, Assange is trying to prepare for the case. The decision by Swedish prosecutors today means there'll now be no competing extradition request to the one from the US. In June, the then UK Home Secretary, Sajid Javid, formally approved an extradition request from the US.
Note: Read a 2012 article from the UK's Guardian titled "Don't lose sight of why the US is out to get Julian Assange." For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
A group of American hackers who once worked for U.S. intelligence agencies helped the United Arab Emirates spy on a BBC host, the chairman of Al Jazeera and other prominent Arab media figures during a tense 2017 confrontation pitting the UAE and its allies against the Gulf state of Qatar. The American operatives worked for Project Raven, a secret Emirati intelligence program that spied on dissidents, militants and political opponents of the UAE monarchy. A Reuters investigation in January revealed Project Raven’s existence and inner workings, including the fact that it surveilled a British activist and several unnamed U.S. journalists. At first, the goal was to crack down on terrorism by helping the UAE monitor militants around the region. But Raven’s mission quickly expanded to include monitoring and suppressing a range of UAE political opponents. Among its targets was Qatar, which the UAE and Saudi Arabia had long accused of fueling political opposition across the region, in part through the Qatari government’s funding of Al Jazeera. The Emiratis also tapped Raven in the effort to contain dissent at home. After the Arab Spring, the operatives were increasingly tasked with targeting human rights activists and journalists who questioned the government. The Raven effort went beyond the Middle East. Operatives [targeted] the mobile phones of other media figures the UAE believed were being supported by Qatar, including journalists for London-based Arabic media outlets.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
Hours after police Officer Darren Wilson shot and killed 18-year-old Michael Brown on a quiet suburban street in Ferguson, Missouri, Olajuwon Ali Davis stood with a few dozen people on that same street. Davis, who was 22 at the time, kept showing up as the protests grew larger. Three months later, Davis and another young man named Brandon Orlando Baldwin were arrested in an FBI sting and accused of planning to ... blow up St. Louis’s iconic Gateway Arch. Three years later, the FBI listed Davis’s case in a secret memo warning of the rise of a “black identity extremist” movement whose members’ “perceptions of police brutality against African Americans” spurred what the FBI claimed was “an increase in premeditated, retaliatory lethal violence against law enforcement.” The “black identity extremism” report was prepared by the FBI’s Domestic Terrorism Analysis Unit ... and was distributed to scores of local and federal law enforcement partners. Davis and Baldwin ... appear to be the first individuals retroactively labeled by the FBI as “black identity extremists.” According to The Intercept’s analysis, Davis and Olajuwon’s case was the only federal prosecution of individuals the FBI considers to be “black identity extremists” that resulted in a conviction. By comparison, the analysis found that 268 right-wing extremists were prosecuted in federal courts since 9/11 for crimes that appear to meet the legal definition of domestic terrorism.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
Angeline Cheek is preparing for disaster. The indigenous organizer from the Fort Peck reservation in Montana fears that the proposed Keystone XL pipeline could break and spill. But environmental catastrophe is not the most immediate threat. The government has characterized pipeline opponents like her as “extremists” and violent criminals and warned of potential “terrorism”. Recently released records [suggest] that police were organizing to launch an aggressive response to possible Keystone protests, echoing the actions against the Standing Rock movement in North Dakota. There, officers engaged in intense surveillance and faced widespread accusations of excessive force. Documents obtained by the ACLU ... have renewed concerns from civil rights advocates about the government’s treatment of indigenous activists known as water protectors. Notably, one record revealed that authorities hosted a recent “anti-terrorism” training session in Montana. The Department of Homeland Security (DHS) and the Federal Emergency Management Agency also organized a “field force operations” training to teach “mass-arrest procedures”, “riot-control formations” and other “crowd-control methods”.
Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
Last week, the existence of a draft Department of Homeland Security (DHS) report came to light, which calls for long-term surveillance of Sunni Muslim immigrants. Internal documents obtained from the FBI and DHS last year also showed how the agencies are surveilling the Movement for Black Lives, bringing into mind tactics of Cointelpro, an FBI program which secretly and illegally conducted surveillance on the civil rights movement in order to disrupt Americans’ ability to organize politically. But these are not the only types of surveillance this administration is engaged in. On 18 October, DHS implemented a new rule to track the internet activity of all visa applicants, visa holders and legal permanent residents. The rule would also apply to naturalized US citizens. The new rule would track and store social media account information and other highly sensitive data as part of individuals’ immigration files. The policy would allow DHS to collect and track immigrants’ social media accounts handles as well as aliases, and search results from both public search engines as well as commercial databases. The rule ... seems like it was designed with the specific purpose of hampering our freedom of speech, in line with the Trump administration’s other chilling tactics of attacks on the press and crackdowns on protesters who do not fall in line with the policies of this administration. This covert surveillance, now culminating in overt spying on immigrants, is designed as a tactic to control and fracture dissent.
Note: Read more about the FBI's infamous Cointelpro program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
I was captured when I was in my 20s and brought to Guantanamo Bay in 2004, after more than two years in secret prisons. I have been imprisoned here without charges since then. I am now 43. Thirteen years ago, your country brought me here because of accusations about who I was. Confessions were beaten out of me in those secret prisons. I tried, but I am no longer trying to fight against those accusations from the past. What I am asking today is, how long is my punishment going to continue? Your president says there will be no more transfers from here. Am I going to die here? If I have committed crimes against the law, charge me. In 15 years, I have never been charged, and the worst things the government has said about me were extracted by force. The judge in my habeas case decided years ago that I had been subjected to physical and psychological abuse during my interrogations, and statements the government has wanted to use against me are not reliable. Even if I were cleared, it would not matter. There are men here who have been cleared for years who are sitting in prison next to me. Detainees here, all Muslim, have never had rights equal to other human beings. Even when we first won the right to challenge our detention, in the end, it became meaningless. It is hard for me to ... believe that laws will not be bent again to allow the government to win. But this week, I am joining a group of detainees here, all of us who have been held without charges for years, to try again to ask the courts for protection.
Note: The above was written by Sharqawi Al Hajj, a Yemeni citizen detained at Guantanamo Bay. For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Mike Beck, a National Security Agency counterintelligence officer, could always bang out 60 words a minute. But in early 2006, Beck struggled to move his fingers at their usual typing speed. Soon after, a brain scan showed why: Beck had Parkinson's disease, the second-most-common neurodegenerative disorder in the United States. He was only 46 - unusually young for Parkinson's. No one in his family had ever had it. Then, in an unsettling coincidence, he learned that an NSA colleague — a man he'd spent a pivotal week in 1996 with in a hostile country — had also just been diagnosed with Parkinson's. Eventually, Beck read a classified intelligence report that convinced him that he and his co-worker on the trip were likely the victims of a covert attack that led to their illnesses - and that has prompted a highly unusual workers' compensation claim. Beck believes that while he and his colleague were sleeping in their hotel rooms, the hostile country, which he cannot name for security reasons, deployed a high-powered microwave weapon against them, damaging their nervous systems. For the last four years, Beck, 57, has been trying to persuade the Labor Department to award him 75 percent of his salary, or about $110,000 a year. But the Labor Department won't approve Beck's request without solid evidence that he was targeted. In Beck's case — short of obtaining proof from the hostile nation's spy service — he'd need the endorsement of the NSA, which has refused to provide it.
Note: To learn about how electromagnetic weapons can be used to torture anyone without legal recourse, listen to this revealing interview. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and non-lethal weapons.
Later this year - unless President Trump intervenes - the American people will get access to the last of thousands of secret government files about a turning point in the nation’s history: the 1963 assassination of President John F. Kennedy. The National Archives this week released several hundred of the documents, which come from CIA and FBI files. JFK researchers are scrambling to see whether they contain any new clues about the president’s murder. But many more documents remain under seal, awaiting release by this October, the 25-year deadline set by the 1992 Kennedy Assassination Records Collection Act. The law gives only one person - the president - the ability to stop the release from happening. He can act only if he certifies in writing that the documents would somehow endanger national security. About 3,150 ... documents remain totally under seal, along with tens of thousands of pages that have been only partially unsealed because intelligence and law-enforcement agencies opposed their release in the 1990s. Those are the documents that Trump could try to keep secret. And sadly, he appears to be under pressure to do so. Congressional and other government officials have warned us in confidence in recent weeks that at least two federal agencies will make formal appeals to the White House to block the release of some of the files. Which agencies? Which files? The officials would not say. Trump ... has a chance to show that he is committed to resolving some of the biggest conspiracy theories in American politics. We hope he welcomes the opportunity.
Note: The above was written by Larry J. Sabato, author of “The Kennedy Half-Century,” and Philip Shenon, author of “A Cruel and Shocking Act: The Secret History of the Kennedy Assassination.” For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and assassinations from reliable major media sources.
Fifteen years after he helped devise the brutal interrogation techniques used on terrorism suspects in secret C.I.A. prisons, John Bruce Jessen, a former military psychologist, expressed ambivalence about the program. He described himself and a fellow military psychologist, James Mitchell, as reluctant participants in using the techniques, some of which are widely viewed as torture. The two psychologists ... are defendants in the only lawsuit that may hold participants accountable for causing harm. Revelations about the C.I.A. practices ... led to an eventual ban on the techniques and a prohibition by the American Psychological Association against members’ participation in national security interrogations. The two psychologists argue that the C.I.A., for which they were contractors, controlled the program. But it is difficult to successfully sue agency officials because of government immunity. Under the agency’s direction, the two men ... proposed [and applied] the “enhanced interrogation” techniques. Their business received $81 million. When [the psychologists] wanted to end the waterboarding sessions as no longer useful, C.I.A. supervisors ... ordered them to continue. Dr. Mitchell said that the C.I.A. officials told them: “‘You guys have lost your spine.’ I think the word that was actually used is that you guys are pussies. There was going to be another attack in America and the blood of dead civilians are going to be on your hands.”
Note: Prior to condemning torture, some of the American Psychological Association’s top officials sought to curry favor with Pentagon officials by supporting the CIA's brutal interrogation methods. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
In 1953, the then-Director of Central Intelligence officially approved project MKUltra. Originally intended to make sure the United States government kept up with presumed Soviet advances in mind-control technology ... MKUltra has gone down in history as a significant example of government abuse of human rights. The intent of the project was to study “the use of biological and chemical materials in altering human behavior,” according to ... official testimony. Under MKUltra, the CIA gave itself the authority to [experiment on] unwitting test subjects, like drug-addicted prisoners, marginalized sex workers and terminal cancer patients. “The covert testing programs resulted in massive abridgements of the rights of American citizens, sometimes with tragic consequences,” concluded a Senate hearing in 1975-76. MKUltra wasn’t one project, as the US Supreme Court wrote in a 1985 decision. It was 162 different secret projects that were indirectly financed by the CIA, but were “contracted out to various universities ... and similar institutions.” In all, at least 80 institutions and 185 researchers participated, but many didn’t know they were dealing with the CIA. Many of MKUltra’s records were destroyed. But 8,000 pages of records - mostly financial documents that were mistakenly not destroyed in 1973 - were found in 1977. Nobody ever answered for MKUltra. Two lawsuits related to the program reached the Supreme Court, [writes Melissa Blevins for Today I Found Out], “but both protected the government over citizen’s rights.”
Note: Unfortunately, MK-ULTRA is far from the only program to have used humans as guinea pigs in attempts to create more powerful mind control technologies. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
WikiLeaks leader Julian Assange’s revelation last week of the CIA’s arsenal of hacking tools had a misplaced tone of surprise. Some scary initial stories argued that the CIA could crack Signal and WhatsApp phone encryption, not to mention your toaster and television. But ... the hardest question here is whether the CIA and other government agencies have a responsibility to disclose to software vendors the holes they discover in computer code, so they can be fixed quickly. This may sound like a no-brainer. The problem is that there’s a global market for “zero-day” exploits (ones that are unknown on the day they’re used). U.S. intelligence agencies buy some of these exploits; so do other countries’ spy services, criminal gangs and the software vendors themselves. A recent report by the Rand Corp. [calculated that] there are about two dozen companies selling or renting exploits to the United States and its allies, with many of these contractors making between $1 million and $2.5 million annually. More than 200 zero-day exploits studied by Rand went undetected for an average of 6.9 years. Given this evidence, Rand argued, “some may conclude that stockpiling zero-days may be a reasonable option” to combat potential adversaries. But let’s be honest: The real shocker in the WikiLeaks scoop is the demonstration ... that the U.S. government can’t keep secrets. It makes little sense for the CIA to argue against disclosing its cyber-tricks to computer companies if this valuable information is going to get leaked ... anyway.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The announcement by the Justice Department’s inspector general that his office will look into FBI Director James B. Comey’s handling of Hillary Clinton’s emails reopens painful questions about the 2016 election, but it is also welcome news. The investigation will address allegations that Comey violated established Justice Department and FBI policies and procedures in his July 5, 2016, public announcement concerning the Hillary Clinton email investigation. And it will explore allegations that Comey’s Oct. 28 and Nov. 6 letters to Congress, which jolted the presidential election ... were improper. In addition to looking into the actions of the FBI director regarding the email investigation, the probe will look into whether the FBI’s deputy director should have recused himself from the investigation because of his wife’s political involvement; whether a high-ranking Justice Department official or others improperly disclosed non-public information to both the Clinton and Trump campaigns; and whether the timing of the FBI’s election eve Freedom of Information Act disclosures relating to Bill Clinton’s 2001 pardon of Marc Rich was based on inappropriate considerations. This investigation has bipartisan support. It was requested by the chairman and ranking members of multiple congressional oversight committees. Federal inspectors general, who do not leave with the change of administrations ... are the only political appointees whom the law requires be selected “without regard to political affiliation and solely on the basis of integrity.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the manipulation of public perception.
Christopher Steele, the former MI6 agent who investigated Donald Trump’s alleged Kremlin links, was so worried by what he was discovering that at the end he was working without pay. Mr Steele also decided to pass on information to both British and American intelligence officials after concluding that such material should not just be in the hands of political opponents of Mr Trump, who had hired his services, but was a matter of national security. However, say security sources, Mr Steele became increasingly frustrated that the FBI was failing to take action on the intelligence. He came to believe there was a cover-up, that a cabal within the Bureau blocked a thorough inquiry into Mr Trump. A colleague of Mr Steele in Washington, Glenn Simpson, a former Wall Street Journal reporter who runs the firm Fusion GPS, felt the same way. Fusion GPS had been hired by Republican opponents of Mr Trump in September 2015. In June 2016 Mr Steele came on the team. In July, Mr Trump won the Republican nomination and the Democrats became new employers of Mr Steele and Fusion GPS. By September ... Mr Steele [had] compiled a set of his memos into one document and passed it to his contacts at the FBI. But there seemed to be little progress in a proper inquiry into Mr Trump. The Bureau, instead, seemed to be devoting their resources in the pursuit of Hillary Clinton’s email transgressions. The New York office, in particular, appeared to be on a crusade against Ms Clinton.
Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss this provocative article by Glenn Greenwald and this interview he gave to Fox News. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the manipulation of public perception.
It was known as the “secret war,” but the covert campaign the Kennedy administration waged against Fidel Castro in the years after the Bay of Pigs rivaled open warfare in time, effort and money spent. It was a war waged largely by the Central Intelligence Agency from an informal command post at what was then the south campus of the University of Miami - home to JMWAVE, the code name for the biggest CIA station in the world outside Langley, Virginia. From there, upward of 400 full-time CIA officers toiled, plotting the covert campaign against Cuba, ranging from sabotage to assassination. Its chief from 1962 to 1965 ... was Ted Shackley. But Shackley was not the real commander of the covert war. That role fell to Robert F. Kennedy, the U.S. attorney general and brother of the president. By the fall of 1961, under intense prodding from Robert Kennedy, the U.S. policy had evolved into Operation Mongoose, the code name for a multiagency covert action plan designed to bring down Castro. The basic concept of the entire operation was to “bring about the revolt of the Cuban people ... and institute a new government,” [Mongoose operations chief Brig. Gen. Edward] Lansdale [said]. The budget of the Miami station has been estimated at $50 million annually during its peak years. In the most active period - roughly 1962 to 1964 - several thousand Cubans were on the payroll for a variety of tasks, ranging from sabotage and infiltration runs to Cuba to propaganda activities.
Note: A 1967 report declassified in 2003 describes some of the CIA's many plans to kill or embarrass Fidel Castro. For more along these lines, see concise summaries of deeply revealing intelligence agency news articles from reliable major media sources.
The poster child of the American torture program sits in a Guantanamo Bay prison cell, where many U.S. officials hope he will simply be forgotten. Zayn al-Abidin Muhammad Husayn, known to the world as Abu Zubaydah ... was the “guinea pig” of the CIA torture program. He was the first prisoner sent to a secret CIA “black site,” the first to have his interrogation “enhanced ” and the only prisoner subjected to all of the CIA’s approved techniques, as well as many that were not authorized. He is the man for whom the George W. Bush administration wrote the infamous torture memo in the summer of 2002. Senior officials thought he had been personally involved in every major al-Qaeda operation, including 9/11. Today, the United States acknowledges that assessment was, to put it graciously, overblown. His extended torture provided no actionable intelligence about al-Qaeda’s plans. He has never been charged with a violation of U.S. law, military or civilian, and apparently never will be formally charged. Instead, he languishes at Guantanamo. After years in secret prisons around the world, he remains incommunicado, with no prospect of trial. Who is Zubaydah, really? Public understanding about Zubaydah remains remarkably controlled and superficial. In connection with Zubaydah’s stalled case seeking federal court review of his detention, the government has recently agreed to clear for public release a few of the letters he has written to us. These brief letters [are] published here for the first time.
Note: The use of humans as guinea pigs in government, military, and medical experiments has a long history. For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Government lawyers on Thursday continued their fight to bury the Senate Torture Report, arguing before the D.C. District Court of Appeals that the 6,700-page text could not be released on procedural grounds. When the 500-page executive summary of the report was released more than a year ago, it prompted international outcry and renewed calls for prosecution. The summary describes not only the CIA’s rape and torture of detainees, but also how the agency consistently misrepresented the brutality and effectiveness of the torture program. But many of the most graphic details are in Volume III of the full report, which former Senate Intelligence Committee chair Dianne Feinstein has said contains “excruciating” details on “each of the 119 known individuals who were held in CIA custody.” On the same day the executive summary was released, the Intelligence Committee sent copies of the full report to executive branch agencies with instructions ... that they be used “as broadly as appropriate to make sure that this experience is never repeated.” Last year, after succeeding Feinstein as chair, Sen. Richard Burr, R-Ga., requested that the copies distributed to federal agencies be returned to Congress, prompting a legal standoff. In the meantime ... the Justice Department has “refuse[d] to allow executive branch officials to review the full and final study.”
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
692 felony convictions in California ... were thrown out between 1989 and 2012 based on errors or misconduct by police, prosecutors, defense lawyers or judges, according to a new study by researchers at UC Berkeley and the University of Pennsylvania. The report ... didn’t include misdemeanor cases, which amount to about 80 percent of all prosecutions, or juvenile cases. And it also excluded the costs of jailing people who were later released without charges, which may amount to $70 million a year, the report said. The study examined only records from California and ... looked at cases in which felony convictions were overturned and the defendants were later cleared. More than half the cases involved prosecutors’ wrongful withholding of evidence. One example was that of former Black Panther Elmer “Geronimo” Pratt. Pratt was convicted in 1972 of murdering schoolteacher Carolyn Olson [in 1968] and was sentenced to life in prison, based in part on [witness] testimony. He was freed in 1999 after a judge found that prosecutors had withheld evidence that the witness was an informant for the FBI, which was then trying to discredit Pratt as part of its Cointelpro campaign. The authors questioned long-standing laws that shield prosecutors from lawsuits by criminal defendants. They said they knew of no other profession that received immunity for “intentional wrongdoing that gravely injures another.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the prison system.
The Federal Bureau of Investigation has quietly developed a new way to measure its success in the war on terror: counting the number of terror threats it has “disrupted” in a year. In the section on “Performance Measures” in the FBI’s latest financial statement, the bureau reports 440 “terror disruptions” in the 12-month period ending on September 30, 2015. That’s ... more than three times the 2015 “target” of 125. In a vacuum, that would appear to suggest that the FBI’s terror-fighting mission - which sucked ... 54 percent of the bureau’s $9.8 billion budget in 2015 - is exceeding expectations. But that number - 440 - is much higher than the number of arrests reported by the FBI. The Washington Post counted about 60 terror-related arrests in 2015. Of those arrests, many were of people trying to travel abroad or trying to help others do so. Many more involved people planning attacks that were essentially imaginary, often goaded by FBI informants. There was only one genuinely “foiled attack” in the United States between January 2014 and September 2015. And that one ... was stopped by the local police department. The fact that the agency establishes a target for terrorism disruptions is also troubling, said Michael German, a former FBI agent.
Note: The FBI has made a habit of manufacturing "terrorist plots" from thin air. Now it appears that activities reminiscent of COINTELPRO are again being carried out to justify massive anti-terrorism spending. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
A UN panel will conclude Wikileaks founder Julian Assange is being "arbitrarily detained" in the UK, the Swedish foreign ministry has said. Mr Assange, 44, claimed asylum in London's Ecuadorean embassy in 2012. The Met Police says Mr Assange will be arrested if he leaves the embassy. The Australian was originally arrested in London in 2010 under a European Arrest Warrant issued by Sweden over rape and sexual assault claims. In 2012, while on bail, he claimed asylum inside the Ecuadorean embassy in Knightsbridge after the UK Supreme Court had ruled the extradition against him could go ahead. Mr Assange's Wikileaks organisation posted secret American government documents on the internet, and he says Washington could seek his extradition to the US to face espionage charges if he is sent to Sweden. In the statement, published earlier by Wikileaks on Twitter, Mr Assange said: "Should the UN announce tomorrow that I have lost my case against the United Kingdom and Sweden I shall exit the embassy at noon on Friday to accept arrest by British police ... However, should I prevail and the state parties be found to have acted unlawfully, I expect the immediate return of my passport and the termination of further attempts to arrest me." Last October, Scotland Yard said it would no longer station officers outside the Ecuador embassy following an operation which it said had cost Ł12.6m. But it said "a number of overt and covert tactics to arrest him" would still be deployed.
Note: Read more about the "legal limbo" and propaganda campaign carried out against Assange and Wikileaks. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
From 2011 to 2013, the most elite forces in the U.S. military, supported by the CIA and other elements of the intelligence community, set out to destroy the Taliban and al Qaeda forces that remained hidden ... along Afghanistan’s northeastern border with Pakistan. Dubbed Operation Haymaker, the campaign has been described as a potential model for the future of American warfare. The military’s own analysis demonstrates that the Haymaker campaign was in many respects a failure. The vast majority of those killed in airstrikes were not the direct targets. Nor did the campaign succeed in significantly degrading al Qaeda’s operations in the region. The frequency with which “targeted killing” operations hit unnamed bystanders is among the more striking takeaways from the Haymaker slides. [Documents obtained by The Intercept] show that during a five-month stretch of the campaign, nearly nine out of 10 people who died in airstrikes were not the Americans’ direct targets. Larry Lewis, formerly a principal research scientist at the Center for Naval Analyses, ... found that drone strikes in Afghanistan were 10 times more likely to kill civilians than conventional aircraft. This month, an American airstrike on a hospital run by the international organization Médecins Sans Frontičres ... killed at least a dozen members of the humanitarian group’s medical staff and 10 patients, including three children. A nurse on the scene recalled seeing six victims in the intensive care unit ablaze in their beds.
Note: Read more about the major failings of US drone attacks. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
In 1986, the director of Britain's premier domestic spy agency told Margaret Thatcher's cabinet secretary the risk of "embarrassment" from publicizing a politician's suspected child abuse was greater than the "danger" he presented. CBS News partner network Sky News reported the new twist in Britain's long and still-unfolding child sexual abuse scandal on Thursday, saying then-MI5 director Sir Antony Duff had told Prime Minister Thatcher's staffer "the risks of political embarrassment to the government is rather greater than the security danger." The name of the Member of Parliament Duff had been asked to investigate, over allegations he had a "penchant for small boys," has not been revealed, but Sky reported Wednesday that four former senior politicians were named in previously unseen government documents on abuse. All four have been dead for years, but they were senior members of Thatcher's cabinet. Over the course of several years the sex abuse scandal has snowballed, revealing - at best - a pervasive lax attitude among British law enforcement, politicians and celebrity culture toward the abuse of children during the 1970s and 80s. The ongoing police investigation has already landed some big names from British culture ... in jail for abuses committed during the height of their popularity. Others have been posthumously revealed as serial abusers. Sky's investigation, however, is the first time any suggestion of a possible cover-up of abuse by senior government officials has emerged.
Note: The Thatcher government was reported to have covered up a VIP pedophile ring. Watch an excellent segment by Australia's "60-Minutes" team "Spies, Lords and Predators" on a pedophile ring in the UK which leads directly to the highest levels of government. A second suppressed documentary, "Conspiracy of Silence," goes even deeper into this topic in the US. For more along these lines, see concise summaries of deeply revealing sexual abuse scandal news articles from reliable major media sources.
Germany has been spying and eavesdropping on its closest partners in the EU and passing the information to the US for more than a decade, a parliamentary inquiry in Berlin has found, triggering allegations of lying and coverups reaching to the very top of Angela Merkel’s administration. Under a 2002 pact between German intelligence (BND) and the NSA, Berlin used its largest electronic eavesdropping facility in Bavaria to monitor email and telephone traffic at the Élysée Palace, the offices of the French president, and of key EU institutions in Brussels including the European commission. The BND’s biggest listening post at Bad Aibling in Bavaria was abused for years for NSA spying on European states. “The core is the political spying on our European neighbours and EU institutions,” an unnamed source said to be familiar with the evidence told the Süddeutsche. As well as the political intelligence activities, the NSA also got the BND to spy on European aerospace and defence firms. German and American individuals and companies were not monitored. The Bad Aibling complex of listening posts was an NSA facility for years. Under an agreement in 2002, it was handed over to the Germans in 2004. Since then, much of the information gleaned was routinely passed to the Americans. According to the Süddeutsche, the Americans supplied search terms on a weekly basis to the Germans – totalling 690,000 phone numbers and 7.8m IP addresses up until 2013.
Note: Many countries claim they don't spy on their own citizens. What they do is have agreements to spy on each other's citizens so that they can then share the information and still technically claim they are not breaking any laws. This article shows how it works. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of privacy rights from reliable major media sources.
After the first revelations of domestic surveillance by NSA whistleblower Edward Snowden, President Obama defended the spying programs by claiming they were “subject to congressional oversight and congressional reauthorization and congressional debate.” But as Rep. Alan Grayson, D-Fla., and other members of Congress have pointed out, there is essentially a "two-tiered" system for oversight, with lawmakers and staff on specialized committees, such as the House and Senate committees on Intelligence and Homeland Security, controlling the flow of information and routinely excluding other Congress members. A large number of lobbyists and consultants [pass] through the revolving door between the intelligence community and the watchdogs who purportedly oversee the intelligence community. Lobbyist influence is a particularly sensitive issue when it comes to intelligence committees, since those committees oversee secret “black budgets” in which money is disbursed with greatly reduced public oversight. The potential for self dealing is significant; former Rep. Randy “Duke” Cunningham, R-Calif., was caught accepting bribes to essentially earmark government contracts into a black budget. Lobbyist control over the House and Senate intelligence and homeland security committees may have a profound impact on a range of surveillance issues debated by Congress this year, including the Cybersecurity Information Sharing Act and the Patriot Act.
Note: The above article details several examples of industry lobbyists now operating in key government oversight positions within an unaccountable intelligence establishment. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in intelligence agencies.
Pete Seeger, composer of classic American folk tunes including "If I Had a Hammer" and "Where Have All the Flowers Gone?", was spied on by FBI agents for more than two decades because he wrote a protest letter as a young man concerned about plans to deport tens of thousands of Japanese American citizens at the end of the second world war. A vast file on Seeger was released ... in response to a request under the freedom of information act. The bureau’s spies first took an interest in the singer in 1943, [and continued] into the early 1970s. The suspicion was that Seeger, who died in early 2014, was a security risk with close connections to the Communist party. The FBI file on him has nearly 1,800 pages – 90 of them are still withheld for security reasons. Throughout the 1950s, when Seeger was part of the Weavers folk group, the bureau commissioned hundreds of reports on him. As the Weavers scored chart hits, Seeger was blacklisted for his suspected Communist party links. In 1955 he was called before the House Committee on un-American Activities and asked if he was a communist. “I am not going to answer any questions as to my associations, my philosophical or religious beliefs or my political beliefs or how I voted in any election or any of these private affairs,” Seeger replied. Two years later he was cited for contempt of Congress and then, four years later, found guilty and sentenced to a year in prison. Let free on bail, Seeger’s conviction was overturned a year later.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The “war on terror” is not the CIA’s first venture into human experimentation. At the dawn of the Cold War, German scientists and doctors with Nazi records of human experimentation were given new identities and brought to the United States under Operation Paperclip. In 1953, the CIA established the MK-ULTRA program, [which] evolved into experiments in psychological torture. During the Vietnam War, the CIA developed the Phoenix program, which combined psychological torture with brutal interrogations, human experimentation and extrajudicial executions. In 1963, the CIA produced a manual titled “Kubark Counterintelligence Interrogation” to guide agents in the art of extracting information. An updated version of the Kubark guide [was] produced in 1983 and titled “Human Resource Exploitation Manual” [for CIA supported] right-wing regimes in Latin America and Southeast Asia. Here we are again. On April 15, 2002, [psychologists hired by the CIA] Mitchell and Jessen arrived at a black site in Thailand to supervise the interrogation of Abu Zubaydah, the first “high-value detainee” captured by the CIA. From then ... at least thirty-eight people were subjected to psychological and physical torments, and the results were methodically documented and analyzed. That is the textbook definition of human experimentation.
Note: For more along these lines, see this list depicting the rampant use of humans as guinea pigs in government, military, and medical experiments over the last century, or watch "Human Resources", a two-hour documentary on the subject. For more, see the excellent, reliable resources provided in our Mind Control Information Center.
The intrusions into former CBS News correspondent Sharyl Attkisson’s computers constitute the narrative spine of the reporter’s new book “Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington.” In October 2012, right in the midst of the Benghazi story ... a person who’s identified as “Jeff” warns Attkisson: “I’ve been reading your reports online about Benghazi. It’s pretty incredible. Keep at it. But you’d better watch out.” So CBS News hires an independent computer analyst whom Attkisson identifies as "Jerry Patel." He finds a massive amount of suspicious activity in the computer. Intrusions of this caliber, concludes “Patel,” are “far beyond the the abilities of even the best nongovernment hackers.” In summing up, Attkisson writes, “Everything Patel has found serves to confirm my January source and analysis. Patel tells me that only a few entities possess these skills. One of them is the U.S. government. [Computer security specialist] Don Allison ... takes a close look at Attkisson’s iMac. The results: “While a great deal of data has been expertly wiped in an attempt to cover-up the deed, Don is able to find remnants of what was once there. There’s key evidence of a government computer connection to my computer. A sort of backdoor link that leads to an ISP address for a government computer that can’t be accessed by the general public on the Web. It’s an undeniable link to the U.S. government.”
Note: For lots more on this courageous reporter and suppression of vital news, read this article and this one. Then read even more mind-blowing reports of news suppression by top journalists.
TERRY GROSS: James Risen [is] an investigative reporter for The New York Times. He, along with Eric Lichtbau, broke the story about warrantless wiretapping. Now Risen is facing a prison sentence for refusing to reveal his source or sources for that story. [Risen] has a new book called "Pay Any Price: Greed, Power And Endless War," which is a series of investigations into who's making money on the War on Terror and what are some of the secret operations within it. You recently wrote an article in The New York Times with Laura Poitras who broke the Edward Snowden story along with Glenn Greenwald. And you reported on how American intelligence is trying to harvest facial imagery with the intention of - what's it for? RISEN: Facial recognition ... in a way that no [one] really understood before has become a central focus of the NSA today. They can link that up with a signals intelligence, which is the communications that they intercept [and] basically find where you are, what you're doing, who you're seeing and virtually anything about you in real time. GROSS: So ... your big story turned out kind of differently than the celebrations facing Woodward and Bernstein. RISEN: I think the times have changed. We had this period in journalism for about 30 years where there was the government and the press. The government ... wouldn't go after whistleblowers or reporters very aggressively. It's only after the - after 9/11 and after the plane case, which you may remember where Judy Miller was sent to jail. I think the post-9/11 age, the government has decided to become much more aggressive against reporters and whistleblowers.
Note: The above quotes are from the transcript of a radio interview that you can listen to by clicking on the news story link provided. For more along these lines, see concise summaries of deeply revealing stories about high level manipulation of mass media from reliable sources.
In the space of a single primetime address on [September 10], Barack Obama dealt a crippling blow to a creaking, 40-year old effort to restore legislative primacy to American warmaking. The administration’s rationale, at odds with the war it is steadily expanding, is to forestall an endless conflict foisted upon it by a bloodthirsty legislature. Yet one of the main authorities Obama is relying on for avoiding Congress is the 2001 ... document known as the Authorization to Use Military Force (AUMF) that few think actually applies to ISIS. Taken together with the congressional leadership’s shrug, Obama has stripped the veneer off a contemporary fact of American national security: presidents make war on their own, and congresses acquiesce. An allergy to congressional authorisation is enmeshed with the president’s stated desire to end what he last year termed a “perpetual war” footing. It has led Obama in directions legal scholars consider highly questionable. Not only has Obama rejected restrictions of his warmaking power, he has also rejected legislative expansions of it - a more curious choice. Obama has been wary that Congress will offer up new laws that entrench and expand an amorphous war that, in his mind, he has waged with the minimum necessary amount of force. Obama last year advocated the eventual repeal of the 2001 authorisation - as well as the 2002 congressional approval of the Iraq war - to aid in turning a page on a long era of US warfare. [After Obama's address] a senior administration official told reporters that the 2001 authorisation covered the war against ISIS.
Note: The war machine marches on as the US presidency claims ever more power over Congress. For more on this, see concise summaries of deeply revealing war news articles from reliable major media sources.
The CIA brought top al-Qaeda suspects close “to the point of death” by drowning them in water-filled baths during interrogation sessions in the years that followed the September 11 attacks, a security source has told The Telegraph. The description of the torture meted out to at least two leading al-Qaeda suspects, including the alleged 9/11 mastermind Khalid Sheikh Mohammed, far exceeds the conventional understanding of waterboarding, or “simulated drowning” so far admitted by the CIA. “They weren’t just pouring water over their heads or over a cloth,” said the source who has first-hand knowledge of the period. “They were holding them under water until the point of death, with a doctor present to make sure they did not go too far. This was real torture.” The account of extreme CIA interrogation comes as the US Senate prepares to publish a declassified version of its so-called Torture Report – a 3,600-page report document based on a review of several million classified CIA documents. Publication of the report is currently being held up by a dispute over how much of the 480-page public summary should remain classified, but it is expected to be published within weeks. A second source who is familiar with the Senate report told The Telegraph that it contained several unflinching accounts of some CIA interrogations which – the source predicted – would “deeply shock” the general public.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
Florida’s former U.S. Sen. Bob Graham ... has been fighting both the Bush and Obama administrations to declassify 28 pages of a 9/11 intelligence report that may detail and expose the efforts of members of the Saudi Arabian royal family in aiding and abetting [9/11] terrorists in Florida, many who were themselves Saudi. Graham is befuddled as to why the Obama administration does not release these documents, which he read when he was chair of the Senate Select Intelligence Committee and co-chair of a congressional inquiry into the 9/11 attacks. As a result, he has joined a Freedom of Information Act request alongside others, asking that 80,000 pages of information on a Saudi family that disappeared just before the attacks be made public. “It isn’t credible that 19 people — most [of whom] could not speak English well and did not have experience in the United States — could carry out such a complicated task without external assistance,” Graham insists. The Saudi family living in Sarasota fled to Saudi Arabia just prior to the 9/11 attacks. Were they tipped off that they should leave? If so, by whom? Graham believes that there was a deliberate effort to cover up Saudi involvement in the tragedy of 9/11 by the Bush administration, one, he says, that the Obama administration appears to support. The American public needs to know. The families of those who were lost to the 9/11 attacks or those who fought in Afghanistan and Iraq deserve an answer as well.
Note: For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.
[Google engineers] are making it far more difficult — and far more expensive — for the National Security Agency and the intelligence arms of other governments around the world to pierce their systems. As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps. After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant. But governments are fighting back, harder than ever. The cellphone giant Vodafone reported ... that a “small number” of governments around the world have demanded the ability to tap directly into its communication networks [and] noted that some countries did not issue warrants to obtain phone, email or web-searching traffic, because “the relevant agencies and authorities already have permanent access to customer communications via their own direct link.”
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Just before Edward Snowden became a household name, the ACLU argued before the supreme court that the FISA Amendments Act – one of the two main laws used by the NSA to conduct mass surveillance – was unconstitutional. In a sharply divided opinion, the Supreme Court ruled, 5-4, that the case should be dismissed because the plaintiffs didn't have "standing". The court relied on two claims by the Justice Department to support their ruling: 1) that the NSA would only get the content of Americans' communications without a warrant when they are targeting a foreigner abroad for surveillance, and 2) that the Justice Department would notify criminal defendants who have been spied on under the Fisa Amendments Act, so there exists some way to challenge the law in court. It turns out that neither of those statements were true. One of the most explosive Snowden revelations exposed a then-secret technique known as "about" surveillance. As the New York Times first reported, the NSA "is searching the contents of vast amounts of Americans' e-mail and text communications into and out of the country, hunting for people who mention information about foreigners under surveillance." In other words, the NSA doesn't just target a contact overseas – it sweeps up everyone's international communications into a dragnet and searches them for keywords. The Snowden leaks also pushed the Justice Department to admit ... that the government hadn't been notifying any defendants they were being charged based on NSA surveillance.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The Obama administration has barred officials at 17 agencies from speaking to journalists about unclassified intelligence-related topics without permission, according to a newly disclosed directive. The directive, issued by James R. Clapper Jr., the director of national intelligence, also requires the agencies’ employees to report any unplanned contact with journalists. Officials who violate the directive may be disciplined or fired, the directive says. The directive prohibits unauthorized “contact with the media about intelligence-related information, including intelligence sources, methods, activities and judgments,” without regard to whether it is classified. It says that employees who violate the policy “may be subject to administrative actions that may include revocation of security clearances or termination of employment.” At a minimum, the directive adds, any violation of the policy “will be handled in the same manner as a security violation.” Mr. Clapper signed the directive on March 20, and it was quietly posted on the office’s website last week. The directive limiting contact with reporters was reported Monday by Steve Aftergood, a government secrecy specialist for the Federation of American Scientists. In a blog post, Mr. Aftergood portrayed the directive as seeking to ensure that “the only news about intelligence is to be authorized news.” He criticized the policy as going too far, arguing that routine interactions between agency employees and reporters about unclassified matters did not pose a threat to national security, but that limiting them would hurt the public.
Note: Yet another major effort to muzzle whistleblowers. For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Two weeks ago, a pair of F.B.I. agents appeared unannounced at the door of a member of the defense team for one of the men accused of plotting the 9/11 terrorist attacks. As a contractor working with the defense team at Guantánamo Bay, Cuba, the man was bound by the same confidentiality rules as a lawyer. But the agents wanted to talk. They asked questions, lawyers say, about the legal teams for Ramzi bin al-Shibh, Khalid Shaikh Mohammed and other accused terrorists who will eventually stand trial before a military tribunal at Guantánamo. Before they left, the agents asked the contractor to sign an agreement promising not to tell anyone about the conversation. With that signature, Mr. bin al-Shibh’s lawyers say, the government turned a member of their team into an F.B.I. informant. The F.B.I.’s inquiry became the focus of the pretrial hearings at Guantánamo this week, after the contractor disclosed it to the defense team. It was a reminder that, no matter how much the proceedings at the island military prison resemble a familiar American trial, the invisible hand of the United States government is at work there in ways unlike anything seen in typical courtrooms. “It’s a courtroom with three benches,” said Eugene R. Fidell, who teaches military justice at Yale Law School. “There’s one person pretending to be the judge, and two other agencies behind the scenes exerting at least as much influence.” Thirteen years after 9/11, nobody has been convicted in connection with the attacks.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The Obama administration on [April 3] defended its creation of a Twitter-like Cuban communications network [called ZunZuneo] to undermine the Communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval. But two senior Democrats on congressional intelligence and judiciary committees said they had known nothing about the effort. An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform. First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent. Yet its users were neither aware it was created by [USAID, the U.S. Agency for International Development] with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes. Josefina Vidal, director of U.S. affairs at Cuba's Foreign Ministry, said ... that the ZunZuneo program "shows once again that the United States government has not renounced its plans of subversion against Cuba, which have as their aim the creation of situations of destabilization in our country to create changes in the public order and toward which it continues to devote multimillion-dollar budgets each year."
Note: If any other country did this to the U.S., how do you think the U.S. government would respond?
A Senate intelligence committee investigation found that the Central Intelligence Agency employed brutal interrogation methods that turned out to be largely useless and then lied about their effectiveness. The Senate report contradicts the main defenses of the Bush-era torture program: That harsh methods were needed to produce "actionable results," and that the program itself helped save American lives by foiling terror attacks. Instead, the CIA overstated the effectiveness of the program and concealed the harshness of the methods they used. Intelligence breakthroughs credited to the “enhanced interrogation” program by the CIA were instead gleaned through other means, and then used by the agency to bolster defenses of the program. Conservative media figures incessantly hyped former Bush administration officials’ at times verifiably false claims about the efficacy of the program. The Bush administration’s trip to the “dark side” provided pundits, op-ed columnists, and other media personalities an endless stream of satisfaction from talking like the greased up protagonists of 1980s action films.
Note: For an article explaining how even though this report may be declassified, the public will not have access to most of it, click here. For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Three days after an FBI agent was cleared of wrongdoing in the bizarre killing of an associate of slain Boston bombing suspect Tamerlan Tsarnaev, lawyers for Dzhokhar Tsarnaev, the only surviving bombing suspect, alleged that the FBI attempted to recruit the elder Tsarnaev as an informant. Dzhokhar Tsarnaev’s defense team said that new information suggests the FBI interviewed Tamerlan on several occasions before the attack, and even pressured him to surreptitiously report on the Chechen underworld. The Bureau has continued to emphatically state that it didn’t know the identities of the two suspected bombers until they were fingerprinted, and have denied any involvement with the brothers aside from following up on a tip from a Russian emissary that the elder Tsarnaev may have been seeking jihad. In the case of Ibragim Todashev, who allegedly took part with Tamerlan in a robbery turned triple-homicide in Waltham, in 2011, family members have also stated that FBI pressure may have pushed the 20-something ethnic Chechen and mixed martial arts fighter to the brink of violence. Since the terrorist attacks of 9/11, the Bureau has stepped up surveillance of specific racial, ethnic and religious communities, including the use of informants. The tactics have ... left the Bureau open to charges of entrapment, not to mention assorted Internet conspiracy theories. Part of those post-9/11 tactics are the use of “voluntary interviews … often encouraging interviewees to serve as informants in their communities,” writes the American Civil Liberties Union.
Note: Why didn't the FBI reveal its attempt to recruit the elder Tsarnaev when the bombing happened? Something is quite fishy here.
From 10,000 feet up, tracking an entire city at one glance: Ohio-based Persistent Surveillance Systems is trying to convince cities across the country that its surveillance technology can help reduce crime. Its new generation of camera technology is far more powerful than the police cameras to which America has grown accustomed. But these newer cameras have sparked some privacy concerns. A new, far more powerful generation is being quietly deployed [from small aircraft] that can track every vehicle and person across an area the size of a small city, for several hours at a time. Although these cameras can’t read license plates or see faces, they provide such a wealth of data that police, businesses and even private individuals can use them to help identify people and track their movements. Already, the cameras have been flown above major public events such as the Ohio political rally where Sen. John McCain named Sarah Palin as his running mate in 2008. They’ve been flown above Baltimore; Philadelphia; Compton, Calif.; and Dayton [OH] in demonstrations for police. They’ve also been used for traffic impact studies, [and] for security at NASCAR races. Defense contractors are developing similar technology for the military, but its potential for civilian use is raising novel civil liberties concerns. In Dayton, where Persistent Surveillance Systems is based, city officials balked last year when police considered paying for 200 hours of flights, in part because of privacy complaints. The Supreme Court generally has given wide latitude to police using aerial surveillance as long as the photography captures images visible to the naked eye.
Note: For more on surveillance by government agencies and corporations, see the deeply revealing reports from reliable major media sources available here.
Taken together, the [Edward Snowden] revelations have brought to light a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations. Six months after the first revelations ... Snowden agreed to reflect at length on the roots and repercussions of his choice. He was relaxed and animated over two days of nearly unbroken conversation. Snowden offered vignettes from his intelligence career and from his recent life as “an indoor cat” in Russia. But he consistently steered the conversation back to surveillance, democracy and the meaning of the documents he exposed. “For me, in terms of personal satisfaction, the mission’s already accomplished,” he said. “I already won. As soon as the journalists were able to work, everything that I had been trying to do was validated. Because, remember, I didn’t want to change society. I wanted to give society a chance to determine if it should change itself. All I wanted was for the public to be able to have a say in how they are governed,” he said. Snowden ... had come to believe that a dangerous machine of mass surveillance was growing unchecked. Closed-door oversight by Congress and the Foreign Intelligence Surveillance Court was a “graveyard of judgment,” he said, manipulated by the agency it was supposed to keep in check. The NSA’s business is “information dominance,” the use of other people’s secrets to shape events. At 29, Snowden upended the agency on its own turf.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
[Thirteen] days before that dark day in Dallas, [police informant Willie Augustus] Somersett elicited a chilling, police tape-recorded threat from a right-wing racist who talked of how the President would soon be shot “from an office building with a high-powered rifle” and how “they’ll pick up somebody within hours after…just to throw the public off.” Extremist Joseph A. Milteer, of Quitman, Ga., made the threat against Kennedy in the kitchen of Somersett’s small apartment in downtown Miami. In the late 1970s, the House Assassinations Committee had experts analyze a photograph taken in Dealey Plaza moments before the first shot of an unidentified motorcade spectator “who bears a strong resemblance” to Milteer. The experts, however, concluded the man was not Milteer, who died in 1974. But now, a retired FBI agent who says that within hours of the assassination he was assigned to locate Milteer has [said] the man in the photograph is indeed Milteer. “I stood next to the man. I interviewed him and spent hours with him,” said Don Adams, who spent 20 years with the FBI before working as a police chief in Ohio. “There is no question in my mind. As soon as I saw that picture I almost fell off of my feet.” Congressional investigators never contacted Adams. Adams, now 82, says he saw the Dealey Plaza photograph for the first time a decade after his 1982 retirement from the FBI. The photograph renewed his interest in the case and ultimately led him to write the book, From an Office Building with a High-Powered Rifle. His insider’s account raises disturbing questions about the FBI’s investigation of Kennedy’s death.
Note: To watch a five-minute video of 20-year FBI agent Don Adams stating he has no doubt there was a major cover-up of the JFK assassination, click here. For more excellent, revealing videos on the assassination, click here and here. For more on the JFK assassination, see the deeply revealing reports from reliable major media sources available here.
The Transportation Security Administration is expanding its screening of passengers before they arrive at the airport by searching a wide array of government and private databases that can include records like car registrations and employment information. It is unclear precisely what information the agency is relying upon to make these risk assessments, given the extensive range of records it can access, including tax identification number, past travel itineraries, property records, physical characteristics, and law enforcement or intelligence information. The measures go beyond the background check the government has conducted for years, called Secure Flight, in which a passenger’s name, gender and date of birth are compared with terrorist watch lists. Now, the search includes using a traveler’s passport number, which is already used to screen people at the border, and other identifiers to access a system of databases maintained by the Department of Homeland Security. “I think the best way to look at it is as a pre-crime assessment every time you fly,” said Edward Hasbrouck, a consultant to the Identity Project, one of the groups that oppose the prescreening initiatives. “The default will be the highest, most intrusive level of search, and anything less will be conditioned on providing some additional information in some fashion.” Critics argue that the problem with what the agency calls an “intelligence-driven, risk-based analysis” of passenger data is that secret computer rules, not humans, make these determinations. Civil liberties groups have questioned whether the agency has the legal authority to make these assessments.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals. Details of the intelligence-sharing agreement are laid out in a memorandum of understanding between the NSA and its Israeli counterpart that shows the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis. The disclosure that the NSA agreed to provide raw intelligence data to a foreign country contrasts with assurances from the Obama administration that there are rigorous safeguards to protect the privacy of US citizens caught in the dragnet. The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies "pertaining to the protection of US persons", repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights. But this is undermined by the disclosure that Israel is allowed to receive "raw Sigint" – signal intelligence. The memorandum says: "Raw Sigint includes, but is not limited to, unevaluated and [unredacted] transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content." According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
When it comes to foreign policy, war, assassinations, drones, surveillance, secrecy, and civil liberties, President Obama's most stalwart, enthusiastic defenders are often found among the most radical precincts of the Republican Party. The extraordinary events that took place in the House of Representatives [on July 24] are perhaps the most vivid illustration yet of this dynamic. The House voted on an amendment sponsored by Justin Amash, the young Michigan lawyer elected in 2010 as a Tea Party candidate, and co-sponsored by John Conyers, the 24-term senior Democrat on the House Judiciary Committee. The amendment was simple. It would de-fund one single NSA program: the agency's bulk collection of the telephone records of all Americans. The amendment yesterday was defeated. A majority of House Democrats supported the Amash/Conyers amendment, while a majority of Republicans voted against it. As the New York Times put it in its account of yesterday's vote: "Conservative Republicans leery of what they see as Obama administration abuses of power teamed up with liberal Democrats long opposed to intrusive intelligence programs. The Obama administration made common cause with the House Republican leadership to try to block it." The fate of the amendment was sealed when the Obama White House ... announced its vehement opposition to it, and then sent NSA officials to the House to scare members that barring the NSA from collecting all phone records of all Americans would "Help The Terrorists."
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The modern American surveillance state is not really the stuff of paranoid fantasies; it has arrived. The revelations about the National Security Agency’s PRISM data collection program have raised awareness ... about the reach and power of secret intelligence gatherers operating behind the facades of government and business. But those revelations ... have been partial — they primarily focus on one government agency and on the surveillance end of intelligence work, purportedly done in the interest of national security. What has received less attention is the fact that most intelligence work today is not carried out by government agencies but by private intelligence firms and that much of that work involves another common aspect of intelligence work: deception. That is, it is involved not just with the concealment of reality, but with the manufacture of it. Important insight into the world [of] these companies came from a 2010 hack by a group best known as LulzSec ... which targeted the private intelligence firm HBGary Federal. That hack yielded 75,000 e-mails. Team Themis (a group that included HBGary and the private intelligence and security firms Palantir Technologies, Berico Technologies and Endgame Systems) was effectively brought in to find a way to undermine the credibility of WikiLeaks and the journalist Glenn Greenwald (who recently broke the story of Edward Snowden’s leak of the N.S.A.’s Prism program), because of Greenwald’s support for WikiLeaks. The plan called for actions to “sabotage or discredit the opposing organization” including a plan to submit fake documents and then call out the error.
Note: For more on the games intelligence agencies play, see the deeply revealing reports from reliable major media sources available here.
Long before Edward Snowden walked out of the NSA with his trove of documents, whistleblowers there had been trying for years to bring attention to the massive turn toward domestic spying that the agency was making. Last year in my Wired cover story on the enormous new NSA data center in Utah, Bill Binney, the man who largely designed the agency’s worldwide eavesdropping system, warned of the secret, nationwide surveillance. He told how the NSA had gained access to billions of billing records not only from AT&T but also from Verizon. I also wrote about Adrienne J. Kinne, an NSA intercept operator who attempted to blow the whistle on the NSA’s illegal eavesdropping on Americans following the 9/11 attacks. She [attempted and failed] to end the illegal activity with appeals all the way up the chain of command to Major General Keith Alexander. The deception by General Alexander is especially troubling. In my new cover story for Wired’s July issue ...I show how he has become the most powerful intelligence chief in the nation’s history. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the U.S. Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.
Note: James Bamford, the author of this article, was the ABC producer responsible for breaking the story on Operation Northwoods, which proved a level of deception almost beyond belief at the very highest levels of the Pentagon. For more on this, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
The State Department may have covered up allegations of illegal and inappropriate behavior within their ranks. The Diplomatic Security Service, or the DSS, is the State Department's security force, charged with ... investigating any cases of misconduct. According to an internal State Department Inspector General's memo, several recent investigations were influenced, manipulated, or simply called off. The memo obtained by CBS News cited eight specific examples. Among them: allegations that a State Department security official in Beirut "engaged in sexual assaults" on foreign nationals hired as embassy guards. The memo also reveals details about an "underground drug ring" was operating near the U.S. Embassy in Baghdad and supplied State Department security contractors with drugs. Aurelia Fedenisn, a former investigator with the State Department's internal watchdog agency, the Inspector General, told Miller, "We also uncovered several allegations of criminal wrongdoing in cases, some of which never became cases." In such cases, DSS agents told the Inspector General's investigators that senior State Department officials told them to back off. In one specific and striking cover-up, State Department agents told the Inspector General they were told to stop investigating the case of a U.S. Ambassador who held a sensitive diplomatic post and was suspected of patronizing prostitutes in a public park.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
The FBI did not initially share with Boston police the warnings it had received from Russia about one suspect in last month's marathon bombings, despite the work of four city police representatives on a federal terrorism task force, Boston's police commissioner told Congress on [May 9]. Boston police learned about the Russian security service warnings only later. The congressional hearing was the first in a series to review the government's initial response to the attacks, ask what information authorities received about Tsarnaev and his brother before the bombings and consider whether everything was handled correctly. Some lawmakers questioned whether Boston police could have more thoroughly investigated Tsarnaev after 2011, based on Russia's vague warnings then to the FBI and CIA or the discovery by the Homeland Security Department in 2012 that he was traveling to Russia for six months, and whether Justice Department rules intended to protect civil liberties constrained the FBI's own inquiry. Led by the FBI, Joint Terrorism Task Forces operate in many cities as a way to bring federal, state and local officials together to share information. The model has existed for decades but, after 9/11, task forces sprouted up in cities nationwide to ensure that police were not out of the loop on investigations like the one the FBI conducted into Tsarnaev.
Note: For a powerful 11-minute video presenting undeniable evidence that the Boston bombers' uncle was closely linked to both the CIA and terrorist organizations, click here. Many are questioning whether the recent Boston bombing was a false flag operation. Though it is not conclusive, you can find some very reliable evidence that this might be the case at this link and this one. For deeply revealing reports from reliable major media sources on the deceptions of intelligence agencies, click here.
Wikileaks founder Julian Assange has released a database of diplomatic records by Henry Kissinger, who ran American foreign policy under two presidents. Assange has compiled a database of State Department cables that Kissinger signed during the 1970s. The documents were not classified and had been available in national archives, which is where Wikileaks researchers obtained them. Six years after Wikileaks was founded, Assange and his organisation are under pressure. He worked on the database at the Ecuadorean Embassy in London, where he is now living. Critics deplore what Kissinger has done. They point out that after the US secretly bombed Cambodia in 1970, Kissinger tried to control leaks of information about government activities by setting up wiretaps at the homes of journalists. Critics also say Kissinger encouraged the overthrow of Socialist president of Chile, Salvador Allende, in 1973. Because of his role in the wiretapping of Americans and his comments about Chile, among other things, Kissinger has been the subject of intense scrutiny over the years. Kissinger would "sanitise" official accounts of meetings, says Princeton University's Gary Bass, author of a forthcoming book called The Blood Telegram: Nixon, Kissinger, and a Forgotten Genocide. "He would tell his note-takers to leave out something, so we don't have a complete record."
Note: It is quite unusual that this article and very few media have reported on a key quote by Kissinger that was released in these files. He says, “The illegal we do immediately; the unconstitutional takes a little longer." You can see an image of the document with this quote at this link.
Drone war proponents are facing inconvenient truths. This month, for instance, they are facing a new United Nations report showing that President Obama's escalation of the Afghanistan War - in part by an escalation in drone air strikes - is killing hundreds of children "due notably to reported lack of precautionary measures and indiscriminate use of force." Drone-war cheerleaders will no doubt find this news difficult to explain away. Sen. Angus King [justified] the drone war earlier this month. "Drones are a lot more civilized than what we used to do," he told a cable television audience. "I think it's actually a more humane weapon because it can be targeted to specific enemies and specific people." Designed to obscure mounting civilian casualties, King's phrase "humane weapon" is the crux of the larger argument. The idea is that an intensifying drone war is necessary - and even humane! - because it is more surgical than violent global ground war, which is supposedly America's only other option. In a country whose culture so often (wrongly) portrays bloodshed as the most effective problem solver, many Americans hear this now-ubiquitous drone-war argument and reflexively agree with its suppositions. By deliberately ignoring any other less violent option, drone-war proponents who employ choice-narrowing language are ... precluding America from making more prudent, informed and dispassionate national security decisions - the kind that might stop us from repeating the worst mistakes of our own history.
Note: For a revealing 27-minute documentary on drones which operate in swarms and pose serious ethical questions in both peace and war, click here.
NBC News National Investigative Correspondent Michael Isikoff co-authored the best-selling book Hubris: The Inside Story of Spin, Scandal, and the Selling of the Iraq War with David Corn. Their book is the basis for the new MSNBC documentary, "Hubris: Selling the Iraq War". The reporting ... at a time when the movie "Zero Dark Thirty" has drawn attention to the issue, shows viewers the role that torture played in intelligence-gathering after 9/11. The real-life role of torture in pre-Iraq war intelligence, which is reported in Hubris, has far scarier implications than the Hollywood version. MSNBC: What was the single most shocking thing you discovered? [Isikoff:] I still find the Ibn Shaykh al-Libi story ... the most shocking of all. At first, he’s questioned by the FBI–then “rendered” by the CIA in early 2002 to Egypt, where he was subjected to torture: beatings [and] a mock burial. He suddenly coughed up a story–that Iraq was training al-Qaida members in chemical and biological weapons–that nobody in the U.S. intelligence community really believed. The CIA internally even wrote an assessment concluding that al-Libi was likely fabricating much of what he told the Egyptians. Yet suddenly in September 2002, the White House starts using the claim that Iraq is training al-Qaida in “poisons and gases”–a claim based entirely on al-Libi. After the war, al-Libi is returned to U.S. custody and recants the whole thing, saying he made it up because the Egyptians were torturing him. Anybody who saw "Zero Dark Thirty" and thinks it vindicates waterboarding and other “enhanced interrogation techniques” should watch "Hubris".
Note: For deeply revealing reports from reliable major media sources on torture and other war crimes committed by the US, click here.
A federal judge in Manhattan refused on [January 2] to require the Justice Department to disclose a memorandum providing the legal justification for the targeted killing of a United States citizen, Anwar al-Awlaki, who died in a drone strike in Yemen in 2011. The ruling, by Judge Colleen McMahon, was marked by skepticism about the antiterrorist program that targeted him, and frustration with her own role in keeping the legal rationale for it secret. “I can find no way around the thicket of laws and precedents that effectively allow the executive branch of our government to proclaim as perfectly lawful certain actions that seem on their face incompatible with our Constitution and laws while keeping the reasons for their conclusion a secret,” she wrote. “The Alice-in-Wonderland nature of this pronouncement is not lost on me,” Judge McMahon wrote, adding that she was operating in a legal environment that amounted to “a veritable Catch-22.” Judge McMahon’s opinion included an overview of what she called “an extensive public relations campaign” by various government officials about the American role in the killing of Mr. Awlaki and the circumstances under which the government considers targeted killings, including of its citizens, to be lawful. The government’s public comments were as a whole “cryptic and imprecise,” Judge McMahon said. Even as she ruled against the plaintiffs, the judge wrote that the public should be allowed to judge whether the administration’s analysis holds water.
Note: For analysis of the significance of this reluctant court ruling upholding continued secrecy of the drone assassinations, click here.
Lawmakers accused the CIA of misleading the makers of the Osama bin Laden raid film “Zero Dark Thirty” by allegedly telling them that harsh interrogation methods helped track down the terrorist mastermind. The film shows waterboarding and similar techniques as important, if not key, to finding bin Laden in Pakistan, where he was killed by Navy SEALs in 2011. A Senate Intelligence Committee investigation into the CIA’s detainee program found that such methods produced no useful intelligence. In a letter to the CIA this week, Sens. Dianne Feinstein, D-Calif., John McCain, R-Ariz., and others asked [the CIA] to share documents showing what the filmmakers were told. The senators contend that that the CIA detainee who provided the most accurate information about the courier who was tracked to bin Laden’s hiding place “provided the information prior to being subjected to coercive interrogation techniques,” according to a statement ... from Feinstein. The CIA says it will cooperate.
Note: Note that this "critique" of the CIA by US Senators serves to maintain the claim that Osama bin Laden was killed by the Navy SEALs raid in Pakistan in 2011. But there have been numerous reports of bin Laden's death before the "official" killing. Click here and here for two intriguing BBC reports on this. WantToKnow team member David Ray Griffin's book establishing the likelihood that Osama bin Laden died in December 2001, Osama bin Laden: Dead or Alive?, is available here.
The new Kathryn Bigelow movie "Zero Dark Thirty" has renewed the debate on the efficacy of torture. The film obliquely credits the discovery of the key piece of information in the search for [Osama] Bin Laden to the torture of an Al Qaeda prisoner held by the CIA. This is at odds with the facts as they have been recounted by journalists reporting on the manhunt, by Obama administration intelligence officials and by legislative leaders. Bigelow and her writing partner, Mark Boal, are promoting "Zero Dark Thirty" in part by stressing its basis in fact. It's curious that they could have gotten this central, contentious point wrong. And because they originally set out to make a movie about the frustrating failure to find Bin Laden, it's hard to believe their aim was to celebrate torture. But that's in effect what they've done. It was Dick Cheney's idea that the United States could solve complicated problems just by being brave enough, or tough enough, or both. Despite the fact that the world doesn't seem to work that way, Cheney's argument had a force and a tenor that fits with our national narrative of exceptionalism. It's satisfying. We are willing to believe there is something heroic, justifiable about torture. There is not. The moral objection ought to be obvious. We've had laws against torture for decades. We've had these laws for the simplest of reasons — we decided it was wrong. In almost no contemporary culture is it presumed to be not wrong.
Note: There have been numerous reports of bin Laden's death before the "official" killing. Click here and here for two intriguing BBC reports on this. WantToKnow team member David Ray Griffin's book establishing the likelihood that Osama bin Laden died in December 2001, Osama bin Laden: Dead or Alive?, is available here.
Presidential counterterrorism adviser John O. Brennan is compiling the rules for a war the Obama administration believes will far outlast its own time in office. The “playbook,” as Brennan calls it, will ... cover the selection and approval of targets from the “disposition matrix,” the designation of who should pull the trigger when a killing is warranted, and the legal authorities the administration thinks sanction its actions in Pakistan, Yemen, Somalia and beyond. Brennan is the principal architect of a policy that has transformed counterterrorism from a conventional fight centered in Afghanistan to a high-tech global effort to track down and eliminate perceived enemies one by one. What was once a disparate collection of tactics ... has become a White House-centered strategy with Brennan at its core. Brennan is leading efforts to curtail the CIA’s primary responsibility for targeted killings. Still, during Brennan’s tenure, the CIA has carried out hundreds of drone strikes in Pakistan and opened a new base for armed drones in the Arabian Peninsula. Brennan wields enormous power in shaping decisions on “kill” lists and the allocation of armed drones, the war’s signature weapon.
Note: Remember that these drones have been used to kill American citizens who were given no rights or trial, including a 16-year-old American boy. Is this what is called justice? For deeply revealing reports from reliable major media sources on the secret and illegal operations of the "global war on terror," click here.
After years of frustration and hundreds of millions of dollars lost on a system that didn't work, the FBI has finally deployed a new $451 million computer system called Sentinel. The web-based interface allows agents to widely search all FBI case files and data as they work investigations and track down leads, effectively moving FBI agents and analysts away from paper based files to a streamlined computer program. The system allows agents to conduct searches of related case information to "connect the dots." The FBI was sharply criticized after the 9/11 attacks for failing to piece together information about suspected terrorists obtaining flight training in the United States. The FBI was first warned in July 2001 by FBI Agent Ken Williams, who was assigned to the Phoenix Field Office, that individuals associated with Osama Bin Laden were undertaking a coordinated effort to obtain flight training in Arizona. The memo he wrote recommending that the FBI have liaison with flight schools in their areas was not widely read or acted upon. In August 2001 officials at FBI headquarters did not realize the significance of the arrest of Zacarias Moussaoui who was seeking flight training in Minnesota and had financial connections to the 9/11 hijackers.
Note: For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here.
Dick Lehr is the co-author of the book Black Mass: Whitey Bulger, the FBI, and a Devil’s Deal. First published in 2001, the book has undergone a number of revisions as the story of Bulger and the FBI has unfolded. Its latest revision has been published this month. Lehr and his co-author Gerry O’Neill are former reporters for the Boston Globe, whose ... report in September 1988 on the tale of the two Bulger brothers first raised the issue in public of Bulger’s “special relationship” to the FBI. Dick Lehr: [Whitey Bulger] goes down into history as one of the 20th century’s most notorious gangsters. He did something no other gangster that we know of has ever done and that’s compromise the FBI, bring it to its knees, not just in a single case, but as a way of life. He had sold everybody a story that would explain why someone might see him and [FBI agent John] Connolly. And that was that Connolly was their source, that it was one-way, and that Connolly was a corrupted agent, which was true, but it didn’t tell the whole story. But it did become Whitey’s cover. So if anybody ever saw him with Connolly and asked, ‘Hey what are you doing with that FBI guy?’ Whitey could say, ‘Hey, that’s my guy — he’s my rat.’ Throughout a lifetime he’s strategically always been able to anticipate and plant seeds in the event something happens down the road and he’s already a step ahead in terms of everyone, strategy and analysis.
Note: To go much deeper into this bizarre story of FBI strangeness, read the interview in the Boston Globe at this link. And for additional reliable information on intense corruption in intelligence agencies, click here.
Tim Weiner’s new book, Enemies: A History of the F.B.I., is an outstanding piece of work. The F.B.I. ... from World War I on investigated all manner of political radicals and Communists, compiled lists of Americans to be detained in the event of national emergency and engaged in at least half a century of illegal wiretapping, mail opening and burglaries. This is certainly the most complete book we are likely to see about the F.B.I.’s intelligence-gathering operations, from Emma Goldman to Osama bin Laden. Where Mr. Weiner excels is in connecting the dots. He identifies his themes, almost all involving the conflicting demands of civil liberties and civil order — “the saga of our struggle to be both safe and free,” as he puts it — and rigorously pursues them. Illegal wiretaps and burglaries were the F.B.I.’s key weapons almost from the beginning. Time and again, going back to the 1930s, this or that court would rule such procedures illegal. Time and again, J. Edgar Hoover, the bureau’s director from 1924 until his death in 1972, simply ignored the law. A string of presidents, from Roosevelt to Richard M. Nixon, knew exactly what the bureau was doing and refused to stop it. Hunting Commies ... was Hoover’s true life’s work — the one thing, other than his reflexive bureaucratic defensiveness, that obsessed him from his first radical raids in 1919 into the 1960s.
Note: Mr. Weiner, a former reporter for The New York Times, previously wrote an admired history of the C.I.A., Legacy of Ashes. For deeply revealing reports from reliable major media sources on intelligence agency skullduggery, click here.
It has been 10 years since Guantanamo Bay became a prison. Today, 171 men are still held there with no real prospect of either trial or release. Bush administration officials have admitted ordering torture against prisoners in Guantanamo, Afghanistan, Iraq and secret sites in [other] countries, yet no one has been held to account for violating U.S. law. Their illegal actions and the recent passage - and signing by President Obama - of the National Defense Authorization Act have undermined fundamental structures of law and morality that are our heritage as Americans. More than 80 percent of Americans self-identified as "religious" in a 2011 Pew poll. Today, 312 U.S. faith groups are members of the National Religious Campaign Against Torture. Organized in 2006, it is a vehicle for people of faith seeking to denounce abusive practices by the United States. Under President Obama, we have held no one accountable for torture. With the passage of the Defense Act, indefinite detention without trial has become law ... including even American citizens captured on U.S. soil, a clear violation of the Fourth Amendment to the Constitution. The loss of habeas corpus rights under the Defense Act now puts every ordinary person at risk of indefinite detention. As citizens, it is our right and responsibility to demand that our government investigate the U.S. torture program and uphold our constitutional rights. As a nation of people of faith, this is our sacred duty.
Note: The author, Louise Specht, is the convener of the Bay Area Religious Campaign Against Torture, the Northern California affiliate of the National Religious Campaign Against Torture.
The former head of Cambodia's antidrug office was sentenced to life in prison ... for masterminding a drug ring from his office, a court official said. Lt. Gen. Mok Dara, secretary-general of the National Authority for Combating Drugs until his arrest last January, faced more than 30 counts of bribery and drug trafficking and was given a life sentence. An associate, anti-drug officer Chea Leang, also received a life sentence, while a third defendant, Morn Doeun, who was at large, was sentenced to 25 years by the court in the northwestern province, which borders Thailand. The case, which lasted several weeks, was one of the largest to go through Cambodia's court system and involved the testimonies of scores of witnesses. Cambodia has been working in recent years to reduce corruption. Mok Dara's is the latest in a string of cases brought by the government's new Anti-Corruption Unit. Mok Dara maintained he was innocent, people attending the proceedings said. Nop Virak, a trial monitor at the Cambodian Center for Human Rights who observed the case, said Mok Dara's sentencing will serve as a warning to corrupt officials.
Note: How long before the rogue elements in Western governments running drug operations are arrested? It's only a matter of time.
Rep. Lamar Smith, chairman of the House Judiciary Committee, ... demanded an independent investigation of whether Attorney General Eric Holder misled Congress on what he knew about the botched gun-tracking operation known as "Fast and Furious" - and when he found out about it. The Associated Press reported that the George W. Bush administration conducted a program similar to Fast and Furious, in which Bureau of Alcohol, Tobacco, Firearms and Explosives agents were instructed to let Mexican drug cartel straw purchasers buy guns in the Phoenix area to follow the trail to higher-ups. Known as Operation Wide Receiver, the Bush-era operation also let guns be transferred to suspected arms traffickers. Justice Department prosecutors have brought charges against nine people involved in the operation, according to AP; two have pleaded guilty. Fast and Furious was meant to take down Mexican cartels importing U.S.-bought weapons and shipping drugs to the United States. Phoenix-based ATF agents allowed the gun purchases so they could take down cartel bosses rather than only arresting lower-level purchasers. But the agents lost track of more than 1,000 firearms during the operation last year. Several were later found at the scenes of Mexican drug crimes, according to a report by the House oversight committee.
Note: For key reports from major media sources on government corruption, click here.
A top-secret document revealing how MI6 and MI5 officers were allowed to extract information from prisoners being illegally tortured overseas has been seen by the Guardian. The interrogation policy ... instructed senior intelligence officers to weigh the importance of the information being sought against the amount of pain they expected a prisoner to suffer. It was operated by the British government for almost a decade. The fact that the interrogation policy document and other similar papers may not be made public during the inquiry into British complicity in torture and rendition has led to human rights groups and lawyers refusing to give evidence or attend any meetings with the inquiry team because it does not have "credibility or transparency". The decision by 10 groups – including Liberty, Reprieve and Amnesty International – follows the publication of the inquiry's protocols, which show the final decision on whether material uncovered by the inquiry, led by Sir Peter Gibson, can be made public will rest with the cabinet secretary. Some have criticised the appointment of Gibson, a retired judge, to head the inquiry because he previously served as the intelligence services commissioner, overseeing government ministers' use of a controversial power that permits them to "disapply" UK criminal and civil law in order to offer a degree of protection to British intelligence officers committing crimes overseas.
Note: Isn't it quite unusual for human rights organizations to refuse to participate in an inquiry into government abuses of human rights? Evidently the conflicts of interest of the inquiry head Gibson are so extreme that participation is simply impossible.
What's good for the police apparently isn't good for the people - or so the law enforcement community would have us believe when it comes to surveillance. That's a concise summary of a new trend noted by National Public Radio last week - the trend whereby law enforcement officials have been trying to prevent civilians from using cell phone cameras in public places as a means of deterring police brutality. Oddly, the effort - which employs both forcible arrests of videographers and legal proceedings against them - comes at a time when the American Civil Liberties Union reports that "an increasing number of American cities and towns are investing millions of taxpayer dollars in surveillance camera systems." The assault on civil liberties in America is a very real problem. As USA Today reported under the headline "Police brutality cases on rise since 9/11," situations "in which police, prison guards and other law enforcement authorities have used excessive force or other tactics to violate victims' civil rights increased 25 percent" between 2001 and 2007. Last year alone, more than 1,500 officers were involved in excessive force complaints, according to the National Police Misconduct Statistics and Reporting Project.
Note: For lots more from major media sources on government and police threats to civil liberties and privacy, click here and here.
U.S. officials set up a human-intelligence laboratory at Guantánamo that used interrogation and detention practices they largely made up as they went along. The secret summaries, which were obtained via WikiLeaks, help explain why in May 2009 President Obama, after ordering his own review of wartime intelligence, called ... Guantánamo "quite simply a mess." The documents ... show an intelligence operation that was tremendously dependent on informants — both prison-camp snitches repeating what they'd heard from fellow captives, and self-described, at times self-aggrandizing, former al-Qaida insiders turned government witnesses who Pentagon records show have since been released. Intelligence analysts are at odds with each other over which informants to trust, at times drawing inferences from prisoner exercise habits. They ordered DNA tests, tethered Taliban suspects to polygraphs and strung together tidbits in ways that seemed to defy common sense. The documents also show that in the earliest years of the prison camp's operation, the Pentagon permitted Chinese and Russian interrogators into the camps — information from those sessions are included in some captives' assessments — something American defense lawyers working free for the foreign prisoners have alleged and protested for years.
Note: For key reports from reliable sources on the prison at Guantanamo and other black sites where torture and false allegations are the norm, click here.
The suspect's house, just west of this city, sat on a hilltop at the end of a steep, exposed driveway. Agents with the Texas Department of Public Safety believed the man inside had a large stash of drugs and a cache of weapons. The Texas agents did what no state or local law enforcement agency had done before in a high-risk operation: They launched a drone. A bird-size device called a Wasp floated hundreds of feet into the sky and instantly beamed live video to agents on the ground. The SWAT team stormed the house and arrested the suspect. "The nice thing is it's covert," said Bill C. Nabors Jr., chief pilot with the Texas DPS, "You don't hear it, and unless you know what you're looking for, you can't see it." The drone technology that has revolutionized warfare in Iraq, Afghanistan and Pakistan is entering the national airspace. The operation outside Austin presaged what could prove to be one of the most far-reaching and potentially controversial uses of drones: as a new and relatively cheap surveillance tool in domestic law enforcement. By 2013, the FAA expects to have formulated new rules that would allow police across the country to routinely fly lightweight, unarmed drones up to 400 feet above the ground - high enough for them to be largely invisible eyes in the sky. Such technology could allow police to record the activities of the public below with high-resolution, infrared and thermal-imaging cameras.
Note: For lots more from reliable sources on government and corporate threats to privacy, click here.
Former investigative reporter Cheri Seymour, a San Diego County resident, has written a non-fiction thriller to end all thrillers. The Last Circle is ripped from the headlines of one of our era’s most controversial murder scandals: the killing of investigative journalist Danny Casolaro, whose discoveries about a shadowy organization that he dubbed “The Octopus” reached into the Mafia, the Cali Drug Cartel, and even the U.S. Department of Justice. Casolaro, a Washington D.C. journalist, began his probe with an investigation into the theft of a revolutionary new software program that was actually the forerunner of artificial intelligence. It was called PROMIS. Casolaro worked closely with Bill Hamilton, owner and developer of the PROMIS software, to locate and identify the persons responsible for illegally modifying the software, installing a backdoor or Trojan Horse in the program, and selling it worldwide to foreign countries -— thus allowing the U.S. government to secretly monitor intelligence operations in those countries. In August 1991, Casolaro filled his briefcase with documents and headed out to Martinsburg, Virginia to “bring back the head of the Octopus,” according to his closest friends who said he was “ecstatic” about something he had recently uncovered. He never returned. He was found dead at a Martinsburg hotel on August 10, 1991. The coroner ruled his death a suicide, but all his documents and briefcase were missing from the hotel room and never recovered. Three months after Casolaro’s death, Seymour jumped on the investigative trail he left behind, and 18 years later, his story and Seymour’s are revealed in this riveting book.
Note: For more on Danny Casolaro, click here.
Federal law enforcement and national security officials are preparing to seek sweeping new regulations for the Internet, arguing that their ability to wiretap criminal and terrorism suspects is “going dark” as people increasingly communicate online instead of by telephone. Essentially, officials want Congress to require all services that enable communications — including encrypted e-mail transmitters like BlackBerry, social networking Web sites like Facebook and software that allows direct “peer to peer” messaging like Skype — to be technically capable of complying if served with a wiretap order. The mandate would include being able to intercept and unscramble encrypted messages. James X. Dempsey, vice president of the Center for Democracy and Technology, an Internet policy group, said the proposal had “huge implications” and challenged “fundamental elements of the Internet revolution” — including its decentralized design. “They are really asking for the authority to redesign services that take advantage of the unique, and now pervasive, architecture of the Internet,” he said. “They basically want to turn back the clock and make Internet services function the way that the telephone system used to function.”
Note: For an analysis of this new government move to spy on US citizens, click here. For lots more from reliable sources on disturbing government threats to privacy and civil liberties, click here and here.
The US Central Intelligence Agency is running and paying for a secret 3,000-strong army of Afghan paramilitaries whose main aim is assassinating Taliban and al-Qa'ida operatives not just in Afghanistan but across the border in neighbouring Pakistan's tribal areas. Although the CIA has long been known to run clandestine militias in Afghanistan, including one from a base it rents from the Afghan president Hamid Karzai's half-brother in the southern province of Kandahar, the sheer number of militiamen directly under its control have never been publicly revealed. [Bob] Woodward's [new] book, Obama's Wars, describes these forces as elite, well-trained units that conduct highly sensitive covert operations into Pakistan as part of a stepped-up campaign against al-Qa'ida and Afghan Taliban havens there. The secret army is split into "Counterterrorism Pursuit Teams", and is thought to be responsible for the deaths of many Pakistani Taliban fighters who have crossed the border into Afghanistan to fight Nato and Afghan government forces there. There are ever-increasing numbers of "kill-or-capture" missions undertaken by US Special Forces against Afghan Taliban and foreign fighters, who hope to drive rank-and-file Taliban towards the Afghan government's peace process by eliminating their leaders.
Note: For commentary on this report of the CIA's army of assassins, click here. For key reports on the realities of the "global war on terror," click here.
A retired FBI agent from Summit County is making claims regarding the assassination of President John F. Kennedy that go beyond conspiracy theories. Don Adams ... doesn't waiver from his position that Lee Harvey Oswald did not kill President John F. Kennedy in Dallas. "It is a fact," says Adams, and he says he has the FBI documents to prove it. One of Adams first assignments was investigating an extreme right radical, with connections to the States Rights Party and KKK named Joseph Adams Milteer. One week after completing the investigation, President Kennedy was gunned down in Dallas. Agent Adams located Milteer in Quintan, Georgia on November 27, 1963, but according to Adams, the Senior Agent in charge would not allow a proper interrogation. "I said, 'Boss wait a minute, we have an opportunity to elicit tremendous information from him' and he replied '5 questions and nothing more'." Years later, while searching the archives Adams learned that Milteer had threatened to kill President Kennedy November 9, 1963, just weeks before the assassination, and that FBI agents had allegedly lied about his whereabouts immediately following [the] threat. An FBI record states that after the assassination, "a jubilant" Milteer bragged to the informant, "You thought I was kidding when I said he would be killed from a window with a high powered rifle." Adams questions why Milteer appears in a photograph near President Kennedy's limousine before the shooting, but was never mentioned in the Warren Commission Report.
Note: For key articles from reliable sources on many still-unanswered questions about the John Kennedy and other major political assassinations, click here.
From 1960 to 1965, the CIA brainstormed at least eight plots to assassinate Cuba's Fidel Castro. According to a report prepared in 1967 and declassified 36 years later, the CIA thought of using cigars, contaminated air, poisoned pills, fungus and a poison-filled syringe to take out the Communist leader. One plot, which sought only to damage Castro's image, suggested placing thallium salt in his shoes, in the hope that his beard would fall out. But one idea stood out above the rest: the plan to kill Castro with a booby-trapped seashell. You see, the dictator was a fan of skin diving, so intelligence agents plotted to place an especially spectacular shell in a reef Castro was known to frequent. The hope was that the shell would be so beautiful that Castro would pick it up and, by doing so, trigger an explosive. Desmond Fitzgerald, the CIA's head of Cuban operations, went as far as to buy two books on Caribbean mollusks. But the elaborate scheme was deemed impractical.
Note: For more on assassinations as a tool of government policy, see the deeply revealing reports from reliable major media sources available here.
The Obama administration is seeking to compel a writer to testify about his confidential sources for a 2006 book about the Central Intelligence Agency, a rare step that was authorized by Attorney General Eric H. Holder Jr. The author, James Risen, who is a reporter for The New York Times, received a subpoena on [April 26] requiring him to provide documents and to testify May 4 before a grand jury in Alexandria, Va., about his sources for a chapter of his book, State of War: The Secret History of the C.I.A. and the Bush Administration. The chapter largely focuses on problems with a covert C.I.A. effort to disrupt alleged Iranian nuclear weapons research. Mr. Risen referred questions to his lawyer, Joel Kurtzberg, ... who said that Mr. Risen would not comply with the demand and would ask a judge to quash the subpoena. �He intends to honor his commitment of confidentiality to his source or sources,� Mr. Kurtzberg said. �We intend to fight this subpoena.� The subpoena comes two weeks after the indictment of a former National Security Agency official on charges apparently arising from an investigation into a series of Baltimore Sun articles that exposed technical failings and cost overruns of several agency programs that cost billions of dollars.
Note: For many key major media articles on the efforts of the government to maintain secrecy, click here.
After five years of investigation, the Justice Department has released its findings regarding the government lawyers who authorized waterboarding and other forms of torture during the interrogation of suspected terrorists at Guantánamo Bay and elsewhere. In contrast, the government doctors and psychologists who participated in and authorized the torture of detainees have escaped discipline, accountability or even internal investigation. It is hardly news that medical staff at the C.I.A. and the Pentagon played a critical role in developing and carrying out torture procedures. Psychologists and at least one doctor designed or recommended coercive interrogation methods including sleep deprivation, stress positions, isolation and waterboarding. The military’s Behavioral Science Consultation Teams evaluated detainees, consulted their medical records to ascertain vulnerabilities and advised interrogators when to push harder for intelligence information. Psychologists designed a program for new arrivals at Guantánamo that kept them in isolation to “enhance and exploit” their “disorientation and disorganization.”
Note: To learn about top doctors and psychiatrists who abused their positions to forward secret government mind control programs, click here.
The nation’s top scientists and spies are collaborating on an effort to use the federal government’s intelligence assets — including spy satellites and other classified sensors — to assess the hidden complexities of environmental change. The collaboration ... has the strong backing of the director of the Central Intelligence Agency. Secrecy cloaks the monitoring effort ... because the United States wants to keep foes and potential enemies in the dark about the abilities of its spy satellites and other sensors. Controversy has often dogged the use of federal intelligence gear for environmental monitoring. About 60 scientists — mainly from academia but including some from industry and federal agencies — run the effort’s scientific side. All have secret clearances. The C.I.A. runs the program and arranges for the scientists to draw on federal surveillance equipment, including highly classified satellites of the National Reconnaissance Office. Officials said the effort to restart the program originated on Capitol Hill in 2008 after former Vice President Al Gore argued for its importance with Senator Dianne Feinstein, Democrat of California, who was then a member of the Senate Intelligence Committee; she became its chairwoman in early 2009.
Note: What happens to the public perception of science if research relies increasingly on secret data and collaboration with spy agencies? How could the results of important studies be verified by independent researchers? For lots more on the ever-expanding world of government secrecy, click here.
Private security guards from Blackwater Worldwide participated in some of the C.I.A.’s most sensitive activities — clandestine raids with agency officers against people suspected of being insurgents in Iraq and Afghanistan and the transporting of detainees, according to former company employees and intelligence officials. The raids against suspects occurred on an almost nightly basis during the height of the Iraqi insurgency from 2004 to 2006, with Blackwater personnel playing central roles in what company insiders called “snatch and grab” operations. Several former Blackwater guards said that their involvement in the operations became so routine that the lines supposedly dividing the Central Intelligence Agency, the military and Blackwater became blurred. Instead of simply providing security for C.I.A. officers, they say, Blackwater personnel at times became partners in missions to capture or kill militants in Iraq and Afghanistan, a practice that raises questions about the use of guns for hire on the battlefield. The secret missions illuminate a far deeper relationship between the spy agency and the private security company than government officials had acknowledged. Blackwater’s ties to the C.I.A. have emerged in recent months, beginning with disclosures in The New York Times that the agency had hired the company as part of a program to assassinate leaders of Al Qaeda and to assist in the C.I.A.’s Predator drone program in Afghanistan and Pakistan.
Note: After this report was published, the CIA announced it had terminated contracts with Blackwater. The reality is that many of Blackwater's services are provided under classified contracts, with both the CIA and the Joint Special Operations Command, so the denial of "contracts" with Blackwater may be deceptive.
In a landmark ruling, an Italian judge ... convicted a base chief for the Central Intelligence Agency and 22 other Americans, almost all C.I.A. operatives, of kidnapping a Muslim cleric from the streets of Milan in 2003. The case was a huge symbolic victory for Italian prosecutors, who drew the first convictions involving the American practice of rendition, in which terrorism suspects are captured in one country and taken for questioning in another, often one more open to [torture]. The fact that Italy would actually convict intelligence agents of an allied country was seen as a bold move that could set a precedent in other cases. Judge Oscar Magi handed an eight-year sentence to Robert Seldon Lady, a former C.I.A. base chief in Milan, and five-year sentences to the 22 other Americans, including an Air Force colonel and 21 C.I.A. operatives. Three of the other high-ranking Americans were given diplomatic immunity, including Jeffrey Castelli, a former C.I.A. station chief in Rome. Citing state secrecy, the judge did not convict five high-ranking Italians charged in the abduction, including a former head of Italian military intelligence, Nicolň Pollari. All the Americans were tried in absentia and are considered fugitives. Armando Spataro, the counterterrorism prosecutor who brought the case, said he was considering asking the Italian government for an international arrest warrant for the fugitive Americans. Tom Parker, Amnesty International’s United States point man for terrorism issues, called on the Obama administration to “repudiate the unlawful practice of extraordinary rendition.”
Note: The US government has refused to extradite to Italy the 23 Americans convicted in absentia of kidnapping. Yet the US is pressing for the extradition of 76-year-old Roman Polanski for fleeing the US after serious judicial malfeasance. For an analysis of these contradictions by US authorities over extradition, click here.
A federal appeals court granted the Obama administration's request ... to rehear a case over a Bay Area company's alleged participation in CIA torture flights, setting the stage for a critical test of government claims of secrecy and national security. The Ninth U.S. Circuit Court of Appeals in San Francisco had reinstated a suit in April by five men who accused the company, Jeppesen Dataplan of San Jose, of taking part in the CIA's extraordinary rendition program that led to their imprisonment and torture. The 3-0 ruling rejected arguments by the Bush and Obama administrations that the case concerned secrets too sensitive to disclose in court. The full appeals court set aside that ruling. President Obama criticized the practice [of extraordinary rendition] but refused to disavow it, promising only that no prisoners would be tortured. Ben Wizner, an ACLU attorney, said ... that he was "disappointed that the Obama administration continues to stand in the way of torture victims having their day in court. This case is not about secrecy. It's about immunity from accountability," Wizner said. In the April ruling reinstating the lawsuit, the three-judge appeals court panel said the government and Jeppesen could take steps to protect national secrets as the case proceeded. The panel said the administration's argument, if accepted, would "cordon off all secret government actions from judicial scrutiny, immunizing the CIA and its contractors from the demands and limits of the law."
Note: For many reports from major media sources of growing government threats to civil liberties, click here.
When the CIA revived a plan to kill or capture [alleged] terrorists in 2004, the agency turned to the well-connected security company then known as Blackwater USA. With Blackwater's lucrative government security work and contacts arrayed in hot spots around the world, company officials offered the services of foreigners supposedly skilled at tracking [people] in lawless regions and countries where the CIA had no working relationships with the government. But the CIA's use of the private contractor as part of its now-abandoned plan to dispatch death squads skirted concerns now re-emerging with recent disclosures about Blackwater's role. Blackwater's later hiring of several senior CIA officials who were involved in or aware of the secret program, including one of the men who ran the operation, showed the blurred lines of using a private contractor for such a highly classified and dangerous project. The 2004 decision by CIA officials to entrust the North Carolina-based company with such a sensitive overseas operation struck some former agency officials as highly unusual. "The question remains: Why do we need Blackwater?" said Charles Faddis, a former department chief at the CIA's Counterterrorism Center who retired in 2008 and was not involved in the secret program. "I remain mystified. This is quintessential CIA work. You wonder what it means that the CIA has to rely on Blackwater? Why are we still funding the CIA?" The former senior CIA official who had knowledge of the program explained that "you wouldn't want to have American fingerprints on it."
Note: For lots more on government corruption, click here.
In March 2003, two C.I.A. officials surprised Kyle D. Foggo, then the chief of the agency's main European supply base, with an unusual request. They wanted his help building secret prisons to hold some of the world's most threatening terrorists. Mr. Foggo, nicknamed Dusty, ... agreed to the assignment. With that, Mr. Foggo went on to oversee construction of three detention centers, each built to house about a half-dozen detainees. The existence of the network of prisons to detain and interrogate [captives] has long been known, but details about them have been a closely guarded secret. In recent interviews, though, several former intelligence officials have provided a fuller account. Mr. Foggo acknowledged a role, which has never been previously reported. He pleaded guilty last year to a fraud charge involving a contractor that equipped the C.I.A. jails and provided other supplies to the agency, and he is now serving a three-year sentence in a Kentucky prison. Eventually, the agency's network would encompass at least eight detention centers, including one in the Middle East, one each in Iraq and Afghanistan and a maximum-security long-term site at Guantanamo Bay, Cuba. The C.I.A. has never officially disclosed the exact number of prisoners it once held, but top officials have put the figure at fewer than 100. Mr. Foggo's success in Frankfurt, including his work on the prisons, won him a promotion back in Washington. In November 2004, he was named the C.I.A.'s executive director, in effect its day-to-day administrative chief. "It was like taking a senior NCO and telling him he now runs the regiment," said A. B. Krongard, the C.I.A.'s executive director from 2001 to 2004. "It popped people's eyes."
Note: Kyle "Dusty" Foggo's case is highly unusual. Very few high-level CIA officers have ever been imprisoned for corruption. His predecessor as Executive Director of the CIA, quoted in the article above, A.B. "Buzzy" Krongard, who held the office on 9/11, had been the chief executive of a branch of the investment company which placed the still unexplained "put options" on American and United Airlines stocks the week before the attacks, resulting in hundreds of millions of dollars of profits to "unknown" parties.
The Obama administration is fighting on multiple fronts - in courts in San Francisco, Washington and London - to keep an official veil of secrecy over the treatment of a former prisoner who says he was tortured at Guantanamo Bay. The administration has asked a federal appeals court in San Francisco to reconsider its ruling allowing Binyam Mohamed and four other former or current prisoners to sue a Bay Area company for allegedly flying them to overseas torture chambers for the CIA. Most recently, a British government lawyer told her nation's High Court last month that Secretary of State Hillary Rodham Clinton had threatened to limit U.S. intelligence-sharing with Great Britain if the court disclosed details of Mohamed's treatment in Guantanamo. The British court declared in August 2008 that there was evidence Mohamed had been tortured, but deleted the details from its public version of the ruling at the Bush administration's insistence. Mohamed, 30, an Ethiopian refugee and British resident, ... and four other men have sued Jeppesen Dataplan, a San Jose subsidiary of the Boeing Co., for its alleged role in arranging their flights for the CIA. A Council of Europe report in 2007 described Jeppesen as the CIA's aviation services provider. The Ninth U.S. Circuit Court of Appeals in San Francisco reinstated the suit in April, rejecting arguments originally made by the Bush administration that the case posed grave risks to national security. Obama administration lawyers endorsed those arguments at a hearing in February and have asked the court for a rehearing. Mohamed's lawyers, Clive Stafford Smith and Ahmad Ghappour of the British human-rights group Reprieve, were threatened with jail after drafting a letter to Obama in February urging him to release the evidence of their client's treatment in U.S. custody or to authorize Britain to do so.
Note: For many illuminating reports from major media sources on government secrecy, click here.
The Obama administration will proceed with a Bush-era plan to use National Security Agency assistance in screening government computer traffic on private-sector networks, with AT&T as the likely test site, according to three current and former government officials. President Obama said in May that government efforts to protect computer systems from attack would not involve "monitoring private-sector networks or Internet traffic," and Department of Homeland Security officials say the new program will scrutinize only data going to or from government systems. But the program has provoked debate within DHS, the officials said, because of uncertainty about whether private data can be shielded from unauthorized scrutiny, how much of a role NSA should play and whether the agency's involvement in warrantless wiretapping during George W. Bush's presidency would draw controversy. Each time a private citizen visited a "dot-gov" Web site or sent an e-mail to a civilian government employee, that action would be screened for potential harm to the network. Under a classified pilot program approved during the Bush administration, NSA data and hardware would be used to protect the networks of some civilian government agencies. Part of an initiative known as Einstein 3, the plan called for telecommunications companies to route the Internet traffic of civilian agencies through a monitoring box that would search for and block computer codes designed to penetrate or otherwise compromise networks. AT&T, the world's largest telecommunications firm, was the Bush administration's choice to participate in the test. AT&T officials declined to comment. The prospect of NSA involvement in cybersecurity ... fuels concerns about unwarranted government snooping into private communication."
Note: For lots more on government and corporate threats to privacy, click here and here.
Perhaps we protest too much. Torture, after all, is a venerable American tradition. If not quite as homespun as apple pie or lynching, it is at least as old as our imperial aspirations. We were waterboarding captives in one of our earliest wars of occupation, the Philippine-American War, which cost as many as 1 million civilian lives. In 1902, Teddy Roosevelt himself wrote with laconic praise of "the old Filipino method." Other techniques, crude or sophisticated, have filled the war bag since. CIA interrogation manuals from the 1960s, which lay out the basic stress-position and sleep- and sensory-deprivation techniques later applied at Bagram and Guantanamo, have been public since 1997. Despite our protestations, we have little to be surprised about. Now, when President Obama vows that "the United States does not torture" and spars with the former vice president over details, he crosses his fingers behind his back and saves himself a loophole. Via "extraordinary rendition" -- a Clinton administration innovation -- our government is still free to outsource torture and claim it doesn't know. The Obama administration has been relying increasingly on foreign intelligence services to detain and interrogate our suspects for us. Despite hundreds of front-page stories, we pretend we didn't know, that it was all somehow kept secret from us. This blindness serves a function. By declaring torture anomalous, by pushing it once again to the margins of legality, we can preserve a vision of U.S. military power -- and of American empire -- that is essentially benevolent. [But] maintaining military and economic hegemony over the planet remains an inherently bloody affair. Empire is a synonym for subjugation, and hence for violence on a massive scale.
Note: For a retired Marine Corps general's understanding of the real reasons behind both torture and mass slaughter of civilian populations by the US military, click here.
Everyone called the stranger with all the money "Maqsood." He would sit in his Mercedes, waiting in the parking lot of the mosque in Newburgh, N.Y., until the Friday prayer was over. Then, according to members of the mosque, the Masjid al-Ikhlas, he approached the young men. The man, a Pakistani, occasionally approached the assistant imam of the mosque. In time, many of the mosque's older members had made the man for a government informant, according to mosque leaders. They said that he seemed to focus most of his attention on younger black members and visitors. "It's easy to influence someone with the dollar," said Mr. Muhammed, a longtime member of the mosque. "Especially these guys coming out of prison." The members of the mosque now believe that Maqsood was the government informant at the center of the case involving four men from Newburgh arrested and charged this week with having plotted to explode bombs at Jewish centers in New York City. The government case revolves significantly around the work of an informant who facilitated the men's desire to mount a terrorist attack. The role of informants has been a constant in the terror cases made by federal and local authorities since 9/11. And just as constant have been the attempts by lawyers for those charged to portray their clients as dupes, people who would not have committed to do harm without the provocation of the informants. The informant was not identified in court papers unsealed on Wednesday in Manhattan. But according to a person briefed on the case, the informant is Shahed Hussain, the central prosecution witness in a 2004 federal sting focusing on a pizzeria owner and an imam at an Albany mosque.
Note: For lots more on the "war on terror" from reliable sources, click here.
The Federal Bureau of Investigation has incorrectly kept nearly 24,000 people on a terrorist watch list on the basis of outdated or sometimes irrelevant information. By the beginning of 2009, the report said, this consolidated government watch list comprised about 400,000 people, recorded as 1.1 million names and aliases, an exponential growth from the days before the attacks of Sept. 11, 2001. The new report, by the office of the Justice Department’s inspector general, provides the most authoritative statistical account to date of the problems connected with the list. An earlier report by the inspector general, released in March 2008, looked mainly at flaws in the system, without an emphasis on the number of people caught up in it. The list has long been a target of public criticism, particularly after well-publicized errors in which politicians including Senator Edward M. Kennedy and Representative John Lewis showed up on it. People with names similar to actual terrorists have complained that it can take months to be removed from the list, and civil liberties advocates charge that antiwar protesters, Muslim activists and others have been listed for political reasons. One of the biggest problems identified in the report was the use of outdated information, or material unconnected to terrorism, to keep people on the bureau’s own terror watch list, which is incorporated in the consolidated list. The report, examining nearly 69,000 referrals to the F.B.I. list that were either brought or processed by the bureau, found that 35 percent of those people, both Americans and foreigners, remained on the list despite inadequate justification.
Note: For many detailed reports from reliable sources indicating the "war on terror" isn't really what it's claimed to be, click here.
According to current and former government officials, the CIA's secret waterboarding program was designed and assured to be safe by two well-paid psychologists now working out of an unmarked office building in Spokane, Washington. Bruce Jessen and Jim Mitchell, former military officers, together founded Mitchell Jessen and Associates. Both men declined to speak to ABC News citing non-disclosure agreements with the CIA. But sources say Jessen and Mitchell together designed and implemented the CIA's interrogation program. "It's clear that these psychologists had an important role in developing what became the CIA's torture program," said Jameel Jaffer, an attorney with the American Civil Liberties Union. Former U.S. officials say the two men were essentially the architects of the CIA's 10-step interrogation plan that culminated in waterboarding. Associates say the two made good money doing it, boasting of being paid a $1,000 a day by the CIA to oversee the use of the techniques on top al Qaeda suspects at CIA secret sites. Both Mitchell and Jessen were previously involved in the U.S. military program to train pilots how to survive behind enemy lines and resist brutal tactics if captured. But it turns out neither Mitchell nor Jessen had any experience in conducting actual interrogations before the CIA hired them. The new documents show the CIA later came to learn that the two psychologists' waterboarding "expertise" was probably "misrepresented" and thus, there was no reason to believe it was "medically safe" or effective. The waterboarding used on al Qaeda detainees was far more intense than the brief sessions used on U.S. military personnel in the training classes.
Note: For lots more on CIA torture and other recent government attacks on civil liberties, click here.
As a novice CIA case officer in the Middle East, Andrew Warren quickly learned the value of sex in recruiting spies. Colleagues say that he made an early habit of taking informants to strip clubs, and that he later began arranging out-of-town visits to brothels for his best recruits. Often Warren would travel with them, according to two colleagues who worked with him for years. His methods earned him promotions and notoriety over a lengthy career, until Warren, 41, became ensnared in a sex scandal. Two Algerian women have accused the Virginia native of drugging and sexually assaulting them, and, in one instance, videotaping the encounter. The episode -- one of three sex-related scandals to shake the CIA this year -- has drawn harsh questions from Congress about whether the agency adequately polices its far-flung workforce or takes sufficient steps to root out corrupt behavior. Former officers say the cases underscore a perennial challenge: guarding against scandal in a workforce -- the size of which is classified but is generally estimated to be 20,000 -- that prides itself on secrecy and deception. "You have an organization of professional liars," said Tyler Drumheller, who oversaw hundreds of officers as chief of the agency's European division. Experienced field managers are needed, he said, because inevitably "some people will try to take advantage of the system . . . and it's a system that can be taken advantage of." The recent string of embarrassing revelations started with the CIA's former No. 3 officer, Kyle "Dusty" Foggo, who was indicted on corruption charges two years ago.
Note: For in-depth analysis of the continuing revelations of a long history of the CIA's use of sex to control people, click here.
It was 1968, and Frank Rochelle was 20 years old and fresh out of Army boot camp when he saw notices posted around his base in Virginia asking for volunteers to test uniforms and equipment. That might be a good break after the harsh weeks of boot camp, he thought, and signed up. Instead of equipment testing, though, the Onslow county, North Carolina, native found himself in a bizarre, CIA-funded drug testing and mind-control programme, according to a lawsuit that he and five other veterans and Vietnam Veterans of America filed last week. The suit was filed in federal court in San Francisco against the US department of defence and the CIA. The plaintiffs seek to force the government to contact all the subjects of the experiments and give them proper healthcare. In 2003 the US department of veterans affairs released a pamphlet that said nearly 7,000 soldiers had been involved and more than 250 chemicals used on them, including hallucinogens such as LSD and PCP as well as biological and chemical agents. Lasting from 1950 to 1975, the experiments took place at Edgewood Arsenal in Maryland. According to the lawsuit, some of the volunteers were even implanted with electrical devices in an effort to control their behaviour. Rochelle, 60, [said] there were about two dozen volunteers when he was taken to Edgewood. Once there, they were asked to volunteer a second time, for drug testing. They were told that the experiments were harmless.
Note: For a powerful summary of the decades-long mind control experiment program conducted by the CIA and other US government agencies, click here.
I should have felt triumphant when I returned from Iraq in August 2006. Instead, I was worried and exhausted. My mind was consumed with the unfinished business of our mission: fixing the deeply flawed, ineffective and un-American way the U.S. military conducts interrogations in Iraq. I'm still alarmed about that today. I'm not some ivory-tower type; I served for 14 years in the U.S. Air Force, began my career as a Special Operations pilot flying helicopters, saw combat in Bosnia and Kosovo, became an Air Force counterintelligence agent, then volunteered to go to Iraq to work as a senior interrogator. What I saw in Iraq still rattles me -- both because it betrays our traditions and because it just doesn't work. What I soon discovered about our methods astonished me. The Army was still conducting interrogations according to the Guantanamo Bay model: Interrogators were nominally using the methods outlined in the U.S. Army Field Manual, the interrogators' bible, but they were pushing in every way possible to bend the rules -- and often break them.These interrogations were based on fear and control; they often resulted in torture and abuse. I refused to participate in such practices, and a month later, I extended that prohibition to the team of interrogators I was assigned to lead. I personally conducted more than 300 interrogations, and I supervised more than 1,000. The methods my team used are not classified ... but the way we used them was, I like to think, unique. We got to know our enemies, we learned to negotiate with them, and we adapted criminal investigative techniques to our work.
Note: For revealing reports from reliable and verifiable sources on the realities of the Iraq and Afghan wars, click here.
The Federal Bureau of Investigation is struggling to find enough agents and resources to investigate criminal wrongdoing tied to the country’s economic crisis, according to current and former bureau officials. The bureau slashed its criminal investigative work force to expand its national security role after the Sept. 11 attacks, shifting more than 1,800 agents, or nearly one-third of all agents in criminal programs, to terrorism and intelligence duties. The cutbacks have left the bureau seriously exposed in investigating areas like white-collar crime, which has taken on urgent importance in recent weeks because of the nation’s economic woes. So depleted are the ranks of the F.B.I.’s white-collar investigators that executives in the private sector say they have had difficulty attracting the bureau’s attention in cases involving possible frauds of millions of dollars. Since 2004, F.B.I. officials have warned that mortgage fraud posed a looming threat, and the bureau has repeatedly asked the Bush administration for more money to replenish the ranks of agents handling nonterrorism investigations. But each year, the requests have been denied, with no new agents approved for financial crimes, as policy makers focused on counterterrorism. According to previously undisclosed internal F.B.I. data, the cutbacks have been particularly severe in staffing for investigations into white-collar crimes like mortgage fraud, with a loss of 625 agents, or 36 percent of its 2001 levels.
Note: How fortunate for the financial fraudsters that the FBI doesn't have the resources to investigate them! Was it just a coincidence that first the "war on terror" and then the Wall Street bailout both have resulted in trillions of dollars going to a few well-positioned corporations? For more on government corruption from reliable sources, click here.
Bruce Ivins, the Army scientist accused of masterminding the 2001 anthrax attacks, e-mailed himself last year saying he knew who the killer was, according to court documents unsealed Wednesday. "Yes! Yes! Yes!!!!!!! I finally know who mailed the anthrax letters in the fall of 2001. I've pieced it together!" Ivins wrote in the e-mail dated Sept. 7, 2007, according to an FBI affidavit. "I'm not looking forward to everybody getting dragged through the mud, but at least it will all be over," Ivins allegedly wrote. "Finally! I should have it TOTALLY nailed down within the month. I should have been a private eye!!!!" The e-mail did not say who Ivins thought was the anthrax killer. Ivins committed suicide in July as prosecutors prepared to charge him in the mailings that killed five people and sickened 17 others. The e-mail was signed "bruce" and sent from an America Online address by the name of "KingBadger7." Authorities said it was one of at least six e-mail addresses registered to Ivins. The FBI affidavit was included in the final batch of court documents to be released by the government that shows how prosecutors built their case against Ivins. Ivins' lawyer, Paul Kemp, has maintained that Ivins was innocent and has predicted the scientist would have been cleared if the case had gone to trial. It was not unusual for Ivins to e-mail himself, according to the FBI document. "In addition, Ivins has sent at least one other e-mail to himself that details his opinion of who may have been the anthrax mailer," the affidavit states.
Note: Isn't it strange that the man the FBI accused of being the anthrax killer would send himself an e-mail saying he knew who the killer was? For many strange deaths of microbiologists that occurred shortly after the anthrax scare, click here.
Scottish police had information that might have changed the outcome of the Lockerbie bombing trial, a BBC TV programme has learned. The information could have affected the credibility of key evidence, but was not passed to the defence team. Libyan national Abdelbaset ali Mohmed al-Megrahi is serving life for killing 270 people in the 1988 bombing. A prosecution witness had seen a picture linking al-Megrahi to the bombing before he identified him. Al-Megrahi, 56, who maintains he is the victim of a miscarriage of justice, has been granted leave to appeal against his conviction for a second time. Tony Gauci, who picked al-Megrahi out in a line-up, had looked at a magazine photograph of him just four days before he made the identification. BBC TV programme The Conspiracy Files: Lockerbie has now seen documentary evidence that Scottish police knew this was the case. That information should have been passed to the defence, but the disclosure did not take place. There have always been doubts expressed about who was behind the bombing and what was their motivation. In June last year the Scottish Criminal Cases Review Commission (SCCRC), which has been investigating the case, concluded that al-Megrahi could have suffered a miscarriage of justice and recommended that he should be granted a second appeal.
Note: For a revealing documentary showing a major cover-up involving the Lockerbie bombing, click here.
Government lawyers say the ongoing investigation into the Sept. 11 attacks could be compromised if the airline industry is allowed to seek more information from the FBI to defend itself against lawsuits brought by terrorism victims. The government urged a judge to block aviation companies from interviewing five FBI employees who the companies say will help them prove the government withheld key information before the 2001 attacks. The lawyers said it would be impossible to interview the employees without disclosing classified or privileged material that could "cause serious damage to national security and interfere with pending law enforcement proceedings." The largest investigation in FBI history has resulted in 167,000 interviews and more than 155,000 pieces of evidence and involved the pursuit of 500,000 investigative leads, the lawyers wrote. The airlines and aviation companies are defending themselves against lawsuits seeking billions of dollars in damages for injuries, fatalities, property damage and business losses related to the Sept. 11, 2001 attacks. The companies filed separate lawsuits against the CIA and the FBI last August to force terrorism investigators to tell whether the aviation industry was to blame for the Sept. 11 attacks. Meanwhile, lawyers for the victims of the attacks ... recounted in court papers numerous hijackings and attacks aboard planes before Sept. 11 that they said should have put the airline industry on notice that a disastrous attack could occur.
Note: For a two-page overview of many unanswered questions about what really happened on 9/11, click here.
An independent oversight board created to identify intelligence abuses after the CIA scandals of the 1970s did not send any reports to the attorney general of legal violations during the first 5 1/2 years of the Bush administration's counterterrorism effort, the Justice Department has told Congress. The President's Intelligence Oversight Board -- the principal civilian watchdog of the intelligence community -- is obligated under a 26-year-old executive order to tell the attorney general and the president about any intelligence activities it believes "may be unlawful." The board was vacant for the first two years of the Bush administration. The board's mandate is to provide independent oversight, so the absence of such communications has prompted critics to question whether the board was doing its job. "It's now apparent that the IOB was not actively employed in the early part of the administration. And it was a crucial period when its counsel would seem to have been needed the most," said Anthony Harrington, who served as the board's chairman for most of the Clinton administration. Senate Judiciary Committee chairman Patrick J. Leahy (D-Vt.) added: "It is deeply disturbing that this administration seems to spend so much of its energy and resources trying to find ways to ignore any check and balance on its authority and avoid accountability to Congress and the American public."
Long-secret documents released Tuesday provide new details about how the Central Intelligence Agency illegally spied on Americans decades ago. Known inside the agency as the “family jewels,” the 702 pages of documents released Tuesday catalog domestic wiretapping operations, failed assassination plots, mind-control experiments and spying on journalists from the early years of the C.I.A. The papers provide evidence of paranoia and occasional incompetence as the agency began a string of illegal spying operations in the 1960s and 1970s, often to hunt links between Communist governments and the domestic protests that roiled the nation in that period. Yet the long-awaited documents leave out a great deal. Large sections are censored, showing that the C.I.A. still cannot bring itself to expose all the skeletons in its closet. And many activities about overseas operations disclosed years ago by journalists, Congressional investigators and a presidential commission — which led to reforms of the nation’s intelligence agencies — are not detailed in the papers. The 60-year-old agency has been under fire ... by critics [of] the secret prisons and harsh interrogation practices it has adopted since the Sept. 11 attacks. Some intelligence experts suggested ... that the release of the documents was intended to distract from the current controversies. And they and historians expressed disappointment that the documents were so heavily censored. Tom Blanton of the National Security Archive, the research group that filed the Freedom of Information request in 1992 that led to the documents’ becoming public, said he was initially underwhelmed by them because they contained little about the agency’s foreign operations. But Mr. Blanton said what was striking was the scope of the C.I.A’s domestic spying efforts.
Note: The entire body of the CIA's "Family Jewels" documents have been posted online by the National Security Archives, and can be read by clicking here.
Thousands of white-collar criminals across the country are no longer being prosecuted in federal court -- and, in many cases, not at all -- leaving a trail of frustrated victims and potentially billions of dollars in fraud and theft losses. It is the untold story of the Bush administration's massive restructuring of the FBI after the terrorism attacks of 9/11. Five-and-a-half years later, the White House and the Justice Department have failed to replace at least 2,400 agents transferred to counterterrorism squads, leaving far fewer agents on the trail of identity thieves, con artists, hatemongers and other criminals. The hidden cost: a dramatic plunge in FBI investigations and case referrals in many of the crimes that the bureau has traditionally fought, including sophisticated fraud, embezzlement schemes and civil rights violations. In 2005, the bureau brought slightly more than 20,000 cases to federal prosecutors, compared with about 31,000 in 2000 -- a 34 percent drop. White-collar crime investigations by the bureau have plummeted in recent years. In 2005, the FBI sent prosecutors 3,500 cases -- a fraction of the more than 10,000 cases assigned to agents in 2000. Civil rights investigations, which include hate crimes and police abuse, have continued a steady decline since the late 1990s. FBI agents pursued 65 percent fewer cases in 2005 than they did in 2000. Large numbers of FBI agents also were transferred out of violent-crime programs. The gaps created by the Bush administration's war on terrorism are troubling to criminal justice experts, police chiefs -- even many current and former FBI officials and agents.
Note: For an article on how the FBI knowingly allowed innocent people to be sentenced to death, click here.
A judge Friday indicted 26 Americans and five Italians in the abduction of an Egyptian terror suspect on a Milan street in what would be the first criminal trial stemming from the CIA’s extraordinary rendition program. Prosecutors allege that five Italian intelligence officials worked with the Americans to seize Muslim cleric Osama Moustafa Hassan Nasr on Feb. 17, 2003. Nasr was allegedly transferred by vehicle to the Aviano Air Force base near Venice, then by air to the Ramstein Air Base in Germany, and on to Egypt, where his lawyer says he was tortured. Nasr was freed earlier this week by an Egyptian court that found his four years of detention in Egypt “unfounded.” All but one of the Americans have been identified as CIA agents, including the former Milan station chief Robert Seldon Lady and former Rome station chief Jeffrey Castelli. Among the Italians indicted by Judge Caterina Interlandi was the former chief of military intelligence, Nicolo Pollari, and his former deputy, Marco Mancini. The CIA has refused to comment on the case, which has put an uncomfortable spotlight on its operations. Prosecutors are pressing the Italian government to seek the extradition of the Americans. In Italy, defendants can be tried in absentia. Prosecutors elsewhere in Europe are moving ahead with cases aimed at the CIA program. A Munich prosecutor recently issued arrest warrants for 13 people in another alleged CIA-orchestrated kidnapping, that of a German citizen who says he was seized in December 2003 at the Serbian-Macedonia border and flown to Afghanistan.
Note: At long last, the CIA is beginning to be held accountable for flagrantly breaking laws resulting in torture.
The CIA’s former No. 3 official and a defense contractor were charged Tuesday with fraud and other offenses in the corruption investigation that sent former Rep. Randy “Duke” Cunningham to prison. Federal indictments named Kyle “Dusty” Foggo, executive director of the CIA until he resigned in May, and his close friend, San Diego defense contractor Brent Wilkes, both 52, according to two government officials who spoke on condition of anonymity. One of the officials said the grand jury heard claims that Foggo joined Wilkes on trips to Hawaii and Scotland, and was introduced to Wilkes’ employees as early as 2003 as a “future executive” of Wilkes’ company, Wilkes Corp., which allegedly received $12 million in illicit contracts from various government agencies. Cunningham, an eight-term Republican, served on the House Intelligence Committee and on the defense subcommittee of the Appropriations Committee — assignments that made him a key figure in the awarding of Pentagon contracts. Cunningham pleaded guilty in November 2005 to taking $2.4 million in bribes from defense contractors and others, including mortgage payments and a yacht he named “Duke-Stir.” The indictments paint a stunning picture of corruption in Washington. The alleged crimes by Cunningham and defense contractors is, according to the U.S. Attorney in San Diego, "breathtaking in scope." Foggo was named executive director of the CIA in 2004, responsible for running the agency’s day-to-day operations. He retired in May while under investigation by the FBI, the Internal Revenue Service, the Pentagon, the CIA and the U.S. attorney’s office in San Diego.
Note: This is very encouraging news as the once "untouchable" CIA is finally being subject to some of the same laws and justice as the rest of us.
Amid daily revelations about prewar intelligence and a growing scandal surrounding the indictment of the vice president's chief of staff and presidential adviser, Lewis "Scooter" Libby, FRONTLINE goes behind the headlines to investigate the internal war that was waged between the intelligence community and Richard Bruce Cheney, the most powerful vice president in the nation's history. "A lot of what needs to be done here will have to be done quietly, without any discussion, using sources and methods that are available to our intelligence agencies," Cheney told Americans just after 9/11. He warned the public that the government would have to operate on the "dark side." In The Dark Side, airing June 20, 2006, at 9 P.M. on PBS...FRONTLINE tells the story of the vice president's role as the chief architect of the war on terror and his battle with Director of Central Intelligence George Tenet for control of the "dark side." Drawing on more than 40 interviews and thousands of documents, the film provides a step-by-step examination of what happened inside the councils of war. After the attacks on 9/11, Cheney seized the initiative and pushed for expanding presidential power, transforming America's intelligence agencies, and bringing the war on terror to Iraq. In the initial stages of the war on terror, Tenet's CIA was rising to prominence as the lead agency in the Afghanistan war. But when Tenet insisted in his personal meetings with the president that there was no connection between Al Qaeda and Iraq, Cheney and Rumsfeld initiated a secret program to re-examine the evidence and marginalize the agency and Tenet.
Russell Tice, a longtime insider at the National Security Agency, is now a whistleblower the agency would like to keep quiet. For 20 years, Tice worked in the shadows. "I specialized in what's called special access programs," Tice said of his job. "We called them 'black world' programs and operations." Some of those secret "black world" operations run by the NSA were operated in ways that he believes violated the law. He is prepared to tell Congress all he knows. Tice says the technology exists to track and sort through every domestic and international phone call...and to search for key words or phrases that a terrorist might use. Tice...says the number of Americans subject to eavesdropping by the NSA could be in the millions if the full range of secret NSA programs is used. "For most Americans [who] placed an overseas communication, more than likely they were sucked into that vacuum." He told ABC News that he was a source for the [New York] Times. But Tice maintains that his conscience is clear. "We need to clean up the intelligence community. We've had abuses, and they need to be addressed." The NSA revoked Tice's security clearance in May of last year based on what it called psychological concerns and later dismissed him. Tice calls that bunk and says that's the way the NSA deals with troublemakers and whistleblowers.
In a clumsy effort to sabotage Iran's nuclear program, the CIA in 2004 intentionally handed Tehran some top-secret bomb designs laced with a hidden flaw that U.S. officials hoped would doom any weapon made from them. But the Iranians were tipped to the scheme by the Russian defector hired by the CIA to deliver the plans and may have gleaned scientific information useful for designing a bomb, writes New York Times reporter James Risen in "State of War." Two nuclear weapons experts...added that a deliberate flaw in the plans could have been easily found by the Iranians. The New York Times delayed for a year publication of its article on the NSA's domestic spying, in part because of personal requests from the president. Critics have questioned whether the paper could have published the information before last year's presidential election if it had decided against a delay. Newspaper officials have refused to comment on reasons for the delay or on the exact timing. Top New York Times officials also refused to publish a news article about the reported CIA plot to give intentionally flawed nuclear plans to Iran, according to a person briefed on the newspaper's conversations by one of the participants. That person said the New York Times withheld publication at the request of the White House and former CIA Director George J. Tenet.
Former CIA chief Stansfield Turner lashed out at Dick Cheney on Thursday, calling him a "vice president for torture" that is out of touch with the American people. Turner's condemnation...comes amid an effort by Sen. John McCain, R-Arizona, to pass legislation forbidding any U.S. authority from torturing a prisoner. McCain was tortured as a Vietnam prisoner of war. Cheney has lobbied against the legislation, prompting Turner to say he's "embarrassed that the United State[s] has a vice president for torture. I think it is just reprehensible." Turner...scoffed at assertions that challenging the administration's strategy aided the terrorists' propaganda efforts. "It's the vice president who is out there advocating torture. He's the one who has made himself the vice president in favor of torture," said Turner, who from 1972 to 1974 was president of the Naval War College, a think tank for strategic and national security policy. "We military people don't want future military people who are taken prisoner by other countries to be subjected to torture in the name of doing just what the United States does," he said.
Declassified US government documents show that a man suspected of involvement in the bombing of a Cuban passenger plane worked for the CIA. Luis Posada Carriles, a Cuban-born Venezuelan and anti-Castro dissident, was an agent and informer. The papers also reveal that an FBI informer "all but admitted" that Mr Posada was one of those behind the 1976 bombing that killed 73 people. Mr Posada, who denies any involvement, is said to be seeking asylum in the US. His lawyer says his client, thought to be in hiding in the Miami area, deserves US protection because of his long years of service to the country. The documents, released by George Washington University's National Security Archive, show that Mr Posada, now in his 70s, was on the CIA payroll from the 1960s until mid-1976. Mr Posada once boasted of being responsible for a series of bomb attacks on Havana tourist spots in the 1990s.
Note: Why did the U.S. media fail to pick up this astounding story?
A Chicago FBI agent who has complained to the media and Congress that the bureau bungled terrorism investigations had been targeted for firing by supervisors who vowed to "take him out," according to a memo written by a former high-ranking official in the FBI's disciplinary office. The FBI opened an internal investigation against Agent Robert G. Wright Jr. in 2003 just days after his appearance at a news conference and on a national television news program, according to the memo obtained by the Tribune. The top two agents in the FBI's disciplinary office at the time, Robert J. Jordan and J.P. "Jody" Weis, ordered an investigation into Wright for insubordination and had already made up their minds to have him fired, according to the memo. The memo, written by John Roberts when he was third in command of the Office of Professional Responsibility, questioned how often supervisors misused the disciplinary process to silence employees critical of the FBI. His lawyer, Stephen Kohn, said the memo's point is clear. "The FBI uses its Office of Professional Responsibility to retaliate against whistleblowers," Kohn said. The memo, written while Roberts still worked as unit chief for the office, was heavily censored by the bureau before it was turned over to the Judiciary Committee. Since the Sept. 11 terrorist attacks, Wright has held two national news conferences and has given several television news interviews in which he accused the FBI of mishandling terrorism investigations during the 1990s into fundraising by militant Islamic groups such as Hamas.
Note: For key reports from major media sources on the realities behind the surface activities of powerful intelligence agencies, click here.
A Montreal woman who underwent intense electroshock treatment in a program funded by the CIA 50 years ago has been awarded $100,000. Gail Kastner was given massive electroshock therapy to treat depression in 1953 at the Allan Memorial Institute in Montreal. She was left out of a federal compensation package in 1994 because her treatment was deemed to have been less intense than that of other victims of the experiments. Her treatment was also found to have had fewer long-term effects. A Federal Court judge reversed that ruling, and awarded her the same amount Ottawa gave to 77 others as compensation for their treatment. Dr. Ewan Cameron, who was director of the Allan Memorial Institute, conducted experiments using electroshock and drug-induced sleep. The research was funded from 1950 to 1965 by the CIA and by the Canadian government.
Note: Did you know that 78 people received awards of $100,000 each for having been subjected to CIA and government-funded experiments in controlling the mind? There is much more to this story. Don't miss our very well documented two-page summary on this little-known topic: click here.
American citizens working for al Qaeda overseas can legally be targeted and killed by the CIA under President Bush's rules for the war on terrorism. The authority to kill U.S. citizens is granted under a secret finding signed by the president after the Sept. 11 attacks. The CIA already has killed one American under this authority, although U.S. officials maintain he wasn't the target. On Nov. 3, a CIA-operated Predator drone fired a missile that destroyed a carload of suspected al Qaeda operatives in Yemen. The target of the attack ... was the top al Qaeda operative in that country. But the CIA didn't know a U.S. citizen, Yemeni-American Kamal Derwish, was in the car. The Bush administration said the killing of an American in this fashion was legal. The Bush administration and al Qaeda together have defined the entire world as a battlefield — meaning the attack on ... Derwish was tantamount to an air strike in a combat zone. According to CBS Legal Analyst Andrew Cohen, this is legal because the President and his lawyers say so. "I can assure you that no constitutional questions are raised here. There are authorities that the president can give to officials," said Condoleezza Rice. Previously, the government's authority to kill a citizen outside of the judicial process has been generally restricted to when the American is directly threatening the lives of other Americans or their allies. The CIA declines comment on covert actions and the authorities it operates under. Scott L. Silliman, director of Duke University's Center on Law, Ethics and National Securit [asks], "could you put a Hellfire missile into a car in Washington, D.C., under the same theory? The answer is yes, you could."
President Bush was expected to sign detailed plans for a worldwide war against al-Qaida two days before Sept. 11 but did not have the chance before the terrorist attacks in New York and Washington, U.S. and foreign sources told NBC News. The document, a formal National Security Presidential Directive, amounted to a “game plan to remove al-Qaida from the face of the earth,” one of the sources told NBC News’ Jim Miklaszewski. In many respects, the directive ... outlined essentially the same war plan that the White House, the CIA and the Pentagon put into action after the Sept. 11 attacks. Officials did not believe that Bush had had the opportunity to closely review the document in the two days between its submission and the Sept. 11 attacks. But it had been submitted to national security adviser Condoleezza Rice, and the officials said Bush knew about it and had been expected to sign it. The couching of the plans as a formal security directive is significant, Miklaszewski reported, because it indicates that the United States intended a full-scale assault on al-Qaida even if the Sept. 11 attacks had not occurred.
Note: Why was this kept secret? Why is it still being kept secret?
Brice Taylor used to be your typical soccer mom, with a successful husband, three kids, and a beautiful home. That is, until she started telling of [her] secret double life as a mind-controlled sex slave for the CIA. Now, this onetime suburban housewife finds herself the unlikely leading lady in a real-life psychosexual spy thriller costarring a former Los Angeles FBI chief. [Former FBI chief Ted Gunderson]: "Brice Taylor is absolutely telling the truth. I would stake my name and reputation of 50 years on it." Taylor says [she was lent] out to such luminaries as Henry Kissinger and every president after Eisenhower except for Carter and the elder Bush, whom Taylor calls a pedophile, accusing him of sleeping with her young daughter. Brice says it turned her into a mindless "Stepford" wife, a programmed sex toy who could be triggered into action by the CIA with subliminal messages embedded in her brain. Taylor: "I was a human robot, who had no ability to think or question on my own. I could only follow commands." We contacted three Los Angeles psychotherapists who treated Brice, but all of them refused to discuss her case, even with her permission. Pam Monday believes that's because they've already been threatened by the CIA. Brice Taylor wrote about her alleged life as a CIA sex slave in vivid detail in a new book out called Thanks for the Memories: The Truth Has Set Me Free!.
Note: For more on mind control operations carried out by government agencies, see the deeply revealing reports from reliable major media sources available here. For our Mind Control Information Center filled with verifiable information on secret government mind control programs, click here.
Standing on the shores of the East End, you can see across the water to some of Long Island's greatest treasures, tantalizingly close yet forbiddingly inaccessible. They are off limits to the public. A mystique ... envelops the islands, and it is well earned. These islands -- Gardiners, Great Gull, Little Gull, Plum and Robins -- have been the setting of some of Long Island's most exciting historical chapters. Captain Kidd buried pirate treasure there. One Island woman was tried for witchcraft decades before Salem's trials. Another was so beautiful that she dazzled Washington society [and] married the President. And during the cold war, one island was used for secret research for a germ warfare attack on the Soviet Union. Plum Island ... is strictly controlled and it has the tightest security of all the islands. Unlike the secret germ warfare project in the 1950's, the first Federal project on Plum Island was quite open and ordinary. In 1826, the Government belatedly bought 3 of its 800 acres for a lighthouse. About the time of the Spanish-American War, the Government bought the rest of Plum and built Fort Terry as the headquarters for artillery batteries at Montauk. Federal officials ... converted the site to the Animal Disease Center in 1954. Since 1929, the country's only outbreak of the dreaded foot-and-mouth disease was in 1978, when it spread to animals outside the laboratory buildings. For decades, officials denied rumors of biological warfare experiments. But in 1993, Newsday unearthed previously classified documents on plans to disrupt the Soviet economy by spreading diseases to kill its pigs, cattle and horses.
Note: At the northernmost tip of Long Island, Plum island sits directly across from the town of Lyme, Conn., famous as the epicenter of the Lyme disease outbreak. This is one of many pieces of evidence suggesting that Lyme disease escaped from government labs there, as described in the book Lab 257: The Disturbing Story of the Government's Secret Germ Laboratory.
The F.B.I. agreed today to pay a settlement of more than $1.16 million to the agent who brought about an overhaul of its crime laboratory. The agent, Frederic Whitehurst, who is a chemist, returned to work from a yearlong suspension today and then voluntarily resigned as required by the deal to settle part of his lawsuit against the bureau. In the 16-page settlement, a copy of which was obtained by The Associated Press, the Federal Bureau of Investigation agreed to pay $1.166 million now to buy annuities that would pay the 50-year-old agent annual amounts equal to the salary and pension he would have earned had he kept working until the normal F.B.I. retirement age of 57. Under terms of the settlement, the bureau will also pay $258,580 in legal fees to Dr. Whitehurst's lawyers, and the Justice Department will drop all consideration of disciplinary action against him. For 10 years as the laboratory supervisor and once the bureau's top bomb residue expert, Dr. Whitehurst complained mostly in vain about laboratory practices. But his efforts finally led last April to a scathing 500-page study of the laboratory by the Justice Department's inspector general, Michael Bromwich. Mr. Bromwich sharply criticized the laboratory for flawed scientific work and inaccurate, pro-prosecution testimony in major cases, including the Oklahoma City and World Trade Center bombings. Mr. Bromwich recommended major changes and discipline for five agents.
Note: Yahoo! News posted a great article with advice to whistleblowers at this link.
Despite the essential role whistleblowers play in illuminating the truth and protecting the public interest, several myths persist about them. The overwhelming majority of employees who see problems want to blow the whistle internally first. Understanding this can - and should - encourage employers to respond appropriately when workers report problems. Similarly, employees who understand that they are in fact whistleblowers when they raise concerns inside the workplace will be better prepared to navigate their rights, risks and options. While many employees who witness wrongdoing in the workplace stay silent, fearing reprisal or futility, those who do raise concerns ... demonstrate faith that their employers are committed to compliance and that they can make a difference. Whistleblowers who report externally typically do so because the problem is significant and their employers have failed to address it or engaged in reprisal (or both). Snowden’s revelations about the NSA’s unconstitutional mass collection of telephone metadata, and Reality Winner’s disclosures about Russian efforts to hack state elections as the Trump campaign was denying Russian involvement, clearly meet this standard of significance. While reporters may use the term “leak” to describe information received from anonymous insiders, the failure to distinguish between leaking and anonymous whistleblowing risks undermining the legitimacy and importance of disclosures that clearly advance the public’s interest.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Heavily armed men burst into the home in the middle of night, hustling four brothers into separate rooms. Afghan special forces then shot them in the head and heart. The operation, the CIA-trained Afghan unit said, targeted the Islamic State group's militants in a remote region of eastern Nangarhar Province. In reality, the raid took place in the province's capital of Jalalabad. The truth of their deaths was eventually revealed by local and international media and the country's intelligence chief, Masoom Stanikzai, was forced to resign. But that's not enough, says Human Rights Watch in a new report released Thursday documenting what it says are mounting atrocities by U.S.-backed Afghan special forces and rising civilian deaths by both American and Afghan forces. It calls for an investigation into whether the U.S. has committed war crimes in Afghanistan. The report says U.S.-led peace talks to end the 18-year-old war have omitted addressing the future of the Afghan special forces that work "as part of the covert operations of the Central Intelligence Agency." The report suggests either disbanding them or bringing them under the control of the Defense Ministry. "These troops include Afghan strike forces who have been responsible for extrajudicial executions and enforced disappearances, indiscriminate airstrikes, attacks on medical facilities, and other violations of international humanitarian law, or the laws of war," it says.
Note: For more along these lines, see concise summaries of deeply revealing news articles on war and intelligence agency corruption from reliable major media sources.
Newly released documents show that another government agency, as well as the Australian Federal Police, was involved in the investigation that led to the raid on the ABC in June. The documents, obtained under Freedom of Information, reveal that the AFP refused to release certain documents relating to the June 6 raid because it said they related to an agency of the Federal Government which is exempt from FOI. Under the section cited by the AFP to justify not releasing the material - subsection 7(1) of the FOI Act - agencies which have complete exemption include the Australian Security Intelligence Organisation (ASIO), the Australian Signals Directorate (ASD) and the Australian Secret Intelligence Service (ASIS). The raid on the ABC's Ultimo headquarters was related to the Afghan Files, a series of stories, published in 2017, which detailed incidents where Australian soldiers in Afghanistan killed unarmed men and children. [South Australian senator Rex] Patrick said ... he believed that the other agency was either ASIO or the Australian Signals Directorate. The primary role of the Australian Signals Directorate is to eavesdrop on conversations and monitor the communications of people of interest outside Australia. The story which prompted one of the raids - on News Corp journalist Annika Smethurst - was about the push by some within the Federal Government to give ASD power to monitor the communications of Australians in Australia, which is currently prohibited by law.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable major media sources.
In a combative exchange at a hearing Friday in Washington, D.C., a federal judge unabashedly accused career State Department officials of lying and signing "clearly false" affidavits to derail a series of lawsuits seeking information about former Secretary of State Hillary Clinton's private email server and her handling of the 2012 terrorist attack on the U.S. Consulate in Benghazi, Libya. U.S. District Court Judge Royce Lamberth also said he was "shocked" and "dumbfounded" when he learned that FBI had granted immunity to former Clinton chief of staff Cheryl Mills during its investigation into the use of Clinton's server, according to a court transcript. The Department of Justice's Inspector General (IG), Michael Horowitz, noted ... in June that it was "inconsistent with typical investigative strategy" for the FBI to allow Mills to sit in during the agency's interview of Clinton during the email probe, given that classified information traveled through Mills' personal email account. "[T]here are serious potential ramifications when one witness attends another witness' interview," the IG wrote. The transparency group Judicial Watch initially sued the State Department in 2014, seeking information about the response to the Benghazi attack after the government didn't respond to a Freedom of Information Act (FOIA) request. Parallel lawsuits ... are probing issues like Clinton's server, whose existence was revealed during the course of the litigation.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
A major U.S. telecommunications company discovered manipulated hardware from Super Micro Computer Inc. in its network and removed it in August, fresh evidence of tampering in China of critical technology components bound for the U.S., according to a security expert working for the telecom company. The security expert, Yossi Appleboum, provided ... evidence of the discovery following the publication of an investigative report in Bloomberg Businessweek that detailed how China’s intelligence services had ordered subcontractors to plant malicious chips in Supermicro server motherboards over a two-year period ending in 2015. [Appleboum’s company] was hired to scan several large data centers belonging to the telecommunications company. Unusual communications from a Supermicro server and a subsequent physical inspection revealed an implant built into the server’s Ethernet connector. The executive said he has seen similar manipulations of different vendors' computer hardware made by contractors in China, not just products from Supermicro. “Supermicro is a victim - so is everyone else,” he said. There are countless points in the supply chain in China where manipulations can be introduced, and deducing them can in many cases be impossible. The manipulation of the Ethernet connector appeared to be similar to a method also used by the U.S. National Security Agency, details of which were leaked in 2013.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Thousands of new documents from Project MKUltra, the Central Intelligence Agency’s mid-century mind control program, will soon be released. The new records include 4,358 undisclosed pages regarding MKUltra’s “behavior modification” efforts. John Greenewald, founder of The Black Vault, a site specializing in declassified government records obtained via Freedom of Information Act (FOIA) requests, first uploaded MKUltra documents in 2004 - tens of thousands of pages, spread over four CD-ROMs. Still, the trove of MKUltra material available on The Black Vault represent only a small fraction of the material from the sprawling, multi-decade program, with the majority lost to history after CIA Director Richard Helms ordered all MKUltra files destroyed in 1973. This makes the new documents crucial to expanding our narrow perspective on the CIA’s actions from the operation’s beginnings in 1953 through the cover-up twenty years later. Project MKUltra was an illegal program of human experimentation undertaken by the CIA to discover methods, both pharmacological and psychological, for controlling the human mind. More than 80 colleges, prisons, pharma companies and hospitals collaborated in the program, including renowned psychiatrist Donald Ewen Cameron, who served president of the American Psychiatric Association and the World Psychiatric Association. The existence of the previously unknown MKUltra pages was discovered in 2016, when a Black Vault user, Oscar Diggs, discovered irregularities in the collection the CIA disclosed to Greenewald.
Note: Read details of the CIA's bizarre efforts to keep these missing documents away from the public on this page. While Black Vault makes the MKUltra archive available for bulk download, you can view individual MKUltra files from this archive on this WantToKnow.info page. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
Four decades ago, [CIA operative Stefan] Halper was responsible for a long-forgotten spying scandal involving the 1980 election. The Reagan campaign – using CIA officials managed by Halper, reportedly under the direction of former CIA Director and then-Vice-Presidential candidate George H.W. Bush – got caught running a spying operation from inside the Carter administration. The plot involved CIA operatives passing classified information about Carter’s foreign policy to Reagan campaign officials. Over the past several weeks, House Republicans have been claiming that the FBI during the 2016 election used an operative to spy on the Trump campaign, and they triggered outrage within the FBI by trying to learn his identity. On May 8, the Washington Post described the informant as “a top-secret intelligence source” and cited DOJ officials as arguing that disclosure of his name “could risk lives by potentially exposing the source, a U.S. citizen who has provided intelligence to the CIA and FBI.” But now ... everyone knows the name of the FBI’s informant: Stefan Halper. So as it turns out, the informant used by the FBI in 2016 to gather information on the Trump campaign was not some previously unknown, top-secret asset whose exposure as an operative could jeopardize lives. Quite the contrary: his decades of work for the CIA – including his role in an obviously unethical if not criminal spying operation during the 1980 presidential campaign – is quite publicly known.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in elections and in the intelligence community.
Alison Steel was only 4˝ years old when her mother's life changed forever. In 1957, Jean Steel was admitted to Montreal's Allan Memorial Institute. In the months that followed, Steel became the victim of CIA-funded brainwashing experiments conducted by Dr. Ewen Cameron. She was kept in a chemically induced sleep for weeks and subjected to rounds of electroshocks, experimental drugs and tape-recorded messages played non-stop. Steel said her mother was never quite the same. Now, 60 years after Cameron's experiments left her mother damaged for life, Alison Steel has finally won a measure of justice for her family. The federal government quietly reached an out-of-court settlement with Steel earlier this year, paying her $100,000 in exchange for dropping the legal action she launched in September 2015. The settlement with Steel is the latest development in the decades-old saga that began with Cameron's experiments at the Allan Memorial Institute in the '50s and '60s. What patients and their families didn't know was that Cameron's experiments were ... being funded by the U.S. Central Intelligence Agency's MK Ultra program. The CIA ... funded mind-control experiments across North America. In 1992, Conservative Justice Minister Kim Campbell decided to compensate dozens of Cameron's former patients. An estimated 70 patients were compensated, but hundreds more who applied were rejected because the government said they hadn't been "de-patterned" enough to warrant compensation.
Note: Read more about the CIA's MK Ultra program. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
Americas love affair with LSD did not begin in Haight-Ashbury or during the summer of love. Instead it was seeded ... in Midwestern laboratories and government offices, where it comprised one strand of an extensive germ warfare programme. Errol Morriss splendidly clammy, mysterious docu-drama Wormwood reopens the file on Frank Olson, a jobbing biochemist who fell to his death from a New York hotel. At the time (December 1953) Olsons death was ruled to be suicide. But 20 years later evidence emerged that complicated the official verdict and prompted Olsons family to sue the federal government. Even today elderly Eric Olson is in search of a definitive answer. He casts himself in the role of a Cold War Hamlet, haunted and harried by his fathers ghost. So what became of luckless Frank Olson? Did he fall or was he pushed? Infuriatingly perhaps fittingly we will have to wait to find out. For Morriss docu-drama is a six-part series, commissioned by Netflix. So were left to blunder on, hands outstretched, past pensive Eric Olson and ... through spooky archive footage of a 1970s congressional hearing where sleazy Colonel Ruwet surely the villain of the piece sits with his back to the camera, meaning that we can only see his starched collar and his bald spot and the hint of a smile when he responds to a question. Who, then, can predict how this investigation turns out?
Note: A 1975 US government report said that Frank Olson committed suicide after being given LSD without his knowledge as part of the CIA's MK-ULTRA program. The lawsuit filed by his sons claimed Olson was killed by the CIA after he "raised concerns about testing chemical and biological weapons on human subjects without their consent". For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Early last month, the C.I.A. director, Mike Pompeo, recommended to President Trump that he shut down a four-year-old effort to arm and train Syrian rebels. The president swiftly ended the program. The rebel army was by then a shell, hollowed out by more than a year of bombing by Russian planes. Critics in Congress had complained for years about the costs - more than $1 billion over the life of the program - and reports that some of the C.I.A.-supplied weapons had ended up in the hands of a rebel group tied to Al Qaeda further sapped political support for the program. President Barack Obama ... agreed to the program in 2013. It soon fell victim to the constantly shifting alliances in Syria’s six-year-old civil war. Once C.I.A.-trained fighters crossed into Syria, C.I.A. officers had difficulty controlling them. The fact that some of their C.I.A. weapons ended up with Nusra Front fighters - and that some of the rebels joined the group - confirmed the fears of many in the Obama administration when the program began. Although the Nusra Front was widely seen as an effective fighting force against [President Bashar al-Assad]’s troops, its Qaeda affiliation made it impossible for the Obama administration to provide direct support for the group. American intelligence officials estimate that the Nusra Front now has as many as 20,000 fighters in Syria, making it Al Qaeda’s largest affiliate. Officials also received ... reports that the C.I.A.-trained rebels had summarily executed prisoners and committed other violations of the rules of armed conflict.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Twice in the past month, National Security Agency cyberweapons stolen from its arsenal have been turned against two very different partners of the United States — Britain and Ukraine. The N.S.A. has [not acknowledged] its role in developing the weapons. White House officials have deflected many questions ... by arguing that the focus should be on the attackers themselves, not the manufacturer of their weapons. The silence is wearing thin for victims of the assaults, as a series of escalating attacks using N.S.A. cyberweapons have hit hospitals, a nuclear site and American businesses. There is growing concern that United States intelligence agencies have rushed to create digital weapons that they cannot keep safe from adversaries or disable once they fall into the wrong hands. On Wednesday, the calls for the agency to address its role in the latest attacks grew louder. Representative Ted Lieu ... who serves on the House Judiciary and Foreign Affairs Committees, urged the N.S.A. to help stop the attacks and to stop hoarding knowledge of the computer vulnerabilities upon which these weapons rely. Brad Smith, the president of Microsoft, said outright that the National Security Agency was the source of the “vulnerabilities” now wreaking havoc. For the American spy agency ... what is unfolding across the world amounts to a digital nightmare. It was as if the Air Force lost some of its most sophisticated missiles and discovered an adversary was launching them against American allies — yet refused to respond, or even to acknowledge that the missiles were built for American use.
Note: It was reported in 2014 that the NSA had developed specialized tools to covertly hack into computers on a mass scale by using automated systems. More recently, a large number of NSA hacking tools were put up for sale online. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
When Bill Binney, former NSA analyst and head of the anti-terror ThinThread metadata program sits in front of you and says he is not afraid of the government, you have to admire him. A wheel-chair-bound U.S. serviceman who rose in the ranks of intelligence to work in top-secret NSA programs, Binney created ThinThread prior to September 11, 2001, and says it mathematically broke down all phone communications anywhere in the world without any infringement on Constitutional rights. The program was self-running. More important, it worked. In "A Good American," the new documentary from executive producer Oliver Stone ... audiences are taken on a tense and frightening ride through Binney and his colleagues' experience developing and deploying ThinThread in tests, only to see its funding pulled just weeks before 9/11 in favor of an expensive and ineffective ... program called Trailblazer. Binney contends that ThinThread would have identified the terrorists who planned and executed the 9/11 terror attacks, thereby preventing them from occurring. When ThinThread's plug was pulled, Binney and his team challenged their NSA bosses, and in the process found themselves at odds with the U.S. government and in a complex web of lies and corruption. Thus, when Binney said he remains unafraid of possible repercussions or retaliation tied to the film's thesis, it's not hard to believe. "What else can they do to me?" he asks. "They've already tried everything to stop me."
Note: Watch a free trailer or rent the whole documentary on this webpage. Read a revealing, detailed New York Times article on Oliver Stone and his profound work to expose corruption and manipulation through film. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
The C.I.A., the F.B.I. and the White House may all agree that Russia was behind the hacking that interfered with the election. But that was of no import to the website Breitbart News, which dismissed reports on the intelligence assessment as “left-wing fake news.” Until now, that term had been widely understood to refer to fabricated news accounts that are meant to spread virally online. But conservative cable and radio personalities ... have appropriated the term and turned it against any news they see as hostile to their agenda. In defining “fake news” so broadly and seeking to dilute its meaning, they are capitalizing on the declining credibility of all purveyors of information. Journalists who work to separate fact from fiction see a dangerous conflation of stories that turn out to be wrong because of a legitimate misunderstanding with those whose clear intention is to deceive. A report, shared more than a million times on social media, that the pope had endorsed Mr. Trump was undeniably false. But was it “fake news” to report on data models that showed Hillary Clinton with overwhelming odds of winning the presidency? Are opinion articles fake if they cherry-pick facts to draw disputable conclusions? “Fake news was a term specifically about people who purposely fabricated stories for clicks and revenue,” said David Mikkelson, the founder of Snopes, the myth-busting website. “Now it includes bad reporting, slanted journalism and outright propaganda. And I think we’re doing a disservice to lump all those things together.”
Note: For more along these lines, see concise summaries of deeply revealing media corruption news articles from reliable sources.
A former contractor for a UK-based public relations firm says that the Pentagon paid more than half a billion dollars for the production and dissemination of fake Al-Qaeda videos that portrayed the insurgent group in a negative light. The PR firm, Bell Pottinger, worked alongside top US military officials at Camp Victory in Baghdad at the height of the Iraq War. The agency was tasked with crafting TV segments in the style of unbiased Arabic news reports, videos of Al-Qaeda bombings that appeared to be filmed by insurgents, and anti-insurgent commercials. Those who watched the videos could be tracked by US forces. Bell Pottinger ... could have earned as much as $120m from the US in 2006. Former video editor Martin Wells, who worked on the IOTF contract with Bell Pottinger, said they were given very specific instructions on how to produce the fake Al-Qaeda propaganda films. US Marines would then take CDs containing the videos while on patrol, then plant them at sites during raids. “If they’re raiding a house and they’re going to make a mess of it looking for stuff anyway, they’d just drop an odd CD there,” he said. The CDs were encoded to open the videos on RealPlayer software that connects to the Internet when it runs. It would issue an IP address that could then be tracked by US intelligence. The programmes produced by Bell Pottinger would move up the chain of command ... and could sometimes go as high up as the White House for approval.
Note: Read more about the fake "Al Qaeda" videos produced and distributed for the Pentagon. For more along these lines, see concise summaries of deeply revealing news articles on military corruption and the manipulation of public perception.
Yahoo has been accused of secretly building a customised software programme to search all of its customers’ incoming emails for specific information provided by US intelligence officials. The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI. Reuters said that a number of surveillance experts said this represented the first case to surface of a US Internet company agreeing to a spy agency’s demand by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time. The agency also said it was unable to determine what data the company had handed over, and if the intelligence officials had approached other email providers besides Yahoo. US phone and Internet companies are known to have handed over bulk customer data to intelligence agencies. But some former government officials and private surveillance experts said they had not previously seen either such a broad directive for real-time Web collection or one that required the creation of a new computer program. “I’ve never seen that, a wiretap in real time on a ‘selector’,” said Albert Gidari, a lawyer who represented phone and Internet companies on surveillance. A selector refers to a type of search term used to zero in on specific information. He added: “It would be really difficult for a provider to do that.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about corporate corruption and the disappearance of privacy.
Secret FBI rules allow agents to obtain journalists’ phone records with approval from two internal officials - far less oversight than under normal judicial procedures. The classified rules ... govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a judge or informing the news organization being targeted. Obtaining a journalist’s records with a national security letter (or NSL) requires the signoff of the FBI’s general counsel and the executive assistant director of the bureau’s National Security Branch. The Obama administration has come under criticism for bringing a record number of leak prosecutions and aggressively targeting journalists in the process. In 2013, after it came out that the Justice Department had secretly seized records from phone lines at the Associated Press and surveilled ... reporter James Rosen, then-Attorney General Eric Holder tightened the rules. The FBI could not label reporters as co-conspirators in order to try to identify their sources - as had happened with Rosen - and it became more difficult to get journalists’ phone records without notifying the news organization first. Yet these changes did not apply to NSLs. Those are governed by a separate set of rules. The FBI issues thousands of NSLs each year, including nearly 13,000 in 2015. Over the years, a series of Inspector General reports found significant problems with their use, yet the FBI is currently pushing to expand the types of information it can demand with an NSL.
Note: The aggressive pursuit of leaks and journalists that report them led BBC to recently ask: "Is the US government at war with whistleblowers?" Read more about the FBI's use of secret National Security Letters. For more along these lines, see concise summaries of deeply revealing news articles on media manipulation and the disappearance of privacy.
Hidden microphones that are part of a clandestine government surveillance program that has been operating around the Bay Area has been exposed. Imagine standing at a bus stop, talking to your friend and having your conversation recorded without you knowing. It happens all the time, and the FBI doesn’t even need a warrant to do it. Jeff Harp, a ... security analyst and former FBI special agent said, “They put microphones under rocks, they put microphones in trees, they plant microphones in equipment. I mean, there’s microphones that are planted in places that people don’t think about, because that’s the intent!” FBI agents hid microphones inside light fixtures and at a bus stop outside the Oakland Courthouse without a warrant to record conversations, between March 2010 and January 2011. Federal authorities are trying to prove real estate investors in San Mateo and Alameda counties are guilty of bid rigging and fraud and used these recordings as evidence. The lawyer for one of the accused real estate investors who will ask the judge to throw out the recordings, told KPIX 5 News that, “Speaking in a public place does not mean that the individual has no reasonable expectation of privacy … private communication in a public place qualifies as a protected ‘oral communication.'”
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
Bechtel - a behemoth among closely held companies - has been the world’s builder, benefiting from vast government contracts for engineering and infrastructure work in difficult places while it nurtured relationships with power brokers in Washington. In The Profiteers, journalist Sally Denton seeks to unravel the history of Bechtel. Her story is one of “how a dynastic line of rulers from the same American family conducts its business” and how its system of networking now pervades US capitalism. Anecdotes of Bohemian Grove, the secretive retreat that became an all-male “summer camp” for US corporate, political and military elites to toast marshmallows, skinny-dip in the river north of San Francisco and dress in drag for skits, elucidate the chummy nature of big business. As of 2014, [Bechtel's] reported revenue was $37bn, with projects and employees in 37 countries. The corporation’s embrace of Saudi Arabia as a lucrative client and its decades-long and contorted experience in Iraq also makes sense of some aspects of US foreign policy - as well as its intelligence-gathering operations. The life and times of John McCone, a former Bechtel executive who later served as CIA director in the US administrations of Presidents Kennedy and Johnson, is chronicled deftly here. It is worth noting: McCone was and is critical to Bechtel’s dominance today. He devised the idea of “cost-plus contracts” for the toughest jobs sought by government. Contractors are guaranteed a profit in such deals.
Note: Bechtel was at the center of a major Iraqi reconstruction scandal in 2007. More recently, major defense contractors have been publicly congratulating themselves for steering US policy towards militarism. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the corporate world.
Survivors of CIA torture have sued the contractor psychologists who designed one of the most infamous programs of the post-9/11 era. In an extraordinary step, psychologists James Mitchell and Bruce Jessen now face a federal lawsuit for their role in convincing the CIA to subject terror suspects to mock drowning, painful bodily contortions, sleep and dietary deprivation and other methods long rejected by much of the world as torture. In practice, CIA torture meant disappearances, mock executions, anal penetration ... and at least one man who froze to death, according to a landmark Senate report last year. On behalf of torture survivors ... as well as a representative of the estate of Gul Rahman – who froze to death in a CIA black site in Afghanistan – the American Civil Liberties Union (ACLU) filed the suit against Mitchell and Jessen on Tuesday in a federal court in Washington state. The suit calls the torture program a “joint criminal enterprise” and a “war crime” in which the CIA, Mitchell and Jessen colluded and from which Mitchell and Jessen financially profited. Although numerous US government investigations have pierced the veneer of secrecy around the torture program, the program’s government architects have faced no legal reprisal. A Justice Department inquiry ended in 2012 without prosecutions. The new lawsuit, aimed not at government officials but the contractors Mitchell and Jessen, aims to break the trend.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
Government papers about the former home secretary Leon Brittan are among a fresh batch of documents which have come to light months after the conclusion of an official review into whether allegations of child abuse were covered up by the Home Office in the 1980s. The documents also reveal that the then director general of MI5 corresponded with the Cabinet Secretary in 1986 about an unnamed MP who was alleged to have “a penchant for small boys”. The letter from Sir Anthony Duff to Sir Robert Armstrong added: “At the present stage ... the risks of political embarrassment to the government is rather greater than the security danger.” “The risk to children is not considered at all,” Peter Wanless, chief executive of the NSPCC, and barrister Richard Whittam, said in a supplement to their review. The papers ... will be passed to an ongoing independent inquiry into child abuse within state and non-state institutions. Previously unreleased files also concern figures including Margaret Thatcher’s parliamentary private secretary, the late Sir Peter Morrison, former diplomat Sir Peter Hayman and former minister Sir William van Straubenzee. The papers also contain material on allegations by a former British army intelligence agent, Colin Wallace, about the Kincora boys’ home in Northern Ireland, which has long been at the centre of abuse claims. The Wanless review, published in November after the investigation of 114 missing Home Office files, could not rule out the possibility of files being destroyed as part of a coverup.
Note: Watch powerful evidence in a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government. For more along these lines, see concise summaries of deeply revealing news articles on sex abuse scandals from reliable major media sources.
Moxie Marlinspike has ... created an encryption program that scrambles messages until they reach the intended reader. The software is effective enough to alarm governments. British Prime Minister David Cameron called protected-messaging apps a “safe space” for terrorists. The following week, President Barack Obama called them “a problem.” In a research paper released Tuesday, 15 prominent technologists cited three programs relying on Mr. Marlinspike’s code as options for shielding communications. His encrypted texting and calling app, Signal, has come up in White House meetings. Former National Security Agency contractor Edward Snowden, who leaked troves of U.S. spying secrets, urged listeners to use “anything” that Mr. Marlinspike releases. That endorsement was “a little bit terrifying,” Mr. Marlinspike says. But he says he sees an opening, following Mr. Snowden’s revelations, to demystify, and simplify, encryption, so more people use it. Consumer encryption tools ... have been around since the early 1990s, but most are so cumbersome that few people use them, [limiting] the use of encryption to a level law enforcement has mostly learned to live with. Adding easy-to-use encryption that companies can’t unscramble to products used by millions changes that calculus. Technology companies, once cozy with Washington, sound increasingly like Mr. Marlinspike. Apple, Facebook, Google and others are resisting efforts to give the government access to encrypted communications.
Note: For more along these lines, see concise summaries of deeply revealing news articles about the corrupt intelligence agencies that are attempting to erode privacy rights in the U.S. and elsewhere.
Edward Snowden is in exile in Moscow. He's still hard at work. Whatever he's working on, the former NSA contractor who exposed controversial US surveillance practices, says it's much tougher than his last gig. "The fact is I was getting paid an extraordinary amount of money for very little work with very little in the way of qualifications. That's changed significantly," Snowden said in an event at Stanford University on Friday, via teleconference from Moscow. Last week, a federal appeals court ruled that the NSA's massive collection of Americans' phone records is illegal — a victory for Snowden, who revealed the existence of the surveillance program in the documents he leaked to the press. Snowden said in the teleconference that he worked with reporters so that there could be a system of checks and balances, and noted that he did not publish a single document himself. Still, he couldn't leak his secrets anonymously to the reporters because his colleagues' livelihoods would have been at risk as well if the NSA conducted a witch-hunt, Snowden said. "Whistleblowers are elected by circumstance. Nobody self nominates to be a whistleblower because it’s so painful," Snowden said, [and] emphasized that he doesn't see himself as a hero or a traitor, but he had just reached the tipping point where he needed to do something.
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of privacy rights from reliable major media sources.
About once a month, staff members of the congressional intelligence committees drive across the Potomac River to C.I.A. headquarters in Langley, Va., and watch ... footage of drone strikes. The screenings have provided a veneer of congressional oversight. The C.I.A.’s killing missions are ... unlikely to change significantly despite President Obama’s announcement on Thursday that a drone strike accidentally killed two innocent hostages, an American and an Italian. Michael D’Andrea ... was chief of operations during the birth of the agency’s detention and interrogation program and then, as head of the C.I.A. Counterterrorism Center, became an architect of the targeted killing program. He presided over the growth of C.I.A. drone operations and hundreds of strikes. Mr. D’Andrea was a forceful advocate for the drone program. He was particularly effective in winning the support of Senator Dianne Feinstein, the California Democrat who was chairwoman of the Senate Intelligence Committee until January. The confidence Ms. Feinstein and other Democrats express about the drone program ... stands in sharp contrast to the criticism among lawmakers of the now defunct C.I.A. program to capture and interrogate Qaeda suspects in secret prisons. When Ms. Feinstein was asked in a meeting with reporters in 2013 why she was so sure she was getting the truth about the drone program while she accused the C.I.A. of lying to her about torture, she seemed surprised. “That’s a good question, actually.”
Note: The CIA has been aware that drone strikes are ineffective since at least 2009. If drones help terrorists, almost always miss their intended targets, and may be used to target people in the US in the future, what are the real reasons for the US government's drone program?
The idea was once considered fringe — to purposely re-engineer the planet's climate as a last ditch effort to battle global warming with an artificial cloud. No longer. In a nuanced, two-volume report, the National Academy of Sciences said that the concept should not be acted upon immediately because it is too risky, but it should be studied and perhaps tested outdoors in small projects. Because warming has worsened and some countries might act unilaterally, scientists said research is needed to calculate the consequences. Panel chairwoman Marcia McNutt, editor of the journal Science and former director of the U.S. Geological Survey, said in an interview that the public should read this report "and say, 'This is downright scary.' And they should say, 'If this is our Hail Mary, what a scary, scary place we are in.'" The committee scientists said once you start this type of tinkering, it would be difficult to stop. A decision to spray particles into the air would have to continue for more than 1,000 years. The report was requested by U.S. intelligence agencies, academy president Ralph J. Ciccerone said. Because the world is not reducing the emissions of greenhouse gases that cause global warming, scientists have been forced "to at least consider what is known as geoengineering," he said.
Note: The National Academy of Science's two-part report says that geoengineering technologies "present serious known and possible unknown environmental, social, and political risks, including the possibility of being deployed unilaterally." The US military has used the weather as a weapon in the past. Now, with a deeply corrupt scientific establishment being guided by corrupt intelligence agencies to meddle with the planet's total ecology, and with low public awareness about the messy history of mysterious atmospheric experiments over cities in the U.S. and elsewhere, what could possibly go wrong?
The outrageous whitewash issued Wednesday by the CIA panel John Brennan hand-picked to lead the investigation into his agency's spying on Senate staffers is being taken seriously by the elite Washington media, which is solemnly reporting that officials have been "cleared" of any "wrongdoing". The panel's report is just the latest element in a long string of cover-ups and deceptions orchestrated by Brennan. At issue, of course, is the same intrusion into Senate computers that Brennan initially tried to make people think was a figment of then-Senate Intelligence Committee Chair Dianne Feinstein's warped imagination. "Nothing could be further from the truth," Brennan said when confronted with Feinstein's allegations. Senator Ron Wyden ... issued a statement in response to the newly released documents: "First, agency officers and contractors went far beyond the limits set out even in the Justice Department's torture memos. Then, top officials spent a decade making inaccurate statements about torture's effectiveness to Congress, the White House and the American people. Next, instead of acknowledging these years of misrepresentations, the CIA's current leadership decided to double down on denial. And when CIA officials were worried that the Intelligence Committee had found a document that contradicted their claims, they secretly searched Senate computer files to find out if Senate investigators had obtained it." The panel's report can also be seen as Brennan's total assault on David B. Buckley, the CIA inspector general who wrote the first, highly critical report on the incident – and who suddenly resigned a few days ago.
Note: For more along these lines, see concise summaries of deeply revealing news articles about the manipulation of mass media and the routine dishonesty of intelligence agencies from reliable sources.
Sen. Dianne Feinstein’s last act as chair of the Senate Intelligence Committee ... had Washington’s most powerful forces arrayed against her. At the end ... Feinstein said she was more determined than ever to release the summary of a 6,700-page report on the CIA’s use of torture after the terrorist attacks of Sept. 11, 2001. “She has been vilified, the committee was spied on, the CIA and its supporters ran what amounted to a domestic disinformation campaign against the report and the committee,” said Stephen Rickard, executive director of the Open Society Policy Center, a civil liberties and human rights group in Washington. “She did her job.” Her job was to provide congressional oversight of an executive branch agency, and she met prolonged and intense resistance. Feinstein called the report “the most significant and comprehensive oversight report in the committee’s history, and perhaps in that of the U.S. Senate.” The Senate panel examined nearly 6.3 million pages of documents, without Republican cooperation and against the resistance of the CIA, which went so far as to hack Intelligence Committee computers and threaten to bring criminal charges against the staff. Although President Obama insisted he wanted the report made public, administration officials reportedly pressed for redactions that Senate Democrats said would make the report meaningless.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
In June 2011, (WikiLeaks’ founder) Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt. The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas. Cohen had moved to Google from the U.S. State Department. Schmidt arrived first, accompanied by his then partner, Lisa Shields ... a vice president of the Council on Foreign Relations. Two months later, WikiLeaks’ release of State Department cables was coming to an abrupt end. Two years later, in the wake of his early 2013 visits to China, North Korea and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, “back-channel diplomacy” for Washington. In 1999 ... Schmidt joined the New America Foundation. The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place hundreds of articles and op-eds per year. In 2003, the U.S. National Security Agency (NSA) had already started systematically violating the Foreign Intelligence Surveillance Act (FISA). During the same period, Google ... was accepting NSA money to the tune of $2 million to provide the agency with search tools. In 2012, Google arrived on the list of top-spending Washington, D.C., lobbyists. Whether it is being just a company or “more than just a company,” Google’s geopolitical aspirations are firmly enmeshed within the foreign-policy agenda of the world’s largest superpower.
Note: Read the complete Newsweek article summarized above for Julian Assange's detailed accounting of the connections between Washington D.C. insiders, Google and related technology companies, intelligence agencies, and civil society organizations. For more about Wikileaks, read this news article summary. For more on the geopolitical big picture, see these concise summaries of deeply revealing news articles from reliable major media sources.
The mysterious workings of a Pentagon office that oversees clandestine operations are unraveling in federal court, where a criminal investigation has exposed a secret weapons program ... to manufacture an untraceable batch of automatic-rifle silencers. The silencers — 349 of them — were ordered by a little-known Navy intelligence office at the Pentagon known as the Directorate for Plans, Policy, Oversight and Integration. The directorate is composed of fewer than 10 civilian employees, most of them retired military personnel. Court records filed by prosecutors allege that the Navy paid the auto mechanic — the brother of the directorate’s boss — $1.6 million for the silencers, even though they cost only $10,000 in parts and labor to manufacture. If the foreign-made weapons were equipped with unmarked silencers, the source said, the weapons could have been used by U.S. or foreign forces for special operations in other countries without any risk that they would be traced back to the United States. No documentation has surfaced in court to indicate that Navy officials formally signed off on the silencer project, although many pretrial motions have been filed under seal. Hall, the directorate official charged with illegally purchasing the silencers, has asserted that he received verbal approval for the secret program from Robert C. Martinage, a former acting undersecretary of the Navy, according to statements made during pretrial hearings. Martinage was forced to resign in January after investigators looking into the silencer deal found evidence that he had engaged in personal misconduct ... unrelated to the silencer contract.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations. Snowden said professionals were failing in their obligations to their clients, sources, patients and parishioners in what he described as a new and challenging world. "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe. Any communications should be encrypted by default," he said. Snowden's plea for the professions to tighten security came during an extensive and revealing interview with the Guardian in Moscow. During the seven hours of interview, Snowden: • Said if he ended up in US detention in Guantánamo Bay he could live with it. • Does not have any regrets. • Said that ... he was independently secure, living on savings, and money from awards and speeches he has delivered online round the world. • Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in "sexually compromising" situations are routinely passed around. He works online late into the night; a solitary, digital existence not that dissimilar to his earlier life. He said he was using part of that time to work on the new focus for his technical skills, designing encryption tools to help professionals such as journalists protect sources and data. He is negotiating foundation funding for the project, a contribution to addressing the problem of professions wanting to protect client or patient data, and in this case journalistic sources.
Note: Read the transcript of the Guardian's new interview of Edward Snowden. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
On the Today show and CBS, [Sec. of State John Kerry] said [Edward] Snowden "should man up and come back to the United States" to face charges. But John Kerry is wrong. As Snowden told Brian Williams on NBC later that night, ... he would have no chance whatsoever to come home and make his case – in public or in court. Snowden would come back home to a jail cell – and not just an ordinary cell-block but isolation in solitary confinement, ... probably [for] the rest of his life. The current state of whistleblowing prosecutions under the Espionage Act makes a truly fair trial wholly unavailable to an American who has exposed classified wrongdoing. The other NSA whistleblower prosecuted, Thomas Drake, was barred from uttering the words "whistleblowing" and "overclassification" in his trial. In the recent case of the State Department contractor Stephen Kim, the presiding judge ruled the prosecution "need not show that the information he allegedly leaked could damage US national security or benefit a foreign power, even potentially." Without reform to the Espionage Act that lets a court hear a public interest defense – or a challenge to the appropriateness of government secrecy in each particular case – Snowden and future Snowdens can and will only be able to "make their case" from outside the United States. Snowden acted in full knowledge of the constitutionally questionable efforts of the Obama administration, in particular, to use the Espionage Act in a way it was never intended by Congress: as the equivalent of a British-type Official Secrets Act criminalizing any and all unauthorized release of classified information.
Note: or more on the Snowden case, see the deeply revealing reports from reliable major media sources available here.
Three years after the CIA used an immunization survey as a cover in its hunt for Osama bin Laden, the White House has promised that the agency will never again use a vaccination campaign in its operations. Responding to a letter from the deans of 12 U.S. public health schools, Lisa Monaco, the assistant to the president for homeland security and counterterrorism, informed them last week that the CIA will no longer conduct such campaigns, White House spokeswoman Caitlin Hayden said. The deans wrote to President Obama in January 2013 to protest the precedent set when the CIA used Shakil Afridi, a Pakistani surgeon, to seek information ... under the guise of conducting a hepatitis immunization survey. “This disguising of an intelligence-gathering effort as a humanitarian public health service has resulted in serious collateral consequences that affect the public health community,” the deans wrote. International aid organizations were forced to move some of their staff members out of Pakistan, and some health workers were killed in a backlash against a polio vaccination effort. Attacks have continued sporadically. Last year, 83 new polio cases were reported in Pakistan, more than in Afghanistan or Nigeria, the other countries where it is endemic.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Former National Security Agency contractor Edward Snowden, and one of the reporters who first broke the news of Snowden's documents, Laura Poitras, received a Ridenhour Truth-Teller prize [on April 30] to a standing ovation at the National Press Club. Snowden leaked classified documents that exposed the NSA's massive global surveillance programs. Snowden ... compared his actions with that of Director of National Intelligence James R. Clapper, who denied that the NSA was "wittingly" collecting data on millions of Americans in a Senate Intelligence Committee hearing last spring -- a claim at odds with revelations about domestic phone records collection as a result of documents provided by Snowden. "The oath that I remember is James Clapper raising his hand, swearing to tell the truth and then lying to the American public," Snowden said. "I also swore an oath, but that oath was not to secrecy, but to defend the American Constitution." While Clapper has accused Snowden of perpetrating the most "massive and damaging theft of intelligence" in U.S. history, Snowden argues his actions were serving a larger public interest that superseded the national intelligence need for secrecy. Later in the speech, he described Clapper as having "committed a crime by lying under oath to the American people," and questioned why charges were never brought against the director. By contrast, Snowden said, charges were brought against him soon after he revealed himself as the source of the leaks.
Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.
The FBI’s transformation from a crime-fighting agency to a counterterrorism organization in the wake of the Sept. 11, 2001, attacks has been well documented. Less widely known has been the bureau’s role in secret operations against al-Qaeda and its affiliates in Iraq and Afghanistan, among other locations around the world. With the war in Afghanistan ending, FBI officials have become more willing to discuss a little-known alliance between the bureau and the Joint Special Operations Command (JSOC) that allowed agents to participate in hundreds of raids in Iraq and Afghanistan. The relationship benefited both sides. JSOC used the FBI’s expertise in exploiting digital media and other materials to locate insurgents and detect plots, including any against the United States. The bureau’s agents, in turn, could preserve evidence and maintain a chain of custody should any suspect be transferred to the United States for trial. In early 2003, two senior FBI counterterrorism officials traveled to Afghanistan to meet with the Joint Special Operations Command’s deputy commander at Bagram air base. The pace of activity in Afghanistan was slow at first. An FBI official said there was less than a handful of [Hostage and Rescue Team] deployments to Afghanistan in those early months; the units primarily worked with the SEALs as they hunted top al-Qaeda targets. The tempo quickened with the U.S.-led invasion of Iraq in 2003. At first, the HRT’s mission was mainly to protect other FBI agents when they left the Green Zone, former FBI officials said. In 2005, all of the HRT members in Iraq began to work under JSOC.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
One person's freedom fighter may be another's terrorist, but David Miranda is very clearly neither. Yet he was detained at Heathrow airport for nine hours under schedule 7 of the Terrorism Act 2000. That the high court has now found his detention to be lawful is disappointing, to say the least. If someone travelling as part of journalistic work can be lawfully detained like this – questioned for hours without a lawyer present, his electronic equipment confiscated and cloned and all without the merest suspicion of wrongdoing required – then clearly something has gone wrong with the law. Schedule 7 suffers the same glaring flaws as the old section 44 counter-terrorism power that also allowed stop and search without suspicion. Such laws leave themselves wide open to discriminatory misuse: section 44 never once led to a terrorism conviction but was used to stop people like journalist Pennie Quinton. In a significant victory, Liberty took her case to the European court of human rights and the power was declared unlawful. Liberty and other organisations intervened in [Miranda's] case on just this point, arguing that the detention violated article 10 of the European convention, the right to freedom of expression. Our riled security services' transparent intimidation and interference with Miranda is shocking. But it's also important that we use his case to shed light on the murky everyday reality of schedule 7.
Note: For more on threats to civil liberties, see the deeply revealing reports from reliable major media sources available here.
At least since the aftermath of September 2001, western governments and intelligence agencies have been hard at work expanding the scope of their own power, while eroding privacy, civil liberties and public control of policy. What used to be viewed as paranoid, Orwellian, tin-foil hat fantasies [turn] out post-Snowden, to be not even the whole story. We've been warned for years that these things were going on: wholesale surveillance of entire populations, militarization of the internet, the end of privacy. Secret laws, secret interpretations of secret laws by secret courts and no effective parliamentary oversight whatsoever. By and large the media have paid scant attention to this, even as more and more courageous, principled whistleblowers stepped forward. The unprecedented persecution of truth-tellers, initiated by the Bush administration and severely accelerated by the Obama administration, has been mostly ignored, while record numbers of well-meaning people are charged with serious felonies simply for letting their fellow citizens know what's going on. Numerous ex-NSA officials have come forward in the past decade, disclosing massive fraud, vast illegalities and abuse of power in [that] agency, including Thomas Drake, William Binney and Kirk Wiebe. The response was 100% persecution and 0% accountability by both the NSA and the rest of government. Since the summer of 2013, the public has witnessed a shift in debate over these matters. The reason is that one courageous person: Edward Snowden.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
On December 4th it [was exactly] 44 years since a select unit of 14 Chicago Police officers, on special assignment to Cook County State's Attorney Edward Hanrahan, executed a pre-dawn raid on a west side apartment that left Illinois Black Panther Party leaders Fred Hampton and Mark Clark dead, several other young Panthers wounded, and the seven raid survivors arrested on bogus attempted murder charges. The physical evidence soon exposed the claims of a "shootout" that were made by Hanrahan and his men to be blatant lies, and that the murderous reality was that the police fired nearly 100 shots while the Panthers fired but one. But those lies were only the first layer of a massive cover-up that was dismantled and exposed over the next eight years -- a cover-up designed to suppress the central role of the Federal Bureau of Investigation and its COINTELPRO program in the assassination. The first documentation [of the operation and its cover-up] surfaced in March of 1971 when the Citizens Commission to Investigate the FBI broke into a small FBI office in Media Pennsylvania and expropriated over 1000 FBI documents. These documents exposed the FBI's super-secret and profoundly illegal COINTELPRO program and its focus in the 1960s on the black liberation movement and its leaders. Citing the assassinated Malcolm X as an example, Hoover directed all of the Bureau's Offices to "expose, disrupt, misdirect, discredit, and otherwise neutralize" African American organizations and leaders.
Note: For more on the realities of intelligence agency activity, see the deeply revealing reports from reliable major media sources available here.
America's National Security Agency may hold crucial evidence about one of the greatest unsolved mysteries of the Cold War — the cause of the 1961 plane crash which killed United Nations Secretary-General Dag Hammarskjold, a commission of prominent jurists says. Widely considered the U.N.'s most effective chief, Hammarskjold died as he was attempting to bring peace to the newly independent Congo. It's long been rumored that his DC-6 plane was shot down, and an independent commission set up to evaluate new evidence surrounding his death on [September 9] recommended a fresh investigation — citing radio intercepts held by the NSA as the possible key to solving the case. Hammerskjold's aircraft went down on the night of Sept. 17, 1961, smashing into a forested area just short of Ndola Airport in modern-day Zambia. A host of hard-to-answer questions about the crash have led to a glut of conspiracy theories. Among them: Why did it take 15 hours to find the wreckage, just a few miles from the airport? Why did Hammarskjold's bodyguard, who survived the crash for a few days, say that the plane "blew up"? Why did witnesses report seeing sparks, flashes, or even another plane? Hammarskjold was flying into a war zone infested with mercenaries and riven by Cold War tension. Foreign multinationals coveted [Congo's] vast mineral wealth and the country was challenged by a Western-backed insurgency in Katanga, which hosted mining interests belonging to United States, Britain, and Belgium.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Over decades and diverse administrations, justifications for the use of force - limited and full scale - have constantly revolved around weapons of mass destruction. Protection against them, real and imaginary, has served [as] justification for government excess and a curtailment of our freedoms. We stop everything because it is WMD and we fret about the consequences of both action and inaction because it is WMD. We do so because of a little known and little understood entity that truly drives American national security practices: It's called the Program. Founded in the darkest days of nuclear threat during the Eisenhower administration, the Program began as a limited system given responsibility for survival of the government. The nuclear arms race ended, but the Program never completely went away. And since 9/11, like everything else about national security, its mission and focus have expanded. The Program exists through a system of sealed envelopes - four dozen formal Presidential Emergency Action Documents more secret than anything that has been revealed about the National Security Agency of late, arrangements that instruct a surviving entity of what to do if a nation-destroying calamity befalls Washington or the United States. Because Doomsday is now thought by the experts in government to be any day, and because the potential battlefield is anyplace and every place, the work of the Program, and its power, have dramatically expanded. A survival apparatus operates behind the scenes as if survival is perpetually and instantly at stake.
Note: The author of this analysis, William M. Arkin, has written American Coup: How a Terrified Government is Destroying the Constitution, and is co-author of the best-selling book and newspaper series Top Secret America: The Rise of the New American Security State.
There was a time when the U.S. National Security Agency was so secretive that government officials dared not speak its name in public. NSA, the joke went, stood for "No Such Agency." That same agency this month held an on-the-record conference call with reporters, issued a lengthy press release to rebut a newspaper story, and posted documents on a newly launched open website - icontherecord.tumblr.com (which stands for intelligence community on the record). The steps were taken under pressure as President Barack Obama's administration tries to calm a public storm over disclosures by former NSA contractor Edward Snowden. The NSA's moves out of the shadows were meant to show that it operates lawfully..., but not everyone is convinced that it is a fundamental shift toward more openness at the intelligence agencies. Jameel Jaffer, deputy legal director at the American Civil Liberties Union, said the [disclosures] should not be viewed as a huge shift toward transparency by the administration. "In fact, on the same day the president promised more transparency on surveillance issues, the CIA filed a brief in one of our 'targeted killing' cases arguing that it could not release legal memos about the drone program, could not release civilian casualty numbers, and for that matter could not even acknowledge that the agency had played any role in targeted killings," Jaffer said.
Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.
The news that the National Security Agency (NSA) is routinely operating outside of the law and overstepping its legal authority by carrying out surveillance on American citizens is not really much of a surprise. This is what happens when you give the government broad powers and allow government agencies to routinely sidestep the Constitution. Consider that the government's Utah Data Center (UDC), the central hub of the NSA's vast spying infrastructure, will be a clearinghouse and a depository for every imaginable kind of information - whether innocent or not, private or public - including communications, transactions and the like. In fact, anything and everything you've ever said or done, from the trivial to the damning - phone calls, Facebook posts, Twitter tweets, Google searches, emails, bookstore and grocery purchases, bank statements, commuter toll records, etc. - will be tracked, collected, cataloged and analyzed by the UDC's supercomputers and teams of government agents. By sifting through the detritus of your once-private life, the government will come to its own conclusions about who you are, where you fit in, and how best to deal with you should the need arise. Surveillance of all citizens ... is not friendly to freedom. Frankly, we are long past the point where we should be merely alarmed. These are no longer experiments on our freedoms. These are acts of aggression.
Note: Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents. Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by statute and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls. The documents, provided earlier this summer to The Washington Post by former NSA contractor Edward Snowden, include a level of detail and analysis that is not routinely shared with Congress or the special court that oversees surveillance. In one of the documents, agency personnel are instructed to remove details and substitute more generic language in reports to the Justice Department and the Office of the Director of National Intelligence. In one instance, the NSA decided that it need not report the unintended surveillance of Americans. The NSA audit obtained by The Post, dated May 2012, counted 2,776 incidents in the preceding 12 months of unauthorized collection, storage, access to or distribution of legally protected communications. Many involved failures of due diligence or violations of standard operating procedure. The most serious incidents included a violation of a court order and unauthorized use of data about more than 3,000 Americans and green-card holders.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The CIA is funding a study examining various ways mankind can geo-engineer the planet -- blocking or limiting the sunlight that reaches the Earth, stripping carbon dioxide from the skies, seeding the clouds and so on. The project, a panel called “Geoengineering Climate: Technical Evaluation and Discussion of Impacts,” is backed by the National Academy of Sciences [NAS}, the National Oceanic and Atmospheric Administration (NOAA), NASA -- and the U.S. intelligence community. That’s spy-talk for the CIA, William Kearney, a spokesman for NAS, [said]. Conspiracy theorists love to argue that various world governments seek to control the weather; they cite “chemtrails” and cloud seeding and so on. The group’s first two meetings, May 20 and June 19, were closed-door in their entirety. On July 17 in Washington D.C., closed-door morning and evening meetings book-ended a public session, however, offering a peek into the group’s plans -- and it’s nothing worthy of Fox Mulder’s time, explained Edward Dunlea, study director with the National Academies. “Nothing involved in this study is classified at all,” Dunlea told FoxNews.com. “ This is an assessment of what is known in the science literature about some of the proposed engineering techniques -- both solar-radiation management and carbon-dioxide removal. All of our sponsors are interested in this topic as a part of the larger climate-change discussion, which has economic, environmental and national-security ramifications,” he said.
Note: If nothing is classified, why are the meetings secret? For solid evidence that elements of government have used the HAARP program to control the weather, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
[Daniel] Ellsberg is one of the most outspoken critics of the Obama administration’s prosecution of leakers. Under President Obama’s tenure, the government has prosecuted six individuals for releasing classified information to media organizations. Ellsberg is particularly fierce in his support of Bradley Manning, a young soldier who released a large amount of classified information to WikiLeaks. Manning was arrested in 2010, and his military court-martial began this week. Ellsberg considers Manning a hero, and he argues that there is little difference between what Manning did in 2010 and what Ellsberg did four decades earlier. [Q.}: In a 1973 interview, you said that a “secondary objective” of releasing the Pentagon Papers was “the hope of changing the tolerance of Executive secrecy that had grown up over the last quarter of a century both in Congress and the courts and in the public at large.” How has that “tolerance of secrecy” changed over the last four decades? DE: There’s been very great tolerance that if the magic words “national security,” or the new words “homeland security” are invoked, Congress has given the president virtually a free hand in deciding what information they will know as well as the public. I wouldn’t count on the current court with its current makeup making the same ruling with the Pentagon Papers as they did 40 years ago. I’m sure that President Obama would have sought a life sentence in my case. Various things that were counted as unconstitutional then have been put in the president’s hands now. He’s become an elected monarch. Nixon’s slogan, “when the president does it, it’s not illegal,” is pretty much endorsed now.
Note: To see key quotes showing the amazing courage and dedication of Snowden, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
The case of Stephen Jin-Woo Kim, the government adviser, and James Rosen, the chief Washington correspondent for Fox News, bears striking similarities to a sweeping leaks investigation disclosed last week in which federal investigators obtained records over two months of more than 20 telephone lines assigned to the Associated Press. At a time when President Obama’s administration is under renewed scrutiny for an unprecedented number of leak investigations, the Kim case provides a rare glimpse into the inner workings of one such probe. Court documents in the Kim case reveal how deeply investigators explored the private communications of a working journalist - and raise the question of how often journalists have been investigated as closely as Rosen was in 2010. The case also raises new concerns among critics of government secrecy about the possible stifling effect of these investigations on a critical element of press freedom: the exchange of information between reporters and their sources. “The latest events show an expansion of this law enforcement technique,” said attorney Abbe Lowell, who is defending Kim on federal charges filed in 2010 that he disclosed national defense information. “Individual reporters or small time periods have turned into 20 [telephone] lines and months of records with no obvious attempt to be targeted or narrow.” The Obama administration has pursued more such cases than all previous administrations combined.
Note: Read more about the Kim case in this article. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation.
New FBI records connecting Saudis who lived in Sarasota before 9/11 to “individuals associated with the terrorist attacks” [have been] released. The FBI records provide new information about an investigation into what occurred prior to 9/11 at the upscale home of Abdulaziz al-Hijji and his family in the gated community of Prestancia. Information in the records contradicts prior FBI statements that no evidence was found connecting the al-Hijjis to 9/11. Agents determined the al-Hijjis “fled” their home on August 27, 2001 — two weeks before the attacks — leaving behind three cars, furniture, clothing, toys, food and other items. “Further investigation of the [name deleted] family revealed many connections between the [name deleted] and individuals associated with the terrorist attacks on 9/11/2001,” says an April 16, 2002 FBI report. The report lists three of those individuals. Two, including one described as a “family member,” were described as students at the nearby Venice airport flight school where suicide hijackers Mohamed Atta and Marwan al-Shehhi trained. The third person lived with some flight students, the report says. A counterintelligence officer speaking on condition of anonymity said an FBI examination of gatehouse log books and photos of license tags revealed that vehicles linked to the future hijackers visited al-Hijji’s residence. Much remains unclear. Chunks of the released reports are blanked out for national security and other reasons. Four pages were withheld in their entirety.
Note: For powerful evidence reported in the major media the several of the 9/11 hijackers trained at U.S. military bases, click here. For deeply revealing reports from reliable major media sources questioning the official story of the 9/11 attacks, click here.
For years, senior Obama officials, including the president himself, have been making public claims about their drone program that have just been proven to be categorically false. McClatchy's national security reporter, Jonathan Landay, obtained top-secret intelligence documents showing that "contrary to assurances it has deployed US drones only against known senior leaders of al-Qaida and allied groups, the Obama administration has targeted and killed hundreds of suspected lower-level Afghan, Pakistani and unidentified 'other' militants in scores of strikes in Pakistan's rugged tribal area." That article quotes drone expert Micah Zenko of the Council on Foreign Relations as saying that "McClatchy's findings indicate that the administration is 'misleading the public about the scope of who can legitimately be targeted.'" In his own must-read article at Foreign Policy about these disclosures, Zenko writes - under the headline: "Finally, proof that the United States has lied in the drone wars" - that "it turns out that the Obama administration has not been honest about who the CIA has been targeting with drones in Pakistan" and that the McClatchy article "plainly demonstrates that the claim repeatedly made by President Obama and his senior aides - that targeted killings are limited only to officials, members, and affiliates of al-Qaida who pose an imminent threat of attack on the US homeland - is false." Zenko explains that these now-disproven claims may very well make the drone strikes illegal since assertions about who is being targeted were "essential to the legal foundations on which the strikes are ultimately based."
Note: For deeply revealing reports from reliable major media sources on the lies and crimes committed by the US and UK in their global wars of aggression, click here.
Raytheon, a Massachusetts defense contractor, has built tracking software that pulls information from social networks, according to a video obtained by the Guardian newspaper in London. "[Raytheon] has acknowledged the technology was shared with U.S. government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analyzing 'trillions of entities' from cyberspace." Using public data from Facebook, Twitter, Gowalla and Foursquare, the software - called RIOT, or Rapid Information Overlay Technology - apparently gathers uploaded information and forms a profile of a person's every move that was registered with one of the websites. The video obtained by the newspaper starts with a demonstration by Raytheon's "principal investigator," Brian Urch, showing how easy it is to track an employee named Nick - a real person - based on all the places he has checked in using his smartphone. "When people take pictures and post them on the Internet using their smartphones, the phone will actually embed the latitude and longitude in the header data - so we're going to take advantage of that," Urch says. "So now we know where Nick's gone ... and now we'll predict where he'll be in the future." Urch goes on to analyze - using graphs and calendars - where Nick likes to spend his personal time and make predictions about his behavior. "If you ever wanted to get a hold of his laptop, you might want to visit the gym at 6 a.m. on Monday," Urch says with alarming casualness.
Note: To read the full Guardian article, click here.
The FISA Amendments Act of 2008 did much more than shield lawbreaking telecoms from all forms of legal accountability. It also legalized vast new, sweeping and almost certainly unconstitutional forms of warrantless government eavesdropping. [The] 2008 law gutted the 30-year-old FISA statute that had [barred] the government from eavesdropping on the communications of Americans without first obtaining a warrant from a court. Worst of all, the 2008 law legalized ... the NSA warrantless eavesdropping program secretly implemented by George Bush after the 9/11 attack. The 2008 FISA law provided that it would expire in four years unless renewed. Yesterday, the Senate debated its renewal. Several Senators - Democrats Jeff Merkley and Ron Wyden of Oregon along with Kentucky GOP Senator Rand Paul - each attempted to attach amendments to the law simply to provide some modest amounts of transparency and oversight to ensure that the government's warrantless eavesdropping powers were constrained and checked from abuse. The Democratic Chair of the Senate Intelligence Committee, Dianne Feinstein ... demanded renewal of the FISA law without any reforms. And then predictably, in virtually identical 37-54 votes, Feinstein and her conservative-Democratic comrades joined with virtually the entire GOP caucus ... to reject each one of the proposed amendments and thus give Obama exactly what he demanded: reform-free renewal of the law.
Note: For analysis of this Senate vote, click here. For deeply revealing reports from reliable major media sources on government assaults on privacy, click here.
Three days before the Dec. 7, 1941 Japanese attack on Pearl Harbor, President Roosevelt was warned in a memo from naval intelligence that Tokyo's military and spy network was focused on Hawaii. In the newly revealed 20-page memo from FDR's declassified FBI file, the Office of Naval Intelligence on December 4 warned, "In anticipation of open conflict with this country, Japan is vigorously utilizing every available agency to secure military, naval and commercial information, paying particular attention to the West Coast, the Panama Canal and the Territory of Hawaii." The memo, published in the new book December 1941: 31 Days that Changed America and Saved the World went on to say that the Japanese were collecting "detailed technical information" that would be specifically used by its navy. To collect and analyze information, they were building a network of spies through their U.S. embassies and consulates. Historian and acclaimed Reagan biographer Craig Shirley, author of the just released December 1941, doesn't blame FDR for blowing it, but instead [said] that it "does suggest that there were more pieces to the puzzle" that the administration missed. He compares the missed signals leading up to Japan's attack to 9/11, which government investigations also show that the Clinton and Bush administrations missed clear signals that an attack was coming. "So many mistakes through so many levels of Washington," said Shirley. "Some things never change."
Note: Explore powerful evidence that US president Franklin Roosevelt was baiting Japan into an attack on Pearl Harbor. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
[A recent] successful exercise in autonomous robotics could presage the future of the American way of war: a day when drones hunt, identify and kill the enemy based on calculations made by software, not decisions made by humans. The demonstration laid the groundwork for scientific advances that would allow drones to search for a human target and then make an identification based on facial-recognition or other software. Once a match was made, a drone could launch a missile to kill the target. The prospect of machines able to perceive, reason and act in unscripted environments presents a challenge to the current understanding of international humanitarian law. “The deployment of such systems would reflect a paradigm shift and a major qualitative change in the conduct of hostilities,” Jakob Kellenberger, president of the International Committee of the Red Cross, said at a conference in Italy this month. Drones flying over Afghanistan, Pakistan and Yemen can already move automatically from point to point, and it is unclear what surveillance or other tasks, if any, they perform while in autonomous mode.
Note: For lots more from reliable sources on Pentagon robotic weapons development projects, click here.
Details of shadowy CIA [rendition flights] have emerged in a ... New York courthouse in a billing dispute between contractors. The court documents offer a rare glimpse of the costs and operations of the controversial rendition program. For all the secrecy that once surrounded the CIA program, a significant part of its operation was entrusted to very small aviation companies whose previous experience involved flying sports teams across the country. In the process, the costs and itineraries of numerous CIA flights became part of the court record. The more than 1,500 pages from the trial and appeals court files appear to include sensitive material, such as logs of air-to-ground phone calls made from the plane. These logs show multiple calls to CIA headquarters; to the cell- and home phones of a senior CIA official involved in the rendition program; and to a government contractor, Falls Church-based DynCorp, that worked for the CIA. Attorneys for a London-based legal charity, Reprieve, which has been investigating the CIA program, discovered the Columbia County case and brought the court records to the attention of The Washington Post. “This new evidence tells a chilling story, from the CIA’s efforts to disguise its illegal activities to the price it paid to ferry prisoners to torture chambers across the world,” said Cori Crider, Reprieve’s legal director.
Note: For lots more from reliable sources on the hidden realities behind the "Global War on Terror", click here.
The Justice Department has called into question a key pillar of the FBI's case against Bruce Ivins, the Army scientist accused of mailing the anthrax-laced letters that killed five people and terrorized Congress a decade ago. Shortly after Ivins committed suicide in 2008, federal investigators announced that they had identified him as the mass murderer who sent the letters to members of Congress and the media. The case was circumstantial, with federal officials arguing that the scientist had the means, motive and opportunity to make the deadly powder at a U.S. Army research facility at Fort Detrick, in Frederick, Md. On July 15, however, Justice Department lawyers acknowledged in court papers that the sealed area in Ivins' lab -- the so-called hot suite -- did not contain the equipment needed to turn liquid anthrax into the refined powder that floated through congressional buildings and post offices in the fall of 2001. The government's statements deepen the questions about the case against Ivins. Searches of his car and home in 2007 found no anthrax spores, and the FBI's eight-year, $100 million investigation never proved he mailed the letters or identified another location where he might have secretly dried the anthrax into an easily inhaled powder.
Note: For more doubts on the FBI's case against Ivins, click here. For a detailed analysis of the anthrax attacks by Prof. Graeme MacQueen of McMaster University, showing that it was an integral part, with the 9/11 attacks, of a larger operation to launch two wars, click here.
There are more than 280 million cellphone subscribers in the U.S., and many of those phones can record video. With so many cameras in pockets and purses, clashes between police and would-be videographers may be inevitable. "All of us, as we walk around, have to understand that we could be filmed, we could be taped," says Deborah Jacobs, director of the ACLU chapter. "But police officers above all others should be subject to this kind of filming because we have a duty to hold them accountable as powerful public servants." Tom Nolan, a former Boston police officer, says police have to get used to the world of cameras everywhere. "There's always going to be a pocket of police officers who are resistant to change," he says. Nolan now teaches at Boston University. He says police in Massachusetts train their officers to tolerate video recording, as long as no other crime is taking place. And Nolan thinks departments around the country will eventually do the same. "The police will get the message when municipal governments and police departments have got to write out substantial settlement checks," he says. "Standing by itself, that video camera in the hands of some teenager is not going to constitute sufficient grounds for a lawful arrest."
Note: Yet police are lobbying in many U.S. states to make it illegal to videotape them, and according to this CNN article, it may already be illegal in three states. For much more information from reliable sources on government and police threats to civil liberties, click here.
US government doctors who cared for the prisoners at Guantanamo Bay deliberately concealed or ignored evidence that their patients were being tortured, the first official study of its kind has found. A detailed review of the medical records and case files of nine Guantanamo inmates has concluded that medical personnel at the US detention centre were complicit in suppressing evidence that would demonstrate systematic torture of the inmates. The review is published in an online scientific journal, PLoS Medicine, and is the first peer-reviewed study analysing the behaviour of the doctors in charge of Guantanamo inmates who were subjected to "enhanced interrogation" techniques that a decade ago had been classed by the US government as torture. [The report] concluded that no doctor could have failed to notice the medical signs and symptoms of the extreme interrogation techniques and unauthorised assaults that other physicians would recognise as torture, such as severe beatings resulting in bone fractures, sexual assaults, mock executions, and simulated drowning by "waterboarding". Many of the prisoners said they were also subjected to unauthorised abuses resulting in severe and prolonged physical and mental pain.
Note: For lots more from major media sources on torture committed by US forces and approved by the highest levels of government, click here.
The American who shot dead two men in Lahore, triggering a diplomatic crisis between Pakistan and the US, is a CIA agent who was on assignment at the time. Raymond Davis has been the subject of widespread speculation since he opened fire with a semi-automatic Glock pistol on the two men who had pulled up in front of his car at a red light on 25 January. Pakistani authorities charged him with murder, but the Obama administration has insisted he is an "administrative and technical official" attached to its Lahore consulate and has diplomatic immunity. Based on interviews in the US and Pakistan, the Guardian can confirm that the 36-year-old former special forces soldier is employed by the CIA. "It's beyond a shadow of a doubt," said a senior Pakistani intelligence official. Washington's case is hobbled by its resounding silence on Davis's role. He served in the US special forces for 10 years before leaving in 2003 to become a security contractor. A senior Pakistani official said he believed Davis had worked with Xe, the firm formerly known as Blackwater. Pakistani suspicions about Davis's role were stoked by the equipment police confiscated from his car: an unlicensed pistol, a long-range radio, a GPS device, an infrared torch and a camera with pictures of buildings around Lahore.
Note: For further details on Raymond Davis' work for the CIA and Blackwater Corp., click here. Discussing the two Pakistanis killed by Davis, an ABC News blog states, "Pakistani government officials have told ABC News that the two were working for that country's intelligence agency, Inter-Service Intelligence, and were also conducting surveillance." Click here for that article.
The Obama administration is preparing an executive order that would formalize indefinite detention without trial for some detainees at the U.S. military prison at Guantanamo Bay, Cuba ..., U.S. officials said. Some civil liberties groups oppose any form of indefinite detention. "Indefinite detention without charge or trial is wrong, whether it comes from Congress or the president's pen," said Laura W. Murphy, director of the American Civil Liberties Union's Washington legislative office. "Our Constitution requires that we charge and prosecute people who are accused of crimes. You cannot sell an indefinite detention scheme by attaching a few due-process baubles and expect that to restore the rule of law. That is bad for America and is not the form of justice we want other nations to emulate." Legislation supported by some Republicans ... would create a system of indefinite detention not only for some Guantanamo detainees but also for future terrorism suspects seized overseas.
Note: Why are so few people speaking out about indefinite detention, when it is done in a way that gives the person detained virtually no legal rights or recourse? This clearly violates the sixth amendment to the US Constitution which states, "the accused shall enjoy the right to a speedy and public trial."
In roughly a dozen countries — from the deserts of North Africa, to the mountains of Pakistan, to former Soviet republics crippled by ethnic and religious strife — the United States has significantly increased military and intelligence operations, ... using robotic drones and commando teams, paying contractors to spy and training local operatives. The White House has intensified the Central Intelligence Agency’s drone missile campaign in Pakistan, approved raids ... in Somalia and launched clandestine operations from Kenya. The administration has worked with European allies ... in North Africa, efforts that include a recent French strike in Algeria. And the Pentagon tapped a network of private contractors to gather intelligence ... in Pakistan. While the stealth war began in the Bush administration, it has expanded under President Obama, who rose to prominence in part for his early opposition to the invasion of Iraq. Virtually none of the newly aggressive steps undertaken by the United States government have been publicly acknowledged. In contrast with the troop buildup in Afghanistan, which came after months of robust debate, for example, the American military campaign in Yemen began without notice in December and has never been officially confirmed.
Note: For many revealing reports on the secret operations of the US military and intelligence services in its "global war on terrorism", click here.
It is just a technical matter, the Obama administration says: We just need to make a slight change in a law to make clear that we have the right to see the names of anyone’s e-mail correspondents and their Web browsing history without the messy complication of asking a judge for permission. It is far more than a technical change. The administration’s request, reported [on July 29] in The Washington Post, is an unnecessary and disappointing step backward toward more intrusive surveillance from a president who promised something very different during the 2008 campaign. To get this information, the F.B.I. simply has to ask for it in the form of a national security letter, which is an administrative request that does not require a judge’s signature. The F.B.I. used these letters hundreds of thousands of times to demand records of phone calls and other communications, and the Pentagon used them to get records from banks and consumer credit agencies. Internal investigations of both agencies found widespread misuse of the power, and little oversight into how it was wielded. President Obama campaigned for office on an explicit promise to rein in these abuses. But instead of implementing reasonable civil liberties protections, like taking requests for e-mail surveillance before a judge, the administration is proposing changes to the law that would allow huge numbers of new electronic communications to be examined with no judicial oversight.
Note: For key reports on the growing government and corporate threats to privacy, click here.
The Federal Bureau of Investigation has issued a report that is supposed to clinch the case that a lone scientist mailed anthrax-laced letters in 2001, terrorizing a country already traumatized by the 9/11 attacks. The agency cites voluminous circumstantial evidence ... but its report leaves too many loose ends to be taken as a definitive verdict. The scientist — Dr. Bruce Ivins, an Army biodefense expert — killed himself in 2008 as the investigation moved ever closer to an indictment. That means the evidence and the F.B.I.’s conclusion that he was the culprit and acted alone will never be tested in court. Problematic is the investigative work that led the F.B.I. to conclude that only Dr. Ivins, among perhaps 100 scientists who had access to the same flask, could have sent the letters. The case has always been hobbled by a lack of direct evidence tying Dr. Ivins to the letters. No witnesses who saw him prepare the powdered anthrax or mail the letters. No anthrax spores in his house or car. No incriminating fingerprints, fibers or DNA. No confession to a colleague or in a suicide note, just opaque ramblings in e-mail that the F.B.I. interprets as evidence of guilt. The F.B.I. has a troubling history of building a circumstantial case against suspects who are later exonerated. We ... agree with Representative Rush Holt of New Jersey, who is calling for an independent assessment to validate the findings.
Note: For a recent Wall Street Journal report on the unsolved anthrax attacks, click here.
The British government [has] disclosed once-secret details of the United States' harsh treatment of a former Guantanamo Bay detainee after losing a lengthy legal battle to suppress the information. According to the information, from a judge's summary of a classified CIA report to British authorities, Binyam Mohamed was subjected to "cruel, inhuman and degrading" treatment during interrogations in Pakistan in 2002, including being shackled and deprived of sleep while interrogators played upon "his fears of being removed from United States custody and 'disappearing.' " Mohamed, 31, was born in Ethiopia and lives in Britain. Arrested in Pakistan in 2002, he says he was tortured by American authorities and others under U.S. instruction there and in Morocco. He says he was beaten with a leather strap, subjected to a mock execution and sliced with a scalpel on his chest and penis. Mohamed says Britain knew about his treatment because information used during his questioning could have come only from British intelligence. He spent seven years in detention, four of them at the U.S. military prison at Guantanamo Bay, Cuba. Reprieve, a legal organization representing Mohamed in a lawsuit against the British government, said in a statement that the disclosures show that "the U.S. documented their efforts to abuse Mr. Mohamed" and that British authorities "knew he was being abused and did nothing about it."
Note: For lots more from reliable sources on the illegal actions undertaken by the US and UK in the prosecution of the fraudulent "war on terror," click here.
The FBI illegally collected more than 2,000 U.S. telephone call records between 2002 and 2006 by invoking terrorism emergencies that did not exist or simply persuading phone companies to provide records, according to internal bureau memos and interviews. FBI officials issued approvals after the fact to justify their actions. E-mails obtained by The Washington Post detail how counterterrorism officials inside FBI headquarters did not follow their own procedures that were put in place to protect civil liberties. A Justice Department inspector general's report due out this month is expected to conclude that the FBI frequently violated the law with its emergency requests. FBI officials said they thought that nearly all of the requests involved terrorism investigations. FBI general counsel Valerie Caproni said ... that the FBI technically violated the Electronic Communications Privacy Act when agents invoked nonexistent emergencies to collect records.
Note: The FBI, by admitting that "nearly all" of the phone records they obtained were related to "terrorism investigations," make it clear that some were not. But they used claims of "terrorism emergency" to obtain them. These they then assert were merely "technical" violations. For many disturbing reports from major media sources on the increasing threats to civil liberties under the pretext of the "war on terrorism," click here.
Since the attempted bombing of a U.S. airliner on Christmas Day, former Homeland Security secretary Michael Chertoff has given dozens of media interviews touting the need for the federal government to buy more full-body scanners for airports. What he has made little mention of is that the Chertoff Group, his security consulting agency, includes a client that manufactures the machines. An airport passengers' rights group ... criticized Chertoff, who left office less than a year ago, for using his former government credentials to advocate for a product that benefits his clients. "Mr. Chertoff should not be allowed to ... privately gain from the sale of full-body scanners under the pretense that the scanners would have detected this particular type of explosive," said Kate Hanni, founder of FlyersRights.org, which opposes the use of the scanners. Chertoff's advocacy for the technology dates back to his time in the Bush administration. In 2005, Homeland Security ordered the government's first batch of the scanners. Today, 40 body scanners are in use at 19 U.S. airports. The number is expected to skyrocket at least in part because of the Christmas Day incident. The Transportation Security Administration this week said it will order 300 more machines.
Note: For lots more on the profiteering that underlies "the war on terror," click here.
Ahmed Wali Karzai, the brother of the Afghan president and a suspected player in the country’s booming illegal opium trade, gets regular payments from the Central Intelligence Agency, and has for much of the past eight years, according to current and former American officials. The C.I.A.’s practices ... suggest that the United States is not doing everything in its power to stamp out the lucrative Afghan drug trade, a major source of revenue for the Taliban. The relationship between Mr. Karzai and the C.I.A. is wide ranging. He helps the C.I.A. operate a paramilitary group, the Kandahar Strike Force, that is used for raids against suspected insurgents. On at least one occasion, the strike force has been accused of mounting an unauthorized operation against an official of the Afghan government. Mr. Karzai is also paid for allowing the C.I.A. and American Special Operations troops to rent a large compound outside the city. “He’s our landlord,” a senior American official said, speaking on the condition of anonymity. A former C.I.A. officer with experience in Afghanistan said the agency relied heavily on Ahmed Wali Karzai, and often based covert operatives at compounds he owned.
Note: To read an analysis of these revelations, which argues that there is a much bigger story of "heavy dependence by U.S. and NATO counterinsurgency forces on Afghan warlords for security", click here.
Is the Central Intelligence Agency covering up some dark secret about the assassination of John F. Kennedy? For six years, the agency has fought in federal court to keep secret hundreds of documents from 1963, when an anti-Castro Cuban group it paid clashed publicly with the soon-to-be [alleged] assassin, Lee Harvey Oswald. The files in question, some released under direction of the court and hundreds more that are still secret, involve the curious career of George E. Joannides, the case officer who oversaw the dissident Cubans in 1963. In 1978, the agency made Mr. Joannides the liaison to the House Select Committee on Assassinations — but never told the committee of his earlier role. That concealment has fueled suspicion that Mr. Joannides’s real assignment was to limit what the House committee could learn about C.I.A. activities. The agency’s deception was first reported in 2001 by Jefferson Morley, who has doggedly pursued the files ever since. Mr. Morley, 51, [is] a former Washington Post reporter and the author of a 2008 biography of a former C.I.A. station chief in Mexico. After losing an appeals court decision in Mr. Morley’s lawsuit, the C.I.A. released material last year confirming Mr. Joannides’s deep involvement with the anti-Castro Cubans who confronted Oswald. But the agency is withholding 295 specific documents from the 1960s and ’70s, while refusing to confirm or deny the existence of many others. The deceptions began in 1964 with the Warren Commission. The C.I.A. hid its schemes to kill Fidel Castro and its ties to the anti-Castro Directorio Revolucionario Estudantil, or Cuban Student Directorate, which received $50,000 a month in C.I.A. support during 1963. In the years since Oswald was named as the assassin, speculation about who might have been behind him has never ended.
Note: For WantToKnow.info team member Peter Dale Scott's analysis of the extraordinary significance of this New York Times article, click here. For two revealing clips suggesting the official explanation of the JFK assassination was manipulated, click here (for a five-minute clip from the History Channel) and here (for a highly revealing documentary from a CBS affiliate).
A long-suppressed report by the Central Intelligence Agency's inspector general to be released next week reveals that CIA interrogators staged mock executions as part of the agency's post-9/11 program to detain and question terror suspects, NEWSWEEK has learned. The report describes how one detainee, suspected USS Cole bomber Abd al-Rahim al-Nashiri, was threatened with a gun and a power drill during the course of CIA interrogation. Nashiri's interrogators brandished the gun in an effort to convince him that he was going to be shot. Interrogators also turned on a power drill and held it near him. "The purpose was to scare him into giving [information] up," said one [source]. A federal law banning the use of torture expressly forbids threatening a detainee with "imminent death." The report also says ... that a mock execution was staged in a room next to a detainee, during which a gunshot was fired in an effort to make the suspect believe that another prisoner had been killed. The inspector general's report alludes to more than one mock execution. Before leaving office, Bush administration officials confirmed that Nashiri was one of three CIA detainees subjected to waterboarding. They also acknowledged that Nashiri was one of two Al Qaeda detainees whose detentions and interrogations were documented at length in CIA videotapes. But senior officials of the agency's undercover operations branch, the National Clandestine Service, ordered that the tapes be destroyed, an action that has been under investigation for more than a year by a federal prosecutor. The new revelations are contained in a lengthy report on the CIA interrogation program completed by the agency's inspector general in May 2004.
Note: For lots more from reliable sources on the illegal methods used by the CIA and US military in its wars of aggression in Iraq and Afghanistan, click here.
The Central Intelligence Agency in 2004 hired outside contractors from the private security contractor Blackwater USA as part of a secret program to locate and assassinate top operatives of Al Qaeda, according to current and former government officials. Executives from Blackwater ... helped the spy agency with planning, training and surveillance. The C.I.A. spent several million dollars on the program, which did not successfully capture or kill any terrorist suspects. It is unclear whether the C.I.A. had planned to use the contractors to actually capture or kill Qaeda operatives, or just to help with training and surveillance in the program. American spy agencies have in recent years outsourced some highly controversial work, including the interrogation of prisoners. But government officials said that bringing outsiders into a program with lethal authority raised deep concerns about accountability in covert operations. Officials said the C.I.A. did not have a formal contract with Blackwater for this program but instead had individual agreements with top company officials, including the founder, Erik D. Prince, a politically connected former member of the Navy Seals and the heir to a family fortune. Over the years, Blackwater has hired several former top C.I.A. officials, including Cofer Black, who ran the C.I.A. counterterrorism center immediately after the Sept. 11 attacks. C.I.A. operatives also regularly use the company’s training complex in North Carolina. The complex includes a shooting range used for sniper training.
Note: For many revealing reports from major media sources on the frequent use of assassinations to advance state objectives, click here.
A federal judge has ruled that CIA officials committed fraud to protect a former covert agent against an eavesdropping lawsuit and is considering sanctioning as many as six who worked at the agency, including former CIA Director George Tenet. According to court documents unsealed Monday, U.S. District Judge Royce Lamberth referred a CIA attorney, Jeffrey Yeates, for discipline. Lamberth also denied the CIA's renewed efforts under the Obama administration to keep the case secret because of what he calls the agency's "diminished credibility" in the case. The eavesdropping lawsuit was brought by a former agent with the Drug Enforcement Agency, Richard Horn, who says his home in Rangoon, Burma, was illegally wiretapped by the CIA in 1993. He says Arthur Brown, the former CIA station chief in Burma, and Franklin Huddle Jr., the chief of mission at the U.S. Embassy in Burma, were trying to get him relocated because they disagreed with his work with Burmese officials on the country's drug trade. Horn sued Brown and Huddle in 1994, seeking damages for violations of his civil rights because of the alleged wiretapping. Tenet filed an affidavit in 2000 asking that the case against Brown be dismissed because he was a covert agent whose identity must not be revealed in court. Lamberth granted the CIA's request and threw out the case against Brown in 2004. But Lamberth found out last year that Brown's cover had been lifted in 2002, even though the CIA continued to file legal documents saying his status was covert. The judge found that the CIA intentionally misled the court and reinstated the case against Brown.
Note: This may not seem like big news, but the fact that the CIA is facing court opposition is quite significant. In the past this never would have happened, much less have made it into a newspaper.
CIA director Leon Panetta just told Congress he cancelled a secret operation to assassinate al-Qaida leaders. The CIA campaign, authorized in 2001, had not yet become operational, claimed Panetta. His claim is humbug. The U.S. has been trying to kill al-Qaida personnel (real and imagined) since the Clinton administration. These efforts continue under President Barack Obama. Claims by Congress it was never informed are hogwash. The CIA and Pentagon have been in the assassination business since the early 1950s, using American hit teams or third parties. Assassination was outlawed in the U.S. in 1976, but that did not stop attempts by its last three administrations to emulate Israel's Mossad in the "targeted killing" of enemies. The George W. Bush administration, and now the Obama White House, sidestepped American law by saying the U.S. was at war, and thus legally killing "enemy combatants." But Congress never declared war. Washington is buzzing about a secret death squad run by Dick Cheney when he was vice-president and his protege, the new U.S. commander in Afghanistan, Gen. Stanley McChrystal. This gung-ho general led the Pentagon's super secret Special Operations Command, which has become a major rival to the CIA in the business of "wet affairs" (as the KGB used to call assassinations) and covert raids. America is hardly alone in trying to rub out enemies or those who thwart its designs. Britain's MI-6 and France's SDECE were notorious for sending out assassins. U.S. assassins are still at work. In Afghanistan and Pakistan, U.S. drones are killing tribesmen almost daily. Over 90% are civilians. Americans have a curious notion that killing people from the air is not murder or even a crime, but somehow clean.
Note: For more revealing information on this, click here. For more on assassination as a tool of state, click here.
The Somali pirates attacking shipping in the Gulf of Aden and Indian Ocean are directed to their targets by a "consultant" team in London, according to a European military intelligence document obtained by a Spanish radio station. The document, obtained by Cadena SER radio, says the team and the pirates remain in contact by satellite telephone. It says that pirate groups have "well-placed informers" in London who are in regular contact with control centres in Somalia where decisions on which vessels to attack are made. These London-based "consultants" help the pirates select targets, providing information on the ships' cargoes and courses. In at least one case the pirates have remained in contact with their London informants from the hijacked ship, according to one targeted shipping company. "The information that merchant ships sailing through the area volunteer to various international organisations is ending up in the pirates' hands," Cadena SER reported the report as saying. This enables the more organised pirate groups to study their targets in advance, even spending several days training teams for specific hijacks. Senior pirates then join the vessel once it has been sailed close to Somalia. Captains of attacked ships have found that pirates know everything from the layout of the vessel to its ports of call. The national flag of a ship is also taken into account when choosing a target, with British vessels being increasingly avoided, according to the report.
Note: The remarkable capability described here -- knowledge of all the details of cargo, ship layout, nationality, and especially position and course -- is one that only national intelligence agencies are likely to have. The positional information would require real-time satellite or drone aircraft surveillance data. Could MI6, the British C.I.A., be running the Somali pirate operations, which have so suddenly spiked up just as the Pentagon's new AFRICOM gets underway?
An influential Democrat in Congress, California's Jane Harman, is at the center of a national security scandal that's threatening her political career. Harman is fighting mad after reports that her phone conversation was intercepted by a national security agency wiretap ... in 2005 and 2006. Sources say Harman was overheard talking to an investigative target whose conversations were being legally intercepted. Congressional Quarterly and The New York Times report that Harman discussed using her influence to reduce espionage-related charges against two officials of the American Israeli Public Affairs Committee. In return, the person with whom she was speaking would lobby then-House Minority Leader Nancy Pelosi to appoint Harman chair of the House Intelligence Committee. Harman reportedly ended the conversation by saying, "This conversation doesn't exist." [Congressional Quarterly] also reports that after the intercept, the FBI tried to open an investigation of Harman. But Attorney General Alberto Gonzales pulled the plug because he wanted Harman's help defending the controversial domestic warrantless wiretapping program. The former attorney general had no comment.
Note: For lots more from major media sources on the clandestine operations of the FBI and other intelligence agencies, click here.
With the help of CIA spotters, the Peruvian air force shot down 15 small civilian aircraft suspected of carrying drugs, in many cases without warning and within two to three minutes of being sighted, a U.S. lawmaker said Thursday. It was the first public disclosure of the number of planes shot down between 1995 and 2001 as part of the Airbridge Denial Program, a CIA counternarcotics effort that killed an innocent American missionary, Veronica Bowers, and her infant daughter in 2001. Michigan Rep. Pete Hoekstra, senior Republican on the Intelligence Committee of the House of Representatives, told The Associated Press most of the 15 planes shot down with the help of the CIA crashed in the jungle. The wreckage has not been or could not be examined to ascertain whether narcotics were aboard the aircraft. "The Bowers could have gone in the same category if they had crashed in the jungle," Hoekstra said, speaking of the missionary family from Hoekstra's state, Michigan. The Bowers' plane made an emergency river landing after it was hit. Excerpts from a CIA inspector general's report released in November raised questions about whether the missionaries' plane was the only craft mistakenly suspected of drug smuggling. The CIA report said that in most of the shootdowns, pilots fired on aircraft "without being properly identified, without being given the required warnings to land, and without being given time to respond to such warnings as were given to land."
Note: For many key reports from major media sources on government corruption, click here.
Internet "black boxes" will be used to collect every email and web visit in the UK under the Government's plans for a giant "big brother" database, The Independent has learnt. Home Office officials have told senior figures from the internet and telecommunications industries that the "black box" technology could automatically retain and store raw data from the web before transferring it to a giant central database controlled by the Government. Plans to create a database holding information about every phone call, email and internet visit made in the UK have provoked a huge public outcry. Richard Thomas, the Information Commissioner, described it as "step too far" and the Government's own terrorism watchdog said that as a "raw idea" it was "awful". News that the Government is already preparing the ground by trying to allay the concerns of the internet industry is bound to raise suspicions about ministers' true intentions. Further details of the database emerged on Monday at a meeting of internet service providers (ISPs) in London where representatives from BT, AOL Europe, O2 and BSkyB were given a PowerPoint presentation of the issues and the technology surrounding the Government's Interception Modernisation Programme (IMP), the name given by the Home Office to the database proposal. "It was clear the 'back box' is the technology the Government will use to hold all the data. But what isn't clear is what the Home Secretary, GCHQ and the security services intend to do with all this information in the future," said a source close to the meeting.
Note: For lots more on threats to privacy from reliable sources, click here.
Hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant National Security Agency (NSA) center in Fort Gordon, Georgia. "These were just really everyday, average, ordinary Americans who happened to be in the Middle East, in our area of intercept and happened to be making these phone calls on satellite phones," said Adrienne Kinne, a 31-year old US Army Reserves Arab linguist assigned to a special military program at the NSA's Back Hall at Fort Gordon from November 2001 to 2003. She said US military officers, American journalists and American aid workers were routinely intercepted and "collected on" as they called their offices or homes in the United States. Another intercept operator, former Navy Arab linguist, David Murfee Faulk, 39, said he and his fellow intercept operators listened into hundreds of Americans picked up using phones in Baghdad's Green Zone from late 2003 to November 2007. Both former intercept operators came forward at first to speak with investigative journalist [James] Bamford for a book on the NSA, The Shadow Factory, to be published next week. "It's extremely rare," said Bamford, who has written two previous books on the NSA, including the landmark Puzzle Palace which first revealed the existence of the super secret spy agency. "Both of them felt that what they were doing was illegal and improper, and immoral, and it shouldn't be done, and that's what forces whistleblowers."
Note: For many reports from major media sources of disturbing threats to privacy, click here.
The controversy over a best-selling author's account of forgery and deception in the White House deepened yesterday with a new CIA denial that it helped the Bush administration produce phony documents suggesting past links between al-Qaeda and Saddam Hussein. Author Ron Suskind's book The Way of the World, released earlier this month, contends that the White House learned in early 2003 that the Iraqi president no longer possessed weapons of mass destruction but went to war regardless. Suskind wrote that the information was passed to British and U.S. intelligence officials in secret meetings with Tahir Habbush, Iraq's spy chief at the time. Moreover, in an allegation that implies potentially criminal acts by administration officials, the author wrote that White House officials ordered a forgery to influence public opinion about the war. The book contends that the CIA paid Habbush $5 million and resettled him in Jordan after the war. Then, it says, in late 2003, the White House ordered the CIA to enlist Habbush's help in concocting a fake letter that purported to show that Iraq helped train Mohamed Atta, the [alleged hijacker] in the Sept. 11, 2001, attacks. Such a letter surfaced in Iraq in December 2003, but its authenticity quickly came into question. Suskind ... yesterday continued to stand by his book and accused the CIA and White House of orchestrating a smear campaign. "It's the same old stuff," said Suskind, who said his findings are supported by hours of interviews, some of them taped. "There's not a shred of doubt about any of it."
For nearly seven years, scientist Bruce E. Ivins and a small circle of fellow anthrax specialists at Fort Detrick's Army medical lab lived in a curious limbo: They served as occasional consultants for the FBI in the investigation of the deadly 2001 anthrax attacks, yet they were all potential suspects. Over lunch in the bacteriology division, nervous scientists would share stories about their latest unpleasant encounters with the FBI and ponder whether they should hire criminal defense lawyers. In tactics that the researchers considered heavy-handed and often threatening, they were interviewed and polygraphed as early as 2002, and reinterviewed numerous times. Their labs were searched, and their computers and equipment carted away. The FBI eventually focused on Ivins, whom federal prosecutors were planning to indict when he committed suicide last week. Colleagues and friends of the vaccine specialist remained convinced that Ivins was innocent: They contended that he had neither the motive nor the means to create the fine, lethal powder that was sent by mail to news outlets and congressional offices in the late summer and fall of 2001. Mindful of previous FBI mistakes in fingering others in the case, many are deeply skeptical that the bureau has gotten it right this time. "I really don't think he's the guy. I say to the FBI, 'Show me your evidence,' " said Jeffrey J. Adamovicz, former director of the bacteriology division at the U.S. Army Medical Research Institute for Infectious Diseases, or USAMRIID. "A lot of the tactics they used were designed to isolate him from his support. The FBI just continued to push his buttons."
Note: For revealing insights into the realities behind the war on terror, click here.
The number of Americans being secretly wiretapped or having their financial and other records reviewed by the government has continued to increase as officials aggressively use powers approved after the Sept. 11 attacks. But the number of terrorism prosecutions ending up in court -- one measure of the effectiveness of such sleuthing -- has continued to decline, in some cases precipitously. The trends, visible in new government data and a private analysis of Justice Department records, are worrisome to civil liberties groups and some legal scholars. They say it is further evidence that the government has compromised the privacy rights of ordinary citizens without much to show for it. The Bush administration has been seeking to expand its ability to gather intelligence without prior court approval. The [Justice] department ... reported a sharp rise in the use of national security letters by the FBI -- from 9,254 in 2005 to 12,583 in 2006, the latest data available. The letters seek customer information from banks, Internet providers and phone companies. They have caused a stir because consumers do not have a right to know that their information is being disclosed and the letters are issued without court oversight. Civil liberties groups say the new data reveal a disturbing consequence of the government's post-Sept. 11 expanded surveillance capabilities. "The number of Americans being investigated dwarfs any legitimate number of actual terrorism prosecutions, and that is extremely troubling," said Lisa Graves, deputy director of the Center for National Security Studies, a Washington-based civil liberties group.
Note: For many reports from major media sources that question the reality of the "terror" threat, click here.
The FBI has increasingly used administrative orders to obtain the personal records of U.S. citizens rather than foreigners implicated in terrorism or counterintelligence investigations, and at least once it relied on such orders to obtain records that a special intelligence-gathering court had deemed protected by the First Amendment, according to two government audits released yesterday. The episode was outlined in a Justice Department report that concluded the FBI had abused its intelligence-gathering privileges by issuing inadequately documented "national security letters" from 2003 to 2006. The report makes it clear that the abuses persisted in 2006 and disclosed that 60 percent of the nearly 50,000 security letters issued that year by the FBI targeted Americans. Because U.S. citizens enjoy constitutional protections against unreasonable searches and seizures, judicial warrants are ordinarily required for government surveillance. But national security letters are approved only by FBI officials and are not subject to judicial approval; they routinely demand certain types of personal data, such as telephone, e-mail and financial records, while barring the recipient from disclosing that the information was requested or supplied. "The fact that these are being used against U.S. citizens, and being used so aggressively, should call into question the claim that these powers are about terrorists and not just about collecting information on all kinds of people," said Jameel Jaffer, national security director at the American Civil Liberties Union. "They're basically using national security letters to evade legal requirements that would be enforced if there were judicial oversight."
Note: For many key reports from major media sources on increasing threats to civil liberties, click here.
The Bush administration allowed CIA interrogators to use tactics that were "quite distressing, uncomfortable, even frightening," as long as they did not cause enough severe and lasting pain to constitute illegal torture, a senior Justice Department official said last week. In testimony before a House subcommittee, Steven G. Bradbury, the acting chief of the Justice Department's Office of Legal Counsel, spelled out how the administration regulated the CIA's use of rough tactics and offered new details of how [waterboarding] was used to compel disclosures by prisoners. Bradbury indicated that no water entered the lungs of the three prisoners who were subjected to the practice, lending credence to previous accounts that the noses and mouths of CIA captives were covered in cloth or cellophane. Cellophane could pose a serious asphyxiation risk, torture experts said. Bradbury's unusually frank testimony ... stunned many civil liberties advocates and outside legal scholars who have long criticized the Bush administration's secretive and aggressive interrogation policies. Martin S. Lederman, a former Office of Legal Counsel official who teaches law at Georgetown University, called Bradbury's testimony "chilling." Lederman said that "to say that this is not severe physical suffering -- is not torture -- is absurd. And to invoke the defense that what the Spanish Inquisition did was worse and that we use a more benign, non-torture form of waterboarding . . . is obscene." Bradbury wrote two secret memos in 2005 that authorized waterboarding, head-slapping and other harsh tactics by the CIA. As a result of that and other issues, Senate Democrats have repeatedly blocked Bradbury's nomination to head the legal counsel's office permanently.
The Bush administration plans to leave oversight of its expanded foreign eavesdropping program to the same government officials who supervise the surveillance activities and to the intelligence personnel who carry them out, senior government officials said yesterday. The law, which permits intercepting Americans' calls and e-mails without a warrant if the communications involve overseas transmission, gives Director of National Intelligence Mike McConnell and Attorney General Alberto R. Gonzales responsibility for creating the broad procedures determining whose telephone calls and e-mails are collected. It also gives McConnell and Gonzales the role of assessing compliance with those procedures. The law ... does not contain provisions for outside oversight -- unlike an earlier House measure that called for audits every 60 days by the Justice Department's inspector general. The controversial changes to the 1978 Foreign Intelligence Surveillance Act were approved by both chambers of the Democratic-controlled Congress despite privacy concerns raised by Democratic leaders and civil liberties advocacy groups. Central to the new program is the collection of foreign intelligence from "communication service providers," which the officials declined to identify, citing secrecy concerns. Under the new law, the attorney general is required to draw up the governing procedures for surveillance activity, for approval by the Foreign Intelligence Surveillance Court. Once the procedures are established, the attorney general and director of national intelligence will formally certify that the collection of data is authorized. But the certification will be placed under seal "unless the certification is necessary to determine the legality of the acquisition," according to the law signed by Bush.
George J. Tenet, the former director of central intelligence, has lashed out against Vice President Dick Cheney and other Bush administration officials in a new book, saying they pushed the country to war in Iraq without ever conducting a “serious debate” about whether Saddam Hussein posed an imminent threat. [His book] is the first detailed account by a member of the president’s inner circle of the Sept. 11, 2001, terrorist attacks, the decision to invade Iraq and the failure to find the unconventional weapons that were a major justification for the war. “There was never a serious debate that I know of within the administration about the imminence of the Iraqi threat,” Mr. Tenet writes in a devastating judgment. Nor, he adds, “was there ever a significant discussion” about the possibility of containing Iraq without an invasion. Mr. Tenet ... makes clear his bitter view that the administration made him a scapegoat for the Iraq war. As violence in Iraq spiraled beginning in late 2003, Mr. Tenet writes, “rather than acknowledge responsibility, the administration’s message was: Don’t blame us. George Tenet and the C.I.A. got us into this mess.” Mr. Tenet takes blame for the flawed 2002 National Intelligence Estimate about Iraq’s weapons programs, calling the episode “one of the lowest moments of my seven-year tenure.” Mr. Tenet largely endorses the view of administration critics that Mr. Cheney and a handful of Pentagon officials, including Paul D. Wolfowitz and Douglas J. Feith, were focused on Iraq as a threat in late 2001 and 2002 even as Mr. Tenet and the C.I.A. concentrated mostly on Al Qaeda. Mr. Tenet has spoken rarely in public, and never so caustically, since stepping down in July 2004.
Note: Was the Iraq war based largely on lies and deception? Now that Hussein is gone and there are no weapons of mass destruction, who is the enemy in Iraq? For the comments of a top U.S. general, click here.
Two Oakland police officers working undercover at an anti-war protest in May 2003 got themselves elected to leadership positions in an effort to influence [a] demonstration. The department assigned the officers to join activists protesting the U.S. war in Iraq ... a police official said last year in a sworn deposition. [At the] demonstration, police fired nonlethal bullets and bean bags at demonstrators who blocked the Port of Oakland's entrance in a protest. Dozens of activists and longshoremen on their way to work suffered injuries ranging from welts to broken bones and have won nearly $2 million in legal settlements from the city. In a deposition related to a lawsuit filed by protesters, Deputy Police Chief Howard Jordan said activists had elected the undercover officers to "plan the route of the march and decide I guess where it would end up and some of the places that it would go." Oakland police had also monitored online postings by the longshoremen's union regarding its opposition to the war. The documents ... were released Thursday by the American Civil Liberties Union, as part of a report criticizing government surveillance of political activists since the terrorist attacks of Sept. 11, 2001. Jordan ... noted that "two of our officers were elected leaders within an hour on May 12." The idea was "to gather the information and maybe even direct them to do something that we want them to do." The ACLU said the Oakland case was one of several instances in which police agencies had spied on legitimate political activity since 2001.
The home and office of Kyle Foggo, who stepped down on Monday as the Central Intelligence Agency's No. 3 official, were searched today. Mr. Foggo resigned after becoming entangled in a widening investigation that has already brought down former Representative Randy Cunningham. Mr. Foggo's workplace in Langley, Va., and his residence in Virginia were searched this morning by agents of the Federal Bureau of Investigation and the C.I.A. inspector general's office. April Langwell, a spokeswoman for the F.B.I.'s San Diego office, said Mr. Foggo had been under investigation by the Internal Revenue Service and the Defense Criminal Investigative Service of the Defense Department's inspector general's office, as well as by the C.I.A.'s inspector general and the F.B.I. The inquiry by the C.I.A.'s inspector is examining whether he improperly awarded agency contracts to a longtime friend, Brent R. Wilkes, a military contractor whose companies have received nearly $100 million in government contracts over the years. Mr. Foggo, 51, has admitted attending poker parties throughout the 1990's that Mr. Wilkes held in a suite at the Watergate Hotel in Washington. The parties were primarily attended by C.I.A. officials and congressmen, and Mr. Cunningham, a California Republican, occasionally attended. Several news media accounts have reported that prostitutes frequented the parties.
Note: This article has huge significance. Until just a few years ago, there was a virtual blackout in the media on any negative coverage of the CIA. The fact that the Feds raided the home of the #3 man in the CIA and it was reported in top newspapers is an external manifestation of huge shake-ups going on behind the scenes. Buzzy Krongard, the previous #3 at the CIA has been linked to the millions of dollars in suspicious stock option trades made just prior to 9/11 that were never claimed, though this received little media coverage.
Counterterrorism agents at the Federal Bureau of Investigation have conducted numerous surveillance and intelligence-gathering operations that involved, at least indirectly, groups active in causes as diverse as the environment, animal cruelty and poverty relief. One F.B.I. document...talks of the Catholic Workers group's "semi-communistic ideology." The documents...came as part of a series of Freedom of Information Act lawsuits brought by the American Civil Liberties Union. The latest batch of documents...totals more than 2,300 pages and centers on references in internal files to a handful of groups, including PETA, the environmental group Greenpeace and the Catholic Workers group, which promotes antipoverty efforts and social causes. Many of the investigative documents turned over by the bureau are heavily edited. The documents indicate that in some cases, the F.B.I. has used employees, interns and other confidential informants within groups like PETA and Greenpeace to develop leads on potential criminal activity and has downloaded material from the groups' Web sites, in addition to monitoring their protests.
The CIA is squelching publication of a new book detailing events leading up to Osama bin Laden's escape from his Tora Bora mountain stronghold during the U.S.-led invasion of Afghanistan, says a former CIA officer who led much of the fighting. In a story he says he resigned from the agency to tell, Gary Berntsen recounts the attacks he coordinated at the peak of the fighting in eastern Afghanistan in late 2001, including how U.S. commanders knew bin Laden was in the rugged mountains near the Pakistani border and the al Qaeda leader's much-discussed getaway. During the 2004 election, President Bush and other senior administration officials repeatedly said that commanders did not know whether bin Laden was at Tora Bora when U.S. and allied Afghan forces attacked there in 2001. A Republican and avid Bush supporter, Berntsen, 48, retired in June and hasn't spoken publicly before. Berntsen's book is one of a handful written recently by former CIA officers who have wrestled with the agency over what could be published.
The F.B.I. missed at least five chances in the months before Sept. 11, 2001, to find two hijackers as they prepared for the attacks and settled in San Diego, the Justice Department inspector general said in a report made public on Thursday after being kept secret for a year. Investigators were stymied by bureaucratic obstacles, communication breakdowns and a lack of urgency, the report said. In the case of the San Diego hijackers, for instance, the report disclosed that an F.B.I. agent assigned to the Central Intelligence Agency wanted to pass on information to the F.B.I. about the two men in early 2000 - 19 months before the attacks - but was blocked by a C.I.A. supervisor and did not aggressively follow up. That set the stage for a series of bungled opportunities in an episode that many officials now regard as their best chance to have detected or disrupted the Sept. 11 plot. Many passages in the public version of the report were blacked out to shield information still considered sensitive by the government; an entire 115-page section on one terror suspect was withheld.
The government has told a federal appeals court that a suit by an F.B.I. translator who was fired after accusing the bureau of ineptitude should not be allowed to proceed because it would cause "significant damage to the national security and foreign policy of the United States." The case has become a lightning rod for critics who contend that the bureau retaliated against Ms. Edmonds and other whistle-blowers who have sought to expose management problems related to the antiterrorism campaign. The suit was dismissed in July after Attorney General John Ashcroft invoked a rarely used power and declared the case as falling under "state secret" privilege. The Justice Department retroactively classified a 2002 Congressional briefing about the case and some related letters from lawmakers, but this week it decided to permit the information to be released. The inspector general of the department concluded last month that the F.B.I. had failed to aggressively investigate Ms. Edmonds's accusations of espionage and fired her in large part for raising them. In a report that the department sought for months to keep classified, the inspector general issued a sharp rebuke to the bureau over its handling of Ms. Edmonds's accusations.
Note: If the above link fails, click here. This article fails to mention Ms. Edmonds claims that top individuals in government concealed critical information about 9/11 suggesting complicity by compromised politicians. For more, click here.
Iraq in flames, Washington an object of disgust. What to do? At this pivotal moment, CNN and Fox News are tipped off to a clip of an American citizen being beheaded. The victim is ... Nick Berg.The vile deed is deemed the work of al-Qaeda. The timing of the video was brilliant for the West. Media pundits judged the crime a deeper evil than the systemic torture of innocent Iraqis. But some people sensed a rat. But if it was not al-Qaeda, who? While this video shows a human body having its head chopped off, it does not necessarily portray an act of murder. A month before the discovery of [his] corpse, Berg had been released from custody. But whose custody? Brigadier General Mark Kimmitt ... claimed he was in the custody of Iraqi police. However, the Iraqi police chief [stated] "the Iraqi police never arrested the slain American". Berg's family are certain his jailers were the US military. His father, Michael, had been told so by the FBI. He has produced an email from a US consular official ... confirming that his son was in the hands of the US. In his final moments on screen Berg is wearing an orange jumpsuit of the kind familiar from Guantanamo Bay. His white chair is identical to those in the photographs of the Abu Ghraib prison tortures. During the decapitation, starting at the front of the throat, there is little sign of blood. The scream is wildly out of sync, sounds female, and is obviously dubbed. Dr John Simpson, executive director for surgical affairs at the Royal Australasian College of Surgeons ... agrees with other experts who find it highly probable that Berg had died before his decapitation. There's something fishy about this video. In the end, the question is: who killed Nick Berg, and why?
Note: If the above link fails, click here. For a CNN article raising other serious questions on Berg, click here. For more reliable information on how government can control and manipulate public perception, click here.
At least once a year during the 1980s Dick Cheney and Donald Rumsfeld vanished. Cheney was ... a [Republican] congressman. Rumsfeld [was] the head of G. D. Searle & Co.. Yet for periods of three or four days at a time no one in Congress knew where Cheney was, nor could anyone at Searle locate Rumsfeld. Rumsfeld and Cheney were principal actors in one of the most highly classified programs of the Reagan Administration. [It] called for setting aside the legal rules for presidential succession ... in favor of a secret procedure for putting in place a new "President" and his staff. The program is of particular interest today because it helps to explain the thinking and behavior of the second Bush Administration [since] September 11, 2001. The idea was to concentrate on speed, to preserve "continuity of government," and to avoid cumbersome procedures; the speaker of the House, the president pro tempore of the Senate, and the rest of Congress would play a greatly diminished role. "One of the awkward questions we faced ... was whether to reconstitute Congress after a nuclear attack. It was decided that no, it would be easier to operate without them." [Cheney's and Rumsfeld's] participation in the extra-constitutional continuity-of-government exercises ... also demonstrates a broad, underlying truth about these two men. For three decades ... even when they were out of the executive branch of government, they were never far away. They stayed in touch with defense, military, and intelligence officials, who regularly called upon them. They were ... a part of the permanent hidden national-security apparatus of the United States.
Note: If above link fails, click here. The author, James Mann, is a former Washington correspondent for the Los Angeles Times, and senior writer-in-residence at the Center for Strategic and International Studies, in Washington, D.C. Apparently, Cheney and Rumsfeld don't find Congress to be very important.
Computer users across Europe should encrypt all their e-mails, to avoid being spied on by a UK-US eavesdropping network, say Euro-MPs. The tentacles of the Echelon network stretch so far that the UK's involvement could constitute a breach of human rights, they say. The Euro-MPs have been studying Echelon for almost a year, after allegations that it has been used by the US to commit industrial espionage against European firms. They conclude that Echelon - whose existence is not officially acknowledged - is reading millions of e-mails and faxes sent every day by ordinary people. The US has denied the system even exists, and the UK refuses to give details, except to say that communications interception is a vital tool in the fight against "dangers to society". The Echelon operation is based at Fort Meade in Maryland, America, and at the UK's spy centre, GCHQ in Cheltenham.
Note: For another revealing BBC News report on Echelon, click here.
Guantanamo Bay detainees who have been held for as long as 16 years without being charged cannot be imprisoned indefinitely, attorneys argued in federal court Wednesday. Speaking before U.S. District Judge Thomas Hogan in Washington, attorneys representing eight men detained at the military facility said the Trump administration had violated prisoners’ rights because it did not intend to try them or resettle them overseas. The case shines a light on the few remaining prisoners at Guantanamo, which President Trump has promised to keep open and potentially use to house new suspects, reversing his predecessor’s failed quest to shutter the facility. The men’s collective challenge ... is a reminder of the unsettled questions that continue to surround the prison, which for critics symbolizes what they see as excesses that followed the attacks of Sept. 11, 2001. At its peak, the military facility ... held more than 700 prisoners. After 2009, President Barack Obama, seeking to close the prison, resettled close to 200 more but was unable to overcome congressional opposition to shutting the prison. Two of the men whose challenge was heard Wednesday, Tofiq Nasser Awad al-Bihani and Abdul Latif Nasser, have already been deemed eligible for resettlement overseas by a government panel, but they remain at Guantanamo. Much of the hearing revolved around the government’s assertion that it could continue to hold the detainees until hostilities against the United States cease, no matter how long that takes.
Note: A letter written by Al Hajj, a Yemeni citizen detained without charges for over 15 years, sheds further light on the plight of these prisoners. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
This is a tale of two defendants and two systems of justice. Suspected of colluding with the Russian government, the former campaign manager for Donald Trump, [Paul Manafort, was] indicted on a dozen charges involving conspiracy, money laundering, bank fraud, and lying to federal investigators. Manafort avoided jail by posting $10 million in bond, though he was confined to his luxury condo in Alexandria, Virginia. Reality Winner, an Air Force veteran and former contractor for the National Security Agency ... was accused of leaking an NSA document that showed how Russians tried to hack American voting systems in 2016. Her case is related to Manafort’s in this sense: While Manafort is suspected of aiding the Russian effort, Winner is accused of warning Americans about it. Even though she has been indicted on just one count of leaking classified information and faces far less prison time than Manafort, the judge in her case ... denied her bail. Winner spent the holidays at the Lincolnton jail, which is smaller in its entirety than Manafort’s Hampton’s estate. The U.S. government rarely acts kindly toward the leakers it chooses to prosecute - unless they happen to be popular figures like David Petraeus, the former general and CIA director who shared with his girlfriend several notebooks filled with top-secret information; he was allowed to plead guilty to just a misdemeanor charge. Last year, Attorney General Jeff Sessions proudly announced that the DOJ was investigating three times as many leaks as in the Obama era.
Note: The NSA document Winner is accused of leaking revealed high-level interference in a US election. For more along these lines, see concise summaries of deeply revealing news articles on corruption in the intelligence community and in the judicial system.
Two men kicked in the door to Berta Cáceres’s house in the small Honduran mountain town of La Esperanza. One of them opened the door to her bedroom and fired six shots. She died moments later. The murder ... might simply have receded into a grim tally of regrettable losses. But Ms. Cáceres, 44, had won international acclaim for leading her indigenous Lenca community against a dam planned on their land. Now, 20 months after the killing, a team of five international lawyers has warned that the people who ordered it may never face justice. The evidence, the lawyers said, points to a plot against Ms. Cáceres that was months in the making and reached up to senior executives of Desarrollos Energéticos, known as Desa, the Honduran company holding the dam concession. “The existing proof is conclusive regarding the participation of numerous state agents, high-ranking executives and employees of Desa in the planning, execution and cover-up of the assassination,” the lawyers wrote. Eight suspects are in custody, including ... a retired Honduran Army lieutenant who was Desa’s director of security until mid-2015. “What the public ministry has yet to do is indict the people who hired Bustillo to plan the operation,” said Miguel Ángel Urbina Martínez, one of the lawyers reviewing the case. “There was this criminal structure comprised of company executives and employees, state agents and criminal gangs that used violence, threats and intimidation,” said Roxanna Altholz, [a] member of the lawyers’ group.
Note: The Guardian reported last year that Berta Cáceres’s murder appeared to be "an extrajudicial killing planned by military intelligence specialists linked to the country’s US-trained special forces". For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the corporate world.
John N. Tye wants to make it easier to expose government wrongdoing without getting fired or breaking the law. Tye, a former State Department whistleblower, and lawyer Mark S. Zaid have formed Whistleblower Aid, a nonprofit law office to help would-be tipsters in government and the military navigate the bureaucratic and legal morass involved in reporting governmental misdeeds. Whistleblowing can be a challenge for people who have taken an oath of office to support and defend the Constitution ... Tye said in a telephone interview. “Then you get into government and you see something wrong,” he said. “You’ve sworn to stop it, but there aren’t a lot of tools at your disposal, especially if it’s your supervisor who’s breaking the law. People are scared. They’re worried about their jobs. If it involves classified information, they can be criminally prosecuted.” Tye’s interest in whistleblowing came from a stint as section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor. He came forward as a whistleblower to publicize the government’s electronic surveillance practices. He wrote about it in 2014 in a Washington Post opinion piece that he submitted to the State Department for approval. His quest to air his concerns cost him $13,000 in legal fees. If a whistleblower comes to Whistleblower Aid with classified information, he or she will be steered to investigators with security clearances and the power to do something about it.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Julian Assange, the founder of whistleblowing platform WikiLeaks, has spoken out against a passing US Senate bill which aims to officially label his organisation as a "non-state hostile intelligence service". WikiLeaks has recently been publishing documents allegedly pilfered from inside the US Central Intelligence Agency (CIA), something that has led its director, Mike Pompeo, to shift from openly citing its publications to harshly criticising them. The WikiLeaks editor-in-chief ... wrote: "Media organisations develop and protect sources. So do intelligence agencies. But to suggest that media organisations are 'non-state intelligence services is absurd. It is equivalent to suggesting that the CIA is a media organisation." The day prior to the statement's release, it emerged that US senator Ron Wyden was the sole politician to vote against the intelligence committee's authorisation bill. Wyden said: "My concern is that the use of the novel phrase 'non-state hostile intelligence service' may have legal, constitutional, and policy implications, particularly should it be applied to journalists inquiring about secrets. The language in the bill suggesting that the US government has some unstated course of action against 'non-state hostile intelligence services' is equally troubling." Legally, experts warn it is largely impossible to prosecute WikiLeaks without also bringing charges against The New York Times, The Guardian or other mainstream publications. Despite this, US attorney general Jeff Sessions has still pledged to "put some people in jail".
Note: In May, United Nations officials said that the US treatment of activists was increasingly "incompatible with US obligations under international human rights law". For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
A decade-old internet scourge called ransomware went mainstream on Friday when cybercriminals seized control of computers around the world, from the delivery giant FedEx in the United States to Britain’s public health system, universities in China and even Russia’s powerful Interior Ministry. Ransomware is nothing new. For years, there have been stories of individuals or companies horrified that they have been locked out of their computers and that the only way back in is to pay a ransom to someone, somewhere who has managed to take control. But computer criminals are discovering that ransomware is the most effective way to make money in the shortest amount of time. Friday’s attacks were a powerful escalation of earlier, much smaller episodes. Hackers exploited a vulnerability in Microsoft servers that was first discovered by the National Security Agency and then leaked online. It allowed the ransomware to spread [to] more than 70,000 organizations. There is even now a concept of “ransomware as a service” - a play on the Silicon Valley jargon “software as a service,” which describes the delivery of software over the internet. Now anyone can visit a web page, generate a ransomware file with the click of a mouse, encrypt someone’s systems and demand a ransom to restore access to the files. If the victim pays, the ransomware provider takes a cut of the payment. Ransomware criminals also have customer service lines that victims can call to get help paying a ransom.
Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
In late 2014, Senate Democrats delivered to a handful of federal agencies copies of a 6,700-page classified report about the secret prison network the Central Intelligence Agency established after the Sept. 11 attacks. Senator Dianne Feinstein of California, who oversaw the report, hoped it would become a seminal document for national security professionals for generations to come. Now the report ... is at risk of remaining under wraps for more than a decade. At the Justice Department’s direction, officials at the C.I.A., State Department, Pentagon and Office of the Director of National Intelligence placed their copies in safes, unread. In January 2015, Senator Richard Burr, the new chairman of the Senate Select Committee on Intelligence ... wrote to President Obama demanding that all copies be returned to the Senate. He also instructed the administration not to enter the report into the executive branch’s system of records, since doing so would ... mean that the report could at some point see the light of day. On Friday, the White House informed Ms. Feinstein that it intended to preserve the report under the Presidential Records Act. That step bars the incoming administration from destroying all copies of the report. But President Obama did not ... declassify the study, which means that the report would remain secret for at least 12 years. “We can’t erase our mistakes by destroying the history books,” said Ms. Feinstein, who released a partly redacted summary of the report in December 2014.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
There's no more valuable resource for an informed citizenry than the folks doing god's work at the National Security Archive at the George Washington University. Their most recent revelations concern the Rockefeller Commission, which was formed by the Ford Administration as a reaction to the New York Times stories in 1975 that broke the news of the CIA's misdeeds, up to and including covert assassinations. And, lo and behold, you'll never guess who was leading the [cover up]: "The Gerald Ford White House significantly altered the final report of the supposedly independent 1975 Rockefeller Commission investigating CIA domestic activities, over the objections of senior Commission staff, according to internal White House and Commission documents posted today by the National Security Archive. The changes included removal of an entire 86-page section on CIA assassination plots and numerous edits to the report by then-deputy White House Chief of Staff Richard Cheney. The documents in this set have yet to be incorporated into standard accounts of the events of this period. Among the abuses that led directly to President Ford creating the Rockefeller Commission were charges the CIA had compiled dossiers on American citizens and infiltrated political groups that opposed the U.S. war in Vietnam. The Rockefeller panelists entered a blanket finding that the files and lists of citizen dissenters were "improper." The White House edit changed this conclusion.
Note: Read about the CIA's involvement in the 1953 death of military scientist Frank Olson. The Rockefeller Commission report was one of the first official sources to publicly reveal CIA and DOD mind control experiments. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The Republican-led House intelligence committee wants the Pentagon to provide what it believes are illegally deleted intelligence files pertaining to the U.S. military campaign against ISIS in Syria and Iraq. "We have been made aware that both files and emails have been deleted by personnel at CENTCOM, and we expect that the Department of Defense will provide these and all other relevant documents to the committee," [Committee Chairman Devin] Nunes said at a hearing Thursday. Nunes' assertions led to an extraordinary public acknowledgment from Lt. Gen. Vincent Stewart, director of the Defense Intelligence Agency, who was testifying before the committee, of the "unusually high" dissatisfaction inside the agency responsible for providing military intelligence on ISIS. There is already an ongoing Defense Department Inspector General investigation into allegations that intelligence analysts at CENTCOM were pressured into changing their analysis to make their reports sound overly optimistic. Congress is conducting a separate investigation. The committee has information from whistleblowers that both intelligence files and emails were deliberately deleted at Central Command, but that copies remain in the hands of analysts. Some Pentagon officials have privately told CNN they believe the problem at Central Command is that some analysts feel their work is not accepted if it shows a negative view of progress.
Note: For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
President John F. Kennedy sent an army of anti-Castro exiles backed by the CIA onto the beach at Cuba’s Bay of Pigs to suffer bloody, catastrophic defeat. A few days later, [Kennedy] wondered aloud why nobody had talked him out of it. Could the Miami Herald have done that - talked him out of it? The Herald, seven months before the Bay of Pigs, had prepared a news story saying that the United States was planning to launch a military operation against Cuba. But the paper’s top management killed the story after CIA Director Allen Dulles said publishing it would hurt national security. In 1960, [reporter David Kraslow's] contacts at the Justice Department ... told him of a brutal feud between legendary FBI director J. Edgar Hoover and the CIA. The CIA wanted to train an army of Cuban exiles to overthrow Castro; the FBI was charged with enforcing the federal Neutrality Act that makes it illegal to stage a military expedition against another country from U.S. territory. Kraslow had a blockbuster story. “It was about 1,500 words and it said the CIA was secretly recruiting and training Cuban exiles for some sort of major military operation against Castro,” he recalls. The Herald wouldn’t run it. Training of the Cuban exiles was moved out the United States to Guatemala. On Jan. 10, 1961, [The New York Times] published a story on the ... base in Guatemala. The day after that, the Herald published its own story. A little editor’s note explained that the Herald had held up the news “for more than two months”.
Note: Although JFK did not stop the Bay of Pigs debacle, his administration did successfully stop a Pentagon plan to fabricate acts of terrorism on US soil as a pretext for war with Cuba. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the manipulation of mass media.
Senator Dianne Feinstein, the California Democrat who relinquished the chairmanship of the intelligence committee ... said she objects to Senator Richard Burr's request that the Obama administration return all copies of the full, 6,000-plus-page classified [torture] study. "Doing so would limit the ability to learn lessons from this sad chapter in America's history and omit from the record two years of work," Feinstein said in a statement late on Tuesday. In an extraordinary epilogue to the battle between the Senate intelligence committee and the CIA over the torture report, new chairman Burr, a North Carolina Republican, requested that administration agencies return to the committee all copies of the full report. Burr's request was first reported by the New York Times and the Huffington Post. The Times noted that Burr's request would have the effect of placing the classified report beyond the reach of the Freedom of Information Act, which exempts Congress. President Obama has [given the report] rhetorical support, but [empowered] the CIA to determine what portions of a critique of the agency ought to be public. A CIA-appointed review panel also recently found that the agency's director, John Brennan, consulted with the White House chief of staff, Denis McDonough, before agency employees surreptitiously accessed emails and drafts from committee investigators. Feinstein said in March that the breach represented a constitutional crisis, with the CIA spying on its Senate overseers.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in intelligence agencies and government.
Lawyers acting for Jeremy Hammond, the Chicago-based hacktivist facing up to 10 years in prison for releasing internal emails from the private intelligence agency Stratfor, have lodged 265 letters of support with the federal judge who will determine his sentence on 15 November. The letters call on judge Loretta Preska ... to show leniency towards Hammond, a former member of the hacking network Anonymous who has become a cause célčbre for hacktivists, civil libertarians and those concerned about the rights of whistleblowers. Among the correspondents are Daniel Ellsberg, source of the 1970s Pentagon Papers leak on the Vietnam war, and Jesselyn Radack, a former Justice Department whistleblower who now works at the Government Accountability Project. Hammond, 28, has pleaded guilty to one count under the Computer Fraud and Abuse Act (CFAA) relating to a 2011 cyber attack on Strategic Forecasting, Inc, known as Stratfor – an information analysis company based in Austin, Texas. Working alongside a fellow hacker operating under the internet handle Sabu – who was later revealed to be an FBI informant – Hammond downloaded an email spool from Stratfor containing millions of files and sent the data to the anti-secrecy website WikiLeaks which released them as the “Global Intelligence Files”. The Stratfor emails revealed that [Stratfor] had been contracted by Dow Chemical, parent company of Union Carbide which owned the Bhopal pesticide plant where the world’s worst industrial catastrophe took place in 1984, to follow the activities of campaigners seeking redress for the victims.
Note: For an excellent follow-up article titled "The Revolutionaries in Our Midst," click here. For more on privatization of "intelligence", see the deeply revealing reports from reliable major media sources available here.
It was an innocuous e-mail, one of millions sent every day by spouses with updates on the situation at home. But this one was of particular interest to the National Security Agency and contained clues that put the sender’s husband in the crosshairs of a CIA drone. Days later, Hassan Ghul ... was killed by a drone strike in Pakistan’s tribal belt. Documents provided ... by former NSA contractor Edward Snowden confirm his demise in October 2012 and reveal the agency’s extensive involvement in the targeted killing program that has served as a centerpiece of President Obama’s counterterrorism strategy. The documents provide the most detailed account of the intricate collaboration between the CIA and the NSA in the drone campaign. [The] collection of records in the Snowden trove [make] clear that the drone campaign — often depicted as the CIA’s exclusive domain — relies heavily on the NSA’s ability to vacuum up enormous quantities of e-mail, phone calls and other fragments of signals intelligence, or SIGINT. To handle the expanding workload, the NSA created a secret unit known as the Counter-Terrorism Mission Aligned Cell, or CT MAC, to concentrate the agency’s vast resources on hard-to-find [targets]. Former CIA officials said the files are an accurate reflection of the NSA’s contribution to finding targets in a campaign that has killed more than 3,000 people [in] Pakistan.
Note: For more on the use of drones to kill abroad and spy at home, see the deeply revealing reports from reliable major media sources available here.
The full extent of the CIA's extraordinary rendition programme has been laid bare with the publication of a report showing there is evidence that more than a quarter of the world's governments covertly offered support. A 213-page report compiled by the Open Society Justice Initiative (OSJI), a New York-based human rights organisation, says that at least 54 countries co-operated with the global kidnap, detention and torture operation that was mounted after 9/11, many of them in Europe. So widespread and extensive was the participation of governments across the world that it is now clear the CIA could not have operated its programme without their support, according to the OSJI. "Responsibility for these violations does not end with the United States. Secret detention and extraordinary rendition operations, designed to be conducted outside the United States under cover of secrecy, could not have been implemented without the active participation of foreign governments. These governments too must be held accountable." The states identified by the OSJI include those such as Pakistan, Afghanistan, Egypt and Jordan where the existence of secret prisons and the use of torture has been well documented for many years. But the OSJI's rendition list also includes states such as Ireland, Iceland and Cyprus, which are accused of granting covert support for the programme by permitting the use of airspace and airports by aircraft involved in rendition flights. Iran and Syria are identified by the OSJI as having participated in the rendition programme.
Note: For deeply revealing reports from reliable major media sources on the illegal operations that comprise the 'global war on terror', click here.
The head of Germany's domestic intelligence service resigned on [July 2] after admitting that his agency had shredded files on a neo-Nazi cell whose killing spree targeting immigrants rocked the country late last year. Heinz Fromm's resignation is the latest in a series of embarrassing setbacks for Germany's security services over their handling of the "National Socialist Underground" (NSU), which went undetected for more than a decade despite its murder of 10 people, mostly ethnic Turkish immigrants. German lawmakers said there was no suggestion that Fromm had ordered the destruction of the files but that he was taking responsibility for others' failures. German media have said an official working in the intelligence agency is suspected of having destroyed files on an operation to recruit far-right informants just one day after the involvement of the NSU in the murders became public. Fromm told the Spiegel weekly that the shredding of files in the case had done "grave damage to the reputation" of his agency, known in Germany as the Federal Office for the Protection of the Constitution. Germans, burdened by their Nazi past, were mortified by last year's news that three neo-Nazis had been behind the killings of eight ethnic Turks, an ethnic Greek and a police officer in a period running from 2000 to 2007. The NSU cell's culpability only came to light after two of the neo-Nazis committed suicide following a botched bank robbery last autumn.
Note: For insightful reports from reliable major media articles on the dark operations of intelligence agencies, click here.
The government will be able to monitor the calls, emails, texts and website visits of everyone in the UK under new legislation set to be announced soon. Internet firms will be required to give intelligence agency GCHQ access to communications on demand, in real time. The Home Office says the move is key to tackling crime and terrorism, but civil liberties groups have criticised it. Tory MP David Davis called it "an unnecessary extension of the ability of the state to snoop on ordinary people". A new law ... would not allow GCHQ to access the content of emails, calls or messages without a warrant. But it would enable intelligence officers to identify who an individual or group is in contact with, how often and for how long. They would also be able to see which websites someone had visited. Conservative MP and former shadow home secretary David Davis said it would make it easier for the government "to eavesdrop on vast numbers of people". "What this is talking about doing is not focusing on terrorists or criminals, it's absolutely everybody's emails, phone calls, web access..." He said that until now anyone wishing to monitor communications had been required to gain permission from a magistrate. Nick Pickles, director of the Big Brother Watch campaign group, called the move "an unprecedented step that will see Britain adopt the same kind of surveillance seen in China and Iran". The previous Labour government attempted to introduce a central, government-run database of everyone's phone calls and emails, but eventually dropped the bid after widespread anger.
Note: For more on this from BBC, click here. Though this is interesting news, many know that the government has had easy access to all people's emails, phone calls, and more for many years through systems like echelon and more. For an abundance of major media articles showing how many of the power elite want to create a big-brother society, click here.
The federal government has agreed to pay $2.5 million to the widow and children of the first person killed in the anthrax letter attacks of 2001, settling a lawsuit claiming that the Army did not adequately secure its supply of the deadly pathogen. The settlement with the family of Robert Stevens, a tabloid photo editor in Florida, follows an eight-year legal battle that exposed slack rules and sloppy recordkeeping at the Armys biodefense laboratory at Fort Detrick, in Frederick, Md. As part of the agreement, Justice Department lawyers are seeking to have many documents that were uncovered in the litigation kept under court seal or destroyed. Mr. Stevenss widow, Maureen, filed suit against the government in 2003, as evidence accumulated that the anthrax powder in the lethal letters had come from an Army laboratory. Mr. Stevens, 62, died on Oct. 5, 2001, days after inhaling anthrax powder at work.
Note: Why would the government want these documents destroyed? Remember that these attacks, which happened within weeks of the 9/11 attacks, were at first attributed to terrorists. Now it is fully acknowledged they were the responsibility of someone in government. Hmmmmm.
Jose Guerena Ortiz was sleeping after an exhausting 12-hour night shift at a copper mine. His wife, Vanessa, had begun breakfast. Their 4-year-old son, Joel, asked to watch cartoons. An ordinary morning was unfolding in the middle-class Tucson neighborhood — until an armored vehicle pulled into the family's driveway and men wearing heavy body armor and helmets climbed out, weapons ready. They were a sheriff's department SWAT team who had come to execute a search warrant. But Vanessa Guerena insisted she had no idea, when she heard a "boom" and saw a dark-suited man pass by a window, that it was police outside her home. She shook her husband awake and told him someone was firing a gun outside. A U.S. Marine veteran of the Iraq war, he was only trying to defend his family, she said, when he grabbed his own gun — an AR-15 assault rifle. What happened next was captured on video after a member of the SWAT team activated a helmet-mounted camera. The officers — four of whom carried .40-caliber handguns while another had an AR-15 — moved to the door, briefly sounding a siren, then shouting "Police!" in English and Spanish. With a thrust of a battering ram, they broke the door open. Eight seconds passed before they opened fire into the house. And 10 seconds later, Guerena lay dying in a hallway 20-feet from the front door. The SWAT team fired 71 rounds, riddling his body 22 times, while his wife and child cowered in a closet.
Note: For a survey of the decade-long trend toward militarization of police forces in the US, click here. For analyses of the militaristic police responses to the Occupy movement, click here and here.
Thirty-one seconds after the pilot reported muzzle flashes, the Marines at Alcatraz ordered that the Predator be prepared to strike if the shooters could be confirmed as hostile. At 8:49 a.m., 29 minutes after the ambush began, they authorized the pilot to fire. In minutes, two Americans would be dead. The decision to fire a missile from one of the growing fleet of U.S. unmanned aircraft is the result of work by ground commanders, pilots and analysts at far-flung military installations, who analyze video and data feeds and communicate by a system of voice and text messages. In addition to the platoon taking fire that morning in Helmand province's Upper Sangin Valley, the mission involved Marine Corps and Air Force personnel at four locations: Marines of the 2nd Reconnaissance Battalion at Alcatraz, the drone crew in Nevada, the analyst in Indiana and a mission intelligence coordinator at March Air Reserve Base in California. Senior officers say drone technology has vastly improved their ability to tell friend from foe in the confusion of battle. But the video can also prompt commanders to make decisions before they fully understand what they're seeing. In February 2009, a crew operating a drone over Afghanistan misidentified a civilian convoy as an enemy force. The Predator pilot and the Army captain who called in the airstrike disregarded warnings from Air Force analysts who had observed children in the convoy. At least 15 people were killed.
Note: For key reports from major media sources on the illegal and immoral prosecution of the global "war on terror" by the US military and NATO, click here.
An FBI employee shared confidential information with his girlfriend, who was a news reporter, then later threatened to release a sex tape the two had made. A supervisor watched pornographic videos in his office during work hours while "satisfying himself." And an employee in a "leadership position" misused a government database to check on two friends who were exotic dancers and allowed them into an FBI office after hours. These are among confidential summaries of FBI disciplinary reports obtained by CNN, which describe misconduct by agency supervisors, agents and other employees over the last three years. The reports, compiled by the FBI's Office of Professional Responsibility, are e-mailed quarterly to FBI employees, but are not released to the public. And despite the bureau's very strict screening procedure for all prospective employees, the FBI confirms that about 325 to 350 employees a year receive some kind of discipline, ranging from a reprimand to suspension. About 30 employees each year are fired. "We do have a no-tolerance policy," FBI Assistant Director Candice Will told CNN. "We don't tolerate our employees engaging in misconduct. We expect them to behave pursuant to the standards of conduct imposed on all FBI employees." However, the internal summaries show that even with serious misconduct, employees can keep their job (names and locations of the employees are not listed in the reports).
Note: For an abundance of revealing media articles on corruption in the intelligence agencies, click here.
Consumer Watchdog, an advocacy group largely focused in recent years on Google's privacy practices, has called [for] a congressional investigation into the Internet giant's "cozy" relationship with U.S. President Barack Obama's administration. In a letter sent [on January 24], Consumer Watchdog asked Representative Darrell Issa, the new chairman of the House Oversight and Government Reform Committee, to investigate the relationship between Google and several government agencies. "We believe Google has inappropriately benefited from close ties to the administration," the letter said. "It should not get special treatment and access because of a special relationship with the administration." Consumer Watchdog's latest complaints about the relationship of Google and the Obama administration are outlined in a 32-page report [which] questions Google's relationship with the U.S. National Security Agency and calls for the company to be more open about what consumer information it shares with the spy agency.
The Drug Enforcement Administration has been transformed into a global intelligence organization with a reach that extends far beyond narcotics, and an eavesdropping operation so expansive it has to fend off foreign politicians who want to use it against their political enemies, according to secret diplomatic cables. The cables, from the cache obtained by WikiLeaks [offer glimpses of drug agents] in places where it can be hard to tell the politicians from the traffickers, and where drug rings are themselves mini-states whose wealth and violence permit them to run roughshod over struggling governments. Officials of the D.E.A. and the State Department declined to discuss what they said was information that should never have been made public. The D.E.A. now has 87 offices in 63 countries and close partnerships with governments that keep the [CIA] at arm’s length. Created in 1973, the D.E.A. has steadily built its international turf. Since the 2001 terrorist attacks, the agency’s leaders have cited what they describe as an expanding nexus between drugs and terrorism in further building its overseas presence.
Note: Isn't it odd that this report fails to mention the recent revelation in The New York Times itself that the American accused of masterminding the Mumbai attacks, David C. Headley, was a DEA agent while attending a "terrorism training camp" in Pakistan in the years before the attacks?
Israel’s undercover operations here, including missions to steal U.S. secrets, are hardly a secret at the FBI, CIA and other U.S. intelligence agencies. From time to time, in fact, the FBI has called Israeli officials on the carpet to complain about a particularly brazen effort to collect classified or other sensitive information, in particular U.S. technical and industrial secrets. The most notorious operation employed Jonathan Pollard, the naval intelligence analyst convicted in 1987 and sentenced to life in prison for stealing tens of thousands of classified documents for Israel. One of Israel’s major interests, of course, is keeping track of Muslims who might be allied with Hamas, which rules the Gaza Strip, or Iran-backed Hezbollah, based in Lebanon. As tensions with Iran escalate, according to former CIA officer Philip Giraldi, “Israeli agents have become more aggressive in targeting Muslims living in the United States as well as in operating against critics. There have been a number of cases reported to the FBI about Mossad officers who have approached leaders in Arab-American communities and have falsely represented themselves as ‘U.S. intelligence,’ ” Giraldi wrote recently in American Conservative magazine. “Because few Muslims would assist an Israeli, this is done to increase the likelihood that the target will cooperate. It’s referred to as a ‘false flag’ operation.”
Note: For an excellent overview of "false-flag" operations, click here.
For seven years, Thomas A. Drake was a senior executive at the nation's largest intelligence organization with an ambition to change its insular culture. He had access to classified programs that purported to help the National Security Agency tackle its toughest challenges. Today, he wears a blue T-shirt and answers questions about iPhones at an Apple store in the Washington area. He is awaiting trial in a criminal media leak case that could send him to prison for 35 years. In his years at the NSA, Drake grew disillusioned, then indignant, about what he saw as waste, mismanagement and a willingness to compromise Americans' privacy without enhancing security. He first tried the sanctioned methods -- going to his superiors, inspectors general, Congress. Finally, in frustration, he turned to the "nuclear option": leaking to the media. Drake, 53, may pay a high price for going nuclear. In April he was indicted, accused of mishandling classified information and obstructing justice. His supporters consider him a patriotic whistleblower targeted by an Obama administration bent on sealing leaks and on having something to show for an investigation that spans two presidencies. What led Drake to this point, friends and others say, is a belief that his actions were justified if they forced such a powerful and secretive agency to be held accountable. "He tried to have his concerns heard and nobody really wanted to listen," said Nina Ginsberg, an attorney.
Note: On June 9, 2011, all ten original charges against Thomas A Drake were dropped and he was not incarcerated, yet it is cases like this that keep people like Edward Snowden from making his case in US courts.
The Army has dropped the Vietnam-era name "psychological operations" for its branch in charge of trying to change minds behind enemy lines, acknowledging the term can sound ominous. The Defense Department picked a more neutral moniker: "Military Information Support Operations," or MISO. Fort Bragg is home to the 4th Psychological Operations Group, the Army's only active duty psychological operations unit. Psychological operations soldiers are trained at the post. The change was driven from the top, by Pentagon policymakers working for Defense Secretary Robert Gates. It reflects unease with the Cold War echoes of the old terminology, and the implication that the work involved subterfuge. Psychological operations have been cast as spooky in movies and books over the years portraying the soldiers as master manipulators. The 2009 movie "The Men Who Stare at Goats," staring George Clooney, was about an army unit that trains psychic spies, based on Jon Ronson's nonfiction account of the U.S. military's hush-hush research into psychic warfare and espionage.
Note: For more on psychological operations and mind control, click here.
WikiLeaks co-founder Julian Assange has given his strongest indication yet about the next big leak from his whistleblower organisation. In an interview with the ABC's Foreign Correspondent, Mr Assange said cryptically of WikiLeaks' current project: "I can give an analogy. If there had been mass spying that had affected many, many people and organisations and the details of that mass spying were released then that is something that would reveal that the interests of many people had been abused." He agreed it would be of the "calibre" of publishing information about the way the top secret Echelon system - the US-UK electronic spying network which eavesdrops on worldwide communications traffic - had been used. Mr Assange also confirmed that WikiLeaks has a copy of a video showing a US military bombing of a western Afghan township which killed dozens of people, including children. During the course of the past month, Mr Assange has been talking to [ABC's] Foreign Correspondent for [an upcoming] program examining the efficacy of the WikiLeaks model. "What we want to create is a system where there is guaranteed free press across the world, the entire world, that every individual in the world has the ability to publish materials that is meaningful," he said.
Note: For more on government surveillance from major media sources, click here.
Succumbing to the politics of fear during the 2008 campaign, Congress seriously diluted the First and Fourth Amendment rights of Americans by changing the 1978 law that governs electronic surveillance. In addition to supplying retroactive approval for President George W. Bush�s warrantless wiretapping, the FISA Amendments Act vastly expanded the government�s ability to eavesdrop without warrants in the future. It gave the National Security Agency authority to monitor the international phone calls and e-mail messages of Americans who are not engaged in criminal activity and pose no threat to national security. The measure weakened judicial supervision of how these powers are exercised, making abuse far more likely. An important case being argued [April 16] in New York City will help determine the extent of the damage. At issue is a constitutional challenge to the 2008 law filed on behalf of human rights, labor, legal, and news media organizations whose work requires sensitive telephone and e-mail communication with people abroad. Embracing the Bush administration�s approach, the Obama administration has sought to block the suit, contending that the plaintiffs lack the requisite �standing� to bring the challenge because they cannot show with certainty that they have been spied on. (Of course, any attempt to prove spying would likely be met by a flimsy claim of state secrecy.)
Note: For lots more from reliable sources on government threats to civil liberties, click here.
Attorney General Eric H. Holder Jr. named a veteran federal prosecutor on Monday to examine abuse of prisoners held by the Central Intelligence Agency, after the Justice Department released a long-secret report showing interrogators choked a prisoner repeatedly and threatened to kill another detainee’s children. Mr. Holder chose John H. Durham, a prosecutor from Connecticut who has been investigating the C.I.A.’s destruction of interrogation videotapes, to determine whether a full criminal investigation of the conduct of agency employees or contractors was warranted. The attorney general said his decision to order an inquiry was based in part on the recommendation of the Justice Department’s ethics office, which called for a new review of several interrogation cases. He said he was also influenced by a 2004 report by the C.I.A. inspector general at the time, John L. Helgerson, on the agency’s interrogations. The report was released Monday under a court order in a Freedom of Information Act lawsuit. Although large portions of the 109-page report are blacked out, it gives new details about a variety of abuses inside the C.I.A.’s overseas prisons, including suggestions about sexually assaulting members of a detainee’s family, staging mock executions, intimidation with a handgun and power drill, and blowing cigar and cigarette smoke into prisoners’ faces to make them vomit. The inspector general’s review raised broad questions about the legality, political acceptability and effectiveness of the harshest of the C.I.A.’s methods, including some not authorized by the Justice Department and others that were approved, like the near-drowning technique of waterboarding.
Note: And what do you think might have been in the blacked out portions of the report? For lots more on the use of illegal methods by the CIA and US military in their prosecution of the "war on terror," click here.
Imagine someone watching your every move, hearing everything you say and knowing where you are at every moment. If you have a cell phone, it could happen to you. After four months of harassing phone calls, Courtney Kuykendall was afraid to answer her cell phone. The Tacoma, Washington, teenager was receiving graphic, violent threats at all hours. And when she and her family changed their cell phone numbers and got new phones, the calls continued. Using deep scratchy voices, anonymous stalkers literally took control of the Kuykendall's cell phones, repeatedly threatened Courtney with murder and rape, and began following the family's every move. "They're listening to us and recording us," Courtney's mother, Heather Kuykendall, told NBC's Today Show. "We know that because they will record us and play it back as a voicemail." How is something like this possible? Just take a look on the internet. That's where you'll find the latest spy technology for cell phones. Spyware marketers claim you can tap into someone's calls, read their text messages and track their movements "anywhere, anytime." Security experts say it's no internet hoax."It's real, and it is pretty creepy," said Rick Mislan, a former military intelligence officer who now teaches cyber forensics at Purdue University's Department of Computer and Information Technology. Mislan has examined thousands of cell phones inside Purdue's Cyber Forensics Lab, and he says spy software can now make even the most high-tech cell phone vulnerable. "I think a lot of people think their cell phone calls are very secure but our privacy isn't always what we think it is."
Note: For lots more on increasing corporate and governmental threats to privacy, click here.
By exploring the current, post-9/11 operations of the NSA [National Security Agency, James] Bamford ... goes where congressional oversight committees and investigative journalists still struggle to go. [When] the Bush administration declared its ... global war on terror, Congress agreed to most of the White House's demands. According to Bamford, the NSA's expanded powers and resources enabled it to collect communications both inside and outside the United States. He quotes a former NSA employee as a witness to the agency's spying on the conversations of Americans who have no connection to terrorism. After suing the NSA for documents, [Bamford] obtained considerable evidence that telecommunication companies (with the notable exception of Qwest) knowingly violated U.S. law by cooperating with the NSA to tap fiber optic lines. In impressive detail, The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America tells how private contractors, including some little-known entities with foreign owners, have done the sensitive work of storing and processing the voices and written data of Americans and non-Americans alike. In the book, he offers new revelations about the National Security Agency's counterterrorism tactics, including its controversial domestic surveillance programs. Bamford warns of worse to come: 'There is now the capacity to make tyranny total in America. Only law ensures that we never fall into that abyss -- the abyss from which there is no return.'"
Note: Bamford is the author of two other books on the NSA: Body of Secrets and The Puzzle Palace.
Rafid Ahmed Alwan hoped for an easier life when he came [to Nuremberg, Germany] from Iraq nine years ago. He also hoped for a reward for his cooperation with German intelligence officers. "For what I've done, I should be treated like a king," he said outside a cramped, low-rent apartment he shares with his family. Instead, the Iraqi informant code-named Curveball has flipped burgers at McDonald's and Burger King, washed dishes in a Chinese restaurant and baked pretzels in an all-night bakery. He also has faced withering international scorn for peddling discredited intelligence that helped spur an invasion of his native country. It was intelligence attributed to Alwan -- as Curveball -- that the White House used in making its case that Saddam Hussein possessed weapons of mass destruction. He described what turned out to be fictional mobile germ factories. The CIA belatedly branded him a liar. After Curveball's role in the pre-invasion intelligence fiasco was disclosed by the Los Angeles Times four years ago, the con man behind the code name remained in the shadows. His security was protected and his identity concealed by the BND, Germany's Federal Intelligence Service. Along with confirmation of Curveball's identity, however, have come fresh disclosures raising doubts about his honesty -- much of that new detail coming from friends, associates and past employers. And records reveal that when Alwan fled to Germany, one step ahead of the Iraq Justice Ministry, an arrest warrant had been issued alleging that he sold filched camera equipment on the Baghdad black market.
Note: For much more information on the CIA's "disinformant" Curveball, click here. The lies he told were peddled by US media, including the major television networks and The New York Times and Washington Post, in the run-up to the US invasion of Iraq. For a powerful summary of major media cover-ups, click here.
America is ruled by an “intelligence-industrial complex” whose allegiance is not to the taxpaying public but to a cabal of private-sector contractors. That is the central thesis of Spies for Hire: The Secret World of Intelligence Outsourcing by Tim Shorrock, ... an investigative journalist. His book [provides a] disturbing overview of the intelligence community, also known as “the I.C.” Mr. Shorrock says our government is outsourcing 70 percent of its intelligence budget, or more than $42 billion a year, to a “secret army” of corporate vendors. Because of accelerated privatization efforts after 9/11, these companies are participating in covert operations and intelligence-gathering activities that were considered “inherently governmental” functions reserved for agencies like the Central Intelligence Agency, he says. Some of the book’s most intriguing assertions concern the permeating influence of the consulting firm Booz Allen Hamilton. In 2006, Mr. Shorrock reports, Booz Allen amassed $3.7 billion in revenue, much of which came from classified government contracts exempt from public oversight. Among its more than 18,000 employees are R. James Woolsey, the former C.I.A. director, and Joan Dempsey, a former longtime United States intelligence official who declared in a 2004 speech, “I like to refer to Booz Allen as the shadow I.C.” The “revolving door” between Booz Allen and the I.C. is personified by Mike McConnell, who joined the firm after serving as head of the National Security Agency under President Bill Clinton, only to return as director of national intelligence under President Bush.
Note: For revealing reports on government corruption from reliable sources, click here.
For three years, the Bush administration has drawn fire from civil liberties groups over its use of national security letters, a kind of administrative subpoena that compels private businesses such as telecommunications companies to turn over information to the government. After the 2001 USA Patriot Act loosened the guidelines, the FBI issued tens of thousands of such requests, something critics say amounts to warrantless spying on Americans who have not been charged with crimes. Now, newly released documents shed light on the use of the letters by the CIA. The spy agency has employed them to obtain financial information about U.S. residents and does so under extraordinary secrecy, according to the American Civil Liberties Union, which obtained copies of CIA letters under the Freedom of Information Act. The CIA's requests for financial records come with "gag orders" on the recipients, said ACLU lawyer Melissa Goodman. In many cases, she said, the recipient is not allowed to keep a copy of the letter or even take notes about the information turned over to the CIA. The ACLU posted copies of some of the letters on its Web site. In most cases, nearly all the text had been redacted by CIA censors.
Note: For many powerful reports on the growing threats to civil liberties, click here.
Federal courts had prohibited the Bush administration from discarding evidence of detainee torture and abuse months before the CIA destroyed videotapes that revealed some of its harshest interrogation tactics. Normally, that would force the government to defend itself against obstruction allegations. But the CIA may have an out: its clandestine network of overseas prisons. While judges focused on the detention center in Guantanamo Bay, Cuba, and tried to guarantee that any evidence of detainee abuse would be preserved, the CIA was performing its toughest questioning half a world away. And by the time President Bush publicly acknowledged the secret prison system, interrogation videos of two terrorism suspects had been destroyed. The CIA destroyed the tapes in November 2005. That June, U.S. District Judge Henry H. Kennedy Jr. had ordered the Bush administration to safeguard "all evidence and information regarding the torture, mistreatment, and abuse of detainees now at the United States Naval Base at Guantanamo Bay." U.S. District Judge Gladys Kessler issued a nearly identical order that July. At the time, that seemed to cover all detainees in U.S. custody. But Abu Zubaydah and Abd al-Rahim al-Nashiri, the terrorism suspects whose interrogations were videotaped and then destroyed, weren't at Guantanamo Bay. They were prisoners that existed off the books -- and apparently beyond the scope of the court's order. Attorneys say that might not matter. David H. Remes, a lawyer for Yemeni citizen Mahmoad Abdah and others, ... said "It is still unlawful for the government to destroy evidence, and it had every reason to believe that these interrogation records would be relevant to pending litigation. It's logical to infer that the documents were destroyed in order to obstruct any inquiry into the means by which statements were obtained."
Hundreds of defendants sitting in prisons nationwide have been convicted with the help of an FBI forensic tool that was discarded more than two years ago. But the FBI lab has yet to take steps to alert the affected defendants or courts, even as the window for appealing convictions is closing, a joint investigation by The Washington Post and "60 Minutes" has found. The science, known as comparative bullet-lead analysis, was first used after President John F. Kennedy's assassination in 1963. The technique used chemistry to link crime-scene bullets to ones possessed by suspects on the theory that each batch of lead had a unique elemental makeup. In 2004, however, the nation's most prestigious scientific body concluded that variations in the manufacturing process rendered the FBI's testimony about the science "unreliable and potentially misleading." Specifically, the National Academy of Sciences said that decades of FBI statements to jurors linking a particular bullet to those found in a suspect's gun or cartridge box were so overstated that such testimony should be considered "misleading under federal rules of evidence." A year later, the bureau abandoned the analysis. But the FBI lab has never gone back to determine how many times its scientists misled jurors. Internal memos show that the bureau's managers were aware by 2004 that testimony had been overstated in a large number of trials. In a smaller number of cases, the experts had made false matches based on a faulty statistical analysis of the elements contained in different lead samples, documents show. The government has fought releasing the list of the estimated 2,500 cases over three decades in which it performed the analysis. For the majority of affected prisoners, the typical two-to-four-year window to appeal their convictions based on new scientific evidence is closing.
Traditionally, powerful spy satellites have been used to search for strategic threats overseas. But now the Department of Homeland Security has developed a new office to use the satellites to [monitor the US itself]. [DHS] officials ... faced extensive criticism [in Congress] about the privacy and civil liberty concerns of the new office, called the National Applications Office. [House Homeland Security] Committee members expressed concern about abuse of the satellite imagery, charging that Homeland Security had not informed the oversight committee about the program. "What's most disturbing is learning about it from The Wall Street Journal," said Committee Chairman Rep. Bennie Thompson, D-Miss. The lawmakers also expressed concern about using military capabilities for U.S. law enforcement and Homeland Security operations, potentially a violation of the Posse Comitatus Act, which bars the military from serving as a law enforcement body within the United States. Committee members said that in addition to not being informed about the National Applications Office program, they had not yet been provided with documents defining the limits and legal guidance about the program. [They] sent a letter to Homeland Security saying, "We are so concerned that ... we are calling for a moratorium on the program. Today's testimony made clear that there is effectively no legal framework governing the domestic use of satellite imagery for the various purposes envisioned by the department."
The Bush administration rushed to defend new espionage legislation Monday amid growing concern that the changes could lead to increased spying by U.S. intelligence agencies on American citizens. But officials declined to provide details about how the new capabilities might be used by the National Security Agency and other spy services. And in many cases, they could point only to internal monitoring mechanisms to prevent abuse of the new rules that appear to give the government greater authority to tap into the traffic flowing across U.S. telecommunications networks. Officials rejected assertions that the new capabilities would enable the government to cast electronic "drift nets" that might ensnare U.S. citizens [and] that the new legislation would amount to the expansion of a controversial — and critics contend unconstitutional — warrantless wiretapping program that President Bush authorized after the 9/11 attacks. Intelligence experts said there were an array of provisions in the new legislation that appeared to make it possible for the government to engage in intelligence-collection activities that the Bush administration officials were discounting. "They are trying to shift the terms of the debate to their intentions and away from the meaning of the new law," said Steven Aftergood, an intelligence policy analyst at the Federation of American Scientists. "The new law gives them authority to do far more than simply surveil foreign communications abroad," he said. "It expands the surveillance program beyond terrorism to encompass foreign intelligence. It permits the monitoring of communications of a U.S. person as long as he or she is not the primary target. And it effectively removes judicial supervision of the surveillance process."
The FBI is taking cues from the CIA to recruit thousands of covert informants in the United States as part of a sprawling effort to boost its intelligence capabilities. According to a recent unclassified report to Congress, the FBI expects its informants to provide secrets about possible terrorists and foreign spies, although some may also be expected to aid with criminal investigations, in the tradition of law enforcement confidential informants. The FBI said the push was driven by a 2004 directive from President Bush ordering the bureau to improve its counterterrorism efforts by boosting its human intelligence capabilities. The aggressive push for more secret informants appears to be part of a new effort to grow its intelligence and counterterrorism efforts. Other recent proposals include expanding its collection and analysis of data on U.S. persons, retaining years' worth of Americans' phone records and even increasing so-called "black bag" secret entry operations. To handle the increase in so-called human sources, the FBI also plans to overhaul its database system, so it can manage records and verify the accuracy of information from "more than 15,000" informants, according to the document. The bureau has arranged to use elements of CIA training to teach FBI agents about "Source Targeting and Development," the report states. The courses will train FBI special agents on the "comprehensive tradecraft" needed to identify, recruit and manage these "confidential human sources."
In a letter written Saturday to former CIA Director George Tenet, six former CIA officers described their former boss as "the Alberto Gonzales of the intelligence community," and called his book "an admission of failed leadership." The letter, signed by Phil Giraldi, Ray McGovern, Larry Johnson, Jim Marcinkowski, Vince Cannistraro and David MacMichael, said Tenet should have resigned in protest rather than take part in the administration's buildup to the war. (Read the full letter) Johnson is a former CIA intelligence official and registered Republican who voted for Bush in 2000. Cannistraro is former head of the CIA's counterterrorism division. The writers said ... "your lament that you are a victim in a process you helped direct is self-serving. You were not a victim. You were a willing participant in a poorly considered policy to start an unnecessary war. CIA field operatives produced solid intelligence in September 2002 that stated clearly there was no stockpile of any kind of WMD in Iraq. This intelligence was ignored and later misused." The letter said CIA officers learned later that month Iraq had no contact with Osama bin Laden and that then-President Saddam Hussein considered the al Qaeda leader to be an enemy. Still, Tenet "went before Congress in February 2003 and testified that Iraq did indeed have links to al Qaeda. "You helped set the bar very low for reporting that supported favored White House positions, while raising the bar astronomically high when it came to raw intelligence that did not support the case for war. You betrayed the CIA officers who collected the intelligence. Most importantly and tragically, you failed to meet your obligations to the people of the United States."
In 1968, Robert Kennedy seemed likely to follow his brother, John, into the White House. Then, on June 6, he was assassinated - apparently by a lone gunman. But Shane O'Sullivan says he has evidence implicating three CIA agents in the murder: On June 5 1968, Robert Kennedy wins the California Democratic primary. After midnight, he finishes his victory speech at the Ambassador hotel in Los Angeles ... in a crowded pantry when 24-year-old Palestinian Sirhan Sirhan steps down from a tray-stacker with a "sick, villainous smile" on his face and starts firing at Kennedy with an eight-shot revolver. As Kennedy lies dying on the pantry floor, Sirhan is arrested as the lone assassin. He carries the motive in his shirt-pocket (a clipping about Kennedy's plans to sell bombers to Israel). But the autopsy report suggests Sirhan could not have fired the shots that killed Kennedy. And more bullet-holes are found in the pantry than Sirhan's gun can hold, suggesting a second gunman. Three years ago, I started writing a screenplay about the assassination [and was] caught up in a strange tale of second guns and "Manchurian candidates" (as the movie termed brainwashed assassins). As I researched the case, I uncovered new video and photographic evidence suggesting that three senior CIA operatives were behind the killing. Morales died of a heart attack in 1978, weeks before he was to be called before the HSCA [House Select Committee on Assassinations]. Joannides died in 1990. Campbell may still be out there somewhere, in his early 80s. Given the positive identifications we have gathered on these three, the CIA and the Los Angeles Police Department need to explain what they were doing there.
Pentagon officials said Thursday they have found three more people who recall an intelligence chart that identified Sept. 11 mastermind Mohamed Atta as a terrorist one year before the attacks on New York and Washington. But they have been unable to find the chart or other evidence that it existed. On Thursday, four intelligence officials provided the first extensive briefing for reporters on the outcome of their interviews with people associated with Able Danger and their review of documents. They said they interviewed at least 80 people over a three-week period and found three, besides Philpott and Shaffer, who said they remember seeing a chart that either mentioned Atta by name as an al-Qaida operative or showed his photograph. Four of the five recalled a chart with a pre-9/11 photo of Atta; the other person recalled only a reference to his name. The intelligence officials said they consider the five people to be credible but their recollections are still unverified. Navy Cmdr. Christopher Chope, of the Center for Special Operations at U.S. Special Operations Command, said there were "negative indications" that anyone ever ordered the destruction of Able Danger documents, other than the materials that were routinely required to be destroyed under existing regulations.
U.S. intelligence officials had several warnings that terrorists might attack the United States on its home soil -- even using airplanes as weapons -- well before the September 11, 2001 attacks, two congressional committees said in a report. In 1998, U.S. intelligence had information that a group of unidentified Arabs planned to fly an explosives-laden airplane into the World Trade Center, according to a joint inquiry of the House and Senate intelligence committees. However, the Federal Aviation Administration found the plot "highly unlikely given the state of that foreign country's aviation program," and believed a flight originating outside the United States would be detected before it reached its target inside the country, the report said. "The FBI's New York office took no action on the information," it said. Another alert came just a month before the attacks, the report said, when the CIA sent a message to the FAA warning of a possible hijacking "or an act of sabotage against a commercial airliner." The information was linked to a group of Pakistanis based in South America. That warning did not mention using an airliner as a weapon and, the report said, "there was apparently little, if any, effort by intelligence community analysts to produce any strategic assessments of terrorists using aircraft as weapons."
Note: For many unanswered questions about the official account of 9/11 asked by highly-respected professors and officials, click here and here.
This summer, Saudi Arabia promised the Trump administration $100 million for American efforts to stabilize areas in Syria. That money landed in American accounts on Tuesday, the same day that Secretary of State Mike Pompeo landed in the Saudi capital, Riyadh, for discussions with the kingdom’s leaders about the fate of a missing Saudi dissident. The timing of the money’s arrival raised eyebrows even among some of the bureaucrats whose programs will benefit from the influx of cash. “The timing of this is no coincidence,” said an American official involved in Syria policy who spoke on condition of anonymity. The disappearance of the Saudi journalist, Jamal Khashoggi, has battered the image of Saudi Arabia and of its powerful crown prince, Mohammed bin Salman, a key player in many of the Trump administration’s ambitions for the Middle East. Turkish officials say that Mr. Khashoggi was slain inside the Saudi consulate in Istanbul by Saudi agents on Oct. 2 while he was trying to secure a document he needed to get married. Saudi leaders have denied harming Mr. Khashoggi, but have not provided a credible explanation of what happened to him. Mr. Trump threatened “severe punishment” if it was confirmed that Saudi Arabia killed Mr. Khashoggi. But after speaking with King Salman of Saudi Arabia on Monday, he suggested that “rogue killers” could have been responsible and dispatched Mr. Pompeo to Riyadh to see the Saudi king.
Note: There is much more than meets the eye on this Khashoggi case. Read this fascinating article for a taste. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the manipulation of public perception.
The Trump administration held secret meetings with rebellious military officers from Venezuela over the last year to discuss their plans to overthrow President Nicolás Maduro. One of the Venezuelan military commanders involved in the secret talks ... is on the American government’s own sanctions list of corrupt officials in Venezuela. He and other members of the Venezuelan security apparatus have been accused by Washington of a wide range of serious crimes, including torturing critics, jailing hundreds of political prisoners, wounding thousands of civilians, trafficking drugs and collaborating with the Revolutionary Armed Forces of Colombia, or FARC, which is considered a terrorist organization by the United States. In a series of covert meetings ... the military officers told the American government that they represented a few hundred members of the armed forces who had soured on Mr. Maduro’s authoritarianism. The officers asked the United States to supply them with encrypted radios, citing the need to communicate securely, as they developed a plan to install a transitional government. American officials did not provide material support, and the plans unraveled after a recent crackdown that led to the arrest of dozens of the plotters. On Feb. 1, Rex W. Tillerson ... delivered a speech in which he said the United States had not “advocated for regime change or removal of President Maduro.” Yet, responding to a question afterward, Mr. Tillerson raised the potential for a military coup.
Note: The US has a long history of supporting coups and human rights abuses in Latin America. The Western Hemisphere Institute for Security Cooperation, formerly known as the School of the Americas, graduated more than 500 human rights abusers. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
An American doctor and Naval reserve officer who has done extensive medical evaluation of a high-profile prisoner who was tortured under the supervision of Gina Haspel privately urged Sen. Mark Warner, the vice chair of the Senate Intelligence Committee, to oppose Haspel’s confirmation as CIA director. “I have evaluated Mr. Abdal Rahim al-Nashiri, as well as close to 20 other men who were tortured” in U.S. custody, including several who were tortured “as part of the CIA’s RDI [Rendition, Detention, and Interrogation] program. I am one of the only health professionals he has ever talked to about his torture,” Dr. Sondra Crosby, a professor ... at Boston University, wrote to Warner’s legislative director. “He is irreversibly damaged by torture that was unusually cruel. In my over 20 years of experience treating torture victims from around the world, including Syria, Iraq, and the Democratic Republic of Congo, Mr. al-Nashiri presents as one of the most severely traumatized individuals I have ever seen.” Nashiri was ... “rendered” to Afghanistan by the CIA and eventually taken to the Cat’s Eye prison in Thailand that was run by Haspel from October to December 2002. On Monday, The Intercept reported that a ... classified memo compiled by the [Senate Intelligence Committee] and aimed at examining Haspel’s full involvement with torture and destruction of evidence was removed from the Senate. It was supposed to be housed in a secure facility inside Congress, so senators and their staff could read it.
Note: The above article contains graphic descriptions of torture overseen and then covered up by Gina Haspel. Another article, by a former CIA counterterrorism officer who was imprisoned for blowing the whistle on the CIA torture, referred to Haspel's actions as "war crimes, crimes against humanity". For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Ecuador has cut Julian Assange’s communications with the outside world from its London embassy, where the founder of the whistleblowing WikiLeaks website has been living for nearly six years. The Ecuadorian government said in statement that it had acted because Assange had breached “a written commitment made to the government at the end of 2017 not to issue messages that might interfere with other states”. The move came after Assange tweeted on Monday challenging Britain’s accusation that Russia was responsible for the nerve agent poisoning of a Russian former double agent and his daughter in the English city of Salisbury earlier this month. Ecuador previously cut Assange’s internet access in the embassy in October 2016 over fears he was using it to interfere in the US presidential election following Wikileaks’ publication of leaked emails from the Democratic National Committee (DNC) and Hillary Clinton’s campaign adviser, John Podesta. In May 2017 the Ecuadorian president, Lenin Moreno, again asked Assange to refrain from commenting on Spain’s dispute with the separatist region of Catalonia. Assange had tweeted that Madrid was guilty of “repression”. As part of a subsequent agreement between Assange and the Ecuadorian government, he is not permitted to send any messages that could interfere with Ecuador’s relations with other countries.
Note: Despite the "legal limbo" and propaganda campaign carried out against Assange and Wikileaks, Assange was recently granted Ecuadorian citizenship. A 2016 United Nations panel found that authorities in Sweden and the UK have acted unlawfully with regard to Assange. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Mysterious metal towers are popping up at local tunnels, and soon they’ll start appearing at bridges, too. But even people on the MTA board in charge of the towers can’t say why they’re being used or what’s in them. It’s a $100 million MTA project shrouded in secrecy, with 18 of them for tunnels and bridges. So what are they exactly? The MTA’s man in charge of the bridges and tunnels, Cedrick Fulton, dodged Carlin’s questions Wednesday. “I said no comment,” he said. Some MTA board members, including New York City Transportation Commissioner Polly Trottenberg, say they know too little about the towers - even with half the money already spent and some of the towers already up. “A lot of the board members felt they didn’t have all the details they would have wanted, myself included,” she said. Residents suspect there is much more going on in the towers than meets the eye and wonder if they’ll ever really know what’s going on inside of them. CBS2 demanded answers from MTA Chairman Joe Lhota. Carlin: “Some of your own board members say they don’t know the specifics.” Lhota: “The base of these new pieces that are going up include whatever fiber optics are necessary for those Homeland Security items.” In other words, anti-terror technology. Could that one day include facial recognition? We don’t know and Lhota won’t say. “I’m not at liberty to discuss that,” he told Carlin. Lhota said all necessary Homeland Security technology remains in place at all crossings, even the ones that don’t have the new towers yet.
Note: See video of these strange new towers containing secret Homeland Security technology at the link above. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy.
Senators, spies and a president spent years in a pitched battle over how the history is told of one of the most controversial chapters of America’s campaign against terrorism, the detention and interrogation of prisoners in secret C.I.A. jails. Congressional officials said on Friday that the [Trump] administration had begun returning to Congress copies of a 6,700-page Senate report from 2014 about the C.I.A. program. The move raises the possibility that most of the copies could be locked in Senate vaults indefinitely or even destroyed. The classified report [tells] the story of how ... the C.I.A. began capturing terrorism suspects and interrogating them ... beyond the reach of the American judicial and military legal systems. The central conclusion of the report is that the spy agency’s interrogation methods - including waterboarding, sleep deprivation and other kinds of torture - were far more brutal and less effective than the C.I.A. described to policy makers, Congress and the public. The Senate Intelligence Committee, which was run by Democrats when the executive summary was released, sent copies of the entire report to at least eight federal agencies, asking that they incorporate it into their records — a move that would have made the documents subject to requests under the Freedom of Information Act. The agencies all refused to add the report to their records, and instead kept their copies locked up, prompting the American Civil Liberties Union to sue the C.I.A. for access to the full report.
Note: See a revealing New York Times article listing seven key points from this torture report. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
The days leading up to last Friday’s release of director Oliver Stone’s Snowden looked like one long movie trailer. The American Civil Liberties Union ... announced a campaign to win a presidential pardon for Edward Snowden, the former National Security Agency contract employee who leaked hundreds of thousands of its highly classified documents. The next day, the House Intelligence Committee released a bipartisan letter to the president that advised him against any pardon. The week before, Stone had invited me to a private screening of his movie, [along with] a small group of former government employees who were whistleblowers before Snowden – and paid a high price for it. The reason they had been persecuted is that U.S. law makes no distinction between revealing illegal government activity to the press about eavesdropping on Americans or engaging in torture, and betraying the country by passing secrets for money or ideology to foreign governments. The Espionage Act was enacted nearly a century ago following World War One, and has already been amended several times. One key issue confronting the next president ... is whether the law needs to be amended again – this time to separate the whistleblowers from the spies. Today ... the battle lines have been drawn between those in government – both the executive branch and Congress – who view the theft of government secrets as espionage, regardless of the motive, and those in civil-liberties groups and the media who see motive as a critical distinction.
Note: The above was written by James Bamford, whistleblower and author of "The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America." For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
A specialist unit created by the British domestic counterintelligence and security agency MI5 to “get inside the heads” of terrorists has helped foil seven attacks in the past year. The Behavioural Science Unit at Thames House, the headquarters of MI5 [establishes] whether people flagged as potential threats are "talkers" or "walkers" - those who simply boast or those who are preparing to act. Research by MI5 shows that more than 60 per cent of so-called lone wolves unwittingly provide clues that they are preparing to strike. The BSU’s work involves picking up signs of such changing behaviour. Neil, an Arabic and Norwegian speaker who has worked for the unit for six years, said ... his team is passed intelligence by officers that is gleaned from a network of informants and the public. The BSU then looks for signs of unusual activity. The BSU team pays close attention to “lone-actor” terrorists. The number of experts working in the BSU, which was created in 2004, has more than doubled since ... 2013. “We deal with probabilities and that is the nature of our work,” said Neil, [adding that] some of those they profiled lied to themselves about their intention and the ultimate aim was to persuade them to abandon their radical ideology. He said the assumption that many extremists had mental health problems was wrong. “Only 2 per cent of members of terrorist organisations suffer from mental health problems, compared with an average of up to 30 per cent of members of the public,” Neil said.
Note: See the full text of this article on this webpage. If this article is accurate, MI5 is using very different tactics than those used by the FBI to fight the war on terror.
For the first time, a federal judge is letting a civil lawsuit proceed against two CIA contract psychologists who designed and supervised brutal interrogation tactics that critics called torture. The ruling allows two former CIA detainees and the family of another who died in agency custody to try to win damages in federal court for the abuse they suffered at then-secret CIA prisons in the early 2000s. According to the lawsuit and a Senate Intelligence Committee report, the mistreatment included waterboarding, sleep deprivation, confinement in small boxes, rectal feeding and beatings. As the lawsuit progresses, it may shed more light on the so-called enhanced interrogation techniques that the CIA used in an effort to collect intelligence ... after the Sept. 11, 2001, attacks. “It’s unprecedented,” [said] Dror Ladin, the American Civil Liberties Union attorney who argued the plaintiffs' case in court. “No CIA torture victim has ever taken this step toward accountability. Every previous lawsuit has been shut down before this stage. “It gives our clients a chance to ... finally get some justice,” he said. The Department of Justice had blocked previous lawsuits aimed at the CIA's now-barred detention and interrogation program on grounds that any case could reveal secrets and compromise national security. That changed after the Senate Intelligence Committee released a report in December 2014 that exposed details about the program, including the role played by [psychologists Bruce] Jessen and [James E.] Mitchell.
Note: Read more in this ACLU article. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
Canada's electronic spy agency broke privacy laws by sharing information about Canadians with foreign partners, a federal watchdog said Thursday. Commissioner Jean-Pierre Plouffe said in his annual report that the Communications Security Establishment passed along information known as metadata to counterparts in the United States, Britain, Australia and New Zealand. Metadata is information associated with a communication, such as a telephone number or email address, but not the message itself. The communications agency intercepts and analyzes foreign communications for intelligence information of interest to the federal government. The agency is legally authorized to collect and analyze metadata churning through cyberspace. Plouffe, who keeps an eye on the highly secretive agency, said he found that it lacks clarity regarding the sharing of certain types of metadata. Defense Minister Harjit Sajjan said the sharing won't resume until he is satisfied that the proper protections are in place. Plouffe's report noted that certain metadata was not being properly minimized, or rendered unidentifiable, prior to being shared. The CSE's failure to strip out certain Canadian identity information violated the National Defense Act and therefore the federal Privacy Act as well. Privacy advocates have stressed that metadata is far from innocuous since it can reveal a great deal about a person's online behavior and interactions.
Note: Many countries do not allow their intelligence agencies to spy on their own citizens without going through a legal process. The easy way around this that has been used for decades is to simply getting the information from a friendly country. So if the CIA wants information on you in the US, they can't spy directly, but they can ask the UK to do so and pass the information to them and thus get around the laws. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The Navy’s SEAL Team 6 ... best known for killing Osama bin Laden, has been transformed by more than a decade of combat into a global manhunting machine. That role reflects America’s new way of war, in which conflict is distinguished ... by the relentless killing of suspected militants. While fighting grinding wars of attrition in Afghanistan and Iraq, Team 6 ... joined Central Intelligence Agency operatives in an initiative called the Omega Program, which offered greater latitude in hunting adversaries. Team 6 has successfully carried out thousands of dangerous raids that military leaders credit with weakening militant networks, but its activities have also spurred recurring concerns. Afghan villagers and a British commander accused SEALs of indiscriminately killing men in one hamlet; in 2009, team members joined C.I.A. and Afghan paramilitary forces in a raid that left a group of youths dead and inflamed tensions between Afghan and NATO officials. When suspicions have been raised about misconduct, outside oversight has been limited. “This is an area where Congress notoriously doesn’t want to know too much,” said Harold Koh, the State Department’s former top legal adviser. Like the C.I.A.’s campaign of drone strikes, Special Operations missions offer policy makers an alternative to costly wars of occupation. But the bulwark of secrecy around Team 6 makes it impossible to fully assess its record and the consequences of its actions, including civilian casualties or the deep resentment inside the countries where its members operate.
Note: Drone strikes almost always miss their intended targets. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing news articles about military corruption and high level manipulation of mass media.
James Risen, who won the Pulitzer Prize in 2005 for exposing the NSA warrantless eavesdropping program, has [been] threatened with prison by the Obama Justice Department. [This] is almost certainly the vindictive by-product of the U.S. government’s anger over his NSA reporting. He has published a new book on the War on Terror entitled Pay Any Price: Greed, Power and Endless War. Risen's [critique] is one of the first to offer large amounts of original reporting on ... a particular part of the War on Terror, namely the way in which economic motives, what [he] calls the Homeland Security Industrial Complex, has driven a huge part of the war. GLENN GREENWALD: How much of this economic motive is the cause of the fact that we’ve now been at war for 13 years? RISEN: It plays a really central role. After so many years there’s ... a post-9/11 mercenary class that’s developed that have invested. Not just people who are making money, but people who are in the government. Their status and their power within the government are invested in continuing the war. There’s very little debate about whether to continue the war. When Dick Cheney said, “the gloves come off,” ... that really meant, “We’re going to deregulate national security, and we’re going to take off all the rules that were imposed in the ’70s after Watergate.” That was just a dramatic change. It’s been extended to this whole new homeland security apparatus. People think that terrorism is an existential threat, even though it’s not, and so they’re willing to go along with all this.
Note: The complete interview at the link above provides details of James Risen's fight to preserve journalistic integrity against a corrupted government's attempts to manipulate the news. For more on Risen's deeply revealing investigation of the Homeland Security Industrial Complex, see this recent NPR interview.
A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security. National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the Russian government. The hacked software is used to control ... oil and gas pipelines, power transmission grids, water distribution and filtration systems, wind turbines and even some nuclear plants. The hacking campaign has been ongoing since 2011, but no attempt has been made to activate the malware. DHS sources ... fear that the Russians have torn a page from the old, Cold War playbook, and have placed the malware in key U.S. systems as a threat, and/or as a deterrent to a U.S. cyber-attack on Russian systems. The hack became known to insiders last week when a DHS alert bulletin was issued. The bulletin said the “BlackEnergy” penetration recently had been detected by several companies. DHS said “BlackEnergy” is the same malware that was used ... to target NATO and some energy and telecommunications companies. The hacked software is very advanced. It allows designated workers to control various industrial processes through the computer, an iPad or a smart phone, sources said.
Note: For an example of a computer-based attack on industrial infrastructure, read how a malware called Stuxnet targeted Iranian nuclear facilities. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Former intelligence contractor Edward Snowden responded to questions from The Washington Post following the release of an e-mail he had sent while working for the National Security Agency. Q: How do you respond to today’s NSA statement and the release of your email with the Office of General Counsel? A: The NSA’s new discovery of written contact between me and its lawyers - after more than a year of denying any such contact existed - raises serious concerns. It reveals as false the NSA’s claim ... that “after extensive investigation, including interviews with his former NSA supervisors and co-workers, we have not found any evidence to support Mr. Snowden’s contention that he brought these matters to anyone’s attention.” Today’s release is incomplete, and does not include my correspondence with the Signals Intelligence Directorate’s Office of Compliance. [But] whether my disclosures were justified does not depend on whether I raised these concerns previously. That’s because the system is designed to ensure that even the most valid concerns are suppressed and ignored, not acted upon. The fact that two powerful Democratic Senators - Ron Wyden and Mark Udall - knew of mass surveillance that they believed was abusive and felt constrained [not] to do anything about it underscores how futile such internal action is -- and will remain -- until these processes are reformed. Still, the fact is that I did raise such concerns both verbally and in writing, and on multiple, continuing occasions - as I have always said.
Note: For more on the Snowden case, see the deeply revealing reports from reliable major media sources available here.
The widespread surveillance of Spanish citizens by the US National Security Agency, which caused outrage when it was reported this week, was the product of a collaboration with Spain's intelligence services, according to one Spanish newspaper. Spanish agents not only knew about the work of the NSA but also facilitated it, El Mundo reports. An NSA document entitled "Sharing computer network operations cryptologic information with foreign partners" reportedly shows how the US relies on the collaboration of many countries to give it access to intelligence information, including electronic metadata. According to the document seen by El Mundo, the US classifies cooperation with various countries on four different levels. In the first group – "Comprehensive Cooperation" – are the UK, Australia, Canada and New Zealand. The second group – "Focused Cooperation" – of which Spain is a member, includes 19 countries, all of them European, apart from Japan and South Korea. The third group – "Limited cooperation" – consists of countries such as France, Israel, India and Pakistan; while the fourth – "Exceptional Cooperation" – is made up of countries that the US considers to be hostile to its interests. The NSA documents [suggest] the Spanish intelligence services were working hand in hand with the NSA, as were other foreign agencies. But if there was any doubt as to who held the upper hand, the NSA documents make clear that any collaboration was always to serve the needs of protecting American interests.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
The shooter behind the deadly massacre at the Sikh Temple of Wisconsin [on August 5, 2012] has been identified as 40-year-old Wade Michael Page. Page previously served in the U.S. military, but was no longer on active duty. Page enlisted in the Army in April 1992 and was given a less-than-honorable discharge in October 1998. He was last stationed in Fort Bragg, N.C., serving in the psychological operations unit. Authorities said Page strode into the temple carrying a 9mm handgun and multiple magazines of ammunition and opened fire without saying a word. When the shooting at the Sikh Temple of Wisconsin in suburban Milwaukee ended, six victims ranging in age from 39 to 84 years old lay dead. Three others were critically wounded. The suspect was shot and killed by police. Page joined the military in Milwaukee in 1992 and was a repairman for the Hawk missile system before switching jobs to become one of the Army’s psychological operations specialists assigned to a battalion at Fort Bragg, N.C. As a psyops specialist, Page would have trained to host public meetings between locals and American forces, use leaflet campaigns in a conflict zone or use loudspeakers to communicate with enemy soldiers. He never deployed overseas while serving in that role, Pentagon spokesman George Wright said. The FBI was leading the investigation because the shooting was considered domestic terrorism, or an attack that originated inside the U.S. The agency said it had no reason to believe anyone other than Page was involved. The shooting also came two weeks after a gunman killed 12 people at movie theater in Colorado.
Note: For more on US military and intelligence agency mind control programs and the creation of assassins ("Manchurian Candidates"), click here.
The Pentagon is planning to ramp up its spying operations against high-priority targets such as Iran under an intelligence reorganization aimed at expanding on the military’s espionage efforts beyond war zones. The newly created Defense Clandestine Service would work closely with the CIA ... in an effort to bolster espionage operations overseas at a time when the missions of the agency and the military increasingly converge. Defense Secretary Leon E. Panetta, who signed off on the newly created service last week, served as CIA director at a time when the agency relied extensively on military hardware, including armed drones. Michael Vickers, the undersecretary of defense for intelligence and the main force behind the changes, is best known as one of the architects of the CIA’s program to arm Islamist militants to oust the Soviets from Afghanistan in the 1980s. He is also a former member of U.S. Special Operations forces. Despite the potentially provocative name for the new service, the official played down concerns that the Pentagon was seeking to usurp the role of the CIA or its National Clandestine Service. The new service fits into a broader convergence trend. U.S. Special Operations forces are increasingly engaged in intelligence collection overseas and have collaborated with the CIA on missions. The blurring is also evident in the organizations’ upper ranks. Panetta previously served as CIA director.
Note: For lots more from major media sources on the activities of government intelligence agencies, click here.
Since September, at least 60 people have died in 14 reported CIA drone strikes in Pakistan’s tribal regions. The Obama administration has named only one of the dead, hailing the elimination of Janbaz Zadran, a top official in the Haqqani insurgent network, as a counterterrorism victory. The identities of the rest remain classified, as does the existence of the drone program itself. The administration ... has parried reports of collateral damage and the alleged killing of innocents by saying that drones, with their surveillance capabilities and precision missiles, result in far fewer mistakes than less sophisticated weapons. Yet in carrying out hundreds of strikes over three years — resulting in an estimated 1,350 to 2,250 deaths in Pakistan — it has provided virtually no details to support those assertions. The rapid expansion in the size and scope of the drone campaign as the U.S. wars in Iraq and Afghanistan have been winding down has led to increased criticism from human rights and international law experts, many of whom dispute the legal justification for the program. Much of the resistance to increased disclosure has come from the CIA, which has argued that the release of any information about the program, particularly on how targets are chosen and strikes approved, would aid the enemy. The Defense Department’s Joint Special Operations Command (JSOC), which has carried out strikes in Yemen and Somalia, refuses to discuss drones or any other aspect of its secret counterterrorism operations.
Note: For key reports from major media sources on government secrecy, click here.
Buried in FBI laboratory reports about the anthrax mail attacks that killed five people in 2001 are data suggesting that a chemical may have been added to try to heighten the powder's potency, a move that some experts say exceeded the expertise of the presumed killer. The lab data, contained in more than 9,000 pages of files that emerged a year after the Justice Department closed its inquiry and condemned the late Army microbiologist Bruce Ivins as the perpetrator, shows unusual levels of silicon and tin in anthrax powder from two of the five letters. Those elements are found in compounds that could be used to weaponize the anthrax, enabling the lethal spores to float easily so they could be readily inhaled by the intended victims, scientists say. The existence of the silicon-tin chemical signature offered investigators the possibility of tracing purchases of the more than 100 such chemical products available before the attacks, which might have produced hard evidence against Ivins or led the agency to the real culprit. But the FBI lab reports released in late February give no hint that bureau agents tried to find the buyers of additives such as tin-catalyzed silicone polymers. The apparent failure of the FBI to pursue this avenue of investigation raises the ominous possibility that the killer is still on the loose.
Note: For key articles from reliable sources on government corruption, click here.
Doctors and psychologists the CIA employed to monitor its "enhanced interrogation" of terror suspects came close to, and may even have committed, unlawful human experimentation, a medical ethics watchdog has alleged. Physicians for Human Rights (PHR), a not-for-profit group that has investigated the role of medical personnel in alleged incidents of torture at Guantánamo, Abu Ghraib, Bagram and other US detention sites, accuses doctors of being far more involved than hitherto understood. PHR says health professionals participated at every stage in the development, implementation and legal justification of what it calls the CIA's secret "torture programme". The most incendiary accusation of PHR's latest report, Aiding Torture, is that doctors actively monitored the CIA's interrogation techniques with a view to determining their effectiveness, using detainees as human subjects without their consent. The report concludes that such data gathering was "a practice that approaches unlawful experimentation". Human experimentation without consent has been prohibited in any setting since 1947 [with] the Nuremberg Code, which resulted from the prosecution of Nazi doctors. In April, a leaked report from the International Committee of the Red Cross found that medical staff employed by the CIA had been present during waterboarding, and had even used what appeared to be a pulse oxymeter, placed on the prisoner's finger to monitor his oxygen saturation during the procedure. PHR is calling for an official investigation into the role of doctors in the CIA's now widely discredited programme. It wants to know exactly how many doctors participated, what they did, what records they kept and the science that they applied.
Note: To watch a video of a Democracy Now! segment on the PHR report, click here. For astounding information on how MDs participated in the CIA's mind control experiments in the past, click here.
U.S. military defense lawyers for accused 9/11 conspirator Ramzi bin al Shibh cannot learn what interrogation techniques CIA agents used on the Yemeni before he was moved to Guantánamo to be tried as a terrorist, an Army judge has ruled. Bin al Shibh, 37, is one of five men charged in a complex death penalty prosecution by military commission currently under review by the Obama administration. But his lawyers say he suffers a "delusional disorder," and hallucinations in his cell at Guantánamo may leave him neither sane enough to act as his own attorney nor to stand trial. Prison camp doctors treat him with psychotropic drugs. Army Col. Stephen Henley, the military judge on the case, has scheduled a competency hearing for mid-September. Meantime, the judge ruled on Aug. 6 that "evidence of specific techniques employed by various governmental agencies to interrogate the accused is . . . not essential to a fair resolution of the incompetence determination hearing in this case." Prosecutors had invoked a national security privilege in seeking to shield the details from defense lawyers. Many of the techniques used on the men have already been made public. They included waterboarding, sleep deprivation and sexual humiliation methods meant to break a captive's will. But Navy Cmdr. Suzanne Lachelier, the Yemeni's Pentagon appointed defense attorney, said court-approved mental health experts -- as well as the judge -- need to know the specifics to assess her client's mental illness. If he suffers post-traumatic stress disorder as a result of his CIA interrogations, there may be PTSD treatments that could make him competent.
Note: For many reports from reliable sources on the hidden realities of "the war on terror," click here.
The Bush administration said yesterday that it plans to start using the nation's most advanced spy technology for domestic purposes soon, rebuffing challenges by House Democrats over the idea's legal authority. Homeland Security Secretary Michael Chertoff said his department will activate his department's new domestic satellite surveillance office in stages, starting as soon as possible. Sophisticated overhead sensor data will be used for law enforcement once privacy and civil rights concerns are resolved, he said. His statements marked a fresh determination to operate the department's new National Applications Office. But Congress delayed launch of the new office last October. Critics cited its potential to expand the role of military assets in domestic law enforcement, to turn new or as-yet-undeveloped technologies against Americans without adequate public debate, and to divert the existing civilian and scientific focus of some satellite work to security uses. Democrats say Chertoff has not spelled out what federal laws govern the NAO, whose funding and size are classified. Congress barred Homeland Security from funding the office until its investigators could review the office's operating procedures and safeguards. The department submitted answers on Thursday, but some lawmakers promptly said the response was inadequate. [Rep. Bennie G. Thompson (D-Miss.), chairman of the House Homeland Security Committee] said, "We still don't know whether the NAO will pass constitutional muster since no legal framework has been provided."
Note: For many more revealing stories on threats to civil liberties, click here.
Today, more than 23,000 representatives of private industry are working quietly with the FBI and the Department of Homeland Security. The members of this rapidly growing group, called InfraGard, receive secret warnings of terrorist threats before the public does -- and, at least on one occasion, before elected officials. In return, they provide information to the government, which alarms the ACLU. But there may be more to it than that. One business executive, who showed me his InfraGard card, told me they have permission to "shoot to kill"ť in the event of martial law. In November 2001, InfraGard had around 1,700 members. As of late January, InfraGard had 23,682 members, according to its website, www.infragard.net, which adds that "350 of our nation's Fortune 500 have a representative in InfraGard."ť FBI Director Robert Mueller addressed an InfraGard convention on August 9, 2005. He urged InfraGard members to contact the FBI if they "note suspicious activity or an unusual event." And he said they could sic the FBI on "disgruntled employees who will use knowledge gained on the job against their employers."ť
Note: We don't normally use Common Dreams as a news source, but as this news is so important and the major media failed to report it, we decided to include this article here. For a revealing report by the ACLU on this key topic, click here. For important reports from major media sources on threats to civil liberties, click here.
U.S. intelligence officials are [now claiming] that popular Internet services that enable computer users to adopt cartoon-like personas in three-dimensional online spaces also are creating security vulnerabilities by opening novel ways ... to move money, organize and conduct corporate espionage. Over the last few years, "virtual worlds" such as Second Life and other role-playing games have become home to millions of computer-generated personas known as avatars. By directing their avatars, people can take on alternate personalities, socialize, explore and earn and spend money across uncharted online landscapes. Nascent economies have sprung to life in these 3-D worlds, complete with currency, banks and shopping malls. Corporations and government agencies have opened animated virtual offices, and a growing number of organizations hold meetings where avatars gather and converse in newly minted conference centers. Intelligence officials ... say they're convinced that the qualities that many computer users find so attractive about virtual worlds -- including anonymity, global access and the expanded ability to make financial transfers outside normal channels -- have turned them into seedbeds for transnational threats. The government's growing concern seems likely to make virtual worlds the next battlefield in the struggle over the proper limits on the government's quest to [expand] data collection and analysis and the surveillance of commercial computer systems. Virtual worlds could also become an actual battlefield. The intelligence community has begun contemplating how to use Second Life and other such communities as platforms for cyber weapons.
An investigation into the illicit sale of American nuclear secrets was compromised by a senior official in the State Department, a former FBI employee has claimed. The official is said to have tipped off a foreign contact about a bogus CIA company used to investigate the sale of nuclear secrets. The firm, Brewster Jennings & Associates, was a front for Valerie Plame, the former CIA agent. Her public outing two years later in 2003 by White House officials became a cause célčbre. The claims that a State Department official blew the investigation into a nuclear smuggling ring have been made by Sibel Edmonds, 38, a former Turkish language translator in the FBI’s Washington field office. Plame, then 38, was the ... wife of a former US ambassador, Joe Wilson. She travelled widely for her work, often claiming to be an oil consultant. In fact she was a career CIA agent who was part of a small team investigating the same procurement network that the State Department official is alleged to have aided. Brewster Jennings was one of a number of covert enterprises set up to infiltrate the nuclear ring. [Edmonds said the State Department official] "found out about the arrangement . . . and he contacted one of the foreign targets and said . . . you need to stay away from Brewster Jennings because they are a cover for the government.“ Phillip Giraldi, a former CIA officer, said: “It’s pretty clear Plame was targeting the Turks. If indeed that [State Department] official was working with the Turks to violate US law on nuclear exports, it would have been in his interest to alert them to the fact that this woman’s company was affiliated to the CIA. I don’t know if that’s treason legally but many people would consider it to be.”
Note: To read former CIA agent Philip Giraldi's analysis of Edmonds' claims, in which he identifies the unnamed State Department official as Marc Grossman, click here. And to read an interview with Edmonds on the series of articles about her revelations appearing in the Sunday Times and media censorship elsewhere, click here.
Bradblog has been chasing the story about former FBI translator Sibel Edmonds' offer to 'tell all.' [Daniel] Ellsberg says: "I'd say what she has is far more explosive than the Pentagon Papers. From what [Edmonds] has to tell, it has a major difference from the Pentagon Papers in that it deals directly with criminal activity and may involve impeachable offenses. And I don't necessarily mean the President or the Vice-President, though I wouldn't be surprised if the information reached up that high. But other members of the Executive Branch may be impeached as well. There will be phone calls going out to the media saying 'don't even think of touching [Edmonds' case], you will be prosecuted for violating national security.'" [Edmonds] said: "The media called from Japan and France and Belgium and Germany and Canada and from all over the world. I'm getting contact from all over the world, but not from here." More Ellsberg: "I am confident that there is conversation inside the Government as to 'How do we deal with Sibel?' The first line of defense is to ensure that she doesn't get into the media. I think any outlet that thought of using her materials would go to the government and they would be told 'don't touch this, it's communications intelligence.' As long as they hold a united front on this, they don't run the risk of being shamed." [Edmonds:] "I will name the name of major publications who know the story, and have been sitting on it --- almost a year and a half." "How do you know they have the story?," we asked. "I know they have it because people from the FBI have come in and given it to them. They've given them the documents and specific case-numbers on my case."
Note: Though this is not from one of our normal reliable sources, Dan Ellsberg is a highly respected whistleblower who has received an abundance of major media coverage over the years. As the mainstream media are clearly and consciously ignoring this story, we felt it deserved to be posted, even though we don't have a major media source to back it up. For lots more reliable information on this courageous woman, click here.
Five reporters must reveal their government sources for stories they wrote about Steven J. Hatfill and investigators' suspicions that the former Army scientist was behind the deadly anthrax attacks of 2001, a federal judge ruled. The ruling is a victory for Hatfill, a bioterrorism expert who has argued in a civil suit that the government violated his privacy rights and ruined his chances at a job by unfairly leaking information about the probe. He has not been charged in the attacks that killed five people and sickened 17 others, and he has denied wrongdoing. Hatfill's suit, filed in 2003, accuses the government of waging a "coordinated smear campaign." To succeed, Hatfill and his attorneys have been seeking the identities of FBI and Justice Department officials who disclosed disparaging information about him to the media. In lengthy depositions in the case, reporters have identified 100 instances when Justice or FBI sources provided them with information about the investigation of Hatfill and the techniques used to probe his possible role in anthrax-laced mailings. But the reporters have refused to name the individuals. In 2002, then-Attorney General John D. Ashcroft called Hatfill, who had formerly worked at the Army's infectious diseases lab in Fort Detrick in Frederick County, a "person of interest" in the anthrax case. Authorities have not made any arrests in the investigation. Hatfill's search for government leakers is "strikingly similar" to the civil suit filed by Wen Ho Lee, a nuclear scientist who became the subject of a flurry of media stories identifying him as a chief suspect in a nuclear-secrets spy case. Those stories also relied on anonymous sources. Lee was never charged with espionage.
Note: For more reliable information about the anthrax attacks that followed closely after 9/11 and the mysterious deaths of over a dozen renowned microbiologists shortly thereafter, click here.
Airlines and aviation-related companies sued the CIA and the FBI on Tuesday to force terrorism investigators to tell whether the aviation industry was to blame for the Sept. 11 attacks. The two lawsuits in U.S. District Court in Manhattan sought court orders for depositions as the aviation entities build their defenses against lawsuits seeking billions of dollars in damages for injuries, fatalities, property damage and business losses related to Sept. 11, 2001. The aviation companies said the agencies in a series of boilerplate letters had refused to let them depose two secret agents, including the 2001 head of the CIA's special Osama bin Laden unit, and six FBI agents with key information about al-Qaida and bin Laden. The [plaintiffs] said they were entitled to present evidence to show the terrorist attacks did not depend upon negligence by any aviation defendants and that there were other causes of the attacks. In the CIA lawsuit, companies ... asked to interview the deputy chief of the CIA's bin Laden unit in 2001 and an FBI agent assigned to the unit at that time. The names of both are secret. In the FBI lawsuit, the companies asked to interview five former and current FBI employees who had participated in investigations of al-Qaida and al-Qaida operatives before and after Sept. 11. Those individuals included Coleen M. Rowley, the former top FBI lawyer in its Minneapolis office, who sent a scathing letter to FBI Director Robert S. Mueller in May 2002 complaining that a supervisor in Washington interfered with the Minnesota investigation of Zacarias Moussaoui weeks before the Sept. 11 attacks. Requests to interview the agents were rejected as not sufficiently explained, burdensome or protected by investigative or attorney-client privilege, the lawsuits said.
Note: For a concise summary of reliable, verifiable information on the 9/11 coverup, click here.
President Bush set broad legal boundaries for the CIA's harsh interrogation of terrorism suspects yesterday, allowing the intelligence agency to resume a program that was suspended last year after criticism that it violated U.S. and international law. In an executive order lacking any details about actual interrogation techniques, Bush said the CIA program will now comply with a Geneva Conventions prohibition against "outrages upon personal dignity, in particular humiliating and degrading treatment." Two administration officials said that suspects now in U.S. custody could be moved immediately into the "enhanced interrogation" program and subjected to techniques that go beyond those allowed by the U.S. military. Rights activists criticized Bush's order for failing to spell out which techniques are now approved or prohibited. "All the order really does is to have the president say, 'Everything in that other document that I'm not showing you is legal -- trust me,' " said Tom Malinowski of Human Rights Watch. The CIA interrogation guidelines are contained in a classified document. A senior intelligence official, asked whether this list includes such widely criticized methods as the simulated drowning known as "waterboarding," declined to discuss specifics but said "it would be very wrong to assume that the program of the past would move into the future unchanged." CIA detainees have also alleged they were left naked in cells for prolonged periods, subjected to sensory and sleep deprivation and extreme heat and cold, and sexually taunted. A senior administration official briefing reporters yesterday said that any future use of "extremes of heat and cold" would be subject to a "reasonable interpretation . . . we're not talking about forcibly induced hypothermia."
An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.
Fifty years ago, Eric Gow had a baffling and unexplained experience. As a 19-year-old sailor, he remembers going to a clandestine military establishment, where he was given something to drink in a sherry glass and experienced vivid hallucinations. Other servicemen also remember tripping: one thought he was seeing tigers jumping out of a wall, while another recalls faces "with eyes running down their cheeks, Salvador Dalí-style". Mr Gow and another serviceman had volunteered to take part in what they thought was research to find a cure for the common cold. Mr Gow felt that the government had never explained what happened to him. But now he has received an official admission for the first time, confirmed last night, that the intelligence agency MI6 tested LSD on servicemen. One of the scientists involved at the time suggested that the experiments were stopped because it was feared that the acid could produce "suicidal tendencies". MI6, known formally as the Secret Intelligence Service (SIS) and responsible for spying operations abroad, carried out the tests in the cold war in an attempt to uncover a "truth drug" which would make prisoners talk against their will in interrogations. In parallel experiments, the CIA infamously tested LSD and other drugs on unwitting human subjects in a 20-year search to uncover mind-manipulation techniques. The trials were widely criticised when they came to light in the 1970s.
Note: For key reports from major media sources on CIA experimentation on unwitting subjects, click here.
The FBI never adequately investigated complaints by a fired contract linguist who alleged shoddy work and possible espionage inside the bureau's translator program, although evidence and witnesses supported her, the Justice Department's senior oversight official said yesterday. The bureau's response to complaints by former translator Sibel Edmonds was "significantly flawed," Inspector General Glenn Fine said in a report that summarized a lengthy classified investigation into how the FBI handled the case. Fine said Edmonds's contentions "raised substantial questions and were supported by various pieces of evidence." "The report substantiated the most serious of Sibel's allegations and demonstrates that the FBI owes Sibel an apology and compensation for its unlawful firing of her rather than hiding behind its false cloak of national security," said Mark Zaid, her lawyer.
Note: Ms. Edmonds deeply revealing allegations are laid out clearly in an open letter to 9/11 Commission Chairman Thomas Kean available at http://www.WantToKnow.info/sibeledmonds.
When Nicholas Berg took an Oklahoma bus to a remote college campus a few years ago, the American recently beheaded by terrorists allowed a man with terrorist connections to use his laptop computer, according to his father. Michael Berg said the FBI investigated the matter more than a year ago. He stressed that his son was in no way connected to the terrorists who captured and killed him. Government sources told CNN that the encounter involved an acquaintance of Zacarias Moussaoui -- the only person publicly charged in the United States in connection with the September 11, 2001, terror attacks. According to Berg, his son was taking a course a few years ago at a remote campus of the University of Oklahoma near an airport. He described how on one particular day, his son met "some terrorist people -- who no one knew were terrorists at the time." At one point during the bus ride, Berg said, the man sitting next to his son asked if he could use Nick's laptop computer. Government sources said Berg gave the man his password, which was later used by Moussaoui, the sources said. The sources said the man who used Berg's e-mail knew Moussaoui. But the sources would not disclose details of how the men were connected.
Note: Other major media articles have pointed out a number of other strange "coincidences" connecting the man allegedgly beheaded and those accused of involvement in 9/11. How can that be? For lots more, click here.
First Star Wars. Now Star Gate. That is the real code name ... of a secret program that spent $20 million in the past 10 years to employ psychics in pursuit of the unknown. What the Pentagon's ultra-secret Defense Intelligence Agency [DIA] hoped it might get from the paranormal was a real advantage in the world of military intelligence. Last week ... the CIA (which spent $750,000 on psychic research from 1972 to 1977) determined that the program was a waste of money and moved to shut it down. Congress had ordered the agency to take over Star Gate last year and conduct a study of its effectiveness. "There's no documented evidence it had any value to the intelligence community," says David Goslin, of the American Institute for Research, which the CIA hired to do the study. So the three full-time psychics still operating on a $500,000-a-year budget out of Fort Meade, Maryland, will soon close up shop. At least a few powerful Senators on the Appropriations Committee will miss them. Senators Daniel Inouye and Robert Byrd, intrigued by stories of psychic successes, pushed hard during many years to keep Star Gate going. Tales of the effectiveness of psychics as spies have long been circulated. DIA credited psychics with creating accurate pictures of Soviet submarine construction hidden from U.S. spy satellites, and a 1993 Pentagon report said psychics had correctly drawn 20 tunnels being built in North Korea near the demilitarized zone.
Note: Though this article largely debunks remote viewing, it does reveal some key facts. Before 1995 the government consistently denied such a program ever existed. Former participants in remote viewing programs, many of them respected scientists, have spoken openly about their involvement. Many of these scientists believe that the program was not shut down, but rather all civilians were terminated from the program in order to take it to a higher level of secrecy. For an excellent 50-minute video on this program, click here.
Britain's spy agencies will reveal its knowledge of alleged Westminster-related child abuse at a public inquiry amid concerns it aided in an establishment cover-up. MI5, MI6 and GCHQ have given their "full cooperation" with the Independent Inquiry into Child Sexual Abuse, lead counsel Andrew O'Connor QC told a preliminary hearing on Tuesday. Some of the evidence the agencies will give may be heard in private due to national security reasons. All three agencies have already provided files and documents relevant to its investigation into the alleged failure to pursue and prosecute child abusers in Whitehall and parliament. Parliamentary whips have also provided documents and archives to determine its involvement in the suspected cover-up. Mr O’Connor said a number of other notorious cases linked to Westminster - including those of the late former MPs, Cyril Smith, a Liberal, and Victor Montagu and Peter Morrison, both Conservatives - will be investigated. Further allegations ... are also expected to be explored. Allegations stemming from claims that police officers were "warned off" investigating cases of child sex abuse committed by senior politicians and other establishment figures in the 1960s, 70s and 80s will be looked at. The inquiry will also examine why the high ranking diplomat Peter Hayman, who died in 1992, escaped prosecution for sending obscene material through the post. The allegations against Hayman, who is believed to have been an MI6 official, were made public under parliamentary privilege in 1981.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and sexual abuse scandals.
The Trump Administration has now indicted at least five journalists’ sources in less than two years’ time—a pace that, if maintained through the end of Trump’s term, would obliterate the already-record number of leakers and whistleblowers prosecuted under eight years of the Obama administration. The latest case, which broke on Wednesday, shows the administration taking advantage of a new avenue to go after a potential whistleblower. Instead of using the archaic Espionage Act - the 100-year-old law meant for spies, not sources - prosecutors are pursuing the latest alleged leaker using financial laws. A senior Treasury official named Natalie Mayflower Sours Edwards has been arrested and charged ... for allegedly sharing “Suspicious Activity Reports” (SARs) about financial red flags with a news organization and its journalist for a series of stories related to the Russia investigation in 2017 and 2018. The complaint contains an interesting allegation, albeit one buried in a footnote: Edwards, according to prosecutors, told investigators she considered herself a “whistleblower.” The government also admitted she had filed a whistleblower complaint within her agency and had talked to Congressional staffers about the issue as well. The Justice Department reportedly has dozens of other [leak] investigations open, and we don’t know who will be next.
Note: This leak prosecution follows the sentencing of Reality Winner to five years in prison for providing evidence of high-level interference in a US election to the media. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the manipulation of public perception.
The U.S. government can monitor journalists under a foreign intelligence law that allows invasive spying and operates outside the traditional court system, according to newly released documents. Targeting members of the press under the law, known as the Foreign Intelligence Surveillance Act, requires approval from the Justice Department’s highest-ranking officials. Prior to the release of these documents, little was known about the use of FISA court orders against journalists. Previous attention had been focused on the use of National Security Letters against members of the press; the letters are administrative orders with which the FBI can obtain certain ... records without a judge’s oversight. FISA court orders can authorize much more invasive searches and collection, including the content of communications, and do so through hearings conducted in secret and outside the sort of ... judicial process that allows journalists and other targets of regular criminal warrants to eventually challenge their validity. The rules apply to media entities or journalists who are thought to be agents of a foreign government, or ... possess foreign intelligence information. “There’s a lack of clarity on the circumstances when the government might consider a journalist an agent of a foreign power,” said [Knight Institute staff attorney Ramya] Krishnan. “Think about WikiLeaks; the government has said they are an intelligence operation.”
Note: In its latest instruction manual for federal prosecutors, the US Justice Department removed a subsection titled “Need for Free Press and Public Trial”. For more along these lines, see concise summaries of deeply revealing news articles on judicial system corruption and the erosion of civil liberties.
Edward Snowden has no regrets five years on from leaking the biggest cache of top-secret documents in history. He is wanted by the US. He is in exile in Russia. But he is satisfied with the way his revelations of mass surveillance have rocked governments, intelligence agencies and major internet companies. What has happened in the five years since? The most important change, he said, was public awareness. “The government and corporate sector preyed on our ignorance. But now we know. People are aware now. People are still powerless to stop it but we are trying. The revelations made the fight more even.” He said he had no regrets. His own life is uncertain, perhaps now more than ever, he said. His sanctuary in Russia depends on the whims of the Putin government, and the US and UK intelligence agencies have not forgiven him. For them, the issue is as raw as ever. One of the disclosures to have most impact was around the extent of collaboration between the intelligence agencies and internet companies. In 2013, the US companies were outsmarting the EU in negotiations over data protection. Snowden landed like a bomb in the middle of the negotiations and the data protection law that took effect last month is a consequence. But he will not be marking the anniversary with a “victory lap”. There is still much to be done. “The fightback is just beginning,” said Snowden. “The governments and the corporates have been in this game a long time and we are just getting started.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
When it comes to torture, no American officials have been more practiced in those heinous dark arts than the officers and employees of the Central Intelligence Agency who applied it to terrorism suspects after 9/11. Few American officials were so directly involved in that frenzy of abuse ... as Gina Haspel. On Tuesday, in announcing that he had dismissed Rex Tillerson as secretary of state and was replacing him with Mike Pompeo, the C.I.A. director, Mr. Trump said that Mr. Pompeo’s successor would be his deputy, Ms. Haspel. As an undercover C.I.A. officer, Ms. Haspel played a direct role in the agency’s “extraordinary rendition program,” under which suspected militants were ... were tortured by agency personnel. Ms. Haspel ran the first detention site in Thailand and oversaw the brutal interrogation of the Abd al-Rahim al-Nashiri. The sessions were videotaped and the recordings stored in a safe at the C.I.A. station in Thailand until they were ordered destroyed in 2005. Ms. Haspel’s name was on the cable with the destruction orders. In 2013, these activities were of such concern that Senator Dianne Feinstein of California ... blocked Ms. Haspel’s promotion to be head of the agency’s clandestine service. Senator John McCain ... a former prisoner of war, insisted that during the confirmation process, Ms. Haspel must “explain the nature and extent of her involvement” in the interrogation program.
Note: Read the thoughts of a former CIA counterterrorism officer on the dangers of this appointment. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
More than 50 years after President John F. Kennedy was slain in full view of the world, the final government documents about his death are set for release. The documents are among the last of still-secret papers the government amassed on the assassination. Some grand jury and tax documents will remain secret. The JFK Records Act passed in 1992. The law mandated the government release the remaining files to the public and gave it 25 years to do so. October 26, 2017 ... is the deadline for full release. The National Archives said government agencies had deemed files covered by the act prior to its passage too sensitive for release. They run the gamut from FBI to CIA materials and all manner of documents said to pertain to investigations into Kennedy's death. The Archives said the full collection ... spans millions of documents. Many files have been released about the Kennedy assassination over the years, including some in redacted form. Barring a waiver from the President, the obscured text will be revealed. The full release of the documents would mark the end of a decades-long struggle for researchers to get a hold of all available information. A Gallup poll in 2013 showed 61% of respondents said more than one person was involved in the shooting and some pointed to the Mafia, the government, the CIA, Cuba and others as playing a role.
Note: An October 21 AFP article reported that Trump said he intends to allow these files to be released as planned. Many are unaware that an official report from 1979 by the U.S. House of Representatives stated: "The committee believes, on the basis of the evidence available to it, that President John F. Kennedy was probably assassinated as a result of a conspiracy." For more along these lines, see concise summaries of deeply revealing Kennedy assassination news articles from reliable major media sources.
I’m a taxi driver from Karachi, in Pakistan. Fifteen years ago I was sold for a bounty and taken by the U.S. military to a secret prison in Afghanistan. They mistook me for someone called Hassan Gul, and I was tortured for over a year before they flew me to Guantanamo. There’s no disputing this—it’s in the U.S. Senate report on torture. I’ve been held here ever since then, without charge or trial. I’ve been through a lot - but a new punitive medical regime at this prison might finally kill me. In May 2013, without any way of defending myself or securing my freedom, I resorted to peaceful protest, and began a hunger strike. On September 20, things abruptly changed. A new senior medical officer (SMO) arrived, bringing in a new Trump administration policy of refusing to tube-feed anyone on hunger strike. They apparently don’t mind if people die because of the injustice here, because they figure nobody cares about Guantanámo anymore, and nobody will notice. I’ve lost more weight than ever before - I’m well under 100 pounds - but they have stopped bringing anyone to check my vitals, weigh me, or force-feed me. They want this peaceful protest over. So they refuse us access to medical care. The doctors here do what the new medical boss tells them. He wants me to beg him for food, but I will not. He is like a dictator. They tell me it’s my fault if I die. But all I am asking for is basic justice - a fair trial or freedom. I am innocent, but I’m not allowed to prove it. I don't want to die, but they will not succeed in breaking my strike.
Note: The horrific treatment of Guantánamo Bay detainees is well documented. For more, read about the 10 Craziest Things in the Senate Report on Torture and many other questionable intelligence agency practices.
Last week, Trump blocked Rex Tillerson from hiring Elliott Abrams as his deputy at the State Department after someone brought to his attention critical comments he had made during the campaign. That happened despite a job interview that had gone well. Last night, Robert Harward turned down Trump’s offer to replace Michael Flynn as national security adviser. One key factor in Harward's decision to turn down the job was that he couldn't get a guarantee that he could select his own staff. Specifically ... Harward wanted commitments that the National Security Council would be fully in charge of security matters, not Trump's political advisers. Just yesterday, Secretary of State Rex Tillerson’s enforcers at the State Department laid off staff at Foggy Bottom while the secretary traveled in Europe. Much of seventh-floor staff, who work for the Deputy Secretary of State for Management and Resources and the Counselor offices, were told ... that their services were no longer needed. These staffers in particular are often the conduit between the secretary’s office to the country bureaus, where the regional expertise is centered. Inside the State Department, some officials fear that this is a politically-minded purge that cuts out much-needed expertise from the policy-making, rather than simply reorganizing the bureaucracy. Ambassador Kristie Kenney, the Counselor of the State Department and one of the last remaining senior officials, was [also] informed that she will be let go. Also noteworthy: Not a single State Department official was included in the White House meetings with Israeli Prime Minister Benjamin Netanyahu this week.
Note: While simple politics or government corruption may be responsible for this high-level reshuffling, this video interview with former CIA agent Robert David Steele suggests there is much more going on behind the scenes.
Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days. A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate. The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO). The exploits are not run-of-the-mill tools to target everyday individuals. They are expensive software used to take over firewalls, such as Cisco and Fortinet, that are used “in the largest and most critical commercial, educational and government agencies around the world,” said [former TAO operator] Blake Darche. Some former agency employees suspect that the leak was the result of a mistake by an NSA operator, rather than a successful hack by a foreign government of the agency’s infrastructure. It is not unprecedented for a TAO operator to accidentally upload a large file of tools ... one of the former employees said. “What’s unprecedented is to not realize you made a mistake,” he said. “You would recognize, ‘Oops, I uploaded that set’ and delete it.” Critics of the NSA have suspected that the agency, when it discovers a software vulnerability, frequently does not disclose it, thereby putting at risk the cybersecurity of anyone using that product.
Note: Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
WikiLeaks published the DNC’s hacked emails. There has been a flurry of accusations – including from the Hillary Clinton campaign – that Russian president Vladimir Putin orchestrated both the hack and the leak, in an attempt to help Donald Trump win the presidency. It’s amazing how quickly the media are willing to forgo any skepticism and jump to conspiracy-tinged conclusions where Putin is involved. There is some circumstantial evidence that the hack may have originated in Russia, but there are also many questions that haven’t been resolved. As Adam Johnson detailed, when you look closely, the evidence is shoddy and often contradictory. The bulk of the “evidence” has come from the statements of cybersecurity firms FireEye and Crowdstrike, both of which have lucrative contracts with the US government. As FireEye’s CEO once made clear, his company has a financial stake in nation-state hacking tensions. As Edward Snowden pointed out ... with an accompanying NSA document, “Our government specifically authorized the hacking of political parties.” The US has also considered hacking and then releasing sensitive and embarrassing information in China in retaliation for cybersecurity attacks, as the New York Times reported last year. If the US wants to place blame at the feet of the Russians, they should do so transparently and in public, without leaving it to anonymous officials and cybersecurity firms to make claims without providing hard evidence.
Note: Wikileaks published thousands of documents which exposed significant elections corruption in the US. Why is the media glossing over this to focus so heavily on Russia?
President Obama will become the first sitting U.S. president to visit Hiroshima, the Japanese city that the United States nearly destroyed with a nuclear bomb in 1945. While the bombing ... killed as many as 150,000 people, Obama is not expected to apologize during his visit. After more than 70 years, why not apologize for Hiroshima? Countries in general do not apologize for violence against other countries. What else has America not apologized for? Here are a few ideas. During the Vietnam War, the United States sprayed about 12 million gallons of Agent Orange, a herbicide, over areas of Vietnam, Cambodia and Laos. About 1 million people were disabled or suffered health problems because of contact with the herbicide. There has been no apology for this or for other controversies of the war. In 1953, democratically elected Iranian Prime Minister Mohammed Mossadegh was overthrown in a coup [that] was carried out under CIA direction ... with the aid of the British Secret Intelligence Service. The United States and Britain have never apologized for [this], with the Obama administration recently stating that it had no plans to. The United States is also widely suspected of involvement in a bloody 1973 coup that ousted socialist Chilean President Salvador Allende in 1973 and put dictator Augusto Pinochet in control. In 1977, Brady Tyson, deputy leader of the U.S. delegation to the U.N. Human Rights Commission in Geneva, did ... offer an apology for the U.S. involvement in the coup, but he was quickly disavowed by the State Department.
Note: Read a detailed description of how the New York Times suppressed and skewed the facts about the effects of the atomic bomb in order to forward the war-profiteering agenda. Although CIA involvement in the Iranian coup and the Pentagon's prolonged support for the Pinochet regime's torturers are now well-known, the intelligence community remains unapologetically corrupt.
More than 50 intelligence analysts at Centcom have formally complained that reports on the Islamic State and the Nusra Front — Al Qaeda's Syria branch — have been repeatedly altered by senior intelligence officials to fit with the Obama administration's insistence that the US is winning the war against the two militant groups. Former CIA deputy director Michael Morell explained on "CBS This Morning" how serious these allegations are. "One of the key aspects of the policymaking process in the United States is that analysts get to say what they think ... if there is truth that somebody has been meddling with their analysis, I think somebody needs to lose their job over it." A written complaint was sent in July by two Centcom senior analysts to the Department of Defense Inspector General. Eleven individuals knowledgeable about the details of the complaint [say] crucial parts of intelligence reports were taken out, analysts were subject to an environment in which they did not feel able to give a candid assessment of the situation in Iraq and Syria, and sometimes reports seen as being too negative were sent back to analysts. One source alleges that when [analysts] brought concerns to Centcom leadership, they were urged to retire, and some agreed to leave. In late July, the Associated Press reported that assessments by the CIA, the Defense Intelligence Agency, and others found that the Islamic State, also known as ISIS or ISIL, is no weaker than it was when US bombing began in 2014.
Note: For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources. Then explore an in-depth essay documenting the covert origins of Isis and other international terrorist organizations.
A treason investigation into two journalists who reported that the German state planned to increase online surveillance has been suspended by the country’s prosecutor general following protests by leading voices across politics and media. Harald Range, Germany’s prosecutor general, said on Friday he was halting the investigation “for the good of press and media freedom”. It was the first time in more than half a century that journalists in Germany had faced charges of treason. His announcement followed a deluge of criticism and accusations that Germany’s prosecutor had “misplaced priorities”, having failed to investigate with any conviction the NSA spying scandal revealed by whistleblower Edward Snowden, and targeting instead the two investigative journalists, Markus Beckedahl and Andre Meister. The two reporters made reference to what is believed to be a genuine intelligence report that had been classified as confidential, which proposed establishing a new intelligence department to monitor the internet, in particular social media networks. Beckedahl hit out at the prosecutor’s investigation against him on Friday on the state broadcaster Deutschlandfunk, calling it “absurd” and suggesting it was meant as a general warning to scare sources from speaking to journalists. Much of the German media called the decision an attack on the freedom of the press.
Note: The NSA recently got caught spying on German reporters, possibly as a favor to the German government. For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
The US National Security Agency (NSA) spied on French Presidents Jacques Chirac, Nicolas Sarkozy and Francois Hollande in 2006-12, Wikileaks says [citing] "top secret intelligence reports and technical documents" from the NSA. A file dated 2010 suggests that French officials were aware that the US was spying upon them and intended to complain about it. According to the summary of an intercepted exchange, the French envoy to Washington ... discussed Mr Sarkozy's plan to express his "frustration" over US unwillingness to sign a "bilateral intelligence co-operation agreement". "The main sticking point is the US desire to continue spying on France," the intercept says. [One analyst commented] "Of course they know that spying goes on – even between friends. But the cardinal rule is not to get found out. When you do, you must expect the full force of diplomatic outrage." In response to the alleged leaks, National Security Council spokesman Ned Price said: "As a general matter, we do not conduct any foreign intelligence surveillance activities unless there is a specific and validated national security purpose. This applies to ordinary citizens and world leaders alike." In 2013 Brazilian media reported that NSA documents showed the agency had also spied on Brazilian President Dilma Rousseff and President Enrique Pena Nieto of Mexico. [Also] in 2013 the NSA was accused of spying on German Chancellor Angela Merkel. German media later reported that Germany's national intelligence agency had spied on ... the EU's headquarters on behalf of the US.
Note: The claim of a "threat to national security" is widely used both to perpetrate and to cover up huge amounts of illegal behavior. For more along these lines, see concise summaries of deeply revealing news articles on secrecy excesses from reliable major media sources.
The CIA can keep secret a nearly 7,000-page Senate report on harsh interrogation methods, as well as an internal agency review. The complete 6,963-page report compiled by the Senate Select Committee on Intelligence [is] exempt from the dictates of the Freedom of Information Act, U.S. District Judge James E. Boasberg concluded. The Senate committee report, he reasoned, remained a document under congressional control, and Congress made sure to exempt itself from FOIA. “Congress has undoubted authority to keep its records secret, authority rooted in the Constitution, longstanding practice, and current congressional rules,” Boasberg stated. Hina Shamsi, director of the ACLU National Security Project, voiced disappointment in the ruling. The Senate committee released a summary of the $40 million report last December, following years of back-and-forth.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
The Twins Plus Go-Go Lounge ... had an unusual distinction: David Polos, an official with the Drug Enforcement Administration in New York City, and Glen Glover, a civilian D.E.A. employee, each had ownership interests and actively participated in its management. That secret connection was revealed when the two men were charged with lying during national security background checks about their ownership interests and their work in the strip club. Mr. Polos, 51, had been with the agency for more than 20 years. He helped supervise the New York Organized Crime and Drug Enforcement Strike Force, a multiagency group that targets large narcotics traffickers. Polos ... resigned from the agency last month. Glen Glover, 45, of Lyndhurst, N.J., also a longtime agency employee, worked as a telecommunications specialist. Each man was charged with one count of making false statements. The men had claimed that they had no employment outside the agency, when in fact they had ownership interests in the lounge, and actively managed it while working for the D.E.A.. The two men had worked regular shifts running the club, hiring and firing dancers, bouncers and other employees, arranging for advertising and using a video surveillance system to remotely monitor activities inside the club by smartphone or computer. Mr. Polos used his status as a law enforcement officer to facilitate the club’s operations. At times, he told people in the club that he was working for the F.B.I.
Note: Award-winning journalists have presented powerful evidence of direct DEA and CIA involvement in and support of drug running and drug cartels. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
1971: A group of ordinary citizens broke into an FBI office in Media, Pennsylvania. What they discovered shocked them. Long before Edward Snowden’s revelations about NSA surveillance, these activist-burglars exposed COINTELPRO, the FBI’s illegal surveillance program that involved the intimidation of law-abiding Americans. For forty years the burglars kept their identities secret, but in Johanna Hamilton’s new film 1971, these previously anonymous Americans publicly tell their story for the first time. Hamilton took the time to talk to us about how she approached telling this story: "To me, every aspect of the story was compelling. A group of ordinary people who put everything on the line to protect freedom of speech and hold their government accountable. They were total outsiders who trained themselves for one night of amateur burglary in order to break into an FBI office — on a hunch! They manage to evade capture. The revelations from the break-in helped lead to the Church Committee hearings in Congress, which ended up establishing the first ever set of guidelines governing the FBI’s investigative powers. The Citizens’ Commission risked everything because they suspected the government was conducting illegal surveillance. And they were right. We are in the midst of the same discussion today. Post 9/11 we lost many of the checks and balances that the government normally operates under. Governments should not spy on law-abiding citizens — whether it’s Hoover’s FBI or today’s NSA."
Note: Watch this incredible documentary free on this webpage. For more along these lines, read about COINTELPRO and many other intrusive manipulations by corrupt intelligence agencies.
John Oliver’s Monday night interview of Edward Snowden ... renewed all the standard attacks in Democratic circles accusing Snowden of being a traitor in cahoots with the Kremlin. What’s most striking about this — aside from the utter lack of evidence for any of it — is how identical it is to what Nixon officials said to smear the last generation’s greatest whistleblower, Daniel Ellsberg. I defy anyone to listen to any Democratic apparatchik insinuate that Snowden is a Russian agent and identify any differences with how Nixon apparatchiks smeared Ellsberg (or, for that matter, how today’s warnings from Obama officials about the grave harm coming from leaks differ from the warnings issued by Bush and Nixon officials). The script for smearing never changes. One of the most illustrative examples of this: an April 1967 New York Times editorial harshly chastising Martin Luther King for his anti-war activism. That editorial was published three days after King’s speech on the Vietnam War at the Riverside Church in New York City, which ... denounced the U.S. government as “the greatest purveyor of violence in the world today,” as well as the leading exponent of “the deadly Western arrogance that has poisoned the international atmosphere for so long.” The attack of the NYT editors on King for that speech is ... identical to how anti-war advocates in the U.S. are maligned today [by] Washington smear merchants.
Note: The media smear campaign against Dr. Martin Luther King was followed by his government-sponsored assassination, as a 1999 trial in Memphis, TN ultimately revealed. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the manipulation of mass media.
Terror suspects held by the CIA were interrogated on the British owned island of Diego Garcia despite the repeated denials of London and Washington that any such incidents took place, a senior American official said today. Lawrence Wilkerson, who was the chief aide to former US Secretary of State Colin Powell, said the remote UK-administered military base in the Indian Ocean was used as a back-up location for “nefarious activities”, such as the questioning of prisoners in the wake of the 9/11 attacks. In an interview with the Vice News website, Mr Wilkerson said that Diego Garcia did not host a permanent CIA prison but was used as a back-up location to conduct interrogations. Mr Wilkerson, 70, who served as chief of staff to Mr Powell throughout the Iraq war, said he had not learnt of the CIA’s alleged use of Diego Garcia until after he stepped down in 2005. He said that on the basis of his own experience while serving on the island in the 1980s and information from his sources, he believed it to be unlikely that any interrogations could have happened without the knowledge of British liaison staff who are in command of the base. The former Prime Minister Tony Blair and Foreign Secretary Jack Straw have previously denied any use of the coral atoll for rendition. It was reported last year by Al Jazeera that the Senate Intelligence Committee report, which provided an account of torture by the CIA, would confirm Diego Garcia was used for rendition “with the full co-operation of the UK”. When the document was published the locations of black sites had been redacted.
Note: Diego Garcia has been known to be a center for the CIA's nefarious activities for years. This newspaper article shows how the torture was sometimes done on military "prison ships" near the island to keep it hidden from the people there.
NPR’s David Folkenflik has a revealing new look at ... one of the most important journalistic stories of the last decade: The New York Times‘ 2004 decision ... to suppress for 15 months (through Bush’s re-election) its reporters’ discovery that the NSA was illegally eavesdropping on Americans without warrants. This episode was one significant reason Edward Snowden purposely excluded the Times from his massive trove of documents. In an interview with Folkenflik, the paper’s new executive editor, Dean Baquet, describes the paper’s exclusion from the Snowden story as “really painful.” But ... Baquet has his own checkered history in suppressing plainly newsworthy stories at the government’s request, including a particularly inexcusable 2007 decision, when he was the managing editor of The Los Angeles Times, to kill a story based on AT&T whistleblower Mark Klein’s revelations that the NSA had built secret rooms at AT&T to siphon massive amounts of domestic telephone traffic. In his NPR interview, Baquet insists that he has had a serious change of heart on such questions as a result of the last year of NSA revelations: "[Baquet] says the experience has proved that news executives are often unduly deferential to seemingly authoritative warnings unaccompanied by hard evidence." Dean Baquet’s epiphany about the U.S. government and the American media ... is long overdue, but better late than never. Let us hope that it signals an actual change in behavior.
Note: For more on this, see concise summaries of deeply revealing media corruption news articles from reliable major media sources.
Statements made by NSA whistleblower Edward Snowden regarding the 9/11 terror attacks were edited out of his NBC Nightly News interview with Brian Williams ... in what appears to be an attempt to bolster legitimacy for the agency’s controversial surveillance programs. Snowden’s comments surrounding the failure of dragnet surveillance in stopping the 9/11 attacks were censored from the prime time broadcast and instead buried in an hour long clip on NBC’s website. "The CIA knew who these guys were. The problem was not that we weren’t collecting information, it wasn’t that we didn’t have enough dots, it wasn’t that we didn’t have a haystack, it was that we did not understand the haystack that we had.” NBC’s decision to bury Snowden’s comments are unsurprising given the fact that the 9/11 attacks are exhaustively used by the federal government as the prime justification for surveilling millions of innocent Americans. Snowden remarked on the government’s prior knowledge of the accused Boston bombers as well, also cut from the prime time interview. ‘We’re missing things like the Boston Marathon bombings where all of these mass-surveillance systems, every domestic dragnet in the world, didn’t reveal guys that the Russian intelligence service told us about by name,” Snowden said. Despite ... government officials pointing to 9/11 foreknowledge, whether missed or ignored, establishment media outlets have continually worked to keep such voices out of relevant reporting.
Note: We've never used globalresearch.ca as a top source respected by the general public, but as none of the major media is covering this critical information, we are making an exception here. For more on the Snowden case, see the deeply revealing reports from reliable major media sources available here.
To have a genuinely constructive debate, data must be compiled, evidence must be amassed and verifiable truths must be presented. This truism is particularly significant when it comes to debates about security and liberty. Without facts, we get the counterproductive discourse we are being treated to right now - the one hijacked by National Security Administration defenders throwing temper tantrums, tossing out fear-mongering platitudes and trying to prevent any scrutiny of the agency. Tune into a national news program and you inevitably will hear pundits who have spent the last decade mindlessly cheering on wars and warrantless wiretapping now echoing the talking points emanating from surveillance-state apparatchiks like Reps. Mike Rogers, R-Mich., and Dutch Ruppersberger, D-Md. This week, these two lawmakers, who head the House Intelligence Committee, summarized all the bluster in a press release that should be enshrined for posterity. In an attempt to defend the NSA, the bipartisan duo breathlessly claimed that whistle-blower Edward Snowden ended up "endangering each and every American" by exposing the government's mass surveillance (i.e., metadata) programs. They indicted Snowden's patriotism and said his disclosures of the NSA's unlawful and unconstitutional programs "aligned him with our enemy." But the facts now leaking out of the government's national security apparatus are doing the opposite. They are debunking - rather than confirming - the NSA defenders' platitudes.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
The Senate Intelligence Committee has asked the C.I.A. for an internal study done by the agency that lawmakers believe is broadly critical of the C.I.A.’s detention and interrogation program but was withheld from congressional oversight committees. The committee’s request comes in the midst of a yearlong battle with the C.I.A. over the release of the panel’s own exhaustive report about the program, one of the most controversial policies of the post-Sept. 11 era. The Senate report, totaling more than 6,000 pages, was completed last December but has yet to be declassified. According to people who have read the study, it is unsparing in its criticism of the now-defunct interrogation program and presents a chronicle of C.I.A. officials’ repeatedly misleading the White House, Congress and the public about the value of brutal methods that, in the end, produced little valuable intelligence. Senator Mark Udall, Democrat of Colorado, disclosed the existence of the internal C.I.A. report during an Intelligence Committee hearing on Tuesday. He said he believed it was begun several years ago and “is consistent with the Intelligence’s Committee’s report” although it “conflicts with the official C.I.A. response to the committee’s report.” “If this is true,” Mr. Udall said ... “this raises fundamental questions about why a review the C.I.A. conducted internally years ago — and never provided to the committee — is so different from the C.I.A.’s formal response to the committee study.”
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Europe’s human rights court shone a rare public light [December 3] on the secret network of European prisons that the CIA used to interrogate terrorism suspects, reviving questions about the “extraordinary renditions” that angered many on this continent. At [the] hearing, attorneys for two terrorism suspects currently held by the United States at Guantanamo Bay, Cuba, accused Poland of human rights abuses. The lawyers say the suspects fell victim to the CIA’s rendition program, in which terrorism suspects were kidnapped and transferred to third countries; they allege that the two were tortured in a remote Polish prison. All the prisons were closed by May 2006. Interrogations at sea have replaced CIA “black sites” as the U.S. government’s preferred method for holding terrorism suspects and questioning them without access to lawyers. One of the cases heard [concerns] 48-year-old Saudi national Abd al-Rahim al-Nashiri, who faces U.S. terrorism charges for allegedly orchestrating the al-Qaeda attack on the USS Cole in 2000, a bombing in the Yemeni port of Aden that killed 17 sailors. The second case involves 42-year-old Abu Zubaida, a Palestinian also held in Guantanamo who has never been charged with a crime. Both men say they were brought in December 2002 to Poland, where they were detained and subjected to harsh questioning at a Polish military installation in Stare Kiejkuty, a village in the country’s remote northeast. There they were subject to mock executions, waterboarding and other tortures, including being told their families would be arrested and sexually abused, said Amrit Singh, a lawyer representing Nashiri.
Note: For more on war crimes by the US and UK in the "global war on terror", see the deeply revealing reports from reliable major media sources available here.
Sharp disagreement over the future of the Guantanamo Bay detention camp dominated the first Senate hearing on the issue in four years. The meeting [on July 24] of a Senate Judiciary Committee subcommittee, held in the wake of a high-profile hunger strike by inmates ... made clear that deep partisan divisions remain over whether keeping the prison open is a threat to national security or a necessity. Opened at a U.S. Navy base in Cuba in the months after the Sept. 11, 2001, terrorist attack, Guantanamo was established by President George W. Bush to hold detainees suspected of connections to global terrorism organizations. Allegations of abuse and torture of inmates have led to repeated calls for Guantanamo's closure, and Obama has campaigned twice on the issue, though Congress has passed repeated measures to keep the prison open. Sen. Richard J. Durbin (D-Ill.), who is chairman of the panel, urged Congress to support Obama's efforts, which would end the indefinite detention of prisoners without trial and either release them or charge them in American courts. "The risk of keeping it open far outranks the risk of closing it." Retired Army Maj. Gen. Paul D. Eaton, who trained the Iraqi armed forces from 2003 to 2004, testified that by continuing to violate human rights and American law, the practices at Guantanamo proved more harmful to the U.S. national security interests. "Guantanamo is a terrorist-creating organization," he said to a reporter after the hearing. "It's a terrific recruiting tool."
Note: Whether or not detainees were truly terrorists before they were imprisoned at Guantanamo, how do you think they feel about the US government after years there? You have to wonder if this isn't being done to create terrorists, just as many prisons become training grounds for criminals.
This Reuters article ... purports to summarize an interview I gave to the daily newspaper La Nacion of Argentina. Like everything in the matter of these NSA leaks, this interview is being wildly distorted to attract attention away from the revelations themselves. I made three points in this La Nacion interview, all of which are true: 1) The oft-repeated claim that Snowden's intent is to harm the US is completely negated by the reality that he has all sorts of documents that could quickly and seriously harm the US if disclosed, yet he has published none of those. When he gave us the documents he provided, he repeatedly insisted that we exercise rigorous journalistic judgment in deciding which documents should be published in the public interest and which ones should be concealed on the ground that the harm of publication outweighs the public value. 2) The US government has acted with wild irrationality. The current criticism of Snowden is that he's in Russia. But the reason he's in Russia isn't that he chose to be there. It's because the US blocked him from leaving: first by revoking his passport (with no due process or trial), then by pressuring its allies to deny airspace rights to any plane they thought might be carrying him to asylum (even one carrying the democratically elected president of a sovereign state), then by bullying small countries out of letting him land for re-fueling. 3) I said that [forcing his plane down] would be completely counter-productive given that ... such an attack could easily result in far more disclosures than allowing us as journalists to vet and responsibly report them, as we've [been] doing.
Note: The above article was written by brave journalist Glenn Greenwald, who broke the Snowden story. For more on the NSA surveillance scandal, see the deeply revealing reports from reliable major media sources available here.
Russian authorities contacted the US government with concerns about Tamerlan Tsarnaev not once but "multiple" times, including an alert it sent after he was first investigated by FBI agents in Boston, raising new questions about whether the FBI should have paid more attention to the suspected Boston Marathon bomber. The FBI has previously said it interviewed Tsarnaev in early 2011 after it was initially contacted by the Russians. Following a closed briefing of the Senate Intelligence Committee Tuesday, Senator Richard Burr, a North Carolina Republican, said he believed that Russia alerted the United States about Tsarnaev in “multiple contacts,” including at least once since October 2011. Warnings raised by Russia have loomed large in the investigation of how Tsarnaev, a Kyrgyzstan national, and his younger brother, Dzhokhar, a naturalized US citizen, allegedly prepared for the bombing. US officials have faced tough questions for not tracking the older brother’s travels to the Russian provinces of Dagestan and Chechnya, where he spent more than half of 2012 and may have interacted with militant groups or individuals. Senator Lindsey Graham, Republican of South Carolina, said ... that the FBI told him it was not aware of the older Tsarnaev’s travels because his name had been misspelled on an airliner passenger list. US Secretary of Homeland Security Janet Napolitano confirmed the misspelling during a hearing before the Senate Judiciary Committee ... but she said Homeland Security nonetheless was aware of his trip.
Note: For powerful evidence from a respected researcher that the uncle of the Boston bombers was a top CIA official, click here.
The U.N. General Assembly overwhelmingly approved the first international treaty regulating the multibillion-dollar global arms trade [on April 2], after a more than decade-long campaign. The final vote: 154 in favor, 3 against and 23 abstentions. "This is a victory for the world's people," U.N. Secretary-General Ban Ki-moon said. "The Arms Trade Treaty will make it more difficult for deadly weapons to be diverted into the illicit market. ... It will be a powerful new tool in our efforts to prevent grave human rights abuses or violations of international humanitarian law." Never before has there been a treaty regulating the global arms trade, which is estimated to be worth $60 billion. Frank Jannuzi, deputy executive director of Amnesty International USA [said,] "The voices of reason triumphed over skeptics, treaty opponents and dealers in death to establish a revolutionary treaty that constitutes a major step toward keeping assault rifles, rocket-propelled grenades and other weapons out of the hands of despots and warlords who use them to kill and maim civilians, recruit child soldiers and commit other serious abuses." What impact the treaty will actually have remains to be seen. It will take effect 90 days after 50 countries ratify it, and a lot will depend on which ones ratify and which ones don't, and how stringently it is implemented. As for its chances of being ratified by the U.S., the powerful National Rifle Association has vehemently opposed it, and it is likely to face stiff resistance from conservatives in the Senate, where it needs two-thirds to win ratification.
In a blow against government secrecy, a federal judge ruled [on March 15] that the tens of thousands of "national security letters" the FBI sends each year demanding customer records from phone companies, banks and others, are unconstitutional because they forbid recipients from revealing that the letters exist. A gag order that makes it a crime to disclose one has received such a letter "restrains ... speech about government conduct" with little opportunity for judicial review, said U.S. District Judge Susan Illston of San Francisco. She directed the FBI to stop issuing national security letters that contain gag orders, but put her ruling on hold during an expected government appeal. Attorney Matt Zimmerman of the Electronic Frontier Foundation, which filed the suit in May 2011 on behalf of an unnamed telecommunications company, said [that] the gag orders "have truncated the public debate on these controversial surveillance tools." The USA Patriot Act, passed in response to the Sept. 11, 2001, terrorist attacks, authorized the FBI to issue national security letters on its own for information that it considers relevant to an investigation of international terrorism or spying. Virtually all of the letters include a permanent gag order. In 2008, a federal appeals court in New York found the gag orders constitutionally defective. Congress amended the law in 2006 to allow recipients to challenge national security letters on constitutional grounds, but left the government with near-total power over the gag orders, Illston said.
Note: For deeply revealing reports from reliable major media sources on illegal activities of intelligence agencies, click here.
The Pentagon sent a US veteran of the "dirty wars" in Central America to oversee sectarian police commando units in Iraq that set up secret detention and torture centres to get information from insurgents. These units conducted some of the worst acts of torture during the US occupation and accelerated the country's descent into full-scale civil war. Colonel James Steele was a 58-year-old retired special forces veteran when he was nominated by Donald Rumsfeld to help organise the paramilitaries in an attempt to quell a Sunni insurgency. After the Pentagon lifted a ban on Shia militias joining the security forces, the Special Police Commando (SPC) membership was increasingly drawn from ... Shia groups such as the Badr brigades. A second special adviser, retired Colonel James H Coffman, worked alongside Steele in detention centres that were set up with millions of dollars of US funding. Coffman reported directly to General David Petraeus, sent to Iraq in June 2004 to organise and train the new Iraqi security forces. Steele, who was in Iraq from 2003 to 2005, and returned to the country in 2006, reported directly to Rumsfeld. The allegations, made by US and Iraqi witnesses in the Guardian/BBC documentary ["James Steele: America's Mystery Man in Iraq"], implicate US advisers for the first time in the human rights abuses committed by the commandos. It is also the first time that Petraeus – who last November was forced to resign as director of the CIA after a sex scandal – has been linked through an adviser to this abuse.
Note: For deeply revealing reports from reliable major media sources on war crimes committed by the US and UK in their post-9/11 wars of aggression, click here.
"The zombies are coming!" the Homeland Security Department says. Tongue firmly in cheek, the government urged citizens ... to prepare for a zombie apocalypse, part of a public health campaign to encourage better preparation for genuine disasters and emergencies. The theory: If you're prepared for a zombie attack, the same preparations will help during a hurricane, pandemic, earthquake or terrorist attack. The federal Centers for Disease Control and Prevention last year first launched a zombie apocalypse social media campaign for the same purposes. Emergency planners were encouraged to use the threat of zombies - the flesh-hungry, walking dead - to encourage citizens to prepare for disasters. A few of the government's suggestions tracked closely with some of the 33 rules for dealing with zombies popularized in the 2009 movie "Zombieland," which included "always carry a change of underwear" and "when in doubt, know your way out."
Note: Very high strangeness...
The National Archives is refusing to release 1,171 classified CIA documents related to the assassination [of President John F. Kennedy] in time for the [50th] anniversary as it had promised. In 2010, deputy archivist Michael Kurtz announced that the secret records would be declassified by November 22, 2013. But the National Archives has since [retracted] that promise in a letter to Jim Lesar of the Assassination Archives and Research Center, who requested the release. [This] frustrates Lesar, whose nonprofit is devoted to collecting and disseminating information about political assassinations. "In 1992, Congress unanimously passed legislation that was designed to get all of the JFK assassination-related records released," he said. "There was supposed to be only a very few records whose release could be postponed for periods of time including up until the year 2017, but basically everything was supposed to be released well before then." Of course, the CIA and National Archives won't say exactly what is contained in the documents, not even the number of pages. "The National Archives does not have a page count, but it appears that there are at least several thousand pages that are still being withheld, and they appear to be on some very important subjects." The CIA and National Archives' intransigence certainly doesn't help deflate the bubble of speculation about what really happened at the Grassy Knoll. It's been 49 years. Most of the people involved are dead. What's to hide, unless the government is shown in an embarrassing or criminal light?
Note: See our excellent information center filled with reliable verifiable information on the John Kennedy assassination at this link. For deeply revealing reports from reliable major media sources on the John Kennedy assassination, click here.
The Air Force has been secretly flying Reaper drones on counterterrorism missions from a remote civilian airport in southern Ethiopia as part of a rapidly expanding U.S.-led proxy war ... in East Africa, U.S. military officials said. The Reapers began flying missions earlier this year over neighboring Somalia. The United States has relied on lethal drone attacks, a burgeoning CIA presence in Mogadishu and small-scale missions carried out by U.S. Special Forces. The Washington Post reported last month that the Obama administration is building a constellation of secret drone bases in the Arabian Peninsula and the Horn of Africa. The location of the Ethiopian base and the fact that it became operational this year, however, have not been previously disclosed. Some bases in the region also have been used to carry out operations ... in Yemen. The U.S. military deploys drones on attack and surveillance missions over Somalia from a number of bases in the region. The Air Force operates a small fleet of Reapers from the Seychelles, a tropical archipelago in the Indian Ocean, about 800 miles from the Somali coast. The U.S. military also operates drones — both armed versions and models used strictly for surveillance — from Djibouti, a tiny African nation that abuts northwest Somalia at the junction of the Red Sea and the Gulf of Aden.
Note: For more from reliable sources on war manipulations and the expanding use of drones worldwide, click here.
In the months before Osama bin Laden was [allegedly] killed, the Central Intelligence Agency ran a phony vaccination program in Abbottabad, Pakistan, as a ruse to obtain DNA evidence from members of Bin Laden’s family thought to be holed up in an expansive compound there, according to an American official. The vaccination program ... adds a new twist to the months of spy games that preceded the nighttime raid in early May. It has also aggravated already strained tensions between the United States and Pakistan. The operation was run by a Pakistan doctor, Shakil Afridi, whom Pakistani spies have since arrested for his suspected collaboration with the Americans. Dr. Afridi remains in Pakistani custody, the American official said. Obama administration officials have said publicly they were not sure whether Bin Laden was in Abbottabad when dozens of Navy Seals commandos stormed the house in May. Pakistani military and intelligence operatives were furious about the American raid ... and relations between the United States and Pakistan have only plummeted since. Pakistani officials have suggested that they might use troops to repel another incursion into Pakistan.
Note: For WantToKnow team member David Ray Griffin's book, Osama bin Laden: Dead of Alive?, demonstrating the high likelihood that Osama Bin Laden died in 2001, click here. For a four-minute leaked Pentagon video revealing plans to use vaccines to secretly modify behavior, click here.
Pakistan has demanded that the United States steeply reduce the number of Central Intelligence Agency operatives and Special Operations forces working in Pakistan, and that it halt C.I.A. drone strikes aimed at militants in northwest Pakistan. The request was a sign of the near collapse of cooperation between the two testy allies. Pakistani and American officials said in interviews that the demand that the United States scale back its presence was the immediate fallout from the arrest in Pakistan of Raymond A. Davis, a C.I.A. security officer who killed two men in January. In all, about 335 American personnel -- C.I.A. officers and contractors and Special Operations forces -- were being asked to leave the country, said a Pakistani official closely involved in the decision. It was not clear how many C.I.A. personnel that would leave behind; the total number in Pakistan has not been disclosed. But the cuts demanded by the Pakistanis amounted to 25 to 40 percent of United States Special Operations forces in the country, the officials said. The number also included the removal of all the American contractors used by the C.I.A. in Pakistan. In addition to the withdrawal of all C.I.A. contractors, Pakistan is demanding the removal of C.I.A. operatives involved in "unilateral" assignments like Mr. Davis's that the Pakistani intelligence agency did not know about, the Pakistani official said.
Note: For further reports from major media sources on the long history of relations between the CIA and the Pakistani secret service, and their joint creation of and support for the Taliban, click here.
Reports about what life is like inside the military prison for terrorism suspects at Guantanamo Bay are not uncommon. But very little is reported about two secretive units for convicted terrorists and other inmates who get 24-hour surveillance, right here in the U.S. For the first time, an NPR investigation has identified 86 of the more than 100 men who have lived in the special units that some people are calling "Guantanamo North." The Communications Management Units [CMU] in Terre Haute, Ind., and Marion, Ill., are mostly filled with Muslims. About two-thirds of the inmates identified by NPR are U.S. citizens. Prison officials opened the first CMU with no public notice four years ago, something inmates say they had no right to do under the federal law known as the Administrative Procedures Act. The units' population has included men convicted in well-known post-Sept. 11 cases, as well as defendants from the 1993 World Trade Center bombing, the 1999 "millennium" plot ... and hijacking cases in 1976, 1985 and 1996. When the Terre Haute unit opened in December 2006, 15 of the first 17 inmates were Muslim. As word got out that the special units were disproportionately Muslim ... the Bureau of Prisons started moving in non-Muslims. Guards and cameras watch the CMU inmates' every move. Every word they speak is picked up by a counterterrorism team that eavesdrops from West Virginia. [Several] inmates have been suing the Federal Bureau of Prisons. They say the special units were set up outside the law and raise serious due process issues. Unlike prisoners who are convicted of serious crimes and sent to a federal supermax facility, CMU inmates have no way to review the evidence that sent them there or to challenge that evidence to get out.
Note: For other major media articles exposing excessive secrecy in government and elsewhere, click here.
For eight years, government officials turned to Dennis Montgomery, a California computer programmer, for eye-popping technology that he said could catch terrorists. Now, federal officials want nothing to do with him and are going to extraordinary lengths to ensure that his dealings with Washington stay secret. The Justice Department, which in the last few months has gotten protective orders from two federal judges keeping details of the technology out of court, says it is guarding state secrets that would threaten national security if disclosed. But others involved in the case say that what the government is trying to avoid is public embarrassment over evidence that Mr. Montgomery bamboozled federal officials. A onetime biomedical technician with a penchant for gambling, Mr. Montgomery is at the center of a tale that features terrorism scares, secret White House briefings, backing from prominent Republicans, backdoor deal-making and fantastic-sounding computer technology. Mr. Montgomery and his associates received more than $20 million in government contracts by claiming that software he had developed could help stop Al Qaeda’s next attack on the United States. But the technology appears to have been a hoax, and a series of government agencies, including the Central Intelligence Agency and the Air Force, repeatedly missed the warning signs, the records and interviews show.
Note: For lots more on government corruption from reliable sources, click here.
A pocket-size drone dubbed the Nano Hummingbird for the way it flaps its tiny robotic wings has been developed for the Pentagon by a Monrovia company as a mini-spy plane capable of maneuvering on the battlefield and in urban areas. The battery-powered drone was built by AeroVironment Inc. for [DARPA, the Defense Advanced Research Projects Agency,] the Pentagon's research arm, as part of a series of experiments in nanotechnology. The little flying machine is built to look like a bird for potential use in spy missions. Equipped with a camera, the drone can fly at speeds of up to 11 miles per hour. It can hover and fly sideways, backward and forward, as well as go clockwise and counterclockwise. It also demonstrates the promise of fielding mini-spy planes. Industry insiders see the technology eventually being capable of flying through open windows or sitting on power lines, capturing audio and video while enemies would be none the wiser. With a wingspan of 6.5 inches, the mini-drone weighs 19 grams, or less than a AA battery. The Hummingbird's guts are made up of motors, communications systems and a video camera. It is slightly larger than the average hummingbird.
Note: Remember that secret government research is usually at least 10 years in advance of anything that has been announced publicly. For more on the hummingbird drone, click here.
Stuxnet, the world's first known “cyber missile,” was designed to sabotage special power supplies used almost exclusively in nuclear fuel-refining centrifuge systems, researchers studying its code have revealed. The discovery is another puzzle piece experts say points to Iran's nuclear centrifuge plants as the likely target. While the discovery may seem just another bit of circumstantial evidence, it is a critical one that appears to all but answer a central mystery surrounding Stuxnet: What was its target? Stuxnet was discovered in June by a Belarus antivirus company, and its unique ability to control industrial processes was uncovered by US researchers in July. But its true role as the world's first publicly known cyber super weapon – designed to cross the digital divide and destroy a very specific target in the real world – was only revealed in September. It now appears that a smoking gun within Stuxnet's software code targets power supplies almost certainly used inside any Iranian nuclear fuel refining plant, researchers say. Working separately, researchers at California computer security firm Symantec arrived at the same conclusion as researchers in Germany late last week: Nuclear-fuel centrifuges were the target. All of the circumstantial evidence points in the same direction: Natanz.
Note: For key reports from reliable sources on new weapons developments, click here.
Not since the end of the Cold War has the Pentagon spent so much to develop and deploy secret weapons. But now military researchers have turned their attention from mass destruction to a far more precise challenge: finding, tracking, and killing individuals. Every year, tens of billions of Pentagon dollars go missing. The money vanishes not because of fraud, waste or abuse, but because U.S. military planners have appropriated it to secretly develop advanced weapons and fund clandestine operations. Next year, this so-called black budget will be even larger than it was in the Cold War days of 1987, when the leading black-budget watchdog, the Center for Strategic and Budgetary Assessments (CSBA), began gathering reliable estimates. The current total is staggering: $58 billionenough to pay for two complete Manhattan Projects.
Note: For other detailed reports on Pentagon weapons development, click here and here.
The secret services must become more transparent if they are to halt the spread of damaging conspiracy theories and increase trust in the Government, claims a leading think tank. A Demos report published today, "The Power of Unreason", argues that secrecy surrounding the investigation of events such as the 9/11 New York attacks and the 7/7 bombings in London merely adds weight to ... claims that they were "inside jobs". It ... recommends the Government fight back by infiltrating internet sites to dispute these theories. The Royal United Services Institute warned last week that the UK may soon face a new wave of home-grown terrorists, when criminals who have been targeted by jihadists while in prison are released.
Note: The report cited in this article advocates UK government infiltration of "conspiracist" organizations and websites. In the US the same recommendation has been made by Obama appointee Cass Sunstein, whose article "Conspiracy Theories: Causes and Cures" has just been fully dissected by WantToKnow team member David Ray Griffin in his new book Cognitive Infiltration: An Obama Appointee's Plan to Undermine the 9/11 Conspiracy Theory.
John Lennon sure was a feisty one. The ex-Beatle protested war, promoted peace and once wrote a song called "I Am the Walrus." No wonder the FBI put [Lennon] on its watch list before the 1972 Republican National Convention (which the feds erroneously thought he might disrupt), terminated his visa and began deportation proceedings — at the suggestion of Senator Strom Thurmond. During the 1972 presidential election, the FBI monitored Lennon's television appearances and concerts and even followed the activities of Yoko Ono's daughter from a previous marriage. Lennon didn't do anything suspicious, so the FBI closed its investigation a month after Nixon's re-election. After Lennon's murder in 1980, historian Jon Weiner fought a 14-year legal battle to force the FBI to release its Lennon files under the Freedom of Information Act. In the end, he won. The findings are detailed in the 2006 documentary The U.S. vs. John Lennon.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The CIA has hired Xe Services, the private security firm formerly known as Blackwater Worldwide, to guard its facilities in Afghanistan and elsewhere. The previously undisclosed CIA contract is worth about $100 million. The revelation comes only a day after members of a federal commission investigating war-zone contractors blasted the State Department for granting Xe a new $120 million contract to guard U.S. consulates under construction in Afghanistan. CIA spokesman Paul Gimigliano stopped short of confirming the contract, saying only that Xe personnel would not be involved in operations. The firm, based in Moyock, N.C., has been fighting off prosecution and lawsuits since a September 2007 incident in Baghdad, when its guards opened fire in a city square, allegedly killing 17 unarmed civilians and wounding 24. Two weeks ago, [CEO Erik] Prince announced that he was putting the company on the block. A spokeswoman said "a number of firms" are interested in buying but declined to elaborate.
Note: For lots more on government corruption from reliable sources, click here.
CBS News has learned in an exclusive report that the State Department has awarded a part of what was formerly known as Blackwater Worldwide a contract worth more than $120 million for providing security services in Afghanistan. Private security firm U.S. Training Center, a business unit of the Moyock, N.C.-based Blackwater, now called Xe Services, was awarded the contract [on June 18], a State Department spokeswoman said. Under the contract, U.S. Training Center will provide "protective security services" at the new U.S. consulates in Herat and Mazar-e-Sharif, Afghanistan, the spokeswoman said. The firm can begin work "immediately" and has to start within two months. The contract lasts a year but can be extended twice for three months at a time to last a maximum of 18 months. The awarding of the contract comes just more than four months after the government of Iraq ordered hundreds of Blackwater-linked security guards to leave the country within seven days or face possible arrest. The Justice Department is also trying to prosecute a case against five Blackwater guards who had opened fire on a crowded Baghdad street in 2007. The Justice Department's case or Blackwater's expulsion from Iraq didn't block U.S. Training Center from bidding on the multi-million dollar contract, the State Department spokeswoman said.
Note: For an analysis, click here. For lots more on government corruption from reliable sources, click here.
Pakistan's main spy agency continues to arm and train the Taliban and is even represented on the group's leadership council despite U.S. pressure to sever ties and billions in aid to combat the militants, a research report concluded. U.S. officials have suggested in the past that current or former members of Pakistan's powerful Inter-Services Intelligence agency, or ISI, have maintained links to the Taliban despite the government's decision to denounce the group in 2001 under U.S. pressure. The report issued [on June 13] by the London School of Economics offered one of the strongest cases that assistance to the group is official ISI policy, and even extends to the highest levels of the Pakistani government. The report ... was based on interviews with Taliban commanders, former Taliban officials, Western diplomats and many others. "Without a change in Pakistani behavior it will be difficult, if not impossible, for international forces and the Afghan government to make progress against the insurgency," said the report, written by Matt Waldman, a fellow at Harvard University's John F. Kennedy School of Government.
Note: For lots more powerful information suggestion Pakistani involvement with terrorism and 9/11, watch the highly insightful documentary available here.
Two former employees of Blackwater Worldwide have accused the private security company of defrauding the government for years by filing bogus receipts, double billing for the same services and charging government agencies for strippers and prostitutes, according to court documents unsealed this week. In a December 2008 lawsuit, the former employees said top Blackwater officials had engaged in a pattern of deception as they carried out government contracts in Iraq and Afghanistan, and in Louisiana in the aftermath of Hurricane Katrina. The lawsuit, filed under the False Claims Act, also asserts that Blackwater officials turned a blind eye to “excessive and unjustified” force against Iraqi civilians by several Blackwater guards. Blackwater has earned billions of dollars from government agencies in the years since the Sept. 11 attacks, when the company won contracts to protect American diplomats in Iraq and Afghanistan. The former employees who filed the lawsuit, a married couple named Brad and Melan Davis, said there was little financial oversight of the money. The documents detailing the Davises’ accusations were unsealed after the Justice Department declined to join in the case against Blackwater, which last year changed its name to Xe Services.
Note: For lots more on corporate fraud and war profiteering from reliable sources, click here.
After a Somali-American teenager from Minneapolis committed a suicide bombing in Africa in October 2008, the Federal Bureau of Investigation began investigating whether a Somali Islamist group had recruited him on United States soil. Instead of collecting information only on people about whom they had a tip or links to the teenager, agents fanned out to scrutinize Somali communities. The operation unfolded as the Bush administration was relaxing some domestic intelligence-gathering rules. The F.B.I.’s interpretation of those rules was recently made public when it released, in response to a Freedom of Information lawsuit, its “Domestic Investigations and Operations Guide.” The disclosure of the manual has opened the widest window yet onto how agents have been given greater power in the post-Sept. 11 era. But the manual’s details have alarmed privacy advocates. “It raises fundamental questions about whether a domestic intelligence agency can protect civil liberties if they feel they have a right to collect broad personal information about people they don’t even suspect of wrongdoing,” said Mike German, a former F.B.I. agent who now works for the American Civil Liberties Union. The manual authorizes agents to open an “assessment” to “proactively” seek information about whether people or organizations are involved in national security threats. Assessments permit agents to use potentially intrusive techniques, like sending confidential informants to infiltrate organizations and following and photographing targets in public. When selecting targets, agents are permitted to consider political speech or religion as one criterion.
Note: To read the FBI's recently-released and redacted new "Domestic Investigations and Operation Guide", described by the New York Times as giving "F.B.I. agents the most power in national security matters that they have had since the post-Watergate era," click here.
A British man spoke publicly for the first time yesterday to accuse MI5 officers of forcing him to confess to masterminding the July 7 bombings. Jamil Rahman claims UK security officers were behind his arrest in 2005 in Bangladesh. He says he was beaten repeatedly by local officials who also threatened to rape him and his wife. Mr Rahman, who is suing the Home Office, said a pair of MI5 officers who attended his torture and interrogation would leave the room while he was beaten. He claims when he told the pair he had been tortured they merely answered: 'They haven't done a very good job on you.' Mr Rahman told the BBC: 'They threatened my family. They go to me, "In the UK, gas leaks happen, if your family house had a gas leak and everyone got burnt, there's no problems, we can do that easily".' He says he eventually made a false confession of involvement in the July 7 bomb plots. The extraordinary allegations will add to pressure on UK ministers to come clean over the way Britain's intelligence agencies have been allowed to gather evidence around the world in the eight years since the September 11 attacks. Jamil Rahman, a former civil servant from south Wales, is a British citizen who moved to Bangladesh in 2005 and married a woman he met there. He returned to the UK last year. He said: 'It was all to do with the British. Jamil Rahman is one of a number of former detainees who accuse the British Government colluded in their torture abroad. His account echoes that of former Guantanamo Bay detainee Binyam Mohamed, who said he was tortured in Pakistan and Morocco with MI5's knowledge. The 30-year-old Ethiopian says he was beaten and deprived of sleep to try to make him confess to an Al Qaeda 'dirty bomb' plot, and his treatment is now the subject of an unprecedented police investigation into MI5's conduct.
Note: For lots more on the hidden strategies used to maintain the "war on terror", click here.
President Obama plans to order a sweeping overhaul of the National Security Council, expanding its membership and increasing its authority to set strategy across a wide spectrum of international and domestic issues. The result will be a "dramatically different" NSC from that of the Bush administration or any of its predecessors since the forum was established after World War II ... according to national security adviser James L. Jones, who described the changes in an interview. Jones, a retired Marine general, made it clear that he will run the process and be the primary conduit of national security advice to Obama. The new structure ... will expand the NSC's reach far beyond the range of traditional foreign policy issues. New NSC directorates will deal with such department-spanning 21st-century issues as cybersecurity, energy, climate change, nation-building and infrastructure. Many of the functions of the Homeland Security Council, established as a separate White House entity by President Bush after the terrorist attacks of Sept. 11, 2001, may be subsumed into the expanded NSC, although it is still undetermined whether elements of the HSC will remain as a separate body within the White House. Over the next 50 days, John O. Brennan, a CIA veteran who serves as presidential adviser for counterterrorism and homeland security and is Jones's deputy, will review options for the homeland council, including its responsibility for preparing for and responding to natural and terrorism-related domestic disasters.
There is apparently no limit to the Bush administration’s desire to invade Americans’ privacy in the name of national security. According to members of Congress, Attorney General Michael Mukasey is preparing to give the F.B.I. broad new authority to investigate Americans — without any clear basis for suspicion that they are committing a crime. Opening the door to sweeping investigations of this kind would be an invitation to the government to spy on people based on their race, religion or political activities. Mr. Mukasey has not revealed the new guidelines. But according to senators whose staff have been given limited briefings, the rules may also authorize the F.B.I. to use an array of problematic investigative techniques. Among these are pretext interviews, in which agents do not honestly represent themselves while questioning a subject’s neighbors and work colleagues. The F.B.I. has a long history of abusing its authority to spy on domestic groups, including civil rights and anti-war activists, and there is a real danger that the new rules would revive those dark days. Clearly, the Bush administration cannot be trusted to get the balance between law enforcement and civil liberties right. It has repeatedly engaged in improper and illegal domestic spying — notably in the National Security Agency’s warrantless eavesdropping program. The F.B.I. and the White House no doubt want to push the changes through before a new president is elected. There is no reason to rush to adopt rules that have such important civil liberties implications.
Where do you look when you want to recruit spies? Just about everywhere, judging from the formerly top-secret records of the World War II agency that became today's CIA. There was the young woman who became TV chef Julia Child. And labor lawyer Arthur Goldberg who became a Supreme Court justice. And young scholar Arthur Schlesinger who became a presidential adviser. Names and details on nearly 24,000 one-time intelligence workers are included among 750,000 formerly top-secret government records released Thursday by the National Archives. The documents describe a worldwide spy network during World War II managed by the Office of Strategic Services, the intelligence outfit that later became the CIA. The personnel files, long withheld from the public, provide insights into young agents now known for other careers. Julia McWilliams, later the ebullient chef, ... was hired in the summer of 1942 for clerical work with the intelligence agency and later worked directly for OSS Director William Donovan, the personnel records show. Some of the others: Acclaimed movie director John Ford, whose skill as a videographer qualified him to manage wartime spy photography. Chicago lawyer Goldberg, whose early legal work with labor unions made him an attractive spy candidate to rally European labor unions to help with the war effort, years before President Kennedy appointed him to the Supreme Court. And Schlesinger, who spent much of his time with OSS working in London as an intelligence officer and writer on the political staff, producing reports on political activities.
Note: To examine the newly-released OSS personnel files at the National Archives, start here. For many revealing articles on government secrecy from verifiable sources, click here.
Attorney General Michael Mukasey confirmed plans ... to loosen post-Watergate restrictions on the FBI's national security and criminal investigations. Mukasey said he expected criticism of the new rules because "they expressly authorize the FBI to engage in intelligence collection inside the United States." The Justice Department ... is expected to publicly release the final version within several more weeks. Even then, portions are expected to remain classified for national security reasons. Nonetheless, Mukasey provided enough detail Wednesday to alarm civil libertarians. Michael German, a former veteran FBI agent who is now policy counsel for the American Civil Liberties Union, said if Mukasey moves ahead with the new rules as he describes them, he'll be weakening restrictions originally put in place after the Watergate scandal to rein in the FBI's domestic Counter Intelligence Program, or COINTELPRO. "I'm concerned with the way the attorney general frames the problem," German said. "He talks about 'arbitrary or irrelevant differences' between criminal and national security investigations but these were corrections originally designed to prevent the type of overreach the FBI engaged in for years." German said recent events demonstrated that Mukasey needed to strengthen the FBI's guidelines, not "water them down. ... What the attorney general is doing is expanding the bureau's intelligence collection without addressing the mismanagement within the FBI. If you have an agency collecting more with less oversight, it's only going to get worse."
Note: For many disturbing reports on increasing threats to civil liberties from reliable sources, click here.
Philip Agee, a former CIA agent who exposed its undercover operations in Latin America in a 1975 book, died in Havana ... on Monday night. Agee worked for the CIA for 12 years in Washington, Ecuador, Uruguay and Mexico. He resigned in 1968 in disagreement with U.S. support for military dictatorships in Latin America and became one of the first to blow the whistle on the CIA's activities around the world. His exposé Inside the Company: CIA Diary revealed the names of dozens of agents working undercover in Latin America and elsewhere in the world. It was published in 27 languages. The CIA declined to comment on his death. Florida-born Agee said working as a case officer in South America opened his eyes to the CIA's ... goal in the region: to prop up traditional elites against perceived leftist threats through political repression and torture. "It was a time in the '70s when the worst imaginable horrors were going on in Latin America -- Argentina, Brazil, Chile, Uruguay, Paraguay, Guatemala, El Salvador -- they were military dictatorships with death squads, all with the backing of the CIA and the U.S. government," he told the British newspaper The Guardian in an interview published last year. "That was what motivated me to name all the names and work with journalists who were interested in knowing just who the CIA were in their countries," he said. Barbara Bush, the wife of former U.S. President George H.W. Bush, who was CIA director in 1976, blamed Agee in her memoirs for the murder of the Athens station chief, Richard Welch, in 1975. Agee denied any connection and sued her for $4 million, forcing her to revise the book to settle the libel case. In his autobiography On the Run, Agee detailed how he was hounded from five NATO countries, including the Netherlands, France and West Germany, after incurring the CIA's wrath.
Note: Philip Agee's CIA whistleblowing is documented in the excellent documentary "Secret of the CIA," available for viewing at this link.
Over the past six years, the Bush administration has spent almost $100 million on a highly classified program to help Gen. Pervez Musharraf, Pakistan’s president, secure his country’s nuclear weapons. The aid, buried in secret portions of the federal budget, paid for the training of Pakistani personnel in the United States and the construction of a nuclear security training center in Pakistan, a facility that American officials say is nowhere near completion, even though it was supposed to be in operation this year. A raft of equipment — from helicopters to night-vision goggles to nuclear detection equipment — was given to Pakistan to help secure its nuclear material, its warheads, and the laboratories that were the site of the worst known case of nuclear proliferation in the atomic age. While American officials say that they believe the arsenal is safe at the moment, and that they take at face value Pakistani assurances that security is vastly improved, in many cases the Pakistani government has been reluctant to show American officials how or where the gear is actually used. That is because the Pakistanis do not want to reveal the locations of their weapons or the amount or type of new bomb-grade fuel the country is now producing. In addition, the Pakistanis were suspicious that any American-made technology in their warheads could include a secret “kill switch,” enabling the Americans to turn off their weapons. While Pakistan is formally considered a “major non-NATO ally,” the program has been hindered by a deep suspicion among Pakistan’s military that the secret goal of the United States was to gather intelligence about how to locate and, if necessary, disable Pakistan’s arsenal, which is the pride of the country.
Note: Isn't it interesting that the U.S. administration has so fervently attacked Iraq and Iran for developing nuclear weapons, yet they seem unconcerned about Pakistan, which is known to have supported terrorist groups.
The Defense Intelligence Agency is preparing to pay private contractors up to $1 billion to conduct core intelligence tasks of analysis and collection over the next five years, an amount that would set a record in the outsourcing of such functions by the Pentagon's top spying agency. The proposed contracts ... reflect a continuing expansion of the Defense Department's intelligence-related work and fit a well-established pattern of Bush administration transfers of government work to private contractors. Since 2000, the value of federal contracts signed by all agencies each year has more than doubled to reach $412 billion, with the largest growth at the Defense Department. Outsourcing particularly accelerated among intelligence agencies after the [Sept. 11] 2001 terrorist attacks. The DIA's action comes a few months after CIA Director Michael V. Hayden, acting under pressure from Congress, announced a program to cut the agency's hiring of outside contractors by at least 10 percent. The DIA is the country's major manager and producer of foreign military intelligence, with more than 11,000 military and civilian employees worldwide and a budget of nearly $1 billion. It has its own analysts from the various services as well as collectors of human intelligence in the Defense HUMINT Service. DIA also manages the Defense attaches stationed in embassies all over the world. Unlike the CIA, the DIA outsources the major analytical products known as all-source intelligence reports, a senior intelligence official said.
The Bush administration has approved a plan to expand domestic access to some of the most powerful tools of 21st-century spycraft, giving law enforcement officials and others the ability to view data obtained from satellite and aircraft sensors that can see through cloud cover and even penetrate buildings and underground bunkers. A program approved by the Office of the Director of National Intelligence and the Department of Homeland Security will allow broader domestic use of secret overhead imagery beginning as early as this fall, with the expectation that state and local law enforcement officials will eventually be able to tap into technology once largely restricted to foreign surveillance. But the program ... quickly provoked opposition from civil liberties advocates, who said the government is crossing a well-established line against the use of military assets in domestic law enforcement. The administration's decision would provide domestic authorities with unprecedented access to high-resolution, real-time satellite photos. They could also have access to much more. Civil liberties groups quickly condemned the move, which Kate Martin, director of the Center for National Security Studies, ... likened to "Big Brother in the sky. They want to turn these enormous spy capabilities ... onto Americans. They are laying the bricks one at a time for a police state." Steven Aftergood, director of the Project on Government Secrecy for the Federation of American Scientists, said that ... oversight for the program was woefully inadequate. Enhanced access "shouldn't be adopted at all costs because it comes with risk to privacy and to the integrity of our political institutions," he said.
The Federal Bureau of Investigation is developing a computer-profiling system that would enable investigators to target possible terror suspects. The System to Assess Risk, or STAR, assigns risk scores to possible suspects based on a variety of information, similar to the way a credit bureau assigns a rating based on a consumer's spending behavior and debt. The program focuses on foreign suspects but also includes data about some U.S. residents. Some lawmakers said ... that the report raises new questions about the government's power to use personal information and intelligence without accountability. "The Bush administration has expanded the use of this technology, often in secret, to collect and sift through Americans' most sensitive personal information," said Sen. Patrick J. Leahy (D-Vt.), chairman of the Senate Judiciary Committee. The use of data mining in the war on terror has sparked criticism. An airplane-passenger screening program called CAPPS II was revamped and renamed because of civil liberty concerns. An effort to collect Americans' personal and financial data called Total Information Awareness was killed. Law enforcement and national security officials have continued working on other programs to use computers to sift through information for signs of threats. The Department of Homeland Security, for example, flags travelers entering and leaving the United States who may be potential suspects through a risk-assessment program called the Automated Targeting System.
In April 1971, CIA officer John Seabury Thomson paddled his aluminum canoe across the Potomac on his daily commute from his home in Maryland to CIA headquarters in Langley. When he reached the Virginia shore, he noticed a milky substance clouding the waters around Pulp Run. A fierce environmentalist, Thomson traced the pollution to its source: his employer. The murky white discharge was a chemical mash, the residue of thousands of liquefied secrets that the agency had been quietly disposing of in his beloved river. He single-handedly brought the practice to a halt. Nearly four decades later, though, that trickle of secrets would be a tsunami that would capsize Thomson's small craft. Today the nation's obsession with secrecy is redefining public and private institutions and taking a toll on the lives of ordinary citizens. Excessive secrecy is at the root of multiple scandals -- the phantom weapons of mass destruction, the collapse of Enron, the tragedies traced to Firestone tires and the arthritis drug Vioxx, and more. In this self-proclaimed "Information Age," our country is on the brink of becoming a secretocracy, a place where the right to know is being replaced by the need to know. [There] is a confluence of causes behind it, among them the chill wrought by 9/11, industry deregulation, the long dominance of a single political party, fear of litigation and liability and the threat of the Internet. But perhaps most alarming [is] the public's increasing tolerance of secrecy. Without timely information, citizens are reduced to mere residents, and representative government atrophies into a representational image of democracy as illusory as a hologram.
Note: The author of this superb article is Ted Gup. He is a journalism professor at Case Western Reserve University and author of Nation of Secrets: The Threat to Democracy and the American Way of Life.
Congressional Republicans and Democrats demanded answers from the Bush administration Thursday about a government spy agency secretly collecting records of ordinary Americans' phone calls to build a database of every call made within the country. This database affects as many as 200 million Americans. AT&T Corp., Verizon Communications Inc., and BellSouth Corp. telephone companies began turning over records of tens of millions of their customers' phone calls to the NSA program shortly after the Sept. 11, 2001, terrorist attacks. 'We have reached a privacy crisis,' said Rep. Edward J. Markey, D-MA, the ranking Democrat on the House Telecommunications and Internet Subcommittee. 'The N.S.A. stands for Now Spying on Americans.' Republican Sen. Lindsey Graham, R-S.C., told Fox News Channel: "The idea of collecting millions or thousands of phone numbers, how does that fit into following the enemy?" The Justice Department has abruptly ended an inquiry into the warrantless eavesdropping program because the NSA refused to grant its lawyers the necessary security clearance. The Justice Department's Office of Professional Responsibility [said] they were closing their inquiry because without clearance their lawyers cannot examine Justice lawyers' role in the program.
Note: Who gave the NSA power to stop the Justice Department from performing an inquiry?
The National Archives signed a secret agreement in 2001 with the Central Intelligence Agency permitting the spy agency to withdraw from public access records it considered to have been improperly declassified, the head of the archives, Allen Weinstein, disclosed on Monday. Mr. Weinstein, who began work as archivist of the United States last year, said he learned of the agreement with the C.I.A. on Thursday and was putting a stop to such secret reclassification arrangements, which he described as incompatible with the mission of the archives. The disclosure of the secret agreements provides at least a partial explanation for the removal since 1999 of more than 55,000 pages of historical documents from access to researchers at the archives. The removal of documents, including many dating to the 1950's, was discovered by a group of historians this year and reported by The New York Times in February. In a brief interview, Mr. Weinstein said he was particularly disturbed that the archives had agreed not to tell researchers why documents were unavailable. The C.I.A. agreement said archives employees would "not attribute to C.I.A. any part of the review or the withholding of documents."
In a seven-year-old secret program at the National Archives, intelligence agencies have been removing from public access thousands of historical documents that were available for years, including some already published by the State Department. The restoration of classified status to more than 55,000 previously declassified pages began in 1999, when the Central Intelligence Agency and five other agencies objected to what they saw as a hasty release of sensitive information after a 1995 declassification order signed by President Bill Clinton. It accelerated after the Bush administration took office and especially after the 2001 terrorist attacks. But because the reclassification program is itself shrouded in secrecy -- governed by a still-classified memorandum that prohibits the National Archives even from saying which agencies are involved -- it continued virtually without outside notice until December. Historians say the program is removing material that can do no conceivable harm to national security. They say it is part of a marked trend toward greater secrecy under the Bush administration, which has increased the pace of classifying documents, slowed declassification and discouraged the release of some material under the Freedom of Information Act. "I think this is a travesty," said Dr. Nelson. "I think the public is being deprived of what history is really about: facts."
Note: More on this in the National Security Archive: http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB179
The National Security Agency used law enforcement agencies, including the Baltimore Police Department, to track members of a city anti-war group as they prepared for protests outside the sprawling Fort Meade facility, internal NSA documents show. The target of the clandestine surveillance was the Baltimore Pledge of Resistance, a group...whose members include many veteran city peace activists with a history of nonviolent civil disobedience. Since the Sept. 11 terrorist attacks, members of the group say, their protests have come under increasing scrutiny by federal and local law enforcement officials working on behalf of the NSA. An internal NSA e-mail, posted on two Internet sites this week, shows how operatives with the "Baltimore Intel Unit" provided a minute-by-minute account of Pledge of Resistances' preparations for a July 3, 2004. "****UPDATE: 11:55 HRS. S/A V------- ADVISED THE PROTESTORS LEFT 4600 YORK ROAD EN ROUTE TO THE NSA CAMPUS ... S/A V----- REPORTED FIVE OR SIX PEOPLE IN A BLUE VAN WITH BLACK BALLOONS, ANTI-WAR SIGNS AND A POSSIBLE HELIUM TANK." Some legal analysts and administration critics say the agency's actions violate the 1978 Foreign Intelligence Surveillance Act.
POWER: At half past nine this morning we were actually running an exercise for a company of over a thousand people in London based on simultaneous bombs going off precisely at the railway stations where it happened this morning, so I still have the hairs on the back of my neck standing up right now. HOST: To get this quite straight, you were running an exercise to see how you would cope with this, and it happened while you were running the exercise? POWER: Precisely, and it was about half past nine this morning. We planned this for a company, and for obvious reasons I don't want to reveal their name but they're listening and they'll know it. And we had a room full of crisis managers for the first time they'd met. And so within five minutes we made a pretty rapid decision that this is the real one, and so we went through the correct drills of activating crisis management procedures to jump from slow time to quick time thinking.
Note: For Mr. Power's comments on CBC radio, Canada's PBS, click here. For many more serious questions raised around the London bombings, click here and here. For a very similar "coincidence" on 9/11, click here.
In early 2003, two senior CIA officers arrived at the U.S. Embassy in Warsaw to pick up a pair of large cardboard boxes. Inside were bundles of cash totaling $15 million that had been flown from Germany via diplomatic pouch. The Americans and Poles then sealed an agreement that over the previous weeks had allowed the CIA the use of a secret prison — a remote villa in the Polish lake district — to interrogate al-Qaeda suspects. The Polish intelligence service received the money, and the CIA had a solid location for its newest covert operation, according to former agency officials who spoke on the condition of anonymity to discuss the interrogation program, including previously unreported details about the creation of the CIA’s “black sites,” or secret prisons. The CIA prison in Poland was arguably the most important of all the black sites created by the agency after the Sept. 11, 2001, attacks. It was the first of a trio in Europe that housed the initial wave of accused Sept. 11 conspirators, and it was where Khalid Sheik Mohammed, the self-declared mastermind of the attacks, was waterboarded 183 times after his capture. In December, the European Court of Human Rights heard arguments that Poland violated international law and participated in torture by accommodating its American ally. “In the face of Polish and United States efforts to draw a veil over these abuses, the European Court of Human Rights now has an opportunity to break this conspiracy of silence and uphold the rule of law,” said Amrit Singh, a lawyer with the Open Society Justice Initiative.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Concerned about the growing dependence of the nation’s spy agencies on private contractors, top intelligence officials have spent months determining just how many contractors work at the C.I.A., D.I.A., F.B.I., N.S.A. and the rest of the spook alphabet soup. Now they have an answer. But they cannot reveal it, they say, because America’s enemies might be listening. Steven Aftergood of the Project on Government Secrecy at the Federation of American Scientists, said the decision not to reveal the numbers was a sign of dysfunctional policies. “It reveals how confused the government is about what is really sensitive and what is not,” Mr. Aftergood said. “What would Osama bin Laden do with the fraction of intelligence workers who are contractors? Absolutely nothing.” The government’s use of contractors has accelerated greatly during the Bush administration. Nowhere has the increase been more striking than in the spy agencies. The agencies have long fought efforts to make public their budgets and work force numbers. But not all officials have been punctilious about keeping the secrets. At a conference in 2005 ... a deputy director of national intelligence, let slip that the annual spy budget was $44 billion. Last year, John D. Negroponte, then the intelligence director, said in a speech “almost 100,000 patriotic, talented and hard-working Americans” work for the agencies. Why was Mr. Negroponte permitted to reveal that number? “It was an estimate,” said Ross Feinstein, a spokesman for the current intelligence chief.
The Central Intelligence Agency took no action after learning the pseudonym and whereabouts of the fugitive Holocaust overseer Adolf Eichmann in 1958, according to C.I.A. documents that shed new light on the spy agency's use of former Nazis as informers after World War II. The United States government...had no policy at the time of pursuing Nazi war criminals. The documents show the C.I.A. "failed to lift a finger" to hunt Eichmann and "forced us to confront not only the moral harm but the practical harm" of relying on intelligence from ex-Nazis. As head of the Gestapo's Jewish affairs office during the war, Eichmann implemented the policy of extermination of European Jewry, promoting the use of gas chambers and having a hand in the murder of millions of Jews. The Eichmann papers are among 27,000 newly declassified pages released by the C.I.A. to the National Archives under Congressional pressure to make public files about former officials of Hitler's regime later used as American agents. The material reinforces the view that most former Nazis gave American intelligence little of value and in some cases proved to be damaging double agents for the Soviet K.G.B. Since Congress passed the Nazi War Crimes Disclosure Act in 1998, the Interagency Working Group has persuaded the government to declassify more than 8 million pages of documents. But the group ran into resistance starting in 2002 from the C.I.A., which sought to withhold operational files from the 1940's and 50's.
Note: For more on clandestine government use of Nazi scientists in developing top-secret mind control programs with links for verification, see http://www.WantToKnow.info/mindcontrol10pg
When President Bill Clinton appointed Louis Freeh director of the FBI, he called Freeh “a law enforcement legend.” But it also turns out that no FBI director had a more strained relationship with the president who had appointed him. Now he’s written a book, My FBI, and speaks out for the first time about his years as director, and his toxic relationship with Bill Clinton. Here’s how he wrote about the former president: “The problem was with Bill Clinton, the scandals...never ended. Whatever moral compass the president was consulting was leading him in the wrong direction. His closets were full of skeletons just waiting to burst out.” Former Chief of Staff John Podesta says Clinton always referred to the FBI director as ‘Effing’ Freeh...[After] the 1996 Khobar Towers terrorist attack in Saudi Arabia, where 19 U.S. servicemen died and more than 370 were wounded, President Clinton had sent the FBI to investigate and promised Americans that those responsible would pay. But Freeh says the President failed to keep his promise. The FBI wanted access to the suspects the Saudis had arrested. Saudi Ambassador Prince Bandar said the only way to get access to prisoners would be if the president personally asked the crown prince for access. [Freeh] writes...: “Bill Clinton raised the subject only to tell the crown prince that he understood the Saudi’s reluctance to cooperate, and then he hit Abdullah up for a contribution to the Clinton Presidential Library.”
Environmental and animal rights extremists who have turned to arson and explosives are the nation’s top domestic terrorism threat, the FBI has told lawmakers. Groups such as the Animal Liberation Front, the Earth Liberation Front and the Britain-based SHAC, or Stop Huntingdon Animal Cruelty, are “way out in front” in terms of damage and number of crimes, John Lewis, the FBI’s deputy assistant director for counterterrorism, told a Senate hearing Wednesday. “Just like al-Qaida or any other terrorist organization, ELF and ALF cannot accomplish their goals without money, membership and the media,” Inhofe said. The FBI said 35 of its offices have 150 open investigations, and activists are claiming responsibility for 1,200 crimes between 1990 and mid-2004.
President Trump’s allegations that former President Barack Obama tapped his phone and his assertions that the bureaucracy is leaking secrets to discredit him are the latest signs of a White House preoccupation with a “deep state” working to thwart the Trump presidency. “A deep state [is] part of government or people outside of government that are literally controlling the direction of the country no matter who’s actually in charge, and probably engaging in murder and other corrupt practices,” [former National Security Council official Loren DeJonge] Schulman said. The deep state is a phrase often heard in countries where there is a history of military coups. Pakistan is Exhibit A: The deep state is often invoked in serious discussions about the role of the Pakistani military and its intelligence service. Wide swaths of the population see the unseen hand of the security services behind major political events and all kinds of everyday happenings, such as random traffic stops. The views are not without basis. “The deep state concept emerges in places where the army and the security apparatus creates boundaries within which the civilian political people are allowed to operate,” said Peter Feaver, a specialist in civil-military issues. “If they transgress those boundaries, then the deep state interferes to reorder things, often using military force. There are milder forms of it in healthier democracies,” Mr. Feaver said.
Note: A 2014 Boston Globe article suggests that US policy in the national security realm is made by "concealed institutions" rather than by elected officials. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
The prime minister says a public inquiry into the state's involvement in the assassination of solicitor Pat Finucane would not produce a fuller picture "of what happened and what went wrong" than the review he commissioned from Sir Desmond de Silva QC. But by publishing on Thursday the review containing hundreds of secret and confidential documents, Mr Cameron seems unwittingly to have strengthened the campaign by the Finucane family and others for a public inquiry. The scale of collusion is quite shocking: · 85% of intelligence that the [Ulster Defence Association] used to target people for murder originated from army and police sources · 270 separate instances of security force leaks to the UDA between January 1987 and September 1989 · Agents working for MI5, [Royal Ulster Constabulary] Special Branch and Military Intelligence were participating in criminality, presumably including murder. · Neither a proper legal framework nor even guidelines to control the criminality of what are known as these "participating agents". · The Northern Ireland Office was "not overly enthusiastic" about attempts by senior RUC and MI5 officers to introduce guidelines "despite representations at the highest levels." · This issue was also considered extensively at cabinet level and ministers were clearly aware that the agents were being run without guidelines. The director general of the MI5 raised it with the Prime Minister Margaret Thatcher in 1988. All this was a "wilful and abject failure by successive Governments" to run agents lawfully.
Note: Patrick Finucane (1949 – 12 February 1989) was a Belfast solicitor killed by UDA loyalist paramilitaries. Two public investigations concluded that elements of the British security forces colluded in Finucane's murder and there have been high-profile calls for a public inquiry. A review, led by Desmond Lorenz de Silva, released a report in December 2012 acknowledging that the case entailed "a wilful and abject failure by successive Governments"; however, Finucane's family called the De Silva report a "sham."
Disturbing new questions have been raised about the role of doctors and other medical professionals in helping the Central Intelligence Agency subject terrorism suspects to harsh treatment, abuse and torture. The Red Cross previously documented, from interviews with "high-value" prisoners, that medical personnel helped facilitate abuses in the C.I.A.'s "enhanced interrogation program" during the Bush administration. Now Physicians for Human Rights has suggested that the medical professionals may also have violated national and international laws setting limits on what research can be performed on humans. The group's report focused particularly on a few issues where medical personnel played an important role – determining how far a harsh interrogation could go, providing legal cover against prosecution and designing future interrogation procedures. In the case of waterboarding, a technique in which prisoners are brought to the edge of drowning, health professionals were required to monitor the practice and keep detailed medical records. Their findings led to several changes, including a switch to saline solution as the near-drowning agent instead of water, ostensibly to protect the health of detainees who ingest large volumes of liquid but also, the group says, to allow repeated use of waterboarding on the same subject.
Note: For lots more from reliable sources on the unlawful actions of US intelligence and military forces in the "global war on terror," click here.
They say money talks, and a new report suggests Canadian currency is indeed chatting, at least electronically, on behalf of shadowy spies. Coins containing tiny transmitters have mysteriously turned up in the pockets of at least three American contractors who visited Canada, says a branch of the U.S. Defence Department. Security experts believe the devices could be used to track the movements of defence industry personnel dealing in military technology. According to a report from the U.S. Defence Security Service, "On at least three separate occasions between October 2005 and January 2006, cleared defense contractors' employees travelling through Canada have discovered radio frequency transmitters embedded in Canadian coins placed on their persons." A service spokeswoman said details of the incidents were classified. The type of transmitter in play and its ultimate purpose remain a mystery. However, tiny tracking tags, known as RFIDs, are commonly placed in everything from clothing to key chains to help retailers track inventory. Each tag contains a miniature antenna that beams a unique identification code to an electronic reader. The information can then be transferred by the reader into a computerized database.
In early February 1987, an anonymous tipster in Tallahassee, Fla., made a phone call to police. Two "well-dressed men" seemed to be "supervising" six disheveled and hungry children in a local park, the caller said. The cops went after the case like bloodhounds - at least at first. The two men were identified as members of the Finders. They were charged with child abuse in Florida. In Washington, D.C., police and U.S. Customs Service agents raided a duplex apartment building and a warehouse connected to the group. Among the evidence seized: detailed instructions on obtaining children for unknown purposes and several photographs of nude children. The more the police learned about the Finders, the more bizarre they seemed: There were suggestions of child abuse, Satanism, dealing in pornography and ritualistic animal slaughter. None of the allegations was ever proved, however. Today ... the Justice Department has begun a new investigation into the Finders. One of the unresolved questions involves allegations that the Finders are somehow linked to the Central Intelligence Agency. In 1987, when Customs agents sought to examine the evidence gathered by Washington, D.C., police, they were told that the Finders investigation "had become a CIA internal matter." The police report on the case had been classified secret. Even now, Tallahassee police complain about the handling of the Finders investigation by D.C. police. "They dropped this case," one Tallahassee investigator says, "like a hot rock."
Note: For lots more on the disturbing group called "The Finders," see the excellent research available at this link. As US News & World Report does not have archives for older articles like this, the link above takes you to a scanned copy of the the article taken directly from a copy of the magazine we obtained.
A four-page memo circulating in Congress that reveals alleged United States government surveillance abuses is being described by lawmakers as “shocking.” The lawmakers said they could not yet discuss the contents of the memo they reviewed on Thursday after it was released to members by the House Intelligence Committee. But they say the memo should be immediately made public. “It is so alarming the American people have to see this,” Ohio Rep. Jim Jordan said. “It's troubling,” North Carolina Rep. Mark Meadows said. “Part of me wishes that I didn't read it because I don’t want to believe that those kinds of things could be happening in this country that I call home and love so much.” The House Intelligence Committee on Thursday approved a motion by New York Rep. Pete King to release the memo on abuses of FISA, or the Foreign Intelligence Surveillance Act, to all House members. The memo details the Intelligence Committee’s oversight work for the FBI and Justice, including the controversy over unmasking and FISA surveillance. The process for releasing it to the public involves a committee vote. If approved, it could be released as long as there are no objections from the White House within five days. On Thursday, the Senate voted 65-34 to reauthorize a FISA provision that allows U.S. spy agencies to conduct surveillance on foreign targets abroad for six years.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Chelsea Manning, the transgender U.S. Army soldier who spent seven years in prison for leaking classified documents, will not be distinguished visiting fellow at Harvard after growing backlash prompted the school to rescind the invitation. The school withdrew Manning's invite two days after announcing she would be one of roughly ten visiting fellows this fall. Manning's designation as a visiting fellow led to Mike Morell, former deputy director and acting director of the CIA, to resign his post as a senior fellow at Harvard University, CBS reported. CIA Director Mike Pompeo also canceled a speaking event Thursday at a Harvard forum in protest of what he called the school's decision to place Manning in a "position of honor." Manning was convicted of leaking more than 700,000 classified documents, including battlefield reports on Iraq and Afghanistan and State Department cables, while working as an intelligence analyst in Iraq. She said the leaks were intended to expose wrongdoing. Manning was arrested in May 2010 and given a 35-year sentence, which was commuted in the final days of the Obama administration. Manning was known as Pvt. Bradley Manning at the time of her arrest, but announced she was transgender during her incarceration. Elmendorf said Manning will still spend a day at the Kennedy School and speak in the Forum, though she will not be designated a visiting fellow.
Note: Read about Manning's wartime whistleblowing in this CNN story. For more along these lines, see concise summaries of deeply revealing news articles on corruption in intelligence agencies and in the corporate world.
This summer, operatives with the Central Intelligence Agency gathered at Arlington National Cemetery to bury two of their own. Brian Ray Hoke and Nathaniel Patrick Delemarre, elite gunslingers who worked for the C.I.A.’s paramilitary force, were laid to rest after a firefight with Islamic State militants. Their deaths this past October were never acknowledged by the C.I.A., beyond two memorial stars chiseled in a marble wall at the agency’s headquarters in Langley, Va. Today there are at least 18 stars on that wall representing the number of C.I.A. personnel killed in Afghanistan - a tally that has not been previously reported, and one that rivals the number of C.I.A. operatives killed in the wars in Vietnam and Laos nearly a half century ago. The deaths are a reflection of the heavy price the agency has paid in a secret, nearly 16-year-old war, where thousands of C.I.A. operatives have served since the attacks of Sept. 11, 2001. The deaths of Mr. Hoke, 42, and Mr. Delemarre, 47, show how the C.I.A. continues to move from traditional espionage to the front lines, and underscore the pressure the agency faces now that President Trump has pledged to keep the United States in Afghanistan with no end in sight.
Note: For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Attorney General Jeff Sessions said Friday that the Justice Department has more than tripled the number of leak investigations compared with the number that were ongoing at the end of the last administration. Sessions said he was devoting more resources to stamping out unauthorized disclosures, directing Deputy Attorney General Rod J. Rosenstein and FBI Director Christopher A. Wray to actively monitor every investigation, instructing the department’s national security division and U.S. attorneys to prioritize such cases, and creating a new counterintelligence unit in the FBI to manage the work. Sessions also said he was reviewing the Justice Department’s policy on issuing subpoenas to reporters. Rosenstein refused to rule out the possibility that journalists would be prosecuted. It has long been Justice Department practice in leak probes to try to avoid investigating journalists directly to find their sources. Prosecutors in the Obama era brought nine leak cases, more than during all previous administrations combined, and in the process called a reporter a criminal “co-conspirator” and secretly went after journalists’ phone records in a bid to identify reporters’ sources. Danielle Brian, executive director at the Project on Government Oversight, said leak investigations might inappropriately target well-intentioned whistleblowers. “Whistleblowers are the nation’s first line of defense against fraud, waste, abuse, and illegality within the federal government,” Brian said in a statement.
Note: For more, see concise summaries of deeply revealing news articles on government corruption and the manipulation of mass media.
A federal appeals court on Tuesday revived a high-profile challenge to the National Security Agency’s warrantless surveillance of internet communications. The ruling ... increases the chances that the Supreme Court may someday scrutinize whether the N.S.A.’s so-called upstream system for internet surveillance complies with Fourth Amendment privacy rights. The ruling reversed a Federal District Court judge’s decision to throw out the case. The district judge had ruled that the plaintiffs - including the Wikimedia Foundation - lacked standing to sue because they could not prove that their messages had been intercepted. Because of how the internet works, surveillance of communications crossing network switches is different from traditional circuit-based phone wiretapping. While the government can target a specific phone call without touching anyone else’s communications, it cannot simply intercept a surveillance target’s email. Instead ... to find such emails it is necessary first to systematically copy data packets crossing a network switch and sift them in search of components from any messages involving a target. Documents provided by [Edward] Snowden and declassified by the government have shown that this system works through equipment installed at the facilities of companies, like AT&T, that [connect] the American internet to the rest of the world. Privacy advocates contend that the initial copying and searching of all those data packets ... violates Fourth Amendment protections against government search and seizure.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
On the sixth anniversary of the first infamous "Cablegate" by WikiLeaks ... it has expanded its Public Library of US Diplomacy (PLUSD) with 531,525 new diplomatic cables from 1979. In a statement to coincide with the release of the cables, known as "Carter Cables III", Mr Assange explained how events which unfolded in 1979 had begun a series of events that led to the rise of ISIS: "The Iranian revolution, the Saudi Islamic uprising and the Egypt-Israel Camp David Accords led not only to the present regional power dynamic but decisively changed the relationship between oil, militant Islam and the world. "The uprising at Mecca permanently shifted Saudi Arabia towards Wahhabism, leading to the transnational spread of Islamic fundamentalism and the US-Saudi destabilisation of Afghanistan." He said at this point Osama bin Laden left his native Saudi Arabia for Pakistan to support the Afghan Mujahideen. He added: "The invasion of Afghanistan by the USSR would see Saudi Arabia and the CIA push billions of dollars to Mujahideen fighters as part of Operation Cyclone, fomenting the rise of al-Qaeda and the eventual collapse of the Soviet Union." The rise of al-Qaeda eventually bore the September 11, 2001 attacks in the United States, enabling the US invasion of Afghanistan and Iraq and over a decade of war, leaving, at its end, the ideological, financial and geographic basis for ISIS."
Note: Read a well-researched essay from the profound online book Lifting the Veil suggesting the War on Terror is a fraud. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
For two years after the accident, Yei Yang refused to leave his home. "I couldn't farm, I couldn't go to see friends, as they might be afraid of me," Yang tells CNN. "I didn't want to live." Yang was just 22 and burning rubbish near his village in the province of Xieng Khoung in north-eastern Laos, when a bomb blast tore off one of his eyelids, his top lip and an ear, mutilated one of his arms, and left him with severe scarring from the waist up. His wounds were not caused by a modern day conflict, but by the remnants of a war that was waged more than 40 years ago, and is still destroying lives in this small Southeast Asian nation. Some 80 million unexploded bombs are scattered across the country - the deadly legacy of what became known as America's "secret war" in Laos - a CIA-led mission during the Vietnam War. In total, between 1964 and 1973, the US dropped more than two million tons of bombs - one of the heaviest aerial bombardments in history. Most of the munitions dropped were cluster bombs, which splinter before impact, spreading hundreds of smaller bomblets. To this day, less than 1% of the bombs have been removed, according to US-based NGO Legacies of War, which is spearheading the campaign to clear them. More than 20,000 people have been killed or maimed by the unexploded ordnance (UXOs) since the war ended, and currently, 50 people are maimed or killed every year. Around 40% of those are children.
Note: Big banks profited immensely from the cluster bomb trade. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Edward Snowden, the whistleblower whose NSA revelations sparked a debate on mass surveillance, has waded into the arguments over the FBI’s attempt to force Apple to help it unlock the iPhone 5C of one of the San Bernardino shooters. The FBI says that only Apple can deactivate certain passcode protections on the iPhone, which will allow law enforcement to guess the passcode by using brute-force. Talking via video link from Moscow to the Common Cause Blueprint for a Great Democracy conference, Snowden said: “The FBI says Apple has the ‘exclusive technical means’ to unlock the phone. Respectfully, that’s bullshit.” Snowden then went on to tweet his support for an American Civil Liberties Union report saying that the FBI’s claims in the case are fraudulent. Apple co-founder Steve Wozniak also spoke out against the FBI on the Conan O’Brien show on Monday, saying: “I side with Apple on this one. [The FBI] picked the lamest case you ever could.” Wozniak added: “Verizon turned over all the phone records and SMS messages. So they want to take this other phone that the two didn’t destroy, which was a work phone. It’s so lame and worthless to expect there’s something on it and to get Apple to expose it.” Apple’s clash with the FBI comes to a head in California this month when the two will meet in federal court to debate whether the smartphone manufacturer should be required to weaken security settings on the iPhone of the shooter.
Note: According to The New York Times, the FBI has been misleading the public about the San Bernadino attacks for months. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
The secret agreements between our intelligence and Gaddafi’s torturers will now remain safe for good. Gaddafi’s spymaster Abdullah al-Senussi will be shot in Libya before he has a chance to tell us about the cosy relationship he had with our Western security services when he liaised between his boss, the CIA and MI6. The Brits and Americans have not batted an eyelid since Senussi, Gaddafi’s son Saif and a bunch of other regime cohorts were sentenced to death last week without defence counsel or testimony or documents or witnesses. Senussi himself is held responsible for the massacre of more than a thousand of Gaddafi’s political prisoners. But he and his successor, Moussa Koussa ... were among the most loyal of Gaddafi’s henchmen. [His] crimes against humanity [included] the torture of Libyan exiles after their barbaric rendition to Libya with the help of MI6 and other Western agencies. Senussi knew far more about our spying agencies and their dirty tricks than Saif al-Gaddafi – the late Muammar’s son. Maybe that’s why Senussi initially did a runner to Mauritania, which should have handed him over to The Hague. But after receiving a bribe of $200m, Mauritania returned him to Tripoli. Senussi’s international counsel, Ben Emmerson ... told me in 2013 that when Senussi’s lawyers wanted to know if MI6 operatives had interrogated their client while he was in Mauritania – before his illegal rendition to Libya – William Hague, the Foreign Secretary at the time, declined to answer.
Note: The British government is presently being sued by victims of the cooperative arrangement between MI6 and Libyan torturers. For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and government.
Former New York Times reporter Judy Miller ... granted anonymity to government officials and then uncritically laundered their dubious claims. As the paper’s own editors put it in their 2004 mea culpa about the role they played in selling the [Iraq] war: “We have found a number of instances of coverage that ... seems questionable now, was insufficiently qualified or allowed to stand unchallenged.” But 12 years after Miller left, you can pick up that same paper on any given day and ... find reporters doing exactly the same thing. It is worth observing how damaging it continues to be, because, shockingly, all sorts of self-identified “journalists” — both within the paper and outside of it — continue to equate unverified assertions from government officials as Proven Truth, even when these officials are too cowardly to attach their names to these claims, as long as papers such as the NYT launder them. Among the assertions mindlessly repeated by the Paper of Record from its beloved anonymous officials is this one: that ISIS learned to use couriers as a result of the Snowden revelations. The claim itself ... is monumentally stupid. Terrorists have known for a very long time that the U.S. government and its allies are trying to intercept their communications, and have long used encryption and other means to prevent that. This is the same process that enabled the New York Times, more than any other media outlet, to sell the Iraq War to the American public, and they’re using exactly the same methods to this day.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
Jean Maria Arrigo’s inbox is filling up with apologies. For a decade, colleagues of the 71-year-old psychologist ignored, derided and in some cases attacked Arrigo for sounding alarms that the American Psychological Association was implicated in US torture. But now ... a devastating report has exposed deep APA complicity with brutal CIA and US military interrogations – and a smear campaign against Arrigo herself. David Hoffman, a former federal prosecutor, confirmed what she has crusaded against for a decade: the APA’s institutional involvement with torture led to a concerted effort to quash dissent, lie to the public, and silence people like her. In 2005, Arrigo ... was a member of an internal panel, known as the Task Force on Psychological Ethics and National Security (Pens), that greenlit psychologist participation in national-security interrogations. The taskforce was intentionally weighted in favor of the US department of defense, through stacking it with representatives from the military and CIA. It rejected efforts ... to include references to the Geneva Convention and specific interrogation techniques that psychologists could not be involved in. Arrigo took her concerns public. In response, [Gerald] Koocher ... who served as APA president in 2006, [launched] “a highly personal attack.” Arrigo said she was untroubled by Koocher’s “idiotic” broadside. What was more troubling to her, she said, were the well-meaning members of APA who did not challenge the attacks.
Note: Read an article on how military psychologists are fighting against torture reforms. For more, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists.
Colonel Ian Henderson was a British official dubbed “the Butcher of Bahrain” because of atrocities he repeatedly committed during the 30 years he served as chief security official of that Middle Eastern country. A 2002 Guardian article reported that “during this time his men allegedly detained and tortured thousands of anti-government activists”; his official acts “included the ransacking of villages, sadistic sexual abuse and using power drills to maim prisoners”. Col. Henderson was never punished in any way. For years, human rights groups have fought to obtain ... a 37-year-old diplomatic cable, relating to British responsibility for Henderson’s brutality in Bahrain. Ordinarily, documents more than 30 years old are disclosable. Now, a governmental tribunal ruled ... that most of the diplomatic cable shall remain suppressed. The tribunal’s ruling was at least partially based on “secret evidence ... that the release of such information could jeopardise Britain’s new military base in the country.” This is the core mindset now prevalent in both the U.S. and U.K. for hiding their crimes from their own populations and the rest of the world: disclosure of what we did will embarrass and shame us, cause anger toward us, and thus harm our “national security.” This is exactly the same mentality driving the Obama administration’s years-long effort to suppress photographs showing torture of detainees by the U.S.. Obama insisted that to release the photos “would be to further inflame anti-American opinion and to put our troops in danger.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Edward Snowden was among the winners Wednesday of a Swedish human rights award, sometimes referred to as the "alternative Nobel," for his disclosures of top secret surveillance programs. The decision to honor the former National Security Agency contractor with the Right Livelihood Award appeared to cause a diplomatic headache for Sweden's Foreign Ministry, which withdrew the prize jury's permission to use its media room for the announcement. Snowden split the honorary portion of the award with Alan Rusbridger, editor of the Guardian, which has published a series of articles on government surveillance based on documents leaked by Snowden. The award foundation cited Snowden's "courage and skill" in revealing the extent of government surveillance and praised Rusbridger "for building a global media organization dedicated to responsible journalism in the public interest." Created in 1980, the annual Right Livelihood Award honors efforts that founder Jacob von Uexkull felt were being ignored by the Nobel Prizes. Snowden, who has reportedly also been nominated for the Nobel Peace Prize, remains exiled in Russia since leaking top secret NSA documents to journalists last year. He has been charged under the U.S. Espionage Act and could face up to 30 years in prison. Though the honorary award doesn't include any money, the foundation would offer to help pay Snowden's legal costs. Von Uexkull said the foundation was denied access to the Swedish Foreign Ministry's media room, where it has announced the awards since 1995, after it gave the ministry advance notice of the winners.
Note: For more on this, see concise summaries of deeply revealing secrecy news articles from reliable major media sources.
A federal judge has ordered the FBI to scrutinize allegations that the agency pressured a witness not to testify in a trial about videos related to the Oklahoma City bombing. U.S. District Judge Clark Waddoups said the agency needs to get to the bottom of the claims from Utah lawyer Jesse Trentadue, who said that the FBI threatened to cut off a former government operative's benefits if he appeared in court. Waddoups decided the lawyer's report raises disturbing questions, and he wanted evidence that the agency has thoroughly investigated the matter. Waddoups ordered the attorneys to present the results of the witness-tampering investigation on Nov. 13. The hearing is the latest in a case that reignited questions about whether others were involved in the bombing that killed 168 people. Trentadue argues surveillance videos from 1995 show Timothy McVeigh had an accomplice. The agency says its investigators have done a reasonable search and found no evidence of additional unreleased videos. [John] Matthews was supposed to testify during a late July bench trial, but Trentadue argued that he backed out at the last minute because the FBI threatened to cut off his veteran's and disability benefits. Trentadue said Matthews was part of a stealth government operation before the Oklahoma City bombing tracking militia movements of which McVeigh was a part, and his testimony could support the idea that there was a second suspect. Matthews told him and a colleague that he had been pressured in phone calls just before and after he was supposed to testify, the lawyer said.
Note: Many aspects of the Oklahoma City bombing were covered up. For a compilation of media videos showing without doubt that there were other bombs in the building which later were completely ignored, click here. For other major media articles showing major manipulation, click here click here, here, and here.
To many Americans, online eavesdropping by the U.S. National Security Agency is an outrage, a threat to privacy and freedom. To some, it's a business opportunity. A small but growing number of companies have introduced Internet and communications services designed to shield users from the government's eyes. A few even advertise their products as "NSA-proof." Many of the companies have been offering encrypted online services for years, scrambling their customers' data and communications in ways that require the right computer-generated "key" to decode. They are at least as concerned with thwarting private hackers and corporate spies as they are with blocking federal agents. But some entrepreneurs in the field found motivation in the NSA, after learning that the agency has been collecting troves of Internet and phone data on ordinary citizens for years. "Privacy and democracy go hand in hand - that's why this is so important," said Jason Stockman, one of the creators of ProtonMail, which began offering an encrypted e-mail service in May. "Our goal is to protect people against mass surveillance." But most companies will quickly admit that if the NSA - or some foreign intelligence service - really wants your data, they can't guarantee protection. Since the NSA conducts its business in secret, its full capabilities remain a matter of speculation. Most companies that invoke the NSA in their marketing focus on encryption.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
The US came under sharp criticism at the UN human rights committee in Geneva on [March 13] for a long list of human rights abuses that included everything from detention without charge at Guantánamo, drone strikes and NSA surveillance, to the death penalty, rampant gun violence and endemic racial inequality. The experts raised questions about the National Security Agency’s surveillance of digital communications in the wake of Edward Snowden’s revelations. The committee’s 18 experts [are] charged with upholding the International Covenant on Civil and Political Rights (ICCPR), a UN treaty that the US ratified in 1992. The US came under sustained criticism for its global counter-terrorism tactics, including the use of unmanned drones to kill al-Qaida suspects, and its transfer of detainees to third countries that might practice torture, such as Algeria. Committee members also highlighted the Obama administration’s failure to prosecute any of the officials responsible for permitting waterboarding and other “enhanced interrogation” techniques under the previous administration. Walter Kälin, a Swiss international human rights lawyer who sits on the committee, attacked the US government’s refusal to recognise the convention’s mandate over its actions beyond its own borders. The US has asserted since 1995 that the ICCPR does not apply to US actions beyond its borders - and has used that “extra-territoriality” claim to justify its actions in Guantánamo and in conflict zones.
Note: How sad that it appears this news was not reported in any major US media.
An Indiana University faculty member has sued two U.S. customs agents for detaining her after the government eavesdropped on emails she exchanged with a Greek friend. The American Civil Liberties Union of Indiana filed a federal lawsuit [on February 19] alleging the customs agents violated Christine Von Der Haar’s constitutional protection against unreasonable searches and seizures. “This case raises troubling issues about the power of the government to detain and question citizens,” said Ken Falk, the ACLU of Indiana legal director who represents Von Der Haar. The lawsuit alleges Von Der Haar, a senior lecturer in the sociology department at Indiana University in Bloomington, was confined in a guarded room at Indianapolis International Airport for more than 20 minutes on June 8, 2012, while she was questioned about her relationship with her friend. The lawsuit alleges the questioning was based on surreptitious monitoring of communications between Von Der Haar and her friend, Dimitris Papatheodoropoulus. The two “communicated frequently through emails. Some of these emails were flirtatious and romantic in nature,” the lawsuit said. Von Der Haar felt she had no choice but to answer questions from the agents, whom she believed to be armed, and did not believe she could leave until they released her, the lawsuit said. “The detention of Dr. Von Der Haar was without cause or justification,” the complaint said, and “caused her anxiety, concern, distress and other damages.” The lawsuit names the two customs agents as defendants and seeks damages.
Note: For more on government abuses of civil liberties, see the deeply revealing reports from reliable major media sources available here.
Jimmy Wales, the founder of Wikipedia, has called on Barack Obama to rein in the National Security Agency as he described the whistleblower Edward Snowden as "a hero" whom history will judge "very favourably". Wales called for a "major re-evaluation" of the NSA, adding that the public "would have never approved this sweeping surveillance program" had it been put to a vote. The revelations, Wales said, had been "incredibly damaging and embarrassing to the US. It makes it very difficult for someone like me to go out, as I do, [to] speak to people in authoritarian countries, and say: 'You shouldn’t be spying on activists, you shouldn’t be censoring the internet', when we [in the US] are complicit in these acts of extraordinary intrusion into people’s personal lives. [Snowden] has exposed what I believe to be criminal wrongdoing, lying to Congress, and certainly [an] affront to the Fourth Amendment. I think that history will judge him very favourably. There is a growing sense of concern in Congress about this, a growing sense in Congress that public is angry about this, that they have been misled and I think we are going to see legislation to change this."
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
The Guardian has agreed with the New York Times to give the U.S. newspaper access to some classified documents leaked by former National Security Agency contractor Edward Snowden, both papers said on [August 23]. In a brief story posted on its website, the Guardian said it "struck a partnership" with the Times after the British government threatened the Guardian with legal action unless it either surrendered or destroyed files it received from Snowden about Government Communications Headquarters - Britain's equivalent of NSA. The Times' executive editor, Jill Abramson, confirmed the collaboration. A source familiar with the matter said the partnership deal had been struck several weeks ago and that Abramson was personally involved in negotiating it. The Guardian said in its story that its partnership with the Times would enable it to "continue exposing mass surveillance by putting the Snowden documents on GCHQ beyond government reach." The Times and the Guardian previously collaborated on stories related to alleged phone hacking by British tabloid newspapers and on coverage of secret U.S. military and diplomatic documents made available by U.S. Army soldier Bradley Manning to the WikiLeaks website.
Note: For more on the NSA spying scandal, see the deeply revealing reports from reliable major media sources available here.
A former supervisory FBI agent has been arrested and jailed on child pornography charges. Donald Sachtleben was taken into custody and charged ... after a nationwide undercover investigation of illegal child porn images traded over the Internet. The 54-year-old resident of Carmel, Indiana, has pleaded not guilty. A federal complaint alleges 30 graphic images and video were found on Sachtleben's laptop computer late last week when FBI agents searched his home, about 23 miles north of Indianapolis. The arrest was a result a months-long probe, said the U.S. attorney for the Southern District of Indiana, Joseph Hogsett. "The mission of our Project Safe Childhood initiative is to investigate and prosecute anyone found to (be) engaged in the sexual exploitation of children," Hogsett said in a news release. "No matter who you are, you will be brought to justice if you are found guilty of such criminal behavior." Sachtleben is currently an Oklahoma State University visiting professor, according to his online resume. He is director of training at the school's Center for Improvised Explosives. He had been an FBI special agent from 1983 to 2008, serving as a bomb technician. He worked on the Oklahoma City bombing and Unabomber investigations, according to his university biography. The Justice Department's Project Safe Childhood initiative was launched in 2006, leading to what federal officials call a more than 40% increase in the number of cases investigated. The project's website says 2,700 indictments were filed last year alone.
Note: For deeply revealing reports from reliable major media sources on sexual abuse scandals, click here.
After years of criminality and deception that included scouting targets for the 2008 Mumbai terrorist attacks — a slaughter that left 166 people dead — Pakistani-American David Coleman Headley was arrested by U.S. authorities in October 2009. Facing the death penalty and possible extradition overseas, he chose to cooperate. A federal judge yesterday ordered federal prosecutors to make public two video clips of the FBI’s interrogation of Headley shortly after he was arrested. The tapes show Headley ... trying to make the kind of deal that had won his freedom twice before. His first success came in 1988, when his cooperation with the Drug Enforcement Agency (DEA) shrunk an eight-year sentence for importing heroin down to four years. When he was arrested again on heroin charges in 1997, he again cooperated with the DEA, becoming an informant and even traveling to Pakistan on the agency’s behalf. He served 15 months in prison, when he had been looking at nine years. From these experiences, Headley knew the more information he gave, the sweeter the deal. Once again, Headley succeeded in getting himself a deal. His plea agreement saved him from extradition and the death penalty, but his cooperation included testifying against his childhood best friend, Tahawwur Rana, who in June was found guilty of conspiring with Headley to attack a Danish newspaper. During Rana’s trial, the defense played these two clips of Headley’s interrogation in court.
Note: Videos of Headley's manipulations are available at the link above. For deeply revealing reports from reliable major media sources on government corruption, click here.
Ever since 9/11, counterterrorism has been the FBI's No. 1 priority, consuming the lion's share of its budget—$3.3 billion, compared to $2.6 billion for organized crime—and much of the attention of field agents and a massive, nationwide network of informants. After years of emphasizing informant recruiting as a key task for its agents, the bureau now maintains a roster of 15,000 spies—many of them tasked ... with infiltrating Muslim communities in the United States. In addition, for every informant officially listed in the bureau's records, there are as many as three unofficial ones, according to one former high-level FBI official, known in bureau parlance as "hip pockets." The bureau now maintains a roster of 15,000 spies, some paid as much as $100,000 per case, many of them tasked with infiltrating Muslim communities in the United States. The FBI regularly taps all of them as part of a domestic intelligence apparatus whose only historical peer might be COINTELPRO, the program the bureau ran from the '50s to the '70s to discredit and marginalize organizations ranging from the Ku Klux Klan to civil-rights and protest groups. Throughout the FBI’s history, informant numbers have been closely guarded secrets. Periodically, however, the bureau has released those figures. A Senate oversight committee in 1975 found the FBI had 1,500 informants. In 1980, officials disclosed there were 2,800. Six years later, following the FBI’s push into drugs and organized crime, the number of bureau informants ballooned to 6,000, the Los Angeles Times reported in 1986. And according to the FBI, the number grew significantly after 9/11.
Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency operations, click here.
The military is dramatically upping its investment in drones over the next nine years, according to Pentagon plans. Medium and high altitude unmanned aircraft like the Global Hawk, Predator, and Reaper will balloon in number to 650 in fiscal year 2021, up from approximately 340 in fiscal year 2012. The emphasis on unmanned aircraft "is a direct reflection of recent operational experience and combatant commander (COCOM) demand," the aviation plan states. And what does that refer to? Just a few examples: There were 118 drone strikes in the ... Pakistan-Afghanistan border region of North and South Waziristan in 2010, up drastically from about 50 in 2009. Every day these systems are being flown by the U.S. worldwide. An advantage to using drones is the persistent surveillance they provide, having the ability to hover over a target for hours on end. National security expert John Pike likens it to an FBI stakeout of a gangster's social club. And another obvious benefit-- using unmanned drones allows the military and the CIA to avoid US casualties. "You avoid body bags, hostages, and public attention," says Pike. The procurement plan numbers released only focus on the larger, higher speed unmanned aircraft, and leave out the smaller systems the US has and plans to purchase. In total, the US currently has 8,000 drones of all sizes and capabilities.
Note: And what about the many innocent civilians killed by these drones? Drones are murdering people without any usage of a formal justice system, often with opposition from the leaders of the countries in which the strikes are made. Is this justice? For key reports on developing new war technologies, click here.
It doesn't seem all that long ago that *le tout Washington* was crying for the CIA to be demolished and replaced by an updated version of the OSS, our World War II spying and dirty tricks service. The idea, accelerated by the Sept. 11, 2001, attacks, was that the CIA had grown too bloated, comfortable and cautious over the 40 years since it moved into its new headquarters in Langley, Va. The challenge thrown down by al-Qaeda, it was said, called for a far smaller, nimble, can-do organization, as presidential candidate John McCain put it, that would fight terrorist subversion across the world and in cyberspace. But a few hours spent with Douglas Waller's forthcoming and lively new book, Wild Bill Donovan: The Spymaster Who Created the OSS and Modern American Espionage, should cure that. As Waller and a number of other authors before him have discovered, the forerunner of the CIA was every bit as bewitched, beleaguered and befogged for much of its brief existence as [the CIA]. Even in Waller's balanced hands, there's no glossing over the record that the OSS's contribution to the glorious victories over Germany, and especially Japan, was marginal. From the invasion of North Africa through the Italian campaign, to the invasion of occupied France and the final push into Germany, the OSS mostly muddled through.
Scotland Yard has admitted giving MPs inaccurate information by denying "covert officers" were deployed at London's G20 protests in April 2009. In a statement, the Metropolitan Police said it had established that covert officers had been deployed to the protests. The letter came after ... the unmasking of undercover policeman Mark Kennedy, who attended many demonstrations during seven years living as a spy among green activists. Giving evidence at the select committee in 2009, Commander Bob Broadhurst told MPs then: "The only officers we deploy for intelligence purposes at public order are forward intelligence team officers who are wearing full police uniforms with a yellow jacket with blue shoulders. There were no plain clothes officers deployed at all." The Met statement released on Wednesday said: "Having made thorough checks on the back of recent media reporting we have now established that covert officers were deployed during the G20 protests. Therefore the information that was given by Commander Bob Broadhurst to the Home Affairs Select Committee saying that 'We had no plain-clothes officers deployed within the crowd' was not accurate."
Note: For lots more on the police provocateur Mark Kennedy, click here.
The whistle-blower website WikiLeaks on [August 25] posted what it said was an internal CIA report into the perception that the United States exports terrorism. The three-page document, dated February 2, 2010, asks, "What If Foreigners See the United States as an 'Exporter of Terrorism?'" The founder and editor of the website, Julian Assange, was arrested in absentia last week in Sweden on charges of rape, but the warrant was revoked less than a day later by Chief Prosecutor Eva Finne. Separately on [August 24], the attorney for the alleged victims told CNN rumors that the Pentagon or CIA was somehow involved in the sex crime accusations against Assange are "complete nonsense."
The world of modern eavesdropping, or signals intelligence ... for many years ... operated in the shadows. The Puzzle Palace, the 1983 best seller by James Bamford that remains the benchmark study of the N.S.A., first pulled back the curtain to provide a glint of unwanted sunlight on the place. As each operation has come to light, an anxious public has wanted to know whether this powerful new surveillance model was undermining traditional notions of privacy and civil liberties. Just whom is the government watching? And who is watching the watchers? It has been left to outsiders — journalists, authors, civil rights advocates and privacy groups — to keep tabs on the watchers and to bring public scrutiny to once-secret programs. For the spymasters, this spotlight was decidedly unwelcome. Mike McConnell, a director of intelligence in the Bush administration, ... is one of the recurring characters in The Watchers: The Rise of America’s Surveillance State by Shane Harris. Mr. Harris, with some success, does what Mr. McConnell and others in the intelligence world have found so objectionable: he watches the watchers. At its best The Watchers provides an insightful glimpse into how Washington works and how ideas are marketed and sold in the back rooms of power, whether the product being peddled is widgets or a radical model for intelligence gathering.
Note: For more insights into the activities of Big Brother, click here.
American special forces have conducted multiple clandestine raids into Pakistan's tribal areas as part of a secret war in the border region where Washington is pressing to expand its drone assassination programme. A former Nato officer said the incursions, only one of which has been previously reported, occurred between 2003 and 2008, involved helicopter-borne elite soldiers stealing across the border at night, and were never declared to the Pakistani government. "The Pakistanis were kept entirely in the dark about it. It was one of those things we wouldn't confirm officially with them," said the source, who had detailed knowledge of the operations. Such operations are a matter of sensitivity in Pakistan. While public opinion has grudgingly tolerated CIA-led drone strikes in the tribal areas, any hint of American "boots on the ground" is greeted with virulent condemnation. After the only publicly acknowledged special forces raid in September 2008, Pakistan's foreign office condemned it as "a grave provocation" while the military threatened retaliatory action. The military source said that was the fourth raid of previous years. The secretive nature of the raids underscores the suspicious nature of the relationship between the two allies as they argue about Washington's latest demands.
Note: For lots more from reliable sources on the secret realities of the "war on terrorism," click here.
Vice President Dick Cheney said Monday that he was directly involved in approving severe interrogation methods used by the CIA, and that the prison at Guantanamo Bay, Cuba, should remain open indefinitely. Cheney's comments ... mark the first time that he has acknowledged playing a central role in clearing the CIA's use of an array of controversial interrogation tactics, including a ... method known as waterboarding. "I was aware of the program, certainly, and involved in helping get the process cleared," Cheney said in an interview with ABC News. Asked whether he still believes it was appropriate to use the waterboarding method on terrorism suspects, Cheney said: "I do." His comments come on the heels of disclosures by a Senate committee showing that high-level officials in the Bush administration were intimately involved in reviewing and approving interrogation methods that have since been explicitly outlawed and that have been condemned internationally as torture. Soon after the Sept. 11 attacks, Cheney said, the CIA "in effect came in and wanted to know what they could and couldn't do. And they talked to me, as well as others, to explain what they wanted to do. And I supported it." Waterboarding involves strapping a prisoner to a tilted surface, covering his face with a towel and dousing it to simulate the sensation of drowning. CIA Director Michael V. Hayden has said that the agency used the technique on three Al Qaeda suspects in 2002 and 2003. Cheney has long defended the technique. But he has not previously disclosed his role in pushing to give the CIA such authority.
Note: For lots more from major media sources on US torture and other war crimes committed in the Iraq and Afghan wars, click here.
Interpol is planning to expand its role into the mass screening of passengers moving around the world by creating a face recognition database. Every year more than 800 million international travellers fail to undergo "the most basic scrutiny" to check whether their identity documents have been stolen, the global policing cooperation body has warned. Senior figures want a system that lets immigration officials capture digital images of passengers and immediately cross-check them against a database of pictures of [alleged] terror suspects, international criminals and fugitives. The UK's first automated face recognition gates -- matching passengers to their digital image in the latest generation of passports -- began operating at Manchester airport in August. Mark Branchflower, head of Interpol's fingerprint unit, will this week unveil proposals in London for the creation of biometric identification systems that could be linked to such immigration checks. The civil liberties group No2ID, which campaigns against identity cards, expressed alarm at the plans. "This is a move away from seeking specific persons to GCHQ-style bulk interception of information," warned spokesman Michael Parker. "This is the next step. Law enforcement agencies want the most efficient systems but there has to be a balance between security and privacy."
Note: For many disturbing reports on increasing threats to privacy, click here.
US Attorney General Michael Mukasey has signed new guidelines for FBI operations he said are designed to better protect the country from terrorist attacks, but that raise concern of some lawmakers and civil rights groups. The new, revised regulations -- the original version met strong criticism from congressional committees last month -- comprise 50 pages dealing with five areas of FBI investigation, including criminal, national security and foreign intelligence. Despite Mukasey's assurances that the new regulations "reflect consultation with Congress as well as privacy and civil liberties groups," not all concerns over their effect on privacy rights were dispelled. [The] Senate Judiciary Committee chairman, Democrat Patrick Leahy, said the new guidelines expand the FBI's powers of surveillance. "It appears that with these guidelines, the attorney general is once again giving the FBI broad new powers to conduct surveillance and use other intrusive investigative techniques on Americans without requiring any indication of wrongdoing or any approval even from FBI supervisors," Leahy said in a statement. "The American people deserve a ... Justice Department that does not sacrifice or endanger their rights and privacy," he added. The American Civil Liberties Union, who had called for an investigation into the first version of the FBI regulations, said the new rules "reduce standards for beginning 'assessments.'" "More troubling still," it added, "the guidelines allow a person's race or ethnic background to be used as a factor in opening an investigation, a move that the ACLU believes may institute a racial profiling as a matter of policy."
Note: For many reports on increasing government surveillance and threats to privacy, click here.
Rapid advances in neuroscience could have a dramatic impact on national security and the way in which future wars are fought, US intelligence officials have been told. In a report commissioned by the Defense Intelligence Agency, leading scientists were asked to examine how a greater understanding of the brain over the next 20 years is likely to drive the development of new medicines and technologies. They found several areas in which progress could have a profound impact, including behaviour-altering drugs, scanners that can interpret a person's state of mind and devices capable of boosting senses such as hearing and vision. On the battlefield, bullets may be replaced with "pharmacological land mines" that release drugs to incapacitate soldiers on contact, while scanners and other electronic devices could be developed to identify suspects from their brain activity and even disrupt their ability to tell lies when questioned, the report says. "The concept of torture could also be altered by products in this market. It is possible that some day there could be a technique developed to extract information from a prisoner that does not have any lasting side effects," the report states. The report highlights one electronic technique, called transcranial direct current stimulation, which involves using electrical pulses to interfere with the firing of neurons in the brain and has been shown to delay a person's ability to tell a lie.
Note: This is the public report, for little-known information relating what has already been going on, click here.
The military is using the FBI to skirt legal restrictions on domestic surveillance to obtain private records of Americans' Internet service providers, financial institutions and telephone companies, the ACLU said Tuesday. The American Civil Liberties Union based its conclusion on a review of more than 1,000 documents turned over by the Defense Department after it sued the agency last year for documents related to national security letters. The letters are investigative tools used to compel businesses to turn over customer information without a judge's order or grand jury subpoena. ACLU lawyer Melissa Goodman said the documents the civil rights group studied "make us incredibly concerned that the FBI and DoD might be collaborating to evade limits" placed on the Defense Department's use of the letters. Goodman, a staff attorney with the ACLU National Security Project, said the military is allowed to demand financial and credit records in certain instances but does not have the authority to get e-mail and phone records or lists of Web sites that people have visited. That is the kind of information that the FBI can get by using a national security letter, she said. "That's why we're particularly concerned. The DoD may be accessing the kinds of records they are not allowed to get," she said. Goodman also noted that legal limits are placed on the Defense Department "because the military doing domestic investigations tends to make us leery.
Note: For further disturbing reports on threats to civil liberties, click here.
When the nation's intelligence agencies wanted a computer network to better share information ... they turned to a big name in the technology industry to supply some of the equipment: Google Inc. The Mountain View company sold the agencies servers for searching documents. Many of the contracts are for search appliances - servers for storing and searching internal documents. Agencies can use the devices to create their own mini-Googles on intranets made up entirely of government data. Additionally, Google has had success licensing a souped-up version of its aerial mapping service, Google Earth. Spy agencies are using Google equipment as the backbone of Intellipedia, a network aimed at helping agents share intelligence. [The system] is maintained by the director of national intelligence and is accessible only to the CIA, FBI, National Security Agency and an alphabet soup of other intelligence agencies and offices. Google supplies the computer servers that support the network, as well as the search software that allows users to sift through messages and data. Because of the complexities of doing business with the government, Google uses resellers to process orders on its behalf. Google takes care of the sales, marketing and management of the accounts. Google is one of many technology vendors vying for government contracts. On occasion, Google is the target of conspiracy theories from bloggers who say it is working with spy agencies more closely than simply selling search equipment.
A proposed new FBI program would skirt federal laws by paying private companies to hold millions of phone and Internet records which the bureau is barred from keeping itself, experts say. The $5 million project would apparently pay private firms to store at least two years' worth of telephone and Internet activity by millions of Americans, few of whom would ever be considered a suspect in any terrorism, intelligence or criminal matter. The FBI is barred by law from collecting and storing such data if it has no connection to a specific investigation or intelligence matter. In recent years the bureau has tried to encourage telecommunications firms to voluntarily store such information, but corporations have balked at the cost of keeping records they don't need. "The government isn't allowed to warehouse the information, and the companies don't want to, so this creates a business incentive for the companies to warehouse it, so the government can access it later," said Mike German, a policy expert on national security and privacy issues for the American Civil Liberties Union (ACLU). "It's a public-private partnership that puts civil liberties to the test." In March, an FBI official identified the companies as Verizon, MCI and AT&T. Even the bureau's own top lawyer said she found the [FBI's] behavior "disturbing," noting that when requesting access to phone company records, it repeatedly referenced "emergency" situations that did not exist, falsely claimed grand juries had subpoenaed information and failed to keep records on much of its own activity.
The CIA will declassify hundreds of pages of long-secret records detailing some of the intelligence agency's worst illegal abuses -- the so-called "family jewels" documenting a quarter-century of overseas assassination attempts, domestic spying, kidnapping and infiltration of leftist groups ... CIA Director Michael V. Hayden said yesterday. The documents ... also include accounts of break-ins and theft, the agency's opening of private mail to and from China and the Soviet Union, wiretaps and surveillance of journalists, and a series of "unwitting" tests on U.S. civilians, including the use of drugs. The documents have been sought for decades by historians, journalists and conspiracy theorists and have been the subject of many fruitless Freedom of Information Act requests. In anticipation of the CIA's release, the National Security Archive at George Washington University yesterday published a separate set of documents from January 1975 detailing internal government discussions of the abuses. Those documents portray a rising sense of panic within the administration of President Gerald R. Ford that what then-CIA Director William E. Colby called "skeletons" in the CIA's closet had begun to be revealed in news accounts. "It's surely part of [Hayden's] program now to draw a bright line with the past," said National Security Archive Director Thomas S. Blanton. "But it's uncanny how the government keeps dipping into the black bag." Newly revealed details of ancient CIA operations, Blanton said, "are pretty resonant today."
A bipartisan group of senators is pushing legislation that would force the CIA to release an inspector general's report on the terrorist attacks of Sept. 11, 2001. The CIA has spent more than 20 months weighing requests under the Freedom of Information Act for its internal investigation of the attacks but has yet to release any portion of it. The agency is the only federal office involved in counterterrorism operations that has not made at least a version of its internal 9/11 investigation public. The law requires agencies to respond to requests within 20 days. Sen. Ron Wyden, D-Ore., and two other intelligence committee leaders -- chairman Jay Rockefeller, D-W.Va., and senior Republican Kit Bond of Missouri -- are pushing legislation that would require the agency to declassify the executive summary of the review within one month and submit a report to Congress explaining why any material was withheld. "It's amazing the efforts the administration is going to stonewall this,'' Wyden said. "The American people have a right to know what the Central Intelligence Agency was doing in those critical months before 9/11.'' Completed in June 2005, the inspector general's report examined the personal responsibility of individuals at the CIA before and after the attacks. The CIA has not released any documents to The Associated Press or other organizations that began requesting the information at least 20 months ago. Groups including the National Security Archive have clashed with the agency over its FOIA policies. Last year, the archive gave the CIA its prize for the agency with the worst FOIA record. ''CIA has for three decades been one of the worst FOIA agencies,'' archive Director Thomas Blanton said this week.
Note: For more reliable information on what US intelligence agencies knew about the coming attacks, click here.
The Central Intelligence Agency has closed a unit that for a decade had the mission of hunting Osama bin Laden and his top lieutenants, intelligence officials confirmed Monday. The unit, known as Alec Station, was disbanded late last year and its analysts reassigned within the C.I.A. Counterterrorist Center, the officials said. The decision is a milestone for the agency, which formed the unit before Osama bin Laden became a household name and bolstered its ranks after the Sept. 11 attacks, when President Bush pledged to bring Mr. bin Laden to justice "dead or alive." "The efforts to find Osama bin Laden are as strong as ever," said Jennifer Millerwise Dyck, a C.I.A. spokeswoman. "This is an agile agency, and the decision was made to ensure greater reach and focus." Michael Scheuer, a former senior C.I.A. official who was the first head of the unit, said the move reflected a view within the agency that Mr. bin Laden was no longer the threat he once was. Mr. Scheuer said that view was mistaken. "This will clearly denigrate our operations against Al Qaeda," he said.
Note: They disband the unit to capture the man on the most wanted list? What's up with that?
MI5 is being accused of a cover-up for failing to disclose to a parliamentary watchdog that it bugged the leader of the July 7 suicide bombers discussing the building of a bomb months before the London attacks. MI5 had secret tape recordings of Mohammad Sidique Khan, the gang leader, talking about how to build the device and then leave the country because there would be a lot of police activity. However, despite the recordings, MI5 allowed him to escape the net. Transcripts of the tapes were never shown to the parliamentary intelligence and security committee (ISC), which investigated the attacks. The new evidence shows MI5 monitored Khan when he met suspects allegedly planning another, separate attack; that he had knowledge of the "late-stage discussions" of this plot; and that he was recorded having discussions with them about making a bomb and leaving the country. The disclosures will increase pressure for a public inquiry into the atrocity, with greater powers to demand evidence and interrogate witnesses.
Since the Sept. 11 attacks, the number of insiders alleging wrongdoing in government...has surged, as have reprisals against them. That's the message from this week's congressional hearing on protections for national security whistle-blowers. "The system is broken," says Rep. Christopher Shays (R) of Connecticut, who chaired the House Government Affairs subcommittee hearing. Government scientists and even analysts at the scholarly Congressional Research Service...report efforts to control their contact with the press and public. If whistle-blowers and others "do not see an option for dissent within the system, then the system is in bad shape," says Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists. James Hansen, the top climate scientist at NASA, spoke out about efforts by the NASA press office to screen his speeches and limit his contact with the press. When lawmakers on the House panel asked what other issues they should heed, watchdog groups cited the case of Louis Fisher, a senior analyst at Congressional Research Service. "The CRS has been severely compromised," says William Weaver, a political scientist at the University of Texas in El Paso and a founder of the National Security Whistle-blowers Coalition. Says Fisher himself: "For the last 33 years my job was to defend legislative prerogative and constitutional government, and suddenly that's a bad thing to do."
A former FBI translator failed Monday to persuade the Supreme Court to revive her lawsuit alleging she was fired for reporting possible wrongdoing by other linguists involved in counterterrorism investigations. Edmonds...argued that a trial court judge was wrong to accept the Justice Department's claim that allowing her lawsuit to go forward would threaten "state secrets," or national security. Edmonds' firing was controversial among some lawmakers in Congress, especially after the Justice Department's inspector general found that the FBI had not taken her complaints seriously enough and had fired her for lodging complaints about the translation unit.
Note: The article fails to mention Edmonds' allegations of the criminal involvement in 9/11-related matters of top government officials. For more on this, see http://www.wanttoknow.info/sibeledmonds To sign Congressman Weldon's petition for open testimony on the Able Danger program, click here.
No 'True' Al Qaeda Sleeper Agents Have Been Found in U.S. A secret FBI report obtained by ABC News concludes that while there is no doubt al Qaeda wants to hit the United States, its capability to do so is unclear. The 32-page assessment says flatly, "To date, we have not identified any true 'sleeper' agents in the US," seemingly contradicting the "sleeper cell" description prosecutors assigned to seven men in Lackawanna, N.Y., in 2002. It also differs from testimony given by FBI Director Robert Mueller, who warned in the past that several sleeper cells were probably in place.
1. Cost of the Manhattan Project (through August 1945): $20,000,000,000. 2. Total number of nuclear missiles built, 1951-present: 67,500. 3. Estimated construction costs for more than 1,000 ICBM launch pads and silos, and support facilities, from 1957-1964: nearly $14,000,000,000. 4. Total number of nuclear bombers built, 1945-present: 4,680. 5. Peak number of nuclear warheads and bombs in the stockpile/year: 32,193/1966 6. Total number and types of nuclear warheads and bombs built, 1945-1990: more than 70,000/65 types 7. Number currently in the stockpile (2002): 10,600 (7,982 deployed, 2,700 hedge/contingency stockpile) 8. Number of nuclear warheads requested by the Army in 1956 and 1957: 151,000 9. Projected operational U.S. strategic nuclear warheads and bombs after full enactment of the Strategic Offensive Reductions Treaty in 2012: 1,700-2,200 10. Additional strategic and non-strategic warheads not limited by the treaty that the U.S. military wants to retain as a "hedge" against unforeseen future threats: 4,900
Note: The U.S. Nuclear Weapons Cost Study Project was completed in August 1998 and resulted in the book Atomic Audit: The Costs and Consequences of U.S. Nuclear Weapons Since 1940 edited by Stephen I. Schwartz. To understand how these huge amounts of money affect our world, see what a top US general had to say about what he learned at this link.
The late Lord [Victor] Rothschild, scientist, think-tank head, first-class cricketer, bomb-disposal expert and MI5 agent, was a super-spy for the Russians, according to a ... book. The Fifth Man: The Soviet Super Spy, by the Australian author Roland Perry, claims to prove [that] Rothschild stole 'all major UK/US weapons developments in the Second World War', including biological warfare, the atomic bomb and radar. Specifically, he alleges that Rothschild, not Klaus Fuchs, or, as is generally believed, the civil servant John Cairncross, first alerted Stalin to Allied plans to build an atom bomb using plutonium 235. Perry also claims that Rothschild, who died in 1990, was involved 'in so many aspects of spying that he seemed like a super-agent, sabotaging every Western intelligence initiative for 20 years after the war'. The evidence offered is largely derived from three days of interviews in Moscow with seven retired KGB officers, some identified only by initials. The most important was Yuri Ivanovitch Modin, controller of the Cambridge spies, and orchestrator of the Burgess/Maclean defection. But speaking from Moscow late last week, an 'astonished' Modin denied Perry's version comprehensively. No, he had never hinted, nor did he believe, that Rothschild was the fifth man, or any kind of Soviet agent. One explanation may be confusion. Perry attributes to the brilliant Rothschild a number of espionage coups which Modin knows from archives and personal contact were the work of the unassuming Cairncross.
We learned last week that a dubious program in which thousands of pages of once-classified historical documents were removed from public view was protected by an agreement in which the National Archives and Records Administration covertly helped the Air Force, the CIA and other agencies to pull the documents and cover up the reclassification effort. That the keepers of the nation's archival history would secretly collude with military and spy agencies to lock away selected parts of that history is, by itself, cause for concern. But the program, which began in 1999 and was dramatically accelerated after 9/11, went far beyond reversing genuine mistakes in declassification. The program apparently...morphed into a license for spies and diplomats to whitewash some of the agencies' most dubious and embarrassing acts. Historical CYA, in short. Cover Your Asininities. How else to explain the sheer volume of the vacuuming - more than 55,000 pages within 10,000 documents, mostly from the 1940s and '50s?
In the 1970s, when President Richard Nixon's policy of détente was under attack by some former military officials and conservative policy intellectuals, Ford administration officials Dick Cheney and Donald Rumsfeld were among those challenging as too soft the CIA's estimate of Moscow's military power. Rumsfeld and Cheney wanted to create a "Team B." CIA Director William Colby rejected the Team B idea and was fired. Colby's successor as head of the spy agency, George H.W. Bush, the current president's father, accepted it. Rumsfeld was reprising Team B by creating his own intelligence shop. The Chalabi organization's alarmist reports on Hussein's nuclear weapons, which later proved to be false, bypassed the CIA and went directly to the White House. "In retrospect, and with the Team B report and records now largely declassified, it is possible to see that virtually all of Team B's criticisms ... proved to be wrong," Raymond Garthoff, a former U.S. ambassador to Bulgaria, wrote in a paper for the CIA's Center for the Study of Intelligence three years ago. "On several important specific points it wrongly criticized and 'corrected' the official estimates, always in the direction of enlarging the impression of danger and threat." When Reagan's Secretary of State George Schultz wanted to secretly back Saddam Hussein against the Iranians, Schultz bypassed the CIA and sent Rumsfeld, then a businessman, to Baghdad to seal the deal.
A federal appeals court Thursday barred the public from arguments in the case of a fired FBI contractor who alleged security breaches and misconduct at the agency. Sibel Edmonds' lawsuit against the government was thrown out of a lower court when the Bush administration invoked the state secrets privilege, which allows the government to withhold information to safeguard national security. The Justice Department's inspector general said Edmonds' allegations to her superiors about a co-worker "raised serious concerns that, if true, could potentially have extremely damaging consequences for the FBI." The inspector general concluded that the FBI did not adequately investigate the allegations and that Edmonds was retaliated against for speaking out.
Note: Ms. Edmonds has repeatedly claimed that top government officials had clear foreknowledge of 9/11, yet 9/11 is not even mentioned in the article.
New director must decide whether to discipline any of the dozen-plus criticized. A long-awaited CIA inspector-general's report on the agency's performance before the Sept. 11 terrorist attacks includes detailed criticism of more than a dozen former and current agency officials, aiming its sharpest language at George Tenet, the former director of central intelligence. Tenet is censured for failing to develop and carry out a strategic plan to take on al Qaeda in the years before 2001, even after he wrote in a 1998 memo to the intelligence agencies that "we are at war" with the terrorist group. The findings place Goss in a delicate position. Now, as director of the CIA, he will have to decide whether to discipline any of those criticized, risking a further blow to the morale of an agency still charged with protecting the country against future terrorist attacks.
Note: Though various whistleblowers on the 9/11 cover-up have been fired or demoted, there has never been a report of a single government official being disciplined for failures which led to the 9/11 attacks. As pressure builds for accountability, Tenet, who resigned over a year ago, may be the chosen scapegoat.
In mid-February, [reporter Matt] Taibbi announced he was leaving Rolling Stone, where he has worked for almost a decade, to start a digital magazine for First Look Media, the company owned by eBay billionaire Pierre Omidyar. The last few weeks have been consumed with business matters—hiring editorial staff, signing off on designs. Taibbi won’t discuss the exact format of the new venture, nor its name—that’s still being worked out, too—but he sees it focusing, in part, on the same matters of corporate malfeasance he’s been covering for years. What people expect, of course, is the ribald, loudly antagonistic voice of a writer who is, in his own words, “full of outrage.” The guy who compared Goldman Sachs to a “vampire squid wrapped around the face of humanity, relentlessly jamming its blood funnel into anything that smells like money.” None of Taibbi’s anger at the “toothlessness” of the media has dissipated. Taibbi says his decision to leave Rolling Stone was predicated in part on ... his desire to “be on Glenn’s side.” Glenn being Glenn Greenwald, who, along with Laura Poitras and Jeremy Scahill, is currently editing another First Look property, the national-security-centric The Intercept, which has been live since February. “Glenn’s in this position of being a reporter trying to put out material that came from a whistle-blower, and now they’re both essentially in exile. It’s crazy. If the press corps that existed in the ’60s and ’70s had seen this situation, they’d be rising as one and denouncing the government for it,” Taibbi says.
Note: For more on corporate corruption, see the deeply revealing reports from reliable major media sources available here.
The Muslim community in Des Moines, Iowa ... is diverse. The members of the four mosques here are from Yemen, Somalia, Pakistan and Bangladesh, among other nations. [But] the community is a tight-knit group. That’s why what happened at their mosques here is alarming to so many of its members. “That was really surprising, very sad that ... the FBI or Homeland Security would send somebody here to pretend to be Muslim and try to find out what goes on here. I feel there is no need for that,” said Dr. Hamed Baig, president of the Islamic Center of Des Moines. Baig is talking about 42 year-old Arvinder Singh. Baid says he saw Singh a couple of times at his mosque. But it wasn’t until recently that members of the community discovered that Singh, who was raised a Sikh, was allegedly sent into their mosques to spy for the FBI. Singh told CNN that the FBI told him, "'You look Middle Eastern, and we need your help for the war against terror.'" Singh says the FBI came to him with a simple tradeoff: We’ll help you get your citizenship if you help us get some terrorists. Singh says he assumed a Muslim identity -– Rafik Alvi -- and went into the mosques pretending to be interested in converting. He says he frequented mosques all over the state but attended the four in Des Moines regularly for seven years. He says sometimes the FBI gave him pictures of persons of interest and he would confirm that they were at the mosque. On a few occasions, Singh says he taped his conversations with congregants.
Note: For lots more from major media sources on the clandestine operations of the FBI and other intelligence agencies, click here.
As arguments flare in Israel and the United States about a possible military strike to set back Iran’s nuclear program, an accelerating covert campaign of assassinations, bombings, cyberattacks and defections appears intended to make that debate irrelevant. The campaign, which experts believe is being carried out mainly by Israel, apparently claimed its latest victim on [January 11] when a bomb killed a 32-year-old nuclear scientist in Tehran’s morning rush hour. The scientist, Mostafa Ahmadi Roshan, was a department supervisor at the Natanz uranium enrichment plant. He was at least the fifth scientist with nuclear connections to be killed since 2007; a sixth scientist, Fereydoon Abbasi, survived a 2010 attack. Iranian officials immediately blamed both Israel and the United States for the latest death, which came less than two months after a suspicious explosion at an Iranian missile base that killed a top general and 16 other people. Neither Israeli nor American officials will discuss the covert campaign in any detail, leaving some uncertainty about the perpetrators and their purpose. Israel has used assassination as a tool of statecraft since its creation in 1948, historians say, killing dozens of Palestinian and other militants and a small number of foreign scientists. But there is no exact precedent for what appears to be the current campaign against Iran, involving Israel and the United States and a broad array of methods.
Note: For key reports from reliable sources on covert actions undertaken by the US in the "global war on terror", click here.
Top U.S. intelligence officials have raised concerns about the growing vulnerability the United States faces from cyberwarfare threats and malicious computer activity that CIA Director Leon Panetta said "represents the battleground for the future." "The potential for the next Pearl Harbor could very well be a cyber-attack," he testified on Capitol Hill [on February 10] before the House Permanent Select Committee on Intelligence. Panetta provided a stark assessment for the intelligence committee. "If you have a cyber-attack that brings down our power-grid system, brings down our financial system, brings down our government systems, you could paralyze this country," he said. U.S officials from the National Security Agency, Department of Homeland Security and the FBI have actively been working the emerging cybersecurity threats. The military activated U.S. Cyber Command last year to coordinate the military's cyberspace resources.
Note: For more articles from reliable sources on the construction of a total surveillance state, click here.
Fidel Castro says al-Qaida leader Osama bin Laden is a bought-and-paid-for CIA agent who always popped up when former President George W. Bush needed to scare the world, arguing that documents recently posted on the Internet prove it. "Any time Bush would stir up fear and make a big speech, bin Laden would appear threatening people with a story about what he was going to do," Castro told state media during a meeting with a Lithuanian-born writer known for advancing conspiracy theories about world domination. "Bush never lacked for bin Laden's support. He was a subordinate." Castro said documents posted on WikiLeaks.org — a website that recently released thousands of pages of classified documents from the Afghan war — "effectively proved he was a CIA agent." Last week, he began highlighting the work of Daniel Estulin, who wrote a trilogy of books highlighting the Bilderberg Club, whose prominent members meet once a year behind closed doors. During the meeting, Estulin told Castro that the real voice of bin Laden was last heard in late 2001, not long after the Sept. 11 attacks. He said the person heard making warnings about terror attacks after that was a "bad actor."
Note: WantToKnow team member David Ray Griffin has analyzed the evidence for bin Laden's likely death in December 2001 in his important book Osama Bin Laden: Dead or Alive?. For key reports from major media sources on secret societies such as the Bilderberg Club, click here.
Medical professionals who were involved in the Central Intelligence Agency's interrogations of terrorism suspects engaged in forms of human research and experimentation in violation of medical ethics and domestic and international law, according to a new report from a human rights organization. Doctors, psychologists and other professionals assigned to monitor the C.I.A.'s use of waterboarding, sleep deprivation and other "enhanced" interrogation techniques gathered and collected data on the impact of the interrogations on the detainees in order to refine those techniques. But, by doing so, the medical professionals turned the detainees into research subjects, according to the report ... published on [June 7] by Physicians for Human Rights. "There was no therapeutic purpose or intent to monitor and collect this data," said Jonathan D. Moreno, a professor of medical ethics at the University of Pennsylvania. "You can't use people as laboratories."
Note: To read the full report from Physicians for Human Rights, "Experiments in Torture: Human Subject Research and Evidence of Experimentation in the â€Enhanced' Interrogation Program", click here.
U.S. spy agencies' sensitive data should soon be linked by Google-like search systems. Director of National Intelligence Mike McConnell has launched a sweeping technology program to knit together the thousands of databases across all 16 spy agencies. After years of bureaucratic snafus, intelligence analysts will be able to search through secret intelligence files the same way they can search public data on the Internet. Linking up the 16 agencies is the challenge at the heart of the job of director of national intelligence, created after 9/11. The new information program also is designed to include Facebook-like social-networking programs and classified news feeds. It includes enhanced security measures to ensure that only appropriately cleared people can access the network. The price tag is expected to be in the billions of dollars. The impact for analysts, Mr. McConnell says, "will be staggering." Not only will analysts have vastly more data to examine, potentially inaccurate intelligence will stand out more clearly, he said. Today, an analyst's query might scan only 5% of the total intelligence data in the U.S. government, said a senior intelligence official. Even when analysts find documents, they sometimes can't read them without protracted negotiations to gain access. Under the new system, an analyst would likely search about 95% of the data, the official said.
Note: For key reports from reliable sources on the hidden realities of the War on Terror, click here.
President-elect Barack Obama is unlikely to radically overhaul controversial Bush administration intelligence policies, advisers say, an approach that is almost certain to create tension within the Democratic Party. Mr. Obama is being advised largely by a group of intelligence professionals ... who have supported Republicans. The intelligence-transition team is led by former National Counterterrorism Center chief John Brennan and former CIA intelligence-analysis director Jami Miscik, say officials close to the matter. Mr. Brennan is viewed as a potential candidate for a top intelligence post. Ms. Miscik left amid a slew of departures from the CIA under then-Director Porter Goss. Mr. Brennan is a leading contender for one of the two jobs, say some advisers. He declined to comment. Gen. James L. Jones, a former North Atlantic Treaty Organization commander; Thomas Fingar, the chief of analysis for the intelligence director; Joan A. Dempsey, who served in top intelligence and Pentagon posts; former Rep. Tim Roemer of Indiana, who served on the 9/11 Commission; and [Rep. Jane] Harman have also been mentioned. Ms. Harman has also been cited as a potential secretary of homeland security.
Note: According to the New York Times, John O. Brennan, president-elect Obama's intelligence-transition leader and a top candidate for director of national intelligence or the CIA in the Obama administration, "[was] a senior adviser to [CIA Director George] Tenet in 2002 [and] was present at the creation of the C.I.A.’s controversial detention and interrogation program." Jane Harman has been the principal Congressional proponent of the Violent Radicalization and Homegrown Terrorism Prevention Act, with its McCarthyesque provisions for criminalizing political thought. For more on increasing threats to civil liberties from reliable sources, click here.
The Defense Intelligence Agency's newly created Defense Counterintelligence and Human Intelligence Center is going to have an office authorized for the first time to carry out "strategic offensive counterintelligence operations," according to Mike Pick, who will direct the program. Such covert offensive operations are carried out at home and abroad against people known or suspected to be foreign intelligence officers or connected to foreign intelligence or international terrorist activities. The investigative branches of the three services -- the Army's Counterintelligence Corps, the Air Force Office of Special Investigations and the Naval Criminal Investigative Service -- have done secret offensive counterintelligence operations for years, and now DIA has been given the authority. Two years ago, the DIA asked then-Undersecretary of Defense Stephen A. Cambone for authority to run offensive operations along with a newer Pentagon intelligence agency, the Counterintelligence Field Activity (CIFA). Cambone agreed to a two-year trial. Defense Secretary Robert M. Gates recently approved the merger of CIFA into the new DIA center. Senior Defense Department officials and the combat commanders overseas will now decide what to do with the DIA's new offensive operational authority.
Note: For penetrating reports on the realities of the "war on terror" from major media sources, click here.
The Bush administration's chief intelligence official said yesterday that President Bush authorized a series of secret surveillance activities under a single executive order in late 2001. The disclosure makes clear that a controversial National Security Agency program was part of a much broader operation than the president previously described. The disclosure by Mike McConnell [is] the first time that the administration has publicly acknowledged that Bush's order included undisclosed activities beyond the warrantless surveillance of e-mails and phone calls that Bush confirmed in December 2005. McConnell [disclosed] that the executive order following the Sept. 11, 2001 attacks included "a number of . . . intelligence activities" and that a name routinely used by the administration -- the Terrorist Surveillance Program -- applied only to "one particular aspect of these activities, and nothing more. This is the only aspect of the NSA activities that can be discussed publicly, because it is the only aspect of those various activities whose existence has been officially acknowledged." News reports ... have detailed a range of activities linked to the program, including the use of data mining to identify surveillance targets and the participation of telecommunication companies in turning over millions of phone records. Kate Martin ... of the Center for National Security Studies, said the new disclosures show that ... administration officials have "repeatedly misled the Congress and the American public" about the extent of NSA surveillance efforts. "They have repeatedly tried to give the false impression that the surveillance was narrow and justified," Martin said. "Why did it take accusations of perjury before the DNI disclosed that there is indeed other, presumably broader and more questionable, surveillance?"
Pentagon scientists are planning to turn sharks into "stealth spies" capable of tracking vessels undetected, a British magazine has reported. They want to remotely control the sharks by implanting electrodes in their brains, The New Scientist says. It says the aim is "to exploit sharks' natural ability to glide through the water, sense delicate electrical gradients and follow chemical trails". The research is being funded by the Pentagon's Defence Advanced Research Projects Agency (DARPA). It aims to build on latest developments in brain implant technology which has already seen scientists controlling the movements of fish, rats and monkeys. Such devices are already being used by scientists at Boston University to "steer" a spiny dogfish in a fish tank. The next step for the Pentagon scientists will be the release of blue sharks with similar devices into the ocean off the coast of Florida. Remote-controlled sharks...have advantages that robotic underwater surveillance vehicles just cannot match: they are silent, and they power themselves.
Note: This article fails to mention that electronic implants we used over 40 years ago to control the behavior of bulls, as reported on the front page of the New York Times on May 17, 1965. To see the Times article, go to http://www.WantToKnow.info/delgadobullnytimes.pdf. For lots more reliable information on government mind control programs: http://www.WantToKnow.info/mindcontrol
After listening to former translator Sibel Edmonds complain about her treatment at the hands of the Justice Department and the FBI, Reps. Christopher Shays, R-Conn., and Carolyn Maloney, D-N.Y., said their staffs would debrief Edmonds and confront Justice Department officials with the information. Edmonds commented on the issue while testifying at a House Government Reform subcommittee hearing on the government's designation of information as classified. She told lawmakers the people she accused were still working at the FBI. The Justice Department's inspector general said last month that the FBI never adequately investigated Edmonds' complaints, even though evidence and witnesses supported her. Edmonds filed a lawsuit seeking to keep her job, but last summer a judge threw out her case after Attorney General John Ashcroft said her claims might harm national security by exposing government secrets.
Note: This article fails to mention Ms. Edmonds claims that top individuals in government concealed critical information about 9/11 suggesting complicity by compromised politicians. For more, click here.
A dozen Army and Marine recruiters who visited high schools were among the personnel caught in a major FBI cocaine investigation, and some were allowed to keep working while under suspicion. The recruiters, who worked in the Tucson area, were targets of a federal sting called Operation Lively Green, which ran from 2001 to 2004 and was revealed last year. So far, 69 members of the military, prison guards, law enforcement employees and other public employees have been convicted of accepting bribes to help smuggle cocaine. The FBI allowed many recruiters to stay on the job even though they were targeted by the investigation. Some were still recruiting three years after they were photographed running drugs in uniform. Most of the recruiters pleaded guilty and will be sentenced in March. Some honorably retired from the military.
Note: For a description of serious government involvement in major drug trafficking by a former top DEA agent, click here. Immediately following is a similar story by a Pulitzer-winning journalist.
Back in December, 60 Minutes broadcast a now-notorious segment of pure access journalism in which they gullibly disseminated one false NSA claim after the next. The program claimed that Snowden “is believed to still have access to 1.5 million classified documents he has not leaked”. Ever since then, that Snowden “stole” 1.7 or 1.8 million documents from the NSA has been repeated over and over again by US media outlets as verified fact. The Washington Post‘s Walter Pincus, citing an anonymous official source, purported to tell readers that “among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports”. Reuters frequently includes in its reports the unchallenged assertion that “Snowden was believed to have taken 1.7 million computerized documents.” In fact, that number is and always has been a pure fabrication, as even Keith Alexander admits. The claimed number has changed more times than one can count: always magically morphing into randomly chosen higher and scarier numbers. The reality, in the words of the General, is that the US Government ”really [doesn't know] what he actually took with him” and they ”don’t have an accurate way of counting”. All they know is how many documents he accessed in his entire career at NSA, which is a radically different question from how many documents he took. But that hasn’t stopped American media outlets from repeatedly affirming the inflammatory evidence-free claim that Snowden took 1.7 million documents.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The CIA is reported to have used unmanned drones to target ... Somalia for the first time, attacks coinciding with the unveiling of a new US counterterrorism strategy shifting the war on terror away from costly battlefields and toward expanded covert operations. The strikes in Somalia ... bring to six the number of countries where the missile-armed drones have been deployed: Afghanistan, Pakistan, Yemen, Libya and Iraq, and now [Somalia]. US officials quoted by The Washington Post yesterday claimed the two individuals targeted had "direct ties" to Anwar al-Awlaki, the US-born cleric now based in Yemen. In May, al-Alwaki himself was targeted by a drone attack, but managed to escape. If confirmed, the strikes in Somalia would fit the new approach set out in the 19-page "National Strategy for Counterterrorism" released this week by the White House, and presented by John Brennan, President Barack Obama's top anti-terrorism adviser. There is no mention of the Bush era "global war on terror". In this campaign, America's main tools would be intelligence and Special Operations forces, backed up by the rapid deployment of what he called "unique assets", a reference to the drones that are becoming smaller and deadlier.
Note: Could it be that high-level members of the Obama administration believe that if they do not use the "global war on terror" slogan, the public will not perceive the continuation of the Bush administration's policies and methods by Pres. Obama? For critical reports from major media sources on the illegal and unjustified "global war on terror", click here.
Switzerland announced [on July 12] that it would not extradite [Roman] Polanski, a famous film director, to the United States in part because of fresh doubts over the conduct of the judge in his original trial. “He’s a free man,” the Swiss justice minister, Eveline Widmer-Schlumpf, said at a news conference on Monday. The French foreign minister, Bernard Kouchner, said he was “delighted” and deeply relieved by the ruling. Samantha Geimer, who at 13 was Mr. Polanski’s victim in the original sex case, has long disclosed her identity and called to end the prosecution. The decision to free Mr. Polanski was a sharp defeat for prosecutors in Los Angeles. Steve Cooley, the Los Angeles County district attorney, is the Republican candidate for state attorney general. The turning point in the case occurred in mid-March, when Mr. Polanski’s lawyers disclosed in an appeals brief that Roger Gunson, a now-retired lawyer who originally prosecuted the case, had given sealed testimony describing a plan by Judge Laurence J. Rittenband, the original judge, to limit Mr. Polanski’s sentence to a 90-day psychiatric evaluation, a portion of which Mr. Polanski had served during his 42 days in Chino State Prison. Mr. Gunson, who gave the testimony in January, also described his own reservations about the handling of the case by Judge Rittenband, who is now deceased.
Note: For an analysis of this decision by the Swiss government, click here.
Anthony J. Russo, a Rand researcher in the late 1960s who encouraged Daniel Ellsberg to leak the Pentagon Papers and stood trial with him in the Vietnam War-era case that triggered debates over freedom of the press and hastened the fall of a president, has died. In 1971, Russo helped Ellsberg copy a classified government history of the Vietnam War that Ellsberg later supplied to the New York Times, ... dubbed the Pentagon Papers. The secret study provided evidence of lying by government officials, including several presidents, about the scope and purposes of the war. "I explained [to Ellsberg] how the so-called enemy, the Viet Cong, and the North Vietnamese, were actually the legitimate parties and how the U.S. presence was illegal, immoral and unwise. I supplied him with reams of documentation," Russo later wrote. He was fired from Rand a short time later. Russo said that when he heard about the fabrication of the Gulf of Tonkin incident, he urged Ellsberg to "turn that over to the newspapers." Publication of the first installments in June [1971] sparked an FBI manhunt for Ellsberg. Russo was harassed by police and placed under surveillance. When he was subpoenaed by a grand jury, he refused to testify against Ellsberg and was jailed for 45 days. A few days before Christmas 1971, both men were indicted on charges of conspiracy, theft and espionage. "I will be eternally grateful to Tony for his courage and partnership," Ellsberg said. "He set an example of willingness to risk everything for his country and for the Vietnam that he loved that very few, unfortunately, have emulated."
Note: For background information on "false-flag operations" like the Gulf of Tonkin incident, click here.
William E. Colby faced an uneasy decision in late 1973 when he took over the Central Intelligence Agency: whether to make public the agency’s internal accounting, then being compiled, of its domestic spying, assassination plots and other misdeeds since its founding nearly three decades earlier. Mr. Colby decided to keep the so-called family jewels a secret, and wrote in his memoir in 1978 that he believed the agency’s already sullied reputation ... could not have withstood a public airing of all its dirty laundry. So why, at a time when the agency has again been besieged by criticism, this time for its program of secret detentions and interrogations since the Sept. 11 attacks, would the current director, Gen. Michael V. Hayden, decide to declassify the same documents that Mr. Colby chose to keep secret? General Hayden said it was essential for the C.I.A. ... to be as open as possible in order to build public trust and dispel myths surrounding its operations. The more that the agency can tell the public, he said, the less chance that misinformation among the public will “fill the vacuum.” It was this outlook that General Hayden, whose public relations skills are well known in Washington, brought to an earlier job. There, as director of the National Security Agency, he tried to overhaul the N.S.A.’s public image — that of the shadowy, menacing organization portrayed in the movie “Enemy of the State” — by inviting reporters to briefings and authorizing its officials to speak to the author James Bamford for his book on the agency, “Body of Secrets.”
Note: For a brief summary of and links to further information about James Bamford's important book on the NSA, Body of Secrets, click here.
Edwin Wilson...was hurtling into history as one of this nation's most infamous traitors until three years ago when a federal judge concluded he'd been buried with the help of government lies. Now 78 and paroled, Wilson works in his Seattle office...to prove he didn't earn the spectacular fall from skilled CIA agent to despised federal prisoner. In books about his downfall, he is the villain: a ruthless renegade who left the CIA and made himself rich by selling arms and training terrorists for Libyan leader Moammar Gadhafi. Three years ago, a federal judge in Texas threw out a major conviction...and blasted the government for covering up the truth. Wilson had finally gotten documents [proving] that despite his 1971 retirement, the CIA was still secretly using him to gather intelligence. The government had denied it for years. The people Wilson is suing—former officials in the U.S. Attorney's Office, the Justice Department and the CIA, including two men who are now federal judges—contend they can't be held liable for doing their jobs, even if his rights were violated. Wilson spent 22 years in prison. U.S. District Judge Lynn Hughes found that about two dozen government lawyers were involved in hiding information from Wilson's defense attorney. In his blistering opinion, Hughes noted that the CIA had more than 80 contacts with Wilson after he left the agency, which, among other things, had used him to "trade weapons or explosives for sophisticated Soviet military equipment—like MiG-25 fighters, tanks, missiles and ocean mines—with Libya." A CIA agent had even discussed with Wilson that "sending tons—yes, tons—of explosives to a hostile power could be authorized" if the U.S. got good enough information for it, the judge wrote.
Note: For another famous case of a major "traitor" who was framed by the U.S. government, click here.
Aviation obsessives with cameras and Internet connections have become a threat to cover stories established by the CIA to mask its undercover operations and personnel overseas. U.S. intel sources complain that "plane spotters" -- hobbyists who photograph airplanes landing or departing local airports and post the pix on the Internet -- made it possible for CIA critics recently to assemble details of a clandestine transport system the agency set up to secretly move cargo and people -- including terrorist suspects -- around the world.
They knew which factories to burn, which bridges to blow up, which cargo ships could be sunk in good conscience. They had pothole counts for roads used for invasion and head counts for city blocks marked for incineration. They weren't just secret agents. They were secret insurance agents. These undercover underwriters gave their World War II spymasters access to a global industry that both bankrolled and, ultimately, helped bring down Adolf Hitler's Third Reich. Newly declassified U.S. intelligence files tell the remarkable story of the ultra-secret Insurance Intelligence Unit, a component of the Office of Strategic Services, a forerunner of the CIA, and its elite counterintelligence branch X-2. Though rarely numbering more than a half dozen agents, the unit gathered intelligence on the enemy's insurance industry, Nazi insurance titans and suspected collaborators in the insurance business. But, more significantly, the unit mined standard insurance records for blueprints of bomb plants, timetables of tide changes and thousands of other details about targets, from a brewery in Bangkok to a candy company in Bergedorf. "They used insurance information as a weapon of war," said Greg Bradsher, a historian and National Archives expert on the declassified records. That insurance information was critical to Allied strategists, who were seeking to cripple the enemy's industrial base and batter morale by burning cities.
A high-ranking military analyst has accused the Federal Government of systematically putting foreign policy objectives ahead of intelligence, seriously undermining the work of its own spies. A saga that has wracked the military for six years has culminated in General Peter Cosgrove's senior intelligence analyst during the East Timor conflict, Lieutenant-Colonel Lance Collins, writing to the Prime Minster demanding a Royal Commission into the spy services. The letter says there has been a litany of intelligence failures. "I strongly urge you, Prime Minister, to appoint an impartial and wide-ranging Royal Commission into intelligence," the letter says. "To do otherwise would merely cultivate an artificial scab over the putrefaction beneath". A navy lawyer, Captain Martin Toohey, conducted a review of Colonel Collins's grievances and found his intelligence on Timor was blocked at high levels in the DIO. Captain Toohey said the DIO reported what "the government wants to hear" on East Timor. He found it vindictively and unfairly placed Colonel Collins's name on an Australian Federal Police search warrant looking for leaked intelligence documents, effectively ending his career as an intelligence officer. The Herald can reveal the DIO shut down an intelligence-sharing network at the height of the East Timor operation and ordered, in early 2000, that no more intelligence be gathered from West Timor, where atrocities against East Timorese refugees occurred.
A former FBI official claims he was "Deep Throat," the long-anonymous source who leaked secrets about President Nixon's Watergate coverup to The Washington Post, his family said Tuesday. W. Mark Felt, 91, was second-in-command at the FBI in the early 1970s. His identity was revealed Tuesday by Vanity Fair magazine, and family members said they believe his account is true.
Note: What they failed to investigate is the strong possibility that "Deep Throat" made his revelations on orders from Henry Kissinger. Kissinger (Nixon's Secretary of State) and Nixon are reported to have formed a tenuous alliance to eliminate J. Edgar Hoover, former head of the FBI for almost 50 years. Until his death in May of 1972, Hoover had been arguably the most powerful man in the country for many years. With Hoover out of the way, in June 1972 Kissinger arranged to have Nixon pushed out by setting up the Watergate disclosures through "Deep Throat," according to a well researched book by Leonard Horowitz, Emerging Viruses. Kissinger remains powerful to this day, as evidenced by the personal experience of website founder Fred Burks, who worked as a top US State Department interpreter. See also, excellent article in Slate.
The Justice Department increasingly has refused to prosecute FBI cases targeting suspected terrorists over the past five years, according to private researchers who reviewed department records. The report being released Monday by the Transactional Records Access Clearinghouse at Syracuse University raises questions about the quality of the FBI's investigations. Prosecutors declined to bring charges in 131 of 150, or 87 percent, of international terrorist case referrals from the FBI between October 2005 and June 2006. That number marks the peak of generally steady increases from the 2001 budget year, when prosecutors rejected 33 percent of such cases from the FBI. The data "raise troubling questions about the bureau's investigation of criminal matters involving individuals the government has identified as international terrorists," the report said. It noted that prosecutions in traditional FBI investigations since 2001—including drug cases, white collar crimes and organized crimes—have decreased while the number of agents and other employees has risen. "So with more special agents, many more intelligence analysts, and many fewer prosecutions the question must be asked: What is the FBI doing?" the report said.
Note: With the current administration's frequent claims to be tough on terrorism, does this make any sense? Could it be that some of the accused are being protected from prosecution?
CIA counterterrorism officers have signed up in growing numbers for a government-reimbursed, private insurance plan that would pay their civil judgments and legal expenses if they are sued or charged with criminal wrongdoing. The new enrollments reflect heightened anxiety at the CIA that officers may be vulnerable to accusations they were involved in abuse, torture, human rights violations and other misconduct, including wrongdoing related to the Sept. 11, 2001, attacks. The anxieties stem partly from public controversy about a system of secret CIA prisons in which detainees were subjected to harsh interrogation methods, including temperature extremes and simulated drowning. The White House contends the methods were legal, but some CIA officers have worried privately that they may have violated international law. Bush last week called for Congress to approve legislation drafted by the White House that would exempt CIA officers and other federal civilian officials from prosecution for humiliating and degrading terrorism suspects. Agency officials said that interest has been stoked over the years by the $2 million legal bill incurred by CIA officer Clair George before his 1992 conviction for lying to Congress about the Iran-contra arms sales; by the Justice Department's lengthy investigation of CIA officers for allegedly lying to Congress about the agency's role in shooting down a civilian aircraft in 2001 in Peru; and by other events. One former intelligence official said CIA officers have recently expressed concern that lawsuits will erupt if details of the agency's internal probe of wrongdoing related to the September 2001 attacks become public.
An active-duty Navy captain has become the second military officer to come forward publicly to say that a secret defense intelligence program tagged the ringleader of the Sept. 11 attacks as a possible terrorist more than a year before the attacks. The officer, Capt. Scott Phillpott, said in a statement Monday that he could not discuss details of the military program, which was called Able Danger, but confirmed that its analysts had identified the Sept. 11 ringleader, Mohamed Atta, by name by early 2000. His comments came on the same day that the Pentagon's chief spokesman, Lawrence Di Rita, told reporters that the Defense Department had been unable to validate the assertions made by an Army intelligence veteran, Lt. Col. Anthony Shaffer, and now backed up by Phillpott, about the early identification of Atta. Shaffer went public with his assertions last week, saying that analysts in the intelligence project had been overruled by military lawyers when they tried to share the program's findings with the FBI in 2000 in hopes of tracking down terrorist suspects tied to al Qaeda.
The CIA is conducting a cyber-war game this week geared to simulate a major Internet attack by enemy computer hackers, an intelligence official said Thursday. Dubbed "Silent Horizon," the three-day unclassified exercise is based on a scenario set five years in the future and involves participants from government and the private sector. Online crime has exploded in recent years, a result of organized crime groups based in Eastern Europe. But investigators so far have uncovered few links to Islamic extremists.
Note: Do you think it is the terrorists who want to shut down the Internet, or might there be political elites who don't want their hidden agendas exposed?
The Bush administration had to empty its secret prisons and transfer terror suspects to the military-run detention centre at Guantánamo this month in part because CIA interrogators had refused to carry out further interrogations and run the secret facilities. When Mr Bush announced the suspension of the secret prison programme in a speech before the fifth anniversary of the September 11 terror attacks, some analysts thought he was trying to gain political momentum before the November midterm congressional elections. Former CIA officials said Mr Bush's hand was forced because interrogators had refused to continue their work until the legal situation was clarified because they were concerned they could be prosecuted for using illegal techniques. One intelligence source also said the CIA had refused to keep the secret prisons going.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.