Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
A UN panel will conclude Wikileaks founder Julian Assange is being "arbitrarily detained" in the UK, the Swedish foreign ministry has said. Mr Assange, 44, claimed asylum in London's Ecuadorean embassy in 2012. The Met Police says Mr Assange will be arrested if he leaves the embassy. The Australian was originally arrested in London in 2010 under a European Arrest Warrant issued by Sweden over rape and sexual assault claims. In 2012, while on bail, he claimed asylum inside the Ecuadorean embassy in Knightsbridge after the UK Supreme Court had ruled the extradition against him could go ahead. Mr Assange's Wikileaks organisation posted secret American government documents on the internet, and he says Washington could seek his extradition to the US to face espionage charges if he is sent to Sweden. In the statement, published earlier by Wikileaks on Twitter, Mr Assange said: "Should the UN announce tomorrow that I have lost my case against the United Kingdom and Sweden I shall exit the embassy at noon on Friday to accept arrest by British police ... However, should I prevail and the state parties be found to have acted unlawfully, I expect the immediate return of my passport and the termination of further attempts to arrest me." Last October, Scotland Yard said it would no longer station officers outside the Ecuador embassy following an operation which it said had cost Ł12.6m. But it said "a number of overt and covert tactics to arrest him" would still be deployed.
Note: Read more about the "legal limbo" and propaganda campaign carried out against Assange and Wikileaks. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
From 2011 to 2013, the most elite forces in the U.S. military, supported by the CIA and other elements of the intelligence community, set out to destroy the Taliban and al Qaeda forces that remained hidden ... along Afghanistan’s northeastern border with Pakistan. Dubbed Operation Haymaker, the campaign has been described as a potential model for the future of American warfare. The military’s own analysis demonstrates that the Haymaker campaign was in many respects a failure. The vast majority of those killed in airstrikes were not the direct targets. Nor did the campaign succeed in significantly degrading al Qaeda’s operations in the region. The frequency with which “targeted killing” operations hit unnamed bystanders is among the more striking takeaways from the Haymaker slides. [Documents obtained by The Intercept] show that during a five-month stretch of the campaign, nearly nine out of 10 people who died in airstrikes were not the Americans’ direct targets. Larry Lewis, formerly a principal research scientist at the Center for Naval Analyses, ... found that drone strikes in Afghanistan were 10 times more likely to kill civilians than conventional aircraft. This month, an American airstrike on a hospital run by the international organization Médecins Sans Frontičres ... killed at least a dozen members of the humanitarian group’s medical staff and 10 patients, including three children. A nurse on the scene recalled seeing six victims in the intensive care unit ablaze in their beds.
Note: Read more about the major failings of US drone attacks. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
In 1986, the director of Britain's premier domestic spy agency told Margaret Thatcher's cabinet secretary the risk of "embarrassment" from publicizing a politician's suspected child abuse was greater than the "danger" he presented. CBS News partner network Sky News reported the new twist in Britain's long and still-unfolding child sexual abuse scandal on Thursday, saying then-MI5 director Sir Antony Duff had told Prime Minister Thatcher's staffer "the risks of political embarrassment to the government is rather greater than the security danger." The name of the Member of Parliament Duff had been asked to investigate, over allegations he had a "penchant for small boys," has not been revealed, but Sky reported Wednesday that four former senior politicians were named in previously unseen government documents on abuse. All four have been dead for years, but they were senior members of Thatcher's cabinet. Over the course of several years the sex abuse scandal has snowballed, revealing - at best - a pervasive lax attitude among British law enforcement, politicians and celebrity culture toward the abuse of children during the 1970s and 80s. The ongoing police investigation has already landed some big names from British culture ... in jail for abuses committed during the height of their popularity. Others have been posthumously revealed as serial abusers. Sky's investigation, however, is the first time any suggestion of a possible cover-up of abuse by senior government officials has emerged.
Note: The Thatcher government was reported to have covered up a VIP pedophile ring. Watch an excellent segment by Australia's "60-Minutes" team "Spies, Lords and Predators" on a pedophile ring in the UK which leads directly to the highest levels of government. A second suppressed documentary, "Conspiracy of Silence," goes even deeper into this topic in the US. For more along these lines, see concise summaries of deeply revealing sexual abuse scandal news articles from reliable major media sources.
Germany has been spying and eavesdropping on its closest partners in the EU and passing the information to the US for more than a decade, a parliamentary inquiry in Berlin has found, triggering allegations of lying and coverups reaching to the very top of Angela Merkel’s administration. Under a 2002 pact between German intelligence (BND) and the NSA, Berlin used its largest electronic eavesdropping facility in Bavaria to monitor email and telephone traffic at the Élysée Palace, the offices of the French president, and of key EU institutions in Brussels including the European commission. The BND’s biggest listening post at Bad Aibling in Bavaria was abused for years for NSA spying on European states. “The core is the political spying on our European neighbours and EU institutions,” an unnamed source said to be familiar with the evidence told the Süddeutsche. As well as the political intelligence activities, the NSA also got the BND to spy on European aerospace and defence firms. German and American individuals and companies were not monitored. The Bad Aibling complex of listening posts was an NSA facility for years. Under an agreement in 2002, it was handed over to the Germans in 2004. Since then, much of the information gleaned was routinely passed to the Americans. According to the Süddeutsche, the Americans supplied search terms on a weekly basis to the Germans – totalling 690,000 phone numbers and 7.8m IP addresses up until 2013.
Note: Many countries claim they don't spy on their own citizens. What they do is have agreements to spy on each other's citizens so that they can then share the information and still technically claim they are not breaking any laws. This article shows how it works. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of privacy rights from reliable major media sources.
After the first revelations of domestic surveillance by NSA whistleblower Edward Snowden, President Obama defended the spying programs by claiming they were “subject to congressional oversight and congressional reauthorization and congressional debate.” But as Rep. Alan Grayson, D-Fla., and other members of Congress have pointed out, there is essentially a "two-tiered" system for oversight, with lawmakers and staff on specialized committees, such as the House and Senate committees on Intelligence and Homeland Security, controlling the flow of information and routinely excluding other Congress members. A large number of lobbyists and consultants [pass] through the revolving door between the intelligence community and the watchdogs who purportedly oversee the intelligence community. Lobbyist influence is a particularly sensitive issue when it comes to intelligence committees, since those committees oversee secret “black budgets” in which money is disbursed with greatly reduced public oversight. The potential for self dealing is significant; former Rep. Randy “Duke” Cunningham, R-Calif., was caught accepting bribes to essentially earmark government contracts into a black budget. Lobbyist control over the House and Senate intelligence and homeland security committees may have a profound impact on a range of surveillance issues debated by Congress this year, including the Cybersecurity Information Sharing Act and the Patriot Act.
Note: The above article details several examples of industry lobbyists now operating in key government oversight positions within an unaccountable intelligence establishment. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in intelligence agencies.
Pete Seeger, composer of classic American folk tunes including "If I Had a Hammer" and "Where Have All the Flowers Gone?", was spied on by FBI agents for more than two decades because he wrote a protest letter as a young man concerned about plans to deport tens of thousands of Japanese American citizens at the end of the second world war. A vast file on Seeger was released ... in response to a request under the freedom of information act. The bureau’s spies first took an interest in the singer in 1943, [and continued] into the early 1970s. The suspicion was that Seeger, who died in early 2014, was a security risk with close connections to the Communist party. The FBI file on him has nearly 1,800 pages – 90 of them are still withheld for security reasons. Throughout the 1950s, when Seeger was part of the Weavers folk group, the bureau commissioned hundreds of reports on him. As the Weavers scored chart hits, Seeger was blacklisted for his suspected Communist party links. In 1955 he was called before the House Committee on un-American Activities and asked if he was a communist. “I am not going to answer any questions as to my associations, my philosophical or religious beliefs or my political beliefs or how I voted in any election or any of these private affairs,” Seeger replied. Two years later he was cited for contempt of Congress and then, four years later, found guilty and sentenced to a year in prison. Let free on bail, Seeger’s conviction was overturned a year later.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The “war on terror” is not the CIA’s first venture into human experimentation. At the dawn of the Cold War, German scientists and doctors with Nazi records of human experimentation were given new identities and brought to the United States under Operation Paperclip. In 1953, the CIA established the MK-ULTRA program, [which] evolved into experiments in psychological torture. During the Vietnam War, the CIA developed the Phoenix program, which combined psychological torture with brutal interrogations, human experimentation and extrajudicial executions. In 1963, the CIA produced a manual titled “Kubark Counterintelligence Interrogation” to guide agents in the art of extracting information. An updated version of the Kubark guide [was] produced in 1983 and titled “Human Resource Exploitation Manual” [for CIA supported] right-wing regimes in Latin America and Southeast Asia. Here we are again. On April 15, 2002, [psychologists hired by the CIA] Mitchell and Jessen arrived at a black site in Thailand to supervise the interrogation of Abu Zubaydah, the first “high-value detainee” captured by the CIA. From then ... at least thirty-eight people were subjected to psychological and physical torments, and the results were methodically documented and analyzed. That is the textbook definition of human experimentation.
Note: For more along these lines, see this list depicting the rampant use of humans as guinea pigs in government, military, and medical experiments over the last century, or watch "Human Resources", a two-hour documentary on the subject. For more, see the excellent, reliable resources provided in our Mind Control Information Center.
The intrusions into former CBS News correspondent Sharyl Attkisson’s computers constitute the narrative spine of the reporter’s new book “Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington.” In October 2012, right in the midst of the Benghazi story ... a person who’s identified as “Jeff” warns Attkisson: “I’ve been reading your reports online about Benghazi. It’s pretty incredible. Keep at it. But you’d better watch out.” So CBS News hires an independent computer analyst whom Attkisson identifies as "Jerry Patel." He finds a massive amount of suspicious activity in the computer. Intrusions of this caliber, concludes “Patel,” are “far beyond the the abilities of even the best nongovernment hackers.” In summing up, Attkisson writes, “Everything Patel has found serves to confirm my January source and analysis. Patel tells me that only a few entities possess these skills. One of them is the U.S. government. [Computer security specialist] Don Allison ... takes a close look at Attkisson’s iMac. The results: “While a great deal of data has been expertly wiped in an attempt to cover-up the deed, Don is able to find remnants of what was once there. There’s key evidence of a government computer connection to my computer. A sort of backdoor link that leads to an ISP address for a government computer that can’t be accessed by the general public on the Web. It’s an undeniable link to the U.S. government.”
Note: For lots more on this courageous reporter and suppression of vital news, read this article and this one. Then read even more mind-blowing reports of news suppression by top journalists.
TERRY GROSS: James Risen [is] an investigative reporter for The New York Times. He, along with Eric Lichtbau, broke the story about warrantless wiretapping. Now Risen is facing a prison sentence for refusing to reveal his source or sources for that story. [Risen] has a new book called "Pay Any Price: Greed, Power And Endless War," which is a series of investigations into who's making money on the War on Terror and what are some of the secret operations within it. You recently wrote an article in The New York Times with Laura Poitras who broke the Edward Snowden story along with Glenn Greenwald. And you reported on how American intelligence is trying to harvest facial imagery with the intention of - what's it for? RISEN: Facial recognition ... in a way that no [one] really understood before has become a central focus of the NSA today. They can link that up with a signals intelligence, which is the communications that they intercept [and] basically find where you are, what you're doing, who you're seeing and virtually anything about you in real time. GROSS: So ... your big story turned out kind of differently than the celebrations facing Woodward and Bernstein. RISEN: I think the times have changed. We had this period in journalism for about 30 years where there was the government and the press. The government ... wouldn't go after whistleblowers or reporters very aggressively. It's only after the - after 9/11 and after the plane case, which you may remember where Judy Miller was sent to jail. I think the post-9/11 age, the government has decided to become much more aggressive against reporters and whistleblowers.
Note: The above quotes are from the transcript of a radio interview that you can listen to by clicking on the news story link provided. For more along these lines, see concise summaries of deeply revealing stories about high level manipulation of mass media from reliable sources.
In the space of a single primetime address on [September 10], Barack Obama dealt a crippling blow to a creaking, 40-year old effort to restore legislative primacy to American warmaking. The administration’s rationale, at odds with the war it is steadily expanding, is to forestall an endless conflict foisted upon it by a bloodthirsty legislature. Yet one of the main authorities Obama is relying on for avoiding Congress is the 2001 ... document known as the Authorization to Use Military Force (AUMF) that few think actually applies to ISIS. Taken together with the congressional leadership’s shrug, Obama has stripped the veneer off a contemporary fact of American national security: presidents make war on their own, and congresses acquiesce. An allergy to congressional authorisation is enmeshed with the president’s stated desire to end what he last year termed a “perpetual war” footing. It has led Obama in directions legal scholars consider highly questionable. Not only has Obama rejected restrictions of his warmaking power, he has also rejected legislative expansions of it - a more curious choice. Obama has been wary that Congress will offer up new laws that entrench and expand an amorphous war that, in his mind, he has waged with the minimum necessary amount of force. Obama last year advocated the eventual repeal of the 2001 authorisation - as well as the 2002 congressional approval of the Iraq war - to aid in turning a page on a long era of US warfare. [After Obama's address] a senior administration official told reporters that the 2001 authorisation covered the war against ISIS.
Note: The war machine marches on as the US presidency claims ever more power over Congress. For more on this, see concise summaries of deeply revealing war news articles from reliable major media sources.
The CIA brought top al-Qaeda suspects close “to the point of death” by drowning them in water-filled baths during interrogation sessions in the years that followed the September 11 attacks, a security source has told The Telegraph. The description of the torture meted out to at least two leading al-Qaeda suspects, including the alleged 9/11 mastermind Khalid Sheikh Mohammed, far exceeds the conventional understanding of waterboarding, or “simulated drowning” so far admitted by the CIA. “They weren’t just pouring water over their heads or over a cloth,” said the source who has first-hand knowledge of the period. “They were holding them under water until the point of death, with a doctor present to make sure they did not go too far. This was real torture.” The account of extreme CIA interrogation comes as the US Senate prepares to publish a declassified version of its so-called Torture Report – a 3,600-page report document based on a review of several million classified CIA documents. Publication of the report is currently being held up by a dispute over how much of the 480-page public summary should remain classified, but it is expected to be published within weeks. A second source who is familiar with the Senate report told The Telegraph that it contained several unflinching accounts of some CIA interrogations which – the source predicted – would “deeply shock” the general public.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
Florida’s former U.S. Sen. Bob Graham ... has been fighting both the Bush and Obama administrations to declassify 28 pages of a 9/11 intelligence report that may detail and expose the efforts of members of the Saudi Arabian royal family in aiding and abetting [9/11] terrorists in Florida, many who were themselves Saudi. Graham is befuddled as to why the Obama administration does not release these documents, which he read when he was chair of the Senate Select Intelligence Committee and co-chair of a congressional inquiry into the 9/11 attacks. As a result, he has joined a Freedom of Information Act request alongside others, asking that 80,000 pages of information on a Saudi family that disappeared just before the attacks be made public. “It isn’t credible that 19 people — most [of whom] could not speak English well and did not have experience in the United States — could carry out such a complicated task without external assistance,” Graham insists. The Saudi family living in Sarasota fled to Saudi Arabia just prior to the 9/11 attacks. Were they tipped off that they should leave? If so, by whom? Graham believes that there was a deliberate effort to cover up Saudi involvement in the tragedy of 9/11 by the Bush administration, one, he says, that the Obama administration appears to support. The American public needs to know. The families of those who were lost to the 9/11 attacks or those who fought in Afghanistan and Iraq deserve an answer as well.
Note: For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.
[Google engineers] are making it far more difficult — and far more expensive — for the National Security Agency and the intelligence arms of other governments around the world to pierce their systems. As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps. After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant. But governments are fighting back, harder than ever. The cellphone giant Vodafone reported ... that a “small number” of governments around the world have demanded the ability to tap directly into its communication networks [and] noted that some countries did not issue warrants to obtain phone, email or web-searching traffic, because “the relevant agencies and authorities already have permanent access to customer communications via their own direct link.”
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
Just before Edward Snowden became a household name, the ACLU argued before the supreme court that the FISA Amendments Act – one of the two main laws used by the NSA to conduct mass surveillance – was unconstitutional. In a sharply divided opinion, the Supreme Court ruled, 5-4, that the case should be dismissed because the plaintiffs didn't have "standing". The court relied on two claims by the Justice Department to support their ruling: 1) that the NSA would only get the content of Americans' communications without a warrant when they are targeting a foreigner abroad for surveillance, and 2) that the Justice Department would notify criminal defendants who have been spied on under the Fisa Amendments Act, so there exists some way to challenge the law in court. It turns out that neither of those statements were true. One of the most explosive Snowden revelations exposed a then-secret technique known as "about" surveillance. As the New York Times first reported, the NSA "is searching the contents of vast amounts of Americans' e-mail and text communications into and out of the country, hunting for people who mention information about foreigners under surveillance." In other words, the NSA doesn't just target a contact overseas – it sweeps up everyone's international communications into a dragnet and searches them for keywords. The Snowden leaks also pushed the Justice Department to admit ... that the government hadn't been notifying any defendants they were being charged based on NSA surveillance.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The Obama administration has barred officials at 17 agencies from speaking to journalists about unclassified intelligence-related topics without permission, according to a newly disclosed directive. The directive, issued by James R. Clapper Jr., the director of national intelligence, also requires the agencies’ employees to report any unplanned contact with journalists. Officials who violate the directive may be disciplined or fired, the directive says. The directive prohibits unauthorized “contact with the media about intelligence-related information, including intelligence sources, methods, activities and judgments,” without regard to whether it is classified. It says that employees who violate the policy “may be subject to administrative actions that may include revocation of security clearances or termination of employment.” At a minimum, the directive adds, any violation of the policy “will be handled in the same manner as a security violation.” Mr. Clapper signed the directive on March 20, and it was quietly posted on the office’s website last week. The directive limiting contact with reporters was reported Monday by Steve Aftergood, a government secrecy specialist for the Federation of American Scientists. In a blog post, Mr. Aftergood portrayed the directive as seeking to ensure that “the only news about intelligence is to be authorized news.” He criticized the policy as going too far, arguing that routine interactions between agency employees and reporters about unclassified matters did not pose a threat to national security, but that limiting them would hurt the public.
Note: Yet another major effort to muzzle whistleblowers. For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Two weeks ago, a pair of F.B.I. agents appeared unannounced at the door of a member of the defense team for one of the men accused of plotting the 9/11 terrorist attacks. As a contractor working with the defense team at Guantánamo Bay, Cuba, the man was bound by the same confidentiality rules as a lawyer. But the agents wanted to talk. They asked questions, lawyers say, about the legal teams for Ramzi bin al-Shibh, Khalid Shaikh Mohammed and other accused terrorists who will eventually stand trial before a military tribunal at Guantánamo. Before they left, the agents asked the contractor to sign an agreement promising not to tell anyone about the conversation. With that signature, Mr. bin al-Shibh’s lawyers say, the government turned a member of their team into an F.B.I. informant. The F.B.I.’s inquiry became the focus of the pretrial hearings at Guantánamo this week, after the contractor disclosed it to the defense team. It was a reminder that, no matter how much the proceedings at the island military prison resemble a familiar American trial, the invisible hand of the United States government is at work there in ways unlike anything seen in typical courtrooms. “It’s a courtroom with three benches,” said Eugene R. Fidell, who teaches military justice at Yale Law School. “There’s one person pretending to be the judge, and two other agencies behind the scenes exerting at least as much influence.” Thirteen years after 9/11, nobody has been convicted in connection with the attacks.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The Obama administration on [April 3] defended its creation of a Twitter-like Cuban communications network [called ZunZuneo] to undermine the Communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval. But two senior Democrats on congressional intelligence and judiciary committees said they had known nothing about the effort. An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform. First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent. Yet its users were neither aware it was created by [USAID, the U.S. Agency for International Development] with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes. Josefina Vidal, director of U.S. affairs at Cuba's Foreign Ministry, said ... that the ZunZuneo program "shows once again that the United States government has not renounced its plans of subversion against Cuba, which have as their aim the creation of situations of destabilization in our country to create changes in the public order and toward which it continues to devote multimillion-dollar budgets each year."
Note: If any other country did this to the U.S., how do you think the U.S. government would respond?
A Senate intelligence committee investigation found that the Central Intelligence Agency employed brutal interrogation methods that turned out to be largely useless and then lied about their effectiveness. The Senate report contradicts the main defenses of the Bush-era torture program: That harsh methods were needed to produce "actionable results," and that the program itself helped save American lives by foiling terror attacks. Instead, the CIA overstated the effectiveness of the program and concealed the harshness of the methods they used. Intelligence breakthroughs credited to the “enhanced interrogation” program by the CIA were instead gleaned through other means, and then used by the agency to bolster defenses of the program. Conservative media figures incessantly hyped former Bush administration officials’ at times verifiably false claims about the efficacy of the program. The Bush administration’s trip to the “dark side” provided pundits, op-ed columnists, and other media personalities an endless stream of satisfaction from talking like the greased up protagonists of 1980s action films.
Note: For an article explaining how even though this report may be declassified, the public will not have access to most of it, click here. For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Three days after an FBI agent was cleared of wrongdoing in the bizarre killing of an associate of slain Boston bombing suspect Tamerlan Tsarnaev, lawyers for Dzhokhar Tsarnaev, the only surviving bombing suspect, alleged that the FBI attempted to recruit the elder Tsarnaev as an informant. Dzhokhar Tsarnaev’s defense team said that new information suggests the FBI interviewed Tamerlan on several occasions before the attack, and even pressured him to surreptitiously report on the Chechen underworld. The Bureau has continued to emphatically state that it didn’t know the identities of the two suspected bombers until they were fingerprinted, and have denied any involvement with the brothers aside from following up on a tip from a Russian emissary that the elder Tsarnaev may have been seeking jihad. In the case of Ibragim Todashev, who allegedly took part with Tamerlan in a robbery turned triple-homicide in Waltham, in 2011, family members have also stated that FBI pressure may have pushed the 20-something ethnic Chechen and mixed martial arts fighter to the brink of violence. Since the terrorist attacks of 9/11, the Bureau has stepped up surveillance of specific racial, ethnic and religious communities, including the use of informants. The tactics have ... left the Bureau open to charges of entrapment, not to mention assorted Internet conspiracy theories. Part of those post-9/11 tactics are the use of “voluntary interviews … often encouraging interviewees to serve as informants in their communities,” writes the American Civil Liberties Union.
Note: Why didn't the FBI reveal its attempt to recruit the elder Tsarnaev when the bombing happened? Something is quite fishy here.
From 10,000 feet up, tracking an entire city at one glance: Ohio-based Persistent Surveillance Systems is trying to convince cities across the country that its surveillance technology can help reduce crime. Its new generation of camera technology is far more powerful than the police cameras to which America has grown accustomed. But these newer cameras have sparked some privacy concerns. A new, far more powerful generation is being quietly deployed [from small aircraft] that can track every vehicle and person across an area the size of a small city, for several hours at a time. Although these cameras can’t read license plates or see faces, they provide such a wealth of data that police, businesses and even private individuals can use them to help identify people and track their movements. Already, the cameras have been flown above major public events such as the Ohio political rally where Sen. John McCain named Sarah Palin as his running mate in 2008. They’ve been flown above Baltimore; Philadelphia; Compton, Calif.; and Dayton [OH] in demonstrations for police. They’ve also been used for traffic impact studies, [and] for security at NASCAR races. Defense contractors are developing similar technology for the military, but its potential for civilian use is raising novel civil liberties concerns. In Dayton, where Persistent Surveillance Systems is based, city officials balked last year when police considered paying for 200 hours of flights, in part because of privacy complaints. The Supreme Court generally has given wide latitude to police using aerial surveillance as long as the photography captures images visible to the naked eye.
Note: For more on surveillance by government agencies and corporations, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.