Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
When Bill Binney, former NSA analyst and head of the anti-terror ThinThread metadata program sits in front of you and says he is not afraid of the government, you have to admire him. A wheel-chair-bound U.S. serviceman who rose in the ranks of intelligence to work in top-secret NSA programs, Binney created ThinThread prior to September 11, 2001, and says it mathematically broke down all phone communications anywhere in the world without any infringement on Constitutional rights. The program was self-running. More important, it worked. In "A Good American," the new documentary from executive producer Oliver Stone ... audiences are taken on a tense and frightening ride through Binney and his colleagues' experience developing and deploying ThinThread in tests, only to see its funding pulled just weeks before 9/11 in favor of an expensive and ineffective ... program called Trailblazer. Binney contends that ThinThread would have identified the terrorists who planned and executed the 9/11 terror attacks, thereby preventing them from occurring. When ThinThread's plug was pulled, Binney and his team challenged their NSA bosses, and in the process found themselves at odds with the U.S. government and in a complex web of lies and corruption. Thus, when Binney said he remains unafraid of possible repercussions or retaliation tied to the film's thesis, it's not hard to believe. "What else can they do to me?" he asks. "They've already tried everything to stop me."
Note: Watch a free trailer or rent the whole documentary on this webpage. Read a revealing, detailed New York Times article on Oliver Stone and his profound work to expose corruption and manipulation through film. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
The C.I.A., the F.B.I. and the White House may all agree that Russia was behind the hacking that interfered with the election. But that was of no import to the website Breitbart News, which dismissed reports on the intelligence assessment as “left-wing fake news.” Until now, that term had been widely understood to refer to fabricated news accounts that are meant to spread virally online. But conservative cable and radio personalities ... have appropriated the term and turned it against any news they see as hostile to their agenda. In defining “fake news” so broadly and seeking to dilute its meaning, they are capitalizing on the declining credibility of all purveyors of information. Journalists who work to separate fact from fiction see a dangerous conflation of stories that turn out to be wrong because of a legitimate misunderstanding with those whose clear intention is to deceive. A report, shared more than a million times on social media, that the pope had endorsed Mr. Trump was undeniably false. But was it “fake news” to report on data models that showed Hillary Clinton with overwhelming odds of winning the presidency? Are opinion articles fake if they cherry-pick facts to draw disputable conclusions? “Fake news was a term specifically about people who purposely fabricated stories for clicks and revenue,” said David Mikkelson, the founder of Snopes, the myth-busting website. “Now it includes bad reporting, slanted journalism and outright propaganda. And I think we’re doing a disservice to lump all those things together.”
Note: For more along these lines, see concise summaries of deeply revealing media corruption news articles from reliable sources.
A former contractor for a UK-based public relations firm says that the Pentagon paid more than half a billion dollars for the production and dissemination of fake Al-Qaeda videos that portrayed the insurgent group in a negative light. The PR firm, Bell Pottinger, worked alongside top US military officials at Camp Victory in Baghdad at the height of the Iraq War. The agency was tasked with crafting TV segments in the style of unbiased Arabic news reports, videos of Al-Qaeda bombings that appeared to be filmed by insurgents, and anti-insurgent commercials. Those who watched the videos could be tracked by US forces. Bell Pottinger ... could have earned as much as $120m from the US in 2006. Former video editor Martin Wells, who worked on the IOTF contract with Bell Pottinger, said they were given very specific instructions on how to produce the fake Al-Qaeda propaganda films. US Marines would then take CDs containing the videos while on patrol, then plant them at sites during raids. “If they’re raiding a house and they’re going to make a mess of it looking for stuff anyway, they’d just drop an odd CD there,” he said. The CDs were encoded to open the videos on RealPlayer software that connects to the Internet when it runs. It would issue an IP address that could then be tracked by US intelligence. The programmes produced by Bell Pottinger would move up the chain of command ... and could sometimes go as high up as the White House for approval.
Note: Read more about the fake "Al Qaeda" videos produced and distributed for the Pentagon. For more along these lines, see concise summaries of deeply revealing news articles on military corruption and the manipulation of public perception.
Yahoo has been accused of secretly building a customised software programme to search all of its customers’ incoming emails for specific information provided by US intelligence officials. The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI. Reuters said that a number of surveillance experts said this represented the first case to surface of a US Internet company agreeing to a spy agency’s demand by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time. The agency also said it was unable to determine what data the company had handed over, and if the intelligence officials had approached other email providers besides Yahoo. US phone and Internet companies are known to have handed over bulk customer data to intelligence agencies. But some former government officials and private surveillance experts said they had not previously seen either such a broad directive for real-time Web collection or one that required the creation of a new computer program. “I’ve never seen that, a wiretap in real time on a ‘selector’,” said Albert Gidari, a lawyer who represented phone and Internet companies on surveillance. A selector refers to a type of search term used to zero in on specific information. He added: “It would be really difficult for a provider to do that.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about corporate corruption and the disappearance of privacy.
Secret FBI rules allow agents to obtain journalists’ phone records with approval from two internal officials - far less oversight than under normal judicial procedures. The classified rules ... govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a judge or informing the news organization being targeted. Obtaining a journalist’s records with a national security letter (or NSL) requires the signoff of the FBI’s general counsel and the executive assistant director of the bureau’s National Security Branch. The Obama administration has come under criticism for bringing a record number of leak prosecutions and aggressively targeting journalists in the process. In 2013, after it came out that the Justice Department had secretly seized records from phone lines at the Associated Press and surveilled ... reporter James Rosen, then-Attorney General Eric Holder tightened the rules. The FBI could not label reporters as co-conspirators in order to try to identify their sources - as had happened with Rosen - and it became more difficult to get journalists’ phone records without notifying the news organization first. Yet these changes did not apply to NSLs. Those are governed by a separate set of rules. The FBI issues thousands of NSLs each year, including nearly 13,000 in 2015. Over the years, a series of Inspector General reports found significant problems with their use, yet the FBI is currently pushing to expand the types of information it can demand with an NSL.
Note: The aggressive pursuit of leaks and journalists that report them led BBC to recently ask: "Is the US government at war with whistleblowers?" Read more about the FBI's use of secret National Security Letters. For more along these lines, see concise summaries of deeply revealing news articles on media manipulation and the disappearance of privacy.
Hidden microphones that are part of a clandestine government surveillance program that has been operating around the Bay Area has been exposed. Imagine standing at a bus stop, talking to your friend and having your conversation recorded without you knowing. It happens all the time, and the FBI doesn’t even need a warrant to do it. Jeff Harp, a ... security analyst and former FBI special agent said, “They put microphones under rocks, they put microphones in trees, they plant microphones in equipment. I mean, there’s microphones that are planted in places that people don’t think about, because that’s the intent!” FBI agents hid microphones inside light fixtures and at a bus stop outside the Oakland Courthouse without a warrant to record conversations, between March 2010 and January 2011. Federal authorities are trying to prove real estate investors in San Mateo and Alameda counties are guilty of bid rigging and fraud and used these recordings as evidence. The lawyer for one of the accused real estate investors who will ask the judge to throw out the recordings, told KPIX 5 News that, “Speaking in a public place does not mean that the individual has no reasonable expectation of privacy … private communication in a public place qualifies as a protected ‘oral communication.'”
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
Bechtel - a behemoth among closely held companies - has been the world’s builder, benefiting from vast government contracts for engineering and infrastructure work in difficult places while it nurtured relationships with power brokers in Washington. In The Profiteers, journalist Sally Denton seeks to unravel the history of Bechtel. Her story is one of “how a dynastic line of rulers from the same American family conducts its business” and how its system of networking now pervades US capitalism. Anecdotes of Bohemian Grove, the secretive retreat that became an all-male “summer camp” for US corporate, political and military elites to toast marshmallows, skinny-dip in the river north of San Francisco and dress in drag for skits, elucidate the chummy nature of big business. As of 2014, [Bechtel's] reported revenue was $37bn, with projects and employees in 37 countries. The corporation’s embrace of Saudi Arabia as a lucrative client and its decades-long and contorted experience in Iraq also makes sense of some aspects of US foreign policy - as well as its intelligence-gathering operations. The life and times of John McCone, a former Bechtel executive who later served as CIA director in the US administrations of Presidents Kennedy and Johnson, is chronicled deftly here. It is worth noting: McCone was and is critical to Bechtel’s dominance today. He devised the idea of “cost-plus contracts” for the toughest jobs sought by government. Contractors are guaranteed a profit in such deals.
Note: Bechtel was at the center of a major Iraqi reconstruction scandal in 2007. More recently, major defense contractors have been publicly congratulating themselves for steering US policy towards militarism. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the corporate world.
Survivors of CIA torture have sued the contractor psychologists who designed one of the most infamous programs of the post-9/11 era. In an extraordinary step, psychologists James Mitchell and Bruce Jessen now face a federal lawsuit for their role in convincing the CIA to subject terror suspects to mock drowning, painful bodily contortions, sleep and dietary deprivation and other methods long rejected by much of the world as torture. In practice, CIA torture meant disappearances, mock executions, anal penetration ... and at least one man who froze to death, according to a landmark Senate report last year. On behalf of torture survivors ... as well as a representative of the estate of Gul Rahman – who froze to death in a CIA black site in Afghanistan – the American Civil Liberties Union (ACLU) filed the suit against Mitchell and Jessen on Tuesday in a federal court in Washington state. The suit calls the torture program a “joint criminal enterprise” and a “war crime” in which the CIA, Mitchell and Jessen colluded and from which Mitchell and Jessen financially profited. Although numerous US government investigations have pierced the veneer of secrecy around the torture program, the program’s government architects have faced no legal reprisal. A Justice Department inquiry ended in 2012 without prosecutions. The new lawsuit, aimed not at government officials but the contractors Mitchell and Jessen, aims to break the trend.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
Government papers about the former home secretary Leon Brittan are among a fresh batch of documents which have come to light months after the conclusion of an official review into whether allegations of child abuse were covered up by the Home Office in the 1980s. The documents also reveal that the then director general of MI5 corresponded with the Cabinet Secretary in 1986 about an unnamed MP who was alleged to have “a penchant for small boys”. The letter from Sir Anthony Duff to Sir Robert Armstrong added: “At the present stage ... the risks of political embarrassment to the government is rather greater than the security danger.” “The risk to children is not considered at all,” Peter Wanless, chief executive of the NSPCC, and barrister Richard Whittam, said in a supplement to their review. The papers ... will be passed to an ongoing independent inquiry into child abuse within state and non-state institutions. Previously unreleased files also concern figures including Margaret Thatcher’s parliamentary private secretary, the late Sir Peter Morrison, former diplomat Sir Peter Hayman and former minister Sir William van Straubenzee. The papers also contain material on allegations by a former British army intelligence agent, Colin Wallace, about the Kincora boys’ home in Northern Ireland, which has long been at the centre of abuse claims. The Wanless review, published in November after the investigation of 114 missing Home Office files, could not rule out the possibility of files being destroyed as part of a coverup.
Note: Watch powerful evidence in a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government. For more along these lines, see concise summaries of deeply revealing news articles on sex abuse scandals from reliable major media sources.
Moxie Marlinspike has ... created an encryption program that scrambles messages until they reach the intended reader. The software is effective enough to alarm governments. British Prime Minister David Cameron called protected-messaging apps a “safe space” for terrorists. The following week, President Barack Obama called them “a problem.” In a research paper released Tuesday, 15 prominent technologists cited three programs relying on Mr. Marlinspike’s code as options for shielding communications. His encrypted texting and calling app, Signal, has come up in White House meetings. Former National Security Agency contractor Edward Snowden, who leaked troves of U.S. spying secrets, urged listeners to use “anything” that Mr. Marlinspike releases. That endorsement was “a little bit terrifying,” Mr. Marlinspike says. But he says he sees an opening, following Mr. Snowden’s revelations, to demystify, and simplify, encryption, so more people use it. Consumer encryption tools ... have been around since the early 1990s, but most are so cumbersome that few people use them, [limiting] the use of encryption to a level law enforcement has mostly learned to live with. Adding easy-to-use encryption that companies can’t unscramble to products used by millions changes that calculus. Technology companies, once cozy with Washington, sound increasingly like Mr. Marlinspike. Apple, Facebook, Google and others are resisting efforts to give the government access to encrypted communications.
Note: For more along these lines, see concise summaries of deeply revealing news articles about the corrupt intelligence agencies that are attempting to erode privacy rights in the U.S. and elsewhere.
Edward Snowden is in exile in Moscow. He's still hard at work. Whatever he's working on, the former NSA contractor who exposed controversial US surveillance practices, says it's much tougher than his last gig. "The fact is I was getting paid an extraordinary amount of money for very little work with very little in the way of qualifications. That's changed significantly," Snowden said in an event at Stanford University on Friday, via teleconference from Moscow. Last week, a federal appeals court ruled that the NSA's massive collection of Americans' phone records is illegal — a victory for Snowden, who revealed the existence of the surveillance program in the documents he leaked to the press. Snowden said in the teleconference that he worked with reporters so that there could be a system of checks and balances, and noted that he did not publish a single document himself. Still, he couldn't leak his secrets anonymously to the reporters because his colleagues' livelihoods would have been at risk as well if the NSA conducted a witch-hunt, Snowden said. "Whistleblowers are elected by circumstance. Nobody self nominates to be a whistleblower because it’s so painful," Snowden said, [and] emphasized that he doesn't see himself as a hero or a traitor, but he had just reached the tipping point where he needed to do something.
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of privacy rights from reliable major media sources.
About once a month, staff members of the congressional intelligence committees drive across the Potomac River to C.I.A. headquarters in Langley, Va., and watch ... footage of drone strikes. The screenings have provided a veneer of congressional oversight. The C.I.A.’s killing missions are ... unlikely to change significantly despite President Obama’s announcement on Thursday that a drone strike accidentally killed two innocent hostages, an American and an Italian. Michael D’Andrea ... was chief of operations during the birth of the agency’s detention and interrogation program and then, as head of the C.I.A. Counterterrorism Center, became an architect of the targeted killing program. He presided over the growth of C.I.A. drone operations and hundreds of strikes. Mr. D’Andrea was a forceful advocate for the drone program. He was particularly effective in winning the support of Senator Dianne Feinstein, the California Democrat who was chairwoman of the Senate Intelligence Committee until January. The confidence Ms. Feinstein and other Democrats express about the drone program ... stands in sharp contrast to the criticism among lawmakers of the now defunct C.I.A. program to capture and interrogate Qaeda suspects in secret prisons. When Ms. Feinstein was asked in a meeting with reporters in 2013 why she was so sure she was getting the truth about the drone program while she accused the C.I.A. of lying to her about torture, she seemed surprised. “That’s a good question, actually.”
Note: The CIA has been aware that drone strikes are ineffective since at least 2009. If drones help terrorists, almost always miss their intended targets, and may be used to target people in the US in the future, what are the real reasons for the US government's drone program?
The idea was once considered fringe — to purposely re-engineer the planet's climate as a last ditch effort to battle global warming with an artificial cloud. No longer. In a nuanced, two-volume report, the National Academy of Sciences said that the concept should not be acted upon immediately because it is too risky, but it should be studied and perhaps tested outdoors in small projects. Because warming has worsened and some countries might act unilaterally, scientists said research is needed to calculate the consequences. Panel chairwoman Marcia McNutt, editor of the journal Science and former director of the U.S. Geological Survey, said in an interview that the public should read this report "and say, 'This is downright scary.' And they should say, 'If this is our Hail Mary, what a scary, scary place we are in.'" The committee scientists said once you start this type of tinkering, it would be difficult to stop. A decision to spray particles into the air would have to continue for more than 1,000 years. The report was requested by U.S. intelligence agencies, academy president Ralph J. Ciccerone said. Because the world is not reducing the emissions of greenhouse gases that cause global warming, scientists have been forced "to at least consider what is known as geoengineering," he said.
Note: The National Academy of Science's two-part report says that geoengineering technologies "present serious known and possible unknown environmental, social, and political risks, including the possibility of being deployed unilaterally." The US military has used the weather as a weapon in the past. Now, with a deeply corrupt scientific establishment being guided by corrupt intelligence agencies to meddle with the planet's total ecology, and with low public awareness about the messy history of mysterious atmospheric experiments over cities in the U.S. and elsewhere, what could possibly go wrong?
The outrageous whitewash issued Wednesday by the CIA panel John Brennan hand-picked to lead the investigation into his agency's spying on Senate staffers is being taken seriously by the elite Washington media, which is solemnly reporting that officials have been "cleared" of any "wrongdoing". The panel's report is just the latest element in a long string of cover-ups and deceptions orchestrated by Brennan. At issue, of course, is the same intrusion into Senate computers that Brennan initially tried to make people think was a figment of then-Senate Intelligence Committee Chair Dianne Feinstein's warped imagination. "Nothing could be further from the truth," Brennan said when confronted with Feinstein's allegations. Senator Ron Wyden ... issued a statement in response to the newly released documents: "First, agency officers and contractors went far beyond the limits set out even in the Justice Department's torture memos. Then, top officials spent a decade making inaccurate statements about torture's effectiveness to Congress, the White House and the American people. Next, instead of acknowledging these years of misrepresentations, the CIA's current leadership decided to double down on denial. And when CIA officials were worried that the Intelligence Committee had found a document that contradicted their claims, they secretly searched Senate computer files to find out if Senate investigators had obtained it." The panel's report can also be seen as Brennan's total assault on David B. Buckley, the CIA inspector general who wrote the first, highly critical report on the incident – and who suddenly resigned a few days ago.
Note: For more along these lines, see concise summaries of deeply revealing news articles about the manipulation of mass media and the routine dishonesty of intelligence agencies from reliable sources.
Sen. Dianne Feinstein’s last act as chair of the Senate Intelligence Committee ... had Washington’s most powerful forces arrayed against her. At the end ... Feinstein said she was more determined than ever to release the summary of a 6,700-page report on the CIA’s use of torture after the terrorist attacks of Sept. 11, 2001. “She has been vilified, the committee was spied on, the CIA and its supporters ran what amounted to a domestic disinformation campaign against the report and the committee,” said Stephen Rickard, executive director of the Open Society Policy Center, a civil liberties and human rights group in Washington. “She did her job.” Her job was to provide congressional oversight of an executive branch agency, and she met prolonged and intense resistance. Feinstein called the report “the most significant and comprehensive oversight report in the committee’s history, and perhaps in that of the U.S. Senate.” The Senate panel examined nearly 6.3 million pages of documents, without Republican cooperation and against the resistance of the CIA, which went so far as to hack Intelligence Committee computers and threaten to bring criminal charges against the staff. Although President Obama insisted he wanted the report made public, administration officials reportedly pressed for redactions that Senate Democrats said would make the report meaningless.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
In June 2011, (WikiLeaks’ founder) Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt. The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas. Cohen had moved to Google from the U.S. State Department. Schmidt arrived first, accompanied by his then partner, Lisa Shields ... a vice president of the Council on Foreign Relations. Two months later, WikiLeaks’ release of State Department cables was coming to an abrupt end. Two years later, in the wake of his early 2013 visits to China, North Korea and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, “back-channel diplomacy” for Washington. In 1999 ... Schmidt joined the New America Foundation. The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place hundreds of articles and op-eds per year. In 2003, the U.S. National Security Agency (NSA) had already started systematically violating the Foreign Intelligence Surveillance Act (FISA). During the same period, Google ... was accepting NSA money to the tune of $2 million to provide the agency with search tools. In 2012, Google arrived on the list of top-spending Washington, D.C., lobbyists. Whether it is being just a company or “more than just a company,” Google’s geopolitical aspirations are firmly enmeshed within the foreign-policy agenda of the world’s largest superpower.
Note: Read the complete Newsweek article summarized above for Julian Assange's detailed accounting of the connections between Washington D.C. insiders, Google and related technology companies, intelligence agencies, and civil society organizations. For more about Wikileaks, read this news article summary. For more on the geopolitical big picture, see these concise summaries of deeply revealing news articles from reliable major media sources.
The mysterious workings of a Pentagon office that oversees clandestine operations are unraveling in federal court, where a criminal investigation has exposed a secret weapons program ... to manufacture an untraceable batch of automatic-rifle silencers. The silencers — 349 of them — were ordered by a little-known Navy intelligence office at the Pentagon known as the Directorate for Plans, Policy, Oversight and Integration. The directorate is composed of fewer than 10 civilian employees, most of them retired military personnel. Court records filed by prosecutors allege that the Navy paid the auto mechanic — the brother of the directorate’s boss — $1.6 million for the silencers, even though they cost only $10,000 in parts and labor to manufacture. If the foreign-made weapons were equipped with unmarked silencers, the source said, the weapons could have been used by U.S. or foreign forces for special operations in other countries without any risk that they would be traced back to the United States. No documentation has surfaced in court to indicate that Navy officials formally signed off on the silencer project, although many pretrial motions have been filed under seal. Hall, the directorate official charged with illegally purchasing the silencers, has asserted that he received verbal approval for the secret program from Robert C. Martinage, a former acting undersecretary of the Navy, according to statements made during pretrial hearings. Martinage was forced to resign in January after investigators looking into the silencer deal found evidence that he had engaged in personal misconduct ... unrelated to the silencer contract.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations. Snowden said professionals were failing in their obligations to their clients, sources, patients and parishioners in what he described as a new and challenging world. "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe. Any communications should be encrypted by default," he said. Snowden's plea for the professions to tighten security came during an extensive and revealing interview with the Guardian in Moscow. During the seven hours of interview, Snowden: • Said if he ended up in US detention in Guantánamo Bay he could live with it. • Does not have any regrets. • Said that ... he was independently secure, living on savings, and money from awards and speeches he has delivered online round the world. • Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in "sexually compromising" situations are routinely passed around. He works online late into the night; a solitary, digital existence not that dissimilar to his earlier life. He said he was using part of that time to work on the new focus for his technical skills, designing encryption tools to help professionals such as journalists protect sources and data. He is negotiating foundation funding for the project, a contribution to addressing the problem of professions wanting to protect client or patient data, and in this case journalistic sources.
Note: Read the transcript of the Guardian's new interview of Edward Snowden. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
On the Today show and CBS, [Sec. of State John Kerry] said [Edward] Snowden "should man up and come back to the United States" to face charges. But John Kerry is wrong. As Snowden told Brian Williams on NBC later that night, ... he would have no chance whatsoever to come home and make his case – in public or in court. Snowden would come back home to a jail cell – and not just an ordinary cell-block but isolation in solitary confinement, ... probably [for] the rest of his life. The current state of whistleblowing prosecutions under the Espionage Act makes a truly fair trial wholly unavailable to an American who has exposed classified wrongdoing. The other NSA whistleblower prosecuted, Thomas Drake, was barred from uttering the words "whistleblowing" and "overclassification" in his trial. In the recent case of the State Department contractor Stephen Kim, the presiding judge ruled the prosecution "need not show that the information he allegedly leaked could damage US national security or benefit a foreign power, even potentially." Without reform to the Espionage Act that lets a court hear a public interest defense – or a challenge to the appropriateness of government secrecy in each particular case – Snowden and future Snowdens can and will only be able to "make their case" from outside the United States. Snowden acted in full knowledge of the constitutionally questionable efforts of the Obama administration, in particular, to use the Espionage Act in a way it was never intended by Congress: as the equivalent of a British-type Official Secrets Act criminalizing any and all unauthorized release of classified information.
Note: or more on the Snowden case, see the deeply revealing reports from reliable major media sources available here.
Three years after the CIA used an immunization survey as a cover in its hunt for Osama bin Laden, the White House has promised that the agency will never again use a vaccination campaign in its operations. Responding to a letter from the deans of 12 U.S. public health schools, Lisa Monaco, the assistant to the president for homeland security and counterterrorism, informed them last week that the CIA will no longer conduct such campaigns, White House spokeswoman Caitlin Hayden said. The deans wrote to President Obama in January 2013 to protest the precedent set when the CIA used Shakil Afridi, a Pakistani surgeon, to seek information ... under the guise of conducting a hepatitis immunization survey. “This disguising of an intelligence-gathering effort as a humanitarian public health service has resulted in serious collateral consequences that affect the public health community,” the deans wrote. International aid organizations were forced to move some of their staff members out of Pakistan, and some health workers were killed in a backlash against a polio vaccination effort. Attacks have continued sporadically. Last year, 83 new polio cases were reported in Pakistan, more than in Afghanistan or Nigeria, the other countries where it is endemic.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.