Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Yahoo has been accused of secretly building a customised software programme to search all of its customers’ incoming emails for specific information provided by US intelligence officials. The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI. Reuters said that a number of surveillance experts said this represented the first case to surface of a US Internet company agreeing to a spy agency’s demand by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time. The agency also said it was unable to determine what data the company had handed over, and if the intelligence officials had approached other email providers besides Yahoo. US phone and Internet companies are known to have handed over bulk customer data to intelligence agencies. But some former government officials and private surveillance experts said they had not previously seen either such a broad directive for real-time Web collection or one that required the creation of a new computer program. “I’ve never seen that, a wiretap in real time on a ‘selector’,” said Albert Gidari, a lawyer who represented phone and Internet companies on surveillance. A selector refers to a type of search term used to zero in on specific information. He added: “It would be really difficult for a provider to do that.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about corporate corruption and the disappearance of privacy.
Secret FBI rules allow agents to obtain journalists’ phone records with approval from two internal officials - far less oversight than under normal judicial procedures. The classified rules ... govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a judge or informing the news organization being targeted. Obtaining a journalist’s records with a national security letter (or NSL) requires the signoff of the FBI’s general counsel and the executive assistant director of the bureau’s National Security Branch. The Obama administration has come under criticism for bringing a record number of leak prosecutions and aggressively targeting journalists in the process. In 2013, after it came out that the Justice Department had secretly seized records from phone lines at the Associated Press and surveilled ... reporter James Rosen, then-Attorney General Eric Holder tightened the rules. The FBI could not label reporters as co-conspirators in order to try to identify their sources - as had happened with Rosen - and it became more difficult to get journalists’ phone records without notifying the news organization first. Yet these changes did not apply to NSLs. Those are governed by a separate set of rules. The FBI issues thousands of NSLs each year, including nearly 13,000 in 2015. Over the years, a series of Inspector General reports found significant problems with their use, yet the FBI is currently pushing to expand the types of information it can demand with an NSL.
Note: The aggressive pursuit of leaks and journalists that report them led BBC to recently ask: "Is the US government at war with whistleblowers?" Read more about the FBI's use of secret National Security Letters. For more along these lines, see concise summaries of deeply revealing news articles on media manipulation and the disappearance of privacy.
Hidden microphones that are part of a clandestine government surveillance program that has been operating around the Bay Area has been exposed. Imagine standing at a bus stop, talking to your friend and having your conversation recorded without you knowing. It happens all the time, and the FBI doesn’t even need a warrant to do it. Jeff Harp, a ... security analyst and former FBI special agent said, “They put microphones under rocks, they put microphones in trees, they plant microphones in equipment. I mean, there’s microphones that are planted in places that people don’t think about, because that’s the intent!” FBI agents hid microphones inside light fixtures and at a bus stop outside the Oakland Courthouse without a warrant to record conversations, between March 2010 and January 2011. Federal authorities are trying to prove real estate investors in San Mateo and Alameda counties are guilty of bid rigging and fraud and used these recordings as evidence. The lawyer for one of the accused real estate investors who will ask the judge to throw out the recordings, told KPIX 5 News that, “Speaking in a public place does not mean that the individual has no reasonable expectation of privacy … private communication in a public place qualifies as a protected ‘oral communication.'”
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
Bechtel - a behemoth among closely held companies - has been the world’s builder, benefiting from vast government contracts for engineering and infrastructure work in difficult places while it nurtured relationships with power brokers in Washington. In The Profiteers, journalist Sally Denton seeks to unravel the history of Bechtel. Her story is one of “how a dynastic line of rulers from the same American family conducts its business” and how its system of networking now pervades US capitalism. Anecdotes of Bohemian Grove, the secretive retreat that became an all-male “summer camp” for US corporate, political and military elites to toast marshmallows, skinny-dip in the river north of San Francisco and dress in drag for skits, elucidate the chummy nature of big business. As of 2014, [Bechtel's] reported revenue was $37bn, with projects and employees in 37 countries. The corporation’s embrace of Saudi Arabia as a lucrative client and its decades-long and contorted experience in Iraq also makes sense of some aspects of US foreign policy - as well as its intelligence-gathering operations. The life and times of John McCone, a former Bechtel executive who later served as CIA director in the US administrations of Presidents Kennedy and Johnson, is chronicled deftly here. It is worth noting: McCone was and is critical to Bechtel’s dominance today. He devised the idea of “cost-plus contracts” for the toughest jobs sought by government. Contractors are guaranteed a profit in such deals.
Note: Bechtel was at the center of a major Iraqi reconstruction scandal in 2007. More recently, major defense contractors have been publicly congratulating themselves for steering US policy towards militarism. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the corporate world.
Survivors of CIA torture have sued the contractor psychologists who designed one of the most infamous programs of the post-9/11 era. In an extraordinary step, psychologists James Mitchell and Bruce Jessen now face a federal lawsuit for their role in convincing the CIA to subject terror suspects to mock drowning, painful bodily contortions, sleep and dietary deprivation and other methods long rejected by much of the world as torture. In practice, CIA torture meant disappearances, mock executions, anal penetration ... and at least one man who froze to death, according to a landmark Senate report last year. On behalf of torture survivors ... as well as a representative of the estate of Gul Rahman – who froze to death in a CIA black site in Afghanistan – the American Civil Liberties Union (ACLU) filed the suit against Mitchell and Jessen on Tuesday in a federal court in Washington state. The suit calls the torture program a “joint criminal enterprise” and a “war crime” in which the CIA, Mitchell and Jessen colluded and from which Mitchell and Jessen financially profited. Although numerous US government investigations have pierced the veneer of secrecy around the torture program, the program’s government architects have faced no legal reprisal. A Justice Department inquiry ended in 2012 without prosecutions. The new lawsuit, aimed not at government officials but the contractors Mitchell and Jessen, aims to break the trend.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
Government papers about the former home secretary Leon Brittan are among a fresh batch of documents which have come to light months after the conclusion of an official review into whether allegations of child abuse were covered up by the Home Office in the 1980s. The documents also reveal that the then director general of MI5 corresponded with the Cabinet Secretary in 1986 about an unnamed MP who was alleged to have “a penchant for small boys”. The letter from Sir Anthony Duff to Sir Robert Armstrong added: “At the present stage ... the risks of political embarrassment to the government is rather greater than the security danger.” “The risk to children is not considered at all,” Peter Wanless, chief executive of the NSPCC, and barrister Richard Whittam, said in a supplement to their review. The papers ... will be passed to an ongoing independent inquiry into child abuse within state and non-state institutions. Previously unreleased files also concern figures including Margaret Thatcher’s parliamentary private secretary, the late Sir Peter Morrison, former diplomat Sir Peter Hayman and former minister Sir William van Straubenzee. The papers also contain material on allegations by a former British army intelligence agent, Colin Wallace, about the Kincora boys’ home in Northern Ireland, which has long been at the centre of abuse claims. The Wanless review, published in November after the investigation of 114 missing Home Office files, could not rule out the possibility of files being destroyed as part of a coverup.
Note: Watch powerful evidence in a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government. For more along these lines, see concise summaries of deeply revealing news articles on sex abuse scandals from reliable major media sources.
Moxie Marlinspike has ... created an encryption program that scrambles messages until they reach the intended reader. The software is effective enough to alarm governments. British Prime Minister David Cameron called protected-messaging apps a “safe space” for terrorists. The following week, President Barack Obama called them “a problem.” In a research paper released Tuesday, 15 prominent technologists cited three programs relying on Mr. Marlinspike’s code as options for shielding communications. His encrypted texting and calling app, Signal, has come up in White House meetings. Former National Security Agency contractor Edward Snowden, who leaked troves of U.S. spying secrets, urged listeners to use “anything” that Mr. Marlinspike releases. That endorsement was “a little bit terrifying,” Mr. Marlinspike says. But he says he sees an opening, following Mr. Snowden’s revelations, to demystify, and simplify, encryption, so more people use it. Consumer encryption tools ... have been around since the early 1990s, but most are so cumbersome that few people use them, [limiting] the use of encryption to a level law enforcement has mostly learned to live with. Adding easy-to-use encryption that companies can’t unscramble to products used by millions changes that calculus. Technology companies, once cozy with Washington, sound increasingly like Mr. Marlinspike. Apple, Facebook, Google and others are resisting efforts to give the government access to encrypted communications.
Note: For more along these lines, see concise summaries of deeply revealing news articles about the corrupt intelligence agencies that are attempting to erode privacy rights in the U.S. and elsewhere.
Edward Snowden is in exile in Moscow. He's still hard at work. Whatever he's working on, the former NSA contractor who exposed controversial US surveillance practices, says it's much tougher than his last gig. "The fact is I was getting paid an extraordinary amount of money for very little work with very little in the way of qualifications. That's changed significantly," Snowden said in an event at Stanford University on Friday, via teleconference from Moscow. Last week, a federal appeals court ruled that the NSA's massive collection of Americans' phone records is illegal — a victory for Snowden, who revealed the existence of the surveillance program in the documents he leaked to the press. Snowden said in the teleconference that he worked with reporters so that there could be a system of checks and balances, and noted that he did not publish a single document himself. Still, he couldn't leak his secrets anonymously to the reporters because his colleagues' livelihoods would have been at risk as well if the NSA conducted a witch-hunt, Snowden said. "Whistleblowers are elected by circumstance. Nobody self nominates to be a whistleblower because it’s so painful," Snowden said, [and] emphasized that he doesn't see himself as a hero or a traitor, but he had just reached the tipping point where he needed to do something.
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of privacy rights from reliable major media sources.
About once a month, staff members of the congressional intelligence committees drive across the Potomac River to C.I.A. headquarters in Langley, Va., and watch ... footage of drone strikes. The screenings have provided a veneer of congressional oversight. The C.I.A.s killing missions are ... unlikely to change significantly despite President Obamas announcement on Thursday that a drone strike accidentally killed two innocent hostages, an American and an Italian. Michael DAndrea ... was chief of operations during the birth of the agencys detention and interrogation program and then, as head of the C.I.A. Counterterrorism Center, became an architect of the targeted killing program. He presided over the growth of C.I.A. drone operations and hundreds of strikes. Mr. DAndrea was a forceful advocate for the drone program. He was particularly effective in winning the support of Senator Dianne Feinstein, the California Democrat who was chairwoman of the Senate Intelligence Committee until January. The confidence Ms. Feinstein and other Democrats express about the drone program ... stands in sharp contrast to the criticism among lawmakers of the now defunct C.I.A. program to capture and interrogate Qaeda suspects in secret prisons. When Ms. Feinstein was asked in a meeting with reporters in 2013 why she was so sure she was getting the truth about the drone program while she accused the C.I.A. of lying to her about torture, she seemed surprised. Thats a good question, actually.
Note: The CIA has been aware that drone strikes are ineffective since at least 2009. If drones help terrorists, almost always miss their intended targets, and may be used to target people in the US in the future, what are the real reasons for the US government's drone program?
The idea was once considered fringe — to purposely re-engineer the planet's climate as a last ditch effort to battle global warming with an artificial cloud. No longer. In a nuanced, two-volume report, the National Academy of Sciences said that the concept should not be acted upon immediately because it is too risky, but it should be studied and perhaps tested outdoors in small projects. Because warming has worsened and some countries might act unilaterally, scientists said research is needed to calculate the consequences. Panel chairwoman Marcia McNutt, editor of the journal Science and former director of the U.S. Geological Survey, said in an interview that the public should read this report "and say, 'This is downright scary.' And they should say, 'If this is our Hail Mary, what a scary, scary place we are in.'" The committee scientists said once you start this type of tinkering, it would be difficult to stop. A decision to spray particles into the air would have to continue for more than 1,000 years. The report was requested by U.S. intelligence agencies, academy president Ralph J. Ciccerone said. Because the world is not reducing the emissions of greenhouse gases that cause global warming, scientists have been forced "to at least consider what is known as geoengineering," he said.
Note: The National Academy of Science's two-part report says that geoengineering technologies "present serious known and possible unknown environmental, social, and political risks, including the possibility of being deployed unilaterally." The US military has used the weather as a weapon in the past. Now, with a deeply corrupt scientific establishment being guided by corrupt intelligence agencies to meddle with the planet's total ecology, and with low public awareness about the messy history of mysterious atmospheric experiments over cities in the U.S. and elsewhere, what could possibly go wrong?
The outrageous whitewash issued Wednesday by the CIA panel John Brennan hand-picked to lead the investigation into his agency's spying on Senate staffers is being taken seriously by the elite Washington media, which is solemnly reporting that officials have been "cleared" of any "wrongdoing". The panel's report is just the latest element in a long string of cover-ups and deceptions orchestrated by Brennan. At issue, of course, is the same intrusion into Senate computers that Brennan initially tried to make people think was a figment of then-Senate Intelligence Committee Chair Dianne Feinstein's warped imagination. "Nothing could be further from the truth," Brennan said when confronted with Feinstein's allegations. Senator Ron Wyden ... issued a statement in response to the newly released documents: "First, agency officers and contractors went far beyond the limits set out even in the Justice Department's torture memos. Then, top officials spent a decade making inaccurate statements about torture's effectiveness to Congress, the White House and the American people. Next, instead of acknowledging these years of misrepresentations, the CIA's current leadership decided to double down on denial. And when CIA officials were worried that the Intelligence Committee had found a document that contradicted their claims, they secretly searched Senate computer files to find out if Senate investigators had obtained it." The panel's report can also be seen as Brennan's total assault on David B. Buckley, the CIA inspector general who wrote the first, highly critical report on the incident – and who suddenly resigned a few days ago.
Note: For more along these lines, see concise summaries of deeply revealing news articles about the manipulation of mass media and the routine dishonesty of intelligence agencies from reliable sources.
Sen. Dianne Feinstein’s last act as chair of the Senate Intelligence Committee ... had Washington’s most powerful forces arrayed against her. At the end ... Feinstein said she was more determined than ever to release the summary of a 6,700-page report on the CIA’s use of torture after the terrorist attacks of Sept. 11, 2001. “She has been vilified, the committee was spied on, the CIA and its supporters ran what amounted to a domestic disinformation campaign against the report and the committee,” said Stephen Rickard, executive director of the Open Society Policy Center, a civil liberties and human rights group in Washington. “She did her job.” Her job was to provide congressional oversight of an executive branch agency, and she met prolonged and intense resistance. Feinstein called the report “the most significant and comprehensive oversight report in the committee’s history, and perhaps in that of the U.S. Senate.” The Senate panel examined nearly 6.3 million pages of documents, without Republican cooperation and against the resistance of the CIA, which went so far as to hack Intelligence Committee computers and threaten to bring criminal charges against the staff. Although President Obama insisted he wanted the report made public, administration officials reportedly pressed for redactions that Senate Democrats said would make the report meaningless.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
In June 2011, (WikiLeaks’ founder) Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt. The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas. Cohen had moved to Google from the U.S. State Department. Schmidt arrived first, accompanied by his then partner, Lisa Shields ... a vice president of the Council on Foreign Relations. Two months later, WikiLeaks’ release of State Department cables was coming to an abrupt end. Two years later, in the wake of his early 2013 visits to China, North Korea and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, “back-channel diplomacy” for Washington. In 1999 ... Schmidt joined the New America Foundation. The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place hundreds of articles and op-eds per year. In 2003, the U.S. National Security Agency (NSA) had already started systematically violating the Foreign Intelligence Surveillance Act (FISA). During the same period, Google ... was accepting NSA money to the tune of $2 million to provide the agency with search tools. In 2012, Google arrived on the list of top-spending Washington, D.C., lobbyists. Whether it is being just a company or “more than just a company,” Google’s geopolitical aspirations are firmly enmeshed within the foreign-policy agenda of the world’s largest superpower.
Note: Read the complete Newsweek article summarized above for Julian Assange's detailed accounting of the connections between Washington D.C. insiders, Google and related technology companies, intelligence agencies, and civil society organizations. For more about Wikileaks, read this news article summary. For more on the geopolitical big picture, see these concise summaries of deeply revealing news articles from reliable major media sources.
The mysterious workings of a Pentagon office that oversees clandestine operations are unraveling in federal court, where a criminal investigation has exposed a secret weapons program ... to manufacture an untraceable batch of automatic-rifle silencers. The silencers — 349 of them — were ordered by a little-known Navy intelligence office at the Pentagon known as the Directorate for Plans, Policy, Oversight and Integration. The directorate is composed of fewer than 10 civilian employees, most of them retired military personnel. Court records filed by prosecutors allege that the Navy paid the auto mechanic — the brother of the directorate’s boss — $1.6 million for the silencers, even though they cost only $10,000 in parts and labor to manufacture. If the foreign-made weapons were equipped with unmarked silencers, the source said, the weapons could have been used by U.S. or foreign forces for special operations in other countries without any risk that they would be traced back to the United States. No documentation has surfaced in court to indicate that Navy officials formally signed off on the silencer project, although many pretrial motions have been filed under seal. Hall, the directorate official charged with illegally purchasing the silencers, has asserted that he received verbal approval for the secret program from Robert C. Martinage, a former acting undersecretary of the Navy, according to statements made during pretrial hearings. Martinage was forced to resign in January after investigators looking into the silencer deal found evidence that he had engaged in personal misconduct ... unrelated to the silencer contract.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
The NSA whistleblower, Edward Snowden, has urged lawyers, journalists, doctors, accountants, priests and others with a duty to protect confidentiality to upgrade security in the wake of the spy surveillance revelations. Snowden said professionals were failing in their obligations to their clients, sources, patients and parishioners in what he described as a new and challenging world. "What last year's revelations showed us was irrefutable evidence that unencrypted communications on the internet are no longer safe. Any communications should be encrypted by default," he said. Snowden's plea for the professions to tighten security came during an extensive and revealing interview with the Guardian in Moscow. During the seven hours of interview, Snowden: • Said if he ended up in US detention in Guantánamo Bay he could live with it. • Does not have any regrets. • Said that ... he was independently secure, living on savings, and money from awards and speeches he has delivered online round the world. • Made a startling claim that a culture exists within the NSA in which, during surveillance, nude photographs picked up of people in "sexually compromising" situations are routinely passed around. He works online late into the night; a solitary, digital existence not that dissimilar to his earlier life. He said he was using part of that time to work on the new focus for his technical skills, designing encryption tools to help professionals such as journalists protect sources and data. He is negotiating foundation funding for the project, a contribution to addressing the problem of professions wanting to protect client or patient data, and in this case journalistic sources.
Note: Read the transcript of the Guardian's new interview of Edward Snowden. For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
On the Today show and CBS, [Sec. of State John Kerry] said [Edward] Snowden "should man up and come back to the United States" to face charges. But John Kerry is wrong. As Snowden told Brian Williams on NBC later that night, ... he would have no chance whatsoever to come home and make his case – in public or in court. Snowden would come back home to a jail cell – and not just an ordinary cell-block but isolation in solitary confinement, ... probably [for] the rest of his life. The current state of whistleblowing prosecutions under the Espionage Act makes a truly fair trial wholly unavailable to an American who has exposed classified wrongdoing. The other NSA whistleblower prosecuted, Thomas Drake, was barred from uttering the words "whistleblowing" and "overclassification" in his trial. In the recent case of the State Department contractor Stephen Kim, the presiding judge ruled the prosecution "need not show that the information he allegedly leaked could damage US national security or benefit a foreign power, even potentially." Without reform to the Espionage Act that lets a court hear a public interest defense – or a challenge to the appropriateness of government secrecy in each particular case – Snowden and future Snowdens can and will only be able to "make their case" from outside the United States. Snowden acted in full knowledge of the constitutionally questionable efforts of the Obama administration, in particular, to use the Espionage Act in a way it was never intended by Congress: as the equivalent of a British-type Official Secrets Act criminalizing any and all unauthorized release of classified information.
Note: or more on the Snowden case, see the deeply revealing reports from reliable major media sources available here.
Three years after the CIA used an immunization survey as a cover in its hunt for Osama bin Laden, the White House has promised that the agency will never again use a vaccination campaign in its operations. Responding to a letter from the deans of 12 U.S. public health schools, Lisa Monaco, the assistant to the president for homeland security and counterterrorism, informed them last week that the CIA will no longer conduct such campaigns, White House spokeswoman Caitlin Hayden said. The deans wrote to President Obama in January 2013 to protest the precedent set when the CIA used Shakil Afridi, a Pakistani surgeon, to seek information ... under the guise of conducting a hepatitis immunization survey. “This disguising of an intelligence-gathering effort as a humanitarian public health service has resulted in serious collateral consequences that affect the public health community,” the deans wrote. International aid organizations were forced to move some of their staff members out of Pakistan, and some health workers were killed in a backlash against a polio vaccination effort. Attacks have continued sporadically. Last year, 83 new polio cases were reported in Pakistan, more than in Afghanistan or Nigeria, the other countries where it is endemic.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Former National Security Agency contractor Edward Snowden, and one of the reporters who first broke the news of Snowden's documents, Laura Poitras, received a Ridenhour Truth-Teller prize [on April 30] to a standing ovation at the National Press Club. Snowden leaked classified documents that exposed the NSA's massive global surveillance programs. Snowden ... compared his actions with that of Director of National Intelligence James R. Clapper, who denied that the NSA was "wittingly" collecting data on millions of Americans in a Senate Intelligence Committee hearing last spring -- a claim at odds with revelations about domestic phone records collection as a result of documents provided by Snowden. "The oath that I remember is James Clapper raising his hand, swearing to tell the truth and then lying to the American public," Snowden said. "I also swore an oath, but that oath was not to secrecy, but to defend the American Constitution." While Clapper has accused Snowden of perpetrating the most "massive and damaging theft of intelligence" in U.S. history, Snowden argues his actions were serving a larger public interest that superseded the national intelligence need for secrecy. Later in the speech, he described Clapper as having "committed a crime by lying under oath to the American people," and questioned why charges were never brought against the director. By contrast, Snowden said, charges were brought against him soon after he revealed himself as the source of the leaks.
Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.
The FBI’s transformation from a crime-fighting agency to a counterterrorism organization in the wake of the Sept. 11, 2001, attacks has been well documented. Less widely known has been the bureau’s role in secret operations against al-Qaeda and its affiliates in Iraq and Afghanistan, among other locations around the world. With the war in Afghanistan ending, FBI officials have become more willing to discuss a little-known alliance between the bureau and the Joint Special Operations Command (JSOC) that allowed agents to participate in hundreds of raids in Iraq and Afghanistan. The relationship benefited both sides. JSOC used the FBI’s expertise in exploiting digital media and other materials to locate insurgents and detect plots, including any against the United States. The bureau’s agents, in turn, could preserve evidence and maintain a chain of custody should any suspect be transferred to the United States for trial. In early 2003, two senior FBI counterterrorism officials traveled to Afghanistan to meet with the Joint Special Operations Command’s deputy commander at Bagram air base. The pace of activity in Afghanistan was slow at first. An FBI official said there was less than a handful of [Hostage and Rescue Team] deployments to Afghanistan in those early months; the units primarily worked with the SEALs as they hunted top al-Qaeda targets. The tempo quickened with the U.S.-led invasion of Iraq in 2003. At first, the HRT’s mission was mainly to protect other FBI agents when they left the Green Zone, former FBI officials said. In 2005, all of the HRT members in Iraq began to work under JSOC.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
One person's freedom fighter may be another's terrorist, but David Miranda is very clearly neither. Yet he was detained at Heathrow airport for nine hours under schedule 7 of the Terrorism Act 2000. That the high court has now found his detention to be lawful is disappointing, to say the least. If someone travelling as part of journalistic work can be lawfully detained like this – questioned for hours without a lawyer present, his electronic equipment confiscated and cloned and all without the merest suspicion of wrongdoing required – then clearly something has gone wrong with the law. Schedule 7 suffers the same glaring flaws as the old section 44 counter-terrorism power that also allowed stop and search without suspicion. Such laws leave themselves wide open to discriminatory misuse: section 44 never once led to a terrorism conviction but was used to stop people like journalist Pennie Quinton. In a significant victory, Liberty took her case to the European court of human rights and the power was declared unlawful. Liberty and other organisations intervened in [Miranda's] case on just this point, arguing that the detention violated article 10 of the European convention, the right to freedom of expression. Our riled security services' transparent intimidation and interference with Miranda is shocking. But it's also important that we use his case to shed light on the murky everyday reality of schedule 7.
Note: For more on threats to civil liberties, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.