Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
At least since the aftermath of September 2001, western governments and intelligence agencies have been hard at work expanding the scope of their own power, while eroding privacy, civil liberties and public control of policy. What used to be viewed as paranoid, Orwellian, tin-foil hat fantasies [turn] out post-Snowden, to be not even the whole story. We've been warned for years that these things were going on: wholesale surveillance of entire populations, militarization of the internet, the end of privacy. Secret laws, secret interpretations of secret laws by secret courts and no effective parliamentary oversight whatsoever. By and large the media have paid scant attention to this, even as more and more courageous, principled whistleblowers stepped forward. The unprecedented persecution of truth-tellers, initiated by the Bush administration and severely accelerated by the Obama administration, has been mostly ignored, while record numbers of well-meaning people are charged with serious felonies simply for letting their fellow citizens know what's going on. Numerous ex-NSA officials have come forward in the past decade, disclosing massive fraud, vast illegalities and abuse of power in [that] agency, including Thomas Drake, William Binney and Kirk Wiebe. The response was 100% persecution and 0% accountability by both the NSA and the rest of government. Since the summer of 2013, the public has witnessed a shift in debate over these matters. The reason is that one courageous person: Edward Snowden.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
On December 4th it [was exactly] 44 years since a select unit of 14 Chicago Police officers, on special assignment to Cook County State's Attorney Edward Hanrahan, executed a pre-dawn raid on a west side apartment that left Illinois Black Panther Party leaders Fred Hampton and Mark Clark dead, several other young Panthers wounded, and the seven raid survivors arrested on bogus attempted murder charges. The physical evidence soon exposed the claims of a "shootout" that were made by Hanrahan and his men to be blatant lies, and that the murderous reality was that the police fired nearly 100 shots while the Panthers fired but one. But those lies were only the first layer of a massive cover-up that was dismantled and exposed over the next eight years -- a cover-up designed to suppress the central role of the Federal Bureau of Investigation and its COINTELPRO program in the assassination. The first documentation [of the operation and its cover-up] surfaced in March of 1971 when the Citizens Commission to Investigate the FBI broke into a small FBI office in Media Pennsylvania and expropriated over 1000 FBI documents. These documents exposed the FBI's super-secret and profoundly illegal COINTELPRO program and its focus in the 1960s on the black liberation movement and its leaders. Citing the assassinated Malcolm X as an example, Hoover directed all of the Bureau's Offices to "expose, disrupt, misdirect, discredit, and otherwise neutralize" African American organizations and leaders.
Note: For more on the realities of intelligence agency activity, see the deeply revealing reports from reliable major media sources available here.
America's National Security Agency may hold crucial evidence about one of the greatest unsolved mysteries of the Cold War — the cause of the 1961 plane crash which killed United Nations Secretary-General Dag Hammarskjold, a commission of prominent jurists says. Widely considered the U.N.'s most effective chief, Hammarskjold died as he was attempting to bring peace to the newly independent Congo. It's long been rumored that his DC-6 plane was shot down, and an independent commission set up to evaluate new evidence surrounding his death on [September 9] recommended a fresh investigation — citing radio intercepts held by the NSA as the possible key to solving the case. Hammerskjold's aircraft went down on the night of Sept. 17, 1961, smashing into a forested area just short of Ndola Airport in modern-day Zambia. A host of hard-to-answer questions about the crash have led to a glut of conspiracy theories. Among them: Why did it take 15 hours to find the wreckage, just a few miles from the airport? Why did Hammarskjold's bodyguard, who survived the crash for a few days, say that the plane "blew up"? Why did witnesses report seeing sparks, flashes, or even another plane? Hammarskjold was flying into a war zone infested with mercenaries and riven by Cold War tension. Foreign multinationals coveted [Congo's] vast mineral wealth and the country was challenged by a Western-backed insurgency in Katanga, which hosted mining interests belonging to United States, Britain, and Belgium.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Over decades and diverse administrations, justifications for the use of force - limited and full scale - have constantly revolved around weapons of mass destruction. Protection against them, real and imaginary, has served [as] justification for government excess and a curtailment of our freedoms. We stop everything because it is WMD and we fret about the consequences of both action and inaction because it is WMD. We do so because of a little known and little understood entity that truly drives American national security practices: It's called the Program. Founded in the darkest days of nuclear threat during the Eisenhower administration, the Program began as a limited system given responsibility for survival of the government. The nuclear arms race ended, but the Program never completely went away. And since 9/11, like everything else about national security, its mission and focus have expanded. The Program exists through a system of sealed envelopes - four dozen formal Presidential Emergency Action Documents more secret than anything that has been revealed about the National Security Agency of late, arrangements that instruct a surviving entity of what to do if a nation-destroying calamity befalls Washington or the United States. Because Doomsday is now thought by the experts in government to be any day, and because the potential battlefield is anyplace and every place, the work of the Program, and its power, have dramatically expanded. A survival apparatus operates behind the scenes as if survival is perpetually and instantly at stake.
Note: The author of this analysis, William M. Arkin, has written American Coup: How a Terrified Government is Destroying the Constitution, and is co-author of the best-selling book and newspaper series Top Secret America: The Rise of the New American Security State.
There was a time when the U.S. National Security Agency was so secretive that government officials dared not speak its name in public. NSA, the joke went, stood for "No Such Agency." That same agency this month held an on-the-record conference call with reporters, issued a lengthy press release to rebut a newspaper story, and posted documents on a newly launched open website - icontherecord.tumblr.com (which stands for intelligence community on the record). The steps were taken under pressure as President Barack Obama's administration tries to calm a public storm over disclosures by former NSA contractor Edward Snowden. The NSA's moves out of the shadows were meant to show that it operates lawfully..., but not everyone is convinced that it is a fundamental shift toward more openness at the intelligence agencies. Jameel Jaffer, deputy legal director at the American Civil Liberties Union, said the [disclosures] should not be viewed as a huge shift toward transparency by the administration. "In fact, on the same day the president promised more transparency on surveillance issues, the CIA filed a brief in one of our 'targeted killing' cases arguing that it could not release legal memos about the drone program, could not release civilian casualty numbers, and for that matter could not even acknowledge that the agency had played any role in targeted killings," Jaffer said.
Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.
The news that the National Security Agency (NSA) is routinely operating outside of the law and overstepping its legal authority by carrying out surveillance on American citizens is not really much of a surprise. This is what happens when you give the government broad powers and allow government agencies to routinely sidestep the Constitution. Consider that the government's Utah Data Center (UDC), the central hub of the NSA's vast spying infrastructure, will be a clearinghouse and a depository for every imaginable kind of information - whether innocent or not, private or public - including communications, transactions and the like. In fact, anything and everything you've ever said or done, from the trivial to the damning - phone calls, Facebook posts, Twitter tweets, Google searches, emails, bookstore and grocery purchases, bank statements, commuter toll records, etc. - will be tracked, collected, cataloged and analyzed by the UDC's supercomputers and teams of government agents. By sifting through the detritus of your once-private life, the government will come to its own conclusions about who you are, where you fit in, and how best to deal with you should the need arise. Surveillance of all citizens ... is not friendly to freedom. Frankly, we are long past the point where we should be merely alarmed. These are no longer experiments on our freedoms. These are acts of aggression.
Note: Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents. Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by statute and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls. The documents, provided earlier this summer to The Washington Post by former NSA contractor Edward Snowden, include a level of detail and analysis that is not routinely shared with Congress or the special court that oversees surveillance. In one of the documents, agency personnel are instructed to remove details and substitute more generic language in reports to the Justice Department and the Office of the Director of National Intelligence. In one instance, the NSA decided that it need not report the unintended surveillance of Americans. The NSA audit obtained by The Post, dated May 2012, counted 2,776 incidents in the preceding 12 months of unauthorized collection, storage, access to or distribution of legally protected communications. Many involved failures of due diligence or violations of standard operating procedure. The most serious incidents included a violation of a court order and unauthorized use of data about more than 3,000 Americans and green-card holders.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The CIA is funding a study examining various ways mankind can geo-engineer the planet -- blocking or limiting the sunlight that reaches the Earth, stripping carbon dioxide from the skies, seeding the clouds and so on. The project, a panel called “Geoengineering Climate: Technical Evaluation and Discussion of Impacts,” is backed by the National Academy of Sciences [NAS}, the National Oceanic and Atmospheric Administration (NOAA), NASA -- and the U.S. intelligence community. That’s spy-talk for the CIA, William Kearney, a spokesman for NAS, [said]. Conspiracy theorists love to argue that various world governments seek to control the weather; they cite “chemtrails” and cloud seeding and so on. The group’s first two meetings, May 20 and June 19, were closed-door in their entirety. On July 17 in Washington D.C., closed-door morning and evening meetings book-ended a public session, however, offering a peek into the group’s plans -- and it’s nothing worthy of Fox Mulder’s time, explained Edward Dunlea, study director with the National Academies. “Nothing involved in this study is classified at all,” Dunlea told FoxNews.com. “ This is an assessment of what is known in the science literature about some of the proposed engineering techniques -- both solar-radiation management and carbon-dioxide removal. All of our sponsors are interested in this topic as a part of the larger climate-change discussion, which has economic, environmental and national-security ramifications,” he said.
Note: If nothing is classified, why are the meetings secret? For solid evidence that elements of government have used the HAARP program to control the weather, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
[Daniel] Ellsberg is one of the most outspoken critics of the Obama administration’s prosecution of leakers. Under President Obama’s tenure, the government has prosecuted six individuals for releasing classified information to media organizations. Ellsberg is particularly fierce in his support of Bradley Manning, a young soldier who released a large amount of classified information to WikiLeaks. Manning was arrested in 2010, and his military court-martial began this week. Ellsberg considers Manning a hero, and he argues that there is little difference between what Manning did in 2010 and what Ellsberg did four decades earlier. [Q.}: In a 1973 interview, you said that a “secondary objective” of releasing the Pentagon Papers was “the hope of changing the tolerance of Executive secrecy that had grown up over the last quarter of a century both in Congress and the courts and in the public at large.” How has that “tolerance of secrecy” changed over the last four decades? DE: There’s been very great tolerance that if the magic words “national security,” or the new words “homeland security” are invoked, Congress has given the president virtually a free hand in deciding what information they will know as well as the public. I wouldn’t count on the current court with its current makeup making the same ruling with the Pentagon Papers as they did 40 years ago. I’m sure that President Obama would have sought a life sentence in my case. Various things that were counted as unconstitutional then have been put in the president’s hands now. He’s become an elected monarch. Nixon’s slogan, “when the president does it, it’s not illegal,” is pretty much endorsed now.
Note: To see key quotes showing the amazing courage and dedication of Snowden, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
The case of Stephen Jin-Woo Kim, the government adviser, and James Rosen, the chief Washington correspondent for Fox News, bears striking similarities to a sweeping leaks investigation disclosed last week in which federal investigators obtained records over two months of more than 20 telephone lines assigned to the Associated Press. At a time when President Obama’s administration is under renewed scrutiny for an unprecedented number of leak investigations, the Kim case provides a rare glimpse into the inner workings of one such probe. Court documents in the Kim case reveal how deeply investigators explored the private communications of a working journalist - and raise the question of how often journalists have been investigated as closely as Rosen was in 2010. The case also raises new concerns among critics of government secrecy about the possible stifling effect of these investigations on a critical element of press freedom: the exchange of information between reporters and their sources. “The latest events show an expansion of this law enforcement technique,” said attorney Abbe Lowell, who is defending Kim on federal charges filed in 2010 that he disclosed national defense information. “Individual reporters or small time periods have turned into 20 [telephone] lines and months of records with no obvious attempt to be targeted or narrow.” The Obama administration has pursued more such cases than all previous administrations combined.
Note: Read more about the Kim case in this article. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation.
New FBI records connecting Saudis who lived in Sarasota before 9/11 to “individuals associated with the terrorist attacks” [have been] released. The FBI records provide new information about an investigation into what occurred prior to 9/11 at the upscale home of Abdulaziz al-Hijji and his family in the gated community of Prestancia. Information in the records contradicts prior FBI statements that no evidence was found connecting the al-Hijjis to 9/11. Agents determined the al-Hijjis “fled” their home on August 27, 2001 — two weeks before the attacks — leaving behind three cars, furniture, clothing, toys, food and other items. “Further investigation of the [name deleted] family revealed many connections between the [name deleted] and individuals associated with the terrorist attacks on 9/11/2001,” says an April 16, 2002 FBI report. The report lists three of those individuals. Two, including one described as a “family member,” were described as students at the nearby Venice airport flight school where suicide hijackers Mohamed Atta and Marwan al-Shehhi trained. The third person lived with some flight students, the report says. A counterintelligence officer speaking on condition of anonymity said an FBI examination of gatehouse log books and photos of license tags revealed that vehicles linked to the future hijackers visited al-Hijji’s residence. Much remains unclear. Chunks of the released reports are blanked out for national security and other reasons. Four pages were withheld in their entirety.
Note: For powerful evidence reported in the major media the several of the 9/11 hijackers trained at U.S. military bases, click here. For deeply revealing reports from reliable major media sources questioning the official story of the 9/11 attacks, click here.
For years, senior Obama officials, including the president himself, have been making public claims about their drone program that have just been proven to be categorically false. McClatchy's national security reporter, Jonathan Landay, obtained top-secret intelligence documents showing that "contrary to assurances it has deployed US drones only against known senior leaders of al-Qaida and allied groups, the Obama administration has targeted and killed hundreds of suspected lower-level Afghan, Pakistani and unidentified 'other' militants in scores of strikes in Pakistan's rugged tribal area." That article quotes drone expert Micah Zenko of the Council on Foreign Relations as saying that "McClatchy's findings indicate that the administration is 'misleading the public about the scope of who can legitimately be targeted.'" In his own must-read article at Foreign Policy about these disclosures, Zenko writes - under the headline: "Finally, proof that the United States has lied in the drone wars" - that "it turns out that the Obama administration has not been honest about who the CIA has been targeting with drones in Pakistan" and that the McClatchy article "plainly demonstrates that the claim repeatedly made by President Obama and his senior aides - that targeted killings are limited only to officials, members, and affiliates of al-Qaida who pose an imminent threat of attack on the US homeland - is false." Zenko explains that these now-disproven claims may very well make the drone strikes illegal since assertions about who is being targeted were "essential to the legal foundations on which the strikes are ultimately based."
Note: For deeply revealing reports from reliable major media sources on the lies and crimes committed by the US and UK in their global wars of aggression, click here.
Raytheon, a Massachusetts defense contractor, has built tracking software that pulls information from social networks, according to a video obtained by the Guardian newspaper in London. "[Raytheon] has acknowledged the technology was shared with U.S. government and industry as part of a joint research and development effort, in 2010, to help build a national security system capable of analyzing 'trillions of entities' from cyberspace." Using public data from Facebook, Twitter, Gowalla and Foursquare, the software - called RIOT, or Rapid Information Overlay Technology - apparently gathers uploaded information and forms a profile of a person's every move that was registered with one of the websites. The video obtained by the newspaper starts with a demonstration by Raytheon's "principal investigator," Brian Urch, showing how easy it is to track an employee named Nick - a real person - based on all the places he has checked in using his smartphone. "When people take pictures and post them on the Internet using their smartphones, the phone will actually embed the latitude and longitude in the header data - so we're going to take advantage of that," Urch says. "So now we know where Nick's gone ... and now we'll predict where he'll be in the future." Urch goes on to analyze - using graphs and calendars - where Nick likes to spend his personal time and make predictions about his behavior. "If you ever wanted to get a hold of his laptop, you might want to visit the gym at 6 a.m. on Monday," Urch says with alarming casualness.
Note: To read the full Guardian article, click here.
The FISA Amendments Act of 2008 did much more than shield lawbreaking telecoms from all forms of legal accountability. It also legalized vast new, sweeping and almost certainly unconstitutional forms of warrantless government eavesdropping. [The] 2008 law gutted the 30-year-old FISA statute that had [barred] the government from eavesdropping on the communications of Americans without first obtaining a warrant from a court. Worst of all, the 2008 law legalized ... the NSA warrantless eavesdropping program secretly implemented by George Bush after the 9/11 attack. The 2008 FISA law provided that it would expire in four years unless renewed. Yesterday, the Senate debated its renewal. Several Senators - Democrats Jeff Merkley and Ron Wyden of Oregon along with Kentucky GOP Senator Rand Paul - each attempted to attach amendments to the law simply to provide some modest amounts of transparency and oversight to ensure that the government's warrantless eavesdropping powers were constrained and checked from abuse. The Democratic Chair of the Senate Intelligence Committee, Dianne Feinstein ... demanded renewal of the FISA law without any reforms. And then predictably, in virtually identical 37-54 votes, Feinstein and her conservative-Democratic comrades joined with virtually the entire GOP caucus ... to reject each one of the proposed amendments and thus give Obama exactly what he demanded: reform-free renewal of the law.
Note: For analysis of this Senate vote, click here. For deeply revealing reports from reliable major media sources on government assaults on privacy, click here.
Three days before the Dec. 7, 1941 Japanese attack on Pearl Harbor, President Roosevelt was warned in a memo from naval intelligence that Tokyo's military and spy network was focused on Hawaii. In the newly revealed 20-page memo from FDR's declassified FBI file, the Office of Naval Intelligence on December 4 warned, "In anticipation of open conflict with this country, Japan is vigorously utilizing every available agency to secure military, naval and commercial information, paying particular attention to the West Coast, the Panama Canal and the Territory of Hawaii." The memo, published in the new book December 1941: 31 Days that Changed America and Saved the World went on to say that the Japanese were collecting "detailed technical information" that would be specifically used by its navy. To collect and analyze information, they were building a network of spies through their U.S. embassies and consulates. Historian and acclaimed Reagan biographer Craig Shirley, author of the just released December 1941, doesn't blame FDR for blowing it, but instead [said] that it "does suggest that there were more pieces to the puzzle" that the administration missed. He compares the missed signals leading up to Japan's attack to 9/11, which government investigations also show that the Clinton and Bush administrations missed clear signals that an attack was coming. "So many mistakes through so many levels of Washington," said Shirley. "Some things never change."
Note: Explore powerful evidence that US president Franklin Roosevelt was baiting Japan into an attack on Pearl Harbor. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
[A recent] successful exercise in autonomous robotics could presage the future of the American way of war: a day when drones hunt, identify and kill the enemy based on calculations made by software, not decisions made by humans. The demonstration laid the groundwork for scientific advances that would allow drones to search for a human target and then make an identification based on facial-recognition or other software. Once a match was made, a drone could launch a missile to kill the target. The prospect of machines able to perceive, reason and act in unscripted environments presents a challenge to the current understanding of international humanitarian law. “The deployment of such systems would reflect a paradigm shift and a major qualitative change in the conduct of hostilities,” Jakob Kellenberger, president of the International Committee of the Red Cross, said at a conference in Italy this month. Drones flying over Afghanistan, Pakistan and Yemen can already move automatically from point to point, and it is unclear what surveillance or other tasks, if any, they perform while in autonomous mode.
Note: For lots more from reliable sources on Pentagon robotic weapons development projects, click here.
Details of shadowy CIA [rendition flights] have emerged in a ... New York courthouse in a billing dispute between contractors. The court documents offer a rare glimpse of the costs and operations of the controversial rendition program. For all the secrecy that once surrounded the CIA program, a significant part of its operation was entrusted to very small aviation companies whose previous experience involved flying sports teams across the country. In the process, the costs and itineraries of numerous CIA flights became part of the court record. The more than 1,500 pages from the trial and appeals court files appear to include sensitive material, such as logs of air-to-ground phone calls made from the plane. These logs show multiple calls to CIA headquarters; to the cell- and home phones of a senior CIA official involved in the rendition program; and to a government contractor, Falls Church-based DynCorp, that worked for the CIA. Attorneys for a London-based legal charity, Reprieve, which has been investigating the CIA program, discovered the Columbia County case and brought the court records to the attention of The Washington Post. “This new evidence tells a chilling story, from the CIA’s efforts to disguise its illegal activities to the price it paid to ferry prisoners to torture chambers across the world,” said Cori Crider, Reprieve’s legal director.
Note: For lots more from reliable sources on the hidden realities behind the "Global War on Terror", click here.
The Justice Department has called into question a key pillar of the FBI's case against Bruce Ivins, the Army scientist accused of mailing the anthrax-laced letters that killed five people and terrorized Congress a decade ago. Shortly after Ivins committed suicide in 2008, federal investigators announced that they had identified him as the mass murderer who sent the letters to members of Congress and the media. The case was circumstantial, with federal officials arguing that the scientist had the means, motive and opportunity to make the deadly powder at a U.S. Army research facility at Fort Detrick, in Frederick, Md. On July 15, however, Justice Department lawyers acknowledged in court papers that the sealed area in Ivins' lab -- the so-called hot suite -- did not contain the equipment needed to turn liquid anthrax into the refined powder that floated through congressional buildings and post offices in the fall of 2001. The government's statements deepen the questions about the case against Ivins. Searches of his car and home in 2007 found no anthrax spores, and the FBI's eight-year, $100 million investigation never proved he mailed the letters or identified another location where he might have secretly dried the anthrax into an easily inhaled powder.
Note: For more doubts on the FBI's case against Ivins, click here. For a detailed analysis of the anthrax attacks by Prof. Graeme MacQueen of McMaster University, showing that it was an integral part, with the 9/11 attacks, of a larger operation to launch two wars, click here.
There are more than 280 million cellphone subscribers in the U.S., and many of those phones can record video. With so many cameras in pockets and purses, clashes between police and would-be videographers may be inevitable. "All of us, as we walk around, have to understand that we could be filmed, we could be taped," says Deborah Jacobs, director of the ACLU chapter. "But police officers above all others should be subject to this kind of filming because we have a duty to hold them accountable as powerful public servants." Tom Nolan, a former Boston police officer, says police have to get used to the world of cameras everywhere. "There's always going to be a pocket of police officers who are resistant to change," he says. Nolan now teaches at Boston University. He says police in Massachusetts train their officers to tolerate video recording, as long as no other crime is taking place. And Nolan thinks departments around the country will eventually do the same. "The police will get the message when municipal governments and police departments have got to write out substantial settlement checks," he says. "Standing by itself, that video camera in the hands of some teenager is not going to constitute sufficient grounds for a lawful arrest."
Note: Yet police are lobbying in many U.S. states to make it illegal to videotape them, and according to this CNN article, it may already be illegal in three states. For much more information from reliable sources on government and police threats to civil liberties, click here.
US government doctors who cared for the prisoners at Guantanamo Bay deliberately concealed or ignored evidence that their patients were being tortured, the first official study of its kind has found. A detailed review of the medical records and case files of nine Guantanamo inmates has concluded that medical personnel at the US detention centre were complicit in suppressing evidence that would demonstrate systematic torture of the inmates. The review is published in an online scientific journal, PLoS Medicine, and is the first peer-reviewed study analysing the behaviour of the doctors in charge of Guantanamo inmates who were subjected to "enhanced interrogation" techniques that a decade ago had been classed by the US government as torture. [The report] concluded that no doctor could have failed to notice the medical signs and symptoms of the extreme interrogation techniques and unauthorised assaults that other physicians would recognise as torture, such as severe beatings resulting in bone fractures, sexual assaults, mock executions, and simulated drowning by "waterboarding". Many of the prisoners said they were also subjected to unauthorised abuses resulting in severe and prolonged physical and mental pain.
Note: For lots more from major media sources on torture committed by US forces and approved by the highest levels of government, click here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.