Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


Israeli spies wooing U.S. Muslims, sources say
2010-09-02, Washington Post
http://blog.washingtonpost.com/spy-talk/2010/09/israeli_spies_pitching_us_mus...

Israel’s undercover operations here, including missions to steal U.S. secrets, are hardly a secret at the FBI, CIA and other U.S. intelligence agencies. From time to time, in fact, the FBI has called Israeli officials on the carpet to complain about a particularly brazen effort to collect classified or other sensitive information, in particular U.S. technical and industrial secrets. The most notorious operation employed Jonathan Pollard, the naval intelligence analyst convicted in 1987 and sentenced to life in prison for stealing tens of thousands of classified documents for Israel. One of Israel’s major interests, of course, is keeping track of Muslims who might be allied with Hamas, which rules the Gaza Strip, or Iran-backed Hezbollah, based in Lebanon. As tensions with Iran escalate, according to former CIA officer Philip Giraldi, “Israeli agents have become more aggressive in targeting Muslims living in the United States as well as in operating against critics. There have been a number of cases reported to the FBI about Mossad officers who have approached leaders in Arab-American communities and have falsely represented themselves as ‘U.S. intelligence,’ ” Giraldi wrote recently in American Conservative magazine. “Because few Muslims would assist an Israeli, this is done to increase the likelihood that the target will cooperate. It’s referred to as a ‘false flag’ operation.”

Note: For an excellent overview of "false-flag" operations, click here.


Former NSA executive Thomas A. Drake may pay high price for media leak
2010-07-13, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2010/07/13/AR20100713059...

For seven years, Thomas A. Drake was a senior executive at the nation's largest intelligence organization with an ambition to change its insular culture. He had access to classified programs that purported to help the National Security Agency tackle its toughest challenges. Today, he wears a blue T-shirt and answers questions about iPhones at an Apple store in the Washington area. He is awaiting trial in a criminal media leak case that could send him to prison for 35 years. In his years at the NSA, Drake grew disillusioned, then indignant, about what he saw as waste, mismanagement and a willingness to compromise Americans' privacy without enhancing security. He first tried the sanctioned methods -- going to his superiors, inspectors general, Congress. Finally, in frustration, he turned to the "nuclear option": leaking to the media. Drake, 53, may pay a high price for going nuclear. In April he was indicted, accused of mishandling classified information and obstructing justice. His supporters consider him a patriotic whistleblower targeted by an Obama administration bent on sealing leaks and on having something to show for an investigation that spans two presidencies. What led Drake to this point, friends and others say, is a belief that his actions were justified if they forced such a powerful and secretive agency to be held accountable. "He tried to have his concerns heard and nobody really wanted to listen," said Nina Ginsberg, an attorney.

Note: On June 9, 2011, all ten original charges against Thomas A Drake were dropped and he was not incarcerated, yet it is cases like this that keep people like Edward Snowden from making his case in US courts.


Army Drops 'Psy Ops' Name For Influence Operations
2010-07-02, CBS News/Associated Press
http://www.cbsnews.com/stories/2010/07/02/ap/national/main6641003.shtml

The Army has dropped the Vietnam-era name "psychological operations" for its branch in charge of trying to change minds behind enemy lines, acknowledging the term can sound ominous. The Defense Department picked a more neutral moniker: "Military Information Support Operations," or MISO. Fort Bragg is home to the 4th Psychological Operations Group, the Army's only active duty psychological operations unit. Psychological operations soldiers are trained at the post. The change was driven from the top, by Pentagon policymakers working for Defense Secretary Robert Gates. It reflects unease with the Cold War echoes of the old terminology, and the implication that the work involved subterfuge. Psychological operations have been cast as spooky in movies and books over the years portraying the soldiers as master manipulators. The 2009 movie "The Men Who Stare at Goats," staring George Clooney, was about an army unit that trains psychic spies, based on Jon Ronson's nonfiction account of the U.S. military's hush-hush research into psychic warfare and espionage.

Note: For more on psychological operations and mind control, click here.


WikiLeaks founder drops 'mass spying' hint
2010-06-22, ABC News (Australian Broadcasting Corporation)
http://www.abc.net.au/news/stories/2010/06/22/2933892.htm

WikiLeaks co-founder Julian Assange has given his strongest indication yet about the next big leak from his whistleblower organisation. In an interview with the ABC's Foreign Correspondent, Mr Assange said cryptically of WikiLeaks' current project: "I can give an analogy. If there had been mass spying that had affected many, many people and organisations and the details of that mass spying were released then that is something that would reveal that the interests of many people had been abused." He agreed it would be of the "calibre" of publishing information about the way the top secret Echelon system - the US-UK electronic spying network which eavesdrops on worldwide communications traffic - had been used. Mr Assange also confirmed that WikiLeaks has a copy of a video showing a US military bombing of a western Afghan township which killed dozens of people, including children. During the course of the past month, Mr Assange has been talking to [ABC's] Foreign Correspondent for [an upcoming] program examining the efficacy of the WikiLeaks model. "What we want to create is a system where there is guaranteed free press across the world, the entire world, that every individual in the world has the ability to publish materials that is meaningful," he said.

Note: For more on government surveillance from major media sources, click here.


Spying, Civil Liberties and the Courts
2010-04-16, New York Times
http://www.nytimes.com/2010/04/16/opinion/16fri2.html

Succumbing to the politics of fear during the 2008 campaign, Congress seriously diluted the First and Fourth Amendment rights of Americans by changing the 1978 law that governs electronic surveillance. In addition to supplying retroactive approval for President George W. Bush�s warrantless wiretapping, the FISA Amendments Act vastly expanded the government�s ability to eavesdrop without warrants in the future. It gave the National Security Agency authority to monitor the international phone calls and e-mail messages of Americans who are not engaged in criminal activity and pose no threat to national security. The measure weakened judicial supervision of how these powers are exercised, making abuse far more likely. An important case being argued [April 16] in New York City will help determine the extent of the damage. At issue is a constitutional challenge to the 2008 law filed on behalf of human rights, labor, legal, and news media organizations whose work requires sensitive telephone and e-mail communication with people abroad. Embracing the Bush administration�s approach, the Obama administration has sought to block the suit, contending that the plaintiffs lack the requisite �standing� to bring the challenge because they cannot show with certainty that they have been spied on. (Of course, any attempt to prove spying would likely be met by a flimsy claim of state secrecy.)

Note: For lots more from reliable sources on government threats to civil liberties, click here.


C.I.A. Abuse Cases Detailed in Report on Detainees
2009-08-25, New York Times
http://www.nytimes.com/2009/08/25/us/politics/25detain.html

Attorney General Eric H. Holder Jr. named a veteran federal prosecutor on Monday to examine abuse of prisoners held by the Central Intelligence Agency, after the Justice Department released a long-secret report showing interrogators choked a prisoner repeatedly and threatened to kill another detainee’s children. Mr. Holder chose John H. Durham, a prosecutor from Connecticut who has been investigating the C.I.A.’s destruction of interrogation videotapes, to determine whether a full criminal investigation of the conduct of agency employees or contractors was warranted. The attorney general said his decision to order an inquiry was based in part on the recommendation of the Justice Department’s ethics office, which called for a new review of several interrogation cases. He said he was also influenced by a 2004 report by the C.I.A. inspector general at the time, John L. Helgerson, on the agency’s interrogations. The report was released Monday under a court order in a Freedom of Information Act lawsuit. Although large portions of the 109-page report are blacked out, it gives new details about a variety of abuses inside the C.I.A.’s overseas prisons, including suggestions about sexually assaulting members of a detainee’s family, staging mock executions, intimidation with a handgun and power drill, and blowing cigar and cigarette smoke into prisoners’ faces to make them vomit. The inspector general’s review raised broad questions about the legality, political acceptability and effectiveness of the harshest of the C.I.A.’s methods, including some not authorized by the Justice Department and others that were approved, like the near-drowning technique of waterboarding.

Note: And what do you think might have been in the blacked out portions of the report? For lots more on the use of illegal methods by the CIA and US military in their prosecution of the "war on terror," click here.


Tapping your cell phone
2008-11-13, WTHR-TV (Indianapolis NBC affiliate)
http://www.wthr.com/global/story.asp?s=9346833

Imagine someone watching your every move, hearing everything you say and knowing where you are at every moment. If you have a cell phone, it could happen to you. After four months of harassing phone calls, Courtney Kuykendall was afraid to answer her cell phone. The Tacoma, Washington, teenager was receiving graphic, violent threats at all hours. And when she and her family changed their cell phone numbers and got new phones, the calls continued. Using deep scratchy voices, anonymous stalkers literally took control of the Kuykendall's cell phones, repeatedly threatened Courtney with murder and rape, and began following the family's every move. "They're listening to us and recording us," Courtney's mother, Heather Kuykendall, told NBC's Today Show. "We know that because they will record us and play it back as a voicemail." How is something like this possible? Just take a look on the internet. That's where you'll find the latest spy technology for cell phones. Spyware marketers claim you can tap into someone's calls, read their text messages and track their movements "anywhere, anytime." Security experts say it's no internet hoax."It's real, and it is pretty creepy," said Rick Mislan, a former military intelligence officer who now teaches cyber forensics at Purdue University's Department of Computer and Information Technology. Mislan has examined thousands of cell phones inside Purdue's Cyber Forensics Lab, and he says spy software can now make even the most high-tech cell phone vulnerable. "I think a lot of people think their cell phone calls are very secure but our privacy isn't always what we think it is."

Note: For lots more on increasing corporate and governmental threats to privacy, click here.


The Ultra-Secret NSA from 9/11 to the Eavesdropping on America
2008-10-14, Washington Post
http://www.washingtonpost.com/wp-dyn/content/discussion/2008/10/09/DI20081009...

By exploring the current, post-9/11 operations of the NSA [National Security Agency, James] Bamford ... goes where congressional oversight committees and investigative journalists still struggle to go. [When] the Bush administration declared its ... global war on terror, Congress agreed to most of the White House's demands. According to Bamford, the NSA's expanded powers and resources enabled it to collect communications both inside and outside the United States. He quotes a former NSA employee as a witness to the agency's spying on the conversations of Americans who have no connection to terrorism. After suing the NSA for documents, [Bamford] obtained considerable evidence that telecommunication companies (with the notable exception of Qwest) knowingly violated U.S. law by cooperating with the NSA to tap fiber optic lines. In impressive detail, The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America tells how private contractors, including some little-known entities with foreign owners, have done the sensitive work of storing and processing the voices and written data of Americans and non-Americans alike. In the book, he offers new revelations about the National Security Agency's counterterrorism tactics, including its controversial domestic surveillance programs. Bamford warns of worse to come: 'There is now the capacity to make tyranny total in America. Only law ensures that we never fall into that abyss -- the abyss from which there is no return.'"

Note: Bamford is the author of two other books on the NSA: Body of Secrets and The Puzzle Palace.


'Curveball' speaks, and a reputation as a disinformation agent remains intact
2008-06-18, Los Angeles Times
http://www.latimes.com/news/printedition/front/la-na-curveball18-2008jun18,0,...

Rafid Ahmed Alwan hoped for an easier life when he came [to Nuremberg, Germany] from Iraq nine years ago. He also hoped for a reward for his cooperation with German intelligence officers. "For what I've done, I should be treated like a king," he said outside a cramped, low-rent apartment he shares with his family. Instead, the Iraqi informant code-named Curveball has flipped burgers at McDonald's and Burger King, washed dishes in a Chinese restaurant and baked pretzels in an all-night bakery. He also has faced withering international scorn for peddling discredited intelligence that helped spur an invasion of his native country. It was intelligence attributed to Alwan -- as Curveball -- that the White House used in making its case that Saddam Hussein possessed weapons of mass destruction. He described what turned out to be fictional mobile germ factories. The CIA belatedly branded him a liar. After Curveball's role in the pre-invasion intelligence fiasco was disclosed by the Los Angeles Times four years ago, the con man behind the code name remained in the shadows. His security was protected and his identity concealed by the BND, Germany's Federal Intelligence Service. Along with confirmation of Curveball's identity, however, have come fresh disclosures raising doubts about his honesty -- much of that new detail coming from friends, associates and past employers. And records reveal that when Alwan fled to Germany, one step ahead of the Iraq Justice Ministry, an arrest warrant had been issued alleging that he sold filched camera equipment on the Baghdad black market.

Note: For much more information on the CIA's "disinformant" Curveball, click here. The lies he told were peddled by US media, including the major television networks and The New York Times and Washington Post, in the run-up to the US invasion of Iraq. For a powerful summary of major media cover-ups, click here.


The Business of Intelligence Gathering
2008-06-15, New York Times
http://www.nytimes.com/2008/06/15/business/15shelf.html?partner=rssuserland&e...

America is ruled by an “intelligence-industrial complex” whose allegiance is not to the taxpaying public but to a cabal of private-sector contractors. That is the central thesis of Spies for Hire: The Secret World of Intelligence Outsourcing by Tim Shorrock, ... an investigative journalist. His book [provides a] disturbing overview of the intelligence community, also known as “the I.C.” Mr. Shorrock says our government is outsourcing 70 percent of its intelligence budget, or more than $42 billion a year, to a “secret army” of corporate vendors. Because of accelerated privatization efforts after 9/11, these companies are participating in covert operations and intelligence-gathering activities that were considered “inherently governmental” functions reserved for agencies like the Central Intelligence Agency, he says. Some of the book’s most intriguing assertions concern the permeating influence of the consulting firm Booz Allen Hamilton. In 2006, Mr. Shorrock reports, Booz Allen amassed $3.7 billion in revenue, much of which came from classified government contracts exempt from public oversight. Among its more than 18,000 employees are R. James Woolsey, the former C.I.A. director, and Joan Dempsey, a former longtime United States intelligence official who declared in a 2004 speech, “I like to refer to Booz Allen as the shadow I.C.” The “revolving door” between Booz Allen and the I.C. is personified by Mike McConnell, who joined the firm after serving as head of the National Security Agency under President Bill Clinton, only to return as director of national intelligence under President Bush.

Note: For revealing reports on government corruption from reliable sources, click here.


Like FBI, CIA Has Used Secret 'Letters'
2008-01-25, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/01/24/AR20080124031...

For three years, the Bush administration has drawn fire from civil liberties groups over its use of national security letters, a kind of administrative subpoena that compels private businesses such as telecommunications companies to turn over information to the government. After the 2001 USA Patriot Act loosened the guidelines, the FBI issued tens of thousands of such requests, something critics say amounts to warrantless spying on Americans who have not been charged with crimes. Now, newly released documents shed light on the use of the letters by the CIA. The spy agency has employed them to obtain financial information about U.S. residents and does so under extraordinary secrecy, according to the American Civil Liberties Union, which obtained copies of CIA letters under the Freedom of Information Act. The CIA's requests for financial records come with "gag orders" on the recipients, said ACLU lawyer Melissa Goodman. In many cases, she said, the recipient is not allowed to keep a copy of the letter or even take notes about the information turned over to the CIA. The ACLU posted copies of some of the letters on its Web site. In most cases, nearly all the text had been redacted by CIA censors.

Note: For many powerful reports on the growing threats to civil liberties, click here.


CIA Destroyed Tapes Despite Court Order
2007-12-12, New York Times/Associated Press
http://www.nytimes.com/aponline/us/AP-CIA-Videotapes-Courts.html

Federal courts had prohibited the Bush administration from discarding evidence of detainee torture and abuse months before the CIA destroyed videotapes that revealed some of its harshest interrogation tactics. Normally, that would force the government to defend itself against obstruction allegations. But the CIA may have an out: its clandestine network of overseas prisons. While judges focused on the detention center in Guantanamo Bay, Cuba, and tried to guarantee that any evidence of detainee abuse would be preserved, the CIA was performing its toughest questioning half a world away. And by the time President Bush publicly acknowledged the secret prison system, interrogation videos of two terrorism suspects had been destroyed. The CIA destroyed the tapes in November 2005. That June, U.S. District Judge Henry H. Kennedy Jr. had ordered the Bush administration to safeguard "all evidence and information regarding the torture, mistreatment, and abuse of detainees now at the United States Naval Base at Guantanamo Bay." U.S. District Judge Gladys Kessler issued a nearly identical order that July. At the time, that seemed to cover all detainees in U.S. custody. But Abu Zubaydah and Abd al-Rahim al-Nashiri, the terrorism suspects whose interrogations were videotaped and then destroyed, weren't at Guantanamo Bay. They were prisoners that existed off the books -- and apparently beyond the scope of the court's order. Attorneys say that might not matter. David H. Remes, a lawyer for Yemeni citizen Mahmoad Abdah and others, ... said "It is still unlawful for the government to destroy evidence, and it had every reason to believe that these interrogation records would be relevant to pending litigation. It's logical to infer that the documents were destroyed in order to obstruct any inquiry into the means by which statements were obtained."


FBI's Forensic Test Full of Holes
2007-11-18, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/11/17/AR20071117016...

Hundreds of defendants sitting in prisons nationwide have been convicted with the help of an FBI forensic tool that was discarded more than two years ago. But the FBI lab has yet to take steps to alert the affected defendants or courts, even as the window for appealing convictions is closing, a joint investigation by The Washington Post and "60 Minutes" has found. The science, known as comparative bullet-lead analysis, was first used after President John F. Kennedy's assassination in 1963. The technique used chemistry to link crime-scene bullets to ones possessed by suspects on the theory that each batch of lead had a unique elemental makeup. In 2004, however, the nation's most prestigious scientific body concluded that variations in the manufacturing process rendered the FBI's testimony about the science "unreliable and potentially misleading." Specifically, the National Academy of Sciences said that decades of FBI statements to jurors linking a particular bullet to those found in a suspect's gun or cartridge box were so overstated that such testimony should be considered "misleading under federal rules of evidence." A year later, the bureau abandoned the analysis. But the FBI lab has never gone back to determine how many times its scientists misled jurors. Internal memos show that the bureau's managers were aware by 2004 that testimony had been overstated in a large number of trials. In a smaller number of cases, the experts had made false matches based on a faulty statistical analysis of the elements contained in different lead samples, documents show. The government has fought releasing the list of the estimated 2,500 cases over three decades in which it performed the analysis. For the majority of affected prisoners, the typical two-to-four-year window to appeal their convictions based on new scientific evidence is closing.


Spy Satellites Turned on the U.S.
2007-09-06, ABC News
http://abcnews.go.com/TheLaw/story?id=3567635

Traditionally, powerful spy satellites have been used to search for strategic threats overseas. But now the Department of Homeland Security has developed a new office to use the satellites to [monitor the US itself]. [DHS] officials ... faced extensive criticism [in Congress] about the privacy and civil liberty concerns of the new office, called the National Applications Office. [House Homeland Security] Committee members expressed concern about abuse of the satellite imagery, charging that Homeland Security had not informed the oversight committee about the program. "What's most disturbing is learning about it from The Wall Street Journal," said Committee Chairman Rep. Bennie Thompson, D-Miss. The lawmakers also expressed concern about using military capabilities for U.S. law enforcement and Homeland Security operations, potentially a violation of the Posse Comitatus Act, which bars the military from serving as a law enforcement body within the United States. Committee members said that in addition to not being informed about the National Applications Office program, they had not yet been provided with documents defining the limits and legal guidance about the program. [They] sent a letter to Homeland Security saying, "We are so concerned that ... we are calling for a moratorium on the program. Today's testimony made clear that there is effectively no legal framework governing the domestic use of satellite imagery for the various purposes envisioned by the department."


Bush administration defends spy law
2007-08-07, Los Angeles Times
http://www.latimes.com/news/la-na-intel7aug07,0,1631228.story

The Bush administration rushed to defend new espionage legislation Monday amid growing concern that the changes could lead to increased spying by U.S. intelligence agencies on American citizens. But officials declined to provide details about how the new capabilities might be used by the National Security Agency and other spy services. And in many cases, they could point only to internal monitoring mechanisms to prevent abuse of the new rules that appear to give the government greater authority to tap into the traffic flowing across U.S. telecommunications networks. Officials rejected assertions that the new capabilities would enable the government to cast electronic "drift nets" that might ensnare U.S. citizens [and] that the new legislation would amount to the expansion of a controversial — and critics contend unconstitutional — warrantless wiretapping program that President Bush authorized after the 9/11 attacks. Intelligence experts said there were an array of provisions in the new legislation that appeared to make it possible for the government to engage in intelligence-collection activities that the Bush administration officials were discounting. "They are trying to shift the terms of the debate to their intentions and away from the meaning of the new law," said Steven Aftergood, an intelligence policy analyst at the Federation of American Scientists. "The new law gives them authority to do far more than simply surveil foreign communications abroad," he said. "It expands the surveillance program beyond terrorism to encompass foreign intelligence. It permits the monitoring of communications of a U.S. person as long as he or she is not the primary target. And it effectively removes judicial supervision of the surveillance process."


FBI Proposes Building Network of U.S. Informants
2007-07-25, ABC News blog
http://blogs.abcnews.com/theblotter/2007/07/fbi-proposes-bu.html

The FBI is taking cues from the CIA to recruit thousands of covert informants in the United States as part of a sprawling effort to boost its intelligence capabilities. According to a recent unclassified report to Congress, the FBI expects its informants to provide secrets about possible terrorists and foreign spies, although some may also be expected to aid with criminal investigations, in the tradition of law enforcement confidential informants. The FBI said the push was driven by a 2004 directive from President Bush ordering the bureau to improve its counterterrorism efforts by boosting its human intelligence capabilities. The aggressive push for more secret informants appears to be part of a new effort to grow its intelligence and counterterrorism efforts. Other recent proposals include expanding its collection and analysis of data on U.S. persons, retaining years' worth of Americans' phone records and even increasing so-called "black bag" secret entry operations. To handle the increase in so-called human sources, the FBI also plans to overhaul its database system, so it can manage records and verify the accuracy of information from "more than 15,000" informants, according to the document. The bureau has arranged to use elements of CIA training to teach FBI agents about "Source Targeting and Development," the report states. The courses will train FBI special agents on the "comprehensive tradecraft" needed to identify, recruit and manage these "confidential human sources."


Officers: Ex-CIA chief Tenet a 'failed' leader
2007-04-27, CNN News
http://edition.cnn.com/2007/US/04/29/tenet.letter/index.html

In a letter written Saturday to former CIA Director George Tenet, six former CIA officers described their former boss as "the Alberto Gonzales of the intelligence community," and called his book "an admission of failed leadership." The letter, signed by Phil Giraldi, Ray McGovern, Larry Johnson, Jim Marcinkowski, Vince Cannistraro and David MacMichael, said Tenet should have resigned in protest rather than take part in the administration's buildup to the war. (Read the full letter) Johnson is a former CIA intelligence official and registered Republican who voted for Bush in 2000. Cannistraro is former head of the CIA's counterterrorism division. The writers said ... "your lament that you are a victim in a process you helped direct is self-serving. You were not a victim. You were a willing participant in a poorly considered policy to start an unnecessary war. CIA field operatives produced solid intelligence in September 2002 that stated clearly there was no stockpile of any kind of WMD in Iraq. This intelligence was ignored and later misused." The letter said CIA officers learned later that month Iraq had no contact with Osama bin Laden and that then-President Saddam Hussein considered the al Qaeda leader to be an enemy. Still, Tenet "went before Congress in February 2003 and testified that Iraq did indeed have links to al Qaeda. "You helped set the bar very low for reporting that supported favored White House positions, while raising the bar astronomically high when it came to raw intelligence that did not support the case for war. You betrayed the CIA officers who collected the intelligence. Most importantly and tragically, you failed to meet your obligations to the people of the United States."


Did the CIA kill Bobby Kennedy?
2006-11-20, The Guardian (One of the U.K.'s leading newspapers)
http://www.guardian.co.uk/usa/story/0,,1952393,00.html

In 1968, Robert Kennedy seemed likely to follow his brother, John, into the White House. Then, on June 6, he was assassinated - apparently by a lone gunman. But Shane O'Sullivan says he has evidence implicating three CIA agents in the murder: On June 5 1968, Robert Kennedy wins the California Democratic primary. After midnight, he finishes his victory speech at the Ambassador hotel in Los Angeles ... in a crowded pantry when 24-year-old Palestinian Sirhan Sirhan steps down from a tray-stacker with a "sick, villainous smile" on his face and starts firing at Kennedy with an eight-shot revolver. As Kennedy lies dying on the pantry floor, Sirhan is arrested as the lone assassin. He carries the motive in his shirt-pocket (a clipping about Kennedy's plans to sell bombers to Israel). But the autopsy report suggests Sirhan could not have fired the shots that killed Kennedy. And more bullet-holes are found in the pantry than Sirhan's gun can hold, suggesting a second gunman. Three years ago, I started writing a screenplay about the assassination [and was] caught up in a strange tale of second guns and "Manchurian candidates" (as the movie termed brainwashed assassins). As I researched the case, I uncovered new video and photographic evidence suggesting that three senior CIA operatives were behind the killing. Morales died of a heart attack in 1978, weeks before he was to be called before the HSCA [House Select Committee on Assassinations]. Joannides died in 1990. Campbell may still be out there somewhere, in his early 80s. Given the positive identifications we have gathered on these three, the CIA and the Los Angeles Police Department need to explain what they were doing there.


Pentagon Finds More Who Recall Atta Intel
2005-09-02, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2005/09/02/AR20050902005...

Pentagon officials said Thursday they have found three more people who recall an intelligence chart that identified Sept. 11 mastermind Mohamed Atta as a terrorist one year before the attacks on New York and Washington. But they have been unable to find the chart or other evidence that it existed. On Thursday, four intelligence officials provided the first extensive briefing for reporters on the outcome of their interviews with people associated with Able Danger and their review of documents. They said they interviewed at least 80 people over a three-week period and found three, besides Philpott and Shaffer, who said they remember seeing a chart that either mentioned Atta by name as an al-Qaida operative or showed his photograph. Four of the five recalled a chart with a pre-9/11 photo of Atta; the other person recalled only a reference to his name. The intelligence officials said they consider the five people to be credible but their recollections are still unverified. Navy Cmdr. Christopher Chope, of the Center for Special Operations at U.S. Special Operations Command, said there were "negative indications" that anyone ever ordered the destruction of Able Danger documents, other than the materials that were routinely required to be destroyed under existing regulations.


Report cites warnings before 9/11
2002-09-19, CNN
http://archives.cnn.com/2002/ALLPOLITICS/09/18/intelligence.hearings/

U.S. intelligence officials had several warnings that terrorists might attack the United States on its home soil -- even using airplanes as weapons -- well before the September 11, 2001 attacks, two congressional committees said in a report. In 1998, U.S. intelligence had information that a group of unidentified Arabs planned to fly an explosives-laden airplane into the World Trade Center, according to a joint inquiry of the House and Senate intelligence committees. However, the Federal Aviation Administration found the plot "highly unlikely given the state of that foreign country's aviation program," and believed a flight originating outside the United States would be detected before it reached its target inside the country, the report said. "The FBI's New York office took no action on the information," it said. Another alert came just a month before the attacks, the report said, when the CIA sent a message to the FAA warning of a possible hijacking "or an act of sabotage against a commercial airliner." The information was linked to a group of Pakistanis based in South America. That warning did not mention using an airliner as a weapon and, the report said, "there was apparently little, if any, effort by intelligence community analysts to produce any strategic assessments of terrorists using aircraft as weapons."

Note: For many unanswered questions about the official account of 9/11 asked by highly-respected professors and officials, click here and here.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"