Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
The government will be able to monitor the calls, emails, texts and website visits of everyone in the UK under new legislation set to be announced soon. Internet firms will be required to give intelligence agency GCHQ access to communications on demand, in real time. The Home Office says the move is key to tackling crime and terrorism, but civil liberties groups have criticised it. Tory MP David Davis called it "an unnecessary extension of the ability of the state to snoop on ordinary people". A new law ... would not allow GCHQ to access the content of emails, calls or messages without a warrant. But it would enable intelligence officers to identify who an individual or group is in contact with, how often and for how long. They would also be able to see which websites someone had visited. Conservative MP and former shadow home secretary David Davis said it would make it easier for the government "to eavesdrop on vast numbers of people". "What this is talking about doing is not focusing on terrorists or criminals, it's absolutely everybody's emails, phone calls, web access..." He said that until now anyone wishing to monitor communications had been required to gain permission from a magistrate. Nick Pickles, director of the Big Brother Watch campaign group, called the move "an unprecedented step that will see Britain adopt the same kind of surveillance seen in China and Iran". The previous Labour government attempted to introduce a central, government-run database of everyone's phone calls and emails, but eventually dropped the bid after widespread anger.
Note: For more on this from BBC, click here. Though this is interesting news, many know that the government has had easy access to all people's emails, phone calls, and more for many years through systems like echelon and more. For an abundance of major media articles showing how many of the power elite want to create a big-brother society, click here.
The federal government has agreed to pay $2.5 million to the widow and children of the first person killed in the anthrax letter attacks of 2001, settling a lawsuit claiming that the Army did not adequately secure its supply of the deadly pathogen. The settlement with the family of Robert Stevens, a tabloid photo editor in Florida, follows an eight-year legal battle that exposed slack rules and sloppy recordkeeping at the Armys biodefense laboratory at Fort Detrick, in Frederick, Md. As part of the agreement, Justice Department lawyers are seeking to have many documents that were uncovered in the litigation kept under court seal or destroyed. Mr. Stevenss widow, Maureen, filed suit against the government in 2003, as evidence accumulated that the anthrax powder in the lethal letters had come from an Army laboratory. Mr. Stevens, 62, died on Oct. 5, 2001, days after inhaling anthrax powder at work.
Note: Why would the government want these documents destroyed? Remember that these attacks, which happened within weeks of the 9/11 attacks, were at first attributed to terrorists. Now it is fully acknowledged they were the responsibility of someone in government. Hmmmmm.
Jose Guerena Ortiz was sleeping after an exhausting 12-hour night shift at a copper mine. His wife, Vanessa, had begun breakfast. Their 4-year-old son, Joel, asked to watch cartoons. An ordinary morning was unfolding in the middle-class Tucson neighborhood — until an armored vehicle pulled into the family's driveway and men wearing heavy body armor and helmets climbed out, weapons ready. They were a sheriff's department SWAT team who had come to execute a search warrant. But Vanessa Guerena insisted she had no idea, when she heard a "boom" and saw a dark-suited man pass by a window, that it was police outside her home. She shook her husband awake and told him someone was firing a gun outside. A U.S. Marine veteran of the Iraq war, he was only trying to defend his family, she said, when he grabbed his own gun — an AR-15 assault rifle. What happened next was captured on video after a member of the SWAT team activated a helmet-mounted camera. The officers — four of whom carried .40-caliber handguns while another had an AR-15 — moved to the door, briefly sounding a siren, then shouting "Police!" in English and Spanish. With a thrust of a battering ram, they broke the door open. Eight seconds passed before they opened fire into the house. And 10 seconds later, Guerena lay dying in a hallway 20-feet from the front door. The SWAT team fired 71 rounds, riddling his body 22 times, while his wife and child cowered in a closet.
Note: For a survey of the decade-long trend toward militarization of police forces in the US, click here. For analyses of the militaristic police responses to the Occupy movement, click here and here.
Thirty-one seconds after the pilot reported muzzle flashes, the Marines at Alcatraz ordered that the Predator be prepared to strike if the shooters could be confirmed as hostile. At 8:49 a.m., 29 minutes after the ambush began, they authorized the pilot to fire. In minutes, two Americans would be dead. The decision to fire a missile from one of the growing fleet of U.S. unmanned aircraft is the result of work by ground commanders, pilots and analysts at far-flung military installations, who analyze video and data feeds and communicate by a system of voice and text messages. In addition to the platoon taking fire that morning in Helmand province's Upper Sangin Valley, the mission involved Marine Corps and Air Force personnel at four locations: Marines of the 2nd Reconnaissance Battalion at Alcatraz, the drone crew in Nevada, the analyst in Indiana and a mission intelligence coordinator at March Air Reserve Base in California. Senior officers say drone technology has vastly improved their ability to tell friend from foe in the confusion of battle. But the video can also prompt commanders to make decisions before they fully understand what they're seeing. In February 2009, a crew operating a drone over Afghanistan misidentified a civilian convoy as an enemy force. The Predator pilot and the Army captain who called in the airstrike disregarded warnings from Air Force analysts who had observed children in the convoy. At least 15 people were killed.
Note: For key reports from major media sources on the illegal and immoral prosecution of the global "war on terror" by the US military and NATO, click here.
An FBI employee shared confidential information with his girlfriend, who was a news reporter, then later threatened to release a sex tape the two had made. A supervisor watched pornographic videos in his office during work hours while "satisfying himself." And an employee in a "leadership position" misused a government database to check on two friends who were exotic dancers and allowed them into an FBI office after hours. These are among confidential summaries of FBI disciplinary reports obtained by CNN, which describe misconduct by agency supervisors, agents and other employees over the last three years. The reports, compiled by the FBI's Office of Professional Responsibility, are e-mailed quarterly to FBI employees, but are not released to the public. And despite the bureau's very strict screening procedure for all prospective employees, the FBI confirms that about 325 to 350 employees a year receive some kind of discipline, ranging from a reprimand to suspension. About 30 employees each year are fired. "We do have a no-tolerance policy," FBI Assistant Director Candice Will told CNN. "We don't tolerate our employees engaging in misconduct. We expect them to behave pursuant to the standards of conduct imposed on all FBI employees." However, the internal summaries show that even with serious misconduct, employees can keep their job (names and locations of the employees are not listed in the reports).
Note: For an abundance of revealing media articles on corruption in the intelligence agencies, click here.
Consumer Watchdog, an advocacy group largely focused in recent years on Google's privacy practices, has called [for] a congressional investigation into the Internet giant's "cozy" relationship with U.S. President Barack Obama's administration. In a letter sent [on January 24], Consumer Watchdog asked Representative Darrell Issa, the new chairman of the House Oversight and Government Reform Committee, to investigate the relationship between Google and several government agencies. "We believe Google has inappropriately benefited from close ties to the administration," the letter said. "It should not get special treatment and access because of a special relationship with the administration." Consumer Watchdog's latest complaints about the relationship of Google and the Obama administration are outlined in a 32-page report [which] questions Google's relationship with the U.S. National Security Agency and calls for the company to be more open about what consumer information it shares with the spy agency.
The Drug Enforcement Administration has been transformed into a global intelligence organization with a reach that extends far beyond narcotics, and an eavesdropping operation so expansive it has to fend off foreign politicians who want to use it against their political enemies, according to secret diplomatic cables. The cables, from the cache obtained by WikiLeaks [offer glimpses of drug agents] in places where it can be hard to tell the politicians from the traffickers, and where drug rings are themselves mini-states whose wealth and violence permit them to run roughshod over struggling governments. Officials of the D.E.A. and the State Department declined to discuss what they said was information that should never have been made public. The D.E.A. now has 87 offices in 63 countries and close partnerships with governments that keep the [CIA] at arm’s length. Created in 1973, the D.E.A. has steadily built its international turf. Since the 2001 terrorist attacks, the agency’s leaders have cited what they describe as an expanding nexus between drugs and terrorism in further building its overseas presence.
Note: Isn't it odd that this report fails to mention the recent revelation in The New York Times itself that the American accused of masterminding the Mumbai attacks, David C. Headley, was a DEA agent while attending a "terrorism training camp" in Pakistan in the years before the attacks?
Israel’s undercover operations here, including missions to steal U.S. secrets, are hardly a secret at the FBI, CIA and other U.S. intelligence agencies. From time to time, in fact, the FBI has called Israeli officials on the carpet to complain about a particularly brazen effort to collect classified or other sensitive information, in particular U.S. technical and industrial secrets. The most notorious operation employed Jonathan Pollard, the naval intelligence analyst convicted in 1987 and sentenced to life in prison for stealing tens of thousands of classified documents for Israel. One of Israel’s major interests, of course, is keeping track of Muslims who might be allied with Hamas, which rules the Gaza Strip, or Iran-backed Hezbollah, based in Lebanon. As tensions with Iran escalate, according to former CIA officer Philip Giraldi, “Israeli agents have become more aggressive in targeting Muslims living in the United States as well as in operating against critics. There have been a number of cases reported to the FBI about Mossad officers who have approached leaders in Arab-American communities and have falsely represented themselves as ‘U.S. intelligence,’ ” Giraldi wrote recently in American Conservative magazine. “Because few Muslims would assist an Israeli, this is done to increase the likelihood that the target will cooperate. It’s referred to as a ‘false flag’ operation.”
Note: For an excellent overview of "false-flag" operations, click here.
For seven years, Thomas A. Drake was a senior executive at the nation's largest intelligence organization with an ambition to change its insular culture. He had access to classified programs that purported to help the National Security Agency tackle its toughest challenges. Today, he wears a blue T-shirt and answers questions about iPhones at an Apple store in the Washington area. He is awaiting trial in a criminal media leak case that could send him to prison for 35 years. In his years at the NSA, Drake grew disillusioned, then indignant, about what he saw as waste, mismanagement and a willingness to compromise Americans' privacy without enhancing security. He first tried the sanctioned methods -- going to his superiors, inspectors general, Congress. Finally, in frustration, he turned to the "nuclear option": leaking to the media. Drake, 53, may pay a high price for going nuclear. In April he was indicted, accused of mishandling classified information and obstructing justice. His supporters consider him a patriotic whistleblower targeted by an Obama administration bent on sealing leaks and on having something to show for an investigation that spans two presidencies. What led Drake to this point, friends and others say, is a belief that his actions were justified if they forced such a powerful and secretive agency to be held accountable. "He tried to have his concerns heard and nobody really wanted to listen," said Nina Ginsberg, an attorney.
Note: On June 9, 2011, all ten original charges against Thomas A Drake were dropped and he was not incarcerated, yet it is cases like this that keep people like Edward Snowden from making his case in US courts.
The Army has dropped the Vietnam-era name "psychological operations" for its branch in charge of trying to change minds behind enemy lines, acknowledging the term can sound ominous. The Defense Department picked a more neutral moniker: "Military Information Support Operations," or MISO. Fort Bragg is home to the 4th Psychological Operations Group, the Army's only active duty psychological operations unit. Psychological operations soldiers are trained at the post. The change was driven from the top, by Pentagon policymakers working for Defense Secretary Robert Gates. It reflects unease with the Cold War echoes of the old terminology, and the implication that the work involved subterfuge. Psychological operations have been cast as spooky in movies and books over the years portraying the soldiers as master manipulators. The 2009 movie "The Men Who Stare at Goats," staring George Clooney, was about an army unit that trains psychic spies, based on Jon Ronson's nonfiction account of the U.S. military's hush-hush research into psychic warfare and espionage.
Note: For more on psychological operations and mind control, click here.
WikiLeaks co-founder Julian Assange has given his strongest indication yet about the next big leak from his whistleblower organisation. In an interview with the ABC's Foreign Correspondent, Mr Assange said cryptically of WikiLeaks' current project: "I can give an analogy. If there had been mass spying that had affected many, many people and organisations and the details of that mass spying were released then that is something that would reveal that the interests of many people had been abused." He agreed it would be of the "calibre" of publishing information about the way the top secret Echelon system - the US-UK electronic spying network which eavesdrops on worldwide communications traffic - had been used. Mr Assange also confirmed that WikiLeaks has a copy of a video showing a US military bombing of a western Afghan township which killed dozens of people, including children. During the course of the past month, Mr Assange has been talking to [ABC's] Foreign Correspondent for [an upcoming] program examining the efficacy of the WikiLeaks model. "What we want to create is a system where there is guaranteed free press across the world, the entire world, that every individual in the world has the ability to publish materials that is meaningful," he said.
Note: For more on government surveillance from major media sources, click here.
Succumbing to the politics of fear during the 2008 campaign, Congress seriously diluted the First and Fourth Amendment rights of Americans by changing the 1978 law that governs electronic surveillance. In addition to supplying retroactive approval for President George W. Bush�s warrantless wiretapping, the FISA Amendments Act vastly expanded the government�s ability to eavesdrop without warrants in the future. It gave the National Security Agency authority to monitor the international phone calls and e-mail messages of Americans who are not engaged in criminal activity and pose no threat to national security. The measure weakened judicial supervision of how these powers are exercised, making abuse far more likely. An important case being argued [April 16] in New York City will help determine the extent of the damage. At issue is a constitutional challenge to the 2008 law filed on behalf of human rights, labor, legal, and news media organizations whose work requires sensitive telephone and e-mail communication with people abroad. Embracing the Bush administration�s approach, the Obama administration has sought to block the suit, contending that the plaintiffs lack the requisite �standing� to bring the challenge because they cannot show with certainty that they have been spied on. (Of course, any attempt to prove spying would likely be met by a flimsy claim of state secrecy.)
Note: For lots more from reliable sources on government threats to civil liberties, click here.
Attorney General Eric H. Holder Jr. named a veteran federal prosecutor on Monday to examine abuse of prisoners held by the Central Intelligence Agency, after the Justice Department released a long-secret report showing interrogators choked a prisoner repeatedly and threatened to kill another detainee’s children. Mr. Holder chose John H. Durham, a prosecutor from Connecticut who has been investigating the C.I.A.’s destruction of interrogation videotapes, to determine whether a full criminal investigation of the conduct of agency employees or contractors was warranted. The attorney general said his decision to order an inquiry was based in part on the recommendation of the Justice Department’s ethics office, which called for a new review of several interrogation cases. He said he was also influenced by a 2004 report by the C.I.A. inspector general at the time, John L. Helgerson, on the agency’s interrogations. The report was released Monday under a court order in a Freedom of Information Act lawsuit. Although large portions of the 109-page report are blacked out, it gives new details about a variety of abuses inside the C.I.A.’s overseas prisons, including suggestions about sexually assaulting members of a detainee’s family, staging mock executions, intimidation with a handgun and power drill, and blowing cigar and cigarette smoke into prisoners’ faces to make them vomit. The inspector general’s review raised broad questions about the legality, political acceptability and effectiveness of the harshest of the C.I.A.’s methods, including some not authorized by the Justice Department and others that were approved, like the near-drowning technique of waterboarding.
Note: And what do you think might have been in the blacked out portions of the report? For lots more on the use of illegal methods by the CIA and US military in their prosecution of the "war on terror," click here.
Imagine someone watching your every move, hearing everything you say and knowing where you are at every moment. If you have a cell phone, it could happen to you. After four months of harassing phone calls, Courtney Kuykendall was afraid to answer her cell phone. The Tacoma, Washington, teenager was receiving graphic, violent threats at all hours. And when she and her family changed their cell phone numbers and got new phones, the calls continued. Using deep scratchy voices, anonymous stalkers literally took control of the Kuykendall's cell phones, repeatedly threatened Courtney with murder and rape, and began following the family's every move. "They're listening to us and recording us," Courtney's mother, Heather Kuykendall, told NBC's Today Show. "We know that because they will record us and play it back as a voicemail." How is something like this possible? Just take a look on the internet. That's where you'll find the latest spy technology for cell phones. Spyware marketers claim you can tap into someone's calls, read their text messages and track their movements "anywhere, anytime." Security experts say it's no internet hoax."It's real, and it is pretty creepy," said Rick Mislan, a former military intelligence officer who now teaches cyber forensics at Purdue University's Department of Computer and Information Technology. Mislan has examined thousands of cell phones inside Purdue's Cyber Forensics Lab, and he says spy software can now make even the most high-tech cell phone vulnerable. "I think a lot of people think their cell phone calls are very secure but our privacy isn't always what we think it is."
Note: For lots more on increasing corporate and governmental threats to privacy, click here.
By exploring the current, post-9/11 operations of the NSA [National Security Agency, James] Bamford ... goes where congressional oversight committees and investigative journalists still struggle to go. [When] the Bush administration declared its ... global war on terror, Congress agreed to most of the White House's demands. According to Bamford, the NSA's expanded powers and resources enabled it to collect communications both inside and outside the United States. He quotes a former NSA employee as a witness to the agency's spying on the conversations of Americans who have no connection to terrorism. After suing the NSA for documents, [Bamford] obtained considerable evidence that telecommunication companies (with the notable exception of Qwest) knowingly violated U.S. law by cooperating with the NSA to tap fiber optic lines. In impressive detail, The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America tells how private contractors, including some little-known entities with foreign owners, have done the sensitive work of storing and processing the voices and written data of Americans and non-Americans alike. In the book, he offers new revelations about the National Security Agency's counterterrorism tactics, including its controversial domestic surveillance programs. Bamford warns of worse to come: 'There is now the capacity to make tyranny total in America. Only law ensures that we never fall into that abyss -- the abyss from which there is no return.'"
Note: Bamford is the author of two other books on the NSA: Body of Secrets and The Puzzle Palace.
Rafid Ahmed Alwan hoped for an easier life when he came [to Nuremberg, Germany] from Iraq nine years ago. He also hoped for a reward for his cooperation with German intelligence officers. "For what I've done, I should be treated like a king," he said outside a cramped, low-rent apartment he shares with his family. Instead, the Iraqi informant code-named Curveball has flipped burgers at McDonald's and Burger King, washed dishes in a Chinese restaurant and baked pretzels in an all-night bakery. He also has faced withering international scorn for peddling discredited intelligence that helped spur an invasion of his native country. It was intelligence attributed to Alwan -- as Curveball -- that the White House used in making its case that Saddam Hussein possessed weapons of mass destruction. He described what turned out to be fictional mobile germ factories. The CIA belatedly branded him a liar. After Curveball's role in the pre-invasion intelligence fiasco was disclosed by the Los Angeles Times four years ago, the con man behind the code name remained in the shadows. His security was protected and his identity concealed by the BND, Germany's Federal Intelligence Service. Along with confirmation of Curveball's identity, however, have come fresh disclosures raising doubts about his honesty -- much of that new detail coming from friends, associates and past employers. And records reveal that when Alwan fled to Germany, one step ahead of the Iraq Justice Ministry, an arrest warrant had been issued alleging that he sold filched camera equipment on the Baghdad black market.
Note: For much more information on the CIA's "disinformant" Curveball, click here. The lies he told were peddled by US media, including the major television networks and The New York Times and Washington Post, in the run-up to the US invasion of Iraq. For a powerful summary of major media cover-ups, click here.
America is ruled by an “intelligence-industrial complex” whose allegiance is not to the taxpaying public but to a cabal of private-sector contractors. That is the central thesis of Spies for Hire: The Secret World of Intelligence Outsourcing by Tim Shorrock, ... an investigative journalist. His book [provides a] disturbing overview of the intelligence community, also known as “the I.C.” Mr. Shorrock says our government is outsourcing 70 percent of its intelligence budget, or more than $42 billion a year, to a “secret army” of corporate vendors. Because of accelerated privatization efforts after 9/11, these companies are participating in covert operations and intelligence-gathering activities that were considered “inherently governmental” functions reserved for agencies like the Central Intelligence Agency, he says. Some of the book’s most intriguing assertions concern the permeating influence of the consulting firm Booz Allen Hamilton. In 2006, Mr. Shorrock reports, Booz Allen amassed $3.7 billion in revenue, much of which came from classified government contracts exempt from public oversight. Among its more than 18,000 employees are R. James Woolsey, the former C.I.A. director, and Joan Dempsey, a former longtime United States intelligence official who declared in a 2004 speech, “I like to refer to Booz Allen as the shadow I.C.” The “revolving door” between Booz Allen and the I.C. is personified by Mike McConnell, who joined the firm after serving as head of the National Security Agency under President Bill Clinton, only to return as director of national intelligence under President Bush.
Note: For revealing reports on government corruption from reliable sources, click here.
For three years, the Bush administration has drawn fire from civil liberties groups over its use of national security letters, a kind of administrative subpoena that compels private businesses such as telecommunications companies to turn over information to the government. After the 2001 USA Patriot Act loosened the guidelines, the FBI issued tens of thousands of such requests, something critics say amounts to warrantless spying on Americans who have not been charged with crimes. Now, newly released documents shed light on the use of the letters by the CIA. The spy agency has employed them to obtain financial information about U.S. residents and does so under extraordinary secrecy, according to the American Civil Liberties Union, which obtained copies of CIA letters under the Freedom of Information Act. The CIA's requests for financial records come with "gag orders" on the recipients, said ACLU lawyer Melissa Goodman. In many cases, she said, the recipient is not allowed to keep a copy of the letter or even take notes about the information turned over to the CIA. The ACLU posted copies of some of the letters on its Web site. In most cases, nearly all the text had been redacted by CIA censors.
Note: For many powerful reports on the growing threats to civil liberties, click here.
Federal courts had prohibited the Bush administration from discarding evidence of detainee torture and abuse months before the CIA destroyed videotapes that revealed some of its harshest interrogation tactics. Normally, that would force the government to defend itself against obstruction allegations. But the CIA may have an out: its clandestine network of overseas prisons. While judges focused on the detention center in Guantanamo Bay, Cuba, and tried to guarantee that any evidence of detainee abuse would be preserved, the CIA was performing its toughest questioning half a world away. And by the time President Bush publicly acknowledged the secret prison system, interrogation videos of two terrorism suspects had been destroyed. The CIA destroyed the tapes in November 2005. That June, U.S. District Judge Henry H. Kennedy Jr. had ordered the Bush administration to safeguard "all evidence and information regarding the torture, mistreatment, and abuse of detainees now at the United States Naval Base at Guantanamo Bay." U.S. District Judge Gladys Kessler issued a nearly identical order that July. At the time, that seemed to cover all detainees in U.S. custody. But Abu Zubaydah and Abd al-Rahim al-Nashiri, the terrorism suspects whose interrogations were videotaped and then destroyed, weren't at Guantanamo Bay. They were prisoners that existed off the books -- and apparently beyond the scope of the court's order. Attorneys say that might not matter. David H. Remes, a lawyer for Yemeni citizen Mahmoad Abdah and others, ... said "It is still unlawful for the government to destroy evidence, and it had every reason to believe that these interrogation records would be relevant to pending litigation. It's logical to infer that the documents were destroyed in order to obstruct any inquiry into the means by which statements were obtained."
Hundreds of defendants sitting in prisons nationwide have been convicted with the help of an FBI forensic tool that was discarded more than two years ago. But the FBI lab has yet to take steps to alert the affected defendants or courts, even as the window for appealing convictions is closing, a joint investigation by The Washington Post and "60 Minutes" has found. The science, known as comparative bullet-lead analysis, was first used after President John F. Kennedy's assassination in 1963. The technique used chemistry to link crime-scene bullets to ones possessed by suspects on the theory that each batch of lead had a unique elemental makeup. In 2004, however, the nation's most prestigious scientific body concluded that variations in the manufacturing process rendered the FBI's testimony about the science "unreliable and potentially misleading." Specifically, the National Academy of Sciences said that decades of FBI statements to jurors linking a particular bullet to those found in a suspect's gun or cartridge box were so overstated that such testimony should be considered "misleading under federal rules of evidence." A year later, the bureau abandoned the analysis. But the FBI lab has never gone back to determine how many times its scientists misled jurors. Internal memos show that the bureau's managers were aware by 2004 that testimony had been overstated in a large number of trials. In a smaller number of cases, the experts had made false matches based on a faulty statistical analysis of the elements contained in different lead samples, documents show. The government has fought releasing the list of the estimated 2,500 cases over three decades in which it performed the analysis. For the majority of affected prisoners, the typical two-to-four-year window to appeal their convictions based on new scientific evidence is closing.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.