Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
President John F. Kennedy sent an army of anti-Castro exiles backed by the CIA onto the beach at Cuba’s Bay of Pigs to suffer bloody, catastrophic defeat. A few days later, [Kennedy] wondered aloud why nobody had talked him out of it. Could the Miami Herald have done that - talked him out of it? The Herald, seven months before the Bay of Pigs, had prepared a news story saying that the United States was planning to launch a military operation against Cuba. But the paper’s top management killed the story after CIA Director Allen Dulles said publishing it would hurt national security. In 1960, [reporter David Kraslow's] contacts at the Justice Department ... told him of a brutal feud between legendary FBI director J. Edgar Hoover and the CIA. The CIA wanted to train an army of Cuban exiles to overthrow Castro; the FBI was charged with enforcing the federal Neutrality Act that makes it illegal to stage a military expedition against another country from U.S. territory. Kraslow had a blockbuster story. “It was about 1,500 words and it said the CIA was secretly recruiting and training Cuban exiles for some sort of major military operation against Castro,” he recalls. The Herald wouldn’t run it. Training of the Cuban exiles was moved out the United States to Guatemala. On Jan. 10, 1961, [The New York Times] published a story on the ... base in Guatemala. The day after that, the Herald published its own story. A little editor’s note explained that the Herald had held up the news “for more than two months”.
Note: Although JFK did not stop the Bay of Pigs debacle, his administration did successfully stop a Pentagon plan to fabricate acts of terrorism on US soil as a pretext for war with Cuba. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the manipulation of mass media.
Senator Dianne Feinstein, the California Democrat who relinquished the chairmanship of the intelligence committee ... said she objects to Senator Richard Burr's request that the Obama administration return all copies of the full, 6,000-plus-page classified [torture] study. "Doing so would limit the ability to learn lessons from this sad chapter in America's history and omit from the record two years of work," Feinstein said in a statement late on Tuesday. In an extraordinary epilogue to the battle between the Senate intelligence committee and the CIA over the torture report, new chairman Burr, a North Carolina Republican, requested that administration agencies return to the committee all copies of the full report. Burr's request was first reported by the New York Times and the Huffington Post. The Times noted that Burr's request would have the effect of placing the classified report beyond the reach of the Freedom of Information Act, which exempts Congress. President Obama has [given the report] rhetorical support, but [empowered] the CIA to determine what portions of a critique of the agency ought to be public. A CIA-appointed review panel also recently found that the agency's director, John Brennan, consulted with the White House chief of staff, Denis McDonough, before agency employees surreptitiously accessed emails and drafts from committee investigators. Feinstein said in March that the breach represented a constitutional crisis, with the CIA spying on its Senate overseers.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in intelligence agencies and government.
Lawyers acting for Jeremy Hammond, the Chicago-based hacktivist facing up to 10 years in prison for releasing internal emails from the private intelligence agency Stratfor, have lodged 265 letters of support with the federal judge who will determine his sentence on 15 November. The letters call on judge Loretta Preska ... to show leniency towards Hammond, a former member of the hacking network Anonymous who has become a cause célčbre for hacktivists, civil libertarians and those concerned about the rights of whistleblowers. Among the correspondents are Daniel Ellsberg, source of the 1970s Pentagon Papers leak on the Vietnam war, and Jesselyn Radack, a former Justice Department whistleblower who now works at the Government Accountability Project. Hammond, 28, has pleaded guilty to one count under the Computer Fraud and Abuse Act (CFAA) relating to a 2011 cyber attack on Strategic Forecasting, Inc, known as Stratfor – an information analysis company based in Austin, Texas. Working alongside a fellow hacker operating under the internet handle Sabu – who was later revealed to be an FBI informant – Hammond downloaded an email spool from Stratfor containing millions of files and sent the data to the anti-secrecy website WikiLeaks which released them as the “Global Intelligence Files”. The Stratfor emails revealed that [Stratfor] had been contracted by Dow Chemical, parent company of Union Carbide which owned the Bhopal pesticide plant where the world’s worst industrial catastrophe took place in 1984, to follow the activities of campaigners seeking redress for the victims.
Note: For an excellent follow-up article titled "The Revolutionaries in Our Midst," click here. For more on privatization of "intelligence", see the deeply revealing reports from reliable major media sources available here.
It was an innocuous e-mail, one of millions sent every day by spouses with updates on the situation at home. But this one was of particular interest to the National Security Agency and contained clues that put the sender’s husband in the crosshairs of a CIA drone. Days later, Hassan Ghul ... was killed by a drone strike in Pakistan’s tribal belt. Documents provided ... by former NSA contractor Edward Snowden confirm his demise in October 2012 and reveal the agency’s extensive involvement in the targeted killing program that has served as a centerpiece of President Obama’s counterterrorism strategy. The documents provide the most detailed account of the intricate collaboration between the CIA and the NSA in the drone campaign. [The] collection of records in the Snowden trove [make] clear that the drone campaign — often depicted as the CIA’s exclusive domain — relies heavily on the NSA’s ability to vacuum up enormous quantities of e-mail, phone calls and other fragments of signals intelligence, or SIGINT. To handle the expanding workload, the NSA created a secret unit known as the Counter-Terrorism Mission Aligned Cell, or CT MAC, to concentrate the agency’s vast resources on hard-to-find [targets]. Former CIA officials said the files are an accurate reflection of the NSA’s contribution to finding targets in a campaign that has killed more than 3,000 people [in] Pakistan.
Note: For more on the use of drones to kill abroad and spy at home, see the deeply revealing reports from reliable major media sources available here.
The full extent of the CIA's extraordinary rendition programme has been laid bare with the publication of a report showing there is evidence that more than a quarter of the world's governments covertly offered support. A 213-page report compiled by the Open Society Justice Initiative (OSJI), a New York-based human rights organisation, says that at least 54 countries co-operated with the global kidnap, detention and torture operation that was mounted after 9/11, many of them in Europe. So widespread and extensive was the participation of governments across the world that it is now clear the CIA could not have operated its programme without their support, according to the OSJI. "Responsibility for these violations does not end with the United States. Secret detention and extraordinary rendition operations, designed to be conducted outside the United States under cover of secrecy, could not have been implemented without the active participation of foreign governments. These governments too must be held accountable." The states identified by the OSJI include those such as Pakistan, Afghanistan, Egypt and Jordan where the existence of secret prisons and the use of torture has been well documented for many years. But the OSJI's rendition list also includes states such as Ireland, Iceland and Cyprus, which are accused of granting covert support for the programme by permitting the use of airspace and airports by aircraft involved in rendition flights. Iran and Syria are identified by the OSJI as having participated in the rendition programme.
Note: For deeply revealing reports from reliable major media sources on the illegal operations that comprise the 'global war on terror', click here.
The head of Germany's domestic intelligence service resigned on [July 2] after admitting that his agency had shredded files on a neo-Nazi cell whose killing spree targeting immigrants rocked the country late last year. Heinz Fromm's resignation is the latest in a series of embarrassing setbacks for Germany's security services over their handling of the "National Socialist Underground" (NSU), which went undetected for more than a decade despite its murder of 10 people, mostly ethnic Turkish immigrants. German lawmakers said there was no suggestion that Fromm had ordered the destruction of the files but that he was taking responsibility for others' failures. German media have said an official working in the intelligence agency is suspected of having destroyed files on an operation to recruit far-right informants just one day after the involvement of the NSU in the murders became public. Fromm told the Spiegel weekly that the shredding of files in the case had done "grave damage to the reputation" of his agency, known in Germany as the Federal Office for the Protection of the Constitution. Germans, burdened by their Nazi past, were mortified by last year's news that three neo-Nazis had been behind the killings of eight ethnic Turks, an ethnic Greek and a police officer in a period running from 2000 to 2007. The NSU cell's culpability only came to light after two of the neo-Nazis committed suicide following a botched bank robbery last autumn.
Note: For insightful reports from reliable major media articles on the dark operations of intelligence agencies, click here.
The government will be able to monitor the calls, emails, texts and website visits of everyone in the UK under new legislation set to be announced soon. Internet firms will be required to give intelligence agency GCHQ access to communications on demand, in real time. The Home Office says the move is key to tackling crime and terrorism, but civil liberties groups have criticised it. Tory MP David Davis called it "an unnecessary extension of the ability of the state to snoop on ordinary people". A new law ... would not allow GCHQ to access the content of emails, calls or messages without a warrant. But it would enable intelligence officers to identify who an individual or group is in contact with, how often and for how long. They would also be able to see which websites someone had visited. Conservative MP and former shadow home secretary David Davis said it would make it easier for the government "to eavesdrop on vast numbers of people". "What this is talking about doing is not focusing on terrorists or criminals, it's absolutely everybody's emails, phone calls, web access..." He said that until now anyone wishing to monitor communications had been required to gain permission from a magistrate. Nick Pickles, director of the Big Brother Watch campaign group, called the move "an unprecedented step that will see Britain adopt the same kind of surveillance seen in China and Iran". The previous Labour government attempted to introduce a central, government-run database of everyone's phone calls and emails, but eventually dropped the bid after widespread anger.
Note: For more on this from BBC, click here. Though this is interesting news, many know that the government has had easy access to all people's emails, phone calls, and more for many years through systems like echelon and more. For an abundance of major media articles showing how many of the power elite want to create a big-brother society, click here.
The federal government has agreed to pay $2.5 million to the widow and children of the first person killed in the anthrax letter attacks of 2001, settling a lawsuit claiming that the Army did not adequately secure its supply of the deadly pathogen. The settlement with the family of Robert Stevens, a tabloid photo editor in Florida, follows an eight-year legal battle that exposed slack rules and sloppy recordkeeping at the Armys biodefense laboratory at Fort Detrick, in Frederick, Md. As part of the agreement, Justice Department lawyers are seeking to have many documents that were uncovered in the litigation kept under court seal or destroyed. Mr. Stevenss widow, Maureen, filed suit against the government in 2003, as evidence accumulated that the anthrax powder in the lethal letters had come from an Army laboratory. Mr. Stevens, 62, died on Oct. 5, 2001, days after inhaling anthrax powder at work.
Note: Why would the government want these documents destroyed? Remember that these attacks, which happened within weeks of the 9/11 attacks, were at first attributed to terrorists. Now it is fully acknowledged they were the responsibility of someone in government. Hmmmmm.
Jose Guerena Ortiz was sleeping after an exhausting 12-hour night shift at a copper mine. His wife, Vanessa, had begun breakfast. Their 4-year-old son, Joel, asked to watch cartoons. An ordinary morning was unfolding in the middle-class Tucson neighborhood — until an armored vehicle pulled into the family's driveway and men wearing heavy body armor and helmets climbed out, weapons ready. They were a sheriff's department SWAT team who had come to execute a search warrant. But Vanessa Guerena insisted she had no idea, when she heard a "boom" and saw a dark-suited man pass by a window, that it was police outside her home. She shook her husband awake and told him someone was firing a gun outside. A U.S. Marine veteran of the Iraq war, he was only trying to defend his family, she said, when he grabbed his own gun — an AR-15 assault rifle. What happened next was captured on video after a member of the SWAT team activated a helmet-mounted camera. The officers — four of whom carried .40-caliber handguns while another had an AR-15 — moved to the door, briefly sounding a siren, then shouting "Police!" in English and Spanish. With a thrust of a battering ram, they broke the door open. Eight seconds passed before they opened fire into the house. And 10 seconds later, Guerena lay dying in a hallway 20-feet from the front door. The SWAT team fired 71 rounds, riddling his body 22 times, while his wife and child cowered in a closet.
Note: For a survey of the decade-long trend toward militarization of police forces in the US, click here. For analyses of the militaristic police responses to the Occupy movement, click here and here.
Thirty-one seconds after the pilot reported muzzle flashes, the Marines at Alcatraz ordered that the Predator be prepared to strike if the shooters could be confirmed as hostile. At 8:49 a.m., 29 minutes after the ambush began, they authorized the pilot to fire. In minutes, two Americans would be dead. The decision to fire a missile from one of the growing fleet of U.S. unmanned aircraft is the result of work by ground commanders, pilots and analysts at far-flung military installations, who analyze video and data feeds and communicate by a system of voice and text messages. In addition to the platoon taking fire that morning in Helmand province's Upper Sangin Valley, the mission involved Marine Corps and Air Force personnel at four locations: Marines of the 2nd Reconnaissance Battalion at Alcatraz, the drone crew in Nevada, the analyst in Indiana and a mission intelligence coordinator at March Air Reserve Base in California. Senior officers say drone technology has vastly improved their ability to tell friend from foe in the confusion of battle. But the video can also prompt commanders to make decisions before they fully understand what they're seeing. In February 2009, a crew operating a drone over Afghanistan misidentified a civilian convoy as an enemy force. The Predator pilot and the Army captain who called in the airstrike disregarded warnings from Air Force analysts who had observed children in the convoy. At least 15 people were killed.
Note: For key reports from major media sources on the illegal and immoral prosecution of the global "war on terror" by the US military and NATO, click here.
An FBI employee shared confidential information with his girlfriend, who was a news reporter, then later threatened to release a sex tape the two had made. A supervisor watched pornographic videos in his office during work hours while "satisfying himself." And an employee in a "leadership position" misused a government database to check on two friends who were exotic dancers and allowed them into an FBI office after hours. These are among confidential summaries of FBI disciplinary reports obtained by CNN, which describe misconduct by agency supervisors, agents and other employees over the last three years. The reports, compiled by the FBI's Office of Professional Responsibility, are e-mailed quarterly to FBI employees, but are not released to the public. And despite the bureau's very strict screening procedure for all prospective employees, the FBI confirms that about 325 to 350 employees a year receive some kind of discipline, ranging from a reprimand to suspension. About 30 employees each year are fired. "We do have a no-tolerance policy," FBI Assistant Director Candice Will told CNN. "We don't tolerate our employees engaging in misconduct. We expect them to behave pursuant to the standards of conduct imposed on all FBI employees." However, the internal summaries show that even with serious misconduct, employees can keep their job (names and locations of the employees are not listed in the reports).
Note: For an abundance of revealing media articles on corruption in the intelligence agencies, click here.
Consumer Watchdog, an advocacy group largely focused in recent years on Google's privacy practices, has called [for] a congressional investigation into the Internet giant's "cozy" relationship with U.S. President Barack Obama's administration. In a letter sent [on January 24], Consumer Watchdog asked Representative Darrell Issa, the new chairman of the House Oversight and Government Reform Committee, to investigate the relationship between Google and several government agencies. "We believe Google has inappropriately benefited from close ties to the administration," the letter said. "It should not get special treatment and access because of a special relationship with the administration." Consumer Watchdog's latest complaints about the relationship of Google and the Obama administration are outlined in a 32-page report [which] questions Google's relationship with the U.S. National Security Agency and calls for the company to be more open about what consumer information it shares with the spy agency.
The Drug Enforcement Administration has been transformed into a global intelligence organization with a reach that extends far beyond narcotics, and an eavesdropping operation so expansive it has to fend off foreign politicians who want to use it against their political enemies, according to secret diplomatic cables. The cables, from the cache obtained by WikiLeaks [offer glimpses of drug agents] in places where it can be hard to tell the politicians from the traffickers, and where drug rings are themselves mini-states whose wealth and violence permit them to run roughshod over struggling governments. Officials of the D.E.A. and the State Department declined to discuss what they said was information that should never have been made public. The D.E.A. now has 87 offices in 63 countries and close partnerships with governments that keep the [CIA] at arm’s length. Created in 1973, the D.E.A. has steadily built its international turf. Since the 2001 terrorist attacks, the agency’s leaders have cited what they describe as an expanding nexus between drugs and terrorism in further building its overseas presence.
Note: Isn't it odd that this report fails to mention the recent revelation in The New York Times itself that the American accused of masterminding the Mumbai attacks, David C. Headley, was a DEA agent while attending a "terrorism training camp" in Pakistan in the years before the attacks?
Israel’s undercover operations here, including missions to steal U.S. secrets, are hardly a secret at the FBI, CIA and other U.S. intelligence agencies. From time to time, in fact, the FBI has called Israeli officials on the carpet to complain about a particularly brazen effort to collect classified or other sensitive information, in particular U.S. technical and industrial secrets. The most notorious operation employed Jonathan Pollard, the naval intelligence analyst convicted in 1987 and sentenced to life in prison for stealing tens of thousands of classified documents for Israel. One of Israel’s major interests, of course, is keeping track of Muslims who might be allied with Hamas, which rules the Gaza Strip, or Iran-backed Hezbollah, based in Lebanon. As tensions with Iran escalate, according to former CIA officer Philip Giraldi, “Israeli agents have become more aggressive in targeting Muslims living in the United States as well as in operating against critics. There have been a number of cases reported to the FBI about Mossad officers who have approached leaders in Arab-American communities and have falsely represented themselves as ‘U.S. intelligence,’ ” Giraldi wrote recently in American Conservative magazine. “Because few Muslims would assist an Israeli, this is done to increase the likelihood that the target will cooperate. It’s referred to as a ‘false flag’ operation.”
Note: For an excellent overview of "false-flag" operations, click here.
For seven years, Thomas A. Drake was a senior executive at the nation's largest intelligence organization with an ambition to change its insular culture. He had access to classified programs that purported to help the National Security Agency tackle its toughest challenges. Today, he wears a blue T-shirt and answers questions about iPhones at an Apple store in the Washington area. He is awaiting trial in a criminal media leak case that could send him to prison for 35 years. In his years at the NSA, Drake grew disillusioned, then indignant, about what he saw as waste, mismanagement and a willingness to compromise Americans' privacy without enhancing security. He first tried the sanctioned methods -- going to his superiors, inspectors general, Congress. Finally, in frustration, he turned to the "nuclear option": leaking to the media. Drake, 53, may pay a high price for going nuclear. In April he was indicted, accused of mishandling classified information and obstructing justice. His supporters consider him a patriotic whistleblower targeted by an Obama administration bent on sealing leaks and on having something to show for an investigation that spans two presidencies. What led Drake to this point, friends and others say, is a belief that his actions were justified if they forced such a powerful and secretive agency to be held accountable. "He tried to have his concerns heard and nobody really wanted to listen," said Nina Ginsberg, an attorney.
Note: On June 9, 2011, all ten original charges against Thomas A Drake were dropped and he was not incarcerated, yet it is cases like this that keep people like Edward Snowden from making his case in US courts.
The Army has dropped the Vietnam-era name "psychological operations" for its branch in charge of trying to change minds behind enemy lines, acknowledging the term can sound ominous. The Defense Department picked a more neutral moniker: "Military Information Support Operations," or MISO. Fort Bragg is home to the 4th Psychological Operations Group, the Army's only active duty psychological operations unit. Psychological operations soldiers are trained at the post. The change was driven from the top, by Pentagon policymakers working for Defense Secretary Robert Gates. It reflects unease with the Cold War echoes of the old terminology, and the implication that the work involved subterfuge. Psychological operations have been cast as spooky in movies and books over the years portraying the soldiers as master manipulators. The 2009 movie "The Men Who Stare at Goats," staring George Clooney, was about an army unit that trains psychic spies, based on Jon Ronson's nonfiction account of the U.S. military's hush-hush research into psychic warfare and espionage.
Note: For more on psychological operations and mind control, click here.
WikiLeaks co-founder Julian Assange has given his strongest indication yet about the next big leak from his whistleblower organisation. In an interview with the ABC's Foreign Correspondent, Mr Assange said cryptically of WikiLeaks' current project: "I can give an analogy. If there had been mass spying that had affected many, many people and organisations and the details of that mass spying were released then that is something that would reveal that the interests of many people had been abused." He agreed it would be of the "calibre" of publishing information about the way the top secret Echelon system - the US-UK electronic spying network which eavesdrops on worldwide communications traffic - had been used. Mr Assange also confirmed that WikiLeaks has a copy of a video showing a US military bombing of a western Afghan township which killed dozens of people, including children. During the course of the past month, Mr Assange has been talking to [ABC's] Foreign Correspondent for [an upcoming] program examining the efficacy of the WikiLeaks model. "What we want to create is a system where there is guaranteed free press across the world, the entire world, that every individual in the world has the ability to publish materials that is meaningful," he said.
Note: For more on government surveillance from major media sources, click here.
Succumbing to the politics of fear during the 2008 campaign, Congress seriously diluted the First and Fourth Amendment rights of Americans by changing the 1978 law that governs electronic surveillance. In addition to supplying retroactive approval for President George W. Bush�s warrantless wiretapping, the FISA Amendments Act vastly expanded the government�s ability to eavesdrop without warrants in the future. It gave the National Security Agency authority to monitor the international phone calls and e-mail messages of Americans who are not engaged in criminal activity and pose no threat to national security. The measure weakened judicial supervision of how these powers are exercised, making abuse far more likely. An important case being argued [April 16] in New York City will help determine the extent of the damage. At issue is a constitutional challenge to the 2008 law filed on behalf of human rights, labor, legal, and news media organizations whose work requires sensitive telephone and e-mail communication with people abroad. Embracing the Bush administration�s approach, the Obama administration has sought to block the suit, contending that the plaintiffs lack the requisite �standing� to bring the challenge because they cannot show with certainty that they have been spied on. (Of course, any attempt to prove spying would likely be met by a flimsy claim of state secrecy.)
Note: For lots more from reliable sources on government threats to civil liberties, click here.
Attorney General Eric H. Holder Jr. named a veteran federal prosecutor on Monday to examine abuse of prisoners held by the Central Intelligence Agency, after the Justice Department released a long-secret report showing interrogators choked a prisoner repeatedly and threatened to kill another detainee’s children. Mr. Holder chose John H. Durham, a prosecutor from Connecticut who has been investigating the C.I.A.’s destruction of interrogation videotapes, to determine whether a full criminal investigation of the conduct of agency employees or contractors was warranted. The attorney general said his decision to order an inquiry was based in part on the recommendation of the Justice Department’s ethics office, which called for a new review of several interrogation cases. He said he was also influenced by a 2004 report by the C.I.A. inspector general at the time, John L. Helgerson, on the agency’s interrogations. The report was released Monday under a court order in a Freedom of Information Act lawsuit. Although large portions of the 109-page report are blacked out, it gives new details about a variety of abuses inside the C.I.A.’s overseas prisons, including suggestions about sexually assaulting members of a detainee’s family, staging mock executions, intimidation with a handgun and power drill, and blowing cigar and cigarette smoke into prisoners’ faces to make them vomit. The inspector general’s review raised broad questions about the legality, political acceptability and effectiveness of the harshest of the C.I.A.’s methods, including some not authorized by the Justice Department and others that were approved, like the near-drowning technique of waterboarding.
Note: And what do you think might have been in the blacked out portions of the report? For lots more on the use of illegal methods by the CIA and US military in their prosecution of the "war on terror," click here.
Imagine someone watching your every move, hearing everything you say and knowing where you are at every moment. If you have a cell phone, it could happen to you. After four months of harassing phone calls, Courtney Kuykendall was afraid to answer her cell phone. The Tacoma, Washington, teenager was receiving graphic, violent threats at all hours. And when she and her family changed their cell phone numbers and got new phones, the calls continued. Using deep scratchy voices, anonymous stalkers literally took control of the Kuykendall's cell phones, repeatedly threatened Courtney with murder and rape, and began following the family's every move. "They're listening to us and recording us," Courtney's mother, Heather Kuykendall, told NBC's Today Show. "We know that because they will record us and play it back as a voicemail." How is something like this possible? Just take a look on the internet. That's where you'll find the latest spy technology for cell phones. Spyware marketers claim you can tap into someone's calls, read their text messages and track their movements "anywhere, anytime." Security experts say it's no internet hoax."It's real, and it is pretty creepy," said Rick Mislan, a former military intelligence officer who now teaches cyber forensics at Purdue University's Department of Computer and Information Technology. Mislan has examined thousands of cell phones inside Purdue's Cyber Forensics Lab, and he says spy software can now make even the most high-tech cell phone vulnerable. "I think a lot of people think their cell phone calls are very secure but our privacy isn't always what we think it is."
Note: For lots more on increasing corporate and governmental threats to privacy, click here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.