Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


SEAL Team 6: A Secret History of Quiet Killings and Blurred Lines
2015-06-06, New York Times
http://www.nytimes.com/2015/06/07/world/asia/the-secret-history-of-seal-team-...

The Navy’s SEAL Team 6 ... best known for killing Osama bin Laden, has been transformed by more than a decade of combat into a global manhunting machine. That role reflects America’s new way of war, in which conflict is distinguished ... by the relentless killing of suspected militants. While fighting grinding wars of attrition in Afghanistan and Iraq, Team 6 ... joined Central Intelligence Agency operatives in an initiative called the Omega Program, which offered greater latitude in hunting adversaries. Team 6 has successfully carried out thousands of dangerous raids that military leaders credit with weakening militant networks, but its activities have also spurred recurring concerns. Afghan villagers and a British commander accused SEALs of indiscriminately killing men in one hamlet; in 2009, team members joined C.I.A. and Afghan paramilitary forces in a raid that left a group of youths dead and inflamed tensions between Afghan and NATO officials. When suspicions have been raised about misconduct, outside oversight has been limited. “This is an area where Congress notoriously doesn’t want to know too much,” said Harold Koh, the State Department’s former top legal adviser. Like the C.I.A.’s campaign of drone strikes, Special Operations missions offer policy makers an alternative to costly wars of occupation. But the bulwark of secrecy around Team 6 makes it impossible to fully assess its record and the consequences of its actions, including civilian casualties or the deep resentment inside the countries where its members operate.

Note: Drone strikes almost always miss their intended targets. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing news articles about military corruption and high level manipulation of mass media.


Talking to James Risen About Pay Any Price, the War on Terror and Press Freedoms
2014-11-25, The Intercept
https://firstlook.org/theintercept/2014/11/25/talking-james-risen-pay-price-w...

James Risen, who won the Pulitzer Prize in 2005 for exposing the NSA warrantless eavesdropping program, has [been] threatened with prison by the Obama Justice Department. [This] is almost certainly the vindictive by-product of the U.S. government’s anger over his NSA reporting. He has published a new book on the War on Terror entitled Pay Any Price: Greed, Power and Endless War. Risen's [critique] is one of the first to offer large amounts of original reporting on ... a particular part of the War on Terror, namely the way in which economic motives, what [he] calls the Homeland Security Industrial Complex, has driven a huge part of the war. GLENN GREENWALD: How much of this economic motive is the cause of the fact that we’ve now been at war for 13 years? RISEN: It plays a really central role. After so many years there’s ... a post-9/11 mercenary class that’s developed that have invested. Not just people who are making money, but people who are in the government. Their status and their power within the government are invested in continuing the war. There’s very little debate about whether to continue the war. When Dick Cheney said, “the gloves come off,” ... that really meant, “We’re going to deregulate national security, and we’re going to take off all the rules that were imposed in the ’70s after Watergate.” That was just a dramatic change. It’s been extended to this whole new homeland security apparatus. People think that terrorism is an existential threat, even though it’s not, and so they’re willing to go along with all this.

Note: The complete interview at the link above provides details of James Risen's fight to preserve journalistic integrity against a corrupted government's attempts to manipulate the news. For more on Risen's deeply revealing investigation of the Homeland Security Industrial Complex, see this recent NPR interview.


'Trojan Horse' Bug Lurking in Vital US Computers Since 2011
2014-11-06, ABC News
http://abcnews.go.com/US/trojan-horse-bug-lurking-vital-us-computers-2011/sto...

A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security. National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the Russian government. The hacked software is used to control ... oil and gas pipelines, power transmission grids, water distribution and filtration systems, wind turbines and even some nuclear plants. The hacking campaign has been ongoing since 2011, but no attempt has been made to activate the malware. DHS sources ... fear that the Russians have torn a page from the old, Cold War playbook, and have placed the malware in key U.S. systems as a threat, and/or as a deterrent to a U.S. cyber-attack on Russian systems. The hack became known to insiders last week when a DHS alert bulletin was issued. The bulletin said the “BlackEnergy” penetration recently had been detected by several companies. DHS said “BlackEnergy” is the same malware that was used ... to target NATO and some energy and telecommunications companies. The hacked software is very advanced. It allows designated workers to control various industrial processes through the computer, an iPad or a smart phone, sources said.

Note: For an example of a computer-based attack on industrial infrastructure, read how a malware called Stuxnet targeted Iranian nuclear facilities. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.


Edward Snowden responds to release of e-mail by U.S. officials
2014-05-29, Washington Post
http://www.washingtonpost.com/world/national-security/edward-snowden-responds...

Former intelligence contractor Edward Snowden responded to questions from The Washington Post following the release of an e-mail he had sent while working for the National Security Agency. Q: How do you respond to today’s NSA statement and the release of your email with the Office of General Counsel? A: The NSA’s new discovery of written contact between me and its lawyers - after more than a year of denying any such contact existed - raises serious concerns. It reveals as false the NSA’s claim ... that “after extensive investigation, including interviews with his former NSA supervisors and co-workers, we have not found any evidence to support Mr. Snowden’s contention that he brought these matters to anyone’s attention.” Today’s release is incomplete, and does not include my correspondence with the Signals Intelligence Directorate’s Office of Compliance. [But] whether my disclosures were justified does not depend on whether I raised these concerns previously. That’s because the system is designed to ensure that even the most valid concerns are suppressed and ignored, not acted upon. The fact that two powerful Democratic Senators - Ron Wyden and Mark Udall - knew of mass surveillance that they believed was abusive and felt constrained [not] to do anything about it underscores how futile such internal action is -- and will remain -- until these processes are reformed. Still, the fact is that I did raise such concerns both verbally and in writing, and on multiple, continuing occasions - as I have always said.

Note: For more on the Snowden case, see the deeply revealing reports from reliable major media sources available here.


Spain colluded in NSA spying on its citizens, Spanish newspaper reports
2013-10-30, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/oct/30/spain-colluded-nsa-spying-citize...

The widespread surveillance of Spanish citizens by the US National Security Agency, which caused outrage when it was reported this week, was the product of a collaboration with Spain's intelligence services, according to one Spanish newspaper. Spanish agents not only knew about the work of the NSA but also facilitated it, El Mundo reports. An NSA document entitled "Sharing computer network operations cryptologic information with foreign partners" reportedly shows how the US relies on the collaboration of many countries to give it access to intelligence information, including electronic metadata. According to the document seen by El Mundo, the US classifies cooperation with various countries on four different levels. In the first group – "Comprehensive Cooperation" – are the UK, Australia, Canada and New Zealand. The second group – "Focused Cooperation" – of which Spain is a member, includes 19 countries, all of them European, apart from Japan and South Korea. The third group – "Limited cooperation" – consists of countries such as France, Israel, India and Pakistan; while the fourth – "Exceptional Cooperation" – is made up of countries that the US considers to be hostile to its interests. The NSA documents [suggest] the Spanish intelligence services were working hand in hand with the NSA, as were other foreign agencies. But if there was any doubt as to who held the upper hand, the NSA documents make clear that any collaboration was always to serve the needs of protecting American interests.

Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Shooter Identified As Former US Military Member
2012-08-06, CBS-DC/Associated Press
http://washington.cbslocal.com/2012/08/06/cbs-news-shooter-identified-as-form...

The shooter behind the deadly massacre at the Sikh Temple of Wisconsin [on August 5, 2012] has been identified as 40-year-old Wade Michael Page. Page previously served in the U.S. military, but was no longer on active duty. Page enlisted in the Army in April 1992 and was given a less-than-honorable discharge in October 1998. He was last stationed in Fort Bragg, N.C., serving in the psychological operations unit. Authorities said Page strode into the temple carrying a 9mm handgun and multiple magazines of ammunition and opened fire without saying a word. When the shooting at the Sikh Temple of Wisconsin in suburban Milwaukee ended, six victims ranging in age from 39 to 84 years old lay dead. Three others were critically wounded. The suspect was shot and killed by police. Page joined the military in Milwaukee in 1992 and was a repairman for the Hawk missile system before switching jobs to become one of the Army’s psychological operations specialists assigned to a battalion at Fort Bragg, N.C. As a psyops specialist, Page would have trained to host public meetings between locals and American forces, use leaflet campaigns in a conflict zone or use loudspeakers to communicate with enemy soldiers. He never deployed overseas while serving in that role, Pentagon spokesman George Wright said. The FBI was leading the investigation because the shooting was considered domestic terrorism, or an attack that originated inside the U.S. The agency said it had no reason to believe anyone other than Page was involved. The shooting also came two weeks after a gunman killed 12 people at movie theater in Colorado.

Note: For more on US military and intelligence agency mind control programs and the creation of assassins ("Manchurian Candidates"), click here.


Pentagon establishes Defense Clandestine Service, new espionage unit
2012-04-23, Washington Post
http://www.washingtonpost.com/world/national-security/pentagon-creates-new-es...

The Pentagon is planning to ramp up its spying operations against high-priority targets such as Iran under an intelligence reorganization aimed at expanding on the military’s espionage efforts beyond war zones. The newly created Defense Clandestine Service would work closely with the CIA ... in an effort to bolster espionage operations overseas at a time when the missions of the agency and the military increasingly converge. Defense Secretary Leon E. Panetta, who signed off on the newly created service last week, served as CIA director at a time when the agency relied extensively on military hardware, including armed drones. Michael Vickers, the undersecretary of defense for intelligence and the main force behind the changes, is best known as one of the architects of the CIA’s program to arm Islamist militants to oust the Soviets from Afghanistan in the 1980s. He is also a former member of U.S. Special Operations forces. Despite the potentially provocative name for the new service, the official played down concerns that the Pentagon was seeking to usurp the role of the CIA or its National Clandestine Service. The new service fits into a broader convergence trend. U.S. Special Operations forces are increasingly engaged in intelligence collection overseas and have collaborated with the CIA on missions. The blurring is also evident in the organizations’ upper ranks. Panetta previously served as CIA director.

Note: For lots more from major media sources on the activities of government intelligence agencies, click here.


Secrecy defines Obama’s drone war
2011-12-19, Washington Post
http://www.washingtonpost.com/world/national-security/secrecy-defines-obamas-...

Since September, at least 60 people have died in 14 reported CIA drone strikes in Pakistan’s tribal regions. The Obama administration has named only one of the dead, hailing the elimination of Janbaz Zadran, a top official in the Haqqani insurgent network, as a counterterrorism victory. The identities of the rest remain classified, as does the existence of the drone program itself. The administration ... has parried reports of collateral damage and the alleged killing of innocents by saying that drones, with their surveillance capabilities and precision missiles, result in far fewer mistakes than less sophisticated weapons. Yet in carrying out hundreds of strikes over three years — resulting in an estimated 1,350 to 2,250 deaths in Pakistan — it has provided virtually no details to support those assertions. The rapid expansion in the size and scope of the drone campaign as the U.S. wars in Iraq and Afghanistan have been winding down has led to increased criticism from human rights and international law experts, many of whom dispute the legal justification for the program. Much of the resistance to increased disclosure has come from the CIA, which has argued that the release of any information about the program, particularly on how targets are chosen and strikes approved, would aid the enemy. The Defense Department’s Joint Special Operations Command (JSOC), which has carried out strikes in Yemen and Somalia, refuses to discuss drones or any other aspect of its secret counterterrorism operations.

Note: For key reports from major media sources on government secrecy, click here.


FBI lab reports on anthrax attacks suggest another miscue
2011-05-19, Miami Herald/McClatchy News
http://www.miamiherald.com/2011/05/19/2225013/fbi-lab-reports-on-anthrax-atta...

Buried in FBI laboratory reports about the anthrax mail attacks that killed five people in 2001 are data suggesting that a chemical may have been added to try to heighten the powder's potency, a move that some experts say exceeded the expertise of the presumed killer. The lab data, contained in more than 9,000 pages of files that emerged a year after the Justice Department closed its inquiry and condemned the late Army microbiologist Bruce Ivins as the perpetrator, shows unusual levels of silicon and tin in anthrax powder from two of the five letters. Those elements are found in compounds that could be used to weaponize the anthrax, enabling the lethal spores to float easily so they could be readily inhaled by the intended victims, scientists say. The existence of the silicon-tin chemical signature offered investigators the possibility of tracing purchases of the more than 100 such chemical products available before the attacks, which might have produced hard evidence against Ivins or led the agency to the real culprit. But the FBI lab reports released in late February give no hint that bureau agents tried to find the buyers of additives such as tin-catalyzed silicone polymers. The apparent failure of the FBI to pursue this avenue of investigation raises the ominous possibility that the killer is still on the loose.

Note: For key articles from reliable sources on government corruption, click here.


CIA doctors face human experimentation claims
2009-09-02, The Guardian (One of the UK's leading newspapers)
http://www.guardian.co.uk/world/2009/sep/02/cia-usa

Doctors and psychologists the CIA employed to monitor its "enhanced interrogation" of terror suspects came close to, and may even have committed, unlawful human experimentation, a medical ethics watchdog has alleged. Physicians for Human Rights (PHR), a not-for-profit group that has investigated the role of medical personnel in alleged incidents of torture at Guantánamo, Abu Ghraib, Bagram and other US detention sites, accuses doctors of being far more involved than hitherto understood. PHR says health professionals participated at every stage in the development, implementation and legal justification of what it calls the CIA's secret "torture programme". The most incendiary accusation of PHR's latest report, Aiding Torture, is that doctors actively monitored the CIA's interrogation techniques with a view to determining their effectiveness, using detainees as human subjects without their consent. The report concludes that such data gathering was "a practice that approaches unlawful experimentation". Human experimentation without consent has been prohibited in any setting since 1947 [with] the Nuremberg Code, which resulted from the prosecution of Nazi doctors. In April, a leaked report from the International Committee of the Red Cross found that medical staff employed by the CIA had been present during waterboarding, and had even used what appeared to be a pulse oxymeter, placed on the prisoner's finger to monitor his oxygen saturation during the procedure. PHR is calling for an official investigation into the role of doctors in the CIA's now widely discredited programme. It wants to know exactly how many doctors participated, what they did, what records they kept and the science that they applied.

Note: To watch a video of a Democracy Now! segment on the PHR report, click here. For astounding information on how MDs participated in the CIA's mind control experiments in the past, click here.


Judge: CIA interrogations not relevant to 9/11 accused's sanity
2009-08-10, Miami Herald
http://www.miamiherald.com/news/americas/guantanamo/story/1179756.html

U.S. military defense lawyers for accused 9/11 conspirator Ramzi bin al Shibh cannot learn what interrogation techniques CIA agents used on the Yemeni before he was moved to Guantánamo to be tried as a terrorist, an Army judge has ruled. Bin al Shibh, 37, is one of five men charged in a complex death penalty prosecution by military commission currently under review by the Obama administration. But his lawyers say he suffers a "delusional disorder," and hallucinations in his cell at Guantánamo may leave him neither sane enough to act as his own attorney nor to stand trial. Prison camp doctors treat him with psychotropic drugs. Army Col. Stephen Henley, the military judge on the case, has scheduled a competency hearing for mid-September. Meantime, the judge ruled on Aug. 6 that "evidence of specific techniques employed by various governmental agencies to interrogate the accused is . . . not essential to a fair resolution of the incompetence determination hearing in this case." Prosecutors had invoked a national security privilege in seeking to shield the details from defense lawyers. Many of the techniques used on the men have already been made public. They included waterboarding, sleep deprivation and sexual humiliation methods meant to break a captive's will. But Navy Cmdr. Suzanne Lachelier, the Yemeni's Pentagon appointed defense attorney, said court-approved mental health experts -- as well as the judge -- need to know the specifics to assess her client's mental illness. If he suffers post-traumatic stress disorder as a result of his CIA interrogations, there may be PTSD treatments that could make him competent.

Note: For many reports from reliable sources on the hidden realities of "the war on terror," click here.


Administration Set to Use New Spy Program in U.S.
2008-04-12, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/04/11/AR20080411036...

The Bush administration said yesterday that it plans to start using the nation's most advanced spy technology for domestic purposes soon, rebuffing challenges by House Democrats over the idea's legal authority. Homeland Security Secretary Michael Chertoff said his department will activate his department's new domestic satellite surveillance office in stages, starting as soon as possible. Sophisticated overhead sensor data will be used for law enforcement once privacy and civil rights concerns are resolved, he said. His statements marked a fresh determination to operate the department's new National Applications Office. But Congress delayed launch of the new office last October. Critics cited its potential to expand the role of military assets in domestic law enforcement, to turn new or as-yet-undeveloped technologies against Americans without adequate public debate, and to divert the existing civilian and scientific focus of some satellite work to security uses. Democrats say Chertoff has not spelled out what federal laws govern the NAO, whose funding and size are classified. Congress barred Homeland Security from funding the office until its investigators could review the office's operating procedures and safeguards. The department submitted answers on Thursday, but some lawmakers promptly said the response was inadequate. [Rep. Bennie G. Thompson (D-Miss.), chairman of the House Homeland Security Committee] said, "We still don't know whether the NAO will pass constitutional muster since no legal framework has been provided."

Note: For many more revealing stories on threats to civil liberties, click here.


The FBI Deputizes Business
2008-02-07, Common Dreams
http://www.commondreams.org/archive/2008/02/07/6918/

Today, more than 23,000 representatives of private industry are working quietly with the FBI and the Department of Homeland Security. The members of this rapidly growing group, called InfraGard, receive secret warnings of terrorist threats before the public does -- and, at least on one occasion, before elected officials. In return, they provide information to the government, which alarms the ACLU. But there may be more to it than that. One business executive, who showed me his InfraGard card, told me they have permission to "shoot to kill"ť in the event of martial law. In November 2001, InfraGard had around 1,700 members. As of late January, InfraGard had 23,682 members, according to its website, www.infragard.net, which adds that "350 of our nation's Fortune 500 have a representative in InfraGard."ť FBI Director Robert Mueller addressed an InfraGard convention on August 9, 2005. He urged InfraGard members to contact the FBI if they "note suspicious activity or an unusual event." And he said they could sic the FBI on "disgruntled employees who will use knowledge gained on the job against their employers."ť

Note: We don't normally use Common Dreams as a news source, but as this news is so important and the major media failed to report it, we decided to include this article here. For a revealing report by the ACLU on this key topic, click here. For important reports from major media sources on threats to civil liberties, click here.


Spies' Battleground Turns Virtual
2008-02-06, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/05/AR20080205031...

U.S. intelligence officials are [now claiming] that popular Internet services that enable computer users to adopt cartoon-like personas in three-dimensional online spaces also are creating security vulnerabilities by opening novel ways ... to move money, organize and conduct corporate espionage. Over the last few years, "virtual worlds" such as Second Life and other role-playing games have become home to millions of computer-generated personas known as avatars. By directing their avatars, people can take on alternate personalities, socialize, explore and earn and spend money across uncharted online landscapes. Nascent economies have sprung to life in these 3-D worlds, complete with currency, banks and shopping malls. Corporations and government agencies have opened animated virtual offices, and a growing number of organizations hold meetings where avatars gather and converse in newly minted conference centers. Intelligence officials ... say they're convinced that the qualities that many computer users find so attractive about virtual worlds -- including anonymity, global access and the expanded ability to make financial transfers outside normal channels -- have turned them into seedbeds for transnational threats. The government's growing concern seems likely to make virtual worlds the next battlefield in the struggle over the proper limits on the government's quest to [expand] data collection and analysis and the surveillance of commercial computer systems. Virtual worlds could also become an actual battlefield. The intelligence community has begun contemplating how to use Second Life and other such communities as platforms for cyber weapons.


Tip-off thwarted nuclear spy ring probe
2008-01-27, Sunday Times (One of the U.K.'s leading newspapers)
http://www.timesonline.co.uk/tol/news/world/us_and_americas/article3257725.ece

An investigation into the illicit sale of American nuclear secrets was compromised by a senior official in the State Department, a former FBI employee has claimed. The official is said to have tipped off a foreign contact about a bogus CIA company used to investigate the sale of nuclear secrets. The firm, Brewster Jennings & Associates, was a front for Valerie Plame, the former CIA agent. Her public outing two years later in 2003 by White House officials became a cause célčbre. The claims that a State Department official blew the investigation into a nuclear smuggling ring have been made by Sibel Edmonds, 38, a former Turkish language translator in the FBI’s Washington field office. Plame, then 38, was the ... wife of a former US ambassador, Joe Wilson. She travelled widely for her work, often claiming to be an oil consultant. In fact she was a career CIA agent who was part of a small team investigating the same procurement network that the State Department official is alleged to have aided. Brewster Jennings was one of a number of covert enterprises set up to infiltrate the nuclear ring. [Edmonds said the State Department official] "found out about the arrangement . . . and he contacted one of the foreign targets and said . . . you need to stay away from Brewster Jennings because they are a cover for the government.“ Phillip Giraldi, a former CIA officer, said: “It’s pretty clear Plame was targeting the Turks. If indeed that [State Department] official was working with the Turks to violate US law on nuclear exports, it would have been in his interest to alert them to the fact that this woman’s company was affiliated to the CIA. I don’t know if that’s treason legally but many people would consider it to be.”

Note: To read former CIA agent Philip Giraldi's analysis of Edmonds' claims, in which he identifies the unnamed State Department official as Marc Grossman, click here. And to read an interview with Edmonds on the series of articles about her revelations appearing in the Sunday Times and media censorship elsewhere, click here.


Dan Ellsberg: Sibel Edmonds case
2007-11-19, OpEdNews.com
http://www.opednews.com/articles/genera_luke_ryl_071119_dan_ellsberg_3a_sibel...

Bradblog has been chasing the story about former FBI translator Sibel Edmonds' offer to 'tell all.' [Daniel] Ellsberg says: "I'd say what she has is far more explosive than the Pentagon Papers. From what [Edmonds] has to tell, it has a major difference from the Pentagon Papers in that it deals directly with criminal activity and may involve impeachable offenses. And I don't necessarily mean the President or the Vice-President, though I wouldn't be surprised if the information reached up that high. But other members of the Executive Branch may be impeached as well. There will be phone calls going out to the media saying 'don't even think of touching [Edmonds' case], you will be prosecuted for violating national security.'" [Edmonds] said: "The media called from Japan and France and Belgium and Germany and Canada and from all over the world. I'm getting contact from all over the world, but not from here." More Ellsberg: "I am confident that there is conversation inside the Government as to 'How do we deal with Sibel?' The first line of defense is to ensure that she doesn't get into the media. I think any outlet that thought of using her materials would go to the government and they would be told 'don't touch this, it's communications intelligence.' As long as they hold a united front on this, they don't run the risk of being shamed." [Edmonds:] "I will name the name of major publications who know the story, and have been sitting on it --- almost a year and a half." "How do you know they have the story?," we asked. "I know they have it because people from the FBI have come in and given it to them. They've given them the documents and specific case-numbers on my case."

Note: Though this is not from one of our normal reliable sources, Dan Ellsberg is a highly respected whistleblower who has received an abundance of major media coverage over the years. As the mainstream media are clearly and consciously ignoring this story, we felt it deserved to be posted, even though we don't have a major media source to back it up. For lots more reliable information on this courageous woman, click here.


Source Disclosure Ordered in Anthrax Suit
2007-08-14, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/08/13/AR20070813009...

Five reporters must reveal their government sources for stories they wrote about Steven J. Hatfill and investigators' suspicions that the former Army scientist was behind the deadly anthrax attacks of 2001, a federal judge ruled. The ruling is a victory for Hatfill, a bioterrorism expert who has argued in a civil suit that the government violated his privacy rights and ruined his chances at a job by unfairly leaking information about the probe. He has not been charged in the attacks that killed five people and sickened 17 others, and he has denied wrongdoing. Hatfill's suit, filed in 2003, accuses the government of waging a "coordinated smear campaign." To succeed, Hatfill and his attorneys have been seeking the identities of FBI and Justice Department officials who disclosed disparaging information about him to the media. In lengthy depositions in the case, reporters have identified 100 instances when Justice or FBI sources provided them with information about the investigation of Hatfill and the techniques used to probe his possible role in anthrax-laced mailings. But the reporters have refused to name the individuals. In 2002, then-Attorney General John D. Ashcroft called Hatfill, who had formerly worked at the Army's infectious diseases lab in Fort Detrick in Frederick County, a "person of interest" in the anthrax case. Authorities have not made any arrests in the investigation. Hatfill's search for government leakers is "strikingly similar" to the civil suit filed by Wen Ho Lee, a nuclear scientist who became the subject of a flurry of media stories identifying him as a chief suspect in a nuclear-secrets spy case. Those stories also relied on anonymous sources. Lee was never charged with espionage.

Note: For more reliable information about the anthrax attacks that followed closely after 9/11 and the mysterious deaths of over a dozen renowned microbiologists shortly thereafter, click here.


Airlines Sue FBI, CIA Over Sept. 11
2007-08-07, Associated Press
http://money.aol.com/news/articles/_a/airlines-sue-fbi-cia-over-sept-11/n2007...

Airlines and aviation-related companies sued the CIA and the FBI on Tuesday to force terrorism investigators to tell whether the aviation industry was to blame for the Sept. 11 attacks. The two lawsuits in U.S. District Court in Manhattan sought court orders for depositions as the aviation entities build their defenses against lawsuits seeking billions of dollars in damages for injuries, fatalities, property damage and business losses related to Sept. 11, 2001. The aviation companies said the agencies in a series of boilerplate letters had refused to let them depose two secret agents, including the 2001 head of the CIA's special Osama bin Laden unit, and six FBI agents with key information about al-Qaida and bin Laden. The [plaintiffs] said they were entitled to present evidence to show the terrorist attacks did not depend upon negligence by any aviation defendants and that there were other causes of the attacks. In the CIA lawsuit, companies ... asked to interview the deputy chief of the CIA's bin Laden unit in 2001 and an FBI agent assigned to the unit at that time. The names of both are secret. In the FBI lawsuit, the companies asked to interview five former and current FBI employees who had participated in investigations of al-Qaida and al-Qaida operatives before and after Sept. 11. Those individuals included Coleen M. Rowley, the former top FBI lawyer in its Minneapolis office, who sent a scathing letter to FBI Director Robert S. Mueller in May 2002 complaining that a supervisor in Washington interfered with the Minnesota investigation of Zacarias Moussaoui weeks before the Sept. 11 attacks. Requests to interview the agents were rejected as not sufficiently explained, burdensome or protected by investigative or attorney-client privilege, the lawsuits said.

Note: For a concise summary of reliable, verifiable information on the 9/11 coverup, click here.


Bush Approves New CIA Methods
2007-07-21, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/07/20/AR20070720012...

President Bush set broad legal boundaries for the CIA's harsh interrogation of terrorism suspects yesterday, allowing the intelligence agency to resume a program that was suspended last year after criticism that it violated U.S. and international law. In an executive order lacking any details about actual interrogation techniques, Bush said the CIA program will now comply with a Geneva Conventions prohibition against "outrages upon personal dignity, in particular humiliating and degrading treatment." Two administration officials said that suspects now in U.S. custody could be moved immediately into the "enhanced interrogation" program and subjected to techniques that go beyond those allowed by the U.S. military. Rights activists criticized Bush's order for failing to spell out which techniques are now approved or prohibited. "All the order really does is to have the president say, 'Everything in that other document that I'm not showing you is legal -- trust me,' " said Tom Malinowski of Human Rights Watch. The CIA interrogation guidelines are contained in a classified document. A senior intelligence official, asked whether this list includes such widely criticized methods as the simulated drowning known as "waterboarding," declined to discuss specifics but said "it would be very wrong to assume that the program of the past would move into the future unchanged." CIA detainees have also alleged they were left naked in cells for prolonged periods, subjected to sensory and sleep deprivation and extreme heat and cold, and sexually taunted. A senior administration official briefing reporters yesterday said that any future use of "extremes of heat and cold" would be subject to a "reasonable interpretation . . . we're not talking about forcibly induced hypothermia."


FBI Finds It Frequently Overstepped in Collecting Data
2007-06-14, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/06/13/AR20070613024...

An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"