Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
I was inside the CIA’s Langley, Va., headquarters on Sept. 11, 2001. I headed counterterrorism operations in Pakistan from January to May 2002. My team captured dozens of al-Qaeda fighters, including senior training-camp commanders. One of the fighters whom I played an integral role in capturing was Abu Zubaida, mistakenly thought at the time to be the third-ranking person in the militant group. By that May, the CIA had decided to torture him. When I returned to CIA headquarters that month, a senior officer in the Counterterrorism Center asked me if I wanted to be “trained in the use of enhanced interrogation techniques.” I declined. I said that I had a moral and ethical problem with torture and that - the judgment of the Justice Department notwithstanding - I thought it was illegal. Unfortunately, there were plenty of people in the U.S. government who were all too willing to allow the practice to go on. One of them was Gina Haspel, whom President Trump nominated Tuesday as the CIA’s next director. Putting Haspel in charge of the CIA would undo attempts by the agency - and the nation - to repudiate torture. The message this sends to the CIA workforce is simple: Engage in war crimes, in crimes against humanity, and you’ll get promoted. Don’t worry about the law. Don’t worry about ethics. Don’t worry about morality or the fact that torture doesn’t even work. Go ahead and do it anyway. We’ll cover for you. And you can destroy the evidence, too.
Note: The above was written by former CIA counterterrorism officer John Kiriakou, who was imprisoned for blowing the whistle on the CIA’s illegal torture program. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
The National Security Agency has apparently been way ahead of Apple or Amazon. The agency has at its disposal voice recognition technology that it employs to identify terrorists, government spies, or anyone they choose — with just a phone call, according to a report by The Intercept. By using recorded audio, the NSA is able to create a "voiceprint," or a map of qualities that mark a voice as singular, and identify the person speaking. According to a classified memo ... the agency has employed this technology since at least 2006, with the document referencing technology "that identifies people by the sound of their voices." In fact, the NSA used such technology during Operation Iraqi Freedom, when analysts were able to verify audio thought to be of Saddam Hussein speaking. It suggests that national security operatives had access to high-level voice technology long before Amazon, Apple and Google's solutions became cultural touchstones. A "voiceprint" is "a dynamic computer model of the individual's vocal characteristics," the publication explained, created by an algorithm analyzing features like pitch and mouth shape. Then, using the NSA's formidable bank of recorded audio files, the agency is able to match the speaker to an identity. Identifying people through their voiceprints is a skill at which the "NSA reigns supreme," according to a leaked document from 2008. And, they're only getting better.
Note: As this BBC article from 1999 shows, mass surveillance systems with voice recognition capability have been in use for many years. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Two New York Times reporters learned in 2004 that the George W. Bush administration was secretly wiretapping Americans, and collecting their phone and email records. The reporters’ attempt to publish their findings were thwarted by the administration’s intense and successful lobbying of their editors. That effort ... had an unlikely ally: Rep. Jane Harman of Los Angeles, the senior Democrat on the House Intelligence Committee. Details of the far-reaching, legally unauthorized surveillance program remained secret until the Times published the article in late 2005. The newspaper’s interactions with administration officials, and Harman’s role, were described by former Times reporter James Risen this month in the Intercept, the investigative publication where he now works. The story on the program known as Stellar Wind was ready for publication before the November 2004 election, when Bush was on the ballot, but NSA Director Michael Hayden and other administration officials told Times editors, in phone calls and face-to-face meetings, that publication would damage national security and endanger lives, Risen said. He said the officials were joined in that effort by Harman, one of a handful of congressional leaders who had been briefed on the program and were enlisted by the White House to contact the Times. Members of Congress learned later that the NSA had not been seeking warrants from a secret court, as required by law, before wiretapping calls.
Note: James Risen is a courageous hero who shared two Pulitzer Prizes for his reporting around 9/11 and massive government surveillance. His recent article in The Intercept describes how a "marketplace of secrets in Washington" supports the US national security apparatus, and is used by corrupt government officials to manipulate the news.
Jake Williams, [a] cybersecurity expert, was dismayed to discover that ... the Shadow Brokers, a mysterious group that had somehow obtained many of the hacking tools the United States used to spy on other countries [had] identified him - correctly - as a former member of the National Security Agency’s hacking group, Tailored Access Operations, or T.A.O., a job he had not publicly disclosed. Then the Shadow Brokers astonished him by dropping technical details that made clear they knew about highly classified hacking operations that he had conducted. America’s largest and most secretive intelligence agency had been deeply infiltrated. Current and former agency officials say the Shadow Brokers disclosures, which began in August 2016, have been catastrophic for the N.S.A., calling into question its ability to protect potent cyberweapons and its very value to national security. Fifteen months into a wide-ranging investigation by the agency’s counterintelligence arm, known as Q Group, and the F.B.I., officials still do not know whether the N.S.A. is the victim of a brilliantly executed hack ... an insider’s leak, or both. Three employees have been arrested since 2015 for taking classified files, but there is fear that one or more leakers may still be in place. There is broad agreement that the damage from the Shadow Brokers already far exceeds the harm to American intelligence done by Edward J. Snowden, the former N.S.A. contractor who fled with four laptops of classified material in 2013. For decades after its creation in 1952, the N.S.A. — No Such Agency, in the old joke — was seen as all but leakproof. But since Mr. Snowden flew away with hundreds of thousands of documents in 2013, that notion has been shattered.
Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
In the summer of 1977, Capitol Hill was gripped by revelations of the CIA’s top-secret MK-Ultra mind control research program, targeting unsuspecting American citizens, in some cases by luring them to brothels to be fed LSD-laced cocktails. Hearings that summer, chaired by Sen. Edward M. Kennedy ... touched some of the country’s rawest nerves. The August 1977 MK-Ultra hearings specifically explored what seemed like an outlandish idea straight out of science fiction: the possibility of government mind control. Kennedy ... had a complex relationship with the CIA, given what the agency knew about the assassinations of his brothers Robert and John in the 1960s. One MK-Ultra project involved CIA-run brothels in San Francisco and New York City, established specifically to study LSD’s effects on unsuspecting adults. Project Midnight Climax ran in San Francisco from 1955 to 1965. Operatives reported that it helped refine sexual blackmail tactics, surveillance technology, LSD’s use in interrogations and how to better use empathy as an investigation tactic. Brothel operatives later [admitted] that they had dosed unsuspecting subjects at nearby restaurants, bars and beaches. In one case, a U.S. marshal held up a San Francisco bar with his service revolver after an MK-Ultra agent slipped LSD into his bourbon and soda. In the early 1970s, CIA Director Richard Helms, who ran the agency from 1966 to 1973, along with one of MK-Ultra’s architects, Sidney Gottlieb, ordered all the relevant paperwork destroyed.
Note: Read more about Midnight Climax and the CIA's MK ULTRA program. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
British intelligence agency MI5 was reportedly warned by its US counterpart that Salman Abedi was planning an attack on UK soil, three months before he blew himself up outside an Ariana Grande concert in Manchester. FBI agents are said to have informed British officials that the 22-year-old was part of a North African Islamic State cell based in the north west of England that was plotting an attack in the UK. “In early 2017 the FBI told MI5 that Abedi belonged to a North African terror gang based in Manchester, which was looking for a political target in this country," a security source [said]. “The information came from the interception of his communications by US federal agents, who had been investigating Abedi since the middle of 2016, and from information unearthed in Libya, where his family was linked to terrorist groups. “Following this US tip-off, Abedi and other members of the gang were scrutinised by MI5. It was thought at the time that Abedi was planning to assassinate a political figure. But nothing came of this investigation and, tragically, he slipped down the pecking order of targets.” MI5 has faced questions over the fact that Abedi was on its radar but slipped through the net in order to carry out the attack that killed 22 people and seriously injured 64. Police have so far arrested 14 people on suspicion of terror offences in conjunction with the Manchester attack, two of whom have since been released.
Note: Read this revealing article for more evidence that the Manchester atrocity was possibly allowed to happen, or worse. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
The C.I.A. developed tools to spy on Mac computers by injecting software into the chips that control the computers’ fundamental operations, according to the latest cache of classified government documents published on Thursday by WikiLeaks. All of the surveillance tools that have been disclosed were designed to be installed on individual phones or computers. But the effects could be much wider. Cisco Systems, for example, warned customers this week that many of its popular routers, the backbone of computer networks, could be hacked using the C.I.A.’s techniques. Julian Assange, the founder of WikiLeaks, has offered to share the precise software code used by the C.I.A.’s cyberweapons with the affected companies. But major tech companies have been reluctant to directly engage with him for fear of violating American laws. The spy software described in the latest documents was designed to be injected into a Mac’s firmware, a type of software preloaded in the computer’s chips. It would then act as a “listening post,” broadcasting the user’s activities to the C.I.A. whenever the machine was connected to the internet. Tools that operate at the chip level can hide their existence and avoid being wiped out by routine software updates. Under an agreement struck during the Obama administration, intelligence agencies were supposed to share their knowledge of most security vulnerabilities with tech companies. The C.I.A. documents suggest that some key vulnerabilities were kept secret.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
In a heavily protected military base some 15 miles south of Washington, D.C., sits the massive headquarters of a spy agency few know exists. The [National Geospatial-Intelligence Agency, or] NGA remains by far the most shadowy member of the Big Five spy agencies, which include the CIA and the National Security Agency. Despite its lack of name recognition, the NGA’s headquarters is the third-largest building in the Washington metropolitan area. The NGA is to pictures what the NSA is to voices. Its principal function is to analyze the billions of images and miles of video captured by drones ... and spy satellites. The agency has never been involved in domestic spy scandals. However, there’s reason to believe that this will change. In March 2016, the Pentagon released the results of an investigation initiated by the Department of Defense’s Office of Inspector General to examine military spy drones in the United States. The report ... revealed that the Pentagon used unarmed surveillance drones over American soil. The investigation also quoted from an Air Force law review article pointing out the growing concern that technology designed to spy on enemies abroad may soon be turned around to spy on citizens at home. In 2016, unbeknownst to many city officials, police in Baltimore began conducting persistent aerial surveillance using a system developed for military use in Iraq. Few civilians have any idea how advanced these military eye-in-the-sky drones have become.
Note: This article was written by former ABC News producer James Bamford, whose 2001 article on Operation Northwoods revealed that the top Pentagon generals signed off on top-secret plans which stated, "We could blow up a U.S. ship in Guantanamo Bay and blame Cuba," and, "casualty lists in U.S. newspapers would cause a helpful wave of national indignation." And showing the level of major media complicity, only ABC News reported on this. For more, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Leaked court documents raise concerns that the murder of the Honduran environmentalist Berta Cáceres was an extrajudicial killing planned by military intelligence specialists linked to the country’s US–trained special forces. Cáceres was shot dead a year ago while supposedly under state protection after receiving death threats over her opposition to a hydroelectric dam. The murder of Cáceres, winner of the prestigious Goldman environmental prize in 2015, prompted international outcry and calls for the US to revoke military aid to Honduras, a key ally in its war on drugs. Eight men have been arrested in connection with the murder, including one serving and two retired military officers. Officials have denied state involvement in the activist’s murder, and downplayed the arrest of the serving officer Maj Mariano Díaz. But ... Díaz, a decorated special forces veteran, was appointed chief of army intelligence in 2015. Another suspect, Lt Douglas Giovanny Bustillo joined the military on the same day as Díaz. Díaz and Bustillo both received military training in the US. A third suspect, Sgt Henry Javier Hernández, was a former special forces sniper, who had worked under the direct command of Díaz. Last year, the Guardian reported that a former Honduran soldier said he had seen Cáceres’s name on a hitlist that was passed to US-trained units. Sgt Rodrigo Cruz said that two elite units were given lists featuring the names and photographs of activists – and ordered to eliminate each target.
Note: The Western Hemisphere Institute for Security Cooperation, formerly known as the School of the Americas, reportedly graduated more than 500 human rights abusers. The identities of many other US-trained troops operating in other countries remain hidden by US courts. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
The Department of Justice proudly announced the first FBI terror arrest of the Trump administration on Tuesday: an elaborate sting operation that snared a 25-year-old Missouri man who had no terrorism contacts besides the two undercover FBI agents who paid him to buy hardware supplies they said was for a bomb - and who at one point pulled a knife on him and threatened his family. Robert Lorenzo Hester of Columbia, Missouri, didn’t have the $20 he needed to buy the 9-volt batteries, duct tape, and roofing nails his new FBI friends wanted him to get, so they gave him the money. The agents noted in a criminal complaint that Hester, who at one point brought his two small children to a meeting because he didn’t have child care, continued smoking marijuana despite professing to be a devout Muslim. But according to the DOJ press release, Hester had plans to conduct an “ISIS-sponsored terrorist attack” on President’s Day that would have resulted in mass casualties had it succeeded. News reports breathlessly echoed the government’s depiction of Hester as a foiled would-be terrorist. But the only contact Hester had with ISIS was with the two undercover agents. There appears to be little to suggest that [Hester] had the wherewithal or capacity to carry out a terrorist attack. His case is similar to many others in which individuals in financial, legal, or psychological distress have been befriended by undercover FBI agents or government informants and coaxed into developing a terrorist plot.
Note: The FBI has been stepping up its use of stings in ISIS cases. Read how an FBI mole posing as a potential lover recently convinced a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
Using loopholes it has kept secret for years, the FBI can in certain circumstances bypass its own rules in order to send undercover agents or informants into political and religious organizations, as well as schools, clubs, and businesses. If the FBI had its way, the infiltration loopholes would still be secret. They are detailed in a mammoth document obtained by The Intercept, an uncensored version of ... the Domestic Investigations and Operations Guide, or DIOG. If an undercover agent wants to pose as a university student and take classes, or if an FBI handler wants to tell an informant to attend religious services - two examples straight out of the rulebook - he or she must obtain a supervisor’s approval and attest both to the operation’s importance and to its compliance with constitutional safeguards. But all those rules go out the window if an agent decides the group is “illegitimate” or an informant spies on the group of his or her own accord. Civil rights groups ... worry that the FBI has made use of precisely these kinds of loopholes, silently undermining cherished freedoms enshrined after a dark chapter of FBI history: the COINTELPRO program in the 1950s and ’60s, when the FBI spied on, harassed, and tried to discredit leftists, civil rights leaders, and anti-war protestors. The exposure of COINTELPRO led to a famous Senate investigation and to institutional reform. The DIOG, despite being hundreds of pages of dense bureaucracy, actually documents a loosening of the standards enacted to rein in the FBI after COINTELPRO and other scandals ... after the 9/11 attacks.
Note: Read a detailed essay on the FBI's COINTELPRO program from the well-researched online book Lifting the Veil. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the erosion of civil liberties.
About 13 million pages of declassified documents from the US Central Intelligence Agency (CIA) have been released online. Among the more unusual records are documents from the Stargate Project, which dealt with psychic powers and extrasensory perception. Those include records of testing on celebrity psychic Uri Geller in 1973. Memos detail how Mr Geller was able to partly replicate pictures drawn in another room with varying - but sometimes precise - accuracy, leading the researchers to write that he "demonstrated his paranormal perceptual ability in a convincing and unambiguous manner". Other unusual records include a collection of reports on flying saucers. While much of the information has been technically publicly available since the mid-1990s, it has been very difficult to access. The records were only available on four physical computers ... at the National Archives in Maryland. A non-profit freedom of information group, MuckRock, sued the CIA to force it to upload the collection. At the same time, journalist Mike Best crowd-funded more than $15,000 to visit the archives to print out and then publicly upload the records, one by one. "By printing out and scanning the documents at CIA expense, I was able to begin making them freely available to the public and to give the agency a financial incentive to simply put the database online," Best wrote.
Note: The entire declassified archive of the Stargate Project is now available on the CIA Library website. Explore a treasure trove of excellent resources on remote viewing. For decades, officials denied the existence of remote viewing programs and UFO investigations. What other intelligence agency lies will be exposed as more information like this comes to light?
The watchdog wing of Congress has quietly launched an investigation into the “integrity” of the Pentagon’s whistleblower protection program. The Government Accountability Office, which serves as the investigative arm of Congress, has been looking into the extent to which Department of Defense whistleblower policies ... reassure employees of their rights to raise concerns “without fear of reprisal.” The investigation will also likely target senior Pentagon officials accused of destroying evidence that would have exculpated former senior NSA official Thomas Drake, who raised internal complaints about what he believed to be NSA misconduct and waste before ultimately approaching journalists. Rather than having his concerns acknowledged, Drake spent months fighting charges against him under the Espionage Act. His career in the intelligence community was ended. “Bureaucratic abuses of power are the primary reason otherwise circumspect national security whistleblowers leak to the media. It is too dangerous to work within an untrustworthy system,” Tom Devine, legal director of the Government Accountability Project, wrote in a statement. John Crane, formerly the assistant inspector general in the Pentagon, revealed his role in attempting to protect Drake’s identity and investigate the document destruction involved in his case last May - an effort he claims cost him his job. The implications of the investigation may eventually be important for evaluating the actions of former NSA contractor Edward Snowden.
Note: Mass surveillance whistleblower Thomas Drake attempted to work within the system and was was targeted for prosecution. John Crane was forced out of the Pentagon in 2013. His story is told in a new book, titled, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Do the committees that oversee the vast U.S. spying apparatus take intelligence community whistleblowers seriously? For the last 20 years, the answer has been a resounding “no.” My own experience in 1995-96 is illustrative. Over a two-year period working with my wife, Robin (who was a CIA detailee to a Senate committee at the time), we discovered that, contrary to the public statements by then-Chairman of the Joint Chiefs Colin Powell and other senior George H. W. Bush administration officials ... American troops had in fact been exposed to chemical agents during and after the 1991 war with Saddam Hussein. Officials at the Pentagon and CIA were working to bury it. The agency didn’t care about helping to find out why hundreds of thousands of American Desert Storm veterans were ill. Seeing the writing on the wall, I began working on what would become a book about our experience: “Gassed in the Gulf.” The agency tried to block publication of the book and attempted to reclassify hundreds of previously declassified Department of Defense and CIA intelligence reports that helped us make our case. Our story [became] a front-page sensation just days before the 1996 presidential election. Within six months, the CIA was forced to admit that it had indeed been withholding data on such chemical exposures, which were a possible cause of the post-war illnesses that would ultimately affect about one-third of the nearly 700,000 U.S. troops who served in Kuwait and Iraq. None of the CIA or Pentagon officials who perpetrated the cover-up were fired or prosecuted.
Note: The above article was written by whistleblower and former CIA analyst Patrick Eddington. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the manipulation of public perception.
The problem of racial bias among police [has] been a concern of the FBI for at least a decade. 10 years ago ... the FBI warned of the potential consequences - including bias - of white supremacist groups infiltrating local and state law enforcement, indicating it was a significant threat to national security. In the 2006 bulletin, the FBI detailed the threat of white nationalists and skinheads infiltrating police in order to disrupt investigations against fellow members and recruit other supremacists. The bulletin was released during a period of scandal for many law enforcement agencies throughout the country, including a neo-Nazi gang formed by members of the Los Angeles County Sheriff’s Department. Similar investigations revealed officers and entire agencies with hate group ties in Illinois, Ohio and Texas. Much of the bulletin has been redacted, but in it, the FBI ... warned of “ghost skins,” hate group members who don’t overtly display their beliefs. “At least one white supremacist group has reportedly encouraged ghost skins to seek positions in law enforcement for the capability of alerting skinhead crews of pending investigative action against them,” the report read. Neither the FBI nor state and local law enforcement agencies have established systems for vetting personnel for potential supremacist links. That task is left primarily to everyday citizens and nonprofit organizations like the Southern Poverty Law Center, one of few that tracks the growing number of hate groups in America.
Note: For more along these lines, see concise summaries of deeply revealing news articles about police corruption and the erosion of civil liberties.
The Pentagon gave a controversial U.K. PR firm over half a billion dollars to run a top secret propaganda program in Iraq, the Bureau of Investigative Journalism can reveal. Bell Pottinger’s output included short TV segments made in the style of Arabic news networks and fake insurgent videos which could be used to track the people who watched them, according to a former employee. The agency’s staff worked alongside high-ranking U.S. military officers in their Baghdad Camp Victory headquarters. Bell Pottinger reported to the Pentagon, the CIA, and the National Security Council on its work in Iraq. In the first media interview any Bell Pottinger employee has given about the work for the U.S. military in Iraq, video editor Martin Wells told the Bureau his time in Camp Victory was “shocking, eye-opening, life-changing.” The firm’s output was signed off by former General David Petraeus - then commander of the coalition forces in Iraq - and on occasion by the White House, he said. Bell Pottinger’s work in Iraq was a huge media operation which cost over a hundred million dollars a year on average. The ... most sensitive program described by Wells was the production of fake al Qaeda propaganda films. U.S. marines would take the CDs on patrol and drop them in the chaos when they raided targets. Wells explained how the team embedded a code into the CDs which linked to a Google Analytics account, giving a list of IP addresses where the CDs had been played.
Note: So the Pentagon made propaganda films to recruit for Al Qaeda, bombed a place upsetting the people there, then seeded these films to try to capture anyone who was interested in the propaganda they spread. For more along these lines, see concise summaries of deeply revealing news articles about war corruption and the manipulation of public perception.
An ongoing review shows the U.S. intelligence community has been debunking long-held myths about some of the “worst of the worst” at Guantánamo, some of them still held today. The retreat emerges in a series of unclassified prisoner profiles released by the Pentagon in recent years, snapshots of much larger dossiers the public cannot see, prepared for the Periodic Review Board examining the Pentagon’s “forever prisoner” population. “It was clear early on that the intelligence was grossly wrong,” said Mark Fallon, a retired 30-year federal officer who between 2002 and 2004 was Special Agent in Charge of the Department of Defense’s Criminal Investigation Task Force. Most “weren’t battlefield captives,” he said, calling many “bounty babies” - men captured by Afghan warlords or Pakistani security forces and sent to Guantánamo “on the sketchiest bit of intelligence with nothing to corroborate.” They ended up with “a lot of false information based on some pretty poor interrogations being done partly by military interrogators in that time frame.” Fallon ... is in the final stages of publishing a book of his criticisms and said in a recent interview that it’s no surprise that early prisoner profiles are imploding under Periodic Review Board scrutiny. In the early years, according to one analyst who worked there, Guantánamo’s Joint Intelligence Group was “looking for anything you can pin on these guys.” The intelligence unit was “picking up on one or two things and holding on to it tightly like it was gospel.”
Note: US officials have been aware for years that many Guantánamo detainees were innocent or only low-level operatives. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
I do my best to resist the thought that prison is a reflection of our society, but the comparisons are unavoidable. From the moment I crossed the threshold from freedom to incarceration because I was charged with, and a jury convicted me of, leaking classified information to a New York Times reporter, I needed no reminder that I was no longer an individual. Prison, with its “one size fits all” structure, is not set up to recognize a person’s worth; the emphasis is removal and categorization. Inmates are not people; we are our offenses. Considering the charges and conviction that brought me here, I’m not exactly sure to which category I belong. No matter. There is an overriding category to which I do belong, and it is this prison reality that I sadly “compare unto the world”: I’m not just an inmate, I’m a black inmate. Here, I am my skin color. Whenever, in my stubborn idealism, I refuse to acknowledge being racially categorized and question the submission to it, the other prisoners invariably respond, “Man, this is prison.” What I see in prison is sad, but what I’m seeing from prison is worse. During my time in the CIA it became clear, in the organization’s words and actions toward me, that they saw me not as an American who wanted to serve his country but as “a big black guy.” There is a black America, there is a white America, there are many Americas. The greatness and promise of this country lies in equality reinforced by our differences. When I am free, I don’t want to feel that I’m merely going from one prison to another.
Note: The above was written by Jeffrey Sterling, a former CIA agent targeted for prosecution as part of the Obama Administration's "crack down on the press and whistle-blowers." Author James Risen tried to help Sterling expose CIA racism, and later wrote an unrelated book exposing some questionable government practices. Sterling was then sent to prison for what Risen wrote. Risen's latest book exposes major government corruption related to the war on terror.
[Daniel] Jones, a counter-terrorism staffer, had become the chief investigator for the Senate intelligence committee, the CIA’s congressional overseer, on its biggest inquiry. For five years, he had been methodically sifting through internal CIA accounts of its infamous torture program. Having read millions of internal emails, cables and accounts of agency torture, Jones had come to believe everything the CIA had told Congress, the Bush and Obama White Houses and the public was a lie. Inside the small room in Virginia the CIA had set up for the Senate investigators, Jones ... slipped crucial printed-out passages of what he called the Panetta Review into [his] bag and secured its lock. Sometime after 1am, Jones walked out, carrying his bag as he always did. The Panetta Review saga would spur a furious CIA to take an extraordinary step: it would spy on its own legislative overseers – especially Jones. The episode would spill out publicly the following March, when top committee Democrat Dianne Feinstein ... accused the CIA on the Senate floor of triggering what she called a constitutional crisis. Both sides requested the justice department pursue a criminal investigation on the other. The bitterness would nearly overshadow a landmark report, a fraction of which was released to the public in December 2014, that documented in chilling detail the depravations CIA inflicted on terrorism suspects after 9/11. The CIA has gone beyond successfully suppressing the report. The agency’s inspector general ... destroyed its copy – allegedly an accident.
Note: For more, see this revealing report. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Over his two terms, Obama has created the most powerful surveillance state the world has ever seen. From 22,300 miles in space, where seven Advanced Orion [spy satellites] now orbit; to a 1-million-square-foot building in the Utah desert that stores data intercepted from personal phones, emails, and social media accounts; to taps along the millions of miles of undersea cables that encircle the Earth like yarn, U.S. surveillance has expanded exponentially since Obama’s inauguration on Jan. 20, 2009. The effort to wire the world ... has cost American taxpayers more than $100 billion. Yet has the president’s blueprint for spying succeeded on its own terms? An examination of the unprecedented architecture reveals that the Obama administration may only have drowned itself in data. Privacy hasn’t been traded for security, but for the government hoarding more data than it knows how to handle. A panel set up by Obama [in 2013] to review the NSA’s operations concluded that the agency had stopped no terrorist attacks. Beyond failures to create security, there is the matter of misuse or abuse of U.S. spying, the effects of which extend well beyond violations of Americans’ constitutional liberties. Obama, meanwhile, has taken virtually no steps to fix what ails his spying apparatus, [but] has gone after people blowing the whistle on intelligence abuses. The Justice Department has charged eight leakers — more than double the number under all previous presidents combined.
Note: The above was written by James Bamford, whistleblower and author of "The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America." Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.