Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
After one woman broke his heart, Khalil Abu Rayyan, a 21-year-old Michigan man, contemplated suicide. Then, when he confided his dark thoughts to another woman, she suggested he steer his violence toward other people. Both women ... were FBI honeypots, and one of the recorded conversations with Rayyan entered into ongoing court proceedings provides a rare glimpse into how federal informants work. The U.S. government now alleges that Rayyan, who has been indicted on federal gun charges, is an Islamic State sympathizer who talked of attacking a church. Federal prosecutors ... are handling Rayyan’s indictment with the secrecy of a national security investigation. The first FBI informant to enter Rayyan’s life was “Ghaada.” They struck up an intense relationship online, and even talked about marriage, children, and a life together. When Ghaada called off the relationship, Rayyan was heartbroken. The FBI then introduced “Jannah Bride.” To impress his new romantic interest, who appeared preoccupied with jihad, Rayyan claimed to have an AK-47 (he didn’t), and to have attempted travel to Syria (there’s no evidence he even bought a ticket). An FBI recording of a conversation between Rayyan and Bride ... shows how the FBI used Rayyan’s suicidal thoughts to manipulate him. After the phone call, FBI agents searched Rayyan’s home and business, [and] found no trace of the assault rifle [he had mentioned to Bride]. Rayyan appears to have made up the story entirely to impress Bride.
Note: Click the link above and listen to how this FBI mole posing as a potential lover convinces a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
Two senior intelligence analysts at U.S. Central Command say the military has forced them out of their jobs because of their skeptical reporting on U.S.-backed rebel groups in Syria. It’s the first known instance of possible reprisals against CENTCOM personnel after analysts accused their bosses of manipulating intelligence reports about the U.S.-led campaign against ISIS in order to paint a rosier picture of progress in the war. One of the analysts alleging reprisals is the top analyst in charge of Syria issues at CENTCOM. He and a colleague doubted rebels’ capabilities and their commitment to U.S. objectives in the region. [Their] views put them at odds with military brass, who last year had predicted that a so-called moderate opposition would make up a 15,000-man ground force to take on ISIS. An initial $500 million program to train and arm those fighters failed spectacularly. And until the very end, Pentagon leaders claimed the operation was more or less on track. The Pentagon inspector general and a congressional task force are investigating allegations of doctored intelligence reports about ISIS. More than 50 CENTCOM analysts have said that senior officials gave more scrutiny and pushback on reports that suggested U.S. efforts to destroy ISIS weren’t progressing. The Defense Department inspector general is also looking into ... "whether there was any falsification, distortion, delay, suppression, or improper modification of intelligence information.”
Note: Explore powerful evidence that ISIS is aided and was possibly even created by covert US support. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
Khalil Abu Rayyank was a lonely young man in Detroit, eager to find a wife. Jannah Bride claimed she was a 19-year-old Sunni Muslim whose husband was killed in an airstrike in Syria. The two struck up a romantic connection ... online. Now, Rayyan, a 21-year-old Michigan man, is accused by federal prosecutors of supporting the Islamic State. Jannah Bride, not a real name, was in fact an FBI informant hired to communicate with Rayyan. The FBI and federal prosecutors have treated his case as a national security concern, making numerous references in court filings and at a detention hearing to statements Rayyan made about the Islamic State and his supposed aspirations for violence. According to transcripts ... Rayyan had fallen in love with Bride and had even proposed marriage. The FBI informant initiated conversations about violence on several occasions, and when she did, Rayyan would tell her that he didn’t want to hurt anyone. Eventually, Rayyan found a way to capture the woman’s interest, describing his plans for an attack. The story appears to be fantasy, however. Psychologist ... Lyle D. Danuloff assessed Rayyan’s level of dangerousness as “very low,” according to a report filed Tuesday. Danuloff wrote: “His verbalization was the result of an effort to keep the attention with hopes of a future. They were not the result of radicalization or representative of terrorist intentions.”
Note: If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success? Read an essay from Timothy Silver's profound book Lifting the Veil that suggests the "War on Terror" is a fraud.
The Obama administration on Thursday announced new rules that will let the NSA share vast amounts of private data gathered without warrant, court orders or congressional authorization with 16 other agencies, including the FBI, the Drug Enforcement Agency, and the Department of Homeland Security. The new rules allow ... those agencies to sift through raw data collected under a broad, Reagan-era executive order that gives the NSA virtually unlimited authority to intercept communications abroad. Previously, NSA analysts would filter out information they deemed irrelevant and mask the names of innocent Americans before passing it along. The last-minute adoption of the procedures is one of many examples of the Obama administration making new executive powers established by the Bush administration permanent, on the assumption that the executive branch could be trusted to police itself. Executive Order 12333 ... serves as authorization for the NSA’s most massive surveillance programs. In 2014, a former state department official described NSA surveillance under 12333 as a “universe of collection and storage” beyond what Congress has authorized. This massive database inevitably includes vast amount of American’s communications — swept up when they speak to people abroad, when they go abroad themselves, or even if their domestic communications are simply routed abroad. That’s why access was previously limited to data that had already been screened to remove unrelated information and information identifying U.S. persons.
Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss this provocative article by Glenn Greenwald and this interview he gave to Fox News. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The Wall Street Journal reported yesterday that the NSA under President Obama targeted Israeli Prime Minister Benjamin Netanyahu and his top aides for surveillance. In the process, the agency ended up eavesdropping on ... U.S. lawmakers and American-Jewish groups. People who spent many years cheering for and defending ... programs of mass surveillance are suddenly indignant now that they know the eavesdropping included them. Long-time GOP chairman of the House Intelligence Committee and unyielding NSA defender Pete Hoekstra last night was truly indignant: "WSJ report that NSA spied on Congress and Israel communications very disturbing. Actually outrageous. Maybe unprecedented abuse of power ... NSA and Obama officials need to be investigated and prosecuted. NSA loses all credibility. Scary." This pattern - whereby political officials who are vehement supporters of the Surveillance State transform overnight into crusading privacy advocates once they learn that they themselves have been spied on - is one that has repeated itself over and over. So now, with yesterday’s WSJ report, we witness the tawdry spectacle of large numbers of people who for years were fine with, responsible for, and even giddy about NSA mass surveillance suddenly objecting. Overnight, privacy is of the highest value because now it’s their privacy, rather than just yours, that is invaded.
Note: Read the full Wall Street Journal article on how the US government is secretly spying on Israeli leaders and more. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Months after the Obama administration declared combat operations over in Afghanistan, the CIA continues to run a shadow war in the eastern part of the country, overseeing an Afghan proxy called the Khost Protection Force [KPF], according to local officials, former commanders of that militia and Western advisers. The highly secretive paramilitary unit has been implicated in civilian killings, torture, questionable detentions, arbitrary arrests and use of excessive force in controversial night raids. In several attacks, witnesses described hearing English being spoken by armed men who had interpreters with them, suggesting American operatives were present during assaults where extreme force was used. Afghan government officials acknowledge that the KPF has killed civilians and committed other abuses. In Khost, the KPF is more influential than the Afghan army and police, and is unaccountable to the provincial government. The CIA [directs] the KPF’s operations, paying fighters’ salaries, and training and equipping them. The CIA is not bound by the Bilateral Security Agreement between Afghanistan and Washington that, among other rules, limits the ability of U.S. military forces to enter Afghan homes. The KPF was one of several large paramilitary forces created by the CIA in the months after the Taliban was ousted following the 9/11 attacks.
Note: Read a fascinating article titled "Does the Pentagon Want Nuclear War Against Russia?" Key leaders in both the CIA and Pentagon seem to want war at all costs, particularly as war fills their coffers and those of their big business buddies. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.
In 2009, not long after his historic election and seven years after the first U.S. drone strike, President Barack Obama accepted the Nobel Peace Prize. Since then, however, deadly U.S. drone strikes have increased sharply, as have doubts about the program’s reliability and effectiveness. The latest criticism comes from Drone, a new documentary about the CIA’s covert drone war. To help promote the film and inveigh against the agency’s drone program ... four former operators - Stephen Lewis, Michael Haas, Cian Westmoreland and Brandon Bryant - appeared at a press conference. Speaking out can lead to veiled threats and prosecution. Which is why for years Bryant was the only drone veteran who openly rebuked the drone war. But his persistence and his appearance in the film, the other three say, inspired them to come forward. On multiple occasions, the men say they complained to their superiors about their concerns to no avail. Drone strikes kill far more civilians than the government admits. These deaths, they argue, wind up helping militant groups recruit new members and hurt the U.S.’s long-term security. By distancing soldiers from the battlefield, the operators suggest the people carrying out strikes may become even more desensitized to killing than their counterparts on the front lines. On some occasions, Haas says operators referred to children as “fun-sized terrorists” or “TITS,” terrorists in training.
Note: A human rights attorney has stated the four former Air Force drone operators-turned-whistleblowers mentioned above have had their credit cards and bank accounts frozen. How many more have not spoken out against these abuses for fear of retaliation like this? Read more about the major failings of US drone attacks. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
It’s a wretched yet predictable ritual after each new terrorist attack: Certain politicians and government officials waste no time exploiting the tragedy for their own ends. The remarks on Monday by John Brennan, the director of the Central Intelligence Agency, took that to a new and disgraceful low ... after coordinated terrorist attacks in Paris killed 129. Mr. Brennan complained about ... the sustained national outrage following the 2013 revelations by Edward Snowden, a former National Security Agency contractor, that the agency was using provisions of the Patriot Act to secretly collect information on millions of Americans’ phone records. It is hard to believe anything Mr. Brennan says. Last year, he bluntly denied that the C.I.A. had illegally hacked into the computers of Senate staff members conducting an investigation into the agency’s detention and torture programs when, in fact, it did. In 2011 ... he claimed that American drone strikes had not killed any civilians, despite clear evidence that they had. And his boss, James Clapper Jr., the director of national intelligence, has admitted lying to the Senate on the N.S.A.’s bulk collection of data. Even putting this lack of credibility aside, it’s not clear what extra powers Mr. Brennan is seeking. Most of the men who carried out the Paris attacks were already on the radar of intelligence officials in France and Belgium, where several of the attackers lived. The problem in this case was not a lack of data. In fact, indiscriminate bulk data sweeps have not been useful.
Note: The above is an excellent article by the New York Times editorial board. Yet the role of the largely subservient media, which strongly supported Bush's campaign to go to war in Iraq is ignored. Read this analysis to go even deeper. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
The U.S. closely monitored Israel’s military bases and eavesdropped on secret communications in 2012, fearing its longtime ally might try to carry out a strike on Fordow, Iran’s most heavily fortified nuclear facility. Nerves frayed at the White House after senior officials learned Israeli aircraft had flown in and out of Iran in what some believed was a dry run for a commando raid on the site. Worried that Israel might ignite a regional war, the White House sent a second aircraft carrier to the region and readied attack aircraft, a senior U.S. official said, “in case all hell broke loose.” The two countries, nursing a mutual distrust, each had something to hide. Instead of talking to each other, the allies kept their intentions secret. To figure out what they weren’t being told, they turned to their spy agencies to fill gaps. They employed deception, not only against Iran, but against each other. After working in concert for nearly a decade to keep Iran from an atomic bomb, the U.S. and Israel split over the best means: diplomacy, covert action or military strikes. In 2010, the risk of covert action became clear. A computer virus dubbed Stuxnet, deployed jointly by the U.S. and Israel to destroy Iranian centrifuges ... had inadvertently spread across the Internet. The Israelis wanted to launch cyberattacks against a range of Iranian institutions, according to U.S. officials. But the breach made Mr. Obama more cautious, officials said, for fear of triggering Iranian retaliation, or damaging the global economy if a virus spread uncontrollably.
Note: This article is also available at this link. When the Stuxnet computer virus got loose, it began attacking European companies. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Confidential files containing evidence of violations committed during El Salvador’s civil war have been stolen from a Washington-based human rights group days after it launched legal proceedings against the CIA over classified files on a former US-backed military commander implicated in massacres, death squads and forced disappearances. A computer and hard drive containing testimonies from survivors were stolen from the office of the director of the University of Washington Center for Human Rights (UWCHR) last week. The director’s office was the only one raided, there were no signs of forced entry, and items of monetary value were left behind. The stolen files contained details of investigations related to the 1980-1992 civil war, which left at least 75,000 people dead, 8,000 missing and a million displaced. The vast majority of crimes were committed by US-backed military dictatorships against civilians ... suspected of supporting the leftist guerrillas, according to the UN. Perpetrators were granted immunity from prosecution by a 1993 amnesty law, which remains intact despite being ruled illegal by the Inter American Court of Human Rights. The UWCHR has uncovered previously unseen information held by federal agencies such as the CIA and DEA, which it has shared with relatives of victims. The group filed a freedom of information suit against the CIA on 2 October. The sensitive files were stolen two weeks later. Several rights groups in El Salvador investigating war crimes have suffered similarly suspicious robberies.
Note: Several military human rights abusers in El Salvador were trained by the US Army's School of the Americas, along with over 500 known human rights abusers.
A French secret service diver who took part in the operation to sink Greenpeace ship the Rainbow Warrior 30 years ago has spoken publicly for the first time to apologise for his actions. Jean-Luc Kister ... was one of two divers serving with the French intelligence service, the Direction générale de la sécurité extérieure (DGSE), who attached limpet mines to the hull of the vessel moored in Auckland in 1985. The Rainbow Warrior was heading for the Mururoa Atoll in the South Pacific in French Polynesia where France was planning a series of nuclear tests. French agents posing as Swiss tourists had earlier visited the ship ... to gather information for the operation. The first mine ... blew a large hole in the ship. Paris initially denied any involvement in the sinking, [which killed photographer Fernando Pereira], and described it as a “terrorist attack”. Documents released in 2005 and published in the Guardian, showed that France [also] tried to blame British intelligence for the sinking. The French government’s responsibility, however, was quickly established. In 1987, under international pressure, France paid $8.2m damages to Greenpeace. It also paid an undisclosed sum to the Pereira family. Kister claims politicians in Paris turned down other suggestions for dealing with the Greenpeace protest. He said it was “an unfair clandestine operation conducted in an allied, friendly and peaceful country” ... and accused French politicians of “high treason” for having leaked his name and role in the operation after the sinking.
Note: By posing as Swiss tourists to spy on the Greenpeace ship, attacking this ship, and then blaming the attack on "terrorists", the French carried out a "false flag" attack. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T. The N.S.A.’s top-secret budget in 2013 for the AT&T partnership was more than twice that of the next-largest such program, [and] the company installed surveillance equipment in at least 17 of its Internet hubs on American soil, far more than its similarly sized competitor, Verizon. After the terrorist attacks of Sept. 11, 2001, AT&T ... began turning over emails and phone calls “within days” after the warrantless surveillance began in October 2001. In 2011, AT&T began handing over 1.1 billion domestic cellphone calling records a day to the N.S.A. after “a push to get this flow operational prior to the 10th anniversary of 9/11,” according to an internal agency newsletter. In a 2006 lawsuit, a retired AT&T technician named Mark Klein claimed that ... he had seen a secret room in a company building in San Francisco where the N.S.A. had installed equipment. Mr. Klein claimed that AT&T was providing the N.S.A. with access to Internet traffic that AT&T transmits for other telecom companies. Such cooperative arrangements, known in the industry as “peering,” mean that communications from customers of other companies could end up on AT&T’s network.
Note: The story of Klein's lawsuit was initially suppressed by the NSA and major media including the L.A. Times. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
Retired Army Gen. Mike Flynn, a top intelligence official in the post-9/11 wars in Iraq and Afghanistan, says in a forthcoming interview ... that the drone war is creating more terrorists than it is killing. He also asserts that the U.S. invasion of Iraq helped create the Islamic State. Flynn, who in 2014 was forced out as head of the Defense Intelligence Agency, has in recent months become an outspoken critic of the Obama administrations Middle East strategy. The former three star general ... describes the present approach of drone warfare as a failed strategy. What we have is this continued investment in conflict, the retired general says. The more weapons we give, the more bombs we drop, that just fuels the conflict. In 2010, [Flynn] published a controversial report on intelligence operations in Afghanistan, stating in part that the military could not answer fundamental questions about the country and its people despite nearly a decade of engagement there. Earlier this year, Flynn commended the Senate Intelligence Committee report on CIA torture saying that torture had eroded American values and that in time, the U.S. will look back on it, and it wont be a pretty picture.
Note: Drone strikes almost always miss their intended targets. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing news articles about military corruption.
An investigation by the German parliament is raising questions on whether the Obama administration not only spied on journalists in that country, but also interfered in the exercise of the free press. On Thursday, Germany's intelligence coordinator, Günter Heiss, testified before a parliamentary investigative committee of the German parliament, the Bundestag, focused on the activities of the U.S. National Security Agency's spying on Germany and whether the German intelligence agency BND had any knowledge of it. In 2013, the German magazine Der Spiegel ... first reported that the NSA was intercepting German Chancellor Angela Merkel's cell phone communications. On Thursday, WikiLeaks released more information, presumably from that surveillance, from a conversation between Merkel and her personal assistant in October 2011. The WikiLeaks release also suggested that the NSA was spying on German ministers in addition to Merkel. Less observed this week was news that the NSA was eavesdropping not only on Merkel, but also in some capacity on Germany's free press, specifically Der Spiegel. "It feels bitter to learn that American intelligence agencies spied on reporters in another country and denounced alleged sources to the government," said one reporter involved, who asked not to be identified for fear of repercussions from his government or the U.S. government. "This is something I expected to happen in authoritarian states like Russia or China, but not in a democracy."
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
[One spy unit is] responsible for some of the United Kingdom's most controversial tactics of surveillance, online propaganda and deceit. Documents ... demonstrate how the Joint Threat Research Intelligence Group (JTRIG), a unit of the signals intelligence agency Government Communications Headquarters (GCHQ), is involved in efforts against political groups it considers "extremist". Though its existence was secret until last year, JTRIG quickly developed a distinctive profile [after] Edward Snowden revealed that the unit had engaged in "dirty tricks" like deploying sexual "honey traps" designed to discredit targets, launching denial-of-service attacks to shut down Internet chat rooms, pushing veiled propaganda onto social networks and generally warping discourse online. Particularly revealing is a fascinating 42-page document from 2011 detailing JTRIG's activities. The document lays out the tactics the agency uses to manipulate public opinion, its scientific and psychological research into how human thinking and behavior can be influenced. Many GCHQ documents describing the "missions" of the "customers" for which it works make clear that the agency has a wide mandate far beyond national security, including providing help on intelligence to the Bank of England, ... to various departments on agriculture and whaling activities, to government financial divisions to enable good investment decisions. Beyond JTRIG's targeting of Anonymous, other parts of GCHQ targeted political activists deemed to be "radical," even monitoring the visits of people to the WikiLeaks website. [The document] includes detailed discussions of how to foster "obedience" and "conformity".
Note: Read amazing excerpts of this report at the link above showing how JTRIG plays an active role on the Internet in directly manipulating many political discussions and websites. For more along these lines, see concise summaries of deeply revealing news articles on corruption in intelligence agencies from reliable major media sources.
The Obama administration is again allowing the CIA to use drone strikes to secretly kill people that the spy agency does not know the identities of in multiple countries - despite repeated statements to the contrary. Apparently the drone operators didn't even know at the time who they were aiming at - only that they thought the target was possibly a terrorist hideout. It's what's known as a "signature" strike. Signature strikes has led to scores of civilians being killed over the past decade, including two completely innocent hostages ... one of whom was a US citizen ... less than two months ago. It's a way of killing that's been roundly condemned by human rights organizations and that some members of Congress have tried to outlaw. Here's how the New York Times described it: "The joke was that when the CIA sees "three guys doing jumping jacks," the agency thinks it is a terrorist training camp, said one senior official. Men loading a truck with fertilizer could be bombmakers – but they might also be farmers." It has become increasingly clear that the "rules" are virtually meaningless. As is typical with the US government's extrajudicial killing policy, there was no public debate about any of the changes to the supposed rules, or even announcement that they ever changed - only an unofficial leak to a journalist after the latest killing. Beyond the enormous human rights consequences related to such a dangerous policy, these types of strikes backfire on the United States, sowing hatred in the populations of bombed countries and breeding sympathy for al-Qaida where there was none before.
Note: For more along these lines, see concise summaries of deeply revealing news articles on terrorism from reliable major media sources. Then explore the excellent, reliable resources provided in our War Information Center.
Two years ago, the first story based on the Snowden archive was published in The Guardian, revealing a program of domestic mass surveillance, which, at least in its original form, ended this week. To commemorate that anniversary, Edward Snowden himself reflected in a New York Times op-ed on the “power of an informed public”. The debate provoked by these disclosures [examined] the role journalism ought to play in a democracy and the proper relationship of journalists to those who wield the greatest political and economic power. Of all the revelations over the last two years, one of the most illuminating and stunning has been the reaction of many in the American media to Edward Snowden as a source. There was plenty of journalistic support for the disclosures. But huge numbers of journalists went on the warpath against transparency. The Los Angeles Times ... believes leaking is criminal and those who do it belong in prison. The LA Times itself constantly publishes illegal leaks, though the ones it publishes usually come from top government officials. Have the LA Times editors called for the criminal prosecution of Leon Panetta, and John Brennan, and the endless number of senior officials who leak not (as Snowden did) to inform the public but in order to propagandize them? Of course not, and therein lies the key media lesson from all of this. These journalists are literally agents of political power.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
On Monday the trial in London of a Swedish man, Bherlin Gildo, accused of terrorism in Syria, collapsed after it became clear British intelligence had been arming the same rebel groups the defendant was charged with supporting. The prosecution abandoned the case, apparently to avoid embarrassing the intelligence services. Reports were cited that MI6 had cooperated with the CIA on a “rat line” of arms transfers from Libyan stockpiles to the Syrian rebels in 2012 after the fall of the Gaddafi regime. Terrorism is now squarely in the eye of the beholder. A revealing light on how we got here has now been shone by a recently declassified secret US intelligence report, written in August 2012, which uncannily predicts – and effectively welcomes – the prospect of a “Salafist principality” in eastern Syria and an al-Qaida-controlled Islamic state in Syria and Iraq. In stark contrast to western claims at the time, the Defense Intelligence Agency document identifies al-Qaida in Iraq (which became Isis) and fellow Salafists as the “major forces driving the insurgency in Syria” – and states that “western countries, the Gulf states and Turkey” were supporting the opposition’s efforts to take control of eastern Syria. A year into the Syrian rebellion, the US and its allies weren’t only supporting and arming ... extreme sectarian groups; they were prepared to countenance the creation of some sort of “Islamic state” – despite the “grave danger” to Iraq’s unity – as a Sunni buffer to weaken Syria.
Note: An article in The Atlantic reveals that the US Congress takes a very strange stance on ISIS. Read more excellent information on the covert origins of ISIS in this revealing essay.
Last summer ... I spent three days in Moscow hanging out with Edward Snowden for a Wired cover story. He told me that what finally drove him to leave his country and become a whistleblower was his conviction that the National Security Agency was conducting illegal surveillance on every American. Thursday, the Second Circuit Court of Appeals in New York ... ruled that the NSA program that secretly intercepts the telephone metadata of every American — who calls whom and when — was illegal. It’s now up to Congress to vote on whether or not to modify the law ... by June 1, when they need to reauthorize the Patriot Act. A PEW survey in March revealed that 52 percent of the public is now concerned about government surveillance, while 46 percent is not. There is now a sort of acceptance of highly intrusive surveillance as the new normal, [while] the American public [remains] unaware of many of the agency’s long list of abuses. It is little wonder that only slightly more than half the public is concerned. For that reason, I agree with Frederick A. O. Schwartz Jr., the former chief counsel of the Church Committee, which conducted a yearlong probe into intelligence abuses in the mid-1970s, that we need a similarly thorough ... investigation today. “Now it is time for a new committee to examine our secret government closely again,” he wrote in a recent Nation magazine article, “particularly for its actions in the post-9/11 period.”
Note: The author of this excellent article is James Bamford, the former ABC News producer who broke the story on Operation Northwoods and has written landmark books on the NSA. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the erosion of privacy rights from reliable major media sources.
Edward Snowden’s most famous leak has just been vindicated. Since June 2013, when he revealed that the telephone calls of Americans are being logged en masse, his critics have charged that he took it upon himself to expose a lawful secret. They insisted that Congress authorized the phone dragnet when it passed the U.S.A. Patriot Act. A panel of judges on the Second Circuit Court of Appeals ruled last week that the program Snowden exposed was never legal. The Patriot Act does not authorize it, contrary to the claims of George W. Bush, Barack Obama, Michael Hayden, Keith Alexander, and James Clapper. “Statutes to which the government points have never been interpreted to authorize anything approaching the breadth of the sweeping surveillance at issue here,” Judge Gerard E. Lynch declared. Consider what this means. For many years, the executive branch carried out a hugely consequential policy change that the legislature never approved. Tens of millions of innocent U.S. citizens were thus subject to invasions of privacy that no law authorized. Officials classified the program as a state secret, keeping it out of Article III courts. By doing so, they prevented the judiciary from reviewing the statutory legitimacy of NSA surveillance, subverting a core check in our system of government. The consequence: An illegal program persisted for years. This is a perfect illustration of why secret government programs are an abomination in our democracy.
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the erosion of privacy rights from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.