Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
The CIA has released hundreds of declassified documents detailing investigations into possible alien life. The Central Intelligence Agency posted documents of reported Unidentified Flying Objects that range in date from the late 1940s to the 1950s. While playing off the hype of the TV show reboot "The X-Files," the CIA broke down the cases into two categories, whether you side with Agent Mulder or Agent Scully. For believers in alien life ... one case you can choose to investigate is the case of a flying saucer in Germany in 1952. An eyewitness told investigators that an object "resembling a huge flying pan" landed in a forest clearing in the Soviet zone of Germany in 1952. The eyewitness said once he was closer to the area where it landed, he saw two men dressed in shiny metallic clothing. Spooked by the eyewitness ... the mysterious men jumped into the large flying pan object and it spun out into the sky. "The whole object then began to rise slowly from the ground and rotate like a top," the eyewitness told the CIA. The man told a judge he thought he was dreaming but said there was a circular imprint on the ground where the object had landed. If that case intrigues you, there are four more listed on the CIA blog post. But if you are more of a skeptic like Scully, and believe there is a simple explanation for flying saucer sightings, then the documents from the scientific advisory panel on UFOs in 1953 will help you prove your case.
Note: Explore these intriguing 'X-Files' on the CIA website at this link. For more along these lines, see concise summaries of deeply revealing UFO cover-up and disclosure news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our UFO Information Center.
U.S. intelligence agencies recently fought off a move by Congress to require the CIA and other spy services to disclose more details about high-ranking employees who have been promoted or fired. Under a provision drafted by the Senate Intelligence Committee this year, intelligence agencies would have been required to regularly provide names of those being promoted to top positions and disclose any “significant and credible information to suggest that the individual is unfit or unqualified.” But that language faced intense opposition from Director of National Intelligence James R. Clapper Jr.. As a result, the wording was watered down by Congress this month and now requires Clapper only to furnish “information the Director determines appropriate.” U.S. spy chiefs chafed at the idea of subjecting their top officials to such congressional scrutiny and went so far as to warn that candidates for certain jobs would probably withdraw. Former CIA director Michael Hayden said he [opposed the provision] “for simply being too invasive.”
Note: As a vocal advocate of intrusive spying, former CIA director Michael Hayden's claim that congressional oversight of spy agency personnel could be "too invasive" is ironic. The unaccountable US intelligence agencies were recently called a "secret government" in the Boston Globe. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
On a snowy afternoon in February 2004, an FBI agent came to Nick Merrill’s door, bearing a letter that would change his life. At the time, Merrill was running a small internet service provider. The envelope that the agent carried contained what is known as a “national security letter”, or NSL. It demanded details on one of his company’s clients; including cellphone tower location data, email details and screen-names. It also imposed a non-disclosure agreement which was only lifted this week, when – after an 11-year legal battle by Merrill and the American Civil Liberties Union, he was finally allowed to reveal the contents of the letter to the world. The NSL which Merrill was given was a new use for what was a relatively old tool. The FBI had long – if sparingly – used them, [but] the Patriot Act vastly expanded the scope of what an NSL could be applied to. The FBI greatly increased the number issued; according to a 2007 inspector general’s report, the NSL that Merrill was handed by the agent was one of nearly 57,000 issued that year. All of those thousands of NSLs were accompanied by a non-disclosure agreement, or “gag order” – which barred recipients were ever disclosing that they had received an NSL – even to the person whose records were being sought. With the ACLU, Merrill went to court to challenge the constitutionality of the letter, especially of the gag order. In 2014, Merrill sued again, helped by ... the Yale Law Clinic. Finally, [a] judge ... ruled that the gag order be completely lifted. It had taken Merrill almost 12 years.
Note: A 2007 Washington Post article summary sheds more light on Merrill's long struggle.
The Federal Bureau of Investigation has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individual’s complete web browsing history and records of all online purchases, a court filing released Monday shows. The documents are believed to be the first time the government has provided details of its so-called national security letters, which are used by the FBI to conduct electronic surveillance without the need for court approval. National security letters have been available as a law enforcement tool since the 1970s, but their frequency and breadth expanded dramatically under the USA Patriot Act, which was passed shortly after the Sept. 11, 2001 attacks. They are almost always accompanied by an open-ended gag order barring companies from disclosing the contents of the demand for customer data. The secretive orders have long drawn the ire of tech companies and privacy advocates, who argue NSLs allow the government to snoop on user content without appropriate judicial oversight. Last year, the Obama administration announced it would permit Internet companies to disclose more about the number of NSLs they receive. But they can still only provide a range such as between 0 and 999 requests. Twitter has sued in federal court seeking the ability to publish more details in its semi-annual transparency reports. Several thousand NSLs are now issued by the FBI every year. At one point that number eclipsed 50,000 letters annually.
Note: Read more about the FBI's use of these controversial secret letters. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
David Talbot despises Allen Dulles. As director of the CIA, Talbot declares, Dulles exemplified the “frightening amorality that prevailed at the pinnacle of American power” at the height of the Cold War. As a lawyer for Sullivan and Cromwell in the 1930s, Dulles protected and promoted Nazi-controlled cartels. He used his influence in the Office of Strategic Services and the CIA to shield former Nazis from prosecution for war crimes in the ’40s and ’50s. Dulles organized the disastrous Bay of Pigs invasion of Cuba, [and was] willing to manipulate and undercut American presidents. In “The Devil’s Chessboard,” David Talbot, the founder and former editor in chief of Salon and former senior editor at Mother Jones, examines Dulles’ career and adds several more “achievements” to his dark resume. Talbot’s indictment is long. He suggests that had President Franklin D. Roosevelt lived, Dulles might well have faced criminal charges for hiding the U.S. assets of German corporations and destroying incriminating evidence. By 1963, Talbot insists, a clear consensus had emerged among corporate leaders “and within America’s deep state” that Kennedy was a threat to national security and had to be removed. Dulles, they concluded, “was the only man with the stature, connections, and decisive will to make something of this enormity happen." [Dulles] then lobbied Lyndon Johnson to appoint him to the Warren Commission, where he saw to it that Lee Harvey Oswald would take the fall as the “lone gunman.”
Note: Read another good article on Talbot's book revealing evidence in the JFK killing. And isn't it interesting that no other major media seemed to find this book worth a review, even though Talbot is well known as the founder of the website Salon.
General Augusto Pinochet directly ordered the 1976 assassination of a Chilean diplomat who was killed in a car bomb in Washington DC, according top secret US intelligence documents declassified by the Obama administration. The documents ... also show that the former dictator was so concerned with covering up his role in the murder that he planned to assassinate his own head of intelligence, General Manuel Contreras. Orlando Letelier, a former defence and foreign minister under President Salvador Allende, was tortured and incarcerated after Pinochet’s 1973 coup. He later fled to the US and worked at the Institute of Policy Studies in Washington DC. Letelier, who had once been Chile’s ambassador to the US, was murdered on 21 September 1976 by a car bomb planted under the driver’s seat of his vehicle just a mile from the White House. Ronni Moffitt, an American colleague, was also killed in the blast. Letelier’s son, Senator Juan Pablo Letelier, confirmed to the Guardian that he had received copies of the newly released documents, which ... include papers from the CIA. Speculation that the CIA was aware of the plot to kill Letelier is based on previously declassified records showing that Manuel Contreras was paid by the CIA before the bombing and was in regular contact with top officials at the spy agency. Contreras, who died in August, always denied responsibility and blamed the CIA for the bombing.
Note: Members of Pinochet's brutal regime were strongly supported by Washington until very recently. George H.W. Bush was head of the CIA when the assassination described above was carried out. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption.
Five years ago this week, FBI agents raided the homes of six political activists of the Freedom Road Socialist Organization (FRSO) in Minnesota, Illinois and Wisconsin, as well as the office of the nonprofit Anti-War Committee. A series of FBI documents left behind at Mick Kelly’s Minneapolis home shed more light on the FBI’s activities. What is especially illuminating is the mindset the documents reveal, particularly some of the questions FBI agents were instructed to ask those being served with the search warrants, such as “What did you do with the proceeds from the Revolutionary Lemonade Stand?” In February 2014, as a result of further legal action ... the search warrants for the raids [were] unsealed. The FBI began surveilling the FRSO shortly after the protests at the 2008 GOP convention, using a confidential informant. Despite the FBI’s collection of over a hundred hours of recordings and its multiyear [investigation], to date none of the activists have been charged with any crime. Just four days prior to the FBI raids against the Anti-War Committee and the FRSO, the Department of Justice Inspector General [IG] released the results of an investigation into post-9/11 surveillance of peace groups and other domestic dissidents up through 2006, [which] found that the bureau “engaged in tactics and strategies toward those groups and their members that were inappropriate, misleading and in some cases counterproductive, [and] accused FBI witnesses of ... offering ‘incomplete and inconsistent accounts of events.’”
Note: By 2011, the legal definition of "supporter of terrorism" had come to include peaceful activists, authors, academics and journalists. For more along these lines, read about Cointelpro, the program used by corrupt intelligence agencies to spy on and attack U.S. activists beginning in the 1960's.
It was the spring of 2002. Pakistani authorities burst into the house [Emad Hassan] shared with 14 other foreign students and brought them to a nearby prison. After two months of beatings and interrogation, the Pakistanis handed him over to the U.S. military. They stripped him of his clothes and put him in a diaper. Then they blindfolded him, placed earmuffs over his head and marched him onto a plane. When the aircraft landed, he soon learned he was in the U.S. prison at Guantánamo Bay, Cuba. For years, the White House has been trying to close Gitmo. As of early September, 52 of the 116 prisoners who remain at the U.S. facility have been cleared to be set free, a tacit admission, critics say, that they should never have been imprisoned. The Pakistani forces who took Hassan from his student housing, his lawyers say, received $5,000 from the U.S. military. This was typical. According to a 2006 analysis ... the vast majority of detainees at Guantánamo Bay were arrested by local groups eager to profit from the counterterrorism gold rush. His lawyers claim much of the U.S. government’s incriminating information comes from a small group of informants at Guantánamo who told interrogators what they wanted to hear. Many sold out their fellow detainees for small rewards. [In 2009] Obama’s task force cleared Hassan for release - a process that requires six federal agencies to agree that a prisoner doesn’t pose a national security threat.
Note: In 2015, Hassan was freed from Gitmo and granted asylum by Oman. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
Hamid Karzai, the former president of Afghanistan, has questioned the existence of al-Qaida, and denied that the 9/11 terror attacks ... were planned in Afghanistan. On the eve of the anniversary of the 2001 attacks, Karzai, who left office last year after 12 years, used an interview with al Jazeera to express his doubt that the terrorist group led by the late Osama bin Laden was responsible for the operation which prompted the invasion of Afghanistan. Karzai ... also claimed in the interview that Islamic State fighters in Afghanistan are “definitely” members of “Pakistani militias”. When asked if he agreed that al-Qaida in Afghanistan had been behind the 9/11 attacks ... Karzai replied: “I can tell you for a fact that the operation was neither conducted from Afghanistan, nor were the Afghan people responsible for that.” A daring and bloody operation involving US special forces and the CIA put Karzai back in Afghanistan in the last weeks of the 2001 war and then into power as a supposed consensus candidate. But Karzai quickly proved himself independent and contrarian. Officials from the US, the UK, Nato and the UN all repeatedly criticised Karzai for failing to crack down on rampant corruption and the booming narcotics trade in Afghanistan. By 2009, according to Robert Gates, the former US defence secretary, Washington was so keen to oust the Afghan president that officials connived in delaying an Afghan presidential election and then tried to manipulate the outcome in a “clumsy and failed putsch”.
Note: By 2000, the Taliban had mostly stopped heroin production in Afghanistan. But once former Unocal employee Hamid Karzai was installed into power by the US, bags of CIA cash helped transform Afghanistan into a narco state.
A new book, The WikiLeaks Files: The World According to U.S. Empire ... explains how the leaked U.S. documents have lifted the veil on the imperialist nature of American foreign policy. At the time of writing, WikiLeaks has published 2,325,961 diplomatic cables and other US State Department records. To randomly pick up isolated diplomatic records that intersect with known entities and disputes, as some daily newspapers have done, is to miss “the empire” for its cables. Diplomatic cables are not produced in order to manipulate the public, but are aimed at elements of the rest of the US state apparatus and are therefore relatively free from the distorting influence of public relations. When WikiLeaks publishes US government documents with classification markings ... two parallel campaigns begin: first, the public campaign of downplaying, diverting attention from and reframing any revelations that are a threat to the prestige of the national security class; and, second, an internal campaign within the national security state itself to digest what has happened. Publicly, the US government has claimed, falsely, that anyone without a security clearance distributing “classified” documents is violating the Espionage Act of 1917. The response of the United States to the release of the WikiLeaks materials betrays a belief that its power resides in a disparity of information: ever more knowledge for the empire, ever less for its subjects.
Note: Wikileaks has published everything from suspicious messages about 9/11 to cables showing US diplomats working directly for companies such as Monsanto to drafts of secret trade deals that big banks use to grow their power. PFC Manning is currently serving a 35 year prison sentence for leaking the data analysed in the book mentioned above.
The Obama administration has ruled that inspectors general have to get permission from the agency they’re monitoring for access to wiretaps, grand jury and credit information, a decision that immediately was denounced by watchdogs and lawmakers. The Justice Department’s inspector general said the 58-page ruling ... will undermine his ability to do his job rooting out fraud and corruption. “Without such access, our office’s ability to conduct its work will be significantly impaired,” Inspector General Michael E. Horowitz said in a statement. His disapproval was followed by a bipartisan condemnation from four congressional leaders whose committees have oversight over DOJ. [In] 2010 ... the FBI started restricting the DOJ inspector general’s access to documents whose confidentiality is protected by law, including grand jury testimony and wiretaps. The IG’s review of the controversial Fast and Furious case, the failed sting operation that lost track of more than 1,000 government-issued guns, one of which was used to kill a U.S. Border Patrol agent, was delayed. Other investigations have lagged, Horowitz testified before Congress last February, complaining that the FBI has failed to turn over key records in several whistleblower cases. “Imagine if we had a DOJ (inspector general) during Watergate looking at the FBI’s conduct and the Attorney General had this opinion to deny or delay access to this kind of information,” said Brian Miller, the former inspector general at the General Services Administration.
Note: Last year, President Obama invoked executive privilege in an attempt to cover up the Fast and Furious scandal. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The Department of Homeland Security has been monitoring the Black Lives Matter movement since anti-police protests erupted in Ferguson, Missouri last summer, according to hundreds of documents obtained by The Intercept through a Freedom of Information Act request. The reports confirm social media surveillance of the protest movement and ostensibly related events in the cities of Ferguson, Baltimore, Washington, DC, and New York. The tracking of domestic protest groups and peaceful gatherings raises questions over whether DHS ... has allowed its mission to creep beyond the bounds of useful security activities as its annual budget has grown beyond $60 billion. In an email to The Intercept, DHS spokesman S.Y. Lee wrote: “The DHS National Operations Center statutory authority ... is limited to providing situational awareness." Baher Azmy, a legal director at the Center for Constitutional Rights, however, argues that, “What they call situational awareness is Orwellian speak for watching and intimidation. Some of the documents show that the DHS has produced minute-by-minute reports on protesters’ movements in demonstrations. Surveillance of [an] April 29th protest, which the bulletin explicitly refers to as a “First Amendment-protected event,” raises questions about the potentially compromised state of protesters’ civil liberties — a worry that also surfaced after it was revealed in 2012 that the DHS was monitoring Occupy Wall Street.
Note: For more along these lines, read about Cointelpro, the program used by corrupt intelligence agencies to spy on and attack the U.S. civil rights movement beginning in the 1960's. For more, see concise summaries of deeply revealing news articles about the erosion of civil liberties.
The torture scandal consuming the US’s premiere professional association of psychologists has cost three senior officials their jobs. As the American Psychological Association copes with the damage reaped by an independent investigation that found it complicit in US torture, the group announced on Tuesday that its chief executive officer, its deputy CEO and its communications chief are no longer with the APA. All three were implicated in the 542-page report issued this month by former federal prosecutor David Hoffman, who concluded that APA leaders “colluded” with the US department of defense and aided the CIA in loosening professional ethics and other guidelines to permit psychologist participation in torture.. Despite rumors ... the APA framed the departures of longtime executive officials Norman Anderson and Michael Honaker as “retirements”. Rhea Farberman, who served as APA’s communications director for 22 years, “resigned”, the APA said in a statement. Anderson, Honaker and Farberman join Stephen Behnke, the APA’s former ethics chief also implicated in torture, in the first wave of APA departures as the organization seeks to rebuild its credibility. A call to end all psychologist participation in US interrogation and detention operations is slated for APA consideration at a major conference next month.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
The Oscar-winning documentary film-maker Laura Poitras is suing the US government. Poitras, 51, said she had been held at borders more than 50 times between 2006 and 2012, often for hours at a time. At various times she alleges being told by officials that she was on a “no fly” list, having her electronic equipment confiscated ... and being threatened with handcuffs for taking notes. The latter incident took place when she was working on a film about the WikiLeaks founder Julian Assange. Poitras [is] launching the legal action "because the government uses the US border to bypass the rule of law,” said the film-maker. She was repeatedly stopped until 2012, when the journalist Glenn Greenwald wrote an article about her experiences. Poitras’s reporting on the NSA whistleblower Edward Snowden, along with work by Greenwald, Ewen MacAskill and Barton Gellman contributed to the Pulitzer prize for public service won jointly by the Washington Post and the Guardian in 2014. Her film on Snowden, Citizenfour, won the 2015 Oscar for best documentary. The director is being represented by lawyers from digital-rights advocacy group the Electronic Frontier Foundation. “The well-documented difficulties Ms Poitras experienced while traveling strongly suggest that she was improperly targeted by federal agencies as a result of her journalistic activities,” senior counsel David Sobel told the Intercept. “Those agencies are now attempting to conceal information that would shed light on tactics that appear to have been illegal.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and attempts to manipulate mass media.
The Central Intelligence Agency’s health professionals repeatedly criticized the agency’s post-Sept. 11 interrogation program, but their protests were rebuffed by prominent outside psychologists who lent credibility to the program, according to a new report. The 542-page report ... raises repeated questions about the collaboration between psychologists and officials at both the C.I.A. and the Pentagon, [and] concludes that some of the [American Psychological] Association’s top officials ... sought to curry favor with Pentagon officials by seeking to keep the association’s ethics policies in line with the Defense Department’s interrogation policies. The association’s ethics office “prioritized the protection of psychologists — even those who might have engaged in unethical behavior — above the protection of the public,” the report said. Two former presidents of the psychological association were on a C.I.A. advisory committee, the report found. One of them gave the agency an opinion that sleep deprivation did not constitute torture, and later held a small ownership stake in a consulting company founded by two men who oversaw the agency’s interrogation program. The association’s ethics director, Stephen Behnke, coordinated the group’s public policy statements on interrogations with a top military psychologist, the report said, and then received a Pentagon contract to help train interrogators while he was working at the association, without the knowledge of the association’s board.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger. With security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds, encryption has emerged as a major issue in the debate over privacy rights. Technology companies ... have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data. The [technology group's] new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers. In the report, the group said any effort to give the government “exceptional access” to encrypted communications ... would leave confidential data and critical infrastructure like banks and the power grid at risk. With government agency breaches now the norm, the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corrupt intelligence agencies that erode privacy rights in the U.S. and elsewhere
Three days after the New York Times revealed that the U.S. government was secretly monitoring the calls and emails of people inside the United States without court-approved warrants, the National Security Agency issued a top-secret assessment of the damage done to intelligence efforts by the story. The conclusion: the information could lead terrorists to try to evade detection. Yet the agency gave no specific examples of investigations that had been jeopardized. The December 2005 bombshell story, by James Risen and Eric Lichtblau, set off a debate about the George W. Bush administration's expansion of spying powers after the 9/11 attacks, and also about the Times editors' decision to delay its publication for a year. White House officials had warned the Times that revealing the program would have grave consequences for national security. "To this day we've never seen any evidence – despite all the claims they made to keep us from publishing – that it did any tangible damage to national security, " Lichtblau told The Intercept. "The reality was that the story ... didn't tell terrorists anything that they didn't know," he said. The NSA's damage assessment on the article ... is among the files provided by former NSA contractor Edward Snowden. The memo recounts meetings in 2004 and 2005 in which administration officials disclosed "certain details of the special program to select individuals from the New York Times to dissuade them from publishing a story on the program at that time."
Note: You can read the revealing memo mentioned at the link above. For more along these lines, see concise summaries of deeply revealing news articles on civil liberties from reliable major media sources. Then explore the excellent, reliable resources provided in our Media Information Center.
Last week in the Boston area, a 26-year-old black Muslim man was shot and killed by agents of the FBI and Boston Police Department. A surveillance video ... was finally released on Monday. It’s virtually impossible to know what happened from this highly touted video, other than the fact that [Usaamah] Rahim appears to have been walking peacefully when he was approached by multiple individuals, wearing no police uniforms, in a threatening, military-style formation. Rahim’s family issued a statement detailing the numerous questions raised by the video. Early reports claimed that there was a third conspirator beyond Rahim and [his nephew and accused co-conspirator David] Wright. The FBI affidavit filed against Wright repeatedly references a “third person” who plotted with Rahim and Wright and met with them. Yet there has been no further mention of this “third person,” and apparently no arrest of him. Why not? Is that third person an FBI informant? Is this yet another case where the director and prime mover of a scary “terror plot” is in fact the FBI itself. What basis exists for the highly inflammatory claim that Rahim was “linked to” or “inspired by” ISIS? He was not only wary of being set up by the FBI, but specifically said he was “preaching AGAINST violence and terrorism.” As AP noted, on social media Rahim “spoke out against the kind of violence Islamic State extremists are fomenting across the Middle East,” and “made none of the violent calls to arms many supporters of armed extremist groups espouse on social media.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about the erosion of civil liberties and the manipulation of public perception.
The US Central Intelligence Agency used a wider array of sexual abuse and other forms of torture than was disclosed in a Senate report last year, according to a Guantánamo Bay detainee turned government cooperating witness. Majid Khan said interrogators poured ice water on his genitals, twice videotaped him naked and repeatedly touched his “private parts” – none of which was described in the Senate report. Khan’s is the first publicly released account from a high-value al-Qaida detainee who experienced [these] “enhanced interrogation techniques”. The 35-year-old Khan ... is awaiting sentencing after [confessing] to delivering $50,000 to al-Qaida operatives in Indonesia. Khan was captured in Pakistan and held at an unidentified CIA “black site” from 2003 to 2006, according to the Senate report. In the interviews with his lawyers, Khan described a carnival-like atmosphere of abuse when he arrived at the CIA detention facility. He said that he experienced excruciating pain when hung naked from poles and that guards repeatedly held his head under ice water. In a July 2003 session, Khan said, CIA guards hooded and hung him from a metal pole for several days and repeatedly poured ice water on his mouth, nose and genitals. When a doctor arrived to check his condition, Khan begged for help. Instead, Khan said, the doctor instructed the guards to again hang him from the metal bar. After hanging from the pole for 24 hours, Khan was forced to write a “confession” while being videotaped naked.
Note: For more, read about the 10 Craziest Things in the Senate Report on Torture and many other questionable intelligence agency practices.
The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals. The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia. The top-secret document, obtained from NSA whistleblower Edward Snowden ... outlines a series of tactics that the NSA and its counterparts in the Five Eyes were [using, which included] a method to hack and hijack phone users’ connections to app stores so that they would be able to send malicious “implants” to targeted devices. The implants could then be used to collect data from the phones without their users noticing. The agencies ... were also keen to find ways to hijack [app stores] as a way of sending “selective misinformation to the targets’ handsets” as part of so-called “effects” operations that are used to spread propaganda or confuse adversaries. Moreover, the agencies wanted to gain access to companies’ app store servers so they could secretly use them for “harvesting” information about phone users. The revelations are the latest to highlight tactics adopted by the Five Eyes agencies. Last year, The Intercept reported that the NSA ... was shown to have masqueraded as a Facebook server in order to hack into computers.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.