Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
The Central Intelligence Agency’s health professionals repeatedly criticized the agency’s post-Sept. 11 interrogation program, but their protests were rebuffed by prominent outside psychologists who lent credibility to the program, according to a new report. The 542-page report ... raises repeated questions about the collaboration between psychologists and officials at both the C.I.A. and the Pentagon, [and] concludes that some of the [American Psychological] Association’s top officials ... sought to curry favor with Pentagon officials by seeking to keep the association’s ethics policies in line with the Defense Department’s interrogation policies. The association’s ethics office “prioritized the protection of psychologists — even those who might have engaged in unethical behavior — above the protection of the public,” the report said. Two former presidents of the psychological association were on a C.I.A. advisory committee, the report found. One of them gave the agency an opinion that sleep deprivation did not constitute torture, and later held a small ownership stake in a consulting company founded by two men who oversaw the agency’s interrogation program. The association’s ethics director, Stephen Behnke, coordinated the group’s public policy statements on interrogations with a top military psychologist, the report said, and then received a Pentagon contract to help train interrogators while he was working at the association, without the knowledge of the association’s board.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger. With security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds, encryption has emerged as a major issue in the debate over privacy rights. Technology companies ... have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data. The [technology group's] new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers. In the report, the group said any effort to give the government “exceptional access” to encrypted communications ... would leave confidential data and critical infrastructure like banks and the power grid at risk. With government agency breaches now the norm, the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corrupt intelligence agencies that erode privacy rights in the U.S. and elsewhere
Three days after the New York Times revealed that the U.S. government was secretly monitoring the calls and emails of people inside the United States without court-approved warrants, the National Security Agency issued a top-secret assessment of the damage done to intelligence efforts by the story. The conclusion: the information could lead terrorists to try to evade detection. Yet the agency gave no specific examples of investigations that had been jeopardized. The December 2005 bombshell story, by James Risen and Eric Lichtblau, set off a debate about the George W. Bush administration's expansion of spying powers after the 9/11 attacks, and also about the Times editors' decision to delay its publication for a year. White House officials had warned the Times that revealing the program would have grave consequences for national security. "To this day we've never seen any evidence – despite all the claims they made to keep us from publishing – that it did any tangible damage to national security, " Lichtblau told The Intercept. "The reality was that the story ... didn't tell terrorists anything that they didn't know," he said. The NSA's damage assessment on the article ... is among the files provided by former NSA contractor Edward Snowden. The memo recounts meetings in 2004 and 2005 in which administration officials disclosed "certain details of the special program to select individuals from the New York Times to dissuade them from publishing a story on the program at that time."
Note: You can read the revealing memo mentioned at the link above. For more along these lines, see concise summaries of deeply revealing news articles on civil liberties from reliable major media sources. Then explore the excellent, reliable resources provided in our Media Information Center.
Last week in the Boston area, a 26-year-old black Muslim man was shot and killed by agents of the FBI and Boston Police Department. A surveillance video ... was finally released on Monday. It’s virtually impossible to know what happened from this highly touted video, other than the fact that [Usaamah] Rahim appears to have been walking peacefully when he was approached by multiple individuals, wearing no police uniforms, in a threatening, military-style formation. Rahim’s family issued a statement detailing the numerous questions raised by the video. Early reports claimed that there was a third conspirator beyond Rahim and [his nephew and accused co-conspirator David] Wright. The FBI affidavit filed against Wright repeatedly references a “third person” who plotted with Rahim and Wright and met with them. Yet there has been no further mention of this “third person,” and apparently no arrest of him. Why not? Is that third person an FBI informant? Is this yet another case where the director and prime mover of a scary “terror plot” is in fact the FBI itself. What basis exists for the highly inflammatory claim that Rahim was “linked to” or “inspired by” ISIS? He was not only wary of being set up by the FBI, but specifically said he was “preaching AGAINST violence and terrorism.” As AP noted, on social media Rahim “spoke out against the kind of violence Islamic State extremists are fomenting across the Middle East,” and “made none of the violent calls to arms many supporters of armed extremist groups espouse on social media.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about the erosion of civil liberties and the manipulation of public perception.
The US Central Intelligence Agency used a wider array of sexual abuse and other forms of torture than was disclosed in a Senate report last year, according to a Guantánamo Bay detainee turned government cooperating witness. Majid Khan said interrogators poured ice water on his genitals, twice videotaped him naked and repeatedly touched his “private parts” – none of which was described in the Senate report. Khan’s is the first publicly released account from a high-value al-Qaida detainee who experienced [these] “enhanced interrogation techniques”. The 35-year-old Khan ... is awaiting sentencing after [confessing] to delivering $50,000 to al-Qaida operatives in Indonesia. Khan was captured in Pakistan and held at an unidentified CIA “black site” from 2003 to 2006, according to the Senate report. In the interviews with his lawyers, Khan described a carnival-like atmosphere of abuse when he arrived at the CIA detention facility. He said that he experienced excruciating pain when hung naked from poles and that guards repeatedly held his head under ice water. In a July 2003 session, Khan said, CIA guards hooded and hung him from a metal pole for several days and repeatedly poured ice water on his mouth, nose and genitals. When a doctor arrived to check his condition, Khan begged for help. Instead, Khan said, the doctor instructed the guards to again hang him from the metal bar. After hanging from the pole for 24 hours, Khan was forced to write a “confession” while being videotaped naked.
Note: For more, read about the 10 Craziest Things in the Senate Report on Torture and many other questionable intelligence agency practices.
The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals. The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia. The top-secret document, obtained from NSA whistleblower Edward Snowden ... outlines a series of tactics that the NSA and its counterparts in the Five Eyes were [using, which included] a method to hack and hijack phone users’ connections to app stores so that they would be able to send malicious “implants” to targeted devices. The implants could then be used to collect data from the phones without their users noticing. The agencies ... were also keen to find ways to hijack [app stores] as a way of sending “selective misinformation to the targets’ handsets” as part of so-called “effects” operations that are used to spread propaganda or confuse adversaries. Moreover, the agencies wanted to gain access to companies’ app store servers so they could secretly use them for “harvesting” information about phone users. The revelations are the latest to highlight tactics adopted by the Five Eyes agencies. Last year, The Intercept reported that the NSA ... was shown to have masqueraded as a Facebook server in order to hack into computers.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
The FBI breached its own internal rules when it spied on campaigners against the Keystone XL pipeline, failing to get approval before it cultivated informants and opened files on individuals protesting against the construction of the pipeline in Texas. Internal agency documents show for the first time how FBI agents have been closely monitoring anti-Keystone activists, in violation of guidelines designed to prevent the agency from becoming unduly involved in sensitive political issues. The hugely contentious Keystone XL pipeline, which is awaiting approval from the Obama administration, would transport tar sands oil from Canada to the Texas Gulf coast. It has been strongly opposed for years by a coalition of environmental groups ... who have been monitored by federal law enforcement agencies. Mike German, a former FBI agent ... said [the documents] indicated the agency had opened a category of investigation that is known in agency parlance as an “assessment”. Introduced as part of an expansion of FBI powers after 9/11, assessments allow agents to open intrusive investigations into individuals or groups, even if they have no reason to believe they are breaking the law. German ... said the documents also raised questions over collusion between law enforcement and TransCanada. “These documents suggest the FBI interprets its national security mandate as protecting private industry from political criticism,” he said.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the erosion of civil liberties from reliable major media sources.
Four years after the death of Al Qaeda leader Osama bin Laden at the hands of US Navy Seals in Abottabad, Pakistan, a new report ... by journalist Seymour Hersh questions the Obama administration’s account of the killing of Osama bin Laden. The report claims that, among the lies, the biggest was the idea that the raid in May 2011 that killed bin Laden was an all-American event. "The most blatant lie was that Pakistan’s two most senior military leaders – General Ashfaq Parvez Kayani, chief of the army staff, and General Ahmed Shuja Pasha, director general of the ISI – were never informed of the US mission," the report says. The report also says that Pakistan’s Inter-Services Intelligence agency had been holding bin Laden as a prisoner since 2006, and that the US learned about the Al Qaeda leader’s location through a former senior Pakistani intelligence officer, who gave the information in return for the reward being offered by American officials. The White House has said bin Laden was found through tracking his couriers. Hersh’s primary US source for his story is "a retired senior intelligence official who was knowledgeable about the initial intelligence about bin Laden’s presence in Abbottabad." White House spokesman Josh Earnest ... dismissed the Hersh piece, saying it was "riddled with inaccuracies." Hersh, a longtime contributor to The New Yorker, is an award-winning journalist who has won numerous prizes for his investigative reporting, including the Pulitzer Prize.
Note: There are many big problems with the official story of the killing of bin Laden. For starters, read the review on the London Review of Books website. For more, see this ABC News article, this BBC article and this AP article.
The targets of the deadly drone strikes that killed two hostages and two suspected American members of al-Qaida were “al-Qaida compounds” rather than specific terrorist suspects, the White House disclosed on Thursday. The lack of specificity suggests that despite a much-publicized 2013 policy change by Barack Obama restricting drone killings by, among other things, requiring “near certainty that the terrorist target is present”, the US continues to launch lethal operations without the necessity of knowing who specifically it seeks to kill. Josh Earnest, the White House spokesman, acknowledged that the January deaths of hostages Warren Weinstein and Giovanni Lo Porto might prompt the tightening of targeting standards. Earnest [confirmed that] the two US civilians killed, longtime English-language propagandist Adam Gadahn and Ahmed Farouq of al-Qaida in the Indian subcontinent, were not “high-value targets” marked for death. In a May 2013 speech, Obama indicated that drone strikes were only permissible when the administration possessed “near certainty that no civilians will be killed or injured, the highest standard we can set”. Human-rights observers see little indication, two years after Obama’s speech, that the US meets its own stated standards. Reprieve, looking at US drone strikes in Yemen and Pakistan, concluded last year that the US killed nearly 1,150 people while targeting 41 individuals.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
It’s been over two years since President Obama promised new transparency and accountability rules when it comes to drone strikes. Virtually no progress has been made. The criteria for who gets added to the unaccountable ‘kill list’ is still shrouded in secrecy – even when the US government is targeting its own citizens. We know because a Texas-born man named Mohanad Mahmoud Al Farekh recently captured overseas was arraigned in federal court this week. It turns out, as the Times reported, that in 2013 “his government debated whether he should be killed by a drone strike in Pakistan.” The CIA and military were reportedly pushing hard to send drones to kill Al Farekh, but the Justice Department didn’t think there was enough evidence. An important new report released by the Open Society Justice Initiative this week also shows that - despite the Obama administration’s internal requirements for drone strikes that supposedly require a “near certainty” that civilians won’t get killed - the government quite often just disregards its own rules, which has led to the death of dozens of civilians in Yemen in the past two years. Though without Open Society’s study, the public would have no clue, since the Obama administration still steadfastly refuses to officially release any information on drone strikes in Yemen. The administration has said for years it prefers capturing to killing – but the data indicates that they practice the opposite.
Note: The CIA has been aware that drone strikes are ineffective since at least 2009. If drones help terrorists, almost always miss their intended targets, and may be used to target people in the US in the future, what are the real reasons for the US government's drone program?
Human rights campaigners have prepared a federal lawsuit aiming to permanently shut down the bulk collection of billions of US phone records – not, this time, by the National Security Agency, but by the Drug Enforcement Agency. The program ... served as a template for the NSA’s gigantic and ongoing bulk surveillance of US phone data after 9/11. The revelation of mass phone-records collection in the so-called “war on drugs” raises new questions about whether the Obama administration or its successors believe US security agencies continue to have legal leeway for warrantless bulk surveillance on American citizens. Starting in 1992, the so-called “USTO” effort operated without judicial approval, despite the US constitution’s warrant requirement. Attorney general Eric Holder ended USTO in September 2013 out of fear of scandal following Snowden’s disclosures. While Snowden did not expose USTO, several NSA programs he has exposed referenced the DEA as an NSA partner, giving the DEA another secret pathway to massive amounts of US communications records. The warrantless bulk records collection provides prosecutors the ability to enter into evidence incriminating material that could otherwise be thrown out of court, [and] has not stopped the upward growth of domestic narcotics consumption.
Note: In order to deny due process to people accused of crimes, the DEA's Special Operations Division constructs lies about the origins of data obtained from warrantless mass surveillance. Award-winning journalists have presented powerful evidence of direct DEA and CIA involvement in and support of drug running and drug cartels. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
In a war full of failures, the US counternarcotics mission in Afghanistan stands out: opiate production has climbed steadily over recent years to reach record-high levels last year. One clear winner in the anti-drug effort is ... the infamous mercenary company formerly known as Blackwater. Statistics released on Tuesday reveal that the rebranded private security firm, known since 2011 as Academi, reaped over a quarter billion dollars from the futile Defense Department push to eradicate Afghan narcotics, some 21% of the $1.5 bn in contracting money the Pentagon has devoted to the job since 2002. The company is the second biggest beneficiary of counternarcotics largesse in Afghanistan. Only the defense giant Northrop Grumman edged it out, with $325m. According to the US inspector general for Afghanistan reconstruction, the $309m Academi got from US taxpayers paid for training, equipment, and logistical support to Afghan forces conducting counternarcotics. Far from eradicating the deep-rooted opiate trade, US counternarcotics efforts have ... contributed to the opium boom. In December, the United Nations reported a 60% growth in Afghan land used for opium poppy cultivation since 2011, up to 209,000 hectares. The estimated $3bn value of Afghan heroin and morphine represents some 15% of Afghan GDP. Academi and its former Blackwater incarnation have an infamous history in Afghanistan. It once set up shell companies to disguise its business practices, according to a Senate report, so that its contracts would be unimpeded by company employees killings of Iraqi and Afghan civilians.
Note: Blackwater, now called Academi, got caught systematically defrauding the US government, while serving as a "virtual extension of the CIA". The CIA has been linked to the Afghan heroin trade for decades. In 2000, the Taliban had all but eradicated Afghan opium production. Once Afghanistan was under US control, opium production surged to record levels.
German Vice Chancellor Sigmar Gabriel said this week in Homburg that the U.S. government threatened to cease sharing intelligence with Germany if Berlin offered asylum to NSA whistleblower Edward Snowden or otherwise arranged for him to travel to that country. "They told us they would stop notifying us of plots and other intelligence matters," Gabriel said. The vice chancellor delivered a speech in which he praised the journalists who worked on the Snowden archive, and then lamented the fact that Snowden was forced to seek refuge in "Vladimir Putin's autocratic Russia" because no other nation was willing and able to protect him from threats of imprisonment by the U.S. government. [When pressed] as to why the German government could not and would not offer Snowden asylum - which, under international law, negates the asylee's status as a fugitive - [the vice chancellor said] that the U.S. government had aggressively threatened the Germans that if they did so, they would be "cut off" from all intelligence sharing. That would mean, if the threat were carried out, that the Americans would literally allow the German population to remain vulnerable to a brewing attack discovered by the Americans by withholding that information from their government.
Note: While treated as a dangerous criminal by US authorities, Edward Snowden has been called a hero in the UK's Guardian for exposing government corruption and intelligence agency lies.
When Yonas Fikre stepped off a luxury private jet at Portland airport last month, the only passenger on a $200,000 flight from Sweden, he braced for the worst. The 36-year-old Eritrean-born American was finally back in Portland at the end of a five-year odyssey that began with a simple business trip but landed him in an Arab prison where he alleges he was tortured at the behest of US anti-terrorism officials because he refused to become an informant at his mosque in Oregon. Fikre is suing the FBI, two of its agents and other American officials for allegedly putting him on the US’s no-fly list – a roster of suspected terrorists barred from taking commercial flights – to pressure him to collaborate. When that failed, the lawsuit said, the FBI had him arrested, interrogated and tortured for 106 days in the United Arab Emirates. As shocking as the claims are, they are not the first to emanate from worshippers at Fikre’s mosque in Portland, where at least nine members have been barred from flying by the US authorities. “The no-fly list gives the FBI an extrajudicial tool to coerce Muslims to become informants,” said Gadeir Abbas, a lawyer who represents other clients on the list. “There’s definitely a cluster of cases like this at the FBI’s Portland office. Fikre has not been charged with any terrorism related crimes or even questioned as a potential threat on his return to the US. He remains on the no-fly list.
Note: For more along these lines, see concise summaries of deeply revealing articles about questionable intelligence agency practices from reliable sources.
In the spring of 2010, Afghan officials struck a deal to free an Afghan diplomat held hostage by Al Qaeda. But the price was steep — $5 million. To come up with the money, [senior security officials] turned to a secret fund that the Central Intelligence Agency bankrolled with monthly cash deliveries to the presidential palace in Kabul, according to several Afghan officials. The Afghan government, they said, had already squirreled away about $1 million from that fund. Within weeks, that money ... was handed over to Al Qaeda, replenishing its coffers after a relentless C.I.A. campaign of drone strikes in Pakistan had decimated the militant network’s upper ranks. The C.I.A.’s contribution to Qaeda’s bottom line, though, was no well-laid trap. It was just another in a long list of examples of how the United States, largely because of poor oversight and loose financial controls, has sometimes inadvertently financed the very militants it is fighting. While refusing to pay ransoms for Americans kidnapped by Al Qaeda, the Taliban or, more recently, the Islamic State, the United States has spent hundreds of billions of dollars over the last decade at war in Iraq and Afghanistan, some of which has been siphoned off to enemy fighters. The C.I.A., meanwhile, continued dropping off bags of cash — ranging each time from a few hundred thousand dollars to more than $1 million — at the presidential palace every month until last year, when Mr. Karzai stepped down. The money was used to buy the loyalty of warlords, legislators and other prominent — and potentially troublesome — Afghans, helping the palace finance a vast patronage network that secured Mr. Karzai’s power base.
Note: A 2013 New York Times article called the US the "biggest source of corruption in Afghanistan" for its CIA bankrolling of Afghan warlords. Meanwhile, over a billion dollars of Iraqi "reconstruction" cash disappeared and was later tracked to a bunker in Lebanon. For more along these lines, see concise summaries of deeply revealing war corruption news articles from reliable major media sources.
A senior American climate scientist has spoken of the fear he experienced when US intelligence services apparently asked him about the possibility of weaponising the weather as a major report on geo-engineering is to be published this week. During a debate on the use of geo-engineering to combat climate change ... Prof Robock said: “I got a phone call from two men who said we work as consultants for the CIA and we'd like to know if some other country was controlling our climate, would we know about it? ”I told them, after thinking a little bit, that we probably would because if you put enough material in the atmosphere to reflect sunlight we would be able to detect it and see the equipment that was putting it up there. “At the same time I thought they were probably also interested in if we could control somebody else's climate, could they detect it?” Professor Robock, who has investigated the potential risks and benefits of using stratospheric particles to simulate the climate-changing effects of volcanic eruptions, said he felt “scared” when the approach was made. “I'd learned of lots of other things the CIA had done that haven't followed the rules and I thought that wasn't how I wanted my tax money spent. Professor Robock’s concerns come as a major report on geo-engineering is to be published this week by the US National Academy of Sciences. Among the report’s list of sponsors is the “US intelligence community." The professor alleges that ... the US government had a proven history of using the weather in a hostile way.
Note: The National Academy of Science's two-part report says that geoengineering technologies "present serious known and possible unknown environmental, social, and political risks, including the possibility of being deployed unilaterally." With a deeply corrupt scientific establishment being guided by corrupt intelligence agencies to meddle with the planet's total ecology, and with low public awareness about the messy history of mysterious atmospheric experiments over cities in the U.S. and elsewhere, what could possibly go wrong? For solid evidence the military has used the weather as a weapon, read about HAARP.
A still-classified section of the investigation by congressional intelligence committees into the Sept. 11, 2001, attacks has taken on an almost mythic quality over the past 13 years. Now new claims by Zacarias Moussaoui, a convicted former member of Al Qaeda, that he had high-level contact with officials of the Saudi government in the prelude to Sept. 11 have brought renewed attention to the inquiry’s withheld findings. Representative Stephen F. Lynch, Democrat of Massachusetts [has authored] a bipartisan resolution encouraging President Obama to declassify the section. Mr. Lynch and his allies have been joined by former Senator Bob Graham of Florida, who as chairman of the Senate Intelligence Committee was a leader of the inquiry. He has called for the release of the report’s [28 page] Part 4, which dealt with Saudi Arabia, since President George W. Bush ordered it classified when the rest of the report was released in December 2002. Mr. Graham has repeatedly said it shows that Saudi Arabia was complicit in the Sept. 11 attacks. “The 28 pages primarily relate to who financed 9/11, and they point a very strong finger at Saudi Arabia as being the principal financier,” Mr. Graham said last month as he pressed for the pages to be made public. Proponents of releasing Part 4, titled “Finding, Discussion and Narrative Regarding Certain National Security Matters,” have suggested that the Bush and Obama administrations have held it back for fear of alienating an influential military and economic partner rather than for any national security consideration.
Note: Several prominent current and former US politicians are working to expose the Saudi government money behind terrorism by declassifying this material. Moussaoui's new claims suggest that they are on the right track. For more along these lines, read concise summaries of deeply revealing 9/11 investigation news from reliable major media sources.
The outrageous legal attack on WikiLeaks and its staffers ... is an attack on freedom of the press itself. WikiLeaks has had their Twitter accounts secretly spied on, been forced to forfeit most of their funding after credit card companies unilaterally cut them off, had the FBI place an informant inside their news organization, watched their supporters hauled before a grand jury, and been the victim of the UK spy agency GCHQ hacking of their website and spying on their readers. Now we’ve learned that, as The Guardian reported on Sunday, the Justice Department got a warrant in 2012 to seize the contents – plus the metadata on emails received, sent, drafted and deleted – of three WikiLeaks’ staffers personal Gmail accounts. The tactics used against WikiLeaks by the Justice Department in their war on leaks [are] also used against mainstream news organizations. For example, after the Washington Post revealed in 2013 the Justice Department had gotten a warrant for the personal Gmail account of Fox News reporter James Rosen in 2010 without his knowledge. Despite the ongoing legal pressure, WikiLeaks has continued to publish important documents in the public interest.
Note: In recent years, Wikileaks' radical transparency has made draft texts of the Trans-Pacific Partnership public, and uncovered a secret CIA report that suggests the US government’s policy of assassinating foreign 'terrorists' does more harm than good. So who is the real problem here?
Libyan government papers pieced together by [a] team of London lawyers show [that] Tony Blair wrote to Colonel Muammar Gaddafi to thank him for the “excellent cooperation” between the two countries’ counter-terrorism agencies. The letter, written in 2007, followed a period in which the dictator’s intelligence officers were permitted to operate in the UK, approaching and intimidating Libyan refugees. Addressed “Dear Mu’ammar” and signed “Best wishes yours ever, Tony”, the letter was among hundreds of pages of documents recovered from Libyan government offices following the 2011 revolution. Six Libyan men, the widow of a seventh, and five British citizens of Libyan and Somali origin are bringing claims against the British government on the basis of the recovered documents, alleging false imprisonment, blackmail, misfeasance in public office and conspiracy to assault. The recovered documents show that MI5 and MI6 submitted more than 1,600 questions to be put to two opposition leaders after they had been kidnapped with British assistance and flown to one of Gaddafi’s prisons. Both men say they suffered appalling torture. On Thursday an attempt by government lawyers to have the case struck out without admitting liability failed when the high court ruled the allegations “are of real potential public concern” and should be heard and dealt with by the courts.
Note: British intelligence agencies have been trying to silence the lawyers filing this lawsuit, and got caught illegally spying on them. For more along these lines, see concise summaries of deeply revealing news articles about corruption in intelligence agencies and government.
Former CBS News correspondent Sharyl Attkisson has sued the Justice Department over the hacking of her computers, officially accusing the Obama administration of illegal surveillance while she was reporting on administration scandals. In a series of legal filings that seek $35 million in damages, Attkisson alleges that three separate computer forensic exams showed that hackers used sophisticated methods to surreptitiously monitor her work between 2011 and 2013. The intruders installed and periodically refreshed software to steal data and obtain passwords on her home and work computers. She also charges that the hackers monitored her audio using a Skype account. The award-winning reporter says she and her attorneys have "pretty good evidence" that these efforts were "connected" to the Justice Department. She said she was caught in a "Catch-22," forcing her to use the lawsuit and an administrative complaint to discover more about the surveillance through the discovery process and to learn the identities of the "John Does" named in the complaints. Attkisson learned through a Freedom of Information request that the FBI opened an investigation of the hacking case in May 2013, but says the bureau never interviewed her or even notified her of the probe. Attkisson resigned from CBS last March after complaining that she was increasingly unable to get her investigative stories on the air. She has published a best-selling book, "Stonewalled," about her battles against the network and the administration.
Note: Fox News was the only major media to cover this important case. Read a judge's supportive comments about this important case on Ms. Attkisson's website. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.