Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
The combined cost of the “war on terror” comes to an estimated $1.6 trillion. A lot of former senior government officials who played important roles in this debacle have done quite well for themselves. [Former CIA director George Tenet] missed multiple signs of a major Al Qaeda attack directed against the United States [prior to 9/11] and approved the Bush administration’s torturing of terror suspects. He got the Presidential Medal of Freedom. He [also] received a $4 million advance to write a memoir. Tenet has received millions more in his current role as ... a board director and advisor to intelligence and military contractors. Louis Freeh, Tenet’s counterpart at the FBI during the run-up to 9/11 [also mishandled] “significant and urgent” intelligence of “serious operational planning” for terrorism attacks by Islamic radicals. Freeh resigned from the FBI two months before 9/11. In 2008, [a businessman named Nasser Kazeminy] was accused of bribing former Senator Norm Coleman, [and] hired Freeh to conduct a “thorough investigation” of the allegations against him in the hopes of clearing his name. In 2011, Freeh issued a public statement saying that his investigation had “completely vindicated” both Kazeminy and Coleman. Freeh also met with the Justice Department – which was investigating the bribery charges but declined to bring a case — on Kazeminy’s behalf. [Today, Freeh has a $3 million] Palm Beach penthouse. Freeh’s wife co-owns it with Kazeminy. The quit claim deed giving Freeh’s wife one-half ownership of the penthouse was signed nine days after Freeh’s vindication of Kazeminy.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in intelligence agencies and government.
President Obama [has thus far] failed to bring to justice anyone responsible for the ... official government [torture] program conceived and carried out in the years after the attacks of Sept. 11, 2001. He did allow his Justice Department to investigate the C.I.A.'s destruction of videotapes of torture sessions and those who may have gone beyond the torture techniques authorized by President George W. Bush. But the investigation did not lead to any charges being filed. The American Civil Liberties Union and Human Rights Watch are ... calling for appointment of a special prosecutor to investigate what appears increasingly to be “a vast criminal conspiracy, under color of law, to commit torture and other serious crimes.” The question everyone will want answered, of course, is: Who should be held accountable? Any credible investigation should include former Vice President Dick Cheney; Mr. Cheney’s chief of staff, David Addington; the former C.I.A. director George Tenet; and John Yoo and Jay Bybee, the Office of Legal Counsel lawyers who drafted what became known as the torture memos. There are many more names that could be considered. Because of the Senate’s report, we now know the distance officials in the executive branch went to rationalize, and conceal, the crimes they wanted to commit. The question is whether the nation will stand by and allow the perpetrators of torture to have perpetual immunity for their actions.
Note: Some have called for prosecuting those responsible as violators of international rules against human experimentation. For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices and widespread government corruption.
Hardly a week goes by without a new report of some massive data theft that has put financial information, trade secrets or government records into the hands of computer hackers. The best defense against these attacks is clear: strong data encryption and more secure technology systems. U.S. intelligence agencies hold a different view. James Comey, the FBI director, is lobbying Congress to require that electronics manufacturers create intentional security holes — so-called back doors — that would enable the government to [easily] access data on every American's cellphone and computer. Building a back door into every cellphone, tablet, or laptop means deliberately creating weaknesses that hackers and foreign governments can exploit. What these officials are proposing would be bad for personal data security and bad for business. Built-in back doors have ... disastrous results. The U.S. House of Representatives recognized how dangerous this idea was and in June approved [an] amendment [to] prohibit the government from mandating that technology companies build security weaknesses into any of their products. I introduced legislation in the Senate to accomplish the same goal. Advances in technology always pose a new challenge to law enforcement agencies. But curtailing innovation on data security is no solution, and certainly won't restore public trust in tech companies or government agencies.
Note: Ron Wyden, a member of the Senate Intelligence Committee, wrote the article summarized above. The NSA routinely creates and exploits security holes in commercial encryption software and devices to spy on people, and shares the personal data it obtains with the CIA, FBI, IRS, and others through the DEA's Special Operations Division. What exactly is the FBI director asking congress for now?
One quiet consequence of this week’s sensational release of the Senate Intelligence Committee’s report on the C.I.A. detention program was a telephone call that a human rights lawyer, Meg Satterthwaite, placed to a client in Yemen, Mohamed Bashmilah. For eight years since Mr. Bashmilah, 46, was released from C.I.A. custody, Ms. Satterthwaite ... had been trying without success to get the United States government to acknowledge that it had held him in secret prisons for 19 months and to explain why. In the phone call on Wednesday, she told him that the Senate report listed him as one of 26 prisoners who, based on C.I.A. documents, had been “wrongfully detained.” After learning the news, Mr. Bashmilah pressed Ms. Satterthwaite, who heads the global justice program at New York University Law School, to tell him what might follow from the Senate’s recognition. Would there be an apology? Would there be some kind of compensation? Among the others mistakenly held for periods of months or years, according to the report, were an “intellectually challenged” man held by the C.I.A. solely to pressure a family member to provide information; two people who were former C.I.A. informants; and two brothers who were falsely linked to Al Qaeda. Ms. Satterthwaite was not able to answer Mr. Bashmilah’s question about an apology or reparation. No apology was forthcoming from the C.I.A., which declined to comment on specific cases.
Note: An ACLU lawsuit filed on behalf of Mr. Bashmilah and others flown to prisons on C.I.A. aircraft was dismissed on the grounds that it might expose state secrets. For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
The UN and human rights groups have called for the prosecution of US officials involved in what a Senate report called the "brutal" CIA interrogation of al-Qaeda suspects. UN Special Rapporteur on Human Rights and Counter-Terrorism Ben Emmerson said that senior officials from the administration of George W Bush who planned and sanctioned crimes must be prosecuted, as well as CIA and US government officials responsible for torture. "As a matter of international law, the US is legally obliged to bring those responsible to justice," Mr Emmerson said in a statement made from Geneva. Correspondents say that the chances of prosecuting members of the Bush administration are unlikely. Several countries suspected to have hosted [CIA torture] sites reacted strongly to the publication. Poland's former president [Aleksander Kwasniewski] has publicly acknowledged for the first time [that] his country hosted a secret CIA prison. Lithuanian Prime Minister Algirdas Butkevicius called on the US to say whether CIA used his country to interrogate prisoners. Afghanistan's President Ashraf Ghani called the report "shocking", saying the actions "violated all accepted norms of human rights in the world".
Note: Read revealing excerpts from this most disturbing report. For more, read how the CIA teamed up with the UK's MI6 to kidnap people and deliver them to be tortured at a Libyan site in 2004. Could this US program have happened without strong international support?
Months before the operation that killed Osama bin Laden in 2011, the Central Intelligence Agency secretly prepared a public-relations plan that would stress that information gathered from its disputed interrogation program had played a critical role in the hunt. Starting the day after the raid, agency officials in classified briefings made that point to Congress. But in page after page of previously classified evidence, the Senate Intelligence Committee report on C.I.A. torture, released Tuesday, rejects the notion that torturing detainees contributed to finding Bin Laden. The crucial breakthrough in the hunt was the identification of ... Abu Ahmed al-Kuwaiti. The United States had started wiretapping a phone number associated with Mr. Kuwaiti by late 2001. It was in 2004 that the C.I.A. came to realize that it should focus on finding Mr. Kuwaiti as part of the hunt for Bin Laden. [A man named] Hassan Ghul, who had been captured in Iraqi Kurdistan ... provided “the most accurate” intelligence that the agency produced about Mr. Kuwaiti’s role and ties to Bin Laden. Mr. Ghul provided all the important information about [Mr. Kuwaiti] before he was subjected to any torture techniques. During that [initial] two-day period in January 2004, “He opened up right away and was cooperative from the outset.” Nevertheless, the C.I.A. then decided to torture Mr. Ghul. During and after that treatment, he provided “no actionable threat information.”
Note: Read revealing excerpts from this most disturbing report.
The FBI confirmed Tuesday it faked an Associated Press story to catch a bomb threat suspect in 2007. Police in Lacey, near Olympia, sought the FBI's help as repeated bomb threats prompted a week of evacuations at Timberline High School in June 2007. The agency obtained a warrant from a federal magistrate judge to send a "communication" to a social media account ... which contained a software tool that could verify Internet addresses, (and) turned out to be a link to a phony AP story about the bomb threats posted on a Web page created by the FBI. The 15-year-old suspect clicked on the link, revealing his computer's location. The FBI did not initially respond to AP's request earlier Tuesday for further detail about the fake story, beyond saying the ruse was necessary. AP spokesman Paul Colford said Tuesday the FBI's "ploy violated AP's name and undermined AP's credibility." "We are extremely concerned and find it unacceptable that the FBI misappropriated the name of The Associated Press and published a false story attributed to AP." Kathy Best, editor of The Seattle Times, said in a statement that, "The FBI, in placing the name of The Associated Press on a phony story sent to a criminal suspect, crossed a line and undermined the credibility of journalists everywhere — including at The Times." The documents revealing the deception were publicized Monday on Twitter by Christopher Soghoian, the principal technologist for the American Civil Liberties Union.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
The director of the FBI savaged tech companies for their recent embrace of end-to-end encryption and suggested rewriting laws to ensure law enforcement access to customer data in a speech on Thursday. James Comey said data encryption such as that employed on Apple’s latest mobile operating system would deprive police and intelligence companies. Privacy advocates contend Comey is demagoguing the issue. It took a June supreme court ruling, they point out, for law enforcement to abandon its contention that it did not require warrants at all to search through smartphones or tablets, and add that technological vulnerabilities can be exploited by hackers and foreign intelligence agencies as well as the US government. Tech companies contend that their newfound adoption of encryption is a response to overarching government surveillance, much of which occurs ... without a warrant, subject to a warrant broad enough to cover indiscriminate data collection, or under a gag order following a non-judicial subpoena. Comey did not mention such subpoenas, often in the form of National Security Letters, in his remarks. Comey acknowledged that the Snowden disclosures caused “justifiable surprise” among the public about the breadth of government surveillance, but hoped to mitigate it through greater transparency and advocacy. Yet the FBI keeps significant aspects of its surveillance reach hidden even from government oversight bodies. Intelligence officials said in a June letter to a US senator that the FBI does not tally how often it searches through NSA’s vast hoards of international communications, without warrants, for Americans’ identifying information. Comey frequently described himself as being technologically unprepared to offer specific solutions, and said he meant to begin a conversation, even at the risk of putting American tech companies at a competitive disadvantage.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
The FBI is facing questions over its role in a 2011 hacking attack on Rupert Murdoch’s Sun newspaper in the UK after the publication of chat logs showed that a man acting as an agency informant played a substantial role in the operation. The attack was so successful that the publisher took down the websites of the Sun and the Times while technicians worked out the scale of the hack. Unsealed documents ... seen by the Guardian, show Hector Xavier Monsegur – known widely online as “Sabu” and frequently referred to as the leader of Lulzsec – played an active role in the operation. The chat records show Monsegur encouraging others to break further into News International systems, claiming to have sources at the Sun, and even apparently helping to break staff’s passwords and to source files for stealing. Monsegur was, however, at that time operating under the direction of the FBI. The close involvement of an FBI asset working under extraordinarily close supervision in a hacking attack on a media outlet ultimately owned by a US-listed company is set to raise further questions about the agency’s approach to tackling online crime. The logs also show Sabu on multiple occasions offering detailed technical help to find additional records on different servers, breaking in to new servers, or obtaining more files – which could easily have included those belonging to journalists at either the Sun or Times. The Sun, which is challenging the UK government over police accessing the phone records of one of its reporters, declined to comment on the apparent FBI involvement in attacks on its servers.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources. For an in-depth look at how these practices have been shown to interfere with a free press, see these excellent, reliable Mass Media Resources.
[National security letters], the reach of which was expanded under the Patriot Act in 2001, let the FBI get business records from telephone, banking, and Internet companies with just a declaration that the information is relevant to a counterterrorism investigation. The FBI can get such information with a subpoena or another method with some judicial oversight. Can the government make demands for data entirely in secret? That was the question yesterday before a federal appeals court in San Francisco, where government lawyers argued that National Security Letters — FBI requests for information that are so secret they can’t be publicly acknowledged by the recipients — were essential to counterterrorism investigations. One of the judges seemed to question why there was no end-date on the gag orders, and why the burden was on the recipients of NSLs to challenge them. “It leaves it to the poor person who is subject to those requirements to just constantly petition the government to get rid of it,” said the judge, N. Randy Smith. The FBI sends out thousands of NSLs each year – 21,000 in fiscal year 2012. Google, Yahoo, Facebook and Microsoft filed a brief in support of the NSL challenge, arguing that they want to “publish more detailed aggregate statistics about the volume, scope and type of NSLs that the government uses to demand information about their users.” Twitter also announced this week that it was suing the U.S. government over restrictions on how it can talk about surveillance orders. Tech companies can currently make public information about the number of NSLs or Foreign Intelligence Surveillance Court orders they receive in broad ranges, but Twitter wants to be more specific.
Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
As part of their insurgency against the Sandinista government in Nicaragua, some of the C.I.A.-backed contras made money through drug smuggling, transgressions noted in a little-noticed 1988 Senate subcommittee report. Gary Webb, a journalist at The San Jose Mercury News, thought it was a far-fetched story to begin with, but in 1995 and 1996, he dug in and produced a deeply reported and deeply flawed three-part series called Dark Alliance. That groundbreaking series was among the first to blow up on the nascent web, and he was initially celebrated, then investigated and finally discredited. Pushed out of journalism in disgrace, he committed suicide in 2004. [The movie] Kill the Messenger ... suggests that he told a truth others were unwilling to. Mr. Webb was not the first journalist to come across [such matters]. In December 1985, The Associated Press reported that three contra groups had engaged in cocaine trafficking, in part to help finance their war against Nicaragua. Major news outlets mostly gave the issue a pass. Peter Landesman, an investigative journalist who wrote the screenplay, was struck by the reflex to go after Mr. Webb. Planeloads of weapons were sent south from the U.S., and everyone knows that those planes didnt come back empty, but the C.I.A. made sure that they never knew for sure what was in those planes, he said. But instead of going after that, they went after Webb." In 1998, Frederick P. Hitz, the C.I.A. inspector general, testified before the House Intelligence Committee that after looking into the matter at length, he believed the C.I.A. was a bystander or worse in the war on drugs. However dark or extensive, the alliance Mr. Webb wrote about was a real one.
Note: Webb's story was not deeply flawed, as reported in this article. His editor even commented that four Washington Post writers could not find one significant factual error, but then changed his mind after CIA leaders threatened the paper. Read a Sacrament Bee newspaper article for more on Webb and his story. For more along these lines, see the excellent, reliable resources provided in our Mass Media Information Center.
Australia has changed radically since last week though it might not look like it on the surface. Late Thursday night the Senate passed the National Security Amendment Bill (No.1) 2014 giving unlimited power to spies and secret police. Now officials can break the law with immunity from prosecution - and without having to answer to a court. They can act in total secrecy. They will decide what they do and to whom and when. They do not have to ask permission. They will choose when to interfere in your life and when they won't. They can dip into your most private communications and they don't need a warrant to do so. Sometimes they will do it because it is necessary to fight crime. Sometimes because they enjoy it. If they mess up your life and you tell anybody, you will get 10 years' jail – even if it doesn't harm security. When a Special Intelligence Operation (SIO) is declared then any participant can break the law on you with no consequences, according to Schedule 3 section 35k. There are broad limits. They cannot kill or torture you, or cause significant physical injury. Minor injury or mental torment is fine. Anyone involved in an SIO will have these powers – but who are they? ASIO, with 1778 staff. The Australian Federal Police, with more than 6900 staff. NSW Police with about 16,370 officers and a spy database called COPS which has more than 30 million entries on the people of NSW. But not just them. Anyone involved in an SIO enjoys legal immunity, including affiliates and subcontractors – whoever they are. Many Senators clearly hadn't read the 128 pages of major legal changes in the NSA Bill. The citizen needs protection from the state built into the laws and that is what they smashed on Thursday.
Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
A massive, $7.2 billion Army intelligence contract signed just 10 days ago underscores the central role to be played by the National Security Agency and its army of private contractors in the unfolding air war being carried out by the United States and its Gulf States allies against the Islamic State in Iraq and Syria. INSCOM’s “global intelligence support” contract will place the contractors at the center of this fight. Under its terms, 21 companies, led by Booz Allen Hamilton, BAE Systems, Lockheed Martin and Northrop Grumman, will compete over the next five years to provide “fully integrated intelligence, security and information operations” in Afghanistan and “future contingency operations” around the world. INSCOM announced the global intelligence contract two days after President Obama, in a speech to the nation, essentially declared war on ISIS in Iraq and Syria and outlined a campaign of airstrikes and combat actions to “degrade and ultimately destroy” the terrorist group. The top contractors on the INSCOM contract are already involved in the war. Lockheed Martin, for example, makes the Hellfire missiles that are used extensively in U.S. drone strikes. Northrop Grumman makes the Global Hawk surveillance drone. Both companies have large intelligence units. 70 percent of the U.S. intelligence budget is spent on private contractors. This spending [is] estimated at around $70 billion a year. [There is a] revolving door between INSCOM and its contractors. The system is corrupted by the close relationships between the companies and their agencies, said [Tom] Drake, who as a whistle-blower was nearly sent to prison for exposing the waste, fraud and abuse in a contracted program at the NSA that ended up losing over $7 billion.
Note: Read a powerful essay written by a top US general showing how he was fooled into supporting wars that were generated by the powerful global elite who want never-ending war in order to keep their profits flowing.
The United States has conducted an escalating campaign of deadly airstrikes against the extremists of the Islamic State. But that appears to have done little to tamp down the conspiracy theories still circulating from the streets of Baghdad to the highest levels of Iraqi government that the CIA is secretly behind the same extremists that it is now attacking. “We know about who made Daesh,” said Bahaa al-Araji, a deputy prime minister, using an Arabic shorthand for the Islamic State ... at a demonstration called by the Shiite cleric Moktada al-Sadr. Mr. Sadr publicly blamed the CIA for creating the Islamic State in a speech last week, and interviews suggested that most of the few thousand people at the demonstration, including dozens of members of Parliament, subscribed to the same theory. The prevalence of the theory in the streets underscored the deep suspicions of the American military’s return to Iraq more than a decade after its invasion, in 2003. The casual endorsement by a senior official, though, was also a pointed reminder that the new Iraqi government may be an awkward partner for the American-led campaign to drive out the extremists.
Note: A carefully researched report on the covert origins of ISIS suggests the creation of terrorists is useful for Washington's elite. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
The rise of ISIS has been aided by the failure of the US government to investigate the connection between the Saudi Arabian government and jihadist networks, said former senator Bob Graham. Senator Graham, who chaired the Senate Intelligence Committee, said that successive administrations had failed to examine the connections between the Saudis and Sunni militant groups. "I believe that the failure to shine a full light on Saudi actions ... has contributed to the Saudi ability to continue to engage in actions that are damaging to the US – and in particular their support for ISIS," he said. The Saudis have been accused of using Sunni militant groups as proxies, channeling money to Islamist groups battling the forces of president Bashar al-Assad in the Syrian civil war, as Sunni and Shia battle for hegemony in the Middle East. The Shia Iranians are chief backers of Assad, and Nouri al Maliki's Shia-dominated government which collapsed following ISIS' onslaught in Iraq, accused the Saudi Arabia and Qatar of funding ISIS, and facilitating "genocide". [Graham] said that Saudi Arabia gives support to the "the most extremist elements among the Sunni". Al-Qaida leader Osama bin Laden was the son of a wealthy construction magnate, who had close ties to the Saudi royal family. It is alleged that redacted pages of the [Joint Congressional 9/11 inquiry] report establish links between Saudi government officials and al-Qaida.
Note: Watch the highly illuminating BBC documentary "Power of Nightmares" that reveals that al-Qaida, under the control of Osama bin Laden, has never actually existed, but is a US/UK-government psychological operation to launch the "Global War on Terror". For more on this, read Prof. David Ray Griffin's deeply revealing book Osama bin Laden: Dead or Alive?
The rise of the Islamic State of Iraq and the Levant (Isis) has been aided by the continuing failure of the US Government to investigate the role of Saudi Arabia in the 9/11 attacks and its support of jihadi movements such as al-Qaeda in the years since, says former Senator Bob Graham, the co-chairman of the official inquiry into 9/11. Senator Graham, who chaired the Senate Intelligence Committee, said that successive administrations in Washington had turned a blind eye to Saudi support for Sunni extremists. He added: “I believe that the failure to shine a full light on Saudi actions and particularly its involvement in 9/11 has contributed to the Saudi ability to continue to engage in actions that are damaging to the US – and in particular their support for Isis.” Senator Graham does not suggest that the Saudis are directly running Isis, but that their support for Sunni extremists in Iraq and Syria opened the door to jihadis including Isis. Similar points were made by Sir Richard Dearlove, the former head of the British Secret Intelligence Service, and MI6, who said ... that rulers of the Kingdom tended to oppose jihadis at home as enemies of the House of Saud, but promote them abroad in the interests of Saudi foreign policy. The US and other Western governments have yet to explain why their “war on terror” has so demonstrably failed with the rise of Isis, but tolerance of Saudi complicity in 9/11 will surely be part of the answer.
Note: Explore solid, verifiable evidence that rogue elements in the US government may have been involved in the creation of Isis. By 2009, US officials were aware that Saudi Arabia was funding ISIS. Saudi officials have long spent lavishly on charming American policymakers and journalists. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
A prominent national security reporter for the Los Angeles Times routinely submitted drafts and detailed summaries of his stories to CIA press handlers prior to publication, according to documents obtained by The Intercept. Email exchanges between CIA public affairs officers and Ken Dilanian, now an Associated Press intelligence reporter who previously covered the CIA for the Times, show that Dilanian enjoyed a closely collaborative relationship with the agency, explicitly promising positive news coverage and sometimes sending the press office entire story drafts for review prior to publication. In at least one instance, the CIA’s reaction appears to have led to significant changes in the story that was eventually published in the Times. Dilanian’s emails were included in hundreds of pages of documents that the CIA turned over in response to two FOIA requests seeking records on the agency’s interactions with reporters. They include email exchanges with reporters for the Associated Press, Washington Post, New York Times, Wall Street Journal, and other outlets. In addition to Dilanian’s deferential relationship with the CIA’s press handlers, the documents show that the agency regularly invites journalists to its McLean, Va., headquarters for briefings and other events.
Note: For more on this, see concise summaries of deeply revealing major media corruption news articles from reliable major media sources.
America has raged against the appalling behavior of the local police in Ferguson, Missouri, and for good reason: automatic rifles pointed at protesters, tank-like armored trucks blocking marches, the teargassing and arresting of reporters, tactics unfit even for war zones. [But ire] should also be focused on the federal government agency that has enabled the rise of military police, and so much more: the Department of Homeland Security (DHS). The 240,000-employee [agency] has been the primary arms dealer for out-of-control local cops in Ferguson and beyond, handing out tens of billions of dollars in grants for military equipment in the last decade with little to no oversight. Police can act like paramilitary forces to combat the most mundane crimes without much worry of the consequences. But the problem with DHS is much larger than just combat gear: Homeland Security is also transferring tens or hundreds of millions of dollars in high-tech spying technology to local police through a sprawling backroom operation surveilling your neighborhood, much of which may be unconstitutional. DHS has its own fleet of Predator drones roaming the US border and far beyond, which it has loaned out to police over 500 times. Homeland Security is also handing out millions of dollars to local police to “accelerate and facilitate the adoption” of smaller drones that police can fly themselves. Cops claim they want these “middleman” drones for “emergencies,” but ... documents show they’ll end up using them for “crowd control” and “intelligence gathering”.
Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."
Note: Read the cover story from Wired magazine with a deep inside report on Snowden.
The New York Times announced on [August 7] that it will use the word torture to describe the United States' controversial interrogation tactics on terror suspects. "From now on, The Times will use the word “torture” to describe incidents in which we know for sure that interrogators inflicted pain on a prisoner in an effort to get information," said Times executive editor Dean Baquet. In the past, the Times had been sharply criticized for not using the word torture. Instead, [it] had referred to torture as "brutal interrogation," or similar epithets. The Times is hardly the only major media outlet to avoid using the word "torture." Reuters referred to the tactics as "brutal interrogation methods" and the AP has called them "enhanced interrogation techniques." The media have been accused of following along with President Bush's denial that the U.S. does not use torture. Banquet [says] that "while the methods set off a national debate, the Justice Department insisted that the techniques did not rise to the legal definition of 'torture.'” Baquet said that reporters and editors had debated the issue in wake of the Senate Intelligence Committee's torture report, which has yet to be released. Last week, President Obama admitted that the CIA "tortured some folks" in post-9/11 anti-terror efforts.
Note: For more on this, see concise summaries of deeply revealing media cover-ups news articles from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.