Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Cyber-threats are the new pretext to justify expansion of power and profit for the public-private National Security State. The Washington Post [reports] "a major expansion of [the Pentagon's] cybersecurity force over the next several years, increasing its size more than fivefold." Specifically, ... "the expansion would increase the Defense Department's Cyber Command by more than 4,000 people, up from the current 900." The Post describes this expansion as "part of an effort to turn an organization that has focused largely on defensive measures into the equivalent of an Internet-era fighting force." This Cyber Command Unit operates under the command of Gen. Keith Alexander, who also happens to be the head of the National Security Agency, the highly secretive government network that spies on the communications of foreign nationals - and American citizens. These activities pose a wide array of serious threats to internet freedom, privacy, and international law that, as usual, will be conducted with full-scale secrecy and with little to no oversight and accountability. And, as always, there is a small army of private-sector corporations who will benefit most from this expansion. The fear-mongering rhetoric from government officials has relentlessly intensified, all devoted to scaring citizens into believing that the US is at serious risk of cataclysmic cyber-attacks from "aggressors". This all culminated when Defense Secretary Leon Panetta, last October, warned of what he called a "cyber-Pearl Harbor". This "would cause physical destruction and the loss of life, an attack that would paralyze and shock the nation and create a profound new sense of vulnerability."
Note: Defense Secretary Panetta's warning of a 'cyber-Pearl Harbor' will surely serve as a reminder for many of the Project for the New American Century's call for a 'new Pearl Harbor' just a few months before 9/11. Is it likely that he was unaware of the baggage such language carries at present? For more on WantToKnow team member Prof. David Ray Griffin's epochal book The New Pearl Harbor, click here.
Recently released FBI files about the Occupy movement do not reveal the kind of dirty tricks J. Edgar Hoover's bureau used against demonstrators in the Bay Area during the '60s, but they present some striking parallels to those dark days and have rightly raised concern among civil libertarians. The records ... show that over the decades the machinery of surveillance remains much the same, even as expanded intelligence powers and technological advances magnify potential abuse. As in the '60s, the FBI reports use sweeping language like "potential terrorist threat" to characterize nonviolent dissent. As then, the bureau exchanges information with a vast network of federal agencies, state and local police, campus cops and corporate security. And once again the FBI is invoking great secrecy. Such activity, Congress found in the '70s, contributed to massive intelligence abuses. The FBI released 99 heavily redacted pages and withheld 288 more in response to a Freedom of Information Act request from the Partnership for Civil Justice Fund, a public-interest legal organization in Washington, D.C. Even while noting Occupy organizers do "not condone the use of violence," the records show that FBI field offices across the nation collected information on the premise [that] the protests posed a potential "terrorist" or "criminal" threat. The bureau shared information on Occupy with police on joint terrorism task forces, which have raised concerns about skirting local surveillance restrictions, and with fusion centers, regional intelligence hubs recently criticized by Congress as violating civil liberties.
Note: The writer of this article, Seth Rosenfeld, is the author of Subversives: The FBI's War on Student Radicals, and Reagan's Rise to Power. For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.
The Federal Bureau of Investigation used counterterrorism agents to investigate the Occupy Wall Street movement, including its communications and planning, according to newly disclosed agency records. The F.B.I. records show that as early as September 2011, an agent from a counterterrorism task force in New York notified officials of two landmarks in Lower Manhattan — Federal Hall and the Museum of American Finance — “that their building was identified as a point of interest for the Occupy Wall Street.” In the following months, F.B.I. personnel around the country were routinely involved in exchanging information about the movement with businesses, local law-enforcement agencies and universities. An October 2011 memo from the bureau’s Jacksonville, Fla., field office was titled Domain Program Management Domestic Terrorist. The memo said agents discussed “past and upcoming meetings” of the movement, and its spread. It said agents should contact Occupy Wall Street activists to ascertain whether people who attended their events had “violent tendencies.” Since the Sept. 11, 2001, attacks, the F.B.I. has come under criticism for deploying counterterrorism agents to conduct surveillance and gather intelligence on organizations active in environmental, animal-cruelty and poverty issues. The records were obtained by the Partnership for Civil Justice Fund, a civil-rights organization in Washington, through a Freedom of Information request to the F.B.I.
Note: For analysis of these amazing documents revealing the use of joint government and corporate counterterrorism structures against peaceful protestors of financial corruption, click here and here. For a Democracy Now! video segment on this, click here.
Thousands of criminal cases at the state and local level may have relied on exaggerated testimony or false forensic evidence to convict defendants of murder, rape and other felonies. The forensic experts in these cases were trained by the same elite FBI team whose members gave misleading court testimony about hair matches and later taught the local examiners to follow the same suspect practices, according to interviews and documents. In July, the Justice Department announced a nationwide review of all cases handled by the FBI Laboratory's hair and fibers unit before 2000 — at least 21,000 cases — to determine whether improper lab reports or testimony might have contributed to wrongful convictions. But about three dozen FBI agents trained 600 to 1,000 state and local examiners to apply the same standards that have proved problematic. None of the local cases is included in the federal review. As a result, legal experts say, although the federal inquiry is laudable, the number of flawed cases at the state and local levels could be even higher, and those are going uncorrected. The FBI review was prompted by a series of articles in The Washington Post about errors at the bureau's renowned crime lab involving microscopic hair comparisons. The articles highlighted the cases of two District of Columbia men who each spent more than 20 years in prison based on false hair matches by FBI experts. Since The Post's articles, the men have been declared innocent by D.C. Superior Court judges.
Note: For deeply revealing reports from reliable major media sources on government corruption, click here.
CIA agents tortured a German citizen, sodomising, shackling, and beating him, as Macedonian state police looked on, the European court of human rights said in a historic judgment released on [December 13]. In a unanimous ruling, it also found Macedonia guilty of torturing, abusing, and secretly imprisoning Khaled el-Masri, a German of Lebanese origin allegedly linked to terrorist organisations. Masri was seized in Macedonia in December 2003 and handed over to a CIA "rendition team" at Skopje airport and secretly flown to Afghanistan. It is the first time the court has described CIA treatment meted out to terror suspects as torture. "The grand chamber of the European court of human rights unanimously found that Mr el-Masri was subjected to forced disappearance, unlawful detention, extraordinary rendition outside any judicial process, and inhuman and degrading treatment," said James Goldston, executive director of the Open Society Justice Initiative. He described the judgment as "an authoritative condemnation of some of the most objectionable tactics employed in the post-9/11 war on terror". Jamil Dakwar, of the American Civil Liberties Union, described the ruling as "a huge victory for justice and the rule of law". The Strasbourg court said it found Masri's account of what happened to him "to be established beyond reasonable doubt".
Note: For deeply revealing reports from reliable major media sources on illegal acts by US intelligence agencies, click here.
The Senate intelligence committee approved a long-awaited report ... concluding that harsh interrogation measures used by the CIA did not produce significant intelligence breakthroughs. The 6,000-page document ... is the most detailed independent examination to date of the agency’s efforts to “break” dozens of detainees through physical and psychological duress. Officials familiar with the report said it makes a detailed case that subjecting prisoners to “enhanced” interrogation techniques did not help the CIA find Osama bin Laden and often [was] counterproductive in the broader campaign against al-Qaeda. It could be months, if not years, before the public gets even a partial glimpse of the report or its 20 findings and conclusions. When that is completed, the committee will need to vote again on whether to release even a portion of the report, a move likely to face opposition from the CIA, which has fought to keep details of the interrogation program classified. Earlier this year, the Justice Department closed investigations of alleged abuses, eliminating the prospect that CIA operatives who had gone beyond the approved methods would face criminal charges. Civil liberties groups praised the report.
Note: For deeply revealing reports from reliable major media sources on illegal activities of intelligence agencies, click here.
Imagine that you have a Top Secret clearance and are privy to some of our country’s most sensitive national security information. In that capacity, you discover that some of the highest elected and appointed political leaders in the land are engaged in espionage and treason, accepting bribes and selling weapons and information (including nuclear weapons secrets) to foreign powers, including our enemies. Moreover, you learn that some of your co-workers are in league with these conspirators, covering up the evidence trail and misdirecting those tasked with preventing such security breaches. In her book Classified Woman: A Memoir, Edmonds recounts the incredible story of her efforts, for more than a decade, to warn her adopted country of imminent perils, only to be slapped down, harassed, smeared, and threatened. To prevent her explosive testimony from seeing the light of day, President George W. Bush and Attorney General John Ashcroft invoked the rarely used (until recently) “state secrets privilege” to gag not only Edmonds, but also committees of Congress that were investigating her case, as well as the Department of Justice’s Office of Inspector General and the FBI’s own Office of Professional Review. The preposterousness of the government’s position is palpable. This is an effort not to protect legitimate state secrets, but to protect criminality that has prospered in secrecy for far too long. Sibel Edmonds is decidedly non-partisan in her scorn; she shows equal disdain for Republicans and Democrats who sell out their country and betray their oaths of office. She names names.
Note: For other major media articles showing how Ms. Edmonds has been targeted and suffered for courageously speaking her truth, click here. This is the first major website to publish a review of this most amazing book by a true hero. Though we don't support all of the objectives of the John Birch Society, which publishes this website, we strongly support any efforts to reveal the truth through people like Sibel Edmonds. The book has a very rare five-star rating on Amazon.com. To get a copy, click here.
The Pentagon will send hundreds of additional spies overseas as part of an ambitious plan to assemble an espionage network that rivals the CIA in size, U.S. officials said. The project is aimed at transforming the Defense Intelligence Agency ... into a spy service focused on emerging threats and more closely aligned with the CIA and elite military commando units. When the expansion is complete, the DIA is expected to have as many as 1,600 “collectors” in positions around the world, an unprecedented total. They will be trained by the CIA and often work with the U.S. Joint Special Operations Command, but they will get their spying assignments from the Department of Defense. Among the Pentagon’s top intelligence priorities, officials said, are Islamist militant groups in Africa, weapons transfers by North Korea and Iran, and military modernization underway in China. The Pentagon’s plan to create what it calls the Defense Clandestine Service, or DCS, reflects the military’s latest and largest foray into secret intelligence work. The DIA overhaul — combined with the growth of the CIA since the Sept. 11, 2001, terrorist attacks — will create a spy network of unprecedented size. The expansion of the agency’s clandestine role is likely to heighten concerns that it will be accompanied by an escalation in lethal strikes and other operations outside public view. Because of differences in legal authorities, the military isn’t subject to the same congressional notification requirements as the CIA.
Note: For deeply revealing reports from reliable major media sources on secret operations by the DIA and CIA in the "global war on terror", click here.
Central Intelligence Agency employees murdered military scientist Frank Olson in 1953 after he raised concerns about testing chemical and biological weapons on human subjects without their consent, according to a lawsuit brought by his two sons. Eric and Nils Olson, in a complaint filed against the U.S. yesterday in Washington, said the agency has covered up the cause of their father’s death for 59 years. Frank Olson, who the CIA admitted was given LSD a few days before his death, didn’t jump from a 13th floor window of the Statler Hotel in New York City, but rather was pushed, they claim. “The circumstances surrounding the death mirrored those detailed in an assassination manual that, upon information and belief, the CIA had drafted that same year,” Scott Gilbert, a lawyer for the Olsons, wrote in the complaint. Olson’s family has tried to piece together how Frank Olson died and the circumstances surrounding his death ever since a 1975 government report on CIA activities in the U.S. said that he committed suicide after being given LSD without his knowledge. Preston Golson, a CIA spokesman, said ... that the agency’s covert behavioral research program known as MK-ULTRA was investigated in 1975 by the Rockefeller Commission and the Church Committee, and in 1977 by the Senate Select Committee on Intelligence and the Senate Subcommittee on Health and Scientific Research. Olson’s sons said in the suit they have asked repeatedly “to be told the truth” about their father’s death. “Each time, the government has responded with falsehoods,” they said.
Note: For lots more on the CIA's Operation MK Ultra, click here. For more on Frank Olson and secret government mind control programs, click here. For deeply revealing reports from reliable major media sources on the games intelligence agencies play, click here.
[There have been] more than 300 drone strikes and some 2,500 people killed by the Central Intelligence Agency and the military since Mr. Obama first took office. Mr. Obama and his advisers are still debating whether remote-control killing should be a measure of last resort against imminent threats to the United States, or a more flexible tool, available to help allied governments attack their enemies or to prevent militants from controlling territory. Though publicly the administration presents a united front on the use of drones, behind the scenes there is longstanding tension. The administration is still pushing to make the rules formal and resolve internal uncertainty and disagreement about exactly when lethal action is justified. The Defense Department and the C.I.A. continue to press for greater latitude to carry out strikes. The administration’s legal reasoning has not persuaded many other countries that the strikes are acceptable under international law. For years before the Sept. 11, 2001, attacks, the United States routinely condemned targeted killings of suspected terrorists by Israel, and most countries still object to such measures. Partly because United Nations officials know that the United States is setting a legal and ethical precedent for other countries developing armed drones, the U.N. plans to open a unit in Geneva early next year to investigate American drone strikes.
Note: For deeply revealing reports from reliable major media sources on atrocities carried out by the US in its illegal wars of aggression in the Middle East, Asia and Africa, click here.
Over the past two years, the Obama administration has been secretly developing a new blueprint for pursuing terrorists, a next-generation targeting list called the “disposition matrix.” The matrix contains the names of terrorism suspects arrayed against an accounting of the resources being marshaled to track them down, including sealed indictments and clandestine operations. U.S. officials said the database is designed to go beyond existing kill lists, mapping plans for the “disposition” of suspects beyond the reach of American drones. The government expects to continue adding names to kill or capture lists for years. Among senior Obama administration officials, there is a broad consensus that such operations are likely to be extended at least another decade. That timeline suggests that the United States has reached only the midpoint of what was once known as the global war on terrorism. Targeting lists that were regarded as finite emergency measures after the attacks of Sept. 11, 2001, are now fixtures of the national security apparatus. The rosters expand and contract with the pace of drone strikes but never go to zero. Obama has institutionalized the highly classified practice of targeted killing, transforming ad-hoc elements into a counterterrorism infrastructure capable of sustaining a seemingly permanent war. Privately, officials acknowledge that the development of the matrix is part of a series of moves, in Washington and overseas, to embed counterterrorism tools into U.S. policy for the long haul.
Note: Through the drone program, the U.S. has license to kill in foreign countries without those being killed given any sort of trial or rights. Is it any wonder some countries are highly critical of this program? For deeply revealing reports from reliable major media sources on the secret and illegal operations of the "global war on terror," click here.
A multibillion-dollar information-sharing program created in the aftermath of 9/11 has improperly collected information about innocent Americans and produced little valuable intelligence on terrorism, a Senate report concludes. It portrays an effort that ballooned far beyond anyone's ability to control. What began as an attempt to put local, state and federal officials in the same room analyzing the same intelligence has instead cost huge amounts of money for data-mining software, flat screen televisions and, in Arizona, two fully equipped Chevrolet Tahoes that are used for commuting, investigators found. The report underscores a reality of post-9/11 Washington: National security programs tend to grow, never shrink, even when their money and manpower far surpass the actual subject of terrorism. When fusion centers did address terrorism, they sometimes did so in ways that infringed on civil liberties. The centers have made headlines for circulating information about Ron Paul supporters, the ACLU, activists on both sides of the abortion debate, war protesters and advocates of gun rights. One fusion center cited in the Senate investigation wrote a report about a Muslim community group's list of book recommendations. Others discussed American citizens speaking at mosques or talking to Muslim groups about parenting. No evidence of criminal activity was contained in those reports. The government did not circulate them, but it kept them on government computers. The federal government is prohibited from storing information about First Amendment activities not related to crimes.
Note: For deeply revealing reports from reliable major media sources on civil liberties, click here.
Two Portland residents say they will appear before a federal grand jury in Seattle Thursday in an investigation of anarchist activity, according to a statement they released on [August 1]. Grand jury subpoenas have also been served to activists in Olympia and Seattle ... according to the Seattle Chapter of the National Lawyers Guild, which identifies itself as an association of progressive lawyers. The guild urged the U.S. Attorney’s Office to drop the subpoenas [because] they were being used “as a pretext for harassing political activists.” “It concerns us any time there are law-enforcement raids that target political literature, first amendment-protected materials,” [guild spokesman Neil] Fox said. Two weeks before a heavily armed, July 25 FBI raid that Dennison Williams and Leah-Lynn Plante said took place at their Portland home, the Seattle Police Department SWAT team seized evidence connected to the May Day investigation from a Judkins Park apartment of Occupy Seattle members. In both cases, those searched told media that law-enforcement charged into their homes [with a battering-ram] early in the morning and used a stun grenade, a non-lethal object that creates a disorienting loud bang and bright light. Williams told The Oregonian that the FBI took his laptop computer, cell phone, two thumb drives, multiple pieces of black clothing, and a T-shirt that read on the front “Multi Death Corporations.”
Note: Amazingly, the FBI raids on political activists in Seattle and Portland have gone completely unreported by the mass media. For analysis of the FBI's attacks on dissenters, click here, here and here. For a Democracy Now! video report, click here. For deeply revealing reports from reliable major media sources on civil liberties, click here.
Bolstered by eyewitness accounts and the Internet, the explosion of TWA Flight 800 off the coast of New York 10 years ago spawned a slew of sinister conspiracy theories, most notably the belief that a missile from a U.S. Navy ship was responsible. So prevalent were these theories that the term "Pierre Salinger Syndrome" -- the belief that everything on the Internet is true -- entered the lexicon. Some witness accounts seemed to support the missile theory. It quickly became a hot topic on the young but quickly growing Internet. It might have stayed simply an Internet conspiracy had it not been for Pierre Salinger, President Kennedy's press secretary who had worked as a network news correspondent for a time. Three months after the TWA tragedy, while working as a freelance public relations director, he claimed to have verified the friendly fire cover-up. "It's a document I got about five weeks ago -- came from ... an intelligence agent of France. He had been given this document from an American Secret Service agent based in France," Salinger said at the time. "He had been doing an inquiry and had some contacts with the U.S. Navy." Salinger took to the news airwaves, including CNN, touting his theory. But as baseless as it sounded, Salinger could not be ignored. His accusations gave conspiracy theorists a voice of distinction and credibility.
Note: For powerful evidence from an Emmy-award winning journalist that this investigation was manipulated, click here. To watch the powerful documentary Shadows of Liberty on major media manipulation, including that of TWA flight 800 (minute 14) at this link.
Revelations that top officials are targeting people to be assassinated abroad, including American citizens, are only the most recent, disturbing proof of how far our nation’s violation of human rights has extended. This development began after [9/11] and has been sanctioned and escalated by bipartisan executive and legislative actions. While the country has made mistakes in the past, the widespread abuse of human rights over the last decade has been a dramatic change from the past. With leadership from the United States, the Universal Declaration of Human Rights was adopted in 1948 as “the foundation of freedom, justice and peace in the world.” This was a bold and clear commitment that power would no longer serve as a cover to oppress or injure people, and it established equal rights of all people to life, liberty, security of person, equal protection of the law and freedom from torture, arbitrary detention or forced exile. It is disturbing that, instead of strengthening these principles, our government’s counterterrorism policies are now clearly violating at least 10 of the declaration’s 30 articles, including the prohibition against “cruel, inhuman or degrading treatment or punishment.” Recent legislation has made legal the president’s right to detain a person indefinitely on suspicion of affiliation with terrorist organizations or “associated forces,” a broad, vague power that can be abused without meaningful oversight from the courts or Congress. This law violates the right to freedom of expression and to be presumed innocent until proved guilty, two other rights enshrined in the declaration.
Note: For revealing reports from major media sources on war crimes committed by US forces in the "global war on terror," click here.
Former Florida Sen. Bob Graham, who co-chaired Congress’ Joint Inquiry into the 9/11 terrorist attacks, has seen two classified FBI documents that he says are at odds with the bureau’s public statements that there was no connection between the hijackers and Saudis then living in Sarasota, Fla. “There are significant inconsistencies between the public statements of the FBI in September and what I read in the classified documents,” Graham said. “One document adds to the evidence that the investigation was not the robust inquiry claimed by the FBI,” Graham said. “An important investigative lead was not pursued and unsubstantiated statements were accepted as truth.” Congress’s bipartisan inquiry released its public report in July 2003. The final 28 pages, regarding possible foreign support for the terrorists, were censored in their entirety -- on President George W. Bush’s instructions. Graham said the two classified FBI documents that he saw, dated 2002 and 2003, were prepared by an agent who participated in the Sarasota investigation. He said the agent suggested that another federal agency be asked to join the investigation, but that the idea was “rejected.” Graham attempted in recent weeks to contact the agent, he said, only to find the man had been instructed by FBI headquarters not to talk.
Note: Much evidence exists implicating not only Saudi Arabia, but also Pakistan, Israel and the UK in the 9/11 attacks. Could the purpose behind these high-profile claims from former US senators be to deflect attention from the key perpetrators, rogue elements within the US government? As WantToKnow team member Prof. David Ray Griffin has exhaustively demonstrated, almost all of the evidence for Muslim hijackers vanishes on close examination. For more serious questions on 9/11, click here.
In the space of three years, the [Obama] administration has built an extensive apparatus for using drones to carry out targeted killings of suspected terrorists and stealth surveillance of other adversaries. The apparatus involves dozens of secret facilities, including two operational hubs on the East Coast, virtual Air Force cockpits in the Southwest and clandestine bases in at least six countries on two continents. No president has ever relied so extensively on the secret killing of individuals to advance the nation’s security goals. Lethal operations are increasingly assembled a la carte, piecing together personnel and equipment in ways that allow the White House to toggle between separate legal authorities that govern the use of lethal force. In Yemen, for instance, the CIA and the military’s Joint Special Operations Command pursue the same adversary with nearly identical aircraft. But they alternate taking the lead on strikes to exploit their separate authorities, and they maintain separate kill lists that overlap but don’t match. CIA and military strikes this fall killed three U.S. citizens, two of whom were suspected al-Qaeda operatives. Although human rights advocates and others are increasingly critical of the drone program, the level of public debate remains muted. [One] reason for the lack of extensive debate is secrecy. The White House has refused to divulge details about the structure of the drone program or, with rare exceptions, who has been killed.
Note: Not that the US citizens killed were not given their constitutional rights for a fair trail before being assassinated. For lots more from major media sources on government secrecy, click here.
Armed with a search warrant, Nelson County Sheriff Kelly Janke went looking for six missing cows on the Brossart family farm in [eastern North Dakota]. He called in reinforcements from the state Highway Patrol, a regional SWAT team, a bomb squad, ambulances and deputy sheriffs from three other counties. He also called in a Predator B drone. Sophisticated sensors under the nose helped pinpoint the three suspects and showed they were unarmed. Police rushed in and made the first known arrests of U.S. citizens with help from a Predator, the spy drone that has helped revolutionize modern warfare. But that was just the start. Local police say they have used two unarmed Predators based at Grand Forks Air Force Base to fly at least two dozen surveillance flights since June. The FBI and Drug Enforcement Administration have used Predators for other domestic investigations, officials said. The drones belong to U.S. Customs and Border Protection, which operates eight Predators on the country's northern and southwestern borders to search for illegal immigrants and smugglers. The previously unreported use of its drones to assist local, state and federal law enforcement has occurred without any public acknowledgment or debate.
Note: "Looking for six cows," the Sheriff called in "a regional SWAT team, a bomb squad, ambulances and deputy sheriffs from three other counties. He also called in a Predator B drone." Does that sound like a reasonable response to the problem of missing cows? Or could there be an agenda to establish aerial surveillance by drones as the norm in the US?
Prominent international human rights lawyer Clive Stafford Smith was impressed by the 16-year-old boy who wanted to draw attention to civilian deaths caused by U.S. drone strikes in Pakistan. Tariq Aziz had volunteered to take pictures of people killed by the remotely piloted aircraft to help Stafford Smith highlight what he calls illegal killings. Three days later, on October 31, he and his 12-year-old cousin were themselves killed by a drone missile strike in the North Waziristan region on the Afghan border, Stafford Smith said. For the veteran lawyer, the deaths highlighted major flaws in the CIA-run drone campaign, which U.S. officials say is invaluable in the war on militants. He considers the drones as "scandalous" as the secret U.S. bombing of Cambodia during the Vietnam War. "What we are seeing in Waziristan is a process that is alienating the population just as napalm in Vietnam did and it's achieving very little benefit." Stafford Smith [also] drew parallels between Guantanamo and the drone campaign in Pakistan, arguing both detentions and strikes were often based on dubious intelligence. He suspects the death of Aziz was a prime example of that. "We as America offer large bounties to different informants and these informants would sell their own mothers," said Stafford Smith, 52, a dual U.S.-British citizen who is the director of Reprieve, an organization that advocates for prisoners' rights.
Note: For key reports from major media sources on the killing of innocent people by US drones, click here.
U.S. officials last week acknowledged that unmanned predator aircraft killed two U.S. citizens, Anwar al-Awlaki and Samir Khan, in Yemen. Yet, U.S. media outlets have chosen to refer to them as "American born" or "U.S.-born," as in "the American-born cleric Anwar al-Awlaki was killed by U.S. armed drones." No concrete proof of their guilt has been furnished beyond what the government and multiple media outlets have reported. In the case of the al-Awlaki killing, U.S. officials said, "Al-Awlaki played a 'significant operational role' in plotting and inspiring attacks on the United States," as they justified the killing of an American citizen. In the post-9/11 world, such reporting garners little attention from the public. But those who believe in the rule of law find such mundane pronouncements frightening. The Sixth Amendment guarantees the accused the right to a public trial by an impartial jury, regardless of his or her ethnic background or previous alleged activities. Government-sanctioned assassinations of U.S. citizens without due process should be discussed rather than blindly accepted as a victory in the war on terror. The obvious follow-up question is: What about other U.S. citizens? Might they also be targeted for assassination without due process? The targeted killings of al-Awlaki and Khan should shock Americans reared on the rule of law, justice, liberty and freedom.
Note: State assassination of a citizen without due process would seem to be the ultimate attack on civil liberties. For lots more on such threats from reliable sources, click here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.