Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Two former employees of Blackwater Worldwide have accused the private security company of defrauding the government for years by filing bogus receipts, double billing for the same services and charging government agencies for strippers and prostitutes, according to court documents unsealed this week. In a December 2008 lawsuit, the former employees said top Blackwater officials had engaged in a pattern of deception as they carried out government contracts in Iraq and Afghanistan, and in Louisiana in the aftermath of Hurricane Katrina. The lawsuit, filed under the False Claims Act, also asserts that Blackwater officials turned a blind eye to “excessive and unjustified” force against Iraqi civilians by several Blackwater guards. Blackwater has earned billions of dollars from government agencies in the years since the Sept. 11 attacks, when the company won contracts to protect American diplomats in Iraq and Afghanistan. The former employees who filed the lawsuit, a married couple named Brad and Melan Davis, said there was little financial oversight of the money. The documents detailing the Davises’ accusations were unsealed after the Justice Department declined to join in the case against Blackwater, which last year changed its name to Xe Services.
Note: For lots more on corporate fraud and war profiteering from reliable sources, click here.
In 2009, the Justice Department began to release reports and top-secret memos detailing interrogation techniques ... used by CIA officers against suspected terror operatives. The list of brutal techniques, including holding prisoners in small boxes, staging mock executions, and water torture, is reminiscent of some of the worst human-rights abuses on record. In medieval Europe, torture was more than just a means of punishment. Many criminal trials of the era consisted of one or more 'ordeals,' painful tests designed to prove guilt or innocence through supernatural judgment. During waterboarding, a technique first used in the 14th century, torturers begin by pumping water directly into a victim's stomach or slowly flooding his throat with liquid. Used extensively during the Spanish Inquisition, the practice became less publicly acceptable during the Enlightenment, then experienced an underground resurgence in the 19th century. Since World War II, different forms of waterboarding have been employed by governments in Japan, Cambodia, the United Kingdom and the United States, among others. In addition to performing forced labor, prisoners at Nazi concentration camps became subjects in some of the cruelest medical experiments ever performed. They were often held at extreme altitudes and temperatures to help develop new survival strategies or exposed to deadly gases and diseases in order to test vaccines. Many of these tests, directed by the infamous Josef Mengele at Auschwitz, advanced Nazi ideology by establishing 'Jewish racial inferiority.'
Note: The above link leads to a revealing 12-part slide show on the history of torture. For more disturbing information on how Nazi torture techniques were eventually used by the CIA for mind control, click here.
Findings of the Select Committee on Assassinations in the Assassination of President John F. Kennedy in Dallas, Tex., November 22, 1963. Scientific acoustical evidence establishes a high probability that two gunmen fired at President John F. Kennedy. Other scientific evidence does not preclude the possibility of two gunmen firing at the President. The committee believes, on the basis of the evidence available to it, that President John F. Kennedy was probably assassinated as a result of a conspiracy. The committee is unable to identify the other gunman or the extent of the conspiracy. The [original] investigation into the possibility of conspiracy in the assassination was inadequate. The conclusions of the investigations were arrived at in good faith, but presented in a fashion that was too definitive. The Department of Justice failed to exercise initiative in supervising and directing the investigation by the Federal Bureau of Investigation of the assassination. The Federal Bureau of Investigation failed to investigate adequately the possibility of a conspiracy to assassinate the President. The Central Intelligence Agency was deficient in its collection and sharing of information both prior to and subsequent to the assassination. The Warren Commission failed to investigate adequately the possibility of a conspiracy to assassinate the President.
Note: This same US Congressional report, on the subject of the Martin Luther King, Jr. assassination, states that "The committee believes, on the basis of the circumstantial evidence available to it, that there is a likelihood that James Earl Ray assassinated Dr. Martin Luther King as a result of a conspiracy." Why hasn't this information been widely reported and become public knowledge? Explore a possible answer. For more along these lines, see concise summaries of deeply revealing news articles on assassinations from reliable major media sources.
At request of Brigadier General George F. Schulgen, Chief of the Requirements Intelligence Branch of Army Air Corps Intelligence, Special Agent [deleted] discussed the above captioned matter with him on July 9, 1947. General Schulgen indicated to [deleted] that the Air Corps has taken the attitude that every effort must be undertaken in order to run down and ascertain whether or not the flying disks are a fact and, if so, to learn all about them. He advised that to complete the picture he desired the assistance of the Federal Bureau of Investigation in locating and questioning the individuals who first sighted the so-called flying disks in order to ascertain whether or not they are sincere in their statements that they saw these disks. [Deleted] indicated that it was his attitude that the flying disks are not the result of any Army or Navy experiments. He stated that he was of the opinion that the Bureau, if at all possible, should accede to General Schulgen's request. [FBI Director J. Edgar Hoover's handwritten response:] I would do it but before agreeing to it we must insist upon full access to discs recovered. For instance in the Sa. case the army grabbed it and would not let us have it for cursory investigation.
Note: The excerpt above is from pages 44 and 45 of the rich collection of declassified FBI documents on UFOs at the link above. If the link fails, click here. Note that this was just days after the Roswell crash. For lots more solid evidence of a major UFO cover-up, see our UFO Information Center at this link. Why hasn't this been widely reported and become public knowledge? For a possible answer, click here.
More than eight years after anthrax-laced letters killed five people and terrorized the country, the F.B.I. [has] closed its investigation, adding eerie new details to its case that the 2001 attacks were carried out by Bruce E. Ivins, an Army biodefense expert who killed himself in 2008. A 92-page report, which concludes what by many measures is the largest investigation in F.B.I. history, laid out the evidence against Dr. Ivins. The report disclosed for the first time the F.B.I.’s theory that Dr. Ivins embedded in the notes mailed with the anthrax a complex coded message, based on DNA biochemistry. Whether the voluminous documentation will convince skeptics about Dr. Ivins’s guilt was uncertain. Representative Rush D. Holt, a New Jersey Democrat and a physicist who has sharply criticized the bureau’s work, said the case should not have been closed. He said the F.B.I. report laid out “barely a circumstantial case” that “would not, I think, stand up in court.” Some of Dr. Ivins’s colleagues at the United States Army Medical Research Institute of Infectious Diseases in Frederick, including several supervisors who knew him well, publicly rejected the F.B.I.’s conclusion. They said he was eccentric but incapable of such a diabolical act, and they questioned whether he could have produced the deadly powder with the equipment in his lab.
Note: The FBI's "closure" of its anthrax investigation won't put an end to the unanswered questions about who the perpetrators of the attacks were. As described in this key Wall Street Journal report, the specific formulation of the anthrax used in the attacks was beyond Ivins' capabilities.
President Bush was expected to sign detailed plans for a worldwide war against al-Qaida two days before Sept. 11 but did not have the chance before the terrorist attacks in New York and Washington, U.S. and foreign sources told NBC News. The document, a formal National Security Presidential Directive, amounted to a “game plan to remove al-Qaida from the face of the earth,” one of the sources told NBC News’ Jim Miklaszewski. In many respects, the directive ... outlined essentially the same war plan that the White House, the CIA and the Pentagon put into action after the Sept. 11 attacks. Officials did not believe that Bush had had the opportunity to closely review the document in the two days between its submission and the Sept. 11 attacks. But it had been submitted to national security adviser Condoleezza Rice, and the officials said Bush knew about it and had been expected to sign it. The couching of the plans as a formal security directive is significant, Miklaszewski reported, because it indicates that the United States intended a full-scale assault on al-Qaida even if the Sept. 11 attacks had not occurred.
Note: Why was this kept secret? Why is it still being kept secret?
The British government [has] disclosed once-secret details of the United States' harsh treatment of a former Guantanamo Bay detainee after losing a lengthy legal battle to suppress the information. According to the information, from a judge's summary of a classified CIA report to British authorities, Binyam Mohamed was subjected to "cruel, inhuman and degrading" treatment during interrogations in Pakistan in 2002, including being shackled and deprived of sleep while interrogators played upon "his fears of being removed from United States custody and 'disappearing.' " Mohamed, 31, was born in Ethiopia and lives in Britain. Arrested in Pakistan in 2002, he says he was tortured by American authorities and others under U.S. instruction there and in Morocco. He says he was beaten with a leather strap, subjected to a mock execution and sliced with a scalpel on his chest and penis. Mohamed says Britain knew about his treatment because information used during his questioning could have come only from British intelligence. He spent seven years in detention, four of them at the U.S. military prison at Guantanamo Bay, Cuba. Reprieve, a legal organization representing Mohamed in a lawsuit against the British government, said in a statement that the disclosures show that "the U.S. documented their efforts to abuse Mr. Mohamed" and that British authorities "knew he was being abused and did nothing about it."
Note: For lots more from reliable sources on the illegal actions undertaken by the US and UK in the prosecution of the fraudulent "war on terror," click here.
The director of national intelligence affirmed rather bluntly today that the U.S. intelligence community has authority to target American citizens for assassination if they present a direct terrorist threat to the United States. "We take direct actions against terrorists in the intelligence community; if we think that direct action will involve killing an American, we get specific permission to do that," Director of National Intelligence Dennis Blair told the House Intelligence Committee. "Whether that American is involved in a group that is trying to attack us, whether that American ... is a threat to other Americans. Those are the factors involved." Blair explained. According to U.S. officials, only a handful of Americans would be eligible for targeting by U.S. intelligence or military operations. The DNI said that Internet and social media sites have become critical to terrorism recruitment efforts. "The homegrown radicalization of people in the United States is a relatively new thing." Blair said U.S. intelligence was rapidly working to counter the emerging problem.
Note: To read a valuable commentary on Director of National Intelligence Dennis Blair's claimed "war exception" to the Constitution, permitting assassination of American citizens by the US military and intelligence services without judicial review or legal process of any kind, click here. For the views of several legal experts, click here.
The State Department didn't revoke the visa of foiled terrorism suspect Umar Farouk Abdulmutallab because federal counterterrorism officials had begged off revocation, a top State Department official revealed. Patrick F. Kennedy, an undersecretary for management at the State Department, said Abdulmutallab's visa wasn't taken away because intelligence officials asked his agency not to deny a visa to the suspected terrorist. "Revocation action would have disclosed what they were doing," Kennedy said in testimony before the House Committee on Homeland Security. Since the failed attack, criticism has swirled around leaders of the U.S. intelligence community who have indicated they were warned by the suspect's father about a month before the flight of a potential terror threat, but failed to stop Abdmutallab, despite other warning signs like the fact that he purchased a one-way ticket to Detroit with cash.
Note: So federal counterterrorism officials stopped the bomber's visa from being revoked. Hmmmm... Clearly there is more going on in this case than "failure to connect the dots." Why aren't other major media reporting this important story? Kurt Haskell, a key eyewitness passenger who almost lost his life, has written a powerfully revealing blog piece on what he thinks is really going on, available here. For more on this key case, click here.
The CIA sequence for a Predator strike ends with a missile but begins with a memo. Usually no more than two or three pages long, it bears the name of a suspected terrorist, the latest intelligence on his activities, and a case for why he should be added to a list of people the agency is trying to kill. No U.S. citizen has ever been on the CIA's target list. But that is expected to change as CIA analysts compile a case against a Muslim cleric who was born in New Mexico but now resides in Yemen. He is a U.S. citizen and until recently was mainly known as a preacher espousing radical Islamic views. Awlaki's status as a U.S. citizen requires special consideration, according to former officials familiar with the criteria for the CIA's targeted killing program. But while Awlaki has not yet been placed on the CIA list, the officials said it is all but certain that he will be. The CIA has carried out Predator attacks in Yemen since at least 2002, when a drone strike killed six suspected Al Qaeda operatives traveling in a vehicle across desert terrain. The agency knew that one of the operatives was an American, Kamal Derwish, who was among those killed. Derwish was never on the CIA's target list, officials said, and the strike was aimed at a senior Al Qaeda operative.
Note: As the last few sentences of this long report indicate, assassination of their own citizens by US military and intelligence agencies has been going on for years. For many key reports from reliable sources on assassination as state policy, click here.
Deception [is reliant] on the close control of information, running agents (and double-agents) and creating stories that adversaries will readily believe. In an era of ubiquitous information access, anonymous leaks and public demands for transparency, deception operations are extraordinarily difficult. Nevertheless, successful strategic deception has in the past provided the United States with significant advantages that translated into operational and tactical success. Successful deception also minimizes U.S. vulnerabilities, while simultaneously setting conditions to surprise adversaries. Thus, strategic deception capabilities and plans must perforce be highly classified. Deception cannot succeed in wartime without developing theory and doctrine in peacetime. In order to mitigate or impart surprise, the United States should develop more robust interagency deception planning and action prior to the need for military operations. To be effective, a permanent standing office with strong professional intelligence and operational expertise needs to be established.
Note: The above excerpts can be found on pages 77 and 78. For a powerful two-page summary of a top general's description of how the American public is deceived into supporting war, click here.
U.S. securities regulators [at the Securities and Exchange Commission] originally treated the New York Federal Reserve's bid to keep secret many of the details of the American International Group bailout like a request to protect matters of national security. The SEC ... agreed to limit the number of SEC employees who would review the document to just two and keep the document locked in a safe while the SEC considered AIG's confidentiality request. The SEC had also agreed that if it determined the document should not be made public, it would be stored "in a special area where national security related files are kept." Emails ... that have become public in recent weeks reveal that some at the New York Fed had gone to great lengths to keep the terms of the bailout private and the SEC may have played a role in contributing to some of the secrecy surrounding the AIG rescue package. "The New York Fed was orchestrating what can only be characterized as an extreme effort to ensure that details of the counterparty deal stayed secret," Rep. Darrell Issa ... said. "More and more it looks as if they would've kept the details of the deal secret indefinitely, it they could have."
Note: So now bank transactions are being considered a matter of "national security." What next? It's becoming ever more apparent that "national security" is used as a catch-all phrase for information that those in power don't want us to know about their secret dealings which benefit themselves at the expense of most of the rest of us.
The investigation of the 2001 anthrax attacks ended as far as the public knew on July 29, 2008, with the death of Bruce Ivins, a senior biodefense researcher at the U.S. Army Medical Research Institute of Infectious Diseases in Fort Detrick, Md. Less than a week after his apparent suicide, the FBI declared Ivins to have been the sole perpetrator of the 2001 Anthrax attacks. The FBI [had] turned the pressure up on him, isolating him at work and forcing him to spend what little money he had on lawyers to defend himself. He became increasingly stressed. Then came his suicide (which, as Eric Nadler and Bob Coen show in their documentary "The Anthrax War," was one of four suicides among American and British biowarfare researchers in past years). But there was still a vexing problem. Silicon was used in the 1960s to weaponize anthrax. Anthrax spores were coated with the substance to prevent them from clinging together so as to create a lethal aerosol. But since weaponization was banned by international treaties, research anthrax no longer contains silicon, and the [anthrax] at Fort Detrick contained none. Ivins, no matter how weird he may have been, had neither the set of skills nor the means to attach silicon to anthrax spores. If Ivins had neither the equipment or skills to weaponize anthrax with silicon, then some other party with access to the anthrax must have done it.
Note: As usual, the FBI tries to pin it on one wacko, when it is clear others most have been involved. Remember that the anthrax attacks occurred as Congress was considering the PATRIOT Act, and were directed in part at key senators opposed to the act. Congress was shut down for a period, and when it reconvened it passed the bill without discussion. For lots more on the antrax attacks as a likely false-flag operation, click here.
U.S. military teams and intelligence agencies are deeply involved in secret joint operations with Yemeni troops who in the past six weeks have killed scores of people. The operations, approved by President Obama, involve several dozen troops from the U.S. military's clandestine Joint Special Operations Command (JSOC), whose main mission is tracking and killing [targeted persons]. Obama approved a Dec. 24 strike against a compound where a U.S. citizen, Anwar al-Aulaqi, was thought to be. He has since been added to a shortlist of U.S. citizens specifically targeted for killing or capture by the JSOC. The combined efforts have resulted in more than two dozen ground raids and airstrikes. After the Sept. 11 attacks, Bush gave the CIA, and later the military, authority to kill U.S. citizens abroad. The Obama administration has adopted the same stance. Both the CIA and the JSOC maintain lists of individuals, called "High Value Targets" and "High Value Individuals," whom they seek to kill or capture. The JSOC list includes three Americans, including Aulaqi, whose name was added late last year. As of several months ago, the CIA list [also] included three U.S. citizens.
Note: For many reports from reliable sources on the growing governmental threats to civil liberties, click here.
The FBI illegally collected more than 2,000 U.S. telephone call records between 2002 and 2006 by invoking terrorism emergencies that did not exist or simply persuading phone companies to provide records, according to internal bureau memos and interviews. FBI officials issued approvals after the fact to justify their actions. E-mails obtained by The Washington Post detail how counterterrorism officials inside FBI headquarters did not follow their own procedures that were put in place to protect civil liberties. A Justice Department inspector general's report due out this month is expected to conclude that the FBI frequently violated the law with its emergency requests. FBI officials said they thought that nearly all of the requests involved terrorism investigations. FBI general counsel Valerie Caproni said ... that the FBI technically violated the Electronic Communications Privacy Act when agents invoked nonexistent emergencies to collect records.
Note: The FBI, by admitting that "nearly all" of the phone records they obtained were related to "terrorism investigations," make it clear that some were not. But they used claims of "terrorism emergency" to obtain them. These they then assert were merely "technical" violations. For many disturbing reports from major media sources on the increasing threats to civil liberties under the pretext of the "war on terrorism," click here.
The Transportation Security Administration ... has on its web site a “mythbuster” that tries to reassure the public. Myth: The No-Fly list includes an 8-year-old boy. Buster: No 8-year-old is on a T.S.A. watch list. “Meet Mikey Hicks,” said Najlah Feanny Hicks, introducing her 8-year-old son, a New Jersey Cub Scout and frequent traveler who has seldom boarded a plane without a hassle because he shares the name of a suspicious person. “It’s not a myth.” Hicks’s mother initially sensed trouble when he was a baby and she could not get a seat for him on their flight to Florida at an airport kiosk; airline officials explained that his name “was on the list,” she recalled. The first time he was patted down, at Newark Liberty International Airport, Mikey was 2. He cried. After years of long delays and waits for supervisors at every airport ticket counter, this year’s vacation to the Bahamas badly shook up the family. Mikey was frisked on the way there, then more aggressively on the way home. “Up your arms, down your arms, up your crotch — someone is patting your 8-year-old down like he’s a criminal,” Mrs. Hicks recounted. It is true that Mikey is not on the federal government’s “no-fly” list, which includes about 2,500 people, less than 10 percent of them from the United States. But his name appears to be among some 13,500 on the larger “selectee” list, which sets off a high level of security screening.
Note: For many reports from major media sources on the extreme loss of liberties brought about by the highly touted "war on terrorism," click here.
The nation’s top scientists and spies are collaborating on an effort to use the federal government’s intelligence assets — including spy satellites and other classified sensors — to assess the hidden complexities of environmental change. The collaboration ... has the strong backing of the director of the Central Intelligence Agency. Secrecy cloaks the monitoring effort ... because the United States wants to keep foes and potential enemies in the dark about the abilities of its spy satellites and other sensors. Controversy has often dogged the use of federal intelligence gear for environmental monitoring. About 60 scientists — mainly from academia but including some from industry and federal agencies — run the effort’s scientific side. All have secret clearances. The C.I.A. runs the program and arranges for the scientists to draw on federal surveillance equipment, including highly classified satellites of the National Reconnaissance Office. Officials said the effort to restart the program originated on Capitol Hill in 2008 after former Vice President Al Gore argued for its importance with Senator Dianne Feinstein, Democrat of California, who was then a member of the Senate Intelligence Committee; she became its chairwoman in early 2009.
Note: What happens to the public perception of science if research relies increasingly on secret data and collaboration with spy agencies? How could the results of important studies be verified by independent researchers? For lots more on the ever-expanding world of government secrecy, click here.
Since the attempted bombing of a U.S. airliner on Christmas Day, former Homeland Security secretary Michael Chertoff has given dozens of media interviews touting the need for the federal government to buy more full-body scanners for airports. What he has made little mention of is that the Chertoff Group, his security consulting agency, includes a client that manufactures the machines. An airport passengers' rights group ... criticized Chertoff, who left office less than a year ago, for using his former government credentials to advocate for a product that benefits his clients. "Mr. Chertoff should not be allowed to ... privately gain from the sale of full-body scanners under the pretense that the scanners would have detected this particular type of explosive," said Kate Hanni, founder of FlyersRights.org, which opposes the use of the scanners. Chertoff's advocacy for the technology dates back to his time in the Bush administration. In 2005, Homeland Security ordered the government's first batch of the scanners. Today, 40 body scanners are in use at 19 U.S. airports. The number is expected to skyrocket at least in part because of the Christmas Day incident. The Transportation Security Administration this week said it will order 300 more machines.
Note: For lots more on the profiteering that underlies "the war on terror," click here.
A key terror suspect who allegedly helped to plan last year’s attacks in Mumbai and plotted to strike Europe was an American secret agent who went rogue, Indian officials believe. David Headley, 49, who was born in Washington to a Pakistan diplomat father and an American mother, was arrested in Chicago in October. He has denied the charges. He came to the attention of the US security services in 1997 when he was arrested in New York for heroin smuggling. He earned a reduced sentence by working for the US Drug Enforcement Agency (DEA) infiltrating Pakistan-linked narcotics gangs. Indian investigators, who have been denied access to Mr Headley, suspect that he remained on the payroll of the US security services — possibly working for the Central Intelligence Agency (CIA) — but switched his allegiance to LeT. “India is looking into whether Headley worked as a double agent,” an Indian Home Ministry official said yesterday. Mr Headley, who changed his name from Daood Gilani, was in Mumbai until two weeks before the attacks on the city. Despite being firmly on the radar of the US intelligence agencies, he was allowed to return to India as recently as March. Indian officials are furious that their American counterparts did not share details of that visit at the time. The Indian media has raised the possibility that Mr Headley was being protected by his American handlers — a theory that experts say is credible.
Note: For many other reports from major media sources that raise profound questions about the official account of "terrorism," click here.
Palestinian security agents who have been detaining and allegedly torturing supporters of the Islamist organisation Hamas in the West Bank have been working closely with the CIA, the Guardian has learned. Less than a year after Barack Obama signed an executive order that prohibited torture and provided for the lawful interrogation of detainees in US custody, evidence is emerging the CIA is co-operating with security agents whose continuing use of torture has been widely documented by human rights groups. The relationship between the CIA and the two Palestinian agencies involved – Preventive Security Organisation (PSO) and General Intelligence Service (GI) – is said by some western diplomats and other officials in the region to be so close that the American agency appears to be supervising the Palestinians' work. One senior western official said: "The [Central Intelligence] Agency consider them as their property, those two Palestinian services." A diplomatic source added that US influence over the agencies was so great they could be considered "an advanced arm of the war on terror". Among the human rights organisations that have documented or complained about the mistreatment of detainees held by the PA in the West Bank are Amnesty International, Human Rights Watch, al-Haq and the Israeli watchdog B'Tselem.
Note: For many accounts from major media sources of the horrific abuses committed by military, intelligence and security forces in the wars of occupation in Palestine, Iraq and Afghanistan, click here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.