Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The investigation of the 2001 anthrax attacks ended as far as the public knew on July 29, 2008, with the death of Bruce Ivins, a senior biodefense researcher at the U.S. Army Medical Research Institute of Infectious Diseases in Fort Detrick, Md. Less than a week after his apparent suicide, the FBI declared Ivins to have been the sole perpetrator of the 2001 Anthrax attacks. The FBI [had] turned the pressure up on him, isolating him at work and forcing him to spend what little money he had on lawyers to defend himself. He became increasingly stressed. Then came his suicide (which, as Eric Nadler and Bob Coen show in their documentary "The Anthrax War," was one of four suicides among American and British biowarfare researchers in past years). But there was still a vexing problem. Silicon was used in the 1960s to weaponize anthrax. Anthrax spores were coated with the substance to prevent them from clinging together so as to create a lethal aerosol. But since weaponization was banned by international treaties, research anthrax no longer contains silicon, and the [anthrax] at Fort Detrick contained none. Ivins, no matter how weird he may have been, had neither the set of skills nor the means to attach silicon to anthrax spores. If Ivins had neither the equipment or skills to weaponize anthrax with silicon, then some other party with access to the anthrax must have done it.
Note: As usual, the FBI tries to pin it on one wacko, when it is clear others most have been involved. Remember that the anthrax attacks occurred as Congress was considering the PATRIOT Act, and were directed in part at key senators opposed to the act. Congress was shut down for a period, and when it reconvened it passed the bill without discussion. For lots more on the antrax attacks as a likely false-flag operation, click here.
U.S. military teams and intelligence agencies are deeply involved in secret joint operations with Yemeni troops who in the past six weeks have killed scores of people. The operations, approved by President Obama, involve several dozen troops from the U.S. military's clandestine Joint Special Operations Command (JSOC), whose main mission is tracking and killing [targeted persons]. Obama approved a Dec. 24 strike against a compound where a U.S. citizen, Anwar al-Aulaqi, was thought to be. He has since been added to a shortlist of U.S. citizens specifically targeted for killing or capture by the JSOC. The combined efforts have resulted in more than two dozen ground raids and airstrikes. After the Sept. 11 attacks, Bush gave the CIA, and later the military, authority to kill U.S. citizens abroad. The Obama administration has adopted the same stance. Both the CIA and the JSOC maintain lists of individuals, called "High Value Targets" and "High Value Individuals," whom they seek to kill or capture. The JSOC list includes three Americans, including Aulaqi, whose name was added late last year. As of several months ago, the CIA list [also] included three U.S. citizens.
Note: For many reports from reliable sources on the growing governmental threats to civil liberties, click here.
The FBI illegally collected more than 2,000 U.S. telephone call records between 2002 and 2006 by invoking terrorism emergencies that did not exist or simply persuading phone companies to provide records, according to internal bureau memos and interviews. FBI officials issued approvals after the fact to justify their actions. E-mails obtained by The Washington Post detail how counterterrorism officials inside FBI headquarters did not follow their own procedures that were put in place to protect civil liberties. A Justice Department inspector general's report due out this month is expected to conclude that the FBI frequently violated the law with its emergency requests. FBI officials said they thought that nearly all of the requests involved terrorism investigations. FBI general counsel Valerie Caproni said ... that the FBI technically violated the Electronic Communications Privacy Act when agents invoked nonexistent emergencies to collect records.
Note: The FBI, by admitting that "nearly all" of the phone records they obtained were related to "terrorism investigations," make it clear that some were not. But they used claims of "terrorism emergency" to obtain them. These they then assert were merely "technical" violations. For many disturbing reports from major media sources on the increasing threats to civil liberties under the pretext of the "war on terrorism," click here.
The Transportation Security Administration ... has on its web site a “mythbuster” that tries to reassure the public. Myth: The No-Fly list includes an 8-year-old boy. Buster: No 8-year-old is on a T.S.A. watch list. “Meet Mikey Hicks,” said Najlah Feanny Hicks, introducing her 8-year-old son, a New Jersey Cub Scout and frequent traveler who has seldom boarded a plane without a hassle because he shares the name of a suspicious person. “It’s not a myth.” Hicks’s mother initially sensed trouble when he was a baby and she could not get a seat for him on their flight to Florida at an airport kiosk; airline officials explained that his name “was on the list,” she recalled. The first time he was patted down, at Newark Liberty International Airport, Mikey was 2. He cried. After years of long delays and waits for supervisors at every airport ticket counter, this year’s vacation to the Bahamas badly shook up the family. Mikey was frisked on the way there, then more aggressively on the way home. “Up your arms, down your arms, up your crotch — someone is patting your 8-year-old down like he’s a criminal,” Mrs. Hicks recounted. It is true that Mikey is not on the federal government’s “no-fly” list, which includes about 2,500 people, less than 10 percent of them from the United States. But his name appears to be among some 13,500 on the larger “selectee” list, which sets off a high level of security screening.
Note: For many reports from major media sources on the extreme loss of liberties brought about by the highly touted "war on terrorism," click here.
The nation’s top scientists and spies are collaborating on an effort to use the federal government’s intelligence assets — including spy satellites and other classified sensors — to assess the hidden complexities of environmental change. The collaboration ... has the strong backing of the director of the Central Intelligence Agency. Secrecy cloaks the monitoring effort ... because the United States wants to keep foes and potential enemies in the dark about the abilities of its spy satellites and other sensors. Controversy has often dogged the use of federal intelligence gear for environmental monitoring. About 60 scientists — mainly from academia but including some from industry and federal agencies — run the effort’s scientific side. All have secret clearances. The C.I.A. runs the program and arranges for the scientists to draw on federal surveillance equipment, including highly classified satellites of the National Reconnaissance Office. Officials said the effort to restart the program originated on Capitol Hill in 2008 after former Vice President Al Gore argued for its importance with Senator Dianne Feinstein, Democrat of California, who was then a member of the Senate Intelligence Committee; she became its chairwoman in early 2009.
Note: What happens to the public perception of science if research relies increasingly on secret data and collaboration with spy agencies? How could the results of important studies be verified by independent researchers? For lots more on the ever-expanding world of government secrecy, click here.
Since the attempted bombing of a U.S. airliner on Christmas Day, former Homeland Security secretary Michael Chertoff has given dozens of media interviews touting the need for the federal government to buy more full-body scanners for airports. What he has made little mention of is that the Chertoff Group, his security consulting agency, includes a client that manufactures the machines. An airport passengers' rights group ... criticized Chertoff, who left office less than a year ago, for using his former government credentials to advocate for a product that benefits his clients. "Mr. Chertoff should not be allowed to ... privately gain from the sale of full-body scanners under the pretense that the scanners would have detected this particular type of explosive," said Kate Hanni, founder of FlyersRights.org, which opposes the use of the scanners. Chertoff's advocacy for the technology dates back to his time in the Bush administration. In 2005, Homeland Security ordered the government's first batch of the scanners. Today, 40 body scanners are in use at 19 U.S. airports. The number is expected to skyrocket at least in part because of the Christmas Day incident. The Transportation Security Administration this week said it will order 300 more machines.
Note: For lots more on the profiteering that underlies "the war on terror," click here.
A key terror suspect who allegedly helped to plan last year’s attacks in Mumbai and plotted to strike Europe was an American secret agent who went rogue, Indian officials believe. David Headley, 49, who was born in Washington to a Pakistan diplomat father and an American mother, was arrested in Chicago in October. He has denied the charges. He came to the attention of the US security services in 1997 when he was arrested in New York for heroin smuggling. He earned a reduced sentence by working for the US Drug Enforcement Agency (DEA) infiltrating Pakistan-linked narcotics gangs. Indian investigators, who have been denied access to Mr Headley, suspect that he remained on the payroll of the US security services — possibly working for the Central Intelligence Agency (CIA) — but switched his allegiance to LeT. “India is looking into whether Headley worked as a double agent,” an Indian Home Ministry official said yesterday. Mr Headley, who changed his name from Daood Gilani, was in Mumbai until two weeks before the attacks on the city. Despite being firmly on the radar of the US intelligence agencies, he was allowed to return to India as recently as March. Indian officials are furious that their American counterparts did not share details of that visit at the time. The Indian media has raised the possibility that Mr Headley was being protected by his American handlers — a theory that experts say is credible.
Note: For many other reports from major media sources that raise profound questions about the official account of "terrorism," click here.
Palestinian security agents who have been detaining and allegedly torturing supporters of the Islamist organisation Hamas in the West Bank have been working closely with the CIA, the Guardian has learned. Less than a year after Barack Obama signed an executive order that prohibited torture and provided for the lawful interrogation of detainees in US custody, evidence is emerging the CIA is co-operating with security agents whose continuing use of torture has been widely documented by human rights groups. The relationship between the CIA and the two Palestinian agencies involved – Preventive Security Organisation (PSO) and General Intelligence Service (GI) – is said by some western diplomats and other officials in the region to be so close that the American agency appears to be supervising the Palestinians' work. One senior western official said: "The [Central Intelligence] Agency consider them as their property, those two Palestinian services." A diplomatic source added that US influence over the agencies was so great they could be considered "an advanced arm of the war on terror". Among the human rights organisations that have documented or complained about the mistreatment of detainees held by the PA in the West Bank are Amnesty International, Human Rights Watch, al-Haq and the Israeli watchdog B'Tselem.
Note: For many accounts from major media sources of the horrific abuses committed by military, intelligence and security forces in the wars of occupation in Palestine, Iraq and Afghanistan, click here.
American special forces have conducted multiple clandestine raids into Pakistan's tribal areas as part of a secret war in the border region where Washington is pressing to expand its drone assassination programme. A former Nato officer said the incursions, only one of which has been previously reported, occurred between 2003 and 2008, involved helicopter-borne elite soldiers stealing across the border at night, and were never declared to the Pakistani government. "The Pakistanis were kept entirely in the dark about it. It was one of those things we wouldn't confirm officially with them," said the source, who had detailed knowledge of the operations. Such operations are a matter of sensitivity in Pakistan. While public opinion has grudgingly tolerated CIA-led drone strikes in the tribal areas, any hint of American "boots on the ground" is greeted with virulent condemnation. After the only publicly acknowledged special forces raid in September 2008, Pakistan's foreign office condemned it as "a grave provocation" while the military threatened retaliatory action. The military source said that was the fourth raid of previous years. The secretive nature of the raids underscores the suspicious nature of the relationship between the two allies as they argue about Washington's latest demands.
Note: For lots more from reliable sources on the secret realities of the "war on terrorism," click here.
The CIA is to be given broad access to the bank records of millions of Britons under a European Union plan to fight terrorism. The Brussels agreement, which will come into force in two months’ time, requires the 27 EU member states to grant requests for banking information made by the United States under its terrorist finance tracking programme. The EU said it had agreed that Europeans would be compelled to release the information to the CIA “as a matter of urgency”. The records will be kept in a US database for five years before being deleted. Critics say the system is “lopsided” because there is no reciprocal arrangement under which the UK authorities can easily access the bank accounts of US citizens. They also say the plan to sift through cross-border and domestic EU bank accounts gives US intelligence more scope to consult our bank accounts than is granted to law enforcement agencies in the UK or the rest of Europe. This weekend civil liberties groups and privacy campaigners said the surveillance programme, introduced as an emergency measure in 2001, was being imposed on Britain without a proper debate. Shami Chakrabarti, director of Liberty, said: “The massive scope for transferring personal information from Europe to the United States is extremely worrying, especially in the absence of public debate or parliamentary scrutiny either at EU or domestic level.
Note: For reports from major media sources on erosion of privacy by governments and corporations, click here.
Private security guards from Blackwater Worldwide participated in some of the C.I.A.’s most sensitive activities — clandestine raids with agency officers against people suspected of being insurgents in Iraq and Afghanistan and the transporting of detainees, according to former company employees and intelligence officials. The raids against suspects occurred on an almost nightly basis during the height of the Iraqi insurgency from 2004 to 2006, with Blackwater personnel playing central roles in what company insiders called “snatch and grab” operations. Several former Blackwater guards said that their involvement in the operations became so routine that the lines supposedly dividing the Central Intelligence Agency, the military and Blackwater became blurred. Instead of simply providing security for C.I.A. officers, they say, Blackwater personnel at times became partners in missions to capture or kill militants in Iraq and Afghanistan, a practice that raises questions about the use of guns for hire on the battlefield. The secret missions illuminate a far deeper relationship between the spy agency and the private security company than government officials had acknowledged. Blackwater’s ties to the C.I.A. have emerged in recent months, beginning with disclosures in The New York Times that the agency had hired the company as part of a program to assassinate leaders of Al Qaeda and to assist in the C.I.A.’s Predator drone program in Afghanistan and Pakistan.
Note: After this report was published, the CIA announced it had terminated contracts with Blackwater. The reality is that many of Blackwater's services are provided under classified contracts, with both the CIA and the Joint Special Operations Command, so the denial of "contracts" with Blackwater may be deceptive.
The White House has authorized an expansion of the C.I.A.’s drone program in Pakistan’s lawless tribal areas. More C.I.A. drone attacks have been conducted under President Obama than under President George W. Bush. The political consensus in support of the drone program ... and its secrecy have obscured just how radical it is. For the first time in history, a civilian intelligence agency is using robots to carry out a military mission, selecting people for killing in a country where the United States is not officially at war. The drone warfare pioneered by the C.I.A. in Pakistan and the Air Force in Iraq and Afghanistan is the leading edge of a wave of push-button combat that will raise legal, moral and political questions around the world, said P. W. Singer, a scholar at the Brookings Institution and author of the book Wired for War: The Robotics Revolution and Conflict in the 21st Century. So far, only the United States and Israel have used the planes for strikes, but that number will grow. It is impossible to judge whether the program violates international law without knowing whether Pakistan permits the incursions, how targets are selected and what is done to minimize civilian casualties.
Note: For many revealing reports from reliable sources on the realities behind the "war on terror," click here.
President Obama will maintain a lid of secrecy on millions of pages of military and intelligence documents that were scheduled to be declassified by the end of the year. The missed deadline spells trouble for the White House’s promises to introduce an era of government openness, say advocates, who believe that releasing historical information enforces a key check on government behavior. They cite as an example the abuses by the Central Intelligence Agency during the Cold War, including domestic spying and assassinations of foreign officials, that were publicly outlined in a set of agency documents known as the "family jewels." The White House has given the agencies ... an extension beyond Dec. 31 of an undetermined length - possibly years. It will be the third such extension: Clinton granted one in 2000 and Bush granted one in 2003. The documents, dating from World War II to the early 1980s, cover the gamut of foreign relations, intelligence activities, and military operations. The records in question are held by the Central Intelligence Agency; the National Security Agency; the departments of Justice, State, Defense, and Energy; and other security and intelligence agencies. None of the agencies involved responded to requests for comment. Steven Aftergood, a specialist on government secrecy at the Federation of American Scientists in Washington [said] "If binding deadlines can be extended more or less at will, then any new declassification requirements will be similarly subject to doubt or defiance."
Note: These documents are all more than 25 years old. Why can't the public know what their government is trying to hide from them? For lots more on government secrecy, click here.
At a covert forward operating base run by the US Joint Special Operations Command (JSOC) in the Pakistani port city of Karachi, members of an elite division of Blackwater are at the center of a secret program in which they plan targeted assassinations of suspected Taliban and Al Qaeda operatives, "snatch and grabs" of high-value targets and other sensitive action inside and outside Pakistan. The Blackwater operatives also assist in gathering intelligence and help direct a secret US military drone bombing campaign that runs parallel to the well-documented CIA predator strikes, according to a well-placed source within the US military intelligence apparatus. The previously unreported program, the military intelligence source said, is distinct from the CIA assassination program. "This is a parallel operation to the CIA," said the source. "They are two separate beasts." Blackwater's presence in Pakistan is "not really visible, and that's why nobody has cracked down on it," said the source. Blackwater's operations in Pakistan, he said, are not done through State Department contracts or publicly identified Defense contracts. "It's Blackwater via JSOC, and it's a classified no-bid [contract] approved on a rolling basis. Some of these strikes are attributed to [the CIA], but in reality it's JSOC. So when you see some of these hits, especially the ones with high civilian casualties, those are almost always JSOC strikes."
Note: Don't miss this key report in it's entirety. Why haven't other major media outlets mentioned the Joint Special Operations Command (JSOC) drone operations in Pakistan, running parallel to the CIA's?
The investigation into the assassination of Bulgarian dissident Georgi Markov, murdered with a poison-filled pellet shot into his leg (possibly with a converted "umbrella gun") at a bus stop in Britain in 1978, was the most unusual and significant case that medical doctor and forensic specialist Christopher C. Green participated in during his twenty year career as an investigative officer with the Central Intelligence Agency. The reason it was so unique, he says, is that "we had pretty much all of the story from a forensic point of view. We had the body, the thing in the body that he was hit with -- the pellet -- and the stuff from the pellet. We knew that the material used to kill him, ricin, had been under development by a foreign service linked to the incident. We also knew that he had been a target of assassination attempts in the past. The story of him being a target was very well known. So we had information on the means, motive, and the opportunity." In the Markov case, "we had 80 percent of the story," says Green, who is now a professor of diagnostic radiology and psychiatry and behavioral neurosciences at Wayne State University's Detroit Medical Center, where he uses brain imaging techniques to watch how the brain functions as people make decisions. His current work, he says, is a logical outgrowth of his service at the CIA -- where he still serves as a consultant. At the CIA, Green studied how the brain responds to chemicals and neurological agents.
Note: For more on this bizarre case, click here. A 2008 Reuters article on the case is also available here, as is a 2006 New York Times article at this link.
Every phone call, text message, email and website visit made by private citizens is to be stored for a year and will be available for monitoring by government bodies. All telecoms companies and internet service providers will be required by law to keep a record of every customer's personal communications, showing who they have contacted, when and where, as well as the websites they have visited. Despite widespread opposition to the increasing amount of surveillance in Britain, 653 public bodies will be given access to the information, including police, local councils, the Financial Services Authority, the ambulance service, fire authorities and even prison governors. They will not require the permission of a judge or a magistrate to obtain the information, but simply the authorisation of a senior police officer or the equivalent of a deputy head of department at a local authority. The Government announced yesterday it was pressing ahead with privately held "Big Brother" databases that opposition leaders said amounted to "state-spying" and a form of "covert surveillance" on the public. It is doing so despite its own consultation showing that it has little public support. The new rules ... will not only force communications companies to keep their records for longer, but to expand the type of data they keep to include details of every website their customers visit.
Note: For many more reports from major media sources on the disturbing trend toward increasing government and corporate surveillance and loss of privacy, click here.
In a landmark ruling, an Italian judge ... convicted a base chief for the Central Intelligence Agency and 22 other Americans, almost all C.I.A. operatives, of kidnapping a Muslim cleric from the streets of Milan in 2003. The case was a huge symbolic victory for Italian prosecutors, who drew the first convictions involving the American practice of rendition, in which terrorism suspects are captured in one country and taken for questioning in another, often one more open to [torture]. The fact that Italy would actually convict intelligence agents of an allied country was seen as a bold move that could set a precedent in other cases. Judge Oscar Magi handed an eight-year sentence to Robert Seldon Lady, a former C.I.A. base chief in Milan, and five-year sentences to the 22 other Americans, including an Air Force colonel and 21 C.I.A. operatives. Three of the other high-ranking Americans were given diplomatic immunity, including Jeffrey Castelli, a former C.I.A. station chief in Rome. Citing state secrecy, the judge did not convict five high-ranking Italians charged in the abduction, including a former head of Italian military intelligence, Nicolň Pollari. All the Americans were tried in absentia and are considered fugitives. Armando Spataro, the counterterrorism prosecutor who brought the case, said he was considering asking the Italian government for an international arrest warrant for the fugitive Americans. Tom Parker, Amnesty International’s United States point man for terrorism issues, called on the Obama administration to “repudiate the unlawful practice of extraordinary rendition.”
Note: The US government has refused to extradite to Italy the 23 Americans convicted in absentia of kidnapping. Yet the US is pressing for the extradition of 76-year-old Roman Polanski for fleeing the US after serious judicial malfeasance. For an analysis of these contradictions by US authorities over extradition, click here.
Newly released FBI data offer evidence of the broad scope and complexity of the nation's terrorist watch list, documenting a daily flood of names nominated for inclusion to the controversial list. During a 12-month period ended in March this year, for example, the U.S. intelligence community suggested on a daily basis that 1,600 people qualified for the list because they presented a "reasonable suspicion," according to data provided to the Senate Judiciary Committee by the FBI in September and made public last week. The ever-churning list is said to contain more than 400,000 unique names and over 1 million entries. Nine percent of those on the terrorism list, the FBI said, are also on the government's "no fly" list. Before the attacks of Sept. 11, 2001, the FBI needed initial information that a person or group was engaged in wrongdoing before it could open a preliminary investigation. Under current practice, no such information is needed. The inquiries can be opened by individual agents "proactively," meaning on his or her own or in response to a lead about a threat.
Note: For lots more from major media sources on the growing government threats to civil liberties, click here.
A federal appeals court granted the Obama administration's request ... to rehear a case over a Bay Area company's alleged participation in CIA torture flights, setting the stage for a critical test of government claims of secrecy and national security. The Ninth U.S. Circuit Court of Appeals in San Francisco had reinstated a suit in April by five men who accused the company, Jeppesen Dataplan of San Jose, of taking part in the CIA's extraordinary rendition program that led to their imprisonment and torture. The 3-0 ruling rejected arguments by the Bush and Obama administrations that the case concerned secrets too sensitive to disclose in court. The full appeals court set aside that ruling. President Obama criticized the practice [of extraordinary rendition] but refused to disavow it, promising only that no prisoners would be tortured. Ben Wizner, an ACLU attorney, said ... that he was "disappointed that the Obama administration continues to stand in the way of torture victims having their day in court. This case is not about secrecy. It's about immunity from accountability," Wizner said. In the April ruling reinstating the lawsuit, the three-judge appeals court panel said the government and Jeppesen could take steps to protect national secrets as the case proceeded. The panel said the administration's argument, if accepted, would "cordon off all secret government actions from judicial scrutiny, immunizing the CIA and its contractors from the demands and limits of the law."
Note: For many reports from major media sources of growing government threats to civil liberties, click here.
After a Somali-American teenager from Minneapolis committed a suicide bombing in Africa in October 2008, the Federal Bureau of Investigation began investigating whether a Somali Islamist group had recruited him on United States soil. Instead of collecting information only on people about whom they had a tip or links to the teenager, agents fanned out to scrutinize Somali communities. The operation unfolded as the Bush administration was relaxing some domestic intelligence-gathering rules. The F.B.I.’s interpretation of those rules was recently made public when it released, in response to a Freedom of Information lawsuit, its “Domestic Investigations and Operations Guide.” The disclosure of the manual has opened the widest window yet onto how agents have been given greater power in the post-Sept. 11 era. But the manual’s details have alarmed privacy advocates. “It raises fundamental questions about whether a domestic intelligence agency can protect civil liberties if they feel they have a right to collect broad personal information about people they don’t even suspect of wrongdoing,” said Mike German, a former F.B.I. agent who now works for the American Civil Liberties Union. The manual authorizes agents to open an “assessment” to “proactively” seek information about whether people or organizations are involved in national security threats. Assessments permit agents to use potentially intrusive techniques, like sending confidential informants to infiltrate organizations and following and photographing targets in public. When selecting targets, agents are permitted to consider political speech or religion as one criterion.
Note: To read the FBI's recently-released and redacted new "Domestic Investigations and Operation Guide", described by the New York Times as giving "F.B.I. agents the most power in national security matters that they have had since the post-Watergate era," click here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.