Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The British government [has] disclosed once-secret details of the United States' harsh treatment of a former Guantanamo Bay detainee after losing a lengthy legal battle to suppress the information. According to the information, from a judge's summary of a classified CIA report to British authorities, Binyam Mohamed was subjected to "cruel, inhuman and degrading" treatment during interrogations in Pakistan in 2002, including being shackled and deprived of sleep while interrogators played upon "his fears of being removed from United States custody and 'disappearing.' " Mohamed, 31, was born in Ethiopia and lives in Britain. Arrested in Pakistan in 2002, he says he was tortured by American authorities and others under U.S. instruction there and in Morocco. He says he was beaten with a leather strap, subjected to a mock execution and sliced with a scalpel on his chest and penis. Mohamed says Britain knew about his treatment because information used during his questioning could have come only from British intelligence. He spent seven years in detention, four of them at the U.S. military prison at Guantanamo Bay, Cuba. Reprieve, a legal organization representing Mohamed in a lawsuit against the British government, said in a statement that the disclosures show that "the U.S. documented their efforts to abuse Mr. Mohamed" and that British authorities "knew he was being abused and did nothing about it."
Note: For lots more from reliable sources on the illegal actions undertaken by the US and UK in the prosecution of the fraudulent "war on terror," click here.
The director of national intelligence affirmed rather bluntly today that the U.S. intelligence community has authority to target American citizens for assassination if they present a direct terrorist threat to the United States. "We take direct actions against terrorists in the intelligence community; if we think that direct action will involve killing an American, we get specific permission to do that," Director of National Intelligence Dennis Blair told the House Intelligence Committee. "Whether that American is involved in a group that is trying to attack us, whether that American ... is a threat to other Americans. Those are the factors involved." Blair explained. According to U.S. officials, only a handful of Americans would be eligible for targeting by U.S. intelligence or military operations. The DNI said that Internet and social media sites have become critical to terrorism recruitment efforts. "The homegrown radicalization of people in the United States is a relatively new thing." Blair said U.S. intelligence was rapidly working to counter the emerging problem.
Note: To read a valuable commentary on Director of National Intelligence Dennis Blair's claimed "war exception" to the Constitution, permitting assassination of American citizens by the US military and intelligence services without judicial review or legal process of any kind, click here. For the views of several legal experts, click here.
The State Department didn't revoke the visa of foiled terrorism suspect Umar Farouk Abdulmutallab because federal counterterrorism officials had begged off revocation, a top State Department official revealed. Patrick F. Kennedy, an undersecretary for management at the State Department, said Abdulmutallab's visa wasn't taken away because intelligence officials asked his agency not to deny a visa to the suspected terrorist. "Revocation action would have disclosed what they were doing," Kennedy said in testimony before the House Committee on Homeland Security. Since the failed attack, criticism has swirled around leaders of the U.S. intelligence community who have indicated they were warned by the suspect's father about a month before the flight of a potential terror threat, but failed to stop Abdmutallab, despite other warning signs like the fact that he purchased a one-way ticket to Detroit with cash.
Note: So federal counterterrorism officials stopped the bomber's visa from being revoked. Hmmmm... Clearly there is more going on in this case than "failure to connect the dots." Why aren't other major media reporting this important story? Kurt Haskell, a key eyewitness passenger who almost lost his life, has written a powerfully revealing blog piece on what he thinks is really going on, available here. For more on this key case, click here.
The CIA sequence for a Predator strike ends with a missile but begins with a memo. Usually no more than two or three pages long, it bears the name of a suspected terrorist, the latest intelligence on his activities, and a case for why he should be added to a list of people the agency is trying to kill. No U.S. citizen has ever been on the CIA's target list. But that is expected to change as CIA analysts compile a case against a Muslim cleric who was born in New Mexico but now resides in Yemen. He is a U.S. citizen and until recently was mainly known as a preacher espousing radical Islamic views. Awlaki's status as a U.S. citizen requires special consideration, according to former officials familiar with the criteria for the CIA's targeted killing program. But while Awlaki has not yet been placed on the CIA list, the officials said it is all but certain that he will be. The CIA has carried out Predator attacks in Yemen since at least 2002, when a drone strike killed six suspected Al Qaeda operatives traveling in a vehicle across desert terrain. The agency knew that one of the operatives was an American, Kamal Derwish, who was among those killed. Derwish was never on the CIA's target list, officials said, and the strike was aimed at a senior Al Qaeda operative.
Note: As the last few sentences of this long report indicate, assassination of their own citizens by US military and intelligence agencies has been going on for years. For many key reports from reliable sources on assassination as state policy, click here.
Deception [is reliant] on the close control of information, running agents (and double-agents) and creating stories that adversaries will readily believe. In an era of ubiquitous information access, anonymous leaks and public demands for transparency, deception operations are extraordinarily difficult. Nevertheless, successful strategic deception has in the past provided the United States with significant advantages that translated into operational and tactical success. Successful deception also minimizes U.S. vulnerabilities, while simultaneously setting conditions to surprise adversaries. Thus, strategic deception capabilities and plans must perforce be highly classified. Deception cannot succeed in wartime without developing theory and doctrine in peacetime. In order to mitigate or impart surprise, the United States should develop more robust interagency deception planning and action prior to the need for military operations. To be effective, a permanent standing office with strong professional intelligence and operational expertise needs to be established.
Note: The above excerpts can be found on pages 77 and 78. For a powerful two-page summary of a top general's description of how the American public is deceived into supporting war, click here.
U.S. securities regulators [at the Securities and Exchange Commission] originally treated the New York Federal Reserve's bid to keep secret many of the details of the American International Group bailout like a request to protect matters of national security. The SEC ... agreed to limit the number of SEC employees who would review the document to just two and keep the document locked in a safe while the SEC considered AIG's confidentiality request. The SEC had also agreed that if it determined the document should not be made public, it would be stored "in a special area where national security related files are kept." Emails ... that have become public in recent weeks reveal that some at the New York Fed had gone to great lengths to keep the terms of the bailout private and the SEC may have played a role in contributing to some of the secrecy surrounding the AIG rescue package. "The New York Fed was orchestrating what can only be characterized as an extreme effort to ensure that details of the counterparty deal stayed secret," Rep. Darrell Issa ... said. "More and more it looks as if they would've kept the details of the deal secret indefinitely, it they could have."
Note: So now bank transactions are being considered a matter of "national security." What next? It's becoming ever more apparent that "national security" is used as a catch-all phrase for information that those in power don't want us to know about their secret dealings which benefit themselves at the expense of most of the rest of us.
The investigation of the 2001 anthrax attacks ended as far as the public knew on July 29, 2008, with the death of Bruce Ivins, a senior biodefense researcher at the U.S. Army Medical Research Institute of Infectious Diseases in Fort Detrick, Md. Less than a week after his apparent suicide, the FBI declared Ivins to have been the sole perpetrator of the 2001 Anthrax attacks. The FBI [had] turned the pressure up on him, isolating him at work and forcing him to spend what little money he had on lawyers to defend himself. He became increasingly stressed. Then came his suicide (which, as Eric Nadler and Bob Coen show in their documentary "The Anthrax War," was one of four suicides among American and British biowarfare researchers in past years). But there was still a vexing problem. Silicon was used in the 1960s to weaponize anthrax. Anthrax spores were coated with the substance to prevent them from clinging together so as to create a lethal aerosol. But since weaponization was banned by international treaties, research anthrax no longer contains silicon, and the [anthrax] at Fort Detrick contained none. Ivins, no matter how weird he may have been, had neither the set of skills nor the means to attach silicon to anthrax spores. If Ivins had neither the equipment or skills to weaponize anthrax with silicon, then some other party with access to the anthrax must have done it.
Note: As usual, the FBI tries to pin it on one wacko, when it is clear others most have been involved. Remember that the anthrax attacks occurred as Congress was considering the PATRIOT Act, and were directed in part at key senators opposed to the act. Congress was shut down for a period, and when it reconvened it passed the bill without discussion. For lots more on the antrax attacks as a likely false-flag operation, click here.
U.S. military teams and intelligence agencies are deeply involved in secret joint operations with Yemeni troops who in the past six weeks have killed scores of people. The operations, approved by President Obama, involve several dozen troops from the U.S. military's clandestine Joint Special Operations Command (JSOC), whose main mission is tracking and killing [targeted persons]. Obama approved a Dec. 24 strike against a compound where a U.S. citizen, Anwar al-Aulaqi, was thought to be. He has since been added to a shortlist of U.S. citizens specifically targeted for killing or capture by the JSOC. The combined efforts have resulted in more than two dozen ground raids and airstrikes. After the Sept. 11 attacks, Bush gave the CIA, and later the military, authority to kill U.S. citizens abroad. The Obama administration has adopted the same stance. Both the CIA and the JSOC maintain lists of individuals, called "High Value Targets" and "High Value Individuals," whom they seek to kill or capture. The JSOC list includes three Americans, including Aulaqi, whose name was added late last year. As of several months ago, the CIA list [also] included three U.S. citizens.
Note: For many reports from reliable sources on the growing governmental threats to civil liberties, click here.
The FBI illegally collected more than 2,000 U.S. telephone call records between 2002 and 2006 by invoking terrorism emergencies that did not exist or simply persuading phone companies to provide records, according to internal bureau memos and interviews. FBI officials issued approvals after the fact to justify their actions. E-mails obtained by The Washington Post detail how counterterrorism officials inside FBI headquarters did not follow their own procedures that were put in place to protect civil liberties. A Justice Department inspector general's report due out this month is expected to conclude that the FBI frequently violated the law with its emergency requests. FBI officials said they thought that nearly all of the requests involved terrorism investigations. FBI general counsel Valerie Caproni said ... that the FBI technically violated the Electronic Communications Privacy Act when agents invoked nonexistent emergencies to collect records.
Note: The FBI, by admitting that "nearly all" of the phone records they obtained were related to "terrorism investigations," make it clear that some were not. But they used claims of "terrorism emergency" to obtain them. These they then assert were merely "technical" violations. For many disturbing reports from major media sources on the increasing threats to civil liberties under the pretext of the "war on terrorism," click here.
The Transportation Security Administration ... has on its web site a “mythbuster” that tries to reassure the public. Myth: The No-Fly list includes an 8-year-old boy. Buster: No 8-year-old is on a T.S.A. watch list. “Meet Mikey Hicks,” said Najlah Feanny Hicks, introducing her 8-year-old son, a New Jersey Cub Scout and frequent traveler who has seldom boarded a plane without a hassle because he shares the name of a suspicious person. “It’s not a myth.” Hicks’s mother initially sensed trouble when he was a baby and she could not get a seat for him on their flight to Florida at an airport kiosk; airline officials explained that his name “was on the list,” she recalled. The first time he was patted down, at Newark Liberty International Airport, Mikey was 2. He cried. After years of long delays and waits for supervisors at every airport ticket counter, this year’s vacation to the Bahamas badly shook up the family. Mikey was frisked on the way there, then more aggressively on the way home. “Up your arms, down your arms, up your crotch — someone is patting your 8-year-old down like he’s a criminal,” Mrs. Hicks recounted. It is true that Mikey is not on the federal government’s “no-fly” list, which includes about 2,500 people, less than 10 percent of them from the United States. But his name appears to be among some 13,500 on the larger “selectee” list, which sets off a high level of security screening.
Note: For many reports from major media sources on the extreme loss of liberties brought about by the highly touted "war on terrorism," click here.
The nation’s top scientists and spies are collaborating on an effort to use the federal government’s intelligence assets — including spy satellites and other classified sensors — to assess the hidden complexities of environmental change. The collaboration ... has the strong backing of the director of the Central Intelligence Agency. Secrecy cloaks the monitoring effort ... because the United States wants to keep foes and potential enemies in the dark about the abilities of its spy satellites and other sensors. Controversy has often dogged the use of federal intelligence gear for environmental monitoring. About 60 scientists — mainly from academia but including some from industry and federal agencies — run the effort’s scientific side. All have secret clearances. The C.I.A. runs the program and arranges for the scientists to draw on federal surveillance equipment, including highly classified satellites of the National Reconnaissance Office. Officials said the effort to restart the program originated on Capitol Hill in 2008 after former Vice President Al Gore argued for its importance with Senator Dianne Feinstein, Democrat of California, who was then a member of the Senate Intelligence Committee; she became its chairwoman in early 2009.
Note: What happens to the public perception of science if research relies increasingly on secret data and collaboration with spy agencies? How could the results of important studies be verified by independent researchers? For lots more on the ever-expanding world of government secrecy, click here.
Since the attempted bombing of a U.S. airliner on Christmas Day, former Homeland Security secretary Michael Chertoff has given dozens of media interviews touting the need for the federal government to buy more full-body scanners for airports. What he has made little mention of is that the Chertoff Group, his security consulting agency, includes a client that manufactures the machines. An airport passengers' rights group ... criticized Chertoff, who left office less than a year ago, for using his former government credentials to advocate for a product that benefits his clients. "Mr. Chertoff should not be allowed to ... privately gain from the sale of full-body scanners under the pretense that the scanners would have detected this particular type of explosive," said Kate Hanni, founder of FlyersRights.org, which opposes the use of the scanners. Chertoff's advocacy for the technology dates back to his time in the Bush administration. In 2005, Homeland Security ordered the government's first batch of the scanners. Today, 40 body scanners are in use at 19 U.S. airports. The number is expected to skyrocket at least in part because of the Christmas Day incident. The Transportation Security Administration this week said it will order 300 more machines.
Note: For lots more on the profiteering that underlies "the war on terror," click here.
A key terror suspect who allegedly helped to plan last year’s attacks in Mumbai and plotted to strike Europe was an American secret agent who went rogue, Indian officials believe. David Headley, 49, who was born in Washington to a Pakistan diplomat father and an American mother, was arrested in Chicago in October. He has denied the charges. He came to the attention of the US security services in 1997 when he was arrested in New York for heroin smuggling. He earned a reduced sentence by working for the US Drug Enforcement Agency (DEA) infiltrating Pakistan-linked narcotics gangs. Indian investigators, who have been denied access to Mr Headley, suspect that he remained on the payroll of the US security services — possibly working for the Central Intelligence Agency (CIA) — but switched his allegiance to LeT. “India is looking into whether Headley worked as a double agent,” an Indian Home Ministry official said yesterday. Mr Headley, who changed his name from Daood Gilani, was in Mumbai until two weeks before the attacks on the city. Despite being firmly on the radar of the US intelligence agencies, he was allowed to return to India as recently as March. Indian officials are furious that their American counterparts did not share details of that visit at the time. The Indian media has raised the possibility that Mr Headley was being protected by his American handlers — a theory that experts say is credible.
Note: For many other reports from major media sources that raise profound questions about the official account of "terrorism," click here.
Palestinian security agents who have been detaining and allegedly torturing supporters of the Islamist organisation Hamas in the West Bank have been working closely with the CIA, the Guardian has learned. Less than a year after Barack Obama signed an executive order that prohibited torture and provided for the lawful interrogation of detainees in US custody, evidence is emerging the CIA is co-operating with security agents whose continuing use of torture has been widely documented by human rights groups. The relationship between the CIA and the two Palestinian agencies involved – Preventive Security Organisation (PSO) and General Intelligence Service (GI) – is said by some western diplomats and other officials in the region to be so close that the American agency appears to be supervising the Palestinians' work. One senior western official said: "The [Central Intelligence] Agency consider them as their property, those two Palestinian services." A diplomatic source added that US influence over the agencies was so great they could be considered "an advanced arm of the war on terror". Among the human rights organisations that have documented or complained about the mistreatment of detainees held by the PA in the West Bank are Amnesty International, Human Rights Watch, al-Haq and the Israeli watchdog B'Tselem.
Note: For many accounts from major media sources of the horrific abuses committed by military, intelligence and security forces in the wars of occupation in Palestine, Iraq and Afghanistan, click here.
American special forces have conducted multiple clandestine raids into Pakistan's tribal areas as part of a secret war in the border region where Washington is pressing to expand its drone assassination programme. A former Nato officer said the incursions, only one of which has been previously reported, occurred between 2003 and 2008, involved helicopter-borne elite soldiers stealing across the border at night, and were never declared to the Pakistani government. "The Pakistanis were kept entirely in the dark about it. It was one of those things we wouldn't confirm officially with them," said the source, who had detailed knowledge of the operations. Such operations are a matter of sensitivity in Pakistan. While public opinion has grudgingly tolerated CIA-led drone strikes in the tribal areas, any hint of American "boots on the ground" is greeted with virulent condemnation. After the only publicly acknowledged special forces raid in September 2008, Pakistan's foreign office condemned it as "a grave provocation" while the military threatened retaliatory action. The military source said that was the fourth raid of previous years. The secretive nature of the raids underscores the suspicious nature of the relationship between the two allies as they argue about Washington's latest demands.
Note: For lots more from reliable sources on the secret realities of the "war on terrorism," click here.
The CIA is to be given broad access to the bank records of millions of Britons under a European Union plan to fight terrorism. The Brussels agreement, which will come into force in two months’ time, requires the 27 EU member states to grant requests for banking information made by the United States under its terrorist finance tracking programme. The EU said it had agreed that Europeans would be compelled to release the information to the CIA “as a matter of urgency”. The records will be kept in a US database for five years before being deleted. Critics say the system is “lopsided” because there is no reciprocal arrangement under which the UK authorities can easily access the bank accounts of US citizens. They also say the plan to sift through cross-border and domestic EU bank accounts gives US intelligence more scope to consult our bank accounts than is granted to law enforcement agencies in the UK or the rest of Europe. This weekend civil liberties groups and privacy campaigners said the surveillance programme, introduced as an emergency measure in 2001, was being imposed on Britain without a proper debate. Shami Chakrabarti, director of Liberty, said: “The massive scope for transferring personal information from Europe to the United States is extremely worrying, especially in the absence of public debate or parliamentary scrutiny either at EU or domestic level.
Note: For reports from major media sources on erosion of privacy by governments and corporations, click here.
Private security guards from Blackwater Worldwide participated in some of the C.I.A.’s most sensitive activities — clandestine raids with agency officers against people suspected of being insurgents in Iraq and Afghanistan and the transporting of detainees, according to former company employees and intelligence officials. The raids against suspects occurred on an almost nightly basis during the height of the Iraqi insurgency from 2004 to 2006, with Blackwater personnel playing central roles in what company insiders called “snatch and grab” operations. Several former Blackwater guards said that their involvement in the operations became so routine that the lines supposedly dividing the Central Intelligence Agency, the military and Blackwater became blurred. Instead of simply providing security for C.I.A. officers, they say, Blackwater personnel at times became partners in missions to capture or kill militants in Iraq and Afghanistan, a practice that raises questions about the use of guns for hire on the battlefield. The secret missions illuminate a far deeper relationship between the spy agency and the private security company than government officials had acknowledged. Blackwater’s ties to the C.I.A. have emerged in recent months, beginning with disclosures in The New York Times that the agency had hired the company as part of a program to assassinate leaders of Al Qaeda and to assist in the C.I.A.’s Predator drone program in Afghanistan and Pakistan.
Note: After this report was published, the CIA announced it had terminated contracts with Blackwater. The reality is that many of Blackwater's services are provided under classified contracts, with both the CIA and the Joint Special Operations Command, so the denial of "contracts" with Blackwater may be deceptive.
The White House has authorized an expansion of the C.I.A.’s drone program in Pakistan’s lawless tribal areas. More C.I.A. drone attacks have been conducted under President Obama than under President George W. Bush. The political consensus in support of the drone program ... and its secrecy have obscured just how radical it is. For the first time in history, a civilian intelligence agency is using robots to carry out a military mission, selecting people for killing in a country where the United States is not officially at war. The drone warfare pioneered by the C.I.A. in Pakistan and the Air Force in Iraq and Afghanistan is the leading edge of a wave of push-button combat that will raise legal, moral and political questions around the world, said P. W. Singer, a scholar at the Brookings Institution and author of the book Wired for War: The Robotics Revolution and Conflict in the 21st Century. So far, only the United States and Israel have used the planes for strikes, but that number will grow. It is impossible to judge whether the program violates international law without knowing whether Pakistan permits the incursions, how targets are selected and what is done to minimize civilian casualties.
Note: For many revealing reports from reliable sources on the realities behind the "war on terror," click here.
President Obama will maintain a lid of secrecy on millions of pages of military and intelligence documents that were scheduled to be declassified by the end of the year. The missed deadline spells trouble for the White House’s promises to introduce an era of government openness, say advocates, who believe that releasing historical information enforces a key check on government behavior. They cite as an example the abuses by the Central Intelligence Agency during the Cold War, including domestic spying and assassinations of foreign officials, that were publicly outlined in a set of agency documents known as the "family jewels." The White House has given the agencies ... an extension beyond Dec. 31 of an undetermined length - possibly years. It will be the third such extension: Clinton granted one in 2000 and Bush granted one in 2003. The documents, dating from World War II to the early 1980s, cover the gamut of foreign relations, intelligence activities, and military operations. The records in question are held by the Central Intelligence Agency; the National Security Agency; the departments of Justice, State, Defense, and Energy; and other security and intelligence agencies. None of the agencies involved responded to requests for comment. Steven Aftergood, a specialist on government secrecy at the Federation of American Scientists in Washington [said] "If binding deadlines can be extended more or less at will, then any new declassification requirements will be similarly subject to doubt or defiance."
Note: These documents are all more than 25 years old. Why can't the public know what their government is trying to hide from them? For lots more on government secrecy, click here.
At a covert forward operating base run by the US Joint Special Operations Command (JSOC) in the Pakistani port city of Karachi, members of an elite division of Blackwater are at the center of a secret program in which they plan targeted assassinations of suspected Taliban and Al Qaeda operatives, "snatch and grabs" of high-value targets and other sensitive action inside and outside Pakistan. The Blackwater operatives also assist in gathering intelligence and help direct a secret US military drone bombing campaign that runs parallel to the well-documented CIA predator strikes, according to a well-placed source within the US military intelligence apparatus. The previously unreported program, the military intelligence source said, is distinct from the CIA assassination program. "This is a parallel operation to the CIA," said the source. "They are two separate beasts." Blackwater's presence in Pakistan is "not really visible, and that's why nobody has cracked down on it," said the source. Blackwater's operations in Pakistan, he said, are not done through State Department contracts or publicly identified Defense contracts. "It's Blackwater via JSOC, and it's a classified no-bid [contract] approved on a rolling basis. Some of these strikes are attributed to [the CIA], but in reality it's JSOC. So when you see some of these hits, especially the ones with high civilian casualties, those are almost always JSOC strikes."
Note: Don't miss this key report in it's entirety. Why haven't other major media outlets mentioned the Joint Special Operations Command (JSOC) drone operations in Pakistan, running parallel to the CIA's?
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.