Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Five reporters must reveal their government sources for stories they wrote about Steven J. Hatfill and investigators' suspicions that the former Army scientist was behind the deadly anthrax attacks of 2001, a federal judge ruled. The ruling is a victory for Hatfill, a bioterrorism expert who has argued in a civil suit that the government violated his privacy rights and ruined his chances at a job by unfairly leaking information about the probe. He has not been charged in the attacks that killed five people and sickened 17 others, and he has denied wrongdoing. Hatfill's suit, filed in 2003, accuses the government of waging a "coordinated smear campaign." To succeed, Hatfill and his attorneys have been seeking the identities of FBI and Justice Department officials who disclosed disparaging information about him to the media. In lengthy depositions in the case, reporters have identified 100 instances when Justice or FBI sources provided them with information about the investigation of Hatfill and the techniques used to probe his possible role in anthrax-laced mailings. But the reporters have refused to name the individuals. In 2002, then-Attorney General John D. Ashcroft called Hatfill, who had formerly worked at the Army's infectious diseases lab in Fort Detrick in Frederick County, a "person of interest" in the anthrax case. Authorities have not made any arrests in the investigation. Hatfill's search for government leakers is "strikingly similar" to the civil suit filed by Wen Ho Lee, a nuclear scientist who became the subject of a flurry of media stories identifying him as a chief suspect in a nuclear-secrets spy case. Those stories also relied on anonymous sources. Lee was never charged with espionage.
Note: For more reliable information about the anthrax attacks that followed closely after 9/11 and the mysterious deaths of over a dozen renowned microbiologists shortly thereafter, click here.
Eric Olson now has a new verb for what happened to his father, Frank Olson, who worked for the Army's top-secret Special Operations Division at Fort Detrick, where he developed bioweapons and experimented with mind-control drugs. Eric Olson found the verb in a 1950s CIA manual. The verb is "dropped." And the manual is a how-to guide for assassins. "The most efficient accident, in simple assassination, is a fall of 75 feet or more onto a hard surface," the manual says, adding helpfully: "It will usually be necessary to stun or drug the subject before dropping him." Eric Olson believes his father -- who developed misgivings about his work and tried to resign -- was murdered by government agents to protect dark government secrets. "No assassination instructions should ever be written or recorded," says the CIA assassination manual. "Decision and instructions should be confined to an absolute minimum of persons." It adds: "For secret assassination the contrived accident is the most effective technique. When successfully executed, it causes little excitement and is only casually investigated." William P. Walter, 78, who supervised anthrax production at Detrick, says Olson's colleagues were divided about his death. "Some say he jumped. Some say he had help," Walter says. "I'm one of the 'had-help' people." So is James Starrs, a George Washington University forensic pathologist who ... called the evidence "rankly and starkly suggestive of homicide." In a report to the CIA on the death, [Harold] Abramson, [a doctor who had experimented with LSD] wrote that the LSD experiment was designed "especially to trap (Olson)." This ... raised a troubling possibility: that the LSD experiment was actually designed to see whether Olson could still be trusted to keep the agency's dark secrets.
Note: Frank Olson was just one of many tragic casualties of the CIA's mind-control programs. For revealing information on this secret history, click here.
The Bush administration plans to leave oversight of its expanded foreign eavesdropping program to the same government officials who supervise the surveillance activities and to the intelligence personnel who carry them out, senior government officials said yesterday. The law, which permits intercepting Americans' calls and e-mails without a warrant if the communications involve overseas transmission, gives Director of National Intelligence Mike McConnell and Attorney General Alberto R. Gonzales responsibility for creating the broad procedures determining whose telephone calls and e-mails are collected. It also gives McConnell and Gonzales the role of assessing compliance with those procedures. The law ... does not contain provisions for outside oversight -- unlike an earlier House measure that called for audits every 60 days by the Justice Department's inspector general. The controversial changes to the 1978 Foreign Intelligence Surveillance Act were approved by both chambers of the Democratic-controlled Congress despite privacy concerns raised by Democratic leaders and civil liberties advocacy groups. Central to the new program is the collection of foreign intelligence from "communication service providers," which the officials declined to identify, citing secrecy concerns. Under the new law, the attorney general is required to draw up the governing procedures for surveillance activity, for approval by the Foreign Intelligence Surveillance Court. Once the procedures are established, the attorney general and director of national intelligence will formally certify that the collection of data is authorized. But the certification will be placed under seal "unless the certification is necessary to determine the legality of the acquisition," according to the law signed by Bush.
The Bush administration rushed to defend new espionage legislation Monday amid growing concern that the changes could lead to increased spying by U.S. intelligence agencies on American citizens. But officials declined to provide details about how the new capabilities might be used by the National Security Agency and other spy services. And in many cases, they could point only to internal monitoring mechanisms to prevent abuse of the new rules that appear to give the government greater authority to tap into the traffic flowing across U.S. telecommunications networks. Officials rejected assertions that the new capabilities would enable the government to cast electronic "drift nets" that might ensnare U.S. citizens [and] that the new legislation would amount to the expansion of a controversial — and critics contend unconstitutional — warrantless wiretapping program that President Bush authorized after the 9/11 attacks. Intelligence experts said there were an array of provisions in the new legislation that appeared to make it possible for the government to engage in intelligence-collection activities that the Bush administration officials were discounting. "They are trying to shift the terms of the debate to their intentions and away from the meaning of the new law," said Steven Aftergood, an intelligence policy analyst at the Federation of American Scientists. "The new law gives them authority to do far more than simply surveil foreign communications abroad," he said. "It expands the surveillance program beyond terrorism to encompass foreign intelligence. It permits the monitoring of communications of a U.S. person as long as he or she is not the primary target. And it effectively removes judicial supervision of the surveillance process."
Airlines and aviation-related companies sued the CIA and the FBI on Tuesday to force terrorism investigators to tell whether the aviation industry was to blame for the Sept. 11 attacks. The two lawsuits in U.S. District Court in Manhattan sought court orders for depositions as the aviation entities build their defenses against lawsuits seeking billions of dollars in damages for injuries, fatalities, property damage and business losses related to Sept. 11, 2001. The aviation companies said the agencies in a series of boilerplate letters had refused to let them depose two secret agents, including the 2001 head of the CIA's special Osama bin Laden unit, and six FBI agents with key information about al-Qaida and bin Laden. The [plaintiffs] said they were entitled to present evidence to show the terrorist attacks did not depend upon negligence by any aviation defendants and that there were other causes of the attacks. In the CIA lawsuit, companies ... asked to interview the deputy chief of the CIA's bin Laden unit in 2001 and an FBI agent assigned to the unit at that time. The names of both are secret. In the FBI lawsuit, the companies asked to interview five former and current FBI employees who had participated in investigations of al-Qaida and al-Qaida operatives before and after Sept. 11. Those individuals included Coleen M. Rowley, the former top FBI lawyer in its Minneapolis office, who sent a scathing letter to FBI Director Robert S. Mueller in May 2002 complaining that a supervisor in Washington interfered with the Minnesota investigation of Zacarias Moussaoui weeks before the Sept. 11 attacks. Requests to interview the agents were rejected as not sufficiently explained, burdensome or protected by investigative or attorney-client privilege, the lawsuits said.
Note: For a concise summary of reliable, verifiable information on the 9/11 coverup, click here.
New charges have been filed alleging that a former top CIA official pushed a proposed $100 million government contract for his best friend in return for lavish vacations, private jet flights and a lucrative job offer. The indictment [brings] charges ... against Kyle “Dusty” Foggo, who resigned from the spy agency a year ago, and ... defense contractor Brent Wilkes. The charges grew from the bribery scandal that landed former U.S. Rep. Randy “Duke” Cunningham in prison. The pair now face 30 wide-ranging counts of fraud, conspiracy and money laundering [including that] Foggo provided Wilkes with “sensitive, internal information related to ... national security,” including classified information, to help him prepare proposals for providing undercover flights for the CIA under the guise of a civil aviation company and armored vehicles for agency operations. Then, he pushed his CIA colleagues to hire Wilkes’ companies without disclosing their friendship, prosecutors allege. In a June 2005 e-mail to the head of CIA air operations quoted in the indictment, Foggo offered to “use some ’EXDIR grease”’ on Wilkes’ behalf. Foggo was the agency’s executive director at the time. In return, Wilkes offered to hire Foggo after he retired from government service. [An] initial indictment in February charged the pair with 11 counts of the same charges in connection with a $1.7 million water-supply contract Foggo allegedly helped win for one of Wilkes’ companies while he was working as a logistics coordinator at a CIA supply hub overseas. Foggo, the former No. 3 official at the CIA, resigned from the spy agency after his house and office were raided by federal agents.
Note: Until just a few years ago, there was a virtual blackout in the media on any negative coverage of the CIA. The prosecution of the #3 man in the CIA is an external manifestation of huge shake-ups going on behind the scenes. Buzzy Krongard, the previous #3 at the CIA has been linked to the millions of dollars in suspicious stock option trades made just prior to 9/11 that were never claimed, though this received little media coverage.
The Bush administration's chief intelligence official said yesterday that President Bush authorized a series of secret surveillance activities under a single executive order in late 2001. The disclosure makes clear that a controversial National Security Agency program was part of a much broader operation than the president previously described. The disclosure by Mike McConnell [is] the first time that the administration has publicly acknowledged that Bush's order included undisclosed activities beyond the warrantless surveillance of e-mails and phone calls that Bush confirmed in December 2005. McConnell [disclosed] that the executive order following the Sept. 11, 2001 attacks included "a number of . . . intelligence activities" and that a name routinely used by the administration -- the Terrorist Surveillance Program -- applied only to "one particular aspect of these activities, and nothing more. This is the only aspect of the NSA activities that can be discussed publicly, because it is the only aspect of those various activities whose existence has been officially acknowledged." News reports ... have detailed a range of activities linked to the program, including the use of data mining to identify surveillance targets and the participation of telecommunication companies in turning over millions of phone records. Kate Martin ... of the Center for National Security Studies, said the new disclosures show that ... administration officials have "repeatedly misled the Congress and the American public" about the extent of NSA surveillance efforts. "They have repeatedly tried to give the false impression that the surveillance was narrow and justified," Martin said. "Why did it take accusations of perjury before the DNI disclosed that there is indeed other, presumably broader and more questionable, surveillance?"
President Bush set broad legal boundaries for the CIA's harsh interrogation of terrorism suspects yesterday, allowing the intelligence agency to resume a program that was suspended last year after criticism that it violated U.S. and international law. In an executive order lacking any details about actual interrogation techniques, Bush said the CIA program will now comply with a Geneva Conventions prohibition against "outrages upon personal dignity, in particular humiliating and degrading treatment." Two administration officials said that suspects now in U.S. custody could be moved immediately into the "enhanced interrogation" program and subjected to techniques that go beyond those allowed by the U.S. military. Rights activists criticized Bush's order for failing to spell out which techniques are now approved or prohibited. "All the order really does is to have the president say, 'Everything in that other document that I'm not showing you is legal -- trust me,' " said Tom Malinowski of Human Rights Watch. The CIA interrogation guidelines are contained in a classified document. A senior intelligence official, asked whether this list includes such widely criticized methods as the simulated drowning known as "waterboarding," declined to discuss specifics but said "it would be very wrong to assume that the program of the past would move into the future unchanged." CIA detainees have also alleged they were left naked in cells for prolonged periods, subjected to sensory and sleep deprivation and extreme heat and cold, and sexually taunted. A senior administration official briefing reporters yesterday said that any future use of "extremes of heat and cold" would be subject to a "reasonable interpretation . . . we're not talking about forcibly induced hypothermia."
An independent oversight board created to identify intelligence abuses after the CIA scandals of the 1970s did not send any reports to the attorney general of legal violations during the first 5 1/2 years of the Bush administration's counterterrorism effort, the Justice Department has told Congress. The President's Intelligence Oversight Board -- the principal civilian watchdog of the intelligence community -- is obligated under a 26-year-old executive order to tell the attorney general and the president about any intelligence activities it believes "may be unlawful." The board was vacant for the first two years of the Bush administration. The board's mandate is to provide independent oversight, so the absence of such communications has prompted critics to question whether the board was doing its job. "It's now apparent that the IOB was not actively employed in the early part of the administration. And it was a crucial period when its counsel would seem to have been needed the most," said Anthony Harrington, who served as the board's chairman for most of the Clinton administration. Senate Judiciary Committee chairman Patrick J. Leahy (D-Vt.) added: "It is deeply disturbing that this administration seems to spend so much of its energy and resources trying to find ways to ignore any check and balance on its authority and avoid accountability to Congress and the American public."
The Federal Bureau of Investigation is developing a computer-profiling system that would enable investigators to target possible terror suspects. The System to Assess Risk, or STAR, assigns risk scores to possible suspects based on a variety of information, similar to the way a credit bureau assigns a rating based on a consumer's spending behavior and debt. The program focuses on foreign suspects but also includes data about some U.S. residents. Some lawmakers said ... that the report raises new questions about the government's power to use personal information and intelligence without accountability. "The Bush administration has expanded the use of this technology, often in secret, to collect and sift through Americans' most sensitive personal information," said Sen. Patrick J. Leahy (D-Vt.), chairman of the Senate Judiciary Committee. The use of data mining in the war on terror has sparked criticism. An airplane-passenger screening program called CAPPS II was revamped and renamed because of civil liberty concerns. An effort to collect Americans' personal and financial data called Total Information Awareness was killed. Law enforcement and national security officials have continued working on other programs to use computers to sift through information for signs of threats. The Department of Homeland Security, for example, flags travelers entering and leaving the United States who may be potential suspects through a risk-assessment program called the Automated Targeting System.
A proposed new FBI program would skirt federal laws by paying private companies to hold millions of phone and Internet records which the bureau is barred from keeping itself, experts say. The $5 million project would apparently pay private firms to store at least two years' worth of telephone and Internet activity by millions of Americans, few of whom would ever be considered a suspect in any terrorism, intelligence or criminal matter. The FBI is barred by law from collecting and storing such data if it has no connection to a specific investigation or intelligence matter. In recent years the bureau has tried to encourage telecommunications firms to voluntarily store such information, but corporations have balked at the cost of keeping records they don't need. "The government isn't allowed to warehouse the information, and the companies don't want to, so this creates a business incentive for the companies to warehouse it, so the government can access it later," said Mike German, a policy expert on national security and privacy issues for the American Civil Liberties Union (ACLU). "It's a public-private partnership that puts civil liberties to the test." In March, an FBI official identified the companies as Verizon, MCI and AT&T. Even the bureau's own top lawyer said she found the [FBI's] behavior "disturbing," noting that when requesting access to phone company records, it repeatedly referenced "emergency" situations that did not exist, falsely claimed grand juries had subpoenaed information and failed to keep records on much of its own activity.
In April 1971, CIA officer John Seabury Thomson paddled his aluminum canoe across the Potomac on his daily commute from his home in Maryland to CIA headquarters in Langley. When he reached the Virginia shore, he noticed a milky substance clouding the waters around Pulp Run. A fierce environmentalist, Thomson traced the pollution to its source: his employer. The murky white discharge was a chemical mash, the residue of thousands of liquefied secrets that the agency had been quietly disposing of in his beloved river. He single-handedly brought the practice to a halt. Nearly four decades later, though, that trickle of secrets would be a tsunami that would capsize Thomson's small craft. Today the nation's obsession with secrecy is redefining public and private institutions and taking a toll on the lives of ordinary citizens. Excessive secrecy is at the root of multiple scandals -- the phantom weapons of mass destruction, the collapse of Enron, the tragedies traced to Firestone tires and the arthritis drug Vioxx, and more. In this self-proclaimed "Information Age," our country is on the brink of becoming a secretocracy, a place where the right to know is being replaced by the need to know. [There] is a confluence of causes behind it, among them the chill wrought by 9/11, industry deregulation, the long dominance of a single political party, fear of litigation and liability and the threat of the Internet. But perhaps most alarming [is] the public's increasing tolerance of secrecy. Without timely information, citizens are reduced to mere residents, and representative government atrophies into a representational image of democracy as illusory as a hologram.
Note: The author of this superb article is Ted Gup. He is a journalism professor at Case Western Reserve University and author of Nation of Secrets: The Threat to Democracy and the American Way of Life.
The most intriguing secrets of the "war on terror" have nothing to do with al-Qaeda and its fellow travelers. They're about the mammoth private spying industry that all but runs U.S. intelligence operations today. In April, Director of National Intelligence Mike McConnell was poised to publicize a year-long examination of outsourcing by U.S. intelligence agencies. But the report was inexplicably delayed -- and suddenly classified a national secret. What McConnell doesn't want you to know is that the private spy industry has succeeded where no foreign government has: It has penetrated the CIA and is running the show. Over the past five years (some say almost a decade), there has been a revolution in the intelligence community toward wide-scale outsourcing. Private companies now perform key intelligence-agency functions, to the tune ... of more than $42 billion a year. Intelligence professionals [say] that more than 50 percent of the National Clandestine Service (NCS) -- the heart, brains and soul of the CIA -- has been outsourced to private firms such as Abraxas, Booz Allen Hamilton, Lockheed Martin and Raytheon. These firms recruit spies, create non-official cover identities and control the movements of CIA case officers. They also provide case officers and watch officers at crisis centers and regional desk officers who control clandestine operations worldwide. As The Los Angeles Times first reported last October, more than half the workforce in two key CIA stations -- Baghdad and Islamabad, Pakistan -- is made up of industrial contractors, or "green badgers," in CIA parlance. Intelligence insiders say that entire branches of the NCS have been outsourced to private industry.
A Montreal senior who survived Cold War-era brainwashing experiments picked up a cheque for compensation from the [Canadian] federal government on Tuesday. Janine Huard, 79, accepted an offer to end her class-action lawsuit against the federal government, which jointly funded the experiments with the [U.S.] Central Intelligence Agency. The terms of the settlement are confidential, but Huard says it will allow her to live out her days in peace, with some peace of mind. "I was really so exhausted from fighting for so many years,'' Huard told The Canadian Press in an interview. Huard was a young mother of four suffering from post-partum depression when she checked herself into McGill's renowned Allen Memorial Institute in 1950. On and off for the next 15 years, she was one of hundreds of patients of Dr. Ewan Cameron subjected to experimental treatments that included massive electroshock therapy, experimental pills and LSD. The patients were induced into comas and exposed to repetitive messages for days on end to brainwash them. Cameron pioneered a technique called psychic driving, which he believed could erase harmful memories and rebuild psyches without psychiatric defect. The idea intrigued the CIA, which recruited him to experiment with mind control beginning in 1950. Until 1964, Cameron conducted a range of experiments at the McGill institute, often without the knowledge or the permission of his patients. The experiments were part of a larger CIA program called MK-ULTRA, which saw LSD administered to U.S. prison inmates and patrons of brothels without their knowledge. Huard said the treatment left her unable to care for her children. She suffered memory loss and migraines for many years.
Note: For a powerful summary of MK-ULTRA and other CIA mind-control experiments, click here.
Long-secret documents released Tuesday provide new details about how the Central Intelligence Agency illegally spied on Americans decades ago. Known inside the agency as the “family jewels,” the 702 pages of documents released Tuesday catalog domestic wiretapping operations, failed assassination plots, mind-control experiments and spying on journalists from the early years of the C.I.A. The papers provide evidence of paranoia and occasional incompetence as the agency began a string of illegal spying operations in the 1960s and 1970s, often to hunt links between Communist governments and the domestic protests that roiled the nation in that period. Yet the long-awaited documents leave out a great deal. Large sections are censored, showing that the C.I.A. still cannot bring itself to expose all the skeletons in its closet. And many activities about overseas operations disclosed years ago by journalists, Congressional investigators and a presidential commission — which led to reforms of the nation’s intelligence agencies — are not detailed in the papers. The 60-year-old agency has been under fire ... by critics [of] the secret prisons and harsh interrogation practices it has adopted since the Sept. 11 attacks. Some intelligence experts suggested ... that the release of the documents was intended to distract from the current controversies. And they and historians expressed disappointment that the documents were so heavily censored. Tom Blanton of the National Security Archive, the research group that filed the Freedom of Information request in 1992 that led to the documents’ becoming public, said he was initially underwhelmed by them because they contained little about the agency’s foreign operations. But Mr. Blanton said what was striking was the scope of the C.I.A’s domestic spying efforts.
Note: The entire body of the CIA's "Family Jewels" documents have been posted online by the National Security Archives, and can be read by clicking here.
Easily lost, on page 425, in the mass of the CIA's notorious "Family Jewels" files is a short paragraph outlining "potentially embarrassing Agency activities". "Experiments in influencing human behaviour through the administration of mind- or personality-altering drugs to unwitting subjects." Of all the heinous acts committed by the CIA in the name of national security, these experiments, done on the agency's behalf by prominent psychiatrists on innocent victims - including children as young as four - may be the darkest. "We have no answer to the moral issue," former director Richard Helms infamously said when asked about the nature of the projects. The release of the Family Jewels documents revealed the CIA handsomely funded these real-life Dr Strangeloves and engaged pharmaceutical companies to help its experiments. The agency appealed to Big Pharma to pass on any drugs that could not be marketed because of "unfavourable side effects" to be tested on mice and monkeys. Any drugs that passed muster would then be used ... on volunteer US soldiers. The Family Jewels files do not provide further detail into the numerous mind-control programs, such as MKULTRA, covertly propped up by the agency. In 1953, MKULTRA was given 6 per cent of the total CIA budget without any oversight. The nature of the experiments, gathered from government documents and testimony in numerous lawsuits brought against the CIA, is shocking, from testing LSD on children to implanting electrodes in victims' brains to deliberately poisoning people with uranium. "The CIA bought my services from my grandfather in 1952 starting at the tender age of four," wrote Carol Rutz of her experiences.
Note: The entire body of the CIA's "Family Jewels" documents have been posted online by the National Security Archives, and can be read by clicking here. And for a 10-page summary of Carol Rutz's riveting book on her experiences as a government-created Manchurian candidate, click here.
The CIA will declassify hundreds of pages of long-secret records detailing some of the intelligence agency's worst illegal abuses -- the so-called "family jewels" documenting a quarter-century of overseas assassination attempts, domestic spying, kidnapping and infiltration of leftist groups ... CIA Director Michael V. Hayden said yesterday. The documents ... also include accounts of break-ins and theft, the agency's opening of private mail to and from China and the Soviet Union, wiretaps and surveillance of journalists, and a series of "unwitting" tests on U.S. civilians, including the use of drugs. The documents have been sought for decades by historians, journalists and conspiracy theorists and have been the subject of many fruitless Freedom of Information Act requests. In anticipation of the CIA's release, the National Security Archive at George Washington University yesterday published a separate set of documents from January 1975 detailing internal government discussions of the abuses. Those documents portray a rising sense of panic within the administration of President Gerald R. Ford that what then-CIA Director William E. Colby called "skeletons" in the CIA's closet had begun to be revealed in news accounts. "It's surely part of [Hayden's] program now to draw a bright line with the past," said National Security Archive Director Thomas S. Blanton. "But it's uncanny how the government keeps dipping into the black bag." Newly revealed details of ancient CIA operations, Blanton said, "are pretty resonant today."
William E. Colby faced an uneasy decision in late 1973 when he took over the Central Intelligence Agency: whether to make public the agency’s internal accounting, then being compiled, of its domestic spying, assassination plots and other misdeeds since its founding nearly three decades earlier. Mr. Colby decided to keep the so-called family jewels a secret, and wrote in his memoir in 1978 that he believed the agency’s already sullied reputation ... could not have withstood a public airing of all its dirty laundry. So why, at a time when the agency has again been besieged by criticism, this time for its program of secret detentions and interrogations since the Sept. 11 attacks, would the current director, Gen. Michael V. Hayden, decide to declassify the same documents that Mr. Colby chose to keep secret? General Hayden said it was essential for the C.I.A. ... to be as open as possible in order to build public trust and dispel myths surrounding its operations. The more that the agency can tell the public, he said, the less chance that misinformation among the public will “fill the vacuum.” It was this outlook that General Hayden, whose public relations skills are well known in Washington, brought to an earlier job. There, as director of the National Security Agency, he tried to overhaul the N.S.A.’s public image — that of the shadowy, menacing organization portrayed in the movie “Enemy of the State” — by inviting reporters to briefings and authorizing its officials to speak to the author James Bamford for his book on the agency, “Body of Secrets.”
Note: For a brief summary of and links to further information about James Bamford's important book on the NSA, Body of Secrets, click here.
An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.
A terrorist watch list compiled by the FBI has apparently swelled to include more than half a million names. Privacy and civil liberties advocates say the list is growing uncontrollably, threatening its usefulness in the war on terror. The bureau says the number of names on its terrorist watch list is classified. A portion of the FBI's unclassified 2008 budget request posted to the Department of Justice Web site, however, refers to "the entire watch list of 509,000 names." A spokesman for the interagency National Counterterrorism Center (NCTC), which maintains the government's list of all suspected terrorists with links to international organizations, said they had 465,000 names covering 350,000 individuals. Many names are different versions of the same identity. In addition to the NCTC list, the FBI keeps a list of U.S. persons who are believed to be domestic terrorists - abortion clinic bombers, for example, or firebombing environmental extremists, who have no known tie to an international terrorist group. Combined, the NCTC and FBI compendia comprise the watch list used by federal security screening personnel on the lookout for terrorists. While the NCTC has made no secret of its terrorist tally, the FBI has consistently declined to tell the public how many names are on its list. "It grows seemingly without control or limitation," said ACLU senior legislative counsel Tim Sparapani of the terrorism watch list. Sparapani called the 509,000 figure "stunning. If we have 509,000 names on that list, the watch list is virtually useless," he told ABC News. "You'll be capturing innocent individuals with no connection to crime or terror." U.S. lawmakers and their spouses have been detained because their names were on the watch list.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.