Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Looking Glass Factory, a company based in the Greenpoint neighborhood of Brooklyn, New York, revealed its latest consumer device: a slim, holographic picture frame that turns photos taken on iPhones into 3D displays. Looking Glass received $2.54 million of "technology development" funding from In-Q-Tel, the venture capital arm of the CIA, from April 2020 to March 2021 and a $50,000 Small Business Innovation Research award from the U.S. Air Force in November 2021 to "revolutionize 3D/virtual reality visualization." Across the various branches of the military and intelligence community, contract records show a rush to jump on holographic display technology, augmented reality, and virtual reality display systems as the latest trend. Critics argue that the technology isn't quite ready for prime time, and that the urgency to adopt it reflects the Pentagon's penchant for high-priced, high-tech contracts based on the latest fad in warfighting. Military interest in holographic imaging, in particular, has grown rapidly in recent years. Military planners in China and the U.S. have touted holographic technology to project images "to incite fear in soldiers on a battlefield." Other uses involve the creation of three-dimensional maps of villages of specific buildings and to analyze blast forensics. Palmer Luckey, who founded the technology startup Anduril Industries ... has received secretive Air Force contracts to develop next-generation artificial intelligence capabilities under the so-called Project Maven initiative.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
While President Biden signed an executive order last fall to declassify 9/11 evidence, the families of some 9/11 victims say they had to go through the British courts to get records and videos seized two decades ago from an alleged Saudi government operative that have never been public until now. Buried inside the trove is a home video from 2000. The event was described in 9/11 Commission records as a party at the San Diego apartment of Nawaf al-Hazmi and Khalid al-Mihdhar, the first two hijackers to arrive in the U.S. in January 2000. A handful of frames captured Mihdhar in the kitchen. Along with Hazmi, their team would later commandeer Flight 77 that slammed into the Pentagon. The party's host, Saudi national Omar al-Bayoumi, was arrested by British police less than two weeks after the attack. British police seized the videos and documents from Bayoumi. A newly declassified and heavily redacted FBI memo from 2017 stated, "In the late 1990s and up to September 11, 2001, Omar al-Bayoumi was paid a monthly stipend as a cooptee of the Saudi General Intelligence Presidency (GIP) via then Ambassador Prince Bandar bin Sultan." The memo continued, "Allegations of al-Bayoumi's involvement with Saudi Intelligence were not confirmed at the time of the 9/11 Commission Report. The above information confirms these allegations." Another recently declassified FBI memo ... said, "There is a 50/50 chance Omar al-Bayoumi had advanced knowledge the 9/11 terrorist attacks were to occur."
Note: For more along these lines, see concise summaries of deeply revealing news articles on 9/11 from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
On June 1, 1951, top military and intelligence officials of the United States, Canada and Great Britain, alarmed by frightening reports of communist success at "intervention in the individual mind," summoned a small group of eminent psychologists to a secret meeting at the Ritz-Carlton Hotel in Montreal. By the following September, U.S. government scientists, spurred on by reports that American prisoners of war were being brainwashed in North Korea, were proposing an urgent, top-secret research program on behavior modification. Drugs, hypnosis, electroshock, lobotomy - all were to be studied as part of a vast U.S. effort to close the mind-control gap. From the end of World War II well into the 1970s, the Atomic Energy Commission, the Defense Department, the military services, the CIA and other agencies used prisoners, drug addicts, mental patients, college students, soldiers, even bar patrons, in a vast range of government-run experiments to test the effects of everything from radiation, LSD and nerve gas to intense electric shocks and prolonged "sensory deprivation." Some of the human guinea pigs knew what they were getting into; many others did not. With the cold war safely over, Energy Secretary Hazel O'Leary has ordered the declassification of millions of pages of documents on the radiation experiments. But the government has long ignored thousands of other cold war victims, rebuffing their requests for compensation and refusing to admit its responsibility for injuries they suffered.
Note: Read more about the disturbing history of government and industry experiments on human guinea pigs. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources.
The intelligence community is about to get the equivalent of an adrenaline shot to the chest. This summer, a $600 million computing cloud developed by Amazon Web Services for the Central Intelligence Agency over the past year will begin servicing all 17 agencies that make up the intelligence community. If the technology plays out as officials envision, it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks. For the first time, agencies within the intelligence community will be able to order a variety of on-demand computing and analytic services from the CIA and National Security Agency. What's more, they'll only pay for what they use. For the risk-averse intelligence community, the decision to go with a commercial cloud vendor is a radical departure from business as usual. It is difficult to underestimate the cloud contract's importance. In a recent public appearance, CIA Chief Information Officer Douglas Wolfe called it "one of the most important technology procurements in recent history," with ramifications far outside the realm of technology. The importance of the cloud capabilities the CIA gets through leveraging Amazon Web Services' horsepower is best exemplified in computing intelligence data. Instead of each agency building out its own systems, select agencies ... are responsible for governing its major components.
Note: The CIA tries to "collect everything and hold on to it forever." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Russia invaded Ukraine. For years now the Central Intelligence Agency has been preparing for such a moment, not only with prescient intelligence gathering and analysis but also by preparing Ukrainians to mount an insurgency against a Russian occupation. The agency has been training Ukrainian special forces and intelligence officers at a secret facility in the U.S. since 2015. Because the CIA training program is now publicly known, Russia can persuasively claim that Ukrainian insurgents are CIA proxies – a useful statement as propaganda to pro-Russian separatists in eastern Ukraine and as a justification for any harsh measures it takes against Ukrainian civilians. The CIA needs to be honest with the Ukrainians – and itself – about the real intent. In the first U.S.-backed insurgency, according to top secret documents later declassified, American officials intended to use the Ukrainians as a proxy force to bleed the Soviet Union. This time, is the primary goal of the paramilitary program to help Ukrainians liberate their country or to weaken Russia over the course of a long insurgency that will undoubtedly cost as many Ukrainian lives as Russian lives, if not more? Even if a Ukrainian insurgency bleeds Russia over years, the conflict could cause instability to spread across Central and Eastern Europe. This is a pattern in the history of U.S. paramilitary operations – from the Cold War to Afghanistan and Iraq today.
Note: For an alternative view of Ukraine's Zelensky, don't miss this excellent presentation by intrepid reporter Ben Swann (skip to 1:45 to avoid advertisement). For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and war from reliable major media sources.
The Supreme Court ruled Thursday that the federal government can shield former government contractors from testifying about the torture of a post-9/11 detainee. The decision likely will make it harder for victims to expose secret government misconduct in the future. Abu Zubaydah was the first prisoner held by the CIA to undergo what, at the time, was euphemistically called "enhanced interrogation." During one 20-day period, he was waterboarded 83 times, 24 hours a day. During that period, the suspected terrorist was also slammed against walls, put in a coffin-like box for hours at a time to simulate live burial, and subjected to something the government called "rectal rehydration." In the end, the two CIA contractors who supervised Zubaydah's interrogation concluded that they had the wrong man. But when lawyers for Zubaydah subpoenaed them, the U.S. government blocked the move by invoking the so-called "state secrets" privilege. In this case, both the Trump and Biden administrations argued that even though the information about the torture program is widely known, confirming the existence of CIA black sites in Poland would jeopardize the U.S. government's relationship with foreign intelligence services. Josh Colangelo-Bryan, a lawyer who represents other Guantanamo Bay detainees, was ... critical. "There has been no accountability for the U.S. program that subjected people to torture," he said in a statement.
Note: Read more about the CIA's torture program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The CIA's chief technology officer outlined the agency's endless appetite for data in a far-ranging speech. Ira "Gus" Hunt said that the world is increasingly awash in information from text messages, tweets, and videos - and that the agency wants all of it. "The value of any piece of information is only known when you can connect it with something else that arrives at a future point in time," Hunt said. "Since you can't connect dots you don't have, it drives us into a mode of, we fundamentally try to collect everything and hang on to it forever." Hunt's comments come two days after Federal Computer Week reported that the CIA has committed to a massive, $600 million, 10-year deal with Amazon for cloud computing services. "It is really very nearly within our grasp to be able to compute on all human generated information," Hunt said. After that mark is reached, Hunt said, the agency would also like to be able to save and analyze all of the digital breadcrumbs people don't even know they are creating. "You're already a walking sensor platform," he said, noting that mobiles, smartphones and iPads come with cameras, accelerometers, light detectors and geolocation capabilities. "Somebody can know where you are at all times, because you carry a mobile device, even if that mobile device is turned off," he said. Hunt also spoke of mobile apps that will be able to control pacemakers - even involuntarily - and joked about a "dystopian" future. Hunt's speech barely touched on privacy concerns.
Note: The Internet of Things makes mass surveillance even easier. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Bloomberg Businessweek published an alarming story: Operatives working for China's People's Liberation Army had secretly implanted microchips into motherboards made in China and sold by U.S.-based Supermicro. This allegedly gave Chinese spies clandestine access to servers belonging to over 30 American companies, including Apple, Amazon, and various government suppliers, in an operation known as a "supply chain attack," in which malicious hardware or software is inserted into products before they are shipped to surveillance targets. U.S. spy agencies ... assessed that China was adept at corrupting the software bundled closest to a computer's hardware at the factory, threatening some of the U.S. government's most sensitive machines, according to documents provided by National Security Agency whistleblower Edward Snowden. The documents also detail how the U.S. and its allies have themselves systematically targeted and subverted tech supply chains, with the NSA conducting its own such operations, including in China, in partnership with the CIA and other intelligence agencies. The documents also disclose supply chain operations by German and French intelligence. Computer hardware can be altered at various points along the supply chain, from design to manufacturing to storage to shipment. The U.S. is among the small number of countries that could, in theory, compromise devices at many different points in this pipeline, thanks to its resources and geographic reach.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
It is widely regarded as the world's most potent spyware, capable of reliably cracking the encrypted communications of iPhone and Android smartphones. The software, Pegasus, made by an Israeli company, NSO Group, has been able to track terrorists and drug cartels. It has also been used against human rights activists, journalists and dissidents. Now, an investigation published Friday by The New York Times Magazine has found that Israel, which controls the export of the spyware ... has made Pegasus a key component of its national security strategy, using it to advance its interests around the world. The F.B.I. bought and tested NSO software for years with plans to use it for domestic surveillance until the agency finally decided last year not to deploy the tools. The F.B.I., in a deal never previously reported, bought the spyware in 2019. It also spent two years discussing whether to deploy a newer product, called Phantom, inside the United States. The discussions at the Justice Department and the F.B.I. continued until last summer. But Pegasus equipment is still in a New Jersey building used by the F.B.I. And the company also gave the agency a demonstration of Phantom, which could hack American phone numbers. A brochure ... says that Phantom allows American law enforcement and spy agencies to "turn your target's smartphone into an intelligence gold mine." In 2018 ... the C.I.A. bought Pegasus to help Djibouti, an American ally, fight terrorism, despite longstanding concerns about human rights abuses there.
Note: Read about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
NSO Group [is] the world's most notorious maker of spyware. The F.B.I. had bought a version of Pegasus, NSO's premier spying tool. It could ... crack the encrypted communications of any iPhone or Android smartphone. Since NSO had introduced Pegasus to the global market in 2011, it had helped Mexican authorities capture JoaquĂn Guzmán Loera, the drug lord known as El Chapo. European investigators have quietly used Pegasus to thwart terrorist plots, fight organized crime and, in one case, take down a global child-abuse ring. Mexico deployed the software not just against gangsters but also against journalists and political dissidents. The United Arab Emirates used the software to hack the phone of a civil rights activist. Saudi Arabia used it against women's rights activists. During a presentation to officials in Washington, the company demonstrated a new system, called Phantom, that could hack any number in the United States that the F.B.I. decided to target. A slick brochure ... says that Phantom allows American law enforcement and spy agencies to get intelligence "by extracting and monitoring crucial data from mobile devices." It is an "independent solution" that requires no cooperation from AT&T, Verizon, Apple or Google. The system, it says, will "turn your target's smartphone into an intelligence gold mine." The Phantom presentation triggered a discussion among government lawyers. Last summer ... the F.B.I. finally decided not to deploy the NSO weapons.
Note: Read more about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The Associated Press sought answers Monday from the Department of Homeland Security on its use of sensitive government databases for tracking international terrorists to investigate as many as 20 American journalists, including an acclaimed AP reporter. In a letter to DHS Secretary Alejandro Mayorkas, AP Executive Editor Julie Pace urged the agency to explain why the name of Pulitzer Prize-winning investigative reporter Martha Mendoza was run through the databases and identified as a potential confidential informant during the Trump administration, as detailed in a report by Homeland Security's inspector general. The DHS investigation of U.S. journalists, as well as congressional staff and perhaps members of Congress ... represents the latest apparent example of an agency created in the wake of the 9/11 attacks using its vast capabilities to target American citizens. The AP's letter ... called for "assurances that these improper practices and apparent abuse of power will not continue going forward." That would be in line with recent order from Attorney General Merrick Garland prohibiting the seizing of records of journalists in leak investigations. That followed an outcry over revelations that the Justice Department under former President Donald Trump had obtained records belonging to journalists, as well as Democratic members of Congress. During the Obama administration, federal investigators secretly seized phone records for some reporters and editors at the AP.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable major media sources.
In the torturous history of the U.S. government's black sites, the F.B.I. has long been portrayed as acting with a strong moral compass. Its agents, disgusted with the violence they saw at a secret C.I.A. prison in Thailand, walked out, enabling the bureau to later deploy "clean teams" untainted by torture to interrogate the five men accused of conspiring in the attacks of Sept. 11, 2001. But new information that emerged this week in the Sept. 11 case undermines that F.B.I. narrative. The two intelligence agencies secretly arranged for nine F.B.I. agents to temporarily become C.I.A. operatives in the overseas prison network where the spy agency used torture to interrogate its prisoners. The once-secret program came to light in pretrial proceedings in the death penalty case. The proceedings are currently examining whether the accused mastermind of the Sept. 11 plot, Khalid Shaikh Mohammed, and his four co-defendants voluntarily confessed after years in the black site network, where detainees were waterboarded, beaten, deprived of sleep and isolated to train them to comply with their captors' wishes. At issue is whether the military judge will exclude from the eventual trial the testimony of F.B.I. agents who questioned the defendants. Earlier testimony showed the F.B.I. participating remotely in the C.I.A. interrogations through requests sent by cables to the black sites seeking certain information from specific detainees, including Mr. Mohammed after he was waterboarded 183 times to force him to talk.
Note: Read more about the CIA torture program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
It's been over 50 years, but Wayne Ritchie says he can still remember how it felt to be dosed with acid. Ritchie may be among the last of the living victims of MK-ULTRA, a Central Intelligence Agency operation that covertly tested lysergic acid diethylamide (LSD) on unwitting Americans in San Francisco and New York City from 1953 to 1964. Seymour Hersh first exposed MK-ULTRA in a New York Times article in 1974 that documented CIA illegalities, including the use of its own citizens as guinea pigs. There were at least three CIA safe houses in the Bay Area where experiments went on. Chief among them was 225 Chestnut. Inside, prostitutes paid by the government to lure clients to the apartment served up acid-laced cocktails to unsuspecting johns, while martini-swilling secret agents observed their every move from behind a two-way mirror. The main man behind the mirror was ... George H. White, a Bureau of Narcotics maverick. He oversaw the San Francisco program, gleefully dubbing it Operation Midnight Climax. But, as a 1976 Senate Select Committee on Intelligence Activities noted, there was no medical pre-screening. White [wrote] in a 1971 letter to [Sidney] Gottlieb, "Of course I was a very minor missionary, actually a heretic, but I toiled wholeheartedly in the vineyards because it was fun, fun, fun. Where else could a red-blooded American boy lie, kill and cheat, steal, deceive, rape and pillage with the sanction and blessing of the All-Highest?"
Note: Read more about MK-ULTRA. This is just one of many programs that treated human beings like guinea pigs. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Almost 40 years after his death following a bar brawl in Key Biscayne, Ricardo Morales, known as "Monkey" – contract CIA worker, anti-Castro militant, counter-intelligence chief for Venezuela, FBI informant and drug dealer – returned to the spotlight Thursday morning when one of his sons made a startling claim on Spanish-language radio: Morales, a sniper instructor in the early 1960s in secret camps where Cuban exiles and others trained to invade Cuba, realized in the hours after President John F. Kennedy was assassinated in Dallas in 1963 that the accused killer, Lee Harvey Oswald, had been one of his sniper trainees. Morales also told his two sons that two days before the assassination, his CIA handler told him and his "clean-up" team to go to Dallas for a mission. But after the tragic events, they were ordered to go back to Miami without learning what the mission was about. The claims ... add to one of the long-held theories about the JFK assassination – that Cuban exiles working for the CIA had been involved. But the claims also point the finger at the CIA, which some observers believe could help explain why President Joe Biden backed off last week on declassifying the remaining documents in the case. Morales Jr. said his father told them he did not know of the plans to assassinate Kennedy. "He knew Kennedy was coming to Dallas, so he imagines something is going to happen, but he doesn't know the plan," he said. "In these kinds of conspiracies ... nobody knows what the other is doing."
Note: For more along these lines, see concise summaries of deeply revealing news articles on the JFK assassination from reliable major media sources.
Since 9/11, the government has been building a huge anti-terror apparatus. In the first few days, the entire blueprint for what would happen over the next decade was written, all in secret. The public didn't know. The media didn't know. And it would take us years to find out. In secret, the administration had authorized the CIA to use what they called "enhanced interrogation techniques." They can do a lot of things that used to be considered torture. Waterboarding, for example. By any definition, it's torture. The Justice Department called it "enhanced interrogation methods" and it approved seven of them, including waterboarding. It took reporter Dana Priest years to piece together where prisoners like Khalid Sheikh Mohammed were. They had been hidden in a secret network of CIA prisons known as "black sites." For the first time, the White House had approved the building of an international prison system entirely in secret. The Terrorist Surveillance Program authorized the NSA to intercept certain telephone calls and emails of American citizens without a warrant. The NSA created a global electronic dragnet capable of reaching into America's communication networks, capturing 1.7 billion intercepts every day. The NSA turned to a new force in the covert war, private contractors. You had this boom in the corporate intelligence world, as well, companies like CACI, Lockheed Martin, General Dynamics. The NSA spent billions of dollars on more than 480 private companies.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and 9/11 from reliable major media sources.
Senior CIA officials during the Trump administration discussed abducting and even assassinating WikiLeaks founder, Julian Assange. The discussions on kidnapping or killing Assange took place in 2017, Yahoo News reported, when the fugitive Australian activist was entering his fifth year sheltering in the Ecuadorian embassy. The then CIA director, Mike Pompeo, and his top officials were furious about WikiLeaks' publication of "Vault 7", a set of CIA hacking tools, a breach which the agency deemed to be the biggest data loss in its history. Some senior officials inside the CIA and the Trump administration went as far as to request "sketches" or "options" for killing Assange. "There seemed to be no boundaries," a former senior counterterrorist official was quoted as saying. The kidnapping or murder of a civilian accused of publishing leaked documents, with no connection to terrorism, would have triggered global outrage. Pompeo raised eyebrows in 2017 by referring to WikiLeaks as a "non-state hostile intelligence service". It was a significant designation, as it implied a green light for a more aggressive approach to the pro-transparency group by CIA operatives, who could treat it as an enemy espionage organization. Barry Pollack, Assange's US lawyer ... told Yahoo News: "As an American citizen, I find it absolutely outrageous that our government would be contemplating kidnapping or assassinating somebody without any judicial process simply because he had published truthful information."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Mysterious episodes that caused brain injuries in spies, diplomats, soldiers and other U.S. personnel overseas starting five years ago now number more than 130 people, far more than previously known, according to current and former officials. The number of cases within the C.I.A., the State Department, the Defense Department and elsewhere spurred broad concern in the Biden administration. The initial publicly confirmed cases were concentrated in China and Cuba and numbered about 60, not including a group of injured C.I.A. officers whose total is not public. Since December, at least three C.I.A. officers have reported serious health effects from episodes overseas. One occurred within the past two weeks, and all have required the officers to undergo outpatient treatment at Walter Reed National Military Medical Center or other facilities. And in one case in 2019 that has not previously been reported, a military officer serving overseas pulled his vehicle into an intersection, then was overcome by nausea and headaches. His 2-year-old son, sitting in the back seat, began crying. After the officer pulled away from the intersection, his nausea stopped, and the child stopped crying. In a report released in December, the National Academy of Sciences said a microwave weapon probably caused the injuries. Some officials believe a microwave or directed-energy device is the most likely cause. The severity of the brain injuries has ranged widely. Some victims have chronic, potentially irreversible symptoms.
Note: Read more about these mysterious attacks on spies and diplomats. Read very little-known, yet astounding information on sophisticated technologies which can project music and clear voices into people's heads in these concise summaries of deeply revealing news articles on non-lethal weapons from reliable major media sources.
Vice President Kamala Harris' trip to Hanoi, Vietnam, was delayed by a few hours after her office was made aware of a "recent possible anomalous health incident" among U.S. officials in Hanoi. "Anomalous health incident" is how the United States government refers to the mysterious "Havana syndrome." First reported in 2016 by United States officials in Cuba, Havana syndrome has afflicted more than 130 U.S. officials over the past five years stationed in several countries overseas. Victims of the syndrome typically report strange experiences, like feelings of pressure or vibration and a screeching sound, and debilitating symptoms, including headaches, nausea, cognitive deficits, and trouble with seeing, hearing, or balancing. The vice president's office said that after "careful consideration," her team opted to continue with her Vietnam trip. A couple hours after the announcement, NBC News reported that a medical evacuation was called for two U.S. officials in Hanoi. The NBC report noted that "strange sounds" were involved in the incidents, and that Vietnam has seen past reports of possible Havana syndrome cases. NBC News reported in June that some U.S. officials believe that unknown adversaries used "devices intended to extract information from cellphones and other personal devices" that emitted electromagnetic waves powerful enough to cause debilitating symptoms. After realizing such devices had that effect, they then "weaponized the tactic to intentionally cause physical harm."
Note: Read more about these mysterious attacks on spies and diplomats. Read very little-known, yet astounding information on sophisticated technologies which can project music and clear voices into people's heads in these concise summaries of deeply revealing news articles on non-lethal weapons from reliable major media sources.
Right up until his death in 2018, Ferik Duka dreamed of seeing his three eldest sons, Shain, Dritan, and Eljvir, freed from prison. In 2009, the three brothers were sentenced to life for their role in an alleged plot to attack the Fort Dix military base in New Jersey. The convictions followed a terrorism sting ... that ran for over a year and involved multiple government informants. The investigation into the "Fort Dix Five," as the case became known, was marred by outrageous law enforcement and legal abuses, documented in a 2015 investigation and documentary by The Intercept. Their case was just one of many in which zealous FBI officials and prosecutors, operating in the heated atmosphere of post-9/11 America, branded individuals who posed no appreciable threat to the country as enemies of the state. Many of them, like the Duka brothers, were given long prison sentences or otherwise had their lives ruined after being convicted on material support for terrorism charges. "There hasn't been any reckoning with the legacy of this era," said Ramzi Kassem, a ... Law professor. Kassem said, "It is alarming when you look across these cases and see an overrepresentation of suspects who were mentally deficient, marginalized, or otherwise vulnerable. Informants proposed so-called terrorism plots, funded them, provided means of execution, coaching, and even coaxed the targets of stings over prolonged periods of time in order to enable prosecutors to paint their conduct as criminally punishable."
Note: Read more about terrorism plots hatched by the FBI. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism from reliable major media sources.
The biggest Al Qaeda plot the FBI claimed to have foiled in the years following the 9/11 attacks involved no weapons, no plot, and no Al Qaeda. Instead, the vague, implausible threat by a group of construction workers in Florida to blow up U.S. buildings, including Chicago's Sears Tower, was mostly the making of the FBI, whose undercover operatives sought out the men, promised them money, and coached them over months to implicate themselves in a conspiracy to commit violent acts they never actually intended or had the means to carry out. The "Liberty City Seven" case – known by its connection to the poor, violence-ridden Miami neighborhood where the men involved lived – was the most high-profile FBI investigation of a supposed terrorist cell after the attacks in New York City and Washington, D.C. The ordeal of the seven Black men, most of them Haitian American, who were manipulated by two paid FBI informants into pledging allegiance to Al Qaeda is recounted in a new Frontline documentary, "In the Shadow of 9/11," by British director Dan Reed. The case set the stage for hundreds of FBI sting operations in the following years, as the bureau continued to frame individuals who were often poor, credulous, and had dubious ability to independently plan any attacks. Rather than abandoning stings as pointless and harmful ... the FBI doubled down on them, in some cases even providing weapons to the individuals they set up.
Note: Read more about how the FBI uses stings to manufacture terrorism cases. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.