Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
692 felony convictions in California ... were thrown out between 1989 and 2012 based on errors or misconduct by police, prosecutors, defense lawyers or judges, according to a new study by researchers at UC Berkeley and the University of Pennsylvania. The report ... didn’t include misdemeanor cases, which amount to about 80 percent of all prosecutions, or juvenile cases. And it also excluded the costs of jailing people who were later released without charges, which may amount to $70 million a year, the report said. The study examined only records from California and ... looked at cases in which felony convictions were overturned and the defendants were later cleared. More than half the cases involved prosecutors’ wrongful withholding of evidence. One example was that of former Black Panther Elmer “Geronimo” Pratt. Pratt was convicted in 1972 of murdering schoolteacher Carolyn Olson [in 1968] and was sentenced to life in prison, based in part on [witness] testimony. He was freed in 1999 after a judge found that prosecutors had withheld evidence that the witness was an informant for the FBI, which was then trying to discredit Pratt as part of its Cointelpro campaign. The authors questioned long-standing laws that shield prosecutors from lawsuits by criminal defendants. They said they knew of no other profession that received immunity for “intentional wrongdoing that gravely injures another.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the prison system.
Edward Snowden, the whistleblower whose NSA revelations sparked a debate on mass surveillance, has waded into the arguments over the FBI’s attempt to force Apple to help it unlock the iPhone 5C of one of the San Bernardino shooters. The FBI says that only Apple can deactivate certain passcode protections on the iPhone, which will allow law enforcement to guess the passcode by using brute-force. Talking via video link from Moscow to the Common Cause Blueprint for a Great Democracy conference, Snowden said: “The FBI says Apple has the ‘exclusive technical means’ to unlock the phone. Respectfully, that’s bullshit.” Snowden then went on to tweet his support for an American Civil Liberties Union report saying that the FBI’s claims in the case are fraudulent. Apple co-founder Steve Wozniak also spoke out against the FBI on the Conan O’Brien show on Monday, saying: “I side with Apple on this one. [The FBI] picked the lamest case you ever could.” Wozniak added: “Verizon turned over all the phone records and SMS messages. So they want to take this other phone that the two didn’t destroy, which was a work phone. It’s so lame and worthless to expect there’s something on it and to get Apple to expose it.” Apple’s clash with the FBI comes to a head in California this month when the two will meet in federal court to debate whether the smartphone manufacturer should be required to weaken security settings on the iPhone of the shooter.
Note: According to The New York Times, the FBI has been misleading the public about the San Bernadino attacks for months. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
There's no more valuable resource for an informed citizenry than the folks doing god's work at the National Security Archive at the George Washington University. Their most recent revelations concern the Rockefeller Commission, which was formed by the Ford Administration as a reaction to the New York Times stories in 1975 that broke the news of the CIA's misdeeds, up to and including covert assassinations. And, lo and behold, you'll never guess who was leading the [cover up]: "The Gerald Ford White House significantly altered the final report of the supposedly independent 1975 Rockefeller Commission investigating CIA domestic activities, over the objections of senior Commission staff, according to internal White House and Commission documents posted today by the National Security Archive. The changes included removal of an entire 86-page section on CIA assassination plots and numerous edits to the report by then-deputy White House Chief of Staff Richard Cheney. The documents in this set have yet to be incorporated into standard accounts of the events of this period. Among the abuses that led directly to President Ford creating the Rockefeller Commission were charges the CIA had compiled dossiers on American citizens and infiltrated political groups that opposed the U.S. war in Vietnam. The Rockefeller panelists entered a blanket finding that the files and lists of citizen dissenters were "improper." The White House edit changed this conclusion.
Note: Read about the CIA's involvement in the 1953 death of military scientist Frank Olson. The Rockefeller Commission report was one of the first official sources to publicly reveal CIA and DOD mind control experiments. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The Federal Bureau of Investigation has quietly developed a new way to measure its success in the war on terror: counting the number of terror threats it has “disrupted” in a year. In the section on “Performance Measures” in the FBI’s latest financial statement, the bureau reports 440 “terror disruptions” in the 12-month period ending on September 30, 2015. That’s ... more than three times the 2015 “target” of 125. In a vacuum, that would appear to suggest that the FBI’s terror-fighting mission - which sucked ... 54 percent of the bureau’s $9.8 billion budget in 2015 - is exceeding expectations. But that number - 440 - is much higher than the number of arrests reported by the FBI. The Washington Post counted about 60 terror-related arrests in 2015. Of those arrests, many were of people trying to travel abroad or trying to help others do so. Many more involved people planning attacks that were essentially imaginary, often goaded by FBI informants. There was only one genuinely “foiled attack” in the United States between January 2014 and September 2015. And that one ... was stopped by the local police department. The fact that the agency establishes a target for terrorism disruptions is also troubling, said Michael German, a former FBI agent.
Note: The FBI has made a habit of manufacturing "terrorist plots" from thin air. Now it appears that activities reminiscent of COINTELPRO are again being carried out to justify massive anti-terrorism spending. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
The Republican-led House intelligence committee wants the Pentagon to provide what it believes are illegally deleted intelligence files pertaining to the U.S. military campaign against ISIS in Syria and Iraq. "We have been made aware that both files and emails have been deleted by personnel at CENTCOM, and we expect that the Department of Defense will provide these and all other relevant documents to the committee," [Committee Chairman Devin] Nunes said at a hearing Thursday. Nunes' assertions led to an extraordinary public acknowledgment from Lt. Gen. Vincent Stewart, director of the Defense Intelligence Agency, who was testifying before the committee, of the "unusually high" dissatisfaction inside the agency responsible for providing military intelligence on ISIS. There is already an ongoing Defense Department Inspector General investigation into allegations that intelligence analysts at CENTCOM were pressured into changing their analysis to make their reports sound overly optimistic. Congress is conducting a separate investigation. The committee has information from whistleblowers that both intelligence files and emails were deliberately deleted at Central Command, but that copies remain in the hands of analysts. Some Pentagon officials have privately told CNN they believe the problem at Central Command is that some analysts feel their work is not accepted if it shows a negative view of progress.
Note: For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
Newly published classified documents show the National Security Agency spied on a 2010 conversation between Italian Prime Minister Silvio Berlusconi and Israeli Prime Minister Benjamin Netanyahu as the two discussed ways to improve Israel’s relationship with the United States. The Italian-Israeli conversation is included in one of five NSA documents released Tuesday by WikiLeaks. Two of the documents focus on climate change, one relates to trade talks, and two report on Italian government communications. The intelligence reports date from 2007 through 2011, [and] provide additional details on U.S. efforts to spy on countries taking part in the 2009 Copenhagen Climate Change Conference, which failed to reach an agreement. One ... contains details of a confidential discussion about climate change negotiations between U.N. Secretary General Ban Ki-moon and the German Chancellor Angela Merkel in the lead-up to the conference. The NSA report is stamped “U.N. diplomatic,” “German leadership,” and Top Secret Gamma, the “Gamma” indicating an extremely sensitive spying operation. The interception methods stated on the latest leaked intelligence reports are “Unconventional” and “SCS,” which stands for Special Collection Service. SCS involves joint NSA and CIA eavesdropping operations run covertly inside U.S. and allied foreign embassy buildings in foreign capitals.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
A UN panel will conclude Wikileaks founder Julian Assange is being "arbitrarily detained" in the UK, the Swedish foreign ministry has said. Mr Assange, 44, claimed asylum in London's Ecuadorean embassy in 2012. The Met Police says Mr Assange will be arrested if he leaves the embassy. The Australian was originally arrested in London in 2010 under a European Arrest Warrant issued by Sweden over rape and sexual assault claims. In 2012, while on bail, he claimed asylum inside the Ecuadorean embassy in Knightsbridge after the UK Supreme Court had ruled the extradition against him could go ahead. Mr Assange's Wikileaks organisation posted secret American government documents on the internet, and he says Washington could seek his extradition to the US to face espionage charges if he is sent to Sweden. In the statement, published earlier by Wikileaks on Twitter, Mr Assange said: "Should the UN announce tomorrow that I have lost my case against the United Kingdom and Sweden I shall exit the embassy at noon on Friday to accept arrest by British police ... However, should I prevail and the state parties be found to have acted unlawfully, I expect the immediate return of my passport and the termination of further attempts to arrest me." Last October, Scotland Yard said it would no longer station officers outside the Ecuador embassy following an operation which it said had cost Ł12.6m. But it said "a number of overt and covert tactics to arrest him" would still be deployed.
Note: Read more about the "legal limbo" and propaganda campaign carried out against Assange and Wikileaks. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Senior CIA officials have for years intentionally deceived parts of the agency workforce by transmitting internal memos that contain false information. The practice is known by the term eyewash. Officials said there is no clear mechanism for labeling eyewash cables or distinguishing them from legitimate records being examined by the CIAs inspector general, turned over to Congress or declassified for historians. Senate investigators uncovered apparent cases of eyewashing as part of a multi-year probe of the CIAs interrogation program, according to officials who said that the Senate Intelligence Committee found glaring inconsistencies in CIA communications about classified operations, including drone strikes. Former CIA officials ... acknowledged that the internal mechanisms for managing eyewash cables were largely informal. Skeptics described the safeguards as inadequate. When you introduce falsehoods into the communications stream then you can destabilize the whole system of intelligence oversight and compliance with the law, said Steven Aftergood, a government secrecy expert at the Federation of American Scientists. It wasnt that long ago that we had a CIA executive director who was engaged in criminal activity - you dont want someone like him preparing eyewash cables, Aftergood said, referring to Kyle Dusty Foggo, the former No. 3 executive at the agency.
Note: Read more about the strange case of Kyle "Dusty" Foggo, the CIA executive convicted of fraud in connection with secret CIA prisons. For more along these lines, see concise summaries of deeply revealing Intelligence agency corruption news articles from reliable major media sources.
Before Julian Assange, the WikiLeaks founder, and Edward Snowden, the intelligence whistleblower, there was Katharine Gun. The former GCHQ employee ... was a young Mandarin specialist at the British government’s eavesdropping agency in Cheltenham. In early 2003 she received an email asking her and her colleagues to help the US government spy on UN security council delegations in New York. It was a critical moment, as Washington was seeking UN backing for its invasion of Iraq. Gun decided the world had to know, whatever the cost to her life and career. She leaked the memo to the Observer and was arrested, lost her job and faced trial under the Official Secrets Act. Thirteen years later, as bloodshed continues in Iraq, the almost forgotten story is to be brought to a new audience in Official Secrets, a movie [that] will chart Gun’s unlikely bid – courageous self-sacrifice to supporters, treachery in the view of critics – to block George W Bush and Tony Blair’s march to war. Unlike many whistleblowers who leak thousands of documents after the event, Gun was intervening in an active operation and trying to stop a war. The US National Security Agency memo told employees of GCHQ to gather “the whole gamut of information that could give American policymakers an edge in obtaining results favourable to US goals or to head off surprises”. “I saw the email and my gut reaction was pretty instantaneous, that it was highly explosive information and that it should be out in the public domain,” she recalled.
Note: The US has spent several trillion dollars pursuing a policy of endless war since 9/11. Great Britain did not believe Iraq to be a global security threat, but backed the US-led invasion on this false pretense for political reasons. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
“The Brothers” is a riveting chronicle of government-sanctioned murder, casual elimination of “inconvenient” regimes, relentless prioritization of American corporate interests and cynical arrogance on the part of two men. John Foster Dulles and his brother, Allen, were ... lawyers, partners in the immensely powerful firm of Sullivan & Cromwell. John Foster Dulles served as secretary of state from 1953 to 1959; his brother ran the C.I.A. from 1953 to 1961. In his detailed, wellconstructed and highly readable book, Stephen Kinzer ... shows how the brothers drove America’s interventionist foreign policy. Kinzer highlights John Foster Dulles’s central role in channeling funds from the United States to Nazi Germany in the 1930s. Sullivan & Cromwell floated bonds for Krupp A. G., the arms manufacturer, and also worked for I. G. Farben, the chemicals conglomerate that later manufactured Zyklon B, the gas used to murder millions of Jews. For the Dulles brothers, and for much of the American government, threats to corporate interests were categorized as support for communism. There are also reminders in Kinzer’s book of dark events in the history of American intelligence. Sixty years ago, Frank Olson, a C.I.A. officer, was reported to have jumped to his death during mind-control experiments “in which psychoactive drugs were administered to unknowing victims.” But last year, Kinzer reports, Olson’s family filed suit, claiming he had actually been murdered after visiting secret C.I.A. prisons in Europe.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The CIA has released hundreds of declassified documents detailing investigations into possible alien life. The Central Intelligence Agency posted documents of reported Unidentified Flying Objects that range in date from the late 1940s to the 1950s. While playing off the hype of the TV show reboot "The X-Files," the CIA broke down the cases into two categories, whether you side with Agent Mulder or Agent Scully. For believers in alien life ... one case you can choose to investigate is the case of a flying saucer in Germany in 1952. An eyewitness told investigators that an object "resembling a huge flying pan" landed in a forest clearing in the Soviet zone of Germany in 1952. The eyewitness said once he was closer to the area where it landed, he saw two men dressed in shiny metallic clothing. Spooked by the eyewitness ... the mysterious men jumped into the large flying pan object and it spun out into the sky. "The whole object then began to rise slowly from the ground and rotate like a top," the eyewitness told the CIA. The man told a judge he thought he was dreaming but said there was a circular imprint on the ground where the object had landed. If that case intrigues you, there are four more listed on the CIA blog post. But if you are more of a skeptic like Scully, and believe there is a simple explanation for flying saucer sightings, then the documents from the scientific advisory panel on UFOs in 1953 will help you prove your case.
Note: Explore these intriguing 'X-Files' on the CIA website at this link. For more along these lines, see concise summaries of deeply revealing UFO cover-up and disclosure news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our UFO Information Center.
Canada's electronic spy agency broke privacy laws by sharing information about Canadians with foreign partners, a federal watchdog said Thursday. Commissioner Jean-Pierre Plouffe said in his annual report that the Communications Security Establishment passed along information known as metadata to counterparts in the United States, Britain, Australia and New Zealand. Metadata is information associated with a communication, such as a telephone number or email address, but not the message itself. The communications agency intercepts and analyzes foreign communications for intelligence information of interest to the federal government. The agency is legally authorized to collect and analyze metadata churning through cyberspace. Plouffe, who keeps an eye on the highly secretive agency, said he found that it lacks clarity regarding the sharing of certain types of metadata. Defense Minister Harjit Sajjan said the sharing won't resume until he is satisfied that the proper protections are in place. Plouffe's report noted that certain metadata was not being properly minimized, or rendered unidentifiable, prior to being shared. The CSE's failure to strip out certain Canadian identity information violated the National Defense Act and therefore the federal Privacy Act as well. Privacy advocates have stressed that metadata is far from innocuous since it can reveal a great deal about a person's online behavior and interactions.
Note: Many countries do not allow their intelligence agencies to spy on their own citizens without going through a legal process. The easy way around this that has been used for decades is to simply getting the information from a friendly country. So if the CIA wants information on you in the US, they can't spy directly, but they can ask the UK to do so and pass the information to them and thus get around the laws. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
U.S. intelligence agencies recently fought off a move by Congress to require the CIA and other spy services to disclose more details about high-ranking employees who have been promoted or fired. Under a provision drafted by the Senate Intelligence Committee this year, intelligence agencies would have been required to regularly provide names of those being promoted to top positions and disclose any “significant and credible information to suggest that the individual is unfit or unqualified.” But that language faced intense opposition from Director of National Intelligence James R. Clapper Jr.. As a result, the wording was watered down by Congress this month and now requires Clapper only to furnish “information the Director determines appropriate.” U.S. spy chiefs chafed at the idea of subjecting their top officials to such congressional scrutiny and went so far as to warn that candidates for certain jobs would probably withdraw. Former CIA director Michael Hayden said he [opposed the provision] “for simply being too invasive.”
Note: As a vocal advocate of intrusive spying, former CIA director Michael Hayden's claim that congressional oversight of spy agency personnel could be "too invasive" is ironic. The unaccountable US intelligence agencies were recently called a "secret government" in the Boston Globe. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
In March I received a call from the White House counsel’s office regarding a speech I had prepared for my boss at the State Department. The speech was about the impact ... of National Security Agency surveillance practices. The draft stated that “if U.S. citizens disagree with congressional and executive branch determinations about the proper scope of signals intelligence activities, they have the opportunity to change the policy through our democratic process.” But the White House counsel’s office told me that no, that wasn’t true. I was instructed to amend the line. Some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them. Public debate about the bulk collection of U.S. citizens’ data by the NSA has focused largely on Section 215 of the Patriot Act. Based in part on classified facts that I am prohibited by law from publishing, I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215. Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained. None of the reforms that Obama announced earlier this year will affect such collection.
Note: The above was written by John Napier Tye, former section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor. A 2014 Washington Post investigation sheds more light on the NSA's legally dubious domestic mass surveillance program. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The Wall Street Journal reported yesterday that the NSA under President Obama targeted Israeli Prime Minister Benjamin Netanyahu and his top aides for surveillance. In the process, the agency ended up eavesdropping on ... U.S. lawmakers and American-Jewish groups. People who spent many years cheering for and defending ... programs of mass surveillance are suddenly indignant now that they know the eavesdropping included them. Long-time GOP chairman of the House Intelligence Committee and unyielding NSA defender Pete Hoekstra last night was truly indignant: "WSJ report that NSA spied on Congress and Israel communications very disturbing. Actually outrageous. Maybe unprecedented abuse of power ... NSA and Obama officials need to be investigated and prosecuted. NSA loses all credibility. Scary." This pattern - whereby political officials who are vehement supporters of the Surveillance State transform overnight into crusading privacy advocates once they learn that they themselves have been spied on - is one that has repeated itself over and over. So now, with yesterday’s WSJ report, we witness the tawdry spectacle of large numbers of people who for years were fine with, responsible for, and even giddy about NSA mass surveillance suddenly objecting. Overnight, privacy is of the highest value because now it’s their privacy, rather than just yours, that is invaded.
Note: Read the full Wall Street Journal article on how the US government is secretly spying on Israeli leaders and more. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The news that the National Security Agency (NSA) is routinely operating outside of the law and overstepping its legal authority by carrying out surveillance on American citizens is not really much of a surprise. This is what happens when you give the government broad powers and allow government agencies to routinely sidestep the Constitution. Consider that the government's Utah Data Center (UDC), the central hub of the NSA's vast spying infrastructure, will be a clearinghouse and a depository for every imaginable kind of information - whether innocent or not, private or public - including communications, transactions and the like. In fact, anything and everything you've ever said or done, from the trivial to the damning - phone calls, Facebook posts, Twitter tweets, Google searches, emails, bookstore and grocery purchases, bank statements, commuter toll records, etc. - will be tracked, collected, cataloged and analyzed by the UDC's supercomputers and teams of government agents. By sifting through the detritus of your once-private life, the government will come to its own conclusions about who you are, where you fit in, and how best to deal with you should the need arise. Surveillance of all citizens ... is not friendly to freedom. Frankly, we are long past the point where we should be merely alarmed. These are no longer experiments on our freedoms. These are acts of aggression.
Note: Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The Federal Bureau of Investigation has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individual’s complete web browsing history and records of all online purchases, a court filing released Monday shows. The documents are believed to be the first time the government has provided details of its so-called national security letters, which are used by the FBI to conduct electronic surveillance without the need for court approval. National security letters have been available as a law enforcement tool since the 1970s, but their frequency and breadth expanded dramatically under the USA Patriot Act, which was passed shortly after the Sept. 11, 2001 attacks. They are almost always accompanied by an open-ended gag order barring companies from disclosing the contents of the demand for customer data. The secretive orders have long drawn the ire of tech companies and privacy advocates, who argue NSLs allow the government to snoop on user content without appropriate judicial oversight. Last year, the Obama administration announced it would permit Internet companies to disclose more about the number of NSLs they receive. But they can still only provide a range such as between 0 and 999 requests. Twitter has sued in federal court seeking the ability to publish more details in its semi-annual transparency reports. Several thousand NSLs are now issued by the FBI every year. At one point that number eclipsed 50,000 letters annually.
Note: Read more about the FBI's use of these controversial secret letters. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
On a snowy afternoon in February 2004, an FBI agent came to Nick Merrill’s door, bearing a letter that would change his life. At the time, Merrill was running a small internet service provider. The envelope that the agent carried contained what is known as a “national security letter”, or NSL. It demanded details on one of his company’s clients; including cellphone tower location data, email details and screen-names. It also imposed a non-disclosure agreement which was only lifted this week, when – after an 11-year legal battle by Merrill and the American Civil Liberties Union, he was finally allowed to reveal the contents of the letter to the world. The NSL which Merrill was given was a new use for what was a relatively old tool. The FBI had long – if sparingly – used them, [but] the Patriot Act vastly expanded the scope of what an NSL could be applied to. The FBI greatly increased the number issued; according to a 2007 inspector general’s report, the NSL that Merrill was handed by the agent was one of nearly 57,000 issued that year. All of those thousands of NSLs were accompanied by a non-disclosure agreement, or “gag order” – which barred recipients were ever disclosing that they had received an NSL – even to the person whose records were being sought. With the ACLU, Merrill went to court to challenge the constitutionality of the letter, especially of the gag order. In 2014, Merrill sued again, helped by ... the Yale Law Clinic. Finally, [a] judge ... ruled that the gag order be completely lifted. It had taken Merrill almost 12 years.
Note: A 2007 Washington Post article summary sheds more light on Merrill's long struggle.
Months after the Obama administration declared combat operations over in Afghanistan, the CIA continues to run a shadow war in the eastern part of the country, overseeing an Afghan proxy called the Khost Protection Force [KPF], according to local officials, former commanders of that militia and Western advisers. The highly secretive paramilitary unit has been implicated in civilian killings, torture, questionable detentions, arbitrary arrests and use of excessive force in controversial night raids. In several attacks, witnesses described hearing English being spoken by armed men who had interpreters with them, suggesting American operatives were present during assaults where extreme force was used. Afghan government officials acknowledge that the KPF has killed civilians and committed other abuses. In Khost, the KPF is more influential than the Afghan army and police, and is unaccountable to the provincial government. The CIA [directs] the KPF’s operations, paying fighters’ salaries, and training and equipping them. The CIA is not bound by the Bilateral Security Agreement between Afghanistan and Washington that, among other rules, limits the ability of U.S. military forces to enter Afghan homes. The KPF was one of several large paramilitary forces created by the CIA in the months after the Taliban was ousted following the 9/11 attacks.
Note: Read a fascinating article titled "Does the Pentagon Want Nuclear War Against Russia?" Key leaders in both the CIA and Pentagon seem to want war at all costs, particularly as war fills their coffers and those of their big business buddies. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.
The United States has conducted an escalating campaign of deadly airstrikes against the extremists of the Islamic State. But that appears to have done little to tamp down the conspiracy theories still circulating from the streets of Baghdad to the highest levels of Iraqi government that the CIA is secretly behind the same extremists that it is now attacking. “We know about who made Daesh,” said Bahaa al-Araji, a deputy prime minister, using an Arabic shorthand for the Islamic State ... at a demonstration called by the Shiite cleric Moktada al-Sadr. Mr. Sadr publicly blamed the CIA for creating the Islamic State in a speech last week, and interviews suggested that most of the few thousand people at the demonstration, including dozens of members of Parliament, subscribed to the same theory. The prevalence of the theory in the streets underscored the deep suspicions of the American military’s return to Iraq more than a decade after its invasion, in 2003. The casual endorsement by a senior official, though, was also a pointed reminder that the new Iraqi government may be an awkward partner for the American-led campaign to drive out the extremists.
Note: A carefully researched report on the covert origins of ISIS suggests the creation of terrorists is useful for Washington's elite. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.