Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Hardly a week goes by without a new report of some massive data theft that has put financial information, trade secrets or government records into the hands of computer hackers. The best defense against these attacks is clear: strong data encryption and more secure technology systems. U.S. intelligence agencies hold a different view. James Comey, the FBI director, is lobbying Congress to require that electronics manufacturers create intentional security holes — so-called back doors — that would enable the government to [easily] access data on every American's cellphone and computer. Building a back door into every cellphone, tablet, or laptop means deliberately creating weaknesses that hackers and foreign governments can exploit. What these officials are proposing would be bad for personal data security and bad for business. Built-in back doors have ... disastrous results. The U.S. House of Representatives recognized how dangerous this idea was and in June approved [an] amendment [to] prohibit the government from mandating that technology companies build security weaknesses into any of their products. I introduced legislation in the Senate to accomplish the same goal. Advances in technology always pose a new challenge to law enforcement agencies. But curtailing innovation on data security is no solution, and certainly won't restore public trust in tech companies or government agencies.
Note: Ron Wyden, a member of the Senate Intelligence Committee, wrote the article summarized above. The NSA routinely creates and exploits security holes in commercial encryption software and devices to spy on people, and shares the personal data it obtains with the CIA, FBI, IRS, and others through the DEA's Special Operations Division. What exactly is the FBI director asking congress for now?
The U.S. House Intelligence Committee has denied [Rep. Alan Grayson, D-Orlando], a Florida congressman ... access to 28 classified pages from the 2002 report of Congress’ Joint Inquiry into the 9/11 terrorist attacks. [Grayson] made his request at the suggestion of House colleagues who have read them. The 28 pages concern ... “the role of Saudi Arabia in funding 9/11,” according to former Florida Senator Bob Graham, who co-chaired the Joint Inquiry and helped write the 28 pages. Graham has long called for declassifying those pages. House Resolution 428 ... asks President Obama to release the 28 pages of the Joint Inquiry’s report. In 2003, 46 senators — including now Vice President Joe Biden, Sam Brownback, Hillary Rodham Clinton and John Kerry – wrote to President Bush asking him to declassify the pages. In a party line vote, the House Intelligence Committee voted 8-4 on Dec. 1 to deny Democrat Grayson access to the 28 pages. The same day, the committee unanimously approved requests to access classified committee documents — not necessarily the 28 pages — by 11 other House members. Grayson, an outspoken liberal and a member of the House Committee on Foreign Affairs, said his denial was engineered by outgoing Chairman Mike Rogers, R-Mich. “Chairman Rogers told the committee that I had discussed classified information on the floor. I was discussing what was reported in the newspaper,” said Grayson. “He clearly misled the committee.”
Note: Alan Grayson questions the lies that intelligence agencies tell congress, and has made it clear to the public how common such lies are. He is now being prevented from helping those who are trying to expose the Saudi government money behind terrorism. For more along these lines, read concise summaries of deeply revealing 9/11 investigation news from reliable major media sources.
28 still-classified pages pages in a congressional inquiry on 9/11 ... raise questions about Saudi financial support to the hijackers in the United States prior to the attacks. Both the administrations of George W. Bush and Barack Obama have refused to declassify the pages on grounds of national security. But [some] members of Congress who have read the pages ... say national security has nothing to do with it. Former Florida Senator Bob Graham, a Democrat who co-chaired the joint investigation of the House and Senate intelligence committees into the Sept. 11 attacks ... maintains that nothing in them qualifies as a legitimate national security secret. The 2002 joint congressional committee probe [Graham] co-chaired reported only that, “contacts in the United States helped hijackers ...” But in an interview with Newsweek, Graham said “the contacts” were Saudis with close connections to their government. The Florida Democrat charged that there has been “an organized effort to suppress information” about Saudi support for terrorism, which "started long before 9/11 and continued ... after 9/11. ISIS ... is a product of Saudi ideals, Saudi money and Saudi organizational support, although now they are making a pretense of being very anti-ISIS,” Graham added. The two co-chairman of ... the 9/11 Commission, likewise urged the White House to declassify the 28 pages. “I’m embarrassed that they’re not declassified,“ former Rep. Lee Hamilton (D-Ind) said at a press conference with his co-chair Tom Kean, the former Republican governor of New Jersey. Meanwhile, Washington and the Saudi royals still maintain their decades-long, cozy relationship.
Note: Several current and former government officials are trying to expose the Saudi government money behind ISIS and other terrorist groups. For more along these lines, read concise summaries of deeply revealing 9/11 investigation news from reliable major media sources.
The combined cost of the “war on terror” comes to an estimated $1.6 trillion. A lot of former senior government officials who played important roles in this debacle have done quite well for themselves. [Former CIA director George Tenet] missed multiple signs of a major Al Qaeda attack directed against the United States [prior to 9/11] and approved the Bush administration’s torturing of terror suspects. He got the Presidential Medal of Freedom. He [also] received a $4 million advance to write a memoir. Tenet has received millions more in his current role as ... a board director and advisor to intelligence and military contractors. Louis Freeh, Tenet’s counterpart at the FBI during the run-up to 9/11 [also mishandled] “significant and urgent” intelligence of “serious operational planning” for terrorism attacks by Islamic radicals. Freeh resigned from the FBI two months before 9/11. In 2008, [a businessman named Nasser Kazeminy] was accused of bribing former Senator Norm Coleman, [and] hired Freeh to conduct a “thorough investigation” of the allegations against him in the hopes of clearing his name. In 2011, Freeh issued a public statement saying that his investigation had “completely vindicated” both Kazeminy and Coleman. Freeh also met with the Justice Department – which was investigating the bribery charges but declined to bring a case — on Kazeminy’s behalf. [Today, Freeh has a $3 million] Palm Beach penthouse. Freeh’s wife co-owns it with Kazeminy. The quit claim deed giving Freeh’s wife one-half ownership of the penthouse was signed nine days after Freeh’s vindication of Kazeminy.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in intelligence agencies and government.
Last March, Senator Dianne Feinstein accused the CIA of spying on the Senate intelligence committee as it labored to finalize its report on the torture of prisoners. CIA Director John Brennan denied the charge. “Nothing could be further from the truth,” he said. “We wouldn’t do that. That’s just beyond the scope of reason in terms of what we’d do.” His denial was publicly proved false. "An internal investigation by the C.I.A. has found that its officers penetrated a computer network used by the Senate Intelligence Committee in preparing its damning report on the C.I.A.’s detention and interrogation program," The New York Times reported. "The report ... found that C.I.A. officers read the emails of the Senate investigators and sent a criminal referral to the Justice Department based on false information." "A panel investigating the C.I.A.’s search of a computer network used by staff members of the Senate Intelligence Committee ... will recommend against punishing anyone," The New York Times reports. "The panel will make that recommendation after the five C.I.A. officials who were singled out by the agency’s inspector general this year for improperly ordering and carrying out the computer searches staunchly defended their actions, saying that they were ... done at the behest of John O. Brennan."
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
President Obama [has thus far] failed to bring to justice anyone responsible for the ... official government [torture] program conceived and carried out in the years after the attacks of Sept. 11, 2001. He did allow his Justice Department to investigate the C.I.A.'s destruction of videotapes of torture sessions and those who may have gone beyond the torture techniques authorized by President George W. Bush. But the investigation did not lead to any charges being filed. The American Civil Liberties Union and Human Rights Watch are ... calling for appointment of a special prosecutor to investigate what appears increasingly to be “a vast criminal conspiracy, under color of law, to commit torture and other serious crimes.” The question everyone will want answered, of course, is: Who should be held accountable? Any credible investigation should include former Vice President Dick Cheney; Mr. Cheney’s chief of staff, David Addington; the former C.I.A. director George Tenet; and John Yoo and Jay Bybee, the Office of Legal Counsel lawyers who drafted what became known as the torture memos. There are many more names that could be considered. Because of the Senate’s report, we now know the distance officials in the executive branch went to rationalize, and conceal, the crimes they wanted to commit. The question is whether the nation will stand by and allow the perpetrators of torture to have perpetual immunity for their actions.
Note: Some have called for prosecuting those responsible as violators of international rules against human experimentation. For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices and widespread government corruption.
Drone strikes and "targeted killings" of terror targets by the United States can be counterproductive and bolster the support of extremist groups, the CIA has admitted in a secret report released by WikiLeaks. The document, by the intelligence agency's Directorate of Intelligence, said that despite the effectiveness of "high value targeting" (HVT), air strikes and special forces operations had a negative impact by boosting the popular support of terror organisations. The CIA report is dated 2009 and talks of operations conducted in countries such as Iraq, Pakistan, Somalia, Afghanistan and Yemen. Operations against terror targets "may increase support for the insurgents, particularly if these strikes enhance insurgent leaders' lore, if non-combatants are killed in the attacks, if legitimate or semi-legitimate politicians aligned with the insurgents are targeted, or if the government is already seen as overly repressive or violent," the report said. "Senior Taliban leaders' use of sanctuary in Pakistan has also complicated the HVT effort," it reveals. "Moreover, the Taliban has a high overall ability to replace lost leaders ... especially at the middle levels." It speaks of drone strikes also having limited effect in Iraq. According to the Bureau of Investigative Journalism, US drone strikes have killed between 2,400 and 3,888 people in Pakistan in the years 2004 to 2014 and between 371 and 541 people in Yemen in the years 2002 to 2014.
Note: This report proves that the CIA has been aware that drone strikes are ineffective since at least 2009. If drones help terrorists, almost always miss their intended targets, and may be used to target people in the US in the future, what are the real reasons for the US government's drone program?
One quiet consequence of this week’s sensational release of the Senate Intelligence Committee’s report on the C.I.A. detention program was a telephone call that a human rights lawyer, Meg Satterthwaite, placed to a client in Yemen, Mohamed Bashmilah. For eight years since Mr. Bashmilah, 46, was released from C.I.A. custody, Ms. Satterthwaite ... had been trying without success to get the United States government to acknowledge that it had held him in secret prisons for 19 months and to explain why. In the phone call on Wednesday, she told him that the Senate report listed him as one of 26 prisoners who, based on C.I.A. documents, had been “wrongfully detained.” After learning the news, Mr. Bashmilah pressed Ms. Satterthwaite, who heads the global justice program at New York University Law School, to tell him what might follow from the Senate’s recognition. Would there be an apology? Would there be some kind of compensation? Among the others mistakenly held for periods of months or years, according to the report, were an “intellectually challenged” man held by the C.I.A. solely to pressure a family member to provide information; two people who were former C.I.A. informants; and two brothers who were falsely linked to Al Qaeda. Ms. Satterthwaite was not able to answer Mr. Bashmilah’s question about an apology or reparation. No apology was forthcoming from the C.I.A., which declined to comment on specific cases.
Note: An ACLU lawsuit filed on behalf of Mr. Bashmilah and others flown to prisons on C.I.A. aircraft was dismissed on the grounds that it might expose state secrets. For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
Ever since the torture report was released last week, U.S. television outlets have endlessly featured American torturers and torture proponents. But there was one group that was almost never heard from: the victims of their torture. The War on Terror generally has been “reported” for 13 years and counting by completely silencing those whose lives are destroyed or ended by U.S. crimes. In 2002, Maher [Arar], a Canadian citizen of Syrian descent who worked as an engineer, was travelling back home to Ottawa when he was abducted by the U.S. Government at JFK Airport, [secretly] interrogated for weeks, then “rendered” to Syria where the U.S. arranged to have him brutally tortured ... for 10 months. He was completely innocent, [and was] unceremoniously released back to his life in Canada as though nothing had happened. U.S. courts refused even to hear his case, accepting the Obama DOJ’s claim that it was too secret to safely adjudicate. The Canadian government ... publicly apologized for its role, and paid him $9 million. There are hundreds if not thousands of Maher Arars the U.S. media could easily and powerfully interview. The detainees held without charges, tortured, and then unceremoniously released from Guantanamo and Bagram are rarely if ever heard from on U.S. television, even when the U.S. Government is forced to admit that they were guilty of nothing.
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption that is supported by equally corrupt mass media.
The “war on terror” is not the CIA’s first venture into human experimentation. At the dawn of the Cold War, German scientists and doctors with Nazi records of human experimentation were given new identities and brought to the United States under Operation Paperclip. In 1953, the CIA established the MK-ULTRA program, [which] evolved into experiments in psychological torture. During the Vietnam War, the CIA developed the Phoenix program, which combined psychological torture with brutal interrogations, human experimentation and extrajudicial executions. In 1963, the CIA produced a manual titled “Kubark Counterintelligence Interrogation” to guide agents in the art of extracting information. An updated version of the Kubark guide [was] produced in 1983 and titled “Human Resource Exploitation Manual” [for CIA supported] right-wing regimes in Latin America and Southeast Asia. Here we are again. On April 15, 2002, [psychologists hired by the CIA] Mitchell and Jessen arrived at a black site in Thailand to supervise the interrogation of Abu Zubaydah, the first “high-value detainee” captured by the CIA. From then ... at least thirty-eight people were subjected to psychological and physical torments, and the results were methodically documented and analyzed. That is the textbook definition of human experimentation.
Note: For more along these lines, see this list depicting the rampant use of humans as guinea pigs in government, military, and medical experiments over the last century, or watch "Human Resources", a two-hour documentary on the subject. For more, see the excellent, reliable resources provided in our Mind Control Information Center.
Months before the operation that killed Osama bin Laden in 2011, the Central Intelligence Agency secretly prepared a public-relations plan that would stress that information gathered from its disputed interrogation program had played a critical role in the hunt. Starting the day after the raid, agency officials in classified briefings made that point to Congress. But in page after page of previously classified evidence, the Senate Intelligence Committee report on C.I.A. torture, released Tuesday, rejects the notion that torturing detainees contributed to finding Bin Laden. The crucial breakthrough in the hunt was the identification of ... Abu Ahmed al-Kuwaiti. The United States had started wiretapping a phone number associated with Mr. Kuwaiti by late 2001. It was in 2004 that the C.I.A. came to realize that it should focus on finding Mr. Kuwaiti as part of the hunt for Bin Laden. [A man named] Hassan Ghul, who had been captured in Iraqi Kurdistan ... provided “the most accurate” intelligence that the agency produced about Mr. Kuwaiti’s role and ties to Bin Laden. Mr. Ghul provided all the important information about [Mr. Kuwaiti] before he was subjected to any torture techniques. During that [initial] two-day period in January 2004, “He opened up right away and was cooperative from the outset.” Nevertheless, the C.I.A. then decided to torture Mr. Ghul. During and after that treatment, he provided “no actionable threat information.”
Note: Read revealing excerpts from this most disturbing report.
The UN and human rights groups have called for the prosecution of US officials involved in what a Senate report called the "brutal" CIA interrogation of al-Qaeda suspects. UN Special Rapporteur on Human Rights and Counter-Terrorism Ben Emmerson said that senior officials from the administration of George W Bush who planned and sanctioned crimes must be prosecuted, as well as CIA and US government officials responsible for torture. "As a matter of international law, the US is legally obliged to bring those responsible to justice," Mr Emmerson said in a statement made from Geneva. Correspondents say that the chances of prosecuting members of the Bush administration are unlikely. Several countries suspected to have hosted [CIA torture] sites reacted strongly to the publication. Poland's former president [Aleksander Kwasniewski] has publicly acknowledged for the first time [that] his country hosted a secret CIA prison. Lithuanian Prime Minister Algirdas Butkevicius called on the US to say whether CIA used his country to interrogate prisoners. Afghanistan's President Ashraf Ghani called the report "shocking", saying the actions "violated all accepted norms of human rights in the world".
Note: Read revealing excerpts from this most disturbing report. For more, read how the CIA teamed up with the UK's MI6 to kidnap people and deliver them to be tortured at a Libyan site in 2004. Could this US program have happened without strong international support?
The release of the Feinstein report [places] the end of the American "torture" regime in January of 2009. I'm not sure I'm buying that the U.S. government suddenly got religion about mistreatment of terror suspects once Obama took office, particularly since this government massively accelerated a drone-assassination program. Still, the end result [shows] that we approved behaviors far worse, and far weirder, than was ever admitted to previously. CIA detainees were subjected to "rectal rehydration" or rectal feeding ... to put them in a talking mood. The interrogators gave pet names to all of their ... permitted techniques, as outlined in the report: (1) attention grasp, (2) walling, (3) facial hold, (4) facial slap (insult slap), (5) cramped confinement, (6) wall standing, (7) stress positions, (8) sleep deprivation, (9) insects placed in a confinement box, and (10) the waterboard. A small confinement box ... had a width of 21 inches, a depth of 2.5 feet, and a height of 2.5 feet. They didn't just put people in these boxes. They [added] insects. Detainees at COBALT were subjected to what was described as a "rough takedown" [wherein] five CIA officers would scream at a detainee, drag him outside of his cell, cut his clothes off, and secure him with Mylar tape. The detainee would then be hooded and [repeatedly] slapped and punched. Gul Rahman was said to have died after one of these choreographed scare-scenes.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
Former CIA officer John Kiriakou is the only CIA employee connected to its interrogation program to go to prison. But he was prosecuted for providing information to reporters, not for anything connected to ... “torture.” No other person connected to the program has been charged with a crime, after the Justice Department said their actions had been approved legally or that there was not sufficient admissible evidence in a couple cases of potential wrongdoing, even in light of the death of two detainees in the early 2000s. Kiriakou was the first person with direct knowledge of the CIA interrogation program to publicly reveal its existence, in an interview with ABC News in 2007. He is now serving a nearly-three-year prison sentence for violating the Intelligence Identities Protection Act, but he says that’s only what the government wants people to believe. “In truth, this is my punishment for blowing the whistle on the CIA’s illegal torture program and for telling the public that torture was official U.S. government policy,” Kiriakou said in a letter last May from a prison in Loretto, Penn. In his groundbreaking interview with ABC News and later with other news outlets, Kiriakou described the details of the program. In some cases, it turned out that even Kiriakou ... was misled or kept in the dark about the extent of the program.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
Sen. Dianne Feinstein’s last act as chair of the Senate Intelligence Committee ... had Washington’s most powerful forces arrayed against her. At the end ... Feinstein said she was more determined than ever to release the summary of a 6,700-page report on the CIA’s use of torture after the terrorist attacks of Sept. 11, 2001. “She has been vilified, the committee was spied on, the CIA and its supporters ran what amounted to a domestic disinformation campaign against the report and the committee,” said Stephen Rickard, executive director of the Open Society Policy Center, a civil liberties and human rights group in Washington. “She did her job.” Her job was to provide congressional oversight of an executive branch agency, and she met prolonged and intense resistance. Feinstein called the report “the most significant and comprehensive oversight report in the committee’s history, and perhaps in that of the U.S. Senate.” The Senate panel examined nearly 6.3 million pages of documents, without Republican cooperation and against the resistance of the CIA, which went so far as to hack Intelligence Committee computers and threaten to bring criminal charges against the staff. Although President Obama insisted he wanted the report made public, administration officials reportedly pressed for redactions that Senate Democrats said would make the report meaningless.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
James Risen, who won the Pulitzer Prize in 2005 for exposing the NSA warrantless eavesdropping program, has [been] threatened with prison by the Obama Justice Department. [This] is almost certainly the vindictive by-product of the U.S. government’s anger over his NSA reporting. He has published a new book on the War on Terror entitled Pay Any Price: Greed, Power and Endless War. Risen's [critique] is one of the first to offer large amounts of original reporting on ... a particular part of the War on Terror, namely the way in which economic motives, what [he] calls the Homeland Security Industrial Complex, has driven a huge part of the war. GLENN GREENWALD: How much of this economic motive is the cause of the fact that we’ve now been at war for 13 years? RISEN: It plays a really central role. After so many years there’s ... a post-9/11 mercenary class that’s developed that have invested. Not just people who are making money, but people who are in the government. Their status and their power within the government are invested in continuing the war. There’s very little debate about whether to continue the war. When Dick Cheney said, “the gloves come off,” ... that really meant, “We’re going to deregulate national security, and we’re going to take off all the rules that were imposed in the ’70s after Watergate.” That was just a dramatic change. It’s been extended to this whole new homeland security apparatus. People think that terrorism is an existential threat, even though it’s not, and so they’re willing to go along with all this.
Note: The complete interview at the link above provides details of James Risen's fight to preserve journalistic integrity against a corrupted government's attempts to manipulate the news. For more on Risen's deeply revealing investigation of the Homeland Security Industrial Complex, see this recent NPR interview.
A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security. National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the Russian government. The hacked software is used to control ... oil and gas pipelines, power transmission grids, water distribution and filtration systems, wind turbines and even some nuclear plants. The hacking campaign has been ongoing since 2011, but no attempt has been made to activate the malware. DHS sources ... fear that the Russians have torn a page from the old, Cold War playbook, and have placed the malware in key U.S. systems as a threat, and/or as a deterrent to a U.S. cyber-attack on Russian systems. The hack became known to insiders last week when a DHS alert bulletin was issued. The bulletin said the “BlackEnergy” penetration recently had been detected by several companies. DHS said “BlackEnergy” is the same malware that was used ... to target NATO and some energy and telecommunications companies. The hacked software is very advanced. It allows designated workers to control various industrial processes through the computer, an iPad or a smart phone, sources said.
Note: For an example of a computer-based attack on industrial infrastructure, read how a malware called Stuxnet targeted Iranian nuclear facilities. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
In the largest opium harvest in Afghanistan's history; with a record 224,000 hectares under cultivation this year, the country produced an estimated 6,400 tons of opium, or around 90 percent of the world's supply. In Afghanistan today, according to U.N. estimates, the opium industry accounts for 15 percent of the economy. The Afghan narcotics trade has gotten undeniably worse since the U.S.-led invasion: The country produces twice as much opium as it did in 2000. In the provincial capital of Lashkar Gah, I arrange an interview with a drug smuggler. I'll call him Sami. He grew up in a camp near the border town of Chagai, in Pakistan. After finishing 11th grade, he got work as a driver and began ... smuggling opium through the desert. Baramcha, a smuggling hub on the Afghan side of the border ... functions as a kind of switching station for much of the opium trade. "The security situation is good ... the drug smugglers and the ISI are tight together," he says, referring to Pakistan's intelligence service. The United States' alliances with opium traffickers in Afghanistan go back to the 1980s, when the CIA waged a dirty war to undermine the Soviet occupation of the country. Large-scale cultivation was introduced [with] support from the ISI and the CIA. U.S. counternarcotics programs, which have cost nearly $8 billion to date, and the Afghan state-building project in general, are perversely part of ... the drug trade.
Note: Read the complete article above for an in depth look at the Afghan narcotics trade. For more, read this 2002 news article, which shows that the Taliban had nearly eliminated opium production in Afghanistan prior to the US led invasion. Yet once the allies defeated the Taliban, opium production hit new records. Today, Afghanistan produces 90% of the global opium supply. This huge source of income is used to fund all kinds of secret projects. Read powerful evidence that the CIA and US military are directly involved in the drug trade.
Bryce Lockwood, Marine staff sergeant, Russian-language expert, recipient of the Silver Star for heroism: "I'm angry! I'm seething with anger! Forty years, and I'm seething with anger!" Lockwood was aboard the USS Liberty, a super-secret spy ship on station in the eastern Mediterranean, when four Israeli fighter jets flew out of the afternoon sun to strafe and bomb the virtually defenseless vessel on June 8, 1967, the fourth day of what would become known as the Six-Day War. Four decades later, many of the more than two dozen Liberty survivors located and interviewed by the Tribune cannot talk about the attack without shouting or weeping. Their anger has been stoked by the declassification of government documents and the recollections of former military personnel. In declassifying the most recent and largest batch of materials last June 8, the 40th anniversary of the attack, the NSA ... acknowledged that the attack had "become the center of considerable controversy." It was not the agency's intention, it said, "to prove or disprove any one set of conclusions, many of which can be drawn from a thorough review of this material." Air Force Capt. Richard Block was ... monitoring Middle Eastern communications [on June 8, 1967]. "Some of the pilots did not want to attack," Block said. "The pilots said, 'This is an American ship. Do you still want us to attack?'" And ground control came back and said, 'Yes, follow orders.'"
Note: The Jerusalem Post has now confirmed that Israel knew the USS Liberty was American. Watch the powerfully incriminating documentary "The Day Israel Attacked America" about the 1967 intentional attack on the USS Liberty which was virtually erased from all historical accounts.
The intelligence services have routinely been intercepting legally privileged communications ... according to internal MI5, MI6 and GCHQ documents. The information obtained may even have been exploited unlawfully and used by the agencies in the fighting of court cases in which they themselves are involved, the Investigatory Powers Tribunal (IPT) has been told. MP David Davis, a former shadow home secretary, said past practice was to delete such material immediately if it was ever picked up. 28 extracts of internal intelligence policies showing how legally privileged material is handled by security officials were released to lawyers pursuing a claim through the IPT. The claim has been brought by two Libyans, Abdel-Hakim Belhaj and Sami Al Saadi. They were abducted in a joint MI6-CIA operation and ... tortured by Colonel Muammar Gaddafi’s regime in 2004. Belhaj has been given permission to sue the government for his mistreatment. Davis, who attended the hearing, said: “In the past, when a bug or intercept on a criminal accidentally picked up a conversation with the criminal’s lawyer, the rule was that it was immediately deleted. Today’s hearing shows that is no longer the case. Agencies are clearly keeping records of legal privileged material, and have explicit policies to handle it. In the case of MI5 that policy includes concealing ... that they have the material. This change has been carried out without changing the law or telling parliament. This is an enormous breach of defendants’ judicial rights.”
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable sources.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.