Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
One quiet consequence of this week’s sensational release of the Senate Intelligence Committee’s report on the C.I.A. detention program was a telephone call that a human rights lawyer, Meg Satterthwaite, placed to a client in Yemen, Mohamed Bashmilah. For eight years since Mr. Bashmilah, 46, was released from C.I.A. custody, Ms. Satterthwaite ... had been trying without success to get the United States government to acknowledge that it had held him in secret prisons for 19 months and to explain why. In the phone call on Wednesday, she told him that the Senate report listed him as one of 26 prisoners who, based on C.I.A. documents, had been “wrongfully detained.” After learning the news, Mr. Bashmilah pressed Ms. Satterthwaite, who heads the global justice program at New York University Law School, to tell him what might follow from the Senate’s recognition. Would there be an apology? Would there be some kind of compensation? Among the others mistakenly held for periods of months or years, according to the report, were an “intellectually challenged” man held by the C.I.A. solely to pressure a family member to provide information; two people who were former C.I.A. informants; and two brothers who were falsely linked to Al Qaeda. Ms. Satterthwaite was not able to answer Mr. Bashmilah’s question about an apology or reparation. No apology was forthcoming from the C.I.A., which declined to comment on specific cases.
Note: An ACLU lawsuit filed on behalf of Mr. Bashmilah and others flown to prisons on C.I.A. aircraft was dismissed on the grounds that it might expose state secrets. For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
Ever since the torture report was released last week, U.S. television outlets have endlessly featured American torturers and torture proponents. But there was one group that was almost never heard from: the victims of their torture. The War on Terror generally has been “reported” for 13 years and counting by completely silencing those whose lives are destroyed or ended by U.S. crimes. In 2002, Maher [Arar], a Canadian citizen of Syrian descent who worked as an engineer, was travelling back home to Ottawa when he was abducted by the U.S. Government at JFK Airport, [secretly] interrogated for weeks, then “rendered” to Syria where the U.S. arranged to have him brutally tortured ... for 10 months. He was completely innocent, [and was] unceremoniously released back to his life in Canada as though nothing had happened. U.S. courts refused even to hear his case, accepting the Obama DOJ’s claim that it was too secret to safely adjudicate. The Canadian government ... publicly apologized for its role, and paid him $9 million. There are hundreds if not thousands of Maher Arars the U.S. media could easily and powerfully interview. The detainees held without charges, tortured, and then unceremoniously released from Guantanamo and Bagram are rarely if ever heard from on U.S. television, even when the U.S. Government is forced to admit that they were guilty of nothing.
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption that is supported by equally corrupt mass media.
The “war on terror” is not the CIA’s first venture into human experimentation. At the dawn of the Cold War, German scientists and doctors with Nazi records of human experimentation were given new identities and brought to the United States under Operation Paperclip. In 1953, the CIA established the MK-ULTRA program, [which] evolved into experiments in psychological torture. During the Vietnam War, the CIA developed the Phoenix program, which combined psychological torture with brutal interrogations, human experimentation and extrajudicial executions. In 1963, the CIA produced a manual titled “Kubark Counterintelligence Interrogation” to guide agents in the art of extracting information. An updated version of the Kubark guide [was] produced in 1983 and titled “Human Resource Exploitation Manual” [for CIA supported] right-wing regimes in Latin America and Southeast Asia. Here we are again. On April 15, 2002, [psychologists hired by the CIA] Mitchell and Jessen arrived at a black site in Thailand to supervise the interrogation of Abu Zubaydah, the first “high-value detainee” captured by the CIA. From then ... at least thirty-eight people were subjected to psychological and physical torments, and the results were methodically documented and analyzed. That is the textbook definition of human experimentation.
Note: For more along these lines, see this list depicting the rampant use of humans as guinea pigs in government, military, and medical experiments over the last century, or watch "Human Resources", a two-hour documentary on the subject. For more, see the excellent, reliable resources provided in our Mind Control Information Center.
Months before the operation that killed Osama bin Laden in 2011, the Central Intelligence Agency secretly prepared a public-relations plan that would stress that information gathered from its disputed interrogation program had played a critical role in the hunt. Starting the day after the raid, agency officials in classified briefings made that point to Congress. But in page after page of previously classified evidence, the Senate Intelligence Committee report on C.I.A. torture, released Tuesday, rejects the notion that torturing detainees contributed to finding Bin Laden. The crucial breakthrough in the hunt was the identification of ... Abu Ahmed al-Kuwaiti. The United States had started wiretapping a phone number associated with Mr. Kuwaiti by late 2001. It was in 2004 that the C.I.A. came to realize that it should focus on finding Mr. Kuwaiti as part of the hunt for Bin Laden. [A man named] Hassan Ghul, who had been captured in Iraqi Kurdistan ... provided “the most accurate” intelligence that the agency produced about Mr. Kuwaiti’s role and ties to Bin Laden. Mr. Ghul provided all the important information about [Mr. Kuwaiti] before he was subjected to any torture techniques. During that [initial] two-day period in January 2004, “He opened up right away and was cooperative from the outset.” Nevertheless, the C.I.A. then decided to torture Mr. Ghul. During and after that treatment, he provided “no actionable threat information.”
Note: Read revealing excerpts from this most disturbing report.
The UN and human rights groups have called for the prosecution of US officials involved in what a Senate report called the "brutal" CIA interrogation of al-Qaeda suspects. UN Special Rapporteur on Human Rights and Counter-Terrorism Ben Emmerson said that senior officials from the administration of George W Bush who planned and sanctioned crimes must be prosecuted, as well as CIA and US government officials responsible for torture. "As a matter of international law, the US is legally obliged to bring those responsible to justice," Mr Emmerson said in a statement made from Geneva. Correspondents say that the chances of prosecuting members of the Bush administration are unlikely. Several countries suspected to have hosted [CIA torture] sites reacted strongly to the publication. Poland's former president [Aleksander Kwasniewski] has publicly acknowledged for the first time [that] his country hosted a secret CIA prison. Lithuanian Prime Minister Algirdas Butkevicius called on the US to say whether CIA used his country to interrogate prisoners. Afghanistan's President Ashraf Ghani called the report "shocking", saying the actions "violated all accepted norms of human rights in the world".
Note: Read revealing excerpts from this most disturbing report. For more, read how the CIA teamed up with the UK's MI6 to kidnap people and deliver them to be tortured at a Libyan site in 2004. Could this US program have happened without strong international support?
The release of the Feinstein report [places] the end of the American "torture" regime in January of 2009. I'm not sure I'm buying that the U.S. government suddenly got religion about mistreatment of terror suspects once Obama took office, particularly since this government massively accelerated a drone-assassination program. Still, the end result [shows] that we approved behaviors far worse, and far weirder, than was ever admitted to previously. CIA detainees were subjected to "rectal rehydration" or rectal feeding ... to put them in a talking mood. The interrogators gave pet names to all of their ... permitted techniques, as outlined in the report: (1) attention grasp, (2) walling, (3) facial hold, (4) facial slap (insult slap), (5) cramped confinement, (6) wall standing, (7) stress positions, (8) sleep deprivation, (9) insects placed in a confinement box, and (10) the waterboard. A small confinement box ... had a width of 21 inches, a depth of 2.5 feet, and a height of 2.5 feet. They didn't just put people in these boxes. They [added] insects. Detainees at COBALT were subjected to what was described as a "rough takedown" [wherein] five CIA officers would scream at a detainee, drag him outside of his cell, cut his clothes off, and secure him with Mylar tape. The detainee would then be hooded and [repeatedly] slapped and punched. Gul Rahman was said to have died after one of these choreographed scare-scenes.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
Former CIA officer John Kiriakou is the only CIA employee connected to its interrogation program to go to prison. But he was prosecuted for providing information to reporters, not for anything connected to ... “torture.” No other person connected to the program has been charged with a crime, after the Justice Department said their actions had been approved legally or that there was not sufficient admissible evidence in a couple cases of potential wrongdoing, even in light of the death of two detainees in the early 2000s. Kiriakou was the first person with direct knowledge of the CIA interrogation program to publicly reveal its existence, in an interview with ABC News in 2007. He is now serving a nearly-three-year prison sentence for violating the Intelligence Identities Protection Act, but he says that’s only what the government wants people to believe. “In truth, this is my punishment for blowing the whistle on the CIA’s illegal torture program and for telling the public that torture was official U.S. government policy,” Kiriakou said in a letter last May from a prison in Loretto, Penn. In his groundbreaking interview with ABC News and later with other news outlets, Kiriakou described the details of the program. In some cases, it turned out that even Kiriakou ... was misled or kept in the dark about the extent of the program.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
Sen. Dianne Feinstein’s last act as chair of the Senate Intelligence Committee ... had Washington’s most powerful forces arrayed against her. At the end ... Feinstein said she was more determined than ever to release the summary of a 6,700-page report on the CIA’s use of torture after the terrorist attacks of Sept. 11, 2001. “She has been vilified, the committee was spied on, the CIA and its supporters ran what amounted to a domestic disinformation campaign against the report and the committee,” said Stephen Rickard, executive director of the Open Society Policy Center, a civil liberties and human rights group in Washington. “She did her job.” Her job was to provide congressional oversight of an executive branch agency, and she met prolonged and intense resistance. Feinstein called the report “the most significant and comprehensive oversight report in the committee’s history, and perhaps in that of the U.S. Senate.” The Senate panel examined nearly 6.3 million pages of documents, without Republican cooperation and against the resistance of the CIA, which went so far as to hack Intelligence Committee computers and threaten to bring criminal charges against the staff. Although President Obama insisted he wanted the report made public, administration officials reportedly pressed for redactions that Senate Democrats said would make the report meaningless.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
James Risen, who won the Pulitzer Prize in 2005 for exposing the NSA warrantless eavesdropping program, has [been] threatened with prison by the Obama Justice Department. [This] is almost certainly the vindictive by-product of the U.S. government’s anger over his NSA reporting. He has published a new book on the War on Terror entitled Pay Any Price: Greed, Power and Endless War. Risen's [critique] is one of the first to offer large amounts of original reporting on ... a particular part of the War on Terror, namely the way in which economic motives, what [he] calls the Homeland Security Industrial Complex, has driven a huge part of the war. GLENN GREENWALD: How much of this economic motive is the cause of the fact that we’ve now been at war for 13 years? RISEN: It plays a really central role. After so many years there’s ... a post-9/11 mercenary class that’s developed that have invested. Not just people who are making money, but people who are in the government. Their status and their power within the government are invested in continuing the war. There’s very little debate about whether to continue the war. When Dick Cheney said, “the gloves come off,” ... that really meant, “We’re going to deregulate national security, and we’re going to take off all the rules that were imposed in the ’70s after Watergate.” That was just a dramatic change. It’s been extended to this whole new homeland security apparatus. People think that terrorism is an existential threat, even though it’s not, and so they’re willing to go along with all this.
Note: The complete interview at the link above provides details of James Risen's fight to preserve journalistic integrity against a corrupted government's attempts to manipulate the news. For more on Risen's deeply revealing investigation of the Homeland Security Industrial Complex, see this recent NPR interview.
A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security. National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the Russian government. The hacked software is used to control ... oil and gas pipelines, power transmission grids, water distribution and filtration systems, wind turbines and even some nuclear plants. The hacking campaign has been ongoing since 2011, but no attempt has been made to activate the malware. DHS sources ... fear that the Russians have torn a page from the old, Cold War playbook, and have placed the malware in key U.S. systems as a threat, and/or as a deterrent to a U.S. cyber-attack on Russian systems. The hack became known to insiders last week when a DHS alert bulletin was issued. The bulletin said the “BlackEnergy” penetration recently had been detected by several companies. DHS said “BlackEnergy” is the same malware that was used ... to target NATO and some energy and telecommunications companies. The hacked software is very advanced. It allows designated workers to control various industrial processes through the computer, an iPad or a smart phone, sources said.
Note: For an example of a computer-based attack on industrial infrastructure, read how a malware called Stuxnet targeted Iranian nuclear facilities. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
In the largest opium harvest in Afghanistan's history; with a record 224,000 hectares under cultivation this year, the country produced an estimated 6,400 tons of opium, or around 90 percent of the world's supply. In Afghanistan today, according to U.N. estimates, the opium industry accounts for 15 percent of the economy. The Afghan narcotics trade has gotten undeniably worse since the U.S.-led invasion: The country produces twice as much opium as it did in 2000. In the provincial capital of Lashkar Gah, I arrange an interview with a drug smuggler. I'll call him Sami. He grew up in a camp near the border town of Chagai, in Pakistan. After finishing 11th grade, he got work as a driver and began ... smuggling opium through the desert. Baramcha, a smuggling hub on the Afghan side of the border ... functions as a kind of switching station for much of the opium trade. "The security situation is good ... the drug smugglers and the ISI are tight together," he says, referring to Pakistan's intelligence service. The United States' alliances with opium traffickers in Afghanistan go back to the 1980s, when the CIA waged a dirty war to undermine the Soviet occupation of the country. Large-scale cultivation was introduced [with] support from the ISI and the CIA. U.S. counternarcotics programs, which have cost nearly $8 billion to date, and the Afghan state-building project in general, are perversely part of ... the drug trade.
Note: Read the complete article above for an in depth look at the Afghan narcotics trade. For more, read this 2002 news article, which shows that the Taliban had nearly eliminated opium production in Afghanistan prior to the US led invasion. Yet once the allies defeated the Taliban, opium production hit new records. Today, Afghanistan produces 90% of the global opium supply. This huge source of income is used to fund all kinds of secret projects. Read powerful evidence that the CIA and US military are directly involved in the drug trade.
Bryce Lockwood, Marine staff sergeant, Russian-language expert, recipient of the Silver Star for heroism: "I'm angry! I'm seething with anger! Forty years, and I'm seething with anger!" Lockwood was aboard the USS Liberty, a super-secret spy ship on station in the eastern Mediterranean, when four Israeli fighter jets flew out of the afternoon sun to strafe and bomb the virtually defenseless vessel on June 8, 1967, the fourth day of what would become known as the Six-Day War. Four decades later, many of the more than two dozen Liberty survivors located and interviewed by the Tribune cannot talk about the attack without shouting or weeping. Their anger has been stoked by the declassification of government documents and the recollections of former military personnel. In declassifying the most recent and largest batch of materials last June 8, the 40th anniversary of the attack, the NSA ... acknowledged that the attack had "become the center of considerable controversy." It was not the agency's intention, it said, "to prove or disprove any one set of conclusions, many of which can be drawn from a thorough review of this material." Air Force Capt. Richard Block was ... monitoring Middle Eastern communications [on June 8, 1967]. "Some of the pilots did not want to attack," Block said. "The pilots said, 'This is an American ship. Do you still want us to attack?'" And ground control came back and said, 'Yes, follow orders.'"
Note: The Jerusalem Post has now confirmed that Israel knew the USS Liberty was American. Watch the powerfully incriminating documentary "The Day Israel Attacked America" about the 1967 intentional attack on the USS Liberty which was virtually erased from all historical accounts.
The intelligence services have routinely been intercepting legally privileged communications ... according to internal MI5, MI6 and GCHQ documents. The information obtained may even have been exploited unlawfully and used by the agencies in the fighting of court cases in which they themselves are involved, the Investigatory Powers Tribunal (IPT) has been told. MP David Davis, a former shadow home secretary, said past practice was to delete such material immediately if it was ever picked up. 28 extracts of internal intelligence policies showing how legally privileged material is handled by security officials were released to lawyers pursuing a claim through the IPT. The claim has been brought by two Libyans, Abdel-Hakim Belhaj and Sami Al Saadi. They were abducted in a joint MI6-CIA operation and ... tortured by Colonel Muammar Gaddafi’s regime in 2004. Belhaj has been given permission to sue the government for his mistreatment. Davis, who attended the hearing, said: “In the past, when a bug or intercept on a criminal accidentally picked up a conversation with the criminal’s lawyer, the rule was that it was immediately deleted. Today’s hearing shows that is no longer the case. Agencies are clearly keeping records of legal privileged material, and have explicit policies to handle it. In the case of MI5 that policy includes concealing ... that they have the material. This change has been carried out without changing the law or telling parliament. This is an enormous breach of defendants’ judicial rights.”
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable sources.
U.S. violent crimes including murders fell 4.4 percent in 2013 to their lowest number since the 1970s, continuing a decades-long downturn, the FBI said on Monday. The law enforcement agency's annual Crime in the United States report showed the country had an estimated 1.16 million violent crimes last year, the lowest number since 1.09 million were recorded in 1978. All types of violent crimes were lower, with murder and non-negligent manslaughter off 4.4 percent to 14,196, the lowest figure since 1968. Rape was down 6.3 percent and robbery fell 2.8 percent, the Federal Bureau of Investigation data showed. The violent crime rate last year was 367.9 for each 100,000 in population, down 5.1 percent from 2012. The rate has fallen every year since at least 1994, the earliest year for readily accessible FBI data, and the 2013 figure was about half the 1994 rate. Property crimes fell 4.1 percent ... the 11th straight yearly decline. In an analysis, the non-profit Pew Charitable Trusts said the drop in crime coincided with a decline in the prison population, with the number of U.S. prisoners down 6 percent in 2013 from its peak in 2008. Thirty-two of the 50 states have seen a drop in crime rates as the rate of imprisonment fell, Pew said. California notched the largest drop in imprisonment rate over the five-year period, at 15 percent, and crime was down 11 percent. The state has been under court order to reduce prison overcrowding, and voters last week approved an initiative that reduced sentences for some crimes.
Note: Why isn't this inspiring news being broadcast widely by the media? And why hasn't the FBI website updated their data on this since 2010? The police and media appear to consistently downplay the huge drop in violent crime since 1994. According to the FBI's own statistics, violent crime has currently dropped to 1/3 or less what it was in 1994. See the revealing FBI graphs and charts here, here, and here. Yet some of these charts have now been removed and mention of this huge decrease downplayed. The obvious reason is that a large decrease in crime might cause people to want to decrease police and FBI budgets. More here.
The FBI confirmed Tuesday it faked an Associated Press story to catch a bomb threat suspect in 2007. Police in Lacey, near Olympia, sought the FBI's help as repeated bomb threats prompted a week of evacuations at Timberline High School in June 2007. The agency obtained a warrant from a federal magistrate judge to send a "communication" to a social media account ... which contained a software tool that could verify Internet addresses, (and) turned out to be a link to a phony AP story about the bomb threats posted on a Web page created by the FBI. The 15-year-old suspect clicked on the link, revealing his computer's location. The FBI did not initially respond to AP's request earlier Tuesday for further detail about the fake story, beyond saying the ruse was necessary. AP spokesman Paul Colford said Tuesday the FBI's "ploy violated AP's name and undermined AP's credibility." "We are extremely concerned and find it unacceptable that the FBI misappropriated the name of The Associated Press and published a false story attributed to AP." Kathy Best, editor of The Seattle Times, said in a statement that, "The FBI, in placing the name of The Associated Press on a phony story sent to a criminal suspect, crossed a line and undermined the credibility of journalists everywhere — including at The Times." The documents revealing the deception were publicized Monday on Twitter by Christopher Soghoian, the principal technologist for the American Civil Liberties Union.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
In June 2011, (WikiLeaks’ founder) Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt. The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas. Cohen had moved to Google from the U.S. State Department. Schmidt arrived first, accompanied by his then partner, Lisa Shields ... a vice president of the Council on Foreign Relations. Two months later, WikiLeaks’ release of State Department cables was coming to an abrupt end. Two years later, in the wake of his early 2013 visits to China, North Korea and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, “back-channel diplomacy” for Washington. In 1999 ... Schmidt joined the New America Foundation. The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place hundreds of articles and op-eds per year. In 2003, the U.S. National Security Agency (NSA) had already started systematically violating the Foreign Intelligence Surveillance Act (FISA). During the same period, Google ... was accepting NSA money to the tune of $2 million to provide the agency with search tools. In 2012, Google arrived on the list of top-spending Washington, D.C., lobbyists. Whether it is being just a company or “more than just a company,” Google’s geopolitical aspirations are firmly enmeshed within the foreign-policy agenda of the world’s largest superpower.
Note: Read the complete Newsweek article summarized above for Julian Assange's detailed accounting of the connections between Washington D.C. insiders, Google and related technology companies, intelligence agencies, and civil society organizations. For more about Wikileaks, read this news article summary. For more on the geopolitical big picture, see these concise summaries of deeply revealing news articles from reliable major media sources.
Declassified US records reveal the nation's intelligence chiefs used hundreds of Nazis as spies and informants after World War Two. Academics studying the documents say America used at least 1,000 ex-Nazis. Some had served at the highest levels of the Nazi Party, and were recruited to work as spies for the US in Europe. Former SS officer Otto von Bolschwing reportedly wrote policy papers on how to terrorise Jews, but was hired by the CIA to spy in Europe after World War Two. The agency is said to have relocated him and his family to New York in the 1950s as a reward for loyal service. Nazi collaborator Aleksandras Lileikis - linked to the massacres of tens of thousands of Jews in Lithuania - was recruited by the US as a spy in East Germany and later brought over to Boston. There is evidence the CIA even tried to intervene when Mr Lileikis became the subject of a war crimes investigation. Records indicate long-time FBI director J Edgar Hoover not only approved of the use of ex-Nazis as spies, he also dismissed the horrific acts they had been involved in during the war as Soviet propaganda. The revelations come one week after an Associated Press investigation found the US government had paid dozens of suspected Nazi war criminals millions of dollars in Social Security benefits.
Note: Explore powerful evidence that the CIA secretly smuggled Nazi war criminals into the US to teach them mind control techniques.
The Obama version of national security looks almost indistinguishable from the one he inherited. Critics tend to focus on Obama himself, but Tufts University political scientist Michael J. Glennon has a more pessimistic answer: Obama couldnt have changed policies much even if he tried. Our government no longer works that way. In a new book, National Security and Double Government, he catalogs the ways that the defence and national security apparatus is effectively self-governing, with virtually no accountability, transparency, or checks and balances of any kind. He uses the term double government: Theres the one we elect, and then theres the one behind it, steering huge swaths of policy almost unchecked. Elected officials end up serving as mere cover for the real decisions made by the bureaucracy. National Security and Double Government comes favorably blurbed by former members of the Defense Department, State Department, White House, and even the CIA. Glennon spoke with Ideas from his office. IDEAS: Where does the term double government come from? GLENNON: Walter Bagehot - the scholar who presided over the birth of The Economist magazine. IDEAS: What evidence exists for saying America has a double government? GLENNON: The documented evidence in the book is substantial there are 800 footnotes. I think the American people ... believe that when they vote for a president or member of Congress or succeed in bringing a case before the courts, that policy is going to change. Policy by and large in the national security realm is made by the concealed institutions.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
Dozens of suspected Nazi war criminals and SS guards collected millions of dollars in U.S. Social Security benefits after being forced out of the United States. Among those receiving benefits were armed SS troops who guarded the network of Nazi camps where millions of Jews perished; a rocket scientist who used slave laborers to advance his research in the Third Reich; and a Nazi collaborator who engineered the arrest and execution of thousands of Jews in Poland. The deals allowed the Justice Department's former Nazi-hunting unit, the Office of Special Investigations, to skirt lengthy deportation hearings. Social Security benefits became tools, U.S. diplomatic officials said, to secure agreements. The Social Security Administration expressed outrage in 1997 over the use of benefits. Austrian authorities were furious upon learning after the fact about a deal made with Martin Bartesch, a former SS guard at the Mauthausen concentration camp in Austria. "It was not upfront, it was not transparent, it was not a legitimate process," said James Hergen, an assistant legal adviser at the State Department from 1982 until 2007. "This was not the way America should behave." Neal Sher, a former OSI director, said the State Department cared more about diplomatic niceties than holding former members of Adolf Hitler's war machine accountable.
Note: Explore powerful evidence that the CIA secretly smuggled Nazi war criminals into the US to teach them mind control techniques.
A Republican-run House committee voted today to cite Attorney General Eric Holder for contempt after President Obama asserted executive privilege over documents in the "Fast and Furious" operation. The "decision to invoke executive privilege implies that White House officials were either involved in the Fast and Furious operation or the cover-up that followed," said Michael Steel, a spokesman for House Speaker John Boehner, R-Ohio. "The administration has always insisted that wasn't the case. Agents involved in Operation Fast and Furious lost track of some weapons. Two guns were later found at the scene of the killing of a U.S. border patrol agent, Brian Terry. In a statement issue by their attorney, Terry's parents condemned the Obama administration for invoking executive privilege. "Our son, Border Patrol Agent Brian Terry, was killed by members of a Mexican drug cartel armed with weapons from this failed Justice Department gun trafficking investigation," said Josephine Terry and Kent Terry Sr. "For more than 18 months we have been asking our federal government for justice and accountability." The Terrys also said that "our son lost his life protecting this nation, and it is very disappointing that we are now faced with an administration that seems more concerned with protecting themselves rather than revealing the truth behind Operation Fast and Furious." The investigation into the operation was spurred after Sen. Charles Grassley, R-Iowa, inquired into whistle-blower allegations that the government had allowed the transfer of illegally purchased weapons.
Note: For more about the Fast and Furious ATF operation that provided US guns to criminal gangs, see this news summary from a reliable major media source.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.