Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. SOMALGET is part of a broader NSA program called MYSTIC, which ... is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has never said what it was seeking when it invaded the computers of Petrobras, Brazil’s huge national oil company, but angry Brazilians have guesses: the company’s troves of data on Brazil’s offshore oil reserves, or perhaps its plans for allocating licenses for exploration to foreign companies. Nor has the N.S.A. said what it intended when it got deep into the computer systems of China Telecom, one of the largest providers of mobile phone and Internet services in Chinese cities. But documents released by Edward J. Snowden, the former agency contractor now in exile in Russia, leave little doubt that the main goal was to learn about Chinese military units, whose members cannot resist texting on commercial networks. The agency’s interest in Huawei, the giant Chinese maker of Internet switching equipment, and Pacnet, the Hong Kong-based operator of undersea fiber optic cables, is more obvious: Once inside those companies’ proprietary technology, the N.S.A. would have access to millions of daily conversations and emails that never touch American shores. The [US] government does not deny it routinely spies to advance American economic advantage, which is part of its broad definition of how it protects American national security. While the N.S.A. cannot spy on Airbus and give the results to Boeing, it is free to spy on European or Asian trade negotiators and use the results to help American trade officials — and, by extension, ... American industries.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
When NSA contractor Edward Snowden downloaded tens of thousands of top-secret documents from a highly secure government network, it led to the largest leak of classified information in history — and sparked a fierce debate over privacy, technology and democracy in the post-9/11 world. Now, in "United States Of Secrets," FRONTLINE goes behind the headlines to reveal the dramatic inside story of how the U.S. government came to monitor and collect the communications of millions of people around the world—including ordinary Americans—and the lengths they went to trying to hide the massive surveillance program from the public. “This is as close to the complete picture as anyone has yet put together — and it’s bigger and more pervasive than we thought,” says veteran FRONTLINE filmmaker Michael Kirk. In part one ... Kirk [pieces] together the secret history of the unprecedented surveillance program that began in the wake of September 11 and continues today – even after the revelations of its existence by Edward Snowden. Then, in part two, premiering Tuesday, May 20 ..., veteran FRONTLINE filmmaker Martin Smith continues the story, exploring the secret relationship between Silicon Valley and the National Security Agency, and investigating how the government and tech companies have worked together to gather and warehouse your data. “Through in-depth interviews with more than 60 whistleblowers, elected officials, journalists, intelligence insiders and cabinet officials, we have woven together the secret narrative that reveals the scale and scope of the government’s spying program,” says Kirk.
Note: Don't miss this engaging program, available at this link. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
On Sunday 9 June 2013, the Guardian published the story that revealed [Edward] Snowden to the world. The article told Snowden's story, conveyed his motives, and proclaimed that "Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley [now Chelsea] Manning." We quoted [a note from Snowden that said:] "I understand that I will be made to suffer for my actions … but I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant." The reaction to the article and the video was more intense than anything I had experienced as a writer. Ellsberg himself, writing the following day in the Guardian, proclaimed that "there has not been in American history a more important leak than Edward Snowden's release of NSA material – and that definitely includes the Pentagon Papers 40 years ago". Several hundred thousand people posted the link to their Facebook accounts in the first several days alone. Almost three million people watched the interview on YouTube. Many more saw it on the Guardian's website. The overwhelming response was shock and inspiration at Snowden's courage.
Note: Don't miss the full, exciting story of how Snowden originally came to leak his stunning information at the link above. This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
The opportunity those in power have to characterise political opponents as "national security threats" or even "terrorists" has repeatedly proven irresistible. In the past decade, the government ... has formally so designated environmental activists, broad swaths of anti-government rightwing groups, anti-war activists, and associations organised around Palestinian rights. One document from the Snowden files, dated 3 October 2012, chillingly underscores the point. It revealed that the agency has been monitoring the online activities of individuals it believes express "radical" ideas and who have a "radicalising" influence on others. Among the information collected about the individuals, at least one of whom is a "US person", are details of their online sex activities and "online promiscuity." The agency discusses ways to exploit this information to destroy their reputations and credibility. The record is suffused with examples of groups and individuals being placed under government surveillance by virtue of their dissenting views and activism – Martin Luther King, the civil rights movement, anti-war activists, environmentalists. The NSA's treatment of Anonymous ... is especially troubling and extreme. Gabriella Coleman, a specialist on Anonymous at McGill University, said that [Anonymous] "is not a defined" entity but rather "an idea that mobilises activists to take collective action and voice political discontent. It is a broad-based global social movement with no centralised or official organised leadership structure. Some have rallied around the name to engage in digital civil disobedience, but nothing remotely resembling terrorism."
Note: This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
Back in December, 60 Minutes broadcast a now-notorious segment of pure access journalism in which they gullibly disseminated one false NSA claim after the next. The program claimed that Snowden “is believed to still have access to 1.5 million classified documents he has not leaked”. Ever since then, that Snowden “stole” 1.7 or 1.8 million documents from the NSA has been repeated over and over again by US media outlets as verified fact. The Washington Post‘s Walter Pincus, citing an anonymous official source, purported to tell readers that “among the roughly 1.7 million documents he walked away with — the vast majority of which have not been made public — are highly sensitive, specific intelligence reports”. Reuters frequently includes in its reports the unchallenged assertion that “Snowden was believed to have taken 1.7 million computerized documents.” In fact, that number is and always has been a pure fabrication, as even Keith Alexander admits. The claimed number has changed more times than one can count: always magically morphing into randomly chosen higher and scarier numbers. The reality, in the words of the General, is that the US Government ”really [doesn't know] what he actually took with him” and they ”don’t have an accurate way of counting”. All they know is how many documents he accessed in his entire career at NSA, which is a radically different question from how many documents he took. But that hasn’t stopped American media outlets from repeatedly affirming the inflammatory evidence-free claim that Snowden took 1.7 million documents.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
John Lennon sure was a feisty one. The ex-Beatle protested war, promoted peace and once wrote a song called "I Am the Walrus." No wonder the FBI put [Lennon] on its watch list before the 1972 Republican National Convention (which the feds erroneously thought he might disrupt), terminated his visa and began deportation proceedings — at the suggestion of Senator Strom Thurmond. During the 1972 presidential election, the FBI monitored Lennon's television appearances and concerts and even followed the activities of Yoko Ono's daughter from a previous marriage. Lennon didn't do anything suspicious, so the FBI closed its investigation a month after Nixon's re-election. After Lennon's murder in 1980, historian Jon Weiner fought a 14-year legal battle to force the FBI to release its Lennon files under the Freedom of Information Act. In the end, he won. The findings are detailed in the 2006 documentary The U.S. vs. John Lennon.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Contradicting an earlier assertion made under oath by a senior FBI official, an attorney for the Justice Department said [on April 30] that the FBI has identified four more boxes of “classified” 9/11 documents held by its Tampa field office. The government, however, has yet to comply with a federal judge’s orders ... that it turn over copies of that massive 9/11 file — now said to total 27 boxes — for his personal inspection. U.S. District Judge William J. Zloch issued those orders in a Freedom of Information lawsuit brought by BrowardBulldog.org seeking records about the FBI’s investigation into apparent pre-9/11 terrorist activity in Sarasota. Former Florida Sen. Bob Graham, who co-chaired Congress’ Joint Inquiry into the 9/11 attacks, has said that the FBI did not disclose the existence of the Sarasota investigation to either the Joint Inquiry or the subsequent 9/11 Commission. The documents state that the Sarasota Saudis had “many connections” to “individuals associated with the terrorist attacks on 9/11/2001.” One document lists three individuals, with names blacked out, and ties them to the Venice, Fla., flight school where suicide hijackers Atta and Marwan al-Shehhi trained.
Note: For solid evidence that many more were involved in 9/11 than is generally admitted, see the revealing newspaper article at this link. For an excellent documentary focused on the Venice, Florida flight school which all but proves a major cover-up involving US citizens involved in the planning of 9/11, click here. And for a treasure trove of reliable information showing a major cover-up around 9/11, click here.
Former National Security Agency contractor Edward Snowden, and one of the reporters who first broke the news of Snowden's documents, Laura Poitras, received a Ridenhour Truth-Teller prize [on April 30] to a standing ovation at the National Press Club. Snowden leaked classified documents that exposed the NSA's massive global surveillance programs. Snowden ... compared his actions with that of Director of National Intelligence James R. Clapper, who denied that the NSA was "wittingly" collecting data on millions of Americans in a Senate Intelligence Committee hearing last spring -- a claim at odds with revelations about domestic phone records collection as a result of documents provided by Snowden. "The oath that I remember is James Clapper raising his hand, swearing to tell the truth and then lying to the American public," Snowden said. "I also swore an oath, but that oath was not to secrecy, but to defend the American Constitution." While Clapper has accused Snowden of perpetrating the most "massive and damaging theft of intelligence" in U.S. history, Snowden argues his actions were serving a larger public interest that superseded the national intelligence need for secrecy. Later in the speech, he described Clapper as having "committed a crime by lying under oath to the American people," and questioned why charges were never brought against the director. By contrast, Snowden said, charges were brought against him soon after he revealed himself as the source of the leaks.
Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.
Britain’s electronic surveillance agency, Government Communications Headquarters [GCHQ], has long presented its collaboration with the National Security Agency’s massive electronic spying efforts as proportionate, carefully monitored, and well within the bounds of privacy laws. But according to a top-secret document in the archive of material provided to The Intercept by NSA whistleblower Edward Snowden, GCHQ secretly coveted the NSA’s vast troves of private communications and sought “unsupervised access” to its data as recently as last year. The document, dated April 2013, reveals that GCHQ requested broad new authority to tap into data collected under a law that authorizes a variety of controversial NSA surveillance initiatives, including the PRISM program. PRISM is a system used by the NSA and the FBI to obtain the content of personal emails, chats, photos, videos, and other data processed by nine of the world’s largest internet companies, including Google, Yahoo!, Microsoft, Apple, Facebook, and Skype. The arrangement GCHQ proposed would also have provided the British agency with greater access to millions of international phone calls and emails that the NSA siphons directly from phone networks and the internet. The Snowden files do not indicate whether NSA granted GCHQ’s request, but they do show that the NSA was “supportive” of the idea, and that GCHQ was permitted extensive access to PRISM during the London Olympics in 2012. The request for the broad access was communicated at “leadership” level.
Note: For more on the construction of a total surveillance state, see the deeply revealing reports from reliable major media sources available here.
The Obama administration has barred officials at 17 agencies from speaking to journalists about unclassified intelligence-related topics without permission, according to a newly disclosed directive. The directive, issued by James R. Clapper Jr., the director of national intelligence, also requires the agencies’ employees to report any unplanned contact with journalists. Officials who violate the directive may be disciplined or fired, the directive says. The directive prohibits unauthorized “contact with the media about intelligence-related information, including intelligence sources, methods, activities and judgments,” without regard to whether it is classified. It says that employees who violate the policy “may be subject to administrative actions that may include revocation of security clearances or termination of employment.” At a minimum, the directive adds, any violation of the policy “will be handled in the same manner as a security violation.” Mr. Clapper signed the directive on March 20, and it was quietly posted on the office’s website last week. The directive limiting contact with reporters was reported Monday by Steve Aftergood, a government secrecy specialist for the Federation of American Scientists. In a blog post, Mr. Aftergood portrayed the directive as seeking to ensure that “the only news about intelligence is to be authorized news.” He criticized the policy as going too far, arguing that routine interactions between agency employees and reporters about unclassified matters did not pose a threat to national security, but that limiting them would hurt the public.
Note: Yet another major effort to muzzle whistleblowers. For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Two weeks ago, a pair of F.B.I. agents appeared unannounced at the door of a member of the defense team for one of the men accused of plotting the 9/11 terrorist attacks. As a contractor working with the defense team at Guantánamo Bay, Cuba, the man was bound by the same confidentiality rules as a lawyer. But the agents wanted to talk. They asked questions, lawyers say, about the legal teams for Ramzi bin al-Shibh, Khalid Shaikh Mohammed and other accused terrorists who will eventually stand trial before a military tribunal at Guantánamo. Before they left, the agents asked the contractor to sign an agreement promising not to tell anyone about the conversation. With that signature, Mr. bin al-Shibh’s lawyers say, the government turned a member of their team into an F.B.I. informant. The F.B.I.’s inquiry became the focus of the pretrial hearings at Guantánamo this week, after the contractor disclosed it to the defense team. It was a reminder that, no matter how much the proceedings at the island military prison resemble a familiar American trial, the invisible hand of the United States government is at work there in ways unlike anything seen in typical courtrooms. “It’s a courtroom with three benches,” said Eugene R. Fidell, who teaches military justice at Yale Law School. “There’s one person pretending to be the judge, and two other agencies behind the scenes exerting at least as much influence.” Thirteen years after 9/11, nobody has been convicted in connection with the attacks.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The federal government’s spy-satellite agency failed to alert authorities after some of its employees and contractors admitted during polygraph tests to crimes including child molestation and lying on security-clearance questionnaires, according to a watchdog. The intelligence community’s inspector general released two reports ... saying the National Reconnaissance Office did not refer some of the cases because of confusion about reporting expectations and requirements. According to one of the reports, an Air Force lieutenant colonel admitted during a 2010 lie-detector test to touching a child in a sexual way and downloading child pornography on his work computer. The NRO only reported that case to the Air Force division that oversees security clearances instead of the Justice Department or the Air Force’s special-investigations office, the inspector general said. The NRO is not legally required to report certain state crimes such as child molestation. Thirty individuals who took NRO lie-detector tests from 2009 through 2012 admitted to child abuse or using child pornography, according to the report. The NRO failed to report three of those cases. Sen. Chuck Grassley (R-Iowa), who requested the review after a McClatchy news investigation raised concerns about the matter in 2012, said the NRO showed a “complete lack of common sense in failing to require reporting of serious state crimes of this sort.”
Note: The NRO is the agency that was running a drill on the morning of 9/11 of an airplane crashing into one of its Washington, DC buildings, as reported in this USA Today article. It has also allegedly been involved in the UFO cover-up, as reported in this testimony.
Two news organizations' stories about National Security Agency surveillance, based upon documents leaked by Edward Snowden, have been awarded the Pulitzer Prize for public service, often described as the highest prize in American journalism. The Washington Post and ... The Guardian each received the prize on [April 14]. The recognition of the NSA reporting was most significant because of the questions raised by Snowden's leaks and the reaction to them. Snowden, who has been living in Russia while seeking asylum from U.S. prosecution, said in a statement that the Pulitzer board's recognition of the coverage was "vindication for everyone who believes that the public has a role in government." "We owe it to the efforts of the brave reporters and their colleagues who kept working in the face of extraordinary intimidation, including the forced destruction of journalistic materials, the inappropriate use of terrorism laws, and so many other means of pressure to get them to stop what the world now recognizes was work of vital public importance." While Snowden provided a trove of documents, reporters including Glenn Greenwald, working for the Guardian; Barton Gellman, working for The Post; and Laura Poitras, who worked with both, pored over the raw information, decided with their editors what parts were ethical to publish, and turned the information into stories that stunned readers around the world.
Note: For more on the historic Snowden revelations, see the deeply revealing reports from reliable major media sources available here.
9/11 [activist] and investigative journalist Michael Ruppert has reportedly committed suicide. The 63-year-old former narcotics investigator with the LAPD shot himself after his radio show, according to an announcement by author Carolyn Baker who was a guest on his final broadcast on [April 13]. Mr Ruppert was famous for his litany of conspiracy theories which encompassed the CIA to drugs, international politics, the oil industry, Wall Street and 9/11. On her Facebook page, Ms Baker wrote: 'This was not a ''fake'' suicide. It was very well planned by Mike who gave us few clues but elaborate instructions for how to proceed without him.' After leaving the LAPD, Mr Ruppert started a website From The Wilderness which claimed to expose government corruption. It included his claims that he had seen drug-dealing at the CIA. Mr Ruppert gained notoriety by confronting then-CIA Director John Deutch during a meeting in 1995 and telling him that he had seen CIA officers involved in drug-dealing. He later claimed on his website that the CIA and American government was involved in 9/11. In 2004, he published Crossing the Rubicon: The Decline of the American Empire at the End of the Age of Oil. The book alleged that former VP Dick Cheney had conspired with Wall Street and other government officials over the September 11 World Trade Center attacks. In 2009, he starred in a documentary called Collapse where he spoke about his theories involving the demise of mankind following the economic and energy crises.
Note: Mike Ruppert was a great hero who courageously reported reliable information the mainstream media would not touch. For a five-minute video of his public testimony on CIA drug running, click here. For a 10-minute video showing his great despair about the condition of the world, click here. Thank you, Mike, for opening the eyes of so many to the deeper realities in our world. Another courageous hero of the 9/11 movement, John Judge, also died, from complications of a stroke, on April 15. For more on his great work, click here. For a great 8-minute video of his revealing powerful information you may not know, click here.
From 1960 to 1965, the CIA brainstormed at least eight plots to assassinate Cuba's Fidel Castro. According to a report prepared in 1967 and declassified 36 years later, the CIA thought of using cigars, contaminated air, poisoned pills, fungus and a poison-filled syringe to take out the Communist leader. One plot, which sought only to damage Castro's image, suggested placing thallium salt in his shoes, in the hope that his beard would fall out. But one idea stood out above the rest: the plan to kill Castro with a booby-trapped seashell. You see, the dictator was a fan of skin diving, so intelligence agents plotted to place an especially spectacular shell in a reef Castro was known to frequent. The hope was that the shell would be so beautiful that Castro would pick it up and, by doing so, trigger an explosive. Desmond Fitzgerald, the CIA's head of Cuban operations, went as far as to buy two books on Caribbean mollusks. But the elaborate scheme was deemed impractical.
Note: For more on assassinations as a tool of government policy, see the deeply revealing reports from reliable major media sources available here.
The FBI’s transformation from a crime-fighting agency to a counterterrorism organization in the wake of the Sept. 11, 2001, attacks has been well documented. Less widely known has been the bureau’s role in secret operations against al-Qaeda and its affiliates in Iraq and Afghanistan, among other locations around the world. With the war in Afghanistan ending, FBI officials have become more willing to discuss a little-known alliance between the bureau and the Joint Special Operations Command (JSOC) that allowed agents to participate in hundreds of raids in Iraq and Afghanistan. The relationship benefited both sides. JSOC used the FBI’s expertise in exploiting digital media and other materials to locate insurgents and detect plots, including any against the United States. The bureau’s agents, in turn, could preserve evidence and maintain a chain of custody should any suspect be transferred to the United States for trial. In early 2003, two senior FBI counterterrorism officials traveled to Afghanistan to meet with the Joint Special Operations Command’s deputy commander at Bagram air base. The pace of activity in Afghanistan was slow at first. An FBI official said there was less than a handful of [Hostage and Rescue Team] deployments to Afghanistan in those early months; the units primarily worked with the SEALs as they hunted top al-Qaeda targets. The tempo quickened with the U.S.-led invasion of Iraq in 2003. At first, the HRT’s mission was mainly to protect other FBI agents when they left the Green Zone, former FBI officials said. In 2005, all of the HRT members in Iraq began to work under JSOC.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. This sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda. Those programs, carried out in secrecy and with little accountability ... threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Last week, Stanford University and New York University released a major study about the use of drones in the ever-evolving but never-ending war on terror. Drones are terrorizing an entire civilian population. [We] spent weeks in Pakistan interviewing more than 60 people from North Waziristan. Many were survivors of strikes. Others had lost loved ones and family members. All of them live under the constant threat of annihilation. What my colleagues and I learned from these unnamed and unknown victims of America's drone warfare gave the report its title: "Living Under Drones." Drones are a constant presence in the skies above the North Waziristan tribal area in Pakistan, with as many as six hovering over villages at any one time. People hear them day and night. They are an inescapable presence, the looming specter of death from above. And that presence is steadily destroying a community twice the size of Rhode Island. The routines of daily life have been ripped to shreds. Indisputably innocent people cower in their homes, afraid to assemble on the streets. "Double taps," or secondary strikes on the same target, have stopped residents from aiding those who have been injured. A leading humanitarian agency now delays assistance by an astonishing six hours. What makes this situation even worse is that no one can tell people in these communities what they can do to make themselves safe. No one knows who is on the American kill list, no one knows how they got there and no one knows what they can do to get themselves off. It's all terrifyingly random. Suddenly, and without warning, a missile launches and obliterates everyone within a 16-yard radius.
Note: The author of this report, Jennifer Gibson, is a staff attorney with Reprieve, a London-based legal charity that represents dozens of Pakistani drone victims. For an excellent, seven-minute video by professors exploring the tragic reality of drone strikes in Pakistan, click here. For the "Living Under Drones" website where you can read a summary and download this report by Stanford University and the New York Times, click here. To learn about a beautiful movement to place large photos of children's faces in target areas to stop drone operators from killing innocents, click here.
At the height of the Cold War, the CIA conducted covert, illegal scientific research on human subjects. Known as Project MK-ULTRA, the program subjected humans to experiments with drugs such as LSD and barbiturates, hypnosis and (some reports indicate) radiological and biological agents. In 1973, CIA Director Richard Helms ordered all documents from Project MK-ULTRA destroyed. Nevertheless, late the following year, the New York Times reported on the illegal activities. In 1975, the Church Committee, headed by Senator Frank Church, and a commission headed by Vice President Nelson Rockefeller investigated the project. They found that over more than two decades, the CIA spent nearly $20 million, enlisted the services of researchers at more than 30 universities and conducted experiments on subjects without their knowledge. Some of the research was performed in Canada. Some historians argue that the goal of the program was to create a mind-control system by which the CIA could program people to conduct assassinations. In 1953, Richard Condon dramatized the idea in the thriller The Manchurian Candidate, which was adapted into a film starring Frank Sinatra. Such ultimately wacky ideas were also dramatized in the recent George Clooney film The Men Who Stare at Goats.
Note: For more on CIA mind control experiments, see the extensive documentation available here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.