Intelligence Agency Media ArticlesExcerpts of Key Intelligence Agency Media Articles in Major Media
Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Newly published classified documents show the National Security Agency spied on a 2010 conversation between Italian Prime Minister Silvio Berlusconi and Israeli Prime Minister Benjamin Netanyahu as the two discussed ways to improve Israel’s relationship with the United States. The Italian-Israeli conversation is included in one of five NSA documents released Tuesday by WikiLeaks. Two of the documents focus on climate change, one relates to trade talks, and two report on Italian government communications. The intelligence reports date from 2007 through 2011, [and] provide additional details on U.S. efforts to spy on countries taking part in the 2009 Copenhagen Climate Change Conference, which failed to reach an agreement. One ... contains details of a confidential discussion about climate change negotiations between U.N. Secretary General Ban Ki-moon and the German Chancellor Angela Merkel in the lead-up to the conference. The NSA report is stamped “U.N. diplomatic,” “German leadership,” and Top Secret Gamma, the “Gamma” indicating an extremely sensitive spying operation. The interception methods stated on the latest leaked intelligence reports are “Unconventional” and “SCS,” which stands for Special Collection Service. SCS involves joint NSA and CIA eavesdropping operations run covertly inside U.S. and allied foreign embassy buildings in foreign capitals.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The Federal Bureau of Investigation has quietly developed a new way to measure its success in the war on terror: counting the number of terror threats it has “disrupted” in a year. In the section on “Performance Measures” in the FBI’s latest financial statement, the bureau reports 440 “terror disruptions” in the 12-month period ending on September 30, 2015. That’s ... more than three times the 2015 “target” of 125. In a vacuum, that would appear to suggest that the FBI’s terror-fighting mission - which sucked ... 54 percent of the bureau’s $9.8 billion budget in 2015 - is exceeding expectations. But that number - 440 - is much higher than the number of arrests reported by the FBI. The Washington Post counted about 60 terror-related arrests in 2015. Of those arrests, many were of people trying to travel abroad or trying to help others do so. Many more involved people planning attacks that were essentially imaginary, often goaded by FBI informants. There was only one genuinely “foiled attack” in the United States between January 2014 and September 2015. And that one ... was stopped by the local police department. The fact that the agency establishes a target for terrorism disruptions is also troubling, said Michael German, a former FBI agent.
Note: The FBI has made a habit of manufacturing "terrorist plots" from thin air. Now it appears that activities reminiscent of COINTELPRO are again being carried out to justify massive anti-terrorism spending. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
A UN panel will conclude Wikileaks founder Julian Assange is being "arbitrarily detained" in the UK, the Swedish foreign ministry has said. Mr Assange, 44, claimed asylum in London's Ecuadorean embassy in 2012. The Met Police says Mr Assange will be arrested if he leaves the embassy. The Australian was originally arrested in London in 2010 under a European Arrest Warrant issued by Sweden over rape and sexual assault claims. In 2012, while on bail, he claimed asylum inside the Ecuadorean embassy in Knightsbridge after the UK Supreme Court had ruled the extradition against him could go ahead. Mr Assange's Wikileaks organisation posted secret American government documents on the internet, and he says Washington could seek his extradition to the US to face espionage charges if he is sent to Sweden. In the statement, published earlier by Wikileaks on Twitter, Mr Assange said: "Should the UN announce tomorrow that I have lost my case against the United Kingdom and Sweden I shall exit the embassy at noon on Friday to accept arrest by British police ... However, should I prevail and the state parties be found to have acted unlawfully, I expect the immediate return of my passport and the termination of further attempts to arrest me." Last October, Scotland Yard said it would no longer station officers outside the Ecuador embassy following an operation which it said had cost Ł12.6m. But it said "a number of overt and covert tactics to arrest him" would still be deployed.
Note: Read more about the "legal limbo" and propaganda campaign carried out against Assange and Wikileaks. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Senior CIA officials have for years intentionally deceived parts of the agency workforce by transmitting internal memos that contain false information. The practice is known by the term “eyewash.” Officials said there is no clear mechanism for labeling eyewash cables or distinguishing them from legitimate records being examined by the CIA’s inspector general, turned over to Congress or declassified for historians. Senate investigators uncovered apparent cases of eyewashing as part of a multi-year probe of the CIA’s interrogation program, according to officials who said that the Senate Intelligence Committee found glaring inconsistencies in CIA communications about classified operations, including drone strikes. Former CIA officials ... acknowledged that the internal mechanisms for managing eyewash cables were largely informal. Skeptics described the safeguards as inadequate. “When you introduce falsehoods into the communications stream then you can destabilize the whole system of intelligence oversight and compliance with the law,” said Steven Aftergood, a government secrecy expert at the Federation of American Scientists. “It wasn’t that long ago that we had a CIA executive director who was engaged in criminal activity - you don’t want someone like him preparing eyewash cables,” Aftergood said, referring to Kyle “Dusty” Foggo, the former No. 3 executive at the agency.
Note: Read more about the strange case of Kyle "Dusty" Foggo, the CIA executive convicted of fraud in connection with secret CIA prisons. For more along these lines, see concise summaries of deeply revealing Intelligence agency corruption news articles from reliable major media sources.
Before Julian Assange, the WikiLeaks founder, and Edward Snowden, the intelligence whistleblower, there was Katharine Gun. The former GCHQ employee ... was a young Mandarin specialist at the British government’s eavesdropping agency in Cheltenham. In early 2003 she received an email asking her and her colleagues to help the US government spy on UN security council delegations in New York. It was a critical moment, as Washington was seeking UN backing for its invasion of Iraq. Gun decided the world had to know, whatever the cost to her life and career. She leaked the memo to the Observer and was arrested, lost her job and faced trial under the Official Secrets Act. Thirteen years later, as bloodshed continues in Iraq, the almost forgotten story is to be brought to a new audience in Official Secrets, a movie [that] will chart Gun’s unlikely bid – courageous self-sacrifice to supporters, treachery in the view of critics – to block George W Bush and Tony Blair’s march to war. Unlike many whistleblowers who leak thousands of documents after the event, Gun was intervening in an active operation and trying to stop a war. The US National Security Agency memo told employees of GCHQ to gather “the whole gamut of information that could give American policymakers an edge in obtaining results favourable to US goals or to head off surprises”. “I saw the email and my gut reaction was pretty instantaneous, that it was highly explosive information and that it should be out in the public domain,” she recalled.
Note: The US has spent several trillion dollars pursuing a policy of endless war since 9/11. Great Britain did not believe Iraq to be a global security threat, but backed the US-led invasion on this false pretense for political reasons. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
The CIA has released hundreds of declassified documents detailing investigations into possible alien life. The Central Intelligence Agency posted documents of reported Unidentified Flying Objects that range in date from the late 1940s to the 1950s. While playing off the hype of the TV show reboot "The X-Files," the CIA broke down the cases into two categories, whether you side with Agent Mulder or Agent Scully. For believers in alien life ... one case you can choose to investigate is the case of a flying saucer in Germany in 1952. An eyewitness told investigators that an object "resembling a huge flying pan" landed in a forest clearing in the Soviet zone of Germany in 1952. The eyewitness said once he was closer to the area where it landed, he saw two men dressed in shiny metallic clothing. Spooked by the eyewitness ... the mysterious men jumped into the large flying pan object and it spun out into the sky. "The whole object then began to rise slowly from the ground and rotate like a top," the eyewitness told the CIA. The man told a judge he thought he was dreaming but said there was a circular imprint on the ground where the object had landed. If that case intrigues you, there are four more listed on the CIA blog post. But if you are more of a skeptic like Scully, and believe there is a simple explanation for flying saucer sightings, then the documents from the scientific advisory panel on UFOs in 1953 will help you prove your case.
Note: Explore these intriguing 'X-Files' on the CIA website at this link. For more along these lines, see concise summaries of deeply revealing UFO cover-up and disclosure news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our UFO Information Center.
Canada's electronic spy agency broke privacy laws by sharing information about Canadians with foreign partners, a federal watchdog said Thursday. Commissioner Jean-Pierre Plouffe said in his annual report that the Communications Security Establishment passed along information known as metadata to counterparts in the United States, Britain, Australia and New Zealand. Metadata is information associated with a communication, such as a telephone number or email address, but not the message itself. The communications agency intercepts and analyzes foreign communications for intelligence information of interest to the federal government. The agency is legally authorized to collect and analyze metadata churning through cyberspace. Plouffe, who keeps an eye on the highly secretive agency, said he found that it lacks clarity regarding the sharing of certain types of metadata. Defense Minister Harjit Sajjan said the sharing won't resume until he is satisfied that the proper protections are in place. Plouffe's report noted that certain metadata was not being properly minimized, or rendered unidentifiable, prior to being shared. The CSE's failure to strip out certain Canadian identity information violated the National Defense Act and therefore the federal Privacy Act as well. Privacy advocates have stressed that metadata is far from innocuous since it can reveal a great deal about a person's online behavior and interactions.
Note: Many countries do not allow their intelligence agencies to spy on their own citizens without going through a legal process. The easy way around this that has been used for decades is to simply getting the information from a friendly country. So if the CIA wants information on you in the US, they can't spy directly, but they can ask the UK to do so and pass the information to them and thus get around the laws. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The Obama administration on Thursday announced new rules that will let the NSA share vast amounts of private data gathered without warrant, court orders or congressional authorization with 16 other agencies, including the FBI, the Drug Enforcement Agency, and the Department of Homeland Security. The new rules allow ... those agencies to sift through raw data collected under a broad, Reagan-era executive order that gives the NSA virtually unlimited authority to intercept communications abroad. Previously, NSA analysts would filter out information they deemed irrelevant and mask the names of innocent Americans before passing it along. The last-minute adoption of the procedures is one of many examples of the Obama administration making new executive powers established by the Bush administration permanent, on the assumption that the executive branch could be trusted to police itself. Executive Order 12333 ... serves as authorization for the NSA’s most massive surveillance programs. In 2014, a former state department official described NSA surveillance under 12333 as a “universe of collection and storage” beyond what Congress has authorized. This massive database inevitably includes vast amount of American’s communications — swept up when they speak to people abroad, when they go abroad themselves, or even if their domestic communications are simply routed abroad. That’s why access was previously limited to data that had already been screened to remove unrelated information and information identifying U.S. persons.
Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss this provocative article by Glenn Greenwald and this interview he gave to Fox News. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The Wall Street Journal reported yesterday that the NSA under President Obama targeted Israeli Prime Minister Benjamin Netanyahu and his top aides for surveillance. In the process, the agency ended up eavesdropping on ... U.S. lawmakers and American-Jewish groups. People who spent many years cheering for and defending ... programs of mass surveillance are suddenly indignant now that they know the eavesdropping included them. Long-time GOP chairman of the House Intelligence Committee and unyielding NSA defender Pete Hoekstra last night was truly indignant: "WSJ report that NSA spied on Congress and Israel communications very disturbing. Actually outrageous. Maybe unprecedented abuse of power ... NSA and Obama officials need to be investigated and prosecuted. NSA loses all credibility. Scary." This pattern - whereby political officials who are vehement supporters of the Surveillance State transform overnight into crusading privacy advocates once they learn that they themselves have been spied on - is one that has repeated itself over and over. So now, with yesterday’s WSJ report, we witness the tawdry spectacle of large numbers of people who for years were fine with, responsible for, and even giddy about NSA mass surveillance suddenly objecting. Overnight, privacy is of the highest value because now it’s their privacy, rather than just yours, that is invaded.
Note: Read the full Wall Street Journal article on how the US government is secretly spying on Israeli leaders and more. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
U.S. intelligence agencies recently fought off a move by Congress to require the CIA and other spy services to disclose more details about high-ranking employees who have been promoted or fired. Under a provision drafted by the Senate Intelligence Committee this year, intelligence agencies would have been required to regularly provide names of those being promoted to top positions and disclose any “significant and credible information to suggest that the individual is unfit or unqualified.” But that language faced intense opposition from Director of National Intelligence James R. Clapper Jr.. As a result, the wording was watered down by Congress this month and now requires Clapper only to furnish “information the Director determines appropriate.” U.S. spy chiefs chafed at the idea of subjecting their top officials to such congressional scrutiny and went so far as to warn that candidates for certain jobs would probably withdraw. Former CIA director Michael Hayden said he [opposed the provision] “for simply being too invasive.”
Note: As a vocal advocate of intrusive spying, former CIA director Michael Hayden's claim that congressional oversight of spy agency personnel could be "too invasive" is ironic. The unaccountable US intelligence agencies were recently called a "secret government" in the Boston Globe. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
On a snowy afternoon in February 2004, an FBI agent came to Nick Merrill’s door, bearing a letter that would change his life. At the time, Merrill was running a small internet service provider. The envelope that the agent carried contained what is known as a “national security letter”, or NSL. It demanded details on one of his company’s clients; including cellphone tower location data, email details and screen-names. It also imposed a non-disclosure agreement which was only lifted this week, when – after an 11-year legal battle by Merrill and the American Civil Liberties Union, he was finally allowed to reveal the contents of the letter to the world. The NSL which Merrill was given was a new use for what was a relatively old tool. The FBI had long – if sparingly – used them, [but] the Patriot Act vastly expanded the scope of what an NSL could be applied to. The FBI greatly increased the number issued; according to a 2007 inspector general’s report, the NSL that Merrill was handed by the agent was one of nearly 57,000 issued that year. All of those thousands of NSLs were accompanied by a non-disclosure agreement, or “gag order” – which barred recipients were ever disclosing that they had received an NSL – even to the person whose records were being sought. With the ACLU, Merrill went to court to challenge the constitutionality of the letter, especially of the gag order. In 2014, Merrill sued again, helped by ... the Yale Law Clinic. Finally, [a] judge ... ruled that the gag order be completely lifted. It had taken Merrill almost 12 years.
Note: A 2007 Washington Post article summary sheds more light on Merrill's long struggle.
Months after the Obama administration declared combat operations over in Afghanistan, the CIA continues to run a shadow war in the eastern part of the country, overseeing an Afghan proxy called the Khost Protection Force [KPF], according to local officials, former commanders of that militia and Western advisers. The highly secretive paramilitary unit has been implicated in civilian killings, torture, questionable detentions, arbitrary arrests and use of excessive force in controversial night raids. In several attacks, witnesses described hearing English being spoken by armed men who had interpreters with them, suggesting American operatives were present during assaults where extreme force was used. Afghan government officials acknowledge that the KPF has killed civilians and committed other abuses. In Khost, the KPF is more influential than the Afghan army and police, and is unaccountable to the provincial government. The CIA [directs] the KPF’s operations, paying fighters’ salaries, and training and equipping them. The CIA is not bound by the Bilateral Security Agreement between Afghanistan and Washington that, among other rules, limits the ability of U.S. military forces to enter Afghan homes. The KPF was one of several large paramilitary forces created by the CIA in the months after the Taliban was ousted following the 9/11 attacks.
Note: Read a fascinating article titled "Does the Pentagon Want Nuclear War Against Russia?" Key leaders in both the CIA and Pentagon seem to want war at all costs, particularly as war fills their coffers and those of their big business buddies. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.
The Federal Bureau of Investigation has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individual’s complete web browsing history and records of all online purchases, a court filing released Monday shows. The documents are believed to be the first time the government has provided details of its so-called national security letters, which are used by the FBI to conduct electronic surveillance without the need for court approval. National security letters have been available as a law enforcement tool since the 1970s, but their frequency and breadth expanded dramatically under the USA Patriot Act, which was passed shortly after the Sept. 11, 2001 attacks. They are almost always accompanied by an open-ended gag order barring companies from disclosing the contents of the demand for customer data. The secretive orders have long drawn the ire of tech companies and privacy advocates, who argue NSLs allow the government to snoop on user content without appropriate judicial oversight. Last year, the Obama administration announced it would permit Internet companies to disclose more about the number of NSLs they receive. But they can still only provide a range such as between 0 and 999 requests. Twitter has sued in federal court seeking the ability to publish more details in its semi-annual transparency reports. Several thousand NSLs are now issued by the FBI every year. At one point that number eclipsed 50,000 letters annually.
Note: Read more about the FBI's use of these controversial secret letters. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
In 2009, not long after his historic election and seven years after the first U.S. drone strike, President Barack Obama accepted the Nobel Peace Prize. Since then, however, deadly U.S. drone strikes have increased sharply, as have doubts about the program’s reliability and effectiveness. The latest criticism comes from Drone, a new documentary about the CIA’s covert drone war. To help promote the film and inveigh against the agency’s drone program ... four former operators - Stephen Lewis, Michael Haas, Cian Westmoreland and Brandon Bryant - appeared at a press conference. Speaking out can lead to veiled threats and prosecution. Which is why for years Bryant was the only drone veteran who openly rebuked the drone war. But his persistence and his appearance in the film, the other three say, inspired them to come forward. On multiple occasions, the men say they complained to their superiors about their concerns to no avail. Drone strikes kill far more civilians than the government admits. These deaths, they argue, wind up helping militant groups recruit new members and hurt the U.S.’s long-term security. By distancing soldiers from the battlefield, the operators suggest the people carrying out strikes may become even more desensitized to killing than their counterparts on the front lines. On some occasions, Haas says operators referred to children as “fun-sized terrorists” or “TITS,” terrorists in training.
Note: A human rights attorney has stated the four former Air Force drone operators-turned-whistleblowers mentioned above have had their credit cards and bank accounts frozen. How many more have not spoken out against these abuses for fear of retaliation like this? Read more about the major failings of US drone attacks. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
It’s a wretched yet predictable ritual after each new terrorist attack: Certain politicians and government officials waste no time exploiting the tragedy for their own ends. The remarks on Monday by John Brennan, the director of the Central Intelligence Agency, took that to a new and disgraceful low ... after coordinated terrorist attacks in Paris killed 129. Mr. Brennan complained about ... the sustained national outrage following the 2013 revelations by Edward Snowden, a former National Security Agency contractor, that the agency was using provisions of the Patriot Act to secretly collect information on millions of Americans’ phone records. It is hard to believe anything Mr. Brennan says. Last year, he bluntly denied that the C.I.A. had illegally hacked into the computers of Senate staff members conducting an investigation into the agency’s detention and torture programs when, in fact, it did. In 2011 ... he claimed that American drone strikes had not killed any civilians, despite clear evidence that they had. And his boss, James Clapper Jr., the director of national intelligence, has admitted lying to the Senate on the N.S.A.’s bulk collection of data. Even putting this lack of credibility aside, it’s not clear what extra powers Mr. Brennan is seeking. Most of the men who carried out the Paris attacks were already on the radar of intelligence officials in France and Belgium, where several of the attackers lived. The problem in this case was not a lack of data. In fact, indiscriminate bulk data sweeps have not been useful.
Note: The above is an excellent article by the New York Times editorial board. Yet the role of the largely subservient media, which strongly supported Bush's campaign to go to war in Iraq is ignored. Read this analysis to go even deeper. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
The U.S. closely monitored Israel’s military bases and eavesdropped on secret communications in 2012, fearing its longtime ally might try to carry out a strike on Fordow, Iran’s most heavily fortified nuclear facility. Nerves frayed at the White House after senior officials learned Israeli aircraft had flown in and out of Iran in what some believed was a dry run for a commando raid on the site. Worried that Israel might ignite a regional war, the White House sent a second aircraft carrier to the region and readied attack aircraft, a senior U.S. official said, “in case all hell broke loose.” The two countries, nursing a mutual distrust, each had something to hide. Instead of talking to each other, the allies kept their intentions secret. To figure out what they weren’t being told, they turned to their spy agencies to fill gaps. They employed deception, not only against Iran, but against each other. After working in concert for nearly a decade to keep Iran from an atomic bomb, the U.S. and Israel split over the best means: diplomacy, covert action or military strikes. In 2010, the risk of covert action became clear. A computer virus dubbed Stuxnet, deployed jointly by the U.S. and Israel to destroy Iranian centrifuges ... had inadvertently spread across the Internet. The Israelis wanted to launch cyberattacks against a range of Iranian institutions, according to U.S. officials. But the breach made Mr. Obama more cautious, officials said, for fear of triggering Iranian retaliation, or damaging the global economy if a virus spread uncontrollably.
Note: This article is also available at this link. When the Stuxnet computer virus got loose, it began attacking European companies. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Confidential files containing evidence of violations committed during El Salvador’s civil war have been stolen from a Washington-based human rights group days after it launched legal proceedings against the CIA over classified files on a former US-backed military commander implicated in massacres, death squads and forced disappearances. A computer and hard drive containing testimonies from survivors were stolen from the office of the director of the University of Washington Center for Human Rights (UWCHR) last week. The director’s office was the only one raided, there were no signs of forced entry, and items of monetary value were left behind. The stolen files contained details of investigations related to the 1980-1992 civil war, which left at least 75,000 people dead, 8,000 missing and a million displaced. The vast majority of crimes were committed by US-backed military dictatorships against civilians ... suspected of supporting the leftist guerrillas, according to the UN. Perpetrators were granted immunity from prosecution by a 1993 amnesty law, which remains intact despite being ruled illegal by the Inter American Court of Human Rights. The UWCHR has uncovered previously unseen information held by federal agencies such as the CIA and DEA, which it has shared with relatives of victims. The group filed a freedom of information suit against the CIA on 2 October. The sensitive files were stolen two weeks later. Several rights groups in El Salvador investigating war crimes have suffered similarly suspicious robberies.
David Talbot despises Allen Dulles. As director of the CIA, Talbot declares, Dulles exemplified the “frightening amorality that prevailed at the pinnacle of American power” at the height of the Cold War. As a lawyer for Sullivan and Cromwell in the 1930s, Dulles protected and promoted Nazi-controlled cartels. He used his influence in the Office of Strategic Services and the CIA to shield former Nazis from prosecution for war crimes in the ’40s and ’50s. Dulles organized the disastrous Bay of Pigs invasion of Cuba, [and was] willing to manipulate and undercut American presidents. In “The Devil’s Chessboard,” David Talbot, the founder and former editor in chief of Salon and former senior editor at Mother Jones, examines Dulles’ career and adds several more “achievements” to his dark resume. Talbot’s indictment is long. He suggests that had President Franklin D. Roosevelt lived, Dulles might well have faced criminal charges for hiding the U.S. assets of German corporations and destroying incriminating evidence. By 1963, Talbot insists, a clear consensus had emerged among corporate leaders “and within America’s deep state” that Kennedy was a threat to national security and had to be removed. Dulles, they concluded, “was the only man with the stature, connections, and decisive will to make something of this enormity happen." [Dulles] then lobbied Lyndon Johnson to appoint him to the Warren Commission, where he saw to it that Lee Harvey Oswald would take the fall as the “lone gunman.”
Note: Read another good article on Talbot's book revealing evidence in the JFK killing. And isn't it interesting that no other major media seemed to find this book worth a review, even though Talbot is well known as the founder of the website Salon.
From 2011 to 2013, the most elite forces in the U.S. military, supported by the CIA and other elements of the intelligence community, set out to destroy the Taliban and al Qaeda forces that remained hidden ... along Afghanistan’s northeastern border with Pakistan. Dubbed Operation Haymaker, the campaign has been described as a potential model for the future of American warfare. The military’s own analysis demonstrates that the Haymaker campaign was in many respects a failure. The vast majority of those killed in airstrikes were not the direct targets. Nor did the campaign succeed in significantly degrading al Qaeda’s operations in the region. The frequency with which “targeted killing” operations hit unnamed bystanders is among the more striking takeaways from the Haymaker slides. [Documents obtained by The Intercept] show that during a five-month stretch of the campaign, nearly nine out of 10 people who died in airstrikes were not the Americans’ direct targets. Larry Lewis, formerly a principal research scientist at the Center for Naval Analyses, ... found that drone strikes in Afghanistan were 10 times more likely to kill civilians than conventional aircraft. This month, an American airstrike on a hospital run by the international organization Médecins Sans Frontičres ... killed at least a dozen members of the humanitarian group’s medical staff and 10 patients, including three children. A nurse on the scene recalled seeing six victims in the intensive care unit ablaze in their beds.
Survivors of CIA torture have sued the contractor psychologists who designed one of the most infamous programs of the post-9/11 era. In an extraordinary step, psychologists James Mitchell and Bruce Jessen now face a federal lawsuit for their role in convincing the CIA to subject terror suspects to mock drowning, painful bodily contortions, sleep and dietary deprivation and other methods long rejected by much of the world as torture. In practice, CIA torture meant disappearances, mock executions, anal penetration ... and at least one man who froze to death, according to a landmark Senate report last year. On behalf of torture survivors ... as well as a representative of the estate of Gul Rahman – who froze to death in a CIA black site in Afghanistan – the American Civil Liberties Union (ACLU) filed the suit against Mitchell and Jessen on Tuesday in a federal court in Washington state. The suit calls the torture program a “joint criminal enterprise” and a “war crime” in which the CIA, Mitchell and Jessen colluded and from which Mitchell and Jessen financially profited. Although numerous US government investigations have pierced the veneer of secrecy around the torture program, the program’s government architects have faced no legal reprisal. A Justice Department inquiry ended in 2012 without prosecutions. The new lawsuit, aimed not at government officials but the contractors Mitchell and Jessen, aims to break the trend.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.