Intelligence Agency Media ArticlesExcerpts of Key Intelligence Agency Media Articles in Major Media
Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Jean Maria Arrigo’s inbox is filling up with apologies. For a decade, colleagues of the 71-year-old psychologist ignored, derided and in some cases attacked Arrigo for sounding alarms that the American Psychological Association was implicated in US torture. But now ... a devastating report has exposed deep APA complicity with brutal CIA and US military interrogations – and a smear campaign against Arrigo herself. David Hoffman, a former federal prosecutor, confirmed what she has crusaded against for a decade: the APA’s institutional involvement with torture led to a concerted effort to quash dissent, lie to the public, and silence people like her. In 2005, Arrigo ... was a member of an internal panel, known as the Task Force on Psychological Ethics and National Security (Pens), that greenlit psychologist participation in national-security interrogations. The taskforce was intentionally weighted in favor of the US department of defense, through stacking it with representatives from the military and CIA. It rejected efforts ... to include references to the Geneva Convention and specific interrogation techniques that psychologists could not be involved in. Arrigo took her concerns public. In response, [Gerald] Koocher ... who served as APA president in 2006, [launched] “a highly personal attack.” Arrigo said she was untroubled by Koocher’s “idiotic” broadside. What was more troubling to her, she said, were the well-meaning members of APA who did not challenge the attacks.
Note: Read an article on how military psychologists are fighting against torture reforms. For more, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists.
The Central Intelligence Agency’s health professionals repeatedly criticized the agency’s post-Sept. 11 interrogation program, but their protests were rebuffed by prominent outside psychologists who lent credibility to the program, according to a new report. The 542-page report ... raises repeated questions about the collaboration between psychologists and officials at both the C.I.A. and the Pentagon, [and] concludes that some of the [American Psychological] Association’s top officials ... sought to curry favor with Pentagon officials by seeking to keep the association’s ethics policies in line with the Defense Department’s interrogation policies. The association’s ethics office “prioritized the protection of psychologists — even those who might have engaged in unethical behavior — above the protection of the public,” the report said. Two former presidents of the psychological association were on a C.I.A. advisory committee, the report found. One of them gave the agency an opinion that sleep deprivation did not constitute torture, and later held a small ownership stake in a consulting company founded by two men who oversaw the agency’s interrogation program. The association’s ethics director, Stephen Behnke, coordinated the group’s public policy statements on interrogations with a top military psychologist, the report said, and then received a Pentagon contract to help train interrogators while he was working at the association, without the knowledge of the association’s board.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
Moxie Marlinspike has ... created an encryption program that scrambles messages until they reach the intended reader. The software is effective enough to alarm governments. British Prime Minister David Cameron called protected-messaging apps a “safe space” for terrorists. The following week, President Barack Obama called them “a problem.” In a research paper released Tuesday, 15 prominent technologists cited three programs relying on Mr. Marlinspike’s code as options for shielding communications. His encrypted texting and calling app, Signal, has come up in White House meetings. Former National Security Agency contractor Edward Snowden, who leaked troves of U.S. spying secrets, urged listeners to use “anything” that Mr. Marlinspike releases. That endorsement was “a little bit terrifying,” Mr. Marlinspike says. But he says he sees an opening, following Mr. Snowden’s revelations, to demystify, and simplify, encryption, so more people use it. Consumer encryption tools ... have been around since the early 1990s, but most are so cumbersome that few people use them, [limiting] the use of encryption to a level law enforcement has mostly learned to live with. Adding easy-to-use encryption that companies can’t unscramble to products used by millions changes that calculus. Technology companies, once cozy with Washington, sound increasingly like Mr. Marlinspike. Apple, Facebook, Google and others are resisting efforts to give the government access to encrypted communications.
Note: For more along these lines, see concise summaries of deeply revealing news articles about the corrupt intelligence agencies that are attempting to erode privacy rights in the U.S. and elsewhere.
An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger. With security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds, encryption has emerged as a major issue in the debate over privacy rights. Technology companies ... have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data. The [technology group's] new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers. In the report, the group said any effort to give the government “exceptional access” to encrypted communications ... would leave confidential data and critical infrastructure like banks and the power grid at risk. With government agency breaches now the norm, the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals.
An investigation by the German parliament is raising questions on whether the Obama administration not only spied on journalists in that country, but also interfered in the exercise of the free press. On Thursday, Germany's intelligence coordinator, Günter Heiss, testified before a parliamentary investigative committee of the German parliament, the Bundestag, focused on the activities of the U.S. National Security Agency's spying on Germany and whether the German intelligence agency BND had any knowledge of it. In 2013, the German magazine Der Spiegel ... first reported that the NSA was intercepting German Chancellor Angela Merkel's cell phone communications. On Thursday, WikiLeaks released more information, presumably from that surveillance, from a conversation between Merkel and her personal assistant in October 2011. The WikiLeaks release also suggested that the NSA was spying on German ministers in addition to Merkel. Less observed this week was news that the NSA was eavesdropping not only on Merkel, but also in some capacity on Germany's free press, specifically Der Spiegel. "It feels bitter to learn that American intelligence agencies spied on reporters in another country and denounced alleged sources to the government," said one reporter involved, who asked not to be identified for fear of repercussions from his government or the U.S. government. "This is something I expected to happen in authoritarian states like Russia or China, but not in a democracy."
Three days after the New York Times revealed that the U.S. government was secretly monitoring the calls and emails of people inside the United States without court-approved warrants, the National Security Agency issued a top-secret assessment of the damage done to intelligence efforts by the story. The conclusion: the information could lead terrorists to try to evade detection. Yet the agency gave no specific examples of investigations that had been jeopardized. The December 2005 bombshell story, by James Risen and Eric Lichtblau, set off a debate about the George W. Bush administration's expansion of spying powers after the 9/11 attacks, and also about the Times editors' decision to delay its publication for a year. White House officials had warned the Times that revealing the program would have grave consequences for national security. "To this day we've never seen any evidence – despite all the claims they made to keep us from publishing – that it did any tangible damage to national security, " Lichtblau told The Intercept. "The reality was that the story ... didn't tell terrorists anything that they didn't know," he said. The NSA's damage assessment on the article ... is among the files provided by former NSA contractor Edward Snowden. The memo recounts meetings in 2004 and 2005 in which administration officials disclosed "certain details of the special program to select individuals from the New York Times to dissuade them from publishing a story on the program at that time."
Note: You can read the revealing memo mentioned at the link above. For more along these lines, see concise summaries of deeply revealing news articles on civil liberties from reliable major media sources. Then explore the excellent, reliable resources provided in our Media Information Center.
The US National Security Agency (NSA) spied on French Presidents Jacques Chirac, Nicolas Sarkozy and Francois Hollande in 2006-12, Wikileaks says [citing] "top secret intelligence reports and technical documents" from the NSA. A file dated 2010 suggests that French officials were aware that the US was spying upon them and intended to complain about it. According to the summary of an intercepted exchange, the French envoy to Washington ... discussed Mr Sarkozy's plan to express his "frustration" over US unwillingness to sign a "bilateral intelligence co-operation agreement". "The main sticking point is the US desire to continue spying on France," the intercept says. [One analyst commented] "Of course they know that spying goes on – even between friends. But the cardinal rule is not to get found out. When you do, you must expect the full force of diplomatic outrage." In response to the alleged leaks, National Security Council spokesman Ned Price said: "As a general matter, we do not conduct any foreign intelligence surveillance activities unless there is a specific and validated national security purpose. This applies to ordinary citizens and world leaders alike." In 2013 Brazilian media reported that NSA documents showed the agency had also spied on Brazilian President Dilma Rousseff and President Enrique Pena Nieto of Mexico. [Also] in 2013 the NSA was accused of spying on German Chancellor Angela Merkel. German media later reported that Germany's national intelligence agency had spied on ... the EU's headquarters on behalf of the US.
Note: The claim of a "threat to national security" is widely used both to perpetrate and to cover up huge amounts of illegal behavior. For more along these lines, see concise summaries of deeply revealing news articles on secrecy excesses from reliable major media sources.
[One spy unit is] responsible for some of the United Kingdom's most controversial tactics of surveillance, online propaganda and deceit. Documents ... demonstrate how the Joint Threat Research Intelligence Group (JTRIG), a unit of the signals intelligence agency Government Communications Headquarters (GCHQ), is involved in efforts against political groups it considers "extremist". Though its existence was secret until last year, JTRIG quickly developed a distinctive profile [after] Edward Snowden revealed that the unit had engaged in "dirty tricks" like deploying sexual "honey traps" designed to discredit targets, launching denial-of-service attacks to shut down Internet chat rooms, pushing veiled propaganda onto social networks and generally warping discourse online. Particularly revealing is a fascinating 42-page document from 2011 detailing JTRIG's activities. The document lays out the tactics the agency uses to manipulate public opinion, its scientific and psychological research into how human thinking and behavior can be influenced. Many GCHQ documents describing the "missions" of the "customers" for which it works make clear that the agency has a wide mandate far beyond national security, including providing help on intelligence to the Bank of England, ... to various departments on agriculture and whaling activities, to government financial divisions to enable good investment decisions. Beyond JTRIG's targeting of Anonymous, other parts of GCHQ targeted political activists deemed to be "radical," even monitoring the visits of people to the WikiLeaks website. [The document] includes detailed discussions of how to foster "obedience" and "conformity".
Note: Read amazing excerpts of this report at the link above showing how JTRIG plays an active role on the Internet in directly manipulating many political discussions and websites. For more along these lines, see concise summaries of deeply revealing news articles on corruption in intelligence agencies from reliable major media sources.
The Obama administration is again allowing the CIA to use drone strikes to secretly kill people that the spy agency does not know the identities of in multiple countries - despite repeated statements to the contrary. Apparently the drone operators didn't even know at the time who they were aiming at - only that they thought the target was possibly a terrorist hideout. It's what's known as a "signature" strike. Signature strikes has led to scores of civilians being killed over the past decade, including two completely innocent hostages ... one of whom was a US citizen ... less than two months ago. It's a way of killing that's been roundly condemned by human rights organizations and that some members of Congress have tried to outlaw. Here's how the New York Times described it: "The joke was that when the CIA sees "three guys doing jumping jacks," the agency thinks it is a terrorist training camp, said one senior official. Men loading a truck with fertilizer could be bombmakers – but they might also be farmers." It has become increasingly clear that the "rules" are virtually meaningless. As is typical with the US government's extrajudicial killing policy, there was no public debate about any of the changes to the supposed rules, or even announcement that they ever changed - only an unofficial leak to a journalist after the latest killing. Beyond the enormous human rights consequences related to such a dangerous policy, these types of strikes backfire on the United States, sowing hatred in the populations of bombed countries and breeding sympathy for al-Qaida where there was none before.
Note: For more along these lines, see concise summaries of deeply revealing news articles on terrorism from reliable major media sources. Then explore the excellent, reliable resources provided in our War Information Center.
Mark Rossini, a former FBI special agent at the center of an enduring mystery related to [9/11] says he is "appalled" by the newly declassified statements by former CIA Director George Tenet defending the spy agency's efforts to detect and stop the plot. Rossini, who was assigned to the CIA's Counterterrorism Center (CTC) at the time of the attacks, has long maintained that the U.S. government has covered up secret relations between the spy agency and Saudi individuals who may have abetted the plot. Fifteen of the 19 hijackers who flew commercial airliners (on 9/11) were Saudis. A heavily redacted 2005 CIA inspector general's report, parts of which had previously been released, was further declassified earlier this month. The Obama administration has [still] refused to declassify 28 pages dealing with Saudi connections. Rossini and another FBI agent assigned to the CTC, Doug Miller, learned in January 2000 that one of the future hijackers ... had a multi-entry visa to enter the U.S. But when Miller and Rossini attempted to warn FBI headquarters that al-Mihdhar could be loose in the U.S., a CIA supervisor ordered them to remain silent. Rossini says he is "deeply concerned" by how the agency continues to suppress information related to contacts between the CIA and Saudi Arabia, particularly when the spy agency is declassifying other portions of documents to show that it did everything possible to thwart the September 11, 2001 plot. "There would have not been a 9/11 if Doug's CIR [Central Intelligence Report] on al-Mihdhar was sent," he told Newsweek in an email. "Period. End of story."
Note: Read a Times of London article showing that some of the hijackers listed in the final 9/11 report are still alive. Several major media articles also reported that some of the 9/11 hijackers may have trained at US military bases. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore other excellent, reliable resources provided in our 9/11 Information Center.
Last week in the Boston area, a 26-year-old black Muslim man was shot and killed by agents of the FBI and Boston Police Department. A surveillance video ... was finally released on Monday. It’s virtually impossible to know what happened from this highly touted video, other than the fact that [Usaamah] Rahim appears to have been walking peacefully when he was approached by multiple individuals, wearing no police uniforms, in a threatening, military-style formation. Rahim’s family issued a statement detailing the numerous questions raised by the video. Early reports claimed that there was a third conspirator beyond Rahim and [his nephew and accused co-conspirator David] Wright. The FBI affidavit filed against Wright repeatedly references a “third person” who plotted with Rahim and Wright and met with them. Yet there has been no further mention of this “third person,” and apparently no arrest of him. Why not? Is that third person an FBI informant? Is this yet another case where the director and prime mover of a scary “terror plot” is in fact the FBI itself. What basis exists for the highly inflammatory claim that Rahim was “linked to” or “inspired by” ISIS? He was not only wary of being set up by the FBI, but specifically said he was “preaching AGAINST violence and terrorism.” As AP noted, on social media Rahim “spoke out against the kind of violence Islamic State extremists are fomenting across the Middle East,” and “made none of the violent calls to arms many supporters of armed extremist groups espouse on social media.”
Two years ago, the first story based on the Snowden archive was published in The Guardian, revealing a program of domestic mass surveillance, which, at least in its original form, ended this week. To commemorate that anniversary, Edward Snowden himself reflected in a New York Times op-ed on the “power of an informed public”. The debate provoked by these disclosures [examined] the role journalism ought to play in a democracy and the proper relationship of journalists to those who wield the greatest political and economic power. Of all the revelations over the last two years, one of the most illuminating and stunning has been the reaction of many in the American media to Edward Snowden as a source. There was plenty of journalistic support for the disclosures. But huge numbers of journalists went on the warpath against transparency. The Los Angeles Times ... believes leaking is criminal and those who do it belong in prison. The LA Times itself constantly publishes illegal leaks, though the ones it publishes usually come from top government officials. Have the LA Times editors called for the criminal prosecution of Leon Panetta, and John Brennan, and the endless number of senior officials who leak not (as Snowden did) to inform the public but in order to propagandize them? Of course not, and therein lies the key media lesson from all of this. These journalists are literally agents of political power.
The Navy’s SEAL Team 6 ... best known for killing Osama bin Laden, has been transformed by more than a decade of combat into a global manhunting machine. That role reflects America’s new way of war, in which conflict is distinguished ... by the relentless killing of suspected militants. While fighting grinding wars of attrition in Afghanistan and Iraq, Team 6 ... joined Central Intelligence Agency operatives in an initiative called the Omega Program, which offered greater latitude in hunting adversaries. Team 6 has successfully carried out thousands of dangerous raids that military leaders credit with weakening militant networks, but its activities have also spurred recurring concerns. Afghan villagers and a British commander accused SEALs of indiscriminately killing men in one hamlet; in 2009, team members joined C.I.A. and Afghan paramilitary forces in a raid that left a group of youths dead and inflamed tensions between Afghan and NATO officials. When suspicions have been raised about misconduct, outside oversight has been limited. “This is an area where Congress notoriously doesn’t want to know too much,” said Harold Koh, the State Department’s former top legal adviser. Like the C.I.A.’s campaign of drone strikes, Special Operations missions offer policy makers an alternative to costly wars of occupation. But the bulwark of secrecy around Team 6 makes it impossible to fully assess its record and the consequences of its actions, including civilian casualties or the deep resentment inside the countries where its members operate.
Note: Drone strikes almost always miss their intended targets. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing news articles about military corruption and high level manipulation of mass media.
On Monday the trial in London of a Swedish man, Bherlin Gildo, accused of terrorism in Syria, collapsed after it became clear British intelligence had been arming the same rebel groups the defendant was charged with supporting. The prosecution abandoned the case, apparently to avoid embarrassing the intelligence services. Reports were cited that MI6 had cooperated with the CIA on a “rat line” of arms transfers from Libyan stockpiles to the Syrian rebels in 2012 after the fall of the Gaddafi regime. Terrorism is now squarely in the eye of the beholder. A revealing light on how we got here has now been shone by a recently declassified secret US intelligence report, written in August 2012, which uncannily predicts – and effectively welcomes – the prospect of a “Salafist principality” in eastern Syria and an al-Qaida-controlled Islamic state in Syria and Iraq. In stark contrast to western claims at the time, the Defense Intelligence Agency document identifies al-Qaida in Iraq (which became Isis) and fellow Salafists as the “major forces driving the insurgency in Syria” – and states that “western countries, the Gulf states and Turkey” were supporting the opposition’s efforts to take control of eastern Syria. A year into the Syrian rebellion, the US and its allies weren’t only supporting and arming ... extreme sectarian groups; they were prepared to countenance the creation of some sort of “Islamic state” – despite the “grave danger” to Iraq’s unity – as a Sunni buffer to weaken Syria.
For the fearmongers in the West and their allies, it’s always the scariest time ever. In February, former CIA Deputy Director Michael Morrell, arguing for renewal of the Patriot Act, warned that “the ‘lone wolf’ terrorist threat to the United States has never been greater.” In January, an anonymous senior aide to U.K. Prime Minister ... argued for a new “snooper” bill by saying that “the terrorist threat has never been greater.” In mid-2014, U.K. Prime Minister Cameron himself raised the threat level to “severe” and announced: “Britain faces the ‘greatest and deepest’ terror threat in the country’s history.” Throughout the Bush years ... officials raised their color-coded terror alerts and issued similar warnings so many times that it became a running joke. Years later, the face of that joke, Homeland Security Secretary Tom Ridge, admitted he was pressured to issue warnings for political gain. Here we are 14 years after 9/11, and it’s still always the worst threat ever in all of history. If we always face the greatest threat ever, then one of two things is true: 1) fearmongers serially exaggerate the threat for self-interested reasons, or 2) the threat is always getting more severe, year after year — which might mean we should evaluate the wisdom of “terrorism” policies that constantly make the problem worse. Whatever else is true, the people who should have the least credibility on the planet are [those] who have spent the last 15 years exploiting the terror threat in order to terrorize the American population into doing what they want.
Note: Read an excellent essay by a top US general exposing how war is a racket. For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
Scores of low-flying planes circling American cities are part of a civilian air force operated by the FBI and obscured behind fictitious companies. The aircraft are equipped with high-tech cameras, and ... technology capable of tracking thousands of cellphones. The surveillance equipment is used for ongoing investigations, the FBI says, generally without a judge's approval. The Drug Enforcement Administration has its own planes, also registered to fake companies, according to a 2011 Justice Department ... report. At the time, the DEA had 92 aircraft in its fleet. And since 2007, the U.S. Marshals Service has operated an aerial surveillance program with its own fleet equipped with technology that can capture data from thousands of cellphones. "These are not your grandparents' surveillance aircraft," said Jay Stanley, a senior policy analyst with the American Civil Liberties Union. Evolving technology can record higher-quality video from long distances, even at night, and can capture certain identifying information from cellphones using a device known as a "cell-site simulator" [to] trick pinpointed cellphones into revealing identification numbers of subscribers, including those not suspected of a crime. The Obama administration [has] been directing local authorities through secret agreements not to reveal their own use of the devices. During the past few weeks, the AP tracked planes from the FBI's fleet on more than 100 flights over at least 11 states plus the District of Columbia.
Note: For more along these lines, see concise summaries of deeply revealing news articles about the corrupt intelligence agencies that facilitate the erosion of privacy rights in the U.S. and elsewhere.
The US Central Intelligence Agency used a wider array of sexual abuse and other forms of torture than was disclosed in a Senate report last year, according to a Guantánamo Bay detainee turned government cooperating witness. Majid Khan said interrogators poured ice water on his genitals, twice videotaped him naked and repeatedly touched his “private parts” – none of which was described in the Senate report. Khan’s is the first publicly released account from a high-value al-Qaida detainee who experienced [these] “enhanced interrogation techniques”. The 35-year-old Khan ... is awaiting sentencing after [confessing] to delivering $50,000 to al-Qaida operatives in Indonesia. Khan was captured in Pakistan and held at an unidentified CIA “black site” from 2003 to 2006, according to the Senate report. In the interviews with his lawyers, Khan described a carnival-like atmosphere of abuse when he arrived at the CIA detention facility. He said that he experienced excruciating pain when hung naked from poles and that guards repeatedly held his head under ice water. In a July 2003 session, Khan said, CIA guards hooded and hung him from a metal pole for several days and repeatedly poured ice water on his mouth, nose and genitals. When a doctor arrived to check his condition, Khan begged for help. Instead, Khan said, the doctor instructed the guards to again hang him from the metal bar. After hanging from the pole for 24 hours, Khan was forced to write a “confession” while being videotaped naked.
Note: For more, read about the 10 Craziest Things in the Senate Report on Torture and many other questionable intelligence agency practices.
The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals. The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia. The top-secret document, obtained from NSA whistleblower Edward Snowden ... outlines a series of tactics that the NSA and its counterparts in the Five Eyes were [using, which included] a method to hack and hijack phone users’ connections to app stores so that they would be able to send malicious “implants” to targeted devices. The implants could then be used to collect data from the phones without their users noticing. The agencies ... were also keen to find ways to hijack [app stores] as a way of sending “selective misinformation to the targets’ handsets” as part of so-called “effects” operations that are used to spread propaganda or confuse adversaries. Moreover, the agencies wanted to gain access to companies’ app store servers so they could secretly use them for “harvesting” information about phone users. The revelations are the latest to highlight tactics adopted by the Five Eyes agencies. Last year, The Intercept reported that the NSA ... was shown to have masqueraded as a Facebook server in order to hack into computers.
The CIA can keep secret a nearly 7,000-page Senate report on harsh interrogation methods, as well as an internal agency review. The complete 6,963-page report compiled by the Senate Select Committee on Intelligence [is] exempt from the dictates of the Freedom of Information Act, U.S. District Judge James E. Boasberg concluded. The Senate committee report, he reasoned, remained a document under congressional control, and Congress made sure to exempt itself from FOIA. “Congress has undoubted authority to keep its records secret, authority rooted in the Constitution, longstanding practice, and current congressional rules,” Boasberg stated. Hina Shamsi, director of the ACLU National Security Project, voiced disappointment in the ruling. The Senate committee released a summary of the $40 million report last December, following years of back-and-forth.
Colonel Ian Henderson was a British official dubbed “the Butcher of Bahrain” because of atrocities he repeatedly committed during the 30 years he served as chief security official of that Middle Eastern country. A 2002 Guardian article reported that “during this time his men allegedly detained and tortured thousands of anti-government activists”; his official acts “included the ransacking of villages, sadistic sexual abuse and using power drills to maim prisoners”. Col. Henderson was never punished in any way. For years, human rights groups have fought to obtain ... a 37-year-old diplomatic cable, relating to British responsibility for Henderson’s brutality in Bahrain. Ordinarily, documents more than 30 years old are disclosable. Now, a governmental tribunal ruled ... that most of the diplomatic cable shall remain suppressed. The tribunal’s ruling was at least partially based on “secret evidence ... that the release of such information could jeopardise Britain’s new military base in the country.” This is the core mindset now prevalent in both the U.S. and U.K. for hiding their crimes from their own populations and the rest of the world: disclosure of what we did will embarrass and shame us, cause anger toward us, and thus harm our “national security.” This is exactly the same mentality driving the Obama administration’s years-long effort to suppress photographs showing torture of detainees by the U.S.. Obama insisted that to release the photos “would be to further inflame anti-American opinion and to put our troops in danger.”
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.