As of June 28th, we're $6,300 in the red for 2015. Please donate here to support this vital work.
Subscribe here to our free email list

Intelligence Agency Media Articles
Excerpts of Key Intelligence Agency Media Articles in Major Media


Below are highly revealing excerpts of important intelligence agency articles reported in the media suggesting a major cover-up. Links are provided to the full articles on major media websites. If any link fails to function, read this webpage. These intelligence agency articles are listed by article date. You can also explore the articles listed by order of importance or by date posted. By choosing to educate ourselves on these important issues and to spread the word, we can and will build a brighter future.

Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


U.S. TV Provides Ample Platform for American Torturers, But None to Their Victims
2014-12-16, The Intercept
https://firstlook.org/theintercept/2014/12/16/u-s-tv-media-gives-ample-platfo...

Ever since the torture report was released last week, U.S. television outlets have endlessly featured American torturers and torture proponents. But there was one group that was almost never heard from: the victims of their torture. The War on Terror generally has been “reported” for 13 years and counting by completely silencing those whose lives are destroyed or ended by U.S. crimes. In 2002, Maher [Arar], a Canadian citizen of Syrian descent who worked as an engineer, was travelling back home to Ottawa when he was abducted by the U.S. Government at JFK Airport, [secretly] interrogated for weeks, then “rendered” to Syria where the U.S. arranged to have him brutally tortured ... for 10 months. He was completely innocent, [and was] unceremoniously released back to his life in Canada as though nothing had happened. U.S. courts refused even to hear his case, accepting the Obama DOJ’s claim that it was too secret to safely adjudicate. The Canadian government ... publicly apologized for its role, and paid him $9 million. There are hundreds if not thousands of Maher Arars the U.S. media could easily and powerfully interview. The detainees held without charges, tortured, and then unceremoniously released from Guantanamo and Bagram are rarely if ever heard from on U.S. television, even when the U.S. Government is forced to admit that they were guilty of nothing.

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption that is supported by equally corrupt mass media.


The CIA Didn’t Just Torture, It Experimented on Human Beings
2014-12-16, The Nation
http://www.thenation.com/article/193185/cia-didnt-just-torture-it-experimente...

The “war on terror” is not the CIA’s first venture into human experimentation. At the dawn of the Cold War, German scientists and doctors with Nazi records of human experimentation were given new identities and brought to the United States under Operation Paperclip. In 1953, the CIA established the MK-ULTRA program, [which] evolved into experiments in psychological torture. During the Vietnam War, the CIA developed the Phoenix program, which combined psychological torture with brutal interrogations, human experimentation and extrajudicial executions. In 1963, the CIA produced a manual titled “Kubark Counterintelligence Interrogation” to guide agents in the art of extracting information. An updated version of the Kubark guide [was] produced in 1983 and titled “Human Resource Exploitation Manual” [for CIA supported] right-wing regimes in Latin America and Southeast Asia. Here we are again. On April 15, 2002, [psychologists hired by the CIA] Mitchell and Jessen arrived at a black site in Thailand to supervise the interrogation of Abu Zubaydah, the first “high-value detainee” captured by the CIA. From then ... at least thirty-eight people were subjected to psychological and physical torments, and the results were methodically documented and analyzed. That is the textbook definition of human experimentation.

Note: For more along these lines, see this list depicting the rampant use of humans as guinea pigs in government, military, and medical experiments over the last century, or watch "Human Resources", a two-hour documentary on the subject. For more, see the excellent, reliable resources provided in our Mind Control Information Center.


With hackers running rampant, why would we poke holes in data security?
2014-12-14, LA Times
http://www.latimes.com/opinion/op-ed/la-oe-1215-wyden-backdoor-for-cell-phone...

Hardly a week goes by without a new report of some massive data theft that has put financial information, trade secrets or government records into the hands of computer hackers. The best defense against these attacks is clear: strong data encryption and more secure technology systems. U.S. intelligence agencies hold a different view. James Comey, the FBI director, is lobbying Congress to require that electronics manufacturers create intentional security holes — so-called back doors — that would enable the government to [easily] access data on every American's cellphone and computer. Building a back door into every cellphone, tablet, or laptop means deliberately creating weaknesses that hackers and foreign governments can exploit. What these officials are proposing would be bad for personal data security and bad for business. Built-in back doors have ... disastrous results. The U.S. House of Representatives recognized how dangerous this idea was and in June approved [an] amendment [to] prohibit the government from mandating that technology companies build security weaknesses into any of their products. I introduced legislation in the Senate to accomplish the same goal. Advances in technology always pose a new challenge to law enforcement agencies. But curtailing innovation on data security is no solution, and certainly won't restore public trust in tech companies or government agencies.

Note: Ron Wyden, a member of the Senate Intelligence Committee, wrote the article summarized above. The NSA routinely creates and exploits security holes in commercial encryption software and devices to spy on people, and shares the personal data it obtains with the CIA, FBI, IRS, and others through the DEA's Special Operations Division. What exactly is the FBI director asking congress for now?


Amid Details on Torture, Data on 26 Who Were Held in Error
2014-12-12, New York Times
http://www.nytimes.com/2014/12/13/us/politics/amid-details-on-torture-data-on...

One quiet consequence of this week’s sensational release of the Senate Intelligence Committee’s report on the C.I.A. detention program was a telephone call that a human rights lawyer, Meg Satterthwaite, placed to a client in Yemen, Mohamed Bashmilah. For eight years since Mr. Bashmilah, 46, was released from C.I.A. custody, Ms. Satterthwaite ... had been trying without success to get the United States government to acknowledge that it had held him in secret prisons for 19 months and to explain why. In the phone call on Wednesday, she told him that the Senate report listed him as one of 26 prisoners who, based on C.I.A. documents, had been “wrongfully detained.” After learning the news, Mr. Bashmilah pressed Ms. Satterthwaite, who heads the global justice program at New York University Law School, to tell him what might follow from the Senate’s recognition. Would there be an apology? Would there be some kind of compensation? Among the others mistakenly held for periods of months or years, according to the report, were an “intellectually challenged” man held by the C.I.A. solely to pressure a family member to provide information; two people who were former C.I.A. informants; and two brothers who were falsely linked to Al Qaeda. Ms. Satterthwaite was not able to answer Mr. Bashmilah’s question about an apology or reparation. No apology was forthcoming from the C.I.A., which declined to comment on specific cases.

Note: An ACLU lawsuit filed on behalf of Mr. Bashmilah and others flown to prisons on C.I.A. aircraft was dismissed on the grounds that it might expose state secrets. For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


10 Craziest Things in the Senate Report on Torture
2014-12-10, Rolling Stone
http://www.rollingstone.com/politics/news/10-craziest-things-in-the-senate-re...

The release of the Feinstein report [places] the end of the American "torture" regime in January of 2009. I'm not sure I'm buying that the U.S. government suddenly got religion about mistreatment of terror suspects once Obama took office, particularly since this government massively accelerated a drone-assassination program. Still, the end result [shows] that we approved behaviors far worse, and far weirder, than was ever admitted to previously. CIA detainees were subjected to "rectal rehydration" or rectal feeding ... to put them in a talking mood. The interrogators gave pet names to all of their ... permitted techniques, as outlined in the report: (1) attention grasp, (2) walling, (3) facial hold, (4) facial slap (insult slap), (5) cramped confinement, (6) wall standing, (7) stress positions, (8) sleep deprivation, (9) insects placed in a confinement box, and (10) the waterboard. A small confinement box ... had a width of 21 inches, a depth of 2.5 feet, and a height of 2.5 feet. They didn't just put people in these boxes. They [added] insects. Detainees at COBALT were subjected to what was described as a "rough takedown" [wherein] five CIA officers would scream at a detainee, drag him outside of his cell, cut his clothes off, and secure him with Mylar tape. The detainee would then be hooded and [repeatedly] slapped and punched. Gul Rahman was said to have died after one of these choreographed scare-scenes.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


CIA interrogations report sparks prosecution calls
2014-12-10, BBC News
http://www.bbc.com/news/world-us-canada-30407950

The UN and human rights groups have called for the prosecution of US officials involved in what a Senate report called the "brutal" CIA interrogation of al-Qaeda suspects. UN Special Rapporteur on Human Rights and Counter-Terrorism Ben Emmerson said that senior officials from the administration of George W Bush who planned and sanctioned crimes must be prosecuted, as well as CIA and US government officials responsible for torture. "As a matter of international law, the US is legally obliged to bring those responsible to justice," Mr Emmerson said in a statement made from Geneva. Correspondents say that the chances of prosecuting members of the Bush administration are unlikely. Several countries suspected to have hosted [CIA torture] sites reacted strongly to the publication. Poland's former president [Aleksander Kwasniewski] has publicly acknowledged for the first time [that] his country hosted a secret CIA prison. Lithuanian Prime Minister Algirdas Butkevicius called on the US to say whether CIA used his country to interrogate prisoners. Afghanistan's President Ashraf Ghani called the report "shocking", saying the actions "violated all accepted norms of human rights in the world".

Note: Read revealing excerpts from this most disturbing report. For more, read how the CIA teamed up with the UK's MI6 to kidnap people and deliver them to be tortured at a Libyan site in 2004. Could this US program have happened without strong international support?


Ex-CIA Operative Says Prison Was Punishment for Whistleblowing on Torture
2014-12-09, ABC News
http://abcnews.go.com/International/cia-operative-prison-punishment-whistlebl...

Former CIA officer John Kiriakou is the only CIA employee connected to its interrogation program to go to prison. But he was prosecuted for providing information to reporters, not for anything connected to ... “torture.” No other person connected to the program has been charged with a crime, after the Justice Department said their actions had been approved legally or that there was not sufficient admissible evidence in a couple cases of potential wrongdoing, even in light of the death of two detainees in the early 2000s. Kiriakou was the first person with direct knowledge of the CIA interrogation program to publicly reveal its existence, in an interview with ABC News in 2007. He is now serving a nearly-three-year prison sentence for violating the Intelligence Identities Protection Act, but he says that’s only what the government wants people to believe. “In truth, this is my punishment for blowing the whistle on the CIA’s illegal torture program and for telling the public that torture was official U.S. government policy,” Kiriakou said in a letter last May from a prison in Loretto, Penn. In his groundbreaking interview with ABC News and later with other news outlets, Kiriakou described the details of the program. In some cases, it turned out that even Kiriakou ... was misled or kept in the dark about the extent of the program.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


Senate Report Rejects Claim on Hunt for Bin Laden
2014-12-09, New York Times
http://www.nytimes.com/2014/12/10/world/senate-report-raises-doubts-about-cia...

Months before the operation that killed Osama bin Laden in 2011, the Central Intelligence Agency secretly prepared a public-relations plan that would stress that information gathered from its disputed interrogation program had played a critical role in the hunt. Starting the day after the raid, agency officials in classified briefings made that point to Congress. But in page after page of previously classified evidence, the Senate Intelligence Committee report on C.I.A. torture, released Tuesday, rejects the notion that torturing detainees contributed to finding Bin Laden. The crucial breakthrough in the hunt was the identification of ... Abu Ahmed al-Kuwaiti. The United States had started wiretapping a phone number associated with Mr. Kuwaiti by late 2001. It was in 2004 that the C.I.A. came to realize that it should focus on finding Mr. Kuwaiti as part of the hunt for Bin Laden. [A man named] Hassan Ghul, who had been captured in Iraqi Kurdistan ... provided “the most accurate” intelligence that the agency produced about Mr. Kuwaiti’s role and ties to Bin Laden. Mr. Ghul provided all the important information about [Mr. Kuwaiti] before he was subjected to any torture techniques. During that [initial] two-day period in January 2004, “He opened up right away and was cooperative from the outset.” Nevertheless, the C.I.A. then decided to torture Mr. Ghul. During and after that treatment, he provided “no actionable threat information.”

Note: Read revealing excerpts from this most disturbing report.


Feinstein prevails in long battle to release torture report
2014-12-09, San Francisco Chronicle
http://www.sfgate.com/politics/article/Feinstein-s-long-battle-to-release-tor...

Sen. Dianne Feinstein’s last act as chair of the Senate Intelligence Committee ... had Washington’s most powerful forces arrayed against her. At the end ... Feinstein said she was more determined than ever to release the summary of a 6,700-page report on the CIA’s use of torture after the terrorist attacks of Sept. 11, 2001. “She has been vilified, the committee was spied on, the CIA and its supporters ran what amounted to a domestic disinformation campaign against the report and the committee,” said Stephen Rickard, executive director of the Open Society Policy Center, a civil liberties and human rights group in Washington. “She did her job.” Her job was to provide congressional oversight of an executive branch agency, and she met prolonged and intense resistance. Feinstein called the report “the most significant and comprehensive oversight report in the committee’s history, and perhaps in that of the U.S. Senate.” The Senate panel examined nearly 6.3 million pages of documents, without Republican cooperation and against the resistance of the CIA, which went so far as to hack Intelligence Committee computers and threaten to bring criminal charges against the staff. Although President Obama insisted he wanted the report made public, administration officials reportedly pressed for redactions that Senate Democrats said would make the report meaningless.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


Afghanistan: The Making of a Narco State
2014-12-04, Rolling Stone
http://www.rollingstone.com/politics/news/afghanistan-the-making-of-a-narco-s...

In the largest opium harvest in Afghanistan's history; with a record 224,000 hectares under cultivation this year, the country produced an estimated 6,400 tons of opium, or around 90 percent of the world's supply. In Afghanistan today, according to U.N. estimates, the opium industry accounts for 15 percent of the economy. The Afghan narcotics trade has gotten undeniably worse since the U.S.-led invasion: The country produces twice as much opium as it did in 2000. In the provincial capital of Lashkar Gah, I arrange an interview with a drug smuggler. I'll call him Sami. He grew up in a camp near the border town of Chagai, in Pakistan. After finishing 11th grade, he got work as a driver and began ... smuggling opium through the desert. Baramcha, a smuggling hub on the Afghan side of the border ... functions as a kind of switching station for much of the opium trade. "The security situation is good ... the drug smugglers and the ISI are tight together," he says, referring to Pakistan's intelligence service. The United States' alliances with opium traffickers in Afghanistan go back to the 1980s, when the CIA waged a dirty war to undermine the Soviet occupation of the country. Large-scale cultivation was introduced [with] support from the ISI and the CIA. U.S. counternarcotics programs, which have cost nearly $8 billion to date, and the Afghan state-building project in general, are perversely part of ... the drug trade.

Note: Read the complete article above for an in depth look at the Afghan narcotics trade. For more, read this 2002 news article, which shows that the Taliban had nearly eliminated opium production in Afghanistan prior to the US led invasion. Yet once the allies defeated the Taliban, opium production hit new records. Today, Afghanistan produces 90% of the global opium supply. This huge source of income is used to fund all kinds of secret projects. Read powerful evidence that the CIA and US military are directly involved in the drug trade.


Talking to James Risen About Pay Any Price, the War on Terror and Press Freedoms
2014-11-25, The Intercept
https://firstlook.org/theintercept/2014/11/25/talking-james-risen-pay-price-w...

James Risen, who won the Pulitzer Prize in 2005 for exposing the NSA warrantless eavesdropping program, has [been] threatened with prison by the Obama Justice Department. [This] is almost certainly the vindictive by-product of the U.S. government’s anger over his NSA reporting. He has published a new book on the War on Terror entitled Pay Any Price: Greed, Power and Endless War. Risen's [critique] is one of the first to offer large amounts of original reporting on ... a particular part of the War on Terror, namely the way in which economic motives, what [he] calls the Homeland Security Industrial Complex, has driven a huge part of the war. GLENN GREENWALD: How much of this economic motive is the cause of the fact that we’ve now been at war for 13 years? RISEN: It plays a really central role. After so many years there’s ... a post-9/11 mercenary class that’s developed that have invested. Not just people who are making money, but people who are in the government. Their status and their power within the government are invested in continuing the war. There’s very little debate about whether to continue the war. When Dick Cheney said, “the gloves come off,” ... that really meant, “We’re going to deregulate national security, and we’re going to take off all the rules that were imposed in the ’70s after Watergate.” That was just a dramatic change. It’s been extended to this whole new homeland security apparatus. People think that terrorism is an existential threat, even though it’s not, and so they’re willing to go along with all this.

Note: The complete interview at the link above provides details of James Risen's fight to preserve journalistic integrity against a corrupted government's attempts to manipulate the news. For more on Risen's deeply revealing investigation of the Homeland Security Industrial Complex, see this recent NPR interview.


FBI: Violent crime drops, reaches 1970s level
2014-11-10, Chicago Tribune
http://www.chicagotribune.com/news/nationworld/chi-violent-crime-1970s-level-...

U.S. violent crimes including murders fell 4.4 percent in 2013 to their lowest number since the 1970s, continuing a decades-long downturn, the FBI said on Monday. The law enforcement agency's annual Crime in the United States report showed the country had an estimated 1.16 million violent crimes last year, the lowest number since 1.09 million were recorded in 1978. All types of violent crimes were lower, with murder and non-negligent manslaughter off 4.4 percent to 14,196, the lowest figure since 1968. Rape was down 6.3 percent and robbery fell 2.8 percent, the Federal Bureau of Investigation data showed. The violent crime rate last year was 367.9 for each 100,000 in population, down 5.1 percent from 2012. The rate has fallen every year since at least 1994, the earliest year for readily accessible FBI data, and the 2013 figure was about half the 1994 rate. Property crimes fell 4.1 percent ... the 11th straight yearly decline. In an analysis, the non-profit Pew Charitable Trusts said the drop in crime coincided with a decline in the prison population, with the number of U.S. prisoners down 6 percent in 2013 from its peak in 2008. Thirty-two of the 50 states have seen a drop in crime rates as the rate of imprisonment fell, Pew said. California notched the largest drop in imprisonment rate over the five-year period, at 15 percent, and crime was down 11 percent. The state has been under court order to reduce prison overcrowding, and voters last week approved an initiative that reduced sentences for some crimes.

Note: Why isn't this inspiring news being broadcast widely by the media? And why hasn't the FBI website updated their data on this since 2010? The police and media appear to consistently downplay the huge drop in violent crime since 1994. According to the FBI's own statistics, violent crime has currently dropped to 1/3 or less what it was in 1994. See the revealing FBI graphs and charts here, here, and here. Yet some of these charts have now been removed and mention of this huge decrease downplayed. The obvious reason is that a large decrease in crime might cause people to want to decrease police and FBI budgets. More here.


UK intelligence agencies spying on lawyers in sensitive security cases
2014-11-07, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2014/nov/06/intelligence-agencies-lawyer-cli...

The intelligence services have routinely been intercepting legally privileged communications ... according to internal MI5, MI6 and GCHQ documents. The information obtained may even have been exploited unlawfully and used by the agencies in the fighting of court cases in which they themselves are involved, the Investigatory Powers Tribunal (IPT) has been told. MP David Davis, a former shadow home secretary, said past practice was to delete such material immediately if it was ever picked up. 28 extracts of internal intelligence policies showing how legally privileged material is handled by security officials were released to lawyers pursuing a claim through the IPT. The claim has been brought by two Libyans, Abdel-Hakim Belhaj and Sami Al Saadi. They were abducted in a joint MI6-CIA operation and ... tortured by Colonel Muammar Gaddafi’s regime in 2004. Belhaj has been given permission to sue the government for his mistreatment. Davis, who attended the hearing, said: “In the past, when a bug or intercept on a criminal accidentally picked up a conversation with the criminal’s lawyer, the rule was that it was immediately deleted. Today’s hearing shows that is no longer the case. Agencies are clearly keeping records of legal privileged material, and have explicit policies to handle it. In the case of MI5 that policy includes concealing ... that they have the material. This change has been carried out without changing the law or telling parliament. This is an enormous breach of defendants’ judicial rights.”

Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable sources.


'Trojan Horse' Bug Lurking in Vital US Computers Since 2011
2014-11-06, ABC News
http://abcnews.go.com/US/trojan-horse-bug-lurking-vital-us-computers-2011/sto...

A destructive “Trojan Horse” malware program has penetrated the software that runs much of the nation’s critical infrastructure and is poised to cause an economic catastrophe, according to the Department of Homeland Security. National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the Russian government. The hacked software is used to control ... oil and gas pipelines, power transmission grids, water distribution and filtration systems, wind turbines and even some nuclear plants. The hacking campaign has been ongoing since 2011, but no attempt has been made to activate the malware. DHS sources ... fear that the Russians have torn a page from the old, Cold War playbook, and have placed the malware in key U.S. systems as a threat, and/or as a deterrent to a U.S. cyber-attack on Russian systems. The hack became known to insiders last week when a DHS alert bulletin was issued. The bulletin said the “BlackEnergy” penetration recently had been detected by several companies. DHS said “BlackEnergy” is the same malware that was used ... to target NATO and some energy and telecommunications companies. The hacked software is very advanced. It allows designated workers to control various industrial processes through the computer, an iPad or a smart phone, sources said.

Note: For an example of a computer-based attack on industrial infrastructure, read how a malware called Stuxnet targeted Iranian nuclear facilities. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.


FBI Says It Faked AP Story to Catch Bomb Suspect
2014-10-28, ABC News
http://abcnews.go.com/Technology/wireStory/ap-seattle-times-upset-fbi-imperso...

The FBI confirmed Tuesday it faked an Associated Press story to catch a bomb threat suspect in 2007. Police in Lacey, near Olympia, sought the FBI's help as repeated bomb threats prompted a week of evacuations at Timberline High School in June 2007. The agency obtained a warrant from a federal magistrate judge to send a "communication" to a social media account ... which contained a software tool that could verify Internet addresses, (and) turned out to be a link to a phony AP story about the bomb threats posted on a Web page created by the FBI. The 15-year-old suspect clicked on the link, revealing his computer's location. The FBI did not initially respond to AP's request earlier Tuesday for further detail about the fake story, beyond saying the ruse was necessary. AP spokesman Paul Colford said Tuesday the FBI's "ploy violated AP's name and undermined AP's credibility." "We are extremely concerned and find it unacceptable that the FBI misappropriated the name of The Associated Press and published a false story attributed to AP." Kathy Best, editor of The Seattle Times, said in a statement that, "The FBI, in placing the name of The Associated Press on a phony story sent to a criminal suspect, crossed a line and undermined the credibility of journalists everywhere — including at The Times." The documents revealing the deception were publicized Monday on Twitter by Christopher Soghoian, the principal technologist for the American Civil Liberties Union.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


US used Nazis as Cold War spies
2014-10-27, BBC News
http://www.bbc.com/news/world-us-canada-29795749

Declassified US records reveal the nation's intelligence chiefs used hundreds of Nazis as spies and informants after World War Two. Academics studying the documents say America used at least 1,000 ex-Nazis. Some had served at the highest levels of the Nazi Party, and were recruited to work as spies for the US in Europe. Former SS officer Otto von Bolschwing reportedly wrote policy papers on how to terrorise Jews, but was hired by the CIA to spy in Europe after World War Two. The agency is said to have relocated him and his family to New York in the 1950s as a reward for loyal service. Nazi collaborator Aleksandras Lileikis - linked to the massacres of tens of thousands of Jews in Lithuania - was recruited by the US as a spy in East Germany and later brought over to Boston. There is evidence the CIA even tried to intervene when Mr Lileikis became the subject of a war crimes investigation. Records indicate long-time FBI director J Edgar Hoover not only approved of the use of ex-Nazis as spies, he also dismissed the horrific acts they had been involved in during the war as Soviet propaganda. The revelations come one week after an Associated Press investigation found the US government had paid dozens of suspected Nazi war criminals millions of dollars in Social Security benefits.

Note: Explore powerful evidence that the CIA secretly smuggled Nazi war criminals into the US to teach them mind control techniques.


Sharyl Attkisson’s computer intrusions: ‘Worse than anything Nixon ever did’
2014-10-27, Washington Post Blog
http://www.washingtonpost.com/blogs/erik-wemple/wp/2014/10/27/sharyl-attkisso...

The intrusions into former CBS News correspondent Sharyl Attkisson’s computers constitute the narrative spine of the reporter’s new book “Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington.” In October 2012, right in the midst of the Benghazi story ... a person who’s identified as “Jeff” warns Attkisson: “I’ve been reading your reports online about Benghazi. It’s pretty incredible. Keep at it. But you’d better watch out.” So CBS News hires an independent computer analyst whom Attkisson identifies as "Jerry Patel." He finds a massive amount of suspicious activity in the computer. Intrusions of this caliber, concludes “Patel,” are “far beyond the the abilities of even the best nongovernment hackers.” In summing up, Attkisson writes, “Everything Patel has found serves to confirm my January source and analysis. Patel tells me that only a few entities possess these skills. One of them is the U.S. government. [Computer security specialist] Don Allison ... takes a close look at Attkisson’s iMac. The results: “While a great deal of data has been expertly wiped in an attempt to cover-up the deed, Don is able to find remnants of what was once there. There’s key evidence of a government computer connection to my computer. A sort of backdoor link that leads to an ISP address for a government computer that can’t be accessed by the general public on the Web. It’s an undeniable link to the U.S. government.”

Note: For lots more on this courageous reporter and suppression of vital news, read this article and this one. Then read even more mind-blowing reports of news suppression by top journalists.


Assange: Google Is Not What It Seems
2014-10-23, Newsweek
http://www.newsweek.com/assange-google-not-what-it-seems-279447

In June 2011, (WikiLeaks’ founder) Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt. The stated reason for the visit was a book. Schmidt was penning a treatise with Jared Cohen, the director of Google Ideas. Cohen had moved to Google from the U.S. State Department. Schmidt arrived first, accompanied by his then partner, Lisa Shields ... a vice president of the Council on Foreign Relations. Two months later, WikiLeaks’ release of State Department cables was coming to an abrupt end. Two years later, in the wake of his early 2013 visits to China, North Korea and Burma, it would come to be appreciated that the chairman of Google might be conducting, in one way or another, “back-channel diplomacy” for Washington. In 1999 ... Schmidt joined the New America Foundation. The foundation and its 100 staff serve as an influence mill, using its network of approved national security, foreign policy and technology pundits to place hundreds of articles and op-eds per year. In 2003, the U.S. National Security Agency (NSA) had already started systematically violating the Foreign Intelligence Surveillance Act (FISA). During the same period, Google ... was accepting NSA money to the tune of $2 million to provide the agency with search tools. In 2012, Google arrived on the list of top-spending Washington, D.C., lobbyists. Whether it is being just a company or “more than just a company,” Google’s geopolitical aspirations are firmly enmeshed within the foreign-policy agenda of the world’s largest superpower.

Note: Read the complete Newsweek article summarized above for Julian Assange's detailed accounting of the connections between Washington D.C. insiders, Google and related technology companies, intelligence agencies, and civil society organizations. For more about Wikileaks, read this news article summary. For more on the geopolitical big picture, see these concise summaries of deeply revealing news articles from reliable major media sources.


Your Taxes Funding Nazi War Criminals' Retirement?
2014-10-20, CBS News/Associated Press
http://www.cbsnews.com/news/nazi-war-criminal-social-security-benefits-ap-inv...

Dozens of suspected Nazi war criminals and SS guards collected millions of dollars in U.S. Social Security benefits after being forced out of the United States. Among those receiving benefits were armed SS troops who guarded the network of Nazi camps where millions of Jews perished; a rocket scientist who used slave laborers to advance his research in the Third Reich; and a Nazi collaborator who engineered the arrest and execution of thousands of Jews in Poland. The deals allowed the Justice Department's former Nazi-hunting unit, the Office of Special Investigations, to skirt lengthy deportation hearings. Social Security benefits became tools, U.S. diplomatic officials said, to secure agreements. The Social Security Administration expressed outrage in 1997 over the use of benefits. Austrian authorities were furious upon learning after the fact about a deal made with Martin Bartesch, a former SS guard at the Mauthausen concentration camp in Austria. "It was not upfront, it was not transparent, it was not a legitimate process," said James Hergen, an assistant legal adviser at the State Department from 1982 until 2007. "This was not the way America should behave." Neal Sher, a former OSI director, said the State Department cared more about diplomatic niceties than holding former members of Adolf Hitler's war machine accountable.

Note: Explore powerful evidence that the CIA secretly smuggled Nazi war criminals into the US to teach them mind control techniques.


Vote all you want. The secret government won't change
2014-10-19, Boston Globe
https://www.bostonglobe.com/ideas/2014/10/18/vote-all-you-want-the-secret-gov...

The Obama version of national security looks almost indistinguishable from the one he inherited. Critics tend to focus on Obama himself, but Tufts University political scientist Michael J. Glennon has a more pessimistic answer: Obama couldn’t have changed policies much even if he tried. Our government no longer works that way. In a new book, “National Security and Double Government,” he catalogs the ways that the defence and national security apparatus is effectively self-governing, with virtually no accountability, transparency, or checks and balances of any kind. He uses the term “double government”: There’s the one we elect, and then there’s the one behind it, steering huge swaths of policy almost unchecked. Elected officials end up serving as mere cover for the real decisions made by the bureaucracy. “National Security and Double Government” comes favorably blurbed by former members of the Defense Department, State Department, White House, and even the CIA. Glennon spoke with Ideas from his office. IDEAS: Where does the term “double government” come from? GLENNON: Walter Bagehot - the scholar who presided over the birth of The Economist magazine. IDEAS: What evidence exists for saying America has a double government? GLENNON: The documented evidence in the book is substantial — there are 800 footnotes. I think the American people ... believe that when they vote for a president or member of Congress or succeed in bringing a case before the courts, that policy is going to change. Policy by and large in the national security realm is made by the concealed institutions.

Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.