Intelligence Agency Media ArticlesExcerpts of Key Intelligence Agency Media Articles in Major Media
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
An offshore company that is trusted by the major web browsers and other tech companies to vouch for the legitimacy of websites has connections to contractors for U.S. intelligence agencies and law enforcement, according to security researchers, documents and interviews. Google's Chrome, Apple's Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to act as what's known as a root certificate authority, a powerful spot in the internet's infrastructure that guarantees websites are not fake, guiding users to them seamlessly. The company's Panamanian registration records show that it has the identical slate of officers, agents and partners as a spyware maker identified this year as an affiliate of Arizona-based Packet Forensics, which ... has sold communication interception services to U.S. government agencies for more than a decade. TrustCor's products include an email service that claims to be end-to-end encrypted, though experts consulted by The Washington Post said they found evidence to undermine that claim. A test version of the email service also included spyware developed by a Panamanian company related to Packet Forensics. A person familiar with Packet Forensics' work confirmed that it had used TrustCor's certificate process and its email service, MsgSafe, to intercept communications and help the U.S. government catch suspected terrorists. The physical address in Toronto given in [TrustCor's] auditor's report, 371 Front St. West, houses a UPS Store mail drop.
The Department of Homeland Security launched a failed operation that ensnared hundreds, if not thousands, of U.S. protesters in what new documents show was as a sweeping, power-hungry effort before the 2020 election to bolster President Donald Trump's spurious claims about a "terrorist organization" he accused his Democratic rivals of supporting. An internal investigative report, made public this month by Sen. Ron Wyden ... details the findings of DHS lawyers concerning a previously undisclosed effort by Trump's acting secretary of homeland security, Chad Wolf, to amass secret dossiers on Americans in Portland attending anti-racism protests in summer 2020 sparked by the police murder of ... George Floyd. The report describes attempts by top officials to link protesters to an imaginary terrorist plot in an apparent effort to boost Trump's reelection odds, raising concerns now about the ability of a sitting president to co-opt billions of dollars' worth of domestic intelligence assets for their own political gain. DHS analysts recounted orders to generate evidence of financial ties between protesters in custody; an effort that, had they not failed, would have seemingly served to legitimize President Trump's false claims about "Antifa." The report describes the dossiers generated by DHS as having detailed the past whereabouts and the "friends and followers of the subjects, as well as their ... First Amendment speech activity."
Note: Read about the FBI's use of entrapment to manufacture terrorist plots. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
The United States has fought more than a dozen "secret wars" over the last two decades, according to a new report from the Brennan Center for Justice. Through a combination of ground combat, airstrikes, and operations by U.S. proxy forces, these conflicts have raged from Africa to the Middle East to Asia, often completely unknown to the American people and with minimal congressional oversight. These clandestine conflicts have been enabled by the 2001 Authorization for Use of Military Force, enacted in the wake of the September 11 attacks, as well as the covert action statute, which allows secret, unattributed operations, primarily conducted by the CIA. [The new] analysis is particularly illuminating in the case of Somalia, where the United States developed two key proxy forces, the Danab Brigade and the Puntland Security Force. The CIA began building the Puntland Security Force in 2002 to battle the Al Qaeda-affiliated al-Shabab and later the Islamic State in Somalia, or ISS. The force was transferred to U.S. military control around 2012 and went on to fight alongside U.S. Special Operations forces for a decade. [The Brennan Center's Katherine Yon] Ebright notes that the proxy fighters were "largely independent of the Somali government, despite being an elite armed brigade and one of Somalia's most capable special operations units. And their relationship with U.S. forces was long kept secret, with U.S. officials disavowing the presence of military advisers in Somalia until 2014."
Note: Since 2008, the US has supported at least nine coups in five African countries. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
The Department of Homeland Security is quietly broadening its efforts to curb speech it considers dangerous, an investigation by The Intercept has found. The work, much of which remains unknown to the American public, came into clearer view earlier this year when DHS announced a new "Disinformation Governance Board": a panel designed to police misinformation (false information spread unintentionally), disinformation (false information spread intentionally), and malinformation (factual information shared, typically out of context, with harmful intent) that allegedly threatens U.S. interests. While the board was widely ridiculed, immediately scaled back, and then shut down within a few months, other initiatives are underway as DHS pivots to monitoring social media now that its original mandate – the war on terror – has been wound down. Behind closed doors, and through pressure on private platforms, the U.S. government has used its power to try to shape online discourse. Discussions have ranged from the scale and scope of government intervention in online discourse to the mechanics of streamlining takedown requests for false or intentionally misleading information. There is also a formalized process for government officials to directly flag content on Facebook or Instagram and request that it be throttled or suppressed through a special Facebook portal that requires a government or law enforcement email to use. How disinformation is defined by the government has not been clearly articulated.
Note: The Department of Homeland Security's Disinformation Governance Board has been paused, not stopped. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
A U.S. senator is pressing the FBI for more information after a whistleblower alleged that an internal review found 665 FBI personnel have resigned or retired to avoid accountability in misconduct probes over the past two decades. The whistleblower told the office of Iowa Sen. Chuck Grassley ... that the Justice Department launched the review of the FBI's disciplinary database in 2020 following an Associated Press investigation into sexual misconduct allegations involving at least six senior FBI officials. The follow-up review found 665 FBI employees, including 45 senior-level officials, resigned or retired between 2004 and 2020 following a misconduct probe but before a final disciplinary letter could be issued, according to a letter this week from Grassley to FBI Director Christopher Wray and Attorney General Merrick Garland. It was not clear how many of those cases involved sexual misconduct. Grassley's office, which declined to make the whistleblower or underlying documents available to protect the person's identify, said that was the kind of information it was still seeking but estimated the number could be in the "hundreds." The AP investigation in December 2020 identified at least six sexual misconduct allegations involving senior FBI officials over the prior five years ranging from unwanted touching and advances to coercion. It found that several senior FBI officials have avoided discipline – quietly transferring or retiring with full benefits – even after claims of sexual misconduct against them were substantiated.
Harry Truman became President in April, 1945. Two years later, he signed the National Security Act, which established the C.I.A.. It was supposed to do what its name suggested: centralize the intelligence that various agencies gathered. "It was not intended as a 'Cloak and Dagger' Outfit!," Truman later wrote. In its charter, the C.I.A. was banned from domestic spying. There was no mention of covert action in the law that chartered the C.I.A., but Presidents–starting with Truman–began using it that way. One of the agency's first operations involved meddling in the 1948 Italian election. During the Vietnam War, the C.I.A. had discouraging intelligence to offer, and, when successive Administrations didn't want to hear it, focused on being helpful by providing ... supposedly quick fixes. That meant abetting a coup in 1963, spying on antiwar protesters, and launching the Phoenix Program, an anti-Vietcong campaign marked by torture and by arbitrary executions. More than twenty thousand people were killed under Phoenix's auspices. The C.I.A. has had a "defining failure" for every decade of its existence–sometimes more than one. In the nineteen-nineties, it was the lack of foresight about the Soviet Union; in the two-thousands, it was the phantom weapons of mass destruction, followed by torture and, in still evolving ways, by the drone-based program of targeted killings, with its high toll of civilian deaths. It's difficult to know, at this point, what the C.I.A.'s next defining failure ... will be.
Note: Read more about the CIA's Phoenix Program, which included the kidnapping, torture, and murder of civilians during the Vietnam War. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The Dallas-based biotechnology company Colossal Biosciences has a vision: "To see the Woolly Mammoth thunder upon the tundra once again." Founders George Church and Ben Lamm have already racked up an impressive list of high-profile funders and investors, including Peter Thiel, Tony Robbins, Paris Hilton, Winklevoss Capital – and, according to the public portfolio its venture capital arm released this month, the CIA. Colossal says it hopes to use advanced genetic sequencing to resurrect two extinct mammals – not just the giant, ice age mammoth, but also a mid-sized marsupial known as the thylacine, or Tasmanian tiger, that died out less than a century ago. In-Q-Tel, its new investor, is registered as a nonprofit venture capital firm funded by the CIA. On its surface, the group funds technology startups with the potential to safeguard national security. In addition to its long-standing pursuit of intelligence and weapons technologies, the CIA outfit has lately displayed an increased interest in biotechnology and particularly DNA sequencing. "Biotechnology and the broader bioeconomy are critical for humanity to further develop. It is important for all facets of our government to develop them and have an understanding of what is possible," Colossal co-founder Ben Lamm wrote. The embrace of this technology, according to In-Q-Tel's blog post, will help allow U.S. government agencies to read, write, and edit genetic material, and, importantly, to steer global biological phenomena that impact "nation-to-nation competition."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
In early 2018, former National Security Agency chief Keith Alexander worked out a deal with Saudi Crown Prince Mohammed bin Salman and the cyber institute led by one of his closest aides, Saud al-Qahtani, to help the Saudi ruler train the next generation of Saudi hackers. The agreement between IronNet, founded by Alexander, and the cyber school ... faced no scrutiny for its association with Qahtani, after the brutal killing of Jamal Khashoggi he reportedly orchestrated just a few months later. Alexander officially inked the deal with the Prince Mohammed bin Salman College of Cyber Security, Artificial Intelligence, and Advanced Technologies – a school set up to train Saudi cyber intelligence agents – at a signing ceremony in Washington, D.C.. Saudi Arabia's agreement with IronNet was part of a host of moves to step up its cyber capabilities, coinciding with a campaign against the kingdom's critics abroad. Khashoggi, then a Washington Post columnist and prominent Salman critic, received a series of threatening messages, including one from Qahtani, warning him to remain silent. Khashoggi, whose family and close associates discovered listening malware electronically implanted on their smartphones, was then lured to the Saudi Embassy in Istanbul. It was there that a team dispatched by Qahtani detained and tortured the Saudi government critic. Qahtani, according to reports, beamed in through Skype to insult Khashoggi during the ordeal. Khashoggi was then dismembered with a bone saw.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The Pentagon has ordered a sweeping audit of how it conducts clandestine information warfare after major social media companies identified and took offline fake accounts suspected of being run by the U.S. military in violation of the platforms' rules. The takedowns in recent years by Twitter and Facebook of more than 150 bogus personas and media sites created in the United States was disclosed last month by internet researchers Graphika and the Stanford Internet Observatory. U.S. Central Command is among those whose activities are facing scrutiny. Some [takedowns] involved posts from the summer that advanced anti-Russia narratives. One fake account posted an inflammatory tweet claiming that relatives of deceased Afghan refugees had reported bodies being returned from Iran with missing organs. The tweet linked to a video that was part of an article posted on a U.S.-military affiliated website. In 2020 Facebook disabled fictitious personas created by Centcom to counter disinformation spread by China suggesting the coronavirus responsible for covid-19 was created at a U.S. Army lab in Fort Detrick, Md.. The pseudo profiles ... were used to amplify truthful information from the U.S. Centers for Disease Control and Prevention. Congress in late 2019 passed a law affirming that the military could conduct operations in the "information environment" to defend the United States. The measure, known as Section 1631, allows the military to carry out clandestine psychological operations.
The British government targeted the American civil rights leader Stokely Carmichael and sought to weaken the Black Power movement with covert disinformation campaigns, recently declassified documents have revealed. The effort was the work of a secret unit known as the Information Research Department, based in London and part of the Foreign Office, which created and distributed literature from fake sources as part of a broader effort to destabilise cold war enemies. The effort against Carmichael, a firebrand orator who travelled to west Africa in part to escape harassment by US law enforcement agencies, aimed to portray the prominent Black Power leader as a foreign interloper in Africa who was contemptuous of the inhabitants of the continent. Based mainly in Guinea from July 1969, the 28-year-old activist had became a vocal advocate of socialist, pan-Africanist ideologies, which worried British officials. The IRD was particularly worried by the movement's potential influence in the Caribbean. In 1969, the IRD also created a new fake group: The Organisation of African Students for African Power. This was supposedly based in East Germany and adopted contemporary radical New Left ideas, "proclaiming a plague on both" the capitalist west and the Soviet bloc. The IRD felt this provided a better platform to "damage opponents" than the dated nationalist approach, while being difficult to trace back to Britain because many similar groups had genuinely sprung up in the late 1960s.
The FBI spent years surveilling the "Queen of Soul" Aretha Franklin, trying to gauge how involved she was with the civil rights movement, communism and the Black Power movement, a 270-page document shows. Franklin, who died in 2018, was monitored ahead of several performances and attendances she made for civil rights groups, such as the National Association for the Advancement of Colored People and the Southern Christian Leadership Conference, whose first president was Dr. Martin Luther King, Jr. Informants mentioned Franklin, a Detroit native, in separate memos for possibly appearing at the SCLC's 1967 and 1968 national conventions, in Atlanta and Memphis, respectively. The FBI mailed several copies of "The Atlanta Voice" newspaper, which reported on her visit to town, to FBI offices around the country, as well as the U.S. attorney general and the Secret Service. During this time, Franklin was, in fact, actively involved in the civil rights movement through her music and personal connections. She was identified in a 1969 memo titled "Possible Racial Violence, Urban Areas, Racial Matters" when, in the year before, Denver concertgoers rioted after she refused to perform at the Red Rocks amphitheater due to not being properly paid. In 1971, memos named the Black Panther Party of Los Angeles and the Boston Young Workers Liberation League as organizations who intended to book her for rallies.
On June 28, Ghislaine Maxwell was sentenced to 20 years in prison for conspiring with Jeffrey Epstein to recruit, groom and abuse underage girls. In Maxwell's defense, lawyer Bobbi C. Sternheim said that Ms. Maxwell's life had been clouded by two men: "her narcissistic, brutish father" Robert Maxwell, wealthy British media tycoon and former member of parliament, and "the controlling, demanding, manipulative" Jeffrey Epstein. What [Maxwell] could not say was that she was the one to take the fall for a sexual blackmail operation sponsored by Western intelligence agencies. That operation appears to have originated with her father Robert back in the 1980s. Ari Ben-Menashe, a former Israeli intelligence official, claimed to have seen Jeffrey Epstein in Robert's office in the early 1980s. Robert was a long-time operative for Israeli intelligence. Ben-Menashe [said] that Epstein "was the simple idiot who was going around providing girls to all kinds of politicians in the United States. He was taking photos of politicians fucking fourteen year old girls. They would just blackmail people like this." Maxwell ... claims she has copies of everything that Epstein had and a secret stash of pedophile sex tapes that could implicate the world's most powerful and will try to use them to save herself. The flight logs from [Epstein's] Lolita Express reveal a "who's who" of early 1990s high society, including ... lawyer Alan Dershowitz, conservative billionaire David Koch; and politicians such as Tony Blair.
John Bolton, a former U.S. ambassador to the United Nations and former White House national security adviser, said on Tuesday that he had helped plan attempted coups in foreign countries. Bolton made the remarks to CNN after the day's congressional hearing into the Jan 6, 2021, attack on the U.S. Capitol. The panel's lawmakers ... accused former President Donald Trump of inciting the violence in a last-ditch bid to remain in power after losing the 2020 election. Speaking to CNN anchor Jake Tapper, however, Bolton suggested Trump was not competent enough to pull off a "carefully planned coup d'etat," later adding: "As somebody who has helped plan coups d'etat - not here but you know (in) other places - it takes a lot of work. And that's not what he (Trump) did." Tapper asked Bolton which attempts he was referring to. "I'm not going to get into the specifics," Bolton said, before mentioning Venezuela. "It turned out not to be successful. Not that we had all that much to do with it but I saw what it took for an opposition to try and overturn an illegally elected president and they failed," he said. "I feel like there's other stuff you're not telling me (beyond Venezuela)," the CNN anchor said, prompting a reply from Bolton: "I'm sure there is." Many foreign policy experts have over the years criticized Washington's history of interventions in other countries, from its role in the 1953 overthrowing of then Iranian nationalist prime minister Mohammad Mosaddegh and the Vietnam war, to its invasions of Iraq and Afghanistan this century.
It was the evening of June 9, 2006. Three [GuantĂˇnamo Bay] detainees were declared dead. The Navy says the men killed themselves by hanging, in separate nonadjoining cells, in the same way, at the same time, under video surveillance, with no guards noticing and no prisoners calling for the guards to intervene. They tell us that each of the men had bound their wrists and ankles with fabric and shoved fabric down their own throats – and then ask us to believe that they hung themselves. Despite explosive reporting by Scott Horton for Harper's Magazine in which multiple sources ... refuted the official narrative and gave evidence that a cover-up had taken place, no independent official investigation of the incident was ordered. This disturbing episode quickly turned unspeakably dark: Independent autopsies ordered by the families of the dead were useless since the bodies, which showed signs of torture, had been sent home with missing parts. The men's throats – the larynx, the hyoid bone, and the thyroid cartilage – had been removed. Even after this shocking finding ... there would be no investigations. The narrative that these men did something terrible and deserved to be imprisoned for it defines the very nature of the post-9/11 response. It doesn't matter that the original accusations against many of them were flimsy and easily disproved. Due process and the presumption of innocence, the defining values of the American ideal of justice, would be forever denied them.
Note: Read a troubling letter by Sharqawi Al Hajj, a Yemeni citizen detained at Guantanamo Bay. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
Looking Glass Factory, a company based in the Greenpoint neighborhood of Brooklyn, New York, revealed its latest consumer device: a slim, holographic picture frame that turns photos taken on iPhones into 3D displays. Looking Glass received $2.54 million of "technology development" funding from In-Q-Tel, the venture capital arm of the CIA, from April 2020 to March 2021 and a $50,000 Small Business Innovation Research award from the U.S. Air Force in November 2021 to "revolutionize 3D/virtual reality visualization." Across the various branches of the military and intelligence community, contract records show a rush to jump on holographic display technology, augmented reality, and virtual reality display systems as the latest trend. Critics argue that the technology isn't quite ready for prime time, and that the urgency to adopt it reflects the Pentagon's penchant for high-priced, high-tech contracts based on the latest fad in warfighting. Military interest in holographic imaging, in particular, has grown rapidly in recent years. Military planners in China and the U.S. have touted holographic technology to project images "to incite fear in soldiers on a battlefield." Other uses involve the creation of three-dimensional maps of villages of specific buildings and to analyze blast forensics. Palmer Luckey, who founded the technology startup Anduril Industries ... has received secretive Air Force contracts to develop next-generation artificial intelligence capabilities under the so-called Project Maven initiative.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
While President Biden signed an executive order last fall to declassify 9/11 evidence, the families of some 9/11 victims say they had to go through the British courts to get records and videos seized two decades ago from an alleged Saudi government operative that have never been public until now. Buried inside the trove is a home video from 2000. The event was described in 9/11 Commission records as a party at the San Diego apartment of Nawaf al-Hazmi and Khalid al-Mihdhar, the first two hijackers to arrive in the U.S. in January 2000. A handful of frames captured Mihdhar in the kitchen. Along with Hazmi, their team would later commandeer Flight 77 that slammed into the Pentagon. The party's host, Saudi national Omar al-Bayoumi, was arrested by British police less than two weeks after the attack. British police seized the videos and documents from Bayoumi. A newly declassified and heavily redacted FBI memo from 2017 stated, "In the late 1990s and up to September 11, 2001, Omar al-Bayoumi was paid a monthly stipend as a cooptee of the Saudi General Intelligence Presidency (GIP) via then Ambassador Prince Bandar bin Sultan." The memo continued, "Allegations of al-Bayoumi's involvement with Saudi Intelligence were not confirmed at the time of the 9/11 Commission Report. The above information confirms these allegations." Another recently declassified FBI memo ... said, "There is a 50/50 chance Omar al-Bayoumi had advanced knowledge the 9/11 terrorist attacks were to occur."
Note: For more along these lines, see concise summaries of deeply revealing news articles on 9/11 from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
The Supreme Court ruled Thursday that the federal government can shield former government contractors from testifying about the torture of a post-9/11 detainee. The decision likely will make it harder for victims to expose secret government misconduct in the future. Abu Zubaydah was the first prisoner held by the CIA to undergo what, at the time, was euphemistically called "enhanced interrogation." During one 20-day period, he was waterboarded 83 times, 24 hours a day. During that period, the suspected terrorist was also slammed against walls, put in a coffin-like box for hours at a time to simulate live burial, and subjected to something the government called "rectal rehydration." In the end, the two CIA contractors who supervised Zubaydah's interrogation concluded that they had the wrong man. But when lawyers for Zubaydah subpoenaed them, the U.S. government blocked the move by invoking the so-called "state secrets" privilege. In this case, both the Trump and Biden administrations argued that even though the information about the torture program is widely known, confirming the existence of CIA black sites in Poland would jeopardize the U.S. government's relationship with foreign intelligence services. Josh Colangelo-Bryan, a lawyer who represents other Guantanamo Bay detainees, was ... critical. "There has been no accountability for the U.S. program that subjected people to torture," he said in a statement.
Note: Read more about the CIA's torture program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Russia invaded Ukraine. For years now the Central Intelligence Agency has been preparing for such a moment, not only with prescient intelligence gathering and analysis but also by preparing Ukrainians to mount an insurgency against a Russian occupation. The agency has been training Ukrainian special forces and intelligence officers at a secret facility in the U.S. since 2015. Because the CIA training program is now publicly known, Russia can persuasively claim that Ukrainian insurgents are CIA proxies – a useful statement as propaganda to pro-Russian separatists in eastern Ukraine and as a justification for any harsh measures it takes against Ukrainian civilians. The CIA needs to be honest with the Ukrainians – and itself – about the real intent. In the first U.S.-backed insurgency, according to top secret documents later declassified, American officials intended to use the Ukrainians as a proxy force to bleed the Soviet Union. This time, is the primary goal of the paramilitary program to help Ukrainians liberate their country or to weaken Russia over the course of a long insurgency that will undoubtedly cost as many Ukrainian lives as Russian lives, if not more? Even if a Ukrainian insurgency bleeds Russia over years, the conflict could cause instability to spread across Central and Eastern Europe. This is a pattern in the history of U.S. paramilitary operations – from the Cold War to Afghanistan and Iraq today.
Note: For an alternative view of Ukraine's Zelensky, don't miss this excellent presentation by intrepid reporter Ben Swann (skip to 1:45 to avoid advertisement). For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and war from reliable major media sources.
NSO Group [is] the world's most notorious maker of spyware. The F.B.I. had bought a version of Pegasus, NSO's premier spying tool. It could ... crack the encrypted communications of any iPhone or Android smartphone. Since NSO had introduced Pegasus to the global market in 2011, it had helped Mexican authorities capture JoaquĂn GuzmĂˇn Loera, the drug lord known as El Chapo. European investigators have quietly used Pegasus to thwart terrorist plots, fight organized crime and, in one case, take down a global child-abuse ring. Mexico deployed the software not just against gangsters but also against journalists and political dissidents. The United Arab Emirates used the software to hack the phone of a civil rights activist. Saudi Arabia used it against women's rights activists. During a presentation to officials in Washington, the company demonstrated a new system, called Phantom, that could hack any number in the United States that the F.B.I. decided to target. A slick brochure ... says that Phantom allows American law enforcement and spy agencies to get intelligence "by extracting and monitoring crucial data from mobile devices." It is an "independent solution" that requires no cooperation from AT&T, Verizon, Apple or Google. The system, it says, will "turn your target's smartphone into an intelligence gold mine." The Phantom presentation triggered a discussion among government lawyers. Last summer ... the F.B.I. finally decided not to deploy the NSO weapons.
Note: Read more about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The Associated Press sought answers Monday from the Department of Homeland Security on its use of sensitive government databases for tracking international terrorists to investigate as many as 20 American journalists, including an acclaimed AP reporter. In a letter to DHS Secretary Alejandro Mayorkas, AP Executive Editor Julie Pace urged the agency to explain why the name of Pulitzer Prize-winning investigative reporter Martha Mendoza was run through the databases and identified as a potential confidential informant during the Trump administration, as detailed in a report by Homeland Security's inspector general. The DHS investigation of U.S. journalists, as well as congressional staff and perhaps members of Congress ... represents the latest apparent example of an agency created in the wake of the 9/11 attacks using its vast capabilities to target American citizens. The AP's letter ... called for "assurances that these improper practices and apparent abuse of power will not continue going forward." That would be in line with recent order from Attorney General Merrick Garland prohibiting the seizing of records of journalists in leak investigations. That followed an outcry over revelations that the Justice Department under former President Donald Trump had obtained records belonging to journalists, as well as Democratic members of Congress. During the Obama administration, federal investigators secretly seized phone records for some reporters and editors at the AP.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.