Intelligence Agency Media ArticlesExcerpts of Key Intelligence Agency Media Articles in Major Media
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
In the month since veteran journalist Seymour Hersh published his bombshell report alleging that President Joe Biden personally authorized a covert action to bomb the Nord Stream pipelines, we've seen a frenzy of speculation, detailed dissection of Hersh's specific assertions, and the emergence of competing narratives both supporting and denouncing the report. On March 7, the New York Times and the German newspaper Die Zeit both published stories that thicken the plot. The Times story was based on a narrative clearly being pushed by U.S. intelligence sources that "a pro-Ukrainian group carried out the attack." If the bombing of the Nord Stream pipelines was, as Hersh alleges, directed by the U.S., then the leaked suggestion that the culprits were a "pro-Ukrainian group" could indicate a nascent effort at floating a cover story. No one has claimed responsibility for this attack, but there are recent precedents for foreign actors taking credit for U.S. operations to conceal Washington's involvement. Military officials have lied or misled the public ... throughout U.S. history. There is no U.S. law or rule prohibiting the government from promoting a false alternative explanation to conceal an operation. "This is an established practice in military operations and intelligence activities where it is often known as 'cover and deception,'" [said former Government Secrecy Project director Steven Aftergood]. "Sometimes, in order to maintain the operational security of X, you have to declare that it is actually Y."
Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
We are stuck in a never ending cycle of disaster that has led to one giant sense-making crises. False flag terrorism ... refers to governments creating, supporting, or staging events, like acts of terrorism in their own country and on their own citizenry, and then blaming it on someone else. Sometimes events can be created and even staged, and other times events are completely real yet the narrative we receive is where the deception lies. Either way, in many cases these events are used for control and/or political and financial gain. Take, for example, Operation Northwoods. This was a plan hatched by the US government in the early 1960s to fool the American public and the international community into supporting a war against Cuba in order to oust Fidel Castro. The plan included blowing up a US ship, attacking a US military base, sinking and blowing up boats of Cuban refugees, hijacking planes, and orchestrating violent terrorism in multiple US cities against American citizens. And of course, blaming Cuba for these actions. 9/11 could perhaps be one of the best examples of false flag terrorism, but the evidence that has lead the majority of people to feel this sentiment has not seen the light of day within the mainstream. There are many similarities between 9/11 and COVID, and in my mind COVID has been a clear act of bioterrorism by the same entities who proposed the 'solution.' These included vaccine mandates, mask mandates and more, which we are likely to see resurface again in the future.
Note: Read more about false flag terrorism. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
The FBI and the Defense Department were actively involved in research and development of facial recognition software that they hoped could be used to identify people from video footage captured by street cameras and flying drones, according to thousands of pages of internal documents that provide new details about the government's ambitions to build out a powerful tool for advanced surveillance. The documents, revealed in response to an ongoing Freedom of Information Act lawsuit the American Civil Liberties Union filed against the FBI, show how closely FBI and Defense officials worked with academic researchers to refine artificial-intelligence techniques that could help in the identification or tracking of Americans without their awareness or consent. Many of the records relate to the Janus program, a project funded by the Intelligence Advanced Research Projects Agency, or IARPA. The improved facial recognition system was ultimately folded into a search tool, called Horus, and made available to the Pentagon's Combating Terrorism Technical Support Office, which helps provide military technologies to civilian police forces. No federal laws regulate how facial recognition systems can be used. The tool's use in domestic mass surveillance would be a "nightmare scenario," said Nathan Wessler, a deputy director at the ACLU. "It could give the government the ability to pervasively track as many people as they want for as long as they want. There's no good outcome for that in a democratic society."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Antiterrorist moral fervor and ideological blinders propelled the U.S. into its biggest foreign policy blunder since World War Two. The U.S. government constantly embellished the storyline to demonize the communist opposition. A CIA operative provided materials for a massive bomb that ripped through a main square in Saigon in 1952. A Life magazine photographer was waiting on the scene, and his resulting snap appeared with a caption blaming the carnage on Viet Minh Communists. The Kennedy administration sought credibility by profoundly deceiving the American people and Congress regarding its Vietnam policy. In August 1963, South Vietnamese Special Forces "carried out midnight raids against Buddhist pagodas throughout the country. More than 1400 people, mostly monks were arrested and many of them were beaten," according to the Pentagon Papers. The CIA was bankrolling these Special Forces, which were supposed to be used for covert operations against the Viet Cong or North Vietnam, not for religious repression. The Johnson administration exploited the terrorist label to sway Americans to support greater U.S. Involvement in Vietnam. In a special message to Congress on May 18, 1964 seeking additional fund for Vietnam, LBJ declared, "the Viet Cong guerrillas, under orders from their Communist masters in the North, have intensified terrorist actions against the peaceful people of South Vietnam. This increased terrorism requires increased response."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and terrorism from reliable major media sources.
Genaro GarcĂa Luna, Mexico's former top law enforcement official known as the "architect" of the Mexican side of the drug war, was found guilty in New York federal court of collaborating with the Sinaloa cartel, the biggest organized crime group in North America. For years, GarcĂa Luna was the U.S. government's most trusted ally in the war on drugs. As public security secretary, he wielded incredible power, overseeing Mexico's Federal Police, the prison network, and a vast intelligence-gathering infrastructure, while working with the Drug Enforcement Administration, FBI, CIA, and Department of Homeland Security in the fight against Mexican cartels. The case portrayed GarcĂa Luna and his network of corrupt officials as a handful of bad apples, and what U.S. officials knew about GarcĂa Luna's illicit activities went mostly unexplored, despite the government's role in providing funding, equipment, and training that has fueled drug-related violence. GarcĂa Luna was found guilty of all five charges, including drug trafficking and continuing a criminal enterprise. Prosecutors alleged that he received around $274 million in bribes from the cartel from 2001 to 2012, first as head of the Federal Investigative Agency, the Mexican equivalent of the FBI, and then as secretary of public security. GarcĂa Luna left public office in 2012 following a change in presidency and moved to Miami where he started a security consulting company and lived a lavish lifestyle.
Note: The War on Drugs has been described as a trillion dollar failure. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in intelligence agencies from reliable major media sources.
It has now been one week since Seymour Hersh published an in-depth report claiming that the Biden administration deliberately blew up the Nord Stream II gas pipeline without Germany's consent or even knowledge – an operation that began planning long before the Russian invasion of Ukraine. Hersh – the journalist who broke the stories of the My Lai Massacre, the CIA spying program and the Abu Ghraib torture scandal – claims that in June, U.S. Navy divers traveled to the Baltic Sea and attached C4 explosive charges to the pipeline. President Biden himself ordered its destruction. All understood ... that, if caught, it would be seen as a flagrant "act of war" against their allies. Despite this, corporate media have overwhelmingly ignored the Pulitzer Prize-winning reporter's bombshell. A MintPress News study analyzed the 20 most influential publications in the United States, according to analytics company Similar Web, and found only four mentions of the report between them. This lack of interest cannot be explained due to the report's irrelevance. If the Biden administration really did work closely with the Norwegian government to blow up Nord Stream II, causing billions of dollars worth of immediate damage and plunging an entire region of the world into a freezing winter without sufficient energy, it ranks as one of the worst terrorist attacks in history. The Nord Stream attack was also one of the world's worst ecological disasters, constituting the largest single leak of methane in history.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
The "Twitter files" revealed an FBI operation to monitor and censor social media content. Dozens of FBI employees worked on the identification and removal of material on a wide range of subjects and that Twitter largely carried out their requests. Nor was it just the FBI, apparently. Emails reveal FBI figures like a San Francisco assistant special agent in charge asking Twitter executives to "invite an OGA" (or "Other Government Organization") to an upcoming meeting. A week later, Stacia Cardille, a senior Twitter legal executive, indicated the OGA was the CIA, an agency under strict limits regarding domestic activities. Twitter's own ranks included dozens of ex-FBI agents and executives. The dozens of disclosed emails ... do not include still-undisclosed but apparent government coordination with Facebook and other social media companies. Much of that work apparently was done through the multi-agency Foreign Influence Task Force (FITF), which operated secretly it seems to censor citizens. This is a First Amendment violation. The Twitter files have substantiated long-standing concerns over "censorship by surrogate" or proxy. As with other amendments like the Fourth Amendment, which protects against unreasonable searches or seizures, the government cannot use private agents to do indirectly what it cannot do directly. Just as a police officer cannot direct a security guard to break into an apartment and conduct a search, the FBI cannot use Twitter to censor Americans.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
A war between China and Taiwan will be extremely good for business at America's Frontier Fund ... according to audio from a February 1 event. The remarks occurred at a tech finance symposium hosted at the Manhattan offices of Silicon Valley Bank. "If the China-Taiwan situation happens, some of our investments will 10x, like overnight," [a] person who identified as "Tom" said. "So I don't want to share the name, but the one example I gave was a critical component that ... the total market value is $200 million, but it is a critical component to a $50 billion market cap. That's like a choke point, right. And so if it's only produced in China, for example, and there's a kinetic event in the Pacific, that would 10x overnight, like no question about it. There's a couple of different things like that." AFF is surely not the only venture fund that would see stratospheric returns throughout their portfolio in the case of a destabilizing global crisis, like a "kinetic event in the Pacific" – that is to say, war. Gilman Louie, AFF's co-founder and current CEO, serves as chair of the National Intelligence University, advises Biden through his Intelligence Advisory Board, and was tapped for the State Department's Foreign Affairs Policy Board. Louie previously ran In-Q-Tel, the CIA's venture capital arm. In other words, AFF stands to massively profit from a geopolitical crisis while its CEO advises the Biden administration on geopolitical crises. AFF was founded last year with support from former Google CEO Eric Schmidt.
Note: While the detection of a Chinese spy balloon drums up significant fear and outrage over hostile foreign "threats," an incisive article reveals how US surveillance of foreign countries is quite common, including their recent expansion of military bases in Southeast Asia to monitor and surveil China. Furthermore, many independent journalists are questioning the war-fueling narrative that China is a threat to national security. Watch an insightful analysis uncovering the deeper story of what's behind the growing tensions between the US and China.
In June 2017, The Intercept published a leaked N.S.A. document, which it claimed revealed "a months-long Russian hacking effort against the U.S. election infrastructure." Ever since, it has been an article of faith in the mainstream media and among Democratic politicians that Russian G.R.U. cyberwarriors "hacked" the 2016 election. Moreover, Reality Winner, the N.S.A. analyst who leaked the document and ended up in jail as a result, has been elevated to the status of a heroic whistleblower. There are strong grounds to believe Winner unwittingly walked into a trap laid by the C.I.A. Winner has always claimed she acted alone, and there is no reason to doubt that she felt it was her patriotic duty to release the document. But her clumsiness, naivety and incompetence suggest she may well be easily manipulable, and a great many individuals and organizations had an interest in the dud intelligence report's release. Foremost among them, elements of the C.I.A. loyal to John Brennan, Agency director between 2013 and January 2017. Brennan fudged ... findings to keep the F.B.I. Trump-Russia "collusion" investigation alive. Launched by the Bureau in 2016, it found no evidence Trump or members of his campaign were conspiring with Moscow. It is an obvious question whether Winner's leak – in addition to furthering the RussiaGate fiction and damaging Trump – also served to discredit the N.S.A. by creating the illusion it had been asleep at the wheel over Kremlin meddling.
Note: Listen to audio of renowned journalist Seymour Hersch debunking the intelligence agency lie that Russia was responsible for the 2016 DNC email leaks, which exposed corruption in the party. Reality Winner's leak gave credence to this lie. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Among the intersections between [Lee Harvey] Oswald and the CIA, his time as a young Marine at the Atsugi naval air facility in Japan in 1957 is high among them. Atsugi was a launching pad for U-2 spy flights over the Soviet Union and was also a hub of the CIA's research into psychedelic drugs. "A CIA memo titled 'Truth Drugs in Interrogation' revealed the agency practice of dosing agents who were marked for dangerous overseas missions," wrote author David Talbot in "The Devil's Chessboard." A new document released in full last week relates directly to Oswald's time at Atsugi, revealing details about the CIA's response to testimony from a former agency accountant that the spy service had employed Oswald – who went on to be a gunman in the assassination of President John F. Kennedy in 1963. The CIA's claim to have had no contact with Oswald is undercut by the fact that George de Mohrenschildt, a CIA asset, became close friends with Oswald in the months before the assassination. According to documents found in the newly declassified files, at the same time as his trip, the CIA's Domestic Operations Division ran a search on de Mohrenschildt, "exact reason unknown," according to two documents created by a CIA analyst included in last week's declassification. The covert arm of the division was run at the time by E. Howard Hunt, a black ops specialist who confessed later in life to learning ahead of time of a conspiracy to assassinate Kennedy that involved high-level figures in the CIA.
Note: The CIA's MK-ULTRA program routinely administered drugs to unsuspecting victims. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
President Joe Biden's administration released more than 13,000 records of President John F. Kennedy's assassination Thursday, but it fell short of fully complying with the spirit of a 30-year-old law demanding transparency by now. With Thursday's action, about 98% of all documents related to the 1963 killing have now been released and just 3% of the records remain redacted in whole or in part, according to the National Archives, which controls the John F. Kennedy Assassination Records Collection. The records include more information on accused gunman Lee Harvey Oswald and his time spent in Mexico City. But about 4,300 records remain redacted in part. [CIA agent George] Joannides ... guided and monitored an anti-Fidel Castro group called Directorio Revolucionario Estudiantil (Revolutionary Student Directorate) in 1963 that came into contact with Oswald in New Orleans in the months before the assassination, leading some to speculate about CIA-related complicity in the killing. As Oswald interacted with DRE and became known as an activist who supported President Castro, the Pentagon was formulating a plan called Operation Northwoods to stage a false flag attack in the United States to blame on Cuba and justify a military confrontation to make up for the aborted Bay of Pigs fiasco two years before. The records and the CIA's deceit over Joannides' ties to Oswald spans decades and came to light only after the records act began to unearth information about him.
Note: While the mainstream narrative points to the CIA being complicit in the killing of Kennedy by a Communist lone gunman, there is overwhelming evidence not often talked about, that reveals how Kennedy was murdered by rogue elements within US government agencies as a result of his efforts towards peacemaking strategies over nuclear weapon warfare, among other reasons. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
Trust Lab was founded by a team of well-credentialed Big Tech alumni who came together in 2021 with a mission: Make online content moderation more transparent, accountable, and trustworthy. A year later, the company announced a "strategic partnership" with the CIA's venture capital firm. The quiet October 29 announcement of the partnership is light on details, stating that Trust Lab and In-Q-Tel – which invests in and collaborates with firms it believes will advance the mission of the CIA – will work on "a long-term project that will help identify harmful content and actors in order to safeguard the internet." Key terms like "harmful" and "safeguard" are unexplained, but the press release goes on to say that the company will work toward "pinpointing many types of online harmful content, including toxicity and misinformation." It's difficult to imagine how aligning the startup with the CIA is compatible with [Trust Lab co-founder Tom] Siegel's goal of bringing greater transparency and integrity to internet governance. What would it mean, for instance, to incubate counter-misinformation technology for an agency with a vast history of perpetuating misinformation? Placing the company within the CIA's tech pipeline also raises questions about Trust Lab's view of who or what might be a "harmful" online, a nebulous concept that will no doubt mean something very different to the U.S. intelligence community than it means elsewhere. Trust Lab's murky partnership with In-Q-Tel suggests a step toward greater governmental oversight of online speech.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
The Biden administration took a public stand last year against the abuse of spyware to target human rights activists, dissidents and journalists: It blacklisted the most notorious maker of the hacking tools, the Israeli firm NSO Group. But the global industry for commercial spyware – which allows governments to invade mobile phones and vacuum up data – continues to boom. Even the U.S. government is using it. The Drug Enforcement Administration is secretly deploying spyware from a different Israeli firm, according to five people familiar with the agency's operations, in the first confirmed use of commercial spyware by the federal government. The most sophisticated spyware tools – like NSO's Pegasus – have "zero-click" technology, meaning they can stealthily and remotely extract everything from a target's mobile phone, without the user having to click on a malicious link to give Pegasus remote access. They can also turn the mobile phone into a tracking and secret recording device, allowing the phone to spy on its owner. But hacking tools without zero-click capability, which are considerably cheaper, also have a significant market. Commercial spyware has been used by intelligence services and police forces to hack phones used by drug networks and terrorist groups. But it has also been abused by numerous authoritarian regimes and democracies to spy on political opponents and journalists. This has led governments to a sometimes tortured rationale for their use.
Note: Read about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.
An offshore company that is trusted by the major web browsers and other tech companies to vouch for the legitimacy of websites has connections to contractors for U.S. intelligence agencies and law enforcement, according to security researchers, documents and interviews. Google's Chrome, Apple's Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to act as what's known as a root certificate authority, a powerful spot in the internet's infrastructure that guarantees websites are not fake, guiding users to them seamlessly. The company's Panamanian registration records show that it has the identical slate of officers, agents and partners as a spyware maker identified this year as an affiliate of Arizona-based Packet Forensics, which ... has sold communication interception services to U.S. government agencies for more than a decade. TrustCor's products include an email service that claims to be end-to-end encrypted, though experts consulted by The Washington Post said they found evidence to undermine that claim. A test version of the email service also included spyware developed by a Panamanian company related to Packet Forensics. A person familiar with Packet Forensics' work confirmed that it had used TrustCor's certificate process and its email service, MsgSafe, to intercept communications and help the U.S. government catch suspected terrorists. The physical address in Toronto given in [TrustCor's] auditor's report, 371 Front St. West, houses a UPS Store mail drop.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.
The Department of Homeland Security launched a failed operation that ensnared hundreds, if not thousands, of U.S. protesters in what new documents show was as a sweeping, power-hungry effort before the 2020 election to bolster President Donald Trump's spurious claims about a "terrorist organization" he accused his Democratic rivals of supporting. An internal investigative report, made public this month by Sen. Ron Wyden ... details the findings of DHS lawyers concerning a previously undisclosed effort by Trump's acting secretary of homeland security, Chad Wolf, to amass secret dossiers on Americans in Portland attending anti-racism protests in summer 2020 sparked by the police murder of ... George Floyd. The report describes attempts by top officials to link protesters to an imaginary terrorist plot in an apparent effort to boost Trump's reelection odds, raising concerns now about the ability of a sitting president to co-opt billions of dollars' worth of domestic intelligence assets for their own political gain. DHS analysts recounted orders to generate evidence of financial ties between protesters in custody; an effort that, had they not failed, would have seemingly served to legitimize President Trump's false claims about "Antifa." The report describes the dossiers generated by DHS as having detailed the past whereabouts and the "friends and followers of the subjects, as well as their ... First Amendment speech activity."
Note: Read about the FBI's use of entrapment to manufacture terrorist plots. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
The United States has fought more than a dozen "secret wars" over the last two decades, according to a new report from the Brennan Center for Justice. Through a combination of ground combat, airstrikes, and operations by U.S. proxy forces, these conflicts have raged from Africa to the Middle East to Asia, often completely unknown to the American people and with minimal congressional oversight. These clandestine conflicts have been enabled by the 2001 Authorization for Use of Military Force, enacted in the wake of the September 11 attacks, as well as the covert action statute, which allows secret, unattributed operations, primarily conducted by the CIA. [The new] analysis is particularly illuminating in the case of Somalia, where the United States developed two key proxy forces, the Danab Brigade and the Puntland Security Force. The CIA began building the Puntland Security Force in 2002 to battle the Al Qaeda-affiliated al-Shabab and later the Islamic State in Somalia, or ISS. The force was transferred to U.S. military control around 2012 and went on to fight alongside U.S. Special Operations forces for a decade. [The Brennan Center's Katherine Yon] Ebright notes that the proxy fighters were "largely independent of the Somali government, despite being an elite armed brigade and one of Somalia's most capable special operations units. And their relationship with U.S. forces was long kept secret, with U.S. officials disavowing the presence of military advisers in Somalia until 2014."
Note: Since 2008, the US has supported at least nine coups in five African countries. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
The Department of Homeland Security is quietly broadening its efforts to curb speech it considers dangerous, an investigation by The Intercept has found. The work, much of which remains unknown to the American public, came into clearer view earlier this year when DHS announced a new "Disinformation Governance Board": a panel designed to police misinformation (false information spread unintentionally), disinformation (false information spread intentionally), and malinformation (factual information shared, typically out of context, with harmful intent) that allegedly threatens U.S. interests. While the board was widely ridiculed, immediately scaled back, and then shut down within a few months, other initiatives are underway as DHS pivots to monitoring social media now that its original mandate – the war on terror – has been wound down. Behind closed doors, and through pressure on private platforms, the U.S. government has used its power to try to shape online discourse. Discussions have ranged from the scale and scope of government intervention in online discourse to the mechanics of streamlining takedown requests for false or intentionally misleading information. There is also a formalized process for government officials to directly flag content on Facebook or Instagram and request that it be throttled or suppressed through a special Facebook portal that requires a government or law enforcement email to use. How disinformation is defined by the government has not been clearly articulated.
Note: The Department of Homeland Security's Disinformation Governance Board has been paused, not stopped. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
A U.S. senator is pressing the FBI for more information after a whistleblower alleged that an internal review found 665 FBI personnel have resigned or retired to avoid accountability in misconduct probes over the past two decades. The whistleblower told the office of Iowa Sen. Chuck Grassley ... that the Justice Department launched the review of the FBI's disciplinary database in 2020 following an Associated Press investigation into sexual misconduct allegations involving at least six senior FBI officials. The follow-up review found 665 FBI employees, including 45 senior-level officials, resigned or retired between 2004 and 2020 following a misconduct probe but before a final disciplinary letter could be issued, according to a letter this week from Grassley to FBI Director Christopher Wray and Attorney General Merrick Garland. It was not clear how many of those cases involved sexual misconduct. Grassley's office, which declined to make the whistleblower or underlying documents available to protect the person's identify, said that was the kind of information it was still seeking but estimated the number could be in the "hundreds." The AP investigation in December 2020 identified at least six sexual misconduct allegations involving senior FBI officials over the prior five years ranging from unwanted touching and advances to coercion. It found that several senior FBI officials have avoided discipline – quietly transferring or retiring with full benefits – even after claims of sexual misconduct against them were substantiated.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and sexual abuse scandals from reliable major media sources.
Harry Truman became President in April, 1945. Two years later, he signed the National Security Act, which established the C.I.A.. It was supposed to do what its name suggested: centralize the intelligence that various agencies gathered. "It was not intended as a 'Cloak and Dagger' Outfit!," Truman later wrote. In its charter, the C.I.A. was banned from domestic spying. There was no mention of covert action in the law that chartered the C.I.A., but Presidents–starting with Truman–began using it that way. One of the agency's first operations involved meddling in the 1948 Italian election. During the Vietnam War, the C.I.A. had discouraging intelligence to offer, and, when successive Administrations didn't want to hear it, focused on being helpful by providing ... supposedly quick fixes. That meant abetting a coup in 1963, spying on antiwar protesters, and launching the Phoenix Program, an anti-Vietcong campaign marked by torture and by arbitrary executions. More than twenty thousand people were killed under Phoenix's auspices. The C.I.A. has had a "defining failure" for every decade of its existence–sometimes more than one. In the nineteen-nineties, it was the lack of foresight about the Soviet Union; in the two-thousands, it was the phantom weapons of mass destruction, followed by torture and, in still evolving ways, by the drone-based program of targeted killings, with its high toll of civilian deaths. It's difficult to know, at this point, what the C.I.A.'s next defining failure ... will be.
Note: Read more about the CIA's Phoenix Program, which included the kidnapping, torture, and murder of civilians during the Vietnam War. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The Dallas-based biotechnology company Colossal Biosciences has a vision: "To see the Woolly Mammoth thunder upon the tundra once again." Founders George Church and Ben Lamm have already racked up an impressive list of high-profile funders and investors, including Peter Thiel, Tony Robbins, Paris Hilton, Winklevoss Capital – and, according to the public portfolio its venture capital arm released this month, the CIA. Colossal says it hopes to use advanced genetic sequencing to resurrect two extinct mammals – not just the giant, ice age mammoth, but also a mid-sized marsupial known as the thylacine, or Tasmanian tiger, that died out less than a century ago. In-Q-Tel, its new investor, is registered as a nonprofit venture capital firm funded by the CIA. On its surface, the group funds technology startups with the potential to safeguard national security. In addition to its long-standing pursuit of intelligence and weapons technologies, the CIA outfit has lately displayed an increased interest in biotechnology and particularly DNA sequencing. "Biotechnology and the broader bioeconomy are critical for humanity to further develop. It is important for all facets of our government to develop them and have an understanding of what is possible," Colossal co-founder Ben Lamm wrote. The embrace of this technology, according to In-Q-Tel's blog post, will help allow U.S. government agencies to read, write, and edit genetic material, and, importantly, to steer global biological phenomena that impact "nation-to-nation competition."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
In early 2018, former National Security Agency chief Keith Alexander worked out a deal with Saudi Crown Prince Mohammed bin Salman and the cyber institute led by one of his closest aides, Saud al-Qahtani, to help the Saudi ruler train the next generation of Saudi hackers. The agreement between IronNet, founded by Alexander, and the cyber school ... faced no scrutiny for its association with Qahtani, after the brutal killing of Jamal Khashoggi he reportedly orchestrated just a few months later. Alexander officially inked the deal with the Prince Mohammed bin Salman College of Cyber Security, Artificial Intelligence, and Advanced Technologies – a school set up to train Saudi cyber intelligence agents – at a signing ceremony in Washington, D.C.. Saudi Arabia's agreement with IronNet was part of a host of moves to step up its cyber capabilities, coinciding with a campaign against the kingdom's critics abroad. Khashoggi, then a Washington Post columnist and prominent Salman critic, received a series of threatening messages, including one from Qahtani, warning him to remain silent. Khashoggi, whose family and close associates discovered listening malware electronically implanted on their smartphones, was then lured to the Saudi Embassy in Istanbul. It was there that a team dispatched by Qahtani detained and tortured the Saudi government critic. Qahtani, according to reports, beamed in through Skype to insult Khashoggi during the ordeal. Khashoggi was then dismembered with a bone saw.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Allegations by FBI Special Agent Steve Friend contained in a whistleblower complaint filed late Wednesday with the Department of Justice inspector general reveal a politicized Washington, DC, FBI field office cooking the books to exaggerate the threat of domestic terrorism, and using an "overzealous" January 6 investigation to harass conservative Americans and violate their constitutional rights. Friend, 37, a respected 12-year veteran of the FBI and a SWAT team member, was suspended Monday, stripped of his gun and badge, and escorted out of the FBI field office in Daytona Beach, Fla., after complaining to his supervisors about the violations. He was declared absent without leave last month for refusing to participate in SWAT raids that he believed violated FBI policy and were a use of excessive force against Jan. 6 subjects accused of misdemeanor offenses. "I have an oath to uphold the Constitution," he told supervisors when he asserted his conscientious objection to joining an Aug. 24 raid on a J6 subject. "I have a moral objection and want to be considered a conscientious objector." In his whistleblower complaint to DOJ Inspector General Michael Horowitz ... Friend lays out multiple violations of FBI policy involving J6 investigations in which he was involved. He says he was removed from active investigations into child sexual exploitation and human trafficking to work on J6 cases sent from DC. As a result, he believes his child exploitation investigations were harmed.
Note: Read how Facebook is silencing activity related to this whistleblower. Read also Matt Taibbi's reporting on this important case. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
The Pentagon has ordered a sweeping audit of how it conducts clandestine information warfare after major social media companies identified and took offline fake accounts suspected of being run by the U.S. military in violation of the platforms' rules. The takedowns in recent years by Twitter and Facebook of more than 150 bogus personas and media sites created in the United States was disclosed last month by internet researchers Graphika and the Stanford Internet Observatory. U.S. Central Command is among those whose activities are facing scrutiny. Some [takedowns] involved posts from the summer that advanced anti-Russia narratives. One fake account posted an inflammatory tweet claiming that relatives of deceased Afghan refugees had reported bodies being returned from Iran with missing organs. The tweet linked to a video that was part of an article posted on a U.S.-military affiliated website. In 2020 Facebook disabled fictitious personas created by Centcom to counter disinformation spread by China suggesting the coronavirus responsible for covid-19 was created at a U.S. Army lab in Fort Detrick, Md.. The pseudo profiles ... were used to amplify truthful information from the U.S. Centers for Disease Control and Prevention. Congress in late 2019 passed a law affirming that the military could conduct operations in the "information environment" to defend the United States. The measure, known as Section 1631, allows the military to carry out clandestine psychological operations.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
The British government targeted the American civil rights leader Stokely Carmichael and sought to weaken the Black Power movement with covert disinformation campaigns, recently declassified documents have revealed. The effort was the work of a secret unit known as the Information Research Department, based in London and part of the Foreign Office, which created and distributed literature from fake sources as part of a broader effort to destabilise cold war enemies. The effort against Carmichael, a firebrand orator who travelled to west Africa in part to escape harassment by US law enforcement agencies, aimed to portray the prominent Black Power leader as a foreign interloper in Africa who was contemptuous of the inhabitants of the continent. Based mainly in Guinea from July 1969, the 28-year-old activist had became a vocal advocate of socialist, pan-Africanist ideologies, which worried British officials. The IRD was particularly worried by the movement's potential influence in the Caribbean. In 1969, the IRD also created a new fake group: The Organisation of African Students for African Power. This was supposedly based in East Germany and adopted contemporary radical New Left ideas, "proclaiming a plague on both" the capitalist west and the Soviet bloc. The IRD felt this provided a better platform to "damage opponents" than the dated nationalist approach, while being difficult to trace back to Britain because many similar groups had genuinely sprung up in the late 1960s.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.
The FBI spent years surveilling the "Queen of Soul" Aretha Franklin, trying to gauge how involved she was with the civil rights movement, communism and the Black Power movement, a 270-page document shows. Franklin, who died in 2018, was monitored ahead of several performances and attendances she made for civil rights groups, such as the National Association for the Advancement of Colored People and the Southern Christian Leadership Conference, whose first president was Dr. Martin Luther King, Jr. Informants mentioned Franklin, a Detroit native, in separate memos for possibly appearing at the SCLC's 1967 and 1968 national conventions, in Atlanta and Memphis, respectively. The FBI mailed several copies of "The Atlanta Voice" newspaper, which reported on her visit to town, to FBI offices around the country, as well as the U.S. attorney general and the Secret Service. During this time, Franklin was, in fact, actively involved in the civil rights movement through her music and personal connections. She was identified in a 1969 memo titled "Possible Racial Violence, Urban Areas, Racial Matters" when, in the year before, Denver concertgoers rioted after she refused to perform at the Red Rocks amphitheater due to not being properly paid. In 1971, memos named the Black Panther Party of Los Angeles and the Boston Young Workers Liberation League as organizations who intended to book her for rallies.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.
On June 28, Ghislaine Maxwell was sentenced to 20 years in prison for conspiring with Jeffrey Epstein to recruit, groom and abuse underage girls. In Maxwell's defense, lawyer Bobbi C. Sternheim said that Ms. Maxwell's life had been clouded by two men: "her narcissistic, brutish father" Robert Maxwell, wealthy British media tycoon and former member of parliament, and "the controlling, demanding, manipulative" Jeffrey Epstein. What [Maxwell] could not say was that she was the one to take the fall for a sexual blackmail operation sponsored by Western intelligence agencies. That operation appears to have originated with her father Robert back in the 1980s. Ari Ben-Menashe, a former Israeli intelligence official, claimed to have seen Jeffrey Epstein in Robert's office in the early 1980s. Robert was a long-time operative for Israeli intelligence. Ben-Menashe [said] that Epstein "was the simple idiot who was going around providing girls to all kinds of politicians in the United States. He was taking photos of politicians fucking fourteen year old girls. They would just blackmail people like this." Maxwell ... claims she has copies of everything that Epstein had and a secret stash of pedophile sex tapes that could implicate the world's most powerful and will try to use them to save herself. The flight logs from [Epstein's] Lolita Express reveal a "who's who" of early 1990s high society, including ... lawyer Alan Dershowitz, conservative billionaire David Koch; and politicians such as Tony Blair.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and Jeffrey Epstein from reliable major media sources.
John Bolton, a former U.S. ambassador to the United Nations and former White House national security adviser, said on Tuesday that he had helped plan attempted coups in foreign countries. Bolton made the remarks to CNN after the day's congressional hearing into the Jan 6, 2021, attack on the U.S. Capitol. The panel's lawmakers ... accused former President Donald Trump of inciting the violence in a last-ditch bid to remain in power after losing the 2020 election. Speaking to CNN anchor Jake Tapper, however, Bolton suggested Trump was not competent enough to pull off a "carefully planned coup d'etat," later adding: "As somebody who has helped plan coups d'etat - not here but you know (in) other places - it takes a lot of work. And that's not what he (Trump) did." Tapper asked Bolton which attempts he was referring to. "I'm not going to get into the specifics," Bolton said, before mentioning Venezuela. "It turned out not to be successful. Not that we had all that much to do with it but I saw what it took for an opposition to try and overturn an illegally elected president and they failed," he said. "I feel like there's other stuff you're not telling me (beyond Venezuela)," the CNN anchor said, prompting a reply from Bolton: "I'm sure there is." Many foreign policy experts have over the years criticized Washington's history of interventions in other countries, from its role in the 1953 overthrowing of then Iranian nationalist prime minister Mohammad Mosaddegh and the Vietnam war, to its invasions of Iraq and Afghanistan this century.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in intelligence services from reliable major media sources.
It was the evening of June 9, 2006. Three [Guantánamo Bay] detainees were declared dead. The Navy says the men killed themselves by hanging, in separate nonadjoining cells, in the same way, at the same time, under video surveillance, with no guards noticing and no prisoners calling for the guards to intervene. They tell us that each of the men had bound their wrists and ankles with fabric and shoved fabric down their own throats – and then ask us to believe that they hung themselves. Despite explosive reporting by Scott Horton for Harper's Magazine in which multiple sources ... refuted the official narrative and gave evidence that a cover-up had taken place, no independent official investigation of the incident was ordered. This disturbing episode quickly turned unspeakably dark: Independent autopsies ordered by the families of the dead were useless since the bodies, which showed signs of torture, had been sent home with missing parts. The men's throats – the larynx, the hyoid bone, and the thyroid cartilage – had been removed. Even after this shocking finding ... there would be no investigations. The narrative that these men did something terrible and deserved to be imprisoned for it defines the very nature of the post-9/11 response. It doesn't matter that the original accusations against many of them were flimsy and easily disproved. Due process and the presumption of innocence, the defining values of the American ideal of justice, would be forever denied them.
Note: Read a troubling letter by Sharqawi Al Hajj, a Yemeni citizen detained at Guantanamo Bay. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
Looking Glass Factory, a company based in the Greenpoint neighborhood of Brooklyn, New York, revealed its latest consumer device: a slim, holographic picture frame that turns photos taken on iPhones into 3D displays. Looking Glass received $2.54 million of "technology development" funding from In-Q-Tel, the venture capital arm of the CIA, from April 2020 to March 2021 and a $50,000 Small Business Innovation Research award from the U.S. Air Force in November 2021 to "revolutionize 3D/virtual reality visualization." Across the various branches of the military and intelligence community, contract records show a rush to jump on holographic display technology, augmented reality, and virtual reality display systems as the latest trend. Critics argue that the technology isn't quite ready for prime time, and that the urgency to adopt it reflects the Pentagon's penchant for high-priced, high-tech contracts based on the latest fad in warfighting. Military interest in holographic imaging, in particular, has grown rapidly in recent years. Military planners in China and the U.S. have touted holographic technology to project images "to incite fear in soldiers on a battlefield." Other uses involve the creation of three-dimensional maps of villages of specific buildings and to analyze blast forensics. Palmer Luckey, who founded the technology startup Anduril Industries ... has received secretive Air Force contracts to develop next-generation artificial intelligence capabilities under the so-called Project Maven initiative.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
While President Biden signed an executive order last fall to declassify 9/11 evidence, the families of some 9/11 victims say they had to go through the British courts to get records and videos seized two decades ago from an alleged Saudi government operative that have never been public until now. Buried inside the trove is a home video from 2000. The event was described in 9/11 Commission records as a party at the San Diego apartment of Nawaf al-Hazmi and Khalid al-Mihdhar, the first two hijackers to arrive in the U.S. in January 2000. A handful of frames captured Mihdhar in the kitchen. Along with Hazmi, their team would later commandeer Flight 77 that slammed into the Pentagon. The party's host, Saudi national Omar al-Bayoumi, was arrested by British police less than two weeks after the attack. British police seized the videos and documents from Bayoumi. A newly declassified and heavily redacted FBI memo from 2017 stated, "In the late 1990s and up to September 11, 2001, Omar al-Bayoumi was paid a monthly stipend as a cooptee of the Saudi General Intelligence Presidency (GIP) via then Ambassador Prince Bandar bin Sultan." The memo continued, "Allegations of al-Bayoumi's involvement with Saudi Intelligence were not confirmed at the time of the 9/11 Commission Report. The above information confirms these allegations." Another recently declassified FBI memo ... said, "There is a 50/50 chance Omar al-Bayoumi had advanced knowledge the 9/11 terrorist attacks were to occur."
Note: For more along these lines, see concise summaries of deeply revealing news articles on 9/11 from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
The Supreme Court ruled Thursday that the federal government can shield former government contractors from testifying about the torture of a post-9/11 detainee. The decision likely will make it harder for victims to expose secret government misconduct in the future. Abu Zubaydah was the first prisoner held by the CIA to undergo what, at the time, was euphemistically called "enhanced interrogation." During one 20-day period, he was waterboarded 83 times, 24 hours a day. During that period, the suspected terrorist was also slammed against walls, put in a coffin-like box for hours at a time to simulate live burial, and subjected to something the government called "rectal rehydration." In the end, the two CIA contractors who supervised Zubaydah's interrogation concluded that they had the wrong man. But when lawyers for Zubaydah subpoenaed them, the U.S. government blocked the move by invoking the so-called "state secrets" privilege. In this case, both the Trump and Biden administrations argued that even though the information about the torture program is widely known, confirming the existence of CIA black sites in Poland would jeopardize the U.S. government's relationship with foreign intelligence services. Josh Colangelo-Bryan, a lawyer who represents other Guantanamo Bay detainees, was ... critical. "There has been no accountability for the U.S. program that subjected people to torture," he said in a statement.
Note: Read more about the CIA's torture program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Russia invaded Ukraine. For years now the Central Intelligence Agency has been preparing for such a moment, not only with prescient intelligence gathering and analysis but also by preparing Ukrainians to mount an insurgency against a Russian occupation. The agency has been training Ukrainian special forces and intelligence officers at a secret facility in the U.S. since 2015. Because the CIA training program is now publicly known, Russia can persuasively claim that Ukrainian insurgents are CIA proxies – a useful statement as propaganda to pro-Russian separatists in eastern Ukraine and as a justification for any harsh measures it takes against Ukrainian civilians. The CIA needs to be honest with the Ukrainians – and itself – about the real intent. In the first U.S.-backed insurgency, according to top secret documents later declassified, American officials intended to use the Ukrainians as a proxy force to bleed the Soviet Union. This time, is the primary goal of the paramilitary program to help Ukrainians liberate their country or to weaken Russia over the course of a long insurgency that will undoubtedly cost as many Ukrainian lives as Russian lives, if not more? Even if a Ukrainian insurgency bleeds Russia over years, the conflict could cause instability to spread across Central and Eastern Europe. This is a pattern in the history of U.S. paramilitary operations – from the Cold War to Afghanistan and Iraq today.
Note: For an alternative view of Ukraine's Zelensky, don't miss this excellent presentation by intrepid reporter Ben Swann (skip to 1:45 to avoid advertisement). For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and war from reliable major media sources.
The Central Intelligence Agency has for years been collecting in bulk, without a warrant, some kind of data that can affect Americans' privacy. At the same time, [the C.I.A.] declared that a report about the same topic, which had prompted the letter, must remain fully classified. That report, called "Deep Dive II," was part of a set of studies by a watchdog board scrutinizing intelligence community operations under Executive Order 12333. In March 2021, the Senate Intelligence Committee received a copy of the report. Two Democrats on the panel, Senators Ron Wyden of Oregon and Martin Heinrich of New Mexico, urged Avril D. Haines, the director of national intelligence, and William J. Burns, the C.I.A. director, to declassify the activity. The senators suggested that its hidden existence cut against Americans' understanding that various pieces of legislation enacted in recent years "limit and, in some cases, prohibit the warrantless collection of Americans' records." In 2015, Congress banned bulk collection of telecommunications metadata under the Patriot Act and limited other types of bulk collection by the F.B.I. under laws governing domestic activities like the Foreign Intelligence Surveillance Act, or FISA. Yet "the C.I.A. has secretly conducted its own bulk program" under Executive Order 12333, the senators wrote. "It has done so entirely outside the statutory framework that Congress and the public believe govern this collection, and without any of the judicial, congressional or even executive branch oversight."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
NSO Group [is] the world's most notorious maker of spyware. The F.B.I. had bought a version of Pegasus, NSO's premier spying tool. It could ... crack the encrypted communications of any iPhone or Android smartphone. Since NSO had introduced Pegasus to the global market in 2011, it had helped Mexican authorities capture JoaquĂn Guzmán Loera, the drug lord known as El Chapo. European investigators have quietly used Pegasus to thwart terrorist plots, fight organized crime and, in one case, take down a global child-abuse ring. Mexico deployed the software not just against gangsters but also against journalists and political dissidents. The United Arab Emirates used the software to hack the phone of a civil rights activist. Saudi Arabia used it against women's rights activists. During a presentation to officials in Washington, the company demonstrated a new system, called Phantom, that could hack any number in the United States that the F.B.I. decided to target. A slick brochure ... says that Phantom allows American law enforcement and spy agencies to get intelligence "by extracting and monitoring crucial data from mobile devices." It is an "independent solution" that requires no cooperation from AT&T, Verizon, Apple or Google. The system, it says, will "turn your target's smartphone into an intelligence gold mine." The Phantom presentation triggered a discussion among government lawyers. Last summer ... the F.B.I. finally decided not to deploy the NSO weapons.
Note: Read more about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The Associated Press sought answers Monday from the Department of Homeland Security on its use of sensitive government databases for tracking international terrorists to investigate as many as 20 American journalists, including an acclaimed AP reporter. In a letter to DHS Secretary Alejandro Mayorkas, AP Executive Editor Julie Pace urged the agency to explain why the name of Pulitzer Prize-winning investigative reporter Martha Mendoza was run through the databases and identified as a potential confidential informant during the Trump administration, as detailed in a report by Homeland Security's inspector general. The DHS investigation of U.S. journalists, as well as congressional staff and perhaps members of Congress ... represents the latest apparent example of an agency created in the wake of the 9/11 attacks using its vast capabilities to target American citizens. The AP's letter ... called for "assurances that these improper practices and apparent abuse of power will not continue going forward." That would be in line with recent order from Attorney General Merrick Garland prohibiting the seizing of records of journalists in leak investigations. That followed an outcry over revelations that the Justice Department under former President Donald Trump had obtained records belonging to journalists, as well as Democratic members of Congress. During the Obama administration, federal investigators secretly seized phone records for some reporters and editors at the AP.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable major media sources.
In the torturous history of the U.S. government's black sites, the F.B.I. has long been portrayed as acting with a strong moral compass. Its agents, disgusted with the violence they saw at a secret C.I.A. prison in Thailand, walked out, enabling the bureau to later deploy "clean teams" untainted by torture to interrogate the five men accused of conspiring in the attacks of Sept. 11, 2001. But new information that emerged this week in the Sept. 11 case undermines that F.B.I. narrative. The two intelligence agencies secretly arranged for nine F.B.I. agents to temporarily become C.I.A. operatives in the overseas prison network where the spy agency used torture to interrogate its prisoners. The once-secret program came to light in pretrial proceedings in the death penalty case. The proceedings are currently examining whether the accused mastermind of the Sept. 11 plot, Khalid Shaikh Mohammed, and his four co-defendants voluntarily confessed after years in the black site network, where detainees were waterboarded, beaten, deprived of sleep and isolated to train them to comply with their captors' wishes. At issue is whether the military judge will exclude from the eventual trial the testimony of F.B.I. agents who questioned the defendants. Earlier testimony showed the F.B.I. participating remotely in the C.I.A. interrogations through requests sent by cables to the black sites seeking certain information from specific detainees, including Mr. Mohammed after he was waterboarded 183 times to force him to talk.
Note: Read more about the CIA torture program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Almost 40 years after his death following a bar brawl in Key Biscayne, Ricardo Morales, known as "Monkey" – contract CIA worker, anti-Castro militant, counter-intelligence chief for Venezuela, FBI informant and drug dealer – returned to the spotlight Thursday morning when one of his sons made a startling claim on Spanish-language radio: Morales, a sniper instructor in the early 1960s in secret camps where Cuban exiles and others trained to invade Cuba, realized in the hours after President John F. Kennedy was assassinated in Dallas in 1963 that the accused killer, Lee Harvey Oswald, had been one of his sniper trainees. Morales also told his two sons that two days before the assassination, his CIA handler told him and his "clean-up" team to go to Dallas for a mission. But after the tragic events, they were ordered to go back to Miami without learning what the mission was about. The claims ... add to one of the long-held theories about the JFK assassination – that Cuban exiles working for the CIA had been involved. But the claims also point the finger at the CIA, which some observers believe could help explain why President Joe Biden backed off last week on declassifying the remaining documents in the case. Morales Jr. said his father told them he did not know of the plans to assassinate Kennedy. "He knew Kennedy was coming to Dallas, so he imagines something is going to happen, but he doesn't know the plan," he said. "In these kinds of conspiracies ... nobody knows what the other is doing."
Note: For more along these lines, see concise summaries of deeply revealing news articles on the JFK assassination from reliable major media sources.
In 2017, the CIA had plotted to kidnap or assassinate Julian Assange, the founder of WikiLeaks, who had taken refuge five years earlier in the Ecuador embassy in London. A senior US counter-intelligence official said that plans for the forcible rendition of Assange to the US were discussed "at the highest levels" of the Trump administration. The informant was one of more than 30 US officials – eight of whom confirmed details of the abduction proposal – quoted in a 7,500-word investigation by Yahoo News into the CIA campaign against Assange. The plan was to "break into the embassy, drag [Assange] out and bring him to where we want", recalled a former intelligence official. Another informant said that he was briefed about a meeting in the spring of 2017 at which President Trump had asked if the CIA could assassinate Assange and provide "options" about how this could be done. The Trump-appointed head of the CIA, Mike Pompeo, said publicly that he would target Assange and WikiLeaks as the equivalent of "a hostile intelligence service". Top intelligence officials intended to decide themselves who is and who is not a journalist, and lobbied the White House to redefine other high-profile journalists as "information brokers", who were to be targeted as if they were agents of a foreign power. In 2013 ... a team of 120 counter-intelligence officers ... failed to find a single person in Iraq and Afghanistan who had died because of the disclosures by WikiLeaks.
Note: CIA interest in assassinating Assange coincided with Wikileaks' publication of leaked CIA hacking tools. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Senior CIA officials during the Trump administration discussed abducting and even assassinating WikiLeaks founder, Julian Assange. The discussions on kidnapping or killing Assange took place in 2017, Yahoo News reported, when the fugitive Australian activist was entering his fifth year sheltering in the Ecuadorian embassy. The then CIA director, Mike Pompeo, and his top officials were furious about WikiLeaks' publication of "Vault 7", a set of CIA hacking tools, a breach which the agency deemed to be the biggest data loss in its history. Some senior officials inside the CIA and the Trump administration went as far as to request "sketches" or "options" for killing Assange. "There seemed to be no boundaries," a former senior counterterrorist official was quoted as saying. The kidnapping or murder of a civilian accused of publishing leaked documents, with no connection to terrorism, would have triggered global outrage. Pompeo raised eyebrows in 2017 by referring to WikiLeaks as a "non-state hostile intelligence service". It was a significant designation, as it implied a green light for a more aggressive approach to the pro-transparency group by CIA operatives, who could treat it as an enemy espionage organization. Barry Pollack, Assange's US lawyer ... told Yahoo News: "As an American citizen, I find it absolutely outrageous that our government would be contemplating kidnapping or assassinating somebody without any judicial process simply because he had published truthful information."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
On April 17, 2018, Terry Albury appeared in a federal court in Minneapolis, where he pleaded guilty to charges of leaking classified information to the press. The allegations – that Albury downloaded, printed and photographed internal F.B.I. documents on his office computer, sending some of them electronically to a journalist and saving others on external devices found in his home – resulted from a 17-month-long internal investigation by the F.B.I., prompted by two Freedom of Information Act requests by a news organization ... in March 2016. Nine months after these FOIA requests were made, a trove of internal F.B.I. documents shedding new light on the vast and largely unrestricted power of the post-9/11 F.B.I. was posted on the investigative-journalism site The Intercept. The cache included hundreds of pages of unredacted policy manuals, including the F.B.I.'s byzantine rule book, the Domestic Investigations and Operations Guide, exposing the hidden loopholes that allowed agents to violate the bureau's own rules against racial and religious profiling and domestic spying as they pursued the domestic war on terror. In October 2018, he was sentenced to four years in prison. Albury says he felt a moral imperative to make his disclosures, motivated by his belief that the bureau had been so fundamentally transformed by Sept. 11 that its own agents were compelled to commit civil and human rights violations.
Note: Listen to Albury talk about his experiences in this podcast. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
Right up until his death in 2018, Ferik Duka dreamed of seeing his three eldest sons, Shain, Dritan, and Eljvir, freed from prison. In 2009, the three brothers were sentenced to life for their role in an alleged plot to attack the Fort Dix military base in New Jersey. The convictions followed a terrorism sting ... that ran for over a year and involved multiple government informants. The investigation into the "Fort Dix Five," as the case became known, was marred by outrageous law enforcement and legal abuses, documented in a 2015 investigation and documentary by The Intercept. Their case was just one of many in which zealous FBI officials and prosecutors, operating in the heated atmosphere of post-9/11 America, branded individuals who posed no appreciable threat to the country as enemies of the state. Many of them, like the Duka brothers, were given long prison sentences or otherwise had their lives ruined after being convicted on material support for terrorism charges. "There hasn't been any reckoning with the legacy of this era," said Ramzi Kassem, a ... Law professor. Kassem said, "It is alarming when you look across these cases and see an overrepresentation of suspects who were mentally deficient, marginalized, or otherwise vulnerable. Informants proposed so-called terrorism plots, funded them, provided means of execution, coaching, and even coaxed the targets of stings over prolonged periods of time in order to enable prosecutors to paint their conduct as criminally punishable."
Note: Read more about terrorism plots hatched by the FBI. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism from reliable major media sources.
The biggest Al Qaeda plot the FBI claimed to have foiled in the years following the 9/11 attacks involved no weapons, no plot, and no Al Qaeda. Instead, the vague, implausible threat by a group of construction workers in Florida to blow up U.S. buildings, including Chicago's Sears Tower, was mostly the making of the FBI, whose undercover operatives sought out the men, promised them money, and coached them over months to implicate themselves in a conspiracy to commit violent acts they never actually intended or had the means to carry out. The "Liberty City Seven" case – known by its connection to the poor, violence-ridden Miami neighborhood where the men involved lived – was the most high-profile FBI investigation of a supposed terrorist cell after the attacks in New York City and Washington, D.C. The ordeal of the seven Black men, most of them Haitian American, who were manipulated by two paid FBI informants into pledging allegiance to Al Qaeda is recounted in a new Frontline documentary, "In the Shadow of 9/11," by British director Dan Reed. The case set the stage for hundreds of FBI sting operations in the following years, as the bureau continued to frame individuals who were often poor, credulous, and had dubious ability to independently plan any attacks. Rather than abandoning stings as pointless and harmful ... the FBI doubled down on them, in some cases even providing weapons to the individuals they set up.
Note: Read more about how the FBI uses stings to manufacture terrorism cases. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism from reliable major media sources.
Vice President Kamala Harris' trip to Hanoi, Vietnam, was delayed by a few hours after her office was made aware of a "recent possible anomalous health incident" among U.S. officials in Hanoi. "Anomalous health incident" is how the United States government refers to the mysterious "Havana syndrome." First reported in 2016 by United States officials in Cuba, Havana syndrome has afflicted more than 130 U.S. officials over the past five years stationed in several countries overseas. Victims of the syndrome typically report strange experiences, like feelings of pressure or vibration and a screeching sound, and debilitating symptoms, including headaches, nausea, cognitive deficits, and trouble with seeing, hearing, or balancing. The vice president's office said that after "careful consideration," her team opted to continue with her Vietnam trip. A couple hours after the announcement, NBC News reported that a medical evacuation was called for two U.S. officials in Hanoi. The NBC report noted that "strange sounds" were involved in the incidents, and that Vietnam has seen past reports of possible Havana syndrome cases. NBC News reported in June that some U.S. officials believe that unknown adversaries used "devices intended to extract information from cellphones and other personal devices" that emitted electromagnetic waves powerful enough to cause debilitating symptoms. After realizing such devices had that effect, they then "weaponized the tactic to intentionally cause physical harm."
Note: Read more about these mysterious attacks on spies and diplomats. Read very little-known, yet astounding information on sophisticated technologies which can project music and clear voices into people's heads in these concise summaries of deeply revealing news articles on non-lethal weapons from reliable major media sources.
Spies for centuries have trained their sights on those who shape destinies of nations: presidents, prime ministers, kings. And in the 21st century, most of them carry smartphones. Such is the underlying logic for some of the most tantalizing discoveries for an international investigation that in recent months scrutinized a list of more than 50,000 phone numbers that included – according to forensic analyses of dozens of iPhones – at least some people targeted by Pegasus spyware licensed to governments worldwide. The list contained the numbers of politicians and government officials by the hundreds. But what of heads of state and governments, arguably the most coveted of targets? Fourteen. Or more specifically: three presidents, 10 prime ministers and a king. Forensic testing that might have revealed infection by NSO's signature spyware, Pegasus, was not possible. Nor was it possible to determine whether any NSO client attempted to deliver Pegasus to the phones of these country leaders – much less whether any succeeded in turning these highly personal devices into pocket spies capable of tracking a national leader's nearly every movement, communication and personal relationship. According to NSO marketing materials and security researchers, Pegasus is designed to collect files, photos, call logs, location records, communications and other private data from smartphones, and can activate cameras and microphones as well for real-time surveillance at key moments.
Note: Read how this Pegasus spyware was used to target activists and journalists in Mexico. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
Human rights activists, journalists and lawyers across the world have been targeted by authoritarian governments using hacking software sold by the Israeli surveillance company NSO Group, according to an investigation into a massive data leak. The investigation by the Guardian and 16 other media organisations suggests widespread and continuing abuse of NSO's hacking spyware, Pegasus. Pegasus is a malware that infects iPhones and Android devices to enable operators of the tool to extract messages, photos and emails, record calls and secretly activate microphones. The leak contains a list of more than 50,000 phone numbers that, it is believed, have been identified as those of people of interest by clients of NSO since 2016. The numbers of more than 180 journalists are listed in the data, including reporters, editors and executives at the Financial Times, CNN, the New York Times, France 24, the Economist, Associated Press and Reuters. The phone number of a freelance Mexican reporter, Cecilio Pineda Birto, was found in the list, apparently of interest to a Mexican client in the weeks leading up to his murder, when his killers were able to locate him at a carwash. He was among at least 25 Mexican journalists apparently selected as candidates for surveillance. The broad array of numbers in the list belonging to people who seemingly have no connection to criminality suggests some NSO clients are breaching their contracts with the company, spying on pro-democracy activists and journalists.
Note: Read more about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Few pause to think that their phones can be transformed into surveillance devices, with someone thousands of miles away silently extracting their messages, photos and location, activating their microphone to record them in real time. Such are the capabilities of Pegasus, the spyware manufactured by NSO Group, the Israeli purveyor of weapons of mass surveillance. The Guardian will be revealing the identities of many innocent people who have been identified as candidates for possible surveillance by NSO clients in a massive leak of data. Without forensics on their devices, we cannot know whether governments successfully targeted these people. But the presence of their names on this list indicates the lengths to which governments may go to spy on critics, rivals and opponents. Journalists across the world were selected as potential targets by these clients prior to a possible hack using NSO surveillance tools. People whose phone numbers appear in the leak ... include lawyers, human rights defenders, religious figures, academics, businesspeople, diplomats, senior government officials and heads of state. One phone that has contained signs of Pegasus activity belonged to our esteemed Mexican colleague Carmen Aristegui, whose number was in the data leak and who was targeted following her exposÄ‚© of a corruption scandal involving her country's former president Enrique PeÄ‚±a Nieto. At least four of her journalist colleagues appear in the leak
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Less than six months into the Biden administration, more than 15 consultants from the firm WestExec Advisors have fanned out across the White House, its foreign policy apparatus, and its law enforcement institutions. Five, some of whom already have jobs with the administration, have been nominated for high-ranking posts, and four others served on the Biden-Harris transition team. Even by Washington standards, it's a remarkable march through the revolving door, especially for a firm that only launched in 2017. The pipeline has produced a dominance of WestExec alums throughout the administration, installed in senior roles as influential as director of national intelligence and secretary of state. WestExec clients, meanwhile, have controversial interests in tech and defense that intersect with the policies their former consultants are now in a position to set and execute. The creeping monopolization of foreign policymaking by a single boutique consulting firm has gone largely unnoticed. The firm describes one of its chief selling points as its "unparalleled geopolitical risk analysis," now confirmed by the saturation of its employees in positions of power. WestExec has also succeeded in getting tech startups into defense contracts. Deputy Director of the CIA David S. Cohen was an early member of WestExec's "core team." But it's impossible to know who his clients were, because an exemption for the spy agencies' officials means that his disclosure is not publicly available.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
Mysterious episodes that caused brain injuries in spies, diplomats, soldiers and other U.S. personnel overseas starting five years ago now number more than 130 people, far more than previously known, according to current and former officials. The number of cases within the C.I.A., the State Department, the Defense Department and elsewhere spurred broad concern in the Biden administration. The initial publicly confirmed cases were concentrated in China and Cuba and numbered about 60, not including a group of injured C.I.A. officers whose total is not public. Since December, at least three C.I.A. officers have reported serious health effects from episodes overseas. One occurred within the past two weeks, and all have required the officers to undergo outpatient treatment at Walter Reed National Military Medical Center or other facilities. And in one case in 2019 that has not previously been reported, a military officer serving overseas pulled his vehicle into an intersection, then was overcome by nausea and headaches. His 2-year-old son, sitting in the back seat, began crying. After the officer pulled away from the intersection, his nausea stopped, and the child stopped crying. In a report released in December, the National Academy of Sciences said a microwave weapon probably caused the injuries. Some officials believe a microwave or directed-energy device is the most likely cause. The severity of the brain injuries has ranged widely. Some victims have chronic, potentially irreversible symptoms.
Note: Read more about these mysterious attacks on spies and diplomats. Read very little-known, yet astounding information on sophisticated technologies which can project music and clear voices into people's heads in these concise summaries of deeply revealing news articles on non-lethal weapons from reliable major media sources.
For a second year, the nation's surveillance court has pointed with concern to "widespread violations" by the F.B.I. of rules intended to protect Americans' privacy when analysts search emails gathered without a warrant. In a 67-page ruling ... James E. Boasberg, the presiding judge on the Foreign Intelligence Surveillance Court, recounted several episodes uncovered by an F.B.I. audit where the bureau's analysts improperly searched for Americans' information in emails that the National Security Agency collected without warrants. Still, Judge Boasberg said he was willing to issue a legally required certification for the National Security Agency's warrantless surveillance program to operate for another year. [The program] grew out of the once-secret Stellarwind project, which President George W. Bush started after the Sept. 11, 2001, attacks. In 2008, Congress legalized the practice. The surveillance is carried out by the National Security Agency, but three other entities – the C.I.A., the National Counterterrorism Center and the F.B.I. – also receive access to streams of "raw" messages. The F.B.I. receives only a small portion of the messages that the National Security Agency vacuums up: The bureau gets copies of intercepts to and from targets who are deemed relevant to a full and active F.B.I. national security investigation. In 2019, the most recent year for which data is public, the program had more than 200,000 targets.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
A former Gestapo general who sent tens of thousands of Jews to their deaths was protected from prosecution by US and West German intelligence after the Second World War. SS-General Franz Josef Huber served as head of the Gestapo in Vienna and much of Austria following the Nazi takeover. He worked closely with Adolf Eichmann, the architect of the Holocaust, and personally ordered the deportation of Austrian Jews to concentration camps. Yet while Eichmann was captured by Israel and sentenced to death ... Huber was released by US forces following the war and spent the rest of his life as a free man in his native Munich, where he was a minor employee at a local business. That was a cover arranged for him by West German intelligence. It now appears Huber was protected by the US because it believed he could be a useful asset against the Soviet Union. "Although we are by no means unmindful of the dangers involved in playing around with a Gestapo general, we also believe, on the basis of the information now in our possession, that Huber might be profitably used by this organization," a CIA memo from 1953 obtained by the New York Times reads. Declassified files obtained by German ARD television's Munich Report show that US and West German intelligence conspired to hide Huber's past and protect him from prosecution. In the US, the CIA, FBI and other intelligence agencies recruited more than 1,000 ex-Nazis as agents in the years following the war.
Note: Read about the Nazi scientists secretly brought to the US to work after WWII. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Deep in the Sahara, the C.I.A. is continuing to conduct secret drone flights from a small but steadily expanding air base, even as the Biden administration has temporarily limited drone strikes against suspected terrorists outside conventional war zones, such as Afghanistan. Soon after it set up the base in northern Niger three years ago, the C.I.A. was poised to launch drone strikes from the site. But there is no public evidence that the agency has carried out anything but surveillance missions so far. New satellite imagery shows that the air base in Dirkou, Niger, has grown significantly since The New York Times first reported the C.I.A. operations there in 2018, to include a much longer runway and increased security. The new imagery also shows for the first time what appears to be an MQ-9 Reaper drone taxiing to or from a clamshell hangar. Under a directive that Mr. Biden's national security adviser, Jake Sullivan, quietly imposed on Jan. 20, Inauguration Day, the military and the C.I.A. must now obtain White House permission to attack terrorism suspects in poorly governed places where there are scant or no American ground troops, such as Somalia, Yemen and Libya. Under the Trump administration, they had been allowed to decide for themselves whether circumstances on the ground met certain conditions and an attack was justified. A recent report by the International Crisis Group concluded that the military-first strategy of France and its allies, including the United States, has failed.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
It is widely regarded as the world's most potent spyware, capable of reliably cracking the encrypted communications of iPhone and Android smartphones. The software, Pegasus, made by an Israeli company, NSO Group, has been able to track terrorists and drug cartels. It has also been used against human rights activists, journalists and dissidents. Now, an investigation published Friday by The New York Times Magazine has found that Israel, which controls the export of the spyware ... has made Pegasus a key component of its national security strategy, using it to advance its interests around the world. The F.B.I. bought and tested NSO software for years with plans to use it for domestic surveillance until the agency finally decided last year not to deploy the tools. The F.B.I., in a deal never previously reported, bought the spyware in 2019. It also spent two years discussing whether to deploy a newer product, called Phantom, inside the United States. The discussions at the Justice Department and the F.B.I. continued until last summer. But Pegasus equipment is still in a New Jersey building used by the F.B.I. And the company also gave the agency a demonstration of Phantom, which could hack American phone numbers. A brochure ... says that Phantom allows American law enforcement and spy agencies to "turn your target's smartphone into an intelligence gold mine." In 2018 ... the C.I.A. bought Pegasus to help Djibouti, an American ally, fight terrorism, despite longstanding concerns about human rights abuses there.
Note: Read about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The leader of the far-right Proud Boys group was a "prolific" informer for federal and local law enforcement, reports say. Enrique Tarrio worked undercover for authorities after he was arrested in 2012, according to a 2014 federal court document obtained by Reuters. During a Miami court hearing a federal prosecutor, an FBI agent and Mr Tarrio's lawyer described his work for law enforcement and said that he had helped convict more than a dozen people in drugs, gambling and human smuggling cases. He has become an increasingly high-profile figure as his violent group gained an elevated profile during the Trump administration. The ex-president infamously told the group to "stand back and stand by" when asked to denounce them during a presidential debate last September. They have been involved in a string of high-profile clashes in Washington DC, including the 6 January pro-Trump Capitol riot. [Mr Tarrio] was arrested in Washington DC in January two days before the riot and charged with possession of two high-capacity rifle magazines, and setting fire to a Black Lives Matter banner during a December pro-Trump demonstration in the city. Mr Tarrio was ordered to leave the city and has a June court date. During the 2014 court case Reuters says that Mr Tarrio's lawyer and prosecutors asked a judge to reduce his prison sentence after he and two defendants pleaded guilty in a fraud case related to stolen diabetes test kits. The prosecutor told the judge that Mr Tarrio had provided information that resulted in the prosecution of 13 people.
Note: For more along these lines, see concise summaries of deeply revealing news articles from reliable major media sources.
I am guilty of violating the Espionage Act, Title 18, U.S. Code Sections 793 and 798. If charged and convicted, I could spend the rest of my life in prison. This is not a hypothetical. Right now, the United States government is prosecuting a publisher under the Espionage Act. The case could set a precedent that would put me and countless other journalists in danger. I confess that I – alongside journalists at The Guardian, The Washington Post and other news organizations – reported on and published highly classified documents from the National Security Agency provided by the whistle-blower Edward Snowden, revealing the government's global mass surveillance programs. This reporting was widely recognized as a public service. Last year ... the Justice Department indicted Julian Assange, the founder and publisher of WikiLeaks, with 17 counts of violating the Espionage Act. None of the architects of the "war on terror," including the C.I.A.'s torture programs, have been brought to justice. Mr. Assange is facing a possible sentence of up to 175 years in prison. I spoke to one of the best First Amendment lawyers in the country. He read the Espionage Act out loud and said it had never been used against a journalist, but there is always a first time. It is impossible to overstate the dangerous precedent Mr. Assange's indictment under the Espionage Act and possible extradition sets: Every national security journalist who reports on classified information now faces possible Espionage Act charges.
Note: The above was written by award-winning journalist Laura Poitras. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
The most probable cause of a series of mysterious afflictions that sickened American spies and diplomats abroad in the past several years was radiofrequency energy, a type of radiation that includes microwaves, the National Academies of Sciences, Engineering, and Medicine has concluded in a report. The conclusion by a committee of 19 experts in medicine and other fields cited "directed, pulsed radiofrequency energy" as "the most plausible mechanism" to explain the illness, which came to be known as Havana syndrome. The report, which was commissioned by the State Department, provides the most definitive explanation yet of the illness that struck scores of government employees, first at the U.S. Embassy in Havana in 2016, and then in China and other countries. Many of the officers suffered from dizziness, fatigue, headaches, and loss of hearing, memory and balance, and some were forced into permanent retirement. C.I.A. officers visiting overseas stations also experienced similar symptoms. The new report reveals strong evidence that the incidents were the result of a malicious attack. It attributes the illnesses to "directed" and "pulsed" – rather than "continuous" – energy, implying that the victims' exposure was targeted and not the result of more common sources of microwave energy. It also said the committee found the immediate symptoms that patients reported ... were more consistent with a directed "attack" of radiofrequency energy.
Note: Many have belittled the possibility of directed energy beam weapons being used to cause harm and alter consciousness. We have been reporting on this for many years. For excellent, reliable information on this disturbing trend, see this essay and these news summaries.
Seven years after former National Security Agency contractor Edward Snowden blew the whistle on the mass surveillance of Americans' telephone records, an appeals court has found the program was unlawful. The U.S. Court of Appeals for the Ninth Circuit said the warrantless telephone dragnet that secretly collected millions of Americans' telephone records violated the Foreign Intelligence Surveillance Act and may well have been unconstitutional. Snowden, who fled to Russia in the aftermath of the 2013 disclosures and still faces U.S. espionage charges, said on Twitter that the ruling was a vindication of his decision to go public with evidence of the National Security Agency's domestic eavesdropping operation. "I never imagined that I would live to see our courts condemn the NSA's activities as unlawful and in the same ruling credit me for exposing them," Snowden said. Evidence that the NSA was secretly building a vast database of U.S. telephone records ... was the first and arguably the most explosive of the Snowden revelations published by the Guardian newspaper in 2013. Up until that moment, top intelligence officials publicly insisted the NSA never knowingly collected information on Americans at all. After the program's exposure, U.S. officials fell back on the argument that the spying had played a crucial role in fighting domestic extremism. But the Ninth Circuit ruled Wednesday that those claims were "inconsistent with the contents of the classified record."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The Office of the Director of National Intelligence has informed the House and Senate Select Committees on Intelligence that it'll no longer be briefing in-person on election security issues, according to letters obtained by CNN. Instead, ODNI will primarily provide written updates to the congressional panels, a senior administration official said. The abrupt announcement is a change that runs counter to the pledge of transparency and regular briefings on election threats by the intelligence community. It also comes after the top intelligence official on election security issued a statement earlier this month saying China, Russia and Iran are seeking to interfere in the 2020 US election. US officials charged with protecting the 2020 election also said last week that they have "no information or intelligence" foreign countries, including Russia, are attempting to undermine any part of the mail-in voting process, contradicting President Donald Trump, who has repeatedly pushed false claims that foreign adversaries are targeting mail ballots as part of a "rigged" presidential race. Senate Intelligence Vice Chairman Mark Warner called the decision to stop in-person briefings an "unprecedented attempt to politicize an issue - protecting our democracy from foreign intervention - that should be non-partisan. Congress and the American public need to know more information about the election interference threat — not less," the Virginia Democrat said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on elections corruption from reliable major media sources.
Concerns about what is now known to be the novel coronavirus pandemic were detailed in a November intelligence report by the military's National Center for Medical Intelligence (NCMI), according to two officials familiar with the document’s contents. The report ... raised alarms because an out-of-control disease would pose a serious threat to U.S. forces in Asia - forces that depend on the NCMI’s work. And it paints a picture of an American government that could have ramped up mitigation and containment efforts far earlier. "Analysts concluded it could be a cataclysmic event," one of the sources said of the NCMI’s report. "It was then briefed multiple times to" the Defense Intelligence Agency, the Pentagon’s Joint Staff and the White House. From that warning in November, the sources described repeated briefings through December for policy-makers and decision-makers across the federal government as well as the National Security Council at the White House. All of that culminated with a detailed explanation of the problem that appeared in the President’s Daily Brief of intelligence matters in early January. The NCMI report was made available widely to people authorized to access intelligence community alerts. Other intelligence community bulletins began circulating through confidential channels across the government around Thanksgiving. Those analyses said China’s leadership knew the epidemic was out of control even as it kept such crucial information from foreign governments and public health agencies.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the coronavirus pandemic from reliable major media sources.
The FBI raised eyebrows on Tuesday when the agency announced that it would not be accepting electronic Freedom of Information Act (FOIA) requests due to the ongoing coronavirus outbreak. As the spread of the virus continues to disrupt normal functions of society like schools, restaurants and sporting events, not many could have predicted that the electronic requests for FBI documents would be affected. "Due to the emerging COVID-19 situation, the FBI is not accepting electronic Freedom of Information/Privacy Act requests or sending out electronic responses through the eFOIPA portal at this time. You may still submit a FOIPA request via standard mail. We apologize for this inconvenience and appreciate your understanding," a red-bolded disclaimer stated on the FBI website. The sudden halt of electronic FOIA requests sparked puzzled reactions on social media. "This is crazy but, then again, FBI and FOIA is a disastrous combo," BuzzFeed senior investigative Jason Leopold tweeted. "The FBI is responding to coronavirus by using it as an opportunity to kill off journalists who really want transparency." They would prefer to receive only those requests laden with all of our germs and whatnot?" Reuters reporter Brad Heath asked.
Note: You can verify this information on the FBI website at this link. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the coronavirus pandemic from reliable major media sources.
Erik Prince, the security contractor with close ties to the Trump administration, has in recent years helped recruit former American and British spies for secretive intelligence-gathering operations that included infiltrating Democratic congressional campaigns, labor organizations and other groups considered hostile to the Trump agenda. One of the former spies, an ex-MI6 officer named Richard Seddon, helped run a 2017 operation to copy files and record conversations in a Michigan office of ... one of the largest teachers’ unions in the nation. The next year, the same undercover operative infiltrated the congressional campaign of Abigail Spanberger, then a former C.I.A. officer who went on to win an important House seat in Virginia as a Democrat. Both operations were run by Project Veritas, a conservative group that has gained attention using hidden cameras and microphones for sting operations. Mr. Prince, the former head of Blackwater Worldwide ... appears to have become interested in using former spies to train Project Veritas operatives in espionage tactics sometime during the 2016 presidential campaign. In 2017, he met with White House and Pentagon officials to pitch a plan to privatize the Afghan war. Mr. Prince invited Project Veritas operatives ... to his family’s Wyoming ranch for training in 2017. [They] shared social media photos of taking target practice with guns at the ranch, including one post ... saying that with the training, Project Veritas will be “the next great intelligence agency.”
Note: Mr. Prince's Blackwater operation got caught systematically defrauding the government. Then Blackwater changed its name to Academi and made over $300 million off the Afghan drug trade. For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption from reliable major media sources.
In early days of America's space program, two men met over a bottle of Jack Daniel's. It was roughly 1959, when the future of America's young space program was clouded by technological disagreements. On one side of the bottle was Wernher von Braun, the engineering genius who had developed the world's first ballistic missile for Adolf Hitler during World War II. He had once been a member of Hitler's Schutzstaffel, or SS, but now ran NASA's Marshall Space Flight Center. On the other side was Abraham Silverstein, who had grown up in a poor Jewish family in Indiana. He was NASA's space flight chief. One former Nazi, one American Jew. Little more than a decade separated them from the Holocaust. Looming before two of America's top rocket engineers were many critical decisions, including what kind of fuel would be needed to blast off astronauts to the moon. The collaboration between Von Braun and Silverstein was not unique. During the Apollo program, which landed Americans on the moon six times between 1969 and 1972, NASA was filled with both Jewish scientists and a large group of Germans who had worked for Hitler before and during World War II. In recent years, a deeper analysis has focused on America's decision to bring 125 German rocket scientists and engineers to the U.S. after World War II under a secret program approved by President Truman and code-named Operation Paperclip. Much of the history of the underground factory was held secret from the American public until the 1970s.
Note: Learn more about Operation Paperclip which secretly brought hundreds of Nazi scientists to the U.S. And more in a New York Times article about the Nazis given safe haven in the US. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
Donald Trump’s administration is targeting Julian Assange as “an enemy of the America who must be brought down” and his very life could be at risk if he is sent to face trial in the US, the first day of the WikiLeaks founder’s extradition hearing has been told. Lawyers for Assange intend to call as a witness a former employee of a Spanish security company who says surveillance was carried out for the US on Assange while he was at Ecuador’s London embassy and that conversations had turned to potentially kidnapping or poisoning him. Assange, 48, is wanted in the US to face 18 charges of attempted hacking and breaches of the Espionage Act. They relate to the publication a decade ago of hundreds of thousands of diplomatic cables and files covering areas including US activities in Afghanistan and Iraq. The Australian, who could face a 175-year prison sentence if found guilty, is accused of working with the former US army intelligence analyst Chelsea Manning to leak classified documents. Key parts of the evidence related to the claim, which emerged last week, that a then US Republican congressman offered Assange a pardon if he denied Russian involvement in the leaking of US Democratic party emails during the 2016 US presidential contest. The court was told that Dana Rohrabacher, who claims to have made the proposal on his own initiative, had presented it as a “win-win” scenario that would allow Assange to leave the embassy and get on with his life.
Note: Read more about the strange prosecution of Assange. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
James “Whitey” Bulger terrorized Boston from the 1970s into the 1990s with a campaign of murder, extortion and drug trafficking. In 2013, Janet Uhlar was one of 12 jurors who found Bulger guilty in a massive racketeering case, including involvement in 11 murders. But now Uhlar says she regrets voting to convict Bulger on any of the murder charges. Her regret stems from a cache of more than 70 letters Bulger wrote to her from prison, some of which describe his unwitting participation in a secret CIA experiment with LSD. The agency dosed Bulger with the powerful hallucinogen more than 50 times when he was serving his first stretch in prison, in Atlanta. Uhlar has spoken publicly about her regret before but says her belief that the gangster was wrongly convicted on the murder charges was reinforced after reading a new book by Brown University professor Stephen Kinzer: “Poisoner in Chief: Sidney Gottlieb and the CIA Search for Mind Control.” Gottlieb’s secret program, known at MK-ULTRA, enlisted doctors and other subcontractors to administer LSD in large doses to prisoners, addicts and others unlikely to complain. Uhlar reviewed the 1977 hearings by the U.S. Senate Committee on Intelligence, which was looking into MK-ULTRA, and found testimony where CIA director Stansfield Turner acknowledged evidence showing that the agency had been searching for a drug that could prepare someone for “debilitating an individual or even killing another person.”
Note: Read more about the CIA's MK-ULTRA program. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources.
For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret. The company, Crypto AG ... made millions of dollars selling equipment to more than 120 countries well into the 21st century. Its clients included Iran, military juntas in Latin America, nuclear rivals India and Pakistan, and even the Vatican. But what none of its customers ever knew was that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence. These spy agencies rigged the company’s devices so they could easily break the codes that countries used to send encrypted messages. The decades-long arrangement, among the most closely guarded secrets of the Cold War, is laid bare in a classified, comprehensive CIA history of the operation obtained by The Washington Post and ZDF, a German public broadcaster, in a joint reporting project. The company always made at least two versions of its products — secure models that would be sold to friendly governments, and rigged systems for the rest of the world. Throughout the 1980s, the list of Crypto’s leading clients read like a catalogue of global trouble spots. In 1981, Saudi Arabia was Crypto’s biggest customer, followed by Iran, Italy, Indonesia, Iraq, Libya, Jordan and South Korea. To protect its market position, Crypto and its secret owners engaged in subtle smear campaigns against rival companies ... and plied government officials with bribes.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
As white supremacists have carried out a growing number of deadly attacks in recent years, the FBI has come under mounting criticism for its failure to address the threat posed by far-right extremist ideologies, whose adherents account for most of the politically motivated violence in the U.S. At the same time, the bureau has also been heavily criticized for devoting large resources to surveilling political dissent by groups and individuals, often of color, who pose no threat but are critical of the government because they oppose official immigration policies or demand police accountability. The FBI’s preoccupation with policing nonviolent critical ideologies while neglecting to investigate ideologies tied to real, and increasing, violence was perhaps best captured in an infamous 2017 threat assessment report warning law enforcement agencies of the supposed rise of a “black identity extremist” movement targeting police. The black identity extremism category was a product of the FBI’s imagination. Last year ... bureau officials told legislators that they were doing away with a set of earlier domestic terrorism categories in favor of four larger ones. The FBI’s fictional black identity extremists would now be lumped together with white supremacists under a new “racially motivated violent extremism” category. That false equivalence made it virtually impossible for the public to know whether the FBI was devoting resources to investigating real threats of racist violence or social and racial justice groups critical of government.
Note: Read a revealing essay on COINTELPRO, the FBI program that targeted civil rights and anti-war activists from 1965-1975. For more along these lines, see concise summaries of deeply revealing news articles on civil liberties from reliable major media sources.
Four years ago, for an embarrassingly modest price, Russia pulled off one of the more audacious acts of election interference in modern history. The Internet Research Agency, the team of Kremlin-backed online propagandists, spent $15 million to $20 million and wreaked havoc on the psyche of the American voter. Russian intelligence agents carried out the digital version of Watergate, infiltrating the Democratic Party and the Clinton campaign, stealing tens of thousands of emails, and weaponizing them in the days and weeks before the election. Russian-based hackers tested election websites in all 50 states for weak spots. “The Russians were testing whether our windows were open, rattling our doors to see whether they were locked, and found the windows and doors wide open,” says Sen. Mark Warner (D-Va.), the top Democrat on the Intelligence Committee. The Russians ... recently hacked the Ukrainian natural-gas company at the center of the Trump impeachment scandal to potentially find damaging material about the Biden family. Other foreign nations, including Iran, North Korea, Saudi Arabia, and China, are getting in on the act. They’ll be joined, analysts say, by domestic actors — American consultants and candidates and click merchants borrowing and adapting Russia’s tactics to influence an election or make a quick buck. “We’re still in a situation going into 2020 where there are significant gaps left in the security of election infrastructure,” says J. Alex Halderman ... who studies voting equipment.
Note: The private companies that supply elections software are very vulnerable to hacking. For more along these lines, see concise summaries of deeply revealing news articles on elections corruption from reliable major media sources.
An explosive leak of tens of thousands of documents from the defunct data firm Cambridge Analytica is set to expose the inner workings of the company that collapsed after the Observer revealed it had misappropriated 87 million Facebook profiles. More than 100,000 documents relating to work in 68 countries that will lay bare the global infrastructure of an operation used to manipulate voters on “an industrial scale” are set to be released over the next months. The documents were revealed to have come from Brittany Kaiser, an ex-Cambridge Analytica employee turned whistleblower, and to be the same ones subpoenaed by Robert Mueller’s investigation into Russian interference in the 2016 presidential election. Kaiser ... decided to go public after last month’s election in Britain. “It’s so abundantly clear our electoral systems are wide open to abuse,” she said. “I’m very fearful about what is going to happen in the US election later this year.” Kaiser said the Facebook data scandal was part of a much bigger global operation that worked with governments, intelligence agencies, commercial companies and political campaigns to manipulate and influence people. The unpublished documents contain material that suggests the firm was working for a political party in Ukraine in 2017 even while under investigation as part of Mueller’s inquiry and emails that Kaiser says describe how the firm helped develop a “sophisticated infrastructure of shell companies that were designed to funnel dark money into politics”.
Note: For more along these lines, see concise summaries of deeply revealing news articles on elections corruption from reliable major media sources.
One shows the prisoner nude and strapped to a crude gurney, his entire body clenched as he is waterboarded by an unseen interrogator. Another shows him with his wrists cuffed to bars so high above his head he is forced on to his tiptoes. They are sketches drawn in captivity by the Guantánamo Bay prisoner known as Abu Zubaydah, self-portraits of the torture he was subjected to during the four years he was held in secret prisons by the C.I.A.. In each illustration, Mr. Zubaydah ... portrays the particular techniques as he says they were used on him at a C.I.A. black site in Thailand in August 2002. They demonstrate how, more than a decade after the Obama administration outlawed the program — and then went on to partly declassify a Senate study that found the C.I.A. lied about both its effectiveness and its brutality — the final chapter of the black sites has yet to be written. Mr. Zubaydah, 48, drew them this year at Guantánamo for inclusion in a 61-page report, “How America Tortures,” by his lawyer, Mark P. Denbeaux, a professor at the Seton Hall University School of Law in Newark, and some of Mr. Denbeaux’s students. The report uses firsthand accounts, internal Bush administration memos, prisoners’ memories and the 2014 Senate Intelligence Committee report to analyze the interrogation program. The program was initially set up for Mr. Zubaydah, who was mistakenly believed to be a top Qaeda lieutenant. He has never been charged with a crime.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Prosecutors in Sweden have dropped an investigation into a rape allegation made against Wikileaks co-founder Julian Assange in 2010. Assange, who denies the accusation, has avoided extradition to Sweden for seven years after seeking refuge at the Ecuadorean embassy in London in 2012. The 48-year-old Australian was evicted in April and sentenced to 50 weeks in jail for breaching his bail conditions. He is currently being held at Belmarsh prison in London. The Swedish investigation had been shelved in 2017 but was re-opened earlier this year. With the end of Julian Assange's legal troubles in Sweden, one long chapter in the saga is over. But another one, in the United States, has barely begun. The Wikileaks founder always argued that his fear of being extradited from Sweden to the US was why he had taken refuge in the Ecuadorean embassy in London. That political refuge ended unceremoniously in April, when he was dragged out by British police. Now Assange faces 18 criminal charges in the US, including conspiring to hack government computers and violating espionage laws. If convicted, he could face decades in jail. From behind bars in Belmarsh jail, Assange is trying to prepare for the case. The decision by Swedish prosecutors today means there'll now be no competing extradition request to the one from the US. In June, the then UK Home Secretary, Sajid Javid, formally approved an extradition request from the US.
Note: Read a 2012 article from the UK's Guardian titled "Don't lose sight of why the US is out to get Julian Assange." For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
As chief investigator for the Senate intelligence committee, Daniel Jones spent five years poring over internal CIA accounts of the agency’s “enhanced interrogation techniques” programme adopted in the “war on terror”, which Congress demanded to see after it emerged that agency officials had destroyed videotapes of the brutal questioning of terrorist suspects. The Amazon movie, The Report, tells the story of what Jones ... and his colleagues found out about the torture programme: the systematic use of waterboarding, sleep deprivation and “stress positions”, and the extraordinary fact that the CIA itself had conducted a review that showed none of it was working. The programme did not provide useful intelligence – and yet the CIA hid that conclusion. None of the officials responsible for the torture or the cover-up had been held accountable. Gina Haspel, who ran one of the CIA’s black sites and who wrote a cable calling for the destruction of the torture videotapes, is now director of the CIA. When Obama was elected, he called an end to the torture, but stopped short of confronting the intelligence community. In a famously oddly worded admission in 2014, Obama said: “We tortured some folks.” The 44th president went on to say: “It’s important for us not to feel too sanctimonious in retrospect about the tough job that those folks had. A lot of those folks were working hard under enormous pressure and are real patriots.” The line still infuriates Jones, who says the real patriots were the CIA whistleblowers.
Note: A former CIA counterterrorism officer who was imprisoned for blowing the whistle on the CIA torture referred to CIA director Gina Haspel's actions as "war crimes, crimes against humanity". For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
A voluminous Senate report documenting the C.I.A.’s use of torture in secret prisons — set for release days later — could lead to riots, attacks on American embassies and the killing of American hostages overseas, James R. Clapper Jr., the director of national intelligence, told members of the Senate Intelligence Committee during a conference call in December 2014, citing a classified assessment. This episode is omitted from a new film treatment of the labyrinthine saga involving the Senate report — making a rare case of real life sometimes being more dramatic than the Hollywood portrayal. But the film, “The Report” ... is the first effort at a popular recounting of the tumultuous events surrounding the congressional investigation into the C.I.A. program and the inquiry’s conclusions, which found that the agency’s brutal interrogation methods — sometimes including torture — produced little or no intelligence of value. The senators believed that the intelligence assessment Clapper was quoting flagrantly distorted what the Senate report had said, predicting dire consequences from the release of information that wasn’t even in the report. In their anger, they decided to push ahead and release the report. Only the 528-page executive summary of the 6,000-page volume has been made public. Yet it is the closest thing to date to a public accounting for the C.I.A. interrogation program, the first time in history the government authorized the use of methods the United States had long considered to be illegal torture.
Note: Read an article titled, "10 Craziest Things in the Senate Report on Torture". For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Ali Alzabarah was an engineer who rose through the ranks at Twitter to a job that gave him access to personal information and account data of the social media service’s millions of users. Ahmad Abouammo was a media partnerships manager at the company who could see the email addresses and phone numbers of Twitter accounts. On Wednesday, the Justice Department accused the two men of using their positions and their access to Twitter’s internal systems to aid Saudi Arabia by obtaining information on American citizens and Saudi dissidents who opposed the policies of the kingdom and its leaders. Mr. Alzabarah and Mr. Abouammo were charged with acting as agents of a foreign power inside the United States, in the first complaint of its kind involving Saudis in the country. The case raised questions about the security of American technology companies already under scrutiny for spreading disinformation and influencing public opinion, showing that these firms can be penetrated from the inside as well. It also underscored the broad effort that Crown Prince Mohammed bin Salman of Saudi Arabia and his close advisers have conducted to silence critics both inside the kingdom and abroad. Jamal Khashoggi, a columnist for The Washington Post who was critical of the way Saudi Arabia is run, was murdered last year by Saudi agents in Istanbul.
Note: Read more on Saudi Arabia's extreme efforts to silence its critics. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable major media sources.
Heavily armed men burst into the home in the middle of night, hustling four brothers into separate rooms. Afghan special forces then shot them in the head and heart. The operation, the CIA-trained Afghan unit said, targeted the Islamic State group's militants in a remote region of eastern Nangarhar Province. In reality, the raid took place in the province's capital of Jalalabad. The truth of their deaths was eventually revealed by local and international media and the country's intelligence chief, Masoom Stanikzai, was forced to resign. But that's not enough, says Human Rights Watch in a new report released Thursday documenting what it says are mounting atrocities by U.S.-backed Afghan special forces and rising civilian deaths by both American and Afghan forces. It calls for an investigation into whether the U.S. has committed war crimes in Afghanistan. The report says U.S.-led peace talks to end the 18-year-old war have omitted addressing the future of the Afghan special forces that work "as part of the covert operations of the Central Intelligence Agency." The report suggests either disbanding them or bringing them under the control of the Defense Ministry. "These troops include Afghan strike forces who have been responsible for extrajudicial executions and enforced disappearances, indiscriminate airstrikes, attacks on medical facilities, and other violations of international humanitarian law, or the laws of war," it says.
Note: For more along these lines, see concise summaries of deeply revealing news articles on war and intelligence agency corruption from reliable major media sources.
The FBI has come under intense criticism after a 2017 leak exposed that its counterterrorism division had invented a new, unfounded domestic terrorism category it called “black identity extremism.” A number of civil rights groups have filed public records requests to try to better understand who exactly the FBI is investigating under that designation. The latest batch of FBI documents ... reveals that between 2015 and 2018, the FBI dedicated considerable time and resources to opening a series of “assessments” into the activities of individuals and groups it mostly labeled “black separatist extremists.” This designation was eventually folded into the category of “black identity extremism.” Assessments differ from full-blown investigations - or “predicated investigations,” in the bureau’s lingo - because they do not need to be predicated on a factual basis. As a new report by the civil liberties group Defending Rights & Dissent notes, when choosing targets for an assessment, agents are allowed to use ethnicity, religion, or speech protected by the First Amendment as a factor, “as long as it is not the only one.” As the report notes, “Even though the standards for opening an assessment are extraordinarily low, the FBI is allowed to use extremely intrusive investigative techniques in performing them, including physical surveillance, use of informants, and pretextual interviews.” The bureau has in recent years shifted its target from those espousing “separatist” views to the much larger group of those protesting police violence.
Note: Read more about the FBI's use of "Black Identity Extremism" as a label in its terrorism investigations. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
The acting director of national intelligence is withholding a secret whistleblower complaint from the House intelligence committee because it involves conduct by someone outside the spy agencies and doesn’t meet the legal requirement for disclosure to Congress, according to letters obtained by NBC News. But in doing so, acting DNI Joseph Maguire acknowledges he is overruling the intelligence community’s independent watchdog, which thinks the complaint should be turned over. The letters, written by Jason Klitenic, the DNI’s general counsel, provide Maguire’s side of the story in what has quickly become an acrimonious dispute with Rep. Adam Schiff, chairman of the House intelligence committee. On Friday night, Schiff went public about the matter in dramatic fashion, announcing that he had issued a subpoena for a classified whistleblower complaint that he charged was being illegally withheld to shield President Donald Trump. On Tuesday, Schiff said Maguire has refused to comply with the subpoena. Current and former intelligence officials told NBC News they were taken aback by Schiff’s public escalation and his suggestion that they acting in bad faith at Trump’s behest. Schiff has declined to say whether he is aware of the nature of the complaint. A committee staffer who declined to be named said that Schiff went public because he wanted to send a message that “under no circumstances can there be any reprisals against this whistleblower.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
A new biography by Stephen Kinzer ... "Poisoner in Chief: Sidney Gottlieb and the CIA Search for Mind Control" ... traces the life and career of Gottlieb. [He was] the brains behind ... MK-ULTRA, the notorious research endeavor that employed mind-altering drugs, including LSD. In 1952, Gottlieb led a team of scientists to a safehouse in Munich ... where prisoners of war were pumped full of drugs, interrogated and then allowed to die. [Back in the U.S.,] Gottlieb worked with a sadistic narcotics officer in opening a "national security whorehouse" to dose unwitting victims being serviced by prostitutes on the C.I.A. payroll. Drugging johns was easy, but when Gottlieb started dosing unwitting government colleagues the research hit turbulence. Frank Olson, an Army scientist working with MK-ULTRA who had been given LSD without his knowledge, jumped, or was possibly pushed, out of a hotel room window in New York in 1953. [Olson's story is] covered most recently in [the] docudrama "Wormwood." His death has overshadowed the "expendables." We just don't know most of their names since Gottlieb destroyed the records. Some of the details in the book, like the coercion of African-American prisoners to participate in C.I.A. experiments, are astounding. [MK-ULTRA] should be remembered for what it was: a vehicle for abominable experiments that often targeted the most vulnerable – drug users, prisoners and psychiatric patients, who were deprived of meaningful informed consent. Kinzer's book is also a good reminder that there is rarely legal accountability for the C.I.A.'s misdeeds.
Note: Explore concise excerpts from the astounding declassified CIA documents on MK-ULTRA. They reveal a very successful program to create Manchurian Candidates or spies who don't know they are spies. The Times' title of this article implies that the CIA is no longer into mind control. If you think that is true, think again. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources. Then explore the excellent, reliable resources provided in our Mind Control Information Center.
During the early period of the Cold War, the CIA became convinced that communists had discovered a drug or technique that would allow them to control human minds. In response, the CIA began its own secret program, called MK-ULTRA, to search for a mind control drug that could be weaponized against enemies. MK-ULTRA, which operated from the 1950s until the early '60s, was created and run by a chemist named Sidney Gottlieb. Some of Gottlieb's experiments were covertly funded at universities and research centers ... while others were conducted in American prisons and in detention centers in Japan, Germany and the Philippines. Many of his unwitting subjects endured psychological torture ranging from electroshock to high doses of LSD. In the early 1950s, he arranged for the CIA to pay $240,000 to buy the world's entire supply of LSD. He brought this to the United States, and he began spreading it around to hospitals, clinics, prisons and other institutions, asking them, through bogus foundations, to carry out research projects and find out what LSD was, how people reacted to it and how it might be able to be used as a tool for mind control. MK-ULTRA, was essentially a continuation of work that began in Japanese and Nazi concentration camps. Not only was it roughly based on those experiments, but the CIA actually hired the vivisectionists and the torturers who had worked in Japan and in Nazi concentration camps to come and explain what they had found out so that we could build on their research.
Note: Read more about the CIA's MK-ULTRA program. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources.
On 12 June 1975, the Washington Post ran a story about an army scientist who had been drugged with LSD by the CIA, reacted badly and jumped out of the window of a New York hotel. This story, with its lurid mix of drugs, death and the CIA, proved irresistible. For the next several days, reporters barraged the CIA with demands to know more. The Olson family called a press conference in the family’s back yard. Alice read a statement saying that the family had decided to “file a lawsuit against the CIA, perhaps within two weeks, asking several million dollars in damages”. “Since 1953, we have struggled to understand Frank Olson’s death as an inexplicable ‘suicide,’” she said. “The true nature of his death was concealed for 22 years.” White House lawyers offered the Olson family $750,000 in exchange for dropping its legal claims. After some hesitation, the family accepted. On 8 August 2002, [Eric Olson] announced that he had reached a new conclusion about what had happened to his father. “The death of Frank Olson on 28 November 1953 was a murder, not a suicide,” he declared. “This is not an LSD drug-experiment story, as it was represented in 1975. This is a biological warfare story. Frank Olson did not die because he was an experimental guinea pig who experienced a ‘bad trip’. He died because of concern that he would divulge information concerning a highly classified CIA interrogation program in the early 1950s, and concerning the use of biological weapons by the United States in the Korean War.”
Note: Read more about the CIA's MK-ULTRA program which Frank Olson was a part of. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources.
Katharine Gun and Martin Bright could be forgiven for fielding Hollywood’s overtures with a degree of skepticism. Ever since their story was documented in Marcia and Thomas Mitchell’s 2008 book “The Spy Who Tried to Stop a War,” Gun, the British whistleblower who attempted to prevent the Iraq War, and Bright, an investigative journalist who broke the leak, had sat down with many a filmmaker interested in translating their tale. So when veteran South African director Gavin Hood expressed interest, Gun and Bright took the development with a grain of salt. When Gun met with Hood, however, she was struck by his engagement. The end result, “Official Secrets,” opens locally Friday with Keira Knightley playing Gun and Matt Smith as Bright. The movie depicts the decision Gun made in 2003, while working for British intelligence agency GCHQ, to leak a secret memo exposing plans by the American government to potentially blackmail members of the U.N. Security Council into supporting the Iraq War. “Official Secrets” probes myriad issues that remain resonant a decade and a half later, including government overreach and accountability, the toxicity of anti-Muslim sentiment, and the merits of an intrepid free press. By positioning Gun as an everywoman, “Official Secrets” asks its audience to ponder the moral dilemma at its core. “I didn’t set out to be a whistleblower,” Gun says. “Hopefully people will see it and come away with the thought, ‘What would I do if I was in a similar situation?’”
Note: Explore more on this courageous whistleblower in this revealing article. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
In 2016 and 2017, 25 Americans, including CIA agents, who worked in the U.S. Embassy in Cuba suffered serious brain injuries causing impaired vision and memory loss among other persistent problems. At least 15 American officials in China suffered unexplained brain trauma soon after. As we first reported in March, the FBI is now investigating whether these Americans were attacked by a mysterious weapon that leaves no trace. Mark Lenzi is a State Department security officer who worked in the U.S. Consulate in Guangzhou, China. He says that he and his wife began to suffer after hearing strange sounds in their apartment. Mark Lenzi believes he was targeted because of his work. He uses top secret equipment to analyze electronic threats to diplomatic missions. "It was a weapon," [said Lenzi]. "I believe it's RF, radio frequency energy, in the microwave range." A clue that supports that theory was revealed by the National Security Agency in 2014. This NSA statement describes such a weapon as a "high-powered microwave system weapon that may have the ability to weaken, intimidate, or kill an enemy over time without leaving evidence." The statement goes on to say "... this weapon is designed to bathe a target's living quarters in microwaves." The NSA disclosed this in a worker's compensation case filed by former NSA employee Mike Beck. In the 1990's Beck and an NSA co-worker were on assignment overseas. Years later, he says they developed Parkinson's Disease at the same time.
Note: Read more on the mysterious "sonic attacks" in Cuba. For more along these lines, see concise summaries of deeply revealing news articles on non-lethal weapons from reliable major media sources.
Commerce Department trade officer Catherine Werner used to promote American business from the U.S. consulate in Guangzhou, China. Today she says she suffers from bouts of nausea, dizziness, and headaches. Robyn Garfield, also a trade officer with the Commerce Department, was posted in Shanghai. Along with nausea, dizziness, and headaches, he says he has trouble remembering words. State Department security officer Mark Lenzi used to work in the consulate in Guangzhou. When he did, he said the splitting pain in his head was debilitating. The three are among at least 15 American officials in China who say they suffered unexplained brain trauma after being attacked by a mysterious weapon. Previously, 25 Americans who worked in the U.S. embassy in Cuba said they also experienced an attack and have similar symptoms. The government employees weren't the only ones targeted. Their spouses, children, and family pets also exhibited neurological symptoms after hearing strange sounds in their homes. In July, a University of Pennsylvania medical team published a study on the brains of U.S. government personnel who developed neurological symptoms in Cuba. The study used advanced brain imaging and found "significant differences in brain tissue and connectivity" in the diplomats' brains. It is the first scientific evidence showing the diplomats had physical damage to the structure of their brains.
Note: Read more on the mysterious "sonic attacks" in Cuba. For more along these lines, see concise summaries of deeply revealing news articles on non-lethal weapons from reliable major media sources.
While we all live under extensive surveillance, for government employees and contractors - especially those with a security clearance - privacy is virtually nonexistent. Everything they do on their work computers is monitored. Even when they try to outsmart their work computer by taking photos directly of their screen, video cameras in their workplace might be recording their every move. Government workers with security clearance promise “never [to] divulge classified information to anyone” who is not authorized to receive it. But for many whistleblowers, the decision to go public results from troubling insights into government activity, coupled with the belief that as long as that activity remains secret, the system will not change. The growing use of the Espionage Act, a 1917 law that criminalizes the release of “national defense” information by anyone “with intent or reason to believe that it is to be used to the injury of the United States or to the advantage of a foreign nation,” shows how the system is rigged against whistleblowers. Government insiders charged under the law are not allowed to defend themselves by arguing that their decision to share what they know was prompted by an impulse to help Americans confront and end government abuses. “The act is blind to the possibility that the public’s interest ... might outweigh the government’s interest,” Jameel Jaffer, head of the Knight First Amendment Institute, wrote recently. “It is blind to the difference between whistle-blowers and spies.”
Note: The above article includes the stories of four whistleblowers charged under the Espionage act. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The United States is stepping up digital incursions into Russia’s electric power grid in a warning to President Vladimir V. Putin and a demonstration of how the Trump administration is using new authorities to deploy cybertools more aggressively, current and former government officials said. In interviews over the past three months, the officials described the previously unreported deployment of American computer code inside Russia’s grid and other targets as a classified companion to more publicly discussed action directed at Moscow’s disinformation and hacking units around the 2018 midterm elections. In August of 2018, President Trump signed [an] executive order ... called National Security Presidential Memorandum 13. Its contents are still classified, but essentially it allows the Cyber Command to go ahead and conduct all kinds of operations inside foreign networks without going back to the president for prior approval. The first thing it did was go after those units in Russia that were responsible for a lot of the election-hacking. They went after the G.R.U., the Russian military intelligence unit that had been responsible for breaking into the D.N.C.. A lot of that ... was made public. What wasn’t made public was a parallel effort to go inside the Russian power grid, to put some code in places where the Russians ... wouldn’t see it, in case the U.S. ever needed to act against Russia’s utilities as the Russians were putting malware in our systems.
Note: A 2007 New York Times article describes the formation of the Air Force Cyberspace Command to arm the US military in anticipation of widespread computer-based warfare. A more recent Guardian article says, "we might already be living through the first world cyberwar." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Newly released documents show that another government agency, as well as the Australian Federal Police, was involved in the investigation that led to the raid on the ABC in June. The documents, obtained under Freedom of Information, reveal that the AFP refused to release certain documents relating to the June 6 raid because it said they related to an agency of the Federal Government which is exempt from FOI. Under the section cited by the AFP to justify not releasing the material - subsection 7(1) of the FOI Act - agencies which have complete exemption include the Australian Security Intelligence Organisation (ASIO), the Australian Signals Directorate (ASD) and the Australian Secret Intelligence Service (ASIS). The raid on the ABC's Ultimo headquarters was related to the Afghan Files, a series of stories, published in 2017, which detailed incidents where Australian soldiers in Afghanistan killed unarmed men and children. [South Australian senator Rex] Patrick said ... he believed that the other agency was either ASIO or the Australian Signals Directorate. The primary role of the Australian Signals Directorate is to eavesdrop on conversations and monitor the communications of people of interest outside Australia. The story which prompted one of the raids - on News Corp journalist Annika Smethurst - was about the push by some within the Federal Government to give ASD power to monitor the communications of Australians in Australia, which is currently prohibited by law.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable major media sources.
Wikileaks founder Julian Assange was arrested on Thursday at Ecuador's London embassy, where he had been granted asylum since 2012. The United States alleges that he conspired with Chelsea Manning to access classified information on Department of Defense computers. Since it launched in 2006, Wikileaks has become renowned for publishing thousands of classified documents covering everything from the film industry to national security and wars. In 2010, Wikileaks published a video from a US military helicopter showing the killing of civilians in Baghdad, Iraq. A voice on the transmission urged the pilots to "light 'em all up" and the individuals on the street were fired at from the helicopter. When a van arrived on the scene to pick up the wounded, it too was fired at. Reuters photographer Namir Noor-Eldeen and his assistant Saeed Chmagh were both killed in the attack. Wikileaks has published hundreds of thousands of documents leaked by former US Army intelligence analyst Chelsea Manning. Documents relating to the war in Afghanistan revealed how the US military had killed hundreds of civilians in unreported incidents. Further documents from the Iraq war revealed that 66,000 civilians had been killed - more than previously reported. The documents also showed that prisoners had been tortured by Iraqi forces. Among the leaks were more than 250,000 messages sent by US diplomats. They revealed that the US wanted to collect "biographic and biometric" information ... of key officials at the UN.
Note: Read more about Wikileaks' effort to promote openness over secrecy. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
Redactions ... symbolize the ongoing tug-of-war between discretion and truth, between a government that knows what we don’t need to know and a citizenry that desires the whole story. That desire is inflamed after two years of theorizing about the Mueller report. “I think it’s going to be more disappointing than not, and frustrating to many,” says D.C. attorney Mark S. Zaid, who handles cases involving national security and the Freedom of Information Act (FOIA). Zaid once sued the government for records related to the death of Princess Diana and the FBI surrendered reams of material. Zaid was thrilled, until he opened the boxes. Two thousand pages of redactions. Every page, blacked out. In 2003 the Department of Justice released a 186-page report on its hiring practices, and half of it was blacked out. American leaders brag about transparency but their agencies historically have cultivated a “culture of caution.” By the turn of last century at least 1.5 billion documents over 25 years old were kept from the public because of national security concerns. Classification cost the federal government $18.49 billion in fiscal year 2017 alone. Redactions can be cosmetic, or historic [like] the 14 blank pages of a 2002 Pentagon assessment of Iraq’s nuclear-weapons program. [Yet] when 19,045 documents related to the John F. Kennedy assassination were released last year, Nate Jones of the National Security Archive was struck by the banality of the information the government had insisted on keeping secret for years.
Note: Why was so much material around the death of Princess Diana redacted? Explore some of the strangeness around the killing of Princess Diana in this news article. For more along these lines, see concise summaries of deeply revealing news articles on secrecy from reliable major media sources.
The United States has revoked the visa of the International Criminal Court’s chief prosecutor because of her attempts to investigate allegations of war crimes in Afghanistan, including any that may have been committed by American forces. Ms. Bensouda, a Gambian lawyer for the court, which is based in The Hague, formally requested an investigation more than a year ago into war crimes in Afghanistan. The inquiry would mostly focus on large-scale crimes against civilians attributed to the Taliban and Afghan government forces. But it would also examine alleged C.I.A. and American military abuse in detention centers in Afghanistan in 2003 and 2004, and at sites in Poland, Lithuania and Romania, putting the court directly at odds with the United States. The United States is not a member state of the I.C.C. and does not recognize the court’s authority to prosecute Americans. In the past, though, the United States has cooperated with the court on other investigations, and Washington played a central role in establishing international criminal law at the Nuremberg trials. [Secretary of State Mike] Pompeo, in a March news briefing in Washington, said investigators “should not assume that you will still have or will get a visa, or that you will be permitted to enter the United States” if they are part of a I.C.C. investigation. “These visa restrictions will not be the end of our efforts,” Mr. Pompeo said at the time. “We are prepared to take additional steps, including economic sanctions if the I.C.C. does not change its course.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Despite the essential role whistleblowers play in illuminating the truth and protecting the public interest, several myths persist about them. The overwhelming majority of employees who see problems want to blow the whistle internally first. Understanding this can - and should - encourage employers to respond appropriately when workers report problems. Similarly, employees who understand that they are in fact whistleblowers when they raise concerns inside the workplace will be better prepared to navigate their rights, risks and options. While many employees who witness wrongdoing in the workplace stay silent, fearing reprisal or futility, those who do raise concerns ... demonstrate faith that their employers are committed to compliance and that they can make a difference. Whistleblowers who report externally typically do so because the problem is significant and their employers have failed to address it or engaged in reprisal (or both). Snowden’s revelations about the NSA’s unconstitutional mass collection of telephone metadata, and Reality Winner’s disclosures about Russian efforts to hack state elections as the Trump campaign was denying Russian involvement, clearly meet this standard of significance. While reporters may use the term “leak” to describe information received from anonymous insiders, the failure to distinguish between leaking and anonymous whistleblowing risks undermining the legitimacy and importance of disclosures that clearly advance the public’s interest.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
A group of American hackers who once worked for U.S. intelligence agencies helped the United Arab Emirates spy on a BBC host, the chairman of Al Jazeera and other prominent Arab media figures during a tense 2017 confrontation pitting the UAE and its allies against the Gulf state of Qatar. The American operatives worked for Project Raven, a secret Emirati intelligence program that spied on dissidents, militants and political opponents of the UAE monarchy. A Reuters investigation in January revealed Project Raven’s existence and inner workings, including the fact that it surveilled a British activist and several unnamed U.S. journalists. At first, the goal was to crack down on terrorism by helping the UAE monitor militants around the region. But Raven’s mission quickly expanded to include monitoring and suppressing a range of UAE political opponents. Among its targets was Qatar, which the UAE and Saudi Arabia had long accused of fueling political opposition across the region, in part through the Qatari government’s funding of Al Jazeera. The Emiratis also tapped Raven in the effort to contain dissent at home. After the Arab Spring, the operatives were increasingly tasked with targeting human rights activists and journalists who questioned the government. The Raven effort went beyond the Middle East. Operatives [targeted] the mobile phones of other media figures the UAE believed were being supported by Qatar, including journalists for London-based Arabic media outlets.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
Hours after police Officer Darren Wilson shot and killed 18-year-old Michael Brown on a quiet suburban street in Ferguson, Missouri, Olajuwon Ali Davis stood with a few dozen people on that same street. Davis, who was 22 at the time, kept showing up as the protests grew larger. Three months later, Davis and another young man named Brandon Orlando Baldwin were arrested in an FBI sting and accused of planning to ... blow up St. Louis’s iconic Gateway Arch. Three years later, the FBI listed Davis’s case in a secret memo warning of the rise of a “black identity extremist” movement whose members’ “perceptions of police brutality against African Americans” spurred what the FBI claimed was “an increase in premeditated, retaliatory lethal violence against law enforcement.” The “black identity extremism” report was prepared by the FBI’s Domestic Terrorism Analysis Unit ... and was distributed to scores of local and federal law enforcement partners. Davis and Baldwin ... appear to be the first individuals retroactively labeled by the FBI as “black identity extremists.” According to The Intercept’s analysis, Davis and Olajuwon’s case was the only federal prosecution of individuals the FBI considers to be “black identity extremists” that resulted in a conviction. By comparison, the analysis found that 268 right-wing extremists were prosecuted in federal courts since 9/11 for crimes that appear to meet the legal definition of domestic terrorism.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
Attorney-General nominee William P. Barr figured prominently in arguments to limit CIA responsibility to provide notification to Congress about covert actions during the 1980s, according to a review of declassified materials published today by the National Security Archive. As the Iran-Contra scandal played out, Barr, who held senior posts at the Justice Department, provisionally supported the idea of the president’s “virtually unfettered discretion” in foreign policy and downplayed Congress’s power. The issue of notification of Congress about imminent clandestine activities was at the heart of the Iran-Contra scandal when President Ronald Reagan and CIA Director William Casey specifically ordered that lawmakers be kept in the dark about the infamous, covert arms-for-hostages deals with Iran. Barr was by no means alone in pushing these views, the documents show. Other notable proponents during the Iran-Contra aftermath included then-Congressman Dick Cheney and John R. Bolton, who was also at the Justice Department. After Cheney became defense secretary he continued to press for extraordinarily broad Executive Branch authority, advising then-President George H. W. Bush to veto the Senate’s intelligence appropriations bill on the grounds it “attacked” presidential prerogatives – resulting in the only known such veto since the CIA’s creation.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The FBI opened a “domestic terrorism” investigation into a civil rights group in California, labeling the activists “extremists” after they protested against neo-Nazis in 2016. Federal authorities ran a surveillance operation on By Any Means Necessary (Bamn), spying on [the] group’s movements in an inquiry that came after one of Bamn’s members was stabbed at the white supremacist rally. The FBI’s Bamn files reveal: The FBI investigated Bamn for potential “conspiracy” against the “rights” of the “Ku Klux Klan” and white supremacists. The FBI considered the KKK as victims and the leftist protesters as potential terror threats, and downplayed the threats of the Klan. The FBI ... cited Bamn’s advocacy against “rape and sexual assault” and “police brutality” as evidence in the terrorism inquiry. The FBI’s 46-page report ... presented an “astonishing” description of the KKK, said Mike German, a former FBI agent. The FBI launched its terrorism investigation and surveillance of Bamn after white supremacists armed with knives faced off with hundreds of counter-protesters, including Bamn activists, at a June 2016 neo-Nazi rally in Sacramento. Although numerous neo-Nazis were suspected of stabbing at least seven anti-fascists in the melee... the FBI chose to launch a inquiry into the activities of the leftwing protesters. California law enforcement subsequently worked with the neo-Nazis to identify counter-protesters, pursued charges against stabbing victims and other anti-fascists, and decided not to prosecute any men on the far-right for the stabbings. In a redacted October 2016 document, the FBI labeled its Bamn investigation a “DT [domestic terrorism] – ANARCHIST EXTREMISM” case.
Note: Why was Newsweek the only major media outlet in the U.S. to write an article on this mind-boggling story? The article states, "Yvette Felarca, a Berkeley teacher and member of BAMN, was stabbed at the rally. Felcara has now been charged with assault and rioting. Police also wanted to bring six charges against Cedric O’Bannon, an independent journalist at the rally who was stabbed by a pole while filming." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Joined by relatives of Robert F. Kennedy, the Rev. Martin Luther King Jr. and Malcolm X, a group of more than 60 authors and investigators have called for a new congressional investigation into the assassinations of the three men and President John F. Kennedy, saying that the four slayings were not resolved. In a public statement, they demanded a public tribunal modeled on South Africa’s “Truth and Reconciliation” process to persuade either Congress or the Justice Department to revisit all four assassinations. Robert F. Kennedy Jr. and former Maryland lieutenant governor Kathleen Kennedy Townsend (D), two of Robert Kennedy’s children, signed the statement, as did Isaac N. Farris, a nephew of King and former president of the Southern Christian Leadership Conference, and the Rev. James M. Lawson Jr., a Memphis pastor and mentor to King. The statement was written in part by Adam Walinsky, a former top aide to Robert Kennedy, with input from other assassination scholars. He cited the “wreckage” from the slayings as the reasons to revisit them. “What a profound effect these assassinations had on this country,” Walinsky said. “These people, and the forces who were responsible for these murders, are still among us. The institutions are still there. And they’re still doing all the same things. So that’s the problem.” A news release and the full statement with a list of signers is here.
Note: In 1999, a civil trial implicated the US government in King's killing. In 2006, BBC described new evidence that placed "three senior CIA operatives at the scene of Robert Kennedy's assassination" and reported that Sirhan may have been a Manchurian Candidate programmed to act as a decoy for the real assassin. In 2011 the Boston Globe reported that RFK harbored suspicions that the CIA was behind his brother's murder. For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.
Bloomberg Businessweek published an alarming story: Operatives working for China's People's Liberation Army had secretly implanted microchips into motherboards made in China and sold by U.S.-based Supermicro. This allegedly gave Chinese spies clandestine access to servers belonging to over 30 American companies, including Apple, Amazon, and various government suppliers, in an operation known as a "supply chain attack," in which malicious hardware or software is inserted into products before they are shipped to surveillance targets. U.S. spy agencies ... assessed that China was adept at corrupting the software bundled closest to a computer's hardware at the factory, threatening some of the U.S. government's most sensitive machines, according to documents provided by National Security Agency whistleblower Edward Snowden. The documents also detail how the U.S. and its allies have themselves systematically targeted and subverted tech supply chains, with the NSA conducting its own such operations, including in China, in partnership with the CIA and other intelligence agencies. The documents also disclose supply chain operations by German and French intelligence. Computer hardware can be altered at various points along the supply chain, from design to manufacturing to storage to shipment. The U.S. is among the small number of countries that could, in theory, compromise devices at many different points in this pipeline, thanks to its resources and geographic reach.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Project Blue Book was the code name for an Air Force program set up in 1952 ... to explain away or debunk as many [UFO] reports as possible in order to mitigate possible panic and shield the public from a genuine national security problem. The prominent astronomer J. Allen Hynek ... was recruited as Blue Book’s scientific consultant and was indeed initially committed to explaining away flying saucers as natural phenomena or mistaken identifications. Hynek, the former U.F.O. skeptic, eventually concluded that they were a real phenomenon in dire need of scientific attention, with hundreds of cases in the Blue Book files still unexplained. Even many of the “closed” cases were resolved with ridiculous, often infuriating explanations, sometimes by Hynek himself. Blue Book compiled reports of 12,618 sightings of unidentified flying objects, of which 701 remain unexplained to this day. The mystery of the elusive flying objects is still far from solved. In 1947. Lt. General Nathan Twining ... sent a secret memo on “Flying Discs” to the commanding general of the Army Air Forces at the Pentagon. Twining stated that “the phenomenon reported is something real and not visionary or fictitious.” Documents show the C.I.A. then devised a plan for a “national policy,” as to “what should be told the public regarding the phenomenon, in order to minimize risk of panic.” The C.I.A. issued a secret report recommending a broad educational program for all intelligence agencies, with the aim of “training and debunking.” When Blue Book closed in late 1969, the Air Force flatly lied to the American people.
Note: For more along these lines, see concise summaries of deeply revealing news articles on a UFO cover-up from reliable major media sources. Then explore the excellent, reliable resources provided in our UFO Information Center.
Newly released files from “behavior modification,” or mind control, projects conducted as part of the infamous Project MKUltra reveal the CIA experimented in more than controlling humans with psychotropic drugs, electrical shocks and radio waves—they also created field operational, remote-controlled dogs. The documents were provided under the Freedom of Information Act (FOIA) by John Greenewald, founder of The Black Vault, a site specializing in declassified government records. In one declassified letter (released as file C00021825) a redacted individual writes to a doctor (whose name has also been redacted) with advice about launching a laboratory for experiments in animal mind control. The writer of the letter is already an expert in the field, whose earlier work had culminated with the creation of six remote control dogs, which could be made to run, turn and stop. The letter writer characterizes the work with remote-controlling dogs as a success, describing “a demonstrated procedure for controlling the free-field behaviors of an unrestrained dog.” Attached to the letter is the writer’s final report from his earlier research, published in 1965, titled “Remote Control Behavior with Rewarding Electrical Stimulation of the Brain,” with the principle investigator’s name redacted. The prospect of a potential new laboratory seems to fire the letter writer’s imagination, who describes potential experimentation on “a range of species,” should they want to move past “basic research.”
Note: If the CIA had this level of sophistication in 1967, what do you think they are capable of now? Read more on the development of microchip implants. For more along these lines, see concise summaries of deeply revealing news articles on CIA mind control programs.
A memo written by FBI director J. Edgar Hoover, released among 2,800 declassified records relating to the assassination of President John F. Kennedy, has shown how in the days after Lee Harvey Oswald was shot, the FBI planned to convince the public that he was the real assassin as soon as possible. In the document, dictated shortly after Oswald was shot by Dallas nightclub owner Jack Ruby, Hoover explains. “The thing I am concerned about, and so is [Attorney General Nicholas] Katzenbach, is having something issued so we can convince the public that Oswald is the real assassin,” Hoover said in the 1963 memo. The former FBI director went on to explain that establishing which facts could and could not be made public was important because of the possible foreign policy implications. “There are several aspects which would complicate our foreign relations,” Hoover says in the memo. These were namely that the FBI was aware Oswald had contacted both the Cuban embassy in Mexico City and the Soviet Embassy in Washington. Hoover explained that having the interception of these messages - one of them to the “man in the Soviet Embassy in charge of assassinations and similar activities on the part of the Soviet government” - made public would have “muddied the waters internationally.” Roughly 300 documents of the tranche of what would have been 3,100 documents pertaining to the assassination of President Kennedy have been withheld [by] President Donald Trump.
Note: Why are documents related to the JFK assassination still classified over 50 years after that fact? Why did Trump backtrack on his campaign promise to release all of these files? For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and assassinations.
America’s finest Republicans and Democrats [are] condemning the Crown Prince of Saudi Arabia for murdering Jamal Khashoggi. CIA director Gina Haspel, who was happy to sign off on the torture of her Muslim captives ... knew what she was talking about when she testified about Mohammed bin Salman and the agony of Jamal Khashoggi. A generation ago, the CIA’s “Operation Phoenix” torture and assassination programme in Vietnam went way beyond the imaginations of the Saudi intelligence service. In spook language, Khashoggi was merely “terminated with maximum prejudice”. If the CIA could sign off on mass murder in Vietnam, why shouldn’t an Arab dictator do the same on a far smaller scale? But there is something more than this ... 15 of those 9/11 hijackers were Saudis, that Osama bin Laden was a Saudi, that George W Bush secretly flew bin Laden family members out of the US after 9/11, that the Saudis themselves are heir to a blighted, rural, cruel version of Sunni Islam ... which has inspired the Taliban, al-Qaeda, Isis and all the other killer cults whom we have proclaimed to be the West’s Enemy No 1. Nailing Mohammed Bin Salman to a crucifix – a method of execution favoured by the Wahhabis – is an easy kill for US senators, of course. You hit the president and smash those unhappy historical details all in one fell swoop.
Note: Jamal Khashoggi's uncle was the notorious billionaire arms dealer and decadent playboy Adnan Khashoggi. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and assassinations.
Over time, the CIA upper echelon has secretly developed all kinds of policy statements and legal rationales to justify routine, widespread surveillance on U.S. soil of citizens who aren’t suspected of terrorism or being a spy. Newly declassified documents from 2014 ... reveal the CIA not only intercepted emails of U.S. citizens but they were emails of the most sensitive kind — written to Congress and involving whistleblowers reporting alleged wrongdoing within the Intelligence Community. The disclosures, kept secret until now, are two letters of “congressional notification” from the Intelligence Community inspector general at the time, Charles McCullough. He stated that during “routine counterintelligence monitoring of government computer systems,” the CIA collected emails between congressional staff and the CIA’s head of whistleblowing and source protection. McCullough added that he was concerned about the CIA’s “potential compromise to whistleblower confidentiality and the consequent ‘chilling effect’.” The March 2014 intercepts ... happened amid what’s widely referred to as the Obama administration’s war on whistleblowers and mass surveillance scandals. The evidence points to bad actors targeting candidate Donald Trump and his associates in part to keep them - and us - from learning about and digging into an even bigger scandal: our Intelligence Community increasingly spying on its own citizens, journalists, members of Congress and political enemies for the better part of two decades.
Note: The above article was written by Emmy award winning investigative journalist and former news anchor for CBS and CNN Sharyl Attkisson. She has been attacked numerous times for questioning the safety of vaccines and investigating too deeply into the lives of certain politicians. Her top-selling book Stonewalled describes her fight for truth against powerful political forces. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Britain's spy agencies will reveal its knowledge of alleged Westminster-related child abuse at a public inquiry amid concerns it aided in an establishment cover-up. MI5, MI6 and GCHQ have given their "full cooperation" with the Independent Inquiry into Child Sexual Abuse, lead counsel Andrew O'Connor QC told a preliminary hearing on Tuesday. Some of the evidence the agencies will give may be heard in private due to national security reasons. All three agencies have already provided files and documents relevant to its investigation into the alleged failure to pursue and prosecute child abusers in Whitehall and parliament. Parliamentary whips have also provided documents and archives to determine its involvement in the suspected cover-up. Mr O’Connor said a number of other notorious cases linked to Westminster - including those of the late former MPs, Cyril Smith, a Liberal, and Victor Montagu and Peter Morrison, both Conservatives - will be investigated. Further allegations ... are also expected to be explored. Allegations stemming from claims that police officers were "warned off" investigating cases of child sex abuse committed by senior politicians and other establishment figures in the 1960s, 70s and 80s will be looked at. The inquiry will also examine why the high ranking diplomat Peter Hayman, who died in 1992, escaped prosecution for sending obscene material through the post. The allegations against Hayman, who is believed to have been an MI6 official, were made public under parliamentary privilege in 1981.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and sexual abuse scandals.
An ex-CIA technician believed to be behind one of the worst leaks in agency history says the conditions at the federal jail in lower Manhattan are so bad that he’d rather be a prisoner in North Korea. Joshua Schulte ... described the Metropolitan Correctional Center as a living hell where inmates are “dragged from their cages and beaten and maced,” forced to bathe in “s–t-filled showers,” thrown into solitary confinement for no reason and improperly barred from communicating with their lawyers. “They even refuse us pens and stamps so we can’t even write,” Schulte told a judge in a letter that he says he was only able to write after he borrowed a pen from a medical assistant. The ex-CIA software engineer has been in the MCC since last year after the feds raided his New York apartment on suspicion that he had leaked classified documents to WikiLeaks. Immediately following the raid, he was ... charged with possession of kiddie porn. It wasn’t until this year that the feds slapped Schulte with a 13-count superseding indictment for leaking classified information, including national defense information, that he believed could be used “to the injury of the United States and the advantage of a foreign nation.” The MCC has been the target of numerous complaints in recent months. Reputed mobster John “Porky” Zancocchio recently got sprung from the lockup, where he was sent for a bail violation, after his lawyer complained that the food there was hurting his client’s already failing health.
Note: Read more on the "Vault 7" CIA files Schulte is accused of leaking. For more along these lines, see concise summaries of deeply revealing prison system corruption news articles from reliable major media sources.
The Trump Administration has now indicted at least five journalists’ sources in less than two years’ time—a pace that, if maintained through the end of Trump’s term, would obliterate the already-record number of leakers and whistleblowers prosecuted under eight years of the Obama administration. The latest case, which broke on Wednesday, shows the administration taking advantage of a new avenue to go after a potential whistleblower. Instead of using the archaic Espionage Act - the 100-year-old law meant for spies, not sources - prosecutors are pursuing the latest alleged leaker using financial laws. A senior Treasury official named Natalie Mayflower Sours Edwards has been arrested and charged ... for allegedly sharing “Suspicious Activity Reports” (SARs) about financial red flags with a news organization and its journalist for a series of stories related to the Russia investigation in 2017 and 2018. The complaint contains an interesting allegation, albeit one buried in a footnote: Edwards, according to prosecutors, told investigators she considered herself a “whistleblower.” The government also admitted she had filed a whistleblower complaint within her agency and had talked to Congressional staffers about the issue as well. The Justice Department reportedly has dozens of other [leak] investigations open, and we don’t know who will be next.
Note: This leak prosecution follows the sentencing of Reality Winner to five years in prison for providing evidence of high-level interference in a US election to the media. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the manipulation of public perception.
Omar Abdulaziz hit record on his phone and slipped it into the breast pocket of his jacket, he recalled, taking a seat in a Montreal cafe to wait for two men who said they were carrying a personal message from Saudi Crown Prince Mohammed bin Salman. When they arrived, Abdulaziz, a 27-year-old Saudi opposition activist, asked why they had come all the way to Canada to see him. “There are two scenarios,” one of the emissaries said, speaking of Abdulaziz in the third person. In the first, he can go back home to Saudi Arabia, to his friends and family. In the second: “Omar goes to prison.” To drive home what was at stake, the visitors brought one of Abdulaziz’s younger brothers from Saudi Arabia to the meeting. The clandestine recordings - more than 10 hours of conversation - were provided to The Washington Post by Abdulaziz, a close associate of the missing Saudi journalist Jamal Khashoggi. They offer a chilling depiction of how Saudi Arabia tries to lure opposition figures back to the kingdom with promises of money and safety. These efforts have sharply escalated since Mohammed became crown prince last year. Khashoggi’s friends said that senior Saudi officials close to the crown prince had contacted him in recent months, even offering him a high-level job ... if he returned to the kingdom. He didn’t trust the offer, fearing it was a ruse. Khashoggi has not been heard from since he visited the Saudi Consulate in Istanbul on Oct. 2. Turkish investigators have concluded he was killed ... and then dismembered.
Note: There is much more than meets the eye on this Khashoggi case. Read this fascinating article for a taste. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the manipulation of public perception.
In a combative exchange at a hearing Friday in Washington, D.C., a federal judge unabashedly accused career State Department officials of lying and signing "clearly false" affidavits to derail a series of lawsuits seeking information about former Secretary of State Hillary Clinton's private email server and her handling of the 2012 terrorist attack on the U.S. Consulate in Benghazi, Libya. U.S. District Court Judge Royce Lamberth also said he was "shocked" and "dumbfounded" when he learned that FBI had granted immunity to former Clinton chief of staff Cheryl Mills during its investigation into the use of Clinton's server, according to a court transcript. The Department of Justice's Inspector General (IG), Michael Horowitz, noted ... in June that it was "inconsistent with typical investigative strategy" for the FBI to allow Mills to sit in during the agency's interview of Clinton during the email probe, given that classified information traveled through Mills' personal email account. "[T]here are serious potential ramifications when one witness attends another witness' interview," the IG wrote. The transparency group Judicial Watch initially sued the State Department in 2014, seeking information about the response to the Benghazi attack after the government didn't respond to a Freedom of Information Act (FOIA) request. Parallel lawsuits ... are probing issues like Clinton's server, whose existence was revealed during the course of the litigation.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
This summer, Saudi Arabia promised the Trump administration $100 million for American efforts to stabilize areas in Syria. That money landed in American accounts on Tuesday, the same day that Secretary of State Mike Pompeo landed in the Saudi capital, Riyadh, for discussions with the kingdom’s leaders about the fate of a missing Saudi dissident. The timing of the money’s arrival raised eyebrows even among some of the bureaucrats whose programs will benefit from the influx of cash. “The timing of this is no coincidence,” said an American official involved in Syria policy who spoke on condition of anonymity. The disappearance of the Saudi journalist, Jamal Khashoggi, has battered the image of Saudi Arabia and of its powerful crown prince, Mohammed bin Salman, a key player in many of the Trump administration’s ambitions for the Middle East. Turkish officials say that Mr. Khashoggi was slain inside the Saudi consulate in Istanbul by Saudi agents on Oct. 2 while he was trying to secure a document he needed to get married. Saudi leaders have denied harming Mr. Khashoggi, but have not provided a credible explanation of what happened to him. Mr. Trump threatened “severe punishment” if it was confirmed that Saudi Arabia killed Mr. Khashoggi. But after speaking with King Salman of Saudi Arabia on Monday, he suggested that “rogue killers” could have been responsible and dispatched Mr. Pompeo to Riyadh to see the Saudi king.
Note: There is much more than meets the eye on this Khashoggi case. Read this fascinating article for a taste. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the manipulation of public perception.
The disappearance, and possible murder, of Jamal Khashoggi, a high-profile critic of the Saudi regime, is the latest, disturbing addition to the rising toll of state-directed, extra-territorial kidnappings, abductions and killings around the world. So here’s the question: why do more and more governments think they can get away with murder, figuratively if not literally? It’s a problem that should concern everybody – because everybody is at risk. It’s tempting to blame the US, a country that ... has come to epitomise the problem. In January 1986, worried about American hostages in Lebanon, Ronald Reagan signed a top-secret covert action directive. The presidential “finding” authorized the CIA to kidnap suspected terrorists anywhere, any place. Reagan’s “snatch and grab” operations inaugurated the modern-day practice of state abduction, leading ineluctably to extraordinary rendition. They set a fateful precedent. George W Bush massively expanded rendition after the 2001 terror attacks. Although the UN classifies one country’s abduction of another country’s citizens as a crime against humanity ... the US and its accomplices have in practice faced no substantive sanction or penalty to date. This grim lesson in impunity has been absorbed and digested by governments everywhere. The Khashoggi disappearance, almost certainly ordered and planned in Riyadh, is the very sort of illegal action that has been normalised ... by very recent American practice from Afghanistan and Iraq to Libya and Cuba.
Note: For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
A major U.S. telecommunications company discovered manipulated hardware from Super Micro Computer Inc. in its network and removed it in August, fresh evidence of tampering in China of critical technology components bound for the U.S., according to a security expert working for the telecom company. The security expert, Yossi Appleboum, provided ... evidence of the discovery following the publication of an investigative report in Bloomberg Businessweek that detailed how China’s intelligence services had ordered subcontractors to plant malicious chips in Supermicro server motherboards over a two-year period ending in 2015. [Appleboum’s company] was hired to scan several large data centers belonging to the telecommunications company. Unusual communications from a Supermicro server and a subsequent physical inspection revealed an implant built into the server’s Ethernet connector. The executive said he has seen similar manipulations of different vendors' computer hardware made by contractors in China, not just products from Supermicro. “Supermicro is a victim - so is everyone else,” he said. There are countless points in the supply chain in China where manipulations can be introduced, and deducing them can in many cases be impossible. The manipulation of the Ethernet connector appeared to be similar to a method also used by the U.S. National Security Agency, details of which were leaked in 2013.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Angeline Cheek is preparing for disaster. The indigenous organizer from the Fort Peck reservation in Montana fears that the proposed Keystone XL pipeline could break and spill. But environmental catastrophe is not the most immediate threat. The government has characterized pipeline opponents like her as “extremists” and violent criminals and warned of potential “terrorism”. Recently released records [suggest] that police were organizing to launch an aggressive response to possible Keystone protests, echoing the actions against the Standing Rock movement in North Dakota. There, officers engaged in intense surveillance and faced widespread accusations of excessive force. Documents obtained by the ACLU ... have renewed concerns from civil rights advocates about the government’s treatment of indigenous activists known as water protectors. Notably, one record revealed that authorities hosted a recent “anti-terrorism” training session in Montana. The Department of Homeland Security (DHS) and the Federal Emergency Management Agency also organized a “field force operations” training to teach “mass-arrest procedures”, “riot-control formations” and other “crowd-control methods”.
Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
The U.S. government can monitor journalists under a foreign intelligence law that allows invasive spying and operates outside the traditional court system, according to newly released documents. Targeting members of the press under the law, known as the Foreign Intelligence Surveillance Act, requires approval from the Justice Department’s highest-ranking officials. Prior to the release of these documents, little was known about the use of FISA court orders against journalists. Previous attention had been focused on the use of National Security Letters against members of the press; the letters are administrative orders with which the FBI can obtain certain ... records without a judge’s oversight. FISA court orders can authorize much more invasive searches and collection, including the content of communications, and do so through hearings conducted in secret and outside the sort of ... judicial process that allows journalists and other targets of regular criminal warrants to eventually challenge their validity. The rules apply to media entities or journalists who are thought to be agents of a foreign government, or ... possess foreign intelligence information. “There’s a lack of clarity on the circumstances when the government might consider a journalist an agent of a foreign power,” said [Knight Institute staff attorney Ramya] Krishnan. “Think about WikiLeaks; the government has said they are an intelligence operation.”
Note: In its latest instruction manual for federal prosecutors, the US Justice Department removed a subsection titled “Need for Free Press and Public Trial”. For more along these lines, see concise summaries of deeply revealing news articles on judicial system corruption and the erosion of civil liberties.
The Trump administration held secret meetings with rebellious military officers from Venezuela over the last year to discuss their plans to overthrow President Nicolás Maduro. One of the Venezuelan military commanders involved in the secret talks ... is on the American government’s own sanctions list of corrupt officials in Venezuela. He and other members of the Venezuelan security apparatus have been accused by Washington of a wide range of serious crimes, including torturing critics, jailing hundreds of political prisoners, wounding thousands of civilians, trafficking drugs and collaborating with the Revolutionary Armed Forces of Colombia, or FARC, which is considered a terrorist organization by the United States. In a series of covert meetings ... the military officers told the American government that they represented a few hundred members of the armed forces who had soured on Mr. Maduro’s authoritarianism. The officers asked the United States to supply them with encrypted radios, citing the need to communicate securely, as they developed a plan to install a transitional government. American officials did not provide material support, and the plans unraveled after a recent crackdown that led to the arrest of dozens of the plotters. On Feb. 1, Rex W. Tillerson ... delivered a speech in which he said the United States had not “advocated for regime change or removal of President Maduro.” Yet, responding to a question afterward, Mr. Tillerson raised the potential for a military coup.
Note: The US has a long history of supporting coups and human rights abuses in Latin America. The Western Hemisphere Institute for Security Cooperation, formerly known as the School of the Americas, graduated more than 500 human rights abusers. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Thousands of new documents from Project MKUltra, the Central Intelligence Agency’s mid-century mind control program, will soon be released. The new records include 4,358 undisclosed pages regarding MKUltra’s “behavior modification” efforts. John Greenewald, founder of The Black Vault, a site specializing in declassified government records obtained via Freedom of Information Act (FOIA) requests, first uploaded MKUltra documents in 2004 - tens of thousands of pages, spread over four CD-ROMs. Still, the trove of MKUltra material available on The Black Vault represent only a small fraction of the material from the sprawling, multi-decade program, with the majority lost to history after CIA Director Richard Helms ordered all MKUltra files destroyed in 1973. This makes the new documents crucial to expanding our narrow perspective on the CIA’s actions from the operation’s beginnings in 1953 through the cover-up twenty years later. Project MKUltra was an illegal program of human experimentation undertaken by the CIA to discover methods, both pharmacological and psychological, for controlling the human mind. More than 80 colleges, prisons, pharma companies and hospitals collaborated in the program, including renowned psychiatrist Donald Ewen Cameron, who served president of the American Psychiatric Association and the World Psychiatric Association. The existence of the previously unknown MKUltra pages was discovered in 2016, when a Black Vault user, Oscar Diggs, discovered irregularities in the collection the CIA disclosed to Greenewald.
Note: Read details of the CIA's bizarre efforts to keep these missing documents away from the public on this page. While Black Vault makes the MKUltra archive available for bulk download, you can view individual MKUltra files from this archive on this WantToKnow.info page. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
The torture of a suspected al-Qaeda terrorist, including waterboarding, is described in meticulous detail in newly-declassified cables that CIA Director Gina Haspel sent to agency headquarters in late 2002, when she headed a secret U.S. detention facility in Thailand. The suspect, Abd al-Rahim al-Nashiri, was believed to have been involved in planning the USS Cole bombing in Yemen in 2000. Nashiri’s treatment during interrogation — forced nudity, shackling, being slammed against walls, being confined in a small box and mock executions, as well as waterboarding — has been previously mentioned in broad terms in official reports, hearings, court cases and news reports. But many specifics about what happened to Nashiri during his several-week stay at the Thailand facility, while Haspel was briefly in charge, have not been made public. They are contained in 11 cables obtained under the Freedom of Information Act by the National Security Archive, a private research institute. On the 12th day of his detention, one cable to the home office reported, “interrogation escalated rapidly from subject being aggressively debriefed by interrogators to multiple applications of the walling technique, and ultimately, multiple applications of the watering technique.” The interrogators, it later said, “covered subject’s head with the hood and left him on the water board, moaning, shaking and asking God to help him repeatedly.”
Note: The above article contains graphic descriptions of torture overseen and then covered up by Gina Haspel. Another article, by a former CIA counterterrorism officer who was imprisoned for blowing the whistle on the CIA torture, referred to Haspel's actions as "war crimes, crimes against humanity". For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The FBI doesn’t want the public to know more about how its agents pose as journalists during undercover investigations. But, in a federal court case, Justice Department lawyers ... acknowledged in a court filing that FBI agents who pretend to be journalists create a chilling effect, making it harder for real journalists to gain trust and cooperation from sources. The astonishing admission came as the FBI attempted to fend off litigation from Reporters Committee for Freedom of the Press, which has filed requests for documents under the Freedom of Information Act. The Reporters Committee’s litigation involves documents related to an FBI undercover operation in which agents posed as documentary filmmakers from a fake company called Longbow Productions to investigate Nevada rancher Cliven Bundy and his supporters. In a motion filed July 23, Assistant U.S. Attorney Johnny H. Walker argued that providing FBI documents about the Bundy investigation and others in which a journalistic cover may have been used would not only disclose sensitive investigative techniques but also ... “would allow criminals to judge whether they should completely avoid any contacts with documentary film crews, rendering the investigative technique ineffective.” The FBI has previously disclosed that agents have pretended to be news reporters to further investigations. But questions remain about how often such covers are used and what policies are in place to govern the deployment of fake reporters.
Note: A mistrial was recently declared in the case against Cliven Bundy and others after the Justice Department was found to have withheld "massive amounts of evidence undermining federal charges". For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
In January 2010 Israeli agents converged on a luxury hotel in Dubai: their target was Mahmoud al-Mabhouh, an arms supplier for Hamas, the Palestinian Islamist movement which controls the Gaza Strip. The mission involved 27 operatives of the Mossad secret service who were posing as tourists or tennis players. The hit team and their watchers flew in from different European airports using false passports. Communications were routed via Austria to avoid surveillance. Mabhouh was killed in his room using a paralysing drug and his body left to be discovered by hotel staff the next day. The snag was that the killing exposed the Mossad to global scrutiny – and angered an Arab country with a record of quiet cooperation with Israel. CCTV caught the agents changing disguises and stalking their prey – seen as a legitimate candidate for extrajudicial execution as he had killed an Israeli soldier and, more importantly, was a logistical link with Iran, sworn enemy of the Jewish state. Ronen Bergman’s account of his country’s targeted assassinations contains a wealth of detail about this and other killings. In recent years Israel has assassinated more people than any other country in the western world. Bergman’s long view sharpens understanding of the asymmetrical nature of the conflict – and of the limits of force. Bergman’s style tends to the sensational but that does not mask a critical strand that questions the morality and effectiveness of Israel’s approach to dealing with the enemy in its own backyard.
Note: Rise and Kill First by Ronen Bergman is available here. For more along these lines, see concise summaries of deeply revealing news articles on war and assassinations.
Guantanamo Bay detainees who have been held for as long as 16 years without being charged cannot be imprisoned indefinitely, attorneys argued in federal court Wednesday. Speaking before U.S. District Judge Thomas Hogan in Washington, attorneys representing eight men detained at the military facility said the Trump administration had violated prisoners’ rights because it did not intend to try them or resettle them overseas. The case shines a light on the few remaining prisoners at Guantanamo, which President Trump has promised to keep open and potentially use to house new suspects, reversing his predecessor’s failed quest to shutter the facility. The men’s collective challenge ... is a reminder of the unsettled questions that continue to surround the prison, which for critics symbolizes what they see as excesses that followed the attacks of Sept. 11, 2001. At its peak, the military facility ... held more than 700 prisoners. After 2009, President Barack Obama, seeking to close the prison, resettled close to 200 more but was unable to overcome congressional opposition to shutting the prison. Two of the men whose challenge was heard Wednesday, Tofiq Nasser Awad al-Bihani and Abdul Latif Nasser, have already been deemed eligible for resettlement overseas by a government panel, but they remain at Guantanamo. Much of the hearing revolved around the government’s assertion that it could continue to hold the detainees until hostilities against the United States cease, no matter how long that takes.
Note: A letter written by Al Hajj, a Yemeni citizen detained without charges for over 15 years, sheds further light on the plight of these prisoners. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Thousands of people pass by the buildings each day and rarely give them a second glance, because their function is not publicly known. They are an integral part of one of the world’s largest telecommunications networks – and they are also linked to a controversial National Security Agency surveillance program. Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C.. In each of these cities, The Intercept has identified an AT&T facility containing networking equipment that transports large quantities of internet traffic across the United States and the world. A body of evidence – including classified NSA documents, public records, and interviews with several former AT&T employees – indicates that the buildings are central to an NSA spying initiative that has for years monitored billions of emails, phone calls, and online chats passing across U.S. territory. The NSA considers AT&T to be one of its most trusted partners and has lauded the company’s “extreme willingness to help.” Little known, however, is that its scope is not restricted to AT&T’s customers. According to the NSA’s documents, it values AT&T not only because it “has access to information that transits the nation,” but also because it maintains unique relationships with other phone and internet providers. The NSA exploits these relationships for surveillance purposes, commandeering AT&T’s massive infrastructure and using it as a platform to covertly tap into communications processed by other companies.
Note: The NSA was authorized in 2016 to share communications data it collected without warrants on Americans with 16 intelligence and law enforcement agencies. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Several U.S victims of alleged "health attacks" in Cuba have hired a lawyer out of concern over how the U.S. government will handle their long-term medical treatment. "That's not at all clear," said lawyer Mark Zaid, who represents eight of the at least 24 U.S. diplomats, intelligence officers and relatives affected by the incidents in Havana. "Some already had to spend their own money" on treatment. "Are they being treated or are they being studied? It's not entirely clear what is happening," the lawyer said, adding that some of the victims had problems accessing their medical records at the UPenn treatment center because the records are government property. Zaid added that ... the cases have placed the government in a predicament because of the mystery not just on the so-called attacks but the injuries experienced. For example, federal employees who have been injured by incidents such as explosions, "the wounds have been specific and concrete, not strange brain and neurological damages. It's much more complicated." In a separate case, another Zaid client - Mike Beck, a retired National Security Agency counterintelligence officer - suffered a "potentially similar attack" in the 1990s when he traveled to an unidentified country. Years later, Beck and a companion on the trip were found to be suffering from Parkinson's disease. A confidential report convinced him that his illness was linked to a covert attack with a weapon that used microwaves, Beck told The Washington Post last year.
Note: There is no doubt that the US has electromagnetic weapons that can cause neurological disorders like this. We suspect this was a false flag attack to turn the American public against the recently opened U.S. embassy in Havana. To learn about how electromagnetic weapons can be used to torture anyone without legal recourse, listen to this revealing interview. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and non-lethal weapons.
When Robert F. Kennedy was assassinated just minutes after winning California's 1968 Democratic primary, the United States was fiercely divided. Many looked to him to help heal that divide. That's part of an unfulfilled legacy his son, Robert Kennedy Jr., describes in his new book, "American Values." It's a history of the ... 40-year tension between my family and the CIA," he said. The Kennedy feud with the CIA was multi-generational. The family patriarch, Joseph Kennedy, sat on a commission that called for an end to the CIA's paramilitary operations. And his sons John and Robert Kennedy both railed against the CIA's role in Vietnam. "The first thing [my father] was gonna do was to remove the clandestine services from the CIA and make the CIA ... an intelligence gathering organization," he said. But the seeds of doubt about who killed his father weren't planted by that notion. "I never suspected at any level that anybody other than Sirhan Sirhan had killed my father until maybe three years ago," he said. What changed for Kennedy? "Well, Paul Schrade." Schrade was a close friend of Robert Kennedy and was with the candidate the night he was shot. Schrade ... has insisted for decades that Sirhan could not have acted alone. He's now raised serious questions in Kennedy Jr.'s mind as well. "It's hard to believe that Sirhan shot my dad, that his bullets hit my dad. Because Sirhan was always in front of my father. And yet, all shots, all the four shots that hit my father came from behind him," he said.
Note: For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.
Edward Snowden has no regrets five years on from leaking the biggest cache of top-secret documents in history. He is wanted by the US. He is in exile in Russia. But he is satisfied with the way his revelations of mass surveillance have rocked governments, intelligence agencies and major internet companies. What has happened in the five years since? The most important change, he said, was public awareness. “The government and corporate sector preyed on our ignorance. But now we know. People are aware now. People are still powerless to stop it but we are trying. The revelations made the fight more even.” He said he had no regrets. His own life is uncertain, perhaps now more than ever, he said. His sanctuary in Russia depends on the whims of the Putin government, and the US and UK intelligence agencies have not forgiven him. For them, the issue is as raw as ever. One of the disclosures to have most impact was around the extent of collaboration between the intelligence agencies and internet companies. In 2013, the US companies were outsmarting the EU in negotiations over data protection. Snowden landed like a bomb in the middle of the negotiations and the data protection law that took effect last month is a consequence. But he will not be marking the anniversary with a “victory lap”. There is still much to be done. “The fightback is just beginning,” said Snowden. “The governments and the corporates have been in this game a long time and we are just getting started.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
This is a tale of two defendants and two systems of justice. Suspected of colluding with the Russian government, the former campaign manager for Donald Trump, [Paul Manafort, was] indicted on a dozen charges involving conspiracy, money laundering, bank fraud, and lying to federal investigators. Manafort avoided jail by posting $10 million in bond, though he was confined to his luxury condo in Alexandria, Virginia. Reality Winner, an Air Force veteran and former contractor for the National Security Agency ... was accused of leaking an NSA document that showed how Russians tried to hack American voting systems in 2016. Her case is related to Manafort’s in this sense: While Manafort is suspected of aiding the Russian effort, Winner is accused of warning Americans about it. Even though she has been indicted on just one count of leaking classified information and faces far less prison time than Manafort, the judge in her case ... denied her bail. Winner spent the holidays at the Lincolnton jail, which is smaller in its entirety than Manafort’s Hampton’s estate. The U.S. government rarely acts kindly toward the leakers it chooses to prosecute - unless they happen to be popular figures like David Petraeus, the former general and CIA director who shared with his girlfriend several notebooks filled with top-secret information; he was allowed to plead guilty to just a misdemeanor charge. Last year, Attorney General Jeff Sessions proudly announced that the DOJ was investigating three times as many leaks as in the Obama era.
Note: The NSA document Winner is accused of leaking revealed high-level interference in a US election. For more along these lines, see concise summaries of deeply revealing news articles on corruption in the intelligence community and in the judicial system.
Robert F. Kennedy Jr. pulled up to the massive Richard J. Donovan Correctional Center, a California state prison complex. Kennedy was there to visit Sirhan B. Sirhan, the man convicted of killing his father, Sen. Robert F. Kennedy, nearly 50 years ago. It was the culmination of months of research by Kennedy into the assassination. He would not discuss the specifics of their conversation. But when it was over, Kennedy had joined those who believe there was a second gunman, and that it was not Sirhan who killed his father. He now supports the call for a re-investigation of the assassination led by Paul Schrade, who also was shot in the head as he walked behind Kennedy in the pantry of the Ambassador Hotel ... but survived. Though Sirhan admitted at his trial in 1969 that he shot Kennedy, he claimed from the start that he had no memory of doing so. And midway through Sirhan's trial, prosecutors provided his lawyers with an autopsy report that launched five decades of controversy: Kennedy was shot four times at point-blank range from behind, including the fatal shot behind his ear. But Sirhan, a 24-year-old Palestinian immigrant, was standing in front of him. Was there a second gunman? The debate rages to this day. Sirhan's appeals have been rejected ... as recently as 2016, even with the courts considering new evidence that has emerged over the years that as many as 13 shots were fired - Sirhan's gun held only eight bullets - and that Sirhan may have been subjected to coercive hypnosis, a real life "Manchurian candidate."
Note: In 2006, BBC described new evidence that placed "three senior CIA operatives at the scene of Robert Kennedy's assassination" and reported that Sirhan may have been a Manchurian Candidate programmed to act as a decoy for the real assassin. In 2011 the Boston Globe reported that RFK harbored suspicions that the CIA was behind his brother's murder. For more along these lines, see concise summaries of deeply revealing news articles on assassinations reported by reliable major media sources.
“My father was the chief law enforcement officer in this country,” Robert F. Kennedy Jr. recently told The Washington Post. “I think it would have disturbed him if somebody was put in jail for a crime they didn’t commit.” Kennedy’s second oldest son now believes ... that his father was killed by a second gunman. RFK Jr. even visited Sirhan Sirhan, the man convicted of shooting and killing his father, because he was “curious and disturbed by what I had seen in the evidence.” He isn’t the only one. “If you believe the LAPD reports about this case, there is no way that Sirhan did it and did it alone,” Dan Moldea, an investigative journalist and author of The Killing of Robert F. Kennedy, told Boston.com. Kennedy was assassinated ... on June 5, 1968, at the Ambassador Hotel in Los Angeles. Kennedy was walking through the hotel kitchen pantry [and] was shot from behind at point-blank range. Sirhan approached from the front, on Kennedy’s right. His gun never got closer than about a foot-and-a-half away [and] carried a maximum of just eight bullets. And yet, there’s evidence that suggests more than eight shots were fired. Who would the second gunman have been? Theorists most commonly point to ... Thane Eugene Cesar. Cesar was a security guard who hated the Kennedys. Cesar was also walking with Kennedy when the shooting occurred and ... owned a .22-caliber similar to Sirhan’s gun, which he initially told police he sold before the assassination, but had actually, it was later found, sold three months after the shooting.
Note: For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.
Survivors and families of those who allegedly underwent brainwashing experiments at McGill University in Montreal are planning a class-action lawsuit against the Quebec and federal governments because of what they claim had been done to them decades ago. Dr. Ewen Cameron, a former psychiatrist at McGill University’s Alan Memorial Institute, conducted CIA-funded experiments in the 1950s and 1960s involving sleeping drugs, electroshock therapy and the powerful hallucinogenic LSD to see if the brain could be reprogrammed. Patients entered the program - known as Project MKUltra - with relatively minor mental health issues, such as anxiety. “These were innocent people that went in for mild depression… They came out completely ravaged and their life was ruined,” Marlene Levenson, whose aunt was admitted to the facility, told CTV Montreal. Many victims of these experiments have since passed away, but some family members have documents that share first-hand accounts of what allegedly transpired at the facility. Angela Bardosh’s mother Nancy Layton showed CTV Montreal a letter from her mother that read in part: "They destroyed many parts of me. I'm lucky to be alive." Bardosh said Layton was admitted to the facility at age 18 due to depression. Within six months of Cameron’s treatment, her mother developed acute schizophrenia. The victims and their families have now banded together in the hopes of filing a class-action lawsuit against the Quebec and federal governments, and maybe even McGill too, seeking damages and an apology for what they had to endure.
Note: The Canadian government has been actively attempting to silence victims of this program for over forty years. Read more on the court cases stemming from Dr Ewen Cameron's CIA-funded experiments in this Times of London article. Read also an excellent summary on the involvement of doctors in the CIA's brainwashing experiments. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
Four decades ago, [CIA operative Stefan] Halper was responsible for a long-forgotten spying scandal involving the 1980 election. The Reagan campaign – using CIA officials managed by Halper, reportedly under the direction of former CIA Director and then-Vice-Presidential candidate George H.W. Bush – got caught running a spying operation from inside the Carter administration. The plot involved CIA operatives passing classified information about Carter’s foreign policy to Reagan campaign officials. Over the past several weeks, House Republicans have been claiming that the FBI during the 2016 election used an operative to spy on the Trump campaign, and they triggered outrage within the FBI by trying to learn his identity. On May 8, the Washington Post described the informant as “a top-secret intelligence source” and cited DOJ officials as arguing that disclosure of his name “could risk lives by potentially exposing the source, a U.S. citizen who has provided intelligence to the CIA and FBI.” But now ... everyone knows the name of the FBI’s informant: Stefan Halper. So as it turns out, the informant used by the FBI in 2016 to gather information on the Trump campaign was not some previously unknown, top-secret asset whose exposure as an operative could jeopardize lives. Quite the contrary: his decades of work for the CIA – including his role in an obviously unethical if not criminal spying operation during the 1980 presidential campaign – is quite publicly known.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in elections and in the intelligence community.
An American doctor and Naval reserve officer who has done extensive medical evaluation of a high-profile prisoner who was tortured under the supervision of Gina Haspel privately urged Sen. Mark Warner, the vice chair of the Senate Intelligence Committee, to oppose Haspel’s confirmation as CIA director. “I have evaluated Mr. Abdal Rahim al-Nashiri, as well as close to 20 other men who were tortured” in U.S. custody, including several who were tortured “as part of the CIA’s RDI [Rendition, Detention, and Interrogation] program. I am one of the only health professionals he has ever talked to about his torture,” Dr. Sondra Crosby, a professor ... at Boston University, wrote to Warner’s legislative director. “He is irreversibly damaged by torture that was unusually cruel. In my over 20 years of experience treating torture victims from around the world, including Syria, Iraq, and the Democratic Republic of Congo, Mr. al-Nashiri presents as one of the most severely traumatized individuals I have ever seen.” Nashiri was ... “rendered” to Afghanistan by the CIA and eventually taken to the Cat’s Eye prison in Thailand that was run by Haspel from October to December 2002. On Monday, The Intercept reported that a ... classified memo compiled by the [Senate Intelligence Committee] and aimed at examining Haspel’s full involvement with torture and destruction of evidence was removed from the Senate. It was supposed to be housed in a secure facility inside Congress, so senators and their staff could read it.
Note: The above article contains graphic descriptions of torture overseen and then covered up by Gina Haspel. Another article, by a former CIA counterterrorism officer who was imprisoned for blowing the whistle on the CIA torture, referred to Haspel's actions as "war crimes, crimes against humanity". For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The Justice Department’s Inspector General, Michael Horowitz, will soon release a much-anticipated assessment of Democratic and Republican charges that officials at the FBI interfered in the 2016 presidential campaign. That year-long probe ... is expected to come down particularly hard on former FBI director James Comey. An earlier [report] in April by Horowitz ... showed that the ousted deputy director of the FBI, Andrew McCabe, had lied to the bureau’s internal investigations branch to cover up a leak he orchestrated about Clinton’s family foundation less than two weeks before the election. Another IG report in March found that FBI retaliation against internal whistle-blowers was continuing despite years of bureau pledges to fix the problem. There have been other painful, more public failures as well: missed opportunities to prevent mass shootings that go beyond the much-publicized overlooked warnings in the Parkland, Fla., school killings; an anguishing delay in the sexual-molestation probe into Olympic gymnastics doctor Larry Nassar; and evidence of misconduct by agents in the aftermath of standoffs with armed militias in Nevada and Oregon. FBI agents are facing criminal charges ranging from obstruction to leaking classified material. And then there’s ... the FBI’s miss of the Russian influence operation against the 2016 election. Jeffrey Danik, a retired FBI agent ... blames the state of affairs on “a severe lack of leadership” and transparency at headquarters.
Note: A New York Times article titled "Terrorist Plots, Hatched by the FBI" sheds further light on questionable practices within The Bureau. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
In 1956, Velma Orlikow checked herself into a renowned Canadian psychiatric hospital, the Allan Memorial Institute in Montreal. Instead of improving, her condition deteriorated – and her personality underwent jarring changes. More than two decades passed before ... her family had an explanation, and it was much stranger than any of them could imagine: in 1977 it emerged that the CIA had been funding experiments in mind-control brainwashing at the institute as part of a North America-wide project known as MK Ultra. Orlikow was one of several hundred patients who became unwitting subjects of these experiments in Montreal in the late 1950s and early 60s. “It’s almost impossible to believe,” said her granddaughter, Sarah Anne Johnson. “Some of the things [psychiatrist Ewen Cameron] did to his patients are so horrible and unbelievable that it sounds like the stuff of nightmares.” Patients were subjected to high-voltage electroshock therapy several times a day, forced into drug-induced sleeps that could last months and injected with megadoses of LSD. After reducing them to a childlike state ... Cameron would attempt to reprogram them by bombarding them with recorded messages for up to 16 hours at a time. Years later, Johnson found out that the experiments had wreaked havoc on Orlikow’s brain; it could take her three weeks to read a newspaper, months to write a letter, and years to read a book. Similar scenes played out across Canada as former patients of the institute attempted to return to their lives. “It tainted our whole family,” said Alison Steel, whose mother was admitted to the institute in 1957.
Note: The Canadian government has been actively attempting to silence victims of this program for over forty years. Read more on the court cases stemming from Dr Ewen Cameron's CIA-funded experiments in this Times of London article. Read also an excellent summary on the involvement of doctors in the CIA's brainwashing experiments. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
President Trump vowed last year to release all the long-secret files related to the JFK assassination, but the administration announced Thursday that some documents will remain redacted until October 2021 for national security reasons. Trump gave the CIA, FBI and other agencies a deadline of April 26 to release documents related to the investigation into President John F. Kennedy’s assassination by Lee Harvey Oswald on Nov. 22, 1963, in Dallas. Trump ... had promised to release the entirety of the 5 million pages of records, most of which have been available since the late 1990s. Jefferson Morley, a former Washington Post staff writer ... said in an interview that he was disappointed by Trump’s decision to delay the full release for another three years and, possibly, beyond. “Trump said that all the JFK files will be released, but the truth is that thousands of JFK files are still secret. The clear intent of Congress was to have these released last October and now we’re talking about 2021,” Morley said. “The point is that the CIA wants to keep this secret forever. It’s a very clear statement of intent.” Morley also said that the Trump administration is not complying with the stipulations of the Kennedy Records Act, which requires that the administration provide declassified explanations for withheld documents. Morley, who has been fighting the CIA in federal court for the last 15 years ... said he was quickly going through the 19,000 files that were released Thursday and came across redactions that made little sense to him.
Note: See this USA Today article for a summary of files released in 2017 on the JFK assassination. For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.
MuckRock, a news organization that specializes in filing Freedom of Information Act (FOIA) requests with state and federal government bodies, received mysterious documents about mind control, seemingly by accident. Journalist Curtis Waltman was writing to the Washington State Fusion Center (WSFC), a joint operation between Washington State law enforcement and the federal government to request information about Antifa and white supremacist groups. He got responses to the questions he asked, but also a file titled "EM effects on human body.zip." At least some of the images [in the file] appear to be part of an article in Nexus magazine describing a 1992 lawsuit brought by one John St. Clair Akewi against the NSA. Akewi claimed that the NSA had the "ability to assassinate US citizens covertly or run covert psychological control operations to cause subjects to be diagnosed with ill mental health" and was documenting their alleged methods. The federal government has absolutely experimented with mind control in a variety of methods, but the documents here do not appear to be official. Waltman had no idea why these documents were included in his request and isn't sure why the government is holding them. The WSFC did not respond to requests for more information.
Note: Text and images from the Nexus magazine article referenced above are available on this page. For more along these lines, see our resource-filled mind control information center and concise summaries of deeply revealing mind control news articles from reliable major media sources.
Bloomberg Government reports on a FedBizOpps.gov posting by the Department of Homeland Security (DHS) with the relatively benign-sounding subject “Media Monitoring Services.” The details of the attached Statement of Work, however, outline a plan to gather and monitor the public activities of media professionals and influencers and are enough to cause nightmares of constitutional proportions, particularly as the freedom of the press is under attack worldwide. As part of its "media monitoring," the DHS seeks to track more than 290,000 global news sources as well as social media. The successful contracting company will have "24/7 access to a password protected, media influencer database" ... in order to "identify any and all media coverage related to the Department of Homeland Security or a particular event." The database will be browsable by "location, beat and type of influencer," and for each influencer, the chosen contractor should "present contact details and ... an overview of the previous coverage published by the media influencer." Increasing government encroachment on the freedom of the press is the sinister backdrop to all of this. Freedom House ... recently concluded that global media freedom has reached its lowest level in the past 13 years. The independent watchdog organization blames "new threats to journalists and media outlets in major democracies" as well as "further crackdowns on independent media in authoritarian countries like Russia and China."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
The U.S. military took more than four years to process a Freedom of Information Act request for a copy of the Guantánamo guidelines for censoring prison library material - and censored the guidelines when it processed the request. The paperwork the military released appeared to leave out three pages of the prison’s procedure for handling the Quran. The Miami Herald sought the Nov. 27, 2013, document in a Dec. 10, 2013, FOIA request. The U.S. Southern Command apparently released the document, with redactions, on March 21 but didn’t put it in the mail for five more days. It arrived at the Herald newsroom, which is next door to Southcom, on Tuesday. The Guantánamo prison is a Law of War detention site run by the Pentagon; left unclear was the U.S. military’s law enforcement or prosecution function related to the Detainee Library, which circulates books among 26 of the prison’s 41 detainees. Of those 26, only two have been convicted of war crimes. Former CIA captives at the clandestine Camp 7 prison, including those accused of plotting the 9/11 attacks, don’t have privileges at the main library but can draw from a different, secret collection. In May 2016, a U.S. Army officer in charge of detainee diversionary programs told reporters that “negative screening criteria” included military topics, extreme graphic violence, nudity, sexuality and extremism. Many of the prison’s current detainees were held by the CIA for weeks or years before their transfer to U.S. military custody.
Note: A letter titled, "Will I Die At Guantanamo Bay? After 15 Years, I Deserve Justice" was recently published by Newsweek. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Ecuador has cut Julian Assange’s communications with the outside world from its London embassy, where the founder of the whistleblowing WikiLeaks website has been living for nearly six years. The Ecuadorian government said in statement that it had acted because Assange had breached “a written commitment made to the government at the end of 2017 not to issue messages that might interfere with other states”. The move came after Assange tweeted on Monday challenging Britain’s accusation that Russia was responsible for the nerve agent poisoning of a Russian former double agent and his daughter in the English city of Salisbury earlier this month. Ecuador previously cut Assange’s internet access in the embassy in October 2016 over fears he was using it to interfere in the US presidential election following Wikileaks’ publication of leaked emails from the Democratic National Committee (DNC) and Hillary Clinton’s campaign adviser, John Podesta. In May 2017 the Ecuadorian president, Lenin Moreno, again asked Assange to refrain from commenting on Spain’s dispute with the separatist region of Catalonia. Assange had tweeted that Madrid was guilty of “repression”. As part of a subsequent agreement between Assange and the Ecuadorian government, he is not permitted to send any messages that could interfere with Ecuador’s relations with other countries.
Note: Despite the "legal limbo" and propaganda campaign carried out against Assange and Wikileaks, Assange was recently granted Ecuadorian citizenship. A 2016 United Nations panel found that authorities in Sweden and the UK have acted unlawfully with regard to Assange. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The father of the 29-year-old who killed 49 people at an Orlando nightclub in the summer of 2016 was an FBI informant who came under scrutiny himself after investigators found receipts for money transfers to Turkey and Afghanistan in the wake of the mass shooting. The revelation came in documents filed by attorneys for the shooter’s wife, Noor Salman, who is on trial in Orlando on allegations that she aided and abetted her husband’s attack and obstructed law enforcement’s investigation into it. Salman’s trial has been underway for weeks, but defense attorneys argued that they were not informed until Saturday of the father’s work for the FBI. That, they argued, is grounds to dismiss the charges. Seddique Mateen - the father of Omar Mateen - was an FBI informant at various points between January 2005 and June 2016, court documents say. Salman’s attorneys argued in court filings that if they had known of Seddique Mateen’s work for the bureau, they might have explored ... whether the FBI’s interviews with Salman were an attempt at “evading the negligence they exercised with their own informant,” and whether their “unwavering focus on Noor Salman, rather than Seddique Mateen, could have been designed to find a culprit other than the father.” The FBI has previously come under criticism for investigating Omar Mateen for 10 months starting in 2013 and ultimately concluding he was not a threat.
Note: Noor Salman was acquitted shortly after this information came out. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Saudi Crown Prince Mohammed bin Salman said Thursday it would be “really insane” for him to trade classified information with presidential son-in-law and White House adviser Jared Kushner. Speaking in a meeting with Washington Post editors and reporters, Mohammed denied U.S. media reports that he had claimed Kushner was “in his pocket,” or that ... he had sought or received a green light from Kushner for massive arrests of allegedly corrupt members of the royal family and Saudi businessmen that took place in the kingdom. The detentions were solely a domestic issue and had been in the works for years, the prince said. The son of King Salman and heir to the Saudi throne, Mohammed, 32, met with President Trump on Tuesday in the Oval Office and over lunch. He also spoke with a number of congressional leaders. Even as Trump has said he is seeking increased investment and purchases of U.S. military equipment and other products from Saudi Arabia, Mohammed has made clear that his primary mission here is to win U.S. investor confidence in his country. Asked about the Saudi-funded spread of Wahhabism, the austere faith ... that some have accused of being a source of global terrorism, Mohammed said that investments in mosques and madrassas overseas were rooted in the Cold War, when allies asked Saudi Arabia to use its resources to prevent inroads in Muslim countries by the Soviet Union. Successive Saudi governments lost track of the effort, he said.
Note: 531,525 diplomatic cables from 1979 published by Wikileaks shed light on how Saudi Arabia and the CIA fueled the rise of modern Islamic terrorism. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism.
In the 1970s, a handsome ex-Israeli army paratrooper popularized extrasensory perception, or ESP. Uri Geller claimed he could ... see inside sealed containers, and even read other people's minds. Geller ... caught the eye of the intelligence community. "Scientists would consider, 'Wait a minute, maybe we can read the minds of other government officials, [or] see inside a nuclear facility in Russia,'" said national security reporter Annie Jacobsen. Jacobsen has written about the U.S. government's ... attempts to use Uri Geller, and others like him, for psychic espionage. "It's sort of like a highly-classified black program inside of a black program," Jacobsen said. "One, because you don't want the Russians or the Chinese to know what we are doing; and two, because a lot of scientists didn't want their colleagues to know what they were doing." In the 1980s, the Defense Intelligence Agency began "Project Star Gate," which was, according to Dean Radin, a scientist who worked on the program, top secret. The program employed about a dozen psychics and mediums. Its aim: espionage. Angela Ford was with Project Star Gate for nine years. She calls herself a medium; the Defense Department preferred "remote viewer." Her assignment? To look for missing hostages and fugitives without ever leaving a building at Fort Meade in Maryland. She recalled one assignment, in 1989, when she says she was able to psychically track down a former customs agent who had allegedly gone rogue.
Note: Explore lots more solid information on remote viewing – the government's psychic spying program. Could it be that key elements in government don't want us to know of the unlimited powers contained within each of us? See undeniable evidence that remote viewing was quite successful.
I was inside the CIA’s Langley, Va., headquarters on Sept. 11, 2001. I headed counterterrorism operations in Pakistan from January to May 2002. My team captured dozens of al-Qaeda fighters, including senior training-camp commanders. One of the fighters whom I played an integral role in capturing was Abu Zubaida, mistakenly thought at the time to be the third-ranking person in the militant group. By that May, the CIA had decided to torture him. When I returned to CIA headquarters that month, a senior officer in the Counterterrorism Center asked me if I wanted to be “trained in the use of enhanced interrogation techniques.” I declined. I said that I had a moral and ethical problem with torture and that - the judgment of the Justice Department notwithstanding - I thought it was illegal. Unfortunately, there were plenty of people in the U.S. government who were all too willing to allow the practice to go on. One of them was Gina Haspel, whom President Trump nominated Tuesday as the CIA’s next director. Putting Haspel in charge of the CIA would undo attempts by the agency - and the nation - to repudiate torture. The message this sends to the CIA workforce is simple: Engage in war crimes, in crimes against humanity, and you’ll get promoted. Don’t worry about the law. Don’t worry about ethics. Don’t worry about morality or the fact that torture doesn’t even work. Go ahead and do it anyway. We’ll cover for you. And you can destroy the evidence, too.
Note: The above was written by former CIA counterterrorism officer John Kiriakou, who was imprisoned for blowing the whistle on the CIA’s illegal torture program. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Ex-CIA Director James Woolsey said it himself. Yes, the U.S. meddles in other countries elections. But when we do it, it’s for the right reasons. “Only for a very good cause,” he says, because our government is ensuring foreign elections result in “democracy.” But doesn’t democracy demand that people decide for themselves? And how well has U.S. meddling actually worked out? According to Carnegie Mellon University researcher Dov Levin, the United States has attempted to sway elections in other countries more than 80 times worldwide between 1946 and 2000. But those 80+ instances of the U.S. interfering with other nations elections does not include regime change efforts. In the 1970s in Chile, the CIA conducted a botched kidnapping of General René Schneider, the Chilean Army’s commander-in-chief, that resulted in Schneider’s death. The plot was an effort to undermine the presidency of Salvador Allende, which may have fueled the violent coup that led to Allende’s overthrow. In 1974, Henry Kissinger was quoted in Newsweek, saying about Chile: “I don’t see why we have to let a country go communist due to the irresponsibility of its own people.” Levin’s tally also does not include covert coup d’etats where our government overthrows a foreign leader like the the U.S. did in Iran in 1953 or in Guatemala in 1954. In fact, Salon magazine documents 35 nations in which the United States has overthrown legitimate governments and or supported fascists, drug lords or terrorists. U.S. intervention is rarely about democracy.
Note: Truth in Media is one of the few media outlets speaking truth from a balanced place with reliable facts can be verified. Don't miss the excellent video at the webpage above. For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources.
When it comes to torture, no American officials have been more practiced in those heinous dark arts than the officers and employees of the Central Intelligence Agency who applied it to terrorism suspects after 9/11. Few American officials were so directly involved in that frenzy of abuse ... as Gina Haspel. On Tuesday, in announcing that he had dismissed Rex Tillerson as secretary of state and was replacing him with Mike Pompeo, the C.I.A. director, Mr. Trump said that Mr. Pompeo’s successor would be his deputy, Ms. Haspel. As an undercover C.I.A. officer, Ms. Haspel played a direct role in the agency’s “extraordinary rendition program,” under which suspected militants were ... were tortured by agency personnel. Ms. Haspel ran the first detention site in Thailand and oversaw the brutal interrogation of the Abd al-Rahim al-Nashiri. The sessions were videotaped and the recordings stored in a safe at the C.I.A. station in Thailand until they were ordered destroyed in 2005. Ms. Haspel’s name was on the cable with the destruction orders. In 2013, these activities were of such concern that Senator Dianne Feinstein of California ... blocked Ms. Haspel’s promotion to be head of the agency’s clandestine service. Senator John McCain ... a former prisoner of war, insisted that during the confirmation process, Ms. Haspel must “explain the nature and extent of her involvement” in the interrogation program.
Note: Read the thoughts of a former CIA counterterrorism officer on the dangers of this appointment. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
One of the very first things I was taught when I joined the C.I.A. was that we do not conduct assassinations. It was drilled into new recruits over and over again. Today, it seems that all that is left of this policy is a euphemism. We don’t call them assassinations anymore. Now, they are “targeted killings,” most often performed by drone strike, and they have become America’s go-to weapon in the war on terror. There have been many who have objected, claiming that the killings inspire more attacks on the United States, complicate our diplomacy and undermine our moral authority in the world. Yet the targeted killings drone on with no end in sight. Just counting the campaigns in Pakistan, Yemen and Somalia, the Bush administration conducted at least 47 targeted killings by drones, while under the Obama administration that number rose to 542. America’s difficult relationship with targeted killing and the dilemmas we may face in the future are beautifully illuminated by the longer story of Israel’s experiences with assassination in its own endless war against terrorism. Israel has always been just a bit farther down this slippery slope than the United States. Americans now have a terrific new introduction to that story with the publication of Ronen Bergman’s “Rise and Kill First: The Secret History of Israel’s Targeted Assassinations.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on war and assassinations.
The Florida sheriff whose department responded to this month's high school massacre defended his leadership Sunday while insisting that only one of his deputies was on the scene as the gunman killed 14 students and three staff members. Broward County Sheriff Scott Israel told CNN that investigators are looking into claims that three other deputies were on the scene but failed to enter the school when the chance to save lives still existed. Israel and the sheriff's office have come under withering scrutiny after last week's revelation that deputy Scot Peterson did not go in to confront the suspected shooter, 19-year-old Nikolas Cruz, during the Valentine's Day attack. It is also facing backlash for apparently mishandling some of the 18 tipster calls related to the suspected shooter. The tips were among a series of what authorities now describe as the clearest missed warning signs that Cruz ... posed a serious threat. The FBI has acknowledged that it failed to investigate the tip about Cruz that the agency received on Jan. 5. A transcript of the phone call [to the FBI] spanned more than 13 minutes. During the call, the woman described a teenager prone to anger with the "mental capacity of a 12 to 14 year old" that deteriorated after his mother died last year. She pointed the FBI to several Instagram accounts where Cruz had posted photos of sliced-up animals and rifles and ammunition he apparently purchased with money from his mother's life insurance policy. "He's thrown out of all these schools because he would pick up a chair and just throw it at somebody, a teacher or a student, because he didn't like the way they were talking to him."
Note: The above article describes problems in government organizations that allowed a threat to become a tragedy, but does not mention the well-documented connection between prescription drugs and mass shootings.
Broward County deputies received at least 18 calls warning them about Nikolas Cruz from 2008 to 2017, including concerns that he "planned to shoot up the school" and other threats and acts of violence before he was accused of killing 17 people at a high school. The warnings, made by concerned people close to Cruz, came in phone calls to the Broward County Sheriff's Office, records show. At least five callers mentioned concern over his access to weapons, according to the documents. None of those warnings led to direct intervention. In February 2016, neighbors told police that they were worried he “planned to shoot up the school”. The new details add to the growing list of red flags missed by law enforcement officials, including the FBI, in the months leading up to last week's mass shooting at Marjory Stoneman Douglas High School. The FBI is reviewing why a tip last month called into the agency about Cruz's desire to kill people was not forwarded to Miami agents for investigation. The Sheriff’s Office has since opened two internal affairs investigations looking into whether its deputies followed the department’s standards after receiving two phone calls. After the February 2016 call, a deputy forwarded the information to the Stoneman Douglas School Resource Officer, Deputy Scot Peterson. Peterson, 54, retired after an internal investigation was launched into why he sat outside the school for about four minutes and never entered as the shooter killed students and staff.
Note: The above article describes problems in government organizations that allowed a threat to become a tragedy, but does not mention the well-documented connection between prescription drugs and mass shootings.
A group of American diplomats stationed in Havana appear to have symptoms of concussion without ever having received blows to their heads, medical experts have found. The diplomats originally were said to have been victims of a “sonic attack,” a possibility that the Federal Bureau of Investigation reportedly ruled out. The experts’ report, published late Wednesday in the journal JAMA, does not solve the mystery, instead raising even more questions about what could have caused the brain injuries. The incidents occurred in 2016, when 18 of the 21 affected diplomats reported they heard strange sounds in their homes or hotel rooms. All but one reported immediate symptoms: headache, pain in one ear, loss of hearing. Days or weeks later, other symptoms emerged. The State Department asked researchers at the University of Pennsylvania to investigate. Their report confirmed neurological problems in the diplomats, including signs of what appear to be concussions. The study’s lead author, Dr. Douglas H. Smith [said], “This is ... concussion without blunt head trauma.” Like concussion patients, some of the diplomats improved on their own, while others recovered only after therapy. Dr. Smith and his colleagues do not think audible sound caused the injuries. Perhaps, they speculated, a device that produced another sort of harmful energy also produced an audible sound. Low-frequency infrasound, high-frequency ultrasound and microwaves have all been shown to damage the brain, the researchers noted.
Note: Was this a false flag attack using non-lethal weapons to get the US out of Cuba? More here.
Last week, the existence of a draft Department of Homeland Security (DHS) report came to light, which calls for long-term surveillance of Sunni Muslim immigrants. Internal documents obtained from the FBI and DHS last year also showed how the agencies are surveilling the Movement for Black Lives, bringing into mind tactics of Cointelpro, an FBI program which secretly and illegally conducted surveillance on the civil rights movement in order to disrupt Americans’ ability to organize politically. But these are not the only types of surveillance this administration is engaged in. On 18 October, DHS implemented a new rule to track the internet activity of all visa applicants, visa holders and legal permanent residents. The rule would also apply to naturalized US citizens. The new rule would track and store social media account information and other highly sensitive data as part of individuals’ immigration files. The policy would allow DHS to collect and track immigrants’ social media accounts handles as well as aliases, and search results from both public search engines as well as commercial databases. The rule ... seems like it was designed with the specific purpose of hampering our freedom of speech, in line with the Trump administration’s other chilling tactics of attacks on the press and crackdowns on protesters who do not fall in line with the policies of this administration. This covert surveillance, now culminating in overt spying on immigrants, is designed as a tactic to control and fracture dissent.
Note: Read more about the FBI's infamous Cointelpro program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
The National Security Agency maintains a page on its website that outlines its mission statement. Since at least May 2016, the surveillance agency had featured honesty as the first of four “core values” listed on NSA.gov, alongside “respect for the law,” “integrity,” and “transparency.” On January 12, however, the NSA removed the mission statement page – which can still be viewed through the Internet Archive – and replaced it with a new version. Now, the parts about honesty and the pledge to be truthful have been deleted. The agency’s new top value is “commitment to service,” which it says means “excellence in the pursuit of our critical mission.” Those are not the only striking alterations. All references to “trust,” “honor,” and “openness” have disappeared. The agency previously stated on its website that it embraced transparency and claimed that all of its activities were aimed at “ensuring the safety, security, and liberty of our fellow citizens.” That has also been discarded. The new list of values includes the additions “respect for people” and “accountability.” But the section on respecting people is a reference to diversity within the NSA workforce, not a general commitment to members of the public. Accountability is defined as taking “responsibility for our decisions.” The one core value that remains essentially unchanged is “respect for the law,” which the agency says means it is “grounded in our adherence to the U.S. Constitution and compliance with the U.S. laws, regulations and policies that govern our activities.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
The White House can now direct US intelligence agencies to spend money and take covert action without approval of congressional oversight committees under a provision slipped into the bill that ended the government shutdown, leaders of the Senate intelligence committee say. A provision in the bill - requested by the White House and Pentagon - gives intelligence agencies an exemption from the law that requires them to get authorization from the intelligence committees before they spend taxpayer money, said Sen. Richard Burr, R-N.C., and chairman of the Senate panel. Section 504 of the National Security Act gives the committees the power to withhold money from the intelligence agencies if they object to surveillance programs or other intelligence activities. Burr and [Sen. Mark] Warner said the provision to weaken their oversight power comes just after they promised civil liberties advocates in the Senate that they would ensure that the FBI and other intelligence agencies don't overstep their bounds in carrying out a controversial surveillance program recently renewed by Congress. That surveillance program, Section 702 of the Foreign Intelligence Surveillance Act ... sweeps up emails, text messages, photos and other communication from an unknown number of Americans, and allows federal agents to search that data without a warrant. Burr and Warner both supported a six-year renewal of the program earlier this month.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
The National Security Agency has apparently been way ahead of Apple or Amazon. The agency has at its disposal voice recognition technology that it employs to identify terrorists, government spies, or anyone they choose — with just a phone call, according to a report by The Intercept. By using recorded audio, the NSA is able to create a "voiceprint," or a map of qualities that mark a voice as singular, and identify the person speaking. According to a classified memo ... the agency has employed this technology since at least 2006, with the document referencing technology "that identifies people by the sound of their voices." In fact, the NSA used such technology during Operation Iraqi Freedom, when analysts were able to verify audio thought to be of Saddam Hussein speaking. It suggests that national security operatives had access to high-level voice technology long before Amazon, Apple and Google's solutions became cultural touchstones. A "voiceprint" is "a dynamic computer model of the individual's vocal characteristics," the publication explained, created by an algorithm analyzing features like pitch and mouth shape. Then, using the NSA's formidable bank of recorded audio files, the agency is able to match the speaker to an identity. Identifying people through their voiceprints is a skill at which the "NSA reigns supreme," according to a leaked document from 2008. And, they're only getting better.
Note: As this BBC article from 1999 shows, mass surveillance systems with voice recognition capability have been in use for many years. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
A four-page memo circulating in Congress that reveals alleged United States government surveillance abuses is being described by lawmakers as “shocking.” The lawmakers said they could not yet discuss the contents of the memo they reviewed on Thursday after it was released to members by the House Intelligence Committee. But they say the memo should be immediately made public. “It is so alarming the American people have to see this,” Ohio Rep. Jim Jordan said. “It's troubling,” North Carolina Rep. Mark Meadows said. “Part of me wishes that I didn't read it because I don’t want to believe that those kinds of things could be happening in this country that I call home and love so much.” The House Intelligence Committee on Thursday approved a motion by New York Rep. Pete King to release the memo on abuses of FISA, or the Foreign Intelligence Surveillance Act, to all House members. The memo details the Intelligence Committee’s oversight work for the FBI and Justice, including the controversy over unmasking and FISA surveillance. The process for releasing it to the public involves a committee vote. If approved, it could be released as long as there are no objections from the White House within five days. On Thursday, the Senate voted 65-34 to reauthorize a FISA provision that allows U.S. spy agencies to conduct surveillance on foreign targets abroad for six years.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Two New York Times reporters learned in 2004 that the George W. Bush administration was secretly wiretapping Americans, and collecting their phone and email records. The reporters’ attempt to publish their findings were thwarted by the administration’s intense and successful lobbying of their editors. That effort ... had an unlikely ally: Rep. Jane Harman of Los Angeles, the senior Democrat on the House Intelligence Committee. Details of the far-reaching, legally unauthorized surveillance program remained secret until the Times published the article in late 2005. The newspaper’s interactions with administration officials, and Harman’s role, were described by former Times reporter James Risen this month in the Intercept, the investigative publication where he now works. The story on the program known as Stellar Wind was ready for publication before the November 2004 election, when Bush was on the ballot, but NSA Director Michael Hayden and other administration officials told Times editors, in phone calls and face-to-face meetings, that publication would damage national security and endanger lives, Risen said. He said the officials were joined in that effort by Harman, one of a handful of congressional leaders who had been briefed on the program and were enlisted by the White House to contact the Times. Members of Congress learned later that the NSA had not been seeking warrants from a secret court, as required by law, before wiretapping calls.
Note: James Risen is a courageous hero who shared two Pulitzer Prizes for his reporting around 9/11 and massive government surveillance. His recent article in The Intercept describes how a "marketplace of secrets in Washington" supports the US national security apparatus, and is used by corrupt government officials to manipulate the news.
Ecuador has granted citizenship to WikiLeaks founder Julian Assange, Ecuador's Foreign Minister Maria Fernanda Espinosa announced Thursday. She called the measure "one more ring of protection" for Assange, who has been holed up at the Ecuadorian Embassy in London since 2012 in an effort to avoid a Swedish arrest warrant. Sweden dropped the charges in May 2017, but Assange remains the subject of a UK arrest warrant. Assange ... has previously expressed concern that if he leaves the Ecuadorian embassy in London he could end up being extradited to the US, where he fears facing the death penalty over allegations of revealing government secrets through WikiLeaks. In December, the Ecuadorian government requested diplomatic status for Assange. But the UK rebuffed the request. Espinosa said Ecuador will continue to pursue a dialogue with the UK to eventually remove Assange from the embassy. "We will continue to protect Julian Assange while his physical and psychological integrity are at risk," Espinosa said. "We are a country that defends human rights and ... respects international law." A 2016 United Nations report concluded that the WikiLeaks founder had been arbitrarily detained by Sweden and the United Kingdom.
Note: Read more about the "legal limbo" and propaganda campaign carried out against Assange and Wikileaks. A 2016 United Nations panel found that authorities in Sweden and the UK have acted unlawfully with regard to Assange. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
I was captured when I was in my 20s and brought to Guantanamo Bay in 2004, after more than two years in secret prisons. I have been imprisoned here without charges since then. I am now 43. Thirteen years ago, your country brought me here because of accusations about who I was. Confessions were beaten out of me in those secret prisons. I tried, but I am no longer trying to fight against those accusations from the past. What I am asking today is, how long is my punishment going to continue? Your president says there will be no more transfers from here. Am I going to die here? If I have committed crimes against the law, charge me. In 15 years, I have never been charged, and the worst things the government has said about me were extracted by force. The judge in my habeas case decided years ago that I had been subjected to physical and psychological abuse during my interrogations, and statements the government has wanted to use against me are not reliable. Even if I were cleared, it would not matter. There are men here who have been cleared for years who are sitting in prison next to me. Detainees here, all Muslim, have never had rights equal to other human beings. Even when we first won the right to challenge our detention, in the end, it became meaningless. It is hard for me to ... believe that laws will not be bent again to allow the government to win. But this week, I am joining a group of detainees here, all of us who have been held without charges for years, to try again to ask the courts for protection.
Note: The above was written by Sharqawi Al Hajj, a Yemeni citizen detained at Guantanamo Bay. For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
The Obama administration was demanding that I reveal the confidential sources I had relied on for a chapter about a botched CIA operation in my 2006 book, “State of War.” I had also written about the CIA operation for the New York Times, but the paper’s editors had suppressed the story at the government’s request. It wasn’t the only time they had done so. My case was part of a broader crackdown on reporters and whistleblowers that had begun during the presidency of George W. Bush and continued far more aggressively under the Obama administration, which had already prosecuted more leak cases than all previous administrations combined. I started covering the CIA in 1995. Success as a reporter on the CIA beat inevitably meant finding out government secrets, and that meant plunging headlong into the classified side of Washington, which had its own strange dynamics. I discovered that there was, in effect, a marketplace of secrets in Washington, in which White House officials and other current and former bureaucrats, contractors, members of Congress, their staffers, and journalists all traded information. This informal black market helped keep the national security apparatus running smoothly, limiting nasty surprises for all involved. The revelation that this secretive subculture existed, and that it allowed a reporter to glimpse the government’s dark side, was jarring. It felt a bit like being in the Matrix.
Note: Article author James Risen is a courageous hero who shared two Pulitzer Prizes for his reporting around 9/11 and massive government surveillance. If you read the entire article at the link above, you will learn in detail how the New York Times and other media bow to government pressure and filter what information reaches the public. They also have a strong, but secretive agenda to support war and the military-industrial complex. You will also see how government keeps the media from reporting some of the most important stories.
Half-a-dozen 2017 releases of long-secret documents about the assassination of President John F. Kennedy have given plenty of new leads to those who don’t believe alleged gunman Lee Harvey Oswald acted alone. The 34,963 documents ... have fed the fire tended by researchers and others who believe there is much more to the story how a U.S. president was assassinated in Dallas 54 years ago. One particular document from the August release has created much buzz. It that shows that Earle Cabell, mayor of Dallas at the time of the Nov. 22, 1963, shooting, became a CIA asset in late 1956. Another revelatory JFK document released in full on Dec. 15 was the transcript of a 1978 interview by the House Select Committee on Assassinations with Orest Pena. According to Pena, a bar owner in New Orleans, Lee Harvey Oswald was a U.S. government agent or informant. How did he know? Because Pena himself was an informant. He had given details to the Warren Commission in July 1964 but, as the new document shows, later revealed much more detail about Warren de Brueys, an FBI agent in New Orleans to whom Pena said he reported. Oswald, he claimed, frequented a breakfast place regularly not only with de Brueys but with agents from U.S. Customs and Immigration. Pena believed Oswald had an office in the same government complex. Pena also testified to the House panel that de Brueys had threatened him if he shared with investigators details of their meetings and training of anti-Castro instigators.
Note: Watch an excellent five-minute segment of the History Channel's "Men Who Killed Kennedy," For more along these lines, see our excellent resource center filled with reliable information questions what really happened in the JFK assassination.
Forty years after revelations that the U.S. Central Intelligence Agency funded brainwashing experiments on unsuspecting Canadians, the Trudeau government is continuing a pattern of silencing the victims. A recent Department of Justice gag order in an out-of-court settlement was designed to avoid responsibility and avert compensation to more victims and their families, said Alan Stein, [a lawyer] who has represented numerous survivors who were once patients at the Allan Memorial Institute in Montreal. Successive federal governments have demanded confidentiality agreements in at least five of the cases he has settled. The Trudeau government's quiet non-disclosure payment in March 2017 to the daughter of a now-deceased victim is just the latest development in a decades-old scandal that saw both the CIA and the Canadian government fund brutal science experiments on unsuspecting patients. Revelations of mental torture on hundreds of Canadian patients first surfaced in the late 1970s. At the centre of the controversy was Dr. Ewen Cameron, a respected psychiatrist and first director of the Allan Memorial Institute, the psychiatric facility at McGill University where the brainwashing experiments took place from 1950 to 1965. Cameron ... ran experiments called "psychic driving" and "depatterning" that attempted to erase a patient's memories and reprogram them with new thoughts. To this day, neither the CIA nor the Canadian government has apologized for its role in the experiments.
Note: Read more on the court cases stemming from Dr Ewen Cameron's CIA-funded experiments in this Times of London article. Read also an excellent summary on the involvement of doctors in the CIA's brainwashing experiments. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
The secret letter was tucked inside the pages of an old book. It had been written by FBI Director J. Edgar Hoover to a top lieutenant, condemning civil rights leader Martin Luther King Jr. [in] 1964. Hoover the previous day had assailed King at a news conference as “the most notorious liar in the country.” Now he was writing a colleague privately to say he hoped King was getting his “just deserts.” Four years later, King would be assassinated. And the letter ... sheds yet more light on the historic malice the FBI director had toward King. Washington scholar James L. Swanson said he found the letter ... clipped to a page in [a book] he purchased. “This is a hitherto unknown and unpublished letter,” Swanson said. “What happened was this: It was announced [the previous month] that Dr. King had been awarded the Nobel Peace Prize, and that provoked Hoover,” he said. Hoover believed that King and his movement were threats to the social order. The FBI had begun wiretapping King’s home and office, and bugging his hotel rooms. No serious links to communism were uncovered, but hints about King’s sexual dalliances allegedly were. Days after Hoover’s news conference, a salacious anonymous letter was delivered to King’s wife. This letter was ... in a package that also [contained] a tape recording that allegedly captured evidence of King’s sexual misconduct. King suspected that the FBI was behind the letter. Sullivan ... later admitted his involvement in the plan during testimony before a Senate committee.
Note: Watch an excellent, six-minute clip from Canada's PBS giving powerful evidence based on the excellent work of William Pepper that King was assassinated by factions in government that wanted his movement stopped. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and assassinations.
Mike Beck, a National Security Agency counterintelligence officer, could always bang out 60 words a minute. But in early 2006, Beck struggled to move his fingers at their usual typing speed. Soon after, a brain scan showed why: Beck had Parkinson's disease, the second-most-common neurodegenerative disorder in the United States. He was only 46 - unusually young for Parkinson's. No one in his family had ever had it. Then, in an unsettling coincidence, he learned that an NSA colleague — a man he'd spent a pivotal week in 1996 with in a hostile country — had also just been diagnosed with Parkinson's. Eventually, Beck read a classified intelligence report that convinced him that he and his co-worker on the trip were likely the victims of a covert attack that led to their illnesses - and that has prompted a highly unusual workers' compensation claim. Beck believes that while he and his colleague were sleeping in their hotel rooms, the hostile country, which he cannot name for security reasons, deployed a high-powered microwave weapon against them, damaging their nervous systems. For the last four years, Beck, 57, has been trying to persuade the Labor Department to award him 75 percent of his salary, or about $110,000 a year. But the Labor Department won't approve Beck's request without solid evidence that he was targeted. In Beck's case — short of obtaining proof from the hostile nation's spy service — he'd need the endorsement of the NSA, which has refused to provide it.
Note: To learn about how electromagnetic weapons can be used to torture anyone without legal recourse, listen to this revealing interview. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and non-lethal weapons.
The U.S. government [planned] false flag attacks with Soviet aircraft to justify war with the USSR or its allies, newly declassified documents surrounding the assassination of President John F. Kennedy show. In a three-page memo, members of the National Security Council wrote, "There is a possibility that such aircraft could be used in a ... provocation operation in which Soviet aircraft would appear to attack US or friendly installations to provide an excuse for U.S. intervention." The memo shows that the department, along with the CIA, considered buying Soviet aircraft to stage the attacks, even getting estimates from the Air Force on how long it would take and how much it would cost to produce the planes domestically and covertly. The document also outlined the possibility of purchasing such aircraft from non-Soviet Bloc countries that had received planes from the USSR, or from pilots that had defected, instead of building them domestically. The CIA deemed those plans too risky. It is unclear when the memo was written or circulated. The NSC staff mention a meeting on March 22, 1962, when a "Special Group" discussed the attorney general's questions about acquiring Soviet aircraft. The document was last reviewed by the CIA in February 1998, and a stamp shows it was declassified in March 2016. But, strangely, the document's cover letter shows a date of "00/00/00."
Note: ABC News back in 2001 was the only major media to report on Operation Northwoods, which is the code name for a very similar plan, when the first documents on this were declassified. As these earlier documents show, the plan was approved by the top Pentagon chiefs to create a pretext for war with Cuba by sinking an American ship in the Havana harbor or creating a "terror campaign" in cities like Miami and Washington D.C. Why was this stunning news only reported by ABC? For a possible reason, see this excellent summary of testimony by major media whistleblowers.
Jake Williams, [a] cybersecurity expert, was dismayed to discover that ... the Shadow Brokers, a mysterious group that had somehow obtained many of the hacking tools the United States used to spy on other countries [had] identified him - correctly - as a former member of the National Security Agency’s hacking group, Tailored Access Operations, or T.A.O., a job he had not publicly disclosed. Then the Shadow Brokers astonished him by dropping technical details that made clear they knew about highly classified hacking operations that he had conducted. America’s largest and most secretive intelligence agency had been deeply infiltrated. Current and former agency officials say the Shadow Brokers disclosures, which began in August 2016, have been catastrophic for the N.S.A., calling into question its ability to protect potent cyberweapons and its very value to national security. Fifteen months into a wide-ranging investigation by the agency’s counterintelligence arm, known as Q Group, and the F.B.I., officials still do not know whether the N.S.A. is the victim of a brilliantly executed hack ... an insider’s leak, or both. Three employees have been arrested since 2015 for taking classified files, but there is fear that one or more leakers may still be in place. There is broad agreement that the damage from the Shadow Brokers already far exceeds the harm to American intelligence done by Edward J. Snowden, the former N.S.A. contractor who fled with four laptops of classified material in 2013. For decades after its creation in 1952, the N.S.A. — No Such Agency, in the old joke — was seen as all but leakproof. But since Mr. Snowden flew away with hundreds of thousands of documents in 2013, that notion has been shattered.
Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The FBI’s background-check system is missing millions of records of criminal convictions, mental illness diagnoses and other flags that would keep guns out of potentially dangerous hands. Experts who study the data say government agencies responsible for maintaining such records have long failed to forward them into federal databases used for gun background checks. As the shooting at a Texas church on Sunday showed, what the FBI doesn’t know can get people killed. In that case, the gunman had been convicted at a court-martial of charges stemming from a domestic violence case. Officials say the Air Force never notified the FBI of his conviction, so when he purchased weapons at a retail store, he cleared the background check. The FBI said it doesn’t know the scope of the problem, but the National Rifle Association says about 7 million records are absent from the system, based on a 2013 report [which] determined that “at least 25% of felony convictions "are not available" to the National Instant Criminal Background Check System maintained by the FBI. In light of the Texas shooting, Air Force officials have ... faulted the staff at an air base for not sending the necessary information to the FBI, but federal officials who work in the database effort say the problem of military nonreporting of domestic violence cases extends far beyond a single base or service branch. A large number of people convicted of misdemeanor domestic violence - who also are prohibited from buying guns - are absent from the FBI database as well.
Note: For more, see concise summaries of deeply revealing news articles on corruption in government and in the military.
The Trump administration has declared all-out war on leakers. But the administration is battling the wrong enemy with the wrong weapons. Digital secrets stolen from the National Security Agency represent the real ... security problem. More than half a billion pages have been swiped. The stolen data includes some of the NSA’s most prized cyber weapons. Most were created by the agency’s own hacker team, the Tailored Access Operations (TAO) unit. Government hackers search for ways to crack into widely used computer operating systems, such as Microsoft Windows. When they discover a way in ... rather than notify the companies that their products are dangerously flawed, the NSA often secretly stores these vulnerabilities and later converts them into powerful cyber weapons, known as “exploits.” Like burglar’s tools, the exploits can secretly open a crack in a system, such as Windows, and insert an “implant” containing NSA malware - enabling the agency to take control of any computer using that Windows program. Unknown to the public, the NSA has for years been negligent in protecting its top-secret material, including these cyber weapons. Meanwhile, the Trump administration continues searching for someone who passed a few tidbits about White House bickering to a reporter, rather than focus on the NSA losing potentially deadly cyber weapons.
Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Two men kicked in the door to Berta Cáceres’s house in the small Honduran mountain town of La Esperanza. One of them opened the door to her bedroom and fired six shots. She died moments later. The murder ... might simply have receded into a grim tally of regrettable losses. But Ms. Cáceres, 44, had won international acclaim for leading her indigenous Lenca community against a dam planned on their land. Now, 20 months after the killing, a team of five international lawyers has warned that the people who ordered it may never face justice. The evidence, the lawyers said, points to a plot against Ms. Cáceres that was months in the making and reached up to senior executives of Desarrollos Energéticos, known as Desa, the Honduran company holding the dam concession. “The existing proof is conclusive regarding the participation of numerous state agents, high-ranking executives and employees of Desa in the planning, execution and cover-up of the assassination,” the lawyers wrote. Eight suspects are in custody, including ... a retired Honduran Army lieutenant who was Desa’s director of security until mid-2015. “What the public ministry has yet to do is indict the people who hired Bustillo to plan the operation,” said Miguel Ángel Urbina Martínez, one of the lawyers reviewing the case. “There was this criminal structure comprised of company executives and employees, state agents and criminal gangs that used violence, threats and intimidation,” said Roxanna Altholz, [a] member of the lawyers’ group.
Note: The Guardian reported last year that Berta Cáceres’s murder appeared to be "an extrajudicial killing planned by military intelligence specialists linked to the country’s US-trained special forces". For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the corporate world.
President Trump ordered the release of more than 2,800 records related to the John F. Kennedy assassination on Thursday, but bowed to pressure from the CIA, FBI and other agencies to delay disclosing some of the most sensitive documents. Even so, the thousands of pages that were published online by the National Archives ... describe decades of spies and surveillance, informants and assassination plots. In an internal FBI report from May 1964, an informant told the FBI that the Ku Klux Klan said it “had documented proof that President Johnson was formerly a member of the Klan in Texas during the early days of his political career.” The records also reveal a deposition given before the presidential Commission on CIA Activities in 1975 by Richard Helms, who had served as the agency’s director. After a discussion of Vietnam, David Belin, an attorney for the commission, turned to whether the CIA was involved in Kennedy’s killing. “Well, now, the final area of my investigation relates to charges that the CIA was in some way conspiratorially involved with the assassination of President Kennedy. During the time of the Warren Commission, you were Deputy Director of Plans, is that correct?” Belin asked. After Helms replied that he was, Belin then asked: “Is there any information involved with the assassination of President Kennedy which in any way shows that Lee Harvey Oswald was in some way a CIA agent or agent…” Then, suddenly, the document cuts off.
Note: Watch the banned final segment of a History Channel series titled "The Men Who Killed Kennedy." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and assassinations from reliable major media sources.
Alison Steel was only 4˝ years old when her mother's life changed forever. In 1957, Jean Steel was admitted to Montreal's Allan Memorial Institute. In the months that followed, Steel became the victim of CIA-funded brainwashing experiments conducted by Dr. Ewen Cameron. She was kept in a chemically induced sleep for weeks and subjected to rounds of electroshocks, experimental drugs and tape-recorded messages played non-stop. Steel said her mother was never quite the same. Now, 60 years after Cameron's experiments left her mother damaged for life, Alison Steel has finally won a measure of justice for her family. The federal government quietly reached an out-of-court settlement with Steel earlier this year, paying her $100,000 in exchange for dropping the legal action she launched in September 2015. The settlement with Steel is the latest development in the decades-old saga that began with Cameron's experiments at the Allan Memorial Institute in the '50s and '60s. What patients and their families didn't know was that Cameron's experiments were ... being funded by the U.S. Central Intelligence Agency's MK Ultra program. The CIA ... funded mind-control experiments across North America. In 1992, Conservative Justice Minister Kim Campbell decided to compensate dozens of Cameron's former patients. An estimated 70 patients were compensated, but hundreds more who applied were rejected because the government said they hadn't been "de-patterned" enough to warrant compensation.
Note: Read more about the CIA's MK Ultra program. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
The FBI counterterrorism division’s identification of a movement it calls “black identity extremists” is the latest addition to the list of protesters and dissidents the agency puts under the “domestic terrorism” umbrella. But many national security experts say the designation [is] simply a label that allows the FBI to conduct additional surveillance on “basically anyone who’s black and politically active,” said Michael German, who left the FBI in 2004. While the practice of labeling certain protest groups as domestic terrorists is not unique to President Trump’s administration, Hina Shamsi ... at the American Civil Liberties Union, said there’s concern that “abusive and unjustified investigations” by the FBI are rising. The problem, Shamsi said, is partly in the overly broad definition of domestic terrorism in the Patriot Act as a violation of the criminal laws ... intended to “influence the policy of a government by intimidation or coercion.” Eighty-four members of Congress cited that intention to intimidate or coerce in a letter to the Justice Department last week that asked whether the department had labeled Dakota Access Pipeline protesters domestic terrorists. The Justice Department did not respond to questions about the letter. The FBI report that focused on black identity extremists ... had interest groups questioning whether the designation has been used to single out members of Black Lives Matter.
Note: The Department of Homeland Security has reportedly been monitoring the Black Lives Matter movement since 2014, in some cases producing "minute-by-minute reports on protesters’ movements". For more along these lines, read about Cointelpro, the program used by corrupt intelligence agencies to spy on and attack the U.S. civil rights movement beginning in the 1960's. See also concise summaries of deeply revealing news articles about the erosion of civil liberties.
More than 50 years after President John F. Kennedy was slain in full view of the world, the final government documents about his death are set for release. The documents are among the last of still-secret papers the government amassed on the assassination. Some grand jury and tax documents will remain secret. The JFK Records Act passed in 1992. The law mandated the government release the remaining files to the public and gave it 25 years to do so. October 26, 2017 ... is the deadline for full release. The National Archives said government agencies had deemed files covered by the act prior to its passage too sensitive for release. They run the gamut from FBI to CIA materials and all manner of documents said to pertain to investigations into Kennedy's death. The Archives said the full collection ... spans millions of documents. Many files have been released about the Kennedy assassination over the years, including some in redacted form. Barring a waiver from the President, the obscured text will be revealed. The full release of the documents would mark the end of a decades-long struggle for researchers to get a hold of all available information. A Gallup poll in 2013 showed 61% of respondents said more than one person was involved in the shooting and some pointed to the Mafia, the government, the CIA, Cuba and others as playing a role.
Note: An October 21 AFP article reported that Trump said he intends to allow these files to be released as planned. Many are unaware that an official report from 1979 by the U.S. House of Representatives stated: "The committee believes, on the basis of the evidence available to it, that President John F. Kennedy was probably assassinated as a result of a conspiracy." For more along these lines, see concise summaries of deeply revealing Kennedy assassination news articles from reliable major media sources.
For more than two decades during the Cold War, the public was bombarded by an enormous publicity campaign to shape American views of Russia. The campaign may have been the largest and most consistent source of political advertising in American history. And it was orchestrated by a big, powerful intelligence service: the Central Intelligence Agency. In 1950, [the CIA] created Radio Free Europe, a government-sponsored broadcasting station. Ostensibly, it provided unbiased news for Eastern Europeans, but in fact the agency used it to wage a subversive campaign to weaken Communist governments. But how to hide the agency’s hand? Simple: pretend that ordinary Americans are paying the bills. A well-heeled and well-connected front group, the National Committee for a Free Europe ... ran an enormous fund-raising campaign ... that implored Americans to donate “freedom dollars” to combat Kremlin lies. The donations barely covered the cost of running the “fund-raising drives,” to say nothing of Radio Free Europe’s $30 million annual budgets. But that wasn’t the point. Declassified documents reveal that almost from the start, the CIA saw that it could exploit the fund-raising campaign as a conduit for domestic propaganda. It was a way to rally public support for the Cold War. Our post-truth media environment [carries] voices from this past. The crusade blasted all information from enemy sources as lies and deceit — fake news, we could say.
Note: The US government was legally prevented from broadcasting propaganda to domestic audiences for many years. This prohibition ended when new rules were adopted in 2013. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
I’m a taxi driver from Karachi, in Pakistan. Fifteen years ago I was sold for a bounty and taken by the U.S. military to a secret prison in Afghanistan. They mistook me for someone called Hassan Gul, and I was tortured for over a year before they flew me to Guantanamo. There’s no disputing this—it’s in the U.S. Senate report on torture. I’ve been held here ever since then, without charge or trial. I’ve been through a lot - but a new punitive medical regime at this prison might finally kill me. In May 2013, without any way of defending myself or securing my freedom, I resorted to peaceful protest, and began a hunger strike. On September 20, things abruptly changed. A new senior medical officer (SMO) arrived, bringing in a new Trump administration policy of refusing to tube-feed anyone on hunger strike. They apparently don’t mind if people die because of the injustice here, because they figure nobody cares about Guantanámo anymore, and nobody will notice. I’ve lost more weight than ever before - I’m well under 100 pounds - but they have stopped bringing anyone to check my vitals, weigh me, or force-feed me. They want this peaceful protest over. So they refuse us access to medical care. The doctors here do what the new medical boss tells them. He wants me to beg him for food, but I will not. He is like a dictator. They tell me it’s my fault if I die. But all I am asking for is basic justice - a fair trial or freedom. I am innocent, but I’m not allowed to prove it. I don't want to die, but they will not succeed in breaking my strike.
Note: The horrific treatment of Guantánamo Bay detainees is well documented. For more, read about the 10 Craziest Things in the Senate Report on Torture and many other questionable intelligence agency practices.
In perhaps its most audacious and elaborate incursion into academia, the CIA has secretly spent millions of dollars staging scientific conferences around the world. Its purpose was to lure Iranian nuclear scientists out of their homeland and into an accessible setting, where its intelligence officers could approach them individually and press them to defect. While a university campus might have only one or two professors of interest to an intelligence service, the right conference – on drone technology, perhaps, or Isis – could have dozens. The FBI and CIA swarm conferences. At gatherings in the US, says one former FBI agent, “foreign intelligence officers try to collect Americans; we try to collect them”. The CIA is involved with conferences in various ways: it sends officers to them; it hosts them through front companies in the Washington area, so that the intelligence community can tap academic wisdom; and it mounts sham conferences to reach potential defectors from hostile countries. Scientific conferences have become such a draw for intelligence agents that one of the biggest concerns for CIA operatives is interference from agency colleagues trapping the same academic prey. “We tend to flood events like these,” a former CIA officer who writes under the pseudonym Ishmael Jones observed in his 2008 book, The Human Factor: Inside the CIA’s Dysfunctional Intelligence Culture.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in science and in the intelligence community.
Mysterious metal towers are popping up at local tunnels, and soon they’ll start appearing at bridges, too. But even people on the MTA board in charge of the towers can’t say why they’re being used or what’s in them. It’s a $100 million MTA project shrouded in secrecy, with 18 of them for tunnels and bridges. So what are they exactly? The MTA’s man in charge of the bridges and tunnels, Cedrick Fulton, dodged Carlin’s questions Wednesday. “I said no comment,” he said. Some MTA board members, including New York City Transportation Commissioner Polly Trottenberg, say they know too little about the towers - even with half the money already spent and some of the towers already up. “A lot of the board members felt they didn’t have all the details they would have wanted, myself included,” she said. Residents suspect there is much more going on in the towers than meets the eye and wonder if they’ll ever really know what’s going on inside of them. CBS2 demanded answers from MTA Chairman Joe Lhota. Carlin: “Some of your own board members say they don’t know the specifics.” Lhota: “The base of these new pieces that are going up include whatever fiber optics are necessary for those Homeland Security items.” In other words, anti-terror technology. Could that one day include facial recognition? We don’t know and Lhota won’t say. “I’m not at liberty to discuss that,” he told Carlin. Lhota said all necessary Homeland Security technology remains in place at all crossings, even the ones that don’t have the new towers yet.
Note: See video of these strange new towers containing secret Homeland Security technology at the link above. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy.
John N. Tye wants to make it easier to expose government wrongdoing without getting fired or breaking the law. Tye, a former State Department whistleblower, and lawyer Mark S. Zaid have formed Whistleblower Aid, a nonprofit law office to help would-be tipsters in government and the military navigate the bureaucratic and legal morass involved in reporting governmental misdeeds. Whistleblowing can be a challenge for people who have taken an oath of office to support and defend the Constitution ... Tye said in a telephone interview. “Then you get into government and you see something wrong,” he said. “You’ve sworn to stop it, but there aren’t a lot of tools at your disposal, especially if it’s your supervisor who’s breaking the law. People are scared. They’re worried about their jobs. If it involves classified information, they can be criminally prosecuted.” Tye’s interest in whistleblowing came from a stint as section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor. He came forward as a whistleblower to publicize the government’s electronic surveillance practices. He wrote about it in 2014 in a Washington Post opinion piece that he submitted to the State Department for approval. His quest to air his concerns cost him $13,000 in legal fees. If a whistleblower comes to Whistleblower Aid with classified information, he or she will be steered to investigators with security clearances and the power to do something about it.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Chelsea Manning, the transgender U.S. Army soldier who spent seven years in prison for leaking classified documents, will not be distinguished visiting fellow at Harvard after growing backlash prompted the school to rescind the invitation. The school withdrew Manning's invite two days after announcing she would be one of roughly ten visiting fellows this fall. Manning's designation as a visiting fellow led to Mike Morell, former deputy director and acting director of the CIA, to resign his post as a senior fellow at Harvard University, CBS reported. CIA Director Mike Pompeo also canceled a speaking event Thursday at a Harvard forum in protest of what he called the school's decision to place Manning in a "position of honor." Manning was convicted of leaking more than 700,000 classified documents, including battlefield reports on Iraq and Afghanistan and State Department cables, while working as an intelligence analyst in Iraq. She said the leaks were intended to expose wrongdoing. Manning was arrested in May 2010 and given a 35-year sentence, which was commuted in the final days of the Obama administration. Manning was known as Pvt. Bradley Manning at the time of her arrest, but announced she was transgender during her incarceration. Elmendorf said Manning will still spend a day at the Kennedy School and speak in the Forum, though she will not be designated a visiting fellow.
Note: Read about Manning's wartime whistleblowing in this CNN story. For more along these lines, see concise summaries of deeply revealing news articles on corruption in intelligence agencies and in the corporate world.
The blaring, grinding noise jolted the American diplomat from his bed. He moved just a few feet, and there was silence. He climbed back into bed. The agonizing sound hit him again. It was as if he’d walked through some invisible wall cutting straight through his room. Soon came the hearing loss, and the speech problems, symptoms both similar and altogether different from others among at least 21 US victims in an astonishing international mystery still unfolding in Cuba. New details learned by the Associated Press indicate at least some of the incidents were confined to specific rooms or even parts of rooms with laser-like specificity, baffling US officials who say the facts and the physics don’t add up. Suspicion initially focused on a sonic weapon. Yet the diagnosis of mild brain injury, considered unlikely to result from sound, has confounded the FBI, the state department and US intelligence agencies involved in the investigation. Some victims now have problems concentrating or recalling specific words, several officials said, the latest signs of more serious damage than the US government initially realized. The United States first acknowledged the attacks in August – nine months after symptoms were first reported. The cases vary deeply: different symptoms, different recollections of what happened. In several episodes recounted by US officials, victims knew it was happening in real time, and there were strong indications of a sonic attack.
Note: Sound weapons developed for war and increasingly used against civilian populations are well-documented. For more along these lines, see concise summaries of deeply revealing non-lethal weapons news articles from reliable major media sources.
This summer, operatives with the Central Intelligence Agency gathered at Arlington National Cemetery to bury two of their own. Brian Ray Hoke and Nathaniel Patrick Delemarre, elite gunslingers who worked for the C.I.A.’s paramilitary force, were laid to rest after a firefight with Islamic State militants. Their deaths this past October were never acknowledged by the C.I.A., beyond two memorial stars chiseled in a marble wall at the agency’s headquarters in Langley, Va. Today there are at least 18 stars on that wall representing the number of C.I.A. personnel killed in Afghanistan - a tally that has not been previously reported, and one that rivals the number of C.I.A. operatives killed in the wars in Vietnam and Laos nearly a half century ago. The deaths are a reflection of the heavy price the agency has paid in a secret, nearly 16-year-old war, where thousands of C.I.A. operatives have served since the attacks of Sept. 11, 2001. The deaths of Mr. Hoke, 42, and Mr. Delemarre, 47, show how the C.I.A. continues to move from traditional espionage to the front lines, and underscore the pressure the agency faces now that President Trump has pledged to keep the United States in Afghanistan with no end in sight.
Note: For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
The relationship between US national security and Hollywood is much deeper and more political than anyone has ever acknowledged. It is a matter of public record that the Pentagon has had an entertainment liaison office since 1948. The Central Intelligence Agency (CIA) established a similar position in 1996. Although it was known that they sometimes request script changes in exchange for advice, permission to use locations, and equipment such as aircraft carriers, each appeared to have passive, and largely apolitical roles. Files we obtained, mainly through the US Freedom of Information Act, show that between 1911 and 2017, more than 800 feature films received support from the US Government’s Department of Defence (DoD), a significantly higher figure than previous estimates indicate. These included blockbuster franchises such as Transformers, Iron Man, and The Terminator. On television, we found over 1,100 titles received Pentagon backing – 900 of them since 2005, from Flight 93 to Ice Road Truckers to Army Wives. When we include individual episodes for long running shows like 24, Homeland, and NCIS, as well as the influence of other major organisations like the FBI and White House, we can establish unequivocally for the first time that the national security state has supported thousands of hours of entertainment. For its part, the CIA has assisted in 60 film and television shows since its formation in 1947. This is a much lower figure than the DoD’s but its role has nonetheless been significant.
Note: Read how the Pentagon controls the script of hundreds of movies, some quite well known. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
America’s love affair with LSD did not begin in Haight-Ashbury or during the summer of love. Instead it was seeded ... in Midwestern laboratories and government offices, where it comprised one strand of an extensive germ warfare programme. Errol Morris’s splendidly clammy, mysterious docu-drama Wormwood reopens the file on Frank Olson, a jobbing biochemist who fell to his death from a New York hotel. At the time (December 1953) Olson’s death was ruled to be suicide. But 20 years later evidence emerged that complicated the official verdict and prompted Olson’s family to sue the federal government. Even today elderly Eric Olson is in search of a definitive answer. He casts himself in the role of a Cold War Hamlet, haunted and harried by his father’s ghost. So what became of luckless Frank Olson? Did he fall or was he pushed? Infuriatingly – perhaps fittingly – we will have to wait to find out. For Morris’s docu-drama is a six-part series, commissioned by Netflix. So we’re left to blunder on, hands outstretched, past pensive Eric Olson and ... through spooky archive footage of a 1970s congressional hearing where sleazy Colonel Ruwet – surely the villain of the piece – sits with his back to the camera, meaning that we can only see his starched collar and his bald spot and the hint of a smile when he responds to a question. Who, then, can predict how this investigation turns out?
Note: A 1975 US government report said that Frank Olson committed suicide after being given LSD without his knowledge as part of the CIA's MK-ULTRA program. The lawsuit filed by his sons claimed Olson was killed by the CIA after he "raised concerns about testing chemical and biological weapons on human subjects without their consent". For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
In the summer of 1977, Capitol Hill was gripped by revelations of the CIA’s top-secret MK-Ultra mind control research program, targeting unsuspecting American citizens, in some cases by luring them to brothels to be fed LSD-laced cocktails. Hearings that summer, chaired by Sen. Edward M. Kennedy ... touched some of the country’s rawest nerves. The August 1977 MK-Ultra hearings specifically explored what seemed like an outlandish idea straight out of science fiction: the possibility of government mind control. Kennedy ... had a complex relationship with the CIA, given what the agency knew about the assassinations of his brothers Robert and John in the 1960s. One MK-Ultra project involved CIA-run brothels in San Francisco and New York City, established specifically to study LSD’s effects on unsuspecting adults. Project Midnight Climax ran in San Francisco from 1955 to 1965. Operatives reported that it helped refine sexual blackmail tactics, surveillance technology, LSD’s use in interrogations and how to better use empathy as an investigation tactic. Brothel operatives later [admitted] that they had dosed unsuspecting subjects at nearby restaurants, bars and beaches. In one case, a U.S. marshal held up a San Francisco bar with his service revolver after an MK-Ultra agent slipped LSD into his bourbon and soda. In the early 1970s, CIA Director Richard Helms, who ran the agency from 1966 to 1973, along with one of MK-Ultra’s architects, Sidney Gottlieb, ordered all the relevant paperwork destroyed.
Note: Read more about Midnight Climax and the CIA's MK ULTRA program. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
Julian Assange, the founder of whistleblowing platform WikiLeaks, has spoken out against a passing US Senate bill which aims to officially label his organisation as a "non-state hostile intelligence service". WikiLeaks has recently been publishing documents allegedly pilfered from inside the US Central Intelligence Agency (CIA), something that has led its director, Mike Pompeo, to shift from openly citing its publications to harshly criticising them. The WikiLeaks editor-in-chief ... wrote: "Media organisations develop and protect sources. So do intelligence agencies. But to suggest that media organisations are 'non-state intelligence services is absurd. It is equivalent to suggesting that the CIA is a media organisation." The day prior to the statement's release, it emerged that US senator Ron Wyden was the sole politician to vote against the intelligence committee's authorisation bill. Wyden said: "My concern is that the use of the novel phrase 'non-state hostile intelligence service' may have legal, constitutional, and policy implications, particularly should it be applied to journalists inquiring about secrets. The language in the bill suggesting that the US government has some unstated course of action against 'non-state hostile intelligence services' is equally troubling." Legally, experts warn it is largely impossible to prosecute WikiLeaks without also bringing charges against The New York Times, The Guardian or other mainstream publications. Despite this, US attorney general Jeff Sessions has still pledged to "put some people in jail".
Note: In May, United Nations officials said that the US treatment of activists was increasingly "incompatible with US obligations under international human rights law". For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
A settlement in a landmark lawsuit against two psychologists who helped design the CIA's harsh interrogation methods used in the war on terror marked the first time the agency or its private contractors have been held accountable for the program, legal experts said. The deal in the lawsuit from the American Civil Liberties Union also makes it unlikely the CIA will again pursue the tactics, said Deborah Pearlstein, professor at the Cardozo Law School in New York. “This sends a signal to those who might consider doing this in the future,” Pearlstein said, adding, “This puts an exclamation mark at the end of ‘don't torture.’” Terms of the settlement were not disclosed, but it avoided a civil trial set for Sept. 5 in federal court. The ACLU sued psychologists James Mitchell and John “Bruce” Jessen on behalf of three former detainees, including one who died in custody, who contended they were tortured at secret CIA prisons overseas. Mitchell and Jessen were under contract with the federal government following the Sept. 11 terror attacks. The lawsuit claimed they designed, implemented and personally administered an experimental torture program. The techniques they developed included waterboarding, slamming the three men into walls, stuffing them inside coffin-like boxes, exposing them to extreme temperatures, starving them and keeping them awake for days, the ACLU said. A U.S. Senate investigation in 2014 found that Mitchell and Jessen's techniques produced no useful intelligence. They were paid $81 million for their work.
Note: Prior to condemning torture, some of the American Psychological Association’s top officials sought to curry favor with Pentagon officials by supporting the CIA's brutal interrogation methods. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
Attorney General Jeff Sessions said Friday that the Justice Department has more than tripled the number of leak investigations compared with the number that were ongoing at the end of the last administration. Sessions said he was devoting more resources to stamping out unauthorized disclosures, directing Deputy Attorney General Rod J. Rosenstein and FBI Director Christopher A. Wray to actively monitor every investigation, instructing the department’s national security division and U.S. attorneys to prioritize such cases, and creating a new counterintelligence unit in the FBI to manage the work. Sessions also said he was reviewing the Justice Department’s policy on issuing subpoenas to reporters. Rosenstein refused to rule out the possibility that journalists would be prosecuted. It has long been Justice Department practice in leak probes to try to avoid investigating journalists directly to find their sources. Prosecutors in the Obama era brought nine leak cases, more than during all previous administrations combined, and in the process called a reporter a criminal “co-conspirator” and secretly went after journalists’ phone records in a bid to identify reporters’ sources. Danielle Brian, executive director at the Project on Government Oversight, said leak investigations might inappropriately target well-intentioned whistleblowers. “Whistleblowers are the nation’s first line of defense against fraud, waste, abuse, and illegality within the federal government,” Brian said in a statement.
Note: For more, see concise summaries of deeply revealing news articles on government corruption and the manipulation of mass media.
A former chief investigator at the Guantanamo Bay detention center is accusing the Pentagon of blocking publication of his book on the use of brutal interrogation techniques and top U.S. officials' advocacy of what he calls "torture." Mark Fallon, a Naval Criminal Investigative Service (NCIS) veteran, said his book "Unjustifiable Means" reveals no classified information or new detainee abuse cases but details internal deliberations about interrogation methods, identifies officials who advocated "torture" and describes how he and others objected. "This is more of an inside view of the fight to try to stop torture," he said. "There was a tremendous opposition within the government itself believing these were war crimes, and I name names." The use of the brutal interrogation methods made the country less safe, he said. Fallon said that he was told it would take no more than six weeks for the Defense Department office that scrubs manuscripts for unauthorized information to review his book. That was more than seven months ago. He has since missed his submission deadline, had to cancel a book tour and enlisted the American Civil Liberties Union and Columbia University's Knight First Amendment Institute to fight what he contends is a Pentagon effort to suppress his work and stifle his right to free speech. Now the ACLU and the Columbia University institute are taking Fallon's case to Congress.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Early last month, the C.I.A. director, Mike Pompeo, recommended to President Trump that he shut down a four-year-old effort to arm and train Syrian rebels. The president swiftly ended the program. The rebel army was by then a shell, hollowed out by more than a year of bombing by Russian planes. Critics in Congress had complained for years about the costs - more than $1 billion over the life of the program - and reports that some of the C.I.A.-supplied weapons had ended up in the hands of a rebel group tied to Al Qaeda further sapped political support for the program. President Barack Obama ... agreed to the program in 2013. It soon fell victim to the constantly shifting alliances in Syria’s six-year-old civil war. Once C.I.A.-trained fighters crossed into Syria, C.I.A. officers had difficulty controlling them. The fact that some of their C.I.A. weapons ended up with Nusra Front fighters - and that some of the rebels joined the group - confirmed the fears of many in the Obama administration when the program began. Although the Nusra Front was widely seen as an effective fighting force against [President Bashar al-Assad]’s troops, its Qaeda affiliation made it impossible for the Obama administration to provide direct support for the group. American intelligence officials estimate that the Nusra Front now has as many as 20,000 fighters in Syria, making it Al Qaeda’s largest affiliate. Officials also received ... reports that the C.I.A.-trained rebels had summarily executed prisoners and committed other violations of the rules of armed conflict.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Later this year - unless President Trump intervenes - the American people will get access to the last of thousands of secret government files about a turning point in the nation’s history: the 1963 assassination of President John F. Kennedy. The National Archives this week released several hundred of the documents, which come from CIA and FBI files. JFK researchers are scrambling to see whether they contain any new clues about the president’s murder. But many more documents remain under seal, awaiting release by this October, the 25-year deadline set by the 1992 Kennedy Assassination Records Collection Act. The law gives only one person - the president - the ability to stop the release from happening. He can act only if he certifies in writing that the documents would somehow endanger national security. About 3,150 ... documents remain totally under seal, along with tens of thousands of pages that have been only partially unsealed because intelligence and law-enforcement agencies opposed their release in the 1990s. Those are the documents that Trump could try to keep secret. And sadly, he appears to be under pressure to do so. Congressional and other government officials have warned us in confidence in recent weeks that at least two federal agencies will make formal appeals to the White House to block the release of some of the files. Which agencies? Which files? The officials would not say. Trump ... has a chance to show that he is committed to resolving some of the biggest conspiracy theories in American politics. We hope he welcomes the opportunity.
Note: The above was written by Larry J. Sabato, author of “The Kennedy Half-Century,” and Philip Shenon, author of “A Cruel and Shocking Act: The Secret History of the Kennedy Assassination.” For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and assassinations from reliable major media sources.
For nearly four years, Syrian rebels have clung to a programme of CIA assistance as a symbol of US support in their battle against Bashar al-Assad’s regime. So reports that Donald Trump’s administration will stop the limited scheme to arm and train Syria’s opposition forces have sparked anger and confusion. Rebels say they have not been informed of any changes to the policy introduced ... in 2013 as part of efforts to put pressure on Syria’s president. According to ... the Washington Post newspaper, Mr Trump decided last month to end funding for the CIA programme. Rebels contacted by the Financial Times say their CIA interlocutors had not confirmed any change, and political opposition figures who met US officials this week say they, too, were given no hint of any change. One rebel commander who asked not to be named said US support had been waning for months but noted that the rebels had been given their salaries as normal last month. The CIA funding for rebel groups fed into two internationally backed operations that supported an array of rebel groups. Many observers and even rebels themselves criticised the programme for turning a blind eye to its funding ending up with jihadis. Rebels who received support would return to volatile territories in Syria, only to be pressed by an al-Qaeda-linked jihadi group to hand over a cut. “Frankly so much of the weapons and ammunition were going to [Syria’s al-Qaeda affiliate] that it’s probably a good thing,” [an] opposition figure said.
Note: What is the CIA doing paying the salaries of rebels in Syria? For more, see this informative article. Then, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
Once expunged from official State Department history, the U.S.-backed 1953 coup in Iran and what led up to it can be glimpsed in documents that the department has quietly published. The operation ultimately pushed the country toward its Islamic Revolution and hostility with the West. The CIA's role in the coup, which toppled Prime Minister Mohammed Mosaddegh and cemented the control of the shah, was well known when the State Department offered its first compendium on the era in 1989. But any trace of American involvement in the putsch had been wiped from the report, causing historians to call it a fraud. The 1,007-page report [released this month] shows U.S. officials discussing a coup up to a year before it took place. The CIA at one point "stockpiled enough arms and demolition material to support a 10,000-man guerrilla organization for six months" and paid out $5.3 million for bribes and other costs, which would be equivalent to $48 million today. One CIA document [states] that "several leading members of these (Iranian) security services are paid agents of this organization." The CIA also described hoping to use "powerfully influential clergy" in Shiite Iran to back the coup. To this day, Iran's clerical leaders portray the U.S. as a hostile foreign power bent on subverting and overthrowing its government. As President Dwight Eisenhower wrote ... in 1953, if knowledge of the coup became public, "We would not only be embarrassed in that region, but our chances to do anything of like nature in the future would almost totally disappear."
Note: The complete collection of State Department documents on this CIA-backed coup is available here. More recently, US policy reportedly fuelled the rise of Isis in Syria and Iraq. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Twice in the past month, National Security Agency cyberweapons stolen from its arsenal have been turned against two very different partners of the United States — Britain and Ukraine. The N.S.A. has [not acknowledged] its role in developing the weapons. White House officials have deflected many questions ... by arguing that the focus should be on the attackers themselves, not the manufacturer of their weapons. The silence is wearing thin for victims of the assaults, as a series of escalating attacks using N.S.A. cyberweapons have hit hospitals, a nuclear site and American businesses. There is growing concern that United States intelligence agencies have rushed to create digital weapons that they cannot keep safe from adversaries or disable once they fall into the wrong hands. On Wednesday, the calls for the agency to address its role in the latest attacks grew louder. Representative Ted Lieu ... who serves on the House Judiciary and Foreign Affairs Committees, urged the N.S.A. to help stop the attacks and to stop hoarding knowledge of the computer vulnerabilities upon which these weapons rely. Brad Smith, the president of Microsoft, said outright that the National Security Agency was the source of the “vulnerabilities” now wreaking havoc. For the American spy agency ... what is unfolding across the world amounts to a digital nightmare. It was as if the Air Force lost some of its most sophisticated missiles and discovered an adversary was launching them against American allies — yet refused to respond, or even to acknowledge that the missiles were built for American use.
Note: It was reported in 2014 that the NSA had developed specialized tools to covertly hack into computers on a mass scale by using automated systems. More recently, a large number of NSA hacking tools were put up for sale online. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The Federal Reserve’s little-known role housing the assets of other central banks comes with a unique benefit to the United States: It serves as a source of foreign intelligence for Washington. Senior officials from the U.S. Treasury and other government departments have turned to these otherwise confidential accounts several times a year to analyze the asset holdings of the central banks of Russia, China, Iraq, Turkey, Yemen, Libya and others, according to more than a dozen current and former senior Fed and Treasury officials. The U.S. central bank keeps a tight lid on information contained in these accounts. But according to the officials interviewed by Reuters, U.S. authorities regularly use a “need to know” confidentiality exception in the Fed’s service contracts with foreign central banks. Some 250 foreign central banks and governments keep $3.3 trillion of their assets at the Federal Reserve Bank of New York, about half of the world’s official dollar reserves, using a service advertised in a 2015 slide presentation as “safe and confidential.” Other major central banks and some commercial banks offer similar services. But only the Fed offers direct access to U.S. debt markets and to the world’s reserve currency, the dollar. In all, the people interviewed by Reuters identified seven instances in the last 15 years in which the accounts gave U.S. authorities insights into the actions of foreign counterparts or market movements, at times leading to a specific U.S. response.
Note: It's quite telling that no other major media picked up this important piece. For more along these lines, see concise summaries of deeply revealing news articles on financial industry corruption and the disappearance of privacy.
Hundreds of men swept up in the hunt for al-Qaida militants have disappeared into a secret network of prisons in southern Yemen where abuse is routine and torture extreme - including the "grill," in which the victim is tied to a spit like a roast and spun in a circle of fire, an Associated Press investigation has found. Senior American defense officials acknowledged Wednesday that U.S. forces have been involved in interrogations of detainees in Yemen but denied any participation in or knowledge of human rights abuses. Interrogating detainees who have been abused could violate international law, which prohibits complicity in torture. The secret prisons are inside military bases, ports, an airport, private villas and even a nightclub. Some detainees have been flown to an Emirati base across the Red Sea in Eritrea, according to Yemen Interior Minister Hussein Arab and others. Several U.S. defense officials, speaking on condition of anonymity to discuss the topic, told AP that American forces do participate in interrogations of detainees at locations in Yemen, provide questions for others to ask, and receive transcripts of interrogations from Emirati allies. They said U.S. senior military leaders were aware of allegations of torture at the prisons in Yemen, looked into them, but were satisfied that there had not been any abuse when U.S. forces were present. Inside war-torn Yemen, however ... nearly 2,000 men have disappeared into the clandestine prisons, a number so high that it has triggered near-weekly protests.
Note: Saudi Arabia's military campaign in Yemen has strong US military support, and flagrantly violates international law. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
People connected to the Russian government tried to hack election-related computer systems in 21 states. Samuel Liles, the Department of Homeland Security’s acting director of the Office of Intelligence and Analysis Cyber Division, said vote-tallying mechanisms were unaffected and that the hackers appeared to be scanning for vulnerabilities — which Liles likened to walking down the street and looking at homes to see who might be inside. Liles was testifying before the Senate Intelligence Committee, which is investigating Russia’s efforts to meddle in the 2016 presidential election. Officials in Arizona and Illinois had previously confirmed that hackers targeted their voter registration system. In a separate hearing ... former Department of Homeland Security secretary Jeh Johnson testified that Russia’s meddling ... was “unprecedented, the scale and the scope of what we saw them doing.” He said the severity of Russia’s efforts persuaded him to sign onto an Oct. 7 statement publicly blaming the Kremlin for what had happened. “We needed to do it, and we needed to do it well before the election to inform American voters of what we saw,” Johnson said. FBI Assistant Director of Counterintelligence Bill Priestap ... said Russia for years has tried to influence U.S. elections but that the “scale” and “aggressiveness” of its efforts in 2016 made the attempts more significant.
Note: Many who follow elections closely have known and spread the word for years about serious vulnerabilities in US electronic voting, yet only now that Russia is involved is it getting widespread coverage. Do you really think the Russians are the only ones who have hacked US elections? Read an enlightening analysis of elections hacking in the US which raises many serious questions. And don't miss the critically important information provided in our Elections Information Center.
Fifteen years after he helped devise the brutal interrogation techniques used on terrorism suspects in secret C.I.A. prisons, John Bruce Jessen, a former military psychologist, expressed ambivalence about the program. He described himself and a fellow military psychologist, James Mitchell, as reluctant participants in using the techniques, some of which are widely viewed as torture. The two psychologists ... are defendants in the only lawsuit that may hold participants accountable for causing harm. Revelations about the C.I.A. practices ... led to an eventual ban on the techniques and a prohibition by the American Psychological Association against members’ participation in national security interrogations. The two psychologists argue that the C.I.A., for which they were contractors, controlled the program. But it is difficult to successfully sue agency officials because of government immunity. Under the agency’s direction, the two men ... proposed [and applied] the “enhanced interrogation” techniques. Their business received $81 million. When [the psychologists] wanted to end the waterboarding sessions as no longer useful, C.I.A. supervisors ... ordered them to continue. Dr. Mitchell said that the C.I.A. officials told them: “‘You guys have lost your spine.’ I think the word that was actually used is that you guys are pussies. There was going to be another attack in America and the blood of dead civilians are going to be on your hands.”
Note: Prior to condemning torture, some of the American Psychological Association’s top officials sought to curry favor with Pentagon officials by supporting the CIA's brutal interrogation methods. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
Russia’s cyberattack on the U.S. electoral system before [the recent] election was far more widespread than has been publicly revealed, including incursions into voter databases and software systems in almost twice as many states as previously reported. In Illinois, investigators found evidence that cyber intruders tried to delete or alter voter data. The hackers accessed software designed to be used by poll workers on Election Day, and in at least one state accessed a campaign finance database. Details of the wave of attacks, in the summer and fall of 2016, were provided by three people with direct knowledge of the U.S. investigation into the matter. In all, the Russian hackers hit systems in a total of 39 states. The scope and sophistication so concerned Obama administration officials that they took an unprecedented step -- complaining directly to Moscow over a modern-day “red phone.” In October, two of the people said, the White House contacted the Kremlin on the back channel to offer detailed documents of what it said was Russia’s role in election meddling and to warn that the attacks risked setting off a broader conflict. The new details, buttressed by a classified National Security Agency document recently disclosed by the Intercept ... paint a worrisome picture for future elections: [This is] the newest portrayal of potentially deep vulnerabilities in the U.S.’s patchwork of voting technologies.
Note: Many who follow elections closely have known and spread the word for years about serious vulnerabilities in US electronic voting, yet only now that Russia is involved is it getting widespread coverage. Do you really think the Russians are the only ones who have hacked US elections? Read an enlightening analysis of elections hacking in the US which raises many serious questions. And don't miss the critically important information provided in our Elections Information Center.
Members of a congressional committee at a public hearing Wednesday blasted former President Barack Obama and his attorney general for allegedly covering up an investigation into the death of a Border Patrol agent killed as a result of a botched government gun-running project known as Operation Fast and Furious. The House Oversight Committee also Wednesday released a scathing, nearly 300-page report that found Holder’s Justice Department tried to hide the facts. Terry died in a gunfight. [His] death exposed Operation Fast and Furious, a Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) operation in which the federal government allowed criminals to buy guns in Phoenix-area shops with the intention of tracking them as they were transported into Mexico. But the agency lost track of more than 1,400 of the 2,000 guns they allowed smugglers to buy. Two of those guns were found at the scene of Terry's killing. Sen. Charles Grassley, R-Iowa, testified Wednesday in front of the committee, accusing DOJ and ATF officials of obstructing the investigation and working to silence ATF agents who informed the Senate of Fast and Furious. One of those silenced ATF agents, John Dodson, testified Wednesday that he remains “in a state of purgatory” since objecting to Fast and Furious and has been the subject of reprisals. Grassley's and Dodson's testimony reinforced findings of the report, which states that the Justice Department knew before Terry’s death that the ATF was “walking” firearms to Mexico and knew the day after the agent’s death that Fast and Furious guns were involved in the shootout -- despite denying these facts.
Note: The Obama administration invoked executive privilege in an unsuccessful attempt to cover this story up. Whistleblower John Dodson published a book on this scandal in 2013. The ATF tried and failed to silence him, then lied about the whole thing. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Russian military intelligence attempted to cyber-attack a U.S. voting software supplier and more than 100 local election officials in the days leading up to the 2016 presidential election, The Intercept reported Monday. According to an NSA document ... Russian military intelligence cyber-attacked a U.S. voting software supplier, using information gained in that attack to “launch a voter registration-themed spear-phishing campaign targeting U.S. local government organizations. Russian General Staff Main Intelligence Directorate actors … executed cyber espionage operations against a named U.S. company in August 2016, evidently to obtain information on elections-related software and hardware solutions,” the document states. The operation gave the hackers “persistent access” to the targeted computers, allowing them to “survey the victims for items of interest.” But Pamela Smith, president of election integrity watchdog Verified Voting, said the hacking might have kept some Americans from voting. “If someone has access to a state voter database, they can take malicious action by modifying or removing information,” she told The Intercept. “This could affect whether someone has the ability to cast a regular ballot or be required to cast a ‘provisional’ ballot — which ... may mean the voter has to jump through certain hoops such as proving their information to the election official before their eligibility is affirmed.”
Note: Why have those who set up our elections allowed private companies to develop software which can be hacked? For undeniable evidence our voting systems have not been safe for years, read summaries of these major media news articles.
Senators, spies and a president spent years in a pitched battle over how the history is told of one of the most controversial chapters of America’s campaign against terrorism, the detention and interrogation of prisoners in secret C.I.A. jails. Congressional officials said on Friday that the [Trump] administration had begun returning to Congress copies of a 6,700-page Senate report from 2014 about the C.I.A. program. The move raises the possibility that most of the copies could be locked in Senate vaults indefinitely or even destroyed. The classified report [tells] the story of how ... the C.I.A. began capturing terrorism suspects and interrogating them ... beyond the reach of the American judicial and military legal systems. The central conclusion of the report is that the spy agency’s interrogation methods - including waterboarding, sleep deprivation and other kinds of torture - were far more brutal and less effective than the C.I.A. described to policy makers, Congress and the public. The Senate Intelligence Committee, which was run by Democrats when the executive summary was released, sent copies of the entire report to at least eight federal agencies, asking that they incorporate it into their records — a move that would have made the documents subject to requests under the Freedom of Information Act. The agencies all refused to add the report to their records, and instead kept their copies locked up, prompting the American Civil Liberties Union to sue the C.I.A. for access to the full report.
Note: See a revealing New York Times article listing seven key points from this torture report. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
British intelligence agency MI5 was reportedly warned by its US counterpart that Salman Abedi was planning an attack on UK soil, three months before he blew himself up outside an Ariana Grande concert in Manchester. FBI agents are said to have informed British officials that the 22-year-old was part of a North African Islamic State cell based in the north west of England that was plotting an attack in the UK. “In early 2017 the FBI told MI5 that Abedi belonged to a North African terror gang based in Manchester, which was looking for a political target in this country," a security source [said]. “The information came from the interception of his communications by US federal agents, who had been investigating Abedi since the middle of 2016, and from information unearthed in Libya, where his family was linked to terrorist groups. “Following this US tip-off, Abedi and other members of the gang were scrutinised by MI5. It was thought at the time that Abedi was planning to assassinate a political figure. But nothing came of this investigation and, tragically, he slipped down the pecking order of targets.” MI5 has faced questions over the fact that Abedi was on its radar but slipped through the net in order to carry out the attack that killed 22 people and seriously injured 64. Police have so far arrested 14 people on suspicion of terror offences in conjunction with the Manchester attack, two of whom have since been released.
Note: Read this revealing article for more evidence that the Manchester atrocity was possibly allowed to happen, or worse. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
A federal appeals court on Tuesday revived a high-profile challenge to the National Security Agency’s warrantless surveillance of internet communications. The ruling ... increases the chances that the Supreme Court may someday scrutinize whether the N.S.A.’s so-called upstream system for internet surveillance complies with Fourth Amendment privacy rights. The ruling reversed a Federal District Court judge’s decision to throw out the case. The district judge had ruled that the plaintiffs - including the Wikimedia Foundation - lacked standing to sue because they could not prove that their messages had been intercepted. Because of how the internet works, surveillance of communications crossing network switches is different from traditional circuit-based phone wiretapping. While the government can target a specific phone call without touching anyone else’s communications, it cannot simply intercept a surveillance target’s email. Instead ... to find such emails it is necessary first to systematically copy data packets crossing a network switch and sift them in search of components from any messages involving a target. Documents provided by [Edward] Snowden and declassified by the government have shown that this system works through equipment installed at the facilities of companies, like AT&T, that [connect] the American internet to the rest of the world. Privacy advocates contend that the initial copying and searching of all those data packets ... violates Fourth Amendment protections against government search and seizure.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
A decade-old internet scourge called ransomware went mainstream on Friday when cybercriminals seized control of computers around the world, from the delivery giant FedEx in the United States to Britain’s public health system, universities in China and even Russia’s powerful Interior Ministry. Ransomware is nothing new. For years, there have been stories of individuals or companies horrified that they have been locked out of their computers and that the only way back in is to pay a ransom to someone, somewhere who has managed to take control. But computer criminals are discovering that ransomware is the most effective way to make money in the shortest amount of time. Friday’s attacks were a powerful escalation of earlier, much smaller episodes. Hackers exploited a vulnerability in Microsoft servers that was first discovered by the National Security Agency and then leaked online. It allowed the ransomware to spread [to] more than 70,000 organizations. There is even now a concept of “ransomware as a service” - a play on the Silicon Valley jargon “software as a service,” which describes the delivery of software over the internet. Now anyone can visit a web page, generate a ransomware file with the click of a mouse, encrypt someone’s systems and demand a ransom to restore access to the files. If the victim pays, the ransomware provider takes a cut of the payment. Ransomware criminals also have customer service lines that victims can call to get help paying a ransom.
Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
[The CIA] has since 1945 succeeded in deposing or killing a string of leaders, but was forced to cut back after a Senate investigation in the 1970s. Some of the most notorious of the CIA’s operations to kill world leaders were those targeting the late Cuban president, Fidel Castro. Attempts ranged from snipers to imaginative plots worthy of spy movie fantasies. But although the CIA attempts proved fruitless in the case of Castro, the US intelligence agency has ... succeeded in deposing or killing a string of leaders elsewhere around the world – either directly or, more often, using sympathetic local military, locally hired criminals or pliant dissidents. On Friday, [North Korea accused] the CIA and South Korea’s intelligence service of being behind an alleged recent assassination attempt on its leader Kim Jong-un. Such a claim cannot be dismissed as totally outlandish – given the long list of US involvement in coups and assassinations worldwide. The agency was forced to cut back on such killings after ... then president Gerald Ford signed in 1976 an executive order stating: “No employee of the United States government shall engage in, or conspire in, political assassination.” In spite of this, the US never totally abandoned the strategy, simply changing the terminology from assassination to targeted killings. A leaked document obtained by WikiLeaks and released earlier this year showed the CIA in October 2014 looking at hacking into car control systems, [potentially allowing] an agent to stage a car crash.
Note: Strong evidence suggests that courageous journalist Michael Hastings was killed when his car controls were hacked causing him to crash head on into a tree. For more along these lines, see concise summaries of deeply revealing news articles on verified or suspected assassinations from reliable major media sources.
In 1953, the then-Director of Central Intelligence officially approved project MKUltra. Originally intended to make sure the United States government kept up with presumed Soviet advances in mind-control technology ... MKUltra has gone down in history as a significant example of government abuse of human rights. The intent of the project was to study “the use of biological and chemical materials in altering human behavior,” according to ... official testimony. Under MKUltra, the CIA gave itself the authority to [experiment on] unwitting test subjects, like drug-addicted prisoners, marginalized sex workers and terminal cancer patients. “The covert testing programs resulted in massive abridgements of the rights of American citizens, sometimes with tragic consequences,” concluded a Senate hearing in 1975-76. MKUltra wasn’t one project, as the US Supreme Court wrote in a 1985 decision. It was 162 different secret projects that were indirectly financed by the CIA, but were “contracted out to various universities ... and similar institutions.” In all, at least 80 institutions and 185 researchers participated, but many didn’t know they were dealing with the CIA. Many of MKUltra’s records were destroyed. But 8,000 pages of records - mostly financial documents that were mistakenly not destroyed in 1973 - were found in 1977. Nobody ever answered for MKUltra. Two lawsuits related to the program reached the Supreme Court, [writes Melissa Blevins for Today I Found Out], “but both protected the government over citizen’s rights.”
Note: Unfortunately, MK-ULTRA is far from the only program to have used humans as guinea pigs in attempts to create more powerful mind control technologies. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
Muhammad Yunus, the Bangladeshi economist, microfinancing pioneer and founder of the grassroots Grameen Bank, has not been resting on his laurels since wining the Nobel peace prize in 2006. The idea behind his multi award-winning idea of microcredit is that everyone is a natural entrepreneur. “Human beings are not born to work for anybody else,” he says. “For millions of years that we were on the planet, we never worked for anybody. We are go-getters. So this is our tradition. There are roughly 160 million people all over the world in microcredit, mostly women. And they have proven one very important thing: that we are all entrepreneurs. Illiterate rural women in the villages ... take tiny little loans - $30, $40 - and they turn themselves into successful entrepreneurs.” In the mid 70s, as a young economics professor, Yunus experimented with lending a mere $27 to 42 women in the village ... near his university. Banks would not lend to the poor ... and moneylenders charged extortionate rates. His experiment was a success, and he began to develop ... the Grameen Bank. The Grameen Bank today has nine million borrowers, 97% of them women. “They own the bank. It is a bank owned by poor women,” he says. “The repayment rate is 99.6%, and it has never fallen below that in our eight years of experience.” Part of his expansion into rich countries includes a program in the US: 19 branches in 11 cities, including eight in New York.
Note: Learn more about the inspiring microcredit movement helping to reduce inequality while securing financial returns for investors.
Approximately half of adult Americans’ photographs are stored in facial recognition databases that can be accessed by the FBI, without their knowledge or consent, in the hunt for suspected criminals. About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports. The algorithms used to identify matches are inaccurate about 15% of the time, and are more likely to misidentify black people than white people. These are just some of the damning facts presented at last week’s House oversight committee hearing, where politicians and privacy campaigners criticized the FBI and called for stricter regulation of facial recognition technology at a time when it is creeping into law enforcement and business. The FBI first launched its advanced biometric database ... in 2010, augmenting the old fingerprint database with further capabilities including facial recognition. The bureau did not inform the public ... nor did it publish a privacy impact assessment, required by law, for five years. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos. Last year, the US government accountability office (GAO) analyzed the FBI’s use of facial recognition technology and found it to be lacking in accountability, accuracy and oversight. “It doesn’t know how often the system incorrectly identifies the wrong subject,” explained the GAO’s Diana Maurer. “Innocent people could bear the burden of being falsely accused.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
The C.I.A. developed tools to spy on Mac computers by injecting software into the chips that control the computers’ fundamental operations, according to the latest cache of classified government documents published on Thursday by WikiLeaks. All of the surveillance tools that have been disclosed were designed to be installed on individual phones or computers. But the effects could be much wider. Cisco Systems, for example, warned customers this week that many of its popular routers, the backbone of computer networks, could be hacked using the C.I.A.’s techniques. Julian Assange, the founder of WikiLeaks, has offered to share the precise software code used by the C.I.A.’s cyberweapons with the affected companies. But major tech companies have been reluctant to directly engage with him for fear of violating American laws. The spy software described in the latest documents was designed to be injected into a Mac’s firmware, a type of software preloaded in the computer’s chips. It would then act as a “listening post,” broadcasting the user’s activities to the C.I.A. whenever the machine was connected to the internet. Tools that operate at the chip level can hide their existence and avoid being wiped out by routine software updates. Under an agreement struck during the Obama administration, intelligence agencies were supposed to share their knowledge of most security vulnerabilities with tech companies. The C.I.A. documents suggest that some key vulnerabilities were kept secret.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
In a heavily protected military base some 15 miles south of Washington, D.C., sits the massive headquarters of a spy agency few know exists. The [National Geospatial-Intelligence Agency, or] NGA remains by far the most shadowy member of the Big Five spy agencies, which include the CIA and the National Security Agency. Despite its lack of name recognition, the NGA’s headquarters is the third-largest building in the Washington metropolitan area. The NGA is to pictures what the NSA is to voices. Its principal function is to analyze the billions of images and miles of video captured by drones ... and spy satellites. The agency has never been involved in domestic spy scandals. However, there’s reason to believe that this will change. In March 2016, the Pentagon released the results of an investigation initiated by the Department of Defense’s Office of Inspector General to examine military spy drones in the United States. The report ... revealed that the Pentagon used unarmed surveillance drones over American soil. The investigation also quoted from an Air Force law review article pointing out the growing concern that technology designed to spy on enemies abroad may soon be turned around to spy on citizens at home. In 2016, unbeknownst to many city officials, police in Baltimore began conducting persistent aerial surveillance using a system developed for military use in Iraq. Few civilians have any idea how advanced these military eye-in-the-sky drones have become.
Note: This article was written by former ABC News producer James Bamford, whose 2001 article on Operation Northwoods revealed that the top Pentagon generals signed off on top-secret plans which stated, "We could blow up a U.S. ship in Guantanamo Bay and blame Cuba," and, "casualty lists in U.S. newspapers would cause a helpful wave of national indignation." And showing the level of major media complicity, only ABC News reported on this. For more, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
US President Donald Trump has given the Central Intelligence Agency new authority to conduct drone attacks against suspected militants. The move would be a change from the policy of former President Barack Obama's administration of limiting the CIA's paramilitary role. The United States was the first to use unmanned aircraft fitted with missiles to kill militant suspects in the years after the September 11, 2001, attacks on New York and Washington. Strikes by missile-armed Predator and Reaper drones against overseas targets began under former President George W. Bush and were expanded by Obama. Critics of the targeted killing program question whether the strikes create more militants than they kill. They cite the spread of jihadist organisations and militant attacks throughout the world as evidence that targeted killings may be exacerbating the problem. In July, the US government accepted responsibility for inadvertently killing up to 116 civilians in strikes in countries where America is not at war.
Note: Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
WikiLeaks leader Julian Assange’s revelation last week of the CIA’s arsenal of hacking tools had a misplaced tone of surprise. Some scary initial stories argued that the CIA could crack Signal and WhatsApp phone encryption, not to mention your toaster and television. But ... the hardest question here is whether the CIA and other government agencies have a responsibility to disclose to software vendors the holes they discover in computer code, so they can be fixed quickly. This may sound like a no-brainer. The problem is that there’s a global market for “zero-day” exploits (ones that are unknown on the day they’re used). U.S. intelligence agencies buy some of these exploits; so do other countries’ spy services, criminal gangs and the software vendors themselves. A recent report by the Rand Corp. [calculated that] there are about two dozen companies selling or renting exploits to the United States and its allies, with many of these contractors making between $1 million and $2.5 million annually. More than 200 zero-day exploits studied by Rand went undetected for an average of 6.9 years. Given this evidence, Rand argued, “some may conclude that stockpiling zero-days may be a reasonable option” to combat potential adversaries. But let’s be honest: The real shocker in the WikiLeaks scoop is the demonstration ... that the U.S. government can’t keep secrets. It makes little sense for the CIA to argue against disclosing its cyber-tricks to computer companies if this valuable information is going to get leaked ... anyway.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
WikiLeaks has alleged that the CIA looked into vehicle interference methods that could potentially enable it to assassinate people without detection. According to the whistle-blowing organisation, the CIA explored the tactic in October 2014. It hasn’t included any more details about the alleged practice. WikiLeaks included the claim in its release announcing ‘Vault 7’, a huge batch of documents, which Julian Assange claims to account for the CIA’s “entire hacking capacity”. “As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks,” reads a passage in the release. “The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.” The CIA has also been accused of using malware and hacking tools to turn TVs into covert microphones and remotely break into smartphones. The latter, according to WikiLeaks, allowed it to bypass encryption on a number of popular messaging apps, including WhatsApp. WikiLeaks describes Vault 7 as “the largest intelligence publication in history” and says that the initial batch of 8,761 files is just the first in a series of releases.
Note: See the wikileaks webpage summarizing this most important leak. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
WikiLeaks on Tuesday released a significant cache of documents that it said came from a high-security network inside the Central Intelligence Agency. WikiLeaks called the documents Vault 7, and they lay out the capabilities of the agency’s global covert hacking program. By the end of 2016, the C.I.A. program had 5,000 registered users, including government employees and contractors, [and] had produced more than a thousand hacking systems. The files have circulated among former United States government hackers and contractors in “an unauthorized manner, one of whom provided WikiLeaks with portions of the archive,” WikiLeaks said. The software targeted by the hacking program included the most popular smartphone operating systems. Apple’s iPhone software ... was a particular target, including the development of several “zero day” exploits - a term for attacking coding flaws the company would not have known about. Google’s Android ... received even more attention. By 2016, the C.I.A. had 24 weaponized Android “zero day” software programs. The C.I.A. also targeted ... internet-connected computers and home and industrial devices running the Linux operating system. In 2010, the Obama administration promised to disclose newly discovered vulnerabilities to companies like Apple, Google and Microsoft. But the WikiLeaks documents indicate that the agency found security flaws, kept them secret and then used them for surveillance and intelligence gathering.
Note: See the wikileaks webpage summarizing this most important leak. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
President Trump’s allegations that former President Barack Obama tapped his phone and his assertions that the bureaucracy is leaking secrets to discredit him are the latest signs of a White House preoccupation with a “deep state” working to thwart the Trump presidency. “A deep state [is] part of government or people outside of government that are literally controlling the direction of the country no matter who’s actually in charge, and probably engaging in murder and other corrupt practices,” [former National Security Council official Loren DeJonge] Schulman said. The deep state is a phrase often heard in countries where there is a history of military coups. Pakistan is Exhibit A: The deep state is often invoked in serious discussions about the role of the Pakistani military and its intelligence service. Wide swaths of the population see the unseen hand of the security services behind major political events and all kinds of everyday happenings, such as random traffic stops. The views are not without basis. “The deep state concept emerges in places where the army and the security apparatus creates boundaries within which the civilian political people are allowed to operate,” said Peter Feaver, a specialist in civil-military issues. “If they transgress those boundaries, then the deep state interferes to reorder things, often using military force. There are milder forms of it in healthier democracies,” Mr. Feaver said.
Note: A 2014 Boston Globe article suggests that US policy in the national security realm is made by "concealed institutions" rather than by elected officials. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Leaked court documents raise concerns that the murder of the Honduran environmentalist Berta Cáceres was an extrajudicial killing planned by military intelligence specialists linked to the country’s US–trained special forces. Cáceres was shot dead a year ago while supposedly under state protection after receiving death threats over her opposition to a hydroelectric dam. The murder of Cáceres, winner of the prestigious Goldman environmental prize in 2015, prompted international outcry and calls for the US to revoke military aid to Honduras, a key ally in its war on drugs. Eight men have been arrested in connection with the murder, including one serving and two retired military officers. Officials have denied state involvement in the activist’s murder, and downplayed the arrest of the serving officer Maj Mariano Díaz. But ... Díaz, a decorated special forces veteran, was appointed chief of army intelligence in 2015. Another suspect, Lt Douglas Giovanny Bustillo joined the military on the same day as Díaz. Díaz and Bustillo both received military training in the US. A third suspect, Sgt Henry Javier Hernández, was a former special forces sniper, who had worked under the direct command of Díaz. Last year, the Guardian reported that a former Honduran soldier said he had seen Cáceres’s name on a hitlist that was passed to US-trained units. Sgt Rodrigo Cruz said that two elite units were given lists featuring the names and photographs of activists – and ordered to eliminate each target.
Note: The Western Hemisphere Institute for Security Cooperation, formerly known as the School of the Americas, reportedly graduated more than 500 human rights abusers. The identities of many other US-trained troops operating in other countries remain hidden by US courts. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
The Department of Justice proudly announced the first FBI terror arrest of the Trump administration on Tuesday: an elaborate sting operation that snared a 25-year-old Missouri man who had no terrorism contacts besides the two undercover FBI agents who paid him to buy hardware supplies they said was for a bomb - and who at one point pulled a knife on him and threatened his family. Robert Lorenzo Hester of Columbia, Missouri, didn’t have the $20 he needed to buy the 9-volt batteries, duct tape, and roofing nails his new FBI friends wanted him to get, so they gave him the money. The agents noted in a criminal complaint that Hester, who at one point brought his two small children to a meeting because he didn’t have child care, continued smoking marijuana despite professing to be a devout Muslim. But according to the DOJ press release, Hester had plans to conduct an “ISIS-sponsored terrorist attack” on President’s Day that would have resulted in mass casualties had it succeeded. News reports breathlessly echoed the government’s depiction of Hester as a foiled would-be terrorist. But the only contact Hester had with ISIS was with the two undercover agents. There appears to be little to suggest that [Hester] had the wherewithal or capacity to carry out a terrorist attack. His case is similar to many others in which individuals in financial, legal, or psychological distress have been befriended by undercover FBI agents or government informants and coaxed into developing a terrorist plot.
Note: The FBI has been stepping up its use of stings in ISIS cases. Read how an FBI mole posing as a potential lover recently convinced a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
Last week, Trump blocked Rex Tillerson from hiring Elliott Abrams as his deputy at the State Department after someone brought to his attention critical comments he had made during the campaign. That happened despite a job interview that had gone well. Last night, Robert Harward turned down Trump’s offer to replace Michael Flynn as national security adviser. One key factor in Harward's decision to turn down the job was that he couldn't get a guarantee that he could select his own staff. Specifically ... Harward wanted commitments that the National Security Council would be fully in charge of security matters, not Trump's political advisers. Just yesterday, Secretary of State Rex Tillerson’s enforcers at the State Department laid off staff at Foggy Bottom while the secretary traveled in Europe. Much of seventh-floor staff, who work for the Deputy Secretary of State for Management and Resources and the Counselor offices, were told ... that their services were no longer needed. These staffers in particular are often the conduit between the secretary’s office to the country bureaus, where the regional expertise is centered. Inside the State Department, some officials fear that this is a politically-minded purge that cuts out much-needed expertise from the policy-making, rather than simply reorganizing the bureaucracy. Ambassador Kristie Kenney, the Counselor of the State Department and one of the last remaining senior officials, was [also] informed that she will be let go. Also noteworthy: Not a single State Department official was included in the White House meetings with Israeli Prime Minister Benjamin Netanyahu this week.
Note: While simple politics or government corruption may be responsible for this high-level reshuffling, this video interview with former CIA agent Robert David Steele suggests there is much more going on behind the scenes.
Juan Pablo Escobar, the son of the most dangerous criminal in the history of Colombia, Pablo Escobar, has written a new book on the life and death of his father in which he said that the drug trafficker worked for the CIA. "In my book, I recount the story of my father working for the CIA selling cocaine to finance the fight against communism in Central America. There are names like George Bush Sr. and many more," said Escobar. "The drug business is very different from what you might imagine. The CIA was buying control of the drug supply going into each country and making huge profits. My father was a cog in their global drug trafficking network. When he no longer served them, they had him killed," said Juan Pablo Escobar. Remember that Bush was chief of the CIA in the administration of Richard Nixon. In his book Pablo Escobar Infraganti, the son of Escobar, known until 2009 by the name of Juan Sebastián Marroquín, reveals the corruption stories that made his father so "successful," despite the violence in which he immersed Colombia. Juan Pablo Escobar rejected the idea of glamorizing the drug trafficking business as portrayed in series like Narcos, of Netflix, which deal with the lives of the drug dealers and hitmen that worked for his father. "It is not true that a drug kingpin has riches, girls and power. The more power my father had, the poorer he lived, " he said.
Note: This article is in Spanish on the msn.com website at the link above, yet the English major media is completely ignoring it, including MSN, which has no English version of the article. For more, read this article. For excellent evidence of CIA involvement in drug running, see what two top journalists have written. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The dozens of American diplomats taken hostage by revolutionary students who seized the U.S. Embassy in Iran in 1979 might have had some secret company during their 15-month captivity: U.S. intelligence agencies had a squad of military-trained psychics using ESP to watch them, according to declassified documents in a newly available CIA database. In an operation code-named Grill Flame, half a dozen psychics ... on more than 200 occasions tried to peer through the ether to see where the hostages were being held, how closely they were guarded and the state of their health. Whether the psychics provided any useful intelligence was the subject of a debate among intelligence officials as heated as it was secret. The debate continues today. “The stuff that the CIA has declassified is garbage,” one of the Grill Flame psychics, Joseph McMoneagle, told the Miami Herald. “They haven’t declassified any of the stuff that worked.” Agreed Edwin May, a physicist who oversaw parapsychology research for government intelligence agencies for 20 years: “The psychics were able to tell, in some cases, where the hostages were moved to. They were able to see the degree of their health.” Operation Grill Flame was just one part of a broader U.S. intelligence project involving psychics and ESP that continued for 20 years. It went through as many as 10 different code names as its management shifted from agency to agency ... and carried out 26,000 telepathic forays by 227 psychics before the government shut it down in 1995.
Note: Read more on McMoneagle's work as a psychic for the US military. For more excellent, well resourced material on remote viewing and why the intelligence community continues to deny its successes, see this webpage.
The FBI is investigating political activists campaigning against the Dakota Access pipeline, diverting agents charged with preventing terrorist attacks to instead focus their attention on indigenous activists and environmentalists. Officers within the FBI’s joint terrorism taskforce have attempted to contact at least three people tied to the Standing Rock “water protector” movement in North Dakota. “The idea that the government would attempt to construe this indigenous-led non-violent movement into some kind of domestic terrorism investigation is unfathomable to me,” said Lauren Regan, a civil rights attorney. “It’s outrageous, it’s unwarranted … and it’s unconstitutional.” Regan ... said she learned of three cases in which officers with the taskforce, known as the JTTF, tried to talk to activists in person. She described the encounters as attempted “knocks and talks”, meaning law enforcement showed up at people’s doors without a subpoena or warrant and tried to get them to voluntarily cooperate with an interview. The three individuals ... asserted their fifth amendment rights and did not respond to the officers, according to Regan. All three contacts were made in recent weeks after Trump’s inauguration. Trump, a former investor in Energy Transfer Partners, the Texas-based firm behind the pipeline, took executive action in his first week in office to expedite the project. On Wednesday, workers began drilling to complete the pipeline.
Note: The FBI has a long history of violating activists' rights. The 2011 National Defense Authorization Bill broadened the definition of "supporter of terrorism" to include peaceful activists, authors, academics and even journalists. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
When Bill Binney, former NSA analyst and head of the anti-terror ThinThread metadata program sits in front of you and says he is not afraid of the government, you have to admire him. A wheel-chair-bound U.S. serviceman who rose in the ranks of intelligence to work in top-secret NSA programs, Binney created ThinThread prior to September 11, 2001, and says it mathematically broke down all phone communications anywhere in the world without any infringement on Constitutional rights. The program was self-running. More important, it worked. In "A Good American," the new documentary from executive producer Oliver Stone ... audiences are taken on a tense and frightening ride through Binney and his colleagues' experience developing and deploying ThinThread in tests, only to see its funding pulled just weeks before 9/11 in favor of an expensive and ineffective ... program called Trailblazer. Binney contends that ThinThread would have identified the terrorists who planned and executed the 9/11 terror attacks, thereby preventing them from occurring. When ThinThread's plug was pulled, Binney and his team challenged their NSA bosses, and in the process found themselves at odds with the U.S. government and in a complex web of lies and corruption. Thus, when Binney said he remains unafraid of possible repercussions or retaliation tied to the film's thesis, it's not hard to believe. "What else can they do to me?" he asks. "They've already tried everything to stop me."
Note: Watch a free trailer or rent the whole documentary on this webpage. Read a revealing, detailed New York Times article on Oliver Stone and his profound work to expose corruption and manipulation through film. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
Using loopholes it has kept secret for years, the FBI can in certain circumstances bypass its own rules in order to send undercover agents or informants into political and religious organizations, as well as schools, clubs, and businesses. If the FBI had its way, the infiltration loopholes would still be secret. They are detailed in a mammoth document obtained by The Intercept, an uncensored version of ... the Domestic Investigations and Operations Guide, or DIOG. If an undercover agent wants to pose as a university student and take classes, or if an FBI handler wants to tell an informant to attend religious services - two examples straight out of the rulebook - he or she must obtain a supervisor’s approval and attest both to the operation’s importance and to its compliance with constitutional safeguards. But all those rules go out the window if an agent decides the group is “illegitimate” or an informant spies on the group of his or her own accord. Civil rights groups ... worry that the FBI has made use of precisely these kinds of loopholes, silently undermining cherished freedoms enshrined after a dark chapter of FBI history: the COINTELPRO program in the 1950s and ’60s, when the FBI spied on, harassed, and tried to discredit leftists, civil rights leaders, and anti-war protestors. The exposure of COINTELPRO led to a famous Senate investigation and to institutional reform. The DIOG, despite being hundreds of pages of dense bureaucracy, actually documents a loosening of the standards enacted to rein in the FBI after COINTELPRO and other scandals ... after the 9/11 attacks.
Note: Read a detailed essay on the FBI's COINTELPRO program from the well-researched online book Lifting the Veil. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the erosion of civil liberties.
About 13 million pages of declassified documents from the US Central Intelligence Agency (CIA) have been released online. Among the more unusual records are documents from the Stargate Project, which dealt with psychic powers and extrasensory perception. Those include records of testing on celebrity psychic Uri Geller in 1973. Memos detail how Mr Geller was able to partly replicate pictures drawn in another room with varying - but sometimes precise - accuracy, leading the researchers to write that he "demonstrated his paranormal perceptual ability in a convincing and unambiguous manner". Other unusual records include a collection of reports on flying saucers. While much of the information has been technically publicly available since the mid-1990s, it has been very difficult to access. The records were only available on four physical computers ... at the National Archives in Maryland. A non-profit freedom of information group, MuckRock, sued the CIA to force it to upload the collection. At the same time, journalist Mike Best crowd-funded more than $15,000 to visit the archives to print out and then publicly upload the records, one by one. "By printing out and scanning the documents at CIA expense, I was able to begin making them freely available to the public and to give the agency a financial incentive to simply put the database online," Best wrote.
Note: The entire declassified archive of the Stargate Project is now available on the CIA Library website. Explore a treasure trove of excellent resources on remote viewing. For decades, officials denied the existence of remote viewing programs and UFO investigations. What other intelligence agency lies will be exposed as more information like this comes to light?
The announcement by the Justice Department’s inspector general that his office will look into FBI Director James B. Comey’s handling of Hillary Clinton’s emails reopens painful questions about the 2016 election, but it is also welcome news. The investigation will address allegations that Comey violated established Justice Department and FBI policies and procedures in his July 5, 2016, public announcement concerning the Hillary Clinton email investigation. And it will explore allegations that Comey’s Oct. 28 and Nov. 6 letters to Congress, which jolted the presidential election ... were improper. In addition to looking into the actions of the FBI director regarding the email investigation, the probe will look into whether the FBI’s deputy director should have recused himself from the investigation because of his wife’s political involvement; whether a high-ranking Justice Department official or others improperly disclosed non-public information to both the Clinton and Trump campaigns; and whether the timing of the FBI’s election eve Freedom of Information Act disclosures relating to Bill Clinton’s 2001 pardon of Marc Rich was based on inappropriate considerations. This investigation has bipartisan support. It was requested by the chairman and ranking members of multiple congressional oversight committees. Federal inspectors general, who do not leave with the change of administrations ... are the only political appointees whom the law requires be selected “without regard to political affiliation and solely on the basis of integrity.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the manipulation of public perception.
Christopher Steele, the former MI6 agent who investigated Donald Trump’s alleged Kremlin links, was so worried by what he was discovering that at the end he was working without pay. Mr Steele also decided to pass on information to both British and American intelligence officials after concluding that such material should not just be in the hands of political opponents of Mr Trump, who had hired his services, but was a matter of national security. However, say security sources, Mr Steele became increasingly frustrated that the FBI was failing to take action on the intelligence. He came to believe there was a cover-up, that a cabal within the Bureau blocked a thorough inquiry into Mr Trump. A colleague of Mr Steele in Washington, Glenn Simpson, a former Wall Street Journal reporter who runs the firm Fusion GPS, felt the same way. Fusion GPS had been hired by Republican opponents of Mr Trump in September 2015. In June 2016 Mr Steele came on the team. In July, Mr Trump won the Republican nomination and the Democrats became new employers of Mr Steele and Fusion GPS. By September ... Mr Steele [had] compiled a set of his memos into one document and passed it to his contacts at the FBI. But there seemed to be little progress in a proper inquiry into Mr Trump. The Bureau, instead, seemed to be devoting their resources in the pursuit of Hillary Clinton’s email transgressions. The New York office, in particular, appeared to be on a crusade against Ms Clinton.
Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss this provocative article by Glenn Greenwald and this interview he gave to Fox News. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the manipulation of public perception.
For months, the CIA, with unprecedented clarity, overtly threw its weight behind Hillary Clinton’s candidacy. In August, former acting CIA Director Michael Morell announced his endorsement of Clinton in the New York Times and claimed that “Mr. Putin had recruited Mr. Trump as an unwitting agent of the Russian Federation.” The CIA and NSA director under George W. Bush, Gen. Michael Hayden, also endorsed Clinton and went to the Washington Post to warn, in the week before the election, that “Donald Trump really does sound a lot like Vladimir Putin.” It is not hard to understand why the CIA preferred Clinton over Trump. Clinton was critical of Obama for restraining the CIA’s proxy war in Syria and was eager to expand that war. Clinton clearly wanted a harder line than Obama took against the CIA’s long-standing foes in Moscow. In general, Clinton defended and intended to extend the decadeslong international military order on which the CIA and Pentagon’s preeminence depends, while Trump - through a still-uncertain mix of instability and extremist conviction - posed a threat to it. The claims about Russia’s interference in U.S. elections and ties to Trump should be fully investigated. But until then, assertions that are unaccompanied by evidence and disseminated anonymously should be treated with the utmost skepticism. Venerating the intelligence community ... and equating its dark and dirty assertions [with] Truth ... cannot possibly achieve any good and is already doing much harm.
Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss the above provocative article by Glenn Greenwald and this interview he gave to Fox News.
We might already be living through the first world cyberwar – it’s just that we haven’t acknowledged or named it yet. What might a timeline of that war look like? Well, 2007 seems like a good bet as a starting point – with a concerted series of cyber-attacks on Estonia. In 2008 there were events that a historian might weave into a narrative of a global cyberwar, when several underwater internet cables were cut during the course of the year, interrupting internet communication and particularly affecting the Middle East. In 2010 the Stuxnet worm was used to attack Iran’s nuclear program. Another event from 2010, the WikiLeaks American embassy cables release ... would be irresistible for a historian to refer to in this context. One of the things that makes the first world cyberwar different from conventional warfare [is] the mix of nation states being involved with pressure groups, whistleblowers and hackers. Historians will be unable to ignore ... the 2016 US election campaign being influenced by alleged hacked and leaked emails. What reason is there to suppose that these events might eventually be grouped together as a single world cyberwar by historians? It is the idea that hostilities might formally come to an end. You can envisage a scenario where Russia, China and the US can see a mutual benefit in de-escalating cyber-attacks between the three of them.
Note: A 2007 New York Times article describes the formation of the Air Force Cyberspace Command to arm the US military in anticipation of widespread computer-based warfare. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
The C.I.A., the F.B.I. and the White House may all agree that Russia was behind the hacking that interfered with the election. But that was of no import to the website Breitbart News, which dismissed reports on the intelligence assessment as “left-wing fake news.” Until now, that term had been widely understood to refer to fabricated news accounts that are meant to spread virally online. But conservative cable and radio personalities ... have appropriated the term and turned it against any news they see as hostile to their agenda. In defining “fake news” so broadly and seeking to dilute its meaning, they are capitalizing on the declining credibility of all purveyors of information. Journalists who work to separate fact from fiction see a dangerous conflation of stories that turn out to be wrong because of a legitimate misunderstanding with those whose clear intention is to deceive. A report, shared more than a million times on social media, that the pope had endorsed Mr. Trump was undeniably false. But was it “fake news” to report on data models that showed Hillary Clinton with overwhelming odds of winning the presidency? Are opinion articles fake if they cherry-pick facts to draw disputable conclusions? “Fake news was a term specifically about people who purposely fabricated stories for clicks and revenue,” said David Mikkelson, the founder of Snopes, the myth-busting website. “Now it includes bad reporting, slanted journalism and outright propaganda. And I think we’re doing a disservice to lump all those things together.”
Note: For more along these lines, see concise summaries of deeply revealing media corruption news articles from reliable sources.
Carnegie Mellon University researcher Dov Levin [has compiled a] historical database that tracks U.S. involvement in meddling with foreign elections over the years. The U.S. has ... tried to influence the outcome of another country's election ... more than 80 times worldwide between 1946 and 2000. One example of that was our intervention in Serbia, Yugoslavia in the 2000 election there. Slobodan Milosevic was running for re-election, and we didn't want him to stay in power there. So we intervened in various ways for the opposition candidate, Vojislav Kostunica. And we gave funding to the opposition, and we gave them training and campaigning aide. That assistance was crucial in enabling the opposition to win. About one-third of [election interventions] are public, and two-third of them are covert. In other words, they're not known to the voters in the target before the election. Covert coup d'etats like the United States did in Iran in 1953 or in Guatemala in 1954 [were not counted, only times] when the United States [tried] directly to influence an election for one of the sides. The United States is the most common user of this technique. Russia or the Soviet Union since 1945 has used it half as much. My estimate has been 36 cases between 1946 to 2000. We know also that the Chinese have used this technique and the Venezuelans when the late Hugo Chavez was still in power in Venezuela and other countries.
Note: For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources.
The US "got it wrong" about Saddam Hussein and Iraq, the CIA analyst who interrogated the former dictator has said. John Nixon had numerous conversations with the deposed leader and now says that America was critically mistaken about their intervention Iraq. In particular, he claims, the CIA’s view of Hussein’s attitude to using chemical weapons was wrong. During the interrogations, Mr Nixon asked Hussein if he’d ever thought of engaging in a pre-emptive strike with WMDs against US troops based in Saudi Arabia. According to Mr Nixon ... the former dictator’s reply was: “We never thought about using weapons of mass destruction. It was not discussed. Use chemical weapons against the world? Is there anyone with full faculties who would do this?” Mr Nixon admitted this was “not what we had expected to hear”. The main reason the American and British governments used to justify the controversial invasion of Iraq was the supposed risk posed by the WMDs possessed by the country. Nearly 200,000 people have died in the conflicts that followed. Iraq is now widely regarded as a failed state, and still suffers from widespread violence. Thirteen years on, at least 5,000 American troops remain in the country. Mr Nixon also spoke out against Mr Bush, who was rude towards him and reportedly made inappropriate jokes about the missing WMDs. Mr Bush blamed the CIA for Iraq’s failures, Mr Nixon said, adding that he “called its analysis ‘guesswork’ while hearing only what he wanted to hear”.
Note: Have you noticed how every Arabic nation to which the U.S. has sent armed forces has ended up not with a stronger democracy, but in a situation of chaos? Do you think this might be intentional? The war machine makes huge profits from conditions of chaos. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
The watchdog wing of Congress has quietly launched an investigation into the “integrity” of the Pentagon’s whistleblower protection program. The Government Accountability Office, which serves as the investigative arm of Congress, has been looking into the extent to which Department of Defense whistleblower policies ... reassure employees of their rights to raise concerns “without fear of reprisal.” The investigation will also likely target senior Pentagon officials accused of destroying evidence that would have exculpated former senior NSA official Thomas Drake, who raised internal complaints about what he believed to be NSA misconduct and waste before ultimately approaching journalists. Rather than having his concerns acknowledged, Drake spent months fighting charges against him under the Espionage Act. His career in the intelligence community was ended. “Bureaucratic abuses of power are the primary reason otherwise circumspect national security whistleblowers leak to the media. It is too dangerous to work within an untrustworthy system,” Tom Devine, legal director of the Government Accountability Project, wrote in a statement. John Crane, formerly the assistant inspector general in the Pentagon, revealed his role in attempting to protect Drake’s identity and investigate the document destruction involved in his case last May - an effort he claims cost him his job. The implications of the investigation may eventually be important for evaluating the actions of former NSA contractor Edward Snowden.
Note: Mass surveillance whistleblower Thomas Drake attempted to work within the system and was was targeted for prosecution. John Crane was forced out of the Pentagon in 2013. His story is told in a new book, titled, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
In late 2014, Senate Democrats delivered to a handful of federal agencies copies of a 6,700-page classified report about the secret prison network the Central Intelligence Agency established after the Sept. 11 attacks. Senator Dianne Feinstein of California, who oversaw the report, hoped it would become a seminal document for national security professionals for generations to come. Now the report ... is at risk of remaining under wraps for more than a decade. At the Justice Department’s direction, officials at the C.I.A., State Department, Pentagon and Office of the Director of National Intelligence placed their copies in safes, unread. In January 2015, Senator Richard Burr, the new chairman of the Senate Select Committee on Intelligence ... wrote to President Obama demanding that all copies be returned to the Senate. He also instructed the administration not to enter the report into the executive branch’s system of records, since doing so would ... mean that the report could at some point see the light of day. On Friday, the White House informed Ms. Feinstein that it intended to preserve the report under the Presidential Records Act. That step bars the incoming administration from destroying all copies of the report. But President Obama did not ... declassify the study, which means that the report would remain secret for at least 12 years. “We can’t erase our mistakes by destroying the history books,” said Ms. Feinstein, who released a partly redacted summary of the report in December 2014.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
US intelligence agencies have concluded that Russia interfered in last month’s presidential election. Officials ... were told that intelligence agencies had found that individuals linked to the Russian government had provided WikiLeaks with thousands of confidential emails stolen from the Democratic National Committee (DNC) and others. The emails were steadily leaked via WikiLeaks ... revealing that DNC figures had colluded to harm the chances of [Clinton’s] nomination rival Bernie Sanders, and later giving examples of collusion between her campaign and figures in the media to blindside Trump in debates. The Kremlin has rejected the hacking accusations. WikiLeaks founder Julian Assange has previously said the DNC leaks were not linked to Russia. A ... senior official cited by the Washington Post conceded that intelligence agencies did not have specific proof that the Kremlin was “directing” the hackers. Craig Murray, the former UK ambassador to Uzbekistan, who is a close associate of Assange, [said of] the CIA claims: “They are absolutely making it up ... I know who leaked them. “They are certainly not Russian and it’s an insider. It’s a leak, not a hack; the two are different things. “If ... the CIA’s statement refers to people who are known to be linked to the Russian state, they would have arrested someone. America has not been shy about arresting whistleblowers and it’s not been shy about extraditing hackers. They plainly have no knowledge whatsoever.”
Note: The Guardian newspaper's website removed all front page links to the above article just three hours after it was published. In its place, the Guardian ran a new article that was entirely supportive of what Wikileaks affiliate Craig Murray calls "the CIA’s blatant lie" about the leaked DNC emails. A short essay by WantToKnow.info team member Mark Bailey explores this apparent media manipulation.
The CIA has concluded in a secret assessment that Russia intervened in the 2016 election to help Donald Trump win the presidency, rather than just to undermine confidence in the U.S. electoral system, according to officials briefed on the matter. Intelligence agencies have identified individuals with connections to the Russian government who provided WikiLeaks with thousands of hacked emails from the Democratic National Committee and others. “It is the assessment of the intelligence community that Russia’s goal here was to favor one candidate over the other, to help Trump get elected,” said a senior U.S. official. “That’s the consensus view.” The CIA shared its latest assessment with key senators in a closed-door briefing on Capitol Hill last week. The CIA presentation ... fell short of a formal U.S. assessment produced by all 17 intelligence agencies. A senior U.S. official said there were minor disagreements among intelligence officials about the agency’s assessment, in part because some questions remain unanswered. For example, intelligence agencies do not have specific intelligence showing officials in the Kremlin “directing” the identified individuals to pass the Democratic emails to WikiLeaks. Some key ... lawmakers have continued to question the quality of evidence supporting Russian involvement. “I’ll be the first one to come out and point at Russia if there’s clear evidence, but there is no clear evidence - even now,” said [chairman of the House Intelligence Committee] Devin Nunes.
Note: The above article comes on the heels of the Washington Post's promotion of an anti-Russian "McCarthyite blacklist" which smeared dozens of U.S. news sites as “routine peddlers of Russian propaganda.” For more along these lines, see concise summaries of deeply revealing news articles on elections corruption and the manipulation of public perception.
Vladimir K. Bukovsky, a tireless opponent of Soviet leaders and President Vladimir V. Putin of Russia, is not a man easily put off his stride. But he got knocked sideways when British police officers banged on the front door of his home ... and informed him that they had “received information about forbidden images” in his possession. He faced five charges of making indecent images of children, five charges of possession of indecent images of children and one charge of possession of a prohibited image. After Mr. Bukovsky, 73, entered a not-guilty plea, [the case] was delayed [following] a prosecution request for more time to review an independent forensic report on what had been found on Mr. Bukovsky’s computers and how an unidentified third party had probably put it there. Mr. Bukovsky ... insisted that he was the victim of a new and particularly noxious form of an old K.G.B. dirty trick known as kompromat, the fabrication and planting of compromising or illegal material. Old-style kompromat featured ... a wide range of other primitive entrapment techniques. Today, however, kompromat has become allied with the more sophisticated tricks of cybermischief-making. Hacking is not only a good way to get real information ... but a relatively easy and usually untraceable way to plant fake information. This blurring of all boundaries between truth and falsehood in the service of operational needs has created a climate in Russia in which even the most serious and grotesque accusations ... are simply a currency for settling scores.
Note: Hackers from any country's intelligence services could plant child porn on anyone's computer so that they would then be arrested and convicted. What a wild world we live in! For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
In the trove of documents provided by former National Security Agency contractor Edward Snowden is a treasure. It begins with a riddle: "What do the President of Pakistan, a cigar smuggler, an arms dealer, a counterterrorism target, and a combatting proliferation target have in common? They all used their everyday GSM phone during a flight." This riddle appeared in 2010 in SIDtoday, the internal newsletter of the NSA's Signals Intelligence Directorate, or SID, and it was classified "top secret." It announced the emergence of a new field of espionage that had not yet been explored: the interception of data from phone calls made on board civil aircraft. In a separate internal document from a year earlier, the NSA reported that 50,000 people had already used their mobile phones in flight as of December 2008, a figure that rose to 100,000 by February 2009. In a 2012 presentation, Government Communications Headquarters, or GCHQ ... disclosed a program called "Southwinds," which was used to gather all the cellular activity, voice communication, data, metadata, and content of calls on board commercial aircraft. To spy on a telephone, all that was required was that the aircraft be cruising at an altitude above 10,000 feet. Today, approximately 100 companies permit in-flight use of telephones. This will further extend the scope of espionage by providing a pool of potential targets comprising several hundreds of thousands of people. This implies a population that goes far beyond terrorist targets.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
In your Monday editorial, “Russia’s roulette,” you mentioned the “alarming evidence” of my government’s alleged involvement in the U.S. presidential elections. I do believe that it’s just nonsense, but if you insist that it’s true, then it would be interesting and necessary to see the evidence. I am sure that your respected newspaper meticulously worked through all the proofs before publishing the above-mentioned editorial. Unfortunately, nobody, including my government, despite numerous official requests, has never been presented with the onus probandi. The latter will not come from just repeating the unsubstantiated accusations over and over again or referring to unknown “independent researchers.” As far as I know, (National Security Agency Director) Adm. Michael Rogers in his recent interview with Wall Street Journal has never mentioned RUSSIA, while the official statement of Oct. 7 that has been repeatedly referred to, has never INDICTED Russia (“believing” and even being “confident” is something very different). Without evidence, in every state of law, with the United States being one of them, the principle of the presumption of innocence prevails. And accusations remain pure speculation. In this case, ill-intentioned.
Note: The above was written by Maxim Goncharov, a press attaché with the Russian Consulate in San Francisco. For more along these lines, see concise summaries of deeply revealing elections news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our Elections Information Center.
On the sixth anniversary of the first infamous "Cablegate" by WikiLeaks ... it has expanded its Public Library of US Diplomacy (PLUSD) with 531,525 new diplomatic cables from 1979. In a statement to coincide with the release of the cables, known as "Carter Cables III", Mr Assange explained how events which unfolded in 1979 had begun a series of events that led to the rise of ISIS: "The Iranian revolution, the Saudi Islamic uprising and the Egypt-Israel Camp David Accords led not only to the present regional power dynamic but decisively changed the relationship between oil, militant Islam and the world. "The uprising at Mecca permanently shifted Saudi Arabia towards Wahhabism, leading to the transnational spread of Islamic fundamentalism and the US-Saudi destabilisation of Afghanistan." He said at this point Osama bin Laden left his native Saudi Arabia for Pakistan to support the Afghan Mujahideen. He added: "The invasion of Afghanistan by the USSR would see Saudi Arabia and the CIA push billions of dollars to Mujahideen fighters as part of Operation Cyclone, fomenting the rise of al-Qaeda and the eventual collapse of the Soviet Union." The rise of al-Qaeda eventually bore the September 11, 2001 attacks in the United States, enabling the US invasion of Afghanistan and Iraq and over a decade of war, leaving, at its end, the ideological, financial and geographic basis for ISIS."
Note: Read a well-researched essay from the profound online book Lifting the Veil suggesting the War on Terror is a fraud. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
It was known as the “secret war,” but the covert campaign the Kennedy administration waged against Fidel Castro in the years after the Bay of Pigs rivaled open warfare in time, effort and money spent. It was a war waged largely by the Central Intelligence Agency from an informal command post at what was then the south campus of the University of Miami - home to JMWAVE, the code name for the biggest CIA station in the world outside Langley, Virginia. From there, upward of 400 full-time CIA officers toiled, plotting the covert campaign against Cuba, ranging from sabotage to assassination. Its chief from 1962 to 1965 ... was Ted Shackley. But Shackley was not the real commander of the covert war. That role fell to Robert F. Kennedy, the U.S. attorney general and brother of the president. By the fall of 1961, under intense prodding from Robert Kennedy, the U.S. policy had evolved into Operation Mongoose, the code name for a multiagency covert action plan designed to bring down Castro. The basic concept of the entire operation was to “bring about the revolt of the Cuban people ... and institute a new government,” [Mongoose operations chief Brig. Gen. Edward] Lansdale [said]. The budget of the Miami station has been estimated at $50 million annually during its peak years. In the most active period - roughly 1962 to 1964 - several thousand Cubans were on the payroll for a variety of tasks, ranging from sabotage and infiltration runs to Cuba to propaganda activities.
Note: A 1967 report declassified in 2003 describes some of the CIA's many plans to kill or embarrass Fidel Castro. For more along these lines, see concise summaries of deeply revealing intelligence agency news articles from reliable major media sources.
The heads of the Pentagon and the nation’s intelligence community have recommended to President Obama that the director of the National Security Agency, Adm. Michael S. Rogers, be removed. The recommendation, delivered to the White House last month, was made by Defense Secretary Ashton B. Carter and Director of National Intelligence James R. Clapper Jr.. The news comes as Rogers is being considered by President-elect Donald Trump to be his nominee for director of national intelligence to replace Clapper as the official who oversees all 17 U.S. intelligence agencies. In a move apparently unprecedented for a military officer, Rogers, without notifying superiors, traveled to New York to meet with Trump on Thursday at Trump Tower. That caused consternation at senior levels of the administration, according to the officials, who spoke on the condition of anonymity. Carter has concerns with Rogers’s performance, officials said. The driving force for Clapper ... was the separation of leadership roles at the NSA and U.S. Cyber Command, and his stance that the NSA should be headed by a civilian. The expectation had been that Rogers would be replaced before the Nov. 8 election. Meanwhile, in February, Rogers ... merged the agency’s spying and hacking arms with its computer-security division into one Directorate of Operations. That reorganization has only intensified the discontent that has marked Rogers’s tenure at the agency. “The morale is horrible,” one former senior official said.
Note: Edward Snowden tweeted this article stating, "The real story you're not hearing about is a revolt within the US Intelligence Community." For more along these lines, see concise summaries of deeply revealing news articles on corruption in the military and in intelligence agencies.
Do the committees that oversee the vast U.S. spying apparatus take intelligence community whistleblowers seriously? For the last 20 years, the answer has been a resounding “no.” My own experience in 1995-96 is illustrative. Over a two-year period working with my wife, Robin (who was a CIA detailee to a Senate committee at the time), we discovered that, contrary to the public statements by then-Chairman of the Joint Chiefs Colin Powell and other senior George H. W. Bush administration officials ... American troops had in fact been exposed to chemical agents during and after the 1991 war with Saddam Hussein. Officials at the Pentagon and CIA were working to bury it. The agency didn’t care about helping to find out why hundreds of thousands of American Desert Storm veterans were ill. Seeing the writing on the wall, I began working on what would become a book about our experience: “Gassed in the Gulf.” The agency tried to block publication of the book and attempted to reclassify hundreds of previously declassified Department of Defense and CIA intelligence reports that helped us make our case. Our story [became] a front-page sensation just days before the 1996 presidential election. Within six months, the CIA was forced to admit that it had indeed been withholding data on such chemical exposures, which were a possible cause of the post-war illnesses that would ultimately affect about one-third of the nearly 700,000 U.S. troops who served in Kuwait and Iraq. None of the CIA or Pentagon officials who perpetrated the cover-up were fired or prosecuted.
Note: The above article was written by whistleblower and former CIA analyst Patrick Eddington. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the manipulation of public perception.
The problem of racial bias among police [has] been a concern of the FBI for at least a decade. 10 years ago ... the FBI warned of the potential consequences - including bias - of white supremacist groups infiltrating local and state law enforcement, indicating it was a significant threat to national security. In the 2006 bulletin, the FBI detailed the threat of white nationalists and skinheads infiltrating police in order to disrupt investigations against fellow members and recruit other supremacists. The bulletin was released during a period of scandal for many law enforcement agencies throughout the country, including a neo-Nazi gang formed by members of the Los Angeles County Sheriff’s Department. Similar investigations revealed officers and entire agencies with hate group ties in Illinois, Ohio and Texas. Much of the bulletin has been redacted, but in it, the FBI ... warned of “ghost skins,” hate group members who don’t overtly display their beliefs. “At least one white supremacist group has reportedly encouraged ghost skins to seek positions in law enforcement for the capability of alerting skinhead crews of pending investigative action against them,” the report read. Neither the FBI nor state and local law enforcement agencies have established systems for vetting personnel for potential supremacist links. That task is left primarily to everyday citizens and nonprofit organizations like the Southern Poverty Law Center, one of few that tracks the growing number of hate groups in America.
Note: For more along these lines, see concise summaries of deeply revealing news articles about police corruption and the erosion of civil liberties.
Investigators pursuing what they believe to be the largest case of mishandling classified documents in United States history have found that the huge trove of stolen documents in the possession of a National Security Agency contractor included top-secret N.S.A. hacking tools that two months ago were offered for sale on the internet. They have been hunting for electronic clues that could link those cybertools - computer code posted online for auction by an anonymous group calling itself the Shadow Brokers - to the home computers of the contractor, Harold T. Martin III, who was arrested in late August. But so far, the investigators have been frustrated in their attempt to prove that Mr. Martin deliberately leaked or sold the hacking tools. Mr. Martin ... has insisted that he got in the habit of taking material home so he could improve his skills and be better at his job. The material the F.B.I. found in his possession added up to “many terabytes” of information ... which would make it by far the largest unauthorized leak of classified material from the classified sector. That volume dwarfs the hundreds of thousands of N.S.A. documents taken by Edward J. Snowden. [Mr. Martin] long held a high-level clearance and for a time worked with the N.S.A.’s premier hacking unit, called Tailored Access Operations, which breaks into the computer networks of foreign countries and which developed the hacking tools.
Note: It was reported in 2014 that the NSA had developed specialized tools to covertly hack into computers on a mass scale by using automated systems. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
An alleged accomplice in the Sept. 11 terror attacks is to undergo surgery this week for decade-old damage from his “sodomy” in CIA custody, his attorney says. Defense attorney Walter Ruiz, a Navy Reserve officer, disclosed the upcoming surgery for his client, Mustafa al Hawsawi, 48, on the eve of pretrial hearings Tuesday in the case that accuses the Saudi Arabian Hawsawi and four other men of orchestrating the Sept. 11, 2001, terror attacks. Ruiz said a case prosecutor informed him of the procedure over the weekend. Defense lawyers have been litigating over conditions at the remote prison and, in the case of their client, have specifically sought medical intervention to treat a rectal prolapse that has caused Hawsawi to bleed for more than a decade. The disclosure comes days after The New York Times published a detailed account of former CIA and Guantánamo captives grappling with the aftereffects of torture. Hawsawi was denied a request to have a member of his legal team on standby near the surgery. He has sat gingerly on a pillow at the war court since his first appearance in 2008. But the reason was not publicly known until release of a portion of the so-called Senate Torture Report on the CIA program ... which described agents using quasi-medical techniques called “rectal rehydration” and “rectal re-feeding.” Former CIA captives like Hawsawi are segregated in a clandestine lockup called Camp 7 that has been described ... as having its own medical facility, the capabilities of which are not known.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
The poster child of the American torture program sits in a Guantanamo Bay prison cell, where many U.S. officials hope he will simply be forgotten. Zayn al-Abidin Muhammad Husayn, known to the world as Abu Zubaydah ... was the “guinea pig” of the CIA torture program. He was the first prisoner sent to a secret CIA “black site,” the first to have his interrogation “enhanced ” and the only prisoner subjected to all of the CIA’s approved techniques, as well as many that were not authorized. He is the man for whom the George W. Bush administration wrote the infamous torture memo in the summer of 2002. Senior officials thought he had been personally involved in every major al-Qaeda operation, including 9/11. Today, the United States acknowledges that assessment was, to put it graciously, overblown. His extended torture provided no actionable intelligence about al-Qaeda’s plans. He has never been charged with a violation of U.S. law, military or civilian, and apparently never will be formally charged. Instead, he languishes at Guantanamo. After years in secret prisons around the world, he remains incommunicado, with no prospect of trial. Who is Zubaydah, really? Public understanding about Zubaydah remains remarkably controlled and superficial. In connection with Zubaydah’s stalled case seeking federal court review of his detention, the government has recently agreed to clear for public release a few of the letters he has written to us. These brief letters [are] published here for the first time.
Note: The use of humans as guinea pigs in government, military, and medical experiments has a long history. For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
A former contractor for a UK-based public relations firm says that the Pentagon paid more than half a billion dollars for the production and dissemination of fake Al-Qaeda videos that portrayed the insurgent group in a negative light. The PR firm, Bell Pottinger, worked alongside top US military officials at Camp Victory in Baghdad at the height of the Iraq War. The agency was tasked with crafting TV segments in the style of unbiased Arabic news reports, videos of Al-Qaeda bombings that appeared to be filmed by insurgents, and anti-insurgent commercials. Those who watched the videos could be tracked by US forces. Bell Pottinger ... could have earned as much as $120m from the US in 2006. Former video editor Martin Wells, who worked on the IOTF contract with Bell Pottinger, said they were given very specific instructions on how to produce the fake Al-Qaeda propaganda films. US Marines would then take CDs containing the videos while on patrol, then plant them at sites during raids. “If they’re raiding a house and they’re going to make a mess of it looking for stuff anyway, they’d just drop an odd CD there,” he said. The CDs were encoded to open the videos on RealPlayer software that connects to the Internet when it runs. It would issue an IP address that could then be tracked by US intelligence. The programmes produced by Bell Pottinger would move up the chain of command ... and could sometimes go as high up as the White House for approval.
Note: Read more about the fake "Al Qaeda" videos produced and distributed for the Pentagon. For more along these lines, see concise summaries of deeply revealing news articles on military corruption and the manipulation of public perception.
Yahoo has been accused of secretly building a customised software programme to search all of its customers’ incoming emails for specific information provided by US intelligence officials. The company complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI. Reuters said that a number of surveillance experts said this represented the first case to surface of a US Internet company agreeing to a spy agency’s demand by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time. The agency also said it was unable to determine what data the company had handed over, and if the intelligence officials had approached other email providers besides Yahoo. US phone and Internet companies are known to have handed over bulk customer data to intelligence agencies. But some former government officials and private surveillance experts said they had not previously seen either such a broad directive for real-time Web collection or one that required the creation of a new computer program. “I’ve never seen that, a wiretap in real time on a ‘selector’,” said Albert Gidari, a lawyer who represented phone and Internet companies on surveillance. A selector refers to a type of search term used to zero in on specific information. He added: “It would be really difficult for a provider to do that.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about corporate corruption and the disappearance of privacy.
The Pentagon gave a controversial U.K. PR firm over half a billion dollars to run a top secret propaganda program in Iraq, the Bureau of Investigative Journalism can reveal. Bell Pottinger’s output included short TV segments made in the style of Arabic news networks and fake insurgent videos which could be used to track the people who watched them, according to a former employee. The agency’s staff worked alongside high-ranking U.S. military officers in their Baghdad Camp Victory headquarters. Bell Pottinger reported to the Pentagon, the CIA, and the National Security Council on its work in Iraq. In the first media interview any Bell Pottinger employee has given about the work for the U.S. military in Iraq, video editor Martin Wells told the Bureau his time in Camp Victory was “shocking, eye-opening, life-changing.” The firm’s output was signed off by former General David Petraeus - then commander of the coalition forces in Iraq - and on occasion by the White House, he said. Bell Pottinger’s work in Iraq was a huge media operation which cost over a hundred million dollars a year on average. The ... most sensitive program described by Wells was the production of fake al Qaeda propaganda films. U.S. marines would take the CDs on patrol and drop them in the chaos when they raided targets. Wells explained how the team embedded a code into the CDs which linked to a Google Analytics account, giving a list of IP addresses where the CDs had been played.
Note: So the Pentagon made propaganda films to recruit for Al Qaeda, bombed a place upsetting the people there, then seeded these films to try to capture anyone who was interested in the propaganda they spread. For more along these lines, see concise summaries of deeply revealing news articles about war corruption and the manipulation of public perception.
An ongoing review shows the U.S. intelligence community has been debunking long-held myths about some of the “worst of the worst” at Guantánamo, some of them still held today. The retreat emerges in a series of unclassified prisoner profiles released by the Pentagon in recent years, snapshots of much larger dossiers the public cannot see, prepared for the Periodic Review Board examining the Pentagon’s “forever prisoner” population. “It was clear early on that the intelligence was grossly wrong,” said Mark Fallon, a retired 30-year federal officer who between 2002 and 2004 was Special Agent in Charge of the Department of Defense’s Criminal Investigation Task Force. Most “weren’t battlefield captives,” he said, calling many “bounty babies” - men captured by Afghan warlords or Pakistani security forces and sent to Guantánamo “on the sketchiest bit of intelligence with nothing to corroborate.” They ended up with “a lot of false information based on some pretty poor interrogations being done partly by military interrogators in that time frame.” Fallon ... is in the final stages of publishing a book of his criticisms and said in a recent interview that it’s no surprise that early prisoner profiles are imploding under Periodic Review Board scrutiny. In the early years, according to one analyst who worked there, Guantánamo’s Joint Intelligence Group was “looking for anything you can pin on these guys.” The intelligence unit was “picking up on one or two things and holding on to it tightly like it was gospel.”
Note: US officials have been aware for years that many Guantánamo detainees were innocent or only low-level operatives. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
The days leading up to last Friday’s release of director Oliver Stone’s Snowden looked like one long movie trailer. The American Civil Liberties Union ... announced a campaign to win a presidential pardon for Edward Snowden, the former National Security Agency contract employee who leaked hundreds of thousands of its highly classified documents. The next day, the House Intelligence Committee released a bipartisan letter to the president that advised him against any pardon. The week before, Stone had invited me to a private screening of his movie, [along with] a small group of former government employees who were whistleblowers before Snowden – and paid a high price for it. The reason they had been persecuted is that U.S. law makes no distinction between revealing illegal government activity to the press about eavesdropping on Americans or engaging in torture, and betraying the country by passing secrets for money or ideology to foreign governments. The Espionage Act was enacted nearly a century ago following World War One, and has already been amended several times. One key issue confronting the next president ... is whether the law needs to be amended again – this time to separate the whistleblowers from the spies. Today ... the battle lines have been drawn between those in government – both the executive branch and Congress – who view the theft of government secrets as espionage, regardless of the motive, and those in civil-liberties groups and the media who see motive as a critical distinction.
Note: The above was written by James Bamford, whistleblower and author of "The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America." For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The United States paid over a million euros to the family of Giovanni Lo Porto, an Italian aid worker killed in a U.S. drone strike in January of last year, according to newly released documents. The 37-year-old Lo Porto died when CIA drones struck an al Qaeda compound where he was being held hostage along with Warren Weinstein, an American humanitarian worker. In a rare admission of responsibility, President Barack Obama acknowledged the strike and promised compensation for the families. The Intercept first reported that the family had reached a settlement with the U.S. government in July. The document also states that the agreement does not imply “a waiver of sovereign or personal immunity.” Lawyers for the Lo Porto family had pressed the Italian state prosecutor to consider a criminal case against the United States, while acknowledging that the chances of such a case going forward were slim. They also asked for more information from U.S. agencies about the strike and its aftermath. The U.S. has, in a few instances, paid hundreds of thousands of dollars to the families of civilians killed in attacks in Yemen, but has not publicly acknowledged doing so. Many human rights advocacy groups see a double standard in the silence of the U.S. government on the cases of non-Westerners who have died.
Note: The families of thousands of innocent citizens killed by US drones in the Middle East have received zero compensation. Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
I do my best to resist the thought that prison is a reflection of our society, but the comparisons are unavoidable. From the moment I crossed the threshold from freedom to incarceration because I was charged with, and a jury convicted me of, leaking classified information to a New York Times reporter, I needed no reminder that I was no longer an individual. Prison, with its “one size fits all” structure, is not set up to recognize a person’s worth; the emphasis is removal and categorization. Inmates are not people; we are our offenses. Considering the charges and conviction that brought me here, I’m not exactly sure to which category I belong. No matter. There is an overriding category to which I do belong, and it is this prison reality that I sadly “compare unto the world”: I’m not just an inmate, I’m a black inmate. Here, I am my skin color. Whenever, in my stubborn idealism, I refuse to acknowledge being racially categorized and question the submission to it, the other prisoners invariably respond, “Man, this is prison.” What I see in prison is sad, but what I’m seeing from prison is worse. During my time in the CIA it became clear, in the organization’s words and actions toward me, that they saw me not as an American who wanted to serve his country but as “a big black guy.” There is a black America, there is a white America, there are many Americas. The greatness and promise of this country lies in equality reinforced by our differences. When I am free, I don’t want to feel that I’m merely going from one prison to another.
Note: The above was written by Jeffrey Sterling, a former CIA agent targeted for prosecution as part of the Obama Administration's "crack down on the press and whistle-blowers." Author James Risen tried to help Sterling expose CIA racism, and later wrote an unrelated book exposing some questionable government practices. Sterling was then sent to prison for what Risen wrote. Risen's latest book exposes major government corruption related to the war on terror.
Years before anyone had ever heard of [Edward] Snowden, [Bill] Binney, a gifted cryptologist and mathematician, was pushing back against the NSA’s spying overreach. In October 2001 ... he resigned rather than participate in a clandestine, massively overpriced and questionably legal electronic spying system code-named Trailblazer. Eventually, the government came after him. [Binney] was thrilled by [Oliver] Stone’s powerful biopic of Snowden, who astounded the world with his massive exposure of the NSA’s global spying programs. "I think it will help people understand what is really going on behind the scenes. They are invading the privacy of everyone," he says. "They can turn on your cellphone and listen to you. They can turn on your camera and watch you." In 2013 ... James Clapper, the director of national intelligence, [lied] under oath during a congressional hearing about the NSA’s spying programs. Snowden was watching. He had also seen what had happened to Binney and fellow NSA executives Thomas Drake, Ed Loomis and Kirk Wiebe, whose homes were raided by FBI agents after The New York Times exposed the NSA’s secret spying programs in 2005. Drake, prosecuted under the 1917 Espionage Act, was eventually acquitted ... but his career was ruined. [Snowden's] critics insist he should have pursued his complaints internally, despite the persuasive examples of Binney and his comrades that such resistance is futile, even risky.
Note: Watch a free trailer or rent the whole documentary on this webpage. Read a revealing, detailed New York Times article on Oliver Stone and his profound work to expose corruption and manipulation through film. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
“The United States does not torture,” said George W Bush on 6 September 2006. Bush was, for the first time, acknowledging the existence of the program that Senate intelligence committee staff investigator Daniel Jones would later expose as taking power drills to the heads of captured men; making them stand with their arms stretched above their heads for days at a time; leaving at least one of them naked until he froze to death; waterboarding them to the point of catatonia as bubbles rose from their open mouths; and inserting pureed food into their rectums while claiming it was necessary for delivering nutrients. Details of those procedures were outlined in the 525 pages which CIA director John Brennan, Barack Obama and White House chief of staff Denis McDonough allowed to become public. The CIA’s response to Jones’s report was split into two corps, one official and one not. The agency itself would no longer defend torture outright. The second corps consisted of retired CIA directors, a group known colloquially as the “Formers”. They laid into the Senate committee, [and] savaged it as a Democratic witchhunt. Jones has regrets about the way the declassified report turned out. Most prominently, Jones wishes he had gotten declassified the nearly 100-page table of contents for the full 6,700-page torture report, so readers could understand from the headings and subheadings just what the full contours of the torture was. In May 2016, the CIA inspector general’s office destroyed its only copy of the classified torture report.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Oliver Stone has taken aim at the US government for deceiving people about the levels of surveillance that exist in the country. His new film Snowden, about the controversial NSA informant Edward Snowden, received its world premiere. The drama ... tells of the former CIA employee’s discovery that the agency had constructed a system to spy on the public. “Americans don’t know anything about it because the government lies about it all the time,” Stone said at a press conference. “What’s going on now is pretty shocking. This story not only deals with eavesdropping but mass eavesdropping, drones and cyberwarfare. As Snowden said himself the other day, ‘It’s out of control, the world is out of control.’” The film also features a cameo from Snowden himself, who still resides at an undisclosed location in Russia while he searches for asylum elsewhere. Stone hopes that he may return to US ground but is doubtful. “Obama could pardon him and we hope so,” he said. “But he has vigorously prosecuted eight whistleblowers under the espionage act, which is an all-time record for an American president, and he’s been one of the most efficient managers of this surveillance world. It is the most extensive and invasive surveillance state that has ever existed and he’s built it up.” The film-maker ... likens [the current situation] to a George Orwell novel. “I never thought this could happen,” he said. “But from 2001 on, it’s very clear that something radical has changed. There’s more to it that meets the eye and whatever they tell you, you’ve got to look beyond.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on questionable intelligence agency practices and the disappearance of privacy.
[Daniel] Jones, a counter-terrorism staffer, had become the chief investigator for the Senate intelligence committee, the CIA’s congressional overseer, on its biggest inquiry. For five years, he had been methodically sifting through internal CIA accounts of its infamous torture program. Having read millions of internal emails, cables and accounts of agency torture, Jones had come to believe everything the CIA had told Congress, the Bush and Obama White Houses and the public was a lie. Inside the small room in Virginia the CIA had set up for the Senate investigators, Jones ... slipped crucial printed-out passages of what he called the Panetta Review into [his] bag and secured its lock. Sometime after 1am, Jones walked out, carrying his bag as he always did. The Panetta Review saga would spur a furious CIA to take an extraordinary step: it would spy on its own legislative overseers – especially Jones. The episode would spill out publicly the following March, when top committee Democrat Dianne Feinstein ... accused the CIA on the Senate floor of triggering what she called a constitutional crisis. Both sides requested the justice department pursue a criminal investigation on the other. The bitterness would nearly overshadow a landmark report, a fraction of which was released to the public in December 2014, that documented in chilling detail the depravations CIA inflicted on terrorism suspects after 9/11. The CIA has gone beyond successfully suppressing the report. The agency’s inspector general ... destroyed its copy – allegedly an accident.
Note: For more, see this revealing report. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Over his two terms, Obama has created the most powerful surveillance state the world has ever seen. From 22,300 miles in space, where seven Advanced Orion [spy satellites] now orbit; to a 1-million-square-foot building in the Utah desert that stores data intercepted from personal phones, emails, and social media accounts; to taps along the millions of miles of undersea cables that encircle the Earth like yarn, U.S. surveillance has expanded exponentially since Obama’s inauguration on Jan. 20, 2009. The effort to wire the world ... has cost American taxpayers more than $100 billion. Yet has the president’s blueprint for spying succeeded on its own terms? An examination of the unprecedented architecture reveals that the Obama administration may only have drowned itself in data. Privacy hasn’t been traded for security, but for the government hoarding more data than it knows how to handle. A panel set up by Obama [in 2013] to review the NSA’s operations concluded that the agency had stopped no terrorist attacks. Beyond failures to create security, there is the matter of misuse or abuse of U.S. spying, the effects of which extend well beyond violations of Americans’ constitutional liberties. Obama, meanwhile, has taken virtually no steps to fix what ails his spying apparatus, [but] has gone after people blowing the whistle on intelligence abuses. The Justice Department has charged eight leakers — more than double the number under all previous presidents combined.
Note: The above was written by James Bamford, whistleblower and author of "The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America." Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
For two years after the accident, Yei Yang refused to leave his home. "I couldn't farm, I couldn't go to see friends, as they might be afraid of me," Yang tells CNN. "I didn't want to live." Yang was just 22 and burning rubbish near his village in the province of Xieng Khoung in north-eastern Laos, when a bomb blast tore off one of his eyelids, his top lip and an ear, mutilated one of his arms, and left him with severe scarring from the waist up. His wounds were not caused by a modern day conflict, but by the remnants of a war that was waged more than 40 years ago, and is still destroying lives in this small Southeast Asian nation. Some 80 million unexploded bombs are scattered across the country - the deadly legacy of what became known as America's "secret war" in Laos - a CIA-led mission during the Vietnam War. In total, between 1964 and 1973, the US dropped more than two million tons of bombs - one of the heaviest aerial bombardments in history. Most of the munitions dropped were cluster bombs, which splinter before impact, spreading hundreds of smaller bomblets. To this day, less than 1% of the bombs have been removed, according to US-based NGO Legacies of War, which is spearheading the campaign to clear them. More than 20,000 people have been killed or maimed by the unexploded ordnance (UXOs) since the war ended, and currently, 50 people are maimed or killed every year. Around 40% of those are children.
Note: Big banks profited immensely from the cluster bomb trade. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Bolivia’s president Evo Morales has opened a new “anti-imperialist” military academy to counter US policies and military influence in Latin America. “If the empire teaches domination of the world from its military schools, we will learn from this school to free ourselves from imperial oppression,” the country’s first indigenous president said. “We want to build anti-colonial and anti-capitalist thinking with this school that binds the armed forces to social movements and counteracts the influence of the School of the Americas that always saw the indigenous as internal enemies,” he told a crowd that included the defense ministers of Venezuela and Nicaragua. Some Latin American officers trained at the US-based School of the Americas went on to commit atrocities under 20th century military dictatorships. In 2000, the academy at Fort Benning, Georgia, was renamed the Western Hemisphere Institute for Security Cooperation. Morales, who expelled the US ambassador and counter-narcotics agents in 2008, accused Washington of encouraging “congressional coups” such as the impending impeachment trial of suspended President Dilma Rousseff in Brazil. He also said the US promotes global terrorism through military interventions, citing the rise of the Islamic State group as an example. The re-inaugurated school carries the name of General Juan Jose Torres, a leftist who was Bolivia’s de facto president in 1970 and who expelled the Peace Corps for allegedly sterilizing indigenous women.
Note: The Western Hemisphere Institute for Security Cooperation, formerly known as the School of the Americas, graduated more than 500 human rights abusers. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days. A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate. The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO). The exploits are not run-of-the-mill tools to target everyday individuals. They are expensive software used to take over firewalls, such as Cisco and Fortinet, that are used “in the largest and most critical commercial, educational and government agencies around the world,” said [former TAO operator] Blake Darche. Some former agency employees suspect that the leak was the result of a mistake by an NSA operator, rather than a successful hack by a foreign government of the agency’s infrastructure. It is not unprecedented for a TAO operator to accidentally upload a large file of tools ... one of the former employees said. “What’s unprecedented is to not realize you made a mistake,” he said. “You would recognize, ‘Oops, I uploaded that set’ and delete it.” Critics of the NSA have suspected that the agency, when it discovers a software vulnerability, frequently does not disclose it, thereby putting at risk the cybersecurity of anyone using that product.
Note: Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Federal drug agents regularly mine Americans’ travel information to profile people who might be ferrying money for narcotics traffickers - though they almost never use what they learn to make arrests or build criminal cases. Instead, that targeting has helped the Drug Enforcement Administration seize a small fortune in cash. The DEA surveillance is separate from the vast and widely-known anti-terrorism apparatus. DEA units assigned to patrol 15 of the nation’s busiest airports seized more than $209 million in cash from at least 5,200 people over the past decade “They count on this as part of the budget,” said Louis Weiss, a former [DEA group] supervisor. “Basically, you’ve got to feed the monster.” Federal law gives the government broad powers to seize cash and other assets if agents have evidence that they are linked to crime. That process, commonly known as asset forfeiture, has come under fire ... after complaints that police were using the law as a way to raise money rather than to protect the public or prevent crime. Court records show agents and informants flagged travelers for questioning based on whether they were traveling with one-way tickets, had paid in cash, had listed a non-working phone number on the reservation or had checked luggage. Agents said Zane Young fit that profile when they ... seized $36,000 from his bags. Young’s lawyer, Thomas Baker, said in a court filing that the drug agency’s profile was “vague, ambiguous, overbroad, and can be manipulated to include just about anyone.”
Note: Read about how the DEA stole a young man's life savings without ever charging him with a crime. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
As part of an ongoing effort to “exploit medical intelligence,” the National Security Agency teamed up with the military-focused Defense Intelligence Agency to extract “medical SIGINT” from the intercepted communications of nonprofit groups starting in the early 2000s, a top-secret document shows. Medical intelligence can include information about disease outbreaks; the ability of a foreign regime to respond to chemical, biological, and nuclear attacks; the capabilities of overseas drugs companies; advances in medical technology; medical research, and the medical response capabilities of various governments, according to the document and others like it, provided by NSA whistleblower Edward Snowden. One of the more prominent examples of focused medical spying came in 2010, when the agency crafted a plan to stow tracking devices with medical supplies bound for an ill Osama bin Laden in order to locate the terrorist leader. One article from August 2003 identifies an NSA project to keep an eye on the evolution of biotechnology in various countries. “Can we ... determine the specific features that would distinguish a Bio Warfare Program from a benign civilian pharmaceutical production effort?” the author wrote, identifying a “suspect Iranian [biological warfare] facility” as a target for inspection. Medical intelligence gathering has continued since then, according to the so-called “black budget” proposed for the 2013 fiscal year, published in February 2012.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and terrorism.
A specialist unit created by the British domestic counterintelligence and security agency MI5 to “get inside the heads” of terrorists has helped foil seven attacks in the past year. The Behavioural Science Unit at Thames House, the headquarters of MI5 [establishes] whether people flagged as potential threats are "talkers" or "walkers" - those who simply boast or those who are preparing to act. Research by MI5 shows that more than 60 per cent of so-called lone wolves unwittingly provide clues that they are preparing to strike. The BSU’s work involves picking up signs of such changing behaviour. Neil, an Arabic and Norwegian speaker who has worked for the unit for six years, said ... his team is passed intelligence by officers that is gleaned from a network of informants and the public. The BSU then looks for signs of unusual activity. The BSU team pays close attention to “lone-actor” terrorists. The number of experts working in the BSU, which was created in 2004, has more than doubled since ... 2013. “We deal with probabilities and that is the nature of our work,” said Neil, [adding that] some of those they profiled lied to themselves about their intention and the ultimate aim was to persuade them to abandon their radical ideology. He said the assumption that many extremists had mental health problems was wrong. “Only 2 per cent of members of terrorist organisations suffer from mental health problems, compared with an average of up to 30 per cent of members of the public,” Neil said.
Note: See the full text of this article on this webpage. If this article is accurate, MI5 is using very different tactics than those used by the FBI to fight the war on terror.
Days before an ISIS sympathizer attacked a cartoon contest in Garland, Texas, he received a text from an undercover FBI agent. “Tear up Texas,” the agent messaged Elton Simpson days before he opened fire at the Draw Muhammad event, according to an affidavit filed in federal court Thursday. “U know what happened in Paris,” Simpson responded. “So that goes without saying ... No need to be direct.” That revelation comes amidst a national debate about the use of undercover officers and human sources in terrorism cases. The texts were included in the indictment, released Thursday, of Erick Jamal Hendricks. He was charged with conspiring to provide material support to ISIS. [Hendricks] tried to recruit other Americans to form an ISIS cell on secret compounds and introduced an undercover agent to one of the Draw Muhammad attackers, according to the FBI. But Hendricks did more than make a connection. According to the court papers, he asked the undercover officer about the Draw Muhammad event’s security, size, and police presence, during the event, according to an affidavit filed in court. FBI spokeswoman Carol Cratty hung up on The Daily Beast after being asked about the “tear up Texas” text. But shortly after that exchange, Simpson and his accomplice, Nadir Soofi, drove up to the contest and opened fire. Both men were killed in the altercation, but Hendricks would remain free for another year. Every major U.S. attack was linked to FBI investigation before it happened.
Note: The FBI has been stepping up its use of stings in ISIS cases. Read how an FBI mole posing as a potential lover recently convinced a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
WikiLeaks published the DNC’s hacked emails. There has been a flurry of accusations – including from the Hillary Clinton campaign – that Russian president Vladimir Putin orchestrated both the hack and the leak, in an attempt to help Donald Trump win the presidency. It’s amazing how quickly the media are willing to forgo any skepticism and jump to conspiracy-tinged conclusions where Putin is involved. There is some circumstantial evidence that the hack may have originated in Russia, but there are also many questions that haven’t been resolved. As Adam Johnson detailed, when you look closely, the evidence is shoddy and often contradictory. The bulk of the “evidence” has come from the statements of cybersecurity firms FireEye and Crowdstrike, both of which have lucrative contracts with the US government. As FireEye’s CEO once made clear, his company has a financial stake in nation-state hacking tensions. As Edward Snowden pointed out ... with an accompanying NSA document, “Our government specifically authorized the hacking of political parties.” The US has also considered hacking and then releasing sensitive and embarrassing information in China in retaliation for cybersecurity attacks, as the New York Times reported last year. If the US wants to place blame at the feet of the Russians, they should do so transparently and in public, without leaving it to anonymous officials and cybersecurity firms to make claims without providing hard evidence.
Note: Wikileaks published thousands of documents which exposed significant elections corruption in the US. Why is the media glossing over this to focus so heavily on Russia?
One of the most tortured men in the history of Guantánamo Bay has received clearance from the wartime prison’s quasi-parole board to leave after nearly 14 years of detention without charge. Mohamedou Ould Slahi, a Mauritanian citizen whose harrowing account of his torture at Guantánamo Bay became an international bestseller in 2015, will soon leave behind the Cuban detention center where US military personnel contorted his body; bombarded him with noise; deprived him of sleep; stuffed his clothing with ice during a nighttime boat ride meant to to convince him he was headed to an even worse place; threatened his life; and threatened his mother with rape. A nonlegal panel representing various US security agencies tasked with assessing threats posed by Guantánamo’s 76 residual detainees, found Slahi to represent no “continuing significant threat to the security of the United States”. The consensus decision, reached on 14 July, was made public on Wednesday. A federal judge in 2010 [had previously] ordered him freed for lack of evidence untainted by torture to justify his detention, yet the US justice department appealed. In the summer of 2003, senior Guantánamo officials, believing Slahi was an important link to al-Qaida, sought and received permission from the Pentagon to torture him. US defense secretary Donald Rumsfeld personally approved Slahi’s torture. In his book, Slahi recalled ... that he would tell his tormentors whatever they wished to hear. “I don’t care, as long as you are pleased,” Slahi informed his interrogators.
Note: By the time Slahi's bestselling book Guantanamo Diary was published, leaked documents obtained by BBC News had revealed that more than 150 innocent people were detained at Guantanamo after being rounded up for no reason. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists.
When you listen to any member of our government state that the newly released 29 pages are no smoking gun - they are lying. Read the 29 pages and ... remember that they were written during 2002 and 2003. President Bush wanted to go to war in Iraq - not Saudi Arabia. So, 29 full pages that said “Saudi” and “Bandar” instead of “Hussein” and “Iraq” was a huge problem. There was a concerted effort by the FBI and the Bush Administration to keep incriminating Saudi evidence out of the Inquiry’s investigation. The Joint Inquiry was still able to write 29 full pages regarding Saudi complicity in the 9/11 attacks. No other nation is given such singular prominence in the Joint Inquiry’s Final Report. Not Iraq. Not Iran. Not Syria. Not Sudan. Not even Afghanistan or Pakistan. The 29 pages have been kept secret and suppressed from the American public for fifteen years - not for matters of genuine national security - but for matters of convenience, embarrassment, and cover-up. Instead of calling for an emergency session of Congress to immediately name the Kingdom of Saudi Arabia as a State Sponsor of Terrorism, President Obama continues to downplay, belittle, and ignore the truth leaving us vulnerable to terrorist attacks that are still to this very day being funded by our “ally”. The Kingdom of Saudi Arabia provided operational and financial support to the 9/11 hijackers. That is a fact. And, the U.S. government has been covering up that fact for fifteen years - even to this very day.
Note: Read these pages that they didn't want you to see on this webpage and explore good commentary at this link. Check out also five key revelations of these documents. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
The CIA has a long history of “spooking the news,” dating back to its earliest days when the legendary spymaster Allen Dulles and his top staff drank and dined regularly with the press elite of New York and Washington, and the agency boasted hundreds of U.S. and foreign journalists as paid and unpaid assets. In 1977, after this systematic media manipulation was publicly exposed by congressional investigations, the CIA created an Office of Public Affairs that was tasked with guiding press coverage of intelligence matters. The intelligence empire’s efforts to manufacture the truth and mold public opinion are more vast and varied than ever before. One of its foremost assets? Hollywood. The agency has established a very active spin machine in the heart of the entertainment capital, which works strenuously to make sure the cloak-and-dagger world is presented in heroic terms. Since the mid-1990s, but especially after 9/11, American screenwriters, directors, and producers have traded positive portrayal of the spy profession in film or television projects for ... favors at CIA headquarters. As Hollywood became increasingly embedded with Langley ... CIA employees often saw their public-affairs colleagues giving various celebrities personalized tours of the headquarters. “I can’t tell you how many times this happened,” recalled the former CIA officer John Kiriakou. There’s a revolving door between the CIA and Hollywood.
Note: Read how the Pentagon controls the script of hundreds of movies, some quite well known. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
The Obama administration just released numbers suggesting ... that drone strikes in countries excluding Iraq, Afghanistan and Syria have resulted in between at least 64 and 116 noncombatant deaths during his administration. The president also issued an executive order effectively directing his successor to ... publish this data going forward. The new executive order means it will be harder for the next president to kill in total secrecy. Obama’s use [of drones] over the last seven years set a disastrous global precedent: using a new weapons technology as an excuse to kill in secret and without regard for international law. Today’s developments are an incremental but important step away from the notion that new technology is a license for secrecy. The downside, though, is that the drone data could be completely misleading – and provide a veneer of legitimacy to unlawful killings. There are reports of hundreds of unidentified people killed in apparent “signature strikes,” where targeting decisions were made on the basis of patterns of behavior rather than identification of a specific individual. Amnesty International and other groups have also documented so-called rescuer strikes, where the US killed or injured individuals who were trying to help the victims of an initial strike. The CIA, an agency with an extremely poor record of accountability to the public, is still conducting strikes. Its continued role is likely one reason we aren’t getting fuller answers to our questions about drones.
Note: Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Secret FBI rules allow agents to obtain journalists’ phone records with approval from two internal officials - far less oversight than under normal judicial procedures. The classified rules ... govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a judge or informing the news organization being targeted. Obtaining a journalist’s records with a national security letter (or NSL) requires the signoff of the FBI’s general counsel and the executive assistant director of the bureau’s National Security Branch. The Obama administration has come under criticism for bringing a record number of leak prosecutions and aggressively targeting journalists in the process. In 2013, after it came out that the Justice Department had secretly seized records from phone lines at the Associated Press and surveilled ... reporter James Rosen, then-Attorney General Eric Holder tightened the rules. The FBI could not label reporters as co-conspirators in order to try to identify their sources - as had happened with Rosen - and it became more difficult to get journalists’ phone records without notifying the news organization first. Yet these changes did not apply to NSLs. Those are governed by a separate set of rules. The FBI issues thousands of NSLs each year, including nearly 13,000 in 2015. Over the years, a series of Inspector General reports found significant problems with their use, yet the FBI is currently pushing to expand the types of information it can demand with an NSL.
Note: The aggressive pursuit of leaks and journalists that report them led BBC to recently ask: "Is the US government at war with whistleblowers?" Read more about the FBI's use of secret National Security Letters. For more along these lines, see concise summaries of deeply revealing news articles on media manipulation and the disappearance of privacy.
The push by congressional Democrats to bar suspected terrorists from acquiring guns and explosives has focused renewed attention on the government’s secretive terrorist watch lists, which have grown exponentially since the 9/11 attacks. Since the mass shooting in a gay nightclub in Orlando on June 12, Democrats have endorsed various measures to get weapons out of the hands of people on the lists. The Orlando shooter, Omar Mateen, had been on the FBI’s terrorist watch list but was removed in 2014. His was one of approximately 800,000 names in that database, the most prominent of at least seven overlapping watch lists. The government does not release the exact number of watch lists or the specific criteria for getting on them. The no-fly list ... contained 16 people on Sept. 11, 2001. By 2014, it had grown to about 64,000 people. Civil liberties advocates [say] the watch lists are riddled with inaccurate and outdated information, nearly impossible to get off and stigmatize the people on them. The largest watch list is The Terrorist Identities Datamart Environment (TIDE), maintained by the National Counterterrorism Center. As of August 2014, it contained about 1.1 million names. The FBI’s Terrorist Screening Center ... maintains what is known as the government’s "consolidated Terrorist Watchlist." It contains about 800,000 names. Last year, [a] federal judge ruled that the government’s lack of effective procedures for people to challenge their inclusion on the no-fly list was unconstitutional.
Note: A 2013 New York Times article further describes the rapid expansion of these mysterious lists, which are made according to secret rules. Some people have reportedly been added to watch lists by federal air marshals simply to meet quotas. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
The F.B.I. has significantly increased its use of stings in terrorism cases, employing agents and informants to pose as jihadists, bomb makers, gun dealers or online “friends” in hundreds of investigations. Undercover operations, once seen as a last resort, are now used in about two of every three prosecutions involving people suspected of supporting the Islamic State, a sharp rise in the span of just two years. F.B.I. operatives coax suspects into saying and doing things that they might not otherwise do - the essence of entrapment. “They’re manufacturing terrorism cases,” said Michael German, a former undercover agent with the F.B.I.. Despite dozens of challenges to undercover terrorism cases brought since the Sept. 11, 2001, attacks, a judge has yet to throw one out on the grounds of entrapment. Not that some judges have not considered it. “I believe beyond a shadow of a doubt that there would have been no crime here, except the government instigated it, planned it and brought it to fruition,” Judge Colleen McMahon of the United States District Court ... said in 2011 in a case involving four Muslim men in Newburgh, N.Y. The F.B.I. planted an undercover informant inside a mosque in Newburgh as part of what became an elaborate, nearly yearlong plot. The F.B.I. even built a fake Stinger missile and had it delivered to the men. Judge McMahon said she was troubled by the F.B.I.’s conduct, but she upheld the charges.
Note: For more, see how an FBI mole posing as a potential lover recently convinced a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
Prime ministers, finance ministers, leading entrepreneurs and a former spy chief are among the attendees at this year’s influential Bilderberg conference ... which begins on Thursday in Dresden. The German military has been drafted in to oversee security. They’re working with corporate security from Airbus to make sure the politicians are kept safely away from the press for the entire three-day conference. Every year, a major corporation with links to the Bilderberg steering committee coordinates security for the event with the police. Which makes the whole conference even more obviously the corporate lobbying event that it is - with giant corporations handling everything from security to dry ice. And it makes the silence of the politicians who attend even more egregious. These high-level talks between policymakers and the heads of transnational oil companies ... take place in heavily guarded privacy, with no press oversight whatsoever. [This is] especially great if you’re on the board of BP. Like, for example, Sir John Sawers. As well as being a director of BP, the silken, Blairish former MI6 boss is a member of Bilderberg’s steering committee, and the chairman of Macro Advisory Partners, a global advisory group with heavy links to the transatlantic intelligence community, very much in the style of Kissinger Associates. And speak of the devil! The ageless 93-year-old former US secretary of state will be holding court at Dresden, croaking out his wisdom from the throne of bones he has shipped everywhere he goes.
Note: This entire article is a must read if you want to know how the power elite work together to manipulate global politics. For more along these lines, see concise summaries of deeply revealing news articles on the Bilderberg Group and other elite secret societies.
June 6 will be the third anniversary of The Guardian’s publication of top-secret documents provided by [Edward] Snowden that showed that the National Security Agency was collecting the telephone records of tens of millions of Americans. Mr. Snowden [has been] denounced ... as a traitor. [Former Secretary of State Hillary] Clinton said in a Democratic presidential debate [that], “He could have gotten all of the protections of being a whistle-blower.” Thomas Drake would disagree. Mr. Drake was a senior N.S.A. official who had also complained, 12 years earlier, about warrantless surveillance. He went up the chain of command [to] the Defense Department’s Office of Inspector General. Things did not go well. F.B.I. agents raided his house. He was forced to resign and was indicted on 10 felony charges arising from an alleged “scheme” to improperly “retain and disclose classified information.” He ultimately pleaded guilty to a misdemeanor for “exceeding authorized use of a government computer” in exchange for the government’s dropping the other charges. He now works at an Apple store. Mr. Snowden followed the Drake case closely in the news media and drew the obvious conclusion: Going through [official] channels was worse than a dead end. [John] Crane, a former assistant inspector general in the Defense Department who oversaw the whistle-blower program, has now come forward alleging that Mr. Drake was persecuted by the very officials in his office who were supposed to protect him.
Note: John Crane was forced out of the Pentagon in 2013. His story is told in a new book, titled, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
President Obama will become the first sitting U.S. president to visit Hiroshima, the Japanese city that the United States nearly destroyed with a nuclear bomb in 1945. While the bombing ... killed as many as 150,000 people, Obama is not expected to apologize during his visit. After more than 70 years, why not apologize for Hiroshima? Countries in general do not apologize for violence against other countries. What else has America not apologized for? Here are a few ideas. During the Vietnam War, the United States sprayed about 12 million gallons of Agent Orange, a herbicide, over areas of Vietnam, Cambodia and Laos. About 1 million people were disabled or suffered health problems because of contact with the herbicide. There has been no apology for this or for other controversies of the war. In 1953, democratically elected Iranian Prime Minister Mohammed Mossadegh was overthrown in a coup [that] was carried out under CIA direction ... with the aid of the British Secret Intelligence Service. The United States and Britain have never apologized for [this], with the Obama administration recently stating that it had no plans to. The United States is also widely suspected of involvement in a bloody 1973 coup that ousted socialist Chilean President Salvador Allende in 1973 and put dictator Augusto Pinochet in control. In 1977, Brady Tyson, deputy leader of the U.S. delegation to the U.N. Human Rights Commission in Geneva, did ... offer an apology for the U.S. involvement in the coup, but he was quickly disavowed by the State Department.
Note: Read a detailed description of how the New York Times suppressed and skewed the facts about the effects of the atomic bomb in order to forward the war-profiteering agenda. Although CIA involvement in the Iranian coup and the Pentagon's prolonged support for the Pinochet regime's torturers are now well-known, the intelligence community remains unapologetically corrupt.
By now, almost everyone knows what Edward Snowden did. He leaked top-secret documents revealing that the National Security Agency was spying on hundreds of millions of people. The key to Snowden’s effectiveness, according to Thomas Devine, the legal director of the Government Accountability Project (GAP), was that he practised “civil disobedience” rather than “lawful” whistleblowing. “None of the lawful whistleblowers who tried to expose the government’s warrantless surveillance ... had any success,” Devine told me. “They came forward ... but the government just said, ‘They’re lying. We’re not doing those things.’ And the whistleblowers couldn’t prove their case because the government had classified all the evidence.” The NSA whistleblowers were not leftwing peace nuts. They had spent their professional lives inside the US intelligence apparatus – devoted, they thought, to the protection of the homeland and defense of the constitution. They were political conservatives, highly educated, respectful of evidence, careful with words. And they were saying, on the basis of personal experience, that the US government was being run by people who were willing to break the law and bend the state’s awesome powers to their own ends. They were saying that laws and technologies had secretly been put in place that threatened to overturn the democratic governance Americans took for granted and shrink their liberties to a vanishing point.
Note: The article above was is adapted from Mark Hertsgaard’s book, Bravehearts: Whistle Blowing in the Age of Snowden. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Edward Snowden has called for a complete overhaul of US whistleblower protections after a new source from deep inside the Pentagon came forward with a startling account of how the system became a “trap” for those seeking to expose wrongdoing. The account of John Crane ... appears to undermine Barack Obama, Hillary Clinton and [others] who argue that there were established routes for Snowden other than leaking to the media. Crane, a longtime assistant inspector general at the Pentagon, has accused his old office of retaliating against a major surveillance whistleblower, Thomas Drake. Not only did Pentagon officials provide Drake’s name to criminal investigators, Crane told the Guardian, they destroyed documents relevant to his defence. Thomas Drake’s legal ordeal ruined him financially. His case served as a prologue to Snowden’s. In 2002, Drake and NSA colleagues contacted the Pentagon inspector general to blow the whistle on [a] tool, Trailblazer, for mass-data analysis. Crane, head of the office’s whistleblower unit, assigned investigators. For over two years, with Drake as a major source, they ... prepared a lengthy secret report [that] eventually [helped] to kill the program. As far as Crane was concerned, the whistleblower system was working. But after an aspect of the NSA’s warrantless mass surveillance leaked to the New York Times, Drake himself came under investigation and eventually indictment [for] hoarding documentation – exactly what inspector-general investigators tell their whistleblowers to do.
Note: John Crane was forced out of the Pentagon in 2013. His story is told in a new book, titled, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
A CIA tip off to South Africa's apartheid regime which led to Nelson Mandela's arrest and 27-year imprisonment was condemned as a "betrayal of our nation" by the grandson and heir of the former president. Mandla Mandela called on US President Barack Obama to apologise and make a "full disclosure" of the events leading up to his grandfather's arrest in 1962 ... after a former CIA agent confirmed that he told the apartheid police how to find [Nelson] Mandela. "The USA put its imperial interests above the struggle for liberation of millions of people," said Mr Mandela, the former statesman's eldest grandson who is also an ANC MP. Donald Rickard said he and his handlers believed Mr Mandela was "the world's most dangerous communist outside of the Soviet Union" and he had no qualms about tipping the authorities off about his whereabouts in 1962, the height of the Cold War. The CIA's involvement in his detention after 17 years on the run has long been suspected but has never been confirmed until now. Mr Rickard ... broke his silence about his involvement in netting the "Black Pimpernel" as Mandela was known in an interview in March with researchers for a new film by British director John Irvin. Mr Rickard, who retired from the CIA in 1978 and spent the rest of his life in a remote spot in Colorado, died two weeks after the interview. Zizi Kodwa, a spokesman for the ANC, echoed claims by the ANC's secretary-general that the CIA was still interfering in South African politics.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Hidden microphones that are part of a clandestine government surveillance program that has been operating around the Bay Area has been exposed. Imagine standing at a bus stop, talking to your friend and having your conversation recorded without you knowing. It happens all the time, and the FBI doesn’t even need a warrant to do it. Jeff Harp, a ... security analyst and former FBI special agent said, “They put microphones under rocks, they put microphones in trees, they plant microphones in equipment. I mean, there’s microphones that are planted in places that people don’t think about, because that’s the intent!” FBI agents hid microphones inside light fixtures and at a bus stop outside the Oakland Courthouse without a warrant to record conversations, between March 2010 and January 2011. Federal authorities are trying to prove real estate investors in San Mateo and Alameda counties are guilty of bid rigging and fraud and used these recordings as evidence. The lawyer for one of the accused real estate investors who will ask the judge to throw out the recordings, told KPIX 5 News that, “Speaking in a public place does not mean that the individual has no reasonable expectation of privacy … private communication in a public place qualifies as a protected ‘oral communication.'”
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
From 2013 to 2015, the NSA and CIA doubled the number of warrantless searches they conducted for Americans’ data in a massive NSA database ostensibly collected for foreign intelligence purposes, according to a new intelligence community transparency report. The estimated number of search terms “concerning a known U.S. person” to get contents of communications within what is known as the 702 database was 4,672 - more than double the 2013 figure. And that doesn’t even include the number of FBI searches on that database. A recently released ... court ruling confirmed that the FBI is allowed to run any number of searches it wants on that database, not only for national security probes but also to hunt for evidence of traditional crimes. No estimates have ever been released of how often that happens. The missing data from the FBI is of great concern to privacy advocates. The USA Freedom Act, passed in June 2015, “conspicuously exempts the FBI” from disclosing how often it searches the 702 database, the Project on Government Oversight (POGO) wrote in a letter to the Director of National Intelligence, James Clapper, in October 2015. “There is every reason to believe the number of FBI queries far exceeds those of the CIA and NSA,” POGO wrote. “It is essential that you work with the attorney general to release statistics on the FBI’s use of U.S. person queries.” The new report also leaves unanswered how many Americans’ communications are collected in the first place.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
After one woman broke his heart, Khalil Abu Rayyan, a 21-year-old Michigan man, contemplated suicide. Then, when he confided his dark thoughts to another woman, she suggested he steer his violence toward other people. Both women ... were FBI honeypots, and one of the recorded conversations with Rayyan entered into ongoing court proceedings provides a rare glimpse into how federal informants work. The U.S. government now alleges that Rayyan, who has been indicted on federal gun charges, is an Islamic State sympathizer who talked of attacking a church. Federal prosecutors ... are handling Rayyan’s indictment with the secrecy of a national security investigation. The first FBI informant to enter Rayyan’s life was “Ghaada.” They struck up an intense relationship online, and even talked about marriage, children, and a life together. When Ghaada called off the relationship, Rayyan was heartbroken. The FBI then introduced “Jannah Bride.” To impress his new romantic interest, who appeared preoccupied with jihad, Rayyan claimed to have an AK-47 (he didn’t), and to have attempted travel to Syria (there’s no evidence he even bought a ticket). An FBI recording of a conversation between Rayyan and Bride ... shows how the FBI used Rayyan’s suicidal thoughts to manipulate him. After the phone call, FBI agents searched Rayyan’s home and business, [and] found no trace of the assault rifle [he had mentioned to Bride]. Rayyan appears to have made up the story entirely to impress Bride.
Note: Click the link above and listen to how this FBI mole posing as a potential lover convinces a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
Of the 19 hijackers who carried out the Sept. 11 attacks, 15 were citizens of Saudi Arabia. What does that fact signify? According to senior U.S. officials, little or nothing. From the outset, they treated the national identity of the terrorists as incidental, connoting nothing of importance. Imagine if 15 Iraqis had perpetrated the attacks... In its final report, the 9/11 Commission said it “found no evidence that the Saudi government as an institution or senior Saudi officials individually” had funded Al Qaeda. This artfully crafted passage was ... designed to preserve the existing U.S.-Saudi relationship from critical scrutiny. The effort never fully succeeded, skeptics suspecting that there might be more to the story. Today those doubts find expression in demands to declassify 28 pages of a congressional investigation said to detail Saudi relations with and support for the Al Qaeda terrorist network before September 2001. Whether the 28 pages sustain or refute suspicions of Saudi involvement in the Sept. 11 attacks will remain impossible to say absent ... executive action. Yet implicit in this dispute is an issue of even greater moment: Who ultimately exercises jurisdiction over truth? The foreign policy establishment insists that the 28 pages remain secret; not only might the document challenge the state's preferred Sept. 11 narrative, but the demands for its declassification also call into question the establishment's very authority to control that narrative.
Note: Read more on the Saudi role in Sept. 11 and the hidden 9/11 report pages. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
For the first time, a federal judge is letting a civil lawsuit proceed against two CIA contract psychologists who designed and supervised brutal interrogation tactics that critics called torture. The ruling allows two former CIA detainees and the family of another who died in agency custody to try to win damages in federal court for the abuse they suffered at then-secret CIA prisons in the early 2000s. According to the lawsuit and a Senate Intelligence Committee report, the mistreatment included waterboarding, sleep deprivation, confinement in small boxes, rectal feeding and beatings. As the lawsuit progresses, it may shed more light on the so-called enhanced interrogation techniques that the CIA used in an effort to collect intelligence ... after the Sept. 11, 2001, attacks. “It’s unprecedented,” [said] Dror Ladin, the American Civil Liberties Union attorney who argued the plaintiffs' case in court. “No CIA torture victim has ever taken this step toward accountability. Every previous lawsuit has been shut down before this stage. “It gives our clients a chance to ... finally get some justice,” he said. The Department of Justice had blocked previous lawsuits aimed at the CIA's now-barred detention and interrogation program on grounds that any case could reveal secrets and compromise national security. That changed after the Senate Intelligence Committee released a report in December 2014 that exposed details about the program, including the role played by [psychologists Bruce] Jessen and [James E.] Mitchell.
Note: Read more in this ACLU article. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
Bradley Birkenfeld is the most significant financial whistleblower of all time, so you might think he'd be cheering on the disclosures in the new Panama Papers leaks. [He] was a banker working at UBS in Switzerland when he approached the U.S. government with information on massive amounts of tax evasion by Americans with secret accounts in Switzerland. By the end of his whistleblowing career, Birkenfeld had served more than two years in a U.S. federal prison, been awarded $104 million by the IRS for his information and shattered the foundations of more than a century of Swiss banking secrecy. In an exclusive interview Tuesday from Munich, Birkenfeld said he doesn't think the source of the 11 million documents stolen from [Panama City-based law firm Mossack Fonseca] should automatically be considered a whistleblower like himself. Instead, he said, the hacking ... could have been done by a U.S. intelligence agency. "The CIA I'm sure is behind this, in my opinion," Birkenfeld said, [pointing] to the fact that the political uproar created by the disclosures have mainly impacted countries with tense relationships with the United States. "If you've got NSA and CIA spying on foreign governments they can certainly get into a law firm like this," Birkenfeld said. "They selectively bring the information to the public domain that doesn't hurt the U.S.. That's wrong. And there's something seriously sinister here behind this."
Note: See this article for more. Read concise summaries of deeply revealing news articles about corruption in banking and in the intelligence community.
House Minority Leader Nancy Pelosi on Sunday said she wants 28 redacted pages declassified from a 2003 congressional report on the intelligence community's preparedness for and response to the 9/11 attacks. "As the former Ranking Democrat on the House Intelligence Committee and top the House Democrat on the Joint Congressional investigation looking into the 9/11 attacks, I agree with former Senator Bob Graham that these documents should be declassified and made public, and that the Bush Administration's refusal to do so was a mistake," Pelosi said in a statement. Her statement came the same day that "60 Minutes" aired a story featuring Graham and other current and former government officials who want the report's top secret pages declassified. Graham, who declined to detail the redacted section, helped author the report and he now says the redacted portion could highlight possible Saudi support for the 9/11 hijackers. He also suggested that it sheds light on a network of people he believes supported the hijackers in the US. There is ... tension between the the Saudis and the U.S. over doubts about the Saudi commitment to combating violent Islamist extremism.
Note: Read more on the Saudi role in Sept. 11 and the hidden 9/11 report pages. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
Current and former members of Congress, U.S. officials, 9/11 Commissioners and the families of the attack's victims want 28 top-secret pages of a congressional report released. Bob Graham, the former Florida governor, Democratic U.S. Senator and onetime chairman of the Senate Select Committee on Intelligence, says the key section of a top secret report ... should be declassified to shed light on possible Saudi support for some of the 9/11 hijackers. Graham was co-chair of Congress' bipartisan "Joint Inquiry" into intelligence failures surrounding the attacks on Sept. 11, 2001, that issued the report in 2003. Graham and his Joint Inquiry co-chair in the House, former Representative Porter Goss (R-FL) - who went on to be director of the CIA - say the 28 pages were excised from their report by the Bush Administration in the interest of national security. Graham wouldn't discuss the classified contents, but says the 28 pages outline a network of people he believes supported hijackers in the US, [and] believes the hijackers were "substantially" supported by Saudi Arabia. Asked if the support was from government, rich people or charities, the former senator replies, "all of the above." Graham and others think the reason for classifying the pages was to protect the U.S. relationship with ally Saudi Arabia. In addition to Graham and Goss ... Tim Roemer, former Democratic U.S. Representative from Indiana who was the only person to serve on both Congress' Joint Inquiry and the 9/11 Commission [has] read the redacted pages. Roemer says it's time to let everyone know what's in the top secret documents.
Note: Watch this revealing video segment on the CBS website. Read more on the Saudi role in Sept. 11 and the hidden 9/11 report pages. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
Two senior intelligence analysts at U.S. Central Command say the military has forced them out of their jobs because of their skeptical reporting on U.S.-backed rebel groups in Syria. It’s the first known instance of possible reprisals against CENTCOM personnel after analysts accused their bosses of manipulating intelligence reports about the U.S.-led campaign against ISIS in order to paint a rosier picture of progress in the war. One of the analysts alleging reprisals is the top analyst in charge of Syria issues at CENTCOM. He and a colleague doubted rebels’ capabilities and their commitment to U.S. objectives in the region. [Their] views put them at odds with military brass, who last year had predicted that a so-called moderate opposition would make up a 15,000-man ground force to take on ISIS. An initial $500 million program to train and arm those fighters failed spectacularly. And until the very end, Pentagon leaders claimed the operation was more or less on track. The Pentagon inspector general and a congressional task force are investigating allegations of doctored intelligence reports about ISIS. More than 50 CENTCOM analysts have said that senior officials gave more scrutiny and pushback on reports that suggested U.S. efforts to destroy ISIS weren’t progressing. The Defense Department inspector general is also looking into ... "whether there was any falsification, distortion, delay, suppression, or improper modification of intelligence information.”
Note: Explore powerful evidence that ISIS is aided and was possibly even created by covert US support. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
On the north side of Telegraph Hill is 225 Chestnut St., a swanky modernist building. From 1955 to 1965, this building was the site of “Operation Midnight Climax” - a top-secret mind-control program in which CIA agents used hookers to lure unsuspecting johns from North Beach bars to what they called “the pad,” then dosed the men with LSD and observed the X-rated goings-on through a two-way mirror. As John Marks notes in his 1977 book, “The Search for the ‘Manchurian Candidate’: The CIA and Mind Control,” the CIA’s ... predecessor, the Office of Strategic Services, set up a “truth drug” program whose purpose was to discover a substance that would make subjects reveal their secrets. When the CIA was created in 1947, it ... authorized covert mind and behavior control programs. Drugs were given to people deemed expendable, including North Korean POWs, mental patients, prisoners, addicts and prostitutes. Before the programs were shot down, hundreds of scientists would work on them. [In] 1953, CIA director Allen Dulles approved a program for “covert use of biological and chemical materials” with an initial budget of $300,000. Its name: MKULTRA. CIA operatives began dosing people with acid in restaurants, bars and beaches. They also used other, more exotic drugs. And the agency began using the prostitutes to lure men of all sorts, not just marginal figures, back to the safe house. Because the agency destroyed most of MKULTRA’s files, no one will ever know how many lives and minds [it] damaged or destroyed.
Note: Don't miss the entire, revealing article. For more on CIA mind control experiments, see the extensive documentation on this page. Then explore the excellent, reliable resources provided in our Mind Control Information Center.
Khalil Abu Rayyank was a lonely young man in Detroit, eager to find a wife. Jannah Bride claimed she was a 19-year-old Sunni Muslim whose husband was killed in an airstrike in Syria. The two struck up a romantic connection ... online. Now, Rayyan, a 21-year-old Michigan man, is accused by federal prosecutors of supporting the Islamic State. Jannah Bride, not a real name, was in fact an FBI informant hired to communicate with Rayyan. The FBI and federal prosecutors have treated his case as a national security concern, making numerous references in court filings and at a detention hearing to statements Rayyan made about the Islamic State and his supposed aspirations for violence. According to transcripts ... Rayyan had fallen in love with Bride and had even proposed marriage. The FBI informant initiated conversations about violence on several occasions, and when she did, Rayyan would tell her that he didn’t want to hurt anyone. Eventually, Rayyan found a way to capture the woman’s interest, describing his plans for an attack. The story appears to be fantasy, however. Psychologist ... Lyle D. Danuloff assessed Rayyan’s level of dangerousness as “very low,” according to a report filed Tuesday. Danuloff wrote: “His verbalization was the result of an effort to keep the attention with hopes of a future. They were not the result of radicalization or representative of terrorist intentions.”
Note: If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success? Read an essay from Timothy Silver's profound book Lifting the Veil that suggests the "War on Terror" is a fraud.
The CIA took naked photographs of people it sent to its foreign partners for torture. A former US official who had seen some of the photographs described them as “very gruesome”. In some of the photos, which remain classified, CIA captives are blindfolded, bound and show visible bruises. Some photographs also show people believed to be CIA officials or contractors alongside the naked detainees. It is not publicly known how many people ... were caught in the CIA’s web of so-called “extraordinary renditions”, extra-judicial transfers of detainees to foreign countries, many of which practised even more brutal forms of torture than the US came to adopt. Human rights groups over the years have identified at least 50 people the CIA rendered, going back to Bill Clinton’s presidency. “Is the naked photography a form of sexual assault? Yes. It’s a form of sexual humiliation,” said Dr Vincent Iacopino, the medical director of Physicians for Human Rights. “It’s cruel, inhumane and degrading treatment at a minimum and may constitute torture,” he said. International human rights law, to include the Geneva conventions, forbids photographing prisoners except in extremely limited circumstances related to their detention, to include anything that might compromise their dignity. The CIA is known to have employed nudity in other aspects of its custody of terrorism suspects. Often the nudity occurred in tandem with other torture techniques, such as shackling and frigid conditions, leading in at least one case to a detainee’s death.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Syrian militias armed by different parts of the U.S. war machine have begun to fight each other on the plains between the besieged city of Aleppo and the Turkish border. The fighting has intensified over the last two months, as CIA-armed units and Pentagon-armed ones have repeatedly shot at each other while maneuvering through contested territory on the northern outskirts of Aleppo. Last year, the Pentagon helped create a new military coalition, the Syrian Democratic Forces ... to take territory away from the Islamic State. The group is dominated by Kurdish outfits known as People's Protection Units or YPG. It has received air-drops of weapons and supplies and assistance from U.S. Special Forces. The U.S. backing for a heavily Kurdish armed force has been a point of tension with the Turkish government, which has a long history of crushing Kurdish rebellions. The CIA, meanwhile, has its own operations center inside Turkey from which it has been directing aid to rebel groups in Syria, providing them with TOW antitank missiles from Saudi Arabian weapons stockpiles. While the Pentagon's actions are part of an overt effort by the U.S. and its allies against Islamic State, the CIA's backing of militias is part of a separate covert U.S. effort aimed at keeping pressure on the Assad government. Over the last several months ... Kurdish-led groups [expanded] their zone of control to the outskirts of Aleppo, bringing them into more frequent conflict with the CIA-backed outfits.
Note: Explore powerful evidence that ISIS is aided and was possibly even created by covert US support. Watch this video which shows how the US and its allies stoke war in order to pad the pockets of mega-corporations which profit greatly from arms sales. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Bechtel - a behemoth among closely held companies - has been the world’s builder, benefiting from vast government contracts for engineering and infrastructure work in difficult places while it nurtured relationships with power brokers in Washington. In The Profiteers, journalist Sally Denton seeks to unravel the history of Bechtel. Her story is one of “how a dynastic line of rulers from the same American family conducts its business” and how its system of networking now pervades US capitalism. Anecdotes of Bohemian Grove, the secretive retreat that became an all-male “summer camp” for US corporate, political and military elites to toast marshmallows, skinny-dip in the river north of San Francisco and dress in drag for skits, elucidate the chummy nature of big business. As of 2014, [Bechtel's] reported revenue was $37bn, with projects and employees in 37 countries. The corporation’s embrace of Saudi Arabia as a lucrative client and its decades-long and contorted experience in Iraq also makes sense of some aspects of US foreign policy - as well as its intelligence-gathering operations. The life and times of John McCone, a former Bechtel executive who later served as CIA director in the US administrations of Presidents Kennedy and Johnson, is chronicled deftly here. It is worth noting: McCone was and is critical to Bechtel’s dominance today. He devised the idea of “cost-plus contracts” for the toughest jobs sought by government. Contractors are guaranteed a profit in such deals.
Note: Bechtel was at the center of a major Iraqi reconstruction scandal in 2007. More recently, major defense contractors have been publicly congratulating themselves for steering US policy towards militarism. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the corporate world.
Government lawyers on Thursday continued their fight to bury the Senate Torture Report, arguing before the D.C. District Court of Appeals that the 6,700-page text could not be released on procedural grounds. When the 500-page executive summary of the report was released more than a year ago, it prompted international outcry and renewed calls for prosecution. The summary describes not only the CIA’s rape and torture of detainees, but also how the agency consistently misrepresented the brutality and effectiveness of the torture program. But many of the most graphic details are in Volume III of the full report, which former Senate Intelligence Committee chair Dianne Feinstein has said contains “excruciating” details on “each of the 119 known individuals who were held in CIA custody.” On the same day the executive summary was released, the Intelligence Committee sent copies of the full report to executive branch agencies with instructions ... that they be used “as broadly as appropriate to make sure that this experience is never repeated.” Last year, after succeeding Feinstein as chair, Sen. Richard Burr, R-Ga., requested that the copies distributed to federal agencies be returned to Congress, prompting a legal standoff. In the meantime ... the Justice Department has “refuse[d] to allow executive branch officials to review the full and final study.”
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
The “sneak-and-peek” provision of the Patriot Act that was alleged to be used only in national security and terrorism investigations has overwhelmingly been used in narcotics cases. Now the New York Times reports that National Security Agency data will be shared with other intelligence agencies like the FBI without first applying any screens for privacy. The ACLU of Massachusetts blog Privacy SOS explains [that] domestic law enforcement officials now have access to huge troves of American communications, obtained without warrants, that they can use to put people in cages. This basically formalizes what was already happening. We’ve known for a couple of years now that the Drug Enforcement Administration and the IRS were getting information from the NSA. Because that information was obtained without a warrant, the agencies were instructed to engage in “parallel construction” when explaining to courts and defense attorneys how the information had been obtained. It certainly isn’t the only time that that national security apparatus has let law enforcement agencies benefit from policies that are supposed to be reserved for terrorism investigations in order to get around the Fourth Amendment, then instructed those law enforcement agencies to misdirect, fudge and outright lie about how they obtained incriminating information. This isn’t just a few rogue agents. The lying has been a matter of policy.
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
692 felony convictions in California ... were thrown out between 1989 and 2012 based on errors or misconduct by police, prosecutors, defense lawyers or judges, according to a new study by researchers at UC Berkeley and the University of Pennsylvania. The report ... didn’t include misdemeanor cases, which amount to about 80 percent of all prosecutions, or juvenile cases. And it also excluded the costs of jailing people who were later released without charges, which may amount to $70 million a year, the report said. The study examined only records from California and ... looked at cases in which felony convictions were overturned and the defendants were later cleared. More than half the cases involved prosecutors’ wrongful withholding of evidence. One example was that of former Black Panther Elmer “Geronimo” Pratt. Pratt was convicted in 1972 of murdering schoolteacher Carolyn Olson [in 1968] and was sentenced to life in prison, based in part on [witness] testimony. He was freed in 1999 after a judge found that prosecutors had withheld evidence that the witness was an informant for the FBI, which was then trying to discredit Pratt as part of its Cointelpro campaign. The authors questioned long-standing laws that shield prosecutors from lawsuits by criminal defendants. They said they knew of no other profession that received immunity for “intentional wrongdoing that gravely injures another.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the prison system.
Edward Snowden, the whistleblower whose NSA revelations sparked a debate on mass surveillance, has waded into the arguments over the FBI’s attempt to force Apple to help it unlock the iPhone 5C of one of the San Bernardino shooters. The FBI says that only Apple can deactivate certain passcode protections on the iPhone, which will allow law enforcement to guess the passcode by using brute-force. Talking via video link from Moscow to the Common Cause Blueprint for a Great Democracy conference, Snowden said: “The FBI says Apple has the ‘exclusive technical means’ to unlock the phone. Respectfully, that’s bullshit.” Snowden then went on to tweet his support for an American Civil Liberties Union report saying that the FBI’s claims in the case are fraudulent. Apple co-founder Steve Wozniak also spoke out against the FBI on the Conan O’Brien show on Monday, saying: “I side with Apple on this one. [The FBI] picked the lamest case you ever could.” Wozniak added: “Verizon turned over all the phone records and SMS messages. So they want to take this other phone that the two didn’t destroy, which was a work phone. It’s so lame and worthless to expect there’s something on it and to get Apple to expose it.” Apple’s clash with the FBI comes to a head in California this month when the two will meet in federal court to debate whether the smartphone manufacturer should be required to weaken security settings on the iPhone of the shooter.
Note: According to The New York Times, the FBI has been misleading the public about the San Bernadino attacks for months. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
There's no more valuable resource for an informed citizenry than the folks doing god's work at the National Security Archive at the George Washington University. Their most recent revelations concern the Rockefeller Commission, which was formed by the Ford Administration as a reaction to the New York Times stories in 1975 that broke the news of the CIA's misdeeds, up to and including covert assassinations. And, lo and behold, you'll never guess who was leading the [cover up]: "The Gerald Ford White House significantly altered the final report of the supposedly independent 1975 Rockefeller Commission investigating CIA domestic activities, over the objections of senior Commission staff, according to internal White House and Commission documents posted today by the National Security Archive. The changes included removal of an entire 86-page section on CIA assassination plots and numerous edits to the report by then-deputy White House Chief of Staff Richard Cheney. The documents in this set have yet to be incorporated into standard accounts of the events of this period. Among the abuses that led directly to President Ford creating the Rockefeller Commission were charges the CIA had compiled dossiers on American citizens and infiltrated political groups that opposed the U.S. war in Vietnam. The Rockefeller panelists entered a blanket finding that the files and lists of citizen dissenters were "improper." The White House edit changed this conclusion.
Note: Read about the CIA's involvement in the 1953 death of military scientist Frank Olson. The Rockefeller Commission report was one of the first official sources to publicly reveal CIA and DOD mind control experiments. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The Republican-led House intelligence committee wants the Pentagon to provide what it believes are illegally deleted intelligence files pertaining to the U.S. military campaign against ISIS in Syria and Iraq. "We have been made aware that both files and emails have been deleted by personnel at CENTCOM, and we expect that the Department of Defense will provide these and all other relevant documents to the committee," [Committee Chairman Devin] Nunes said at a hearing Thursday. Nunes' assertions led to an extraordinary public acknowledgment from Lt. Gen. Vincent Stewart, director of the Defense Intelligence Agency, who was testifying before the committee, of the "unusually high" dissatisfaction inside the agency responsible for providing military intelligence on ISIS. There is already an ongoing Defense Department Inspector General investigation into allegations that intelligence analysts at CENTCOM were pressured into changing their analysis to make their reports sound overly optimistic. Congress is conducting a separate investigation. The committee has information from whistleblowers that both intelligence files and emails were deliberately deleted at Central Command, but that copies remain in the hands of analysts. Some Pentagon officials have privately told CNN they believe the problem at Central Command is that some analysts feel their work is not accepted if it shows a negative view of progress.
Note: For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
Newly published classified documents show the National Security Agency spied on a 2010 conversation between Italian Prime Minister Silvio Berlusconi and Israeli Prime Minister Benjamin Netanyahu as the two discussed ways to improve Israel’s relationship with the United States. The Italian-Israeli conversation is included in one of five NSA documents released Tuesday by WikiLeaks. Two of the documents focus on climate change, one relates to trade talks, and two report on Italian government communications. The intelligence reports date from 2007 through 2011, [and] provide additional details on U.S. efforts to spy on countries taking part in the 2009 Copenhagen Climate Change Conference, which failed to reach an agreement. One ... contains details of a confidential discussion about climate change negotiations between U.N. Secretary General Ban Ki-moon and the German Chancellor Angela Merkel in the lead-up to the conference. The NSA report is stamped “U.N. diplomatic,” “German leadership,” and Top Secret Gamma, the “Gamma” indicating an extremely sensitive spying operation. The interception methods stated on the latest leaked intelligence reports are “Unconventional” and “SCS,” which stands for Special Collection Service. SCS involves joint NSA and CIA eavesdropping operations run covertly inside U.S. and allied foreign embassy buildings in foreign capitals.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The Federal Bureau of Investigation has quietly developed a new way to measure its success in the war on terror: counting the number of terror threats it has “disrupted” in a year. In the section on “Performance Measures” in the FBI’s latest financial statement, the bureau reports 440 “terror disruptions” in the 12-month period ending on September 30, 2015. That’s ... more than three times the 2015 “target” of 125. In a vacuum, that would appear to suggest that the FBI’s terror-fighting mission - which sucked ... 54 percent of the bureau’s $9.8 billion budget in 2015 - is exceeding expectations. But that number - 440 - is much higher than the number of arrests reported by the FBI. The Washington Post counted about 60 terror-related arrests in 2015. Of those arrests, many were of people trying to travel abroad or trying to help others do so. Many more involved people planning attacks that were essentially imaginary, often goaded by FBI informants. There was only one genuinely “foiled attack” in the United States between January 2014 and September 2015. And that one ... was stopped by the local police department. The fact that the agency establishes a target for terrorism disruptions is also troubling, said Michael German, a former FBI agent.
Note: The FBI has made a habit of manufacturing "terrorist plots" from thin air. Now it appears that activities reminiscent of COINTELPRO are again being carried out to justify massive anti-terrorism spending. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
A UN panel will conclude Wikileaks founder Julian Assange is being "arbitrarily detained" in the UK, the Swedish foreign ministry has said. Mr Assange, 44, claimed asylum in London's Ecuadorean embassy in 2012. The Met Police says Mr Assange will be arrested if he leaves the embassy. The Australian was originally arrested in London in 2010 under a European Arrest Warrant issued by Sweden over rape and sexual assault claims. In 2012, while on bail, he claimed asylum inside the Ecuadorean embassy in Knightsbridge after the UK Supreme Court had ruled the extradition against him could go ahead. Mr Assange's Wikileaks organisation posted secret American government documents on the internet, and he says Washington could seek his extradition to the US to face espionage charges if he is sent to Sweden. In the statement, published earlier by Wikileaks on Twitter, Mr Assange said: "Should the UN announce tomorrow that I have lost my case against the United Kingdom and Sweden I shall exit the embassy at noon on Friday to accept arrest by British police ... However, should I prevail and the state parties be found to have acted unlawfully, I expect the immediate return of my passport and the termination of further attempts to arrest me." Last October, Scotland Yard said it would no longer station officers outside the Ecuador embassy following an operation which it said had cost Ł12.6m. But it said "a number of overt and covert tactics to arrest him" would still be deployed.
Note: Read more about the "legal limbo" and propaganda campaign carried out against Assange and Wikileaks. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Senior CIA officials have for years intentionally deceived parts of the agency workforce by transmitting internal memos that contain false information. The practice is known by the term “eyewash.” Officials said there is no clear mechanism for labeling eyewash cables or distinguishing them from legitimate records being examined by the CIA’s inspector general, turned over to Congress or declassified for historians. Senate investigators uncovered apparent cases of eyewashing as part of a multi-year probe of the CIA’s interrogation program, according to officials who said that the Senate Intelligence Committee found glaring inconsistencies in CIA communications about classified operations, including drone strikes. Former CIA officials ... acknowledged that the internal mechanisms for managing eyewash cables were largely informal. Skeptics described the safeguards as inadequate. “When you introduce falsehoods into the communications stream then you can destabilize the whole system of intelligence oversight and compliance with the law,” said Steven Aftergood, a government secrecy expert at the Federation of American Scientists. “It wasn’t that long ago that we had a CIA executive director who was engaged in criminal activity - you don’t want someone like him preparing eyewash cables,” Aftergood said, referring to Kyle “Dusty” Foggo, the former No. 3 executive at the agency.
Note: Read more about the strange case of Kyle "Dusty" Foggo, the CIA executive convicted of fraud in connection with secret CIA prisons. For more along these lines, see concise summaries of deeply revealing Intelligence agency corruption news articles from reliable major media sources.
Before Julian Assange, the WikiLeaks founder, and Edward Snowden, the intelligence whistleblower, there was Katharine Gun. The former GCHQ employee ... was a young Mandarin specialist at the British government’s eavesdropping agency in Cheltenham. In early 2003 she received an email asking her and her colleagues to help the US government spy on UN security council delegations in New York. It was a critical moment, as Washington was seeking UN backing for its invasion of Iraq. Gun decided the world had to know, whatever the cost to her life and career. She leaked the memo to the Observer and was arrested, lost her job and faced trial under the Official Secrets Act. Thirteen years later, as bloodshed continues in Iraq, the almost forgotten story is to be brought to a new audience in Official Secrets, a movie [that] will chart Gun’s unlikely bid – courageous self-sacrifice to supporters, treachery in the view of critics – to block George W Bush and Tony Blair’s march to war. Unlike many whistleblowers who leak thousands of documents after the event, Gun was intervening in an active operation and trying to stop a war. The US National Security Agency memo told employees of GCHQ to gather “the whole gamut of information that could give American policymakers an edge in obtaining results favourable to US goals or to head off surprises”. “I saw the email and my gut reaction was pretty instantaneous, that it was highly explosive information and that it should be out in the public domain,” she recalled.
Note: The US has spent several trillion dollars pursuing a policy of endless war since 9/11. Great Britain did not believe Iraq to be a global security threat, but backed the US-led invasion on this false pretense for political reasons. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
The CIA has released hundreds of declassified documents detailing investigations into possible alien life. The Central Intelligence Agency posted documents of reported Unidentified Flying Objects that range in date from the late 1940s to the 1950s. While playing off the hype of the TV show reboot "The X-Files," the CIA broke down the cases into two categories, whether you side with Agent Mulder or Agent Scully. For believers in alien life ... one case you can choose to investigate is the case of a flying saucer in Germany in 1952. An eyewitness told investigators that an object "resembling a huge flying pan" landed in a forest clearing in the Soviet zone of Germany in 1952. The eyewitness said once he was closer to the area where it landed, he saw two men dressed in shiny metallic clothing. Spooked by the eyewitness ... the mysterious men jumped into the large flying pan object and it spun out into the sky. "The whole object then began to rise slowly from the ground and rotate like a top," the eyewitness told the CIA. The man told a judge he thought he was dreaming but said there was a circular imprint on the ground where the object had landed. If that case intrigues you, there are four more listed on the CIA blog post. But if you are more of a skeptic like Scully, and believe there is a simple explanation for flying saucer sightings, then the documents from the scientific advisory panel on UFOs in 1953 will help you prove your case.
Note: Explore these intriguing 'X-Files' on the CIA website at this link. For more along these lines, see concise summaries of deeply revealing UFO cover-up and disclosure news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our UFO Information Center.
Canada's electronic spy agency broke privacy laws by sharing information about Canadians with foreign partners, a federal watchdog said Thursday. Commissioner Jean-Pierre Plouffe said in his annual report that the Communications Security Establishment passed along information known as metadata to counterparts in the United States, Britain, Australia and New Zealand. Metadata is information associated with a communication, such as a telephone number or email address, but not the message itself. The communications agency intercepts and analyzes foreign communications for intelligence information of interest to the federal government. The agency is legally authorized to collect and analyze metadata churning through cyberspace. Plouffe, who keeps an eye on the highly secretive agency, said he found that it lacks clarity regarding the sharing of certain types of metadata. Defense Minister Harjit Sajjan said the sharing won't resume until he is satisfied that the proper protections are in place. Plouffe's report noted that certain metadata was not being properly minimized, or rendered unidentifiable, prior to being shared. The CSE's failure to strip out certain Canadian identity information violated the National Defense Act and therefore the federal Privacy Act as well. Privacy advocates have stressed that metadata is far from innocuous since it can reveal a great deal about a person's online behavior and interactions.
Note: Many countries do not allow their intelligence agencies to spy on their own citizens without going through a legal process. The easy way around this that has been used for decades is to simply getting the information from a friendly country. So if the CIA wants information on you in the US, they can't spy directly, but they can ask the UK to do so and pass the information to them and thus get around the laws. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
The Obama administration on Thursday announced new rules that will let the NSA share vast amounts of private data gathered without warrant, court orders or congressional authorization with 16 other agencies, including the FBI, the Drug Enforcement Agency, and the Department of Homeland Security. The new rules allow ... those agencies to sift through raw data collected under a broad, Reagan-era executive order that gives the NSA virtually unlimited authority to intercept communications abroad. Previously, NSA analysts would filter out information they deemed irrelevant and mask the names of innocent Americans before passing it along. The last-minute adoption of the procedures is one of many examples of the Obama administration making new executive powers established by the Bush administration permanent, on the assumption that the executive branch could be trusted to police itself. Executive Order 12333 ... serves as authorization for the NSA’s most massive surveillance programs. In 2014, a former state department official described NSA surveillance under 12333 as a “universe of collection and storage” beyond what Congress has authorized. This massive database inevitably includes vast amount of American’s communications — swept up when they speak to people abroad, when they go abroad themselves, or even if their domestic communications are simply routed abroad. That’s why access was previously limited to data that had already been screened to remove unrelated information and information identifying U.S. persons.
Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss this provocative article by Glenn Greenwald and this interview he gave to Fox News. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The Wall Street Journal reported yesterday that the NSA under President Obama targeted Israeli Prime Minister Benjamin Netanyahu and his top aides for surveillance. In the process, the agency ended up eavesdropping on ... U.S. lawmakers and American-Jewish groups. People who spent many years cheering for and defending ... programs of mass surveillance are suddenly indignant now that they know the eavesdropping included them. Long-time GOP chairman of the House Intelligence Committee and unyielding NSA defender Pete Hoekstra last night was truly indignant: "WSJ report that NSA spied on Congress and Israel communications very disturbing. Actually outrageous. Maybe unprecedented abuse of power ... NSA and Obama officials need to be investigated and prosecuted. NSA loses all credibility. Scary." This pattern - whereby political officials who are vehement supporters of the Surveillance State transform overnight into crusading privacy advocates once they learn that they themselves have been spied on - is one that has repeated itself over and over. So now, with yesterday’s WSJ report, we witness the tawdry spectacle of large numbers of people who for years were fine with, responsible for, and even giddy about NSA mass surveillance suddenly objecting. Overnight, privacy is of the highest value because now it’s their privacy, rather than just yours, that is invaded.
Note: Read the full Wall Street Journal article on how the US government is secretly spying on Israeli leaders and more. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
U.S. intelligence agencies recently fought off a move by Congress to require the CIA and other spy services to disclose more details about high-ranking employees who have been promoted or fired. Under a provision drafted by the Senate Intelligence Committee this year, intelligence agencies would have been required to regularly provide names of those being promoted to top positions and disclose any “significant and credible information to suggest that the individual is unfit or unqualified.” But that language faced intense opposition from Director of National Intelligence James R. Clapper Jr.. As a result, the wording was watered down by Congress this month and now requires Clapper only to furnish “information the Director determines appropriate.” U.S. spy chiefs chafed at the idea of subjecting their top officials to such congressional scrutiny and went so far as to warn that candidates for certain jobs would probably withdraw. Former CIA director Michael Hayden said he [opposed the provision] “for simply being too invasive.”
Note: As a vocal advocate of intrusive spying, former CIA director Michael Hayden's claim that congressional oversight of spy agency personnel could be "too invasive" is ironic. The unaccountable US intelligence agencies were recently called a "secret government" in the Boston Globe. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
On a snowy afternoon in February 2004, an FBI agent came to Nick Merrill’s door, bearing a letter that would change his life. At the time, Merrill was running a small internet service provider. The envelope that the agent carried contained what is known as a “national security letter”, or NSL. It demanded details on one of his company’s clients; including cellphone tower location data, email details and screen-names. It also imposed a non-disclosure agreement which was only lifted this week, when – after an 11-year legal battle by Merrill and the American Civil Liberties Union, he was finally allowed to reveal the contents of the letter to the world. The NSL which Merrill was given was a new use for what was a relatively old tool. The FBI had long – if sparingly – used them, [but] the Patriot Act vastly expanded the scope of what an NSL could be applied to. The FBI greatly increased the number issued; according to a 2007 inspector general’s report, the NSL that Merrill was handed by the agent was one of nearly 57,000 issued that year. All of those thousands of NSLs were accompanied by a non-disclosure agreement, or “gag order” – which barred recipients were ever disclosing that they had received an NSL – even to the person whose records were being sought. With the ACLU, Merrill went to court to challenge the constitutionality of the letter, especially of the gag order. In 2014, Merrill sued again, helped by ... the Yale Law Clinic. Finally, [a] judge ... ruled that the gag order be completely lifted. It had taken Merrill almost 12 years.
Note: A 2007 Washington Post article summary sheds more light on Merrill's long struggle.
Months after the Obama administration declared combat operations over in Afghanistan, the CIA continues to run a shadow war in the eastern part of the country, overseeing an Afghan proxy called the Khost Protection Force [KPF], according to local officials, former commanders of that militia and Western advisers. The highly secretive paramilitary unit has been implicated in civilian killings, torture, questionable detentions, arbitrary arrests and use of excessive force in controversial night raids. In several attacks, witnesses described hearing English being spoken by armed men who had interpreters with them, suggesting American operatives were present during assaults where extreme force was used. Afghan government officials acknowledge that the KPF has killed civilians and committed other abuses. In Khost, the KPF is more influential than the Afghan army and police, and is unaccountable to the provincial government. The CIA [directs] the KPF’s operations, paying fighters’ salaries, and training and equipping them. The CIA is not bound by the Bilateral Security Agreement between Afghanistan and Washington that, among other rules, limits the ability of U.S. military forces to enter Afghan homes. The KPF was one of several large paramilitary forces created by the CIA in the months after the Taliban was ousted following the 9/11 attacks.
Note: Read a fascinating article titled "Does the Pentagon Want Nuclear War Against Russia?" Key leaders in both the CIA and Pentagon seem to want war at all costs, particularly as war fills their coffers and those of their big business buddies. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.
The Federal Bureau of Investigation has used a secretive authority to compel Internet and telecommunications firms to hand over customer data including an individual’s complete web browsing history and records of all online purchases, a court filing released Monday shows. The documents are believed to be the first time the government has provided details of its so-called national security letters, which are used by the FBI to conduct electronic surveillance without the need for court approval. National security letters have been available as a law enforcement tool since the 1970s, but their frequency and breadth expanded dramatically under the USA Patriot Act, which was passed shortly after the Sept. 11, 2001 attacks. They are almost always accompanied by an open-ended gag order barring companies from disclosing the contents of the demand for customer data. The secretive orders have long drawn the ire of tech companies and privacy advocates, who argue NSLs allow the government to snoop on user content without appropriate judicial oversight. Last year, the Obama administration announced it would permit Internet companies to disclose more about the number of NSLs they receive. But they can still only provide a range such as between 0 and 999 requests. Twitter has sued in federal court seeking the ability to publish more details in its semi-annual transparency reports. Several thousand NSLs are now issued by the FBI every year. At one point that number eclipsed 50,000 letters annually.
Note: Read more about the FBI's use of these controversial secret letters. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
In 2009, not long after his historic election and seven years after the first U.S. drone strike, President Barack Obama accepted the Nobel Peace Prize. Since then, however, deadly U.S. drone strikes have increased sharply, as have doubts about the program’s reliability and effectiveness. The latest criticism comes from Drone, a new documentary about the CIA’s covert drone war. To help promote the film and inveigh against the agency’s drone program ... four former operators - Stephen Lewis, Michael Haas, Cian Westmoreland and Brandon Bryant - appeared at a press conference. Speaking out can lead to veiled threats and prosecution. Which is why for years Bryant was the only drone veteran who openly rebuked the drone war. But his persistence and his appearance in the film, the other three say, inspired them to come forward. On multiple occasions, the men say they complained to their superiors about their concerns to no avail. Drone strikes kill far more civilians than the government admits. These deaths, they argue, wind up helping militant groups recruit new members and hurt the U.S.’s long-term security. By distancing soldiers from the battlefield, the operators suggest the people carrying out strikes may become even more desensitized to killing than their counterparts on the front lines. On some occasions, Haas says operators referred to children as “fun-sized terrorists” or “TITS,” terrorists in training.
Note: A human rights attorney has stated the four former Air Force drone operators-turned-whistleblowers mentioned above have had their credit cards and bank accounts frozen. How many more have not spoken out against these abuses for fear of retaliation like this? Read more about the major failings of US drone attacks. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
It’s a wretched yet predictable ritual after each new terrorist attack: Certain politicians and government officials waste no time exploiting the tragedy for their own ends. The remarks on Monday by John Brennan, the director of the Central Intelligence Agency, took that to a new and disgraceful low ... after coordinated terrorist attacks in Paris killed 129. Mr. Brennan complained about ... the sustained national outrage following the 2013 revelations by Edward Snowden, a former National Security Agency contractor, that the agency was using provisions of the Patriot Act to secretly collect information on millions of Americans’ phone records. It is hard to believe anything Mr. Brennan says. Last year, he bluntly denied that the C.I.A. had illegally hacked into the computers of Senate staff members conducting an investigation into the agency’s detention and torture programs when, in fact, it did. In 2011 ... he claimed that American drone strikes had not killed any civilians, despite clear evidence that they had. And his boss, James Clapper Jr., the director of national intelligence, has admitted lying to the Senate on the N.S.A.’s bulk collection of data. Even putting this lack of credibility aside, it’s not clear what extra powers Mr. Brennan is seeking. Most of the men who carried out the Paris attacks were already on the radar of intelligence officials in France and Belgium, where several of the attackers lived. The problem in this case was not a lack of data. In fact, indiscriminate bulk data sweeps have not been useful.
Note: The above is an excellent article by the New York Times editorial board. Yet the role of the largely subservient media, which strongly supported Bush's campaign to go to war in Iraq is ignored. Read this analysis to go even deeper. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government [is] a new book by Salon founder David Talbot. As Talbot explains, “What I was really trying to do was a biography on the American power elite from World War II up to the 60s.” Dulles ... served as CIA director from 1953 to 1961. Dulles would have had no moral qualms about killing any politician, including Americans. He went on to wield far greater power than most elected officials ever have. The Devil's Chessboard ... includes detailed reexaminations of Dulles's most notorious failures, such as the Bay of Pigs in 1961 and the nightmarish mind control program MK-ULTRA, as well as his most notorious "successes," the CIA's overthrow of democratic governments in Iran in 1953 and in Guatemala in 1954. As the Swiss director of the Office of Strategic Services during World War II, Dulles – whose law firm had represented German corporations and many U.S. corporations with German interests – quietly attempted to undermine Franklin D. Roosevelt's demand that Germany surrender unconditionally, going so far as to order the rescue of an SS general surrounded by Italian partisans. Dulles also led the push to save Reinhard Gehlen, Nazi head of intelligence on the Eastern Front and a genuine monster, from any post-war justice. Dulles then made certain Gehlen and his spies received a cozy embrace from the CIA, and helped push him to the top of West Germany's Federal Intelligence Service.
Note: Read more about the CIA Nazi link. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
The U.S. closely monitored Israel’s military bases and eavesdropped on secret communications in 2012, fearing its longtime ally might try to carry out a strike on Fordow, Iran’s most heavily fortified nuclear facility. Nerves frayed at the White House after senior officials learned Israeli aircraft had flown in and out of Iran in what some believed was a dry run for a commando raid on the site. Worried that Israel might ignite a regional war, the White House sent a second aircraft carrier to the region and readied attack aircraft, a senior U.S. official said, “in case all hell broke loose.” The two countries, nursing a mutual distrust, each had something to hide. Instead of talking to each other, the allies kept their intentions secret. To figure out what they weren’t being told, they turned to their spy agencies to fill gaps. They employed deception, not only against Iran, but against each other. After working in concert for nearly a decade to keep Iran from an atomic bomb, the U.S. and Israel split over the best means: diplomacy, covert action or military strikes. In 2010, the risk of covert action became clear. A computer virus dubbed Stuxnet, deployed jointly by the U.S. and Israel to destroy Iranian centrifuges ... had inadvertently spread across the Internet. The Israelis wanted to launch cyberattacks against a range of Iranian institutions, according to U.S. officials. But the breach made Mr. Obama more cautious, officials said, for fear of triggering Iranian retaliation, or damaging the global economy if a virus spread uncontrollably.
Note: This article is also available at this link. When the Stuxnet computer virus got loose, it began attacking European companies. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Confidential files containing evidence of violations committed during El Salvador’s civil war have been stolen from a Washington-based human rights group days after it launched legal proceedings against the CIA over classified files on a former US-backed military commander implicated in massacres, death squads and forced disappearances. A computer and hard drive containing testimonies from survivors were stolen from the office of the director of the University of Washington Center for Human Rights (UWCHR) last week. The director’s office was the only one raided, there were no signs of forced entry, and items of monetary value were left behind. The stolen files contained details of investigations related to the 1980-1992 civil war, which left at least 75,000 people dead, 8,000 missing and a million displaced. The vast majority of crimes were committed by US-backed military dictatorships against civilians ... suspected of supporting the leftist guerrillas, according to the UN. Perpetrators were granted immunity from prosecution by a 1993 amnesty law, which remains intact despite being ruled illegal by the Inter American Court of Human Rights. The UWCHR has uncovered previously unseen information held by federal agencies such as the CIA and DEA, which it has shared with relatives of victims. The group filed a freedom of information suit against the CIA on 2 October. The sensitive files were stolen two weeks later. Several rights groups in El Salvador investigating war crimes have suffered similarly suspicious robberies.
Note: Several military human rights abusers in El Salvador were trained by the US Army's School of the Americas, along with over 500 known human rights abusers.
David Talbot despises Allen Dulles. As director of the CIA, Talbot declares, Dulles exemplified the “frightening amorality that prevailed at the pinnacle of American power” at the height of the Cold War. As a lawyer for Sullivan and Cromwell in the 1930s, Dulles protected and promoted Nazi-controlled cartels. He used his influence in the Office of Strategic Services and the CIA to shield former Nazis from prosecution for war crimes in the ’40s and ’50s. Dulles organized the disastrous Bay of Pigs invasion of Cuba, [and was] willing to manipulate and undercut American presidents. In “The Devil’s Chessboard,” David Talbot, the founder and former editor in chief of Salon and former senior editor at Mother Jones, examines Dulles’ career and adds several more “achievements” to his dark resume. Talbot’s indictment is long. He suggests that had President Franklin D. Roosevelt lived, Dulles might well have faced criminal charges for hiding the U.S. assets of German corporations and destroying incriminating evidence. By 1963, Talbot insists, a clear consensus had emerged among corporate leaders “and within America’s deep state” that Kennedy was a threat to national security and had to be removed. Dulles, they concluded, “was the only man with the stature, connections, and decisive will to make something of this enormity happen." [Dulles] then lobbied Lyndon Johnson to appoint him to the Warren Commission, where he saw to it that Lee Harvey Oswald would take the fall as the “lone gunman.”
Note: Read another good article on Talbot's book revealing evidence in the JFK killing. And isn't it interesting that no other major media seemed to find this book worth a review, even though Talbot is well known as the founder of the website Salon.
From 2011 to 2013, the most elite forces in the U.S. military, supported by the CIA and other elements of the intelligence community, set out to destroy the Taliban and al Qaeda forces that remained hidden ... along Afghanistan’s northeastern border with Pakistan. Dubbed Operation Haymaker, the campaign has been described as a potential model for the future of American warfare. The military’s own analysis demonstrates that the Haymaker campaign was in many respects a failure. The vast majority of those killed in airstrikes were not the direct targets. Nor did the campaign succeed in significantly degrading al Qaeda’s operations in the region. The frequency with which “targeted killing” operations hit unnamed bystanders is among the more striking takeaways from the Haymaker slides. [Documents obtained by The Intercept] show that during a five-month stretch of the campaign, nearly nine out of 10 people who died in airstrikes were not the Americans’ direct targets. Larry Lewis, formerly a principal research scientist at the Center for Naval Analyses, ... found that drone strikes in Afghanistan were 10 times more likely to kill civilians than conventional aircraft. This month, an American airstrike on a hospital run by the international organization Médecins Sans Frontičres ... killed at least a dozen members of the humanitarian group’s medical staff and 10 patients, including three children. A nurse on the scene recalled seeing six victims in the intensive care unit ablaze in their beds.
Note: Read more about the major failings of US drone attacks. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Survivors of CIA torture have sued the contractor psychologists who designed one of the most infamous programs of the post-9/11 era. In an extraordinary step, psychologists James Mitchell and Bruce Jessen now face a federal lawsuit for their role in convincing the CIA to subject terror suspects to mock drowning, painful bodily contortions, sleep and dietary deprivation and other methods long rejected by much of the world as torture. In practice, CIA torture meant disappearances, mock executions, anal penetration ... and at least one man who froze to death, according to a landmark Senate report last year. On behalf of torture survivors ... as well as a representative of the estate of Gul Rahman – who froze to death in a CIA black site in Afghanistan – the American Civil Liberties Union (ACLU) filed the suit against Mitchell and Jessen on Tuesday in a federal court in Washington state. The suit calls the torture program a “joint criminal enterprise” and a “war crime” in which the CIA, Mitchell and Jessen colluded and from which Mitchell and Jessen financially profited. Although numerous US government investigations have pierced the veneer of secrecy around the torture program, the program’s government architects have faced no legal reprisal. A Justice Department inquiry ended in 2012 without prosecutions. The new lawsuit, aimed not at government officials but the contractors Mitchell and Jessen, aims to break the trend.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
General Augusto Pinochet directly ordered the 1976 assassination of a Chilean diplomat who was killed in a car bomb in Washington DC, according top secret US intelligence documents declassified by the Obama administration. The documents ... also show that the former dictator was so concerned with covering up his role in the murder that he planned to assassinate his own head of intelligence, General Manuel Contreras. Orlando Letelier, a former defence and foreign minister under President Salvador Allende, was tortured and incarcerated after Pinochet’s 1973 coup. He later fled to the US and worked at the Institute of Policy Studies in Washington DC. Letelier, who had once been Chile’s ambassador to the US, was murdered on 21 September 1976 by a car bomb planted under the driver’s seat of his vehicle just a mile from the White House. Ronni Moffitt, an American colleague, was also killed in the blast. Letelier’s son, Senator Juan Pablo Letelier, confirmed to the Guardian that he had received copies of the newly released documents, which ... include papers from the CIA. Speculation that the CIA was aware of the plot to kill Letelier is based on previously declassified records showing that Manuel Contreras was paid by the CIA before the bombing and was in regular contact with top officials at the spy agency. Contreras, who died in August, always denied responsibility and blamed the CIA for the bombing.
Note: Members of Pinochet's brutal regime were strongly supported by Washington until very recently. George H.W. Bush was head of the CIA when the assassination described above was carried out. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption.
Five years ago this week, FBI agents raided the homes of six political activists of the Freedom Road Socialist Organization (FRSO) in Minnesota, Illinois and Wisconsin, as well as the office of the nonprofit Anti-War Committee. A series of FBI documents left behind at Mick Kelly’s Minneapolis home shed more light on the FBI’s activities. What is especially illuminating is the mindset the documents reveal, particularly some of the questions FBI agents were instructed to ask those being served with the search warrants, such as “What did you do with the proceeds from the Revolutionary Lemonade Stand?” In February 2014, as a result of further legal action ... the search warrants for the raids [were] unsealed. The FBI began surveilling the FRSO shortly after the protests at the 2008 GOP convention, using a confidential informant. Despite the FBI’s collection of over a hundred hours of recordings and its multiyear [investigation], to date none of the activists have been charged with any crime. Just four days prior to the FBI raids against the Anti-War Committee and the FRSO, the Department of Justice Inspector General [IG] released the results of an investigation into post-9/11 surveillance of peace groups and other domestic dissidents up through 2006, [which] found that the bureau “engaged in tactics and strategies toward those groups and their members that were inappropriate, misleading and in some cases counterproductive, [and] accused FBI witnesses of ... offering ‘incomplete and inconsistent accounts of events.’”
Note: By 2011, the legal definition of "supporter of terrorism" had come to include peaceful activists, authors, academics and journalists. For more along these lines, read about Cointelpro, the program used by corrupt intelligence agencies to spy on and attack U.S. activists beginning in the 1960's.
It was the spring of 2002. Pakistani authorities burst into the house [Emad Hassan] shared with 14 other foreign students and brought them to a nearby prison. After two months of beatings and interrogation, the Pakistanis handed him over to the U.S. military. They stripped him of his clothes and put him in a diaper. Then they blindfolded him, placed earmuffs over his head and marched him onto a plane. When the aircraft landed, he soon learned he was in the U.S. prison at Guantánamo Bay, Cuba. For years, the White House has been trying to close Gitmo. As of early September, 52 of the 116 prisoners who remain at the U.S. facility have been cleared to be set free, a tacit admission, critics say, that they should never have been imprisoned. The Pakistani forces who took Hassan from his student housing, his lawyers say, received $5,000 from the U.S. military. This was typical. According to a 2006 analysis ... the vast majority of detainees at Guantánamo Bay were arrested by local groups eager to profit from the counterterrorism gold rush. His lawyers claim much of the U.S. government’s incriminating information comes from a small group of informants at Guantánamo who told interrogators what they wanted to hear. Many sold out their fellow detainees for small rewards. [In 2009] Obama’s task force cleared Hassan for release - a process that requires six federal agencies to agree that a prisoner doesn’t pose a national security threat.
Note: In 2015, Hassan was freed from Gitmo and granted asylum by Oman. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
Hamid Karzai, the former president of Afghanistan, has questioned the existence of al-Qaida, and denied that the 9/11 terror attacks ... were planned in Afghanistan. On the eve of the anniversary of the 2001 attacks, Karzai, who left office last year after 12 years, used an interview with al Jazeera to express his doubt that the terrorist group led by the late Osama bin Laden was responsible for the operation which prompted the invasion of Afghanistan. Karzai ... also claimed in the interview that Islamic State fighters in Afghanistan are “definitely” members of “Pakistani militias”. When asked if he agreed that al-Qaida in Afghanistan had been behind the 9/11 attacks ... Karzai replied: “I can tell you for a fact that the operation was neither conducted from Afghanistan, nor were the Afghan people responsible for that.” A daring and bloody operation involving US special forces and the CIA put Karzai back in Afghanistan in the last weeks of the 2001 war and then into power as a supposed consensus candidate. But Karzai quickly proved himself independent and contrarian. Officials from the US, the UK, Nato and the UN all repeatedly criticised Karzai for failing to crack down on rampant corruption and the booming narcotics trade in Afghanistan. By 2009, according to Robert Gates, the former US defence secretary, Washington was so keen to oust the Afghan president that officials connived in delaying an Afghan presidential election and then tried to manipulate the outcome in a “clumsy and failed putsch”.
Note: By 2000, the Taliban had mostly stopped heroin production in Afghanistan. But once former Unocal employee Hamid Karzai was installed into power by the US, bags of CIA cash helped transform Afghanistan into a narco state.
More than 50 intelligence analysts at Centcom have formally complained that reports on the Islamic State and the Nusra Front — Al Qaeda's Syria branch — have been repeatedly altered by senior intelligence officials to fit with the Obama administration's insistence that the US is winning the war against the two militant groups. Former CIA deputy director Michael Morell explained on "CBS This Morning" how serious these allegations are. "One of the key aspects of the policymaking process in the United States is that analysts get to say what they think ... if there is truth that somebody has been meddling with their analysis, I think somebody needs to lose their job over it." A written complaint was sent in July by two Centcom senior analysts to the Department of Defense Inspector General. Eleven individuals knowledgeable about the details of the complaint [say] crucial parts of intelligence reports were taken out, analysts were subject to an environment in which they did not feel able to give a candid assessment of the situation in Iraq and Syria, and sometimes reports seen as being too negative were sent back to analysts. One source alleges that when [analysts] brought concerns to Centcom leadership, they were urged to retire, and some agreed to leave. In late July, the Associated Press reported that assessments by the CIA, the Defense Intelligence Agency, and others found that the Islamic State, also known as ISIS or ISIL, is no weaker than it was when US bombing began in 2014.
Note: For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources. Then explore an in-depth essay documenting the covert origins of Isis and other international terrorist organizations.
A French secret service diver who took part in the operation to sink Greenpeace ship the Rainbow Warrior 30 years ago has spoken publicly for the first time to apologise for his actions. Jean-Luc Kister ... was one of two divers serving with the French intelligence service, the Direction générale de la sécurité extérieure (DGSE), who attached limpet mines to the hull of the vessel moored in Auckland in 1985. The Rainbow Warrior was heading for the Mururoa Atoll in the South Pacific in French Polynesia where France was planning a series of nuclear tests. French agents posing as Swiss tourists had earlier visited the ship ... to gather information for the operation. The first mine ... blew a large hole in the ship. Paris initially denied any involvement in the sinking, [which killed photographer Fernando Pereira], and described it as a “terrorist attack”. Documents released in 2005 and published in the Guardian, showed that France [also] tried to blame British intelligence for the sinking. The French government’s responsibility, however, was quickly established. In 1987, under international pressure, France paid $8.2m damages to Greenpeace. It also paid an undisclosed sum to the Pereira family. Kister claims politicians in Paris turned down other suggestions for dealing with the Greenpeace protest. He said it was “an unfair clandestine operation conducted in an allied, friendly and peaceful country” ... and accused French politicians of “high treason” for having leaked his name and role in the operation after the sinking.
Note: By posing as Swiss tourists to spy on the Greenpeace ship, attacking this ship, and then blaming the attack on "terrorists", the French carried out a "false flag" attack. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
A new book, The WikiLeaks Files: The World According to U.S. Empire ... explains how the leaked U.S. documents have lifted the veil on the imperialist nature of American foreign policy. At the time of writing, WikiLeaks has published 2,325,961 diplomatic cables and other US State Department records. To randomly pick up isolated diplomatic records that intersect with known entities and disputes, as some daily newspapers have done, is to miss “the empire” for its cables. Diplomatic cables are not produced in order to manipulate the public, but are aimed at elements of the rest of the US state apparatus and are therefore relatively free from the distorting influence of public relations. When WikiLeaks publishes US government documents with classification markings ... two parallel campaigns begin: first, the public campaign of downplaying, diverting attention from and reframing any revelations that are a threat to the prestige of the national security class; and, second, an internal campaign within the national security state itself to digest what has happened. Publicly, the US government has claimed, falsely, that anyone without a security clearance distributing “classified” documents is violating the Espionage Act of 1917. The response of the United States to the release of the WikiLeaks materials betrays a belief that its power resides in a disparity of information: ever more knowledge for the empire, ever less for its subjects.
Note: Wikileaks has published everything from suspicious messages about 9/11 to cables showing US diplomats working directly for companies such as Monsanto to drafts of secret trade deals that big banks use to grow their power. PFC Manning is currently serving a 35 year prison sentence for leaking the data analysed in the book mentioned above.
The Associated Press sued the U.S. Department of Justice Thursday over the FBI's failure to provide public records related to the creation of a fake news story used to plant surveillance software on a suspect's computer. At issue is a 2014 Freedom of Information request seeking documents related to the FBI's decision to send a web link to the fake article to a 15-year-old boy suspected of making bomb threats to a high school. The FBI has used spyware before to pursue suspected criminals. AP strongly objected to the ruse, which was uncovered last year. AP General Counsel Karen Kaiser [wrote] in a 2014 letter to then-Attorney General Eric Holder, "It is improper and inconsistent with a free press for government personnel to masquerade as The Associated Press or any other news organization. The FBI may have intended this false story as a trap for only one person. However, the individual could easily have reposted this story to social networks, distributing to thousands of people, under our name, what was essentially a piece of government disinformation." In a November opinion piece in the New York Times, FBI Director James Comey revealed that an undercover FBI agent had also impersonated an AP reporter. AP's records request also seeks an accounting of how many times since 2000 the FBI has impersonated media organizations to deliver malicious software. In a response to AP, the FBI indicated it might take nearly two years to find and copy the requested records.
Note: According to The Guardian, the FBI forced an informant to hack into and compromise the computer systems of a major UK newspaper in 2011. For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of mass media.
The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T. The N.S.A.’s top-secret budget in 2013 for the AT&T partnership was more than twice that of the next-largest such program, [and] the company installed surveillance equipment in at least 17 of its Internet hubs on American soil, far more than its similarly sized competitor, Verizon. After the terrorist attacks of Sept. 11, 2001, AT&T ... began turning over emails and phone calls “within days” after the warrantless surveillance began in October 2001. In 2011, AT&T began handing over 1.1 billion domestic cellphone calling records a day to the N.S.A. after “a push to get this flow operational prior to the 10th anniversary of 9/11,” according to an internal agency newsletter. In a 2006 lawsuit, a retired AT&T technician named Mark Klein claimed that ... he had seen a secret room in a company building in San Francisco where the N.S.A. had installed equipment. Mr. Klein claimed that AT&T was providing the N.S.A. with access to Internet traffic that AT&T transmits for other telecom companies. Such cooperative arrangements, known in the industry as “peering,” mean that communications from customers of other companies could end up on AT&T’s network.
Note: The story of Klein's lawsuit was initially suppressed by the NSA and major media including the L.A. Times. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
The secret agreements between our intelligence and Gaddafi’s torturers will now remain safe for good. Gaddafi’s spymaster Abdullah al-Senussi will be shot in Libya before he has a chance to tell us about the cosy relationship he had with our Western security services when he liaised between his boss, the CIA and MI6. The Brits and Americans have not batted an eyelid since Senussi, Gaddafi’s son Saif and a bunch of other regime cohorts were sentenced to death last week without defence counsel or testimony or documents or witnesses. Senussi himself is held responsible for the massacre of more than a thousand of Gaddafi’s political prisoners. But he and his successor, Moussa Koussa ... were among the most loyal of Gaddafi’s henchmen. [His] crimes against humanity [included] the torture of Libyan exiles after their barbaric rendition to Libya with the help of MI6 and other Western agencies. Senussi knew far more about our spying agencies and their dirty tricks than Saif al-Gaddafi – the late Muammar’s son. Maybe that’s why Senussi initially did a runner to Mauritania, which should have handed him over to The Hague. But after receiving a bribe of $200m, Mauritania returned him to Tripoli. Senussi’s international counsel, Ben Emmerson ... told me in 2013 that when Senussi’s lawyers wanted to know if MI6 operatives had interrogated their client while he was in Mauritania – before his illegal rendition to Libya – William Hague, the Foreign Secretary at the time, declined to answer.
Note: The British government is presently being sued by victims of the cooperative arrangement between MI6 and Libyan torturers. For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and government.
The Obama administration has ruled that inspectors general have to get permission from the agency they’re monitoring for access to wiretaps, grand jury and credit information, a decision that immediately was denounced by watchdogs and lawmakers. The Justice Department’s inspector general said the 58-page ruling ... will undermine his ability to do his job rooting out fraud and corruption. “Without such access, our office’s ability to conduct its work will be significantly impaired,” Inspector General Michael E. Horowitz said in a statement. His disapproval was followed by a bipartisan condemnation from four congressional leaders whose committees have oversight over DOJ. [In] 2010 ... the FBI started restricting the DOJ inspector general’s access to documents whose confidentiality is protected by law, including grand jury testimony and wiretaps. The IG’s review of the controversial Fast and Furious case, the failed sting operation that lost track of more than 1,000 government-issued guns, one of which was used to kill a U.S. Border Patrol agent, was delayed. Other investigations have lagged, Horowitz testified before Congress last February, complaining that the FBI has failed to turn over key records in several whistleblower cases. “Imagine if we had a DOJ (inspector general) during Watergate looking at the FBI’s conduct and the Attorney General had this opinion to deny or delay access to this kind of information,” said Brian Miller, the former inspector general at the General Services Administration.
Note: Last year, President Obama invoked executive privilege in an attempt to cover up the Fast and Furious scandal. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The Department of Homeland Security has been monitoring the Black Lives Matter movement since anti-police protests erupted in Ferguson, Missouri last summer, according to hundreds of documents obtained by The Intercept through a Freedom of Information Act request. The reports confirm social media surveillance of the protest movement and ostensibly related events in the cities of Ferguson, Baltimore, Washington, DC, and New York. The tracking of domestic protest groups and peaceful gatherings raises questions over whether DHS ... has allowed its mission to creep beyond the bounds of useful security activities as its annual budget has grown beyond $60 billion. In an email to The Intercept, DHS spokesman S.Y. Lee wrote: “The DHS National Operations Center statutory authority ... is limited to providing situational awareness." Baher Azmy, a legal director at the Center for Constitutional Rights, however, argues that, “What they call situational awareness is Orwellian speak for watching and intimidation. Some of the documents show that the DHS has produced minute-by-minute reports on protesters’ movements in demonstrations. Surveillance of [an] April 29th protest, which the bulletin explicitly refers to as a “First Amendment-protected event,” raises questions about the potentially compromised state of protesters’ civil liberties — a worry that also surfaced after it was revealed in 2012 that the DHS was monitoring Occupy Wall Street.
Note: For more along these lines, read about Cointelpro, the program used by corrupt intelligence agencies to spy on and attack the U.S. civil rights movement beginning in the 1960's. For more, see concise summaries of deeply revealing news articles about the erosion of civil liberties.
In 1986, the director of Britain's premier domestic spy agency told Margaret Thatcher's cabinet secretary the risk of "embarrassment" from publicizing a politician's suspected child abuse was greater than the "danger" he presented. CBS News partner network Sky News reported the new twist in Britain's long and still-unfolding child sexual abuse scandal on Thursday, saying then-MI5 director Sir Antony Duff had told Prime Minister Thatcher's staffer "the risks of political embarrassment to the government is rather greater than the security danger." The name of the Member of Parliament Duff had been asked to investigate, over allegations he had a "penchant for small boys," has not been revealed, but Sky reported Wednesday that four former senior politicians were named in previously unseen government documents on abuse. All four have been dead for years, but they were senior members of Thatcher's cabinet. Over the course of several years the sex abuse scandal has snowballed, revealing - at best - a pervasive lax attitude among British law enforcement, politicians and celebrity culture toward the abuse of children during the 1970s and 80s. The ongoing police investigation has already landed some big names from British culture ... in jail for abuses committed during the height of their popularity. Others have been posthumously revealed as serial abusers. Sky's investigation, however, is the first time any suggestion of a possible cover-up of abuse by senior government officials has emerged.
Note: The Thatcher government was reported to have covered up a VIP pedophile ring. Watch an excellent segment by Australia's "60-Minutes" team "Spies, Lords and Predators" on a pedophile ring in the UK which leads directly to the highest levels of government. A second suppressed documentary, "Conspiracy of Silence," goes even deeper into this topic in the US. For more along these lines, see concise summaries of deeply revealing sexual abuse scandal news articles from reliable major media sources.
Government papers about the former home secretary Leon Brittan are among a fresh batch of documents which have come to light months after the conclusion of an official review into whether allegations of child abuse were covered up by the Home Office in the 1980s. The documents also reveal that the then director general of MI5 corresponded with the Cabinet Secretary in 1986 about an unnamed MP who was alleged to have “a penchant for small boys”. The letter from Sir Anthony Duff to Sir Robert Armstrong added: “At the present stage ... the risks of political embarrassment to the government is rather greater than the security danger.” “The risk to children is not considered at all,” Peter Wanless, chief executive of the NSPCC, and barrister Richard Whittam, said in a supplement to their review. The papers ... will be passed to an ongoing independent inquiry into child abuse within state and non-state institutions. Previously unreleased files also concern figures including Margaret Thatcher’s parliamentary private secretary, the late Sir Peter Morrison, former diplomat Sir Peter Hayman and former minister Sir William van Straubenzee. The papers also contain material on allegations by a former British army intelligence agent, Colin Wallace, about the Kincora boys’ home in Northern Ireland, which has long been at the centre of abuse claims. The Wanless review, published in November after the investigation of 114 missing Home Office files, could not rule out the possibility of files being destroyed as part of a coverup.
Note: Watch powerful evidence in a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government. For more along these lines, see concise summaries of deeply revealing news articles on sex abuse scandals from reliable major media sources.
A treason investigation into two journalists who reported that the German state planned to increase online surveillance has been suspended by the country’s prosecutor general following protests by leading voices across politics and media. Harald Range, Germany’s prosecutor general, said on Friday he was halting the investigation “for the good of press and media freedom”. It was the first time in more than half a century that journalists in Germany had faced charges of treason. His announcement followed a deluge of criticism and accusations that Germany’s prosecutor had “misplaced priorities”, having failed to investigate with any conviction the NSA spying scandal revealed by whistleblower Edward Snowden, and targeting instead the two investigative journalists, Markus Beckedahl and Andre Meister. The two reporters made reference to what is believed to be a genuine intelligence report that had been classified as confidential, which proposed establishing a new intelligence department to monitor the internet, in particular social media networks. Beckedahl hit out at the prosecutor’s investigation against him on Friday on the state broadcaster Deutschlandfunk, calling it “absurd” and suggesting it was meant as a general warning to scare sources from speaking to journalists. Much of the German media called the decision an attack on the freedom of the press.
Note: The NSA recently got caught spying on German reporters, possibly as a favor to the German government. For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
Former New York Times reporter Judy Miller ... granted anonymity to government officials and then uncritically laundered their dubious claims. As the paper’s own editors put it in their 2004 mea culpa about the role they played in selling the [Iraq] war: “We have found a number of instances of coverage that ... seems questionable now, was insufficiently qualified or allowed to stand unchallenged.” But 12 years after Miller left, you can pick up that same paper on any given day and ... find reporters doing exactly the same thing. It is worth observing how damaging it continues to be, because, shockingly, all sorts of self-identified “journalists” — both within the paper and outside of it — continue to equate unverified assertions from government officials as Proven Truth, even when these officials are too cowardly to attach their names to these claims, as long as papers such as the NYT launder them. Among the assertions mindlessly repeated by the Paper of Record from its beloved anonymous officials is this one: that ISIS learned to use couriers as a result of the Snowden revelations. The claim itself ... is monumentally stupid. Terrorists have known for a very long time that the U.S. government and its allies are trying to intercept their communications, and have long used encryption and other means to prevent that. This is the same process that enabled the New York Times, more than any other media outlet, to sell the Iraq War to the American public, and they’re using exactly the same methods to this day.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
Retired Army Gen. Mike Flynn, a top intelligence official in the post-9/11 wars in Iraq and Afghanistan, says in a forthcoming interview ... that the drone war is creating more terrorists than it is killing. He also asserts that the U.S. invasion of Iraq helped create the Islamic State. Flynn, who in 2014 was forced out as head of the Defense Intelligence Agency, has in recent months become an outspoken critic of the Obama administration’s Middle East strategy. The former three star general ... describes the present approach of drone warfare as “a failed strategy.” What we have is this continued investment in conflict,” the retired general says. “The more weapons we give, the more bombs we drop, that just … fuels the conflict.” In 2010, [Flynn] published a controversial report on intelligence operations in Afghanistan, stating in part that the military could not answer “fundamental questions” about the country and its people despite nearly a decade of engagement there. Earlier this year, Flynn commended the Senate Intelligence Committee report on CIA torture saying that torture had eroded American values and that in time, the U.S. “will look back on it, and it won’t be a pretty picture.”
Note: Drone strikes almost always miss their intended targets. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing news articles about military corruption.
The torture scandal consuming the US’s premiere professional association of psychologists has cost three senior officials their jobs. As the American Psychological Association copes with the damage reaped by an independent investigation that found it complicit in US torture, the group announced on Tuesday that its chief executive officer, its deputy CEO and its communications chief are no longer with the APA. All three were implicated in the 542-page report issued this month by former federal prosecutor David Hoffman, who concluded that APA leaders “colluded” with the US department of defense and aided the CIA in loosening professional ethics and other guidelines to permit psychologist participation in torture.. Despite rumors ... the APA framed the departures of longtime executive officials Norman Anderson and Michael Honaker as “retirements”. Rhea Farberman, who served as APA’s communications director for 22 years, “resigned”, the APA said in a statement. Anderson, Honaker and Farberman join Stephen Behnke, the APA’s former ethics chief also implicated in torture, in the first wave of APA departures as the organization seeks to rebuild its credibility. A call to end all psychologist participation in US interrogation and detention operations is slated for APA consideration at a major conference next month.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
The Oscar-winning documentary film-maker Laura Poitras is suing the US government. Poitras, 51, said she had been held at borders more than 50 times between 2006 and 2012, often for hours at a time. At various times she alleges being told by officials that she was on a “no fly” list, having her electronic equipment confiscated ... and being threatened with handcuffs for taking notes. The latter incident took place when she was working on a film about the WikiLeaks founder Julian Assange. Poitras [is] launching the legal action "because the government uses the US border to bypass the rule of law,” said the film-maker. She was repeatedly stopped until 2012, when the journalist Glenn Greenwald wrote an article about her experiences. Poitras’s reporting on the NSA whistleblower Edward Snowden, along with work by Greenwald, Ewen MacAskill and Barton Gellman contributed to the Pulitzer prize for public service won jointly by the Washington Post and the Guardian in 2014. Her film on Snowden, Citizenfour, won the 2015 Oscar for best documentary. The director is being represented by lawyers from digital-rights advocacy group the Electronic Frontier Foundation. “The well-documented difficulties Ms Poitras experienced while traveling strongly suggest that she was improperly targeted by federal agencies as a result of her journalistic activities,” senior counsel David Sobel told the Intercept. “Those agencies are now attempting to conceal information that would shed light on tactics that appear to have been illegal.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and attempts to manipulate mass media.
Jean Maria Arrigo’s inbox is filling up with apologies. For a decade, colleagues of the 71-year-old psychologist ignored, derided and in some cases attacked Arrigo for sounding alarms that the American Psychological Association was implicated in US torture. But now ... a devastating report has exposed deep APA complicity with brutal CIA and US military interrogations – and a smear campaign against Arrigo herself. David Hoffman, a former federal prosecutor, confirmed what she has crusaded against for a decade: the APA’s institutional involvement with torture led to a concerted effort to quash dissent, lie to the public, and silence people like her. In 2005, Arrigo ... was a member of an internal panel, known as the Task Force on Psychological Ethics and National Security (Pens), that greenlit psychologist participation in national-security interrogations. The taskforce was intentionally weighted in favor of the US department of defense, through stacking it with representatives from the military and CIA. It rejected efforts ... to include references to the Geneva Convention and specific interrogation techniques that psychologists could not be involved in. Arrigo took her concerns public. In response, [Gerald] Koocher ... who served as APA president in 2006, [launched] “a highly personal attack.” Arrigo said she was untroubled by Koocher’s “idiotic” broadside. What was more troubling to her, she said, were the well-meaning members of APA who did not challenge the attacks.
Note: Read an article on how military psychologists are fighting against torture reforms. For more, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists.
The Central Intelligence Agency’s health professionals repeatedly criticized the agency’s post-Sept. 11 interrogation program, but their protests were rebuffed by prominent outside psychologists who lent credibility to the program, according to a new report. The 542-page report ... raises repeated questions about the collaboration between psychologists and officials at both the C.I.A. and the Pentagon, [and] concludes that some of the [American Psychological] Association’s top officials ... sought to curry favor with Pentagon officials by seeking to keep the association’s ethics policies in line with the Defense Department’s interrogation policies. The association’s ethics office “prioritized the protection of psychologists — even those who might have engaged in unethical behavior — above the protection of the public,” the report said. Two former presidents of the psychological association were on a C.I.A. advisory committee, the report found. One of them gave the agency an opinion that sleep deprivation did not constitute torture, and later held a small ownership stake in a consulting company founded by two men who oversaw the agency’s interrogation program. The association’s ethics director, Stephen Behnke, coordinated the group’s public policy statements on interrogations with a top military psychologist, the report said, and then received a Pentagon contract to help train interrogators while he was working at the association, without the knowledge of the association’s board.
Note: For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
Moxie Marlinspike has ... created an encryption program that scrambles messages until they reach the intended reader. The software is effective enough to alarm governments. British Prime Minister David Cameron called protected-messaging apps a “safe space” for terrorists. The following week, President Barack Obama called them “a problem.” In a research paper released Tuesday, 15 prominent technologists cited three programs relying on Mr. Marlinspike’s code as options for shielding communications. His encrypted texting and calling app, Signal, has come up in White House meetings. Former National Security Agency contractor Edward Snowden, who leaked troves of U.S. spying secrets, urged listeners to use “anything” that Mr. Marlinspike releases. That endorsement was “a little bit terrifying,” Mr. Marlinspike says. But he says he sees an opening, following Mr. Snowden’s revelations, to demystify, and simplify, encryption, so more people use it. Consumer encryption tools ... have been around since the early 1990s, but most are so cumbersome that few people use them, [limiting] the use of encryption to a level law enforcement has mostly learned to live with. Adding easy-to-use encryption that companies can’t unscramble to products used by millions changes that calculus. Technology companies, once cozy with Washington, sound increasingly like Mr. Marlinspike. Apple, Facebook, Google and others are resisting efforts to give the government access to encrypted communications.
Note: For more along these lines, see concise summaries of deeply revealing news articles about the corrupt intelligence agencies that are attempting to erode privacy rights in the U.S. and elsewhere.