Intelligence Agency News StoriesExcerpts of Key Intelligence Agency News Stories in Major Media
Note: This comprehensive list of intelligence agency news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Fifteen years after he helped devise the brutal interrogation techniques used on terrorism suspects in secret C.I.A. prisons, John Bruce Jessen, a former military psychologist, expressed ambivalence about the program. He described himself and a fellow military psychologist, James Mitchell, as reluctant participants in using the techniques, some of which are widely viewed as torture. The two psychologists ... are defendants in the only lawsuit that may hold participants accountable for causing harm. Revelations about the C.I.A. practices ... led to an eventual ban on the techniques and a prohibition by the American Psychological Association against members’ participation in national security interrogations. The two psychologists argue that the C.I.A., for which they were contractors, controlled the program. But it is difficult to successfully sue agency officials because of government immunity. Under the agency’s direction, the two men ... proposed [and applied] the “enhanced interrogation” techniques. Their business received $81 million. When [the psychologists] wanted to end the waterboarding sessions as no longer useful, C.I.A. supervisors ... ordered them to continue. Dr. Mitchell said that the C.I.A. officials told them: “‘You guys have lost your spine.’ I think the word that was actually used is that you guys are pussies. There was going to be another attack in America and the blood of dead civilians are going to be on your hands.”
Note: Prior to condemning torture, some of the American Psychological Association’s top officials sought to curry favor with Pentagon officials by supporting the CIA's brutal interrogation methods. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
Russia’s cyberattack on the U.S. electoral system before [the recent] election was far more widespread than has been publicly revealed, including incursions into voter databases and software systems in almost twice as many states as previously reported. In Illinois, investigators found evidence that cyber intruders tried to delete or alter voter data. The hackers accessed software designed to be used by poll workers on Election Day, and in at least one state accessed a campaign finance database. Details of the wave of attacks, in the summer and fall of 2016, were provided by three people with direct knowledge of the U.S. investigation into the matter. In all, the Russian hackers hit systems in a total of 39 states. The scope and sophistication so concerned Obama administration officials that they took an unprecedented step -- complaining directly to Moscow over a modern-day “red phone.” In October, two of the people said, the White House contacted the Kremlin on the back channel to offer detailed documents of what it said was Russia’s role in election meddling and to warn that the attacks risked setting off a broader conflict. The new details, buttressed by a classified National Security Agency document recently disclosed by the Intercept ... paint a worrisome picture for future elections: [This is] the newest portrayal of potentially deep vulnerabilities in the U.S.’s patchwork of voting technologies.
Note: Many who follow elections closely have known and spread the word for years about serious vulnerabilities in US electronic voting, yet only now that Russia is involved is it getting widespread coverage. Do you really think the Russians are the only ones who have hacked US elections? Read an enlightening analysis of elections hacking in the US which raises many serious questions. And don't miss the critically important information provided in our Elections Information Center.
After World War II, American counterintelligence recruited former Gestapo officers, SS veterans and Nazi collaborators to an even greater extent than had been previously disclosed and helped many of them avoid prosecution or looked the other way when they escaped, according to thousands of newly declassified documents. With the Soviet Union muscling in on Eastern Europe, “settling scores with Germans or German collaborators ... appeared counterproductive,” said a government report published Friday by the National Archives. In chilling detail, the report also elaborates on the close working relationship between Nazi leaders and the grand mufti of Jerusalem, Haj Amin al-Husseini, who ... recruited Muslims for the SS, the Nazi Party’s elite military command, [and] was allowed to flee after the war to Syria. The report, “Hitler’s Shadow: Nazi War Criminals, U.S. Intelligence and the Cold War,” grew out of an interagency group created by Congress to identify, declassify and release federal records on Nazi war crimes and on Allied efforts to hold war criminals accountable. It is drawn from a sampling of 1,100 C.I.A. files and 1.2 million Army counterintelligence files that were not declassified until ... 2007. “Hitler’s Shadow” adds a further dimension to a separate Justice Department history of American Nazi-hunting operations, which the government has refused to release ... and which concluded that American intelligence officials created a “safe haven” in the United States for certain other former Nazis.
Note: Following World War Two, more than 1500 Nazi's, including many war criminals, were brought to the US by "Operation Paperclip" and secretly embedded in the US scientific community and intelligence establishment. For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
Russian military intelligence attempted to cyber-attack a U.S. voting software supplier and more than 100 local election officials in the days leading up to the 2016 presidential election, The Intercept reported Monday. According to an NSA document ... Russian military intelligence cyber-attacked a U.S. voting software supplier, using information gained in that attack to “launch a voter registration-themed spear-phishing campaign targeting U.S. local government organizations. Russian General Staff Main Intelligence Directorate actors … executed cyber espionage operations against a named U.S. company in August 2016, evidently to obtain information on elections-related software and hardware solutions,” the document states. The operation gave the hackers “persistent access” to the targeted computers, allowing them to “survey the victims for items of interest.” But Pamela Smith, president of election integrity watchdog Verified Voting, said the hacking might have kept some Americans from voting. “If someone has access to a state voter database, they can take malicious action by modifying or removing information,” she told The Intercept. “This could affect whether someone has the ability to cast a regular ballot or be required to cast a ‘provisional’ ballot — which ... may mean the voter has to jump through certain hoops such as proving their information to the election official before their eligibility is affirmed.”
Note: Why have those who set up our elections allowed private companies to develop software which can be hacked? For undeniable evidence our voting systems have not been safe for years, read summaries of these major media news articles.
Senators, spies and a president spent years in a pitched battle over how the history is told of one of the most controversial chapters of America’s campaign against terrorism, the detention and interrogation of prisoners in secret C.I.A. jails. Congressional officials said on Friday that the [Trump] administration had begun returning to Congress copies of a 6,700-page Senate report from 2014 about the C.I.A. program. The move raises the possibility that most of the copies could be locked in Senate vaults indefinitely or even destroyed. The classified report [tells] the story of how ... the C.I.A. began capturing terrorism suspects and interrogating them ... beyond the reach of the American judicial and military legal systems. The central conclusion of the report is that the spy agency’s interrogation methods - including waterboarding, sleep deprivation and other kinds of torture - were far more brutal and less effective than the C.I.A. described to policy makers, Congress and the public. The Senate Intelligence Committee, which was run by Democrats when the executive summary was released, sent copies of the entire report to at least eight federal agencies, asking that they incorporate it into their records — a move that would have made the documents subject to requests under the Freedom of Information Act. The agencies all refused to add the report to their records, and instead kept their copies locked up, prompting the American Civil Liberties Union to sue the C.I.A. for access to the full report.
Note: See a revealing New York Times article listing seven key points from this torture report. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
The report released by the Senate Select Committee on Intelligence discloses new details about the C.I.A.’s torture practices. 1. The C.I.A.’s interrogation techniques were more brutal and employed more extensively than the agency portrayed. The report also describes detainees being subjected to sleep deprivation for up to a week, medically unnecessary “rectal feeding” and death threats. Conditions at one prison, described by a clandestine officer as a “dungeon,” were blamed for the death of a detainee, and the harsh techniques were described as leading to “psychological and behavioral issues, including hallucinations, paranoia, insomnia, and attempts at self-harm and self-mutilation.” 2. The C.I.A. interrogation program was mismanaged and was not subject to adequate oversight. 3. The C.I.A. misled members of Congress and the White House about the effectiveness and extent of its brutal interrogation techniques. 4. Interrogators in the field who tried to stop the brutal techniques were repeatedly overruled by senior C.I.A. officials. 5. The C.I.A. repeatedly underreported the number of people it detained. It also underreported the number of detainees who were subjected to torture. 6. At least 26 detainees were wrongfully held and did not meet the government’s standard for detention. 7. The C.I.A. leaked classified information to journalists, exaggerating the success of interrogation methods in an effort to gain public support.
Note: Efforts to bury this report have been ongoing. For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
British intelligence agency MI5 was reportedly warned by its US counterpart that Salman Abedi was planning an attack on UK soil, three months before he blew himself up outside an Ariana Grande concert in Manchester. FBI agents are said to have informed British officials that the 22-year-old was part of a North African Islamic State cell based in the north west of England that was plotting an attack in the UK. “In early 2017 the FBI told MI5 that Abedi belonged to a North African terror gang based in Manchester, which was looking for a political target in this country," a security source [said]. “The information came from the interception of his communications by US federal agents, who had been investigating Abedi since the middle of 2016, and from information unearthed in Libya, where his family was linked to terrorist groups. “Following this US tip-off, Abedi and other members of the gang were scrutinised by MI5. It was thought at the time that Abedi was planning to assassinate a political figure. But nothing came of this investigation and, tragically, he slipped down the pecking order of targets.” MI5 has faced questions over the fact that Abedi was on its radar but slipped through the net in order to carry out the attack that killed 22 people and seriously injured 64. Police have so far arrested 14 people on suspicion of terror offences in conjunction with the Manchester attack, two of whom have since been released.
Note: Read this revealing article for more evidence that the Manchester atrocity was possibly allowed to happen, or worse. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
On the sixth anniversary of the first infamous "Cablegate" by WikiLeaks ... it has expanded its Public Library of US Diplomacy (PLUSD) with 531,525 new diplomatic cables from 1979. In a statement to coincide with the release of the cables, known as "Carter Cables III", Mr Assange explained how events which unfolded in 1979 had begun a series of events that led to the rise of ISIS: "The Iranian revolution, the Saudi Islamic uprising and the Egypt-Israel Camp David Accords led not only to the present regional power dynamic but decisively changed the relationship between oil, militant Islam and the world. "The uprising at Mecca permanently shifted Saudi Arabia towards Wahhabism, leading to the transnational spread of Islamic fundamentalism and the US-Saudi destabilisation of Afghanistan." He said at this point Osama bin Laden left his native Saudi Arabia for Pakistan to support the Afghan Mujahideen. He added: "The invasion of Afghanistan by the USSR would see Saudi Arabia and the CIA push billions of dollars to Mujahideen fighters as part of Operation Cyclone, fomenting the rise of al-Qaeda and the eventual collapse of the Soviet Union." The rise of al-Qaeda eventually bore the September 11, 2001 attacks in the United States, enabling the US invasion of Afghanistan and Iraq and over a decade of war, leaving, at its end, the ideological, financial and geographic basis for ISIS."
Note: Read a well-researched essay from the profound online book Lifting the Veil suggesting the War on Terror is a fraud. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
A federal appeals court on Tuesday revived a high-profile challenge to the National Security Agency’s warrantless surveillance of internet communications. The ruling ... increases the chances that the Supreme Court may someday scrutinize whether the N.S.A.’s so-called upstream system for internet surveillance complies with Fourth Amendment privacy rights. The ruling reversed a Federal District Court judge’s decision to throw out the case. The district judge had ruled that the plaintiffs - including the Wikimedia Foundation - lacked standing to sue because they could not prove that their messages had been intercepted. Because of how the internet works, surveillance of communications crossing network switches is different from traditional circuit-based phone wiretapping. While the government can target a specific phone call without touching anyone else’s communications, it cannot simply intercept a surveillance target’s email. Instead ... to find such emails it is necessary first to systematically copy data packets crossing a network switch and sift them in search of components from any messages involving a target. Documents provided by [Edward] Snowden and declassified by the government have shown that this system works through equipment installed at the facilities of companies, like AT&T, that [connect] the American internet to the rest of the world. Privacy advocates contend that the initial copying and searching of all those data packets ... violates Fourth Amendment protections against government search and seizure.
A decade-old internet scourge called ransomware went mainstream on Friday when cybercriminals seized control of computers around the world, from the delivery giant FedEx in the United States to Britain’s public health system, universities in China and even Russia’s powerful Interior Ministry. Ransomware is nothing new. For years, there have been stories of individuals or companies horrified that they have been locked out of their computers and that the only way back in is to pay a ransom to someone, somewhere who has managed to take control. But computer criminals are discovering that ransomware is the most effective way to make money in the shortest amount of time. Friday’s attacks were a powerful escalation of earlier, much smaller episodes. Hackers exploited a vulnerability in Microsoft servers that was first discovered by the National Security Agency and then leaked online. It allowed the ransomware to spread [to] more than 70,000 organizations. There is even now a concept of “ransomware as a service” - a play on the Silicon Valley jargon “software as a service,” which describes the delivery of software over the internet. Now anyone can visit a web page, generate a ransomware file with the click of a mouse, encrypt someone’s systems and demand a ransom to restore access to the files. If the victim pays, the ransomware provider takes a cut of the payment. Ransomware criminals also have customer service lines that victims can call to get help paying a ransom.
Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
A handful of military personnel from the 4th Psychological Operations Group, based at Fort Bragg, NC, have until recently been working in CNN's headquarters in Atlanta. [A] Dutch journalist named Abe de Vries came up with this important story ... and remains properly astounded that no mainstream news medium in the US has evinced any interest in it. De Vries ... originally [came] upon the story [following] a military symposium in Arlington, VA that discussed the use of the press in military operations. De Vries saw a good story, picked up the phone, and finally reached Maj. Thomas Collins of the US Army Information Service, who duly confirmed the presence of these Army psy-ops experts at CNN. "Psy-ops personnel, soldiers, and officers," De Vries quoted Collins as telling him, "have been working in CNN's headquarters ... through our program, training with industry. They helped in the production of news." Eason Jordan, who identified himself as CNN's president of news-gathering and international networks, [confirmed] that CNN had hosted a total of five interns from US Army psy-ops. Jordan said the program began ... just before the end of the war against Serbia and only recently terminated. Executives at CNN now describe the Army psy-ops intern tours at CNN as having been insignificant. The commanding officer of the psy-ops group certainly thought them of sufficient significance to mention at that high-level Pentagon powwow in Arlington about propaganda and psychological warfare.
Note: This article strangely has been removed from the Los Angeles Times archives. The link above shows a scanned image of the actual newspaper. The article was first published in the San Jose Mercury News on March 23, 2000, though the article is also strangely not available in their archives. U.S. Congressional testimony in the 1970s revealed that the CIA paid employees of major media networks to influence public opinion. The CIA's Operation Mockingbird revealed blatant efforts by the CIA to manipulate public opinion in the U.S., thus violating its charter.
[The CIA] has since 1945 succeeded in deposing or killing a string of leaders, but was forced to cut back after a Senate investigation in the 1970s. Some of the most notorious of the CIA’s operations to kill world leaders were those targeting the late Cuban president, Fidel Castro. Attempts ranged from snipers to imaginative plots worthy of spy movie fantasies. But although the CIA attempts proved fruitless in the case of Castro, the US intelligence agency has ... succeeded in deposing or killing a string of leaders elsewhere around the world – either directly or, more often, using sympathetic local military, locally hired criminals or pliant dissidents. On Friday, [North Korea accused] the CIA and South Korea’s intelligence service of being behind an alleged recent assassination attempt on its leader Kim Jong-un. Such a claim cannot be dismissed as totally outlandish – given the long list of US involvement in coups and assassinations worldwide. The agency was forced to cut back on such killings after ... then president Gerald Ford signed in 1976 an executive order stating: “No employee of the United States government shall engage in, or conspire in, political assassination.” In spite of this, the US never totally abandoned the strategy, simply changing the terminology from assassination to targeted killings. A leaked document obtained by WikiLeaks and released earlier this year showed the CIA in October 2014 looking at hacking into car control systems, [potentially allowing] an agent to stage a car crash.
Note: Strong evidence suggests that courageous journalist Michael Hastings was killed when his car controls were hacked causing him to crash head on into a tree. For more along these lines, see concise summaries of deeply revealing news articles on verified or suspected assassinations from reliable major media sources.
In early February 1987, an anonymous tipster in Tallahassee, Fla., made a phone call to police. Two "well-dressed men" seemed to be "supervising" six disheveled and hungry children in a local park, the caller said. The cops went after the case like bloodhounds - at least at first. The two men were identified as members of the Finders. They were charged with child abuse in Florida. In Washington, D.C., police and U.S. Customs Service agents raided a duplex apartment building and a warehouse connected to the group. Among the evidence seized: detailed instructions on obtaining children for unknown purposes and several photographs of nude children. The more the police learned about the Finders, the more bizarre they seemed: There were suggestions of child abuse, Satanism, dealing in pornography and ritualistic animal slaughter. None of the allegations was ever proved, however. Today ... the Justice Department has begun a new investigation into the Finders. One of the unresolved questions involves allegations that the Finders are somehow linked to the Central Intelligence Agency. In 1987, when Customs agents sought to examine the evidence gathered by Washington, D.C., police, they were told that the Finders investigation "had become a CIA internal matter." The police report on the case had been classified secret. Even now, Tallahassee police complain about the handling of the Finders investigation by D.C. police. "They dropped this case," one Tallahassee investigator says, "like a hot rock."
Note: For lots more on the disturbing group called "The Finders," see the excellent research available at this link. As US News & World Report does not have archives for older articles like this, the link above takes you to a scanned copy of the the article taken directly from a copy of the magazine we obtained.
In 1953, the then-Director of Central Intelligence officially approved project MKUltra. Originally intended to make sure the United States government kept up with presumed Soviet advances in mind-control technology ... MKUltra has gone down in history as a significant example of government abuse of human rights. The intent of the project was to study “the use of biological and chemical materials in altering human behavior,” according to ... official testimony. Under MKUltra, the CIA gave itself the authority to [experiment on] unwitting test subjects, like drug-addicted prisoners, marginalized sex workers and terminal cancer patients. “The covert testing programs resulted in massive abridgements of the rights of American citizens, sometimes with tragic consequences,” concluded a Senate hearing in 1975-76. MKUltra wasn’t one project, as the US Supreme Court wrote in a 1985 decision. It was 162 different secret projects that were indirectly financed by the CIA, but were “contracted out to various universities ... and similar institutions.” In all, at least 80 institutions and 185 researchers participated, but many didn’t know they were dealing with the CIA. Many of MKUltra’s records were destroyed. But 8,000 pages of records - mostly financial documents that were mistakenly not destroyed in 1973 - were found in 1977. Nobody ever answered for MKUltra. Two lawsuits related to the program reached the Supreme Court, [writes Melissa Blevins for Today I Found Out], “but both protected the government over citizen’s rights.”
Note: Unfortunately, MK-ULTRA is far from the only program to have used humans as guinea pigs in attempts to create more powerful mind control technologies. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
Former CBS News correspondent Sharyl Attkisson has sued the Justice Department over the hacking of her computers, officially accusing the Obama administration of illegal surveillance while she was reporting on administration scandals. In a series of legal filings that seek $35 million in damages, Attkisson alleges that three separate computer forensic exams showed that hackers used sophisticated methods to surreptitiously monitor her work between 2011 and 2013. The intruders installed and periodically refreshed software to steal data and obtain passwords on her home and work computers. She also charges that the hackers monitored her audio using a Skype account. The award-winning reporter says she and her attorneys have "pretty good evidence" that these efforts were "connected" to the Justice Department. She said she was caught in a "Catch-22," forcing her to use the lawsuit and an administrative complaint to discover more about the surveillance through the discovery process and to learn the identities of the "John Does" named in the complaints. Attkisson learned through a Freedom of Information request that the FBI opened an investigation of the hacking case in May 2013, but says the bureau never interviewed her or even notified her of the probe. Attkisson resigned from CBS last March after complaining that she was increasingly unable to get her investigative stories on the air. She has published a best-selling book, "Stonewalled," about her battles against the network and the administration.
Note: Fox News was the only major media to cover this important case. Read a judge's supportive comments about this important case on Ms. Attkisson's website. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
Muhammad Yunus, the Bangladeshi economist, microfinancing pioneer and founder of the grassroots Grameen Bank, has not been resting on his laurels since wining the Nobel peace prize in 2006. The idea behind his multi award-winning idea of microcredit is that everyone is a natural entrepreneur. “Human beings are not born to work for anybody else,” he says. “For millions of years that we were on the planet, we never worked for anybody. We are go-getters. So this is our tradition. There are roughly 160 million people all over the world in microcredit, mostly women. And they have proven one very important thing: that we are all entrepreneurs. Illiterate rural women in the villages ... take tiny little loans - $30, $40 - and they turn themselves into successful entrepreneurs.” In the mid 70s, as a young economics professor, Yunus experimented with lending a mere $27 to 42 women in the village ... near his university. Banks would not lend to the poor ... and moneylenders charged extortionate rates. His experiment was a success, and he began to develop ... the Grameen Bank. The Grameen Bank today has nine million borrowers, 97% of them women. “They own the bank. It is a bank owned by poor women,” he says. “The repayment rate is 99.6%, and it has never fallen below that in our eight years of experience.” Part of his expansion into rich countries includes a program in the US: 19 branches in 11 cities, including eight in New York.
Note: Learn more about the inspiring microcredit movement helping to reduce inequality while securing financial returns for investors.
Approximately half of adult Americans’ photographs are stored in facial recognition databases that can be accessed by the FBI, without their knowledge or consent, in the hunt for suspected criminals. About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports. The algorithms used to identify matches are inaccurate about 15% of the time, and are more likely to misidentify black people than white people. These are just some of the damning facts presented at last week’s House oversight committee hearing, where politicians and privacy campaigners criticized the FBI and called for stricter regulation of facial recognition technology at a time when it is creeping into law enforcement and business. The FBI first launched its advanced biometric database ... in 2010, augmenting the old fingerprint database with further capabilities including facial recognition. The bureau did not inform the public ... nor did it publish a privacy impact assessment, required by law, for five years. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos. Last year, the US government accountability office (GAO) analyzed the FBI’s use of facial recognition technology and found it to be lacking in accountability, accuracy and oversight. “It doesn’t know how often the system incorrectly identifies the wrong subject,” explained the GAO’s Diana Maurer. “Innocent people could bear the burden of being falsely accused.”
Gary Webb knew his story would cause a stir. The newspaper report he'd written suggested that a US-backed rebel army in Latin America was supplying the drugs responsible for blighting some of Los Angeles's poorest neighbourhoods – and, crucially, that the CIA must have known about it. [Webb's report, titled] "Dark Alliance" has been called one of the most explosive and controversial exposés in American journalism. Nineteen years on, the story of Webb’s investigation and its aftermath has been given the full Hollywood treatment. Kill the Messenger, based on his account of what happened and a book of the same name about the saga by journalist Nick Schou was recently released in cinemas. What Webb did that nobody else had was to follow the supply chain – right to the poverty stricken streets of Los Angeles. Webb summed up the heart of his ... series thus: “It is one of the most bizarre alliances in modern history. The union of a U.S. backed army attempting to overthrow a revolutionary socialist government and the uzi-toting “gangstas” of Compton and South-Central Los Angeles.” Perhaps most damningly, Webb wrote that crack was virtually unobtainable in the city’s black neighbourhoods before “members of the CIA’s army” began supplying it. [In 1999], Webb said that after spending three years of his life looking into it, he was more convinced than ever that the U.S. Government's responsibility for the drug problems in South Central L.A. was “greater than I ever wrote in the newspaper.”
Note: Read an excellent, concise summary written by Gary Webb himself of what happened on this highly revealing Dark Alliance series. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
In 1996, the award-winning journalist Gary Webb uncovered CIA links to Los Angeles drug dealers. The link between drug-running and the Reagan regime's support for the right-wing terrorist group throughout the 1980s had been public knowledge for over a decade. What was new about Webb's reports, published under the title "Dark Alliance" in the Californian paper the San Jose Mercury News, was that for the first time it brought the story back home. His series of articles ... incited fury among the African-American community, many of whom took his investigation as proof that the White House saw crack as a way of bringing genocide to the ghetto. Webb's reports prompted three official investigations, including one by the CIA itself which ... confirmed the substance of his findings. Webb undeniably made mistakes. But his central thesis - that the CIA, having participated in narcotics trafficking in central America, had, at best, turned a blind eye to the activities of drug dealers in LA - has never been in question. [A 1998] CIA Inspector General's report, commissioned in response to the allegations in "Dark Alliance" ... found that CIA officials ignored information about possible Contra drug dealing; that they continued to work with Contra supporters despite allegations that they were trafficking drugs, and further asserted that officials from the CIA instructed Drug Enforcement Agency officers to refrain from investigating alleged dealers connected with the Contras.
Note: For those interested in the Gary Webb story, this article is possibly the best single summary out there. Read an excellent, concise summary written by Gary Webb himself of what happened on this highly revealing Dark Alliance series. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Carnegie Mellon University researcher Dov Levin [has compiled a] historical database that tracks U.S. involvement in meddling with foreign elections over the years. The U.S. has ... tried to influence the outcome of another country's election ... more than 80 times worldwide between 1946 and 2000. One example of that was our intervention in Serbia, Yugoslavia in the 2000 election there. Slobodan Milosevic was running for re-election, and we didn't want him to stay in power there. So we intervened in various ways for the opposition candidate, Vojislav Kostunica. And we gave funding to the opposition, and we gave them training and campaigning aide. That assistance was crucial in enabling the opposition to win. About one-third of [election interventions] are public, and two-third of them are covert. In other words, they're not known to the voters in the target before the election. Covert coup d'etats like the United States did in Iran in 1953 or in Guatemala in 1954 [were not counted, only times] when the United States [tried] directly to influence an election for one of the sides. The United States is the most common user of this technique. Russia or the Soviet Union since 1945 has used it half as much. My estimate has been 36 cases between 1946 to 2000. We know also that the Chinese have used this technique and the Venezuelans when the late Hugo Chavez was still in power in Venezuela and other countries.
Note: For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.