Intelligence Agency Corruption News Stories
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
American Amara Majeed was accused of terrorism by the Sri Lankan police in 2019. Robert Williams was arrested outside his house in Detroit and detained in jail for 18 hours for allegedly stealing watches in 2020. Randal Reid spent six days in jail in 2022 for supposedly using stolen credit cards in a state he’d never even visited. In all three cases, the authorities had the wrong people. In all three, it was face recognition technology that told them they were right. Law enforcement officers in many U.S. states are not required to reveal that they used face recognition technology to identify suspects. Surveillance is predicated on the idea that people need to be tracked and their movements limited and controlled in a trade-off between privacy and security. The assumption that less privacy leads to more security is built in. That may be the case for some, but not for the people disproportionately targeted by face recognition technology. As of 2019, face recognition technology misidentified Black and Asian people at up to 100 times the rate of white people. In 2018 ... 28 members of the U.S. Congress ... were falsely matched with mug shots on file using Amazon’s Rekognition tool. Much early research into face recognition software was funded by the CIA for the purposes of border surveillance. More recently, private companies have adopted data harvesting techniques, including face recognition, as part of a long practice of leveraging personal data for profit.
Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy from reliable major media sources.
Facial recognition has become a security feature of choice for phones, laptops, passports, and payment apps. Yet it is also, increasingly, a tool of state oppression and corporate surveillance. Immigration and Customs Enforcement and the FBI have deployed the technology as a digital dragnet, searching for suspects among millions of faces in state driver’s license databases, sometimes without first seeking a court order. In early 1963, [Woody Bledsoe] proposed to conduct “a study to determine the feasibility of a simplified facial recognition machine.” A recently declassified history of the CIA’s Office of Research and Development mentions just such a project in 1965; that same year, Woody sent a letter on facial recognition to John W. Kuipers, the division’s chief of analysis. In 1967 ... Woody took on one last assignment that involved recognizing patterns in the human face. The purpose of the experiment was to help law enforcement agencies quickly sift through databases of mug shots and portraits, looking for matches. As before, funding for the project appears to have come from the US government. A 1967 document declassified by the CIA in 2005 mentions an “external contract” for a facial-recognition system that would reduce search time by a hundredfold. Woody’s work set an ethical tone for research on facial recognition that has been enduring and problematic. The potential abuses of facial-recognition technology were apparent almost from its birth.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
In March 2020, Dr. Robert Kadlec addressed a House committee to confirm his role and responsibilities as the federal government’s top preparedness official coordinating the government’s COVID-19 response. As assistant secretary for preparedness and response at the Department of Health and Human Services, Kadlec offered a lengthy statement to lawmakers on the “four principal functions” of his role. None of those functions involved downplaying without scientific evidence a theory that the virus emerged from a laboratory in the Wuhan Institute of Virology. But that’s what Kadlec now says he did by assisting Dr. Anthony Fauci ... in his effort to suppress the lab leak theory. Kadlec says it’s a decision that keeps him up at night. “I wake up at usually about 2 or 3 a.m. and think about it honestly, because it’s something that we all played a role in,” Kadlec [said]. For much of 2020 and 2021, anyone who brought up the possibility that COVID-19 emerged from Wuhan risked being labeled a conspiracy theorist by legacy media and “fact-checkers.” In September, the chairman of the House Select Subcommittee on the Coronavirus Pandemic revealed that Fauci was secretly admitted to CIA headquarters while the agency conducted its analysis of the virus’s origins, allegedly to “‘influence’ the Agency’s review.” A ... CIA whistleblower claims the agency attempted to bribe six analysts tasked with assessing the origin of the virus.
Note: For more along these lines, see concise summaries of deeply revealing news articles on COVID and government corruption from reliable major media sources.
While nobody has offered hard evidence that intelligence agencies, and in particular the CIA or Mossad, were directly involved in Epstein and [Ghislaine] Maxwell's blackmailing of public figures, many of the journalists who investigated the Epstein case have concluded that they were running what is known in the intelligence community as a “honeypot” or “honeytrap” aimed at using sex to blackmail people. The current director of the Central Intelligence Agency, William Burns, had scheduled three meetings with Epstein in 2014. Epstein's private calendar showed that he had dozens of meetings with Kathryn Ruemmler, a former White House counsel under President Barack Obama. Meetings with many other wealthy, well-connected individuals occurred years after Epstein became a convicted sex offender. Reporter Vicky Ward ... wrote a story about the Justice Department's 2007 “non-prosecution agreement” with Epstein. Alexander Acosta was the U.S. Attorney for South Florida who arranged the lenient sentence. “I was told Epstein 'belonged to intelligence' and to leave it alone," Acosta said. In addition to his possible ties to American intelligence, Epstein may have also been connected to the Israeli Mossad. A former Israeli spy, Ari Ben-Menashe, said he was Robert Maxwell's “handler” and claimed to have introduced Epstein to Mossad. “They were agents of the Israeli Intelligence Services,” said Ben-Menashe. The CIA has a long record of using sexual blackmail. In 1975, the Washington Post reported that for years, the CIA had “operated love traps in New York City and San Francisco, where foreign diplomats were lured by prostitutes in the pay of the CIA ...Through hidden one-way mirrors, CIA agents filmed the sexual adventures and later tried to blackmail the victims into becoming informants."
Note: Read more about former Israeli spy Ari Ben-Menashe's claims that Epstein was running a sexual blackmail operation on behalf of Israeli military intelligence. For more along these lines, see concise summaries of deeply revealing news articles on Jeffrey Epstein and intelligence agency corruption from reliable major media sources.
Even after spending a year and a half in prison in Tehran, I knew that if I wanted to go on writing about Iran, I would be a target for plenty of public attacks. But I never imagined the U.S. State Department would be funding my attackers. Last week, several astute Iran watchers drew attention to a series of inflammatory tweets associated with the Iran Disinformation Project, a State Department-funded initiative that its website claims “brings to light disinformation emanating from the Islamic Republic of Iran via official rhetoric, state propaganda outlets, social media manipulation and more.” The targets of the tweets included think-tank analysts, human rights activists and journalists. The common thread is that we are all perceived by regime change proponents and supporters of the Trump administration’s so-called maximum pressure policy to be soft on Iran because we are critical of crushing economic sanctions and the threat of the use of military force. For these thought crimes, we are branded by @IranDisinfo and similar social media accounts as Tehran’s “mouthpieces,” “apologists,” “collaborators,” and “lobbyists” in the West. We’re faced with the irony that an initiative aimed at combating Tehran’s disinformation campaigns is resorting to disinformation campaigns of its own, using taxpayer funds to spread lies about U.S. citizens. We need programs that fight the spread of falsehoods and propaganda, but such efforts shouldn’t combat lies with other lies.
Note: For lots more on this eye-opening event, see this excellent article by Matt Taibbi. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
An offshoot of the conservative Heritage Foundation is suing the Central Intelligence Agency, accusing it of withholding records detailing payoffs to analysts to bury findings that a lab leak was the most likely explanation for the COVID-19 pandemic. The think tank’s Oversight Project filed a federal lawsuit against the CIA Dec. 22, alleging the agency did not comply with its Freedom of Information Act (FOIA) request about analysts who allegedly “received monetary incentives to change their position on the origins of the virus,” according to a copy of the complaint. A senior-level CIA agent told House Republican committee chairmen in September that the agency offered payments to six analysts tasked with determining the origins of SARS-CoV-2 if they said that the virus jumped from animals to humans. The Sept. 12 letter from Select Subcommittee on the Coronavirus Pandemic Chairman Brad Wenstrup (R-Ohio) and Permanent Select Committee on Intelligence Chairman Mike Turner (R-Ohio) to CIA Director William Burns also demanded documentation ... about the payments. “According to the whistleblower, at the end of its review, six of the seven members of the Team believed the intelligence and science were sufficient to make a low confidence assessment that COVID-19 originated from a laboratory in Wuhan, China,” the House panel chairmen wrote. In February, the FBI became the first US intelligence agency to conclude the coronavirus pandemic most likely began with a lab leak.
Note: Former chief White House medical adviser Anthony Fauci will testify before Congress on COVID origins in early 2024. For more along these lines, see concise summaries of deeply revealing news articles on COVID and intelligence agency corruption from reliable major media sources. Then explore the excellent, reliable resources provided in our COVID Information Center.
Under ... Section 702 [of the Foreign Intelligence Surveillance Act], the US government collects hundreds of millions of phone calls, emails, and text messages each year. An inestimable chunk belongs to American citizens, permanent residents, and others in the United States neither suspected nor accused of any crime. Police and intelligence agencies buy their way around the Fourth Amendment by paying US companies for information that they’d otherwise demand a warrant to disclose. The House Intelligence Committee’s bill—the FISA Reform and Reauthorization Act, or FRRA—does nothing to address this privacy threat. What the FRRA does appear to do, despite its name, is explode the number of companies the US government may compel to cooperate with wiretaps under Section 702. That was the assessment on Friday of Marc Zwillinger, amicus curiae to the Foreign Intelligence Surveillance Court of Review (FISCR). Section 702 currently allows the government to compel a class of companies called “electronic communications providers” to collect communications. If the FRRA becomes law, according to Zwillinger, that category would be greatly expanded to include a slew of new businesses, including “data centers, colocation providers, business landlords, and shared workspaces,” as well as, he says, “hotels where guests connect to the internet.” Communications may be seized under 702 and only years later dug up for an entirely different reason.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
In 2021, bullets flew outside a 7-Eleven during a Bureau of Alcohol, Tobacco, Firearms and Explosives operation in Colorado Springs, Colorado. The same year, U.S. Marshals fired shots inside a barbecue restaurant in the Chicago area, and a firefight erupted during a Drug Enforcement Administration search aboard an Amtrak passenger train in Tucson, Arizona. Three suspects and a federal officer were killed. Miraculously, no bystanders were struck. Had they been local police shootings, they might have generated public demands to release body camera video and use-of-force investigation reports. But they were federal operations, conducted by agents and task forces with four federal law enforcement agencies — the FBI, the ATF, the DEA and the U.S. Marshals Service — in which the use of force remains largely a black box, free from public scrutiny. Those four agencies overseen by the Justice Department, among the most prestigious in the country, have been slow to adopt reforms long embraced by big-city police departments, such as the use of body cameras and the release of comprehensive use-of-force data. From 2018 to 2022, 223 people were shot by an on-duty federal officer, a member of a federal task force or a local officer participating in an operation with federal agents, according to an NBC News analysis. A total of 151 were killed. More than 100 of the shootings were investigated by local prosecutors, with only two resulting in criminal charges for officers.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in intelligence agencies and in police departments from reliable major media sources.
It’s actually a very large universe of people with access to Top Secret data. The Director of National Intelligence publishes what is described as an annual report, “Security Clearance Determinations,” although the most recent one I could find was from 2017. In it, more than 2.8 million people are described as having security clearance as of October 2017 – more than 1.6 million have access to either Confidential or Secret information and nearly 1.2 million are described as having access to Top Secret information. There are additional people who have security clearance but don’t currently have access to information. This includes civilian employees, contractors and members of the military. Each agency that deals in classification has its own system. Top Secret ... is the highest level of classification. Information is classified as Top Secret if it “reasonably could be expected to cause exceptionally grave damage to the national security,” according to a 2009 executive order. A subset of Top Secret documents known as SCI, or sensitive compartmented information, is reserved for certain information derived from intelligence sources. Access to an SCI document can be even further restricted to a smaller group of people with specific security clearances. Information is classified as Secret if the information is deemed to be able to cause “serious damage” to national security if revealed. Confidential is the least sensitive level of classification.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
A whistleblower has come forward with an explosive new trove of documents. They describe the activities of an “anti-disinformation” group called the Cyber Threat Intelligence League, or CTIL, that officially began as the volunteer project of data scientists and defense and intelligence veterans but whose tactics over time appear to have been absorbed into ... those of the Department of Homeland Security (DHS). In 2019, US and UK military and intelligence contractors ... developed the sweeping censorship framework. CTIL ... partnered with [Cybersecurity and Infrastructure Security Agency] (CISA) in the spring of 2020. CTIL’s approach to “disinformation” went far beyond censorship. The group engaged in offensive operations to influence public opinion, discussing ways to promote “counter-messaging,” co-opt hashtags, dilute disfavored messaging, create sock puppet accounts, and infiltrate private invite-only groups. The ambitions of the 2020 pioneers of the Censorship Industrial Complex went far beyond simply urging Twitter to slap a warning label on Tweets, or to put individuals on blacklists. The [Adversarial Misinformation and Influence Tactics and Techniques] framework calls for discrediting individuals as a necessary prerequisite of demanding censorship against them. It calls for training influencers to spread messages. And it calls for trying to get banks to cut off financial services to individuals who organize rallies or events. [CTIL] laments that governments and corporate media no longer have full control of information. “For a long time, the ability to reach mass audiences belonged to the nation-state (e.g. in the USA via broadcast licensing through ABC, CBS and NBC). Now, however, control of informational instruments has been allowed to devolve to large technology companies who have been blissfully complacent and complicit in facilitating access to the public for information operators at a fraction of what it would have cost them by other means.”
Note: The extensive collusion between Big Tech and government officials to censor COVID information is barely beginning to come to light. For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
A second whistleblower has come forward with Slack messages showing far greater government and military involvement in the Cyber Threat Intelligence League (CTIL) than we had previously discovered. The CTIL Slack “disinformation” channel and the “law enforcement escalation” channel included current and former FBI employees, as well as personnel from the Michigan Cyber Command Center, the US Defense Digital Service (DDS), and at least one European government. Some of the military’s involvement in censoring information and shaping opinion has been out in the open. In 2017, the DOD added “information” as the seventh joint function of the military. With the addition of “information” as a function of defense, DOD effectively declared that citizens’ perceptions, attitudes, decisions, and behaviors were subject to military scrutiny and manipulation. The Censorship Industrial Complex ... aims to undermine and denigrate populist actors and movements through allegations that anti-government sentiment is linked to hate, conspiracy theories, or Russia. Supposed attempts to stop “disinformation” are really attempts to prevent opposition and challenges to the international political and military order. The new files suggest that the US and UK military and intelligence officials and contractors created the Censorship Industrial Complex’s to defeat populist sentiment, not just individuals.
Note: The extensive collusion between Big Tech and government officials to censor COVID information is barely beginning to come to light. For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
A secretive CIA office has been coordinating the retrieval of crashed UFOs around the world for decades, multiple sources told DailyMail.com. One source said that at least nine apparent 'non-human craft' have been recovered by the US government – some wrecked from a crash, and two completely intact. Three sources briefed on those alleged top secret operations [said] that the Office of Global Access (OGA), a wing of the Central Intelligence Agency's Science and Technology Directorate, has played a central role since 2003 in orchestrating the collection of what could be alien spacecraft. 'There's at least nine vehicles. There were different circumstances for different ones,' one source briefed by UFO program insiders [said]. 'It has to do with the physical condition they're in. If it crashes, there's a lot of damage done. Others, two of them, are completely intact.' The source said the CIA has a 'system in place that can discern UFOs while they're still cloaked,' and that if the 'non-human' craft land, crash or are brought down to earth, special military units are sent to try to salvage the wreckage. Sources said the CIA office then often hands the wreckage or material over to private aerospace contractors for analysis, where it is not subject to rigorous government audits and can be shielded with protections for trade secrets. Multiple sources said that many of the people involved in these programs may not even realize they are dealing with non-human craft.
Note: Read the riveting testimonies of 60 government and military witnesses of UFO phenomenon, which include astronauts, generals, admirals, and other top government and military officials. For more along these lines, see concise summaries of revealing news articles on UFOs from reliable major media sources. Then explore the excellent resources provided in our UFO Information Center.
Israel's military was aware of Hamas ' plan to launch an attack on Israeli soil over a year before the devastating Oct. 7 operation that killed hundreds of people, The New York Times reported Friday. It was the latest in a series of signs that top Israeli commanders either ignored or played down warnings that Hamas was plotting the attack, which triggered a war against the Islamic militant group that has devastated the Gaza Strip. The Times said Israeli officials were in possession of a 40-page battle plan, code-named “Jericho Wall,” that detailed a hypothetical Hamas attack on southern Israeli communities. The document was seen by many Israeli military and intelligence officials, the report said, though it was unclear if Prime Minister Benjamin Netanyahu or other top leaders had seen it. The document predicted that Hamas would bombard Israel with rockets, use drones to disable Israel's security and surveillance abilities at the border wall, and take over southern communities and military bases. Another 2016 Israeli defense memo obtained by the Times said Hamas intended to take hostages back to Gaza. The Oct. 7 attack — in which 1,200 people were killed and 240 people were abducted and taken to Gaza — would uncannily mirror the one outlined in the battle plan. But Israeli officials had brushed off the plan, the report said, dismissing it as “aspirational” rather than something that could practically take place, the report said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on war and intelligence agency corruption from reliable major media sources.
In the 1970s, congressional investigators revealed that the FBI, NSA, and CIA had spent decades illegally surveilling and harassing the civil rights and anti-war movements. These abuses shocked the American public and led Congress to implement a series of intelligence reforms, including the Foreign Intelligence Surveillance Act (FISA), which set strict limitations on when and how intelligence agencies could perform domestic spying. In the decades since the 9/11 attacks, changing laws and aggressive executive branch lawyering have significantly relaxed the rules that govern surveillance of Americans. We are once again seeing abuses of these powers, including instances of intelligence agents seeking access to the communications of politicians, protesters, and journalists. Today, a bipartisan group of lawmakers ... introduced the Government Surveillance Reform Act of 2023 (GSRA) to reverse this erosion of privacy rights. The GSRA begins by tackling Section 702, a controversial surveillance law that expires at the end of this year. Section 702 allows the government to collect the communications of non-Americans located abroad without a warrant. But Americans’ private phone calls, emails, and text messages are inevitably captured, too — and intelligence officials frequently perform warrantless searches for them. Intelligence officials conducted more than 200,000 of these “backdoor searches” for Americans’ communications last year alone.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
During a Senate briefing last week, a federal counterterrorism official cited the October 7 Hamas attack while urging Congress to reauthorize a sprawling and controversial surveillance program repeatedly used to spy on U.S. citizens on U.S. soil. “As evidenced by the events of the past month, the terrorist threat landscape is highly dynamic and our country must preserve [counterterrorism] fundamentals to ensure constant vigilance,” said Director of the National Counterterrorism Center Christine Abizaid. She pointed to Section 702 of the Foreign Intelligence Surveillance Act, which enables the U.S. government to gather vast amounts of intelligence — including about U.S. citizens ... without first seeking a warrant. Section 702 “provides key indications and warning on terrorist plans and ... gives us strategic insight into foreign terrorists and their networks overseas,” Abizaid said. “I respectfully urge Congress to reauthorize this vital authority.” The controversial program is set to expire at the end of the year, and lawmakers sympathetic to the intelligence community are scrambling to protect it. Sean Vitka ... at the civil liberties group Demand Progress [said] that now is the time to enact lasting and dramatic oversight of the 702 authority. “The government has completely failed to demonstrate that any of the privacy protections reformers have called for would impair national security ... so now we’re seeing people grasping at straws trying to turn everything into an excuse for reauthorization,” Vitka said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
Annie Jacobsen [is] author of the book Area 51: An Uncensored History of America’s Top Secret Military Base. To write the book, Jacobsen interviewed over 70 people who had first-hand knowledge of the secret facility, including 32 who lived and worked at Area 51. The result is basically the most comprehensive account of the history of Area 51 you can get without a super-high-level security clearance. "Area 51 was the birthplace of overhead espionage for the CIA," [said Jacobsen]. "It’s where the U-2 spy plane was first built back in the 1950s, and it’s where the intelligence community has worked with its military partners and others to work on espionage platforms. It’s also a place where all elements of the Defense Department work on some of their most classified programs along with members of the intelligence community. There’s also an element of Area 51 where the CIA trains its foreign paramilitary partners in counterterrorism tactics. They do this out on the wilds of Area 51 because they can bring some foreign fighters there who would otherwise not be welcomed into the country. I have interviewed scores of very smart, very highly placed government personnel who visited the base and believe the technology they saw is so advanced that they question whether or not it’s manmade. That’s intriguing to me. I don’t report on that because there is no documentation to support that claim, but that is the opinion of many people that I know."
Note: Don’t miss Jacobsen’s engaging, educational book Area 51: An Uncensored History of America's Top Secret Military Base, which reveals how the public, U.S. Congress, and even presidents were lied to about what was going on at this mysterious facility. For more along these lines, see concise summaries of deeply revealing news articles on UFOs from reliable major media sources.
The CIA has for the first time acknowledged that the 1953 coup it backed in Iran that overthrew its prime minister and cemented the rule of Shah Mohammad Reza Pahlavi was undemocratic. The CIA in 2013 admitted its role in the coup that brought down Iran’s then prime minister, Mohammad Mosaddeq, but until now has not publicly acknowledged that the move was undemocratic. Much of the agency’s official history of the coup remains classified, complicating the public’s understanding of an event that still resonates, as tensions remain high between Tehran and Washington. Iran’s mission to the United Nations described the 1953 coup as marking “the inception of relentless American meddling in Iran’s internal affairs” and dismissed the US acknowledgments. “The US admission never translated into compensatory action or a genuine commitment to refrain from future interference, nor did it change its subversive policy towards the Islamic Republic of Iran,” the mission said in a statement. Seven decades later, the 1953 coup remains as hotly debated as ever in Iran, where many see a straight line leading from the coup to the 1979 Islamic Revolution that ultimately toppled the shah. The coup also prompted the CIA into a series of further actions in other countries, including Guatemala, where US clandestine operations in 1954 installed a military dictator and sparked a 40-year civil war that likely killed approximately 245,000 people.
Note: This admission came in the CIA's official podcast. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Silicon Valley techies are pretty sanguine about commercial surveillance. But they are much less cool about government spying. Government employees and contractors are pretty cool with state surveillance. But they are far less cool with commercial surveillance. What are they both missing? That American surveillance is a public-private partnership: a symbiosis between a concentrated tech sector that has the means, motive, and opportunity to spy on every person in the world and a state that loves surveillance as much as it hates checks and balances. The tech sector has powerful allies in government: cops and spies. No government agency could ever hope to match the efficiency and scale of commercial surveillance. Meanwhile, the private sector relies on cops and spies to go to bat for them, lobbying against new privacy laws and for lax enforcement of existing ones. Think of Amazon’s Ring cameras, which have blanketed entire neighborhoods in CCTV surveillance, which Ring shares with law enforcement agencies, sometimes without the consent or knowledge of the cameras’ owners. Ring marketing recruits cops as street teams, showering them with freebies to distribute to local homeowners. Google ... has managed to play both sides of the culture war with its location surveillance, thanks to the “reverse warrants” that cops have used to identify all the participants at both Black Lives Matter protests and the January 6 coup. Distinguishing between state and private surveillance is a fool’s errand.
Note: For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.
When I joined the CIA in January 1990, I did it to serve my country. My whole world, like the worlds of all Americans, changed dramatically and permanently on September 11, 2001. Within months of the attacks, I found myself heading to Pakistan as the chief of CIA counterterrorism operations in Pakistan. Almost immediately, my team began capturing al-Qaeda fighters at safehouses all around Pakistan. Just a month after the September 11 attacks, the CIA leadership gathered its army of lawyers and black ops people and came up with a plan to legalize torture. This was despite the fact that torture has long been patently illegal in the United States. But it didn’t matter. In the end, I was the only person associated with the CIA’s torture program who was prosecuted and imprisoned. I never tortured anybody. But I was charged with five felonies, including three counts of espionage, for telling ABC News and the New York Times that the CIA was torturing its prisoners, that torture was official U.S. government policy, and that the policy had been approved by the president himself. I served 23 months in a federal prison. Former CIA Director George Tenet, former CIA Deputy Director John McLaughlin, former CIA Deputy Director for Operations Jose Rodriguez, former CIA Executive Director John Brennan, and CIA [contractors] James Mitchell and Bruce Jessen ... weakened our democracy by pretending that the Constitution and the rule of law didn’t exist.
Note: This article was written by CIA whistleblower John Kiriakou. For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Journalist Stephen Kinzer has spent several years investigating the CIA's mind control program, which was known as MKUltra. LSD was just one of the mind-altering drugs that were used in the program to see if and how they could be weaponized to control human behavior. Many of the unwitting subjects of these experiments were subjected to what amounts to psychological torture. The CIA basically set up phony philanthropic foundations which then funded university and college research, and it's through those research experiments that people like Ginsberg and Kesey and Robert Hunter got introduced to LSD. And the university researchers had no idea that their research was actually being funded by the CIA. Stanford University was running a program in which they asked for volunteers to come in and try this new substance. Allen Ginsberg was one of the volunteers; so was Robert Hunter. A similar set of experiments was going on at the Menlo Park Veterans Administration Hospital. That's where Ken Kesey took LSD for the first time. He was so excited about it he took a job in the hospital and began stealing the LSD to give it to his friends. That became the basis for "One Flew Over The Cuckoo's Nest." So all of these original strands that came together in the '60s to produce this great countercultural revolt based around LSD can be traced back through these bogus foundations to the CIA and, ultimately, the director of MKUltra, Sidney Gottlieb.
Note: Read more about the MKUltra program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and mind control from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.