Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
A whistleblower has come forward with an explosive new trove of documents. They describe the activities of an "anti-disinformation" group called the Cyber Threat Intelligence League, or CTIL, that officially began as the volunteer project of data scientists and defense and intelligence veterans but whose tactics over time appear to have been absorbed into ... those of the Department of Homeland Security (DHS). In 2019, US and UK military and intelligence contractors ... developed the sweeping censorship framework. CTIL ... partnered with [Cybersecurity and Infrastructure Security Agency] (CISA) in the spring of 2020. CTIL's approach to "disinformation" went far beyond censorship. The group engaged in offensive operations to influence public opinion, discussing ways to promote "counter-messaging," co-opt hashtags, dilute disfavored messaging, create sock puppet accounts, and infiltrate private invite-only groups. The ambitions of the 2020 pioneers of the Censorship Industrial Complex went far beyond simply urging Twitter to slap a warning label on Tweets, or to put individuals on blacklists. The [Adversarial Misinformation and Influence Tactics and Techniques] framework calls for discrediting individuals as a necessary prerequisite of demanding censorship against them. It calls for training influencers to spread messages. And it calls for trying to get banks to cut off financial services to individuals who organize rallies or events. [CTIL] laments that governments and corporate media no longer have full control of information. "For a long time, the ability to reach mass audiences belonged to the nation-state (e.g. in the USA via broadcast licensing through ABC, CBS and NBC). Now, however, control of informational instruments has been allowed to devolve to large technology companies who have been blissfully complacent and complicit in facilitating access to the public for information operators at a fraction of what it would have cost them by other means."
Note: The extensive collusion between Big Tech and government officials to censor COVID information is barely beginning to come to light. For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
Silicon Valley techies are pretty sanguine about commercial surveillance. But they are much less cool about government spying. Government employees and contractors are pretty cool with state surveillance. But they are far less cool with commercial surveillance. What are they both missing? That American surveillance is a public-private partnership: a symbiosis between a concentrated tech sector that has the means, motive, and opportunity to spy on every person in the world and a state that loves surveillance as much as it hates checks and balances. The tech sector has powerful allies in government: cops and spies. No government agency could ever hope to match the efficiency and scale of commercial surveillance. Meanwhile, the private sector relies on cops and spies to go to bat for them, lobbying against new privacy laws and for lax enforcement of existing ones. Think of Amazon's Ring cameras, which have blanketed entire neighborhoods in CCTV surveillance, which Ring shares with law enforcement agencies, sometimes without the consent or knowledge of the cameras' owners. Ring marketing recruits cops as street teams, showering them with freebies to distribute to local homeowners. Google ... has managed to play both sides of the culture war with its location surveillance, thanks to the "reverse warrants" that cops have used to identify all the participants at both Black Lives Matter protests and the January 6 coup. Distinguishing between state and private surveillance is a fool's errand.
Note: For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.
He still remembers the first gunshot. Now, 60 years later, Paul Landis, one of the Secret Service agents just feet away from President John F. Kennedy on that fateful day in Dallas, is telling his story in full for the first time. His account differs from the official version. At age 88, he said, all he wants is to tell what he saw and what he did. He will leave it to everyone else to draw conclusions. What it comes down to is a copper-jacketed 6.5-millimeter projectile. The Warren Commission decided that one of the bullets fired that day struck the president from behind, exited from the front of his throat and continued on to hit Mr. Connally, somehow managing to injure his back, chest, wrist and thigh. It seemed incredible that a single bullet could do all that, so skeptics called it the magic bullet theory. Investigators came to that conclusion partly because the bullet was found on a stretcher believed to have held Mr. Connally at Parkland Memorial Hospital. In fact, [Mr. Landis] said, he was the one who found the bullet – and he found it not in the hospital near Mr. Connally but in the presidential limousine lodged in the back of the seat behind where Kennedy was sitting. "If what he says is true, which I tend to believe, it is likely to reopen the question of a second shooter, if not even more," [Historian James] Robenalt said. "If the bullet we know as the magic or pristine bullet stopped in President Kennedy's back, it means that the central thesis of the Warren Report, the single-bullet theory, is wrong."
Note: For more along these lines, see concise summaries of revealing news articles on the Kennedy assassination from reliable major media sources. For deeper exploration, check out our comprehensive Information Center on John F. Kennedy's assassination, which challenge mainstream narratives about his assassination and the events leading up to it.
Between 1955 and 1963, federal agents ran a hidden brothel in one of San Francisco's poshest neighborhoods and tested LSD on unsuspecting Bay Area residents. The apartment building is still there, although it has been converted from a CIA brothel into a four-story mansion. At the center of this wildly unethical program was George Hunter White ... who became one of the biggest crusaders of America's early war on drugs. In public, he railed against drug use and ruthlessly investigated jazz legends like Billie Holiday. Privately, however, he drank martinis by the pitcher and even used drugs like LSD and marijuana. White was the federal agent responsible for a top-secret CIA program called "Operation Midnight Climax." The CIA thought it could use hallucinogenic drugs like LSD as weapons of war against its enemies. To find out, the agency got Bay Area residents high without their consent. White outfitted rooms inside a Telegraph Hill apartment building, at 225 Chestnut St., into a safe house for testing LSD. He gave sex workers get-out-of-jail-free cards in exchange for luring unsuspecting johns to the apartment, where the men were dosed with acid while White watched from the other side of a one-way mirror. According to a letter unearthed by John Marks in his 1979 book "The Search for the 'Manchurian Candidate,'" it was nothing but "fun, fun, fun." "Where else could a red-blooded American boy lie, kill, cheat, steal, rape, and pillage with the sanction and blessing of the All-Highest?" White asked.
Note: Read more about Operation Midnight Climax and the larger MK-ULTRA project it was a part of. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and mind control from reliable major media sources.
Recent reports about the Secret Service and Immigration and Customs Enforcement playing fast and loose with rules regarding cellphone tracking and the FBI purchasing phone location data from commercial sources constitute an important wake-up call. They remind us that those handy mobile devices many people tote around are the most cost-effective surveillance system ever invented. "The United States Secret Service and U.S. Immigration and Customs Enforcement, Homeland Security Investigations (ICE HSI) did not always adhere to Federal statute and cellsite simulator (CSS) policies when using CSS during criminal investigations," the Department of Homeland Security's Office of the Inspector General reported last month. "Separately, ICE HSI did not adhere to Department privacy policies and the applicable Federal privacy statute when using CSS." The OIG report referred to the use of what is commonly called "stingray" technology–devices that simulate cellphone towers and trick phones within range into connecting and revealing their location. "They also gather information about the phones of countless bystanders who happen to be nearby," the ACLU warns. Even the most precise phone company location data remains available with court approval. The courts are currently mulling multiple cases involving "geofence warrants" whereby law enforcement seeks data not on individuals, but on whoever was carrying a device in a designated area at a specified time.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
In the month since veteran journalist Seymour Hersh published his bombshell report alleging that President Joe Biden personally authorized a covert action to bomb the Nord Stream pipelines, we've seen a frenzy of speculation, detailed dissection of Hersh's specific assertions, and the emergence of competing narratives both supporting and denouncing the report. On March 7, the New York Times and the German newspaper Die Zeit both published stories that thicken the plot. The Times story was based on a narrative clearly being pushed by U.S. intelligence sources that "a pro-Ukrainian group carried out the attack." If the bombing of the Nord Stream pipelines was, as Hersh alleges, directed by the U.S., then the leaked suggestion that the culprits were a "pro-Ukrainian group" could indicate a nascent effort at floating a cover story. No one has claimed responsibility for this attack, but there are recent precedents for foreign actors taking credit for U.S. operations to conceal Washington's involvement. Military officials have lied or misled the public ... throughout U.S. history. There is no U.S. law or rule prohibiting the government from promoting a false alternative explanation to conceal an operation. "This is an established practice in military operations and intelligence activities where it is often known as â€cover and deception,'" [said former Government Secrecy Project director Steven Aftergood]. "Sometimes, in order to maintain the operational security of X, you have to declare that it is actually Y."
Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
The "Twitter files" revealed an FBI operation to monitor and censor social media content. Dozens of FBI employees worked on the identification and removal of material on a wide range of subjects and that Twitter largely carried out their requests. Nor was it just the FBI, apparently. Emails reveal FBI figures like a San Francisco assistant special agent in charge asking Twitter executives to "invite an OGA" (or "Other Government Organization") to an upcoming meeting. A week later, Stacia Cardille, a senior Twitter legal executive, indicated the OGA was the CIA, an agency under strict limits regarding domestic activities. Twitter's own ranks included dozens of ex-FBI agents and executives. The dozens of disclosed emails ... do not include still-undisclosed but apparent government coordination with Facebook and other social media companies. Much of that work apparently was done through the multi-agency Foreign Influence Task Force (FITF), which operated secretly it seems to censor citizens. This is a First Amendment violation. The Twitter files have substantiated long-standing concerns over "censorship by surrogate" or proxy. As with other amendments like the Fourth Amendment, which protects against unreasonable searches or seizures, the government cannot use private agents to do indirectly what it cannot do directly. Just as a police officer cannot direct a security guard to break into an apartment and conduct a search, the FBI cannot use Twitter to censor Americans.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
Wikipedia is part of the very internet developed by the military with public money in the 1950s-60s, then called ARPANET. Generally speaking, corporations hope that the systems developed in the military that evolve in the public-corporate realm–satellites, computers, data analysis, etc.–will inspire new military-intelligence innovations in a permanent feedback loop. The overarching "values" [of Wikipedia] and its contributors–mainly young, white, middle-class liberals–will reflect those "values". They include progressive slogans but reactionary policies, humanitarianism but pro-war positions, and conformity to consensus opinion even when the consensus is wrong (e.g., "regime change" in Libya and Syria). By 2006, the Intelligence Community had developed its own Intellipedia. A Top Secret report released under a FOIA request instructed intelligence officers how to edit Wikipedia's entry on MK-ULTRA, the CIA's mind control program (1953-circa 1970s), for Intellipedia. Funded by weapons contractors like BAE Systems and Boeing, and until recently led by people like Katherine Maher, ex-World Banker and Fellow of the Truman National Security Project, which exists to promote "US values" at home and abroad, the Wikimedia Foundation that enables Wikipedia does not exist in a vacuum. Wikipedia does not present unbiased, scholarly encyclopedia entries. It is as much part of the military-industrial-complex as mainstream corporate media.
Note: Some Wikipedia entries have been professionally manipulated. Watch a fascinating video with Larry Sanger, the co-founder of Wikipedia, who now says he no longer trusts the website he's helped created. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Facial recognition has become a security feature of choice for phones, laptops, passports, and payment apps. Yet it is also, increasingly, a tool of state oppression and corporate surveillance. Immigration and Customs Enforcement and the FBI have deployed the technology as a digital dragnet, searching for suspects among millions of faces in state driver's license databases, sometimes without first seeking a court order. In early 1963, [Woody Bledsoe] proposed to conduct "a study to determine the feasibility of a simplified facial recognition machine." A recently declassified history of the CIA's Office of Research and Development mentions just such a project in 1965; that same year, Woody sent a letter on facial recognition to John W. Kuipers, the division's chief of analysis. In 1967 ... Woody took on one last assignment that involved recognizing patterns in the human face. The purpose of the experiment was to help law enforcement agencies quickly sift through databases of mug shots and portraits, looking for matches. As before, funding for the project appears to have come from the US government. A 1967 document declassified by the CIA in 2005 mentions an "external contract" for a facial-recognition system that would reduce search time by a hundredfold. Woody's work set an ethical tone for research on facial recognition that has been enduring and problematic. The potential abuses of facial-recognition technology were apparent almost from its birth.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
On the north side of Telegraph Hill is 225 Chestnut St., a swanky modernist building. From 1955 to 1965, this building was the site of “Operation Midnight Climax” - a top-secret mind-control program in which CIA agents used hookers to lure unsuspecting johns from North Beach bars to what they called “the pad,” then dosed the men with LSD and observed the X-rated goings-on through a two-way mirror. As John Marks notes in his 1977 book, “The Search for the ‘Manchurian Candidate’: The CIA and Mind Control,” the CIA’s ... predecessor, the Office of Strategic Services, set up a “truth drug” program whose purpose was to discover a substance that would make subjects reveal their secrets. When the CIA was created in 1947, it ... authorized covert mind and behavior control programs. Drugs were given to people deemed expendable, including North Korean POWs, mental patients, prisoners, addicts and prostitutes. Before the programs were shot down, hundreds of scientists would work on them. [In] 1953, CIA director Allen Dulles approved a program for “covert use of biological and chemical materials” with an initial budget of $300,000. Its name: MKULTRA. CIA operatives began dosing people with acid in restaurants, bars and beaches. They also used other, more exotic drugs. And the agency began using the prostitutes to lure men of all sorts, not just marginal figures, back to the safe house. Because the agency destroyed most of MKULTRA’s files, no one will ever know how many lives and minds [it] damaged or destroyed.
Note: Don't miss the entire, revealing article. For more on CIA mind control experiments, see the extensive documentation on this page. Then explore the excellent, reliable resources provided in our Mind Control Information Center.
Senior CIA officials have for years intentionally deceived parts of the agency workforce by transmitting internal memos that contain false information. The practice is known by the term eyewash. Officials said there is no clear mechanism for labeling eyewash cables or distinguishing them from legitimate records being examined by the CIAs inspector general, turned over to Congress or declassified for historians. Senate investigators uncovered apparent cases of eyewashing as part of a multi-year probe of the CIAs interrogation program, according to officials who said that the Senate Intelligence Committee found glaring inconsistencies in CIA communications about classified operations, including drone strikes. Former CIA officials ... acknowledged that the internal mechanisms for managing eyewash cables were largely informal. Skeptics described the safeguards as inadequate. When you introduce falsehoods into the communications stream then you can destabilize the whole system of intelligence oversight and compliance with the law, said Steven Aftergood, a government secrecy expert at the Federation of American Scientists. It wasnt that long ago that we had a CIA executive director who was engaged in criminal activity - you dont want someone like him preparing eyewash cables, Aftergood said, referring to Kyle Dusty Foggo, the former No. 3 executive at the agency.
Note: Read more about the strange case of Kyle "Dusty" Foggo, the CIA executive convicted of fraud in connection with secret CIA prisons. For more along these lines, see concise summaries of deeply revealing Intelligence agency corruption news articles from reliable major media sources.
For the fearmongers in the West and their allies, it’s always the scariest time ever. In February, former CIA Deputy Director Michael Morrell, arguing for renewal of the Patriot Act, warned that “the ‘lone wolf’ terrorist threat to the United States has never been greater.” In January, an anonymous senior aide to U.K. Prime Minister ... argued for a new “snooper” bill by saying that “the terrorist threat has never been greater.” In mid-2014, U.K. Prime Minister Cameron himself raised the threat level to “severe” and announced: “Britain faces the ‘greatest and deepest’ terror threat in the country’s history.” Throughout the Bush years ... officials raised their color-coded terror alerts and issued similar warnings so many times that it became a running joke. Years later, the face of that joke, Homeland Security Secretary Tom Ridge, admitted he was pressured to issue warnings for political gain. Here we are 14 years after 9/11, and it’s still always the worst threat ever in all of history. If we always face the greatest threat ever, then one of two things is true: 1) fearmongers serially exaggerate the threat for self-interested reasons, or 2) the threat is always getting more severe, year after year — which might mean we should evaluate the wisdom of “terrorism” policies that constantly make the problem worse. Whatever else is true, the people who should have the least credibility on the planet are [those] who have spent the last 15 years exploiting the terror threat in order to terrorize the American population into doing what they want.
Note: Read an excellent essay by a top US general exposing how war is a racket. For more along these lines, see concise summaries of deeply revealing news articles about corruption in the intelligence community and the manipulation of public perception.
The Justice Department and FBI have formally acknowledged that nearly every examiner in an elite FBI forensic unit gave flawed testimony in almost all trials in which they offered evidence against criminal defendants over more than a two-decade period before 2000. Of 28 examiners with the FBI Laboratory’s microscopic hair comparison unit, 26 overstated forensic matches in ways that favored prosecutors in more than 95 percent of the 268 trials reviewed so far, according to the National Association of Criminal Defense Lawyers (NACDL) and the Innocence Project, which are assisting the government with the country’s largest post-conviction review of questioned forensic evidence. The cases include those of 32 defendants sentenced to death. Of those, 14 have been executed or died in prison, the groups said under an agreement with the government to release results after the review of the first 200 convictions. The admissions mark a watershed in one of the country’s largest forensic scandals, highlighting the failure of the nation’s courts for decades to keep bogus scientific information from juries, legal analysts said. The question now, they said, is how state authorities and the courts will respond to findings that confirm long-suspected problems with subjective, pattern-based forensic techniques — like hair and bite-mark comparisons — that have contributed to wrongful convictions in more than one-quarter of 329 DNA-exoneration cases since 1989.
Note: For more along these lines, see concise summaries of deeply revealing news articles on the threats to civil liberties posed by government corruption from reliable major media sources.
The Obama version of national security looks almost indistinguishable from the one he inherited. Critics tend to focus on Obama himself, but Tufts University political scientist Michael J. Glennon has a more pessimistic answer: Obama couldnt have changed policies much even if he tried. Our government no longer works that way. In a new book, National Security and Double Government, he catalogs the ways that the defence and national security apparatus is effectively self-governing, with virtually no accountability, transparency, or checks and balances of any kind. He uses the term double government: Theres the one we elect, and then theres the one behind it, steering huge swaths of policy almost unchecked. Elected officials end up serving as mere cover for the real decisions made by the bureaucracy. National Security and Double Government comes favorably blurbed by former members of the Defense Department, State Department, White House, and even the CIA. Glennon spoke with Ideas from his office. IDEAS: Where does the term double government come from? GLENNON: Walter Bagehot - the scholar who presided over the birth of The Economist magazine. IDEAS: What evidence exists for saying America has a double government? GLENNON: The documented evidence in the book is substantial there are 800 footnotes. I think the American people ... believe that when they vote for a president or member of Congress or succeed in bringing a case before the courts, that policy is going to change. Policy by and large in the national security realm is made by the concealed institutions.
Note: For more along these lines, see concise summaries of deeply revealing stories about questionable intelligence agency practices from reliable sources.
Nearly all of the highest-profile domestic terrorism plots in the United States since 9/11 featured the "direct involvement" of government agents or informants, a new report says. Some of the controversial "sting" operations "were proposed or led by informants", bordering on entrapment by law enforcement. Yet the courtroom obstacles to proving entrapment are significant, one of the reasons the stings persist. The lengthy report, released on [July 21] by Human Rights Watch, raises questions about the US criminal justice system's [respect for] civil rights and due process in post-9/11 terrorism cases. [The report] portrays a system that features not just the sting operations but secret evidence, anonymous juries, extensive pretrial detentions and convictions significantly removed from actual plots. "In some cases the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act," the report alleges. Out of the 494 cases related to terrorism the US has tried since 9/11, the plurality of convictions ... are not for thwarted plots but for "material support" charges, a broad category expanded further by the 2001 Patriot Act that permits prosecutors to pursue charges with tenuous connections to a terrorist act or group. Several cases featured years-long solitary confinement for accused terrorists before their trials. Some defendants displayed signs of mental incapacity. Jurors for the 2007 plot to attack the Fort Dix army base, itself influenced by government informants, were anonymous, limiting defense counsel's ability to screen out bias.
Note: Why was this important news not picked up by any major US media? For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
In March I received a call from the White House counsel’s office regarding a speech I had prepared for my boss at the State Department. The speech was about the impact ... of National Security Agency surveillance practices. The draft stated that “if U.S. citizens disagree with congressional and executive branch determinations about the proper scope of signals intelligence activities, they have the opportunity to change the policy through our democratic process.” But the White House counsel’s office told me that no, that wasn’t true. I was instructed to amend the line. Some intelligence practices remain so secret, even from members of Congress, that there is no opportunity for our democracy to change them. Public debate about the bulk collection of U.S. citizens’ data by the NSA has focused largely on Section 215 of the Patriot Act. Based in part on classified facts that I am prohibited by law from publishing, I believe that Americans should be even more concerned about the collection and storage of their communications under Executive Order 12333 than under Section 215. Unlike Section 215, the executive order authorizes collection of the content of communications, not just metadata, even for U.S. persons. It does not require that the affected U.S. persons be suspected of wrongdoing and places no limits on the volume of communications by U.S. persons that may be collected and retained. None of the reforms that Obama announced earlier this year will affect such collection.
Note: The above was written by John Napier Tye, former section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights and Labor. A 2014 Washington Post investigation sheds more light on the NSA's legally dubious domestic mass surveillance program. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Less than two weeks after the 2011 raid that killed Osama bin Laden, a top Pentagon official ordered all photos of bin Laden's corpse be destroyed or turned over to the CIA. In an e-mail dated May 13, 2011, Adm. William McRaven, the U.S. Special Operations commander, wrote: "One particular item that I want to emphasize is photos; particularly UBLs remains. At this point — all photos should have been turned over to the CIA; if you still have them destroy them immediately or get them to the (redacted)." Shortly after the raid in Pakistan, President Obama said he would not authorize the release of any images of the al-Qaeda leader's body. Days before the order to destroy the photos, watchdog group Judicial Watch and the Associated Press had separately filed a Freedom of Information Act request for photos, videos and documents regarding bin Laden during the raid. Typically, when a Freedom of Information Act request is filed to a government agency under the Federal Records Act, the agency is obliged to preserve the material sought — even if the agency later denies the request.
Note: Why would a top military commander order all photos of bin Laden's dead body destroyed? Why would Obama prevent the release of any images of the body? For powerful evidence that the dead body was not, in fact, bin Laden's, click here and here. For other solid evidence that the official story of 9/11 is riddles with holes, see our 9/11 Information Center available here.
After contradictory stories emerged about an F.B.I. agent’s killing last month of a Chechen man in Orlando, Fla., who was being questioned over ties to the Boston Marathon bombing suspects, the bureau reassured the public that it would clear up the murky episode. But if such internal investigations are time-tested, their outcomes are also predictable: from 1993 to early 2011, F.B.I. agents fatally shot about 70 “subjects” and wounded about 80 others — and every one of those episodes was deemed justified, according to interviews and internal F.B.I. records. The last two years have followed the same pattern: an F.B.I. spokesman said that since 2011, there had been no findings of improper intentional shootings. In most of the shootings, the F.B.I.’s internal investigation was the only official inquiry. In the Orlando case, for example, there have been conflicting accounts about basic facts like whether the Chechen man, Ibragim Todashev, attacked an agent with a knife, was unarmed or was brandishing a metal pole. But Orlando homicide detectives are not independently investigating what happened. Occasionally, the F.B.I. does discipline an agent. A typical punishment involved adding letters of censure to agents’ files. Critics say the fact that for at least two decades no agent has been disciplined for any instance of deliberately shooting someone raises questions about the credibility of the bureau’s internal investigations.
Note: For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here.
A Panel of 22 researchers into the history of 9/11 has uncovered evidence of fraud in the photographic images of Muslim hijackers prior to boarding the planes on 9/11. Court exhibits state that leader Mohamed Atta took a commuter flight from Portland, Maine, to connect to AA Flight 11 out of Boston, which hit the North Tower. The dubious images heighten the mystery of why Atta left Boston, where Flight 11 was to be hijacked, and risked the failure of his entire mission by driving to Portland September 10, staying overnight, and booking a tight connection back to Boston early September 11. The [9/11 Consensus] Panel's in-depth review shows the Portland story to be peppered with inconsistencies and revisions, placing the entire hijack theory in question. Similarly, at Washington's Dulles International Airport, five hijackers allegedly passed through security before flying AA Flight 77, carrying CNN correspondent Barbara Olson, into the Pentagon. Yet no images were released from the 300+ security cameras at Dulles that morning, nor were Arabic men reported in FBI interviews of airport staff. The Panel has produced 28 Consensus Points of "best evidence" regarding the official claims of 9/11 -- the trigger event for the Middle East wars of the last decade. Its investigations cover: explosives at the Twin Towers and Building WTC-7; the inadequate flying skills of the alleged Pentagon pilot; the missing debris from "Let's Roll" Flight 93; the [many] military drills coinciding on 9/11, and the allegedly absent political and military commanders.
Note: This article appears to have been removed from the MarketWatch website, though you can still read it using the Internet Archive. Don't miss the PBS special, "9/11 Explosive Evidence: Experts Speak Out", in which 40 whistle-blowing experts present evidence of controlled demolition at the World Trade Center. For many other major media articles which raise serious questions about the 9/11 official story, click here. For lots more verifiable evidence suggesting a major cover-up around 9/11, click here.
Flying saucer sightings? Reports of three-foot-tall aliens? Secret memos about suspicious objects recovered near Roswell, N.M.? They're all included in the thousands of declassified government documents posted to the FBI's new online "Vault." Among the so-called "X-files" are once-classified reports dating back to the 1940s and 1950s detailing Air Force investigations into "flying discs" and the "bodies of human shape" discovered inside them. In one report from March 1950, Guy Hottel, a special agent with the FBI, said he received information from an Air Force investigator about flying saucers found in New Mexico. "They were described as being circular in shape with raised centers, approximately 50-feet in diameter," he wrote. "Each one was occupied by three bodies of human shape but only 3 feet tall, dressed in a metallic cloth of a very fine texture. Each body was bandaged in a manner very similar to the blackout suits used by speed flyers and test pilots." The informant, whose name is redacted in the file, said he thought the saucer was spotted in New Mexico because a high-powered government radar in the area interfered with the saucer's controlling mechanism. Other reports once marked "restricted" and "confidential" detail sightings of mysterious flashing lights and other "unidentified aerial objects."
Note: You can view the declassified memorandum described above on the FBI website at this link. Or download this amazing document and view it on our website at this link. For lots more reliable information suggesting a major cover-up of the reality of ET visitation, click here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.