Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Harry Truman became President in April, 1945. Two years later, he signed the National Security Act, which established the C.I.A.. It was supposed to do what its name suggested: centralize the intelligence that various agencies gathered. "It was not intended as a â€Cloak and Dagger' Outfit!," Truman later wrote. In its charter, the C.I.A. was banned from domestic spying. There was no mention of covert action in the law that chartered the C.I.A., but Presidents–starting with Truman–began using it that way. One of the agency's first operations involved meddling in the 1948 Italian election. During the Vietnam War, the C.I.A. had discouraging intelligence to offer, and, when successive Administrations didn't want to hear it, focused on being helpful by providing ... supposedly quick fixes. That meant abetting a coup in 1963, spying on antiwar protesters, and launching the Phoenix Program, an anti-Vietcong campaign marked by torture and by arbitrary executions. More than twenty thousand people were killed under Phoenix's auspices. The C.I.A. has had a "defining failure" for every decade of its existence–sometimes more than one. In the nineteen-nineties, it was the lack of foresight about the Soviet Union; in the two-thousands, it was the phantom weapons of mass destruction, followed by torture and, in still evolving ways, by the drone-based program of targeted killings, with its high toll of civilian deaths. It's difficult to know, at this point, what the C.I.A.'s next defining failure ... will be.
Note: Read more about the CIA's Phoenix Program, which included the kidnapping, torture, and murder of civilians during the Vietnam War. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
NSO Group [is] the world's most notorious maker of spyware. The F.B.I. had bought a version of Pegasus, NSO's premier spying tool. It could ... crack the encrypted communications of any iPhone or Android smartphone. Since NSO had introduced Pegasus to the global market in 2011, it had helped Mexican authorities capture JoaquĂn Guzmán Loera, the drug lord known as El Chapo. European investigators have quietly used Pegasus to thwart terrorist plots, fight organized crime and, in one case, take down a global child-abuse ring. Mexico deployed the software not just against gangsters but also against journalists and political dissidents. The United Arab Emirates used the software to hack the phone of a civil rights activist. Saudi Arabia used it against women's rights activists. During a presentation to officials in Washington, the company demonstrated a new system, called Phantom, that could hack any number in the United States that the F.B.I. decided to target. A slick brochure ... says that Phantom allows American law enforcement and spy agencies to get intelligence "by extracting and monitoring crucial data from mobile devices." It is an "independent solution" that requires no cooperation from AT&T, Verizon, Apple or Google. The system, it says, will "turn your target's smartphone into an intelligence gold mine." The Phantom presentation triggered a discussion among government lawyers. Last summer ... the F.B.I. finally decided not to deploy the NSO weapons.
Note: Read more about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Ali Alzabarah was an engineer who rose through the ranks at Twitter to a job that gave him access to personal information and account data of the social media service’s millions of users. Ahmad Abouammo was a media partnerships manager at the company who could see the email addresses and phone numbers of Twitter accounts. On Wednesday, the Justice Department accused the two men of using their positions and their access to Twitter’s internal systems to aid Saudi Arabia by obtaining information on American citizens and Saudi dissidents who opposed the policies of the kingdom and its leaders. Mr. Alzabarah and Mr. Abouammo were charged with acting as agents of a foreign power inside the United States, in the first complaint of its kind involving Saudis in the country. The case raised questions about the security of American technology companies already under scrutiny for spreading disinformation and influencing public opinion, showing that these firms can be penetrated from the inside as well. It also underscored the broad effort that Crown Prince Mohammed bin Salman of Saudi Arabia and his close advisers have conducted to silence critics both inside the kingdom and abroad. Jamal Khashoggi, a columnist for The Washington Post who was critical of the way Saudi Arabia is run, was murdered last year by Saudi agents in Istanbul.
Note: Read more on Saudi Arabia's extreme efforts to silence its critics. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable major media sources.
Even after spending a year and a half in prison in Tehran, I knew that if I wanted to go on writing about Iran, I would be a target for plenty of public attacks. But I never imagined the U.S. State Department would be funding my attackers. Last week, several astute Iran watchers drew attention to a series of inflammatory tweets associated with the Iran Disinformation Project, a State Department-funded initiative that its website claims "brings to light disinformation emanating from the Islamic Republic of Iran via official rhetoric, state propaganda outlets, social media manipulation and more." The targets of the tweets included think-tank analysts, human rights activists and journalists. The common thread is that we are all perceived by regime change proponents and supporters of the Trump administration's so-called maximum pressure policy to be soft on Iran because we are critical of crushing economic sanctions and the threat of the use of military force. For these thought crimes, we are branded by @IranDisinfo and similar social media accounts as Tehran's "mouthpieces," "apologists," "collaborators," and "lobbyists" in the West. We're faced with the irony that an initiative aimed at combating Tehran's disinformation campaigns is resorting to disinformation campaigns of its own, using taxpayer funds to spread lies about U.S. citizens. We need programs that fight the spread of falsehoods and propaganda, but such efforts shouldn't combat lies with other lies.
Note: For lots more on this eye-opening event, see this excellent article by Matt Taibbi. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
Attorney-General nominee William P. Barr figured prominently in arguments to limit CIA responsibility to provide notification to Congress about covert actions during the 1980s, according to a review of declassified materials published today by the National Security Archive. As the Iran-Contra scandal played out, Barr, who held senior posts at the Justice Department, provisionally supported the idea of the president’s “virtually unfettered discretion” in foreign policy and downplayed Congress’s power. The issue of notification of Congress about imminent clandestine activities was at the heart of the Iran-Contra scandal when President Ronald Reagan and CIA Director William Casey specifically ordered that lawmakers be kept in the dark about the infamous, covert arms-for-hostages deals with Iran. Barr was by no means alone in pushing these views, the documents show. Other notable proponents during the Iran-Contra aftermath included then-Congressman Dick Cheney and John R. Bolton, who was also at the Justice Department. After Cheney became defense secretary he continued to press for extraordinarily broad Executive Branch authority, advising then-President George H. W. Bush to veto the Senate’s intelligence appropriations bill on the grounds it “attacked” presidential prerogatives – resulting in the only known such veto since the CIA’s creation.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
Bloomberg Businessweek published an alarming story: Operatives working for China's People's Liberation Army had secretly implanted microchips into motherboards made in China and sold by U.S.-based Supermicro. This allegedly gave Chinese spies clandestine access to servers belonging to over 30 American companies, including Apple, Amazon, and various government suppliers, in an operation known as a "supply chain attack," in which malicious hardware or software is inserted into products before they are shipped to surveillance targets. U.S. spy agencies ... assessed that China was adept at corrupting the software bundled closest to a computer's hardware at the factory, threatening some of the U.S. government's most sensitive machines, according to documents provided by National Security Agency whistleblower Edward Snowden. The documents also detail how the U.S. and its allies have themselves systematically targeted and subverted tech supply chains, with the NSA conducting its own such operations, including in China, in partnership with the CIA and other intelligence agencies. The documents also disclose supply chain operations by German and French intelligence. Computer hardware can be altered at various points along the supply chain, from design to manufacturing to storage to shipment. The U.S. is among the small number of countries that could, in theory, compromise devices at many different points in this pipeline, thanks to its resources and geographic reach.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
“My father was the chief law enforcement officer in this country,” Robert F. Kennedy Jr. recently told The Washington Post. “I think it would have disturbed him if somebody was put in jail for a crime they didn’t commit.” Kennedy’s second oldest son now believes ... that his father was killed by a second gunman. RFK Jr. even visited Sirhan Sirhan, the man convicted of shooting and killing his father, because he was “curious and disturbed by what I had seen in the evidence.” He isn’t the only one. “If you believe the LAPD reports about this case, there is no way that Sirhan did it and did it alone,” Dan Moldea, an investigative journalist and author of The Killing of Robert F. Kennedy, told Boston.com. Kennedy was assassinated ... on June 5, 1968, at the Ambassador Hotel in Los Angeles. Kennedy was walking through the hotel kitchen pantry [and] was shot from behind at point-blank range. Sirhan approached from the front, on Kennedy’s right. His gun never got closer than about a foot-and-a-half away [and] carried a maximum of just eight bullets. And yet, there’s evidence that suggests more than eight shots were fired. Who would the second gunman have been? Theorists most commonly point to ... Thane Eugene Cesar. Cesar was a security guard who hated the Kennedys. Cesar was also walking with Kennedy when the shooting occurred and ... owned a .22-caliber similar to Sirhan’s gun, which he initially told police he sold before the assassination, but had actually, it was later found, sold three months after the shooting.
Note: For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.
The father of the 29-year-old who killed 49 people at an Orlando nightclub in the summer of 2016 was an FBI informant who came under scrutiny himself after investigators found receipts for money transfers to Turkey and Afghanistan in the wake of the mass shooting. The revelation came in documents filed by attorneys for the shooter’s wife, Noor Salman, who is on trial in Orlando on allegations that she aided and abetted her husband’s attack and obstructed law enforcement’s investigation into it. Salman’s trial has been underway for weeks, but defense attorneys argued that they were not informed until Saturday of the father’s work for the FBI. That, they argued, is grounds to dismiss the charges. Seddique Mateen - the father of Omar Mateen - was an FBI informant at various points between January 2005 and June 2016, court documents say. Salman’s attorneys argued in court filings that if they had known of Seddique Mateen’s work for the bureau, they might have explored ... whether the FBI’s interviews with Salman were an attempt at “evading the negligence they exercised with their own informant,” and whether their “unwavering focus on Noor Salman, rather than Seddique Mateen, could have been designed to find a culprit other than the father.” The FBI has previously come under criticism for investigating Omar Mateen for 10 months starting in 2013 and ultimately concluding he was not a threat.
Note: Noor Salman was acquitted shortly after this information came out. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Saudi Crown Prince Mohammed bin Salman said Thursday it would be “really insane” for him to trade classified information with presidential son-in-law and White House adviser Jared Kushner. Speaking in a meeting with Washington Post editors and reporters, Mohammed denied U.S. media reports that he had claimed Kushner was “in his pocket,” or that ... he had sought or received a green light from Kushner for massive arrests of allegedly corrupt members of the royal family and Saudi businessmen that took place in the kingdom. The detentions were solely a domestic issue and had been in the works for years, the prince said. The son of King Salman and heir to the Saudi throne, Mohammed, 32, met with President Trump on Tuesday in the Oval Office and over lunch. He also spoke with a number of congressional leaders. Even as Trump has said he is seeking increased investment and purchases of U.S. military equipment and other products from Saudi Arabia, Mohammed has made clear that his primary mission here is to win U.S. investor confidence in his country. Asked about the Saudi-funded spread of Wahhabism, the austere faith ... that some have accused of being a source of global terrorism, Mohammed said that investments in mosques and madrassas overseas were rooted in the Cold War, when allies asked Saudi Arabia to use its resources to prevent inroads in Muslim countries by the Soviet Union. Successive Saudi governments lost track of the effort, he said.
Note: 531,525 diplomatic cables from 1979 published by Wikileaks shed light on how Saudi Arabia and the CIA fueled the rise of modern Islamic terrorism. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism.
I was inside the CIA’s Langley, Va., headquarters on Sept. 11, 2001. I headed counterterrorism operations in Pakistan from January to May 2002. My team captured dozens of al-Qaeda fighters, including senior training-camp commanders. One of the fighters whom I played an integral role in capturing was Abu Zubaida, mistakenly thought at the time to be the third-ranking person in the militant group. By that May, the CIA had decided to torture him. When I returned to CIA headquarters that month, a senior officer in the Counterterrorism Center asked me if I wanted to be “trained in the use of enhanced interrogation techniques.” I declined. I said that I had a moral and ethical problem with torture and that - the judgment of the Justice Department notwithstanding - I thought it was illegal. Unfortunately, there were plenty of people in the U.S. government who were all too willing to allow the practice to go on. One of them was Gina Haspel, whom President Trump nominated Tuesday as the CIA’s next director. Putting Haspel in charge of the CIA would undo attempts by the agency - and the nation - to repudiate torture. The message this sends to the CIA workforce is simple: Engage in war crimes, in crimes against humanity, and you’ll get promoted. Don’t worry about the law. Don’t worry about ethics. Don’t worry about morality or the fact that torture doesn’t even work. Go ahead and do it anyway. We’ll cover for you. And you can destroy the evidence, too.
Note: The above was written by former CIA counterterrorism officer John Kiriakou, who was imprisoned for blowing the whistle on the CIA’s illegal torture program. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
The National Security Agency has apparently been way ahead of Apple or Amazon. The agency has at its disposal voice recognition technology that it employs to identify terrorists, government spies, or anyone they choose — with just a phone call, according to a report by The Intercept. By using recorded audio, the NSA is able to create a "voiceprint," or a map of qualities that mark a voice as singular, and identify the person speaking. According to a classified memo ... the agency has employed this technology since at least 2006, with the document referencing technology "that identifies people by the sound of their voices." In fact, the NSA used such technology during Operation Iraqi Freedom, when analysts were able to verify audio thought to be of Saddam Hussein speaking. It suggests that national security operatives had access to high-level voice technology long before Amazon, Apple and Google's solutions became cultural touchstones. A "voiceprint" is "a dynamic computer model of the individual's vocal characteristics," the publication explained, created by an algorithm analyzing features like pitch and mouth shape. Then, using the NSA's formidable bank of recorded audio files, the agency is able to match the speaker to an identity. Identifying people through their voiceprints is a skill at which the "NSA reigns supreme," according to a leaked document from 2008. And, they're only getting better.
Note: As this BBC article from 1999 shows, mass surveillance systems with voice recognition capability have been in use for many years. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Two New York Times reporters learned in 2004 that the George W. Bush administration was secretly wiretapping Americans, and collecting their phone and email records. The reporters’ attempt to publish their findings were thwarted by the administration’s intense and successful lobbying of their editors. That effort ... had an unlikely ally: Rep. Jane Harman of Los Angeles, the senior Democrat on the House Intelligence Committee. Details of the far-reaching, legally unauthorized surveillance program remained secret until the Times published the article in late 2005. The newspaper’s interactions with administration officials, and Harman’s role, were described by former Times reporter James Risen this month in the Intercept, the investigative publication where he now works. The story on the program known as Stellar Wind was ready for publication before the November 2004 election, when Bush was on the ballot, but NSA Director Michael Hayden and other administration officials told Times editors, in phone calls and face-to-face meetings, that publication would damage national security and endanger lives, Risen said. He said the officials were joined in that effort by Harman, one of a handful of congressional leaders who had been briefed on the program and were enlisted by the White House to contact the Times. Members of Congress learned later that the NSA had not been seeking warrants from a secret court, as required by law, before wiretapping calls.
Note: James Risen is a courageous hero who shared two Pulitzer Prizes for his reporting around 9/11 and massive government surveillance. His recent article in The Intercept describes how a "marketplace of secrets in Washington" supports the US national security apparatus, and is used by corrupt government officials to manipulate the news.
Jake Williams, [a] cybersecurity expert, was dismayed to discover that ... the Shadow Brokers, a mysterious group that had somehow obtained many of the hacking tools the United States used to spy on other countries [had] identified him - correctly - as a former member of the National Security Agency’s hacking group, Tailored Access Operations, or T.A.O., a job he had not publicly disclosed. Then the Shadow Brokers astonished him by dropping technical details that made clear they knew about highly classified hacking operations that he had conducted. America’s largest and most secretive intelligence agency had been deeply infiltrated. Current and former agency officials say the Shadow Brokers disclosures, which began in August 2016, have been catastrophic for the N.S.A., calling into question its ability to protect potent cyberweapons and its very value to national security. Fifteen months into a wide-ranging investigation by the agency’s counterintelligence arm, known as Q Group, and the F.B.I., officials still do not know whether the N.S.A. is the victim of a brilliantly executed hack ... an insider’s leak, or both. Three employees have been arrested since 2015 for taking classified files, but there is fear that one or more leakers may still be in place. There is broad agreement that the damage from the Shadow Brokers already far exceeds the harm to American intelligence done by Edward J. Snowden, the former N.S.A. contractor who fled with four laptops of classified material in 2013. For decades after its creation in 1952, the N.S.A. — No Such Agency, in the old joke — was seen as all but leakproof. But since Mr. Snowden flew away with hundreds of thousands of documents in 2013, that notion has been shattered.
Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
In the summer of 1977, Capitol Hill was gripped by revelations of the CIA’s top-secret MK-Ultra mind control research program, targeting unsuspecting American citizens, in some cases by luring them to brothels to be fed LSD-laced cocktails. Hearings that summer, chaired by Sen. Edward M. Kennedy ... touched some of the country’s rawest nerves. The August 1977 MK-Ultra hearings specifically explored what seemed like an outlandish idea straight out of science fiction: the possibility of government mind control. Kennedy ... had a complex relationship with the CIA, given what the agency knew about the assassinations of his brothers Robert and John in the 1960s. One MK-Ultra project involved CIA-run brothels in San Francisco and New York City, established specifically to study LSD’s effects on unsuspecting adults. Project Midnight Climax ran in San Francisco from 1955 to 1965. Operatives reported that it helped refine sexual blackmail tactics, surveillance technology, LSD’s use in interrogations and how to better use empathy as an investigation tactic. Brothel operatives later [admitted] that they had dosed unsuspecting subjects at nearby restaurants, bars and beaches. In one case, a U.S. marshal held up a San Francisco bar with his service revolver after an MK-Ultra agent slipped LSD into his bourbon and soda. In the early 1970s, CIA Director Richard Helms, who ran the agency from 1966 to 1973, along with one of MK-Ultra’s architects, Sidney Gottlieb, ordered all the relevant paperwork destroyed.
Note: Read more about Midnight Climax and the CIA's MK ULTRA program. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.
British intelligence agency MI5 was reportedly warned by its US counterpart that Salman Abedi was planning an attack on UK soil, three months before he blew himself up outside an Ariana Grande concert in Manchester. FBI agents are said to have informed British officials that the 22-year-old was part of a North African Islamic State cell based in the north west of England that was plotting an attack in the UK. “In early 2017 the FBI told MI5 that Abedi belonged to a North African terror gang based in Manchester, which was looking for a political target in this country," a security source [said]. “The information came from the interception of his communications by US federal agents, who had been investigating Abedi since the middle of 2016, and from information unearthed in Libya, where his family was linked to terrorist groups. “Following this US tip-off, Abedi and other members of the gang were scrutinised by MI5. It was thought at the time that Abedi was planning to assassinate a political figure. But nothing came of this investigation and, tragically, he slipped down the pecking order of targets.” MI5 has faced questions over the fact that Abedi was on its radar but slipped through the net in order to carry out the attack that killed 22 people and seriously injured 64. Police have so far arrested 14 people on suspicion of terror offences in conjunction with the Manchester attack, two of whom have since been released.
Note: Read this revealing article for more evidence that the Manchester atrocity was possibly allowed to happen, or worse. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
The C.I.A. developed tools to spy on Mac computers by injecting software into the chips that control the computers’ fundamental operations, according to the latest cache of classified government documents published on Thursday by WikiLeaks. All of the surveillance tools that have been disclosed were designed to be installed on individual phones or computers. But the effects could be much wider. Cisco Systems, for example, warned customers this week that many of its popular routers, the backbone of computer networks, could be hacked using the C.I.A.’s techniques. Julian Assange, the founder of WikiLeaks, has offered to share the precise software code used by the C.I.A.’s cyberweapons with the affected companies. But major tech companies have been reluctant to directly engage with him for fear of violating American laws. The spy software described in the latest documents was designed to be injected into a Mac’s firmware, a type of software preloaded in the computer’s chips. It would then act as a “listening post,” broadcasting the user’s activities to the C.I.A. whenever the machine was connected to the internet. Tools that operate at the chip level can hide their existence and avoid being wiped out by routine software updates. Under an agreement struck during the Obama administration, intelligence agencies were supposed to share their knowledge of most security vulnerabilities with tech companies. The C.I.A. documents suggest that some key vulnerabilities were kept secret.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
In a heavily protected military base some 15 miles south of Washington, D.C., sits the massive headquarters of a spy agency few know exists. The [National Geospatial-Intelligence Agency, or] NGA remains by far the most shadowy member of the Big Five spy agencies, which include the CIA and the National Security Agency. Despite its lack of name recognition, the NGA’s headquarters is the third-largest building in the Washington metropolitan area. The NGA is to pictures what the NSA is to voices. Its principal function is to analyze the billions of images and miles of video captured by drones ... and spy satellites. The agency has never been involved in domestic spy scandals. However, there’s reason to believe that this will change. In March 2016, the Pentagon released the results of an investigation initiated by the Department of Defense’s Office of Inspector General to examine military spy drones in the United States. The report ... revealed that the Pentagon used unarmed surveillance drones over American soil. The investigation also quoted from an Air Force law review article pointing out the growing concern that technology designed to spy on enemies abroad may soon be turned around to spy on citizens at home. In 2016, unbeknownst to many city officials, police in Baltimore began conducting persistent aerial surveillance using a system developed for military use in Iraq. Few civilians have any idea how advanced these military eye-in-the-sky drones have become.
Note: This article was written by former ABC News producer James Bamford, whose 2001 article on Operation Northwoods revealed that the top Pentagon generals signed off on top-secret plans which stated, "We could blow up a U.S. ship in Guantanamo Bay and blame Cuba," and, "casualty lists in U.S. newspapers would cause a helpful wave of national indignation." And showing the level of major media complicity, only ABC News reported on this. For more, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Leaked court documents raise concerns that the murder of the Honduran environmentalist Berta Cáceres was an extrajudicial killing planned by military intelligence specialists linked to the country’s US–trained special forces. Cáceres was shot dead a year ago while supposedly under state protection after receiving death threats over her opposition to a hydroelectric dam. The murder of Cáceres, winner of the prestigious Goldman environmental prize in 2015, prompted international outcry and calls for the US to revoke military aid to Honduras, a key ally in its war on drugs. Eight men have been arrested in connection with the murder, including one serving and two retired military officers. Officials have denied state involvement in the activist’s murder, and downplayed the arrest of the serving officer Maj Mariano Díaz. But ... Díaz, a decorated special forces veteran, was appointed chief of army intelligence in 2015. Another suspect, Lt Douglas Giovanny Bustillo joined the military on the same day as Díaz. Díaz and Bustillo both received military training in the US. A third suspect, Sgt Henry Javier Hernández, was a former special forces sniper, who had worked under the direct command of Díaz. Last year, the Guardian reported that a former Honduran soldier said he had seen Cáceres’s name on a hitlist that was passed to US-trained units. Sgt Rodrigo Cruz said that two elite units were given lists featuring the names and photographs of activists – and ordered to eliminate each target.
Note: The Western Hemisphere Institute for Security Cooperation, formerly known as the School of the Americas, reportedly graduated more than 500 human rights abusers. The identities of many other US-trained troops operating in other countries remain hidden by US courts. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
The Department of Justice proudly announced the first FBI terror arrest of the Trump administration on Tuesday: an elaborate sting operation that snared a 25-year-old Missouri man who had no terrorism contacts besides the two undercover FBI agents who paid him to buy hardware supplies they said was for a bomb - and who at one point pulled a knife on him and threatened his family. Robert Lorenzo Hester of Columbia, Missouri, didn’t have the $20 he needed to buy the 9-volt batteries, duct tape, and roofing nails his new FBI friends wanted him to get, so they gave him the money. The agents noted in a criminal complaint that Hester, who at one point brought his two small children to a meeting because he didn’t have child care, continued smoking marijuana despite professing to be a devout Muslim. But according to the DOJ press release, Hester had plans to conduct an “ISIS-sponsored terrorist attack” on President’s Day that would have resulted in mass casualties had it succeeded. News reports breathlessly echoed the government’s depiction of Hester as a foiled would-be terrorist. But the only contact Hester had with ISIS was with the two undercover agents. There appears to be little to suggest that [Hester] had the wherewithal or capacity to carry out a terrorist attack. His case is similar to many others in which individuals in financial, legal, or psychological distress have been befriended by undercover FBI agents or government informants and coaxed into developing a terrorist plot.
Note: The FBI has been stepping up its use of stings in ISIS cases. Read how an FBI mole posing as a potential lover recently convinced a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
Using loopholes it has kept secret for years, the FBI can in certain circumstances bypass its own rules in order to send undercover agents or informants into political and religious organizations, as well as schools, clubs, and businesses. If the FBI had its way, the infiltration loopholes would still be secret. They are detailed in a mammoth document obtained by The Intercept, an uncensored version of ... the Domestic Investigations and Operations Guide, or DIOG. If an undercover agent wants to pose as a university student and take classes, or if an FBI handler wants to tell an informant to attend religious services - two examples straight out of the rulebook - he or she must obtain a supervisor’s approval and attest both to the operation’s importance and to its compliance with constitutional safeguards. But all those rules go out the window if an agent decides the group is “illegitimate” or an informant spies on the group of his or her own accord. Civil rights groups ... worry that the FBI has made use of precisely these kinds of loopholes, silently undermining cherished freedoms enshrined after a dark chapter of FBI history: the COINTELPRO program in the 1950s and ’60s, when the FBI spied on, harassed, and tried to discredit leftists, civil rights leaders, and anti-war protestors. The exposure of COINTELPRO led to a famous Senate investigation and to institutional reform. The DIOG, despite being hundreds of pages of dense bureaucracy, actually documents a loosening of the standards enacted to rein in the FBI after COINTELPRO and other scandals ... after the 9/11 attacks.
Note: Read a detailed essay on the FBI's COINTELPRO program from the well-researched online book Lifting the Veil. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the erosion of civil liberties.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.