Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
We might already be living through the first world cyberwar – it’s just that we haven’t acknowledged or named it yet. What might a timeline of that war look like? Well, 2007 seems like a good bet as a starting point – with a concerted series of cyber-attacks on Estonia. In 2008 there were events that a historian might weave into a narrative of a global cyberwar, when several underwater internet cables were cut during the course of the year, interrupting internet communication and particularly affecting the Middle East. In 2010 the Stuxnet worm was used to attack Iran’s nuclear program. Another event from 2010, the WikiLeaks American embassy cables release ... would be irresistible for a historian to refer to in this context. One of the things that makes the first world cyberwar different from conventional warfare [is] the mix of nation states being involved with pressure groups, whistleblowers and hackers. Historians will be unable to ignore ... the 2016 US election campaign being influenced by alleged hacked and leaked emails. What reason is there to suppose that these events might eventually be grouped together as a single world cyberwar by historians? It is the idea that hostilities might formally come to an end. You can envisage a scenario where Russia, China and the US can see a mutual benefit in de-escalating cyber-attacks between the three of them.
Note: A 2007 New York Times article describes the formation of the Air Force Cyberspace Command to arm the US military in anticipation of widespread computer-based warfare. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
The US "got it wrong" about Saddam Hussein and Iraq, the CIA analyst who interrogated the former dictator has said. John Nixon had numerous conversations with the deposed leader and now says that America was critically mistaken about their intervention Iraq. In particular, he claims, the CIA’s view of Hussein’s attitude to using chemical weapons was wrong. During the interrogations, Mr Nixon asked Hussein if he’d ever thought of engaging in a pre-emptive strike with WMDs against US troops based in Saudi Arabia. According to Mr Nixon ... the former dictator’s reply was: “We never thought about using weapons of mass destruction. It was not discussed. Use chemical weapons against the world? Is there anyone with full faculties who would do this?” Mr Nixon admitted this was “not what we had expected to hear”. The main reason the American and British governments used to justify the controversial invasion of Iraq was the supposed risk posed by the WMDs possessed by the country. Nearly 200,000 people have died in the conflicts that followed. Iraq is now widely regarded as a failed state, and still suffers from widespread violence. Thirteen years on, at least 5,000 American troops remain in the country. Mr Nixon also spoke out against Mr Bush, who was rude towards him and reportedly made inappropriate jokes about the missing WMDs. Mr Bush blamed the CIA for Iraq’s failures, Mr Nixon said, adding that he “called its analysis ‘guesswork’ while hearing only what he wanted to hear”.
Note: Have you noticed how every Arabic nation to which the U.S. has sent armed forces has ended up not with a stronger democracy, but in a situation of chaos? Do you think this might be intentional? The war machine makes huge profits from conditions of chaos. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
US intelligence agencies have concluded that Russia interfered in last month’s presidential election. Officials ... were told that intelligence agencies had found that individuals linked to the Russian government had provided WikiLeaks with thousands of confidential emails stolen from the Democratic National Committee (DNC) and others. The emails were steadily leaked via WikiLeaks ... revealing that DNC figures had colluded to harm the chances of [Clinton’s] nomination rival Bernie Sanders, and later giving examples of collusion between her campaign and figures in the media to blindside Trump in debates. The Kremlin has rejected the hacking accusations. WikiLeaks founder Julian Assange has previously said the DNC leaks were not linked to Russia. A ... senior official cited by the Washington Post conceded that intelligence agencies did not have specific proof that the Kremlin was “directing” the hackers. Craig Murray, the former UK ambassador to Uzbekistan, who is a close associate of Assange, [said of] the CIA claims: “They are absolutely making it up ... I know who leaked them. “They are certainly not Russian and it’s an insider. It’s a leak, not a hack; the two are different things. “If ... the CIA’s statement refers to people who are known to be linked to the Russian state, they would have arrested someone. America has not been shy about arresting whistleblowers and it’s not been shy about extraditing hackers. They plainly have no knowledge whatsoever.”
Note: The Guardian newspaper's website removed all front page links to the above article just three hours after it was published. In its place, the Guardian ran a new article that was entirely supportive of what Wikileaks affiliate Craig Murray calls "the CIA’s blatant lie" about the leaked DNC emails. A short essay by WantToKnow.info team member Mark Bailey explores this apparent media manipulation.
The CIA has concluded in a secret assessment that Russia intervened in the 2016 election to help Donald Trump win the presidency, rather than just to undermine confidence in the U.S. electoral system, according to officials briefed on the matter. Intelligence agencies have identified individuals with connections to the Russian government who provided WikiLeaks with thousands of hacked emails from the Democratic National Committee and others. “It is the assessment of the intelligence community that Russia’s goal here was to favor one candidate over the other, to help Trump get elected,” said a senior U.S. official. “That’s the consensus view.” The CIA shared its latest assessment with key senators in a closed-door briefing on Capitol Hill last week. The CIA presentation ... fell short of a formal U.S. assessment produced by all 17 intelligence agencies. A senior U.S. official said there were minor disagreements among intelligence officials about the agency’s assessment, in part because some questions remain unanswered. For example, intelligence agencies do not have specific intelligence showing officials in the Kremlin “directing” the identified individuals to pass the Democratic emails to WikiLeaks. Some key ... lawmakers have continued to question the quality of evidence supporting Russian involvement. “I’ll be the first one to come out and point at Russia if there’s clear evidence, but there is no clear evidence - even now,” said [chairman of the House Intelligence Committee] Devin Nunes.
Note: The above article comes on the heels of the Washington Post's promotion of an anti-Russian "McCarthyite blacklist" which smeared dozens of U.S. news sites as “routine peddlers of Russian propaganda.” For more along these lines, see concise summaries of deeply revealing news articles on elections corruption and the manipulation of public perception.
Vladimir K. Bukovsky, a tireless opponent of Soviet leaders and President Vladimir V. Putin of Russia, is not a man easily put off his stride. But he got knocked sideways when British police officers banged on the front door of his home ... and informed him that they had “received information about forbidden images” in his possession. He faced five charges of making indecent images of children, five charges of possession of indecent images of children and one charge of possession of a prohibited image. After Mr. Bukovsky, 73, entered a not-guilty plea, [the case] was delayed [following] a prosecution request for more time to review an independent forensic report on what had been found on Mr. Bukovsky’s computers and how an unidentified third party had probably put it there. Mr. Bukovsky ... insisted that he was the victim of a new and particularly noxious form of an old K.G.B. dirty trick known as kompromat, the fabrication and planting of compromising or illegal material. Old-style kompromat featured ... a wide range of other primitive entrapment techniques. Today, however, kompromat has become allied with the more sophisticated tricks of cybermischief-making. Hacking is not only a good way to get real information ... but a relatively easy and usually untraceable way to plant fake information. This blurring of all boundaries between truth and falsehood in the service of operational needs has created a climate in Russia in which even the most serious and grotesque accusations ... are simply a currency for settling scores.
Note: Hackers from any country's intelligence services could plant child porn on anyone's computer so that they would then be arrested and convicted. What a wild world we live in! For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
In the trove of documents provided by former National Security Agency contractor Edward Snowden is a treasure. It begins with a riddle: "What do the President of Pakistan, a cigar smuggler, an arms dealer, a counterterrorism target, and a combatting proliferation target have in common? They all used their everyday GSM phone during a flight." This riddle appeared in 2010 in SIDtoday, the internal newsletter of the NSA's Signals Intelligence Directorate, or SID, and it was classified "top secret." It announced the emergence of a new field of espionage that had not yet been explored: the interception of data from phone calls made on board civil aircraft. In a separate internal document from a year earlier, the NSA reported that 50,000 people had already used their mobile phones in flight as of December 2008, a figure that rose to 100,000 by February 2009. In a 2012 presentation, Government Communications Headquarters, or GCHQ ... disclosed a program called "Southwinds," which was used to gather all the cellular activity, voice communication, data, metadata, and content of calls on board commercial aircraft. To spy on a telephone, all that was required was that the aircraft be cruising at an altitude above 10,000 feet. Today, approximately 100 companies permit in-flight use of telephones. This will further extend the scope of espionage by providing a pool of potential targets comprising several hundreds of thousands of people. This implies a population that goes far beyond terrorist targets.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
In your Monday editorial, “Russia’s roulette,” you mentioned the “alarming evidence” of my government’s alleged involvement in the U.S. presidential elections. I do believe that it’s just nonsense, but if you insist that it’s true, then it would be interesting and necessary to see the evidence. I am sure that your respected newspaper meticulously worked through all the proofs before publishing the above-mentioned editorial. Unfortunately, nobody, including my government, despite numerous official requests, has never been presented with the onus probandi. The latter will not come from just repeating the unsubstantiated accusations over and over again or referring to unknown “independent researchers.” As far as I know, (National Security Agency Director) Adm. Michael Rogers in his recent interview with Wall Street Journal has never mentioned RUSSIA, while the official statement of Oct. 7 that has been repeatedly referred to, has never INDICTED Russia (“believing” and even being “confident” is something very different). Without evidence, in every state of law, with the United States being one of them, the principle of the presumption of innocence prevails. And accusations remain pure speculation. In this case, ill-intentioned.
Note: The above was written by Maxim Goncharov, a press attaché with the Russian Consulate in San Francisco. For more along these lines, see concise summaries of deeply revealing elections news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our Elections Information Center.
The heads of the Pentagon and the nation’s intelligence community have recommended to President Obama that the director of the National Security Agency, Adm. Michael S. Rogers, be removed. The recommendation, delivered to the White House last month, was made by Defense Secretary Ashton B. Carter and Director of National Intelligence James R. Clapper Jr.. The news comes as Rogers is being considered by President-elect Donald Trump to be his nominee for director of national intelligence to replace Clapper as the official who oversees all 17 U.S. intelligence agencies. In a move apparently unprecedented for a military officer, Rogers, without notifying superiors, traveled to New York to meet with Trump on Thursday at Trump Tower. That caused consternation at senior levels of the administration, according to the officials, who spoke on the condition of anonymity. Carter has concerns with Rogers’s performance, officials said. The driving force for Clapper ... was the separation of leadership roles at the NSA and U.S. Cyber Command, and his stance that the NSA should be headed by a civilian. The expectation had been that Rogers would be replaced before the Nov. 8 election. Meanwhile, in February, Rogers ... merged the agency’s spying and hacking arms with its computer-security division into one Directorate of Operations. That reorganization has only intensified the discontent that has marked Rogers’s tenure at the agency. “The morale is horrible,” one former senior official said.
Note: Edward Snowden tweeted this article stating, "The real story you're not hearing about is a revolt within the US Intelligence Community." For more along these lines, see concise summaries of deeply revealing news articles on corruption in the military and in intelligence agencies.
Investigators pursuing what they believe to be the largest case of mishandling classified documents in United States history have found that the huge trove of stolen documents in the possession of a National Security Agency contractor included top-secret N.S.A. hacking tools that two months ago were offered for sale on the internet. They have been hunting for electronic clues that could link those cybertools - computer code posted online for auction by an anonymous group calling itself the Shadow Brokers - to the home computers of the contractor, Harold T. Martin III, who was arrested in late August. But so far, the investigators have been frustrated in their attempt to prove that Mr. Martin deliberately leaked or sold the hacking tools. Mr. Martin ... has insisted that he got in the habit of taking material home so he could improve his skills and be better at his job. The material the F.B.I. found in his possession added up to “many terabytes” of information ... which would make it by far the largest unauthorized leak of classified material from the classified sector. That volume dwarfs the hundreds of thousands of N.S.A. documents taken by Edward J. Snowden. [Mr. Martin] long held a high-level clearance and for a time worked with the N.S.A.’s premier hacking unit, called Tailored Access Operations, which breaks into the computer networks of foreign countries and which developed the hacking tools.
Note: It was reported in 2014 that the NSA had developed specialized tools to covertly hack into computers on a mass scale by using automated systems. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
An alleged accomplice in the Sept. 11 terror attacks is to undergo surgery this week for decade-old damage from his “sodomy” in CIA custody, his attorney says. Defense attorney Walter Ruiz, a Navy Reserve officer, disclosed the upcoming surgery for his client, Mustafa al Hawsawi, 48, on the eve of pretrial hearings Tuesday in the case that accuses the Saudi Arabian Hawsawi and four other men of orchestrating the Sept. 11, 2001, terror attacks. Ruiz said a case prosecutor informed him of the procedure over the weekend. Defense lawyers have been litigating over conditions at the remote prison and, in the case of their client, have specifically sought medical intervention to treat a rectal prolapse that has caused Hawsawi to bleed for more than a decade. The disclosure comes days after The New York Times published a detailed account of former CIA and Guantánamo captives grappling with the aftereffects of torture. Hawsawi was denied a request to have a member of his legal team on standby near the surgery. He has sat gingerly on a pillow at the war court since his first appearance in 2008. But the reason was not publicly known until release of a portion of the so-called Senate Torture Report on the CIA program ... which described agents using quasi-medical techniques called “rectal rehydration” and “rectal re-feeding.” Former CIA captives like Hawsawi are segregated in a clandestine lockup called Camp 7 that has been described ... as having its own medical facility, the capabilities of which are not known.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
The United States paid over a million euros to the family of Giovanni Lo Porto, an Italian aid worker killed in a U.S. drone strike in January of last year, according to newly released documents. The 37-year-old Lo Porto died when CIA drones struck an al Qaeda compound where he was being held hostage along with Warren Weinstein, an American humanitarian worker. In a rare admission of responsibility, President Barack Obama acknowledged the strike and promised compensation for the families. The Intercept first reported that the family had reached a settlement with the U.S. government in July. The document also states that the agreement does not imply “a waiver of sovereign or personal immunity.” Lawyers for the Lo Porto family had pressed the Italian state prosecutor to consider a criminal case against the United States, while acknowledging that the chances of such a case going forward were slim. They also asked for more information from U.S. agencies about the strike and its aftermath. The U.S. has, in a few instances, paid hundreds of thousands of dollars to the families of civilians killed in attacks in Yemen, but has not publicly acknowledged doing so. Many human rights advocacy groups see a double standard in the silence of the U.S. government on the cases of non-Westerners who have died.
Note: The families of thousands of innocent citizens killed by US drones in the Middle East have received zero compensation. Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Years before anyone had ever heard of [Edward] Snowden, [Bill] Binney, a gifted cryptologist and mathematician, was pushing back against the NSA’s spying overreach. In October 2001 ... he resigned rather than participate in a clandestine, massively overpriced and questionably legal electronic spying system code-named Trailblazer. Eventually, the government came after him. [Binney] was thrilled by [Oliver] Stone’s powerful biopic of Snowden, who astounded the world with his massive exposure of the NSA’s global spying programs. "I think it will help people understand what is really going on behind the scenes. They are invading the privacy of everyone," he says. "They can turn on your cellphone and listen to you. They can turn on your camera and watch you." In 2013 ... James Clapper, the director of national intelligence, [lied] under oath during a congressional hearing about the NSA’s spying programs. Snowden was watching. He had also seen what had happened to Binney and fellow NSA executives Thomas Drake, Ed Loomis and Kirk Wiebe, whose homes were raided by FBI agents after The New York Times exposed the NSA’s secret spying programs in 2005. Drake, prosecuted under the 1917 Espionage Act, was eventually acquitted ... but his career was ruined. [Snowden's] critics insist he should have pursued his complaints internally, despite the persuasive examples of Binney and his comrades that such resistance is futile, even risky.
Note: Watch a free trailer or rent the whole documentary on this webpage. Read a revealing, detailed New York Times article on Oliver Stone and his profound work to expose corruption and manipulation through film. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Oliver Stone has taken aim at the US government for deceiving people about the levels of surveillance that exist in the country. His new film Snowden, about the controversial NSA informant Edward Snowden, received its world premiere. The drama ... tells of the former CIA employee’s discovery that the agency had constructed a system to spy on the public. “Americans don’t know anything about it because the government lies about it all the time,” Stone said at a press conference. “What’s going on now is pretty shocking. This story not only deals with eavesdropping but mass eavesdropping, drones and cyberwarfare. As Snowden said himself the other day, ‘It’s out of control, the world is out of control.’” The film also features a cameo from Snowden himself, who still resides at an undisclosed location in Russia while he searches for asylum elsewhere. Stone hopes that he may return to US ground but is doubtful. “Obama could pardon him and we hope so,” he said. “But he has vigorously prosecuted eight whistleblowers under the espionage act, which is an all-time record for an American president, and he’s been one of the most efficient managers of this surveillance world. It is the most extensive and invasive surveillance state that has ever existed and he’s built it up.” The film-maker ... likens [the current situation] to a George Orwell novel. “I never thought this could happen,” he said. “But from 2001 on, it’s very clear that something radical has changed. There’s more to it that meets the eye and whatever they tell you, you’ve got to look beyond.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on questionable intelligence agency practices and the disappearance of privacy.
Bolivia’s president Evo Morales has opened a new “anti-imperialist” military academy to counter US policies and military influence in Latin America. “If the empire teaches domination of the world from its military schools, we will learn from this school to free ourselves from imperial oppression,” the country’s first indigenous president said. “We want to build anti-colonial and anti-capitalist thinking with this school that binds the armed forces to social movements and counteracts the influence of the School of the Americas that always saw the indigenous as internal enemies,” he told a crowd that included the defense ministers of Venezuela and Nicaragua. Some Latin American officers trained at the US-based School of the Americas went on to commit atrocities under 20th century military dictatorships. In 2000, the academy at Fort Benning, Georgia, was renamed the Western Hemisphere Institute for Security Cooperation. Morales, who expelled the US ambassador and counter-narcotics agents in 2008, accused Washington of encouraging “congressional coups” such as the impending impeachment trial of suspended President Dilma Rousseff in Brazil. He also said the US promotes global terrorism through military interventions, citing the rise of the Islamic State group as an example. The re-inaugurated school carries the name of General Juan Jose Torres, a leftist who was Bolivia’s de facto president in 1970 and who expelled the Peace Corps for allegedly sterilizing indigenous women.
Note: The Western Hemisphere Institute for Security Cooperation, formerly known as the School of the Americas, graduated more than 500 human rights abusers. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
As part of an ongoing effort to exploit medical intelligence, the National Security Agency teamed up with the military-focused Defense Intelligence Agency to extract medical SIGINT from the intercepted communications of nonprofit groups starting in the early 2000s, a top-secret document shows. Medical intelligence can include information about disease outbreaks; the ability of a foreign regime to respond to chemical, biological, and nuclear attacks; the capabilities of overseas drugs companies; advances in medical technology; medical research, and the medical response capabilities of various governments, according to the document and others like it, provided by NSA whistleblower Edward Snowden. One of the more prominent examples of focused medical spying came in 2010, when the agency crafted a plan to stow tracking devices with medical supplies bound for an ill Osama bin Laden in order to locate the terrorist leader. One article from August 2003 identifies an NSA project to keep an eye on the evolution of biotechnology in various countries. Can we ... determine the specific features that would distinguish a Bio Warfare Program from a benign civilian pharmaceutical production effort? the author wrote, identifying a suspect Iranian [biological warfare] facility as a target for inspection. Medical intelligence gathering has continued since then, according to the so-called black budget proposed for the 2013 fiscal year, published in February 2012.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and terrorism.
One of the most tortured men in the history of Guantánamo Bay has received clearance from the wartime prison’s quasi-parole board to leave after nearly 14 years of detention without charge. Mohamedou Ould Slahi, a Mauritanian citizen whose harrowing account of his torture at Guantánamo Bay became an international bestseller in 2015, will soon leave behind the Cuban detention center where US military personnel contorted his body; bombarded him with noise; deprived him of sleep; stuffed his clothing with ice during a nighttime boat ride meant to to convince him he was headed to an even worse place; threatened his life; and threatened his mother with rape. A nonlegal panel representing various US security agencies tasked with assessing threats posed by Guantánamo’s 76 residual detainees, found Slahi to represent no “continuing significant threat to the security of the United States”. The consensus decision, reached on 14 July, was made public on Wednesday. A federal judge in 2010 [had previously] ordered him freed for lack of evidence untainted by torture to justify his detention, yet the US justice department appealed. In the summer of 2003, senior Guantánamo officials, believing Slahi was an important link to al-Qaida, sought and received permission from the Pentagon to torture him. US defense secretary Donald Rumsfeld personally approved Slahi’s torture. In his book, Slahi recalled ... that he would tell his tormentors whatever they wished to hear. “I don’t care, as long as you are pleased,” Slahi informed his interrogators.
Note: By the time Slahi's bestselling book Guantanamo Diary was published, leaked documents obtained by BBC News had revealed that more than 150 innocent people were detained at Guantanamo after being rounded up for no reason. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists.
The push by congressional Democrats to bar suspected terrorists from acquiring guns and explosives has focused renewed attention on the government’s secretive terrorist watch lists, which have grown exponentially since the 9/11 attacks. Since the mass shooting in a gay nightclub in Orlando on June 12, Democrats have endorsed various measures to get weapons out of the hands of people on the lists. The Orlando shooter, Omar Mateen, had been on the FBI’s terrorist watch list but was removed in 2014. His was one of approximately 800,000 names in that database, the most prominent of at least seven overlapping watch lists. The government does not release the exact number of watch lists or the specific criteria for getting on them. The no-fly list ... contained 16 people on Sept. 11, 2001. By 2014, it had grown to about 64,000 people. Civil liberties advocates [say] the watch lists are riddled with inaccurate and outdated information, nearly impossible to get off and stigmatize the people on them. The largest watch list is The Terrorist Identities Datamart Environment (TIDE), maintained by the National Counterterrorism Center. As of August 2014, it contained about 1.1 million names. The FBI’s Terrorist Screening Center ... maintains what is known as the government’s "consolidated Terrorist Watchlist." It contains about 800,000 names. Last year, [a] federal judge ruled that the government’s lack of effective procedures for people to challenge their inclusion on the no-fly list was unconstitutional.
Note: A 2013 New York Times article further describes the rapid expansion of these mysterious lists, which are made according to secret rules. Some people have reportedly been added to watch lists by federal air marshals simply to meet quotas. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
June 6 will be the third anniversary of The Guardian’s publication of top-secret documents provided by [Edward] Snowden that showed that the National Security Agency was collecting the telephone records of tens of millions of Americans. Mr. Snowden [has been] denounced ... as a traitor. [Former Secretary of State Hillary] Clinton said in a Democratic presidential debate [that], “He could have gotten all of the protections of being a whistle-blower.” Thomas Drake would disagree. Mr. Drake was a senior N.S.A. official who had also complained, 12 years earlier, about warrantless surveillance. He went up the chain of command [to] the Defense Department’s Office of Inspector General. Things did not go well. F.B.I. agents raided his house. He was forced to resign and was indicted on 10 felony charges arising from an alleged “scheme” to improperly “retain and disclose classified information.” He ultimately pleaded guilty to a misdemeanor for “exceeding authorized use of a government computer” in exchange for the government’s dropping the other charges. He now works at an Apple store. Mr. Snowden followed the Drake case closely in the news media and drew the obvious conclusion: Going through [official] channels was worse than a dead end. [John] Crane, a former assistant inspector general in the Defense Department who oversaw the whistle-blower program, has now come forward alleging that Mr. Drake was persecuted by the very officials in his office who were supposed to protect him.
Note: John Crane was forced out of the Pentagon in 2013. His story is told in a new book, titled, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Edward Snowden has called for a complete overhaul of US whistleblower protections after a new source from deep inside the Pentagon came forward with a startling account of how the system became a “trap” for those seeking to expose wrongdoing. The account of John Crane ... appears to undermine Barack Obama, Hillary Clinton and [others] who argue that there were established routes for Snowden other than leaking to the media. Crane, a longtime assistant inspector general at the Pentagon, has accused his old office of retaliating against a major surveillance whistleblower, Thomas Drake. Not only did Pentagon officials provide Drake’s name to criminal investigators, Crane told the Guardian, they destroyed documents relevant to his defence. Thomas Drake’s legal ordeal ruined him financially. His case served as a prologue to Snowden’s. In 2002, Drake and NSA colleagues contacted the Pentagon inspector general to blow the whistle on [a] tool, Trailblazer, for mass-data analysis. Crane, head of the office’s whistleblower unit, assigned investigators. For over two years, with Drake as a major source, they ... prepared a lengthy secret report [that] eventually [helped] to kill the program. As far as Crane was concerned, the whistleblower system was working. But after an aspect of the NSA’s warrantless mass surveillance leaked to the New York Times, Drake himself came under investigation and eventually indictment [for] hoarding documentation – exactly what inspector-general investigators tell their whistleblowers to do.
Note: John Crane was forced out of the Pentagon in 2013. His story is told in a new book, titled, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Of the 19 hijackers who carried out the Sept. 11 attacks, 15 were citizens of Saudi Arabia. What does that fact signify? According to senior U.S. officials, little or nothing. From the outset, they treated the national identity of the terrorists as incidental, connoting nothing of importance. Imagine if 15 Iraqis had perpetrated the attacks... In its final report, the 9/11 Commission said it “found no evidence that the Saudi government as an institution or senior Saudi officials individually” had funded Al Qaeda. This artfully crafted passage was ... designed to preserve the existing U.S.-Saudi relationship from critical scrutiny. The effort never fully succeeded, skeptics suspecting that there might be more to the story. Today those doubts find expression in demands to declassify 28 pages of a congressional investigation said to detail Saudi relations with and support for the Al Qaeda terrorist network before September 2001. Whether the 28 pages sustain or refute suspicions of Saudi involvement in the Sept. 11 attacks will remain impossible to say absent ... executive action. Yet implicit in this dispute is an issue of even greater moment: Who ultimately exercises jurisdiction over truth? The foreign policy establishment insists that the 28 pages remain secret; not only might the document challenge the state's preferred Sept. 11 narrative, but the demands for its declassification also call into question the establishment's very authority to control that narrative.
Note: Read more on the Saudi role in Sept. 11 and the hidden 9/11 report pages. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.