Intelligence Agency News StoriesExcerpts of Key Intelligence Agency News Stories in Major Media
Note: This comprehensive list of intelligence agencies news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
In the month since veteran journalist Seymour Hersh published his bombshell report alleging that President Joe Biden personally authorized a covert action to bomb the Nord Stream pipelines, we've seen a frenzy of speculation, detailed dissection of Hersh's specific assertions, and the emergence of competing narratives both supporting and denouncing the report. On March 7, the New York Times and the German newspaper Die Zeit both published stories that thicken the plot. The Times story was based on a narrative clearly being pushed by U.S. intelligence sources that "a pro-Ukrainian group carried out the attack." If the bombing of the Nord Stream pipelines was, as Hersh alleges, directed by the U.S., then the leaked suggestion that the culprits were a "pro-Ukrainian group" could indicate a nascent effort at floating a cover story. No one has claimed responsibility for this attack, but there are recent precedents for foreign actors taking credit for U.S. operations to conceal Washington's involvement. Military officials have lied or misled the public ... throughout U.S. history. There is no U.S. law or rule prohibiting the government from promoting a false alternative explanation to conceal an operation. "This is an established practice in military operations and intelligence activities where it is often known as â€cover and deception,'" [said former Government Secrecy Project director Steven Aftergood]. "Sometimes, in order to maintain the operational security of X, you have to declare that it is actually Y."
Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
We are stuck in a never ending cycle of disaster that has led to one giant sense-making crises. False flag terrorism ... refers to governments creating, supporting, or staging events, like acts of terrorism in their own country and on their own citizenry, and then blaming it on someone else. Sometimes events can be created and even staged, and other times events are completely real yet the narrative we receive is where the deception lies. Either way, in many cases these events are used for control and/or political and financial gain. Take, for example, Operation Northwoods. This was a plan hatched by the US government in the early 1960s to fool the American public and the international community into supporting a war against Cuba in order to oust Fidel Castro. The plan included blowing up a US ship, attacking a US military base, sinking and blowing up boats of Cuban refugees, hijacking planes, and orchestrating violent terrorism in multiple US cities against American citizens. And of course, blaming Cuba for these actions. 9/11 could perhaps be one of the best examples of false flag terrorism, but the evidence that has lead the majority of people to feel this sentiment has not seen the light of day within the mainstream. There are many similarities between 9/11 and COVID, and in my mind COVID has been a clear act of bioterrorism by the same entities who proposed the â€solution.' These included vaccine mandates, mask mandates and more, which we are likely to see resurface again in the future.
Note: Read more about false flag terrorism. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
The FBI and the Defense Department were actively involved in research and development of facial recognition software that they hoped could be used to identify people from video footage captured by street cameras and flying drones, according to thousands of pages of internal documents that provide new details about the government's ambitions to build out a powerful tool for advanced surveillance. The documents, revealed in response to an ongoing Freedom of Information Act lawsuit the American Civil Liberties Union filed against the FBI, show how closely FBI and Defense officials worked with academic researchers to refine artificial-intelligence techniques that could help in the identification or tracking of Americans without their awareness or consent. Many of the records relate to the Janus program, a project funded by the Intelligence Advanced Research Projects Agency, or IARPA. The improved facial recognition system was ultimately folded into a search tool, called Horus, and made available to the Pentagon's Combating Terrorism Technical Support Office, which helps provide military technologies to civilian police forces. No federal laws regulate how facial recognition systems can be used. The tool's use in domestic mass surveillance would be a "nightmare scenario," said Nathan Wessler, a deputy director at the ACLU. "It could give the government the ability to pervasively track as many people as they want for as long as they want. There's no good outcome for that in a democratic society."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The Central Intelligence Agency has for years been collecting in bulk, without a warrant, some kind of data that can affect Americans' privacy. At the same time, [the C.I.A.] declared that a report about the same topic, which had prompted the letter, must remain fully classified. That report, called "Deep Dive II," was part of a set of studies by a watchdog board scrutinizing intelligence community operations under Executive Order 12333. In March 2021, the Senate Intelligence Committee received a copy of the report. Two Democrats on the panel, Senators Ron Wyden of Oregon and Martin Heinrich of New Mexico, urged Avril D. Haines, the director of national intelligence, and William J. Burns, the C.I.A. director, to declassify the activity. The senators suggested that its hidden existence cut against Americans' understanding that various pieces of legislation enacted in recent years "limit and, in some cases, prohibit the warrantless collection of Americans' records." In 2015, Congress banned bulk collection of telecommunications metadata under the Patriot Act and limited other types of bulk collection by the F.B.I. under laws governing domestic activities like the Foreign Intelligence Surveillance Act, or FISA. Yet "the C.I.A. has secretly conducted its own bulk program" under Executive Order 12333, the senators wrote. "It has done so entirely outside the statutory framework that Congress and the public believe govern this collection, and without any of the judicial, congressional or even executive branch oversight."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Antiterrorist moral fervor and ideological blinders propelled the U.S. into its biggest foreign policy blunder since World War Two. The U.S. government constantly embellished the storyline to demonize the communist opposition. A CIA operative provided materials for a massive bomb that ripped through a main square in Saigon in 1952. A Life magazine photographer was waiting on the scene, and his resulting snap appeared with a caption blaming the carnage on Viet Minh Communists. The Kennedy administration sought credibility by profoundly deceiving the American people and Congress regarding its Vietnam policy. In August 1963, South Vietnamese Special Forces "carried out midnight raids against Buddhist pagodas throughout the country. More than 1400 people, mostly monks were arrested and many of them were beaten," according to the Pentagon Papers. The CIA was bankrolling these Special Forces, which were supposed to be used for covert operations against the Viet Cong or North Vietnam, not for religious repression. The Johnson administration exploited the terrorist label to sway Americans to support greater U.S. Involvement in Vietnam. In a special message to Congress on May 18, 1964 seeking additional fund for Vietnam, LBJ declared, "the Viet Cong guerrillas, under orders from their Communist masters in the North, have intensified terrorist actions against the peaceful people of South Vietnam. This increased terrorism requires increased response."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and terrorism from reliable major media sources.
Genaro GarcĂa Luna, Mexico's former top law enforcement official known as the "architect" of the Mexican side of the drug war, was found guilty in New York federal court of collaborating with the Sinaloa cartel, the biggest organized crime group in North America. For years, GarcĂa Luna was the U.S. government's most trusted ally in the war on drugs. As public security secretary, he wielded incredible power, overseeing Mexico's Federal Police, the prison network, and a vast intelligence-gathering infrastructure, while working with the Drug Enforcement Administration, FBI, CIA, and Department of Homeland Security in the fight against Mexican cartels. The case portrayed GarcĂa Luna and his network of corrupt officials as a handful of bad apples, and what U.S. officials knew about GarcĂa Luna's illicit activities went mostly unexplored, despite the government's role in providing funding, equipment, and training that has fueled drug-related violence. GarcĂa Luna was found guilty of all five charges, including drug trafficking and continuing a criminal enterprise. Prosecutors alleged that he received around $274 million in bribes from the cartel from 2001 to 2012, first as head of the Federal Investigative Agency, the Mexican equivalent of the FBI, and then as secretary of public security. GarcĂa Luna left public office in 2012 following a change in presidency and moved to Miami where he started a security consulting company and lived a lavish lifestyle.
Note: The War on Drugs has been described as a trillion dollar failure. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in intelligence agencies from reliable major media sources.
It has now been one week since Seymour Hersh published an in-depth report claiming that the Biden administration deliberately blew up the Nord Stream II gas pipeline without Germany's consent or even knowledge – an operation that began planning long before the Russian invasion of Ukraine. Hersh – the journalist who broke the stories of the My Lai Massacre, the CIA spying program and the Abu Ghraib torture scandal – claims that in June, U.S. Navy divers traveled to the Baltic Sea and attached C4 explosive charges to the pipeline. President Biden himself ordered its destruction. All understood ... that, if caught, it would be seen as a flagrant "act of war" against their allies. Despite this, corporate media have overwhelmingly ignored the Pulitzer Prize-winning reporter's bombshell. A MintPress News study analyzed the 20 most influential publications in the United States, according to analytics company Similar Web, and found only four mentions of the report between them. This lack of interest cannot be explained due to the report's irrelevance. If the Biden administration really did work closely with the Norwegian government to blow up Nord Stream II, causing billions of dollars worth of immediate damage and plunging an entire region of the world into a freezing winter without sufficient energy, it ranks as one of the worst terrorist attacks in history. The Nord Stream attack was also one of the world's worst ecological disasters, constituting the largest single leak of methane in history.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
In June 2017, The Intercept published a leaked N.S.A. document, which it claimed revealed "a months-long Russian hacking effort against the U.S. election infrastructure." Ever since, it has been an article of faith in the mainstream media and among Democratic politicians that Russian G.R.U. cyberwarriors "hacked" the 2016 election. Moreover, Reality Winner, the N.S.A. analyst who leaked the document and ended up in jail as a result, has been elevated to the status of a heroic whistleblower. There are strong grounds to believe Winner unwittingly walked into a trap laid by the C.I.A. Winner has always claimed she acted alone, and there is no reason to doubt that she felt it was her patriotic duty to release the document. But her clumsiness, naivety and incompetence suggest she may well be easily manipulable, and a great many individuals and organizations had an interest in the dud intelligence report's release. Foremost among them, elements of the C.I.A. loyal to John Brennan, Agency director between 2013 and January 2017. Brennan fudged ... findings to keep the F.B.I. Trump-Russia "collusion" investigation alive. Launched by the Bureau in 2016, it found no evidence Trump or members of his campaign were conspiring with Moscow. It is an obvious question whether Winner's leak – in addition to furthering the RussiaGate fiction and damaging Trump – also served to discredit the N.S.A. by creating the illusion it had been asleep at the wheel over Kremlin meddling.
Note: Listen to audio of renowned journalist Seymour Hersch debunking the intelligence agency lie that Russia was responsible for the 2016 DNC email leaks, which exposed corruption in the party. Reality Winner's leak gave credence to this lie. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
The "Twitter files" revealed an FBI operation to monitor and censor social media content. Dozens of FBI employees worked on the identification and removal of material on a wide range of subjects and that Twitter largely carried out their requests. Nor was it just the FBI, apparently. Emails reveal FBI figures like a San Francisco assistant special agent in charge asking Twitter executives to "invite an OGA" (or "Other Government Organization") to an upcoming meeting. A week later, Stacia Cardille, a senior Twitter legal executive, indicated the OGA was the CIA, an agency under strict limits regarding domestic activities. Twitter's own ranks included dozens of ex-FBI agents and executives. The dozens of disclosed emails ... do not include still-undisclosed but apparent government coordination with Facebook and other social media companies. Much of that work apparently was done through the multi-agency Foreign Influence Task Force (FITF), which operated secretly it seems to censor citizens. This is a First Amendment violation. The Twitter files have substantiated long-standing concerns over "censorship by surrogate" or proxy. As with other amendments like the Fourth Amendment, which protects against unreasonable searches or seizures, the government cannot use private agents to do indirectly what it cannot do directly. Just as a police officer cannot direct a security guard to break into an apartment and conduct a search, the FBI cannot use Twitter to censor Americans.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
A war between China and Taiwan will be extremely good for business at America's Frontier Fund ... according to audio from a February 1 event. The remarks occurred at a tech finance symposium hosted at the Manhattan offices of Silicon Valley Bank. "If the China-Taiwan situation happens, some of our investments will 10x, like overnight," [a] person who identified as "Tom" said. "So I don't want to share the name, but the one example I gave was a critical component that ... the total market value is $200 million, but it is a critical component to a $50 billion market cap. That's like a choke point, right. And so if it's only produced in China, for example, and there's a kinetic event in the Pacific, that would 10x overnight, like no question about it. There's a couple of different things like that." AFF is surely not the only venture fund that would see stratospheric returns throughout their portfolio in the case of a destabilizing global crisis, like a "kinetic event in the Pacific" – that is to say, war. Gilman Louie, AFF's co-founder and current CEO, serves as chair of the National Intelligence University, advises Biden through his Intelligence Advisory Board, and was tapped for the State Department's Foreign Affairs Policy Board. Louie previously ran In-Q-Tel, the CIA's venture capital arm. In other words, AFF stands to massively profit from a geopolitical crisis while its CEO advises the Biden administration on geopolitical crises. AFF was founded last year with support from former Google CEO Eric Schmidt.
Note: While the detection of a Chinese spy balloon drums up significant fear and outrage over hostile foreign "threats," an incisive article reveals how US surveillance of foreign countries is quite common, including their recent expansion of military bases in Southeast Asia to monitor and surveil China. Furthermore, many independent journalists are questioning the war-fueling narrative that China is a threat to national security. Watch an insightful analysis uncovering the deeper story of what's behind the growing tensions between the US and China.
In 2017, the CIA had plotted to kidnap or assassinate Julian Assange, the founder of WikiLeaks, who had taken refuge five years earlier in the Ecuador embassy in London. A senior US counter-intelligence official said that plans for the forcible rendition of Assange to the US were discussed "at the highest levels" of the Trump administration. The informant was one of more than 30 US officials – eight of whom confirmed details of the abduction proposal – quoted in a 7,500-word investigation by Yahoo News into the CIA campaign against Assange. The plan was to "break into the embassy, drag [Assange] out and bring him to where we want", recalled a former intelligence official. Another informant said that he was briefed about a meeting in the spring of 2017 at which President Trump had asked if the CIA could assassinate Assange and provide "options" about how this could be done. The Trump-appointed head of the CIA, Mike Pompeo, said publicly that he would target Assange and WikiLeaks as the equivalent of "a hostile intelligence service". Top intelligence officials intended to decide themselves who is and who is not a journalist, and lobbied the White House to redefine other high-profile journalists as "information brokers", who were to be targeted as if they were agents of a foreign power. In 2013 ... a team of 120 counter-intelligence officers ... failed to find a single person in Iraq and Afghanistan who had died because of the disclosures by WikiLeaks.
Note: CIA interest in assassinating Assange coincided with Wikileaks' publication of leaked CIA hacking tools. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
President Joe Biden's administration released more than 13,000 records of President John F. Kennedy's assassination Thursday, but it fell short of fully complying with the spirit of a 30-year-old law demanding transparency by now. With Thursday's action, about 98% of all documents related to the 1963 killing have now been released and just 3% of the records remain redacted in whole or in part, according to the National Archives, which controls the John F. Kennedy Assassination Records Collection. The records include more information on accused gunman Lee Harvey Oswald and his time spent in Mexico City. But about 4,300 records remain redacted in part. [CIA agent George] Joannides ... guided and monitored an anti-Fidel Castro group called Directorio Revolucionario Estudiantil (Revolutionary Student Directorate) in 1963 that came into contact with Oswald in New Orleans in the months before the assassination, leading some to speculate about CIA-related complicity in the killing. As Oswald interacted with DRE and became known as an activist who supported President Castro, the Pentagon was formulating a plan called Operation Northwoods to stage a false flag attack in the United States to blame on Cuba and justify a military confrontation to make up for the aborted Bay of Pigs fiasco two years before. The records and the CIA's deceit over Joannides' ties to Oswald spans decades and came to light only after the records act began to unearth information about him.
Note: While the mainstream narrative points to the CIA being complicit in the killing of Kennedy by a Communist lone gunman, there is overwhelming evidence not often talked about, that reveals how Kennedy was murdered by rogue elements within US government agencies as a result of his efforts towards peacemaking strategies over nuclear weapon warfare, among other reasons. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
Among the intersections between [Lee Harvey] Oswald and the CIA, his time as a young Marine at the Atsugi naval air facility in Japan in 1957 is high among them. Atsugi was a launching pad for U-2 spy flights over the Soviet Union and was also a hub of the CIA's research into psychedelic drugs. "A CIA memo titled 'Truth Drugs in Interrogation' revealed the agency practice of dosing agents who were marked for dangerous overseas missions," wrote author David Talbot in "The Devil's Chessboard." A new document released in full last week relates directly to Oswald's time at Atsugi, revealing details about the CIA's response to testimony from a former agency accountant that the spy service had employed Oswald – who went on to be a gunman in the assassination of President John F. Kennedy in 1963. The CIA's claim to have had no contact with Oswald is undercut by the fact that George de Mohrenschildt, a CIA asset, became close friends with Oswald in the months before the assassination. According to documents found in the newly declassified files, at the same time as his trip, the CIA's Domestic Operations Division ran a search on de Mohrenschildt, "exact reason unknown," according to two documents created by a CIA analyst included in last week's declassification. The covert arm of the division was run at the time by E. Howard Hunt, a black ops specialist who confessed later in life to learning ahead of time of a conspiracy to assassinate Kennedy that involved high-level figures in the CIA.
Note: The CIA's MK-ULTRA program routinely administered drugs to unsuspecting victims. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government [is] a new book by Salon founder David Talbot. As Talbot explains, “What I was really trying to do was a biography on the American power elite from World War II up to the 60s.” Dulles ... served as CIA director from 1953 to 1961. Dulles would have had no moral qualms about killing any politician, including Americans. He went on to wield far greater power than most elected officials ever have. The Devil's Chessboard ... includes detailed reexaminations of Dulles's most notorious failures, such as the Bay of Pigs in 1961 and the nightmarish mind control program MK-ULTRA, as well as his most notorious "successes," the CIA's overthrow of democratic governments in Iran in 1953 and in Guatemala in 1954. As the Swiss director of the Office of Strategic Services during World War II, Dulles – whose law firm had represented German corporations and many U.S. corporations with German interests – quietly attempted to undermine Franklin D. Roosevelt's demand that Germany surrender unconditionally, going so far as to order the rescue of an SS general surrounded by Italian partisans. Dulles also led the push to save Reinhard Gehlen, Nazi head of intelligence on the Eastern Front and a genuine monster, from any post-war justice. Dulles then made certain Gehlen and his spies received a cozy embrace from the CIA, and helped push him to the top of West Germany's Federal Intelligence Service.
Note: Read more about the CIA Nazi link. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
The Biden administration took a public stand last year against the abuse of spyware to target human rights activists, dissidents and journalists: It blacklisted the most notorious maker of the hacking tools, the Israeli firm NSO Group. But the global industry for commercial spyware – which allows governments to invade mobile phones and vacuum up data – continues to boom. Even the U.S. government is using it. The Drug Enforcement Administration is secretly deploying spyware from a different Israeli firm, according to five people familiar with the agency's operations, in the first confirmed use of commercial spyware by the federal government. The most sophisticated spyware tools – like NSO's Pegasus – have "zero-click" technology, meaning they can stealthily and remotely extract everything from a target's mobile phone, without the user having to click on a malicious link to give Pegasus remote access. They can also turn the mobile phone into a tracking and secret recording device, allowing the phone to spy on its owner. But hacking tools without zero-click capability, which are considerably cheaper, also have a significant market. Commercial spyware has been used by intelligence services and police forces to hack phones used by drug networks and terrorist groups. But it has also been abused by numerous authoritarian regimes and democracies to spy on political opponents and journalists. This has led governments to a sometimes tortured rationale for their use.
Note: Read about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.
Trust Lab was founded by a team of well-credentialed Big Tech alumni who came together in 2021 with a mission: Make online content moderation more transparent, accountable, and trustworthy. A year later, the company announced a "strategic partnership" with the CIA's venture capital firm. The quiet October 29 announcement of the partnership is light on details, stating that Trust Lab and In-Q-Tel – which invests in and collaborates with firms it believes will advance the mission of the CIA – will work on "a long-term project that will help identify harmful content and actors in order to safeguard the internet." Key terms like "harmful" and "safeguard" are unexplained, but the press release goes on to say that the company will work toward "pinpointing many types of online harmful content, including toxicity and misinformation." It's difficult to imagine how aligning the startup with the CIA is compatible with [Trust Lab co-founder Tom] Siegel's goal of bringing greater transparency and integrity to internet governance. What would it mean, for instance, to incubate counter-misinformation technology for an agency with a vast history of perpetuating misinformation? Placing the company within the CIA's tech pipeline also raises questions about Trust Lab's view of who or what might be a "harmful" online, a nebulous concept that will no doubt mean something very different to the U.S. intelligence community than it means elsewhere. Trust Lab's murky partnership with In-Q-Tel suggests a step toward greater governmental oversight of online speech.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Allegations by FBI Special Agent Steve Friend contained in a whistleblower complaint filed late Wednesday with the Department of Justice inspector general reveal a politicized Washington, DC, FBI field office cooking the books to exaggerate the threat of domestic terrorism, and using an "overzealous" January 6 investigation to harass conservative Americans and violate their constitutional rights. Friend, 37, a respected 12-year veteran of the FBI and a SWAT team member, was suspended Monday, stripped of his gun and badge, and escorted out of the FBI field office in Daytona Beach, Fla., after complaining to his supervisors about the violations. He was declared absent without leave last month for refusing to participate in SWAT raids that he believed violated FBI policy and were a use of excessive force against Jan. 6 subjects accused of misdemeanor offenses. "I have an oath to uphold the Constitution," he told supervisors when he asserted his conscientious objection to joining an Aug. 24 raid on a J6 subject. "I have a moral objection and want to be considered a conscientious objector." In his whistleblower complaint to DOJ Inspector General Michael Horowitz ... Friend lays out multiple violations of FBI policy involving J6 investigations in which he was involved. He says he was removed from active investigations into child sexual exploitation and human trafficking to work on J6 cases sent from DC. As a result, he believes his child exploitation investigations were harmed.
Note: Read how Facebook is silencing activity related to this whistleblower. Read also Matt Taibbi's reporting on this important case. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
An offshore company that is trusted by the major web browsers and other tech companies to vouch for the legitimacy of websites has connections to contractors for U.S. intelligence agencies and law enforcement, according to security researchers, documents and interviews. Google's Chrome, Apple's Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to act as what's known as a root certificate authority, a powerful spot in the internet's infrastructure that guarantees websites are not fake, guiding users to them seamlessly. The company's Panamanian registration records show that it has the identical slate of officers, agents and partners as a spyware maker identified this year as an affiliate of Arizona-based Packet Forensics, which ... has sold communication interception services to U.S. government agencies for more than a decade. TrustCor's products include an email service that claims to be end-to-end encrypted, though experts consulted by The Washington Post said they found evidence to undermine that claim. A test version of the email service also included spyware developed by a Panamanian company related to Packet Forensics. A person familiar with Packet Forensics' work confirmed that it had used TrustCor's certificate process and its email service, MsgSafe, to intercept communications and help the U.S. government catch suspected terrorists. The physical address in Toronto given in [TrustCor's] auditor's report, 371 Front St. West, houses a UPS Store mail drop.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.
The United States has fought more than a dozen "secret wars" over the last two decades, according to a new report from the Brennan Center for Justice. Through a combination of ground combat, airstrikes, and operations by U.S. proxy forces, these conflicts have raged from Africa to the Middle East to Asia, often completely unknown to the American people and with minimal congressional oversight. These clandestine conflicts have been enabled by the 2001 Authorization for Use of Military Force, enacted in the wake of the September 11 attacks, as well as the covert action statute, which allows secret, unattributed operations, primarily conducted by the CIA. [The new] analysis is particularly illuminating in the case of Somalia, where the United States developed two key proxy forces, the Danab Brigade and the Puntland Security Force. The CIA began building the Puntland Security Force in 2002 to battle the Al Qaeda-affiliated al-Shabab and later the Islamic State in Somalia, or ISS. The force was transferred to U.S. military control around 2012 and went on to fight alongside U.S. Special Operations forces for a decade. [The Brennan Center's Katherine Yon] Ebright notes that the proxy fighters were "largely independent of the Somali government, despite being an elite armed brigade and one of Somalia's most capable special operations units. And their relationship with U.S. forces was long kept secret, with U.S. officials disavowing the presence of military advisers in Somalia until 2014."
Note: Since 2008, the US has supported at least nine coups in five African countries. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
On April 17, 2018, Terry Albury appeared in a federal court in Minneapolis, where he pleaded guilty to charges of leaking classified information to the press. The allegations – that Albury downloaded, printed and photographed internal F.B.I. documents on his office computer, sending some of them electronically to a journalist and saving others on external devices found in his home – resulted from a 17-month-long internal investigation by the F.B.I., prompted by two Freedom of Information Act requests by a news organization ... in March 2016. Nine months after these FOIA requests were made, a trove of internal F.B.I. documents shedding new light on the vast and largely unrestricted power of the post-9/11 F.B.I. was posted on the investigative-journalism site The Intercept. The cache included hundreds of pages of unredacted policy manuals, including the F.B.I.'s byzantine rule book, the Domestic Investigations and Operations Guide, exposing the hidden loopholes that allowed agents to violate the bureau's own rules against racial and religious profiling and domestic spying as they pursued the domestic war on terror. In October 2018, he was sentenced to four years in prison. Albury says he felt a moral imperative to make his disclosures, motivated by his belief that the bureau had been so fundamentally transformed by Sept. 11 that its own agents were compelled to commit civil and human rights violations.
Note: Listen to Albury talk about his experiences in this podcast. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.