Intelligence Agency Corruption Media ArticlesExcerpts of Key Intelligence Agency Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The dozens of American diplomats taken hostage by revolutionary students who seized the U.S. Embassy in Iran in 1979 might have had some secret company during their 15-month captivity: U.S. intelligence agencies had a squad of military-trained psychics using ESP to watch them, according to declassified documents in a newly available CIA database. In an operation code-named Grill Flame, half a dozen psychics ... on more than 200 occasions tried to peer through the ether to see where the hostages were being held, how closely they were guarded and the state of their health. Whether the psychics provided any useful intelligence was the subject of a debate among intelligence officials as heated as it was secret. The debate continues today. “The stuff that the CIA has declassified is garbage,” one of the Grill Flame psychics, Joseph McMoneagle, told the Miami Herald. “They haven’t declassified any of the stuff that worked.” Agreed Edwin May, a physicist who oversaw parapsychology research for government intelligence agencies for 20 years: “The psychics were able to tell, in some cases, where the hostages were moved to. They were able to see the degree of their health.” Operation Grill Flame was just one part of a broader U.S. intelligence project involving psychics and ESP that continued for 20 years. It went through as many as 10 different code names as its management shifted from agency to agency ... and carried out 26,000 telepathic forays by 227 psychics before the government shut it down in 1995.
Note: Read more on McMoneagle's work as a psychic for the US military. For more excellent, well resourced material on remote viewing and why the intelligence community continues to deny its successes, see this webpage.
The FBI is investigating political activists campaigning against the Dakota Access pipeline, diverting agents charged with preventing terrorist attacks to instead focus their attention on indigenous activists and environmentalists. Officers within the FBI’s joint terrorism taskforce have attempted to contact at least three people tied to the Standing Rock “water protector” movement in North Dakota. “The idea that the government would attempt to construe this indigenous-led non-violent movement into some kind of domestic terrorism investigation is unfathomable to me,” said Lauren Regan, a civil rights attorney. “It’s outrageous, it’s unwarranted … and it’s unconstitutional.” Regan ... said she learned of three cases in which officers with the taskforce, known as the JTTF, tried to talk to activists in person. She described the encounters as attempted “knocks and talks”, meaning law enforcement showed up at people’s doors without a subpoena or warrant and tried to get them to voluntarily cooperate with an interview. The three individuals ... asserted their fifth amendment rights and did not respond to the officers, according to Regan. All three contacts were made in recent weeks after Trump’s inauguration. Trump, a former investor in Energy Transfer Partners, the Texas-based firm behind the pipeline, took executive action in his first week in office to expedite the project. On Wednesday, workers began drilling to complete the pipeline.
Note: The FBI has a long history of violating activists' rights. The 2011 National Defense Authorization Bill broadened the definition of "supporter of terrorism" to include peaceful activists, authors, academics and even journalists. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
When Bill Binney, former NSA analyst and head of the anti-terror ThinThread metadata program sits in front of you and says he is not afraid of the government, you have to admire him. A wheel-chair-bound U.S. serviceman who rose in the ranks of intelligence to work in top-secret NSA programs, Binney created ThinThread prior to September 11, 2001, and says it mathematically broke down all phone communications anywhere in the world without any infringement on Constitutional rights. The program was self-running. More important, it worked. In "A Good American," the new documentary from executive producer Oliver Stone ... audiences are taken on a tense and frightening ride through Binney and his colleagues' experience developing and deploying ThinThread in tests, only to see its funding pulled just weeks before 9/11 in favor of an expensive and ineffective ... program called Trailblazer. Binney contends that ThinThread would have identified the terrorists who planned and executed the 9/11 terror attacks, thereby preventing them from occurring. When ThinThread's plug was pulled, Binney and his team challenged their NSA bosses, and in the process found themselves at odds with the U.S. government and in a complex web of lies and corruption. Thus, when Binney said he remains unafraid of possible repercussions or retaliation tied to the film's thesis, it's not hard to believe. "What else can they do to me?" he asks. "They've already tried everything to stop me."
Note: Watch a free trailer or rent the whole documentary on this webpage. Read a revealing, detailed New York Times article on Oliver Stone and his profound work to expose corruption and manipulation through film. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
Using loopholes it has kept secret for years, the FBI can in certain circumstances bypass its own rules in order to send undercover agents or informants into political and religious organizations, as well as schools, clubs, and businesses. If the FBI had its way, the infiltration loopholes would still be secret. They are detailed in a mammoth document obtained by The Intercept, an uncensored version of ... the Domestic Investigations and Operations Guide, or DIOG. If an undercover agent wants to pose as a university student and take classes, or if an FBI handler wants to tell an informant to attend religious services - two examples straight out of the rulebook - he or she must obtain a supervisor’s approval and attest both to the operation’s importance and to its compliance with constitutional safeguards. But all those rules go out the window if an agent decides the group is “illegitimate” or an informant spies on the group of his or her own accord. Civil rights groups ... worry that the FBI has made use of precisely these kinds of loopholes, silently undermining cherished freedoms enshrined after a dark chapter of FBI history: the COINTELPRO program in the 1950s and ’60s, when the FBI spied on, harassed, and tried to discredit leftists, civil rights leaders, and anti-war protestors. The exposure of COINTELPRO led to a famous Senate investigation and to institutional reform. The DIOG, despite being hundreds of pages of dense bureaucracy, actually documents a loosening of the standards enacted to rein in the FBI after COINTELPRO and other scandals ... after the 9/11 attacks.
Note: Read a detailed essay on the FBI's COINTELPRO program from the well-researched online book Lifting the Veil. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the erosion of civil liberties.
About 13 million pages of declassified documents from the US Central Intelligence Agency (CIA) have been released online. Among the more unusual records are documents from the Stargate Project, which dealt with psychic powers and extrasensory perception. Those include records of testing on celebrity psychic Uri Geller in 1973. Memos detail how Mr Geller was able to partly replicate pictures drawn in another room with varying - but sometimes precise - accuracy, leading the researchers to write that he "demonstrated his paranormal perceptual ability in a convincing and unambiguous manner". Other unusual records include a collection of reports on flying saucers. While much of the information has been technically publicly available since the mid-1990s, it has been very difficult to access. The records were only available on four physical computers ... at the National Archives in Maryland. A non-profit freedom of information group, MuckRock, sued the CIA to force it to upload the collection. At the same time, journalist Mike Best crowd-funded more than $15,000 to visit the archives to print out and then publicly upload the records, one by one. "By printing out and scanning the documents at CIA expense, I was able to begin making them freely available to the public and to give the agency a financial incentive to simply put the database online," Best wrote.
Note: The entire declassified archive of the Stargate Project is now available on the CIA Library website. Explore a treasure trove of excellent resources on remote viewing. For decades, officials denied the existence of remote viewing programs and UFO investigations. What other intelligence agency lies will be exposed as more information like this comes to light?
The announcement by the Justice Department’s inspector general that his office will look into FBI Director James B. Comey’s handling of Hillary Clinton’s emails reopens painful questions about the 2016 election, but it is also welcome news. The investigation will address allegations that Comey violated established Justice Department and FBI policies and procedures in his July 5, 2016, public announcement concerning the Hillary Clinton email investigation. And it will explore allegations that Comey’s Oct. 28 and Nov. 6 letters to Congress, which jolted the presidential election ... were improper. In addition to looking into the actions of the FBI director regarding the email investigation, the probe will look into whether the FBI’s deputy director should have recused himself from the investigation because of his wife’s political involvement; whether a high-ranking Justice Department official or others improperly disclosed non-public information to both the Clinton and Trump campaigns; and whether the timing of the FBI’s election eve Freedom of Information Act disclosures relating to Bill Clinton’s 2001 pardon of Marc Rich was based on inappropriate considerations. This investigation has bipartisan support. It was requested by the chairman and ranking members of multiple congressional oversight committees. Federal inspectors general, who do not leave with the change of administrations ... are the only political appointees whom the law requires be selected “without regard to political affiliation and solely on the basis of integrity.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the manipulation of public perception.
Christopher Steele, the former MI6 agent who investigated Donald Trump’s alleged Kremlin links, was so worried by what he was discovering that at the end he was working without pay. Mr Steele also decided to pass on information to both British and American intelligence officials after concluding that such material should not just be in the hands of political opponents of Mr Trump, who had hired his services, but was a matter of national security. However, say security sources, Mr Steele became increasingly frustrated that the FBI was failing to take action on the intelligence. He came to believe there was a cover-up, that a cabal within the Bureau blocked a thorough inquiry into Mr Trump. A colleague of Mr Steele in Washington, Glenn Simpson, a former Wall Street Journal reporter who runs the firm Fusion GPS, felt the same way. Fusion GPS had been hired by Republican opponents of Mr Trump in September 2015. In June 2016 Mr Steele came on the team. In July, Mr Trump won the Republican nomination and the Democrats became new employers of Mr Steele and Fusion GPS. By September ... Mr Steele [had] compiled a set of his memos into one document and passed it to his contacts at the FBI. But there seemed to be little progress in a proper inquiry into Mr Trump. The Bureau, instead, seemed to be devoting their resources in the pursuit of Hillary Clinton’s email transgressions. The New York office, in particular, appeared to be on a crusade against Ms Clinton.
Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss this provocative article by Glenn Greenwald and this interview he gave to Fox News. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the manipulation of public perception.
For months, the CIA, with unprecedented clarity, overtly threw its weight behind Hillary Clinton’s candidacy. In August, former acting CIA Director Michael Morell announced his endorsement of Clinton in the New York Times and claimed that “Mr. Putin had recruited Mr. Trump as an unwitting agent of the Russian Federation.” The CIA and NSA director under George W. Bush, Gen. Michael Hayden, also endorsed Clinton and went to the Washington Post to warn, in the week before the election, that “Donald Trump really does sound a lot like Vladimir Putin.” It is not hard to understand why the CIA preferred Clinton over Trump. Clinton was critical of Obama for restraining the CIA’s proxy war in Syria and was eager to expand that war. Clinton clearly wanted a harder line than Obama took against the CIA’s long-standing foes in Moscow. In general, Clinton defended and intended to extend the decadeslong international military order on which the CIA and Pentagon’s preeminence depends, while Trump - through a still-uncertain mix of instability and extremist conviction - posed a threat to it. The claims about Russia’s interference in U.S. elections and ties to Trump should be fully investigated. But until then, assertions that are unaccompanied by evidence and disseminated anonymously should be treated with the utmost skepticism. Venerating the intelligence community ... and equating its dark and dirty assertions [with] Truth ... cannot possibly achieve any good and is already doing much harm.
Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss the above provocative article by Glenn Greenwald and this interview he gave to Fox News.
We might already be living through the first world cyberwar – it’s just that we haven’t acknowledged or named it yet. What might a timeline of that war look like? Well, 2007 seems like a good bet as a starting point – with a concerted series of cyber-attacks on Estonia. In 2008 there were events that a historian might weave into a narrative of a global cyberwar, when several underwater internet cables were cut during the course of the year, interrupting internet communication and particularly affecting the Middle East. In 2010 the Stuxnet worm was used to attack Iran’s nuclear program. Another event from 2010, the WikiLeaks American embassy cables release ... would be irresistible for a historian to refer to in this context. One of the things that makes the first world cyberwar different from conventional warfare [is] the mix of nation states being involved with pressure groups, whistleblowers and hackers. Historians will be unable to ignore ... the 2016 US election campaign being influenced by alleged hacked and leaked emails. What reason is there to suppose that these events might eventually be grouped together as a single world cyberwar by historians? It is the idea that hostilities might formally come to an end. You can envisage a scenario where Russia, China and the US can see a mutual benefit in de-escalating cyber-attacks between the three of them.
Note: A 2007 New York Times article describes the formation of the Air Force Cyberspace Command to arm the US military in anticipation of widespread computer-based warfare. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
The C.I.A., the F.B.I. and the White House may all agree that Russia was behind the hacking that interfered with the election. But that was of no import to the website Breitbart News, which dismissed reports on the intelligence assessment as “left-wing fake news.” Until now, that term had been widely understood to refer to fabricated news accounts that are meant to spread virally online. But conservative cable and radio personalities ... have appropriated the term and turned it against any news they see as hostile to their agenda. In defining “fake news” so broadly and seeking to dilute its meaning, they are capitalizing on the declining credibility of all purveyors of information. Journalists who work to separate fact from fiction see a dangerous conflation of stories that turn out to be wrong because of a legitimate misunderstanding with those whose clear intention is to deceive. A report, shared more than a million times on social media, that the pope had endorsed Mr. Trump was undeniably false. But was it “fake news” to report on data models that showed Hillary Clinton with overwhelming odds of winning the presidency? Are opinion articles fake if they cherry-pick facts to draw disputable conclusions? “Fake news was a term specifically about people who purposely fabricated stories for clicks and revenue,” said David Mikkelson, the founder of Snopes, the myth-busting website. “Now it includes bad reporting, slanted journalism and outright propaganda. And I think we’re doing a disservice to lump all those things together.”
Note: For more along these lines, see concise summaries of deeply revealing media corruption news articles from reliable sources.
Carnegie Mellon University researcher Dov Levin [has compiled a] historical database that tracks U.S. involvement in meddling with foreign elections over the years. The U.S. has ... tried to influence the outcome of another country's election ... more than 80 times worldwide between 1946 and 2000. One example of that was our intervention in Serbia, Yugoslavia in the 2000 election there. Slobodan Milosevic was running for re-election, and we didn't want him to stay in power there. So we intervened in various ways for the opposition candidate, Vojislav Kostunica. And we gave funding to the opposition, and we gave them training and campaigning aide. That assistance was crucial in enabling the opposition to win. About one-third of [election interventions] are public, and two-third of them are covert. In other words, they're not known to the voters in the target before the election. Covert coup d'etats like the United States did in Iran in 1953 or in Guatemala in 1954 [were not counted, only times] when the United States [tried] directly to influence an election for one of the sides. The United States is the most common user of this technique. Russia or the Soviet Union since 1945 has used it half as much. My estimate has been 36 cases between 1946 to 2000. We know also that the Chinese have used this technique and the Venezuelans when the late Hugo Chavez was still in power in Venezuela and other countries.
Note: For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources.
The US "got it wrong" about Saddam Hussein and Iraq, the CIA analyst who interrogated the former dictator has said. John Nixon had numerous conversations with the deposed leader and now says that America was critically mistaken about their intervention Iraq. In particular, he claims, the CIA’s view of Hussein’s attitude to using chemical weapons was wrong. During the interrogations, Mr Nixon asked Hussein if he’d ever thought of engaging in a pre-emptive strike with WMDs against US troops based in Saudi Arabia. According to Mr Nixon ... the former dictator’s reply was: “We never thought about using weapons of mass destruction. It was not discussed. Use chemical weapons against the world? Is there anyone with full faculties who would do this?” Mr Nixon admitted this was “not what we had expected to hear”. The main reason the American and British governments used to justify the controversial invasion of Iraq was the supposed risk posed by the WMDs possessed by the country. Nearly 200,000 people have died in the conflicts that followed. Iraq is now widely regarded as a failed state, and still suffers from widespread violence. Thirteen years on, at least 5,000 American troops remain in the country. Mr Nixon also spoke out against Mr Bush, who was rude towards him and reportedly made inappropriate jokes about the missing WMDs. Mr Bush blamed the CIA for Iraq’s failures, Mr Nixon said, adding that he “called its analysis ‘guesswork’ while hearing only what he wanted to hear”.
Note: Have you noticed how every Arabic nation to which the U.S. has sent armed forces has ended up not with a stronger democracy, but in a situation of chaos? Do you think this might be intentional? The war machine makes huge profits from conditions of chaos. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
The watchdog wing of Congress has quietly launched an investigation into the “integrity” of the Pentagon’s whistleblower protection program. The Government Accountability Office, which serves as the investigative arm of Congress, has been looking into the extent to which Department of Defense whistleblower policies ... reassure employees of their rights to raise concerns “without fear of reprisal.” The investigation will also likely target senior Pentagon officials accused of destroying evidence that would have exculpated former senior NSA official Thomas Drake, who raised internal complaints about what he believed to be NSA misconduct and waste before ultimately approaching journalists. Rather than having his concerns acknowledged, Drake spent months fighting charges against him under the Espionage Act. His career in the intelligence community was ended. “Bureaucratic abuses of power are the primary reason otherwise circumspect national security whistleblowers leak to the media. It is too dangerous to work within an untrustworthy system,” Tom Devine, legal director of the Government Accountability Project, wrote in a statement. John Crane, formerly the assistant inspector general in the Pentagon, revealed his role in attempting to protect Drake’s identity and investigate the document destruction involved in his case last May - an effort he claims cost him his job. The implications of the investigation may eventually be important for evaluating the actions of former NSA contractor Edward Snowden.
Note: Mass surveillance whistleblower Thomas Drake attempted to work within the system and was was targeted for prosecution. John Crane was forced out of the Pentagon in 2013. His story is told in a new book, titled, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
In late 2014, Senate Democrats delivered to a handful of federal agencies copies of a 6,700-page classified report about the secret prison network the Central Intelligence Agency established after the Sept. 11 attacks. Senator Dianne Feinstein of California, who oversaw the report, hoped it would become a seminal document for national security professionals for generations to come. Now the report ... is at risk of remaining under wraps for more than a decade. At the Justice Department’s direction, officials at the C.I.A., State Department, Pentagon and Office of the Director of National Intelligence placed their copies in safes, unread. In January 2015, Senator Richard Burr, the new chairman of the Senate Select Committee on Intelligence ... wrote to President Obama demanding that all copies be returned to the Senate. He also instructed the administration not to enter the report into the executive branch’s system of records, since doing so would ... mean that the report could at some point see the light of day. On Friday, the White House informed Ms. Feinstein that it intended to preserve the report under the Presidential Records Act. That step bars the incoming administration from destroying all copies of the report. But President Obama did not ... declassify the study, which means that the report would remain secret for at least 12 years. “We can’t erase our mistakes by destroying the history books,” said Ms. Feinstein, who released a partly redacted summary of the report in December 2014.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
US intelligence agencies have concluded that Russia interfered in last month’s presidential election. Officials ... were told that intelligence agencies had found that individuals linked to the Russian government had provided WikiLeaks with thousands of confidential emails stolen from the Democratic National Committee (DNC) and others. The emails were steadily leaked via WikiLeaks ... revealing that DNC figures had colluded to harm the chances of [Clinton’s] nomination rival Bernie Sanders, and later giving examples of collusion between her campaign and figures in the media to blindside Trump in debates. The Kremlin has rejected the hacking accusations. WikiLeaks founder Julian Assange has previously said the DNC leaks were not linked to Russia. A ... senior official cited by the Washington Post conceded that intelligence agencies did not have specific proof that the Kremlin was “directing” the hackers. Craig Murray, the former UK ambassador to Uzbekistan, who is a close associate of Assange, [said of] the CIA claims: “They are absolutely making it up ... I know who leaked them. “They are certainly not Russian and it’s an insider. It’s a leak, not a hack; the two are different things. “If ... the CIA’s statement refers to people who are known to be linked to the Russian state, they would have arrested someone. America has not been shy about arresting whistleblowers and it’s not been shy about extraditing hackers. They plainly have no knowledge whatsoever.”
Note: The Guardian newspaper's website removed all front page links to the above article just three hours after it was published. In its place, the Guardian ran a new article that was entirely supportive of what Wikileaks affiliate Craig Murray calls "the CIA’s blatant lie" about the leaked DNC emails. A short essay by WantToKnow.info team member Mark Bailey explores this apparent media manipulation.
The CIA has concluded in a secret assessment that Russia intervened in the 2016 election to help Donald Trump win the presidency, rather than just to undermine confidence in the U.S. electoral system, according to officials briefed on the matter. Intelligence agencies have identified individuals with connections to the Russian government who provided WikiLeaks with thousands of hacked emails from the Democratic National Committee and others. “It is the assessment of the intelligence community that Russia’s goal here was to favor one candidate over the other, to help Trump get elected,” said a senior U.S. official. “That’s the consensus view.” The CIA shared its latest assessment with key senators in a closed-door briefing on Capitol Hill last week. The CIA presentation ... fell short of a formal U.S. assessment produced by all 17 intelligence agencies. A senior U.S. official said there were minor disagreements among intelligence officials about the agency’s assessment, in part because some questions remain unanswered. For example, intelligence agencies do not have specific intelligence showing officials in the Kremlin “directing” the identified individuals to pass the Democratic emails to WikiLeaks. Some key ... lawmakers have continued to question the quality of evidence supporting Russian involvement. “I’ll be the first one to come out and point at Russia if there’s clear evidence, but there is no clear evidence - even now,” said [chairman of the House Intelligence Committee] Devin Nunes.
Note: The above article comes on the heels of the Washington Post's promotion of an anti-Russian "McCarthyite blacklist" which smeared dozens of U.S. news sites as “routine peddlers of Russian propaganda.” For more along these lines, see concise summaries of deeply revealing news articles on elections corruption and the manipulation of public perception.
Vladimir K. Bukovsky, a tireless opponent of Soviet leaders and President Vladimir V. Putin of Russia, is not a man easily put off his stride. But he got knocked sideways when British police officers banged on the front door of his home ... and informed him that they had “received information about forbidden images” in his possession. He faced five charges of making indecent images of children, five charges of possession of indecent images of children and one charge of possession of a prohibited image. After Mr. Bukovsky, 73, entered a not-guilty plea, [the case] was delayed [following] a prosecution request for more time to review an independent forensic report on what had been found on Mr. Bukovsky’s computers and how an unidentified third party had probably put it there. Mr. Bukovsky ... insisted that he was the victim of a new and particularly noxious form of an old K.G.B. dirty trick known as kompromat, the fabrication and planting of compromising or illegal material. Old-style kompromat featured ... a wide range of other primitive entrapment techniques. Today, however, kompromat has become allied with the more sophisticated tricks of cybermischief-making. Hacking is not only a good way to get real information ... but a relatively easy and usually untraceable way to plant fake information. This blurring of all boundaries between truth and falsehood in the service of operational needs has created a climate in Russia in which even the most serious and grotesque accusations ... are simply a currency for settling scores.
Note: Hackers from any country's intelligence services could plant child porn on anyone's computer so that they would then be arrested and convicted. What a wild world we live in! For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
In the trove of documents provided by former National Security Agency contractor Edward Snowden is a treasure. It begins with a riddle: "What do the President of Pakistan, a cigar smuggler, an arms dealer, a counterterrorism target, and a combatting proliferation target have in common? They all used their everyday GSM phone during a flight." This riddle appeared in 2010 in SIDtoday, the internal newsletter of the NSA's Signals Intelligence Directorate, or SID, and it was classified "top secret." It announced the emergence of a new field of espionage that had not yet been explored: the interception of data from phone calls made on board civil aircraft. In a separate internal document from a year earlier, the NSA reported that 50,000 people had already used their mobile phones in flight as of December 2008, a figure that rose to 100,000 by February 2009. In a 2012 presentation, Government Communications Headquarters, or GCHQ ... disclosed a program called "Southwinds," which was used to gather all the cellular activity, voice communication, data, metadata, and content of calls on board commercial aircraft. To spy on a telephone, all that was required was that the aircraft be cruising at an altitude above 10,000 feet. Today, approximately 100 companies permit in-flight use of telephones. This will further extend the scope of espionage by providing a pool of potential targets comprising several hundreds of thousands of people. This implies a population that goes far beyond terrorist targets.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
In your Monday editorial, “Russia’s roulette,” you mentioned the “alarming evidence” of my government’s alleged involvement in the U.S. presidential elections. I do believe that it’s just nonsense, but if you insist that it’s true, then it would be interesting and necessary to see the evidence. I am sure that your respected newspaper meticulously worked through all the proofs before publishing the above-mentioned editorial. Unfortunately, nobody, including my government, despite numerous official requests, has never been presented with the onus probandi. The latter will not come from just repeating the unsubstantiated accusations over and over again or referring to unknown “independent researchers.” As far as I know, (National Security Agency Director) Adm. Michael Rogers in his recent interview with Wall Street Journal has never mentioned RUSSIA, while the official statement of Oct. 7 that has been repeatedly referred to, has never INDICTED Russia (“believing” and even being “confident” is something very different). Without evidence, in every state of law, with the United States being one of them, the principle of the presumption of innocence prevails. And accusations remain pure speculation. In this case, ill-intentioned.
Note: The above was written by Maxim Goncharov, a press attaché with the Russian Consulate in San Francisco. For more along these lines, see concise summaries of deeply revealing elections news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our Elections Information Center.
On the sixth anniversary of the first infamous "Cablegate" by WikiLeaks ... it has expanded its Public Library of US Diplomacy (PLUSD) with 531,525 new diplomatic cables from 1979. In a statement to coincide with the release of the cables, known as "Carter Cables III", Mr Assange explained how events which unfolded in 1979 had begun a series of events that led to the rise of ISIS: "The Iranian revolution, the Saudi Islamic uprising and the Egypt-Israel Camp David Accords led not only to the present regional power dynamic but decisively changed the relationship between oil, militant Islam and the world. "The uprising at Mecca permanently shifted Saudi Arabia towards Wahhabism, leading to the transnational spread of Islamic fundamentalism and the US-Saudi destabilisation of Afghanistan." He said at this point Osama bin Laden left his native Saudi Arabia for Pakistan to support the Afghan Mujahideen. He added: "The invasion of Afghanistan by the USSR would see Saudi Arabia and the CIA push billions of dollars to Mujahideen fighters as part of Operation Cyclone, fomenting the rise of al-Qaeda and the eventual collapse of the Soviet Union." The rise of al-Qaeda eventually bore the September 11, 2001 attacks in the United States, enabling the US invasion of Afghanistan and Iraq and over a decade of war, leaving, at its end, the ideological, financial and geographic basis for ISIS."
Note: Read a well-researched essay from the profound online book Lifting the Veil suggesting the War on Terror is a fraud. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.