Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


Congressional Effort to End Assange Prosecution Underway
2023-03-30, The Intercept
https://theintercept.com/2023/03/30/julian-assange-congress-rashida-tlaib/

Rep. Rashida Tlaib, D-Mich., is circulating a letter among her House colleagues that calls on the Department of Justice to drop charges against Julian Assange and end its effort to extradite him from his detention in Belmarsh prison in the United Kingdom. The Justice Department has charged Assange, the publisher of WikiLeaks, for publishing classified information. The Obama administration had previously decided not to prosecute Assange, concerned with what was dubbed internally as the "New York Times problem." The Times had partnered with Assange when it came to publishing classified information and itself routinely publishes classified information. Publishing classified information is a violation of the Espionage Act, though it has never been challenged in the Supreme Court, and constitutional experts broadly consider that element of the law to be unconstitutional. The Obama administration could not find a way to charge Assange without also implicating standard journalistic practices. The Trump administration, unburdened by such concerns around press freedom, pushed ahead with the indictment and extradition request. The Biden administration, driven by the zealous prosecutor Gordon Kromberg, has aggressively pursued Trump's prosecution. Tlaib noted that the Times, The Guardian, El PaĂ­s, Le Monde, and Der Spiegel had put out a joint statement condemning the charges, and alluded to the same problem that gave the Obama administration pause.

Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.


PETA Urges Pentagon to Stop 'Cruel' Pulsed Radiation Experiments on Animals
2023-03-13, Common Dreams
https://www.commondreams.org/news/havana-syndrome

People for the Ethical Treatment of Animals on Monday implored the U.S. military to reinstate a ban on the intentional wounding of animals in experiments and to stop radiation testing in an attempt to determine the cause of the mystery ailment popularly known as "Havana syndrome" that has afflicted U.S. government officials posted at diplomatic facilities in Washington, D.C. and several foreign countries. PETA argues that the military's decision to use live animals in testing related to Havana syndrome is "counterproductive" due to biological differences between humans and species subjected to the experiments, as well as the widespread availability of non-wounding research methods and the likelihood that radio frequency waves did not cause the mysterious ailment. The U.S. government has a long history of radiation experiments not only on animals but also on human beings. Scores of institutions, including some of North America's most prominent universities, laboratories, and hospitals hosted government and military experimentation on both volunteers and unwitting test subjects in the MK-ULTRA mind control experiments and other highly unethical and sometimes deadly programs. People suffering from Havana syndrome–so named because it was first identified by U.S. and Canadian diplomats and embassy staff in the Cuban capital–experienced what The Lancet described as "an abrupt onset of unusual clinical symptoms."

Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and non-lethal weapons from reliable major media sources.


Most Major "Threats" These Days Are Based On Lies: False Flag Terrorism is a Great Example
2023-03-09, The Pulse
https://www.thepulse.one/p/most-major-threats-these-days-are

We are stuck in a never ending cycle of disaster that has led to one giant sense-making crises. False flag terrorism ... refers to governments creating, supporting, or staging events, like acts of terrorism in their own country and on their own citizenry, and then blaming it on someone else. Sometimes events can be created and even staged, and other times events are completely real yet the narrative we receive is where the deception lies. Either way, in many cases these events are used for control and/or political and financial gain. Take, for example, Operation Northwoods. This was a plan hatched by the US government in the early 1960s to fool the American public and the international community into supporting a war against Cuba in order to oust Fidel Castro. The plan included blowing up a US ship, attacking a US military base, sinking and blowing up boats of Cuban refugees, hijacking planes, and orchestrating violent terrorism in multiple US cities against American citizens. And of course, blaming Cuba for these actions. 9/11 could perhaps be one of the best examples of false flag terrorism, but the evidence that has lead the majority of people to feel this sentiment has not seen the light of day within the mainstream. There are many similarities between 9/11 and COVID, and in my mind COVID has been a clear act of bioterrorism by the same entities who proposed the ‘solution.' These included vaccine mandates, mask mandates and more, which we are likely to see resurface again in the future.

Note: Read more about false flag terrorism. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.


The FBI's Most Controversial Surveillance Tool Is Under Threat
2023-02-10, Wired
https://www.wired.com/story/fbi-section-702/

New details about the FBI's failures to comply with restrictions on the use of foreign intelligence for domestic crimes have emerged. Section 702 of the Foreign Intelligence Surveillance Act (FISA) ... grants the government the ability to intercept the electronic communications of overseas targets who are unprotected by the Fourth Amendment. That authority is set to expire at the end of the year. But errors in the FBI's secondary use of the data–the investigation of crimes on US soil–are likely to inflame an already fierce debate over whether law enforcement agents can be trusted with such an invasive tool. Central to this tension has been a routine audit by the Department of Justice's (DOJ) national security division and the office of the director of national intelligence (ODNI) ... which unearthed new examples of the FBI failing to comply with rules limiting access to intelligence ostensibly gathered to protect US national security. Such "errors," they said, have occurred on a "large number" of occasions. A report on the audit, only recently declassified, found that in the first half of 2020, FBI personnel unlawfully searched raw FISA data on numerous occasions. In one incident, agents reportedly sought evidence of foreign influence linked to a US lawmaker. In another, an inappropriate search pertained to a local political party. In what privacy and civil liberties lawyers have termed a "backdoor search," the FBI regularly searches through unminimized data during investigations, and routinely prior to launching them.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Biden releases most JFK assassination records – but withholds thousands
2022-12-15, NBC News
https://www.nbcnews.com/politics/joe-biden/biden-releases-jfk-assassination-r...

President Joe Biden's administration released more than 13,000 records of President John F. Kennedy's assassination Thursday, but it fell short of fully complying with the spirit of a 30-year-old law demanding transparency by now. With Thursday's action, about 98% of all documents related to the 1963 killing have now been released and just 3% of the records remain redacted in whole or in part, according to the National Archives, which controls the John F. Kennedy Assassination Records Collection. The records include more information on accused gunman Lee Harvey Oswald and his time spent in Mexico City. But about 4,300 records remain redacted in part. [CIA agent George] Joannides ... guided and monitored an anti-Fidel Castro group called Directorio Revolucionario Estudiantil (Revolutionary Student Directorate) in 1963 that came into contact with Oswald in New Orleans in the months before the assassination, leading some to speculate about CIA-related complicity in the killing. As Oswald interacted with DRE and became known as an activist who supported President Castro, the Pentagon was formulating a plan called Operation Northwoods to stage a false flag attack in the United States to blame on Cuba and justify a military confrontation to make up for the aborted Bay of Pigs fiasco two years before. The records and the CIA's deceit over Joannides' ties to Oswald spans decades and came to light only after the records act began to unearth information about him.

Note: While the mainstream narrative points to the CIA being complicit in the killing of Kennedy by a Communist lone gunman, there is overwhelming evidence not often talked about, that reveals how Kennedy was murdered by rogue elements within US government agencies as a result of his efforts towards peacemaking strategies over nuclear weapon warfare, among other reasons. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.


New Report Sheds Light on Pentagon's Secret Wars Playbook
2022-11-03, The Intercept
https://theintercept.com/2022/11/03/us-military-secret-wars/

The United States has fought more than a dozen "secret wars" over the last two decades, according to a new report from the Brennan Center for Justice. Through a combination of ground combat, airstrikes, and operations by U.S. proxy forces, these conflicts have raged from Africa to the Middle East to Asia, often completely unknown to the American people and with minimal congressional oversight. These clandestine conflicts have been enabled by the 2001 Authorization for Use of Military Force, enacted in the wake of the September 11 attacks, as well as the covert action statute, which allows secret, unattributed operations, primarily conducted by the CIA. [The new] analysis is particularly illuminating in the case of Somalia, where the United States developed two key proxy forces, the Danab Brigade and the Puntland Security Force. The CIA began building the Puntland Security Force in 2002 to battle the Al Qaeda-affiliated al-Shabab and later the Islamic State in Somalia, or ISS. The force was transferred to U.S. military control around 2012 and went on to fight alongside U.S. Special Operations forces for a decade. [The Brennan Center's Katherine Yon] Ebright notes that the proxy fighters were "largely independent of the Somali government, despite being an elite armed brigade and one of Somalia's most capable special operations units. And their relationship with U.S. forces was long kept secret, with U.S. officials disavowing the presence of military advisers in Somalia until 2014."

Note: Since 2008, the US has supported at least nine coups in five African countries. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.


Has the C.I.A. Done More Harm Than Good?
2022-10-03, New Yorker
https://www.newyorker.com/magazine/2022/10/10/has-the-cia-done-more-harm-than...

Harry Truman became President in April, 1945. Two years later, he signed the National Security Act, which established the C.I.A.. It was supposed to do what its name suggested: centralize the intelligence that various agencies gathered. "It was not intended as a ‘Cloak and Dagger' Outfit!," Truman later wrote. In its charter, the C.I.A. was banned from domestic spying. There was no mention of covert action in the law that chartered the C.I.A., but Presidents–starting with Truman–began using it that way. One of the agency's first operations involved meddling in the 1948 Italian election. During the Vietnam War, the C.I.A. had discouraging intelligence to offer, and, when successive Administrations didn't want to hear it, focused on being helpful by providing ... supposedly quick fixes. That meant abetting a coup in 1963, spying on antiwar protesters, and launching the Phoenix Program, an anti-Vietcong campaign marked by torture and by arbitrary executions. More than twenty thousand people were killed under Phoenix's auspices. The C.I.A. has had a "defining failure" for every decade of its existence–sometimes more than one. In the nineteen-nineties, it was the lack of foresight about the Soviet Union; in the two-thousands, it was the phantom weapons of mass destruction, followed by torture and, in still evolving ways, by the drone-based program of targeted killings, with its high toll of civilian deaths. It's difficult to know, at this point, what the C.I.A.'s next defining failure ... will be.

Note: Read more about the CIA's Phoenix Program, which included the kidnapping, torture, and murder of civilians during the Vietnam War. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


The Battle for the World's Most Powerful Cyberweapon
2022-01-28, New York Times
https://www.nytimes.com/2022/01/28/magazine/nso-group-israel-spyware.html

NSO Group [is] the world's most notorious maker of spyware. The F.B.I. had bought a version of Pegasus, NSO's premier spying tool. It could ... crack the encrypted communications of any iPhone or Android smartphone. Since NSO had introduced Pegasus to the global market in 2011, it had helped Mexican authorities capture Joaquín Guzmán Loera, the drug lord known as El Chapo. European investigators have quietly used Pegasus to thwart terrorist plots, fight organized crime and, in one case, take down a global child-abuse ring. Mexico deployed the software not just against gangsters but also against journalists and political dissidents. The United Arab Emirates used the software to hack the phone of a civil rights activist. Saudi Arabia used it against women's rights activists. During a presentation to officials in Washington, the company demonstrated a new system, called Phantom, that could hack any number in the United States that the F.B.I. decided to target. A slick brochure ... says that Phantom allows American law enforcement and spy agencies to get intelligence "by extracting and monitoring crucial data from mobile devices." It is an "independent solution" that requires no cooperation from AT&T, Verizon, Apple or Google. The system, it says, will "turn your target's smartphone into an intelligence gold mine." The Phantom presentation triggered a discussion among government lawyers. Last summer ... the F.B.I. finally decided not to deploy the NSO weapons.

Note: Read more about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Former Twitter Employees Charged With Spying for Saudi Arabia
2019-11-06, New York Times
https://www.nytimes.com/2019/11/06/technology/twitter-saudi-arabia-spies.html

Ali Alzabarah was an engineer who rose through the ranks at Twitter to a job that gave him access to personal information and account data of the social media service’s millions of users. Ahmad Abouammo was a media partnerships manager at the company who could see the email addresses and phone numbers of Twitter accounts. On Wednesday, the Justice Department accused the two men of using their positions and their access to Twitter’s internal systems to aid Saudi Arabia by obtaining information on American citizens and Saudi dissidents who opposed the policies of the kingdom and its leaders. Mr. Alzabarah and Mr. Abouammo were charged with acting as agents of a foreign power inside the United States, in the first complaint of its kind involving Saudis in the country. The case raised questions about the security of American technology companies already under scrutiny for spreading disinformation and influencing public opinion, showing that these firms can be penetrated from the inside as well. It also underscored the broad effort that Crown Prince Mohammed bin Salman of Saudi Arabia and his close advisers have conducted to silence critics both inside the kingdom and abroad. Jamal Khashoggi, a columnist for The Washington Post who was critical of the way Saudi Arabia is run, was murdered last year by Saudi agents in Istanbul.

Note: Read more on Saudi Arabia's extreme efforts to silence its critics. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable major media sources.


The State Department has been funding trolls. I'm one of their targets
2019-06-04, Washington Post
https://www.washingtonpost.com/opinions/2019/06/04/state-department-has-been-...

Even after spending a year and a half in prison in Tehran, I knew that if I wanted to go on writing about Iran, I would be a target for plenty of public attacks. But I never imagined the U.S. State Department would be funding my attackers. Last week, several astute Iran watchers drew attention to a series of inflammatory tweets associated with the Iran Disinformation Project, a State Department-funded initiative that its website claims "brings to light disinformation emanating from the Islamic Republic of Iran via official rhetoric, state propaganda outlets, social media manipulation and more." The targets of the tweets included think-tank analysts, human rights activists and journalists. The common thread is that we are all perceived by regime change proponents and supporters of the Trump administration's so-called maximum pressure policy to be soft on Iran because we are critical of crushing economic sanctions and the threat of the use of military force. For these thought crimes, we are branded by @IranDisinfo and similar social media accounts as Tehran's "mouthpieces," "apologists," "collaborators," and "lobbyists" in the West. We're faced with the irony that an initiative aimed at combating Tehran's disinformation campaigns is resorting to disinformation campaigns of its own, using taxpayer funds to spread lies about U.S. citizens. We need programs that fight the spread of falsehoods and propaganda, but such efforts shouldn't combat lies with other lies.

Note: For lots more on this eye-opening event, see this excellent article by Matt Taibbi. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.


What the CIA Tells Congress (Or Doesn’t) about Covert Operations: The Barr/Cheney/Bush Turning Point for CIA Notifications to the Senate
2019-02-07, National Security Archive
https://nsarchive.gwu.edu/briefing-book/intelligence/2019-02-07/what-cia-tell...

Attorney-General nominee William P. Barr figured prominently in arguments to limit CIA responsibility to provide notification to Congress about covert actions during the 1980s, according to a review of declassified materials published today by the National Security Archive. As the Iran-Contra scandal played out, Barr, who held senior posts at the Justice Department, provisionally supported the idea of the president’s “virtually unfettered discretion” in foreign policy and downplayed Congress’s power. The issue of notification of Congress about imminent clandestine activities was at the heart of the Iran-Contra scandal when President Ronald Reagan and CIA Director William Casey specifically ordered that lawmakers be kept in the dark about the infamous, covert arms-for-hostages deals with Iran. Barr was by no means alone in pushing these views, the documents show. Other notable proponents during the Iran-Contra aftermath included then-Congressman Dick Cheney and John R. Bolton, who was also at the Justice Department. After Cheney became defense secretary he continued to press for extraordinarily broad Executive Branch authority, advising then-President George H. W. Bush to veto the Senate’s intelligence appropriations bill on the grounds it “attacked” presidential prerogatives – resulting in the only known such veto since the CIA’s creation.

Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


Everybody Does It: The Messy Truth About Infiltrating Computer Supply Chains
2019-01-24, The Intercept
https://theintercept.com/2019/01/24/computer-supply-chain-attacks/

Bloomberg Businessweek published an alarming story: Operatives working for China's People's Liberation Army had secretly implanted microchips into motherboards made in China and sold by U.S.-based Supermicro. This allegedly gave Chinese spies clandestine access to servers belonging to over 30 American companies, including Apple, Amazon, and various government suppliers, in an operation known as a "supply chain attack," in which malicious hardware or software is inserted into products before they are shipped to surveillance targets. U.S. spy agencies ... assessed that China was adept at corrupting the software bundled closest to a computer's hardware at the factory, threatening some of the U.S. government's most sensitive machines, according to documents provided by National Security Agency whistleblower Edward Snowden. The documents also detail how the U.S. and its allies have themselves systematically targeted and subverted tech supply chains, with the NSA conducting its own such operations, including in China, in partnership with the CIA and other intelligence agencies. The documents also disclose supply chain operations by German and French intelligence. Computer hardware can be altered at various points along the supply chain, from design to manufacturing to storage to shipment. The U.S. is among the small number of countries that could, in theory, compromise devices at many different points in this pipeline, thanks to its resources and geographic reach.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Bobby Kennedy’s son thinks he was killed by a second shooter. Is there anything to it?
2018-05-21, Boston.com
https://www.boston.com/news/history/2018/05/31/rfk-assassination-conspiracy-t...

“My father was the chief law enforcement officer in this country,” Robert F. Kennedy Jr. recently told The Washington Post. “I think it would have disturbed him if somebody was put in jail for a crime they didn’t commit.” Kennedy’s second oldest son now believes ... that his father was killed by a second gunman. RFK Jr. even visited Sirhan Sirhan, the man convicted of shooting and killing his father, because he was “curious and disturbed by what I had seen in the evidence.” He isn’t the only one. “If you believe the LAPD reports about this case, there is no way that Sirhan did it and did it alone,” Dan Moldea, an investigative journalist and author of The Killing of Robert F. Kennedy, told Boston.com. Kennedy was assassinated ... on June 5, 1968, at the Ambassador Hotel in Los Angeles. Kennedy was walking through the hotel kitchen pantry [and] was shot from behind at point-blank range. Sirhan approached from the front, on Kennedy’s right. His gun never got closer than about a foot-and-a-half away [and] carried a maximum of just eight bullets. And yet, there’s evidence that suggests more than eight shots were fired. Who would the second gunman have been? Theorists most commonly point to ... Thane Eugene Cesar. Cesar was a security guard who hated the Kennedys. Cesar was also walking with Kennedy when the shooting occurred and ... owned a .22-caliber similar to Sirhan’s gun, which he initially told police he sold before the assassination, but had actually, it was later found, sold three months after the shooting.

Note: For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.


Orlando nightclub shooter’s father was FBI informant, court documents say
2018-03-26, Washington Post
https://www.washingtonpost.com/world/national-security/orlando-nightclub-shoo...

The father of the 29-year-old who killed 49 people at an Orlando nightclub in the summer of 2016 was an FBI informant who came under scrutiny himself after investigators found receipts for money transfers to Turkey and Afghanistan in the wake of the mass shooting. The revelation came in documents filed by attorneys for the shooter’s wife, Noor Salman, who is on trial in Orlando on allegations that she aided and abetted her husband’s attack and obstructed law enforcement’s investigation into it. Salman’s trial has been underway for weeks, but defense attorneys argued that they were not informed until Saturday of the father’s work for the FBI. That, they argued, is grounds to dismiss the charges. Seddique Mateen - the father of Omar Mateen - was an FBI informant at various points between January 2005 and June 2016, court documents say. Salman’s attorneys argued in court filings that if they had known of Seddique Mateen’s work for the bureau, they might have explored ... whether the FBI’s interviews with Salman were an attempt at “evading the negligence they exercised with their own informant,” and whether their “unwavering focus on Noor Salman, rather than Seddique Mateen, could have been designed to find a culprit other than the father.” The FBI has previously come under criticism for investigating Omar Mateen for 10 months starting in 2013 and ultimately concluding he was not a threat.

Note: Noor Salman was acquitted shortly after this information came out. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


Saudi prince denies Kushner is ‘in his pocket’
2018-03-22, Washington Post
https://www.washingtonpost.com/world/national-security/saudi-prince-denies-ku...

Saudi Crown Prince Mohammed bin Salman said Thursday it would be “really insane” for him to trade classified information with presidential son-in-law and White House adviser Jared Kushner. Speaking in a meeting with Washington Post editors and reporters, Mohammed denied U.S. media reports that he had claimed Kushner was “in his pocket,” or that ... he had sought or received a green light from Kushner for massive arrests of allegedly corrupt members of the royal family and Saudi businessmen that took place in the kingdom. The detentions were solely a domestic issue and had been in the works for years, the prince said. The son of King Salman and heir to the Saudi throne, Mohammed, 32, met with President Trump on Tuesday in the Oval Office and over lunch. He also spoke with a number of congressional leaders. Even as Trump has said he is seeking increased investment and purchases of U.S. military equipment and other products from Saudi Arabia, Mohammed has made clear that his primary mission here is to win U.S. investor confidence in his country. Asked about the Saudi-funded spread of Wahhabism, the austere faith ... that some have accused of being a source of global terrorism, Mohammed said that investments in mosques and madrassas overseas were rooted in the Cold War, when allies asked Saudi Arabia to use its resources to prevent inroads in Muslim countries by the Soviet Union. Successive Saudi governments lost track of the effort, he said.

Note: 531,525 diplomatic cables from 1979 published by Wikileaks shed light on how Saudi Arabia and the CIA fueled the rise of modern Islamic terrorism. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism.


I went to prison for disclosing the CIA’s torture. Gina Haspel helped cover it up.
2018-03-16, Washington Post
https://www.washingtonpost.com/outlook/i-went-to-prison-for-disclosing-the-ci...

I was inside the CIA’s Langley, Va., headquarters on Sept. 11, 2001. I headed counterterrorism operations in Pakistan from January to May 2002. My team captured dozens of al-Qaeda fighters, including senior training-camp commanders. One of the fighters whom I played an integral role in capturing was Abu Zubaida, mistakenly thought at the time to be the third-ranking person in the militant group. By that May, the CIA had decided to torture him. When I returned to CIA headquarters that month, a senior officer in the Counterterrorism Center asked me if I wanted to be “trained in the use of enhanced interrogation techniques.” I declined. I said that I had a moral and ethical problem with torture and that - the judgment of the Justice Department notwithstanding - I thought it was illegal. Unfortunately, there were plenty of people in the U.S. government who were all too willing to allow the practice to go on. One of them was Gina Haspel, whom President Trump nominated Tuesday as the CIA’s next director. Putting Haspel in charge of the CIA would undo attempts by the agency - and the nation - to repudiate torture. The message this sends to the CIA workforce is simple: Engage in war crimes, in crimes against humanity, and you’ll get promoted. Don’t worry about the law. Don’t worry about ethics. Don’t worry about morality or the fact that torture doesn’t even work. Go ahead and do it anyway. We’ll cover for you. And you can destroy the evidence, too.

Note: The above was written by former CIA counterterrorism officer John Kiriakou, who was imprisoned for blowing the whistle on the CIA’s illegal torture program. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.


The NSA knows who you are just by the sound of your voice—and their tech predates Apple and Amazon
2018-01-20, CNBC News
https://www.cnbc.com/2018/01/20/the-nsa-can-recognize-you-by-just-your-voice-...

The National Security Agency has apparently been way ahead of Apple or Amazon. The agency has at its disposal voice recognition technology that it employs to identify terrorists, government spies, or anyone they choose — with just a phone call, according to a report by The Intercept. By using recorded audio, the NSA is able to create a "voiceprint," or a map of qualities that mark a voice as singular, and identify the person speaking. According to a classified memo ... the agency has employed this technology since at least 2006, with the document referencing technology "that identifies people by the sound of their voices." In fact, the NSA used such technology during Operation Iraqi Freedom, when analysts were able to verify audio thought to be of Saddam Hussein speaking. It suggests that national security operatives had access to high-level voice technology long before Amazon, Apple and Google's solutions became cultural touchstones. A "voiceprint" is "a dynamic computer model of the individual's vocal characteristics," the publication explained, created by an algorithm analyzing features like pitch and mouth shape. Then, using the NSA's formidable bank of recorded audio files, the agency is able to match the speaker to an identity. Identifying people through their voiceprints is a skill at which the "NSA reigns supreme," according to a leaked document from 2008. And, they're only getting better.

Note: As this BBC article from 1999 shows, mass surveillance systems with voice recognition capability have been in use for many years. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


How ex-congresswoman helped squelch reports of secret government surveillance
2018-01-15, San Francisco Chronicle (San Francisco's leading newspaper)
http://www.sfchronicle.com/nation/article/Ex-congresswoman-helped-squelch-sto...

Two New York Times reporters learned in 2004 that the George W. Bush administration was secretly wiretapping Americans, and collecting their phone and email records. The reporters’ attempt to publish their findings were thwarted by the administration’s intense and successful lobbying of their editors. That effort ... had an unlikely ally: Rep. Jane Harman of Los Angeles, the senior Democrat on the House Intelligence Committee. Details of the far-reaching, legally unauthorized surveillance program remained secret until the Times published the article in late 2005. The newspaper’s interactions with administration officials, and Harman’s role, were described by former Times reporter James Risen this month in the Intercept, the investigative publication where he now works. The story on the program known as Stellar Wind was ready for publication before the November 2004 election, when Bush was on the ballot, but NSA Director Michael Hayden and other administration officials told Times editors, in phone calls and face-to-face meetings, that publication would damage national security and endanger lives, Risen said. He said the officials were joined in that effort by Harman, one of a handful of congressional leaders who had been briefed on the program and were enlisted by the White House to contact the Times. Members of Congress learned later that the NSA had not been seeking warrants from a secret court, as required by law, before wiretapping calls.

Note: James Risen is a courageous hero who shared two Pulitzer Prizes for his reporting around 9/11 and massive government surveillance. His recent article in The Intercept describes how a "marketplace of secrets in Washington" supports the US national security apparatus, and is used by corrupt government officials to manipulate the news.


Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
2017-11-12, New York Times
https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html

Jake Williams, [a] cybersecurity expert, was dismayed to discover that ... the Shadow Brokers, a mysterious group that had somehow obtained many of the hacking tools the United States used to spy on other countries [had] identified him - correctly - as a former member of the National Security Agency’s hacking group, Tailored Access Operations, or T.A.O., a job he had not publicly disclosed. Then the Shadow Brokers astonished him by dropping technical details that made clear they knew about highly classified hacking operations that he had conducted. America’s largest and most secretive intelligence agency had been deeply infiltrated. Current and former agency officials say the Shadow Brokers disclosures, which began in August 2016, have been catastrophic for the N.S.A., calling into question its ability to protect potent cyberweapons and its very value to national security. Fifteen months into a wide-ranging investigation by the agency’s counterintelligence arm, known as Q Group, and the F.B.I., officials still do not know whether the N.S.A. is the victim of a brilliantly executed hack ... an insider’s leak, or both. Three employees have been arrested since 2015 for taking classified files, but there is fear that one or more leakers may still be in place. There is broad agreement that the damage from the Shadow Brokers already far exceeds the harm to American intelligence done by Edward J. Snowden, the former N.S.A. contractor who fled with four laptops of classified material in 2013. For decades after its creation in 1952, the N.S.A. — No Such Agency, in the old joke — was seen as all but leakproof. But since Mr. Snowden flew away with hundreds of thousands of documents in 2013, that notion has been shattered.

Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Acid flashback: CIA’s mind-control experiment reverberates 40 years after hearings
2017-08-30, Washington Times
https://www.washingtontimes.com/news/2017/aug/30/cias-mk-ultra-lsd-mind-contr...

In the summer of 1977, Capitol Hill was gripped by revelations of the CIA’s top-secret MK-Ultra mind control research program, targeting unsuspecting American citizens, in some cases by luring them to brothels to be fed LSD-laced cocktails. Hearings that summer, chaired by Sen. Edward M. Kennedy ... touched some of the country’s rawest nerves. The August 1977 MK-Ultra hearings specifically explored what seemed like an outlandish idea straight out of science fiction: the possibility of government mind control. Kennedy ... had a complex relationship with the CIA, given what the agency knew about the assassinations of his brothers Robert and John in the 1960s. One MK-Ultra project involved CIA-run brothels in San Francisco and New York City, established specifically to study LSD’s effects on unsuspecting adults. Project Midnight Climax ran in San Francisco from 1955 to 1965. Operatives reported that it helped refine sexual blackmail tactics, surveillance technology, LSD’s use in interrogations and how to better use empathy as an investigation tactic. Brothel operatives later [admitted] that they had dosed unsuspecting subjects at nearby restaurants, bars and beaches. In one case, a U.S. marshal held up a San Francisco bar with his service revolver after an MK-Ultra agent slipped LSD into his bourbon and soda. In the early 1970s, CIA Director Richard Helms, who ran the agency from 1966 to 1973, along with one of MK-Ultra’s architects, Sidney Gottlieb, ordered all the relevant paperwork destroyed.

Note: Read more about Midnight Climax and the CIA's MK ULTRA program. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"