Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


US Spies Are Lobbying Congress to Save a Phone Surveillance 'Loophole'
2023-07-27, Wired
https://www.wired.com/story/nsa-ndaa-lobbying-privacy-loophole/

An effort by United States lawmakers to prevent government agencies from domestically tracking citizens without a search warrant is facing opposition internally from one of its largest intelligence services. Officials at the National Security Agency (NSA) have approached lawmakers charged with its oversight about opposing an amendment that would prevent it from paying companies for location data instead of obtaining a warrant in court. Introduced by US representatives Warren Davidson and Sara Jacobs, the amendment ... would prohibit US military agencies from "purchasing data that would otherwise require a warrant, court order, or subpoena" to obtain. The ban would cover more than half of the US intelligence community, including the NSA, the Defense Intelligence Agency, and the newly formed National Space Intelligence Center, among others. A government report declassified by the Office of the Director of National Intelligence last month revealed that US intelligence agencies were avoiding judicial review by purchasing a "large amount" of "sensitive and intimate information" about Americans, including data that can be used to trace people's whereabouts over extended periods of time. The sensitivity of the data is such that "in the wrong hands," the report says, it could be used to "facilitate blackmail," among other undesirable outcomes. The report also acknowledges that some of the data being procured is protected under the US Constitution's Fourth Amendment.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Jesse Watters Claims FBI and CIA Can Blackmail the President with Hunter Biden's Laptop: ‘He Has to Do Whatever They Say'
2023-06-21, MSN News
https://www.msn.com/en-us/news/politics/jesse-watters-claims-fbi-and-cia-can-...

Fox News host Jesse Watters claimed during a Wednesday airing of The Five that the Federal Bureau of Investigation and Central Intelligence Agency can use information found on the Hunter Biden laptop to blackmail President Joe Biden. Watters' monologue was preceded by talks of the recent plea deal that the president's son reached with federal prosecutors earlier this week to avoid jail time on three federal charges. He failed to pay $1 million in taxes and faced a gun felony count. Conservative politicians and pundits in the media have used this to claim the Department of Justice is creating a two-tiered justice system. Earlier this month, former President Donald Trump was formally indicted by the DOJ for 37 charges related to his handling of classified material. "The feds are never going to crack open the laptop as long as Joe Biden's president. His administration is not going to investigate corruption in the Biden family. It's just not going to happen," Watters told the Fox panel. "Plus, the FBI in the CIA has this is blackmail. They can just dangle it in front of Joe and he has to do whatever they say or else ‘boop!'" Watters then called the former president an "outsider" in Washington. "But the bottom line is that insiders protect insiders. You said it the other day, Trump's an outsider. He goes to prison, his people go to prison. But if you're a Washington insider, you get to Hunter Biden treatment," Watters concluded.

Note: If the article fails to load, here's an alternate source. Read about how the intelligence agencies infiltrated the media to censor the Hunter Biden laptop story and other important topics. While Hunter Biden was indicted for three felony gun charges and nine counts of tax-related crimes, his laptop also revealed suspicious business dealings with corrupt overseas firms.


U.S. Intelligence Building System to Track Mass Movement of People Around the World
2023-05-22, Vice
https://www.vice.com/en/article/88xq54/us-intelligence-building-system-to-tra...

The Pentagon's intelligence branch is developing new tech to help it track the mass movement of people around the globe and flag "anomalies." The project is called the Hidden Activity Signal and Trajectory Anomaly Characterization (HAYSTAC) program and it "aims to establish ‘normal' movement models across times, locations, and populations and determine what makes an activity atypical," according to a press release from the Office of the Director of National Intelligence (DNI). HAYSTAC will be run by the DNI's Intelligence Advanced Research Projects Activity (IARPA). It's kind of like DARPA, the Pentagon's blue-sky research department, but with a focus on intelligence projects. According to the agency, the project will analyze data from internet-connected devices and "smart city" sensors using AI. "An ever-increasing amount of geospatial data is created every day," Jack Cooper, HAYSTAC's program manager, said. Cooper also mentioned privacy, or rather a lack of it. "Today you might think that privacy means going to live off the grid in the middle of nowhere," he said. "That's just not realistic in today's environment. Sensors are cheap. Everybodys got one. There's no such thing as living off the grid." In one project, [contractor] AIS simulated a cyber attack. "Devices included traditional desktop systems, laptops, tablets, and mobile platforms," the firm said. "The technology tracks users through biometric features, including keystroke biometrics, mouse movement behavior, and gait detection."

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Trump-era special counsel's final report criticizes FBI's Russia probe
2023-05-15, NPR
https://www.npr.org/2023/05/15/1176219884/trump-russia-investigation-durham

The special counsel-led investigation looking into the FBI's probe of Russian interference in the 2016 Trump campaign has ended, the Department of Justice announced Monday, and in a 306-page final report, concludes the FBI did not have enough intelligence to merit a full Trump-Russia investigation. The report says that investigation – which was originally called the "Crossfire Hurricane" – was treated different from how cases related to Donald Trump's then-opponent, Democratic candidate Hillary Clinton, had been handled. "The speed and manner in which the FBI opened and investigated Crossfire Hurricane during the presidential election season based on raw, unanalyzed and uncorroborated intelligence also reflected a noticeable departure from how it approached prior matters involving possible attempted foreign election interference plans aimed at the Clinton campaign," the report says. The report concludes that the DOJ and FBI "failed to uphold their important mission of strict fidelity to the law." "Our investigation also revealed that senior FBI personnel displayed a serious lack of analytical rigor towards the information they they received, especially information received from politically affiliated persons and entities," the report says. In particular, there was a significant reliance on investigative leads provided by, or funded by, political opponents of Trump. "The Department did not adequately examine or question thee materials and the motivations of those providing them," the report says.

Note: Explore a much more in-depth analysis of this important news by crack reporter Matt Taibbi. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


CIA's War on WikiLeaks Is a Scandal Worthy of Congressional Investigation
2023-04-10, Truthout
https://truthout.org/articles/cias-war-on-wikileaks-is-a-scandal-worthy-of-co...

In 2010, Chelsea Manning shocked the world with leaked documents that exposed abuses and crimes committed by the United States military in Iraq. These revelations also made the publisher of those documents, Julian Assange, and his organization, WikiLeaks, household names. The U.S. government [is] charging Assange – a publisher – with violating the Espionage Act. Under the Espionage Act, one does not have the ability to make a public interest defense. All prosecutors have to do is show that a whistleblower possessed documents or transferred "national defense information" to a member of the press. Damage has already been done, but the future of journalism is in further jeopardy if the U.S. government holds a trial against Assange, convicts him, and shows the world that it has the final say over who is and is not a journalist. CIA Director Mike Pompeo and other officials sketched plans to target Assange that included poisoning or kidnapping him. This, along with the disruption campaign against WikiLeaks, represented the CIA's all-out war against a dissident media organization. The agency went so far as to redefine the organization as a "non-state hostile intelligence service" to carry out operations that it could never get away with against a group of journalists. It should be the subject of an intense investigation in Congress, and the Justice Department should be dropping the charges after publicly conceding that the CIA's actions mean Assange could never have a fair trial.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.


Congressional Effort to End Assange Prosecution Underway
2023-03-30, The Intercept
https://theintercept.com/2023/03/30/julian-assange-congress-rashida-tlaib/

Rep. Rashida Tlaib, D-Mich., is circulating a letter among her House colleagues that calls on the Department of Justice to drop charges against Julian Assange and end its effort to extradite him from his detention in Belmarsh prison in the United Kingdom. The Justice Department has charged Assange, the publisher of WikiLeaks, for publishing classified information. The Obama administration had previously decided not to prosecute Assange, concerned with what was dubbed internally as the "New York Times problem." The Times had partnered with Assange when it came to publishing classified information and itself routinely publishes classified information. Publishing classified information is a violation of the Espionage Act, though it has never been challenged in the Supreme Court, and constitutional experts broadly consider that element of the law to be unconstitutional. The Obama administration could not find a way to charge Assange without also implicating standard journalistic practices. The Trump administration, unburdened by such concerns around press freedom, pushed ahead with the indictment and extradition request. The Biden administration, driven by the zealous prosecutor Gordon Kromberg, has aggressively pursued Trump's prosecution. Tlaib noted that the Times, The Guardian, El PaĂ­s, Le Monde, and Der Spiegel had put out a joint statement condemning the charges, and alluded to the same problem that gave the Obama administration pause.

Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.


PETA Urges Pentagon to Stop 'Cruel' Pulsed Radiation Experiments on Animals
2023-03-13, Common Dreams
https://www.commondreams.org/news/havana-syndrome

People for the Ethical Treatment of Animals on Monday implored the U.S. military to reinstate a ban on the intentional wounding of animals in experiments and to stop radiation testing in an attempt to determine the cause of the mystery ailment popularly known as "Havana syndrome" that has afflicted U.S. government officials posted at diplomatic facilities in Washington, D.C. and several foreign countries. PETA argues that the military's decision to use live animals in testing related to Havana syndrome is "counterproductive" due to biological differences between humans and species subjected to the experiments, as well as the widespread availability of non-wounding research methods and the likelihood that radio frequency waves did not cause the mysterious ailment. The U.S. government has a long history of radiation experiments not only on animals but also on human beings. Scores of institutions, including some of North America's most prominent universities, laboratories, and hospitals hosted government and military experimentation on both volunteers and unwitting test subjects in the MK-ULTRA mind control experiments and other highly unethical and sometimes deadly programs. People suffering from Havana syndrome–so named because it was first identified by U.S. and Canadian diplomats and embassy staff in the Cuban capital–experienced what The Lancet described as "an abrupt onset of unusual clinical symptoms."

Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and non-lethal weapons from reliable major media sources.


Most Major "Threats" These Days Are Based On Lies: False Flag Terrorism is a Great Example
2023-03-09, The Pulse
https://www.thepulse.one/p/most-major-threats-these-days-are

We are stuck in a never ending cycle of disaster that has led to one giant sense-making crises. False flag terrorism ... refers to governments creating, supporting, or staging events, like acts of terrorism in their own country and on their own citizenry, and then blaming it on someone else. Sometimes events can be created and even staged, and other times events are completely real yet the narrative we receive is where the deception lies. Either way, in many cases these events are used for control and/or political and financial gain. Take, for example, Operation Northwoods. This was a plan hatched by the US government in the early 1960s to fool the American public and the international community into supporting a war against Cuba in order to oust Fidel Castro. The plan included blowing up a US ship, attacking a US military base, sinking and blowing up boats of Cuban refugees, hijacking planes, and orchestrating violent terrorism in multiple US cities against American citizens. And of course, blaming Cuba for these actions. 9/11 could perhaps be one of the best examples of false flag terrorism, but the evidence that has lead the majority of people to feel this sentiment has not seen the light of day within the mainstream. There are many similarities between 9/11 and COVID, and in my mind COVID has been a clear act of bioterrorism by the same entities who proposed the ‘solution.' These included vaccine mandates, mask mandates and more, which we are likely to see resurface again in the future.

Note: Read more about false flag terrorism. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.


The FBI's Most Controversial Surveillance Tool Is Under Threat
2023-02-10, Wired
https://www.wired.com/story/fbi-section-702/

New details about the FBI's failures to comply with restrictions on the use of foreign intelligence for domestic crimes have emerged. Section 702 of the Foreign Intelligence Surveillance Act (FISA) ... grants the government the ability to intercept the electronic communications of overseas targets who are unprotected by the Fourth Amendment. That authority is set to expire at the end of the year. But errors in the FBI's secondary use of the data–the investigation of crimes on US soil–are likely to inflame an already fierce debate over whether law enforcement agents can be trusted with such an invasive tool. Central to this tension has been a routine audit by the Department of Justice's (DOJ) national security division and the office of the director of national intelligence (ODNI) ... which unearthed new examples of the FBI failing to comply with rules limiting access to intelligence ostensibly gathered to protect US national security. Such "errors," they said, have occurred on a "large number" of occasions. A report on the audit, only recently declassified, found that in the first half of 2020, FBI personnel unlawfully searched raw FISA data on numerous occasions. In one incident, agents reportedly sought evidence of foreign influence linked to a US lawmaker. In another, an inappropriate search pertained to a local political party. In what privacy and civil liberties lawyers have termed a "backdoor search," the FBI regularly searches through unminimized data during investigations, and routinely prior to launching them.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Biden releases most JFK assassination records – but withholds thousands
2022-12-15, NBC News
https://www.nbcnews.com/politics/joe-biden/biden-releases-jfk-assassination-r...

President Joe Biden's administration released more than 13,000 records of President John F. Kennedy's assassination Thursday, but it fell short of fully complying with the spirit of a 30-year-old law demanding transparency by now. With Thursday's action, about 98% of all documents related to the 1963 killing have now been released and just 3% of the records remain redacted in whole or in part, according to the National Archives, which controls the John F. Kennedy Assassination Records Collection. The records include more information on accused gunman Lee Harvey Oswald and his time spent in Mexico City. But about 4,300 records remain redacted in part. [CIA agent George] Joannides ... guided and monitored an anti-Fidel Castro group called Directorio Revolucionario Estudiantil (Revolutionary Student Directorate) in 1963 that came into contact with Oswald in New Orleans in the months before the assassination, leading some to speculate about CIA-related complicity in the killing. As Oswald interacted with DRE and became known as an activist who supported President Castro, the Pentagon was formulating a plan called Operation Northwoods to stage a false flag attack in the United States to blame on Cuba and justify a military confrontation to make up for the aborted Bay of Pigs fiasco two years before. The records and the CIA's deceit over Joannides' ties to Oswald spans decades and came to light only after the records act began to unearth information about him.

Note: While the mainstream narrative points to the CIA being complicit in the killing of Kennedy by a Communist lone gunman, there is overwhelming evidence not often talked about, that reveals how Kennedy was murdered by rogue elements within US government agencies as a result of his efforts towards peacemaking strategies over nuclear weapon warfare, among other reasons. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.


New Report Sheds Light on Pentagon's Secret Wars Playbook
2022-11-03, The Intercept
https://theintercept.com/2022/11/03/us-military-secret-wars/

The United States has fought more than a dozen "secret wars" over the last two decades, according to a new report from the Brennan Center for Justice. Through a combination of ground combat, airstrikes, and operations by U.S. proxy forces, these conflicts have raged from Africa to the Middle East to Asia, often completely unknown to the American people and with minimal congressional oversight. These clandestine conflicts have been enabled by the 2001 Authorization for Use of Military Force, enacted in the wake of the September 11 attacks, as well as the covert action statute, which allows secret, unattributed operations, primarily conducted by the CIA. [The new] analysis is particularly illuminating in the case of Somalia, where the United States developed two key proxy forces, the Danab Brigade and the Puntland Security Force. The CIA began building the Puntland Security Force in 2002 to battle the Al Qaeda-affiliated al-Shabab and later the Islamic State in Somalia, or ISS. The force was transferred to U.S. military control around 2012 and went on to fight alongside U.S. Special Operations forces for a decade. [The Brennan Center's Katherine Yon] Ebright notes that the proxy fighters were "largely independent of the Somali government, despite being an elite armed brigade and one of Somalia's most capable special operations units. And their relationship with U.S. forces was long kept secret, with U.S. officials disavowing the presence of military advisers in Somalia until 2014."

Note: Since 2008, the US has supported at least nine coups in five African countries. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.


Has the C.I.A. Done More Harm Than Good?
2022-10-03, New Yorker
https://www.newyorker.com/magazine/2022/10/10/has-the-cia-done-more-harm-than...

Harry Truman became President in April, 1945. Two years later, he signed the National Security Act, which established the C.I.A.. It was supposed to do what its name suggested: centralize the intelligence that various agencies gathered. "It was not intended as a ‘Cloak and Dagger' Outfit!," Truman later wrote. In its charter, the C.I.A. was banned from domestic spying. There was no mention of covert action in the law that chartered the C.I.A., but Presidents–starting with Truman–began using it that way. One of the agency's first operations involved meddling in the 1948 Italian election. During the Vietnam War, the C.I.A. had discouraging intelligence to offer, and, when successive Administrations didn't want to hear it, focused on being helpful by providing ... supposedly quick fixes. That meant abetting a coup in 1963, spying on antiwar protesters, and launching the Phoenix Program, an anti-Vietcong campaign marked by torture and by arbitrary executions. More than twenty thousand people were killed under Phoenix's auspices. The C.I.A. has had a "defining failure" for every decade of its existence–sometimes more than one. In the nineteen-nineties, it was the lack of foresight about the Soviet Union; in the two-thousands, it was the phantom weapons of mass destruction, followed by torture and, in still evolving ways, by the drone-based program of targeted killings, with its high toll of civilian deaths. It's difficult to know, at this point, what the C.I.A.'s next defining failure ... will be.

Note: Read more about the CIA's Phoenix Program, which included the kidnapping, torture, and murder of civilians during the Vietnam War. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


The Battle for the World's Most Powerful Cyberweapon
2022-01-28, New York Times
https://www.nytimes.com/2022/01/28/magazine/nso-group-israel-spyware.html

NSO Group [is] the world's most notorious maker of spyware. The F.B.I. had bought a version of Pegasus, NSO's premier spying tool. It could ... crack the encrypted communications of any iPhone or Android smartphone. Since NSO had introduced Pegasus to the global market in 2011, it had helped Mexican authorities capture Joaquín Guzmán Loera, the drug lord known as El Chapo. European investigators have quietly used Pegasus to thwart terrorist plots, fight organized crime and, in one case, take down a global child-abuse ring. Mexico deployed the software not just against gangsters but also against journalists and political dissidents. The United Arab Emirates used the software to hack the phone of a civil rights activist. Saudi Arabia used it against women's rights activists. During a presentation to officials in Washington, the company demonstrated a new system, called Phantom, that could hack any number in the United States that the F.B.I. decided to target. A slick brochure ... says that Phantom allows American law enforcement and spy agencies to get intelligence "by extracting and monitoring crucial data from mobile devices." It is an "independent solution" that requires no cooperation from AT&T, Verizon, Apple or Google. The system, it says, will "turn your target's smartphone into an intelligence gold mine." The Phantom presentation triggered a discussion among government lawyers. Last summer ... the F.B.I. finally decided not to deploy the NSO weapons.

Note: Read more about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Former Twitter Employees Charged With Spying for Saudi Arabia
2019-11-06, New York Times
https://www.nytimes.com/2019/11/06/technology/twitter-saudi-arabia-spies.html

Ali Alzabarah was an engineer who rose through the ranks at Twitter to a job that gave him access to personal information and account data of the social media service’s millions of users. Ahmad Abouammo was a media partnerships manager at the company who could see the email addresses and phone numbers of Twitter accounts. On Wednesday, the Justice Department accused the two men of using their positions and their access to Twitter’s internal systems to aid Saudi Arabia by obtaining information on American citizens and Saudi dissidents who opposed the policies of the kingdom and its leaders. Mr. Alzabarah and Mr. Abouammo were charged with acting as agents of a foreign power inside the United States, in the first complaint of its kind involving Saudis in the country. The case raised questions about the security of American technology companies already under scrutiny for spreading disinformation and influencing public opinion, showing that these firms can be penetrated from the inside as well. It also underscored the broad effort that Crown Prince Mohammed bin Salman of Saudi Arabia and his close advisers have conducted to silence critics both inside the kingdom and abroad. Jamal Khashoggi, a columnist for The Washington Post who was critical of the way Saudi Arabia is run, was murdered last year by Saudi agents in Istanbul.

Note: Read more on Saudi Arabia's extreme efforts to silence its critics. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable major media sources.


The State Department has been funding trolls. I'm one of their targets
2019-06-04, Washington Post
https://www.washingtonpost.com/opinions/2019/06/04/state-department-has-been-...

Even after spending a year and a half in prison in Tehran, I knew that if I wanted to go on writing about Iran, I would be a target for plenty of public attacks. But I never imagined the U.S. State Department would be funding my attackers. Last week, several astute Iran watchers drew attention to a series of inflammatory tweets associated with the Iran Disinformation Project, a State Department-funded initiative that its website claims "brings to light disinformation emanating from the Islamic Republic of Iran via official rhetoric, state propaganda outlets, social media manipulation and more." The targets of the tweets included think-tank analysts, human rights activists and journalists. The common thread is that we are all perceived by regime change proponents and supporters of the Trump administration's so-called maximum pressure policy to be soft on Iran because we are critical of crushing economic sanctions and the threat of the use of military force. For these thought crimes, we are branded by @IranDisinfo and similar social media accounts as Tehran's "mouthpieces," "apologists," "collaborators," and "lobbyists" in the West. We're faced with the irony that an initiative aimed at combating Tehran's disinformation campaigns is resorting to disinformation campaigns of its own, using taxpayer funds to spread lies about U.S. citizens. We need programs that fight the spread of falsehoods and propaganda, but such efforts shouldn't combat lies with other lies.

Note: For lots more on this eye-opening event, see this excellent article by Matt Taibbi. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.


What the CIA Tells Congress (Or Doesn’t) about Covert Operations: The Barr/Cheney/Bush Turning Point for CIA Notifications to the Senate
2019-02-07, National Security Archive
https://nsarchive.gwu.edu/briefing-book/intelligence/2019-02-07/what-cia-tell...

Attorney-General nominee William P. Barr figured prominently in arguments to limit CIA responsibility to provide notification to Congress about covert actions during the 1980s, according to a review of declassified materials published today by the National Security Archive. As the Iran-Contra scandal played out, Barr, who held senior posts at the Justice Department, provisionally supported the idea of the president’s “virtually unfettered discretion” in foreign policy and downplayed Congress’s power. The issue of notification of Congress about imminent clandestine activities was at the heart of the Iran-Contra scandal when President Ronald Reagan and CIA Director William Casey specifically ordered that lawmakers be kept in the dark about the infamous, covert arms-for-hostages deals with Iran. Barr was by no means alone in pushing these views, the documents show. Other notable proponents during the Iran-Contra aftermath included then-Congressman Dick Cheney and John R. Bolton, who was also at the Justice Department. After Cheney became defense secretary he continued to press for extraordinarily broad Executive Branch authority, advising then-President George H. W. Bush to veto the Senate’s intelligence appropriations bill on the grounds it “attacked” presidential prerogatives – resulting in the only known such veto since the CIA’s creation.

Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


Everybody Does It: The Messy Truth About Infiltrating Computer Supply Chains
2019-01-24, The Intercept
https://theintercept.com/2019/01/24/computer-supply-chain-attacks/

Bloomberg Businessweek published an alarming story: Operatives working for China's People's Liberation Army had secretly implanted microchips into motherboards made in China and sold by U.S.-based Supermicro. This allegedly gave Chinese spies clandestine access to servers belonging to over 30 American companies, including Apple, Amazon, and various government suppliers, in an operation known as a "supply chain attack," in which malicious hardware or software is inserted into products before they are shipped to surveillance targets. U.S. spy agencies ... assessed that China was adept at corrupting the software bundled closest to a computer's hardware at the factory, threatening some of the U.S. government's most sensitive machines, according to documents provided by National Security Agency whistleblower Edward Snowden. The documents also detail how the U.S. and its allies have themselves systematically targeted and subverted tech supply chains, with the NSA conducting its own such operations, including in China, in partnership with the CIA and other intelligence agencies. The documents also disclose supply chain operations by German and French intelligence. Computer hardware can be altered at various points along the supply chain, from design to manufacturing to storage to shipment. The U.S. is among the small number of countries that could, in theory, compromise devices at many different points in this pipeline, thanks to its resources and geographic reach.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Bobby Kennedy’s son thinks he was killed by a second shooter. Is there anything to it?
2018-05-21, Boston.com
https://www.boston.com/news/history/2018/05/31/rfk-assassination-conspiracy-t...

“My father was the chief law enforcement officer in this country,” Robert F. Kennedy Jr. recently told The Washington Post. “I think it would have disturbed him if somebody was put in jail for a crime they didn’t commit.” Kennedy’s second oldest son now believes ... that his father was killed by a second gunman. RFK Jr. even visited Sirhan Sirhan, the man convicted of shooting and killing his father, because he was “curious and disturbed by what I had seen in the evidence.” He isn’t the only one. “If you believe the LAPD reports about this case, there is no way that Sirhan did it and did it alone,” Dan Moldea, an investigative journalist and author of The Killing of Robert F. Kennedy, told Boston.com. Kennedy was assassinated ... on June 5, 1968, at the Ambassador Hotel in Los Angeles. Kennedy was walking through the hotel kitchen pantry [and] was shot from behind at point-blank range. Sirhan approached from the front, on Kennedy’s right. His gun never got closer than about a foot-and-a-half away [and] carried a maximum of just eight bullets. And yet, there’s evidence that suggests more than eight shots were fired. Who would the second gunman have been? Theorists most commonly point to ... Thane Eugene Cesar. Cesar was a security guard who hated the Kennedys. Cesar was also walking with Kennedy when the shooting occurred and ... owned a .22-caliber similar to Sirhan’s gun, which he initially told police he sold before the assassination, but had actually, it was later found, sold three months after the shooting.

Note: For more along these lines, see concise summaries of deeply revealing assassinations news articles from reliable major media sources.


Orlando nightclub shooter’s father was FBI informant, court documents say
2018-03-26, Washington Post
https://www.washingtonpost.com/world/national-security/orlando-nightclub-shoo...

The father of the 29-year-old who killed 49 people at an Orlando nightclub in the summer of 2016 was an FBI informant who came under scrutiny himself after investigators found receipts for money transfers to Turkey and Afghanistan in the wake of the mass shooting. The revelation came in documents filed by attorneys for the shooter’s wife, Noor Salman, who is on trial in Orlando on allegations that she aided and abetted her husband’s attack and obstructed law enforcement’s investigation into it. Salman’s trial has been underway for weeks, but defense attorneys argued that they were not informed until Saturday of the father’s work for the FBI. That, they argued, is grounds to dismiss the charges. Seddique Mateen - the father of Omar Mateen - was an FBI informant at various points between January 2005 and June 2016, court documents say. Salman’s attorneys argued in court filings that if they had known of Seddique Mateen’s work for the bureau, they might have explored ... whether the FBI’s interviews with Salman were an attempt at “evading the negligence they exercised with their own informant,” and whether their “unwavering focus on Noor Salman, rather than Seddique Mateen, could have been designed to find a culprit other than the father.” The FBI has previously come under criticism for investigating Omar Mateen for 10 months starting in 2013 and ultimately concluding he was not a threat.

Note: Noor Salman was acquitted shortly after this information came out. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


Saudi prince denies Kushner is ‘in his pocket’
2018-03-22, Washington Post
https://www.washingtonpost.com/world/national-security/saudi-prince-denies-ku...

Saudi Crown Prince Mohammed bin Salman said Thursday it would be “really insane” for him to trade classified information with presidential son-in-law and White House adviser Jared Kushner. Speaking in a meeting with Washington Post editors and reporters, Mohammed denied U.S. media reports that he had claimed Kushner was “in his pocket,” or that ... he had sought or received a green light from Kushner for massive arrests of allegedly corrupt members of the royal family and Saudi businessmen that took place in the kingdom. The detentions were solely a domestic issue and had been in the works for years, the prince said. The son of King Salman and heir to the Saudi throne, Mohammed, 32, met with President Trump on Tuesday in the Oval Office and over lunch. He also spoke with a number of congressional leaders. Even as Trump has said he is seeking increased investment and purchases of U.S. military equipment and other products from Saudi Arabia, Mohammed has made clear that his primary mission here is to win U.S. investor confidence in his country. Asked about the Saudi-funded spread of Wahhabism, the austere faith ... that some have accused of being a source of global terrorism, Mohammed said that investments in mosques and madrassas overseas were rooted in the Cold War, when allies asked Saudi Arabia to use its resources to prevent inroads in Muslim countries by the Soviet Union. Successive Saudi governments lost track of the effort, he said.

Note: 531,525 diplomatic cables from 1979 published by Wikileaks shed light on how Saudi Arabia and the CIA fueled the rise of modern Islamic terrorism. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and terrorism.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"