Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Mysterious episodes that caused brain injuries in spies, diplomats, soldiers and other U.S. personnel overseas starting five years ago now number more than 130 people, far more than previously known, according to current and former officials. The number of cases within the C.I.A., the State Department, the Defense Department and elsewhere spurred broad concern in the Biden administration. The initial publicly confirmed cases were concentrated in China and Cuba and numbered about 60, not including a group of injured C.I.A. officers whose total is not public. Since December, at least three C.I.A. officers have reported serious health effects from episodes overseas. One occurred within the past two weeks, and all have required the officers to undergo outpatient treatment at Walter Reed National Military Medical Center or other facilities. And in one case in 2019 that has not previously been reported, a military officer serving overseas pulled his vehicle into an intersection, then was overcome by nausea and headaches. His 2-year-old son, sitting in the back seat, began crying. After the officer pulled away from the intersection, his nausea stopped, and the child stopped crying. In a report released in December, the National Academy of Sciences said a microwave weapon probably caused the injuries. Some officials believe a microwave or directed-energy device is the most likely cause. The severity of the brain injuries has ranged widely. Some victims have chronic, potentially irreversible symptoms.
Note: Read more about these mysterious attacks on spies and diplomats. Read very little-known, yet astounding information on sophisticated technologies which can project music and clear voices into people's heads in these concise summaries of deeply revealing news articles on non-lethal weapons from reliable major media sources.
The Senate Select Committee on Intelligence submitted its 6,700-page "torture report" about the CIA to the White House in April 2014. More than 10 years later, the full report remains secret after a federal appellate court dismissed a lawsuit I filed in the hopes of forcing its release. The document "includes comprehensive and excruciating detail" about the CIA's "program of indefinite secret detention and the use of brutal interrogation techniques," the late Sen. Dianne Feinstein, who chaired the Senate intelligence committee at the time, wrote in a 2014 summary. "The full report details how the CIA lied to the public, the Congress, the president, and to itself about the information produced by the torture program," said Tom Blanton, director of the National Security Archive at George Washington University. So far, efforts to obtain the torture report using the federal Freedom of Information Act have been unsuccessful. In late 2016, despite the CIA director's objections, former President Barack Obama placed a copy in his presidential papers. But that copy is not subject to FOIA until 2029 – 12 years after Obama left office. The CIA and a handful of federal agencies also have copies of the torture report, although the Trump administration returned several of these to the Senate intelligence committee vaults in 2017. The Obama, Trump, and Biden administrations all fought strenuously against FOIA requests for these agencies' copies.
Note: The above was written by media law attorney Shawn Musgrave. No one been charged in connection with the unethical CIA torture program. Many of the architects and enablers of the program are now in powerful and esteemed positions in academia, high levels of government, the federal judiciary, and more. For more, read the "10 Craziest Things in the Senate Report on Torture" and check out our summary on US torture programs in our comprehensive Military-Intelligence Corruption Information Center.
Hunter Biden was hit with a double whammy Wednesday. First, a new filing by the prosecution in his upcoming gun-felony trial in Delaware poured scorn on Hunter's legal team's bizarrely persistent denial that his laptop and its contents are authentic. Then IRS whistleblowers Gary Shapley and Joe Ziegler delivered 100 pages of new bombshell evidence showing Hunter lied repeatedly to investigators in his sworn congressional testimony in February, prompting House Ways and Means Committee Chairman Jason Smith to raise the prospect of perjury charges against the first son. Shapley also produced a document that adds further weight to the suspicion that Hunter's "sugar brother" ... Kevin Morris, was under CIA protection. Hunter lied about his shakedown WhatsApp message to CEFC employee Raymond Zhao on July 30, 2017, said Smith, when his committee voted to publicly release the new whistleblower documents. "These documents make clear that Hunter Biden was using his father's name to shake down a Chinese businessman – and it worked. And when confronted by congressional investigators about it, he lied," the panel said. The CIA's shadowy hand can be seen elsewhere in the Hunter Biden story, including in the rapid approval of the "Dirty 51" letter signed by 51 former intelligence operatives (mainly from the CIA) before the 2020 election that falsely claimed that Hunter's laptop was Russian disinformation.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Last year, the Republican chairman of the US House Permanent Select Committee on Intelligence (HPSCI) presented an image of Americans protesting the war in Gaza while implying possible ties between the protesters and Hamas, an allegation that was used to illustrate why surveillance reforms may prove detrimental to national security. In December, as many as 200 Republican staffers gathered behind closed doors to hear a presentation ... aimed at shoring up support for a US surveillance program known as Section 702. Section 702 authorizes the government to surveil foreigners located physically overseas ... but not Americans or individuals on US soil. While eavesdropping on foreigners is permitted, doing so for the explicit purpose of gaining access to an American's communications–a practice commonly referred to as "reverse targeting"–is strictly forbidden. "Yes, it's true, you cannot â€target' protesters under 702," one aide, a legislative director for a Republican lawmaker, says. "But that doesn't mean the FBI doesn't still have the power to access those emails or listen to their calls if it wants." Between 2020 and early 2021, the FBI conducted "tens of thousands" of queries related to "civil unrest" in the United States. "Political protest is literally how America was founded. It's in our DNA," says Jason Pye, senior policy analyst at the nonprofit FreedomWorks. "Whether you agree with these protesters or not is irrelevant."
Note: The FBI has a long history of spying on political activists. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
The United States Defense Department announced Friday that it found no evidence that the government is covering up contact with extraterrestrials. The report was issued by the Pentagon's All-domain Anomaly Resolution Office (AARO), the unit created and tasked in recent years with studying UAP sightings. The report in its own way raises as many new questions as it answers. AARO investigators, for instance, dug through the claims of witnesses and whistleblowers and successfully traced back the underlying research projects, Special Access Programs (SAPs), and classified compartments. As the report says, "AARO investigated numerous named, and described, but unnamed programs alleged to involve UAP exploitation conveyed to AARO through official interviews," and ultimately, "conclude[d] many of these programs represent authentic, current and former sensitive, national security programs, but none of these programs have been involved with capturing, recovering, or reverse-engineering off-world technology or material." What exactly are the secret compartmentalized programs that the whistleblowers and government witnesses misidentified as being related to UAP technology? What, exactly, are the Pentagon, intelligence community, or defense contractors working on that ... looks and sounds like reverse-engineering out-of-this-world technology or even studying so-called "non-human biologics"?
Note: For more along these lines, see concise summaries of deeply revealing news articles on UFOs from reliable major media sources. Then explore the excellent, reliable resources provided in our new UFO Information Center.
During a Senate briefing last week, a federal counterterrorism official cited the October 7 Hamas attack while urging Congress to reauthorize a sprawling and controversial surveillance program repeatedly used to spy on U.S. citizens on U.S. soil. "As evidenced by the events of the past month, the terrorist threat landscape is highly dynamic and our country must preserve [counterterrorism] fundamentals to ensure constant vigilance," said Director of the National Counterterrorism Center Christine Abizaid. She pointed to Section 702 of the Foreign Intelligence Surveillance Act, which enables the U.S. government to gather vast amounts of intelligence – including about U.S. citizens ... without first seeking a warrant. Section 702 "provides key indications and warning on terrorist plans and ... gives us strategic insight into foreign terrorists and their networks overseas," Abizaid said. "I respectfully urge Congress to reauthorize this vital authority." The controversial program is set to expire at the end of the year, and lawmakers sympathetic to the intelligence community are scrambling to protect it. Sean Vitka ... at the civil liberties group Demand Progress [said] that now is the time to enact lasting and dramatic oversight of the 702 authority. "The government has completely failed to demonstrate that any of the privacy protections reformers have called for would impair national security ... so now we're seeing people grasping at straws trying to turn everything into an excuse for reauthorization," Vitka said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
In March of 2021 a nonprofit group called the Center for Countering Digital Hate (CCDH) released a report about online misinformation. Founded [by] Imran Ahmed, the CCDH ... provides the White House with a powerful weapon to use against critics including RFK Jr. and [Elon] Musk, while also pressuring platforms like Facebook and Twitter to enforce the administration's policies. One rumor that came up ... is that [Ahmed] works for British intelligence. "There's nothing surprising about this," said Mike Benz, a former State Department official who now runs the Foundation for Freedom Online, a free-speech watchdog. "This is not the first rodeo of British and U.S. intelligence services creating a cutout for the purpose of influencing the online news economy, to rig public debate in favor of political speech that supports agency agendas." CCDH's ... chairman is Simon Clark, a former senior fellow at the Center for American Progress (CAP), a D.C. think tank aligned with the corporate arm of the Democratic Party. One might conclude that CCDH functions as an arm of the corporate wing of the Democratic Party, to be deployed against the perceived enemies of corporate Democrats, whether they come from the left or the right. Clark was also a senior fellow at the Atlantic Council's Digital Forensics Lab. "The Atlantic Council, in the past several years, has had seven CIA directors on its board of directors or board of advisers," said Benz. "And it's one of the premier architects of online censorship."
Note: Read an excellent piece on what gave rise to the modern censorship regime. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
An advisory board to President Biden has recommended limiting the F.B.I.'s ability to use a controversial warrantless surveillance program to hunt for information about Americans, even as it urged lawmakers to renew the law that authorizes it. The panel, known as the President's Intelligence Advisory Board, suggested barring the bureau from searching a database of intercepted information when looking for evidence about Americans in criminal investigations that do not involve foreign intelligence. The board ... delivered the recommendation in a declassified 39-page report. It came as Congress was debating whether to extend the law authorizing the program, known as Section 702. Under Section 702, the government can collect – from American companies like Google and AT&T and without a warrant – the communications of targeted foreigners abroad, even when they are talking to or about Americans. The notion that Section 702 creates a backdoor to the Fourth Amendment by allowing the F.B.I. to read private communications to or from an American without a warrant in ordinary criminal contexts has raised particular alarm. But the board rejected as unjustified the more sweeping reform proposal: to require the government to obtain a court warrant before using Americans' identifiers to search the repository. Requiring a court order before doing so, the board said, would prevent intelligence agencies from discovering threats to the country in a timely manner.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The U.S. carpet bombing of Cambodia between 1969 and 1973 has been well documented, but its architect, former national security adviser and Secretary of State Henry Kissinger ... bears responsibility for more violence than has been previously reported. An investigation by The Intercept provides evidence of previously unreported attacks that killed or wounded hundreds of Cambodian civilians during Kissinger's tenure in the White House. "You can trace a line from the bombing of Cambodia to the present," said Greg Grandin, author of "Kissinger's Shadow." "The covert justifications for illegally bombing Cambodia became the framework for the justifications of drone strikes and forever war." Kissinger bears significant responsibility for attacks in Cambodia that killed as many as 150,000 civilians, according to Ben Kiernan, former director of the Genocide Studies Program at Yale University and one of the foremost authorities on the U.S. air campaign in Cambodia. That's up to six times the number of noncombatants thought to have died in U.S. airstrikes in Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, and Yemen during the first 20 years of the war on terror. Grandin estimated that, overall, Kissinger – who also helped to prolong the Vietnam War and facilitate genocides in Cambodia, East Timor, and Bangladesh; accelerated civil wars in southern Africa; and supported coups and death squads throughout Latin America – has the blood of at least 3 million people on his hands.
Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and war from reliable major media sources.
FBI officials repeatedly violated their own standards when they searched a vast repository of foreign intelligence for information related to the January 6 insurrection and racial justice protests in 2020, according court order released Friday. The violations were detailed in a secret court order issued last year by the foreign intelligence surveillance (Fisa) court, which has legal oversight of the US government's spy powers. At issue are improper queries of foreign intelligence information collected under section 702 of the Foreign Intelligence Surveillance Act, which enables the government to gather the communications of targeted foreigners outside the US. That program, which is set to expire at the end of the year, creates a database of intelligence that US agencies can search. FBI searches must have a foreign intelligence purpose or be aimed at finding evidence of a crime. But congressional critics of the program have long raised alarm about what they say are unjustified searches of the database for information about Americans, along with more general concerns about surveillance abuses. In repeated episodes disclosed on Friday, the FBI's own standards were not followed. The April 2022 order, for instances, details how the FBI queried the section 702 repository using the name of someone who was believed to have been at the Capitol during the January 6 riot. Officials obtained the information despite it not having any "analytical, investigative or evidentiary purpose", the order said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Antiterrorist moral fervor and ideological blinders propelled the U.S. into its biggest foreign policy blunder since World War Two. The U.S. government constantly embellished the storyline to demonize the communist opposition. A CIA operative provided materials for a massive bomb that ripped through a main square in Saigon in 1952. A Life magazine photographer was waiting on the scene, and his resulting snap appeared with a caption blaming the carnage on Viet Minh Communists. The Kennedy administration sought credibility by profoundly deceiving the American people and Congress regarding its Vietnam policy. In August 1963, South Vietnamese Special Forces "carried out midnight raids against Buddhist pagodas throughout the country. More than 1400 people, mostly monks were arrested and many of them were beaten," according to the Pentagon Papers. The CIA was bankrolling these Special Forces, which were supposed to be used for covert operations against the Viet Cong or North Vietnam, not for religious repression. The Johnson administration exploited the terrorist label to sway Americans to support greater U.S. Involvement in Vietnam. In a special message to Congress on May 18, 1964 seeking additional fund for Vietnam, LBJ declared, "the Viet Cong guerrillas, under orders from their Communist masters in the North, have intensified terrorist actions against the peaceful people of South Vietnam. This increased terrorism requires increased response."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and terrorism from reliable major media sources.
An offshore company that is trusted by the major web browsers and other tech companies to vouch for the legitimacy of websites has connections to contractors for U.S. intelligence agencies and law enforcement, according to security researchers, documents and interviews. Google's Chrome, Apple's Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to act as what's known as a root certificate authority, a powerful spot in the internet's infrastructure that guarantees websites are not fake, guiding users to them seamlessly. The company's Panamanian registration records show that it has the identical slate of officers, agents and partners as a spyware maker identified this year as an affiliate of Arizona-based Packet Forensics, which ... has sold communication interception services to U.S. government agencies for more than a decade. TrustCor's products include an email service that claims to be end-to-end encrypted, though experts consulted by The Washington Post said they found evidence to undermine that claim. A test version of the email service also included spyware developed by a Panamanian company related to Packet Forensics. A person familiar with Packet Forensics' work confirmed that it had used TrustCor's certificate process and its email service, MsgSafe, to intercept communications and help the U.S. government catch suspected terrorists. The physical address in Toronto given in [TrustCor's] auditor's report, 371 Front St. West, houses a UPS Store mail drop.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.
The Department of Homeland Security launched a failed operation that ensnared hundreds, if not thousands, of U.S. protesters in what new documents show was as a sweeping, power-hungry effort before the 2020 election to bolster President Donald Trump's spurious claims about a "terrorist organization" he accused his Democratic rivals of supporting. An internal investigative report, made public this month by Sen. Ron Wyden ... details the findings of DHS lawyers concerning a previously undisclosed effort by Trump's acting secretary of homeland security, Chad Wolf, to amass secret dossiers on Americans in Portland attending anti-racism protests in summer 2020 sparked by the police murder of ... George Floyd. The report describes attempts by top officials to link protesters to an imaginary terrorist plot in an apparent effort to boost Trump's reelection odds, raising concerns now about the ability of a sitting president to co-opt billions of dollars' worth of domestic intelligence assets for their own political gain. DHS analysts recounted orders to generate evidence of financial ties between protesters in custody; an effort that, had they not failed, would have seemingly served to legitimize President Trump's false claims about "Antifa." The report describes the dossiers generated by DHS as having detailed the past whereabouts and the "friends and followers of the subjects, as well as their ... First Amendment speech activity."
Note: Read about the FBI's use of entrapment to manufacture terrorist plots. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
The Supreme Court ruled Thursday that the federal government can shield former government contractors from testifying about the torture of a post-9/11 detainee. The decision likely will make it harder for victims to expose secret government misconduct in the future. Abu Zubaydah was the first prisoner held by the CIA to undergo what, at the time, was euphemistically called "enhanced interrogation." During one 20-day period, he was waterboarded 83 times, 24 hours a day. During that period, the suspected terrorist was also slammed against walls, put in a coffin-like box for hours at a time to simulate live burial, and subjected to something the government called "rectal rehydration." In the end, the two CIA contractors who supervised Zubaydah's interrogation concluded that they had the wrong man. But when lawyers for Zubaydah subpoenaed them, the U.S. government blocked the move by invoking the so-called "state secrets" privilege. In this case, both the Trump and Biden administrations argued that even though the information about the torture program is widely known, confirming the existence of CIA black sites in Poland would jeopardize the U.S. government's relationship with foreign intelligence services. Josh Colangelo-Bryan, a lawyer who represents other Guantanamo Bay detainees, was ... critical. "There has been no accountability for the U.S. program that subjected people to torture," he said in a statement.
Note: Read more about the CIA's torture program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Russia invaded Ukraine. For years now the Central Intelligence Agency has been preparing for such a moment, not only with prescient intelligence gathering and analysis but also by preparing Ukrainians to mount an insurgency against a Russian occupation. The agency has been training Ukrainian special forces and intelligence officers at a secret facility in the U.S. since 2015. Because the CIA training program is now publicly known, Russia can persuasively claim that Ukrainian insurgents are CIA proxies – a useful statement as propaganda to pro-Russian separatists in eastern Ukraine and as a justification for any harsh measures it takes against Ukrainian civilians. The CIA needs to be honest with the Ukrainians – and itself – about the real intent. In the first U.S.-backed insurgency, according to top secret documents later declassified, American officials intended to use the Ukrainians as a proxy force to bleed the Soviet Union. This time, is the primary goal of the paramilitary program to help Ukrainians liberate their country or to weaken Russia over the course of a long insurgency that will undoubtedly cost as many Ukrainian lives as Russian lives, if not more? Even if a Ukrainian insurgency bleeds Russia over years, the conflict could cause instability to spread across Central and Eastern Europe. This is a pattern in the history of U.S. paramilitary operations – from the Cold War to Afghanistan and Iraq today.
Note: For an alternative view of Ukraine's Zelensky, don't miss this excellent presentation by intrepid reporter Ben Swann (skip to 1:45 to avoid advertisement). For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and war from reliable major media sources.
On April 17, 2018, Terry Albury appeared in a federal court in Minneapolis, where he pleaded guilty to charges of leaking classified information to the press. The allegations – that Albury downloaded, printed and photographed internal F.B.I. documents on his office computer, sending some of them electronically to a journalist and saving others on external devices found in his home – resulted from a 17-month-long internal investigation by the F.B.I., prompted by two Freedom of Information Act requests by a news organization ... in March 2016. Nine months after these FOIA requests were made, a trove of internal F.B.I. documents shedding new light on the vast and largely unrestricted power of the post-9/11 F.B.I. was posted on the investigative-journalism site The Intercept. The cache included hundreds of pages of unredacted policy manuals, including the F.B.I.'s byzantine rule book, the Domestic Investigations and Operations Guide, exposing the hidden loopholes that allowed agents to violate the bureau's own rules against racial and religious profiling and domestic spying as they pursued the domestic war on terror. In October 2018, he was sentenced to four years in prison. Albury says he felt a moral imperative to make his disclosures, motivated by his belief that the bureau had been so fundamentally transformed by Sept. 11 that its own agents were compelled to commit civil and human rights violations.
Note: Listen to Albury talk about his experiences in this podcast. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
Haiti was born in 1804 out of a 13-year revolution in which the enslaved people of the then French colony of Saint-Domingue dismantled their chains, defeated, in succession, the armies of France, Britain and Spain, and established a new nation. Elites in Europe and America, meanwhile, fearful that the Haitian example might embolden others struggling for freedom, sought to isolate the new nation, refusing for decades even to recognise it. In 1825, France demanded, as the price of recognition, reparations of 150m francs. France was compelling enslaved people and their descendants to pay their former masters ... forcing [Haiti] to take out loans from French banks at exorbitant rates. By 1914, 80% of the government budget went to repaying the debt. Western nations have not only impoverished Haiti, they have also constantly intervened. Jean-Bertrand Aristide [was] a leftwing priest with mass support among Haiti's working class and poor. Twice, in 1990 and 2001, waves of public support propelled Aristide to the presidency. And twice, in 1991 and 2004, he was ousted in bloody coups. After the first coup, Aristide returned to power with US support. Nevertheless, many of the coup leaders were on the CIA payroll and the agency did not hide its hostility. A decade later, opposition to Aristide's economic and social policies led America to force him out of office. Today, the Haitian state barely exists.
Note: In 2021, Colombian mercenaries who had received training in the US assassinated Haitian President Jovenel MoĂŻse. For more along these lines, see concise summaries of important news articles on intelligence agency corruption from reliable major media sources.
We celebrate World Press Freedom Day in May as a reminder that the role of news organizations is to speak truth to power. It's an occasion to remember three people who exemplify the need to speak the truth: Daniel Ellsberg of Pentagon Papers fame and Julian Assange of WikiLeaks; and also of Chelsea Manning, without whom we would not have the proof of what the United States was doing, not only in Iraq and Afghanistan but all across the globe. Ellsberg's Pentagon Papers were a mere 7,000 pages, and he photocopied them by hand. Chelsea Manning's "papers", which Assange outed, earning the U.S. government's enmity, consisted of about 750,000 documents. Assange and WikiLeaks that made possible for Manning's information to reach people across the globe. And even when he and Manning have been arrested, jailed and isolated, the information on Wikileaks still continues to be accessible to all of us. Even today the Baghdad video of Collateral Murder, posted on WikiLeaks, was seen across the world and brought home that the United States was lying and involved in a massive cover-up of its war crimes. The Diplomatic Cables on Wikileaks informed the Tunisian people about the kleptocratic rule of the Ben Ali family and started what was later named as Arab Spring. Just as the surveillance state has invaded every nook and corner of our lives, the pathological need of the surveillance state to access and store all this information also makes the state porous and vulnerable.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
In early 2018, former National Security Agency chief Keith Alexander worked out a deal with Saudi Crown Prince Mohammed bin Salman and the cyber institute led by one of his closest aides, Saud al-Qahtani, to help the Saudi ruler train the next generation of Saudi hackers. The agreement between IronNet, founded by Alexander, and the cyber school ... faced no scrutiny for its association with Qahtani, after the brutal killing of Jamal Khashoggi he reportedly orchestrated just a few months later. Alexander officially inked the deal with the Prince Mohammed bin Salman College of Cyber Security, Artificial Intelligence, and Advanced Technologies – a school set up to train Saudi cyber intelligence agents – at a signing ceremony in Washington, D.C.. Saudi Arabia's agreement with IronNet was part of a host of moves to step up its cyber capabilities, coinciding with a campaign against the kingdom's critics abroad. Khashoggi, then a Washington Post columnist and prominent Salman critic, received a series of threatening messages, including one from Qahtani, warning him to remain silent. Khashoggi, whose family and close associates discovered listening malware electronically implanted on their smartphones, was then lured to the Saudi Embassy in Istanbul. It was there that a team dispatched by Qahtani detained and tortured the Saudi government critic. Qahtani, according to reports, beamed in through Skype to insult Khashoggi during the ordeal. Khashoggi was then dismembered with a bone saw.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The United States is stepping up digital incursions into Russia’s electric power grid in a warning to President Vladimir V. Putin and a demonstration of how the Trump administration is using new authorities to deploy cybertools more aggressively, current and former government officials said. In interviews over the past three months, the officials described the previously unreported deployment of American computer code inside Russia’s grid and other targets as a classified companion to more publicly discussed action directed at Moscow’s disinformation and hacking units around the 2018 midterm elections. In August of 2018, President Trump signed [an] executive order ... called National Security Presidential Memorandum 13. Its contents are still classified, but essentially it allows the Cyber Command to go ahead and conduct all kinds of operations inside foreign networks without going back to the president for prior approval. The first thing it did was go after those units in Russia that were responsible for a lot of the election-hacking. They went after the G.R.U., the Russian military intelligence unit that had been responsible for breaking into the D.N.C.. A lot of that ... was made public. What wasn’t made public was a parallel effort to go inside the Russian power grid, to put some code in places where the Russians ... wouldn’t see it, in case the U.S. ever needed to act against Russia’s utilities as the Russians were putting malware in our systems.
Note: A 2007 New York Times article describes the formation of the Air Force Cyberspace Command to arm the US military in anticipation of widespread computer-based warfare. A more recent Guardian article says, "we might already be living through the first world cyberwar." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.