Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


The C.I.A.’s Fake News Campaign
2017-10-13, New York Times
https://www.nytimes.com/2017/10/13/opinion/cia-fake-news-russia.html

For more than two decades during the Cold War, the public was bombarded by an enormous publicity campaign to shape American views of Russia. The campaign may have been the largest and most consistent source of political advertising in American history. And it was orchestrated by a big, powerful intelligence service: the Central Intelligence Agency. In 1950, [the CIA] created Radio Free Europe, a government-sponsored broadcasting station. Ostensibly, it provided unbiased news for Eastern Europeans, but in fact the agency used it to wage a subversive campaign to weaken Communist governments. But how to hide the agency’s hand? Simple: pretend that ordinary Americans are paying the bills. A well-heeled and well-connected front group, the National Committee for a Free Europe ... ran an enormous fund-raising campaign ... that implored Americans to donate “freedom dollars” to combat Kremlin lies. The donations barely covered the cost of running the “fund-raising drives,” to say nothing of Radio Free Europe’s $30 million annual budgets. But that wasn’t the point. Declassified documents reveal that almost from the start, the CIA saw that it could exploit the fund-raising campaign as a conduit for domestic propaganda. It was a way to rally public support for the Cold War. Our post-truth media environment [carries] voices from this past. The crusade blasted all information from enemy sources as lies and deceit — fake news, we could say.

Note: The US government was legally prevented from broadcasting propaganda to domestic audiences for many years. This prohibition ended when new rules were adopted in 2013. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.


The science of spying: how the CIA secretly recruits academics
2017-10-11, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/news/2017/oct/10/the-science-of-spying-how-the-ci...

In perhaps its most audacious and elaborate incursion into academia, the CIA has secretly spent millions of dollars staging scientific conferences around the world. Its purpose was to lure Iranian nuclear scientists out of their homeland and into an accessible setting, where its intelligence officers could approach them individually and press them to defect. While a university campus might have only one or two professors of interest to an intelligence service, the right conference – on drone technology, perhaps, or Isis – could have dozens. The FBI and CIA swarm conferences. At gatherings in the US, says one former FBI agent, “foreign intelligence officers try to collect Americans; we try to collect them”. The CIA is involved with conferences in various ways: it sends officers to them; it hosts them through front companies in the Washington area, so that the intelligence community can tap academic wisdom; and it mounts sham conferences to reach potential defectors from hostile countries. Scientific conferences have become such a draw for intelligence agents that one of the biggest concerns for CIA operatives is interference from agency colleagues trapping the same academic prey. “We tend to flood events like these,” a former CIA officer who writes under the pseudonym Ishmael Jones observed in his 2008 book, The Human Factor: Inside the CIA’s Dysfunctional Intelligence Culture.

Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in science and in the intelligence community.


Legal deal over harsh CIA interrogations marks a milestone
2017-08-18, Los Angeles Times/Associated Press
http://www.latimes.com/nation/nationnow/la-na-cia-torture-lawsuit-20170818-st...

A settlement in a landmark lawsuit against two psychologists who helped design the CIA's harsh interrogation methods used in the war on terror marked the first time the agency or its private contractors have been held accountable for the program, legal experts said. The deal in the lawsuit from the American Civil Liberties Union also makes it unlikely the CIA will again pursue the tactics, said Deborah Pearlstein, professor at the Cardozo Law School in New York. “This sends a signal to those who might consider doing this in the future,” Pearlstein said, adding, “This puts an exclamation mark at the end of ‘don't torture.’” Terms of the settlement were not disclosed, but it avoided a civil trial set for Sept. 5 in federal court. The ACLU sued psychologists James Mitchell and John “Bruce” Jessen on behalf of three former detainees, including one who died in custody, who contended they were tortured at secret CIA prisons overseas. Mitchell and Jessen were under contract with the federal government following the Sept. 11 terror attacks. The lawsuit claimed they designed, implemented and personally administered an experimental torture program. The techniques they developed included waterboarding, slamming the three men into walls, stuffing them inside coffin-like boxes, exposing them to extreme temperatures, starving them and keeping them awake for days, the ACLU said. A U.S. Senate investigation in 2014 found that Mitchell and Jessen's techniques produced no useful intelligence. They were paid $81 million for their work.

Note: Prior to condemning torture, some of the American Psychological Association’s top officials sought to curry favor with Pentagon officials by supporting the CIA's brutal interrogation methods. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.


Pentagon suppressing book on interrogations: former investigator
2017-08-03, Reuters
https://www.reuters.com/article/us-usa-torture-idUSKBN1AJ2NG

A former chief investigator at the Guantanamo Bay detention center is accusing the Pentagon of blocking publication of his book on the use of brutal interrogation techniques and top U.S. officials' advocacy of what he calls "torture." Mark Fallon, a Naval Criminal Investigative Service (NCIS) veteran, said his book "Unjustifiable Means" reveals no classified information or new detainee abuse cases but details internal deliberations about interrogation methods, identifies officials who advocated "torture" and describes how he and others objected. "This is more of an inside view of the fight to try to stop torture," he said. "There was a tremendous opposition within the government itself believing these were war crimes, and I name names." The use of the brutal interrogation methods made the country less safe, he said. Fallon said that he was told it would take no more than six weeks for the Defense Department office that scrubs manuscripts for unauthorized information to review his book. That was more than seven months ago. He has since missed his submission deadline, had to cancel a book tour and enlisted the American Civil Liberties Union and Columbia University's Knight First Amendment Institute to fight what he contends is a Pentagon effort to suppress his work and stifle his right to free speech. Now the ACLU and the Columbia University institute are taking Fallon's case to Congress.

Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.


Syrian rebels alarmed by reports covert CIA aid will end
2017-07-20, Financial Times
https://www.ft.com/content/a35244e6-6d2e-11e7-bfeb-33fe0c5b7eaa

For nearly four years, Syrian rebels have clung to a programme of CIA assistance as a symbol of US support in their battle against Bashar al-Assad’s regime. So reports that Donald Trump’s administration will stop the limited scheme to arm and train Syria’s opposition forces have sparked anger and confusion. Rebels say they have not been informed of any changes to the policy introduced ... in 2013 as part of efforts to put pressure on Syria’s president. According to ... the Washington Post newspaper, Mr Trump decided last month to end funding for the CIA programme. Rebels contacted by the Financial Times say their CIA interlocutors had not confirmed any change, and political opposition figures who met US officials this week say they, too, were given no hint of any change. One rebel commander who asked not to be named said US support had been waning for months but noted that the rebels had been given their salaries as normal last month. The CIA funding for rebel groups fed into two internationally backed operations that supported an array of rebel groups. Many observers and even rebels themselves criticised the programme for turning a blind eye to its funding ending up with jihadis. Rebels who received support would return to volatile territories in Syria, only to be pressed by an al-Qaeda-linked jihadi group to hand over a cut. “Frankly so much of the weapons and ammunition were going to [Syria’s al-Qaeda affiliate] that it’s probably a good thing,” [an] opposition figure said.

Note: What is the CIA doing paying the salaries of rebels in Syria? For more, see this informative article. Then, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.


Special Report: How the Federal Reserve serves U.S. foreign intelligence
2017-06-26, Reuters
https://www.reuters.com/article/us-fed-accounts-intelligence-specialrepo/spec...

The Federal Reserve’s little-known role housing the assets of other central banks comes with a unique benefit to the United States: It serves as a source of foreign intelligence for Washington. Senior officials from the U.S. Treasury and other government departments have turned to these otherwise confidential accounts several times a year to analyze the asset holdings of the central banks of Russia, China, Iraq, Turkey, Yemen, Libya and others, according to more than a dozen current and former senior Fed and Treasury officials. The U.S. central bank keeps a tight lid on information contained in these accounts. But according to the officials interviewed by Reuters, U.S. authorities regularly use a “need to know” confidentiality exception in the Fed’s service contracts with foreign central banks. Some 250 foreign central banks and governments keep $3.3 trillion of their assets at the Federal Reserve Bank of New York, about half of the world’s official dollar reserves, using a service advertised in a 2015 slide presentation as “safe and confidential.” Other major central banks and some commercial banks offer similar services. But only the Fed offers direct access to U.S. debt markets and to the world’s reserve currency, the dollar. In all, the people interviewed by Reuters identified seven instances in the last 15 years in which the accounts gave U.S. authorities insights into the actions of foreign counterparts or market movements, at times leading to a specific U.S. response.

Note: It's quite telling that no other major media picked up this important piece. For more along these lines, see concise summaries of deeply revealing news articles on financial industry corruption and the disappearance of privacy.


In Yemen's secret prisons, UAE tortures and US interrogates
2017-06-22, ABC News/Associated Press
http://abcnews.go.com/International/wireStory/us-interrogates-detainees-yemen...

Hundreds of men swept up in the hunt for al-Qaida militants have disappeared into a secret network of prisons in southern Yemen where abuse is routine and torture extreme - including the "grill," in which the victim is tied to a spit like a roast and spun in a circle of fire, an Associated Press investigation has found. Senior American defense officials acknowledged Wednesday that U.S. forces have been involved in interrogations of detainees in Yemen but denied any participation in or knowledge of human rights abuses. Interrogating detainees who have been abused could violate international law, which prohibits complicity in torture. The secret prisons are inside military bases, ports, an airport, private villas and even a nightclub. Some detainees have been flown to an Emirati base across the Red Sea in Eritrea, according to Yemen Interior Minister Hussein Arab and others. Several U.S. defense officials, speaking on condition of anonymity to discuss the topic, told AP that American forces do participate in interrogations of detainees at locations in Yemen, provide questions for others to ask, and receive transcripts of interrogations from Emirati allies. They said U.S. senior military leaders were aware of allegations of torture at the prisons in Yemen, looked into them, but were satisfied that there had not been any abuse when U.S. forces were present. Inside war-torn Yemen, however ... nearly 2,000 men have disappeared into the clandestine prisons, a number so high that it has triggered near-weekly protests.

Note: Saudi Arabia's military campaign in Yemen has strong US military support, and flagrantly violates international law. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.


Homeland Security official: Russian government actors tried to hack election systems in 21 states
2017-06-21, Washington Post
https://www.washingtonpost.com/world/national-security/homeland-security-offi...

People connected to the Russian government tried to hack election-related computer systems in 21 states. Samuel Liles, the Department of Homeland Security’s acting director of the Office of Intelligence and Analysis Cyber Division, said vote-tallying mechanisms were unaffected and that the hackers appeared to be scanning for vulnerabilities — which Liles likened to walking down the street and looking at homes to see who might be inside. Liles was testifying before the Senate Intelligence Committee, which is investigating Russia’s efforts to meddle in the 2016 presidential election. Officials in Arizona and Illinois had previously confirmed that hackers targeted their voter registration system. In a separate hearing ... former Department of Homeland Security secretary Jeh Johnson testified that Russia’s meddling ... was “unprecedented, the scale and the scope of what we saw them doing.” He said the severity of Russia’s efforts persuaded him to sign onto an Oct. 7 statement publicly blaming the Kremlin for what had happened. “We needed to do it, and we needed to do it well before the election to inform American voters of what we saw,” Johnson said. FBI Assistant Director of Counterintelligence Bill Priestap ... said Russia for years has tried to influence U.S. elections but that the “scale” and “aggressiveness” of its efforts in 2016 made the attempts more significant.

Note: Many who follow elections closely have known and spread the word for years about serious vulnerabilities in US electronic voting, yet only now that Russia is involved is it getting widespread coverage. Do you really think the Russians are the only ones who have hacked US elections? Read an enlightening analysis of elections hacking in the US which raises many serious questions. And don't miss the critically important information provided in our Elections Information Center.


Russian Cyber Hacks on U.S. Electoral System Far Wider Than Previously Known
2017-06-13, Bloomberg
https://www.bloomberg.com/politics/articles/2017-06-13/russian-breach-of-39-s...

Russia’s cyberattack on the U.S. electoral system before [the recent] election was far more widespread than has been publicly revealed, including incursions into voter databases and software systems in almost twice as many states as previously reported. In Illinois, investigators found evidence that cyber intruders tried to delete or alter voter data. The hackers accessed software designed to be used by poll workers on Election Day, and in at least one state accessed a campaign finance database. Details of the wave of attacks, in the summer and fall of 2016, were provided by three people with direct knowledge of the U.S. investigation into the matter. In all, the Russian hackers hit systems in a total of 39 states. The scope and sophistication so concerned Obama administration officials that they took an unprecedented step -- complaining directly to Moscow over a modern-day “red phone.” In October, two of the people said, the White House contacted the Kremlin on the back channel to offer detailed documents of what it said was Russia’s role in election meddling and to warn that the attacks risked setting off a broader conflict. The new details, buttressed by a classified National Security Agency document recently disclosed by the Intercept ... paint a worrisome picture for future elections: [This is] the newest portrayal of potentially deep vulnerabilities in the U.S.’s patchwork of voting technologies.

Note: Many who follow elections closely have known and spread the word for years about serious vulnerabilities in US electronic voting, yet only now that Russia is involved is it getting widespread coverage. Do you really think the Russians are the only ones who have hacked US elections? Read an enlightening analysis of elections hacking in the US which raises many serious questions. And don't miss the critically important information provided in our Elections Information Center.


Fast and Furious hearing rips Holder, DOJ for deception in gun-running scandal
2017-06-07, Fox News
http://www.foxnews.com/politics/2017/06/07/fast-and-furious-report-slams-hold...

Members of a congressional committee at a public hearing Wednesday blasted former President Barack Obama and his attorney general for allegedly covering up an investigation into the death of a Border Patrol agent killed as a result of a botched government gun-running project known as Operation Fast and Furious. The House Oversight Committee also Wednesday released a scathing, nearly 300-page report that found Holder’s Justice Department tried to hide the facts. Terry died in a gunfight. [His] death exposed Operation Fast and Furious, a Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) operation in which the federal government allowed criminals to buy guns in Phoenix-area shops with the intention of tracking them as they were transported into Mexico. But the agency lost track of more than 1,400 of the 2,000 guns they allowed smugglers to buy. Two of those guns were found at the scene of Terry's killing. Sen. Charles Grassley, R-Iowa, testified Wednesday in front of the committee, accusing DOJ and ATF officials of obstructing the investigation and working to silence ATF agents who informed the Senate of Fast and Furious. One of those silenced ATF agents, John Dodson, testified Wednesday that he remains “in a state of purgatory” since objecting to Fast and Furious and has been the subject of reprisals. Grassley's and Dodson's testimony reinforced findings of the report, which states that the Justice Department knew before Terry’s death that the ATF was “walking” firearms to Mexico and knew the day after the agent’s death that Fast and Furious guns were involved in the shootout -- despite denying these facts.

Note: The Obama administration invoked executive privilege in an unsuccessful attempt to cover this story up. Whistleblower John Dodson published a book on this scandal in 2013. The ATF tried and failed to silence him, then lied about the whole thing. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


Who Won the Election? NSA Report Suggests Russia Might Have Hacked Voting System
2017-06-05, Newsweek
http://www.newsweek.com/who-won-election-nsa-report-suggests-russia-might-hav...

Russian military intelligence attempted to cyber-attack a U.S. voting software supplier and more than 100 local election officials in the days leading up to the 2016 presidential election, The Intercept reported Monday. According to an NSA document ... Russian military intelligence cyber-attacked a U.S. voting software supplier, using information gained in that attack to “launch a voter registration-themed spear-phishing campaign targeting U.S. local government organizations. Russian General Staff Main Intelligence Directorate actors … executed cyber espionage operations against a named U.S. company in August 2016, evidently to obtain information on elections-related software and hardware solutions,” the document states. The operation gave the hackers “persistent access” to the targeted computers, allowing them to “survey the victims for items of interest.” But Pamela Smith, president of election integrity watchdog Verified Voting, said the hacking might have kept some Americans from voting. “If someone has access to a state voter database, they can take malicious action by modifying or removing information,” she told The Intercept. “This could affect whether someone has the ability to cast a regular ballot or be required to cast a ‘provisional’ ballot — which ... may mean the voter has to jump through certain hoops such as proving their information to the election official before their eligibility is affirmed.”

Note: Why have those who set up our elections allowed private companies to develop software which can be hacked? For undeniable evidence our voting systems have not been safe for years, read summaries of these major media news articles.


Facial recognition database used by FBI is out of control, House committee hears
2017-03-27, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/technology/2017/mar/27/us-facial-recognition-data...

Approximately half of adult Americans’ photographs are stored in facial recognition databases that can be accessed by the FBI, without their knowledge or consent, in the hunt for suspected criminals. About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports. The algorithms used to identify matches are inaccurate about 15% of the time, and are more likely to misidentify black people than white people. These are just some of the damning facts presented at last week’s House oversight committee hearing, where politicians and privacy campaigners criticized the FBI and called for stricter regulation of facial recognition technology at a time when it is creeping into law enforcement and business. The FBI first launched its advanced biometric database ... in 2010, augmenting the old fingerprint database with further capabilities including facial recognition. The bureau did not inform the public ... nor did it publish a privacy impact assessment, required by law, for five years. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos. Last year, the US government accountability office (GAO) analyzed the FBI’s use of facial recognition technology and found it to be lacking in accountability, accuracy and oversight. “It doesn’t know how often the system incorrectly identifies the wrong subject,” explained the GAO’s Diana Maurer. “Innocent people could bear the burden of being falsely accused.”

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


Donald Trump gives CIA authority to conduct drone strikes: WSJ
2017-03-14, Sydney Morning Herald/Reuters
http://www.smh.com.au/world/donald-trump-gives-cia-authority-to-conduct-drone...

US President Donald Trump has given the Central Intelligence Agency new authority to conduct drone attacks against suspected militants. The move would be a change from the policy of former President Barack Obama's administration of limiting the CIA's paramilitary role. The United States was the first to use unmanned aircraft fitted with missiles to kill militant suspects in the years after the September 11, 2001, attacks on New York and Washington. Strikes by missile-armed Predator and Reaper drones against overseas targets began under former President George W. Bush and were expanded by Obama. Critics of the targeted killing program question whether the strikes create more militants than they kill. They cite the spread of jihadist organisations and militant attacks throughout the world as evidence that targeted killings may be exacerbating the problem. In July, the US government accepted responsibility for inadvertently killing up to 116 civilians in strikes in countries where America is not at war.

Note: Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.


With WikiLeaks Claims of C.I.A. Hacking, How Vulnerable Is Your Smartphone?
2017-03-07, New York Times
https://www.nytimes.com/2017/03/07/technology/cia-hacking-documents-wikileaks...

WikiLeaks on Tuesday released a significant cache of documents that it said came from a high-security network inside the Central Intelligence Agency. WikiLeaks called the documents Vault 7, and they lay out the capabilities of the agency’s global covert hacking program. By the end of 2016, the C.I.A. program had 5,000 registered users, including government employees and contractors, [and] had produced more than a thousand hacking systems. The files have circulated among former United States government hackers and contractors in “an unauthorized manner, one of whom provided WikiLeaks with portions of the archive,” WikiLeaks said. The software targeted by the hacking program included the most popular smartphone operating systems. Apple’s iPhone software ... was a particular target, including the development of several “zero day” exploits - a term for attacking coding flaws the company would not have known about. Google’s Android ... received even more attention. By 2016, the C.I.A. had 24 weaponized Android “zero day” software programs. The C.I.A. also targeted ... internet-connected computers and home and industrial devices running the Linux operating system. In 2010, the Obama administration promised to disclose newly discovered vulnerabilities to companies like Apple, Google and Microsoft. But the WikiLeaks documents indicate that the agency found security flaws, kept them secret and then used them for surveillance and intelligence gathering.

Note: See the wikileaks webpage summarizing this most important leak. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Revealed: FBI terrorism taskforce investigating Standing Rock activists
2017-02-10, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/us-news/2017/feb/10/standing-rock-fbi-investigati...

The FBI is investigating political activists campaigning against the Dakota Access pipeline, diverting agents charged with preventing terrorist attacks to instead focus their attention on indigenous activists and environmentalists. Officers within the FBI’s joint terrorism taskforce have attempted to contact at least three people tied to the Standing Rock “water protector” movement in North Dakota. “The idea that the government would attempt to construe this indigenous-led non-violent movement into some kind of domestic terrorism investigation is unfathomable to me,” said Lauren Regan, a civil rights attorney. “It’s outrageous, it’s unwarranted … and it’s unconstitutional.” Regan ... said she learned of three cases in which officers with the taskforce, known as the JTTF, tried to talk to activists in person. She described the encounters as attempted “knocks and talks”, meaning law enforcement showed up at people’s doors without a subpoena or warrant and tried to get them to voluntarily cooperate with an interview. The three individuals ... asserted their fifth amendment rights and did not respond to the officers, according to Regan. All three contacts were made in recent weeks after Trump’s inauguration. Trump, a former investor in Energy Transfer Partners, the Texas-based firm behind the pipeline, took executive action in his first week in office to expedite the project. On Wednesday, workers began drilling to complete the pipeline.

Note: The FBI has a long history of violating activists' rights. The 2011 National Defense Authorization Bill broadened the definition of "supporter of terrorism" to include peaceful activists, authors, academics and even journalists. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.


The Deep State Goes to War With President-Elect Using Unverified Claims
2017-01-11, The Intercept
https://theintercept.com/2017/01/11/the-deep-state-goes-to-war-with-president...

For months, the CIA, with unprecedented clarity, overtly threw its weight behind Hillary Clinton’s candidacy. In August, former acting CIA Director Michael Morell announced his endorsement of Clinton in the New York Times and claimed that “Mr. Putin had recruited Mr. Trump as an unwitting agent of the Russian Federation.” The CIA and NSA director under George W. Bush, Gen. Michael Hayden, also endorsed Clinton and went to the Washington Post to warn, in the week before the election, that “Donald Trump really does sound a lot like Vladimir Putin.” It is not hard to understand why the CIA preferred Clinton over Trump. Clinton was critical of Obama for restraining the CIA’s proxy war in Syria and was eager to expand that war. Clinton clearly wanted a harder line than Obama took against the CIA’s long-standing foes in Moscow. In general, Clinton defended and intended to extend the decadeslong international military order on which the CIA and Pentagon’s preeminence depends, while Trump - through a still-uncertain mix of instability and extremist conviction - posed a threat to it. The claims about Russia’s interference in U.S. elections and ties to Trump should be fully investigated. But until then, assertions that are unaccompanied by evidence and disseminated anonymously should be treated with the utmost skepticism. Venerating the intelligence community ... and equating its dark and dirty assertions [with] Truth ... cannot possibly achieve any good and is already doing much harm.

Note: For an important viewpoint on the real complexities going on with recent reporting on Trump links to Russia, CIA involvement in Syria, and media manipulations, don't miss the above provocative article by Glenn Greenwald and this interview he gave to Fox News.


We're living through the first world cyberwar – but just haven’t called it that
2016-12-30, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/commentisfree/2016/dec/30/first-world-cyberwar-hi...

We might already be living through the first world cyberwar – it’s just that we haven’t acknowledged or named it yet. What might a timeline of that war look like? Well, 2007 seems like a good bet as a starting point – with a concerted series of cyber-attacks on Estonia. In 2008 there were events that a historian might weave into a narrative of a global cyberwar, when several underwater internet cables were cut during the course of the year, interrupting internet communication and particularly affecting the Middle East. In 2010 the Stuxnet worm was used to attack Iran’s nuclear program. Another event from 2010, the WikiLeaks American embassy cables release ... would be irresistible for a historian to refer to in this context. One of the things that makes the first world cyberwar different from conventional warfare [is] the mix of nation states being involved with pressure groups, whistleblowers and hackers. Historians will be unable to ignore ... the 2016 US election campaign being influenced by alleged hacked and leaked emails. What reason is there to suppose that these events might eventually be grouped together as a single world cyberwar by historians? It is the idea that hostilities might formally come to an end. You can envisage a scenario where Russia, China and the US can see a mutual benefit in de-escalating cyber-attacks between the three of them.

Note: A 2007 New York Times article describes the formation of the Air Force Cyberspace Command to arm the US military in anticipation of widespread computer-based warfare. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.


US 'got it so wrong' on Saddam Hussein, says CIA interrogator of the Iraq dictator
2016-12-19, The Independent (One of the UK's leading newspapers)
http://www.independent.co.uk/news/world/middle-east/us-wrong-iraq-saddam-huss...

The US "got it wrong" about Saddam Hussein and Iraq, the CIA analyst who interrogated the former dictator has said. John Nixon had numerous conversations with the deposed leader and now says that America was critically mistaken about their intervention Iraq. In particular, he claims, the CIA’s view of Hussein’s attitude to using chemical weapons was wrong. During the interrogations, Mr Nixon asked Hussein if he’d ever thought of engaging in a pre-emptive strike with WMDs against US troops based in Saudi Arabia. According to Mr Nixon ... the former dictator’s reply was: “We never thought about using weapons of mass destruction. It was not discussed. Use chemical weapons against the world? Is there anyone with full faculties who would do this?” Mr Nixon admitted this was “not what we had expected to hear”. The main reason the American and British governments used to justify the controversial invasion of Iraq was the supposed risk posed by the WMDs possessed by the country. Nearly 200,000 people have died in the conflicts that followed. Iraq is now widely regarded as a failed state, and still suffers from widespread violence. Thirteen years on, at least 5,000 American troops remain in the country. Mr Nixon also spoke out against Mr Bush, who was rude towards him and reportedly made inappropriate jokes about the missing WMDs. Mr Bush blamed the CIA for Iraq’s failures, Mr Nixon said, adding that he “called its analysis ‘guesswork’ while hearing only what he wanted to hear”.

Note: Have you noticed how every Arabic nation to which the U.S. has sent armed forces has ended up not with a stronger democracy, but in a situation of chaos? Do you think this might be intentional? The war machine makes huge profits from conditions of chaos. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.


CIA concludes Russia interfered to help Trump win election, say reports
2016-12-10, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/us-news/2016/dec/10/cia-concludes-russia-interfer...

US intelligence agencies have concluded that Russia interfered in last month’s presidential election. Officials ... were told that intelligence agencies had found that individuals linked to the Russian government had provided WikiLeaks with thousands of confidential emails stolen from the Democratic National Committee (DNC) and others. The emails were steadily leaked via WikiLeaks ... revealing that DNC figures had colluded to harm the chances of [Clinton’s] nomination rival Bernie Sanders, and later giving examples of collusion between her campaign and figures in the media to blindside Trump in debates. The Kremlin has rejected the hacking accusations. WikiLeaks founder Julian Assange has previously said the DNC leaks were not linked to Russia. A ... senior official cited by the Washington Post conceded that intelligence agencies did not have specific proof that the Kremlin was “directing” the hackers. Craig Murray, the former UK ambassador to Uzbekistan, who is a close associate of Assange, [said of] the CIA claims: “They are absolutely making it up ... I know who leaked them. “They are certainly not Russian and it’s an insider. It’s a leak, not a hack; the two are different things. “If ... the CIA’s statement refers to people who are known to be linked to the Russian state, they would have arrested someone. America has not been shy about arresting whistleblowers and it’s not been shy about extraditing hackers. They plainly have no knowledge whatsoever.”

Note: The Guardian newspaper's website removed all front page links to the above article just three hours after it was published. In its place, the Guardian ran a new article that was entirely supportive of what Wikileaks affiliate Craig Murray calls "the CIA’s blatant lie" about the leaked DNC emails. A short essay by WantToKnow.info team member Mark Bailey explores this apparent media manipulation.


Secret CIA assessment says Russia was trying to help Trump win White House
2016-12-09, Washington Post
https://www.washingtonpost.com/world/national-security/obama-orders-review-of...

The CIA has concluded in a secret assessment that Russia intervened in the 2016 election to help Donald Trump win the presidency, rather than just to undermine confidence in the U.S. electoral system, according to officials briefed on the matter. Intelligence agencies have identified individuals with connections to the Russian government who provided WikiLeaks with thousands of hacked emails from the Democratic National Committee and others. “It is the assessment of the intelligence community that Russia’s goal here was to favor one candidate over the other, to help Trump get elected,” said a senior U.S. official. “That’s the consensus view.” The CIA shared its latest assessment with key senators in a closed-door briefing on Capitol Hill last week. The CIA presentation ... fell short of a formal U.S. assessment produced by all 17 intelligence agencies. A senior U.S. official said there were minor disagreements among intelligence officials about the agency’s assessment, in part because some questions remain unanswered. For example, intelligence agencies do not have specific intelligence showing officials in the Kremlin “directing” the identified individuals to pass the Democratic emails to WikiLeaks. Some key ... lawmakers have continued to question the quality of evidence supporting Russian involvement. “I’ll be the first one to come out and point at Russia if there’s clear evidence, but there is no clear evidence - even now,” said [chairman of the House Intelligence Committee] Devin Nunes.

Note: The above article comes on the heels of the Washington Post's promotion of an anti-Russian "McCarthyite blacklist" which smeared dozens of U.S. news sites as “routine peddlers of Russian propaganda.” For more along these lines, see concise summaries of deeply revealing news articles on elections corruption and the manipulation of public perception.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"