Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Ecuador has granted citizenship to WikiLeaks founder Julian Assange, Ecuador's Foreign Minister Maria Fernanda Espinosa announced Thursday. She called the measure "one more ring of protection" for Assange, who has been holed up at the Ecuadorian Embassy in London since 2012 in an effort to avoid a Swedish arrest warrant. Sweden dropped the charges in May 2017, but Assange remains the subject of a UK arrest warrant. Assange ... has previously expressed concern that if he leaves the Ecuadorian embassy in London he could end up being extradited to the US, where he fears facing the death penalty over allegations of revealing government secrets through WikiLeaks. In December, the Ecuadorian government requested diplomatic status for Assange. But the UK rebuffed the request. Espinosa said Ecuador will continue to pursue a dialogue with the UK to eventually remove Assange from the embassy. "We will continue to protect Julian Assange while his physical and psychological integrity are at risk," Espinosa said. "We are a country that defends human rights and ... respects international law." A 2016 United Nations report concluded that the WikiLeaks founder had been arbitrarily detained by Sweden and the United Kingdom.
Note: Read more about the "legal limbo" and propaganda campaign carried out against Assange and Wikileaks. A 2016 United Nations panel found that authorities in Sweden and the UK have acted unlawfully with regard to Assange. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Half-a-dozen 2017 releases of long-secret documents about the assassination of President John F. Kennedy have given plenty of new leads to those who don’t believe alleged gunman Lee Harvey Oswald acted alone. The 34,963 documents ... have fed the fire tended by researchers and others who believe there is much more to the story how a U.S. president was assassinated in Dallas 54 years ago. One particular document from the August release has created much buzz. It that shows that Earle Cabell, mayor of Dallas at the time of the Nov. 22, 1963, shooting, became a CIA asset in late 1956. Another revelatory JFK document released in full on Dec. 15 was the transcript of a 1978 interview by the House Select Committee on Assassinations with Orest Pena. According to Pena, a bar owner in New Orleans, Lee Harvey Oswald was a U.S. government agent or informant. How did he know? Because Pena himself was an informant. He had given details to the Warren Commission in July 1964 but, as the new document shows, later revealed much more detail about Warren de Brueys, an FBI agent in New Orleans to whom Pena said he reported. Oswald, he claimed, frequented a breakfast place regularly not only with de Brueys but with agents from U.S. Customs and Immigration. Pena believed Oswald had an office in the same government complex. Pena also testified to the House panel that de Brueys had threatened him if he shared with investigators details of their meetings and training of anti-Castro instigators.
Note: Watch an excellent five-minute segment of the History Channel's "Men Who Killed Kennedy," For more along these lines, see our excellent resource center filled with reliable information questions what really happened in the JFK assassination.
The secret letter was tucked inside the pages of an old book. It had been written by FBI Director J. Edgar Hoover to a top lieutenant, condemning civil rights leader Martin Luther King Jr. [in] 1964. Hoover the previous day had assailed King at a news conference as “the most notorious liar in the country.” Now he was writing a colleague privately to say he hoped King was getting his “just deserts.” Four years later, King would be assassinated. And the letter ... sheds yet more light on the historic malice the FBI director had toward King. Washington scholar James L. Swanson said he found the letter ... clipped to a page in [a book] he purchased. “This is a hitherto unknown and unpublished letter,” Swanson said. “What happened was this: It was announced [the previous month] that Dr. King had been awarded the Nobel Peace Prize, and that provoked Hoover,” he said. Hoover believed that King and his movement were threats to the social order. The FBI had begun wiretapping King’s home and office, and bugging his hotel rooms. No serious links to communism were uncovered, but hints about King’s sexual dalliances allegedly were. Days after Hoover’s news conference, a salacious anonymous letter was delivered to King’s wife. This letter was ... in a package that also [contained] a tape recording that allegedly captured evidence of King’s sexual misconduct. King suspected that the FBI was behind the letter. Sullivan ... later admitted his involvement in the plan during testimony before a Senate committee.
Note: Watch an excellent, six-minute clip from Canada's PBS giving powerful evidence based on the excellent work of William Pepper that King was assassinated by factions in government that wanted his movement stopped. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and assassinations.
The FBI’s background-check system is missing millions of records of criminal convictions, mental illness diagnoses and other flags that would keep guns out of potentially dangerous hands. Experts who study the data say government agencies responsible for maintaining such records have long failed to forward them into federal databases used for gun background checks. As the shooting at a Texas church on Sunday showed, what the FBI doesn’t know can get people killed. In that case, the gunman had been convicted at a court-martial of charges stemming from a domestic violence case. Officials say the Air Force never notified the FBI of his conviction, so when he purchased weapons at a retail store, he cleared the background check. The FBI said it doesn’t know the scope of the problem, but the National Rifle Association says about 7 million records are absent from the system, based on a 2013 report [which] determined that “at least 25% of felony convictions "are not available" to the National Instant Criminal Background Check System maintained by the FBI. In light of the Texas shooting, Air Force officials have ... faulted the staff at an air base for not sending the necessary information to the FBI, but federal officials who work in the database effort say the problem of military nonreporting of domestic violence cases extends far beyond a single base or service branch. A large number of people convicted of misdemeanor domestic violence - who also are prohibited from buying guns - are absent from the FBI database as well.
Note: For more, see concise summaries of deeply revealing news articles on corruption in government and in the military.
The Trump administration has declared all-out war on leakers. But the administration is battling the wrong enemy with the wrong weapons. Digital secrets stolen from the National Security Agency represent the real ... security problem. More than half a billion pages have been swiped. The stolen data includes some of the NSA’s most prized cyber weapons. Most were created by the agency’s own hacker team, the Tailored Access Operations (TAO) unit. Government hackers search for ways to crack into widely used computer operating systems, such as Microsoft Windows. When they discover a way in ... rather than notify the companies that their products are dangerously flawed, the NSA often secretly stores these vulnerabilities and later converts them into powerful cyber weapons, known as “exploits.” Like burglar’s tools, the exploits can secretly open a crack in a system, such as Windows, and insert an “implant” containing NSA malware - enabling the agency to take control of any computer using that Windows program. Unknown to the public, the NSA has for years been negligent in protecting its top-secret material, including these cyber weapons. Meanwhile, the Trump administration continues searching for someone who passed a few tidbits about White House bickering to a reporter, rather than focus on the NSA losing potentially deadly cyber weapons.
Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The FBI counterterrorism division’s identification of a movement it calls “black identity extremists” is the latest addition to the list of protesters and dissidents the agency puts under the “domestic terrorism” umbrella. But many national security experts say the designation [is] simply a label that allows the FBI to conduct additional surveillance on “basically anyone who’s black and politically active,” said Michael German, who left the FBI in 2004. While the practice of labeling certain protest groups as domestic terrorists is not unique to President Trump’s administration, Hina Shamsi ... at the American Civil Liberties Union, said there’s concern that “abusive and unjustified investigations” by the FBI are rising. The problem, Shamsi said, is partly in the overly broad definition of domestic terrorism in the Patriot Act as a violation of the criminal laws ... intended to “influence the policy of a government by intimidation or coercion.” Eighty-four members of Congress cited that intention to intimidate or coerce in a letter to the Justice Department last week that asked whether the department had labeled Dakota Access Pipeline protesters domestic terrorists. The Justice Department did not respond to questions about the letter. The FBI report that focused on black identity extremists ... had interest groups questioning whether the designation has been used to single out members of Black Lives Matter.
Note: The Department of Homeland Security has reportedly been monitoring the Black Lives Matter movement since 2014, in some cases producing "minute-by-minute reports on protesters’ movements". For more along these lines, read about Cointelpro, the program used by corrupt intelligence agencies to spy on and attack the U.S. civil rights movement beginning in the 1960's. See also concise summaries of deeply revealing news articles about the erosion of civil liberties.
For more than two decades during the Cold War, the public was bombarded by an enormous publicity campaign to shape American views of Russia. The campaign may have been the largest and most consistent source of political advertising in American history. And it was orchestrated by a big, powerful intelligence service: the Central Intelligence Agency. In 1950, [the CIA] created Radio Free Europe, a government-sponsored broadcasting station. Ostensibly, it provided unbiased news for Eastern Europeans, but in fact the agency used it to wage a subversive campaign to weaken Communist governments. But how to hide the agency’s hand? Simple: pretend that ordinary Americans are paying the bills. A well-heeled and well-connected front group, the National Committee for a Free Europe ... ran an enormous fund-raising campaign ... that implored Americans to donate “freedom dollars” to combat Kremlin lies. The donations barely covered the cost of running the “fund-raising drives,” to say nothing of Radio Free Europe’s $30 million annual budgets. But that wasn’t the point. Declassified documents reveal that almost from the start, the CIA saw that it could exploit the fund-raising campaign as a conduit for domestic propaganda. It was a way to rally public support for the Cold War. Our post-truth media environment [carries] voices from this past. The crusade blasted all information from enemy sources as lies and deceit — fake news, we could say.
Note: The US government was legally prevented from broadcasting propaganda to domestic audiences for many years. This prohibition ended when new rules were adopted in 2013. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the manipulation of public perception.
In perhaps its most audacious and elaborate incursion into academia, the CIA has secretly spent millions of dollars staging scientific conferences around the world. Its purpose was to lure Iranian nuclear scientists out of their homeland and into an accessible setting, where its intelligence officers could approach them individually and press them to defect. While a university campus might have only one or two professors of interest to an intelligence service, the right conference – on drone technology, perhaps, or Isis – could have dozens. The FBI and CIA swarm conferences. At gatherings in the US, says one former FBI agent, “foreign intelligence officers try to collect Americans; we try to collect them”. The CIA is involved with conferences in various ways: it sends officers to them; it hosts them through front companies in the Washington area, so that the intelligence community can tap academic wisdom; and it mounts sham conferences to reach potential defectors from hostile countries. Scientific conferences have become such a draw for intelligence agents that one of the biggest concerns for CIA operatives is interference from agency colleagues trapping the same academic prey. “We tend to flood events like these,” a former CIA officer who writes under the pseudonym Ishmael Jones observed in his 2008 book, The Human Factor: Inside the CIA’s Dysfunctional Intelligence Culture.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in science and in the intelligence community.
A settlement in a landmark lawsuit against two psychologists who helped design the CIA's harsh interrogation methods used in the war on terror marked the first time the agency or its private contractors have been held accountable for the program, legal experts said. The deal in the lawsuit from the American Civil Liberties Union also makes it unlikely the CIA will again pursue the tactics, said Deborah Pearlstein, professor at the Cardozo Law School in New York. “This sends a signal to those who might consider doing this in the future,” Pearlstein said, adding, “This puts an exclamation mark at the end of ‘don't torture.’” Terms of the settlement were not disclosed, but it avoided a civil trial set for Sept. 5 in federal court. The ACLU sued psychologists James Mitchell and John “Bruce” Jessen on behalf of three former detainees, including one who died in custody, who contended they were tortured at secret CIA prisons overseas. Mitchell and Jessen were under contract with the federal government following the Sept. 11 terror attacks. The lawsuit claimed they designed, implemented and personally administered an experimental torture program. The techniques they developed included waterboarding, slamming the three men into walls, stuffing them inside coffin-like boxes, exposing them to extreme temperatures, starving them and keeping them awake for days, the ACLU said. A U.S. Senate investigation in 2014 found that Mitchell and Jessen's techniques produced no useful intelligence. They were paid $81 million for their work.
Note: Prior to condemning torture, some of the American Psychological Association’s top officials sought to curry favor with Pentagon officials by supporting the CIA's brutal interrogation methods. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.
A former chief investigator at the Guantanamo Bay detention center is accusing the Pentagon of blocking publication of his book on the use of brutal interrogation techniques and top U.S. officials' advocacy of what he calls "torture." Mark Fallon, a Naval Criminal Investigative Service (NCIS) veteran, said his book "Unjustifiable Means" reveals no classified information or new detainee abuse cases but details internal deliberations about interrogation methods, identifies officials who advocated "torture" and describes how he and others objected. "This is more of an inside view of the fight to try to stop torture," he said. "There was a tremendous opposition within the government itself believing these were war crimes, and I name names." The use of the brutal interrogation methods made the country less safe, he said. Fallon said that he was told it would take no more than six weeks for the Defense Department office that scrubs manuscripts for unauthorized information to review his book. That was more than seven months ago. He has since missed his submission deadline, had to cancel a book tour and enlisted the American Civil Liberties Union and Columbia University's Knight First Amendment Institute to fight what he contends is a Pentagon effort to suppress his work and stifle his right to free speech. Now the ACLU and the Columbia University institute are taking Fallon's case to Congress.
Note: For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.
For nearly four years, Syrian rebels have clung to a programme of CIA assistance as a symbol of US support in their battle against Bashar al-Assad’s regime. So reports that Donald Trump’s administration will stop the limited scheme to arm and train Syria’s opposition forces have sparked anger and confusion. Rebels say they have not been informed of any changes to the policy introduced ... in 2013 as part of efforts to put pressure on Syria’s president. According to ... the Washington Post newspaper, Mr Trump decided last month to end funding for the CIA programme. Rebels contacted by the Financial Times say their CIA interlocutors had not confirmed any change, and political opposition figures who met US officials this week say they, too, were given no hint of any change. One rebel commander who asked not to be named said US support had been waning for months but noted that the rebels had been given their salaries as normal last month. The CIA funding for rebel groups fed into two internationally backed operations that supported an array of rebel groups. Many observers and even rebels themselves criticised the programme for turning a blind eye to its funding ending up with jihadis. Rebels who received support would return to volatile territories in Syria, only to be pressed by an al-Qaeda-linked jihadi group to hand over a cut. “Frankly so much of the weapons and ammunition were going to [Syria’s al-Qaeda affiliate] that it’s probably a good thing,” [an] opposition figure said.
Note: What is the CIA doing paying the salaries of rebels in Syria? For more, see this informative article. Then, see concise summaries of deeply revealing news articles on corruption in government and in the intelligence community.
The Federal Reserve’s little-known role housing the assets of other central banks comes with a unique benefit to the United States: It serves as a source of foreign intelligence for Washington. Senior officials from the U.S. Treasury and other government departments have turned to these otherwise confidential accounts several times a year to analyze the asset holdings of the central banks of Russia, China, Iraq, Turkey, Yemen, Libya and others, according to more than a dozen current and former senior Fed and Treasury officials. The U.S. central bank keeps a tight lid on information contained in these accounts. But according to the officials interviewed by Reuters, U.S. authorities regularly use a “need to know” confidentiality exception in the Fed’s service contracts with foreign central banks. Some 250 foreign central banks and governments keep $3.3 trillion of their assets at the Federal Reserve Bank of New York, about half of the world’s official dollar reserves, using a service advertised in a 2015 slide presentation as “safe and confidential.” Other major central banks and some commercial banks offer similar services. But only the Fed offers direct access to U.S. debt markets and to the world’s reserve currency, the dollar. In all, the people interviewed by Reuters identified seven instances in the last 15 years in which the accounts gave U.S. authorities insights into the actions of foreign counterparts or market movements, at times leading to a specific U.S. response.
Note: It's quite telling that no other major media picked up this important piece. For more along these lines, see concise summaries of deeply revealing news articles on financial industry corruption and the disappearance of privacy.
Hundreds of men swept up in the hunt for al-Qaida militants have disappeared into a secret network of prisons in southern Yemen where abuse is routine and torture extreme - including the "grill," in which the victim is tied to a spit like a roast and spun in a circle of fire, an Associated Press investigation has found. Senior American defense officials acknowledged Wednesday that U.S. forces have been involved in interrogations of detainees in Yemen but denied any participation in or knowledge of human rights abuses. Interrogating detainees who have been abused could violate international law, which prohibits complicity in torture. The secret prisons are inside military bases, ports, an airport, private villas and even a nightclub. Some detainees have been flown to an Emirati base across the Red Sea in Eritrea, according to Yemen Interior Minister Hussein Arab and others. Several U.S. defense officials, speaking on condition of anonymity to discuss the topic, told AP that American forces do participate in interrogations of detainees at locations in Yemen, provide questions for others to ask, and receive transcripts of interrogations from Emirati allies. They said U.S. senior military leaders were aware of allegations of torture at the prisons in Yemen, looked into them, but were satisfied that there had not been any abuse when U.S. forces were present. Inside war-torn Yemen, however ... nearly 2,000 men have disappeared into the clandestine prisons, a number so high that it has triggered near-weekly protests.
Note: Saudi Arabia's military campaign in Yemen has strong US military support, and flagrantly violates international law. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
People connected to the Russian government tried to hack election-related computer systems in 21 states. Samuel Liles, the Department of Homeland Security’s acting director of the Office of Intelligence and Analysis Cyber Division, said vote-tallying mechanisms were unaffected and that the hackers appeared to be scanning for vulnerabilities — which Liles likened to walking down the street and looking at homes to see who might be inside. Liles was testifying before the Senate Intelligence Committee, which is investigating Russia’s efforts to meddle in the 2016 presidential election. Officials in Arizona and Illinois had previously confirmed that hackers targeted their voter registration system. In a separate hearing ... former Department of Homeland Security secretary Jeh Johnson testified that Russia’s meddling ... was “unprecedented, the scale and the scope of what we saw them doing.” He said the severity of Russia’s efforts persuaded him to sign onto an Oct. 7 statement publicly blaming the Kremlin for what had happened. “We needed to do it, and we needed to do it well before the election to inform American voters of what we saw,” Johnson said. FBI Assistant Director of Counterintelligence Bill Priestap ... said Russia for years has tried to influence U.S. elections but that the “scale” and “aggressiveness” of its efforts in 2016 made the attempts more significant.
Note: Many who follow elections closely have known and spread the word for years about serious vulnerabilities in US electronic voting, yet only now that Russia is involved is it getting widespread coverage. Do you really think the Russians are the only ones who have hacked US elections? Read an enlightening analysis of elections hacking in the US which raises many serious questions. And don't miss the critically important information provided in our Elections Information Center.
Russia’s cyberattack on the U.S. electoral system before [the recent] election was far more widespread than has been publicly revealed, including incursions into voter databases and software systems in almost twice as many states as previously reported. In Illinois, investigators found evidence that cyber intruders tried to delete or alter voter data. The hackers accessed software designed to be used by poll workers on Election Day, and in at least one state accessed a campaign finance database. Details of the wave of attacks, in the summer and fall of 2016, were provided by three people with direct knowledge of the U.S. investigation into the matter. In all, the Russian hackers hit systems in a total of 39 states. The scope and sophistication so concerned Obama administration officials that they took an unprecedented step -- complaining directly to Moscow over a modern-day “red phone.” In October, two of the people said, the White House contacted the Kremlin on the back channel to offer detailed documents of what it said was Russia’s role in election meddling and to warn that the attacks risked setting off a broader conflict. The new details, buttressed by a classified National Security Agency document recently disclosed by the Intercept ... paint a worrisome picture for future elections: [This is] the newest portrayal of potentially deep vulnerabilities in the U.S.’s patchwork of voting technologies.
Note: Many who follow elections closely have known and spread the word for years about serious vulnerabilities in US electronic voting, yet only now that Russia is involved is it getting widespread coverage. Do you really think the Russians are the only ones who have hacked US elections? Read an enlightening analysis of elections hacking in the US which raises many serious questions. And don't miss the critically important information provided in our Elections Information Center.
Members of a congressional committee at a public hearing Wednesday blasted former President Barack Obama and his attorney general for allegedly covering up an investigation into the death of a Border Patrol agent killed as a result of a botched government gun-running project known as Operation Fast and Furious. The House Oversight Committee also Wednesday released a scathing, nearly 300-page report that found Holder’s Justice Department tried to hide the facts. Terry died in a gunfight. [His] death exposed Operation Fast and Furious, a Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) operation in which the federal government allowed criminals to buy guns in Phoenix-area shops with the intention of tracking them as they were transported into Mexico. But the agency lost track of more than 1,400 of the 2,000 guns they allowed smugglers to buy. Two of those guns were found at the scene of Terry's killing. Sen. Charles Grassley, R-Iowa, testified Wednesday in front of the committee, accusing DOJ and ATF officials of obstructing the investigation and working to silence ATF agents who informed the Senate of Fast and Furious. One of those silenced ATF agents, John Dodson, testified Wednesday that he remains “in a state of purgatory” since objecting to Fast and Furious and has been the subject of reprisals. Grassley's and Dodson's testimony reinforced findings of the report, which states that the Justice Department knew before Terry’s death that the ATF was “walking” firearms to Mexico and knew the day after the agent’s death that Fast and Furious guns were involved in the shootout -- despite denying these facts.
Note: The Obama administration invoked executive privilege in an unsuccessful attempt to cover this story up. Whistleblower John Dodson published a book on this scandal in 2013. The ATF tried and failed to silence him, then lied about the whole thing. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Russian military intelligence attempted to cyber-attack a U.S. voting software supplier and more than 100 local election officials in the days leading up to the 2016 presidential election, The Intercept reported Monday. According to an NSA document ... Russian military intelligence cyber-attacked a U.S. voting software supplier, using information gained in that attack to “launch a voter registration-themed spear-phishing campaign targeting U.S. local government organizations. Russian General Staff Main Intelligence Directorate actors … executed cyber espionage operations against a named U.S. company in August 2016, evidently to obtain information on elections-related software and hardware solutions,” the document states. The operation gave the hackers “persistent access” to the targeted computers, allowing them to “survey the victims for items of interest.” But Pamela Smith, president of election integrity watchdog Verified Voting, said the hacking might have kept some Americans from voting. “If someone has access to a state voter database, they can take malicious action by modifying or removing information,” she told The Intercept. “This could affect whether someone has the ability to cast a regular ballot or be required to cast a ‘provisional’ ballot — which ... may mean the voter has to jump through certain hoops such as proving their information to the election official before their eligibility is affirmed.”
Note: Why have those who set up our elections allowed private companies to develop software which can be hacked? For undeniable evidence our voting systems have not been safe for years, read summaries of these major media news articles.
Approximately half of adult Americans’ photographs are stored in facial recognition databases that can be accessed by the FBI, without their knowledge or consent, in the hunt for suspected criminals. About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports. The algorithms used to identify matches are inaccurate about 15% of the time, and are more likely to misidentify black people than white people. These are just some of the damning facts presented at last week’s House oversight committee hearing, where politicians and privacy campaigners criticized the FBI and called for stricter regulation of facial recognition technology at a time when it is creeping into law enforcement and business. The FBI first launched its advanced biometric database ... in 2010, augmenting the old fingerprint database with further capabilities including facial recognition. The bureau did not inform the public ... nor did it publish a privacy impact assessment, required by law, for five years. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos. Last year, the US government accountability office (GAO) analyzed the FBI’s use of facial recognition technology and found it to be lacking in accountability, accuracy and oversight. “It doesn’t know how often the system incorrectly identifies the wrong subject,” explained the GAO’s Diana Maurer. “Innocent people could bear the burden of being falsely accused.”
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
US President Donald Trump has given the Central Intelligence Agency new authority to conduct drone attacks against suspected militants. The move would be a change from the policy of former President Barack Obama's administration of limiting the CIA's paramilitary role. The United States was the first to use unmanned aircraft fitted with missiles to kill militant suspects in the years after the September 11, 2001, attacks on New York and Washington. Strikes by missile-armed Predator and Reaper drones against overseas targets began under former President George W. Bush and were expanded by Obama. Critics of the targeted killing program question whether the strikes create more militants than they kill. They cite the spread of jihadist organisations and militant attacks throughout the world as evidence that targeted killings may be exacerbating the problem. In July, the US government accepted responsibility for inadvertently killing up to 116 civilians in strikes in countries where America is not at war.
Note: Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
WikiLeaks on Tuesday released a significant cache of documents that it said came from a high-security network inside the Central Intelligence Agency. WikiLeaks called the documents Vault 7, and they lay out the capabilities of the agency’s global covert hacking program. By the end of 2016, the C.I.A. program had 5,000 registered users, including government employees and contractors, [and] had produced more than a thousand hacking systems. The files have circulated among former United States government hackers and contractors in “an unauthorized manner, one of whom provided WikiLeaks with portions of the archive,” WikiLeaks said. The software targeted by the hacking program included the most popular smartphone operating systems. Apple’s iPhone software ... was a particular target, including the development of several “zero day” exploits - a term for attacking coding flaws the company would not have known about. Google’s Android ... received even more attention. By 2016, the C.I.A. had 24 weaponized Android “zero day” software programs. The C.I.A. also targeted ... internet-connected computers and home and industrial devices running the Linux operating system. In 2010, the Obama administration promised to disclose newly discovered vulnerabilities to companies like Apple, Google and Microsoft. But the WikiLeaks documents indicate that the agency found security flaws, kept them secret and then used them for surveillance and intelligence gathering.
Note: See the wikileaks webpage summarizing this most important leak. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.