Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
More than 60 years ago, in his "Foundation" series, the science fiction novelist Isaac Asimov invented a new science – psychohistory – that combined mathematics and psychology to predict the future. Now social scientists are trying to mine the vast resources of the Internet – Web searches and Twitter messages, Facebook and blog posts, the digital location trails generated by billions of cellphones – to do the same thing. The government is showing interest in the idea. This summer a little-known intelligence agency began seeking ideas from academic social scientists and corporations for ways to automatically scan the Internet in 21 Latin American countries for "big data," according to a research proposal. The three-year experiment ... is being financed by the Intelligence Advanced Research Projects Activity, or Iarpa. The automated data collection system is to focus on patterns of communication, consumption and movement of populations. It will use publicly accessible data, including Web search queries, blog entries, Internet traffic flow, financial market indicators, traffic webcams and changes in Wikipedia entries. It is intended to be an entirely automated system, a "data eye in the sky" without human intervention. Some social scientists and advocates of privacy rights are deeply skeptical of the project, saying it evokes queasy memories of Total Information Awareness, a post-9/11 Pentagon program that proposed hunting for potential attackers by identifying patterns in vast collections of public and private data.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The British government targeted the American civil rights leader Stokely Carmichael and sought to weaken the Black Power movement with covert disinformation campaigns, recently declassified documents have revealed. The effort was the work of a secret unit known as the Information Research Department, based in London and part of the Foreign Office, which created and distributed literature from fake sources as part of a broader effort to destabilise cold war enemies. The effort against Carmichael, a firebrand orator who travelled to west Africa in part to escape harassment by US law enforcement agencies, aimed to portray the prominent Black Power leader as a foreign interloper in Africa who was contemptuous of the inhabitants of the continent. Based mainly in Guinea from July 1969, the 28-year-old activist had became a vocal advocate of socialist, pan-Africanist ideologies, which worried British officials. The IRD was particularly worried by the movement's potential influence in the Caribbean. In 1969, the IRD also created a new fake group: The Organisation of African Students for African Power. This was supposedly based in East Germany and adopted contemporary radical New Left ideas, "proclaiming a plague on both" the capitalist west and the Soviet bloc. The IRD felt this provided a better platform to "damage opponents" than the dated nationalist approach, while being difficult to trace back to Britain because many similar groups had genuinely sprung up in the late 1960s.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.
President Donald Trump's authorization this week of Central Intelligence Agency operations aimed at toppling Venezuelan President Nicolás Maduro prompted warnings from foreign policy experts. The amount of narcotics entering the United States via the country is relatively insignificant. Approximately 90% of US-bound cocaine enters the country via Mexico, according to the US Drug Enforcement Administration and other government agencies. Venezuela is also not a significant source of fentanyl, which is the leading cause of overdoses in the US and is also trafficked primarily through Mexico."Using covert or military measures to destabilize or overthrow regimes reminds us of some of the most notorious episodes in American foreign policy, which undermined the human rights and sovereignty of countries throughout Latin America and the Caribbean," said [policy advisor Matt] Duss. The US has launched at least 41 interventions that successfully overthrew governments in the hemisphere since 1898. Washington has helped install and prop up brutal dictators and assisted in the subversion of democratic movements, including by training Venezuelan forces in torture and repression at the notorious US Army School of the Americas. Tens of thousands of Venezuelans have also died as a result of US economic sanctions on Venezuela, according to research from the Center for Economic and Policy Research. "If Venezuela did not possess oil, gas, gold, fertile land, and water, the imperialists wouldn't even look at our country," [Maduro] added.
Note: Read our Substack investigation into the dark truths behind the US War on Drugs. For more along these lines, read our concise summaries of news articles on the War on Drugs.
Some 10,000 American troops are currently supporting the Trump-ordered counternarcotics operations in the Caribbean. At this point the military intervention has killed 27 people, including individuals who are likely not Venezuelan. President Trump's most recent explanation to reporters for this unprecedented Pentagon build-up off Venezuela's coast was surprisingly reminiscent of the failed "war on drugs" which hearkens all the way back to the days of Richard Nixon, when he famously declared it "public enemy number one". There was a time ... where the CIA itself was the biggest narco-trafficker in United States and perhaps the entire Western hemisphere. This was to fund regime change and covert operations in Latin America after a belated Congressional crackdown on taxpayer funding for black ops. In August 1996, the San Jose Mercury News [published a] series of articles linking the CIA's "contra" army to the crack cocaine epidemic in Los Angeles. During the 1980s the CIA helped finance its covert war against Nicaragua's leftist government through sales of cut-rate cocaine to South Central L.A. drug dealer, Ricky Ross. The CIA's drug network, wrote [journalist Gary] Webb, "opened the first pipeline between Colombia's cocaine cartels and the black neighborhoods of Los Angeles, a city now known as the â€crack' capital of the world." Black gangs used their profits to buy automatic weapons, sometimes from one of the CIA-linked drug dealers.
Note: Though President Richard Nixon launched the War on Drugs by declaring drugs "public enemy No. 1," secretly he admitted in a 1973 Oval Office meeting that marijuana was "not particularly dangerous." The War on Drugs is a trillion dollar failure that has been made worse by every presidential administration since Nixon. Don't miss our in-depth investigation into the dark truths behind the War on Drugs. For more along these lines, read our concise summaries of news articles on intelligence agency corruption and the War on Drugs.
"Ice is just around the corner," my friend said, looking up from his phone. A day earlier, I had met with foreign correspondents at the United Nations to explain the AI surveillance architecture that Immigration and Customs Enforcement (Ice) is using across the United States. The law enforcement agency uses targeting technologies which one of my past employers, Palantir Technologies, has both pioneered and proliferated. Technology like Palantir's plays a major role in world events, from wars in Iran, Gaza and Ukraine to the detainment of immigrants and dissident students in the United States. Known as intelligence, surveillance, target acquisition and reconnaissance (Istar) systems, these tools, built by several companies, allow users to track, detain and, in the context of war, kill people at scale with the help of AI. They deliver targets to operators by combining immense amounts of publicly and privately sourced data to detect patterns, and are particularly helpful in projects of mass surveillance, forced migration and urban warfare. Also known as "AI kill chains", they pull us all into a web of invisible tracking mechanisms that we are just beginning to comprehend, yet are starting to experience viscerally in the US as Ice wields these systems near our homes, churches, parks and schools. The dragnets powered by Istar technology trap more than migrants and combatants ... in their wake. They appear to violate first and fourth amendment rights.
Note: Read how Palantir helped the NSA and its allies spy on the entire planet. Learn more about emerging warfare technology in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on AI and Big Tech.
August 4, 2025 marks the 30th anniversary of Operation Storm. Little known outside the former Yugoslavia, the military campaign unleashed a genocidal cataclysm that violently expelled Croatia's entire Serb population. Croat forces rampaged UN-protected areas of the self-declared Serb Republic of Krajina, looting, burning, raping and murdering their way across the province. Up to 350,000 locals fled, many on foot, never to return. Meanwhile, thousands were summarily executed. As these hideous scenes unfolded, UN peacekeepers charged with protecting Krajina watched without intervening. Meanwhile, US officials strenuously denied the horrifying massacres and mass displacement amounted to ethnic cleansing, let alone war crimes. Operation Storm was for all intents and purposes a NATO attack, carried out by soldiers armed and trained by the US and directly coordinated with other Western powers. Despite publicly endorsing a negotiated peace, Washington privately encouraged Zagreb to employ maximum belligerence, even as their ultranationalist Croat proxies plotted to strike with such ferocity that the country's entire Serb population would "to all practical purposes disappear." High-ranking Croat officials privately discussed methods to justify their coming blitzkrieg, including false flag attacks. In preparing for the offensive, Croatian soldiers were trained at Fort Irwin in California and the Pentagon aided in planning the operation.
Note: Learn more about how war is a tool for hidden agendas in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on war.
The Trump administration Monday released more than 230,000 pages of previously classified documents related to the 1968 assassination of civil rights leader Martin Luther King Jr. Director of National Intelligence Tulsi Gabbard announced the release, carried out under President Donald Trump's executive order directing full transparency on the assassinations of King, President John F. Kennedy and Sen. Robert F. Kennedy. The documents ... include FBI investigation details, internal memos tracking case progress and information about James Earl Ray's former cellmate who claimed Ray discussed an assassination plot. The files also contain foreign evidence from Canadian police and CIA records on the international manhunt for Ray. Unlike the JFK assassination files released under federal law, the King documents had never been digitized. Conspiracy theories have circulated about King's death, in part prompted by Ray's claims that his confession had been forced and the revelation of illegal surveillance of King by the FBI and the CIA. The FBI also allegedly attempted to get King to commit suicide. Some in King's family also believe that the government and possibly the Mafia were involved in the assassination and that Ray was set up to take the fall. The United States House Select Committee on Assassinations determined in 1979 that there was a likelihood Ray acted for monetary gain and that there was likely a conspiracy behind the shooting.
Note: Few people know about the buried 1999 King Family civil trial in Memphis, where it took a jury only one hour to determine that the US government was behind the assassination of King. Read our comprehensive Substack investigation that uncovers the dark truths behind the assassination of Martin Luther King Jr. For more along these lines, read our concise summaries of news articles on political assassinations.
Technology already available – and already demonstrated to be effective – makes it possible for law-abiding officials, together with experienced technical people to create a highly efficient system in which both security and privacy can be assured. Advanced technology can pinpoint and thwart corruption in the intelligence, military, and civilian domain. At its core, this requires automated analysis of attributes and transactional relationships among individuals. The large data sets in government files already contain the needed data. On the Intelligence Community side, there are ways to purge databases of irrelevant data and deny government officials the ability to spy on anyone they want. These methodologies protect the privacy of innocent people, while enhancing the ability to discover criminal threats. In order to ensure continuous legal compliance with these changes, it is necessary to establish a central technical group or organization to continuously monitor and validate compliance with the Constitution and U.S. law. Such a group would need to have the highest-level access to all agencies to ensure compliance behind the classification doors. It must be able to go into any agency to inspect its activity at any time. In addition ... it would be best to make government financial and operational transactions open to the public for review. Such an organization would go a long way toward making government truly transparent to the public.
Note: The article cites national security journalist James Risen's book on how the creation of Google was closely tied to NSA and CIA-backed efforts to privatize surveillance infrastructure. For more along these lines, read our concise summaries of news articles on Big Tech and the disappearance of privacy.
There's a revolving door of talent between the country's premiere intelligence agency and its entertainment industry, with inspiration and influence often working both ways. The agency is targeting professionals at the intersection of arts and technology for recruitment ... and continues to cooperate with entertainment giants to inspire the next generation of creative spies. Creative minds in Hollywood and the entertainment industry have long had a role at the Central Intelligence Agency, devising clever solutions to its most vexing problems, such as perfecting the art of disguise. In the 1950s, a magician from New York named John Mulholland was secretly contracted with the agency to write a manual for Cold War spies on trickery and deception. These days, the officers said, creative skills are more valuable than ever. "You're only limited by your own imagination – don't self-censor your ideas," said Janelle, a CIA public affairs officer. "We're always looking for partners." Some of the CIA's most iconic missions – at least the declassified ones – document the agency's rich history with Hollywood, including Canadian Caper, when CIA operatives disguised themselves as a film crew to rescue six American diplomats in Tehran during the Iran hostage crisis, an operation moviegoers will recognize as the plot of "Argo." CIA analysts have also been known to leave the agency for opportunities in the entertainment industry, writing books and scripts drawing from their experiences.
Note: Learn more about the CIA's longstanding propaganda network in our comprehensive Military-Intelligence Corruption Information Center. The US Department of Defense has had a hand in more than 800 top Hollywood films. For more along these lines, read our concise summaries of news articles on censorship and intelligence agency corruption.
On Tuesday, July 1, 2025, African Stream published its final video, a defiant farewell message. With that, the once-thriving pan-African media outlet confirmed it was shutting down for good. Not because it broke the law. Not because it spread disinformation or incited violence. But because it told the wrong story, one that challenged U.S. power in Africa and resonated too deeply with Black audiences around the world. In September, U.S. Secretary of State Antony Blinken made the call and announced an all-out war against the organization, claiming, without evidence, that it was a Russian front group. Within hours, big social media platforms jumped into action. Google, YouTube, Facebook, Instagram, and TikTok all deleted African Stream's accounts, while Twitter demonetized the organization. The company's founder and CEO, Ahmed Kaballo ... told us that, with just one statement, Washington was able to destroy their entire operation, stating: "We are shutting down because the business has become untenable. After we got attacked by Antony Blinken, we really tried to continue, but without a platform on YouTube, Instagram, TikTok, and being demonetized on X, it just meant the ability to generate income became damn near impossible." Washington both funds thousands of journalists around the planet to produce pro-U.S. propaganda, and, through its close connections to Silicon Valley, has the power to destroy those that do not toe the line.
Note: Learn more about the CIA's longstanding propaganda network in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on censorship.
President George W. Bush created a new command to oversee all military operations in Africa 18 years ago. U.S. Africa Command was meant to help "bring peace and security to the people of Africa." Gen. Michael Langley, the head of AFRICOM, offered a grim assessment of security on the African continent during a recent press conference. The West African Sahel, he said last Friday, was now the "epicenter of terrorism" and the gravest terrorist threats to the U.S. homeland were "unfortunately right here on the African continent." Throughout all of Africa, the State Department counted 23 deaths from terrorist violence in 2002 and 2003, the first years of U.S. counterterrorism efforts in the Sahel and Somalia. By 2010, two years after AFRICOM began operations, fatalities from attacks by militant Islamists had already spiked to 2,674. There were an estimated 18,900 fatalities linked to militant Islamist violence in Africa last year, with 79 percent of those coming from the Sahel and Somalia. This constitutes a jump of more than 82,000 percent since the U.S. launched its post-9/11 counterterrorism efforts on the continent. As violence spiraled in the region over the past decades, at least 15 officers who benefited from U.S. security assistance were key leaders in 12 coups in West Africa and the greater Sahel during the war on terror. At least five leaders of the 2023 coup d'état in [Niger] received American assistance.
Note: Learn more about the US military's shadow wars in Africa. For more along these lines, read our concise summaries of news articles on terrorism and military corruption.
When a military judge threw out a defendant's confession in the Sept. 11 case this month, he gave two main reasons. The prisoner's statements, the judge ruled, were obtained through the C.I.A.'s use of torture, including beatings and sleep deprivation. But equally troubling to the judge was what happened to the prisoner in the years after his physical torture ended, when the agency held him in isolation and kept questioning him from 2003 to 2006. The defendant, Ammar al-Baluchi, is accused of sending money and providing other support to some of the hijackers who carried out the terrorist attack, which killed 3,000 people. In court, Mr. Baluchi is charged as Ali Abdul Aziz Ali. He is the nephew of Khalid Shaikh Mohammed, the man accused of masterminding the plot. The judge, Col. Matthew N. McCall, wrote that it was easy to focus on the torture because it was "so absurdly far outside the norms of what is expected of U.S. custody preceding law enforcement questioning." "However," he added, "the three and a half years of uncharged, incommunicado detention and essentially solitary confinement – all while being continually questioned and conditioned – is just as egregious" as the physical torture. Prosecutors are preparing to appeal. But the 111-page ruling was the latest blow to the government's two-decade-old effort to hold death penalty trials at Guantánamo Bay by sweeping aside a legacy of state-sponsored torture.
Note: Learn more about US torture programs in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on intelligence agency corruption.
The Department of Homeland Security is effectively gutting key civil rights offices within the agency, slashing the number of staff at the Office for Civil Rights and Civil Liberties, the Office of the Immigration Detention Ombudsman, and the Office of the Citizenship and Immigration Services Ombudsman. Each of these offices was created by Congress, but DHS has decided to move ahead anyway, saying they "have obstructed immigration enforcement by adding bureaucratic hurdles." Four days later, Rumeysa Ozturk, a Tufts student with a valid F-1 visa, was pulled off a sidewalk in Massachusetts and sent to a detention center in Louisiana. The Department of Homeland Security, whose agents surround Ozturk in the video, has a long history of civil and human rights abuses. DHS is home to the largest law enforcement cohort in the United States. Its agents have extraordinary powers to stop, arrest, and detain citizens and noncitizens alike throughout the country. When Congress created DHS in 2002, it ... created the Office for Civil Rights and Civil Liberties (CRCL) to provide oversight to guard against abuses. Every year, CRCL files a report to Congress. In its fiscal year (FY) 2023 report, for example, CRCL reported that it received over 3,000 allegations of misconduct and opened 758 investigations into issues ranging from treatment of travelers at airports to discrimination by DHS law enforcement to sexual abuse in DHS custody to deaths in DHS custody.
Note: For more, read our concise summaries of news articles on intelligence agency corruption and the erosion of civil liberties.
The CIA claimed to have confirmed the existence of the Ark of the Covenant by way of remote viewing – aka extra sensory perception or ESP – alleging the mysterious and sacred object is guarded by "entities" with an "unknown" power, a recently resurfaced declassified document claims. When a remote viewer is tasked with searching for a target, the desired object is written down on a piece of paper and put into an envelope. The remote viewer does not know what is written and is guided through the process by another person, retired US Army Chief Warrant Joe McMoneagle explained. McMoneagle, aka remote viewer #1, was the first to do the psychic phenomena experiments for the CIA. Remote viewer #32's vision described a secret Middle Eastern location of the object – which they don't know is the Ark – but they say is "protected by entities," the document reveals. "Target is a container. This container has another container inside of it. The target is fashioned of wood, gold and silver... similar in shape to a coffin and is decorated with seraphim," they relayed, per the file. "The target is protected by entities and can only be opened by those who are authorized to do so – this container will not/cannot be opened until the time is deemed correct," they said. "The purpose of the target is to bring people together. It has something to do with ceremony, memory, homage, the resurrection. There is an aspect of spirituality, information, lessons and historical knowledge," they said.
Note: Explore our resources on remote viewing programs. For more, read our concise summaries of news articles on the mysterious nature of reality.
In 2003 [Alexander Karp] – together with Peter Thiel and three others – founded a secretive tech company called Palantir. And some of the initial funding came from the investment arm of – wait for it – the CIA! The lesson that Karp and his co-author draw [in their book The Technological Republic: Hard Power, Soft Belief and the Future of the West] is that "a more intimate collaboration between the state and the technology sector, and a closer alignment of vision between the two, will be required if the United States and its allies are to maintain an advantage that will constrain our adversaries over the longer term. The preconditions for a durable peace often come only from a credible threat of war." Or, to put it more dramatically, maybe the arrival of AI makes this our "Oppenheimer moment". For those of us who have for decades been critical of tech companies, and who thought that the future for liberal democracy required that they be brought under democratic control, it's an unsettling moment. If the AI technology that giant corporations largely own and control becomes an essential part of the national security apparatus, what happens to our concerns about fairness, diversity, equity and justice as these technologies are also deployed in "civilian" life? For some campaigners and critics, the reconceptualisation of AI as essential technology for national security will seem like an unmitigated disaster – Big Brother on steroids, with resistance being futile, if not criminal.
Note: Learn more about emerging warfare technology in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on AI and intelligence agency corruption.
By appointing FBI Director Kash Patel as acting head of the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF), President Donald Trump took a step towards reining in a federal agency justifiably viewed by many as a threat to self-defense rights. He also signaled that he may consolidate government bodies that overlap in their responsibilities. It's impossible to credibly argue that the ATF doesn't need a shakeup. After all, this is a federal agency that ran guns to criminal gangs in Mexico as part of a bizarre and failed "investigation," manipulated mentally disabled people into participating in sting operations–and then arrested them, lost thousands of guns and gun parts, killed people over paperwork violations, and unilaterally reinterpreted laws to create new felonies out of thin air (which means more cause for sketchy investigations and stings). The federal police agency obsessively focused on firearms has long seemed determined to guarantee itself work by finding ever more things to police. But what about putting the same person in charge of both the ATF and the FBI? Merging agencies–if that's where this is headed–might improve internal communications by clarifying chains of command and eliminating interagency competition. But–and this is a big concern–done wrong, you'd end up with a supercharged federal enforcement agency with all the hostility to civil liberties its old components embodied when separate, but now with lots more clout.
Note: Read how CBS journalist Sharyl Attkisson was hacked by government operatives over her reporting on Fast and Furious. A.T.F. agents once ran a secret multimillion-dollar slush fund for illicit operations and personal perks, bypassing oversight and violating their own rules. For more along these lines, read our concise summaries of news articles on intelligence agency corruption.
Rep. Anna Paulina Luna, R-Fla., will lead a new task force focused on the declassification of federal secrets – including records related to the assassinations of President John F. Kennedy, Sen. Robert F. Kennedy and Dr. Martin Luther King Jr., and other documents in the public interest. House Oversight Committee Chairman James Comer, R-Ky., appointed Luna to chair the "Task Force on the Declassification of Federal Secrets." Comer and Luna sent letters to the State Department, Department of Energy and the CIA for documents relating to the origins of COVID-19; the National Security Agency and CIA for records relating to JFK, MLK and RFK assassinations; the Department of Defense and the CIA for 9/11 files; and to the Justice Department for documents relating to Jeffrey Epstein. The creation of the task force comes after President Donald Trump signed an executive order telling the director of national intelligence ... to present a plan for the full and complete release of all JFK assassination records within 15 days. He also ordered that officials immediately review the records relating to RFK and MLK assassinations and present a plan for their full and complete release within 45 days. "We have spent years seeking information on the assassinations of President Kennedy, Senator Kennedy, Reverend King, and other government secrets without success," Luna told Fox News Digital. "It is time to give Americans the answers they deserve."
Note: Read our comprehensive Substack investigations covering the dark truths behind the assassination of Martin Luther King Jr and the connection between Epstein's child sex trafficking ring and intelligence agency sexual blackmail operations.
President Donald Trump has ordered the release of thousands of classified governmental documents about the 1963 assassination of President John F. Kennedy. The executive order ... also aims to declassify the remaining federal records relating to the assassinations of Sen. Robert F. Kennedy and the Rev. Martin Luther King Jr. The order is among a flurry of executive actions Trump has quickly taken the first week of his second term. Speaking to reporters, Trump said, "everything will be revealed." Trump had promised during his reelection campaign to make public the last batches of still-classified documents surrounding President Kennedy's assassination in Dallas. Trump has nominated Kennedy's nephew, Robert F. Kennedy Jr., to be the health secretary in his new administration. Kennedy's father, Robert F. Kennedy, was assassinated in 1968 as he sought the Democratic presidential nomination. The younger Kennedy has said he isn't convinced that a lone gunman was solely responsible for the assassination of his uncle, President Kennedy, in 1963. The order directs the director of national intelligence and the attorney general to develop a plan within 15 days to release the remaining John F. Kennedy records, and within 45 days for the other two cases. It was not clear when the records would actually be released. Most researchers agree that roughly 3,000 records have not yet been released, either in whole or in part, and many of those originated with the CIA.
Note: Read our comprehensive Substack investigation covering the dark truths behind the assassination of Martin Luther King Jr. For more along these lines, read our concise summaries of news articles on political assassinations.
Between 1953 and 1973, MKUltra, a secret CIA program, explored ... mind-control drugs that the U.S. could use as weapons. By drugging civilians and government workers (without consent), the program's researchers wanted to observe the effects of the drugs like LSD, ultimately hoping to make people biddable to carry out tasks like secret assassinations. Details of MKUltra began to emerge in 1974, when a New York Times story exposed the CIA's unethical and illegal practices, leading to a senate investigation and public revelations. The full extent of MKUltra's activities will likely remain a mystery, since CIA director Richard Helms ordered all of the program's records to be destroyed the year before. J. Edgar Hoover's FBI launched the Counterintelligence Program, or COINTELPRO, in the thick of the Cold War. Its objective: mitigate the Communist Party of the United States's influence. COINTELPRO used a range of tactics to surveil and sabotage its targets, such as undermining them in the public eye or sowing conflict to weaken them. The program gradually broadened its scope to include ... leading activists in the civil rights movement––including Martin Luther King, Jr. As the U.S. built a stockpile of nuclear arms during the Cold War, a new risk emerged: broken arrow incidents in which nuclear weapons are stolen, lost, or mishandled. America has officially owned up to 32 broken arrow incidents.
Note: Read our comprehensive Substack investigation that uncovers the dark truths behind the assassination of Martin Luther King Jr. Learn more about the MKUltra Program in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on intelligence agency corruption.
Two large-scale, coordinated attacks this week rocked Lebanon – the latest iteration in a historical pattern of booby-trapping electronics. On Tuesday, one attack caused pagers to explode across Lebanon and Syria, injuring thousands of people and killing at least 12. A second wave of bombings unfolded on Wednesday, when explosives detonated inside a slew of hand-held radios across the country, leaving nine dead and 300 wounded. Israel, which is widely assumed to be behind both attacks, reportedly booby-trapped pagers used by Hezbollah members, carrying out a similar feat with the hand-held radios. The bombings appear to be supply-chain attacks – meaning the gadgets were tampered with or outright replaced with rigged devices containing explosives and a detonator at some point prior to arriving in the hands of the targets. The tactic of turning an electronic gadget into an explosive device ... dates back at least half a century. Field Manual 5-31, titled simply "Boobytraps" and first published by the U.S. Department of the Army in 1965, describes the titular objects as explosive charges "cunningly contrived to be fired by an unsuspecting person who disturbs an apparently harmless object or performs a presumably safe act." In 1996, the Israeli Security Agency, also known as Shin Bet, is said to used a similar technique to detonate a small charge of explosives near the ear of Hamas bomb-maker Yahya Ayyash.
Note: Learn more about emerging warfare technology in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

