Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Under a post-9/11 surveillance program known as "Upstream", the NSA is systematically searching Americans' internet communications as they enter and leave the United States. The agency sifts through these streams of data looking for "identifiers" associated with its many thousands of foreign targets – identifiers like email addresses and phone numbers. The NSA does all of this without warrants, without any individual judicial approval, and without showing that any of the people it is surveilling – including countless Americans – have done anything wrong. This surveillance raises serious constitutional concerns, but no court has ever considered a legal challenge to it because the government has claimed that allowing a suit against Upstream surveillance to go forward would implicate "state secrets". In 2007, for example, an appeals court dismissed a lawsuit filed by Khaled El-Masri claiming that, in a case of mistaken identity, he had been kidnapped and tortured by the CIA. The court acknowledged the public evidence of El-Masri's mistreatment but held that state secrets were too central to the case to allow it to go forward. And in 2010, a different appeals court dismissed a lawsuit filed by five individuals who claimed that one of Boeing's subsidiary companies had flown the planes carrying them to the black sites where they were tortured by the CIA. This use of the state secrets privilege – to dismiss cases – departs from the supreme court's narrow framing of the privilege.
Note: For more along these lines, see concise summaries of deeply revealing news articles on court system corruption and the disappearance of privacy from reliable major media sources.
Recent reports about the Secret Service and Immigration and Customs Enforcement playing fast and loose with rules regarding cellphone tracking and the FBI purchasing phone location data from commercial sources constitute an important wake-up call. They remind us that those handy mobile devices many people tote around are the most cost-effective surveillance system ever invented. "The United States Secret Service and U.S. Immigration and Customs Enforcement, Homeland Security Investigations (ICE HSI) did not always adhere to Federal statute and cellsite simulator (CSS) policies when using CSS during criminal investigations," the Department of Homeland Security's Office of the Inspector General reported last month. "Separately, ICE HSI did not adhere to Department privacy policies and the applicable Federal privacy statute when using CSS." The OIG report referred to the use of what is commonly called "stingray" technology–devices that simulate cellphone towers and trick phones within range into connecting and revealing their location. "They also gather information about the phones of countless bystanders who happen to be nearby," the ACLU warns. Even the most precise phone company location data remains available with court approval. The courts are currently mulling multiple cases involving "geofence warrants" whereby law enforcement seeks data not on individuals, but on whoever was carrying a device in a designated area at a specified time.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
The United States Federal Bureau of Investigation has acknowledged for the first time that it purchased US location data rather than obtaining a warrant. The disclosure came today during a US Senate hearing. Senator Ron Wyden ... put the question of the bureau's use of commercial data to its director, Christopher Wray: "Does the FBI purchase US phone-geolocation information?" Wray said his agency was not currently doing so. "To my knowledge, we do not currently purchase commercial database information that includes location data derived from internet advertising," Wray said. "I understand that we previously–as in the past–purchased some such information for a specific national security pilot project. But that's not been active for some time." In its landmark Carpenter v. United States decision, the Supreme Court held that government agencies accessing historical location data without a warrant were violating the Fourth Amendment's guarantee against unreasonable searches. The decision left open a glaring loophole that allows the government to simply purchase whatever it cannot otherwise legally obtain. US Customs and Border Protection (CBP) and the Defense Intelligence Agency are among the list of federal agencies known to have taken advantage of this loophole. The Department of Homeland Security ... purchased the geolocations of millions of Americans from private marketing firms. The data were derived from ... benign sources, such as mobile games and weather apps.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
People for the Ethical Treatment of Animals on Monday implored the U.S. military to reinstate a ban on the intentional wounding of animals in experiments and to stop radiation testing in an attempt to determine the cause of the mystery ailment popularly known as "Havana syndrome" that has afflicted U.S. government officials posted at diplomatic facilities in Washington, D.C. and several foreign countries. PETA argues that the military's decision to use live animals in testing related to Havana syndrome is "counterproductive" due to biological differences between humans and species subjected to the experiments, as well as the widespread availability of non-wounding research methods and the likelihood that radio frequency waves did not cause the mysterious ailment. The U.S. government has a long history of radiation experiments not only on animals but also on human beings. Scores of institutions, including some of North America's most prominent universities, laboratories, and hospitals hosted government and military experimentation on both volunteers and unwitting test subjects in the MK-ULTRA mind control experiments and other highly unethical and sometimes deadly programs. People suffering from Havana syndrome–so named because it was first identified by U.S. and Canadian diplomats and embassy staff in the Cuban capital–experienced what The Lancet described as "an abrupt onset of unusual clinical symptoms."
Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and non-lethal weapons from reliable major media sources.
In the month since veteran journalist Seymour Hersh published his bombshell report alleging that President Joe Biden personally authorized a covert action to bomb the Nord Stream pipelines, we've seen a frenzy of speculation, detailed dissection of Hersh's specific assertions, and the emergence of competing narratives both supporting and denouncing the report. On March 7, the New York Times and the German newspaper Die Zeit both published stories that thicken the plot. The Times story was based on a narrative clearly being pushed by U.S. intelligence sources that "a pro-Ukrainian group carried out the attack." If the bombing of the Nord Stream pipelines was, as Hersh alleges, directed by the U.S., then the leaked suggestion that the culprits were a "pro-Ukrainian group" could indicate a nascent effort at floating a cover story. No one has claimed responsibility for this attack, but there are recent precedents for foreign actors taking credit for U.S. operations to conceal Washington's involvement. Military officials have lied or misled the public ... throughout U.S. history. There is no U.S. law or rule prohibiting the government from promoting a false alternative explanation to conceal an operation. "This is an established practice in military operations and intelligence activities where it is often known as â€cover and deception,'" [said former Government Secrecy Project director Steven Aftergood]. "Sometimes, in order to maintain the operational security of X, you have to declare that it is actually Y."
Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
We are stuck in a never ending cycle of disaster that has led to one giant sense-making crises. False flag terrorism ... refers to governments creating, supporting, or staging events, like acts of terrorism in their own country and on their own citizenry, and then blaming it on someone else. Sometimes events can be created and even staged, and other times events are completely real yet the narrative we receive is where the deception lies. Either way, in many cases these events are used for control and/or political and financial gain. Take, for example, Operation Northwoods. This was a plan hatched by the US government in the early 1960s to fool the American public and the international community into supporting a war against Cuba in order to oust Fidel Castro. The plan included blowing up a US ship, attacking a US military base, sinking and blowing up boats of Cuban refugees, hijacking planes, and orchestrating violent terrorism in multiple US cities against American citizens. And of course, blaming Cuba for these actions. 9/11 could perhaps be one of the best examples of false flag terrorism, but the evidence that has lead the majority of people to feel this sentiment has not seen the light of day within the mainstream. There are many similarities between 9/11 and COVID, and in my mind COVID has been a clear act of bioterrorism by the same entities who proposed the â€solution.' These included vaccine mandates, mask mandates and more, which we are likely to see resurface again in the future.
Note: Read more about false flag terrorism. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
The FBI and the Defense Department were actively involved in research and development of facial recognition software that they hoped could be used to identify people from video footage captured by street cameras and flying drones, according to thousands of pages of internal documents that provide new details about the government's ambitions to build out a powerful tool for advanced surveillance. The documents, revealed in response to an ongoing Freedom of Information Act lawsuit the American Civil Liberties Union filed against the FBI, show how closely FBI and Defense officials worked with academic researchers to refine artificial-intelligence techniques that could help in the identification or tracking of Americans without their awareness or consent. Many of the records relate to the Janus program, a project funded by the Intelligence Advanced Research Projects Agency, or IARPA. The improved facial recognition system was ultimately folded into a search tool, called Horus, and made available to the Pentagon's Combating Terrorism Technical Support Office, which helps provide military technologies to civilian police forces. No federal laws regulate how facial recognition systems can be used. The tool's use in domestic mass surveillance would be a "nightmare scenario," said Nathan Wessler, a deputy director at the ACLU. "It could give the government the ability to pervasively track as many people as they want for as long as they want. There's no good outcome for that in a democratic society."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The Central Intelligence Agency has for years been collecting in bulk, without a warrant, some kind of data that can affect Americans' privacy. At the same time, [the C.I.A.] declared that a report about the same topic, which had prompted the letter, must remain fully classified. That report, called "Deep Dive II," was part of a set of studies by a watchdog board scrutinizing intelligence community operations under Executive Order 12333. In March 2021, the Senate Intelligence Committee received a copy of the report. Two Democrats on the panel, Senators Ron Wyden of Oregon and Martin Heinrich of New Mexico, urged Avril D. Haines, the director of national intelligence, and William J. Burns, the C.I.A. director, to declassify the activity. The senators suggested that its hidden existence cut against Americans' understanding that various pieces of legislation enacted in recent years "limit and, in some cases, prohibit the warrantless collection of Americans' records." In 2015, Congress banned bulk collection of telecommunications metadata under the Patriot Act and limited other types of bulk collection by the F.B.I. under laws governing domestic activities like the Foreign Intelligence Surveillance Act, or FISA. Yet "the C.I.A. has secretly conducted its own bulk program" under Executive Order 12333, the senators wrote. "It has done so entirely outside the statutory framework that Congress and the public believe govern this collection, and without any of the judicial, congressional or even executive branch oversight."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Antiterrorist moral fervor and ideological blinders propelled the U.S. into its biggest foreign policy blunder since World War Two. The U.S. government constantly embellished the storyline to demonize the communist opposition. A CIA operative provided materials for a massive bomb that ripped through a main square in Saigon in 1952. A Life magazine photographer was waiting on the scene, and his resulting snap appeared with a caption blaming the carnage on Viet Minh Communists. The Kennedy administration sought credibility by profoundly deceiving the American people and Congress regarding its Vietnam policy. In August 1963, South Vietnamese Special Forces "carried out midnight raids against Buddhist pagodas throughout the country. More than 1400 people, mostly monks were arrested and many of them were beaten," according to the Pentagon Papers. The CIA was bankrolling these Special Forces, which were supposed to be used for covert operations against the Viet Cong or North Vietnam, not for religious repression. The Johnson administration exploited the terrorist label to sway Americans to support greater U.S. Involvement in Vietnam. In a special message to Congress on May 18, 1964 seeking additional fund for Vietnam, LBJ declared, "the Viet Cong guerrillas, under orders from their Communist masters in the North, have intensified terrorist actions against the peaceful people of South Vietnam. This increased terrorism requires increased response."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and terrorism from reliable major media sources.
Genaro GarcĂa Luna, Mexico's former top law enforcement official known as the "architect" of the Mexican side of the drug war, was found guilty in New York federal court of collaborating with the Sinaloa cartel, the biggest organized crime group in North America. For years, GarcĂa Luna was the U.S. government's most trusted ally in the war on drugs. As public security secretary, he wielded incredible power, overseeing Mexico's Federal Police, the prison network, and a vast intelligence-gathering infrastructure, while working with the Drug Enforcement Administration, FBI, CIA, and Department of Homeland Security in the fight against Mexican cartels. The case portrayed GarcĂa Luna and his network of corrupt officials as a handful of bad apples, and what U.S. officials knew about GarcĂa Luna's illicit activities went mostly unexplored, despite the government's role in providing funding, equipment, and training that has fueled drug-related violence. GarcĂa Luna was found guilty of all five charges, including drug trafficking and continuing a criminal enterprise. Prosecutors alleged that he received around $274 million in bribes from the cartel from 2001 to 2012, first as head of the Federal Investigative Agency, the Mexican equivalent of the FBI, and then as secretary of public security. GarcĂa Luna left public office in 2012 following a change in presidency and moved to Miami where he started a security consulting company and lived a lavish lifestyle.
Note: The War on Drugs has been described as a trillion dollar failure. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in intelligence agencies from reliable major media sources.
It has now been one week since Seymour Hersh published an in-depth report claiming that the Biden administration deliberately blew up the Nord Stream II gas pipeline without Germany's consent or even knowledge – an operation that began planning long before the Russian invasion of Ukraine. Hersh – the journalist who broke the stories of the My Lai Massacre, the CIA spying program and the Abu Ghraib torture scandal – claims that in June, U.S. Navy divers traveled to the Baltic Sea and attached C4 explosive charges to the pipeline. President Biden himself ordered its destruction. All understood ... that, if caught, it would be seen as a flagrant "act of war" against their allies. Despite this, corporate media have overwhelmingly ignored the Pulitzer Prize-winning reporter's bombshell. A MintPress News study analyzed the 20 most influential publications in the United States, according to analytics company Similar Web, and found only four mentions of the report between them. This lack of interest cannot be explained due to the report's irrelevance. If the Biden administration really did work closely with the Norwegian government to blow up Nord Stream II, causing billions of dollars worth of immediate damage and plunging an entire region of the world into a freezing winter without sufficient energy, it ranks as one of the worst terrorist attacks in history. The Nord Stream attack was also one of the world's worst ecological disasters, constituting the largest single leak of methane in history.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
In June 2017, The Intercept published a leaked N.S.A. document, which it claimed revealed "a months-long Russian hacking effort against the U.S. election infrastructure." Ever since, it has been an article of faith in the mainstream media and among Democratic politicians that Russian G.R.U. cyberwarriors "hacked" the 2016 election. Moreover, Reality Winner, the N.S.A. analyst who leaked the document and ended up in jail as a result, has been elevated to the status of a heroic whistleblower. There are strong grounds to believe Winner unwittingly walked into a trap laid by the C.I.A. Winner has always claimed she acted alone, and there is no reason to doubt that she felt it was her patriotic duty to release the document. But her clumsiness, naivety and incompetence suggest she may well be easily manipulable, and a great many individuals and organizations had an interest in the dud intelligence report's release. Foremost among them, elements of the C.I.A. loyal to John Brennan, Agency director between 2013 and January 2017. Brennan fudged ... findings to keep the F.B.I. Trump-Russia "collusion" investigation alive. Launched by the Bureau in 2016, it found no evidence Trump or members of his campaign were conspiring with Moscow. It is an obvious question whether Winner's leak – in addition to furthering the RussiaGate fiction and damaging Trump – also served to discredit the N.S.A. by creating the illusion it had been asleep at the wheel over Kremlin meddling.
Note: Listen to audio of renowned journalist Seymour Hersch debunking the intelligence agency lie that Russia was responsible for the 2016 DNC email leaks, which exposed corruption in the party. Reality Winner's leak gave credence to this lie. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
The "Twitter files" revealed an FBI operation to monitor and censor social media content. Dozens of FBI employees worked on the identification and removal of material on a wide range of subjects and that Twitter largely carried out their requests. Nor was it just the FBI, apparently. Emails reveal FBI figures like a San Francisco assistant special agent in charge asking Twitter executives to "invite an OGA" (or "Other Government Organization") to an upcoming meeting. A week later, Stacia Cardille, a senior Twitter legal executive, indicated the OGA was the CIA, an agency under strict limits regarding domestic activities. Twitter's own ranks included dozens of ex-FBI agents and executives. The dozens of disclosed emails ... do not include still-undisclosed but apparent government coordination with Facebook and other social media companies. Much of that work apparently was done through the multi-agency Foreign Influence Task Force (FITF), which operated secretly it seems to censor citizens. This is a First Amendment violation. The Twitter files have substantiated long-standing concerns over "censorship by surrogate" or proxy. As with other amendments like the Fourth Amendment, which protects against unreasonable searches or seizures, the government cannot use private agents to do indirectly what it cannot do directly. Just as a police officer cannot direct a security guard to break into an apartment and conduct a search, the FBI cannot use Twitter to censor Americans.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
A war between China and Taiwan will be extremely good for business at America's Frontier Fund ... according to audio from a February 1 event. The remarks occurred at a tech finance symposium hosted at the Manhattan offices of Silicon Valley Bank. "If the China-Taiwan situation happens, some of our investments will 10x, like overnight," [a] person who identified as "Tom" said. "So I don't want to share the name, but the one example I gave was a critical component that ... the total market value is $200 million, but it is a critical component to a $50 billion market cap. That's like a choke point, right. And so if it's only produced in China, for example, and there's a kinetic event in the Pacific, that would 10x overnight, like no question about it. There's a couple of different things like that." AFF is surely not the only venture fund that would see stratospheric returns throughout their portfolio in the case of a destabilizing global crisis, like a "kinetic event in the Pacific" – that is to say, war. Gilman Louie, AFF's co-founder and current CEO, serves as chair of the National Intelligence University, advises Biden through his Intelligence Advisory Board, and was tapped for the State Department's Foreign Affairs Policy Board. Louie previously ran In-Q-Tel, the CIA's venture capital arm. In other words, AFF stands to massively profit from a geopolitical crisis while its CEO advises the Biden administration on geopolitical crises. AFF was founded last year with support from former Google CEO Eric Schmidt.
Note: While the detection of a Chinese spy balloon drums up significant fear and outrage over hostile foreign "threats," an incisive article reveals how US surveillance of foreign countries is quite common, including their recent expansion of military bases in Southeast Asia to monitor and surveil China. Furthermore, many independent journalists are questioning the war-fueling narrative that China is a threat to national security. Watch an insightful analysis uncovering the deeper story of what's behind the growing tensions between the US and China.
In 2017, the CIA had plotted to kidnap or assassinate Julian Assange, the founder of WikiLeaks, who had taken refuge five years earlier in the Ecuador embassy in London. A senior US counter-intelligence official said that plans for the forcible rendition of Assange to the US were discussed "at the highest levels" of the Trump administration. The informant was one of more than 30 US officials – eight of whom confirmed details of the abduction proposal – quoted in a 7,500-word investigation by Yahoo News into the CIA campaign against Assange. The plan was to "break into the embassy, drag [Assange] out and bring him to where we want", recalled a former intelligence official. Another informant said that he was briefed about a meeting in the spring of 2017 at which President Trump had asked if the CIA could assassinate Assange and provide "options" about how this could be done. The Trump-appointed head of the CIA, Mike Pompeo, said publicly that he would target Assange and WikiLeaks as the equivalent of "a hostile intelligence service". Top intelligence officials intended to decide themselves who is and who is not a journalist, and lobbied the White House to redefine other high-profile journalists as "information brokers", who were to be targeted as if they were agents of a foreign power. In 2013 ... a team of 120 counter-intelligence officers ... failed to find a single person in Iraq and Afghanistan who had died because of the disclosures by WikiLeaks.
Note: CIA interest in assassinating Assange coincided with Wikileaks' publication of leaked CIA hacking tools. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
President Joe Biden's administration released more than 13,000 records of President John F. Kennedy's assassination Thursday, but it fell short of fully complying with the spirit of a 30-year-old law demanding transparency by now. With Thursday's action, about 98% of all documents related to the 1963 killing have now been released and just 3% of the records remain redacted in whole or in part, according to the National Archives, which controls the John F. Kennedy Assassination Records Collection. The records include more information on accused gunman Lee Harvey Oswald and his time spent in Mexico City. But about 4,300 records remain redacted in part. [CIA agent George] Joannides ... guided and monitored an anti-Fidel Castro group called Directorio Revolucionario Estudiantil (Revolutionary Student Directorate) in 1963 that came into contact with Oswald in New Orleans in the months before the assassination, leading some to speculate about CIA-related complicity in the killing. As Oswald interacted with DRE and became known as an activist who supported President Castro, the Pentagon was formulating a plan called Operation Northwoods to stage a false flag attack in the United States to blame on Cuba and justify a military confrontation to make up for the aborted Bay of Pigs fiasco two years before. The records and the CIA's deceit over Joannides' ties to Oswald spans decades and came to light only after the records act began to unearth information about him.
Note: While the mainstream narrative points to the CIA being complicit in the killing of Kennedy by a Communist lone gunman, there is overwhelming evidence not often talked about, that reveals how Kennedy was murdered by rogue elements within US government agencies as a result of his efforts towards peacemaking strategies over nuclear weapon warfare, among other reasons. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
Among the intersections between [Lee Harvey] Oswald and the CIA, his time as a young Marine at the Atsugi naval air facility in Japan in 1957 is high among them. Atsugi was a launching pad for U-2 spy flights over the Soviet Union and was also a hub of the CIA's research into psychedelic drugs. "A CIA memo titled 'Truth Drugs in Interrogation' revealed the agency practice of dosing agents who were marked for dangerous overseas missions," wrote author David Talbot in "The Devil's Chessboard." A new document released in full last week relates directly to Oswald's time at Atsugi, revealing details about the CIA's response to testimony from a former agency accountant that the spy service had employed Oswald – who went on to be a gunman in the assassination of President John F. Kennedy in 1963. The CIA's claim to have had no contact with Oswald is undercut by the fact that George de Mohrenschildt, a CIA asset, became close friends with Oswald in the months before the assassination. According to documents found in the newly declassified files, at the same time as his trip, the CIA's Domestic Operations Division ran a search on de Mohrenschildt, "exact reason unknown," according to two documents created by a CIA analyst included in last week's declassification. The covert arm of the division was run at the time by E. Howard Hunt, a black ops specialist who confessed later in life to learning ahead of time of a conspiracy to assassinate Kennedy that involved high-level figures in the CIA.
Note: The CIA's MK-ULTRA program routinely administered drugs to unsuspecting victims. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government [is] a new book by Salon founder David Talbot. As Talbot explains, “What I was really trying to do was a biography on the American power elite from World War II up to the 60s.” Dulles ... served as CIA director from 1953 to 1961. Dulles would have had no moral qualms about killing any politician, including Americans. He went on to wield far greater power than most elected officials ever have. The Devil's Chessboard ... includes detailed reexaminations of Dulles's most notorious failures, such as the Bay of Pigs in 1961 and the nightmarish mind control program MK-ULTRA, as well as his most notorious "successes," the CIA's overthrow of democratic governments in Iran in 1953 and in Guatemala in 1954. As the Swiss director of the Office of Strategic Services during World War II, Dulles – whose law firm had represented German corporations and many U.S. corporations with German interests – quietly attempted to undermine Franklin D. Roosevelt's demand that Germany surrender unconditionally, going so far as to order the rescue of an SS general surrounded by Italian partisans. Dulles also led the push to save Reinhard Gehlen, Nazi head of intelligence on the Eastern Front and a genuine monster, from any post-war justice. Dulles then made certain Gehlen and his spies received a cozy embrace from the CIA, and helped push him to the top of West Germany's Federal Intelligence Service.
Note: Read more about the CIA Nazi link. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the Kennedy assassination from reliable major media sources.
The Biden administration took a public stand last year against the abuse of spyware to target human rights activists, dissidents and journalists: It blacklisted the most notorious maker of the hacking tools, the Israeli firm NSO Group. But the global industry for commercial spyware – which allows governments to invade mobile phones and vacuum up data – continues to boom. Even the U.S. government is using it. The Drug Enforcement Administration is secretly deploying spyware from a different Israeli firm, according to five people familiar with the agency's operations, in the first confirmed use of commercial spyware by the federal government. The most sophisticated spyware tools – like NSO's Pegasus – have "zero-click" technology, meaning they can stealthily and remotely extract everything from a target's mobile phone, without the user having to click on a malicious link to give Pegasus remote access. They can also turn the mobile phone into a tracking and secret recording device, allowing the phone to spy on its owner. But hacking tools without zero-click capability, which are considerably cheaper, also have a significant market. Commercial spyware has been used by intelligence services and police forces to hack phones used by drug networks and terrorist groups. But it has also been abused by numerous authoritarian regimes and democracies to spy on political opponents and journalists. This has led governments to a sometimes tortured rationale for their use.
Note: Read about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.
Trust Lab was founded by a team of well-credentialed Big Tech alumni who came together in 2021 with a mission: Make online content moderation more transparent, accountable, and trustworthy. A year later, the company announced a "strategic partnership" with the CIA's venture capital firm. The quiet October 29 announcement of the partnership is light on details, stating that Trust Lab and In-Q-Tel – which invests in and collaborates with firms it believes will advance the mission of the CIA – will work on "a long-term project that will help identify harmful content and actors in order to safeguard the internet." Key terms like "harmful" and "safeguard" are unexplained, but the press release goes on to say that the company will work toward "pinpointing many types of online harmful content, including toxicity and misinformation." It's difficult to imagine how aligning the startup with the CIA is compatible with [Trust Lab co-founder Tom] Siegel's goal of bringing greater transparency and integrity to internet governance. What would it mean, for instance, to incubate counter-misinformation technology for an agency with a vast history of perpetuating misinformation? Placing the company within the CIA's tech pipeline also raises questions about Trust Lab's view of who or what might be a "harmful" online, a nebulous concept that will no doubt mean something very different to the U.S. intelligence community than it means elsewhere. Trust Lab's murky partnership with In-Q-Tel suggests a step toward greater governmental oversight of online speech.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.