Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
"Ice is just around the corner," my friend said, looking up from his phone. A day earlier, I had met with foreign correspondents at the United Nations to explain the AI surveillance architecture that Immigration and Customs Enforcement (Ice) is using across the United States. The law enforcement agency uses targeting technologies which one of my past employers, Palantir Technologies, has both pioneered and proliferated. Technology like Palantir's plays a major role in world events, from wars in Iran, Gaza and Ukraine to the detainment of immigrants and dissident students in the United States. Known as intelligence, surveillance, target acquisition and reconnaissance (Istar) systems, these tools, built by several companies, allow users to track, detain and, in the context of war, kill people at scale with the help of AI. They deliver targets to operators by combining immense amounts of publicly and privately sourced data to detect patterns, and are particularly helpful in projects of mass surveillance, forced migration and urban warfare. Also known as "AI kill chains", they pull us all into a web of invisible tracking mechanisms that we are just beginning to comprehend, yet are starting to experience viscerally in the US as Ice wields these systems near our homes, churches, parks and schools. The dragnets powered by Istar technology trap more than migrants and combatants ... in their wake. They appear to violate first and fourth amendment rights.
Note: Read how Palantir helped the NSA and its allies spy on the entire planet. Learn more about emerging warfare technology in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on AI and Big Tech.
She turned to me the other morning and said, "You heard of The Gateway?" It didn't register in the moment. The intrigue revolves around a classified 1983 CIA report on a technique called the Gateway Experience, which is a training system designed to focus brainwave output to alter consciousness and ultimately escape the restrictions of time and space. The CIA was interested in all sorts of psychic research at the time, including the theory and applications of remote viewing, which is when someone views real events with only the power of their mind. The documents have since been declassified. The CIA report "Analysis and Assessment of The Gateway Process" [was] produced [in 1983]. It provides a scientific framework for understanding and expanding human consciousness, out-of-body experiments, and other altered states of mind. Consciousness is used to achieve desired objectives in the physical, emotional, or intellectual sphere ... [to] block pain, enhance feeling, and even suppress tumors. The author of The Gateway Process report is Lieutenant Colonel Wayne M. McDonnell. Wayne was tasked by the Commander of the U.S. Army Operational Group with figuring out how The Gateway Experience, astral projection and out-of-body experiences work. One curious feature of The Gateway Report is that it seems to be missing page 25. It's a real cliffhanger too. The bottom of page 24 reads "And, the eternal thought or concept of self which results from this self-consciousness serves the," The report picks back up on page 26 and 3 sections later as if Wayne hadn't just revealed the very secret of existence.
Note: A society that can self-regulate, self-heal, and access deeper layers of perception is harder to manipulate and even harder to govern through fear. Read our latest Substack, How Consciousness Research Can Help Heal a Divided World to learn more about the Gateway Project. Explore more positive stories like this on the mysterious nature of reality.
Some 10,000 American troops are currently supporting the Trump-ordered counternarcotics operations in the Caribbean. At this point the military intervention has killed 27 people, including individuals who are likely not Venezuelan. President Trump's most recent explanation to reporters for this unprecedented Pentagon build-up off Venezuela's coast was surprisingly reminiscent of the failed "war on drugs" which hearkens all the way back to the days of Richard Nixon, when he famously declared it "public enemy number one". There was a time ... where the CIA itself was the biggest narco-trafficker in United States and perhaps the entire Western hemisphere. This was to fund regime change and covert operations in Latin America after a belated Congressional crackdown on taxpayer funding for black ops. In August 1996, the San Jose Mercury News [published a] series of articles linking the CIA's "contra" army to the crack cocaine epidemic in Los Angeles. During the 1980s the CIA helped finance its covert war against Nicaragua's leftist government through sales of cut-rate cocaine to South Central L.A. drug dealer, Ricky Ross. The CIA's drug network, wrote [journalist Gary] Webb, "opened the first pipeline between Colombia's cocaine cartels and the black neighborhoods of Los Angeles, a city now known as the â€crack' capital of the world." Black gangs used their profits to buy automatic weapons, sometimes from one of the CIA-linked drug dealers.
Note: Though President Richard Nixon launched the War on Drugs by declaring drugs "public enemy No. 1," secretly he admitted in a 1973 Oval Office meeting that marijuana was "not particularly dangerous." The War on Drugs is a trillion dollar failure that has been made worse by every presidential administration since Nixon. Don't miss our in-depth investigation into the dark truths behind the War on Drugs. For more along these lines, read our concise summaries of news articles on intelligence agency corruption and the War on Drugs.
The CIA experienced "as many failures as successes" in exploring the intelligence applications of LSD and other drugs, according to the October 1975 U.S. Senate testimony of the Agency's former top chemist, Sidney Gottlieb, the man most closely associated with the notorious MKULTRA behavior control research projects. The long-secret transcripts of Gottlieb's testimony to the staff of the United States Select Committee to Study Governmental Operations with Respect to Intelligence Activities ("Church Committee") were published today by the National Security Archive, 50 years after the historic intelligence oversight hearings, along with a selection of declassified CIA memos and other records concerning MKULTRA. The Church Committee transcripts are among the highlights of the Digital National Security Archive collection, CIA and the Behavioral Sciences: Mind Control, Drug Experiments and MKULTRA. Gottlieb was a key bureaucratic player who signed off on hundreds of MKULTRA subprojects and who developed clandestine relationships with universities, prisons, hospitals, private laboratories, and private foundations that made it difficult to trace the programs back to the Agency. The Church Committee faced considerable obstacles in reconstructing the story, especially since Gottlieb and CIA director Richard Helms destroyed most of the original project records in 1973.
Note: According to Gottlieb's testimony, the CIA covertly dosed an unwitting individual with a massive amount of LSD to deliberately induce psychosis, causing him to experience violent paranoia and leading an unsuspecting psychiatrist to declare him mentally ill. This was done explicitly to discredit the man in the eyes of his colleagues–a tactic deemed as operationally useful for destroying a person's credibility without ever touching them. Learn more about the MKUltra Program in our comprehensive Military-Intelligence Corruption Information Center.
TrineDay Books announces the release of Blue Butterfly: Inside the Diary of an Epstein Survivor, a gripping memoir of Survivor Juliette Bryant that exposes Jeffrey Epstein's previously unreported medical crimes. Juliette's firsthand testimony ... unravels Epstein's deep ties to the shadowy intelligence community that controlled him. It explores how the two-time college dropout amassed a fortune of half a billion dollars while spending his days abusing young girls. Twenty-three years ago, on September 26, 2002, Jeffrey Epstein touched down in Cape Town with a high-profile entourage. That night, 20-year-old Juliette Bryant, a psychology student and aspiring model, was recruited and promised a future with the lingerie retailer Victoria's Secret. Instead, she found herself ensnared in a global network of abuse. Juliette was trafficked across continents and American states, taken to all of Epstein's luxury residences, and introduced to co-conspirators who enabled his operations to flourish in plain sight. The sexual abuse and psychological manipulation Juliette endured were pervasive as she made her final trip to Epstein's remote Zorro Ranch in New Mexico. There, in June 2004, Juliette awoke paralyzed in a laboratory, while a female doctor operated on her–without her knowledge or consent. While other books have documented his trafficking network, Blue Butterfly explores his obsession with elite eugenics, artificial intelligence, transhumanism, cryogenics, and cloning.
Note: Read our comprehensive Substack investigation covering the connection between Epstein's child sex trafficking ring and intelligence agency sexual blackmail operations. For more, read our concise summaries of news articles on Jeffrey Epstein's criminal enterprise.
The federal investigation into the death of convicted sex-trafficker Jeffrey Epstein was marred by significant lapses, experts told CBS News, including the failure by investigators to interview potential witnesses, properly preserve certain evidence and run basic forensic tests. Nearly two years passed before investigators interviewed the two key corrections officers on duty the night Epstein died. And details pulled from 90 photos of the cell and other evidence collected in the hours after Epstein's death – but before FBI agents arrived to process the scene – appear to show a succession of basic oversights, ranging from an absence of evidence markers to items being moved, experts told CBS News. "The FBI literally has all of the best tools. I mean, spared no expense. They have every tool you can imagine. And they used none of it as far as we can tell," forensic analyst Nick Barreiro said after reviewing the photos. "I do not believe he died by suicide, no," Epstein's co-defendant, Ghislaine Maxwell, said this summer during her interview in August with the Deputy U.S. Attorney General Todd Blanche. Epstein's body was discovered at 6:30 a.m. on Aug. 10, 2019. The first FBI agents arrived at the cell more than seven hours later. When they arrived, photos show they found a disorganized, rifled-through clutter. Epstein's lifeless body had already been removed from the cell, eliminating a critical source of information investigators would need to determine how and when he died.
Note: Read our comprehensive Substack investigation covering the connection between Epstein's child sex trafficking ring and intelligence agency sexual blackmail operations. For more, read our concise summaries of news articles on Jeffrey Epstein's criminal enterprise.
An interview that I conducted in 2020 with Brad Edwards, a lawyer for Epstein's victims, has always haunted me. It's about a conversation Edwards had with Epstein's bodyguard of five years, Igor Zinoviev, who warned him to back off because of Epstein's shadowy connections to the U.S. government. "[Zinoviev said] â€You don't know who you're messing with and you need to be really careful. You are on Jeffrey's radar and somebody that Jeffrey pays a lot of attention to, which is not good, you don't want to be on Jeffrey's radar,'" Edwards told me for Broken: Jeffrey Epstein, the podcast series I hosted and reported. "And I said, â€Well, give me some examples. I mean, who am I messing with?'" Edwards recalled. "And that's when he looked across the table and whispered three letters, â€C-I-A.'" One of Zinoviev's first assignments during Epstein's brief 2008 detention – just 13 months of overnights at the Palm Beach County jail with so-called work release – was to visit CIA headquarters in Langley, Virginia. There, he says, he attended classes for a week as the only private citizen in the room. At the end, the director or assistant director – Zinoviev couldn't remember – handed him a book with a handwritten note inside. He was told not to read it and to deliver it directly to Epstein in jail. Edwards later wrote about this encounter in his own book, Relentless Pursuit: My Fight for the Victims of Jeffrey Epstein. Epstein's usefulness to high-ranking officials might also explain why a Freedom of Information Act request of his calendar by The Wall Street Journal revealed multiple meetings with former CIA director Bill Burns when he was Deputy Secretary of State.
Note: This piece was published on Tara Palmeri's Substack. Palmeri is an investigative journalist and former ABC News White House correspondent. US attorney Alexander Acosta was once told Epstein "belonged to intelligence, and to leave it alone." Read our comprehensive Substack investigation covering the connection between Epstein's child sex trafficking ring and intelligence agency sexual blackmail operations.
By law, the Central Intelligence Agency isn't allowed to operate domestically in the United States. But ... going back to its earliest years, the agency has, in fact, interfered in homeland affairs to combat dissident movements (historically, from the Left), to defend its institutional prerogatives – and, increasingly, to recruit assets among the financial elite. Two former CIA officers and one former intelligence official told me that the [CIA's National Resources Division] is conspicuously absent from the Epstein debate. This, even as the NR must have conducted interviews with the man going back decades. The NR should also have maintained records of those conversations, according to all three officials. Under Attorney General Guideline 12333, intelligence officers, including those serving in the NR, are required to report criminal wrongdoing to the Department of Justice during the course of their investigations. But over scotch and soda on the 50th floor, why would an officer ask, and an executive tell, anything other than what both parties want to hear? "It is inconceivable given Jeffrey Epstein's travel record and associations that he was not approached by the NR at some point before his death," one former CIA officer said. "It would have left the New York NR division in the lurch not to have contacted him." And if that's the case, there should be a paper trail. "Every walk-in, every contact, every handling, every meeting, every termination – you are supposed to document it."
Note: This article exposes the CIA's hidden entanglement with Wall Street, revealing that officers in its National Resources Division not only mingled with top bankers and hedge-fund managers but even authorized them to collect private paychecks while on the CIA payroll, blurring the line between national security and corporate profit and creating a secret web of influence that Epstein was almost certainly a part of. US attorney Alexander Acosta was once told Epstein "belonged to intelligence, and to leave it alone." Read our comprehensive Substack investigation covering the connection between Epstein's child sex trafficking ring and intelligence agency sexual blackmail operations.
In an exchange this week on "All-In Podcast," Alex Karp was on the defensive. The Palantir CEO used the appearance to downplay and deny the notion that his company would engage in rights-violating in surveillance work. "We are the single worst technology to use to abuse civil liberties, which is by the way the reason why we could never get the NSA or the FBI to actually buy our product," Karp said. What he didn't mention was the fact that a tranche of classified documents revealed by [whistleblower and former NSA contractor] Edward Snowden and The Intercept in 2017 showed how Palantir software helped the National Security Agency and its allies spy on the entire planet. Palantir software was used in conjunction with a signals intelligence tool codenamed XKEYSCORE, one of the most explosive revelations from the NSA whistleblower's 2013 disclosures. XKEYSCORE provided the NSA and its foreign partners with a means of easily searching through immense troves of data and metadata covertly siphoned across the entire global internet, from emails and Facebook messages to webcam footage and web browsing. A 2008 NSA presentation describes how XKEYSCORE could be used to detect "Someone whose language is out of place for the region they are in," "Someone who is using encryption," or "Someone searching the web for suspicious stuff." In May, the New York Times reported Palantir would play a central role in a White House plan to boost data sharing between federal agencies, "raising questions over whether he might compile a master list of personal information on Americans that could give him untold surveillance power."
Note: Read about Palantir's revolving door with the US government. As former NSA intelligence official and whistleblower William Binney articulated, "The ultimate goal of the NSA is total population control." For more along these lines, read our concise summaries of news articles on Big Tech and the disappearance of privacy.
A man convicted in a post-9/11 terrorism sting was ordered freed from prison by a judge who criticized the FBI for relying on an "unsavory" confidential informant for an agency-invented conspiracy to blow up New York synagogues and shoot down National Guard planes. U.S. District Judge Colleen McMahon ... granted James Cromitie, 58, compassionate release from prison six months after she ordered the release of his three co-defendants, known as the Newburgh Four, for similar reasons. The four men from the small river city 60 miles north of New York City were convicted of terrorism charges in 2010. They were arrested after allegedly planting "bombs" that were packed with inert explosives supplied by the FBI. Critics have accused federal agents of entrapping a group of men who were down on their luck after doing prison time. In a scathing ruling, McMahon wrote that the FBI invented the conspiracy and identified the targets. Cromitie and his co-defendants, she wrote, "would not have, and could not have, devised on their own a crime involving missiles that would have warranted the 25-year sentence the court was forced to impose." "The notion that Cromitie was selected as a â€leader' by the co-defendants is inconceivable, given his well-documented buffoonery and ineptitude," she wrote. Cromitie was bought into the phony plot by the federal informant Shaheed Hussain, whose work has been criticized for years by civil liberties groups.
Note: Government agents have been directly involved in most high-profile terror plots in the US. For more along these lines, read our concise summaries of news articles on corruption in policing and in intelligence agencies.
A long-suppressed oversight report by the House Permanent Select Committee on Intelligence (HPSCI) concluded that the January 2017 Intelligence Community Assessment (ICA), which claimed Russia interfered in the 2016 election to help Donald Trump, had been manipulated under the direction of then-CIA Director John Brennan. The HPSCI report revealed that Brennan created a special Fusion Cell, excluded independent reviewers, and used a tightly controlled team of hand-picked CIA analysts to reverse what the underlying intelligence actually said. According to a CIA whistleblower who co-authored the ICA, Brennan put the team "under duress" to reach a conclusion that Putin supported Trump. The evidence did not show that the Russians favored Trump. According to someone close to the report, the raw intelligence showed that Russian officials saw Hillary Clinton as "more stable and more manageable" – and thus preferable to Trump. But Brennan's hand-picked team reversed that. Meanwhile, those responsible have faced no consequences. There was a time when if you abused your power in office, whether or not it rose to the level of a crime, you were exiled from D.C. Instead, Comey gets a teaching job in ethics, and Clapper and Brennan get TV contracts. The picture is less incomplete and, finally, clear. The Intelligence Community did not merely misread Russian intentions. It reversed its own analysts. It misled Congress.
Note: The security firm CrowdStrike was hired to investigate the alleged Russian hack of DNC servers in 2016 and found no proof that any emails from the system had been exfiltrated. All they found was inconclusive circumstantial evidence, which was presented as proof in media to the public. This deflected from the DNC and Clinton campaign's sabotage of Bernie Sanders and the damaging content of leaked DNC emails. In 2022, the DNC and Clinton campaign were fined by the FEC for obscuring their role in funding the debunked Steele dossier. Clinton also personally approved sharing another unverified claim with the press that alleged a secret Trump-Russia server connection, which helped trigger an FBI investigation later found to be baseless. Why are we not connecting the dots?
Digital technology was sold as a liberating tool that could free individuals from state power. Yet the state security apparatus always had a different view. The Prism leaks by whistleblower Edward Snowden in 2013 revealed a deep and almost unconditional cooperation between Silicon Valley firms and security apparatuses of the state such as the National Security Agency (NSA). People realized that basically any message exchanged via Big Tech firms including Google, Facebook, Microsoft, Apple, etc. could be easily spied upon with direct backdoor access: a form of mass surveillance with few precedents ... especially in nominally democratic states. The leaks prompted outrage, but eventually most people preferred to look away. The most extreme case is the surveillance and intelligence firm Palantir. Its service is fundamentally to provide a more sophisticated version of the mass surveillance that the Snowden leaks revealed. In particular, it endeavors to support the military and police as they aim to identify and track various targets – sometimes literal human targets. Palantir is a company whose very business is to support the security state in its most brutal manifestations: in military operations that lead to massive loss of life, including of civilians, and in brutal immigration enforcement [in] the United States. Unfortunately, Palantir is but one part of a much broader military-information complex, which is becoming the axis of the new Big Tech Deep State.
Note: For more along these lines, read our concise summaries of news articles on corruption in the intelligence community and in Big Tech.
It's no secret that the US government sought to assassinate Fidel Castro for years. Less well known, however, was that part of their regime-change plot included a plan to blow up Miami and sinking a boat-full of innocent Cubans. The plan, which was revealed in 2017 when the National Archives declassified 2,800 documents from the JFK era, was a collaborative effort that included the CIA, the State Department, the Department of Defense, and other federal agencies that sought to brainstorm strategies to topple Castro and sow unrest within Cuba. One of those plans included Operation Northwoods, submitted to the CIA by General Lyman Lemnitzer on behalf of the Joint Chiefs of Staff. One of the official CIA documents shows officials musing about staging a terror campaign ("real or simulated") and blaming it on Cuban refugees. In the summer of 2014, the CIA's inspector general concluded that the CIA had "improperly" spied on US Senate staffers who were researching the agency's black history of torture. CIA officers ... also sent a criminal referral to the Justice Department based on false information. In the wake of 9/11, the FBI has, on numerous occasions, targeted unstable and mentally ill individuals, sending informants to bait them into committing terror attacks. Before these individuals can actually carry out the attack, however, the Bureau intervenes, presenting the foiled plot to the public as a successfully thwarted attack.
Note: Read more about Operation Northwoods. Learn more about the rise of the CIA in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on intelligence agency corruption.
A new Pentagon report offers the grimmest assessment yet of the results of the last 10 years of U.S. military efforts [in Africa]. It corroborates years of reporting on catastrophes that U.S. Africa Command has long attempted to ignore or cover up. Fatalities from militant Islamist violence spiked over the years of America's most vigorous counterterrorism efforts on the continent, with the areas of greatest U.S. involvement – Somalia and the West African Sahel – suffering the worst outcomes. "Africa has experienced roughly 155,000 militant Islamist group-linked deaths over the past decade," reads a new report by the Africa Center for Strategic Studies. "What many people don't know is that the United States' post-9/11 counterterrorism operations actually contributed to and intensified the present-day crisis," [said] Stephanie Savell, director of the Costs of War Project at Brown University. The U.S. provided tens of millions of dollars in weapons and training to the governments of countries like Burkina Faso and Niger, which are experiencing the worst spikes in violent deaths today, she said. In 2002 and 2003 ... the State Department counted a total of just nine terrorist attacks, resulting in a combined 23 casualties across the entire continent. Last year, there were 22,307 fatalities from militant Islamist violence in Africa. At least 15 officers who benefited from U.S. security assistance were key leaders in a dozen coups in West Africa and the greater Sahel.
Note: Read more about the Pentagon's recent military failures in Africa. Learn more about how war is a tool for hidden agendas in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on military corruption.
Beginning in 2004, the CIA established a vast network of at least 885 websites, ranging from Johnny Carson and Star Wars fan pages to online message boards about Rastafari. Spanning 29 languages and targeting at least 36 countries directly, these websites were aimed not only at adversaries such as China, Venezuela, and Russia, but also at allied nations ... showing that the United States treats its friends much like its foes. These websites served as cover for informants, offering some level of plausible deniability if casually examined. Few of these pages provided any unique content and simply rehosted news and blogs from elsewhere. Informants in enemy nations, such as Venezuela, used sites like Noticias-Caracas and El Correo De Noticias to communicate with Langley, while Russian moles used My Online Game Source and TodaysNewsAndWeather-Ru.com, and other similar platforms. In 2010, USAID–a CIA front organization–secretly created the Cuban social media app, Zunzuneo. While the 885 fake websites were not established to influence public opinion, today, the U.S. government sponsors thousands of journalists worldwide for precisely this purpose. The Trump administration's decision to pause funding to USAID inadvertently exposed a network of more than 6,200 reporters working at nearly 1,000 news outlets or journalism organizations who were all quietly paid to promote pro-U.S. messaging in their countries. Facebook has hired dozens of former CIA officials to run its most sensitive operations. As the platform's senior misinformation manager, [Aaron Berman] ultimately has the final say over what content is promoted and what is demoted or deleted from Facebook. Until 2019, Berman was a high-ranking CIA officer, responsible for writing the president's daily security brief.
Note: Dozens of former CIA agents hold top jobs at Google. Learn more about the CIA's longstanding propaganda network in our comprehensive Military-Intelligence Corruption Information Center. For more along these lines, read our concise summaries of news articles on intelligence agency corruption and media manipulation.
Between 1953 and 1973, MKUltra, a secret CIA program, explored ... mind-control drugs that the U.S. could use as weapons. By drugging civilians and government workers (without consent), the program's researchers wanted to observe the effects of the drugs like LSD, ultimately hoping to make people biddable to carry out tasks like secret assassinations. Details of MKUltra began to emerge in 1974, when a New York Times story exposed the CIA's unethical and illegal practices, leading to a senate investigation and public revelations. The full extent of MKUltra's activities will likely remain a mystery, since CIA director Richard Helms ordered all of the program's records to be destroyed the year before. J. Edgar Hoover's FBI launched the Counterintelligence Program, or COINTELPRO, in the thick of the Cold War. Its objective: mitigate the Communist Party of the United States's influence. COINTELPRO used a range of tactics to surveil and sabotage its targets, such as undermining them in the public eye or sowing conflict to weaken them. The program gradually broadened its scope to include ... leading activists in the civil rights movement––including Martin Luther King, Jr. As the U.S. built a stockpile of nuclear arms during the Cold War, a new risk emerged: broken arrow incidents in which nuclear weapons are stolen, lost, or mishandled. America has officially owned up to 32 broken arrow incidents.
Note: Read our comprehensive Substack investigation that uncovers the dark truths behind the assassination of Martin Luther King Jr. Learn more about the MKUltra Program in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on intelligence agency corruption.
Tor is mostly known as the Dark Web or Dark Net, seen as an online Wild West where crime runs rampant. Yet it's partly funded by the U.S. government, and the BBC and Facebook both have Tor-only versions to allow users in authoritarian countries to reach them. At its simplest, Tor is a distributed digital infrastructure that makes you anonymous online. It is a network of servers spread around the world, accessed using a browser called the Tor Browser, which you can download for free from the Tor Project website. When you use the Tor Browser, your signals are encrypted and bounced around the world before they reach the service you're trying to access. This makes it difficult for governments to trace your activity or block access, as the network just routes you through a country where that access isn't restricted. But, because you can't protect yourself from digital crime without also protecting yourself from mass surveillance by the state, these technologies are the site of constant battles between security and law enforcement interests. The state's claim to protect the vulnerable often masks efforts to exert control. In fact, robust, well-funded, value-driven and democratically accountable content moderation – by well-paid workers with good conditions – is a far better solution than magical tech fixes to social problems ... or surveillance tools. As more of our online lives are funneled into the centralized AI infrastructures ... tools like Tor are becoming ever more important.
Note: For more along these lines, read our concise summaries of news articles on Big Tech and the disappearance of privacy.
August 4, 2025 marks the 30th anniversary of Operation Storm. Little known outside the former Yugoslavia, the military campaign unleashed a genocidal cataclysm that violently expelled Croatia's entire Serb population. Croat forces rampaged UN-protected areas of the self-declared Serb Republic of Krajina, looting, burning, raping and murdering their way across the province. Up to 350,000 locals fled, many on foot, never to return. Meanwhile, thousands were summarily executed. As these hideous scenes unfolded, UN peacekeepers charged with protecting Krajina watched without intervening. Meanwhile, US officials strenuously denied the horrifying massacres and mass displacement amounted to ethnic cleansing, let alone war crimes. Operation Storm was for all intents and purposes a NATO attack, carried out by soldiers armed and trained by the US and directly coordinated with other Western powers. Despite publicly endorsing a negotiated peace, Washington privately encouraged Zagreb to employ maximum belligerence, even as their ultranationalist Croat proxies plotted to strike with such ferocity that the country's entire Serb population would "to all practical purposes disappear." High-ranking Croat officials privately discussed methods to justify their coming blitzkrieg, including false flag attacks. In preparing for the offensive, Croatian soldiers were trained at Fort Irwin in California and the Pentagon aided in planning the operation.
Note: Learn more about how war is a tool for hidden agendas in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on war.
The Obama administration knew before and after the 2016 election that Russia did not affect the vote's outcome through cyberattacks. Director of National Intelligence (DNI) Tulsi Gabbard made public more than 100 pages of emails, memos and other records cataloguing what she called Obama officials' "conspiracy to subvert President Trump's 2016 victory." Both before and after Democrat Hillary Clinton's loss, the US Intelligence Community assessed that Russia played no significant role influencing the election. Among the documents was a Sept. 12, 2016, Intelligence Community Assessment that determined "foreign adversaries do not have and will probably not obtain the capabilities to successfully execute widespread and undetected cyber attacks" on election infrastructure. On Dec. 7, 2016, then-DNI James Clapper's office also concluded: "We have no evidence of cyber manipulation of election infrastructure intended to alter results." But those findings were suppressed after the FBI ... said it was going to "dissent" from the draft's conclusions "based on some new guidance." Clapper then spearheaded an alternative intelligence report claiming the Kremlin orchestrated hackings of Democratic National Committee emails ... and intervened in the presidential contest in favor of Trump. [Obama] ordered a new intelligence assessment from the CIA, FBI, NSA and DHS ... which ended up including the since-debunked dossier produced by former MI6 spy Christopher Steele.
Note: The security firm CrowdStrike was hired to investigate the alleged Russian hack of DNC servers in 2016 and found no proof that any emails from the system had been exfiltrated. All they found was inconclusive circumstantial evidence, which was presented as proof in media to the public. This deflected from the DNC and Clinton campaign's sabotage of Bernie Sanders and the damaging content of leaked DNC emails. In 2022, the DNC and Clinton campaign were fined by the FEC for obscuring their role in funding the debunked Steele dossier. Clinton also personally approved sharing another unverified claim with the press that alleged a secret Trump-Russia server connection, which helped trigger an FBI investigation later found to be discredited. Why are we not connecting the dots?
New evidence suggests that some of the highest-ranking officials in the Obama-era CIA and FBI perjured themselves regarding their claims that Russian President Vladimir Putin helped Donald Trump secure his victory in 2016. A newly released CIA review challenges their sworn denials to Congress that the Steele dossier – a discredited set of allegations about Trump funded by Hillary Clinton's campaign – was used as the basis for the years-long Russiagate probe that hamstrung President Trump's first term. The eight-page review conducted by career CIA analysts found the dossier did, in fact, worm its way into the text of the highly classified report known as an Intelligence Community Assessment (ICA) to buttress the thinly sourced, yet inflammatory allegation that "Putin and the Russian Government aspired to help President-elect Trump's election chances." Former CIA Director John Brennan, for one, insisted in his sworn May 2017 testimony before Congress that the Steele dossier was not "in any way" used as a basis for the so-called ICA completed in late December 2016. Likewise, then-National Intelligence Director James Clapper said in an official January 2017 statement that "we did not rely upon [the dossier] in any way for our conclusions." The CIA review shows that the unverified and now-debunked dossier was used as support for the intelligence analysis, not just as a sidebar as Obama officials have maintained.
Note: The security firm CrowdStrike was hired to investigate the alleged Russian hack of DNC servers in 2016 and found no proof that any emails from the system had been exfiltrated. All they found was inconclusive circumstantial evidence, which was presented as proof in media to the public. This deflected from the DNC and Clinton campaign's sabotage of Bernie Sanders and the damaging content of leaked DNC emails. In 2022, the DNC and Clinton campaign were fined by the FEC for obscuring their role in funding the debunked Steele dossier. Clinton also personally approved sharing another unverified claim with the press that alleged a secret Trump-Russia server connection, which helped trigger an FBI investigation later found to be baseless. Why are we not connecting the dots?
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

