Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Stories
Excerpts of Key Intelligence Agency Corruption News Stories in Major Media


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


Fast and Furious hearing rips Holder, DOJ for deception in gun-running scandal
2017-06-07, Fox News
Posted: 2017-07-10 14:14:05
http://www.foxnews.com/politics/2017/06/07/fast-and-furious-report-slams-hold...

Members of a congressional committee at a public hearing Wednesday blasted former President Barack Obama and his attorney general for allegedly covering up an investigation into the death of a Border Patrol agent killed as a result of a botched government gun-running project known as Operation Fast and Furious. The House Oversight Committee also Wednesday released a scathing, nearly 300-page report that found Holder’s Justice Department tried to hide the facts. Terry died in a gunfight. [His] death exposed Operation Fast and Furious, a Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) operation in which the federal government allowed criminals to buy guns in Phoenix-area shops with the intention of tracking them as they were transported into Mexico. But the agency lost track of more than 1,400 of the 2,000 guns they allowed smugglers to buy. Two of those guns were found at the scene of Terry's killing. Sen. Charles Grassley, R-Iowa, testified Wednesday in front of the committee, accusing DOJ and ATF officials of obstructing the investigation and working to silence ATF agents who informed the Senate of Fast and Furious. One of those silenced ATF agents, John Dodson, testified Wednesday that he remains “in a state of purgatory” since objecting to Fast and Furious and has been the subject of reprisals. Grassley's and Dodson's testimony reinforced findings of the report, which states that the Justice Department knew before Terry’s death that the ATF was “walking” firearms to Mexico and knew the day after the agent’s death that Fast and Furious guns were involved in the shootout -- despite denying these facts.

Note: The Obama administration invoked executive privilege in an unsuccessful attempt to cover this story up. Whistleblower John Dodson published a book on this scandal in 2013. The ATF tried and failed to silence him, then lied about the whole thing. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.


US quietly publishes once-expunged papers on 1953 Iran coup
2017-06-29, ABC News/Associated Press
Posted: 2017-07-10 14:10:13
http://abcnews.go.com/International/wireStory/us-quietly-publishes-expunged-p...

Once expunged from official State Department history, the U.S.-backed 1953 coup in Iran and what led up to it can be glimpsed in documents that the department has quietly published. The operation ultimately pushed the country toward its Islamic Revolution and hostility with the West. The CIA's role in the coup, which toppled Prime Minister Mohammed Mosaddegh and cemented the control of the shah, was well known when the State Department offered its first compendium on the era in 1989. But any trace of American involvement in the putsch had been wiped from the report, causing historians to call it a fraud. The 1,007-page report [released this month] shows U.S. officials discussing a coup up to a year before it took place. The CIA at one point "stockpiled enough arms and demolition material to support a 10,000-man guerrilla organization for six months" and paid out $5.3 million for bribes and other costs, which would be equivalent to $48 million today. One CIA document [states] that "several leading members of these (Iranian) security services are paid agents of this organization." The CIA also described hoping to use "powerfully influential clergy" in Shiite Iran to back the coup. To this day, Iran's clerical leaders portray the U.S. as a hostile foreign power bent on subverting and overthrowing its government. As President Dwight Eisenhower wrote ... in 1953, if knowledge of the coup became public, "We would not only be embarrassed in that region, but our chances to do anything of like nature in the future would almost totally disappear."

Note: The complete collection of State Department documents on this CIA-backed coup is available here. More recently, US policy reportedly fuelled the rise of Isis in Syria and Iraq. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


In Yemen's secret prisons, UAE tortures and US interrogates
2017-06-22, ABC News/Associated Press
Posted: 2017-07-02 20:33:14
http://abcnews.go.com/International/wireStory/us-interrogates-detainees-yemen...

Hundreds of men swept up in the hunt for al-Qaida militants have disappeared into a secret network of prisons in southern Yemen where abuse is routine and torture extreme - including the "grill," in which the victim is tied to a spit like a roast and spun in a circle of fire, an Associated Press investigation has found. Senior American defense officials acknowledged Wednesday that U.S. forces have been involved in interrogations of detainees in Yemen but denied any participation in or knowledge of human rights abuses. Interrogating detainees who have been abused could violate international law, which prohibits complicity in torture. The secret prisons are inside military bases, ports, an airport, private villas and even a nightclub. Some detainees have been flown to an Emirati base across the Red Sea in Eritrea, according to Yemen Interior Minister Hussein Arab and others. Several U.S. defense officials, speaking on condition of anonymity to discuss the topic, told AP that American forces do participate in interrogations of detainees at locations in Yemen, provide questions for others to ask, and receive transcripts of interrogations from Emirati allies. They said U.S. senior military leaders were aware of allegations of torture at the prisons in Yemen, looked into them, but were satisfied that there had not been any abuse when U.S. forces were present. Inside war-torn Yemen, however ... nearly 2,000 men have disappeared into the clandestine prisons, a number so high that it has triggered near-weekly protests.

Note: Saudi Arabia's military campaign in Yemen has strong US military support, and flagrantly violates international law. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.


Hacks Raise Fear Over N.S.A.’s Hold on Cyberweapons
2017-06-28, New York Times
Posted: 2017-07-02 20:28:05
https://www.nytimes.com/2017/06/28/technology/ransomware-nsa-hacking-tools.html

Twice in the past month, National Security Agency cyberweapons stolen from its arsenal have been turned against two very different partners of the United States — Britain and Ukraine. The N.S.A. has [not acknowledged] its role in developing the weapons. White House officials have deflected many questions ... by arguing that the focus should be on the attackers themselves, not the manufacturer of their weapons. The silence is wearing thin for victims of the assaults, as a series of escalating attacks using N.S.A. cyberweapons have hit hospitals, a nuclear site and American businesses. There is growing concern that United States intelligence agencies have rushed to create digital weapons that they cannot keep safe from adversaries or disable once they fall into the wrong hands. On Wednesday, the calls for the agency to address its role in the latest attacks grew louder. Representative Ted Lieu ... who serves on the House Judiciary and Foreign Affairs Committees, urged the N.S.A. to help stop the attacks and to stop hoarding knowledge of the computer vulnerabilities upon which these weapons rely. Brad Smith, the president of Microsoft, said outright that the National Security Agency was the source of the “vulnerabilities” now wreaking havoc. For the American spy agency ... what is unfolding across the world amounts to a digital nightmare. It was as if the Air Force lost some of its most sophisticated missiles and discovered an adversary was launching them against American allies — yet refused to respond, or even to acknowledge that the missiles were built for American use.

Note: It was reported in 2014 that the NSA had developed specialized tools to covertly hack into computers on a mass scale by using automated systems. More recently, a large number of NSA hacking tools were put up for sale online. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


The CIA Drug Connection Is as Old as the Agency
2003-12-03, New York Times
Posted: 2017-07-02 20:18:20
http://www.nytimes.com/1993/12/03/opinion/03iht-edlarry.html

The Justice Department is investigating allegations that officers of a special Venezuelan anti-drug unit funded by the CIA smuggled more than 2,000 pounds of cocaine into the United States with the knowledge of CIA officials – despite protests by the Drug Enforcement Administration. That is a huge amount of cocaine. But it was hardly a first for the CIA. The agency has never been above using individuals or organizations with known links to drug trafficking if it thought they could help it further its national security mission. In Costa Rica, when the war against Nicaragua's Sandinista government was at its peak and cocaine was beginning to pour into the United States, the DEA attaché wanted to place cameras at clandestine airstrips from which he suspected drugs were being flown to the United States. The CIA resident gave him a list of airstrips on which he was not to place cameras. They were the strips into which the CIA was flying arms for the contras. Some were also strips from which the DEA agent suspected drugs were being flown to the United States. Shortly after the kidnapping and brutal murder of the DEA's Enrique Camarena in Mexico, Francis Mullen, the DEA administrator, was taken by the CIA station chief in Mexico City to Mexico's director of federal security, a man who, the station chief confided, was a CIA asset. The gentleman ... denied any knowledge of the affair. He was lying. A DEA investigation revealed that he had been connected ... to the murder. CIA ties to international drug trafficking date to the Korean War.

Note: The above was written by Larry Collins, author of the book, "Black Eagles," which deals with the CIA, cocaine traffic and Central America in the mid-'80s. Read the account of Mike Levine, a 25-year veteran of the DEA who personally witnessed large-scale drug smuggling by the government. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


Homeland Security official: Russian government actors tried to hack election systems in 21 states
2017-06-21, Washington Post
Posted: 2017-06-26 00:08:21
https://www.washingtonpost.com/world/national-security/homeland-security-offi...

People connected to the Russian government tried to hack election-related computer systems in 21 states. Samuel Liles, the Department of Homeland Security’s acting director of the Office of Intelligence and Analysis Cyber Division, said vote-tallying mechanisms were unaffected and that the hackers appeared to be scanning for vulnerabilities — which Liles likened to walking down the street and looking at homes to see who might be inside. Liles was testifying before the Senate Intelligence Committee, which is investigating Russia’s efforts to meddle in the 2016 presidential election. Officials in Arizona and Illinois had previously confirmed that hackers targeted their voter registration system. In a separate hearing ... former Department of Homeland Security secretary Jeh Johnson testified that Russia’s meddling ... was “unprecedented, the scale and the scope of what we saw them doing.” He said the severity of Russia’s efforts persuaded him to sign onto an Oct. 7 statement publicly blaming the Kremlin for what had happened. “We needed to do it, and we needed to do it well before the election to inform American voters of what we saw,” Johnson said. FBI Assistant Director of Counterintelligence Bill Priestap ... said Russia for years has tried to influence U.S. elections but that the “scale” and “aggressiveness” of its efforts in 2016 made the attempts more significant.

Note: Many who follow elections closely have known and spread the word for years about serious vulnerabilities in US electronic voting, yet only now that Russia is involved is it getting widespread coverage. Do you really think the Russians are the only ones who have hacked US elections? Read an enlightening analysis of elections hacking in the US which raises many serious questions. And don't miss the critically important information provided in our Elections Information Center.


Psychologists Open a Window on Brutal C.I.A. Interrogations
2017-06-21, New York Times
Posted: 2017-06-26 00:05:58
https://www.nytimes.com/interactive/2017/06/20/us/cia-torture.html

Fifteen years after he helped devise the brutal interrogation techniques used on terrorism suspects in secret C.I.A. prisons, John Bruce Jessen, a former military psychologist, expressed ambivalence about the program. He described himself and a fellow military psychologist, James Mitchell, as reluctant participants in using the techniques, some of which are widely viewed as torture. The two psychologists ... are defendants in the only lawsuit that may hold participants accountable for causing harm. Revelations about the C.I.A. practices ... led to an eventual ban on the techniques and a prohibition by the American Psychological Association against members’ participation in national security interrogations. The two psychologists argue that the C.I.A., for which they were contractors, controlled the program. But it is difficult to successfully sue agency officials because of government immunity. Under the agency’s direction, the two men ... proposed [and applied] the “enhanced interrogation” techniques. Their business received $81 million. When [the psychologists] wanted to end the waterboarding sessions as no longer useful, C.I.A. supervisors ... ordered them to continue. Dr. Mitchell said that the C.I.A. officials told them: “‘You guys have lost your spine.’ I think the word that was actually used is that you guys are pussies. There was going to be another attack in America and the blood of dead civilians are going to be on your hands.”

Note: Prior to condemning torture, some of the American Psychological Association’s top officials sought to curry favor with Pentagon officials by supporting the CIA's brutal interrogation methods. For more along these lines, read about how the torture program fits in with a long history of human experimentation by corrupt intelligence agencies working alongside unethical scientists. For more, see this list of programs that treated humans as guinea pigs.


Russian Cyber Hacks on U.S. Electoral System Far Wider Than Previously Known
2017-06-13, Bloomberg
Posted: 2017-06-18 23:57:01
https://www.bloomberg.com/politics/articles/2017-06-13/russian-breach-of-39-s...

Russia’s cyberattack on the U.S. electoral system before [the recent] election was far more widespread than has been publicly revealed, including incursions into voter databases and software systems in almost twice as many states as previously reported. In Illinois, investigators found evidence that cyber intruders tried to delete or alter voter data. The hackers accessed software designed to be used by poll workers on Election Day, and in at least one state accessed a campaign finance database. Details of the wave of attacks, in the summer and fall of 2016, were provided by three people with direct knowledge of the U.S. investigation into the matter. In all, the Russian hackers hit systems in a total of 39 states. The scope and sophistication so concerned Obama administration officials that they took an unprecedented step -- complaining directly to Moscow over a modern-day “red phone.” In October, two of the people said, the White House contacted the Kremlin on the back channel to offer detailed documents of what it said was Russia’s role in election meddling and to warn that the attacks risked setting off a broader conflict. The new details, buttressed by a classified National Security Agency document recently disclosed by the Intercept ... paint a worrisome picture for future elections: [This is] the newest portrayal of potentially deep vulnerabilities in the U.S.’s patchwork of voting technologies.

Note: Many who follow elections closely have known and spread the word for years about serious vulnerabilities in US electronic voting, yet only now that Russia is involved is it getting widespread coverage. Do you really think the Russians are the only ones who have hacked US elections? Read an enlightening analysis of elections hacking in the US which raises many serious questions. And don't miss the critically important information provided in our Elections Information Center.


Declassified Papers Show U.S. Recruited Ex-Nazis
2010-12-11, New York Times
Posted: 2017-06-18 23:36:31
http://www.nytimes.com/2010/12/12/us/12holocaust.html

After World War II, American counterintelligence recruited former Gestapo officers, SS veterans and Nazi collaborators to an even greater extent than had been previously disclosed and helped many of them avoid prosecution or looked the other way when they escaped, according to thousands of newly declassified documents. With the Soviet Union muscling in on Eastern Europe, settling scores with Germans or German collaborators ... appeared counterproductive, said a government report published Friday by the National Archives. In chilling detail, the report also elaborates on the close working relationship between Nazi leaders and the grand mufti of Jerusalem, Haj Amin al-Husseini, who ... recruited Muslims for the SS, the Nazi Partys elite military command, [and] was allowed to flee after the war to Syria. The report, Hitlers Shadow: Nazi War Criminals, U.S. Intelligence and the Cold War, grew out of an interagency group created by Congress to identify, declassify and release federal records on Nazi war crimes and on Allied efforts to hold war criminals accountable. It is drawn from a sampling of 1,100 C.I.A. files and 1.2 million Army counterintelligence files that were not declassified until ... 2007. Hitlers Shadow adds a further dimension to a separate Justice Department history of American Nazi-hunting operations, which the government has refused to release ... and which concluded that American intelligence officials created a safe haven in the United States for certain other former Nazis.

Note: Following World War Two, more than 1500 Nazi's, including many war criminals, were brought to the US by "Operation Paperclip" and secretly embedded in the US scientific community and intelligence establishment. For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.


Who Won the Election? NSA Report Suggests Russia Might Have Hacked Voting System
2017-06-05, Newsweek
Posted: 2017-06-11 21:09:40
http://www.newsweek.com/who-won-election-nsa-report-suggests-russia-might-hav...

Russian military intelligence attempted to cyber-attack a U.S. voting software supplier and more than 100 local election officials in the days leading up to the 2016 presidential election, The Intercept reported Monday. According to an NSA document ... Russian military intelligence cyber-attacked a U.S. voting software supplier, using information gained in that attack to “launch a voter registration-themed spear-phishing campaign targeting U.S. local government organizations. Russian General Staff Main Intelligence Directorate actors … executed cyber espionage operations against a named U.S. company in August 2016, evidently to obtain information on elections-related software and hardware solutions,” the document states. The operation gave the hackers “persistent access” to the targeted computers, allowing them to “survey the victims for items of interest.” But Pamela Smith, president of election integrity watchdog Verified Voting, said the hacking might have kept some Americans from voting. “If someone has access to a state voter database, they can take malicious action by modifying or removing information,” she told The Intercept. “This could affect whether someone has the ability to cast a regular ballot or be required to cast a ‘provisional’ ballot — which ... may mean the voter has to jump through certain hoops such as proving their information to the election official before their eligibility is affirmed.”

Note: Why have those who set up our elections allowed private companies to develop software which can be hacked? For undeniable evidence our voting systems have not been safe for years, read summaries of these major media news articles.


Trump Administration Starts Returning Copies of C.I.A. Torture Report to Congress
2017-06-02, New York Times
Posted: 2017-06-11 20:56:27
https://www.nytimes.com/2017/06/02/us/politics/cia-torture-report-trump.html?...

Senators, spies and a president spent years in a pitched battle over how the history is told of one of the most controversial chapters of America’s campaign against terrorism, the detention and interrogation of prisoners in secret C.I.A. jails. Congressional officials said on Friday that the [Trump] administration had begun returning to Congress copies of a 6,700-page Senate report from 2014 about the C.I.A. program. The move raises the possibility that most of the copies could be locked in Senate vaults indefinitely or even destroyed. The classified report [tells] the story of how ... the C.I.A. began capturing terrorism suspects and interrogating them ... beyond the reach of the American judicial and military legal systems. The central conclusion of the report is that the spy agency’s interrogation methods - including waterboarding, sleep deprivation and other kinds of torture - were far more brutal and less effective than the C.I.A. described to policy makers, Congress and the public. The Senate Intelligence Committee, which was run by Democrats when the executive summary was released, sent copies of the entire report to at least eight federal agencies, asking that they incorporate it into their records — a move that would have made the documents subject to requests under the Freedom of Information Act. The agencies all refused to add the report to their records, and instead kept their copies locked up, prompting the American Civil Liberties Union to sue the C.I.A. for access to the full report.

Note: See a revealing New York Times article listing seven key points from this torture report. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.


7 Key Points From the C.I.A. Torture Report
2014-12-09, New York Times
Posted: 2017-06-11 20:54:26
https://www.nytimes.com/interactive/2014/12/09/world/cia-torture-report-key-p...

The report released by the Senate Select Committee on Intelligence discloses new details about the C.I.A.’s torture practices. 1. The C.I.A.’s interrogation techniques were more brutal and employed more extensively than the agency portrayed. The report also describes detainees being subjected to sleep deprivation for up to a week, medically unnecessary “rectal feeding” and death threats. Conditions at one prison, described by a clandestine officer as a “dungeon,” were blamed for the death of a detainee, and the harsh techniques were described as leading to “psychological and behavioral issues, including hallucinations, paranoia, insomnia, and attempts at self-harm and self-mutilation.” 2. The C.I.A. interrogation program was mismanaged and was not subject to adequate oversight. 3. The C.I.A. misled members of Congress and the White House about the effectiveness and extent of its brutal interrogation techniques. 4. Interrogators in the field who tried to stop the brutal techniques were repeatedly overruled by senior C.I.A. officials. 5. The C.I.A. repeatedly underreported the number of people it detained. It also underreported the number of detainees who were subjected to torture. 6. At least 26 detainees were wrongfully held and did not meet the government’s standard for detention. 7. The C.I.A. leaked classified information to journalists, exaggerating the success of interrogation methods in an effort to gain public support.

Note: Efforts to bury this report have been ongoing. For more along these lines, see the "10 Craziest Things in the Senate Report on Torture". For more, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.


FBI 'warned MI5 in January that Salman Abedi was planning terror attack in UK'
2017-05-28, The Independent (One of the UK's leading newspapers)
Posted: 2017-06-04 23:11:26
http://www.independent.co.uk/news/uk/home-news/fbi-warned-mi5-january-manches...

British intelligence agency MI5 was reportedly warned by its US counterpart that Salman Abedi was planning an attack on UK soil, three months before he blew himself up outside an Ariana Grande concert in Manchester. FBI agents are said to have informed British officials that the 22-year-old was part of a North African Islamic State cell based in the north west of England that was plotting an attack in the UK. “In early 2017 the FBI told MI5 that Abedi belonged to a North African terror gang based in Manchester, which was looking for a political target in this country," a security source [said]. “The information came from the interception of his communications by US federal agents, who had been investigating Abedi since the middle of 2016, and from information unearthed in Libya, where his family was linked to terrorist groups. “Following this US tip-off, Abedi and other members of the gang were scrutinised by MI5. It was thought at the time that Abedi was planning to assassinate a political figure. But nothing came of this investigation and, tragically, he slipped down the pecking order of targets.” MI5 has faced questions over the fact that Abedi was on its radar but slipped through the net in order to carry out the attack that killed 22 people and seriously injured 64. Police have so far arrested 14 people on suspicion of terror offences in conjunction with the Manchester attack, two of whom have since been released.

Note: Read this revealing article for more evidence that the Manchester atrocity was possibly allowed to happen, or worse. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.


'CIA created ISIS', says Julian Assange as Wikileaks releases 500k US cables
2016-11-29, Sunday Express (One of the UK's most popular newspapers)
Posted: 2017-05-29 16:58:12
http://www.express.co.uk/news/world/737430/CIA-ISIS-Wikileaks-Carter-Cables-I...

On the sixth anniversary of the first infamous "Cablegate" by WikiLeaks ... it has expanded its Public Library of US Diplomacy (PLUSD) with 531,525 new diplomatic cables from 1979. In a statement to coincide with the release of the cables, known as "Carter Cables III", Mr Assange explained how events which unfolded in 1979 had begun a series of events that led to the rise of ISIS: "The Iranian revolution, the Saudi Islamic uprising and the Egypt-Israel Camp David Accords led not only to the present regional power dynamic but decisively changed the relationship between oil, militant Islam and the world. "The uprising at Mecca permanently shifted Saudi Arabia towards Wahhabism, leading to the transnational spread of Islamic fundamentalism and the US-Saudi destabilisation of Afghanistan." He said at this point Osama bin Laden left his native Saudi Arabia for Pakistan to support the Afghan Mujahideen. He added: "The invasion of Afghanistan by the USSR would see Saudi Arabia and the CIA push billions of dollars to Mujahideen fighters as part of Operation Cyclone, fomenting the rise of al-Qaeda and the eventual collapse of the Soviet Union." The rise of al-Qaeda eventually bore the September 11, 2001 attacks in the United States, enabling the US invasion of Afghanistan and Iraq and over a decade of war, leaving, at its end, the ideological, financial and geographic basis for ISIS."

Note: Read a well-researched essay from the profound online book Lifting the Veil suggesting the War on Terror is a fraud. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.


Federal Court Revives Wikimedia’s Challenge to N.S.A. Surveillance
2017-05-23, New York Times
Posted: 2017-05-29 16:55:47
https://www.nytimes.com/2017/05/23/us/politics/nsa-surveillance-warrantless-w...

A federal appeals court on Tuesday revived a high-profile challenge to the National Security Agency’s warrantless surveillance of internet communications. The ruling ... increases the chances that the Supreme Court may someday scrutinize whether the N.S.A.’s so-called upstream system for internet surveillance complies with Fourth Amendment privacy rights. The ruling reversed a Federal District Court judge’s decision to throw out the case. The district judge had ruled that the plaintiffs - including the Wikimedia Foundation - lacked standing to sue because they could not prove that their messages had been intercepted. Because of how the internet works, surveillance of communications crossing network switches is different from traditional circuit-based phone wiretapping. While the government can target a specific phone call without touching anyone else’s communications, it cannot simply intercept a surveillance target’s email. Instead ... to find such emails it is necessary first to systematically copy data packets crossing a network switch and sift them in search of components from any messages involving a target. Documents provided by [Edward] Snowden and declassified by the government have shown that this system works through equipment installed at the facilities of companies, like AT&T, that [connect] the American internet to the rest of the world. Privacy advocates contend that the initial copying and searching of all those data packets ... violates Fourth Amendment protections against government search and seizure.

Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


With New Digital Tools, Even Nonexperts Can Wage Cyberattacks
2017-05-13, New York Times
Posted: 2017-05-22 10:51:08
https://www.nytimes.com/2017/05/13/technology/hack-ransomware-scam-cyberattac...

A decade-old internet scourge called ransomware went mainstream on Friday when cybercriminals seized control of computers around the world, from the delivery giant FedEx in the United States to Britain’s public health system, universities in China and even Russia’s powerful Interior Ministry. Ransomware is nothing new. For years, there have been stories of individuals or companies horrified that they have been locked out of their computers and that the only way back in is to pay a ransom to someone, somewhere who has managed to take control. But computer criminals are discovering that ransomware is the most effective way to make money in the shortest amount of time. Friday’s attacks were a powerful escalation of earlier, much smaller episodes. Hackers exploited a vulnerability in Microsoft servers that was first discovered by the National Security Agency and then leaked online. It allowed the ransomware to spread [to] more than 70,000 organizations. There is even now a concept of “ransomware as a service” - a play on the Silicon Valley jargon “software as a service,” which describes the delivery of software over the internet. Now anyone can visit a web page, generate a ransomware file with the click of a mouse, encrypt someone’s systems and demand a ransom to restore access to the files. If the victim pays, the ransomware provider takes a cut of the payment. Ransomware criminals also have customer service lines that victims can call to get help paying a ransom.

Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Today's News Is Brought to You by Big Brother
2000-02-27, Los Angeles Times
Posted: 2017-05-22 10:39:04
http://www.wanttoknow.info/mass_media/CNN-psyops-la-times-000327

A handful of military personnel from the 4th Psychological Operations Group, based at Fort Bragg, NC, have until recently been working in CNN's headquarters in Atlanta. [A] Dutch journalist named Abe de Vries came up with this important story ... and remains properly astounded that no mainstream news medium in the US has evinced any interest in it. De Vries ... originally [came] upon the story [following] a military symposium in Arlington, VA that discussed the use of the press in military operations. De Vries saw a good story, picked up the phone, and finally reached Maj. Thomas Collins of the US Army Information Service, who duly confirmed the presence of these Army psy-ops experts at CNN. "Psy-ops personnel, soldiers, and officers," De Vries quoted Collins as telling him, "have been working in CNN's headquarters ... through our program, training with industry. They helped in the production of news." Eason Jordan, who identified himself as CNN's president of news-gathering and international networks, [confirmed] that CNN had hosted a total of five interns from US Army psy-ops. Jordan said the program began ... just before the end of the war against Serbia and only recently terminated. Executives at CNN now describe the Army psy-ops intern tours at CNN as having been insignificant. The commanding officer of the psy-ops group certainly thought them of sufficient significance to mention at that high-level Pentagon powwow in Arlington about propaganda and psychological warfare.

Note: This article strangely has been removed from the Los Angeles Times archives. The link above shows a scanned image of the actual newspaper. The article was first published in the San Jose Mercury News on March 23, 2000, though the article is also strangely not available in their archives. U.S. Congressional testimony in the 1970s revealed that the CIA paid employees of major media networks to influence public opinion. The CIA's Operation Mockingbird revealed blatant efforts by the CIA to manipulate public opinion in the U.S., thus violating its charter.


The CIA has a long history of helping to kill leaders around the world
2017-05-05, The Guardian (One of the UK's leading newspapers)
Posted: 2017-05-15 16:45:11
https://www.theguardian.com/us-news/2017/may/05/cia-long-history-kill-leaders...

[The CIA] has since 1945 succeeded in deposing or killing a string of leaders, but was forced to cut back after a Senate investigation in the 1970s. Some of the most notorious of the CIAs operations to kill world leaders were those targeting the late Cuban president, Fidel Castro. Attempts ranged from snipers to imaginative plots worthy of spy movie fantasies. But although the CIA attempts proved fruitless in the case of Castro, the US intelligence agency has ... succeeded in deposing or killing a string of leaders elsewhere around the world either directly or, more often, using sympathetic local military, locally hired criminals or pliant dissidents. On Friday, [North Korea accused] the CIA and South Koreas intelligence service of being behind an alleged recent assassination attempt on its leader Kim Jong-un. Such a claim cannot be dismissed as totally outlandish given the long list of US involvement in coups and assassinations worldwide. The agency was forced to cut back on such killings after ... then president Gerald Ford signed in 1976 an executive order stating: No employee of the United States government shall engage in, or conspire in, political assassination. In spite of this, the US never totally abandoned the strategy, simply changing the terminology from assassination to targeted killings. A leaked document obtained by WikiLeaks and released earlier this year showed the CIA in October 2014 looking at hacking into car control systems, [potentially allowing] an agent to stage a car crash.

Note: Strong evidence suggests that courageous journalist Michael Hastings was killed when his car controls were hacked causing him to crash head on into a tree. For more along these lines, see concise summaries of deeply revealing news articles on verified or suspected assassinations from reliable major media sources.


Through a glass, very darkly
1993-12-19, US News & World Report
Posted: 2017-04-23 18:44:55
http://www.wanttoknow.info/images/931227-us-news-finders.pdf

In early February 1987, an anonymous tipster in Tallahassee, Fla., made a phone call to police. Two "well-dressed men" seemed to be "supervising" six disheveled and hungry children in a local park, the caller said. The cops went after the case like bloodhounds - at least at first. The two men were identified as members of the Finders. They were charged with child abuse in Florida. In Washington, D.C., police and U.S. Customs Service agents raided a duplex apartment building and a warehouse connected to the group. Among the evidence seized: detailed instructions on obtaining children for unknown purposes and several photographs of nude children. The more the police learned about the Finders, the more bizarre they seemed: There were suggestions of child abuse, Satanism, dealing in pornography and ritualistic animal slaughter. None of the allegations was ever proved, however. Today ... the Justice Department has begun a new investigation into the Finders. One of the unresolved questions involves allegations that the Finders are somehow linked to the Central Intelligence Agency. In 1987, when Customs agents sought to examine the evidence gathered by Washington, D.C., police, they were told that the Finders investigation "had become a CIA internal matter." The police report on the case had been classified secret. Even now, Tallahassee police complain about the handling of the Finders investigation by D.C. police. "They dropped this case," one Tallahassee investigator says, "like a hot rock."

Note: For lots more on the disturbing group called "The Finders," see the excellent research available at this link. As US News & World Report does not have archives for older articles like this, the link above takes you to a scanned copy of the the article taken directly from a copy of the magazine we obtained.


What We Know About the CIA’s Midcentury Mind-Control Project
2017-04-13, Smithsonian Magazine
Posted: 2017-04-16 20:01:18
http://www.smithsonianmag.com/smart-news/what-we-know-about-cias-midcentury-m...

In 1953, the then-Director of Central Intelligence officially approved project MKUltra. Originally intended to make sure the United States government kept up with presumed Soviet advances in mind-control technology ... MKUltra has gone down in history as a significant example of government abuse of human rights. The intent of the project was to study “the use of biological and chemical materials in altering human behavior,” according to ... official testimony. Under MKUltra, the CIA gave itself the authority to [experiment on] unwitting test subjects, like drug-addicted prisoners, marginalized sex workers and terminal cancer patients. “The covert testing programs resulted in massive abridgements of the rights of American citizens, sometimes with tragic consequences,” concluded a Senate hearing in 1975-76. MKUltra wasn’t one project, as the US Supreme Court wrote in a 1985 decision. It was 162 different secret projects that were indirectly financed by the CIA, but were “contracted out to various universities ... and similar institutions.” In all, at least 80 institutions and 185 researchers participated, but many didn’t know they were dealing with the CIA. Many of MKUltra’s records were destroyed. But 8,000 pages of records - mostly financial documents that were mistakenly not destroyed in 1973 - were found in 1977. Nobody ever answered for MKUltra. Two lawsuits related to the program reached the Supreme Court, [writes Melissa Blevins for Today I Found Out], “but both protected the government over citizen’s rights.”

Note: Unfortunately, MK-ULTRA is far from the only program to have used humans as guinea pigs in attempts to create more powerful mind control technologies. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.


Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"