Please donate here to support this vital work.
Revealing News For a Better World

Intelligence Agency Corruption News Stories
Excerpts of Key Intelligence Agency Corruption News Stories in Major Media


Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.


Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


'CIA created ISIS', says Julian Assange as Wikileaks releases 500k US cables
2016-11-29, Sunday Express (One of the UK's most popular newspapers)
Posted: 2017-05-29 16:58:12
http://www.express.co.uk/news/world/737430/CIA-ISIS-Wikileaks-Carter-Cables-I...

On the sixth anniversary of the first infamous "Cablegate" by WikiLeaks ... it has expanded its Public Library of US Diplomacy (PLUSD) with 531,525 new diplomatic cables from 1979. In a statement to coincide with the release of the cables, known as "Carter Cables III", Mr Assange explained how events which unfolded in 1979 had begun a series of events that led to the rise of ISIS: "The Iranian revolution, the Saudi Islamic uprising and the Egypt-Israel Camp David Accords led not only to the present regional power dynamic but decisively changed the relationship between oil, militant Islam and the world. "The uprising at Mecca permanently shifted Saudi Arabia towards Wahhabism, leading to the transnational spread of Islamic fundamentalism and the US-Saudi destabilisation of Afghanistan." He said at this point Osama bin Laden left his native Saudi Arabia for Pakistan to support the Afghan Mujahideen. He added: "The invasion of Afghanistan by the USSR would see Saudi Arabia and the CIA push billions of dollars to Mujahideen fighters as part of Operation Cyclone, fomenting the rise of al-Qaeda and the eventual collapse of the Soviet Union." The rise of al-Qaeda eventually bore the September 11, 2001 attacks in the United States, enabling the US invasion of Afghanistan and Iraq and over a decade of war, leaving, at its end, the ideological, financial and geographic basis for ISIS."

Note: Read a well-researched essay from the profound online book Lifting the Veil suggesting the War on Terror is a fraud. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.


Federal Court Revives Wikimedia’s Challenge to N.S.A. Surveillance
2017-05-23, New York Times
Posted: 2017-05-29 16:55:47
https://www.nytimes.com/2017/05/23/us/politics/nsa-surveillance-warrantless-w...

A federal appeals court on Tuesday revived a high-profile challenge to the National Security Agency’s warrantless surveillance of internet communications. The ruling ... increases the chances that the Supreme Court may someday scrutinize whether the N.S.A.’s so-called upstream system for internet surveillance complies with Fourth Amendment privacy rights. The ruling reversed a Federal District Court judge’s decision to throw out the case. The district judge had ruled that the plaintiffs - including the Wikimedia Foundation - lacked standing to sue because they could not prove that their messages had been intercepted. Because of how the internet works, surveillance of communications crossing network switches is different from traditional circuit-based phone wiretapping. While the government can target a specific phone call without touching anyone else’s communications, it cannot simply intercept a surveillance target’s email. Instead ... to find such emails it is necessary first to systematically copy data packets crossing a network switch and sift them in search of components from any messages involving a target. Documents provided by [Edward] Snowden and declassified by the government have shown that this system works through equipment installed at the facilities of companies, like AT&T, that [connect] the American internet to the rest of the world. Privacy advocates contend that the initial copying and searching of all those data packets ... violates Fourth Amendment protections against government search and seizure.

Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


With New Digital Tools, Even Nonexperts Can Wage Cyberattacks
2017-05-13, New York Times
Posted: 2017-05-22 10:51:08
https://www.nytimes.com/2017/05/13/technology/hack-ransomware-scam-cyberattac...

A decade-old internet scourge called ransomware went mainstream on Friday when cybercriminals seized control of computers around the world, from the delivery giant FedEx in the United States to Britain’s public health system, universities in China and even Russia’s powerful Interior Ministry. Ransomware is nothing new. For years, there have been stories of individuals or companies horrified that they have been locked out of their computers and that the only way back in is to pay a ransom to someone, somewhere who has managed to take control. But computer criminals are discovering that ransomware is the most effective way to make money in the shortest amount of time. Friday’s attacks were a powerful escalation of earlier, much smaller episodes. Hackers exploited a vulnerability in Microsoft servers that was first discovered by the National Security Agency and then leaked online. It allowed the ransomware to spread [to] more than 70,000 organizations. There is even now a concept of “ransomware as a service” - a play on the Silicon Valley jargon “software as a service,” which describes the delivery of software over the internet. Now anyone can visit a web page, generate a ransomware file with the click of a mouse, encrypt someone’s systems and demand a ransom to restore access to the files. If the victim pays, the ransomware provider takes a cut of the payment. Ransomware criminals also have customer service lines that victims can call to get help paying a ransom.

Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Today's News Is Brought to You by Big Brother
2000-02-27, Los Angeles Times
Posted: 2017-05-22 10:39:04
http://www.wanttoknow.info/mass_media/CNN-psyops-la-times-000327

A handful of military personnel from the 4th Psychological Operations Group, based at Fort Bragg, NC, have until recently been working in CNN's headquarters in Atlanta. [A] Dutch journalist named Abe de Vries came up with this important story ... and remains properly astounded that no mainstream news medium in the US has evinced any interest in it. De Vries ... originally [came] upon the story [following] a military symposium in Arlington, VA that discussed the use of the press in military operations. De Vries saw a good story, picked up the phone, and finally reached Maj. Thomas Collins of the US Army Information Service, who duly confirmed the presence of these Army psy-ops experts at CNN. "Psy-ops personnel, soldiers, and officers," De Vries quoted Collins as telling him, "have been working in CNN's headquarters ... through our program, training with industry. They helped in the production of news." Eason Jordan, who identified himself as CNN's president of news-gathering and international networks, [confirmed] that CNN had hosted a total of five interns from US Army psy-ops. Jordan said the program began ... just before the end of the war against Serbia and only recently terminated. Executives at CNN now describe the Army psy-ops intern tours at CNN as having been insignificant. The commanding officer of the psy-ops group certainly thought them of sufficient significance to mention at that high-level Pentagon powwow in Arlington about propaganda and psychological warfare.

Note: This article strangely has been removed from the Los Angeles Times archives. The link above shows a scanned image of the actual newspaper. The article was first published in the San Jose Mercury News on March 23, 2000, though the article is also strangely not available in their archives. U.S. Congressional testimony in the 1970s revealed that the CIA paid employees of major media networks to influence public opinion. The CIA's Operation Mockingbird revealed blatant efforts by the CIA to manipulate public opinion in the U.S., thus violating its charter.


The CIA has a long history of helping to kill leaders around the world
2017-05-05, The Guardian (One of the UK's leading newspapers)
Posted: 2017-05-15 16:45:11
https://www.theguardian.com/us-news/2017/may/05/cia-long-history-kill-leaders...

[The CIA] has since 1945 succeeded in deposing or killing a string of leaders, but was forced to cut back after a Senate investigation in the 1970s. Some of the most notorious of the CIAs operations to kill world leaders were those targeting the late Cuban president, Fidel Castro. Attempts ranged from snipers to imaginative plots worthy of spy movie fantasies. But although the CIA attempts proved fruitless in the case of Castro, the US intelligence agency has ... succeeded in deposing or killing a string of leaders elsewhere around the world either directly or, more often, using sympathetic local military, locally hired criminals or pliant dissidents. On Friday, [North Korea accused] the CIA and South Koreas intelligence service of being behind an alleged recent assassination attempt on its leader Kim Jong-un. Such a claim cannot be dismissed as totally outlandish given the long list of US involvement in coups and assassinations worldwide. The agency was forced to cut back on such killings after ... then president Gerald Ford signed in 1976 an executive order stating: No employee of the United States government shall engage in, or conspire in, political assassination. In spite of this, the US never totally abandoned the strategy, simply changing the terminology from assassination to targeted killings. A leaked document obtained by WikiLeaks and released earlier this year showed the CIA in October 2014 looking at hacking into car control systems, [potentially allowing] an agent to stage a car crash.

Note: Strong evidence suggests that courageous journalist Michael Hastings was killed when his car controls were hacked causing him to crash head on into a tree. For more along these lines, see concise summaries of deeply revealing news articles on verified or suspected assassinations from reliable major media sources.


Through a glass, very darkly
1993-12-19, US News & World Report
Posted: 2017-04-23 18:44:55
http://www.wanttoknow.info/images/931227-us-news-finders.pdf

In early February 1987, an anonymous tipster in Tallahassee, Fla., made a phone call to police. Two "well-dressed men" seemed to be "supervising" six disheveled and hungry children in a local park, the caller said. The cops went after the case like bloodhounds - at least at first. The two men were identified as members of the Finders. They were charged with child abuse in Florida. In Washington, D.C., police and U.S. Customs Service agents raided a duplex apartment building and a warehouse connected to the group. Among the evidence seized: detailed instructions on obtaining children for unknown purposes and several photographs of nude children. The more the police learned about the Finders, the more bizarre they seemed: There were suggestions of child abuse, Satanism, dealing in pornography and ritualistic animal slaughter. None of the allegations was ever proved, however. Today ... the Justice Department has begun a new investigation into the Finders. One of the unresolved questions involves allegations that the Finders are somehow linked to the Central Intelligence Agency. In 1987, when Customs agents sought to examine the evidence gathered by Washington, D.C., police, they were told that the Finders investigation "had become a CIA internal matter." The police report on the case had been classified secret. Even now, Tallahassee police complain about the handling of the Finders investigation by D.C. police. "They dropped this case," one Tallahassee investigator says, "like a hot rock."

Note: For lots more on the disturbing group called "The Finders," see the excellent research available at this link. As US News & World Report does not have archives for older articles like this, the link above takes you to a scanned copy of the the article taken directly from a copy of the magazine we obtained.


What We Know About the CIA’s Midcentury Mind-Control Project
2017-04-13, Smithsonian Magazine
Posted: 2017-04-16 20:01:18
http://www.smithsonianmag.com/smart-news/what-we-know-about-cias-midcentury-m...

In 1953, the then-Director of Central Intelligence officially approved project MKUltra. Originally intended to make sure the United States government kept up with presumed Soviet advances in mind-control technology ... MKUltra has gone down in history as a significant example of government abuse of human rights. The intent of the project was to study “the use of biological and chemical materials in altering human behavior,” according to ... official testimony. Under MKUltra, the CIA gave itself the authority to [experiment on] unwitting test subjects, like drug-addicted prisoners, marginalized sex workers and terminal cancer patients. “The covert testing programs resulted in massive abridgements of the rights of American citizens, sometimes with tragic consequences,” concluded a Senate hearing in 1975-76. MKUltra wasn’t one project, as the US Supreme Court wrote in a 1985 decision. It was 162 different secret projects that were indirectly financed by the CIA, but were “contracted out to various universities ... and similar institutions.” In all, at least 80 institutions and 185 researchers participated, but many didn’t know they were dealing with the CIA. Many of MKUltra’s records were destroyed. But 8,000 pages of records - mostly financial documents that were mistakenly not destroyed in 1973 - were found in 1977. Nobody ever answered for MKUltra. Two lawsuits related to the program reached the Supreme Court, [writes Melissa Blevins for Today I Found Out], “but both protected the government over citizen’s rights.”

Note: Unfortunately, MK-ULTRA is far from the only program to have used humans as guinea pigs in attempts to create more powerful mind control technologies. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.


Sharyl Attkisson sues administration over computer hacking
2015-01-05, Fox News
Posted: 2017-04-09 23:21:41
http://www.foxnews.com/politics/2015/01/05/sharyl-attkisson-sues-administrati...

Former CBS News correspondent Sharyl Attkisson has sued the Justice Department over the hacking of her computers, officially accusing the Obama administration of illegal surveillance while she was reporting on administration scandals. In a series of legal filings that seek $35 million in damages, Attkisson alleges that three separate computer forensic exams showed that hackers used sophisticated methods to surreptitiously monitor her work between 2011 and 2013. The intruders installed and periodically refreshed software to steal data and obtain passwords on her home and work computers. She also charges that the hackers monitored her audio using a Skype account. The award-winning reporter says she and her attorneys have "pretty good evidence" that these efforts were "connected" to the Justice Department. She said she was caught in a "Catch-22," forcing her to use the lawsuit and an administrative complaint to discover more about the surveillance through the discovery process and to learn the identities of the "John Does" named in the complaints. Attkisson learned through a Freedom of Information request that the FBI opened an investigation of the hacking case in May 2013, but says the bureau never interviewed her or even notified her of the probe. Attkisson resigned from CBS last March after complaining that she was increasingly unable to get her investigative stories on the air. She has published a best-selling book, "Stonewalled," about her battles against the network and the administration.

Note: Fox News was the only major media to cover this important case. Read a judge's supportive comments about this important case on Ms. Attkisson's website. For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


'We are all entrepreneurs': Muhammad Yunus on changing the world, one microloan at a time
2017-03-28, The Guardian (One of the UK's leading newspapers)
Posted: 2017-04-09 23:13:45
https://www.theguardian.com/sustainable-business/2017/mar/29/we-are-all-entre...

Muhammad Yunus, the Bangladeshi economist, microfinancing pioneer and founder of the grassroots Grameen Bank, has not been resting on his laurels since wining the Nobel peace prize in 2006. The idea behind his multi award-winning idea of microcredit is that everyone is a natural entrepreneur. “Human beings are not born to work for anybody else,” he says. “For millions of years that we were on the planet, we never worked for anybody. We are go-getters. So this is our tradition. There are roughly 160 million people all over the world in microcredit, mostly women. And they have proven one very important thing: that we are all entrepreneurs. Illiterate rural women in the villages ... take tiny little loans - $30, $40 - and they turn themselves into successful entrepreneurs.” In the mid 70s, as a young economics professor, Yunus experimented with lending a mere $27 to 42 women in the village ... near his university. Banks would not lend to the poor ... and moneylenders charged extortionate rates. His experiment was a success, and he began to develop ... the Grameen Bank. The Grameen Bank today has nine million borrowers, 97% of them women. “They own the bank. It is a bank owned by poor women,” he says. “The repayment rate is 99.6%, and it has never fallen below that in our eight years of experience.” Part of his expansion into rich countries includes a program in the US: 19 branches in 11 cities, including eight in New York.

Note: Learn more about the inspiring microcredit movement helping to reduce inequality while securing financial returns for investors.


Facial recognition database used by FBI is out of control, House committee hears
2017-03-27, The Guardian (One of the UK's leading newspapers)
Posted: 2017-04-02 22:22:46
https://www.theguardian.com/technology/2017/mar/27/us-facial-recognition-data...

Approximately half of adult Americans’ photographs are stored in facial recognition databases that can be accessed by the FBI, without their knowledge or consent, in the hunt for suspected criminals. About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports. The algorithms used to identify matches are inaccurate about 15% of the time, and are more likely to misidentify black people than white people. These are just some of the damning facts presented at last week’s House oversight committee hearing, where politicians and privacy campaigners criticized the FBI and called for stricter regulation of facial recognition technology at a time when it is creeping into law enforcement and business. The FBI first launched its advanced biometric database ... in 2010, augmenting the old fingerprint database with further capabilities including facial recognition. The bureau did not inform the public ... nor did it publish a privacy impact assessment, required by law, for five years. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos. Last year, the US government accountability office (GAO) analyzed the FBI’s use of facial recognition technology and found it to be lacking in accountability, accuracy and oversight. “It doesn’t know how often the system incorrectly identifies the wrong subject,” explained the GAO’s Diana Maurer. “Innocent people could bear the burden of being falsely accused.”

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


The CIA, the drug dealers, and the tragedy of Gary Webb
2015-03-23, The Telegraph (One of the UK's leading newspapers)
Posted: 2017-04-02 21:57:10
http://www.telegraph.co.uk/culture/film/11485819/kill-messenger-gary-webb-tru...

Gary Webb knew his story would cause a stir. The newspaper report he'd written suggested that a US-backed rebel army in Latin America was supplying the drugs responsible for blighting some of Los Angeles's poorest neighbourhoods and, crucially, that the CIA must have known about it. [Webb's report, titled] "Dark Alliance" has been called one of the most explosive and controversial exposs in American journalism. Nineteen years on, the story of Webbs investigation and its aftermath has been given the full Hollywood treatment. Kill the Messenger, based on his account of what happened and a book of the same name about the saga by journalist Nick Schou was recently released in cinemas. What Webb did that nobody else had was to follow the supply chain right to the poverty stricken streets of Los Angeles. Webb summed up the heart of his ... series thus: It is one of the most bizarre alliances in modern history. The union of a U.S. backed army attempting to overthrow a revolutionary socialist government and the uzi-toting gangstas of Compton and South-Central Los Angeles. Perhaps most damningly, Webb wrote that crack was virtually unobtainable in the citys black neighbourhoods before members of the CIAs army began supplying it. [In 1999], Webb said that after spending three years of his life looking into it, he was more convinced than ever that the U.S. Government's responsibility for the drug problems in South Central L.A. was greater than I ever wrote in the newspaper.

Note: Read an excellent, concise summary written by Gary Webb himself of what happened on this highly revealing Dark Alliance series. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


A shameful secret history
2005-10-08, The Independent (One of the UK's leading newspapers)
Posted: 2017-04-02 21:54:32
http://www.independent.co.uk/news/world/americas/susan-bell-a-shameful-secret...

In 1996, the award-winning journalist Gary Webb uncovered CIA links to Los Angeles drug dealers. The link between drug-running and the Reagan regime's support for the right-wing terrorist group throughout the 1980s had been public knowledge for over a decade. What was new about Webb's reports, published under the title "Dark Alliance" in the Californian paper the San Jose Mercury News, was that for the first time it brought the story back home. His series of articles ... incited fury among the African-American community, many of whom took his investigation as proof that the White House saw crack as a way of bringing genocide to the ghetto. Webb's reports prompted three official investigations, including one by the CIA itself which ... confirmed the substance of his findings. Webb undeniably made mistakes. But his central thesis - that the CIA, having participated in narcotics trafficking in central America, had, at best, turned a blind eye to the activities of drug dealers in LA - has never been in question. [A 1998] CIA Inspector General's report, commissioned in response to the allegations in "Dark Alliance" ... found that CIA officials ignored information about possible Contra drug dealing; that they continued to work with Contra supporters despite allegations that they were trafficking drugs, and further asserted that officials from the CIA instructed Drug Enforcement Agency officers to refrain from investigating alleged dealers connected with the Contras.

Note: For those interested in the Gary Webb story, this article is possibly the best single summary out there. Read an excellent, concise summary written by Gary Webb himself of what happened on this highly revealing Dark Alliance series. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


Database Tracks History Of U.S. Meddling In Foreign Elections
2016-12-22, NPR
Posted: 2017-03-26 21:28:17
http://www.npr.org/2016/12/22/506625913/database-tracks-history-of-u-s-meddli...

Carnegie Mellon University researcher Dov Levin [has compiled a] historical database that tracks U.S. involvement in meddling with foreign elections over the years. The U.S. has ... tried to influence the outcome of another country's election ... more than 80 times worldwide between 1946 and 2000. One example of that was our intervention in Serbia, Yugoslavia in the 2000 election there. Slobodan Milosevic was running for re-election, and we didn't want him to stay in power there. So we intervened in various ways for the opposition candidate, Vojislav Kostunica. And we gave funding to the opposition, and we gave them training and campaigning aide. That assistance was crucial in enabling the opposition to win. About one-third of [election interventions] are public, and two-third of them are covert. In other words, they're not known to the voters in the target before the election. Covert coup d'etats like the United States did in Iran in 1953 or in Guatemala in 1954 [were not counted, only times] when the United States [tried] directly to influence an election for one of the sides. The United States is the most common user of this technique. Russia or the Soviet Union since 1945 has used it half as much. My estimate has been 36 cases between 1946 to 2000. We know also that the Chinese have used this technique and the Venezuelans when the late Hugo Chavez was still in power in Venezuela and other countries.

Note: For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources.


The Multibillion-Dollar U.S. Spy Agency You Haven’t Heard of
2017-03-20, Foreign Policy
Posted: 2017-03-26 21:26:02
http://foreignpolicy.com/2017/03/20/the-multibillion-dollar-u-s-spy-agency-yo...

In a heavily protected military base some 15 miles south of Washington, D.C., sits the massive headquarters of a spy agency few know exists. The [National Geospatial-Intelligence Agency, or] NGA remains by far the most shadowy member of the Big Five spy agencies, which include the CIA and the National Security Agency. Despite its lack of name recognition, the NGA’s headquarters is the third-largest building in the Washington metropolitan area. The NGA is to pictures what the NSA is to voices. Its principal function is to analyze the billions of images and miles of video captured by drones ... and spy satellites. The agency has never been involved in domestic spy scandals. However, there’s reason to believe that this will change. In March 2016, the Pentagon released the results of an investigation initiated by the Department of Defense’s Office of Inspector General to examine military spy drones in the United States. The report ... revealed that the Pentagon used unarmed surveillance drones over American soil. The investigation also quoted from an Air Force law review article pointing out the growing concern that technology designed to spy on enemies abroad may soon be turned around to spy on citizens at home. In 2016, unbeknownst to many city officials, police in Baltimore began conducting persistent aerial surveillance using a system developed for military use in Iraq. Few civilians have any idea how advanced these military eye-in-the-sky drones have become.

Note: This article was written by former ABC News producer James Bamford, whose 2001 article on Operation Northwoods revealed that the top Pentagon generals signed off on top-secret plans which stated, "We could blow up a U.S. ship in Guantanamo Bay and blame Cuba," and, "casualty lists in U.S. newspapers would cause a helpful wave of national indignation." And showing the level of major media complicity, only ABC News reported on this. For more, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


C.I.A. Developed Tools to Spy on Mac Computers, WikiLeaks Disclosure Shows
2017-03-23, New York Times
Posted: 2017-03-26 21:21:34
https://www.nytimes.com/2017/03/23/technology/cia-spying-mac-computers-wikile...

The C.I.A. developed tools to spy on Mac computers by injecting software into the chips that control the computers’ fundamental operations, according to the latest cache of classified government documents published on Thursday by WikiLeaks. All of the surveillance tools that have been disclosed were designed to be installed on individual phones or computers. But the effects could be much wider. Cisco Systems, for example, warned customers this week that many of its popular routers, the backbone of computer networks, could be hacked using the C.I.A.’s techniques. Julian Assange, the founder of WikiLeaks, has offered to share the precise software code used by the C.I.A.’s cyberweapons with the affected companies. But major tech companies have been reluctant to directly engage with him for fear of violating American laws. The spy software described in the latest documents was designed to be injected into a Mac’s firmware, a type of software preloaded in the computer’s chips. It would then act as a “listening post,” broadcasting the user’s activities to the C.I.A. whenever the machine was connected to the internet. Tools that operate at the chip level can hide their existence and avoid being wiped out by routine software updates. Under an agreement struck during the Obama administration, intelligence agencies were supposed to share their knowledge of most security vulnerabilities with tech companies. The C.I.A. documents suggest that some key vulnerabilities were kept secret.

Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


The real shocker in the WikiLeaks scoop
2017-03-14, Washington Post
Posted: 2017-03-20 12:57:15
https://www.washingtonpost.com/opinions/the-real-shocker-in-the-wikileaks-sco...

WikiLeaks leader Julian Assange’s revelation last week of the CIA’s arsenal of hacking tools had a misplaced tone of surprise. Some scary initial stories argued that the CIA could crack Signal and WhatsApp phone encryption, not to mention your toaster and television. But ... the hardest question here is whether the CIA and other government agencies have a responsibility to disclose to software vendors the holes they discover in computer code, so they can be fixed quickly. This may sound like a no-brainer. The problem is that there’s a global market for “zero-day” exploits (ones that are unknown on the day they’re used). U.S. intelligence agencies buy some of these exploits; so do other countries’ spy services, criminal gangs and the software vendors themselves. A recent report by the Rand Corp. [calculated that] there are about two dozen companies selling or renting exploits to the United States and its allies, with many of these contractors making between $1 million and $2.5 million annually. More than 200 zero-day exploits studied by Rand went undetected for an average of 6.9 years. Given this evidence, Rand argued, “some may conclude that stockpiling zero-days may be a reasonable option” to combat potential adversaries. But let’s be honest: The real shocker in the WikiLeaks scoop is the demonstration ... that the U.S. government can’t keep secrets. It makes little sense for the CIA to argue against disclosing its cyber-tricks to computer companies if this valuable information is going to get leaked ... anyway.

Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Donald Trump gives CIA authority to conduct drone strikes: WSJ
2017-03-14, Sydney Morning Herald/Reuters
Posted: 2017-03-20 12:55:32
http://www.smh.com.au/world/donald-trump-gives-cia-authority-to-conduct-drone...

US President Donald Trump has given the Central Intelligence Agency new authority to conduct drone attacks against suspected militants. The move would be a change from the policy of former President Barack Obama's administration of limiting the CIA's paramilitary role. The United States was the first to use unmanned aircraft fitted with missiles to kill militant suspects in the years after the September 11, 2001, attacks on New York and Washington. Strikes by missile-armed Predator and Reaper drones against overseas targets began under former President George W. Bush and were expanded by Obama. Critics of the targeted killing program question whether the strikes create more militants than they kill. They cite the spread of jihadist organisations and militant attacks throughout the world as evidence that targeted killings may be exacerbating the problem. In July, the US government accepted responsibility for inadvertently killing up to 116 civilians in strikes in countries where America is not at war.

Note: Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.


With WikiLeaks Claims of C.I.A. Hacking, How Vulnerable Is Your Smartphone?
2017-03-07, New York Times
Posted: 2017-03-13 19:44:39
https://www.nytimes.com/2017/03/07/technology/cia-hacking-documents-wikileaks...

WikiLeaks on Tuesday released a significant cache of documents that it said came from a high-security network inside the Central Intelligence Agency. WikiLeaks called the documents Vault 7, and they lay out the capabilities of the agency’s global covert hacking program. By the end of 2016, the C.I.A. program had 5,000 registered users, including government employees and contractors, [and] had produced more than a thousand hacking systems. The files have circulated among former United States government hackers and contractors in “an unauthorized manner, one of whom provided WikiLeaks with portions of the archive,” WikiLeaks said. The software targeted by the hacking program included the most popular smartphone operating systems. Apple’s iPhone software ... was a particular target, including the development of several “zero day” exploits - a term for attacking coding flaws the company would not have known about. Google’s Android ... received even more attention. By 2016, the C.I.A. had 24 weaponized Android “zero day” software programs. The C.I.A. also targeted ... internet-connected computers and home and industrial devices running the Linux operating system. In 2010, the Obama administration promised to disclose newly discovered vulnerabilities to companies like Apple, Google and Microsoft. But the WikiLeaks documents indicate that the agency found security flaws, kept them secret and then used them for surveillance and intelligence gathering.

Note: See the wikileaks webpage summarizing this most important leak. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


WikiLeaks CIA files: Spy agency looked at ways to hack and control cars to carry out assassinations
2017-03-07, The Independent (One of the UK's leading newspapers)
Posted: 2017-03-13 19:42:03
http://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-cia-d...

WikiLeaks has alleged that the CIA looked into vehicle interference methods that could potentially enable it to assassinate people without detection. According to the whistle-blowing organisation, the CIA explored the tactic in October 2014. It hasn’t included any more details about the alleged practice. WikiLeaks included the claim in its release announcing ‘Vault 7’, a huge batch of documents, which Julian Assange claims to account for the CIA’s “entire hacking capacity”. “As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks,” reads a passage in the release. “The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.” The CIA has also been accused of using malware and hacking tools to turn TVs into covert microphones and remotely break into smartphones. The latter, according to WikiLeaks, allowed it to bypass encryption on a number of popular messaging apps, including WhatsApp. WikiLeaks describes Vault 7 as “the largest intelligence publication in history” and says that the initial batch of 8,761 files is just the first in a series of releases.

Note: See the wikileaks webpage summarizing this most important leak. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Rumblings of a ‘Deep State’ Undermining Trump? It Was Once a Foreign Concept
2017-03-06, New York Times
Posted: 2017-03-13 19:24:14
https://www.nytimes.com/2017/03/06/us/politics/deep-state-trump.html?_r=0

President Trump’s allegations that former President Barack Obama tapped his phone and his assertions that the bureaucracy is leaking secrets to discredit him are the latest signs of a White House preoccupation with a “deep state” working to thwart the Trump presidency. “A deep state [is] part of government or people outside of government that are literally controlling the direction of the country no matter who’s actually in charge, and probably engaging in murder and other corrupt practices,” [former National Security Council official Loren DeJonge] Schulman said. The deep state is a phrase often heard in countries where there is a history of military coups. Pakistan is Exhibit A: The deep state is often invoked in serious discussions about the role of the Pakistani military and its intelligence service. Wide swaths of the population see the unseen hand of the security services behind major political events and all kinds of everyday happenings, such as random traffic stops. The views are not without basis. “The deep state concept emerges in places where the army and the security apparatus creates boundaries within which the civilian political people are allowed to operate,” said Peter Feaver, a specialist in civil-military issues. “If they transgress those boundaries, then the deep state interferes to reorder things, often using military force. There are milder forms of it in healthier democracies,” Mr. Feaver said.

Note: A 2014 Boston Globe article suggests that US policy in the national security realm is made by "concealed institutions" rather than by elected officials. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.


Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"