Intelligence Agency Corruption News StoriesExcerpts of Key Intelligence Agency Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Leonard Glenn Francis, and his company, Glenn Defense Marine Asia, held $200 million in contracts to resupply U.S. Navy ships and provide port security in Asia. But Francis had recently been arrested. Federal agents were shocked to discover ... that he had obtained reams of classified information from corrupt Navy officers about the itineraries of U.S. warships and submarines. Francis, a high school dropout with a prior felony record, penetrated the Navy's elaborate counterintelligence defenses with astonishing ease – and far more extensively than the Pentagon has publicly acknowledged – by bribing ... officers for classified material. Navy counterintelligence officials failed to detect hemorrhaging leaks of military secrets to Francis while he exploited the information for his company's bottom line. Since 2015, 10 Navy officers have admitted to leaking classified material to Francis and his firm in exchange for prostitutes, cash and other favors, the records show, making the Malaysian defense contractor among the most prolific espionage agents in modern history. After a lengthy investigation and the suspension of [Vice Adm. Ted Branch and Rear Adm. Bruce Loveless'] access to classified information, the Navy determined that Branch violated federal ethics rules and committed official misconduct by accepting meals and other gifts from Francis. Loveless was indicted and tried on bribery charges, though prosecutors dropped the case against him.
Note: Read more about the massive bribery scheme that Leonard Francis used to compromise the US Navy. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
Few Navy officers entangled themselves in the Fat Leonard corruption scandal more than Steve Shedd. In court documents and testimony, the former warship captain confessed to leaking military secrets on 10 occasions for prostitutes, vacations, luxury watches and other bribes worth $105,000. Shedd might avoid punishment for his crimes. The reason: a pattern of prosecutorial misconduct in the Fat Leonard investigation that has caused several cases to unravel so far and is threatening to undermine more. The cases collapsed after defense attorneys alleged that prosecutors from the U.S. attorney's office in San Diego relied on flawed evidence and withheld information favorable to the defense during the 2022 bribery trial of five other officers who had served in the Navy's 7th Fleet in Asia. After Francis's arrest in 2013, nearly 1,000 individuals came under scrutiny, including 91 admirals. Federal prosecutors brought criminal charges against 34 defendants. Twenty-nine of them, including Shedd, pleaded guilty. Legal analysts said it is possible that even Francis might catch a break, though he has already pleaded guilty to bribing "scores" of military officers and defrauding the Navy of tens of millions of dollars. During the 2022 trial ... the prosecution team led by Assistant U.S. Attorney Mark Pletcher withheld a witness statement that contradicted some of the government's allegations and did not divulge that one of its lead investigators had made inaccurate statements.
Note: Read more about the massive bribery scheme that Leonard Francis used to compromise the US Navy. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
At CIA, we find inspiration in all kinds of places. From robotic catfish to real-life spy birds, animals and their look-alikes have helped Agency officers perform a variety of critical duties, including eavesdropping, intelligence gathering, security, covert communications, and photo surveillance. During the Cold War ... CIA's Office of Research and Development created a camera so tiny and lightweight that a pigeon could carry it. The camera was strapped to the bird's chest with a little harness, and the bird would be released over a secret area ... that we wanted to know more about. The camera would snap pictures as the bird flew back home to us. During the Vietnam War ... CIA scientists invented what is known as the seismic intruder detection device. It could be strategically placed to monitor movements up to 300 meters away. However, our scientists had to disguise the technology. Since tigers are native to Vietnam ... they provided the ideal cover. The detection device was designed to look like tiger droppings. In the 1970s, CIA's Office of Research and Development created "Insectothopter," the first insect-sized unmanned aerial vehicle (UAV) of its kind! It was disguised as an everyday dragon fly. CIA's Office of Technical Services thought rats would be a great way to conceal things during the Cold War. They treated the rat's carcass with a preservation agent, cut it open, and created a hollow cavity where our officers could hide things like money, notes, or even film. The rat would then be sewn back up, placed at a pre-determined dead drop location, and then left for the asset to retrieve. During testing phases, the rats went missing because stray cats had stolen them.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
A signed affidavit from Guantanamo military commission investigator Don Canestraro ... outlines the findings of a 2016 investigation by Canestraro, a longtime veteran of the Drug Enforcement Administration (DEA), into Saudi and CIA complicity in the [9/11] terrorist attacks, findings that are squarely at odds with the story given to the public in their wake. Relaying the information gathered from dozens of interviews he conducted with former FBI and CIA personnel, members of the 9/11 Commission, and US government officials, Canestraro's affidavit outlines a sequence of events that, if true, suggest a botched and illegal domestic CIA operation was at the heart of the intelligence failure that enabled the attacks. More than that, it suggests there was a concerted cover-up of the grave blunder after the fact by both the CIA and the George W. Bush administration. The CIA impeded law enforcement efforts that could have prevented the attacks. Several former agents recalled being blocked by the agency from sharing intelligence about the hijackers with the rest of the FBI. A "former senior FBI official" likewise told Canestraro that the CIA sat on the news that the hijackers had entered the United States in 2000. Why did the CIA so intensely gatekeep information on the future hijackers? One former agent recalled the FBI faced "diplomatic pressure" not to investigate the Saudi links to the attacks, while another ... charged that agents were told not to interview Saudi nationals.
Note: Read the full article for more important details on this alleged cover-up, including the close relationship between the CIA and Saudi intelligence agency. For more along these lines, see concise summaries of revealing news articles on intelligence agency corruption and explore our comprehensive 9/11 Information Center.
For two decades, the CIA ran mind-control experiments in Montreal that later influenced modern "enhanced interrogation" techniques such as those used at Abu Ghraib. The experiments have not only crossed ethical boundaries but also raised profound questions of accountability and justice. This is particularly true in light of the ongoing class-action lawsuits initiated by those who suffered through the Montreal experiments. Established in 1940, the Allan Memorial Institute (known as "the Allan") used to be a psychiatric institute and research facility. The majority of the Montreal experiments were orchestrated and implemented by a man named Donald Ewen Cameron ... the first director of the Allan. Cameron received funds brokered by then CIA director Allen Dulles to subject his unwitting "patients" to high-voltage electroshock treatments, insulin-induced comas, sensory deprivation, and large doses of hallucinogenic drugs like LSD. To justify these treatments, Cameron touted his psychiatric techniques as innovative and experimental. The CIA obtained their desired test results from Cameron, whose patients unknowingly paid for the operation with the loss of their memories and cognitive abilities. Even though countless individuals who left the Allan were reduced to childlike states and unable to recognize their own family members, the US government has yet to be held accountable.
Note: Read more about the disturbing experiments of Ewen Cameron. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and mind control from reliable major media sources.
An NSA staffer deployed to Iraq led a counterterrorism and counterintelligence mission involving forensic investigations on computers seized in raids. The staffer's "Media Exploitation" team found pornographic videos and photos alongside thousands of audio files of the Quran and sermons, and recruitment and training CDs with video of bombings, torture, and beheadings. The team "jokingly" referred to the content as the "three big â€P's – porn, propaganda and prayer." Reports and files were distributed to the NSA and other intelligence agencies. Among the customers of the material ... were the military units interrogating captured insurgents. Special Forces interrogators found the pornography "extremely useful in breaking down detainees who maintained that they were devout Muslims, but had porn on their computers," according to an account by the NSA staffer. As the conflict with insurgents escalated in Fallujah ... NSA staff with "top-secret" clearances were deployed to the combat zone. Marines gave the NSA staff seized computers, CDs, phones, and radios directly from the battlefield, some "covered in blood." This material, too, was used in interrogations. A former interrogator at the U.S. detention center at Guantánamo Bay, Cuba, has said ... that pornography was used at the facility to reward some detainees and as a tool against others, who were forced to look at the material. The Associated Press has also reported on the use of pornography at Guantánamo.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
A resurfaced documentary is exposing a series of horrific accusations made by alleged victims of a 1988 child sex trafficking ring in 1988, who claim they were flown around the US to abused by high-ranking officials - alleging that FBI 'covered up' the shocking crimes. Back in the 1980s, several alleged victims claimed that a man named Lawrence King ran an underground club in Omaha, Nebraska, through which he, along with well-known politicians, businessmen, and media moguls, are said to have forced children as young as eight years old to have sex with them. In 1990, a Nebraska county grand jury concluded that the claims were a 'hoax,' and a federal grand jury later agreed. However, in 1993 ... alleged victims told documentary makers that the government forced them into silence by threatening those who spoke out, using scare tactics, and even murder. 'Obviously, the FBI was protecting something ... significant,' [lawyer John] DeCamp concluded. 'They were protecting some very prominent politicians, some very powerful and wealthy individuals associated with those politicians and the political system, up to and including the highest political people in this entire country. 'Every victim-witness who stepped forward in any way, or even was a potential witness that somebody heard about, has either been killed, put in jail under some theory or other, terrified or run out of the state, or discredited.'
Note: For an in-depth look at this disturbing crime ring, read The Franklin Cover-Up by John W. DeCamp or watch the suppressed Discovery Channel documentary Conspiracy of Silence. For more, see concise summaries of deeply revealing news articles on sexual abuse scandals from reliable major media sources.
The violent crackdown carried out on Columbia University students protesting Israel's genocidal assault on the Gaza Strip was led by a member of the school's own faculty, New York City Mayor Eric Adams has declared. During a May 1 press conference, just hours after the New York Police Department arrested nearly 300 people on university grounds, Adams praised adjunct Columbia professor Rebecca Weiner, who moonlights as the head of the NYPD counter-terrorism bureau, for giving police the green light to clear out anti-genocide students by force. Weiner maintained an office at Columbia's School of International and Public Affairs (SIPA). Her SIPA bio describes her as an "Adjunct Associate Professor of International and Public Affairs" who simultaneously serves as the "civilian executive in charge of the New York City Police Department's Intelligence & Counterterrorism Bureau." In that role ... Weiner "develops policy and strategic priorities for the Intelligence & Counterterrorism Bureau and publicly represents the NYPD in matters involving counterterrorism and intelligence." A 2011 AP investigation revealed that a so-called "Demographics Unit" operated secretly within the NYPD's Counterterrorism and Intelligence Bureau. This shadowy outfit spied on Muslims around the New York City area. The unit was developed in tandem with the CIA. As a former police official told the AP, the unit attempted to "map the city's human terrain" through a program "modeled in part on how Israeli authorities operate in the West Bank."
Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the erosion of civil liberties from reliable major media sources.
Federal and state Homeland Security grants allow local law enforcement agencies to surveil American citizens with technology more commonly found in war zones and foreign espionage operations. At least two Texas communities along the U.S.-Mexico border have purchased a product called "TraffiCatch," which collects the unique wireless and Bluetooth signals emitted by nearly all modern electronics to identify devices and track their movements. The product is also listed in a federal supply catalog run by the U.S. government's General Services Administration, which negotiates prices and contracts for federal agencies. Combining license plate information with data collected from wireless signals is the kind of surveillance the U.S. military and intelligence agencies have long used, with devices mounted in vehicles, on drones or carried by hand to pinpoint the location of cell phones and other electronic devices. Their usage was once classified and deployed in places like Afghanistan and Iraq. Today, similar devices are showing up in the streets of American cities. The Supreme Court has said that attaching a GPS tracking device to a car or getting historical location data from a cell carrier requires a search warrant. However, law enforcement has found ways around these prohibitions. Increasingly, as people walk around with headphones, fitness wearables and other devices ... their data can be linked to a car, even after they have ditched the car. Courts have not definitively grappled with the question: Under what circumstances can law enforcement passively capture ambient signal information and use it as a tracking tool?
Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy from reliable major media sources.
Fox News host Jesse Watters claimed during a Wednesday airing of The Five that the Federal Bureau of Investigation and Central Intelligence Agency can use information found on the Hunter Biden laptop to blackmail President Joe Biden. Watters' monologue was preceded by talks of the recent plea deal that the president's son reached with federal prosecutors earlier this week to avoid jail time on three federal charges. He failed to pay $1 million in taxes and faced a gun felony count. Conservative politicians and pundits in the media have used this to claim the Department of Justice is creating a two-tiered justice system. Earlier this month, former President Donald Trump was formally indicted by the DOJ for 37 charges related to his handling of classified material. "The feds are never going to crack open the laptop as long as Joe Biden's president. His administration is not going to investigate corruption in the Biden family. It's just not going to happen," Watters told the Fox panel. "Plus, the FBI in the CIA has this is blackmail. They can just dangle it in front of Joe and he has to do whatever they say or else â€boop!'" Watters then called the former president an "outsider" in Washington. "But the bottom line is that insiders protect insiders. You said it the other day, Trump's an outsider. He goes to prison, his people go to prison. But if you're a Washington insider, you get to Hunter Biden treatment," Watters concluded.
Note: If the article fails to load, here's an alternate source. Read about how the intelligence agencies infiltrated the media to censor the Hunter Biden laptop story and other important topics. While Hunter Biden was indicted for three felony gun charges and nine counts of tax-related crimes, his laptop also revealed suspicious business dealings with corrupt overseas firms.
The House of Representatives voted on Friday to extend Section 702 of the Foreign Intelligence Surveillance Act (FISA) for two years. Section 702 permits the US government to wiretap communications between Americans and foreigners overseas. Hundreds of millions of calls, texts, and emails are intercepted by government spies each with the "compelled assistance" of US communications providers. The government argues that Americans are not themselves being targeted and thus the wiretaps are legal. Nevertheless, their calls, texts, and emails may be stored by the government for years, and can later be accessed by law enforcement without a judge's permission. The House bill also dramatically expands the statutory definition for communication service providers. "They're pushing for a major expansion of warrantless spying on Americans," US senator Ron Wyden tells WIRED. "Their amendment would force your cable guy to be a government spy and assist in monitoring Americans' communications without a warrant." "Section 702 has been abused under presidents from both political parties, and it has been used to unlawfully surveil the communications of Americans across the political spectrum," says Kia Hamadanchy, senior policy counsel at the American Civil Liberties Union. "The Senate must add a warrant requirement and rein in this out-of-control government spying."
Note: For more along these lines, see concise summaries of important news articles on government corruption and the disappearance of privacy from reliable major media sources.
On April 20, former acting CIA Director Michael Morell admitted he orchestrated the joint letter that torpedoed the New York Post's bombshell reporting on Hunter Biden's laptop in the weeks leading up to the November 2020 US Presidential election, at the direct request of Joe Biden's campaign team. That letter ... asserted the leaked material bore unambiguous hallmarks of a Kremlin "information operation." In all, 51 former senior intelligence officials endorsed the declaration. This intervention was sufficient for Twitter to block all sharing of the NY Post's exposĂ©s and ban the outlet's official account. Twitter's public suppression of the NY Post's disclosures was complemented by a covert operation to identify and neutralize anyone discussing the contents of Hunter Biden's laptop, courtesy of Dataminr, a social media spying tool heavily connected to British and American intelligence services. In-Q-Tel [is] the CIA's venture capital arm. In 2016, The Intercept revealed In-Q-Tel was financing at least 38 separate social media spying tools, to surveil "erupting political movements, crises, epidemics, and disasters." Among them was Dataminr, which enjoys privileged access to Twitter's "firehose" – all tweets published in real time – in order to track and visualize trends as they happen. [In 2020], the U.S. was ... engulfed by incendiary large-scale protests. Dataminr kept a close eye on this upheaval every step of the way, tipping off police to the identities of demonstrators.
Note: While Hunter Biden was indicted for three felony gun charges and nine counts of tax-related crimes, his laptop also revealed suspicious business dealings with corrupt overseas firms. Learn more about the history of military-intelligence influence on the media in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on corporate corruption and media manipulation from reliable sources.
A devastating new Defense Department inspector general report finds that ... the Army, the primary Defense Department proponent for battlefield influence and deception, has failed to staff its own psyops units. Recent revelations about the Pentagon's psyops call into question just how effective these programs really are. In 2022, an extensive report by the Washington Post revealed widespread concern inside DOD that psychological operations were being waged both recklessly and ineffectively by the armed services. The report was spurred by research from the Stanford Internet Observatory which detailed over 150 instances of Facebook and Twitter removing accounts linked to U.S. military influence campaigns. The 2019 National Defense Authorization Act gave the Defense Department a green light to engage in offensive psyops campaigns, including clandestine operations that align with the same definition as covert, meaning that the armed forces can carry out influence operations that deny an American connection. After the congressional authorization, an unnamed defense official said, "Combatant commanders got really excited" and were "eager to utilize these new authorities. The defense contractors were equally eager to land lucrative classified contracts to enable clandestine influence operations." Researchers at Stanford ultimately found that despite the dozens of Defense Department obscured accounts spreading misinformation, the effect on foreign populations was far less than information conveyed overtly from self-identified U.S. sources.
Note: Read about the Pentagon's secret army of 60,000 undercover operatives that manipulate public perception. Learn more about the history of military-intelligence influence on the media in our comprehensive Military-Intelligence Corruption Information Center.
Hardware that breaks into your phone; software that monitors you on the internet; systems that can recognize your face and track your car: The New York State Police are drowning in surveillance tech. Last year alone, the Troopers signed at least $15 million in contracts for powerful new surveillance tools. Surveillance technology has far outpaced traditional privacy laws. In New York, lawmakers launched a years-in-the-making legislative campaign last year to rein in police intrusion. None of their bills have made it out of committee. A report from the U.S. Office of the Director of National Intelligence, put it succinctly: "The government would never have been permitted to compel billions of people to carry location tracking devices on their persons at all times, to log and track most of their social interactions, or to keep flawless records of all their reading habits." That report called specific attention to the "data broker loophole": law enforcement's practice of obtaining data for which they'd otherwise have to obtain a warrant by buying it from brokers. The New York State Police have taken greater and greater advantage of the loophole in recent years. They've also spent millions on mobile device forensic tools, or MDFTs, powerful hacking hardware and software that allow users to download full, searchable copies of a cellphone's data, including social media messages, emails, web and search histories, and minute-by-minute location information.
Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy from reliable major media sources.
The Haitian Bald Headed Party (PHTK) has tyrannically ruled Haiti since 2011. The U.S. State Department, who unilaterally picked Ariel Henry to be Haiti's prime minister in July of 2021, has now decided Henry no longer fits their interests and has forced him to step down. Henry was prevented from returning to Haiti on March 5 by paramilitary gangs who attempted to take the Toussaint Louverture International Airport, opening fire and hitting a plane bound for Cuba. The imperial forces responsible for over half a million illegal U.S. guns in Haiti that fuel this unparalleled violence are now preparing their next move to keep Haiti subdued. For the past 18 months, the Biden administration has sought to facilitate what will be the fourth U.S.-led foreign invasion and occupation of Haiti in the last 100 years by deputizing Kenya, Benin, the Bahamas, and other western neocolonies to carry out the occupation. The CIA remains active as well seeking a neocolony the U.S. can deputize to carry out this invasion. The only Haitian representatives that can be considered for the U.S.-led transitional government have to agree to the occupation. U.S. policy empowers and works with corrupt political leadership in Haiti because they can be relied upon to do the U.S.'s bidding. Meanwhile, those leaders who refuse to sell out to imperial interests are repressed and murdered. The ruling PHTK [has] bragged about being "legal bandits" above the law and employing ... government death squads armed with hundreds of thousands of U.S. weapons.
Note: The US government wants Ariel Henry out to purportedly prevent a full scale civil war. Is the US now trying to address Haitian stability and violence that US policies have helped create? Read about US involvement in the assassination of Haitian President Jovenel MoĂŻse. Learn more about the role the arms industry plays in global conflicts in our comprehensive Military-Intelligence Corruption Information Center.
The FBI spends "every day, all day long" interrogating people over their Facebook posts. At least, that's what agents told Stillwater, Oklahoma, resident Rolla Abdeljawad when they showed up at her house to ask her about her social media activity. Three FBI agents came to Abdeljawad's house and said that they had been given "screenshots" of her posts by Facebook. Her lawyer Hassan Shibly posted a video of the incident. "Facebook gave us a couple of screenshots of your account," one agent in a gray shirt said in the video. "So we no longer live in a free country and we can't say what we want?" replied Abdeljawad. "No, we totally do. That's why we're not here to arrest you or anything," a second agent in a red shirt added. "We do this every day, all day long. It's just an effort to keep everybody safe and make sure nobody has any ill will." Shibly says that he doesn't know which Facebook post caught the agents' attention, and that it was the first time he had heard of Facebook's parent company, Meta, preemptively reporting posts to law enforcement. [Abdeljawad] made multiple angry posts per day about the war in Gaza, referring to Israel as "Israhell." But none of the posts on her feed call for violence. Ironically, Abdeljawad had also posted a warning about exactly the kind of government monitoring she was later subjected to. "Don't fall for their games. Our community is being watched & they are just waiting for any reason to round us up," Abdeljawad wrote.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
A new nonfiction streaming series, "Four Died Trying" ... investigates not only the JFK liquidation, but also the people and players allegedly behind the assassinations of Malcolm X on Feb. 21, 1965; Rev. Martin Luther King Jr., on April 4, 1968; and Sen. Robert Francis Kennedy on June 6, 1968. Each of these killings is a false mystery. We know what happened to these guys. Each of these leaders in the 1960s were killed by the powers-that-be because of what they were doing at the time. Who planned it? It's a combination of people within the Pentagon, the CIA, Johnson, elements of the mob. There's continually more evidence to show that all of these groups were involved. They were each of them, in their own ways, working for a better world. President Kennedy ... was trying to end the Cold War. Malcolm was going to bring charges against the U.S. in the U.N., in the World Court. Martin Luther King came out against the Vietnam War and was planning the occupation of Washington, D.C. [with the Poor People's Campaign]. Bobby was becoming the candidate of the poor and disenfranchised and was talking about investigating his brother's death and pulling out of Vietnam. We haven't had any president since then who hasn't been a creature of this military-industrial-intelligence-complex. This is the profound warning Eisenhower gives us. He worries that a technocracy, a scientific elite, could control American democracy. It's a profound warning from a general and a president to the American public that we unfortunately did not heed as we should have.
Note: Listen to an excellent podcast with the filmmakers about what these tragic assassinations had in common. For more along these lines, read our in-depth essay on the MLK assassination, along with concise summaries of revealing news articles on assassinations.
Haiti was born in 1804 out of a 13-year revolution in which the enslaved people of the then French colony of Saint-Domingue dismantled their chains, defeated, in succession, the armies of France, Britain and Spain, and established a new nation. Elites in Europe and America, meanwhile, fearful that the Haitian example might embolden others struggling for freedom, sought to isolate the new nation, refusing for decades even to recognise it. In 1825, France demanded, as the price of recognition, reparations of 150m francs. France was compelling enslaved people and their descendants to pay their former masters ... forcing [Haiti] to take out loans from French banks at exorbitant rates. By 1914, 80% of the government budget went to repaying the debt. Western nations have not only impoverished Haiti, they have also constantly intervened. Jean-Bertrand Aristide [was] a leftwing priest with mass support among Haiti's working class and poor. Twice, in 1990 and 2001, waves of public support propelled Aristide to the presidency. And twice, in 1991 and 2004, he was ousted in bloody coups. After the first coup, Aristide returned to power with US support. Nevertheless, many of the coup leaders were on the CIA payroll and the agency did not hide its hostility. A decade later, opposition to Aristide's economic and social policies led America to force him out of office. Today, the Haitian state barely exists.
Note: In 2021, Colombian mercenaries who had received training in the US assassinated Haitian President Jovenel MoĂŻse. For more along these lines, see concise summaries of important news articles on intelligence agency corruption from reliable major media sources.
Billionaire Elon Musk's brain-computer interface (BCI) company Neuralink made headlines earlier this year for inserting its first brain implant into a human being. Such implants ... are described as "fully implantable, cosmetically invisible, and designed to let you control a computer or mobile device anywhere you go." They can help people regain abilities lost due to aging, ailments, accidents or injuries, thus improving quality of life. Yet, great ethical concerns arise with such advancements, and the tech is already being used for questionable purposes. Some Chinese employers have started using "emotional surveillance technology" to monitor workers' brainwaves. Governments and militaries are already ... describing the human body and brain as war's next domain. On this new "battlefield," an era of neuroweapons ... has begun. The Pentagon's research arm DARPA directly or indirectly funds about half of invasive neural interface technology companies in the US. DARPA has initiated at least 40 neurotechnology-related programs over the past 24 years. As a 2024 RAND report speculates, if BCI technologies are hacked or compromised, "a malicious adversary could potentially inject fear, confusion, or anger into [a BCI] commander's brain and cause them to make decisions that result in serious harm." Academic Nicholas Evans speculates, further, that neuroimplants could "control an individual's mental functions," perhaps to manipulate memories, emotions, or even to torture the wearer. In a [military research paper] on neurowarfare: "Microbiologists have recently discovered mind-controlling parasites that can manipulate the behavior of their hosts according to their needs by switching genes on or off. Since human behavior is at least partially influenced by their genetics, nonlethal behavior modifying genetic bioweapons that spread through a highly contagious virus could thus be, in principle, possible.
Note: The CIA once used brain surgery to make six remote controlled dogs. For more, see important information on microchip implants and CIA mind control programs from reliable major media sources.
On March 8, the Department of Defense published the most significant report on UFOs in at least two generations – a congressionally mandated historical review of U.S. government involvement with unidentified anomalous phenomena or UAP. Unfortunately, the report from the Pentagon's All-domain Anomaly Resolution Office (AARO) contains an array of striking omissions and one particularly egregious misrepresentation. The result is a misleading report which, like so much government UFO-related propaganda over seven decades, tells the reader just to move on, nothing to see here. AARO has not provided a plausible explanation for naval aviators' more recent encounters – including one harrowing near-collision – with spherical objects exhibiting extraordinary flight characteristics. Worst of all, AARO's review misrepresents the most exhaustive, comprehensive historical analysis of UFO incidents, conducted on behalf of the Air Force by the Battelle Memorial Institute in the early 1950s. According to AARO, the resulting report found that "all cases that had enough data were resolved and explainable." But this is not what Battelle's analysis found at all, and AARO's misrepresentation of its conclusions speaks volumes. According to the Battelle analysis ... of the UFO cases considered "Excellent" and with sufficient data to draw a conclusion, 33 percent were categorized as having "unknown" origin.
Note: For more along these lines, see concise summaries of deeply revealing news articles on UFOs from reliable major media sources. Then explore the excellent, reliable resources provided in our new UFO Information Center.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.