As a 501(c)(3) nonprofit, we depend almost entirely on donations from people like you.
We really need your help to continue this work! Please consider making a donation.
Subscribe here and join over 13,000 subscribers to our free weekly newsletter

Intelligence Agency Corruption News Stories

Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.

For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.

Explore our comprehensive news index on a wide variety of fascinating topics.
Explore the top 20 most revealing news media articles we've summarized.
Check out 10 useful approaches for making sense of the media landscape.

Sort articles by: Article Date | Date Posted on WantToKnow.info | Importance

Whistleblower: Hundreds Left FBI Over Misconduct in 20 Years
2022-10-06, U.S. News & World Report/Associated Press
Posted: 2022-10-10 13:19:28
https://www.usnews.com/news/politics/articles/2022-10-06/whistleblower-hundre...

A U.S. senator is pressing the FBI for more information after a whistleblower alleged that an internal review found 665 FBI personnel have resigned or retired to avoid accountability in misconduct probes over the past two decades. The whistleblower told the office of Iowa Sen. Chuck Grassley ... that the Justice Department launched the review of the FBI’s disciplinary database in 2020 following an Associated Press investigation into sexual misconduct allegations involving at least six senior FBI officials. The follow-up review found 665 FBI employees, including 45 senior-level officials, resigned or retired between 2004 and 2020 following a misconduct probe but before a final disciplinary letter could be issued, according to a letter this week from Grassley to FBI Director Christopher Wray and Attorney General Merrick Garland. It was not clear how many of those cases involved sexual misconduct. Grassley’s office, which declined to make the whistleblower or underlying documents available to protect the person’s identify, said that was the kind of information it was still seeking but estimated the number could be in the “hundreds.” The AP investigation in December 2020 identified at least six sexual misconduct allegations involving senior FBI officials over the prior five years ranging from unwanted touching and advances to coercion. It found that several senior FBI officials have avoided discipline — quietly transferring or retiring with full benefits — even after claims of sexual misconduct against them were substantiated.

Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and sexual abuse scandals from reliable major media sources.


Former NSA Chief Signed Deal to Train Saudi Hackers Months Before Jamal Khashoggi's Murder
2022-09-26, The Intercept
Posted: 2022-10-02 22:06:18
https://theintercept.com/2022/09/26/keith-alexander-saudi-hackers-khashoggi/

In early 2018, former National Security Agency chief Keith Alexander worked out a deal with Saudi Crown Prince Mohammed bin Salman and the cyber institute led by one of his closest aides, Saud al-Qahtani, to help the Saudi ruler train the next generation of Saudi hackers. The agreement between IronNet, founded by Alexander, and the cyber school ... faced no scrutiny for its association with Qahtani, after the brutal killing of Jamal Khashoggi he reportedly orchestrated just a few months later. Alexander officially inked the deal with the Prince Mohammed bin Salman College of Cyber Security, Artificial Intelligence, and Advanced Technologies — a school set up to train Saudi cyber intelligence agents — at a signing ceremony in Washington, D.C.. Saudi Arabia’s agreement with IronNet was part of a host of moves to step up its cyber capabilities, coinciding with a campaign against the kingdom’s critics abroad. Khashoggi, then a Washington Post columnist and prominent Salman critic, received a series of threatening messages, including one from Qahtani, warning him to remain silent. Khashoggi, whose family and close associates discovered listening malware electronically implanted on their smartphones, was then lured to the Saudi Embassy in Istanbul. It was there that a team dispatched by Qahtani detained and tortured the Saudi government critic. Qahtani, according to reports, beamed in through Skype to insult Khashoggi during the ordeal. Khashoggi was then dismembered with a bone saw.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


Pentagon opens sweeping review of clandestine psychological operations
2022-09-19, Washington Post
Posted: 2022-09-26 22:12:26
https://www.washingtonpost.com/national-security/2022/09/19/pentagon-psycholo...

The Pentagon has ordered a sweeping audit of how it conducts clandestine information warfare after major social media companies identified and took offline fake accounts suspected of being run by the U.S. military in violation of the platforms’ rules. The takedowns in recent years by Twitter and Facebook of more than 150 bogus personas and media sites created in the United States was disclosed last month by internet researchers Graphika and the Stanford Internet Observatory. U.S. Central Command is among those whose activities are facing scrutiny. Some [takedowns] involved posts from the summer that advanced anti-Russia narratives. One fake account posted an inflammatory tweet claiming that relatives of deceased Afghan refugees had reported bodies being returned from Iran with missing organs. The tweet linked to a video that was part of an article posted on a U.S.-military affiliated website. In 2020 Facebook disabled fictitious personas created by Centcom to counter disinformation spread by China suggesting the coronavirus responsible for covid-19 was created at a U.S. Army lab in Fort Detrick, Md.. The pseudo profiles ... were used to amplify truthful information from the U.S. Centers for Disease Control and Prevention. Congress in late 2019 passed a law affirming that the military could conduct operations in the “information environment” to defend the United States. The measure, known as Section 1631, allows the military to carry out clandestine psychological operations.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.


Revealed: how UK targeted American civil rights leader in covert campaign
2022-09-13, The Guardian (One of the UK's Leading Newspapers)
Posted: 2022-09-26 22:09:11
https://www.theguardian.com/world/2022/sep/13/revealed-how-uk-targeted-americ...

The British government targeted the American civil rights leader Stokely Carmichael and sought to weaken the Black Power movement with covert disinformation campaigns, recently declassified documents have revealed. The effort was the work of a secret unit known as the Information Research Department, based in London and part of the Foreign Office, which created and distributed literature from fake sources as part of a broader effort to destabilise cold war enemies. The effort against Carmichael, a firebrand orator who travelled to west Africa in part to escape harassment by US law enforcement agencies, aimed to portray the prominent Black Power leader as a foreign interloper in Africa who was contemptuous of the inhabitants of the continent. Based mainly in Guinea from July 1969, the 28-year-old activist had became a vocal advocate of socialist, pan-Africanist ideologies, which worried British officials. The IRD was particularly worried by the movement’s potential influence in the Caribbean. In 1969, the IRD also created a new fake group: The Organisation of African Students for African Power. This was supposedly based in East Germany and adopted contemporary radical New Left ideas, “proclaiming a plague on both” the capitalist west and the Soviet bloc. The IRD felt this provided a better platform to “damage opponents” than the dated nationalist approach, while being difficult to trace back to Britain because many similar groups had genuinely sprung up in the late 1960s.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.


The FBI monitored Aretha Franklin's role in the civil rights movement for years
2022-09-12, NPR
Posted: 2022-09-26 22:07:36
https://www.npr.org/2022/09/12/1122319306/aretha-franklin-fbi-surveillance

The FBI spent years surveilling the "Queen of Soul" Aretha Franklin, trying to gauge how involved she was with the civil rights movement, communism and the Black Power movement, a 270-page document shows. Franklin, who died in 2018, was monitored ahead of several performances and attendances she made for civil rights groups, such as the National Association for the Advancement of Colored People and the Southern Christian Leadership Conference, whose first president was Dr. Martin Luther King, Jr. Informants mentioned Franklin, a Detroit native, in separate memos for possibly appearing at the SCLC's 1967 and 1968 national conventions, in Atlanta and Memphis, respectively. The FBI mailed several copies of "The Atlanta Voice" newspaper, which reported on her visit to town, to FBI offices around the country, as well as the U.S. attorney general and the Secret Service. During this time, Franklin was, in fact, actively involved in the civil rights movement through her music and personal connections. She was identified in a 1969 memo titled "Possible Racial Violence, Urban Areas, Racial Matters" when, in the year before, Denver concertgoers rioted after she refused to perform at the Red Rocks amphitheater due to not being properly paid. In 1971, memos named the Black Panther Party of Los Angeles and the Boston Young Workers Liberation League as organizations who intended to book her for rallies.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.


Who got America to the moon? An unlikely collaboration of Jewish and former Nazi scientists and engineers
2020-03-01, Los Angeles Times
Posted: 2022-08-15 21:25:14
https://www.latimes.com/california/story/2020-03-01/who-got-america-to-the-mo...

In early days of America’s space program, two men met over a bottle of Jack Daniel’s. It was roughly 1959, when the future of America’s young space program was clouded by technological disagreements. On one side of the bottle was Wernher von Braun, the engineering genius who had developed the world’s first ballistic missile for Adolf Hitler during World War II. He had once been a member of Hitler’s Schutzstaffel, or SS, but now ran NASA’s Marshall Space Flight Center. On the other side was Abraham Silverstein, who had grown up in a poor Jewish family in Indiana. He was NASA’s space flight chief. One former Nazi, one American Jew. Little more than a decade separated them from the Holocaust. Looming before two of America’s top rocket engineers were many critical decisions, including what kind of fuel would be needed to blast off astronauts to the moon. The collaboration between Von Braun and Silverstein was not unique. During the Apollo program, which landed Americans on the moon six times between 1969 and 1972, NASA was filled with both Jewish scientists and a large group of Germans who had worked for Hitler before and during World War II. In recent years, a deeper analysis has focused on America’s decision to bring 125 German rocket scientists and engineers to the U.S. after World War II under a secret program approved by President Truman and code-named Operation Paperclip. Much of the history of the underground factory was held secret from the American public until the 1970s.

Note: Learn more about Operation Paperclip which secretly brought hundreds of Nazi scientists to the U.S. And more in a New York Times article about the Nazis given safe haven in the US. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.


Former senior U.S. official John Bolton admits to planning attempted foreign coups
2022-07-13, Reuters
Posted: 2022-08-08 18:02:02
https://www.reuters.com/world/us/former-senior-us-official-john-bolton-admits...

John Bolton, a former U.S. ambassador to the United Nations and former White House national security adviser, said on Tuesday that he had helped plan attempted coups in foreign countries. Bolton made the remarks to CNN after the day's congressional hearing into the Jan 6, 2021, attack on the U.S. Capitol. The panel's lawmakers ... accused former President Donald Trump of inciting the violence in a last-ditch bid to remain in power after losing the 2020 election. Speaking to CNN anchor Jake Tapper, however, Bolton suggested Trump was not competent enough to pull off a "carefully planned coup d'etat," later adding: "As somebody who has helped plan coups d'etat - not here but you know (in) other places - it takes a lot of work. And that's not what he (Trump) did." Tapper asked Bolton which attempts he was referring to. "I'm not going to get into the specifics," Bolton said, before mentioning Venezuela. "It turned out not to be successful. Not that we had all that much to do with it but I saw what it took for an opposition to try and overturn an illegally elected president and they failed," he said. "I feel like there's other stuff you're not telling me (beyond Venezuela)," the CNN anchor said, prompting a reply from Bolton: "I'm sure there is." Many foreign policy experts have over the years criticized Washington's history of interventions in other countries, from its role in the 1953 overthrowing of then Iranian nationalist prime minister Mohammad Mosaddegh and the Vietnam war, to its invasions of Iraq and Afghanistan this century.

Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in intelligence services from reliable major media sources.


While Guilty for Sex Trafficking, Ghislaine Maxwell Takes Fall for Alleged Sexual Blackmail Operation Run by Western Intelligence Agencies
2022-07-14, Covert Action Magazine
Posted: 2022-08-08 18:00:08
https://covertactionmagazine.com/2022/07/14/while-guilty-for-sex-trafficking-...

On June 28, Ghislaine Maxwell was sentenced to 20 years in prison for conspiring with Jeffrey Epstein to recruit, groom and abuse underage girls. In Maxwell’s defense, lawyer Bobbi C. Sternheim said that Ms. Maxwell’s life had been clouded by two men: “her narcissistic, brutish father” Robert Maxwell, wealthy British media tycoon and former member of parliament, and “the controlling, demanding, manipulative” Jeffrey Epstein. What [Maxwell] could not say was that she was the one to take the fall for a sexual blackmail operation sponsored by Western intelligence agencies. That operation appears to have originated with her father Robert back in the 1980s. Ari Ben-Menashe, a former Israeli intelligence official, claimed to have seen Jeffrey Epstein in Robert’s office in the early 1980s. Robert was a long-time operative for Israeli intelligence. Ben-Menashe [said] that Epstein “was the simple idiot who was going around providing girls to all kinds of politicians in the United States. He was taking photos of politicians fucking fourteen year old girls. They would just blackmail people like this.” Maxwell ... claims she has copies of everything that Epstein had and a secret stash of pedophile sex tapes that could implicate the world’s most powerful and will try to use them to save herself. The flight logs from [Epstein's] Lolita Express reveal a “who’s who” of early 1990s high society, including ... lawyer Alan Dershowitz, conservative billionaire David Koch; and politicians such as Tony Blair.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and Jeffrey Epstein from reliable major media sources.


Revealed: leak uncovers global abuse of cyber-surveillance weapon
2021-07-18, The Guardian (One of the UK's leading newspapers)
Posted: 2022-07-11 12:56:07
https://www.theguardian.com/world/2021/jul/18/revealed-leak-uncovers-global-a...

Human rights activists, journalists and lawyers across the world have been targeted by authoritarian governments using hacking software sold by the Israeli surveillance company NSO Group, according to an investigation into a massive data leak. The investigation by the Guardian and 16 other media organisations suggests widespread and continuing abuse of NSO’s hacking spyware, Pegasus. Pegasus is a malware that infects iPhones and Android devices to enable operators of the tool to extract messages, photos and emails, record calls and secretly activate microphones. The leak contains a list of more than 50,000 phone numbers that, it is believed, have been identified as those of people of interest by clients of NSO since 2016. The numbers of more than 180 journalists are listed in the data, including reporters, editors and executives at the Financial Times, CNN, the New York Times, France 24, the Economist, Associated Press and Reuters. The phone number of a freelance Mexican reporter, Cecilio Pineda Birto, was found in the list, apparently of interest to a Mexican client in the weeks leading up to his murder, when his killers were able to locate him at a carwash. He was among at least 25 Mexican journalists apparently selected as candidates for surveillance. The broad array of numbers in the list belonging to people who seemingly have no connection to criminality suggests some NSO clients are breaching their contracts with the company, spying on pro-democracy activists and journalists.

Note: Read more about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


The Truth Never Mattered at Guantánamo
2022-06-11, The Intercept
Posted: 2022-06-20 12:24:22
https://theintercept.com/2022/06/11/the-truth-never-mattered-at-guantanamo/

It was the evening of June 9, 2006. Three [Guantánamo Bay] detainees were declared dead. The Navy says the men killed themselves by hanging, in separate nonadjoining cells, in the same way, at the same time, under video surveillance, with no guards noticing and no prisoners calling for the guards to intervene. They tell us that each of the men had bound their wrists and ankles with fabric and shoved fabric down their own throats — and then ask us to believe that they hung themselves. Despite explosive reporting by Scott Horton for Harper’s Magazine in which multiple sources ... refuted the official narrative and gave evidence that a cover-up had taken place, no independent official investigation of the incident was ordered. This disturbing episode quickly turned unspeakably dark: Independent autopsies ordered by the families of the dead were useless since the bodies, which showed signs of torture, had been sent home with missing parts. The men’s throats — the larynx, the hyoid bone, and the thyroid cartilage — had been removed. Even after this shocking finding ... there would be no investigations. The narrative that these men did something terrible and deserved to be imprisoned for it defines the very nature of the post-9/11 response. It doesn’t matter that the original accusations against many of them were flimsy and easily disproved. Due process and the presumption of innocence, the defining values of the American ideal of justice, would be forever denied them.

Note: Read a troubling letter by Sharqawi Al Hajj, a Yemeni citizen detained at Guantanamo Bay. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.


The Brooklyn Hologram Studio Receiving Millions from the CIA
2022-05-27, The Intercept
Posted: 2022-06-12 13:21:56
https://theintercept.com/2022/05/27/metaverse-cia-military-hologram-looking-g...

Looking Glass Factory, a company based in the Greenpoint neighborhood of Brooklyn, New York, revealed its latest consumer device: a slim, holographic picture frame that turns photos taken on iPhones into 3D displays. Looking Glass received $2.54 million of “technology development” funding from In-Q-Tel, the venture capital arm of the CIA, from April 2020 to March 2021 and a $50,000 Small Business Innovation Research award from the U.S. Air Force in November 2021 to “revolutionize 3D/virtual reality visualization.” Across the various branches of the military and intelligence community, contract records show a rush to jump on holographic display technology, augmented reality, and virtual reality display systems as the latest trend. Critics argue that the technology isn’t quite ready for prime time, and that the urgency to adopt it reflects the Pentagon’s penchant for high-priced, high-tech contracts based on the latest fad in warfighting. Military interest in holographic imaging, in particular, has grown rapidly in recent years. Military planners in China and the U.S. have touted holographic technology to project images “to incite fear in soldiers on a battlefield.” Other uses involve the creation of three-dimensional maps of villages of specific buildings and to analyze blast forensics. Palmer Luckey, who founded the technology startup Anduril Industries ... has received secretive Air Force contracts to develop next-generation artificial intelligence capabilities under the so-called Project Maven initiative.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


Newly released video shows 9/11 hijackers with alleged Saudi intelligence operative
2022-04-27, CBS News
Posted: 2022-05-17 01:07:20
https://www.cbsnews.com/news/911-hijackers-video-saudi-intelligence-official-...

While President Biden signed an executive order last fall to declassify 9/11 evidence, the families of some 9/11 victims say they had to go through the British courts to get records and videos seized two decades ago from an alleged Saudi government operative that have never been public until now. Buried inside the trove is a home video from 2000. The event was described in 9/11 Commission records as a party at the San Diego apartment of Nawaf al-Hazmi and Khalid al-Mihdhar, the first two hijackers to arrive in the U.S. in January 2000. A handful of frames captured Mihdhar in the kitchen. Along with Hazmi, their team would later commandeer Flight 77 that slammed into the Pentagon. The party's host, Saudi national Omar al-Bayoumi, was arrested by British police less than two weeks after the attack. British police seized the videos and documents from Bayoumi. A newly declassified and heavily redacted FBI memo from 2017 stated, "In the late 1990s and up to September 11, 2001, Omar al-Bayoumi was paid a monthly stipend as a cooptee of the Saudi General Intelligence Presidency (GIP) via then Ambassador Prince Bandar bin Sultan." The memo continued, "Allegations of al-Bayoumi's involvement with Saudi Intelligence were not confirmed at the time of the 9/11 Commission Report. The above information confirms these allegations." Another recently declassified FBI memo ... said, "There is a 50/50 chance Omar al-Bayoumi had advanced knowledge the 9/11 terrorist attacks were to occur."

Note: For more along these lines, see concise summaries of deeply revealing news articles on 9/11 from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.


The Cold War Experiments
1994-01-16, U.S. News & World Report
Posted: 2022-05-17 00:51:42
https://web.archive.org/web/20120823095658/https://www.usnews.com/usnews/news...

On June 1, 1951, top military and intelligence officials of the United States, Canada and Great Britain, alarmed by frightening reports of communist success at "intervention in the individual mind," summoned a small group of eminent psychologists to a secret meeting at the Ritz-Carlton Hotel in Montreal. By the following September, U.S. government scientists, spurred on by reports that American prisoners of war were being brainwashed in North Korea, were proposing an urgent, top-secret research program on behavior modification. Drugs, hypnosis, electroshock, lobotomy - all were to be studied as part of a vast U.S. effort to close the mind-control gap. From the end of World War II well into the 1970s, the Atomic Energy Commission, the Defense Department, the military services, the CIA and other agencies used prisoners, drug addicts, mental patients, college students, soldiers, even bar patrons, in a vast range of government-run experiments to test the effects of everything from radiation, LSD and nerve gas to intense electric shocks and prolonged "sensory deprivation." Some of the human guinea pigs knew what they were getting into; many others did not. With the cold war safely over, Energy Secretary Hazel O'Leary has ordered the declassification of millions of pages of documents on the radiation experiments. But the government has long ignored thousands of other cold war victims, rebuffing their requests for compensation and refusing to admit its responsibility for injuries they suffered.

Note: Read more about the disturbing history of government and industry experiments on human guinea pigs. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources.


The Details About the CIA's Deal With Amazon
2014-07-17, The Atlantic
Posted: 2022-04-25 21:08:10
https://www.theatlantic.com/technology/archive/2014/07/the-details-about-the-...

The intelligence community is about to get the equivalent of an adrenaline shot to the chest. This summer, a $600 million computing cloud developed by Amazon Web Services for the Central Intelligence Agency over the past year will begin servicing all 17 agencies that make up the intelligence community. If the technology plays out as officials envision, it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks. For the first time, agencies within the intelligence community will be able to order a variety of on-demand computing and analytic services from the CIA and National Security Agency. What’s more, they’ll only pay for what they use. For the risk-averse intelligence community, the decision to go with a commercial cloud vendor is a radical departure from business as usual. It is difficult to underestimate the cloud contract’s importance. In a recent public appearance, CIA Chief Information Officer Douglas Wolfe called it “one of the most important technology procurements in recent history,” with ramifications far outside the realm of technology. The importance of the cloud capabilities the CIA gets through leveraging Amazon Web Services’ horsepower is best exemplified in computing intelligence data. Instead of each agency building out its own systems, select agencies ... are responsible for governing its major components.

Note: The CIA tries to "collect everything and hold on to it forever." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


The CIA has backed Ukrainian insurgents before. Let’s learn from those mistakes
2022-02-25, Los Angeles Times
Posted: 2022-04-04 15:28:11
https://www.latimes.com/opinion/story/2022-02-25/ukraine-cia-insurgents-russi...

Russia invaded Ukraine. For years now the Central Intelligence Agency has been preparing for such a moment, not only with prescient intelligence gathering and analysis but also by preparing Ukrainians to mount an insurgency against a Russian occupation. The agency has been training Ukrainian special forces and intelligence officers at a secret facility in the U.S. since 2015. Because the CIA training program is now publicly known, Russia can persuasively claim that Ukrainian insurgents are CIA proxies — a useful statement as propaganda to pro-Russian separatists in eastern Ukraine and as a justification for any harsh measures it takes against Ukrainian civilians. The CIA needs to be honest with the Ukrainians — and itself — about the real intent. In the first U.S.-backed insurgency, according to top secret documents later declassified, American officials intended to use the Ukrainians as a proxy force to bleed the Soviet Union. This time, is the primary goal of the paramilitary program to help Ukrainians liberate their country or to weaken Russia over the course of a long insurgency that will undoubtedly cost as many Ukrainian lives as Russian lives, if not more? Even if a Ukrainian insurgency bleeds Russia over years, the conflict could cause instability to spread across Central and Eastern Europe. This is a pattern in the history of U.S. paramilitary operations — from the Cold War to Afghanistan and Iraq today.

Note: For an alternative view of Ukraine’s Zelensky, don’t miss this excellent presentation by intrepid reporter Ben Swann (skip to 1:45 to avoid advertisement). For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and war from reliable major media sources.


Supreme Court rules against disclosure in torture case
2022-03-03, NPR
Posted: 2022-03-14 17:37:46
https://www.npr.org/2022/03/03/1084161762/supreme-court-rules-against-disclos...

The Supreme Court ruled Thursday that the federal government can shield former government contractors from testifying about the torture of a post-9/11 detainee. The decision likely will make it harder for victims to expose secret government misconduct in the future. Abu Zubaydah was the first prisoner held by the CIA to undergo what, at the time, was euphemistically called "enhanced interrogation." During one 20-day period, he was waterboarded 83 times, 24 hours a day. During that period, the suspected terrorist was also slammed against walls, put in a coffin-like box for hours at a time to simulate live burial, and subjected to something the government called "rectal rehydration." In the end, the two CIA contractors who supervised Zubaydah's interrogation concluded that they had the wrong man. But when lawyers for Zubaydah subpoenaed them, the U.S. government blocked the move by invoking the so-called "state secrets" privilege. In this case, both the Trump and Biden administrations argued that even though the information about the torture program is widely known, confirming the existence of CIA black sites in Poland would jeopardize the U.S. government's relationship with foreign intelligence services. Josh Colangelo-Bryan, a lawyer who represents other Guantanamo Bay detainees, was ... critical. "There has been no accountability for the U.S. program that subjected people to torture," he said in a statement.

Note: Read more about the CIA's torture program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.


CIA’s Gus Hunt On Big Data: We ‘Try To Collect Everything And Hang On To It Forever’
2013-03-20, Huffington Post
Posted: 2022-03-14 17:31:04
https://www.huffpost.com/entry/cia-gus-hunt-big-data_n_2917842

The CIA's chief technology officer outlined the agency's endless appetite for data in a far-ranging speech. Ira "Gus" Hunt said that the world is increasingly awash in information from text messages, tweets, and videos - and that the agency wants all of it. "The value of any piece of information is only known when you can connect it with something else that arrives at a future point in time," Hunt said. "Since you can't connect dots you don't have, it drives us into a mode of, we fundamentally try to collect everything and hang on to it forever." Hunt's comments come two days after Federal Computer Week reported that the CIA has committed to a massive, $600 million, 10-year deal with Amazon for cloud computing services. "It is really very nearly within our grasp to be able to compute on all human generated information," Hunt said. After that mark is reached, Hunt said, the agency would also like to be able to save and analyze all of the digital breadcrumbs people don't even know they are creating. "You're already a walking sensor platform," he said, noting that mobiles, smartphones and iPads come with cameras, accelerometers, light detectors and geolocation capabilities. "Somebody can know where you are at all times, because you carry a mobile device, even if that mobile device is turned off," he said. Hunt also spoke of mobile apps that will be able to control pacemakers - even involuntarily - and joked about a "dystopian" future. Hunt's speech barely touched on privacy concerns.

Note: The Internet of Things makes mass surveillance even easier. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Everybody Does It: The Messy Truth About Infiltrating Computer Supply Chains
2019-01-24, The Intercept
Posted: 2022-03-06 22:52:16
https://theintercept.com/2019/01/24/computer-supply-chain-attacks/

Bloomberg Businessweek published an alarming story: Operatives working for China’s People’s Liberation Army had secretly implanted microchips into motherboards made in China and sold by U.S.-based Supermicro. This allegedly gave Chinese spies clandestine access to servers belonging to over 30 American companies, including Apple, Amazon, and various government suppliers, in an operation known as a “supply chain attack,” in which malicious hardware or software is inserted into products before they are shipped to surveillance targets. U.S. spy agencies ... assessed that China was adept at corrupting the software bundled closest to a computer’s hardware at the factory, threatening some of the U.S. government’s most sensitive machines, according to documents provided by National Security Agency whistleblower Edward Snowden. The documents also detail how the U.S. and its allies have themselves systematically targeted and subverted tech supply chains, with the NSA conducting its own such operations, including in China, in partnership with the CIA and other intelligence agencies. The documents also disclose supply chain operations by German and French intelligence. Computer hardware can be altered at various points along the supply chain, from design to manufacturing to storage to shipment. The U.S. is among the small number of countries that could, in theory, compromise devices at many different points in this pipeline, thanks to its resources and geographic reach.

Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


F.B.I. Secretly Bought Israeli Spyware and Explored Hacking U.S. Phones
2021-01-28, New York Times
Posted: 2022-02-27 19:35:00
https://www.nytimes.com/2022/01/28/world/middleeast/israel-pegasus-spyware.html

It is widely regarded as the world’s most potent spyware, capable of reliably cracking the encrypted communications of iPhone and Android smartphones. The software, Pegasus, made by an Israeli company, NSO Group, has been able to track terrorists and drug cartels. It has also been used against human rights activists, journalists and dissidents. Now, an investigation published Friday by The New York Times Magazine has found that Israel, which controls the export of the spyware ... has made Pegasus a key component of its national security strategy, using it to advance its interests around the world. The F.B.I. bought and tested NSO software for years with plans to use it for domestic surveillance until the agency finally decided last year not to deploy the tools. The F.B.I., in a deal never previously reported, bought the spyware in 2019. It also spent two years discussing whether to deploy a newer product, called Phantom, inside the United States. The discussions at the Justice Department and the F.B.I. continued until last summer. But Pegasus equipment is still in a New Jersey building used by the F.B.I. And the company also gave the agency a demonstration of Phantom, which could hack American phone numbers. A brochure ... says that Phantom allows American law enforcement and spy agencies to “turn your target’s smartphone into an intelligence gold mine.” In 2018 ... the C.I.A. bought Pegasus to help Djibouti, an American ally, fight terrorism, despite longstanding concerns about human rights abuses there.

Note: Read about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


The Battle for the World’s Most Powerful Cyberweapon
2022-01-28, New York Times
Posted: 2022-02-21 19:15:59
https://www.nytimes.com/2022/01/28/magazine/nso-group-israel-spyware.html

NSO Group [is] the world’s most notorious maker of spyware. The F.B.I. had bought a version of Pegasus, NSO’s premier spying tool. It could ... crack the encrypted communications of any iPhone or Android smartphone. Since NSO had introduced Pegasus to the global market in 2011, it had helped Mexican authorities capture Joaquín Guzmán Loera, the drug lord known as El Chapo. European investigators have quietly used Pegasus to thwart terrorist plots, fight organized crime and, in one case, take down a global child-abuse ring. Mexico deployed the software not just against gangsters but also against journalists and political dissidents. The United Arab Emirates used the software to hack the phone of a civil rights activist. Saudi Arabia used it against women’s rights activists. During a presentation to officials in Washington, the company demonstrated a new system, called Phantom, that could hack any number in the United States that the F.B.I. decided to target. A slick brochure ... says that Phantom allows American law enforcement and spy agencies to get intelligence “by extracting and monitoring crucial data from mobile devices.” It is an “independent solution” that requires no cooperation from AT&T, Verizon, Apple or Google. The system, it says, will “turn your target’s smartphone into an intelligence gold mine.” The Phantom presentation triggered a discussion among government lawyers. Last summer ... the F.B.I. finally decided not to deploy the NSO weapons.

Note: Read more about how NSO Group spyware was used against journalists and activists by the Mexican government. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.


Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.