As of Feb. 2, we're $8,200 in the red for the month. Donate here to support this vital work.
Subscribe here to our free email list

Intelligence Agency Media Articles
Excerpts of Key Intelligence Agency Media Articles in Major Media


Below are key excerpts of highly revealing intelligence agencies articles reported in the major media. Links are provided to the full articles on major media websites. If any link fails to function, read this webpage. These intelligence agencies articles are listed by article date. You can also explore the articles listed by order of importance or by date posted. By choosing to educate ourselves on these important issues and to spread the word, we can and will build a brighter future.


Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


Who Won the Election? NSA Report Suggests Russia Might Have Hacked Voting System
2017-06-05, Newsweek
http://www.newsweek.com/who-won-election-nsa-report-suggests-russia-might-hav...

Russian military intelligence attempted to cyber-attack a U.S. voting software supplier and more than 100 local election officials in the days leading up to the 2016 presidential election, The Intercept reported Monday. According to an NSA document ... Russian military intelligence cyber-attacked a U.S. voting software supplier, using information gained in that attack to “launch a voter registration-themed spear-phishing campaign targeting U.S. local government organizations. Russian General Staff Main Intelligence Directorate actors … executed cyber espionage operations against a named U.S. company in August 2016, evidently to obtain information on elections-related software and hardware solutions,” the document states. The operation gave the hackers “persistent access” to the targeted computers, allowing them to “survey the victims for items of interest.” But Pamela Smith, president of election integrity watchdog Verified Voting, said the hacking might have kept some Americans from voting. “If someone has access to a state voter database, they can take malicious action by modifying or removing information,” she told The Intercept. “This could affect whether someone has the ability to cast a regular ballot or be required to cast a ‘provisional’ ballot — which ... may mean the voter has to jump through certain hoops such as proving their information to the election official before their eligibility is affirmed.”

Note: Why have those who set up our elections allowed private companies to develop software which can be hacked? For undeniable evidence our voting systems have not been safe for years, read summaries of these major media news articles.


Trump Administration Starts Returning Copies of C.I.A. Torture Report to Congress
2017-06-02, New York Times
https://www.nytimes.com/2017/06/02/us/politics/cia-torture-report-trump.html?...

Senators, spies and a president spent years in a pitched battle over how the history is told of one of the most controversial chapters of America’s campaign against terrorism, the detention and interrogation of prisoners in secret C.I.A. jails. Congressional officials said on Friday that the [Trump] administration had begun returning to Congress copies of a 6,700-page Senate report from 2014 about the C.I.A. program. The move raises the possibility that most of the copies could be locked in Senate vaults indefinitely or even destroyed. The classified report [tells] the story of how ... the C.I.A. began capturing terrorism suspects and interrogating them ... beyond the reach of the American judicial and military legal systems. The central conclusion of the report is that the spy agency’s interrogation methods - including waterboarding, sleep deprivation and other kinds of torture - were far more brutal and less effective than the C.I.A. described to policy makers, Congress and the public. The Senate Intelligence Committee, which was run by Democrats when the executive summary was released, sent copies of the entire report to at least eight federal agencies, asking that they incorporate it into their records — a move that would have made the documents subject to requests under the Freedom of Information Act. The agencies all refused to add the report to their records, and instead kept their copies locked up, prompting the American Civil Liberties Union to sue the C.I.A. for access to the full report.

Note: See a revealing New York Times article listing seven key points from this torture report. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.


FBI 'warned MI5 in January that Salman Abedi was planning terror attack in UK'
2017-05-28, The Independent (One of the UK's leading newspapers)
http://www.independent.co.uk/news/uk/home-news/fbi-warned-mi5-january-manches...

British intelligence agency MI5 was reportedly warned by its US counterpart that Salman Abedi was planning an attack on UK soil, three months before he blew himself up outside an Ariana Grande concert in Manchester. FBI agents are said to have informed British officials that the 22-year-old was part of a North African Islamic State cell based in the north west of England that was plotting an attack in the UK. “In early 2017 the FBI told MI5 that Abedi belonged to a North African terror gang based in Manchester, which was looking for a political target in this country," a security source [said]. “The information came from the interception of his communications by US federal agents, who had been investigating Abedi since the middle of 2016, and from information unearthed in Libya, where his family was linked to terrorist groups. “Following this US tip-off, Abedi and other members of the gang were scrutinised by MI5. It was thought at the time that Abedi was planning to assassinate a political figure. But nothing came of this investigation and, tragically, he slipped down the pecking order of targets.” MI5 has faced questions over the fact that Abedi was on its radar but slipped through the net in order to carry out the attack that killed 22 people and seriously injured 64. Police have so far arrested 14 people on suspicion of terror offences in conjunction with the Manchester attack, two of whom have since been released.

Note: Read this revealing article for more evidence that the Manchester atrocity was possibly allowed to happen, or worse. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.


Federal Court Revives Wikimedia’s Challenge to N.S.A. Surveillance
2017-05-23, New York Times
https://www.nytimes.com/2017/05/23/us/politics/nsa-surveillance-warrantless-w...

A federal appeals court on Tuesday revived a high-profile challenge to the National Security Agency’s warrantless surveillance of internet communications. The ruling ... increases the chances that the Supreme Court may someday scrutinize whether the N.S.A.’s so-called upstream system for internet surveillance complies with Fourth Amendment privacy rights. The ruling reversed a Federal District Court judge’s decision to throw out the case. The district judge had ruled that the plaintiffs - including the Wikimedia Foundation - lacked standing to sue because they could not prove that their messages had been intercepted. Because of how the internet works, surveillance of communications crossing network switches is different from traditional circuit-based phone wiretapping. While the government can target a specific phone call without touching anyone else’s communications, it cannot simply intercept a surveillance target’s email. Instead ... to find such emails it is necessary first to systematically copy data packets crossing a network switch and sift them in search of components from any messages involving a target. Documents provided by [Edward] Snowden and declassified by the government have shown that this system works through equipment installed at the facilities of companies, like AT&T, that [connect] the American internet to the rest of the world. Privacy advocates contend that the initial copying and searching of all those data packets ... violates Fourth Amendment protections against government search and seizure.

Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


With New Digital Tools, Even Nonexperts Can Wage Cyberattacks
2017-05-13, New York Times
https://www.nytimes.com/2017/05/13/technology/hack-ransomware-scam-cyberattac...

A decade-old internet scourge called ransomware went mainstream on Friday when cybercriminals seized control of computers around the world, from the delivery giant FedEx in the United States to Britain’s public health system, universities in China and even Russia’s powerful Interior Ministry. Ransomware is nothing new. For years, there have been stories of individuals or companies horrified that they have been locked out of their computers and that the only way back in is to pay a ransom to someone, somewhere who has managed to take control. But computer criminals are discovering that ransomware is the most effective way to make money in the shortest amount of time. Friday’s attacks were a powerful escalation of earlier, much smaller episodes. Hackers exploited a vulnerability in Microsoft servers that was first discovered by the National Security Agency and then leaked online. It allowed the ransomware to spread [to] more than 70,000 organizations. There is even now a concept of “ransomware as a service” - a play on the Silicon Valley jargon “software as a service,” which describes the delivery of software over the internet. Now anyone can visit a web page, generate a ransomware file with the click of a mouse, encrypt someone’s systems and demand a ransom to restore access to the files. If the victim pays, the ransomware provider takes a cut of the payment. Ransomware criminals also have customer service lines that victims can call to get help paying a ransom.

Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


The CIA has a long history of helping to kill leaders around the world
2017-05-05, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/us-news/2017/may/05/cia-long-history-kill-leaders...

[The CIA] has since 1945 succeeded in deposing or killing a string of leaders, but was forced to cut back after a Senate investigation in the 1970s. Some of the most notorious of the CIA’s operations to kill world leaders were those targeting the late Cuban president, Fidel Castro. Attempts ranged from snipers to imaginative plots worthy of spy movie fantasies. But although the CIA attempts proved fruitless in the case of Castro, the US intelligence agency has ... succeeded in deposing or killing a string of leaders elsewhere around the world – either directly or, more often, using sympathetic local military, locally hired criminals or pliant dissidents. On Friday, [North Korea accused] the CIA and South Korea’s intelligence service of being behind an alleged recent assassination attempt on its leader Kim Jong-un. Such a claim cannot be dismissed as totally outlandish – given the long list of US involvement in coups and assassinations worldwide. The agency was forced to cut back on such killings after ... then president Gerald Ford signed in 1976 an executive order stating: “No employee of the United States government shall engage in, or conspire in, political assassination.” In spite of this, the US never totally abandoned the strategy, simply changing the terminology from assassination to targeted killings. A leaked document obtained by WikiLeaks and released earlier this year showed the CIA in October 2014 looking at hacking into car control systems, [potentially allowing] an agent to stage a car crash.

Note: Strong evidence suggests that courageous journalist Michael Hastings was killed when his car controls were hacked causing him to crash head on into a tree. For more along these lines, see concise summaries of deeply revealing news articles on verified or suspected assassinations from reliable major media sources.


What We Know About the CIA’s Midcentury Mind-Control Project
2017-04-13, Smithsonian Magazine
http://www.smithsonianmag.com/smart-news/what-we-know-about-cias-midcentury-m...

In 1953, the then-Director of Central Intelligence officially approved project MKUltra. Originally intended to make sure the United States government kept up with presumed Soviet advances in mind-control technology ... MKUltra has gone down in history as a significant example of government abuse of human rights. The intent of the project was to study “the use of biological and chemical materials in altering human behavior,” according to ... official testimony. Under MKUltra, the CIA gave itself the authority to [experiment on] unwitting test subjects, like drug-addicted prisoners, marginalized sex workers and terminal cancer patients. “The covert testing programs resulted in massive abridgements of the rights of American citizens, sometimes with tragic consequences,” concluded a Senate hearing in 1975-76. MKUltra wasn’t one project, as the US Supreme Court wrote in a 1985 decision. It was 162 different secret projects that were indirectly financed by the CIA, but were “contracted out to various universities ... and similar institutions.” In all, at least 80 institutions and 185 researchers participated, but many didn’t know they were dealing with the CIA. Many of MKUltra’s records were destroyed. But 8,000 pages of records - mostly financial documents that were mistakenly not destroyed in 1973 - were found in 1977. Nobody ever answered for MKUltra. Two lawsuits related to the program reached the Supreme Court, [writes Melissa Blevins for Today I Found Out], “but both protected the government over citizen’s rights.”

Note: Unfortunately, MK-ULTRA is far from the only program to have used humans as guinea pigs in attempts to create more powerful mind control technologies. For more along these lines, see concise summaries of deeply revealing mind control news articles from reliable major media sources.


'We are all entrepreneurs': Muhammad Yunus on changing the world, one microloan at a time
2017-03-28, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/sustainable-business/2017/mar/29/we-are-all-entre...

Muhammad Yunus, the Bangladeshi economist, microfinancing pioneer and founder of the grassroots Grameen Bank, has not been resting on his laurels since wining the Nobel peace prize in 2006. The idea behind his multi award-winning idea of microcredit is that everyone is a natural entrepreneur. “Human beings are not born to work for anybody else,” he says. “For millions of years that we were on the planet, we never worked for anybody. We are go-getters. So this is our tradition. There are roughly 160 million people all over the world in microcredit, mostly women. And they have proven one very important thing: that we are all entrepreneurs. Illiterate rural women in the villages ... take tiny little loans - $30, $40 - and they turn themselves into successful entrepreneurs.” In the mid 70s, as a young economics professor, Yunus experimented with lending a mere $27 to 42 women in the village ... near his university. Banks would not lend to the poor ... and moneylenders charged extortionate rates. His experiment was a success, and he began to develop ... the Grameen Bank. The Grameen Bank today has nine million borrowers, 97% of them women. “They own the bank. It is a bank owned by poor women,” he says. “The repayment rate is 99.6%, and it has never fallen below that in our eight years of experience.” Part of his expansion into rich countries includes a program in the US: 19 branches in 11 cities, including eight in New York.

Note: Learn more about the inspiring microcredit movement helping to reduce inequality while securing financial returns for investors.


Facial recognition database used by FBI is out of control, House committee hears
2017-03-27, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/technology/2017/mar/27/us-facial-recognition-data...

Approximately half of adult Americans’ photographs are stored in facial recognition databases that can be accessed by the FBI, without their knowledge or consent, in the hunt for suspected criminals. About 80% of photos in the FBI’s network are non-criminal entries, including pictures from driver’s licenses and passports. The algorithms used to identify matches are inaccurate about 15% of the time, and are more likely to misidentify black people than white people. These are just some of the damning facts presented at last week’s House oversight committee hearing, where politicians and privacy campaigners criticized the FBI and called for stricter regulation of facial recognition technology at a time when it is creeping into law enforcement and business. The FBI first launched its advanced biometric database ... in 2010, augmenting the old fingerprint database with further capabilities including facial recognition. The bureau did not inform the public ... nor did it publish a privacy impact assessment, required by law, for five years. The FBI made arrangements with 18 different states to gain access to their databases of driver’s license photos. Last year, the US government accountability office (GAO) analyzed the FBI’s use of facial recognition technology and found it to be lacking in accountability, accuracy and oversight. “It doesn’t know how often the system incorrectly identifies the wrong subject,” explained the GAO’s Diana Maurer. “Innocent people could bear the burden of being falsely accused.”

Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.


C.I.A. Developed Tools to Spy on Mac Computers, WikiLeaks Disclosure Shows
2017-03-23, New York Times
https://www.nytimes.com/2017/03/23/technology/cia-spying-mac-computers-wikile...

The C.I.A. developed tools to spy on Mac computers by injecting software into the chips that control the computers’ fundamental operations, according to the latest cache of classified government documents published on Thursday by WikiLeaks. All of the surveillance tools that have been disclosed were designed to be installed on individual phones or computers. But the effects could be much wider. Cisco Systems, for example, warned customers this week that many of its popular routers, the backbone of computer networks, could be hacked using the C.I.A.’s techniques. Julian Assange, the founder of WikiLeaks, has offered to share the precise software code used by the C.I.A.’s cyberweapons with the affected companies. But major tech companies have been reluctant to directly engage with him for fear of violating American laws. The spy software described in the latest documents was designed to be injected into a Mac’s firmware, a type of software preloaded in the computer’s chips. It would then act as a “listening post,” broadcasting the user’s activities to the C.I.A. whenever the machine was connected to the internet. Tools that operate at the chip level can hide their existence and avoid being wiped out by routine software updates. Under an agreement struck during the Obama administration, intelligence agencies were supposed to share their knowledge of most security vulnerabilities with tech companies. The C.I.A. documents suggest that some key vulnerabilities were kept secret.

Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


The Multibillion-Dollar U.S. Spy Agency You Haven’t Heard of
2017-03-20, Foreign Policy
http://foreignpolicy.com/2017/03/20/the-multibillion-dollar-u-s-spy-agency-yo...

In a heavily protected military base some 15 miles south of Washington, D.C., sits the massive headquarters of a spy agency few know exists. The [National Geospatial-Intelligence Agency, or] NGA remains by far the most shadowy member of the Big Five spy agencies, which include the CIA and the National Security Agency. Despite its lack of name recognition, the NGA’s headquarters is the third-largest building in the Washington metropolitan area. The NGA is to pictures what the NSA is to voices. Its principal function is to analyze the billions of images and miles of video captured by drones ... and spy satellites. The agency has never been involved in domestic spy scandals. However, there’s reason to believe that this will change. In March 2016, the Pentagon released the results of an investigation initiated by the Department of Defense’s Office of Inspector General to examine military spy drones in the United States. The report ... revealed that the Pentagon used unarmed surveillance drones over American soil. The investigation also quoted from an Air Force law review article pointing out the growing concern that technology designed to spy on enemies abroad may soon be turned around to spy on citizens at home. In 2016, unbeknownst to many city officials, police in Baltimore began conducting persistent aerial surveillance using a system developed for military use in Iraq. Few civilians have any idea how advanced these military eye-in-the-sky drones have become.

Note: This article was written by former ABC News producer James Bamford, whose 2001 article on Operation Northwoods revealed that the top Pentagon generals signed off on top-secret plans which stated, "We could blow up a U.S. ship in Guantanamo Bay and blame Cuba," and, "casualty lists in U.S. newspapers would cause a helpful wave of national indignation." And showing the level of major media complicity, only ABC News reported on this. For more, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.


Donald Trump gives CIA authority to conduct drone strikes: WSJ
2017-03-14, Sydney Morning Herald/Reuters
http://www.smh.com.au/world/donald-trump-gives-cia-authority-to-conduct-drone...

US President Donald Trump has given the Central Intelligence Agency new authority to conduct drone attacks against suspected militants. The move would be a change from the policy of former President Barack Obama's administration of limiting the CIA's paramilitary role. The United States was the first to use unmanned aircraft fitted with missiles to kill militant suspects in the years after the September 11, 2001, attacks on New York and Washington. Strikes by missile-armed Predator and Reaper drones against overseas targets began under former President George W. Bush and were expanded by Obama. Critics of the targeted killing program question whether the strikes create more militants than they kill. They cite the spread of jihadist organisations and militant attacks throughout the world as evidence that targeted killings may be exacerbating the problem. In July, the US government accepted responsibility for inadvertently killing up to 116 civilians in strikes in countries where America is not at war.

Note: Drone strikes almost always miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.


The real shocker in the WikiLeaks scoop
2017-03-14, Washington Post
https://www.washingtonpost.com/opinions/the-real-shocker-in-the-wikileaks-sco...

WikiLeaks leader Julian Assange’s revelation last week of the CIA’s arsenal of hacking tools had a misplaced tone of surprise. Some scary initial stories argued that the CIA could crack Signal and WhatsApp phone encryption, not to mention your toaster and television. But ... the hardest question here is whether the CIA and other government agencies have a responsibility to disclose to software vendors the holes they discover in computer code, so they can be fixed quickly. This may sound like a no-brainer. The problem is that there’s a global market for “zero-day” exploits (ones that are unknown on the day they’re used). U.S. intelligence agencies buy some of these exploits; so do other countries’ spy services, criminal gangs and the software vendors themselves. A recent report by the Rand Corp. [calculated that] there are about two dozen companies selling or renting exploits to the United States and its allies, with many of these contractors making between $1 million and $2.5 million annually. More than 200 zero-day exploits studied by Rand went undetected for an average of 6.9 years. Given this evidence, Rand argued, “some may conclude that stockpiling zero-days may be a reasonable option” to combat potential adversaries. But let’s be honest: The real shocker in the WikiLeaks scoop is the demonstration ... that the U.S. government can’t keep secrets. It makes little sense for the CIA to argue against disclosing its cyber-tricks to computer companies if this valuable information is going to get leaked ... anyway.

Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


WikiLeaks CIA files: Spy agency looked at ways to hack and control cars to carry out assassinations
2017-03-07, The Independent (One of the UK's leading newspapers)
http://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-cia-d...

WikiLeaks has alleged that the CIA looked into vehicle interference methods that could potentially enable it to assassinate people without detection. According to the whistle-blowing organisation, the CIA explored the tactic in October 2014. It hasn’t included any more details about the alleged practice. WikiLeaks included the claim in its release announcing ‘Vault 7’, a huge batch of documents, which Julian Assange claims to account for the CIA’s “entire hacking capacity”. “As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks,” reads a passage in the release. “The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.” The CIA has also been accused of using malware and hacking tools to turn TVs into covert microphones and remotely break into smartphones. The latter, according to WikiLeaks, allowed it to bypass encryption on a number of popular messaging apps, including WhatsApp. WikiLeaks describes Vault 7 as “the largest intelligence publication in history” and says that the initial batch of 8,761 files is just the first in a series of releases.

Note: See the wikileaks webpage summarizing this most important leak. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


With WikiLeaks Claims of C.I.A. Hacking, How Vulnerable Is Your Smartphone?
2017-03-07, New York Times
https://www.nytimes.com/2017/03/07/technology/cia-hacking-documents-wikileaks...

WikiLeaks on Tuesday released a significant cache of documents that it said came from a high-security network inside the Central Intelligence Agency. WikiLeaks called the documents Vault 7, and they lay out the capabilities of the agency’s global covert hacking program. By the end of 2016, the C.I.A. program had 5,000 registered users, including government employees and contractors, [and] had produced more than a thousand hacking systems. The files have circulated among former United States government hackers and contractors in “an unauthorized manner, one of whom provided WikiLeaks with portions of the archive,” WikiLeaks said. The software targeted by the hacking program included the most popular smartphone operating systems. Apple’s iPhone software ... was a particular target, including the development of several “zero day” exploits - a term for attacking coding flaws the company would not have known about. Google’s Android ... received even more attention. By 2016, the C.I.A. had 24 weaponized Android “zero day” software programs. The C.I.A. also targeted ... internet-connected computers and home and industrial devices running the Linux operating system. In 2010, the Obama administration promised to disclose newly discovered vulnerabilities to companies like Apple, Google and Microsoft. But the WikiLeaks documents indicate that the agency found security flaws, kept them secret and then used them for surveillance and intelligence gathering.

Note: See the wikileaks webpage summarizing this most important leak. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.


Rumblings of a ‘Deep State’ Undermining Trump? It Was Once a Foreign Concept
2017-03-06, New York Times
https://www.nytimes.com/2017/03/06/us/politics/deep-state-trump.html?_r=0

President Trump’s allegations that former President Barack Obama tapped his phone and his assertions that the bureaucracy is leaking secrets to discredit him are the latest signs of a White House preoccupation with a “deep state” working to thwart the Trump presidency. “A deep state [is] part of government or people outside of government that are literally controlling the direction of the country no matter who’s actually in charge, and probably engaging in murder and other corrupt practices,” [former National Security Council official Loren DeJonge] Schulman said. The deep state is a phrase often heard in countries where there is a history of military coups. Pakistan is Exhibit A: The deep state is often invoked in serious discussions about the role of the Pakistani military and its intelligence service. Wide swaths of the population see the unseen hand of the security services behind major political events and all kinds of everyday happenings, such as random traffic stops. The views are not without basis. “The deep state concept emerges in places where the army and the security apparatus creates boundaries within which the civilian political people are allowed to operate,” said Peter Feaver, a specialist in civil-military issues. “If they transgress those boundaries, then the deep state interferes to reorder things, often using military force. There are milder forms of it in healthier democracies,” Mr. Feaver said.

Note: A 2014 Boston Globe article suggests that US policy in the national security realm is made by "concealed institutions" rather than by elected officials. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and in the intelligence community.


Berta Cáceres court papers show murder suspects' links to US-trained elite troops
2017-02-28, The Guardian (One of the UK's leading newspapers)
https://www.theguardian.com/world/2017/feb/28/berta-caceres-honduras-military...

Leaked court documents raise concerns that the murder of the Honduran environmentalist Berta Cáceres was an extrajudicial killing planned by military intelligence specialists linked to the country’s US–trained special forces. Cáceres was shot dead a year ago while supposedly under state protection after receiving death threats over her opposition to a hydroelectric dam. The murder of Cáceres, winner of the prestigious Goldman environmental prize in 2015, prompted international outcry and calls for the US to revoke military aid to Honduras, a key ally in its war on drugs. Eight men have been arrested in connection with the murder, including one serving and two retired military officers. Officials have denied state involvement in the activist’s murder, and downplayed the arrest of the serving officer Maj Mariano Díaz. But ... Díaz, a decorated special forces veteran, was appointed chief of army intelligence in 2015. Another suspect, Lt Douglas Giovanny Bustillo joined the military on the same day as Díaz. Díaz and Bustillo both received military training in the US. A third suspect, Sgt Henry Javier Hernández, was a former special forces sniper, who had worked under the direct command of Díaz. Last year, the Guardian reported that a former Honduran soldier said he had seen Cáceres’s name on a hitlist that was passed to US-trained units. Sgt Rodrigo Cruz said that two elite units were given lists featuring the names and photographs of activists – and ordered to eliminate each target.

Note: The Western Hemisphere Institute for Security Cooperation, formerly known as the School of the Americas, reportedly graduated more than 500 human rights abusers. The identities of many other US-trained troops operating in other countries remain hidden by US courts. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.


Trump's First Terror Arrest: A Broke Stoner The FBI Threatened at Knifepoint
2017-02-22, The Intercept
https://theintercept.com/2017/02/22/trumps-first-terror-arrest-a-broke-stoner...

The Department of Justice proudly announced the first FBI terror arrest of the Trump administration on Tuesday: an elaborate sting operation that snared a 25-year-old Missouri man who had no terrorism contacts besides the two undercover FBI agents who paid him to buy hardware supplies they said was for a bomb - and who at one point pulled a knife on him and threatened his family. Robert Lorenzo Hester of Columbia, Missouri, didn’t have the $20 he needed to buy the 9-volt batteries, duct tape, and roofing nails his new FBI friends wanted him to get, so they gave him the money. The agents noted in a criminal complaint that Hester, who at one point brought his two small children to a meeting because he didn’t have child care, continued smoking marijuana despite professing to be a devout Muslim. But according to the DOJ press release, Hester had plans to conduct an “ISIS-sponsored terrorist attack” on President’s Day that would have resulted in mass casualties had it succeeded. News reports breathlessly echoed the government’s depiction of Hester as a foiled would-be terrorist. But the only contact Hester had with ISIS was with the two undercover agents. There appears to be little to suggest that [Hester] had the wherewithal or capacity to carry out a terrorist attack. His case is similar to many others in which individuals in financial, legal, or psychological distress have been befriended by undercover FBI agents or government informants and coaxed into developing a terrorist plot.

Note: The FBI has been stepping up its use of stings in ISIS cases. Read how an FBI mole posing as a potential lover recently convinced a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?


The price of loyalty to Trump is high and rising
2017-02-17, Washington Post
https://www.washingtonpost.com/news/powerpost/paloma/daily-202/2017/02/17/dai...

Last week, Trump blocked Rex Tillerson from hiring Elliott Abrams as his deputy at the State Department after someone brought to his attention critical comments he had made during the campaign. That happened despite a job interview that had gone well. Last night, Robert Harward turned down Trump’s offer to replace Michael Flynn as national security adviser. One key factor in Harward's decision to turn down the job was that he couldn't get a guarantee that he could select his own staff. Specifically ... Harward wanted commitments that the National Security Council would be fully in charge of security matters, not Trump's political advisers. Just yesterday, Secretary of State Rex Tillerson’s enforcers at the State Department laid off staff at Foggy Bottom while the secretary traveled in Europe. Much of seventh-floor staff, who work for the Deputy Secretary of State for Management and Resources and the Counselor offices, were told ... that their services were no longer needed. These staffers in particular are often the conduit between the secretary’s office to the country bureaus, where the regional expertise is centered. Inside the State Department, some officials fear that this is a politically-minded purge that cuts out much-needed expertise from the policy-making, rather than simply reorganizing the bureaucracy. Ambassador Kristie Kenney, the Counselor of the State Department and one of the last remaining senior officials, was [also] informed that she will be let go. Also noteworthy: Not a single State Department official was included in the White House meetings with Israeli Prime Minister Benjamin Netanyahu this week.

Note: While simple politics or government corruption may be responsible for this high-level reshuffling, this video interview with former CIA agent Robert David Steele suggests there is much more going on behind the scenes.


Son of Pablo Escobar: "My father worked for the CIA"
2017-02-12, MSN News (Spanish language edition)
https://www.msn.com/es-xl/noticias/mundo/hijo-de-pablo-escobar-%E2%80%9Cmi-pa...

Juan Pablo Escobar, the son of the most dangerous criminal in the history of Colombia, Pablo Escobar, has written a new book on the life and death of his father in which he said that the drug trafficker worked for the CIA. "In my book, I recount the story of my father working for the CIA selling cocaine to finance the fight against communism in Central America. There are names like George Bush Sr. and many more," said Escobar. "The drug business is very different from what you might imagine. The CIA was buying control of the drug supply going into each country and making huge profits. My father was a cog in their global drug trafficking network. When he no longer served them, they had him killed," said Juan Pablo Escobar. Remember that Bush was chief of the CIA in the administration of Richard Nixon. In his book Pablo Escobar Infraganti, the son of Escobar, known until 2009 by the name of Juan Sebastián Marroquín, reveals the corruption stories that made his father so "successful," despite the violence in which he immersed Colombia. Juan Pablo Escobar rejected the idea of glamorizing the drug trafficking business as portrayed in series like Narcos, of Netflix, which deal with the lives of the drug dealers and hitmen that worked for his father. "It is not true that a drug kingpin has riches, girls and power. The more power my father had, the poorer he lived, " he said.

Note: This article is in Spanish on the msn.com website at the link above, yet the English major media is completely ignoring it, including MSN, which has no English version of the article. For more, read this article. For excellent evidence of CIA involvement in drug running, see what two top journalists have written. For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.