Intelligence Agency Corruption News Articles
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Findings of the Select Committee on Assassinations in the Assassination of President John F. Kennedy in Dallas, Tex., November 22, 1963. Scientific acoustical evidence establishes a high probability that two gunmen fired at President John F. Kennedy. Other scientific evidence does not preclude the possibility of two gunmen firing at the President. The committee believes, on the basis of the evidence available to it, that President John F. Kennedy was probably assassinated as a result of a conspiracy. The committee is unable to identify the other gunman or the extent of the conspiracy. The [original] investigation into the possibility of conspiracy in the assassination was inadequate. The conclusions of the investigations were arrived at in good faith, but presented in a fashion that was too definitive. The Department of Justice failed to exercise initiative in supervising and directing the investigation by the Federal Bureau of Investigation of the assassination. The Federal Bureau of Investigation failed to investigate adequately the possibility of a conspiracy to assassinate the President. The Central Intelligence Agency was deficient in its collection and sharing of information both prior to and subsequent to the assassination. The Warren Commission failed to investigate adequately the possibility of a conspiracy to assassinate the President.
Note: This sameUS Congressional report, on the subject of the Martin Luther King, Jr. assassination, states that "The committee believes, on the basis of the circumstantial evidence available to it, that there is a likelihood that James Earl Ray assassinated Dr. Martin Luther King asa result of a conspiracy." Why hasn't this information been widely reported and become public knowledge? Explore apossible answer. For more along these lines, see concise summaries of deeply revealing news articles on assassinations from reliable major media sources.
A posthypnotic of the night before (pointed finger, you will sleep) was enacted. Misses [deleted] and [deleted] immediately progressed to a deep hypnotic state with no further suggestion. Miss [deleted] was then instructed (having previously expressed a fear of firearms in any fashion) that she would use every method at her disposal to awaken Miss [deleted] (now in a deep hypnotic sleep) and failing this, she would pick up a pistol nearby and fire it at Miss [deleted]. She was instructed that her rage would be so great that she would not hesitate to kill [deleted] for failing to awaken. Miss [deleted] carried out these suggestions to the letter including firing the (unloaded) gun at [deleted] and then proceeding to fall into a deep sleep. Both were awakened and expressed complete amnesia for the entire sequence. Miss [deleted] was again handed the gun, which she refused (in an awakened state) to pick up or accept from the operator. She expressed absolute denial that the foregoing sequence had happened.
Note: This text is quoted from page 1 of declassified CIA document MORI ID 190691. To verify the statement in the text, make a FOIA (Freedom of Information Act) request as described here, or directly view a scanned copy online here. To access thousands of pages of declassified CIA mind control documents online, click here. For lots more reliable information on this crucial topic, click here. For many revealing news articles on mind control, click here.
For nearly nine months the congressional investigations of the Central Intelligence Agency have been conducted behind closed doors. In the old Senate caucus room the ten members of the select Senate committee were questioning CIA officials, including Director William Colby and the deputy director for science and technology, Sayre Stevens, about 11 gm. of shellfish toxin and 8 mg. of cobra venom discovered last May in a CIA storeroom. Colby revealed that the agency in 1952 began a supersecret research program, code-named M.K. Naomi, partly to find countermeasures to chemical and biological weapons that might be used by the Russian KGB. CIA researchers ... came up with an array of James Bond weaponry that could use the shellfish toxin and other poisons as ammunition. To illustrate his testimony, Colby handed a pistol to Committee Chairman Frank Church. Resembling a Colt .45 equipped with a fat telescopic sight, the gun fires a toxin-tipped dart, almost silently and accurately up to 250 ft. Moreover, the dart is so tinythe width of a human hair and a quarter of an inch longas to be almost indetectable, and the poison leaves no trace in a victim's body. Charles Senseney, an engineer for the Defense Department, told the Senators that he had devised dart launchers that were disguised as walking canes and umbrellas.
Note: This silent, lethal dart gun causes what looks like a natural heart attack. If this sophisticated assassination technology was available back in 1975, what kind of secret weapons do you think they have now? To watch an incredible one-minute video clip on this dart gun, click here. To watch the full, highly revealing Warner Brothers documentary Secrets of the CIA, click here. For other riveting major media articles along these lines, click here.
Project Blue Book was the code name for an Air Force program set up in 1952 ... to explain away or debunk as many [UFO] reports as possible in order to mitigate possible panic and shield the public from a genuine national security problem. The prominent astronomer J. Allen Hynek ... was recruited as Blue Books scientific consultant and was indeed initially committed to explaining away flying saucers as natural phenomena or mistaken identifications. Hynek, the former U.F.O. skeptic, eventually concluded that they were a real phenomenon in dire need of scientific attention, with hundreds of cases in the Blue Book files still unexplained. Even many of the closed cases were resolved with ridiculous, often infuriating explanations, sometimes by Hynek himself. Blue Book compiled reports of 12,618 sightings of unidentified flying objects, of which 701 remain unexplained to this day. The mystery of the elusive flying objects is still far from solved. In 1947. Lt. General Nathan Twining ... sent a secret memo on Flying Discs to the commanding general of the Army Air Forces at the Pentagon. Twining stated that the phenomenon reported is something real and not visionary or fictitious. Documents show the C.I.A. then devised a plan for a national policy, as to what should be told the public regarding the phenomenon, in order to minimize risk of panic. The C.I.A. issued a secret report recommending a broad educational program for all intelligence agencies, with the aim of training and debunking. When Blue Book closed in late 1969, the Air Force flatly lied to the American people.
Note: For more along these lines, see concise summaries of deeply revealing news articles on a UFO cover-up from reliable major media sources. Then explore the excellent, reliable resources provided in our UFO Information Center.
The U.S. government [planned] false flag attacks with Soviet aircraft to justify war with the USSR or its allies, newly declassified documents surrounding the assassination of President John F. Kennedy show. In a three-page memo, members of the National Security Council wrote, "There is a possibility that such aircraft could be used in a ... provocation operation in which Soviet aircraft would appear to attack US or friendly installations to provide an excuse for U.S. intervention." The memo shows that the department, along with the CIA, considered buying Soviet aircraft to stage the attacks, even getting estimates from the Air Force on how long it would take and how much it would cost to produce the planes domestically and covertly. The document also outlined the possibility of purchasing such aircraft from non-Soviet Bloc countries that had received planes from the USSR, or from pilots that had defected, instead of building them domestically. The CIA deemed those plans too risky. It is unclear when the memo was written or circulated. The NSC staff mention a meeting on March 22, 1962, when a "Special Group" discussed the attorney general's questions about acquiring Soviet aircraft. The document was last reviewed by the CIA in February 1998, and a stamp shows it was declassified in March 2016. But, strangely, the document's cover letter shows a date of "00/00/00."
Note: ABC News back in 2001 was the only major media to report on Operation Northwoods, which is the code name for a very similar plan, when the first documents on this were declassified. As these earlier documents show, the plan was approved by the top Pentagon chiefs to create a pretext for war with Cuba by sinking an American ship in the Havana harbor or creating a "terror campaign" in cities like Miami and Washington D.C. Why was this stunning news only reported by ABC? For a possible reason, see this excellent summary of testimony by major media whistleblowers.
Wikipedia is part of the very internet developed by the military with public money in the 1950s-60s, then called ARPANET. Generally speaking, corporations hope that the systems developed in the military that evolve in the public-corporate realm—satellites, computers, data analysis, etc.—will inspire new military-intelligence innovations in a permanent feedback loop. The overarching “values” [of Wikipedia] and its contributors—mainly young, white, middle-class liberals—will reflect those “values”. They include progressive slogans but reactionary policies, humanitarianism but pro-war positions, and conformity to consensus opinion even when the consensus is wrong (e.g., “regime change” in Libya and Syria). By 2006, the Intelligence Community had developed its own Intellipedia. A Top Secret report released under a FOIA request instructed intelligence officers how to edit Wikipedia’s entry on MK-ULTRA, the CIA’s mind control program (1953-circa 1970s), for Intellipedia. Funded by weapons contractors like BAE Systems and Boeing, and until recently led by people like Katherine Maher, ex-World Banker and Fellow of the Truman National Security Project, which exists to promote “US values” at home and abroad, the Wikimedia Foundation that enables Wikipedia does not exist in a vacuum. Wikipedia does not present unbiased, scholarly encyclopedia entries. It is as much part of the military-industrial-complex as mainstream corporate media.
Note: Some Wikipedia entries have been professionally manipulated. Watch a fascinating video with Larry Sanger, the co-founder of Wikipedia, who now says he no longer trusts the website he's helped created. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Facial recognition has become a security feature of choice for phones, laptops, passports, and payment apps. Yet it is also, increasingly, a tool of state oppression and corporate surveillance. Immigration and Customs Enforcement and the FBI have deployed the technology as a digital dragnet, searching for suspects among millions of faces in state driver’s license databases, sometimes without first seeking a court order. In early 1963, [Woody Bledsoe] proposed to conduct “a study to determine the feasibility of a simplified facial recognition machine.” A recently declassified history of the CIA’s Office of Research and Development mentions just such a project in 1965; that same year, Woody sent a letter on facial recognition to John W. Kuipers, the division’s chief of analysis. In 1967 ... Woody took on one last assignment that involved recognizing patterns in the human face. The purpose of the experiment was to help law enforcement agencies quickly sift through databases of mug shots and portraits, looking for matches. As before, funding for the project appears to have come from the US government. A 1967 document declassified by the CIA in 2005 mentions an “external contract” for a facial-recognition system that would reduce search time by a hundredfold. Woody’s work set an ethical tone for research on facial recognition that has been enduring and problematic. The potential abuses of facial-recognition technology were apparent almost from its birth.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
[We've] been narrowly saved from lethal terrorist plots in recent years or so it has seemed. A would-be suicide bomber was intercepted on his way to the Capitol; a scheme to bomb synagogues and shoot Stinger missiles at military aircraft was developed by men in Newburgh, N.Y.; and a fanciful idea to fly explosive-laden model planes into the Pentagon and the Capitol was hatched in Massachusetts. But all these dramas were facilitated by the F.B.I., whose undercover agents and informers posed as terrorists offering a dummy missile, fake C-4 explosives, a disarmed suicide vest and rudimentary training. Suspects naively played their parts until they were arrested. When an Oregon college student ... thought of using a car bomb to attack a festive Christmas-tree lighting ceremony in Portland, the F.B.I. provided a van loaded with six 55-gallon drums of inert material, harmless blasting caps, a detonator cord and a gallon of diesel fuel. An undercover F.B.I. agent even did the driving, with Mr. Mohamud in the passenger seat. To trigger the bomb the student punched a number into a cellphone and got no boom, only a bust. Typically, the stings initially target suspects for pure speech comments to an informer outside a mosque, angry postings on Web sites, e-mails with radicals overseas then woo them into relationships with informers, who are often convicted felons [or] F.B.I. agents posing as members of Al Qaeda or other groups. This is legal, but is it legitimate? Without the F.B.I., would the culprits commit violence on their own? Is cultivating potential terrorists the best use of the manpower designed to find the real ones?
Note: Read the entire article to find out just how far the FBI will go to entrap incompetent individuals. To read a New York Times article showing that the 1993 World Trade Center bombing involved similar entrapment, only the bomber was not stopped by knowing FBI agents, click here. More on that available here. For reports on other crazy cases of FBI entrapment, click here and here. For reliable, verifiable information suggesting 9/11 may have been facilitated in some way click here.
The New York Times's explanation of its decision to report, after what it said was a one-year delay, that the National Security Agency is eavesdropping domestically without court-approved warrants was woefully inadequate. And I have had unusual difficulty getting a better explanation for readers, despite the paper's repeated pledges of greater transparency. For the first time since I became public editor, the executive editor and the publisher have declined to respond to my requests for information about news-related decision-making. My queries concerned the timing of the exclusive Dec. 16 article about President Bush's secret decision in the months after 9/11 to authorize the warrantless eavesdropping on Americans in the United States. I e-mailed a list of 28 questions to Bill Keller, the executive editor [of the New York Times], on Dec. 19, three days after the article appeared. He promptly declined to respond to them. I then sent the same questions to Arthur Sulzberger Jr., the publisher, who also declined to respond. They held out no hope for a fuller explanation in the future. The top Times people involved in the final decisions [are] refusing to talk and urging everyone else to remain silent.
Sidney Gottlieb, who presided over the Central Intelligence Agency's cold-war efforts to control the human mind and provided the agency poisons to kill Fidel Castro, died on Sunday. He ... spent his later years caring for dying patients ... and fighting lawsuits from survivors of his secret tests. He will always be remembered as the Government chemist who dosed Americans with psychedelics in the name of national security. Mr. Gottlieb joined the C.I.A. in 1951. Two years later, the agency established MKUltra and Mr. Gottlieb was running it. He served two decades as the senior scientist presiding over some of the C.I.A.'s darkest secrets. The first of these were the LSD experiments. Mr. Gottlieb was fascinated by the drug [and] took it hundreds of times. In the 1950's and early 1960's, the agency gave mind-altering drugs to hundreds of unsuspecting Americans in an effort to explore the possibilities of controlling human consciousness. In one case, a mental patient in Kentucky was dosed with LSD continuously for 174 days. Other experiments involved agency employees, military officers and college students. In all, the agency conducted 149 separate mind-control experiments, and as many as 25 involved unwitting subjects. At least one participant died, others went mad, and still others suffered psychological damage after participating in the project, known as MK Ultra. The C.I.A. ... deliberately destroyed most of the MKUltra records in 1973. Mr. Gottlieb was also involved in the C.I.A.'s assassination plots. [He] developed a poison handkerchief to kill an Iraqi colonel, an array of toxic gifts to be delivered to Fidel Castro, and a poison dart to kill a leftist leader in the Congo.
Note: Read more about the CIA'sMK-ULTRA program. For more along these lines, see concise summaries of deeply revealingnews articles on mind controlfrom reliable major media sources. Then explore the excellent, reliable resources provided in ourMind Control Information Center.
Four years ago ago, officers of the Central Intelligence Agency and National Security Agency participated in a series of unusual experiments run by Stanford Research Institute (SRI) to verify claims that certain people have psychic abilities. The results ... were astonishing. The SRI investigators, physicists Harold E. Puthoff (a former NSA research engineer) and Russell Targ, set out to demonstrate to their CIA sponsor that their subjects, a noted psychic named Ingo Swann and ... Pat Price, could describe distant locations merely by knowing which geographic coordinates to "look at." Puthoff and Targ [call this] "remote viewing." In one case, Swann described and sketched with reasonable accuracy a target island in the South Indian Ocean. In another instance, Pat Price gave an incredibly detailed description of a supposedly secret, underground military installation in Virginia. "Hell, there's no security left," a government security officer exclaimed upon hearing of Price's alleged success at psychic spying. One of Ingo Swann's remote viewing demonstrations at SRI was to pinpoint the location of Soviet submarines around the world. The CIA scientist monitoring the tests ... believed he had a potential class A espionage agent who could roam psychically anywhere in the world – in effect, the perfect spy. For the past 25 years, various branches of the military and intelligence communities have actively investigated this highly controversial field of parapsychology. There is particular concern ... that the Russians are able telepathically to influence the behavior of others, alter their emotions or health, knock them out or even kill. CIA psychologists are swamped with proposals for psychic studies.
Note: This article strangely is not to be found anywhere in the online archives of the Washington Post. It is still available for a fee in the archives of smaller newspapers which published the article. The amazing entire article can be found free at the link above. For lots more along these lines, see a wealth of reliable videos and information on remote viewing. And a great documentary "Third Eye Spies" on remote viewing can be found here. Then explore the excellent, reliable resources provided in our Mind Control Information Center.
A new biography by Stephen Kinzer ... "Poisoner in Chief: Sidney Gottlieb and the CIA Search for Mind Control" ... traces the life and career of Gottlieb. [He was] the brains behind ... MK-ULTRA, the notorious research endeavor that employed mind-altering drugs, including LSD. In 1952, Gottlieb led a team of scientists to a safehouse in Munich ... where prisoners of war were pumped full of drugs, interrogated and then allowed to die. [Back in the U.S.,] Gottlieb worked with a sadistic narcotics officer in opening a “national security whorehouse” to dose unwitting victims being serviced by prostitutes on the C.I.A. payroll. Drugging johns was easy, but when Gottlieb started dosing unwitting government colleagues the research hit turbulence. Frank Olson, an Army scientist working with MK-ULTRA who had been given LSD without his knowledge, jumped, or was possibly pushed, out of a hotel room window in New York in 1953. [Olson's story is] covered most recently in [the] docudrama “Wormwood.” His death has overshadowed the “expendables.” We just don’t know most of their names since Gottlieb destroyed the records. Some of the details in the book, like the coercion of African-American prisoners to participate in C.I.A. experiments, are astounding. [MK-ULTRA] should be remembered for what it was: a vehicle for abominable experiments that often targeted the most vulnerable — drug users, prisoners and psychiatric patients, who were deprived of meaningful informed consent. Kinzer’s book is also a good reminder that there is rarely legal accountability for the C.I.A.’s misdeeds.
Note: Explore concise excerpts from the astounding declassified CIA documents on MK-ULTRA. They reveal a very successful program to create Manchurian Candidates or spies who don't know they are spies. The Times' title of this article implies that the CIA is no longer into mind control. If you think that is true, think again. For more along these lines, see concise summaries of deeply revealing news articles on mind control from reliable major media sources. Then explore the excellent, reliable resources provided in our Mind Control Information Center.
There are three basic problems with the CIA: its objectives, methods, and unaccountability. In effect, the CIA is a secret army of the U.S., capable of creating mayhem across the world with no accountability whatsoever. When President Dwight Eisenhower decided that Africa’s rising political star, democratically elected Patrice Lumumba of Zaire (now the Democratic Republic of Congo), was the “enemy,” the CIA conspired in his 1961 assassination, thus undermining the democratic hopes for Africa. The CIA has been held to serious public account just once, in 1975. In that year, Idaho Senator Frank Church led a Senate investigation that exposed the CIA’s shocking rampage of assassinations, coups, destabilization, surveillance, and Mengele-style torture and medical “experiments.” Since 1975, the CIA has run secretive operations backing Islamic jihadists in Afghanistan that utterly wrecked Afghanistan while giving rise to al-Qaeda. The CIA has likely run secretive operations in the Balkans against Serbia, in the Caucuses against Russia, and in Central Asia targeting China, all deploying CIA-backed jihadists. In the 2010s, the CIA ran deadly operations to topple Syria’s Bashir al-Assad, again with Islamic jihadists. For at least 20 years, the CIA has been deeply involved in fomenting the growing catastrophe in Ukraine, including the violent overthrow of Ukraine’s President Viktor Yanukovych in February 2014 that triggered the devastating war now engulfing Ukraine.
Note: Learn more about the rise of the CIA in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
A whistleblower has come forward with an explosive new trove of documents. They describe the activities of an “anti-disinformation” group called the Cyber Threat Intelligence League, or CTIL, that officially began as the volunteer project of data scientists and defense and intelligence veterans but whose tactics over time appear to have been absorbed into ... those of the Department of Homeland Security (DHS). In 2019, US and UK military and intelligence contractors ... developed the sweeping censorship framework. CTIL ... partnered with [Cybersecurity and Infrastructure Security Agency] (CISA) in the spring of 2020. CTIL’s approach to “disinformation” went far beyond censorship. The group engaged in offensive operations to influence public opinion, discussing ways to promote “counter-messaging,” co-opt hashtags, dilute disfavored messaging, create sock puppet accounts, and infiltrate private invite-only groups. The ambitions of the 2020 pioneers of the Censorship Industrial Complex went far beyond simply urging Twitter to slap a warning label on Tweets, or to put individuals on blacklists. The [Adversarial Misinformation and Influence Tactics and Techniques] framework calls for discrediting individuals as a necessary prerequisite of demanding censorship against them. It calls for training influencers to spread messages. And it calls for trying to get banks to cut off financial services to individuals who organize rallies or events. [CTIL] laments that governments and corporate media no longer have full control of information. “For a long time, the ability to reach mass audiences belonged to the nation-state (e.g. in the USA via broadcast licensing through ABC, CBS and NBC). Now, however, control of informational instruments has been allowed to devolve to large technology companies who have been blissfully complacent and complicit in facilitating access to the public for information operators at a fraction of what it would have cost them by other means.”
Note: The extensive collusion between Big Tech and government officials to censor COVID information is barely beginning to come to light. For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
The “Twitter files” revealed an FBI operation to monitor and censor social media content. Dozens of FBI employees worked on the identification and removal of material on a wide range of subjects and that Twitter largely carried out their requests. Nor was it just the FBI, apparently. Emails reveal FBI figures like a San Francisco assistant special agent in charge asking Twitter executives to “invite an OGA” (or “Other Government Organization”) to an upcoming meeting. A week later, Stacia Cardille, a senior Twitter legal executive, indicated the OGA was the CIA, an agency under strict limits regarding domestic activities. Twitter’s own ranks included dozens of ex-FBI agents and executives. The dozens of disclosed emails ... do not include still-undisclosed but apparent government coordination with Facebook and other social media companies. Much of that work apparently was done through the multi-agency Foreign Influence Task Force (FITF), which operated secretly it seems to censor citizens. This is a First Amendment violation. The Twitter files have substantiated long-standing concerns over “censorship by surrogate” or proxy. As with other amendments like the Fourth Amendment, which protects against unreasonable searches or seizures, the government cannot use private agents to do indirectly what it cannot do directly. Just as a police officer cannot direct a security guard to break into an apartment and conduct a search, the FBI cannot use Twitter to censor Americans.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
A large number of ex-officers from the FBI, CIA, NSC, and State Department have taken positions at Facebook, Twitter, and Google. The revelation comes amid fears the FBI operated control over Twitter censorship and the Hunter Biden laptop story. The Twitter files have revealed the close relationship with the FBI, how the Bureau regularly demanded accounts and tweets be banned and suspicious contact before the Hunter laptop story was censored. The documents detailed how so many former FBI agents joined Twitter's ranks over the past few years that they created their own private Slack channel. A report by Mint Press' Alan MacLeod identified dozens of Twitter employees, who had previously held positions at the Bureau. He also found that former CIA agents made up some of the top ranks in almost every politically-sensitive department at Meta, the parent company of Facebook, Instagram, and WhatsApp. And in another report, MacLeod detailed the extent to which former CIA agents started working at Google. DailyMail.com has now been able to track down nine former CIA agents who are working, or have worked, at Meta, including Aaron Berman, the senior policy manager for misinformation at the company who had previously written the president's daily briefings. Six others have worked for other intelligence agencies before joining the social media giant, many of whom have posted recently about Facebook's efforts to tamp down on so-called 'covert influence operations.'
Note: Explore a deeper analysis on the ex-CIA agents at Facebook and at Google. Additionally, read how Big Tech censors social media on behalf of corporate and government interests. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
The Department of Homeland Security is quietly broadening its efforts to curb speech it considers dangerous, an investigation by The Intercept has found. The work, much of which remains unknown to the American public, came into clearer view earlier this year when DHS announced a new “Disinformation Governance Board”: a panel designed to police misinformation (false information spread unintentionally), disinformation (false information spread intentionally), and malinformation (factual information shared, typically out of context, with harmful intent) that allegedly threatens U.S. interests. While the board was widely ridiculed, immediately scaled back, and then shut down within a few months, other initiatives are underway as DHS pivots to monitoring social media now that its original mandate — the war on terror — has been wound down. Behind closed doors, and through pressure on private platforms, the U.S. government has used its power to try to shape online discourse. Discussions have ranged from the scale and scope of government intervention in online discourse to the mechanics of streamlining takedown requests for false or intentionally misleading information. There is also a formalized process for government officials to directly flag content on Facebook or Instagram and request that it be throttled or suppressed through a special Facebook portal that requires a government or law enforcement email to use. How disinformation is defined by the government has not been clearly articulated.
Note: The Department of Homeland Security's Disinformation Governance Board has been paused, not stopped. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
While Facebook has long sought to portray itself as a "town square" that allows people from across the world to connect, a deeper look into its apparently military origins and continual military connections reveals that the world's largest social network was always intended to act as a surveillance tool to identify and target domestic dissent. LifeLog was one of several controversial post-9/11 surveillance programs pursued by the Pentagon’s Defense Advanced Research Projects Agency (DARPA) that threatened to destroy privacy and civil liberties in the United States. LifeLog sought to .. build a digital record of "everything an individual says, sees, or does." In 2015, [DARPA architect Douglas] Gage told VICE that "Facebook is the real face of pseudo-LifeLog." He tellingly added, “We have ended up providing the same kind of detailed personal information without arousing the kind of opposition that LifeLog provoked.” A few months into Facebook's launch, in June 2004, Facebook cofounders Mark Zuckerberg and Dustin Moskovitz [had] its first outside investor, Peter Thiel. Thiel, in coordination with the CIA, was actively trying to resurrect controversial DARPA programs. Thiel formally acquired $500,000 worth of Facebook shares and was added its board. Thiel's longstanding symbiotic relationship with Facebook cofounders extends to his company Palantir, as the data that Facebook users make public invariably winds up in Palantir's databases and helps drive the surveillance engine Palantir runs for a handful of US police departments, the military, and the intelligence community.
Note: Consider reading the full article by investigative reporter Whitney Webb to explore the scope of Facebook's military origins and the rise of mass surveillance. Read more about the relationship between the national security state and Google, Facebook, TikTok, and the entertainment industry. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. Today, [The Intercept is] publishing [a document from GCHQ's previously secret unit, JTRIG, the Joint Threat Research Intelligence Group], entitled "The Art of Deception: Training for Online Covert Operations." Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: "false flag operations" (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting "negative information" on various forums. Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House's former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-"independent" advocates to "cognitively infiltrate" online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into "chat rooms, online social networks, or even real-space groups" which spread what he views as false and damaging "conspiracy theories" about the government.
Note: To see a guidebook developed by intelligence agencies full of charts and information on how to infiltrate and deceive the public, click here. The Intercept is a media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for their independence. Note that Greenwald fails to mention that Sunstein's almost exclusive focus was on "conspiracy theories" advocated by the 9/11 truth movement. For more on his call for what amounts to a new COINTELPRO, see David Ray Griffin's book Cognitive Infiltration.
Imagine a global spying network that can eavesdrop on every single phone call, fax or e-mail, anywhere on the planet. It sounds like science fiction, but it's true. Two of the chief protagonists - Britain and America - officially deny its existence. But the BBC has confirmation from the Australian Government that such a network really does exist. The base is linked directly to the headquarters of the US National Security Agency (NSA) at Fort Mead in Maryland, and it is also linked to a series of other listening posts scattered across the world, like Britain's own GCHQ. The power of the network, codenamed Echelon, is astounding. Every international telephone call, fax, e-mail, or radio transmission can be listened to by powerful computers capable of voice recognition. They home in on a long list of key words, or patterns of messages. The network is so secret that the British and American Governments refuse to admit that Echelon even exists. But another ally, Australia, has decided not to be so coy. The man who oversees Australia's security services, Inspector General of Intelligence and Security Bill Blick, has confirmed to the BBC that their Defence Signals Directorate (DSD) does form part of the network. Asked if they are then passed on to countries like Britain and America, he said: "They might be in certain circumstances." They are looking for evidence of international crime, like terrorism. But the system is so widespread all sorts of private communications, often of a sensitive commercial nature, are hoovered up and analysed.
Note that this is a 1999 article, long before the revelations of Edward Snowden. The capability to monitor all communications has existed for a long time. For a powerful, well documented 20-page paper in the Federal Communications Law Journal providing strong evidence that this program is unconstitutional, click here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.