Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Hunter Biden was hit with a double whammy Wednesday. First, a new filing by the prosecution in his upcoming gun-felony trial in Delaware poured scorn on Hunter's legal team's bizarrely persistent denial that his laptop and its contents are authentic. Then IRS whistleblowers Gary Shapley and Joe Ziegler delivered 100 pages of new bombshell evidence showing Hunter lied repeatedly to investigators in his sworn congressional testimony in February, prompting House Ways and Means Committee Chairman Jason Smith to raise the prospect of perjury charges against the first son. Shapley also produced a document that adds further weight to the suspicion that Hunter's "sugar brother" ... Kevin Morris, was under CIA protection. Hunter lied about his shakedown WhatsApp message to CEFC employee Raymond Zhao on July 30, 2017, said Smith, when his committee voted to publicly release the new whistleblower documents. "These documents make clear that Hunter Biden was using his father's name to shake down a Chinese businessman – and it worked. And when confronted by congressional investigators about it, he lied," the panel said. The CIA's shadowy hand can be seen elsewhere in the Hunter Biden story, including in the rapid approval of the "Dirty 51" letter signed by 51 former intelligence operatives (mainly from the CIA) before the 2020 election that falsely claimed that Hunter's laptop was Russian disinformation.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Last year, the Republican chairman of the US House Permanent Select Committee on Intelligence (HPSCI) presented an image of Americans protesting the war in Gaza while implying possible ties between the protesters and Hamas, an allegation that was used to illustrate why surveillance reforms may prove detrimental to national security. In December, as many as 200 Republican staffers gathered behind closed doors to hear a presentation ... aimed at shoring up support for a US surveillance program known as Section 702. Section 702 authorizes the government to surveil foreigners located physically overseas ... but not Americans or individuals on US soil. While eavesdropping on foreigners is permitted, doing so for the explicit purpose of gaining access to an American's communications–a practice commonly referred to as "reverse targeting"–is strictly forbidden. "Yes, it's true, you cannot â€target' protesters under 702," one aide, a legislative director for a Republican lawmaker, says. "But that doesn't mean the FBI doesn't still have the power to access those emails or listen to their calls if it wants." Between 2020 and early 2021, the FBI conducted "tens of thousands" of queries related to "civil unrest" in the United States. "Political protest is literally how America was founded. It's in our DNA," says Jason Pye, senior policy analyst at the nonprofit FreedomWorks. "Whether you agree with these protesters or not is irrelevant."
Note: The FBI has a long history of spying on political activists. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
The United States Defense Department announced Friday that it found no evidence that the government is covering up contact with extraterrestrials. The report was issued by the Pentagon's All-domain Anomaly Resolution Office (AARO), the unit created and tasked in recent years with studying UAP sightings. The report in its own way raises as many new questions as it answers. AARO investigators, for instance, dug through the claims of witnesses and whistleblowers and successfully traced back the underlying research projects, Special Access Programs (SAPs), and classified compartments. As the report says, "AARO investigated numerous named, and described, but unnamed programs alleged to involve UAP exploitation conveyed to AARO through official interviews," and ultimately, "conclude[d] many of these programs represent authentic, current and former sensitive, national security programs, but none of these programs have been involved with capturing, recovering, or reverse-engineering off-world technology or material." What exactly are the secret compartmentalized programs that the whistleblowers and government witnesses misidentified as being related to UAP technology? What, exactly, are the Pentagon, intelligence community, or defense contractors working on that ... looks and sounds like reverse-engineering out-of-this-world technology or even studying so-called "non-human biologics"?
Note: For more along these lines, see concise summaries of deeply revealing news articles on UFOs from reliable major media sources. Then explore the excellent, reliable resources provided in our new UFO Information Center.
During a Senate briefing last week, a federal counterterrorism official cited the October 7 Hamas attack while urging Congress to reauthorize a sprawling and controversial surveillance program repeatedly used to spy on U.S. citizens on U.S. soil. "As evidenced by the events of the past month, the terrorist threat landscape is highly dynamic and our country must preserve [counterterrorism] fundamentals to ensure constant vigilance," said Director of the National Counterterrorism Center Christine Abizaid. She pointed to Section 702 of the Foreign Intelligence Surveillance Act, which enables the U.S. government to gather vast amounts of intelligence – including about U.S. citizens ... without first seeking a warrant. Section 702 "provides key indications and warning on terrorist plans and ... gives us strategic insight into foreign terrorists and their networks overseas," Abizaid said. "I respectfully urge Congress to reauthorize this vital authority." The controversial program is set to expire at the end of the year, and lawmakers sympathetic to the intelligence community are scrambling to protect it. Sean Vitka ... at the civil liberties group Demand Progress [said] that now is the time to enact lasting and dramatic oversight of the 702 authority. "The government has completely failed to demonstrate that any of the privacy protections reformers have called for would impair national security ... so now we're seeing people grasping at straws trying to turn everything into an excuse for reauthorization," Vitka said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
In March of 2021 a nonprofit group called the Center for Countering Digital Hate (CCDH) released a report about online misinformation. Founded [by] Imran Ahmed, the CCDH ... provides the White House with a powerful weapon to use against critics including RFK Jr. and [Elon] Musk, while also pressuring platforms like Facebook and Twitter to enforce the administration's policies. One rumor that came up ... is that [Ahmed] works for British intelligence. "There's nothing surprising about this," said Mike Benz, a former State Department official who now runs the Foundation for Freedom Online, a free-speech watchdog. "This is not the first rodeo of British and U.S. intelligence services creating a cutout for the purpose of influencing the online news economy, to rig public debate in favor of political speech that supports agency agendas." CCDH's ... chairman is Simon Clark, a former senior fellow at the Center for American Progress (CAP), a D.C. think tank aligned with the corporate arm of the Democratic Party. One might conclude that CCDH functions as an arm of the corporate wing of the Democratic Party, to be deployed against the perceived enemies of corporate Democrats, whether they come from the left or the right. Clark was also a senior fellow at the Atlantic Council's Digital Forensics Lab. "The Atlantic Council, in the past several years, has had seven CIA directors on its board of directors or board of advisers," said Benz. "And it's one of the premier architects of online censorship."
Note: Read an excellent piece on what gave rise to the modern censorship regime. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
An advisory board to President Biden has recommended limiting the F.B.I.'s ability to use a controversial warrantless surveillance program to hunt for information about Americans, even as it urged lawmakers to renew the law that authorizes it. The panel, known as the President's Intelligence Advisory Board, suggested barring the bureau from searching a database of intercepted information when looking for evidence about Americans in criminal investigations that do not involve foreign intelligence. The board ... delivered the recommendation in a declassified 39-page report. It came as Congress was debating whether to extend the law authorizing the program, known as Section 702. Under Section 702, the government can collect – from American companies like Google and AT&T and without a warrant – the communications of targeted foreigners abroad, even when they are talking to or about Americans. The notion that Section 702 creates a backdoor to the Fourth Amendment by allowing the F.B.I. to read private communications to or from an American without a warrant in ordinary criminal contexts has raised particular alarm. But the board rejected as unjustified the more sweeping reform proposal: to require the government to obtain a court warrant before using Americans' identifiers to search the repository. Requiring a court order before doing so, the board said, would prevent intelligence agencies from discovering threats to the country in a timely manner.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The retired judge Sir John Mitting has been leading a public inquiry examining the conduct of undercover police officers who spied on more than 1,000 political groups between 1968 and at least 2010. At least 139 undercover officers in deployments typically lasting four years were sent to infiltrate mainly leftwing and progressive groups. Undercover officers regularly deceived women into long-term sexual relationships. At least four of the undercover officers are known or alleged to have fathered children with women they met during their deployments. So far, between the mid-1970s and 2010 at least 20 police spies are known to have formed sexual relationships with women without disclosing their true identities. Many of these undercover officers were unmasked by the women themselves after long investigations. The undercover officers joined political groups and pretended to be activists. However, their real job was to collect information about the campaigners and their protests and send secret reports back to their bosses. Another issue under the microscope is how activists were allegedly unjustly convicted for offences connected to protests because key evidence gathered by the undercover officers was concealed. Are undercover police still infiltrating political groups? It is difficult to know. Mitting told police he wanted to know if undercover officers were currently been used to spy on political groups. No answer has been given in public so far.
Note: Read more about the spycops scandal and the dozens of activists tricked into having romantic relationships with undercover police. For more along these lines, read our concise summaries of news articles on police corruption.
The U.S. carpet bombing of Cambodia between 1969 and 1973 has been well documented, but its architect, former national security adviser and Secretary of State Henry Kissinger ... bears responsibility for more violence than has been previously reported. An investigation by The Intercept provides evidence of previously unreported attacks that killed or wounded hundreds of Cambodian civilians during Kissinger's tenure in the White House. "You can trace a line from the bombing of Cambodia to the present," said Greg Grandin, author of "Kissinger's Shadow." "The covert justifications for illegally bombing Cambodia became the framework for the justifications of drone strikes and forever war." Kissinger bears significant responsibility for attacks in Cambodia that killed as many as 150,000 civilians, according to Ben Kiernan, former director of the Genocide Studies Program at Yale University and one of the foremost authorities on the U.S. air campaign in Cambodia. That's up to six times the number of noncombatants thought to have died in U.S. airstrikes in Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, and Yemen during the first 20 years of the war on terror. Grandin estimated that, overall, Kissinger – who also helped to prolong the Vietnam War and facilitate genocides in Cambodia, East Timor, and Bangladesh; accelerated civil wars in southern Africa; and supported coups and death squads throughout Latin America – has the blood of at least 3 million people on his hands.
Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and war from reliable major media sources.
FBI officials repeatedly violated their own standards when they searched a vast repository of foreign intelligence for information related to the January 6 insurrection and racial justice protests in 2020, according court order released Friday. The violations were detailed in a secret court order issued last year by the foreign intelligence surveillance (Fisa) court, which has legal oversight of the US government's spy powers. At issue are improper queries of foreign intelligence information collected under section 702 of the Foreign Intelligence Surveillance Act, which enables the government to gather the communications of targeted foreigners outside the US. That program, which is set to expire at the end of the year, creates a database of intelligence that US agencies can search. FBI searches must have a foreign intelligence purpose or be aimed at finding evidence of a crime. But congressional critics of the program have long raised alarm about what they say are unjustified searches of the database for information about Americans, along with more general concerns about surveillance abuses. In repeated episodes disclosed on Friday, the FBI's own standards were not followed. The April 2022 order, for instances, details how the FBI queried the section 702 repository using the name of someone who was believed to have been at the Capitol during the January 6 riot. Officials obtained the information despite it not having any "analytical, investigative or evidentiary purpose", the order said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Antiterrorist moral fervor and ideological blinders propelled the U.S. into its biggest foreign policy blunder since World War Two. The U.S. government constantly embellished the storyline to demonize the communist opposition. A CIA operative provided materials for a massive bomb that ripped through a main square in Saigon in 1952. A Life magazine photographer was waiting on the scene, and his resulting snap appeared with a caption blaming the carnage on Viet Minh Communists. The Kennedy administration sought credibility by profoundly deceiving the American people and Congress regarding its Vietnam policy. In August 1963, South Vietnamese Special Forces "carried out midnight raids against Buddhist pagodas throughout the country. More than 1400 people, mostly monks were arrested and many of them were beaten," according to the Pentagon Papers. The CIA was bankrolling these Special Forces, which were supposed to be used for covert operations against the Viet Cong or North Vietnam, not for religious repression. The Johnson administration exploited the terrorist label to sway Americans to support greater U.S. Involvement in Vietnam. In a special message to Congress on May 18, 1964 seeking additional fund for Vietnam, LBJ declared, "the Viet Cong guerrillas, under orders from their Communist masters in the North, have intensified terrorist actions against the peaceful people of South Vietnam. This increased terrorism requires increased response."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and terrorism from reliable major media sources.
An offshore company that is trusted by the major web browsers and other tech companies to vouch for the legitimacy of websites has connections to contractors for U.S. intelligence agencies and law enforcement, according to security researchers, documents and interviews. Google's Chrome, Apple's Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to act as what's known as a root certificate authority, a powerful spot in the internet's infrastructure that guarantees websites are not fake, guiding users to them seamlessly. The company's Panamanian registration records show that it has the identical slate of officers, agents and partners as a spyware maker identified this year as an affiliate of Arizona-based Packet Forensics, which ... has sold communication interception services to U.S. government agencies for more than a decade. TrustCor's products include an email service that claims to be end-to-end encrypted, though experts consulted by The Washington Post said they found evidence to undermine that claim. A test version of the email service also included spyware developed by a Panamanian company related to Packet Forensics. A person familiar with Packet Forensics' work confirmed that it had used TrustCor's certificate process and its email service, MsgSafe, to intercept communications and help the U.S. government catch suspected terrorists. The physical address in Toronto given in [TrustCor's] auditor's report, 371 Front St. West, houses a UPS Store mail drop.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.
The Department of Homeland Security launched a failed operation that ensnared hundreds, if not thousands, of U.S. protesters in what new documents show was as a sweeping, power-hungry effort before the 2020 election to bolster President Donald Trump's spurious claims about a "terrorist organization" he accused his Democratic rivals of supporting. An internal investigative report, made public this month by Sen. Ron Wyden ... details the findings of DHS lawyers concerning a previously undisclosed effort by Trump's acting secretary of homeland security, Chad Wolf, to amass secret dossiers on Americans in Portland attending anti-racism protests in summer 2020 sparked by the police murder of ... George Floyd. The report describes attempts by top officials to link protesters to an imaginary terrorist plot in an apparent effort to boost Trump's reelection odds, raising concerns now about the ability of a sitting president to co-opt billions of dollars' worth of domestic intelligence assets for their own political gain. DHS analysts recounted orders to generate evidence of financial ties between protesters in custody; an effort that, had they not failed, would have seemingly served to legitimize President Trump's false claims about "Antifa." The report describes the dossiers generated by DHS as having detailed the past whereabouts and the "friends and followers of the subjects, as well as their ... First Amendment speech activity."
Note: Read about the FBI's use of entrapment to manufacture terrorist plots. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
The Supreme Court ruled Thursday that the federal government can shield former government contractors from testifying about the torture of a post-9/11 detainee. The decision likely will make it harder for victims to expose secret government misconduct in the future. Abu Zubaydah was the first prisoner held by the CIA to undergo what, at the time, was euphemistically called "enhanced interrogation." During one 20-day period, he was waterboarded 83 times, 24 hours a day. During that period, the suspected terrorist was also slammed against walls, put in a coffin-like box for hours at a time to simulate live burial, and subjected to something the government called "rectal rehydration." In the end, the two CIA contractors who supervised Zubaydah's interrogation concluded that they had the wrong man. But when lawyers for Zubaydah subpoenaed them, the U.S. government blocked the move by invoking the so-called "state secrets" privilege. In this case, both the Trump and Biden administrations argued that even though the information about the torture program is widely known, confirming the existence of CIA black sites in Poland would jeopardize the U.S. government's relationship with foreign intelligence services. Josh Colangelo-Bryan, a lawyer who represents other Guantanamo Bay detainees, was ... critical. "There has been no accountability for the U.S. program that subjected people to torture," he said in a statement.
Note: Read more about the CIA's torture program. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Russia invaded Ukraine. For years now the Central Intelligence Agency has been preparing for such a moment, not only with prescient intelligence gathering and analysis but also by preparing Ukrainians to mount an insurgency against a Russian occupation. The agency has been training Ukrainian special forces and intelligence officers at a secret facility in the U.S. since 2015. Because the CIA training program is now publicly known, Russia can persuasively claim that Ukrainian insurgents are CIA proxies – a useful statement as propaganda to pro-Russian separatists in eastern Ukraine and as a justification for any harsh measures it takes against Ukrainian civilians. The CIA needs to be honest with the Ukrainians – and itself – about the real intent. In the first U.S.-backed insurgency, according to top secret documents later declassified, American officials intended to use the Ukrainians as a proxy force to bleed the Soviet Union. This time, is the primary goal of the paramilitary program to help Ukrainians liberate their country or to weaken Russia over the course of a long insurgency that will undoubtedly cost as many Ukrainian lives as Russian lives, if not more? Even if a Ukrainian insurgency bleeds Russia over years, the conflict could cause instability to spread across Central and Eastern Europe. This is a pattern in the history of U.S. paramilitary operations – from the Cold War to Afghanistan and Iraq today.
Note: For an alternative view of Ukraine's Zelensky, don't miss this excellent presentation by intrepid reporter Ben Swann (skip to 1:45 to avoid advertisement). For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and war from reliable major media sources.
The Central Intelligence Agency reportedly had credible evidence that at least 10 members of its staff, some of whom were contracted employees, committed sex crimes involving children, but only one individual was ever charged. Senior investigative reporter Jason Leopold and investigative reporter Anthony Cormier with Buzzfeed News detailed their findings in an article after combing through hundreds of internal agency reports they obtained through Freedom of Information Act (FOIA) lawsuits. Leopold and Cormier say the declassified reports "show a pattern of abuse and a repeated decision by federal prosecutors not to hold agency personnel accountable." One employee was accused of having sexual contact with both a 2-year-old and a 6-year-old before he was fired. Another employee resigned after being accused of purchasing sexually explicit videos of "young girls" filmed by their mothers. A contractor had his contract revoked after allegedly arranging to have sex with an undercover FBI agent who was posing as a child. Only one of the people cited in the documents was actually charged. Prosecutors sent the rest of the cases back to the CIA to handle internally, meaning few faced any consequences beyond the possible loss of their jobs and security clearances," said Leopold and Cormier. "CIA insiders say the agency resists prosecution of its staff for fear the cases will reveal state secrets".
Note: For more along these lines, read our concise summaries of news articles on intelligence agency corruption and sexual abuse scandals.
On April 17, 2018, Terry Albury appeared in a federal court in Minneapolis, where he pleaded guilty to charges of leaking classified information to the press. The allegations – that Albury downloaded, printed and photographed internal F.B.I. documents on his office computer, sending some of them electronically to a journalist and saving others on external devices found in his home – resulted from a 17-month-long internal investigation by the F.B.I., prompted by two Freedom of Information Act requests by a news organization ... in March 2016. Nine months after these FOIA requests were made, a trove of internal F.B.I. documents shedding new light on the vast and largely unrestricted power of the post-9/11 F.B.I. was posted on the investigative-journalism site The Intercept. The cache included hundreds of pages of unredacted policy manuals, including the F.B.I.'s byzantine rule book, the Domestic Investigations and Operations Guide, exposing the hidden loopholes that allowed agents to violate the bureau's own rules against racial and religious profiling and domestic spying as they pursued the domestic war on terror. In October 2018, he was sentenced to four years in prison. Albury says he felt a moral imperative to make his disclosures, motivated by his belief that the bureau had been so fundamentally transformed by Sept. 11 that its own agents were compelled to commit civil and human rights violations.
Note: Listen to Albury talk about his experiences in this podcast. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
The United States today has by far the world's largest incarceration rate, with nearly two million people living in prisons and jails. The conditions in those facilities are often substandard, with Amnesty International criticizing the dehumanizing practice of holding prisoners in prolonged solitary confinement. Assistant professor of history [Benjamin] Weber writes of an "unspoken doctrine of prison imperialism" by which U.S. policy makers sought to "govern the globe through the codification and regulation of crime." Weber adds that, "as prison imperialism expanded outwards, it always returned home producing new forms of social control over the growing number of people ensnared in prison in the United States. The forms of policing and record keeping that gave rise to the surveillance state between World War II and the Cold War were pioneered through overseas colonialism, covert operations and military interventions." When the U.S. colonized the Philippines at the turn of the 20th century, mass incarceration became a linchpin of counterinsurgency strategy. It was designed to suppress the nationalist rebellion and messianic peasant leaders like Felipe Salvador, a leader of the anti-Spanish resistance. Weber emphasizes that the racial hierarchies and oppressive treatment of captives in colonial wars and inmates in colonial enclaves helped shape the mistreatment of minority groups and left-wing subversives in U.S. jails.
Note: For more along these lines, read our concise summaries of news articles on prison system corruption.
Haiti was born in 1804 out of a 13-year revolution in which the enslaved people of the then French colony of Saint-Domingue dismantled their chains, defeated, in succession, the armies of France, Britain and Spain, and established a new nation. Elites in Europe and America, meanwhile, fearful that the Haitian example might embolden others struggling for freedom, sought to isolate the new nation, refusing for decades even to recognise it. In 1825, France demanded, as the price of recognition, reparations of 150m francs. France was compelling enslaved people and their descendants to pay their former masters ... forcing [Haiti] to take out loans from French banks at exorbitant rates. By 1914, 80% of the government budget went to repaying the debt. Western nations have not only impoverished Haiti, they have also constantly intervened. Jean-Bertrand Aristide [was] a leftwing priest with mass support among Haiti's working class and poor. Twice, in 1990 and 2001, waves of public support propelled Aristide to the presidency. And twice, in 1991 and 2004, he was ousted in bloody coups. After the first coup, Aristide returned to power with US support. Nevertheless, many of the coup leaders were on the CIA payroll and the agency did not hide its hostility. A decade later, opposition to Aristide's economic and social policies led America to force him out of office. Today, the Haitian state barely exists.
Note: In 2021, Colombian mercenaries who had received training in the US assassinated Haitian President Jovenel MoĂŻse. For more along these lines, see concise summaries of important news articles on intelligence agency corruption from reliable major media sources.
We celebrate World Press Freedom Day in May as a reminder that the role of news organizations is to speak truth to power. It's an occasion to remember three people who exemplify the need to speak the truth: Daniel Ellsberg of Pentagon Papers fame and Julian Assange of WikiLeaks; and also of Chelsea Manning, without whom we would not have the proof of what the United States was doing, not only in Iraq and Afghanistan but all across the globe. Ellsberg's Pentagon Papers were a mere 7,000 pages, and he photocopied them by hand. Chelsea Manning's "papers", which Assange outed, earning the U.S. government's enmity, consisted of about 750,000 documents. Assange and WikiLeaks that made possible for Manning's information to reach people across the globe. And even when he and Manning have been arrested, jailed and isolated, the information on Wikileaks still continues to be accessible to all of us. Even today the Baghdad video of Collateral Murder, posted on WikiLeaks, was seen across the world and brought home that the United States was lying and involved in a massive cover-up of its war crimes. The Diplomatic Cables on Wikileaks informed the Tunisian people about the kleptocratic rule of the Ben Ali family and started what was later named as Arab Spring. Just as the surveillance state has invaded every nook and corner of our lives, the pathological need of the surveillance state to access and store all this information also makes the state porous and vulnerable.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
In early 2018, former National Security Agency chief Keith Alexander worked out a deal with Saudi Crown Prince Mohammed bin Salman and the cyber institute led by one of his closest aides, Saud al-Qahtani, to help the Saudi ruler train the next generation of Saudi hackers. The agreement between IronNet, founded by Alexander, and the cyber school ... faced no scrutiny for its association with Qahtani, after the brutal killing of Jamal Khashoggi he reportedly orchestrated just a few months later. Alexander officially inked the deal with the Prince Mohammed bin Salman College of Cyber Security, Artificial Intelligence, and Advanced Technologies – a school set up to train Saudi cyber intelligence agents – at a signing ceremony in Washington, D.C.. Saudi Arabia's agreement with IronNet was part of a host of moves to step up its cyber capabilities, coinciding with a campaign against the kingdom's critics abroad. Khashoggi, then a Washington Post columnist and prominent Salman critic, received a series of threatening messages, including one from Qahtani, warning him to remain silent. Khashoggi, whose family and close associates discovered listening malware electronically implanted on their smartphones, was then lured to the Saudi Embassy in Istanbul. It was there that a team dispatched by Qahtani detained and tortured the Saudi government critic. Qahtani, according to reports, beamed in through Skype to insult Khashoggi during the ordeal. Khashoggi was then dismembered with a bone saw.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

