Intelligence Agency Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
From 2008 to 2010, as Edward Snowden has revealed, the National Security Agency (NSA) collaborated with the British Government Communications Headquarters to intercept the webcam footage of over 1.8 million Yahoo users. The agencies were analyzing images they downloaded from webcams and scanning them for known terrorists who might be using the service to communicate, matching faces from the footage to suspects with the help of a new technology called face recognition. In attempting to find faces, the Pentagon's Optic Nerve program recorded webcam sex by its unknowing targets–up to 11 percent of the material the program collected was "undesirable nudity" that employees were warned not to access. And that's just the beginning of what face recognition technology might mean for us in the digital era. The U.S. government is in the process of building the world's largest cache of face recognition data, with the goal of identifying every person in the country. The creation of such a database would mean that anyone could be tracked wherever his or her face appears, whether it's on a city street or in a mall. Today's laws don't protect Americans from having their webcams scanned for facial data. "If cameras connected to databases can do face recognition, it will become impossible to be anonymous in society," [attorney Jennifer] Lynch says. That means every person in the U.S. would be passively tracked at all times.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
More than 60 years ago, in his "Foundation" series, the science fiction novelist Isaac Asimov invented a new science – psychohistory – that combined mathematics and psychology to predict the future. Now social scientists are trying to mine the vast resources of the Internet – Web searches and Twitter messages, Facebook and blog posts, the digital location trails generated by billions of cellphones – to do the same thing. The government is showing interest in the idea. This summer a little-known intelligence agency began seeking ideas from academic social scientists and corporations for ways to automatically scan the Internet in 21 Latin American countries for "big data," according to a research proposal. The three-year experiment ... is being financed by the Intelligence Advanced Research Projects Activity, or Iarpa. The automated data collection system is to focus on patterns of communication, consumption and movement of populations. It will use publicly accessible data, including Web search queries, blog entries, Internet traffic flow, financial market indicators, traffic webcams and changes in Wikipedia entries. It is intended to be an entirely automated system, a "data eye in the sky" without human intervention. Some social scientists and advocates of privacy rights are deeply skeptical of the project, saying it evokes queasy memories of Total Information Awareness, a post-9/11 Pentagon program that proposed hunting for potential attackers by identifying patterns in vast collections of public and private data.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
The British government targeted the American civil rights leader Stokely Carmichael and sought to weaken the Black Power movement with covert disinformation campaigns, recently declassified documents have revealed. The effort was the work of a secret unit known as the Information Research Department, based in London and part of the Foreign Office, which created and distributed literature from fake sources as part of a broader effort to destabilise cold war enemies. The effort against Carmichael, a firebrand orator who travelled to west Africa in part to escape harassment by US law enforcement agencies, aimed to portray the prominent Black Power leader as a foreign interloper in Africa who was contemptuous of the inhabitants of the continent. Based mainly in Guinea from July 1969, the 28-year-old activist had became a vocal advocate of socialist, pan-Africanist ideologies, which worried British officials. The IRD was particularly worried by the movement's potential influence in the Caribbean. In 1969, the IRD also created a new fake group: The Organisation of African Students for African Power. This was supposedly based in East Germany and adopted contemporary radical New Left ideas, "proclaiming a plague on both" the capitalist west and the Soviet bloc. The IRD felt this provided a better platform to "damage opponents" than the dated nationalist approach, while being difficult to trace back to Britain because many similar groups had genuinely sprung up in the late 1960s.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the erosion of civil liberties from reliable major media sources.
The Trump administration Monday released more than 230,000 pages of previously classified documents related to the 1968 assassination of civil rights leader Martin Luther King Jr. Director of National Intelligence Tulsi Gabbard announced the release, carried out under President Donald Trump's executive order directing full transparency on the assassinations of King, President John F. Kennedy and Sen. Robert F. Kennedy. The documents ... include FBI investigation details, internal memos tracking case progress and information about James Earl Ray's former cellmate who claimed Ray discussed an assassination plot. The files also contain foreign evidence from Canadian police and CIA records on the international manhunt for Ray. Unlike the JFK assassination files released under federal law, the King documents had never been digitized. Conspiracy theories have circulated about King's death, in part prompted by Ray's claims that his confession had been forced and the revelation of illegal surveillance of King by the FBI and the CIA. The FBI also allegedly attempted to get King to commit suicide. Some in King's family also believe that the government and possibly the Mafia were involved in the assassination and that Ray was set up to take the fall. The United States House Select Committee on Assassinations determined in 1979 that there was a likelihood Ray acted for monetary gain and that there was likely a conspiracy behind the shooting.
Note: Few people know about the buried 1999 King Family civil trial in Memphis, where it took a jury only one hour to determine that the US government was behind the assassination of King. Read our comprehensive Substack investigation that uncovers the dark truths behind the assassination of Martin Luther King Jr. For more along these lines, read our concise summaries of news articles on political assassinations.
Technology already available – and already demonstrated to be effective – makes it possible for law-abiding officials, together with experienced technical people to create a highly efficient system in which both security and privacy can be assured. Advanced technology can pinpoint and thwart corruption in the intelligence, military, and civilian domain. At its core, this requires automated analysis of attributes and transactional relationships among individuals. The large data sets in government files already contain the needed data. On the Intelligence Community side, there are ways to purge databases of irrelevant data and deny government officials the ability to spy on anyone they want. These methodologies protect the privacy of innocent people, while enhancing the ability to discover criminal threats. In order to ensure continuous legal compliance with these changes, it is necessary to establish a central technical group or organization to continuously monitor and validate compliance with the Constitution and U.S. law. Such a group would need to have the highest-level access to all agencies to ensure compliance behind the classification doors. It must be able to go into any agency to inspect its activity at any time. In addition ... it would be best to make government financial and operational transactions open to the public for review. Such an organization would go a long way toward making government truly transparent to the public.
Note: The article cites national security journalist James Risen's book on how the creation of Google was closely tied to NSA and CIA-backed efforts to privatize surveillance infrastructure. For more along these lines, read our concise summaries of news articles on Big Tech and the disappearance of privacy.
There's a revolving door of talent between the country's premiere intelligence agency and its entertainment industry, with inspiration and influence often working both ways. The agency is targeting professionals at the intersection of arts and technology for recruitment ... and continues to cooperate with entertainment giants to inspire the next generation of creative spies. Creative minds in Hollywood and the entertainment industry have long had a role at the Central Intelligence Agency, devising clever solutions to its most vexing problems, such as perfecting the art of disguise. In the 1950s, a magician from New York named John Mulholland was secretly contracted with the agency to write a manual for Cold War spies on trickery and deception. These days, the officers said, creative skills are more valuable than ever. "You're only limited by your own imagination – don't self-censor your ideas," said Janelle, a CIA public affairs officer. "We're always looking for partners." Some of the CIA's most iconic missions – at least the declassified ones – document the agency's rich history with Hollywood, including Canadian Caper, when CIA operatives disguised themselves as a film crew to rescue six American diplomats in Tehran during the Iran hostage crisis, an operation moviegoers will recognize as the plot of "Argo." CIA analysts have also been known to leave the agency for opportunities in the entertainment industry, writing books and scripts drawing from their experiences.
Note: Learn more about the CIA's longstanding propaganda network in our comprehensive Military-Intelligence Corruption Information Center. The US Department of Defense has had a hand in more than 800 top Hollywood films. For more along these lines, read our concise summaries of news articles on censorship and intelligence agency corruption.
On Tuesday, July 1, 2025, African Stream published its final video, a defiant farewell message. With that, the once-thriving pan-African media outlet confirmed it was shutting down for good. Not because it broke the law. Not because it spread disinformation or incited violence. But because it told the wrong story, one that challenged U.S. power in Africa and resonated too deeply with Black audiences around the world. In September, U.S. Secretary of State Antony Blinken made the call and announced an all-out war against the organization, claiming, without evidence, that it was a Russian front group. Within hours, big social media platforms jumped into action. Google, YouTube, Facebook, Instagram, and TikTok all deleted African Stream's accounts, while Twitter demonetized the organization. The company's founder and CEO, Ahmed Kaballo ... told us that, with just one statement, Washington was able to destroy their entire operation, stating: "We are shutting down because the business has become untenable. After we got attacked by Antony Blinken, we really tried to continue, but without a platform on YouTube, Instagram, TikTok, and being demonetized on X, it just meant the ability to generate income became damn near impossible." Washington both funds thousands of journalists around the planet to produce pro-U.S. propaganda, and, through its close connections to Silicon Valley, has the power to destroy those that do not toe the line.
Note: Learn more about the CIA's longstanding propaganda network in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on censorship.
President George W. Bush created a new command to oversee all military operations in Africa 18 years ago. U.S. Africa Command was meant to help "bring peace and security to the people of Africa." Gen. Michael Langley, the head of AFRICOM, offered a grim assessment of security on the African continent during a recent press conference. The West African Sahel, he said last Friday, was now the "epicenter of terrorism" and the gravest terrorist threats to the U.S. homeland were "unfortunately right here on the African continent." Throughout all of Africa, the State Department counted 23 deaths from terrorist violence in 2002 and 2003, the first years of U.S. counterterrorism efforts in the Sahel and Somalia. By 2010, two years after AFRICOM began operations, fatalities from attacks by militant Islamists had already spiked to 2,674. There were an estimated 18,900 fatalities linked to militant Islamist violence in Africa last year, with 79 percent of those coming from the Sahel and Somalia. This constitutes a jump of more than 82,000 percent since the U.S. launched its post-9/11 counterterrorism efforts on the continent. As violence spiraled in the region over the past decades, at least 15 officers who benefited from U.S. security assistance were key leaders in 12 coups in West Africa and the greater Sahel during the war on terror. At least five leaders of the 2023 coup d'état in [Niger] received American assistance.
Note: Learn more about the US military's shadow wars in Africa. For more along these lines, read our concise summaries of news articles on terrorism and military corruption.
When a military judge threw out a defendant's confession in the Sept. 11 case this month, he gave two main reasons. The prisoner's statements, the judge ruled, were obtained through the C.I.A.'s use of torture, including beatings and sleep deprivation. But equally troubling to the judge was what happened to the prisoner in the years after his physical torture ended, when the agency held him in isolation and kept questioning him from 2003 to 2006. The defendant, Ammar al-Baluchi, is accused of sending money and providing other support to some of the hijackers who carried out the terrorist attack, which killed 3,000 people. In court, Mr. Baluchi is charged as Ali Abdul Aziz Ali. He is the nephew of Khalid Shaikh Mohammed, the man accused of masterminding the plot. The judge, Col. Matthew N. McCall, wrote that it was easy to focus on the torture because it was "so absurdly far outside the norms of what is expected of U.S. custody preceding law enforcement questioning." "However," he added, "the three and a half years of uncharged, incommunicado detention and essentially solitary confinement – all while being continually questioned and conditioned – is just as egregious" as the physical torture. Prosecutors are preparing to appeal. But the 111-page ruling was the latest blow to the government's two-decade-old effort to hold death penalty trials at Guantánamo Bay by sweeping aside a legacy of state-sponsored torture.
Note: Learn more about US torture programs in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on intelligence agency corruption.
The Department of Homeland Security is effectively gutting key civil rights offices within the agency, slashing the number of staff at the Office for Civil Rights and Civil Liberties, the Office of the Immigration Detention Ombudsman, and the Office of the Citizenship and Immigration Services Ombudsman. Each of these offices was created by Congress, but DHS has decided to move ahead anyway, saying they "have obstructed immigration enforcement by adding bureaucratic hurdles." Four days later, Rumeysa Ozturk, a Tufts student with a valid F-1 visa, was pulled off a sidewalk in Massachusetts and sent to a detention center in Louisiana. The Department of Homeland Security, whose agents surround Ozturk in the video, has a long history of civil and human rights abuses. DHS is home to the largest law enforcement cohort in the United States. Its agents have extraordinary powers to stop, arrest, and detain citizens and noncitizens alike throughout the country. When Congress created DHS in 2002, it ... created the Office for Civil Rights and Civil Liberties (CRCL) to provide oversight to guard against abuses. Every year, CRCL files a report to Congress. In its fiscal year (FY) 2023 report, for example, CRCL reported that it received over 3,000 allegations of misconduct and opened 758 investigations into issues ranging from treatment of travelers at airports to discrimination by DHS law enforcement to sexual abuse in DHS custody to deaths in DHS custody.
Note: For more, read our concise summaries of news articles on intelligence agency corruption and the erosion of civil liberties.
The CIA claimed to have confirmed the existence of the Ark of the Covenant by way of remote viewing – aka extra sensory perception or ESP – alleging the mysterious and sacred object is guarded by "entities" with an "unknown" power, a recently resurfaced declassified document claims. When a remote viewer is tasked with searching for a target, the desired object is written down on a piece of paper and put into an envelope. The remote viewer does not know what is written and is guided through the process by another person, retired US Army Chief Warrant Joe McMoneagle explained. McMoneagle, aka remote viewer #1, was the first to do the psychic phenomena experiments for the CIA. Remote viewer #32's vision described a secret Middle Eastern location of the object – which they don't know is the Ark – but they say is "protected by entities," the document reveals. "Target is a container. This container has another container inside of it. The target is fashioned of wood, gold and silver... similar in shape to a coffin and is decorated with seraphim," they relayed, per the file. "The target is protected by entities and can only be opened by those who are authorized to do so – this container will not/cannot be opened until the time is deemed correct," they said. "The purpose of the target is to bring people together. It has something to do with ceremony, memory, homage, the resurrection. There is an aspect of spirituality, information, lessons and historical knowledge," they said.
Note: Explore our resources on remote viewing programs. For more, read our concise summaries of news articles on the mysterious nature of reality.
In 2003 [Alexander Karp] – together with Peter Thiel and three others – founded a secretive tech company called Palantir. And some of the initial funding came from the investment arm of – wait for it – the CIA! The lesson that Karp and his co-author draw [in their book The Technological Republic: Hard Power, Soft Belief and the Future of the West] is that "a more intimate collaboration between the state and the technology sector, and a closer alignment of vision between the two, will be required if the United States and its allies are to maintain an advantage that will constrain our adversaries over the longer term. The preconditions for a durable peace often come only from a credible threat of war." Or, to put it more dramatically, maybe the arrival of AI makes this our "Oppenheimer moment". For those of us who have for decades been critical of tech companies, and who thought that the future for liberal democracy required that they be brought under democratic control, it's an unsettling moment. If the AI technology that giant corporations largely own and control becomes an essential part of the national security apparatus, what happens to our concerns about fairness, diversity, equity and justice as these technologies are also deployed in "civilian" life? For some campaigners and critics, the reconceptualisation of AI as essential technology for national security will seem like an unmitigated disaster – Big Brother on steroids, with resistance being futile, if not criminal.
Note: Learn more about emerging warfare technology in our comprehensive Military-Intelligence Corruption Information Center. For more, read our concise summaries of news articles on AI and intelligence agency corruption.
By appointing FBI Director Kash Patel as acting head of the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF), President Donald Trump took a step towards reining in a federal agency justifiably viewed by many as a threat to self-defense rights. He also signaled that he may consolidate government bodies that overlap in their responsibilities. It's impossible to credibly argue that the ATF doesn't need a shakeup. After all, this is a federal agency that ran guns to criminal gangs in Mexico as part of a bizarre and failed "investigation," manipulated mentally disabled people into participating in sting operations–and then arrested them, lost thousands of guns and gun parts, killed people over paperwork violations, and unilaterally reinterpreted laws to create new felonies out of thin air (which means more cause for sketchy investigations and stings). The federal police agency obsessively focused on firearms has long seemed determined to guarantee itself work by finding ever more things to police. But what about putting the same person in charge of both the ATF and the FBI? Merging agencies–if that's where this is headed–might improve internal communications by clarifying chains of command and eliminating interagency competition. But–and this is a big concern–done wrong, you'd end up with a supercharged federal enforcement agency with all the hostility to civil liberties its old components embodied when separate, but now with lots more clout.
Note: Read how CBS journalist Sharyl Attkisson was hacked by government operatives over her reporting on Fast and Furious. A.T.F. agents once ran a secret multimillion-dollar slush fund for illicit operations and personal perks, bypassing oversight and violating their own rules. For more along these lines, read our concise summaries of news articles on intelligence agency corruption.
Rep. Anna Paulina Luna, R-Fla., will lead a new task force focused on the declassification of federal secrets – including records related to the assassinations of President John F. Kennedy, Sen. Robert F. Kennedy and Dr. Martin Luther King Jr., and other documents in the public interest. House Oversight Committee Chairman James Comer, R-Ky., appointed Luna to chair the "Task Force on the Declassification of Federal Secrets." Comer and Luna sent letters to the State Department, Department of Energy and the CIA for documents relating to the origins of COVID-19; the National Security Agency and CIA for records relating to JFK, MLK and RFK assassinations; the Department of Defense and the CIA for 9/11 files; and to the Justice Department for documents relating to Jeffrey Epstein. The creation of the task force comes after President Donald Trump signed an executive order telling the director of national intelligence ... to present a plan for the full and complete release of all JFK assassination records within 15 days. He also ordered that officials immediately review the records relating to RFK and MLK assassinations and present a plan for their full and complete release within 45 days. "We have spent years seeking information on the assassinations of President Kennedy, Senator Kennedy, Reverend King, and other government secrets without success," Luna told Fox News Digital. "It is time to give Americans the answers they deserve."
Note: Read our comprehensive Substack investigations covering the dark truths behind the assassination of Martin Luther King Jr and the connection between Epstein's child sex trafficking ring and intelligence agency sexual blackmail operations.
President Donald Trump has ordered the release of thousands of classified governmental documents about the 1963 assassination of President John F. Kennedy. The executive order ... also aims to declassify the remaining federal records relating to the assassinations of Sen. Robert F. Kennedy and the Rev. Martin Luther King Jr. The order is among a flurry of executive actions Trump has quickly taken the first week of his second term. Speaking to reporters, Trump said, "everything will be revealed." Trump had promised during his reelection campaign to make public the last batches of still-classified documents surrounding President Kennedy's assassination in Dallas. Trump has nominated Kennedy's nephew, Robert F. Kennedy Jr., to be the health secretary in his new administration. Kennedy's father, Robert F. Kennedy, was assassinated in 1968 as he sought the Democratic presidential nomination. The younger Kennedy has said he isn't convinced that a lone gunman was solely responsible for the assassination of his uncle, President Kennedy, in 1963. The order directs the director of national intelligence and the attorney general to develop a plan within 15 days to release the remaining John F. Kennedy records, and within 45 days for the other two cases. It was not clear when the records would actually be released. Most researchers agree that roughly 3,000 records have not yet been released, either in whole or in part, and many of those originated with the CIA.
Note: Read our comprehensive Substack investigation covering the dark truths behind the assassination of Martin Luther King Jr. For more along these lines, read our concise summaries of news articles on political assassinations.
Two large-scale, coordinated attacks this week rocked Lebanon – the latest iteration in a historical pattern of booby-trapping electronics. On Tuesday, one attack caused pagers to explode across Lebanon and Syria, injuring thousands of people and killing at least 12. A second wave of bombings unfolded on Wednesday, when explosives detonated inside a slew of hand-held radios across the country, leaving nine dead and 300 wounded. Israel, which is widely assumed to be behind both attacks, reportedly booby-trapped pagers used by Hezbollah members, carrying out a similar feat with the hand-held radios. The bombings appear to be supply-chain attacks – meaning the gadgets were tampered with or outright replaced with rigged devices containing explosives and a detonator at some point prior to arriving in the hands of the targets. The tactic of turning an electronic gadget into an explosive device ... dates back at least half a century. Field Manual 5-31, titled simply "Boobytraps" and first published by the U.S. Department of the Army in 1965, describes the titular objects as explosive charges "cunningly contrived to be fired by an unsuspecting person who disturbs an apparently harmless object or performs a presumably safe act." In 1996, the Israeli Security Agency, also known as Shin Bet, is said to used a similar technique to detonate a small charge of explosives near the ear of Hamas bomb-maker Yahya Ayyash.
Note: Learn more about emerging warfare technology in our comprehensive Military-Intelligence Corruption Information Center. For more, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
Body camera footage from a police officer who responded to the assassination attempt on former President Donald Trump last month in Pennsylvania shows the intra-cop quarrels in the immediate aftermath of the attack. Video footage from body cameras on Butler Township Police Department officers, obtained by The Intercept, shed light on the chaos among law enforcement officials responding to the assassination attempt. The videos confirm previous reporting that a lack of communication and coordination between federal, state, and local police led to confusion at the rally and reflected insufficient preparation. Additional body camera footage shows one officer telling his colleagues minutes after the shooting that he warned the Secret Service well ahead of the rally to post agents at the building used by the shooter. One Butler Township police officer started to help other law enforcement teams climb onto a plastic shed to access the roof. As police teams scattered around the building debriefed on what happened, two Butler officers and the Secret Service agent stood looking at the storage shed. "Is that how he got up?" one police officer asked. "I have no idea," the other said. "I fucking told them they need to post the guys fucking over here," the first officer said to his colleague. "I told them that – the Secret Service – I told them that fucking Tuesday. I told them to post fucking guys over here." "I thought you guys were on the roof?" the other cop responded.
Note: For more along these lines, see concise summaries of deeply revealing news articles on assassinations and government corruption from reliable major media sources.
State House Republicans defended former colleague, presidential candidate and U.S. Rep. Tulsi Gabbard in a letter sent Sunday to the Transportation Security Administration demanding she be removed from the federal government's terrorist watch list. The letter, sent to David P. Pekoske, TSA's director in Washington, D.C., noted that one of their "former Hawaii State House colleagues, one of Hawaii's â€favorite daughters', former Congresswoman, former Presidential Candidate, and combat veteran is on your TSA terrorist watch list." "We understand that you are harassing her with your Air Marshals from flight to flight. We strongly urge you to immediately withdraw her name from the Quiet Skies program and/or provide full public transparency of the TSA's reasons for maligning her name and reputation," read the letter. Gabbard ... said that her inclusion on the watch list "is clearly an act of political retaliation." "It's no accident that I was placed on the Quiet Skies list the day after I did a prime-time interview warning the American people about ... why Kamala Harris would be bad for our country if elected as President and Commander in Chief. What hurts me the most is the fact that like so many Americans I enlisted because of the terrorist attack on 9/11, deployed to war zones to go after those terrorists, still serve in the US Army for over 21 years, and now my government is surveilling me as a potential domestic terrorist," Gabbard said. "The real pain this has caused is the stress of forever looking over my shoulder, wondering if and how I am being watched, what secret terror watch list I'm on, and having no transparency or due process."
Note: Why is the government targeting individuals who are simply exercising their First Amendment rights? For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
On June 28, 2009, democratically elected Honduran President Manuel Zelaya was ousted by a military coup. The coup led to nearly 13 years of right-wing rule, marked by collusion with drug trafficking organizations, widespread privatization, violence, repression, and a significant migrant exodus. "During these 13 years that the right wing was in power, they were fully supported by the U.S. government," [said Zelaya]. "There was a lot of repression. There were killings of activists and land defenders throughout the country. Also, a lot of right-wing neoliberal policies that were put in place. We have no preference in [US] elections, between the Republican Party and the Democratic Party. In the end, they act the same. They act in the interest of Wall Street, the military industrial complex, the interest of a global elite that, through capitalism, has already taken over all the assets of wealth: the rivers, the seas, the forests, oil – the world elite manages it all through the speculative financial system. The planet's main resources, of raw economic goods, are those that influence the United States' government. Here, the coup plotters don't even get a traffic ticket – not even a slap on the wrist. Instead, they are offered political parties as if they are a democratic option. It is so absurd: the Honduran right, which put the generals in office who carried out the coup, proclaim themselves to be a democratic alternative. Those who murdered, those who looted, are democratic alternatives – totally absurd."
Note: Read more about the narco-state that the US supported in Honduras. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Israel's military was aware of Hamas ' plan to launch an attack on Israeli soil over a year before the devastating Oct. 7 operation that killed hundreds of people, The New York Times reported Friday. It was the latest in a series of signs that top Israeli commanders either ignored or played down warnings that Hamas was plotting the attack, which triggered a war against the Islamic militant group that has devastated the Gaza Strip. The Times said Israeli officials were in possession of a 40-page battle plan, code-named "Jericho Wall," that detailed a hypothetical Hamas attack on southern Israeli communities. The document was seen by many Israeli military and intelligence officials, the report said, though it was unclear if Prime Minister Benjamin Netanyahu or other top leaders had seen it. The document predicted that Hamas would bombard Israel with rockets, use drones to disable Israel's security and surveillance abilities at the border wall, and take over southern communities and military bases. Another 2016 Israeli defense memo obtained by the Times said Hamas intended to take hostages back to Gaza. The Oct. 7 attack – in which 1,200 people were killed and 240 people were abducted and taken to Gaza – would uncannily mirror the one outlined in the battle plan. But Israeli officials had brushed off the plan, the report said, dismissing it as "aspirational" rather than something that could practically take place, the report said.
Note: For more along these lines, see concise summaries of deeply revealing news articles on war and intelligence agency corruption from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.