The Illusion of Israeli Self Sufficiency in Intelligence
By José Niño | The Libertarian Institute | August 26, 2025
Casual onlookers salivate at the supposed brilliance of Israel’s intelligence services. From Mossad’s assassinations abroad to daring sabotage campaigns in hostile territory, the Jewish state has been elevated in popular imagination as a scrappy David with unmatched cunning, capable of pulling off operations that leave even world powers like the United States in awe. Books, films, and mainstream pundits reinforce this myth, presenting Israel’s intelligence machine as self-sufficient and independent.
But when one peels back the layers, the narrative quickly unravels. Israel’s most celebrated operations—from targeted killings in Europe to sabotage inside Iran—were rarely the product of Israeli ingenuity alone. They relied on cooperation with the CIA, NSA cyberwarfare expertise, European intelligence networks, and even covert collaboration with Arab regimes that publicly denounce Israel while privately working with it. Much like its dependence on U.S. military aid and diplomatic cover, Israel’s intelligence empire survives not through independence but through reliance on Western logistics, intelligence sharing, and political approval. What is sold as the story of a bootstrapping nation is a case study in multinational complicity.
According to investigative reporting by Israeli journalists Melman and Ronen Bergman, Israel’s intelligence community relied heavily on intelligence partnerships with Western and allied nations to conduct clandestine activities in foreign territories.
The foundation of this intelligence cooperation traces back to the aftermath of the 1972 Munich Olympics massacre. According to Dr. Aviva Guttmann’s research, which Melman has covered extensively, the Berne Club—a secret European intelligence alliance founded in 1969—provided crucial support for Israel’s subsequent assassination campaign against Palestinian operatives. This multinational intelligence network initially included Switzerland, West Germany, France, the United Kingdom, Italy, Luxembourg, Austria, the Netherlands, and Belgium, and later expanded to include the United States, Canada, Australia, and other nations. Through an encrypted communication system called “Kilowatt,” thousands of cables were exchanged among eighteen Western intelligence services after the system was established in 1971. The network functioned as a secret clearinghouse for raw intelligence. Shared reports contained the locations of safe houses, vehicle registrations, the movements of high-value targets, updates on Palestinian guerrilla tactics, and analytical assessments, all of which provided Israel with crucial operational support for its clandestine operations.
Direct American involvement in Israeli operations became particularly evident during the George W. Bush administration. The February 2008 assassination of Hezbollah commander Imad Mughniyeh in Damascus was reportedly approved by President Bush himself after being briefed by then-CIA Director Michael Hayden. This was not merely intelligence sharing but active operational participation. “The Mossad agent would ID Mughniyeh, and the CIA man would press the remote control,” a Newsweek report noted. The CIA designed and built the bomb that killed Mughniyeh, tested it at a secret facility in North Carolina, and smuggled it into Syria through Jordan, while Mossad provided intelligence and logistical support.
When it came to confronting Iran’s nuclear program, the United States and Israel collaborated on the creation of the Stuxnet computer virus in a joint operation codenamed “Olympic Games.” The malware was designed to sabotage centrifuges at Iran’s Natanz uranium enrichment facility. According to Ronen Bergman, the virus was developed with input from Israeli cybersecurity experts alongside the U.S. National Security Agency. This operation represented a quadrilateral effort involving the CIA, NSA, Mossad, and Israel’s military intelligence agency, AMAN. It was conceived during the administrations of W. Bush and Israeli Prime Minister Ehud Olmert and ultimately executed in 2010 under President Barack Obama and Prime Minister Benjamin Netanyahu.
The scope of American involvement extended to Israel’s broader targeted killing policies. Ronen Bergman revealed that during Ariel Sharon’s tenure, a secret deal was struck with then-U.S. National Security Advisor Condoleezza Rice that committed Israel to “significantly reduce the construction of new settlements in exchange for American backing of the war with the Palestinians and of Israel’s targeted killing policy” of high-value Palestinian figures.
American intelligence cooperation facilitated Israel’s campaign against Iran’s nuclear program, with Melman documenting extensive Western knowledge of and potential involvement in the assassination of Iranian nuclear scientists between 2007-2012. The Obama administration was aware of the assassination campaign carried out by the Mujahideen-e-Khalq (MEK) terrorist organization, which was being financed, armed, and trained by Mossad. Joint Special Operations Command (JSOC) reportedly trained MEK members starting in 2005, and U.S. intelligence was providing crucial information for these operations. As one former senior intelligence official told investigative journalist Seymour Hersh, “the United States is now providing the intelligence” for assassinations carried out “primarily by MEK through liaison with the Israelis.”
Israeli dependency on foreign support went beyond Western allies to include collaborationist elements in the Arab world. Bergman revealed extensive details about Mossad’s regional cooperation during Meir Dagan’s tenure (2002-2010) as director of the Mossad, including secret partnerships with Arab intelligence services that publicly condemned Israel while privately cooperating with it. These arrangements involved joint operations with countries that “share more or less the same set of interests” despite public hostility, coordination in counter-terrorism operations across the Middle East, and partnerships that enabled many operations attributed solely to Mossad.
The pattern of foreign dependence continues in contemporary operations. An August 2025 ProPublica report by Yossi Melman and fellow journalist Dan Raviv showcased Israel’s enlistment of Iranian dissidents for executing missions inside Iran during “Operation Rising Lion.” They specifically outlined Mossad’s strategic shift from using Israeli personnel to cultivating a “foreign legion” of Iranian and regional operatives to carry out activities ranging from support functions to covert action.
This pattern of intelligence reporting by Melman and Bergman reveals that Israel’s reputation for independent intelligence capabilities obscures a reality of extensive foreign dependence, particularly on Western intelligence services, for conducting operations that extend Israeli influence and security interests globally.
Far from being a model of independence, Israel’s intelligence record underscores how deeply its operations are embedded in Western power structures. The myths of self-sufficiency and unmatched brilliance collapse under the weight of evidence: Mossad’s reach is extended only because Washington, European capitals, and even regional neighbors provide the pipelines of intelligence, technology, and manpower that make its operations possible.
The true scandal lies not in Israel’s dependency but in the willingness of other nations to abet its destabilizing campaigns by supplying the bombs, intelligence streams, and diplomatic cover that allow Tel Aviv to operate with impunity. To strip away the mythology is to confront the uncomfortable truth that Israel’s “miraculous” intelligence victories are collective endeavors, outsourced across continents, exposing not a triumph of independence but a parasitic reliance on collaborators who enable its shadow wars.
How the CIA Spawned Google
By Svetlana Ekimenko – Sputnik – 05.02.2025
American tech giant Google has faced regulatory scrutiny on numerous occasions amid accusations of antitrust violations. Google’s relationship with the CIA, ranging from early financial support to collaborative efforts have been decried as undermining privacy rights and free speech in the digital landscape.
Google’s creation played a crucial role in the US intelligence community’s scheme to attain global dominance by controlling information.
How it Started
- The Pentagon founded its private sector project the Highlands Forum during the Clinton administration in 1994, according to the INSURGE INTELLIGENCE project.
- Together with defense contractors, the group hammered out a strategy for “network-centric warfare.”
- The 9/11 terrorist attacks were seized upon by US spy agencies to justify not only military invasions across the Muslim world, but also mass surveillance of civilian populations.
CIA Steps In
- The CIA’s Massive Digital Data Systems (MDDS) program, which originated in the 1990s, was designed to enhance query techniques and track users’ digital footprints.
- To better serve its goals, in 1999, the CIA established its own venture capital firm, In-Q-Tel, to invest in potentially useful technologies.
- Ph.D. students at Stanford University, Sergey Brin and Larry Page, were working on precisely such a tech start-up.
- The design of the search engine and algorithms that ultimately evolved into Google was funded by CIA grants through a program aimed at enhancing mass surveillance capabilities.
PRISM
- Whistleblower Edward Snowden revealed in 2013 that the NSA had direct access to Google’s systems through its secret PRISM program, enabling the agency to harvest vast amounts of data on American citizens, Washington’s allies, and foreign nationals.
- Ex-CIA spooks are employed in almost every department at Google, according to a 2022 report based on the analysis of employment websites.
- Google has been slapped with multiple lawsuits stemming from its history of data misuse and privacy violations.
A Republic of Spies
By Andrew P. Napolitano | Ron Paul Institute | January 30, 2025
In 2021, to his credit, President Joe Biden warned the American public against the dangers of zero-click spyware manufactured by an Israeli corporation. Zero-click is unwanted software that can expose the entire contents of one’s mobile or desktop device to prying eyes without tricking one into clicking on to a link. Biden banned its importation and use in the United States.
Last week, as an inducement to Israeli Prime Minister Benjamin Netanyahu to accept the Israel/Hamas ceasefire agreement, President Donald Trump secretly agreed to lift the embargo on zero-click.
Here is the backstory.
Though America has employed spies since the Revolutionary War, until the modern era, spying was largely limited to wartime. That changed when America became a surveillance state in 1947 with the public establishment of the Central Intelligence Agency and the secret creation of its counterparts.
The CIA’s stated public task at its inception was to spy on the Soviet Union and its satellite countries so that American officials could prepare for any adverse actions by them. This was the time of the Red Scare, in which both Republicans and Democrats fostered the Orwellian belief that America needed a foreign adversary.
We had just helped the Russians defeat Germany in World War II, and our Russian ally — which was bankrupt and had just lost 27 million troops and civilians — suddenly became so strong it needed to be kept in check. The opening salvo in this absurd argument was fired by President Harry Truman in August 1945 when he used nuclear bombs intentionally to target civilians of an already defeated Japan. One of his targets was a Roman Catholic cathedral.
But his real target — so to speak — was his new friend, Joe Stalin.
When Truman signed the National Security Act into law in 1947, he also had Stalin in mind. That statute, which established the CIA, expressly stated that it shall have no internal intelligence or law enforcement functions and all its collections of intelligence shall come from sources outside the United States.
These limiting clauses were vital to passage of the statute, as members of Congress who crafted it feared the U.S. was creating the type of internal surveillance monster that we had just confronted in Germany.
Of course, no senior official in presidential administrations from Truman to Trump has taken these limitations seriously. As recently as the Obama administration, the CIA boasted that it had the capability of receiving data from all computer chips in the homes of Americans — such as in your microwave or dishwasher.
As well as its presence in your kitchen, the CIA is physically present in all 50 state houses in America. What is it doing there?
The feds admit to funding and empowering 18 domestic intelligence agencies — spies next door. The most notorious of these is the National Security Agency, which, when it last reported, employs 60,000+ persons, mostly civilians, with military leadership.
What do they do? They spy on Americans. We know this thanks to the personal courage of Edward Snowden and others who chose to honor their oaths to uphold the Constitution. NSA spying has produced so much data that the NSA built the second-largest building in the U.S. — after the Pentagon — for use as a storage facility of the data it has collected, and it is running out of room.
What has it collected? Quite simply, everything it can get its hands on. These domestic spies have access to every keystroke and all data on every digital device everywhere in the United States, without a warrant. This is computer hacking, a federal crime; but the feds don’t prosecute the spies they have hired to spy on us.
It also represents an egregious violation of the Fourth Amendment, which guarantees the right to privacy of all persons. The operative language is “the right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall not be violated.”
The law defines all searches and seizures conducted without a warrant as unreasonable and thus violative of not only this amendment but also the uniquely American value it was enacted to protect — the right to be left alone. Surely the computer chip in every desktop, mobile device, dishwasher and microwave is an “effect” protected by the Constitution.
The spies and, sadly, the presidents for whom they have worked don’t see it that way. They have claimed in federal courts and elsewhere that the Fourth Amendment does not pertain to them because they are not law enforcement and because they work directly for the president, who, when he is operating as the commander in chief, is free to employ government assets as he wishes, without constitutional constraints.
This argument has been used to justify the CIA’s violent killings of Americans and others in foreign lands using drones and its agents dressed as military. It has justified the brutal torture of foreign nationals, even those whom the CIA deemed were being truthful during their interrogations. And, of course, it has justified ignoring the Constitution and the rights it protects and the values that underlie it.
This argument was also used to justify foreign and federal spying on Trump. Now he wants to make it easier for America’s spies to spy on the rest of us.
Spying belies the very purpose of the Constitution — to keep the government off the people’s backs. Of course, when the late Justice William O. Douglas coined that phrase, there were no computer chips, the CIA was thought to be law-abiding and the NSA didn’t exist.
So, we can see how desirous of secrecy the Trump administration was last week when it agreed to lift the zero-click embargo.
We can try to avoid commercial spyware, but how can we avoid a totalitarian government that spies on everyone?
According to the Declaration of Independence, we can do so by altering or abolishing it.
To learn more about Judge Andrew Napolitano, visit https://JudgeNap.com.
COPYRIGHT 2025 ANDREW P. NAPOLITANO
DISTRIBUTED BY CREATORS.COM
Tulsi Gabbard Right Pick to Shake-Up US Spy Agiencies – Philip Giraldi
By Ekaterina Blinova – Sputnik – 15.11.2024
President-elect Donald Trump nominated the former Democratic congresswoman and a 21-year army reserve veteran to oversee the bewildering array of 18 US spy agencies in his incoming administration.
“A foreign policy and national security appointment that has created considerable dissent is that of Tulsi Gabbard as Director of National Intelligence [DNI],” Philip Giraldi, a former CIA operations officer with experience in Europe and the Middle East, told Sputnik.
The CIA veteran said much of the dissent comes from inside the ‘intelligence community’, including active officers and former staff of organizations like the CIA and NSA.
Objections to Gabbard’s nomination have focused on her lack of intelligence experience, claiming she will “be unable to perceive problems among an unruly 18-member intelligence community,” the pundit said.
But Giraldi countered that she was “smart, experienced and capable enough to gather her own staff around her that will guide her way through the shoals of Washington DC.”
“To my mind, she is an excellent choice, coming from outside of the intelligence community ‘club,’ and could be an effective and ethical DNI,” he added.
The former CIA officer noted that Gabbard is viewed as a “peace candidate” for her opposition to endless overseas wars, the US military occupation of parts of Syria and the demonization of China. But she is also known for her support for Israel, currently waging a war against the Palestinian territory of Gaza.
“It is likely that Trump appointed her to shake up the intel community, which is regarded by many as the black heart of the deep state,” Giraldi said. “She will, of course, be both helped and handicapped by being provided with plenty of ‘direction’ by a president who is fundamentally ignorant of foreign policy and national security issues.”
‘How I Got Fired From The CIA’: Philip Giraldi Tells All
By Tyler Durden – Zero Hedge – September 6, 2024
Americans are by now familiar with a handful of whistleblowers who after spending years employed by the US intelligence community (IC) eventually saw enough to make them angry and throw away the safety of their future government careers by exposing state secrets to the public. Names like Snowden, Manning, Kiriakou or John Stockwell, William Binney and Thomas Drake (both of NSA whistleblower fame) are well-known, especially in independent and alternative media circles.
But lesser known are the names of those abruptly fired and dismissed from their posts as analysts or as officers for merely questioning and pushing back in real time against what they understood to be disastrous and criminal foreign action and policy. We suspect that this list of names, still largely unknown to the public or media, is much bigger than anyone knows. Such ex-employees of the CIA, NSA, DIA or other alphabet soup agencies typically have their security clearances revoked and are threatened with criminal prosecution should they ever reveal state secrets and classified information. The possibility of future employment even in the civilian world then comes under threat. This means most of them remain unknown.
Typically the American public only finds out about massive covert CIA operations or US war plans long after the fact. For example, the intelligence community knew that the Bush-Cheney White House was gearing up for a ‘shock and awe’ invasion of Iraq for at least many months before it happened. Or for another example, the truth about the CIA’s covert program to overthrow Syria’s Assad (called ‘Timber Sycamore’) finally leaked to The New York Times at least half a decade after it began. Intelligence planners under President Obama understood that the US was arming and training al-Qaeda linked Libyan rebels to overthrow and execute Gaddafi. And all the while, then Secretary of State Hillary Clinton was getting briefed on these US-backed ‘rebels’ conducting extermination campaigns against ethnic minorities. Such horrific and suppressed truths only typically come out years or decades after they happen.
But again, what of those rare voices who dissent in real time and quietly suffer the full retribution of the national security deep state, far from the public eye? ZeroHedge was able to hear directly from one such rare dissenter in the Washington D.C. area this weekend. Former CIA operations officer Philip Giraldi spent over two decades in the agency, which took him around the world. We heard his fascinating and alarming story of “How I Got Fired From The CIA” during a closed-door session at the Ron Paul Institute‘s Liberty Platform conference held in Dulles, Virginia.
Below are ex-CIA Giraldi’s words recounting how his long career led up to a difficult show-down with CIA leadership, and what happened next, as transcribed directly by ZeroHedge [emphasis ours].
* * *
After graduate school and following time in the US Army as an intelligence officer, I joined the CIA. I was an operations officer, which means a spy. I was sent to a lot of nice places to live in, starting with Rome. And then I was in Hamburg and then I was in Istanbul, and then Barcelona. After Barcelona I left the agency for a while and came back as a contractor after 9/11, and I was there for another three years.
How I got in trouble with the agency was… after I came back as a contractor I was sent to Afghanistan – this was after we had overrun it. It didn’t take me long to figure out that we had replaced the Taliban by becoming worse than the Taliban.
And there was no evidence whatsoever coming from CIA analysts that [Osama] bin Laden [and the Afghan government] had actually been involved in 9/11, and so it was a bit of a contradictory assignment, and I became suspicious after that concerning the bogus things going on and what was developing inside the government.
So a couple years later I was back at CIA headquarters at Langley, Virginia and working with them on basic security issues. I had been a counterterrorism specialist and so I was working on different groups that they were considering to be ‘over horizon’ threats to the United States. This was a new concept, this threat. The tune that was being played in Washington was that ‘we are threatened’.
Anyway, while I was doing this I was also talking to a number of my friends who were classmates [from prior schooling and training early in his career] who were analysts and they at this point were very senior analysts in the agency. And the United States meanwhile was preparing to attack Iraq because Iraq was ‘a threat’.
And these friends of mine who were analysts saw all of the raw information that went into what the US government was seeing and they said, “you know this is all bullshit, this is all a lie – the intelligence that’s coming in is fake. And this fake intelligence is being used to justify starting another war.”
So anyway I got ‘converted’ and I started to be somewhat outspoken on the issue of why we should not be going into Iraq and we should leave this alone. And word of this got around [the agency].
So they called me in, they polygraphed me. They wanted to know who among all of my friends have similar views. I refused to cooperate and they said at that point, “well you failed your polygraph exam, we want to take away your security clearance.“
So this was after twenty-one years in the agency, they took away my clearance, and I was basically fired. So it’s kind of an interesting tale. I think it’s probably shaped my thinking ever since then. I’m automatically suspicious of people who talk about justifications for wars. I think I will continue for the rest of my life to be that way. Thank you.
The FBI ‘Visits’ Scott Ritter

By Andrew P. Napolitano | Ron Paul Institute | August 15, 2024
Among the lesser-known holes in the Constitution cut by the Patriot Act of 2001 was the destruction of the “wall” between federal law enforcement and federal spies. The wall was erected in the Foreign Intelligence Surveillance Act of 1978, which statutorily limited all federal domestic spying to that which was authorized by the Foreign Intelligence Surveillance Court.
The wall was intended to prevent law enforcement from accessing and using data gathered by America’s domestic spying agencies.
Government spying is rampant in the US, and the feds regularly engage in it as part of law enforcement’s well-known antipathy to the Fourth Amendment. Last week, the FBI admitted as much when it raided the home of former Chief UN Weapons Inspector Scott Ritter. Scott is a courageous and gifted former Marine. He is also a fierce and articulate antiwar warrior.
Here is the backstory.
After President Richard Nixon resigned the presidency, Congress investigated his use of the FBI and CIA as domestic spying agencies. Some of the spying was on political dissenters and some on political opponents. None of it was lawful.
What is lawful spying? The modern Supreme Court has made it clear that domestic spying is a “search” and the acquisition of data from a search is a “seizure” within the meaning of the Fourth Amendment. That amendment requires a warrant issued by a judge based on probable cause of crime presented under oath to the judge for a search or seizure to be lawful. The amendment also requires that all search warrants specifically describe the place to be searched and the person or thing to be seized.
The language in the Fourth Amendment is the most precise in the Constitution because of the colonial disgust with British general warrants. A general warrant was issued to British agents by a secret court in London. General warrants did not require probable cause, only “governmental needs.” That, of course, was no standard whatsoever, as whatever the government wants it will claim that it needs.
General warrants authorized government agents to search wherever they wished and to seize whatever they found — stated differently, to engage in fishing expeditions.
FISA required that all domestic spying be authorized by the new and secret FISA Court. Congress then unconstitutionally lowered the probable cause of crime standard for the FISA Court to probable cause of speaking to a foreign agent, and it permitted the FISA Court to issue general warrants.
Yet, the FISA compromise that was engineered in order to attract congressional votes was the wall. The wall prohibited whatever data was acquired from surveillance conducted pursuant to a FISA warrant to be shared with law enforcement.
So, if a janitor in the Russian embassy was really an intelligence agent who was distributing illegal drugs as lures to get Americans to spy for him, any telephonic evidence of his drug dealing could not be given to the FBI.
The purpose of the wall was not to protect foreign agents from domestic criminal prosecutions; it was to prevent American law enforcement from violating personal privacy by spying on Americans without search warrants.
Fast forward to the weeks after 9/11 when, with no serious debate, Congress enacted the Patriot Act. It removed the wall between law enforcement and spying. And by 2001, the FISA Court had on its own lowered the standard for issuing a search warrant from probable cause of speaking to a foreign agent to probable cause of speaking to a foreign person. This, too, was unlawful and unconstitutional.
The language removing the wall sounds benign, as it requires that the purpose of the spying must be national security and the discovered criminal evidence — if any — must be accidental or inadvertent. In January 2023, the FBI admitted that it intentionally uses the CIA and the NSA to spy on Americans as to whom it has neither probable cause of crime nor even articulable suspicion of criminal behavior.
Articulable suspicion is the linchpin of commencing all criminal investigations. Without requiring suspicion, we are back to fishing expeditions.
The FBI’s admission that it uses the CIA and the NSA to spy for it came in the form of a 906-page FBI rulebook written during the Trump administration, disseminated to federal agents in 2021 and made known to Congress last year.
Last week, when FBI agents searched Ritter’s home in upstate New York, in addition to trucks, guns, a SWAT team and a bomb squad, they arrived with printed copies of two years’ of Ritter’s emails and texts that they obtained without a search warrant. To do this, they either hacked into Ritter’s electronic devices — a felony — or they relied on their cousins, the CIA and the NSA, to do so, also a felony.
But the CIA charter prohibits its employees from engaging in domestic surveillance and law enforcement. Nevertheless, we know the CIA is physically or virtually present in all of the 50 US statehouses. And the NSA is required to go to the FISA Court when it wants to spy. We know that this, too, is a charade, as the NSA regularly captures every keystroke triggered on every mobile device and desktop computer in the US, 24/7, without warrants.
The search warrant for Ritter’s home specified only electronic devices, of which he had three. Yet, the 40 FBI agents there stole a truckload of materials from him, including his notes from his U.N. inspector years in the 2000s, a draft of a book he is in the midst of writing and some of his wife’s personal property.
The invasion of Scott Ritter’s home was a perversion of the Fourth Amendment, a criminal theft of his private property and an effort to chill his free speech. But it was not surprising. This is what has become of federal law enforcement today. The folks we have hired to protect the Constitution are destroying it.
To learn more about Judge Andrew Napolitano, visit https://JudgeNap.com.
COPYRIGHT 2024 ANDREW P. NAPOLITANO
DISTRIBUTED BY CREATORS.COM
US NSA Purchasing Web Browser Data Without Warrant – Letter
By Mary Manley – Sputnik – 27.01.2024
Amid rising concerns that foreign governments may be purchasing the personal data of citizens, this recent disclosure is the latest evidence of the US government doing such.
The US National Security Agency is buying Americans’ internet browning information from commercial brokers without a warrant, according to a letter between US Senator Ron Wyden (D-OR) and the Director of National Intelligence Avril Haines.
Wyden, who made the letter from Thursday public, called for US intelligence officials to cease purchasing Americans’ data unless it has been obtained in a “lawful manner”.
“As you know, U.S. intelligence agencies are purchasing personal data about Americans that would require a court order if the government demanded it from communications companies,” writes Wyden.
“Such location data is collected from Americans smartphones by app developers, sold to data brokers, resold to defense contractors, and then resold again to the government. In addition; the National Security Agency (NSA) is buying Americans’ domestic internet metadata,” he continues.
He added that “until recently, the data broker industry and the intelligence community’s (IC) purchase of data from these shady companies has existed in a legal gray area”. And that app and advertising companies did not disclose their sale and sharing of personal data with brokers nor did they “obtain informed consent”.
“The secrecy around data purchases was amplified because intelligence agencies have sought to keep the American people in the dark. It took me nearly three years to clear the public release of information revealing the NSA’s purchase of domestic internet metadata,” the senator emphasized.
The senator then points out that the Federal Trade Commission (FTC) brought an action against the data broker X-Mod Social earlier this month. Wyden says that lawyers for the company admitted that they were selling data collected from phones in the US to “US military customers, via defense contractors”.
The FTC then emphasized that the sales of location data is dangerous as it can be used to track people to “sensitive locations, including medical facilities, places of religious worship, places that may be used to infer an LGBTQ+ identification, domestic abuse shelters, and welfare and homeless shelters”. They add that consumers should be made aware that their data is being sold to “government contractors for national security purposes”.
Under Secretary of Defense Ronald S. Moultrie defended the methods of government data collecting in a separate letter released by Wyden.
“I am not aware of any requirement in U.S. law or judicial opinion… that DOD obtain a court order in order to acquire, access or use information, such as CAI, that is equally available for purchase to foreign adversaries, U.S. companies and private persons as it is to the U.S. government,” he wrote.
Army General Paul M. Nakasone, the director of the NSA, also justified the agency’s actions by explaining that the NSA acquires “commercially available information” but that those acquisitions are limited. Adding that they don’t include location data from phones “known to be used in the US”, and that the “non-content” data they do buy is located abroad and is critical for the US Defense Industrial base, according to a separate letter.
“NSA understands and greatly values the congressional and public trust it has been granted to carry out its critical foreign intelligence and cybersecurity missions on behalf of the American people,” Gen. Nakasone wrote.
In the end of his letter, Wyden wrote that the US government should not be “funding and legitimizing shady industry whose flagrant violations of Americans’ privacy are not just unethical, but illegal”. He then requested that Haines direct each IC element to take on a list of actions he outlined, including taking an inventory of the information they have already collected and to discard any information that does not meet consent laws.
‘If We Get Away With It, It’s Legal’: Documents Reveal New Details on U.S. Government’s ‘Censorship-Industrial Complex’
By Michael Nevradakis, Ph.D. | The Defender | November 29, 2023
Government agencies, private-sector firms, academia and nonprofits were collaborating to combat alleged “misinformation” and “disinformation” as far back as 2017, according to new documents released Tuesday.
The “CTIL Files” — which refer to the Cyber Threat Intelligence League, or CTI League, a key player in the so-called “Censorship-Industrial Complex” — are based on documents received from an unnamed but “highly credible” whistleblower, according to investigative journalists Michael Shellenberger, Alex Gutentag and Matt Taibbi, who released the files.
The new documents rival or exceed the “Twitter Files” and “Facebook Files” in “scale and importance,” according to the journalists, two of whom — Shellenberger and Taibbi — were instrumental in releasing many of the “Twitter Files” that first called attention to the “Censorship-Industrial Complex.”
A comprehensive picture of the birth of the ‘anti-disinformation’ sector
The documents, which the journalists detailed on Substack, center around the activities of the CTI League, which “officially began as the volunteer project of data scientists and defense and intelligence veterans but whose tactics over time appear to have been absorbed into multiple official projects, including those of the Department of Homeland Security (DHS).”
According to the journalists, the CTI League documents “offer the missing link … to key questions not addressed in the Twitter Files and Facebook Files” and “offer a comprehensive picture of the birth of the ‘anti-disinformation’ sector.”
“The whistleblower’s documents describe everything from the genesis of modern digital censorship programs to the role of the military and intelligence agencies, partnerships with civil society organizations and commercial media, and the use of sock puppet accounts and other offensive techniques,” the journalists wrote.
Documents in the “CTIL Files” show members of the CTI League, DHS officials and key figures from social media companies “all working closely together in the censorship process.”
This “public-private model” laid the groundwork for “anti-misinformation” and “anti-disinformation” campaigns launched by the U.S. and U.K. governments in 2020 and 2021, the journalists wrote, including attempts to circumvent First Amendment protections against government censorship of speech in the U.S.
Such tactics included “masking censorship within cybersecurity institutions and counter-disinformation agendas; a heavy focus on stopping disfavored narratives, not just wrong facts; and pressuring social media platforms to take down information or take other actions to prevent content from going viral,” they added.
The CTI League went still further though, the journalists wrote, engaging “in offensive operations to influence public opinion, discussing ways to promote ‘counter-messaging,’ co-opt hashtags, dilute disfavored messaging, create sock puppet accounts, and infiltrate private invite-only groups.”
Such censorship lies at the heart of Missouri et al. v. Biden et al., a First Amendment censorship case where injunctions were issued against several federal agencies and government officials, barring them from communicating with social media companies regarding user content. The injunctions are now under review by the U.S. Supreme Court.
Former British intelligence analyst charged with creating counter-disinformation project
The journalists wrote that while previous releases of the “Twitter Files” and “Facebook Files” revealed “overwhelming evidence of government-sponsored censorship,” they had not revealed “where the idea for such mass censorship came from.”
The whistleblower alleged that a key figure in the CTI League, “a ‘former’ British intelligence analyst, was ‘in the room’ at the Obama White House in 2017 when she received the instructions to create a counter-disinformation project to stop a ‘repeat of 2016.’”
By 2019, this analyst, Sara-Jayne “SJ” Terp, had “developed the sweeping censorship framework,” leading a team of U.S. and U.K. “military and intelligence contractors” who “co-led CTIL.” Previously, in 2018, Terp attended a 10-day military exercise organized by the U.S. Army Special Operations Command, according to the journalists.
It was there that Terp met Pablo Breuer, a former U.S. Navy commander, who became a key figure in the CTI League. According to Wired, the two realized that misinformation “could be treated … as a cybersecurity problem.” This led to the development of CogSec, which soon housed the “MisinfoSec Working Group.”
“Terp’s plan, which she shared in presentations to information security and cybersecurity groups in 2019, was to create ‘Misinfosec communities’ that would include government,” the journalists wrote.
By spring 2020, it appears Terp achieved this plan, as the CTI League partnered with the Cybersecurity and Infrastructure Security Agency (CISA), which has been implicated in prior releases of the “Twitter Files” for its role in the “Censorship-Industrial Complex.”
The MisinfoSec Working Group included Renee DiResta, a former CIA operative who worked for the Election Integrity Partnership (EIP) — later renamed the Virality Project (VP). This group “created a censorship, influence, and anti-disinformation strategy called Adversarial Misinformation and Influence Tactics and Techniques (AMITT).”
According to the journalists, AMITT adapted “a cybersecurity framework developed by MITRE, a major defense and intelligence contractor that has an annual budget of $1 to $2 billion in government funding.” MITRE is a backer of the Vaccination Credential Initiative and the SMART Health Card — a digital “vaccine passport.”
Terp used AMITT to develop the DISARM framework, which the World Health Organization (WHO) applied in “countering anti-vaccination campaigns across Europe.”
The same framework “has been formally adopted by the European Union and the United States as part of a ‘common standard for exchanging structured threat information on Foreign Information Manipulation and Interference’” according to the journalists.
‘Can we get a troll on their bums?’
According to the journalists, MisinfoSec’s motivation for counter-misinformation was the “twin political earthquakes of 2016: Brexit and the election of Trump.”
“There’s something off kilter with our information landscape,” Terp and other CTI League members wrote, according to documents.
“The usual useful idiots and fifth columnists — now augmented by automated bots, cyborgs and human trolls — are busily engineering public opinion, stoking up outrage, sowing doubt and chipping away at trust in our institutions. And now it’s our brains that are being hacked,” they added.
In spring 2020, the CTI League set its sights on COVID-19-related narratives, targeting users who engaged in messaging that ran contrary to official policy.
“CTIL began tracking and reporting disfavored content on social media, such as anti-lockdown narratives like ‘all jobs are essential,’ ‘we won’t stay home,’ and ‘open America now,’” the journalists wrote.
“CTIL created a law enforcement channel for reporting content as part of these efforts. The organization also did research on individuals posting anti-lockdown hashtags … and kept a spreadsheet with details from their Twitter bios. The group also discussed requesting ‘takedowns’ and reporting website domains to registrars,” they added.
Regarding the “we won’t stay home” narrative, internal documents revealed by the whistleblower showed that CTI League members wrote, “Do we have enough to ask for the groups and/or accounts to be taken down or at a minimum reported and checked?” and “Can we get all troll on their bums if not?”
They also called posters circulating online promoting anti-lockdown posters “disinformation artifacts,” saying, “We should have seen this one coming” and asking “can we stop the spread, do we have enough evidence to stop superspreaders, and are there other things we can do (are there countermessagers we can ping etc).”
During CTI League brainstorming sessions to develop strategies for “counter-messaging for things like encouraging people to wear masks,” statements such as “Repetition is truth” were uttered by CTI League staff, the journalists noted.
The CTI League also sought to go “beyond simply urging Twitter to slap a warning label on Tweets, or to put individuals on blacklists.”
According to the journalists, “The AMITT framework calls for discrediting individuals as a necessary prerequisite of demanding censorship against them” and “trying to get banks to cut off financial services to individuals who organize rallies or events.”
As part of these efforts, even truthful information was targeted. In a 2019 podcast on “Disinformation, Cognitive Security, and Influence,” Terp admitted, “Most information is actually true … but set in the wrong context.”
“You’re not trying to get people to believe lies most of the time,” she said. “Most of the time, you’re trying to change their belief sets. And in fact, really deeper than that, you’re trying to change, to shift their internal narratives … the set of stories that are your baseline for your culture.”
Previous “Twitter Files” releases have revealed that true information was targeted for censorship by the U.S. government and social media platforms like Twitter if the information contradicted official policy regarding COVID-19 vaccines and restrictions.
‘Cognitive security’ a euphemism for censorship
In the same podcast, according to the journalists, Terp said, “Cognitive security is the thing you want to have. You want to protect that cognitive layer. It basically, it’s about pollution. Misinformation, disinformation is a form of pollution across the Internet.”
The journalists wrote, “A key component of Terp’s work through CTIL, MisinfoSec, and AMITT was to insert the concept of ‘cognitive security’ into the fields of cybersecurity and information security.”
Such “cognitive security” was seen as being threatened by the erosion of the mass media’s control on information and influence over public opinion.
Documents revealed by the whistleblower included a MisinfoSec report stating “For a long time, the ability to reach mass audiences belonged to the nation-state (e.g. in the USA via broadcast licensing through ABC, CBS and NBC).”
“Now, however, control of informational instruments has been allowed to devolve to large technology companies who have been blissfully complacent and complicit in facilitating access to the public for information operators at a fraction of what it would have cost them by other means,” the report said.
The same report also called for a form of “pre-bunking,” to “preemptively inoculate a vulnerable population against messaging,” suggesting that DHS-funded Information Sharing and Analysis Centers could be used to promote such pre-bunking.
‘If we get away with it, it’s legal’
Public-private partnerships were specifically sought out in an attempt to circumvent First Amendment free speech protections in the U.S., the documents revealed, even while Bloomberg, The Washington Post and Wired wrote glowing articles portraying the CTI League as a mere group of “volunteer” cybersecurity experts.
Yet, according to the journalists, “In just one month, from mid-March to mid-April [2020], the supposedly all-volunteer CTIL had grown to ‘1,400 vetted members in 76 countries’” and had “helped to take down 2,833 cybercriminal assets on the internet” including some which impersonated government organizations, the United Nations and WHO.
On the same 2019 podcast, according to the journalists, Breuer explained how the CTI League was getting around the First Amendment, by working to get “nontraditional partners into one room,” including “maybe somebody from one of the social media companies, maybe a few special forces operators, and some folks from Department of Homeland Security.”
Together, they would “talk in a non-attribution, open environment in an unclassified way so that we can collaborate better, more freely and really start to change the way that we address some of these issues,” Breuer said.
Breuer even likened these tactics to those employed by the Chinese government, saying “If you talk to the average Chinese citizen, they absolutely believe that the Great Firewall of China is not there for censorship. They believe that it’s there because the Chinese Communist Party wants to protect the citizenry and they absolutely believe that’s a good thing.”
“If the US government tried to sell that narrative, we would absolutely lose our minds and say, ‘No, no, this is a violation of our First Amendment rights.’ So, the in-group and out-group messaging have to be often different,” he said.
The whistleblower told the journalists that CTI League leaders did not discuss their potential violation of the First Amendment.
“The ethos was that if we get away with it, it’s legal, and there were no First Amendment concerns because we have a ‘public-private partnership’ — that’s the word they used to disguise those concerns. ‘Private people can do things public servants can’t do, and public servants can provide the leadership and coordination,’” the whistleblower said.
According to the journalists, the authors of the MisinfoSec report also “advocated for police, military, and intelligence involvement in censorship, across Five Eyes nations, and even suggested that Interpol should be involved.”
The CTI League documents also suggest that the organization was involved in a form of domestic spying, with one document noting that while censorship activities abroad are “typically” performed by “the CIA and NSA and the Department of Defense,” such efforts “against Americans” necessitate the use of private partners because the government lacks the “legal authority” to do so.
According to the whistleblower, CTI League members also went to great lengths to conceal their activities, with a CTI League handbook recommending the use of burner phones, online pseudonyms and the generation of fake AI faces. One document advised, “Lock your s**t down … your spy disguise.”
One suggested list of questions to be posed to prospective CTI League members proposed asking whether those individuals had ever “worked with influence operations (e.g. disinformation, hate speech, other digital harms etc) previously” and whether those efforts included “active measures” and “psyops” (psychological operations).
Indeed, according to the documents, several CTI League members had worked for the military or intelligence agencies, while according to the whistleblower, “roughly 12-20 active people involved in CTIL worked at the FBI or CISA” — even, for a time, displaying their agency seals alongside their names on the CTI League’s internal Slack channel.
Terp, for instance, previously designed machine learning algorithms and unmanned vehicle systems for the U.K.’s Ministry of Defence.
According to the whistleblower, the CTI League sought “to become part of the federal government.”
Shellenberger, Taibbi to testify before Congress this week
According to the journalists, the FBI declined to comment, while CISA, Terp and other CTI League figures did not respond to requests for comment.
However, one CTI League member, Bonnie Smalley, did respond to the journalists’ request. She wrote, verbatim, “all i can comment on is that i joined cti league which is unaffiliated with any govt orgs because i wanted to combat the inject bleach nonsense online during covid. … i can assure you that we had nothing to do with the govt though.”
“CTIL appears to have generated publicity about itself in the Spring and Fall of 2020 for the same reason EIP did: to claim later that its work was all out in the open and that anybody who suggested it was secretive was engaging in a conspiracy theory,” the journalists wrote.
“But as internal messages have revealed, much of what EIP did was secret, as well as partisan, and demanding of censorship by social media platforms, contrary to its claims,” they said, adding that “EIP and VP, ostensibly, ended, but CTIL is apparently still active, based on the LinkedIn pages of its members.”
The journalists said the documents will be presented to Congressional investigators and made public, while protecting the identity of the whistleblower.
Shellenberger and Taibbi will testify at Thursday’s hearing of the U.S. House of Representatives’ Select Subcommittee on the Weaponization of the Federal Government. They previously testified before the same committee in March.
On Tuesday, Taibbi appeared in a live YouTube webcast presenting some of the key revelations from the first release of the “CTIL Files.”
Michael Nevradakis, Ph.D., based in Athens, Greece, is a senior reporter for The Defender and part of the rotation of hosts for CHD.TV’s “Good Morning CHD.”
This article was originally published by The Defender — Children’s Health Defense’s News & Views Website under Creative Commons license CC BY-NC-ND 4.0. Please consider subscribing to The Defender or donating to Children’s Health Defense.
RT surges after X (aka Twitter) removes censorship – ‘disinformation’ lobbyist
RT | September 27, 2023
NewsGuard, a self-proclaimed disinformation watchdog, has lamented the rise in popularity of RT and 11 other news outlets after Elon Musk relaxed censorship on X (formerly Twitter).
Among 12 media accounts analyzed, RT experienced the highest engagement growth in the 90 days following Musk’s decision in April to remove ‘government-funded’ and ‘state-affiliated’ labels from certain outlets, NewsGuard said on Tuesday. The number of ‘likes’ and reposts for RT’s account increased to 2.5 million in the period studied, up from 1.3 million.
The analysis focused on Chinese, Iranian, and Russian media outlets, which NewsGuard branded “state-run disinformation sources” and purveyors of “propaganda.”
NewsGuard cited political memes posted by Iranian news accounts as purported examples of disinformation. Another instance was supposedly a link shared by Iran’s PressTV to an article on remarks made by US presidential hopeful Robert F. Kennedy Jr., who argued that Americans “created” the Islamic State terrorist group. Kennedy made the claim during an election rally in Boston, where he accused Washington of decades of misguided foreign policy.
The self-described disinformation watchdog advocates imposing strict moderation on online platforms to protect users from supposed foreign influence. NewsGuard’s rating of news outlets generally labels mainstream Western media as trustworthy, while outlets linked with governments opposed by the US are branded deceitful.
Among NewsGuard’s advisers is Michael Hayden, a former head of the CIA and the NSA. He was notably one of the more than 50 former intelligence officials who claimed in 2020 that the factual New York Post story about Hunter Biden’s laptop had “all the classic earmarks of a Russian information operation.”
Others include former NATO Secretary General Anders Fogh Rasmussen, former US Secretary of Homeland Security Tom Ridge, and former US Under Secretary of State Richard Stengel. The latter stated publicly that his job in the Obama administration was jokingly described as “chief propagandist” by others.
The Pentagon and Microsoft have contracted NewsGuard services.
The report heavily implied that the lack of X labels for the likes of RT was to blame for the rise in engagements, as it is now “impossible for users to know whether an account is government-affiliated” simply by looking at posts.
NewsGuard claimed that the 12 accounts in question are attempting to conceal their associations, such as when RT rebranded from its previous name Russia Today. The report described the move as taking place “several years ago,” although the rebranding was implemented in 2009.
Musk, who formally stepped down as CEO of X (then Twitter) in June, ordered the ‘government-funded’ and ‘state-affiliated’ labels to be removed amid a row with America’s NPR, which exited the platform after being branded. Around the same time, X ended its ‘shadow-ban’ on RT and others, lifting a restriction imposed under the previous executive leadership.
The subsequent publication of the ‘Twitter Files’ has detailed extensive US government oversight and pressure on the social media company to amplify Pentagon talking points over dissenting voices.
NewsGuard conceded that Musk’s move to end restrictions on X, which it described as “pushing” undesirable accounts, may have benefited them.
In August, NATO’s Strategic Communications Center of Excellence blamed Musk for a “dramatic rise” in the visibility of Russian government and media accounts.
No US Presidential Election in 2024
The Automatic Earth | August 11, 2023
In January 2023, US special counsel Jack Smith applied for -and received- a subpoena for Twitter, specifically for all of Donald Trump’s utterances at the site through the years, including the ones he may have never published. Note: the subpoena came long after Trump left Twitter. And no, it wasn’t X then, and therefore it is not now. He wrote it when it was Twitter. Important. Trump left Twitter (was cancelled) on Jan 8 2021, Elon Musk bought it on October 27 2022, and renamed it “X” in late July 2023. Just so we get our horses and dogs in line.
Special counsel Jack Smith received his Twitter/Trump subpoena with the added provision that it had to be entirely secret, not even Twitter or Trump could know. US District Court Judge Beryll Howell gave Smith what he wanted, agreeing that if Trump’s years-old Twitter past was known, he would become a flight risk. But both Smith and Howell knew this was absolute nonsense. Not only is Twitter the last place you turn to when you have nefarious secrets to hide (it’s the opposite!), but the man is running for President, for God’s sake! And because of some 5 year old -or so- tweets he would pack in the family and disappear to an -underground- bungalow on Vanatua, never to be heard from again?
I would put this down as the moment when it became impossible for the US to have a presidential election in 2024. We’ve had some 8 years of this anti-Trump circus now, non-stop, Hillary, Pelosi, Adam Schiff and Robert Mueller, yada yada yada, but I don’t think we’ve reached the point before where the elections might as well be cancelled. We’re there now though. And that is a BIG point. We’ve let it come far too far. We’re in slapstick territory.
Think of it as a boxing match. In the one corner, we have the former champion/president, wearing the slightly widened red trunks. At age 77, he looks somewhat bruised and battered, but he doesn’t look beaten- yet. What’s noticeable though is that his corner is empty, except for Melania cleaning his brow, not even his own party is there to support him. There are some 90 million Americans behind him, but they are at home.
In the other corner, the defending champion, in blue trunks, weighing in at about 25 pounds and falling, looks a little lost. But behind him in his corner he has thousands of operatives: his entire party, plus the CIA and NSA and FBI and DOJ. And all the newspapers and TV channels and social media in the country. And all the judges and prosecutors, the DAs and GAs, it’s a veritable love-in. The guy in the blue trunks could be braindead and he’d still win. And I wish I was a cartoonist, and could capture the entire image in one frame. I can see it in front of my eyes, but I can’t draw it.
Where the boxing analogy goes astray is that in this case the blue side is allowed to harass the red side before, during and after the (preparations for) the fight, and during the fight itself. You can’t a have a free and fair fight, and a level playing field, if some “blue operatives” can put shackles on the ankles and wrists of the red candidate, or even lock him up while he’s preparing for the bell to ring. If the system allows him to be a candidate, it must also allow him to prepare for his candidacy, in the same way that his opponent can. That is not happening.
US special counsel Jack Smith has announced that the US plans to drag Trump before court after court starting January 2 2024. At least 3 major indictments (will be a dozen) , likely many more, and at my last count, 82 charges (it’s impossible to keep up). Smith can then finger pick any of these charges to put Trump in custody, whenever he feels like it. The judges are almost all “blue”, and so are the jury pools: New York and DC. And this is while he’s supposed to be campaigning!
And also: Trump allegedly already spent $40 million on legal expenses. But what if Trump doesn’t have $40 million? We could argue the $40 million should be spent on his campaign. Look at Imran Khan, guys, who was just convicted to a 3-year prison term in Pakistan on US directives. Like Trump, he is the most popular political candidate in his nation, and they got him on selling necklaces when he was PM.
That is Trump’s future too. And hence, the end of American democracy. He doesn’t stand a chance. And if he doesn’t, the system doesn’t, and you don’t. You’re fine as long as you agree with the boot stomping on your neck, and you maybe even enjoy it. But if you don’t, Jack Smith and his ilk – and Obama, Hillary, Adam Schiff, Pelosi, the whole gang, will come with charges and indictments directed at you.
You’re on the verge of the abyss. if you want to take your chances with what you might find down there, fair enough. But always know that you have a choice. And that, if somehow they do manage to stage a presidential election in November 2024 as things stand now, it’ll be fake from A to Z. Grow a pair, people, grow a backbone. You’re going to need them.

