Government Corruption Media ArticlesExcerpts of Key Government Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Marsha Appling-Nunez was showing the college students she teaches how to check online if they're registered to vote when she made a troubling discovery. Despite being an active Georgia voter who had cast ballots in recent elections, she was no longer registered. She tried re-registering, but with about one month left before a November election ... Appling-Nunez's application is one of over 53,000 sitting on hold with Georgia Secretary of State Brian Kemp's office. Kemp, who's also the Republican candidate for governor, is in charge of elections and voter registration in Georgia. His Democratic opponent, former state Rep. Stacey Abrams, and voting rights advocacy groups charge that Kemp is systematically using his office to suppress votes and tilt the election, and that his policies disproportionately affect black and minority voters. Through a process that Kemp calls voter roll maintenance and his opponents call voter roll purges, Kemp's office has cancelled over 1.4 million voter registrations since 2012. Nearly 670,000 registrations were cancelled in 2017 alone. According to records obtained from Kemp's office through a public records request, Appling-Nunez's application - like many of the 53,000 registrations on hold with Kemp's office - was flagged because it ran afoul of the state's "exact match" verification process. An analysis of the records obtained by The Associated Press reveals racial disparity in the process. Georgia's population is approximately 32 percent black, according to the U.S. Census, but the list of voter registrations on hold with Kemp's office is nearly 70 percent black.
Note: More on this is available in this MSNBC article. For more along these lines, see concise summaries of deeply revealing elections news articles from reliable major media sources.
The disappearance, and possible murder, of Jamal Khashoggi, a high-profile critic of the Saudi regime, is the latest, disturbing addition to the rising toll of state-directed, extra-territorial kidnappings, abductions and killings around the world. So here’s the question: why do more and more governments think they can get away with murder, figuratively if not literally? It’s a problem that should concern everybody – because everybody is at risk. It’s tempting to blame the US, a country that ... has come to epitomise the problem. In January 1986, worried about American hostages in Lebanon, Ronald Reagan signed a top-secret covert action directive. The presidential “finding” authorized the CIA to kidnap suspected terrorists anywhere, any place. Reagan’s “snatch and grab” operations inaugurated the modern-day practice of state abduction, leading ineluctably to extraordinary rendition. They set a fateful precedent. George W Bush massively expanded rendition after the 2001 terror attacks. Although the UN classifies one country’s abduction of another country’s citizens as a crime against humanity ... the US and its accomplices have in practice faced no substantive sanction or penalty to date. This grim lesson in impunity has been absorbed and digested by governments everywhere. The Khashoggi disappearance, almost certainly ordered and planned in Riyadh, is the very sort of illegal action that has been normalised ... by very recent American practice from Afghanistan and Iraq to Libya and Cuba.
Note: For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Passwords that took seconds to guess, or were never changed from their factory settings. Cyber vulnerabilities that were known, but never fixed. Those are two common problems plaguing some of the Department of Defense's newest weapons systems, according to the Government Accountability Office. The flaws are highlighted in a new GAO report, which found the Pentagon is "just beginning to grapple" with the scale of vulnerabilities in its weapons systems. Drawing data from cybersecurity tests conducted on Department of Defense weapons systems from 2012 to 2017, the report says that by using "relatively simple tools and techniques, testers were able to take control of systems and largely operate undetected" because of basic security vulnerabilities. The GAO says the problems were widespread: "DOD testers routinely found mission critical cyber vulnerabilities in nearly all weapon systems that were under development." The Pentagon has only recently made it a priority to ensure the cybersecurity of its weapons systems. It's still determining how to achieve that goal - and at this point, the report states, "DOD does not know the full scale of its weapon system vulnerabilities." Part of the reason for the ongoing uncertainty ... is that the Defense Department's hacking and cyber tests have been "limited in scope and sophistication." When problems were identified, they were often left unresolved. The GAO cites a test report in which only one of 20 vulnerabilities that were previously found had been addressed.
Note: For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
An Associated Press investigation drawing on hundreds of court documents, immigration records and interviews in the U.S. and Central America identified holes in the system that allow state court judges to grant custody of migrant children to American families — without notifying their parents. And today, with hundreds of those mothers and fathers deported thousands of miles away, the risk has grown exponentially. More than 300 parents were deported to Central America without their children this summer, many of whom allege they were coerced into signing paperwork they didn't understand, affecting their rights to reunify with their children. Some parents also contended that U.S. officials told them their children would be given up for adoption. "And the reality is that for every parent who is not located, there will be a permanent orphaned child, and that is 100 percent the responsibility of the administration," U.S. District Judge Dana Sabraw said in August while overseeing a lawsuit to stop family separations. The AP asked the State Department, as well as embassy officials in El Salvador, Guatemala and Honduras, whether they were working with deported parents to find their children in the U.S.. The State Department deferred to the Department of Homeland Security, which said in a statement: "DHS is not aware of anyone contacting embassy or consulate in a foreign country to be reunified with a child. This is unsurprising given the fact that these parents made a knowing decision to leave their child in a foreign country."
Note: This would seem to amount to child trafficking by the U.S. government. For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
Not all stops are created equal. Sometimes the police pull people over for traffic-safety reasons – for speeding or running a red light, for example. More nefariously, recent reports ... have shown that police departments ... have used traffic enforcement to generate fines to fund local government. But [another] kind of stop – an investigatory or pretext stop – uses the traffic laws to uncover more serious crime. Such stops (and subsequent searches) exploded in popularity in the 1990s. Pretext stops are responsible for most of the racial disparity in traffic stops in the US. Political scientist Charles Epp found that when the police are actually enforcing traffic safety laws, they tend to do so without regard to race. But when they are carrying out investigatory or pretext stops, they are much more likely to stop black and other minority drivers: black people are about two-and-a-half times more likely to be pulled over for pretext stops. The damage from a pretext stop – of a driver, a pedestrian, a loiterer – doesn’t end with the stop itself. The pretext-stop regime ... propels disparities in the rest of the criminal justice system. By ... 2000, we had been steadily, incrementally, building the punitive criminal justice system we still live with today. Most of the pieces – the aggressive prosecutions and policing, longer sentences, prison-building, collateral consequences of convictions such as losing the right to vote or the chance to live in public housing – had been put in place. The years since [have] been primarily dedicated to maintaining ... that basic architecture.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in policing and in the judicial system.
A major U.S. telecommunications company discovered manipulated hardware from Super Micro Computer Inc. in its network and removed it in August, fresh evidence of tampering in China of critical technology components bound for the U.S., according to a security expert working for the telecom company. The security expert, Yossi Appleboum, provided ... evidence of the discovery following the publication of an investigative report in Bloomberg Businessweek that detailed how China’s intelligence services had ordered subcontractors to plant malicious chips in Supermicro server motherboards over a two-year period ending in 2015. [Appleboum’s company] was hired to scan several large data centers belonging to the telecommunications company. Unusual communications from a Supermicro server and a subsequent physical inspection revealed an implant built into the server’s Ethernet connector. The executive said he has seen similar manipulations of different vendors' computer hardware made by contractors in China, not just products from Supermicro. “Supermicro is a victim - so is everyone else,” he said. There are countless points in the supply chain in China where manipulations can be introduced, and deducing them can in many cases be impossible. The manipulation of the Ethernet connector appeared to be similar to a method also used by the U.S. National Security Agency, details of which were leaked in 2013.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
In the summer of 2015, as Memphis exploded with protests over the police killing of a 19-year-old man, activists began hearing on Facebook from someone called Bob Smith. His profile picture [was] a Guy Fawkes mask, the symbol of anti-government dissent. Smith acted as if he supported the protesters. Over the next three years, dozens of them accepted his friend requests, allowing him to observe private discussions. He described himself as a far-left Democrat, a “fellow protester” and a “man of color.” But Smith was not real. He was the creation of a white detective in the Memphis Police Department’s Office of Homeland Security whose job was to keep tabs on local activists. The detective, Tim Reynolds, outed himself in August under questioning by the American Civil Liberties Union of Tennessee, which sued the police department for allegedly violating a 1978 agreement that prohibited police from conducting surveillance of lawful protests. The revelation validated many activists’ distrust of local authorities. It also provided a rare look into the ways American law enforcement operates online. Social media monitoring - including the use of software to crunch data about people’s online activity - illustrates a policing “revolution” that has allowed authorities to not only track people but also map out their networks, said Rachel Levinson-Waldman, senior counsel at [the] Brennan Center for Justice. But there are few laws governing this kind of monitoring.
Note: Memphis police were recently reported to have systematically spied on community activists. For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the erosion of civil liberties.
The Pentagon is studying whether insects can be enlisted to combat crop loss during agricultural emergencies. The bugs would carry genetically engineered viruses that could be deployed rapidly if critical crops such as corn or wheat became vulnerable to a drought, a natural blight or a sudden attack by a biological weapon. The concept envisions the viruses making genetic modifications ... during a single growing season. The program, funded by the Defense Advanced Research Projects Agency (DARPA), has a warm and fuzzy name: Insect Allies. But some critics find the whole thing creepy. A team of skeptical scientists and legal scholars published an article in the journal Science on Thursday arguing that the Insect Allies program opens a Pandoras box" and involves technology that may be widely perceived as an effort to develop biological agents for hostile purposes and their means of delivery. The authors ... contend that Insect Allies could potentially be interpreted as a violation of an international treaty called the Biological Weapons Convention. We argue that there is the risk that the program is seen as not justified by peaceful purposes, [said] co-author Silja Voeneky, a professor of international law. She said the use of insects as a key feature of the program is particularly alarming, because insects could be deployed cheaply and surreptitiously by malevolent actors.
Note: For more, see this informative article. For more along these lines, see concise summaries of deeply revealing news articles on food system corruption and GMOs.
Within the Defense Department, one agency’s recent project sounds futuristic: millions of insects carrying viruses descend upon crops and then genetically modify them to withstand droughts, floods and foreign attacks. But in a warning published Thursday in the journal Science, a group of independent scientists and lawyers objected. They argue that the endeavor is not so different from designing biological weapons - banned under international law since 1975 - that could swarm and destroy acres of crops. “Once you engineer a virus that spreads by insect, it is hard to imagine how you would ever control it,” said Guy Reeves, a researcher ... who contributed to the critique. “You haven’t just released a transmissible virus - you’ve released a disease,” he added. The Defense Advanced Research Projects Agency, or Darpa ... launched the Insect Allies research program in 2016, budgeting $45 million over four years to transform agricultural pests into vectors that can transfer protective genes into plants within one growing season. The critics said publishing the new research findings could establish “preliminary instruction manuals” for developing offensive biological weapons. Foreign military programs are often “driven by perception of competitors’ activities,” the critics warn, and “the mere announcement of this program may motivate other countries to develop their own capabilities in this arena — indeed, it may have already done so.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on food system corruption and GMOs.
The Department of Justice said it is filing a lawsuit against the state of California over its new net neutrality protections, hours after Gov. Jerry Brown signed the bill into law on Sunday. The California law would be the strictest net neutrality protections in the country, and could serve as a blueprint for other states. Under the law, internet service providers will not be allowed to block or slow specific types of content or applications, or charge apps or companies fees for faster access to customers. The Department of Justice says the California law is illegal and that the state is "attempting to subvert the Federal Government's deregulatory approach" to the internet. Barbara van Schewick, a professor at Stanford Law School, says the California bill is on solid legal ground and that California is within its legal rights. California is the third state to pass its own net neutrality regulations, following Washington and Oregon. However, it is the first to match the thorough level of protections that had been provided by the Obama-era federal net neutrality regulations repealed by the Federal Communications Commission in June. At least some other states are expected to model future net neutrality laws on California's. The original FCC rules included a two page summary and more than 300 additional pages with additional protections and clarifications on how they worked. While other states mostly replicated the two-page summary, California took longer crafting its law in order to match the details in the hundreds of supporting pages.
Note: Read how the Federal Communications Commission's net-neutrality policymaking process was heavily manipulated. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Crystal Mason, the woman who became the poster child for voter suppression when she was sentenced to five years for casting a ballot in Texas, has gone into federal prison. Mason’s crime was to cast a ballot in the 2016 presidential election. An African American woman, she had been encouraged by her mother to do her civic duty and vote. When she turned up to the polling station her name was not on the register, so she cast a provisional ballot that was never counted. She did not read the small print of the form that said that anyone who has been convicted of a felony – as she had, having previously been convicted of tax fraud – was prohibited from voting under Texas law. For casting a vote that was not counted, she will now serve 10 months in the federal system. While locked up it is likely that her final appeals in state court will be exhausted, which means she could be passed at the end of the 10 months directly to state custody for a further five years. Her lawyer, Alison Grinter, said she was dismayed to see Mason ripped from her family. “This is an act of voter intimidation, not the will of a free people.” Grinter added: Texas ... has one of the most strict voter ID laws in the country. Fort Worth ... has been particularly hardline, not only prosecuting Mason but also going after a Hispanic woman, Rosa Ortega, for mistakenly voting as a non-US citizen. Ortega, 37, who had permanent resident status in the US having come to the country as an infant, was sentenced to eight years in prison to be followed by deportation.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in elections and in the judicial system.
As the 2018 elections approach, the American intelligence community is issuing increasingly dire warnings about potential interference from Russia and other countries. D.H.S. has now conducted remote-scanning and on-site assessments of state and county election systems. These [measures] don't address core vulnerabilities in voting machines or the systems used to program them. And they ignore the fact that many voting machines that elections officials insist are disconnected from the internet – and therefore beyond the reach of hackers – are in fact accessible by way of the modems they use to transmit vote totals on election night. Add to this the fact that states don't conduct robust postelection audits ... and there's a good chance we simply won't know if someone has altered the digital votes in the next election. How did our election system get so vulnerable, and why haven't officials tried harder to fix it? The answer, ultimately, comes down to politics and money: The voting machines are made by well-connected private companies that wield immense control over their proprietary software, often fighting vigorously in court to prevent anyone from examining it when things go awry. The stakes are high. But the focus on Russia, or any would-be election manipulators, ignores the underlying issue – the myriad vulnerabilities that riddle the system and the ill-considered decisions that got us here.
Note: Why is it that the U.S. government is not allowed to have oversight over the companies that build and maintain voting machines and databases? What if one or more of them is bought off by a foreign or event domestic interest? Isn't this crazy? The major media have severely neglected reporting on elections manipulations that have been going on for many decades. For undeniable evidence of this, see our Elections Information Center.
A little-known, billionaire-funded organization, called Americans for Prosperity (AFP), has tilted American politics to the right. [It] is at the center of the political network created and directed by the billionaire conservative industrialists, Charles and David Koch. AFP has quietly pushed behind the scenes for many of the most important conservative victories across the nation, including the anti-union bills that passed in former union strongholds such as Wisconsin, Michigan, and Ohio. AFP’s laser-like focus on anti-union legislation ... reflects strategic calculations. AFP has recognized that to make lasting change in US politics, the Koch network would need to permanently weaken the organizations that support liberal candidates and causes – and above all, the labor movement. In constructing AFP, the Kochs have created a vehicle that is perfectly positioned to reshape American politics. AFP focuses on both elections and policy battles at all levels of government. Its activities are mostly centrally directed. And even though grassroots participants do not have much say in the direction of the group, AFP has nearly 3 million citizen activists signed up to mobilize for candidates and policy causes. Taken together, AFP’s grassroots volunteers and staffing rival those of the Republican party itself. By providing resources to support GOP candidates and officials, and exerting leverage on them once elected, AFP has been able to pull the Republican party to the far right on economic, tax and regulatory issues.
Note: The Koch brothers' secretive empire spent nearly $1 billion on US elections in 2016. Along with opposing organized labor, this empire has been killing public transit projects across the country. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the manipulation of public perception.
A soldier wears a skullcap that stimulates his brain to make him learn skills faster, or reads his thoughts as a way to control a drone. Another is plugged into a Tron-like active cyber defense system, in which she mentally teams up with computer systems to successfully multitask during complex military missions. The Pentagon is already researching these seemingly sci-fi concepts. The basics of brain-machine interfaces are being developedjust watch the videos of patients moving prosthetic limbs with their minds. The Defense Department is examining newly scientific tools, like genetic engineering, brain chemistry, and shrinking robotics, for even more dramatic enhancements. But the real trick may not be granting superpowers, but rather making sure those effects are temporary. Last year, three Canadian defense researchers published a paper that explored the intersection of human enhancement and ethics. They found that the permanence of the enhancement could have impacts on troops in the field ... as well as a return to civilian life. They also note that many soldier resilience human enhancement technologies raised health and safety questions. The Canadian researchers wrote: Are there unknown side effects or long term effects that could lead to unanticipated health problems during deployment or after discharge? Moreover, is it ethical to force a soldier to use the technology in question, or should he/she be allowed to consent to its use? Can consent be fully free from coercion in the military?
Note: Read an excellent article detailing the risks of biosensors implanted under the skin which have already been developed. Some smaller than a grain of rice can be injected with a needle. Watch a slick video promoting this brave new world. Learn how this is already planned for use on soldiers. For more along these lines, see concise summaries of deeply revealing news articles on military corruption from reliable major media sources.
Angeline Cheek is preparing for disaster. The indigenous organizer from the Fort Peck reservation in Montana fears that the proposed Keystone XL pipeline could break and spill. But environmental catastrophe is not the most immediate threat. The government has characterized pipeline opponents like her as “extremists” and violent criminals and warned of potential “terrorism”. Recently released records [suggest] that police were organizing to launch an aggressive response to possible Keystone protests, echoing the actions against the Standing Rock movement in North Dakota. There, officers engaged in intense surveillance and faced widespread accusations of excessive force. Documents obtained by the ACLU ... have renewed concerns from civil rights advocates about the government’s treatment of indigenous activists known as water protectors. Notably, one record revealed that authorities hosted a recent “anti-terrorism” training session in Montana. The Department of Homeland Security (DHS) and the Federal Emergency Management Agency also organized a “field force operations” training to teach “mass-arrest procedures”, “riot-control formations” and other “crowd-control methods”.
Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
There were dozens of witnesses when a gunfight broke out on a street corner in Buffalo on Aug. 10, 1991. Torriano Jackson, 17, was killed. Valentino Dixon, then 21, was at the scene. Hours later, he was arrested. And in 1992, he was convicted of murder and sentenced to almost 40 years to life in prison. For years, Mr. Dixon fought that conviction from behind bars, insisting on his innocence. No physical evidence had ever connected him to the murder, and another man had confessed to it more than once. His murder conviction was vacated on Wednesday, and Mr. Dixon, 48, walked free. As he struggled to get his conviction overturned, Mr. Dixon got help from ... Martin Tankleff, who was imprisoned for 17 years after being wrongly convicted of murdering his parents. In prison, [Dixon] liked to draw detailed landscapes in colored pencil. Golf courses were a frequent subject. That caught the interest of journalists at Golf Digest, and the magazine profiled Mr. Dixon. In 2017, a new district attorney, John Flynn, took office in Erie County. And in 2018, a course called the Prison Reform Project was offered for the first time at Georgetown University ... with Mr. Tankleff [serving] as an adjunct professor. Three students chose Mr. Dixon’s case and gathered evidence. Their work helped Donald M. Thompson, a lawyer for Mr. Dixon, make his case to the district attorney’s office. Mr. Flynn, the district attorney, said the newly discovered evidence from various witnesses attesting to Mr. Dixon’s innocence was deemed credible.
Note: Read the Golf Digest profile featuring Mr. Dixon's artwork which brought much-needed attention to his wrongful incarceration. Explore a treasure trove of concise summaries of incredibly inspiring news articles which will inspire you to make a difference.
The U.S. government can monitor journalists under a foreign intelligence law that allows invasive spying and operates outside the traditional court system, according to newly released documents. Targeting members of the press under the law, known as the Foreign Intelligence Surveillance Act, requires approval from the Justice Department’s highest-ranking officials. Prior to the release of these documents, little was known about the use of FISA court orders against journalists. Previous attention had been focused on the use of National Security Letters against members of the press; the letters are administrative orders with which the FBI can obtain certain ... records without a judge’s oversight. FISA court orders can authorize much more invasive searches and collection, including the content of communications, and do so through hearings conducted in secret and outside the sort of ... judicial process that allows journalists and other targets of regular criminal warrants to eventually challenge their validity. The rules apply to media entities or journalists who are thought to be agents of a foreign government, or ... possess foreign intelligence information. “There’s a lack of clarity on the circumstances when the government might consider a journalist an agent of a foreign power,” said [Knight Institute staff attorney Ramya] Krishnan. “Think about WikiLeaks; the government has said they are an intelligence operation.”
Note: In its latest instruction manual for federal prosecutors, the US Justice Department removed a subsection titled “Need for Free Press and Public Trial”. For more along these lines, see concise summaries of deeply revealing news articles on judicial system corruption and the erosion of civil liberties.
By the time Lehman Brothers filed for the largest bankruptcy in American history on Sept. 15, 2008, the country had been navigating stormy global financial waters for more than a year. Throughout the mess, the Federal Reserve and the U.S. Treasury had been permitting the largest banks in the country to funnel as much cash as they wanted to their shareholders ― even as it became clear those same banks could not pay their debts. Ben Bernanke, Hank Paulson and Timothy Geithner ... didn’t really rescue the banking system. They transformed it into an unaccountable criminal syndicate. Since the crash, the biggest Wall Street banks have been caught laundering drug money, violating U.S. sanctions against Iran and Cuba, bribing foreign government officials, making illegal campaign contributions to a state regulator and manipulating the market for U.S. government debt. Citibank, JPMorgan, Royal Bank of Scotland, Barclays and UBS even pleaded guilty to felonies for manipulating currency markets. Not a single human being has served a day in jail for any of it. As a percentage of each family’s overall wealth, the poorer you were, the more you lost in the crash. The top 1 percent of U.S. households ultimately captured more than half of the economic gains over the course of the Obama years, while the bottom 99 percent never recovered their losses from the crash. The result has been a predictable and terrifying resurgence of authoritarian politics unseen since the Second World War.
Note: For more along these lines, see concise summaries of deeply revealing news articles on financial industry corruption and income inequality.
An observatory in the mountains of southern New Mexico that is dedicated to unlocking the mysteries of the sun has found itself at the center of a mystery that is creating a buzz here on earth. Authorities [say] only that an undisclosed security concern was behind the decision to abruptly vacate and lock up the remote facility on Sept 6. The Sunspot Solar Observatory has been closed for more than a week. The FBI referred all questions to the group that manages the site, the Association of Universities for Research in Astronomy. The vagueness continued to fuel speculation. The telescope at Sunspot was originally built by the U.S. Air Force. After several years of operation, it was transferred to the National Solar Observatory, which is part of the National Science Foundation. Sunspot's one-of-a-kind telescope produces some of the sharpest images of the sun available in the world, officials said.
Note: Watch NASA footage showing very strange objects occluding the sun at exactly the time this solar observatory was closed and evacuated. What did someone not want us to know for "security" reasons? The official explanation leaves many questions unanswered.
Before he was Donald Trump’s campaign chairman, Paul Manafort embraced extreme tactics in his lobbying efforts. He enlisted a foreign politician who was secretly on his payroll to deliver a message to President Barack Obama in the Oval Office. And he gleefully fueled allegations that an Obama Cabinet member who had spoken out against his Ukrainian client was an anti-Semite. With his guilty plea Friday, Manafort admitted the lengths to which he went to manipulate the American political system and the media for massive profit, exposing how he thrived in the Washington swamp that Trump railed against during his campaign. By pleading guilty, Manafort agreed that he knew he was required by law to publicly report that a pro-Russia Ukrainian political party was paying him and his stable of lobbyists, which included former leaders of Austria, Poland and Italy. Instead, he operated in the dark, working diligently to keep his lobbying for Ukrainian politician Viktor Yanukovych a secret and pocketing millions routed through offshore bank accounts to hide his work and avoid paying taxes. Trump has downplayed Manafort’s wrongdoing. “What he did, some of the charges they threw against him, every consultant, every lobbyist in Washington probably does,” the president told Fox News. Paul Miller, who runs the Institute for Lobbying and Ethics ... acknowledged that there is a “widespread problem” of lobbyists failing to register their activities. But Manafort went far beyond that, Miller said.
Note: For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.