Government Corruption Media ArticlesExcerpts of Key Government Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
As the United States and its allies continue their bombing campaign against the Islamic State in Iraq and Syria, many more noncombatants are perishing than they seem prepared to admit. Airwars, the organization I lead, at present estimates that at least 1,500 civilians have been killed by the United States-led coalition. Similar or higher tallies are reported by other monitoring groups, like Iraq Body Count and the Syrian Observatory for Human Rights. But coalition officials have publicly admitted just 55 deaths. It may just be a matter of looking. Our policy is not to go out and seek allegations of civilian casualties, a senior official from United States Central Command, or Centcom, which oversees the bombing campaign, told me recently when I asked about the discrepancy between reports of noncombatant deaths and official investigations. It took about 15 months into the war for any admission of civilian deaths in Iraq - despite thousands of airstrikes and more than 130 reported incidents. An average of 173 days still passes between a civilian casualty in Iraq or Syria and any public admission of responsibility. The Pentagon is not alone in its accounting failures. Russia still denies the more than 2,000 deaths it has most likely caused in Syria, while all 12 of the United States coalition partners insist they have killed only bad guys. This then is a systemic problem, one that suggests militaries are at present unfit - or unwilling - to count the dead accurately from above.
Note: The above was written by Chris Woods, author of Sudden Justice: Americas Secret Drone Wars. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days. A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate. The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO). The exploits are not run-of-the-mill tools to target everyday individuals. They are expensive software used to take over firewalls, such as Cisco and Fortinet, that are used “in the largest and most critical commercial, educational and government agencies around the world,” said [former TAO operator] Blake Darche. Some former agency employees suspect that the leak was the result of a mistake by an NSA operator, rather than a successful hack by a foreign government of the agency’s infrastructure. It is not unprecedented for a TAO operator to accidentally upload a large file of tools ... one of the former employees said. “What’s unprecedented is to not realize you made a mistake,” he said. “You would recognize, ‘Oops, I uploaded that set’ and delete it.” Critics of the NSA have suspected that the agency, when it discovers a software vulnerability, frequently does not disclose it, thereby putting at risk the cybersecurity of anyone using that product.
Note: Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
A lawsuit filed in a US district court claims that American aid to Israel is illegal under a law passed in the 1970s that prohibits aid to nuclear powers who don’t sign the Nuclear Non-Proliferation Treaty. Grant Smith, director of the Institute for Research: Middle Eastern Policy, who filed the lawsuit ... said the United States has given Israel an estimated $234 billion in foreign aid since Congress in 1976 passed the International Security Assistance and Arms Export Control Act, with its stipulation regarding countries that did not sign the NPT. Though Israel is not a signatory to the Nuclear Non-Proliferation Treaty, Smith noted that it is a known nuclear power and recipient of US aid. Israel ... is widely believed to possess dozens, if not hundreds of nuclear warheads. Smith’s lawsuit comes on the eve of an aid deal that would boost US assistance to the country. Israel already gets $3 billion a year in US aid. To sustain a policy of “nuclear ambiguity” on Israel’s weapons program, Smith says the government uses improper classification and threatens federal employees and researchers with prosecution, fines and imprisonment. The gag is driven ... by a Department of Energy directive known as WNP-136, Foreign Nuclear Capabilities. “This is an Energy Department directive that demands imprisonment for any federal official or contractor who even mentions that Israel might have a nuclear weapons program,” Smith said. Foreign aid to Israel violates two amendments of the 1961 Foreign Aid Act ... which ban aid to clandestine nuclear powers.
Note: How interesting the the US press is not covering this. Consider also that $3 billion in US aid divided by Israel's population of 8.5 million means Israel receives the equivalent of about $350 in aid per person per year, far greater than any other country. Watch a good interview with Miko Peled, a former member of Israeli special forces, on this topic. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The Merchant Marine Academy has the highest rate of sexual assault and harassment of any U.S. military school. While the school received just one report of sexual assault in the 2014-2015 academic year, student surveys taken by the government reveal that 63 percent of women and 11 percent of men experienced unwanted advances or other sexual harassment. And 17 percent of women and 2 percent of men endured some kind of sexual assault, defined as unwanted contact, from groping to rape. Those numbers exceed the combined rates at the U.S. Military Academy at West Point and the Naval, Air Force and Coast Guard academies, where 48 percent of women and 10 percent of men described sexual harassment in similar surveys. Under pressure from Congress, Kings Point hired its first sexual assault coordinator four years ago and beefed up online and face-to-face prevention training. But officials were shocked to find so few victims reporting when surveys told them otherwise. The Middle States Commission on Higher Education - which does 10-year accreditation reviews for the U.S. Education Department - placed the Merchant Marine Academy on warning in June. The commission described a “campus climate and incidence of sexual harassment and sexual assault that have been a serious and recognized problem for over 10 years. The report [criticized] the academy’s efforts to prevent misconduct as “insufficient and ineffective.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on sexual abuse scandals and military corruption.
Privately operated government prisons, which mostly detain migrants convicted of immigration offenses, are drastically more unsafe and punitive than other prisons in the federal system, a stinging investigation by the US Department of Justice’s inspector general has found. Inmates at these 14 contract prisons, the only centers in the federal prison system that are privately operated, were nine times more likely to be placed on lockdown than inmates at other federal prisons and were frequently subjected to arbitrary solitary confinement. In two of the three contract prisons investigators routinely visited, new inmates were automatically placed in solitary confinement as a way of combating overcrowding. The review also found that contract prison inmates were more likely to complain about medical care, treatment by prison staff and about the quality of food. These facilities house around 22,000 individuals, mostly deemed “low risk”, at an annual cost of $600m. They are operated by three private companies: Geo Group, Corrections Corporation of America (CCA), and Management and Training Corporation (MTC). These facilities were also more dangerous than others in the federal system. For example, the report found that inmate on inmate assaults were 28% higher in contract prisons. “This is the latest in a whole series of reports and investigations that have found very serious issues with Bureau of Prisons shadow systems of private prisons,” said Carl Takei, a staff attorney with the ACLU.
Note: Immediately following this inspector general's investigation, the US Justice Department announced plans to phase out private federal prisons. For more along these lines, see concise summaries of deeply revealing prison system corruption news articles.
Republican Mayor Richard Berry was driving around Albuquerque last year when he saw a man on a street corner holding a sign that read: Want a Job. Anything Helps. Throughout his administration, as part of a push to connect the homeless population to services, Berry had taken to driving through the city to talk to panhandlers about their lives. His citys poorest residents told him they didnt want to be on the streets begging for money, but they didnt know where else to go. Seeing that sign gave Berry an idea. The city could bring the work to them. Next month will be the first anniversary of Albuquerques Theres a Better Way program, which hires panhandlers for day jobs beautifying the city. The job pays $9 an hour, which is above minimum wage, and provides a lunch. At the end of the shift, the participants are offered overnight shelter as needed. In less than a year since its start, the program has given out 932 jobs clearing 69,601 pounds of litter and weeds from 196 city blocks. And more than 100 people have been connected to permanent employment. Berrys effort is a shift from the movement across the country to criminalize panhandling. A recent National Law Center on Homelessness & Poverty report found a noticeable increase, with 24 percent of cities banning it altogether and 76 percent banning it in particular areas. When panhandlers have been approached in Albuquerque with the offer of work, most have been eager for the opportunity to earn money, Berry said. They just needed a lift.
Note: Watch an inspiring video on this great program.
Federal drug agents regularly mine Americans’ travel information to profile people who might be ferrying money for narcotics traffickers - though they almost never use what they learn to make arrests or build criminal cases. Instead, that targeting has helped the Drug Enforcement Administration seize a small fortune in cash. The DEA surveillance is separate from the vast and widely-known anti-terrorism apparatus. DEA units assigned to patrol 15 of the nation’s busiest airports seized more than $209 million in cash from at least 5,200 people over the past decade “They count on this as part of the budget,” said Louis Weiss, a former [DEA group] supervisor. “Basically, you’ve got to feed the monster.” Federal law gives the government broad powers to seize cash and other assets if agents have evidence that they are linked to crime. That process, commonly known as asset forfeiture, has come under fire ... after complaints that police were using the law as a way to raise money rather than to protect the public or prevent crime. Court records show agents and informants flagged travelers for questioning based on whether they were traveling with one-way tickets, had paid in cash, had listed a non-working phone number on the reservation or had checked luggage. Agents said Zane Young fit that profile when they ... seized $36,000 from his bags. Young’s lawyer, Thomas Baker, said in a court filing that the drug agency’s profile was “vague, ambiguous, overbroad, and can be manipulated to include just about anyone.”
Note: Read about how the DEA stole a young man's life savings without ever charging him with a crime. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
America has been enmeshed in a wrenching discussion about how the police treat young black men. But this week’s blistering report from the Justice Department on police bias in Baltimore also exposed a different, though related, concern: how the police in that majority-black city treat women, especially victims of sexual assault. In six pages of the 163-page report documenting how Baltimore police officers have systematically violated the rights of African-Americans, the Justice Department also painted a picture of a police culture deeply dismissive of sexual assault victims and hostile toward prostitutes and transgender people. It branded the Baltimore Police Department’s response to sexual assault cases “grossly inadequate.” Baltimore officers sometimes humiliated women who tried to report sexual assault, often failed to gather basic evidence, and disregarded some complaints filed by prostitutes. Some officers blamed victims or discouraged them from identifying their assailants. And the culture seemed to extend to prosecutors, investigators found. In one email exchange, a prosecutor referred to a woman who had reported a sexual assault as a “conniving little whore.” A police officer, using a common text-message expression for laughing heartily, wrote back: “Lmao! I feel the same.” Other “pattern or practice” investigations of police departments - including in New Orleans; Puerto Rico; and Missoula, Mont. - have also identified gender bias.
Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and sexual abuse scandals.
Recent attempts at campaign-directed cyber-attacks have raised red flags about just how vulnerable the upcoming U.S. election is to hackers. The most vulnerable aspect of the voting process is the individual ballot. But in a digital world, far more is susceptible to tampering than the ballot itself. With digital tools integrated throughout the electoral process ... potential weak spots show up long before anyone casts the first vote. Gabriella Coleman, Wolfe Chair in Scientific and Technological Literacy at McGill University and author of the book Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous, warned even poorly executed hacks can be successful. "If you seed enough doubt, it doesn't matter if the system has been hacked or not, because people won't trust the system." With the rise of new technologies there is potential for individuals, governments, terrorist groups or hackers to use internet-based tools strategically to leak sensitive documents, collect private information and influence voter opinion and sentiment. A recent Bloomberg exposé featured a South American political hacker who engaged for a decade in what he calls "psychological operations." He created software to manage and direct an army of fake Twitter accounts. He could change the names, profile pictures, and biographies of thousands of fake accounts to suit his particular needs at the time, using those virtual crowds to sway trends and public opinion.
Note: Read more about South American political hacker Andrés Sepúlveda's effective manipulation of elections in nine countries. For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our Elections Information Center.
The devastating trauma and abuse inflicted on children held by Australia in offshore detention has been laid bare in the largest cache of leaked documents released from inside its immigration regime. More than 2,000 leaked incident reports from Australia’s detention camp for asylum seekers on the remote Pacific island of Nauru – totalling more than 8,000 pages – are published by the Guardian today. The Nauru files set out as never before the assaults, sexual abuse, self-harm attempts, child abuse and living conditions endured by asylum seekers held by the Australian government, painting a picture of routine dysfunction and cruelty. Children are vastly over-represented in the reports. More than half of the 2,116 reports – a total of 1,086 incidents, or 51.3% – involve children, although children made up only about 18% of those in detention on Nauru during the time covered by the reports, May 2013 to October 2015. The findings come just weeks after the brutal treatment of young people in juvenile detention in the Northern Territory was exposed. Allegations of sexual assault ... are a persistent theme of the files. In one report an asylum seeker described being told she was “on a list” written by local Nauruan guards naming single women they were “waiting for”. In [another] report a “cultural adviser” for Wilson Security, the company that employs guards at the detention camp, allegedly told an asylum seeker who had been sexually assaulted in camp that “rape in Australia is very common and people don’t get punished”.
Note: Watch an excellent segment by Australia's "60-Minutes" team "Spies, Lords and Predators" on a pedophile ring in the UK which leads directly to the highest levels of government. A second suppressed documentary, "Conspiracy of Silence," goes even deeper into this topic in the US. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and sexual abuse scandals.
As part of an ongoing effort to exploit medical intelligence, the National Security Agency teamed up with the military-focused Defense Intelligence Agency to extract medical SIGINT from the intercepted communications of nonprofit groups starting in the early 2000s, a top-secret document shows. Medical intelligence can include information about disease outbreaks; the ability of a foreign regime to respond to chemical, biological, and nuclear attacks; the capabilities of overseas drugs companies; advances in medical technology; medical research, and the medical response capabilities of various governments, according to the document and others like it, provided by NSA whistleblower Edward Snowden. One of the more prominent examples of focused medical spying came in 2010, when the agency crafted a plan to stow tracking devices with medical supplies bound for an ill Osama bin Laden in order to locate the terrorist leader. One article from August 2003 identifies an NSA project to keep an eye on the evolution of biotechnology in various countries. Can we ... determine the specific features that would distinguish a Bio Warfare Program from a benign civilian pharmaceutical production effort? the author wrote, identifying a suspect Iranian [biological warfare] facility as a target for inspection. Medical intelligence gathering has continued since then, according to the so-called black budget proposed for the 2013 fiscal year, published in February 2012.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and terrorism.
By the time I started working at the Defense Department in the early years of the Obama administration, the Pentagon's 17.5 miles of corridors had sprouted dozens of shops and restaurants catering to the building's 23,000 employees. And, over time, the U.S. military has itself come to offer a similar one-stop shopping experience to the nation's top policymakers. As retired Army Lt. Gen. Dave Barno once put it to me, the relentlessly expanding U.S. military has become "a Super Walmart with everything under one roof" - and two successive presidential administrations have been eager consumers. The military's transformation into the world's biggest one-stop shopping outfit is ... at once the product and the driver of seismic changes in how we think about war, with consequent challenges both to our laws and to the military itself. We've gotten into the habit of viewing every new threat through the lens of "war," thus asking our military to take on an ever-expanding range of nontraditional tasks. But viewing more and more threats as "war" brings more and more spheres of human activity into the ambit of the law of war, with its greater tolerance of secrecy, violence, and coercion - and its reduced protections for basic rights. Meanwhile, asking the military to take on more and more new tasks requires higher military budgets, forcing us to look for savings elsewhere. As budget cuts cripple civilian agencies, their capabilities dwindle, and we look to the military to pick up the slack, further expanding its role.
Note: As the Tribune has strangely removed this article, here's an alternate link. Another cutting article shows that according to the latest report on public relations spending from the Government Accountability Office, the US government PR apparatus has spent over $1 billion annually — $626 million of which the Pentagon allots to employ a massive propaganda army. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Police departments will be required to give the US justice department full details of deadly incidents involving their officers each quarter, under a new government system for counting killings by police that was influenced by the Guardian. Announcing a new program for documenting all “arrest-related deaths”, federal officials said they would actively work to confirm fatal cases seen in media reports and other open sources rather than wait for departments to report them voluntarily. The new system, which aims to replace a discredited count by the FBI, mirrors that of The Counted, an ongoing Guardian effort to document every death caused by law enforcement officers. Writing in the Federal Register, Department of Justice officials said their new program should increase transparency around the use of force by police and improve accountability for the actions of individual officers. The federal government has kept no comprehensive record of killings by police officers, even as a series of controversial deaths set off unrest in cities across the country over the past two years. An annual voluntary count by the FBI of fatal shootings by officers has recorded only about half the true number. The new system is being overseen by the department’s bureau of justice statistics (BJS). It would, like the Guardian’s, document deaths caused by physical force, Taser shocks and some vehicle crashes caused by law enforcement in addition to fatal shootings by officers.
Note: For more along these lines, see concise summaries of deeply revealing police corruption news articles from reliable major media sources.
Think tanks, which position themselves as “universities without students,” have power in government policy debates because they are seen as researchers independent of moneyed interests. But in the chase for funds, think tanks are pushing agendas important to corporate donors, at times blurring the line between researchers and lobbyists. And they are doing so while reaping the benefits of their tax-exempt status, sometimes without disclosing their connections to corporate interests. On issues as varied as military sales to foreign countries, international trade, highway management systems and real estate development, think tanks have frequently become vehicles for corporate influence and branding campaigns. “This is about giant corporations who figured out that by spending, hey, a few tens of millions of dollars, if they can influence outcomes here in Washington, they can make billions of dollars,” said Senator Elizabeth Warren, Democrat of Massachusetts, a frequent critic of undisclosed Wall Street donations to think tanks. Washington has seen a proliferation of think tanks, particularly small institutions with narrow interests tied to specific industries. At the same time, the brand names of the field have experienced explosive growth. [The Brookings Institution]’s annual budget has doubled in the last decade, to $100 million. The American Enterprise Institute is spending at least $80 million on a new headquarters in Washington, not far from where the Center for Strategic and International Studies built a $100 million office tower.
Note: Read more about how big money buys off institutions democracy depends on. For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the corporate world.
Princeton professor Andrew Appel decided to hack into a voting machine. He bought one online. Appel parted with $82 and became the owner of ...the Sequoia AVC Advantage, one of the oldest and vulnerable, electronic voting machines in the United States. He summoned a graduate student named Alex Halderman, who could pick the machine’s lock in seven seconds. Clutching a screwdriver, [Appel then] deftly wedged out the four ROM chips - they weren’t soldered into the circuit board, as sense might dictate - making it simple to replace them with one of his own: A version of modified firmware that could throw off the machine’s results, subtly altering the tally of votes, never to betray a hint to the voter. The attack was concluded in minutes. Elections could be vulnerable at myriad strike points, among them the software that aggregates the precinct vote totals, and the voter registration rolls that are increasingly digitized. But the threat, the cyber experts say, starts with the machines that tally the votes and crucially keep a record of them - or, in some cases, don't. It’s not just the voting machines themselves - it’s the desktop and laptop computers that election officials use. And the computers that aggregate the results together from all of the optical scans. If any of those get hacked, it could could significantly disrupt the election. Hackers this year have [already] targeted voter registration rolls in Illinois and possibly Arizona, another attack highlighted by the Princeton alums.
Note: For the text of the video at the above link and more, see this webpage. For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our Elections Information Center.
Buried below the ice sheet that covers most of Greenland, there's an abandoned U.S. Army base. Camp Century had trucks, tunnels, even a nuclear reactor. It was also a test site for deploying nuclear missiles. The camp was abandoned almost 50 years ago. But serious pollutants were left behind. Now a team of scientists says that as climate warming melts the ice sheet, those pollutants could spread. [Researcher William Colgan] found unclassified records that described what was left behind there - for example, the nuclear reactor was removed, but low-level radioactive cooling water used in it was not. There were very likely PCBs, which are toxic compounds in electrical equipment. There's no record of how much remained. Colgan says the Army figured all of it would be entombed forever. "They thought it would snow in perpetuity," he says, "and the phrase they used was that the waste would be preserved for eternity by perpetually accumulating snow." Except now, the climate has changed. Greenland's ice sheet is melting. Computer models say the camp could be uncovered by the end of this century. Meltwater could easily end up in the buried camp and then carry contamination through under-ice channels to the ocean. Colgan says it's unclear who owns this waste. The Army built the camp under a treaty between the U.S. and Denmark, which had jurisdiction over Greenland. It's a legal dilemma that's likely to start cropping up more often.
Note: For more along these lines, see concise summaries of deeply revealing global warming news articles from reliable major media sources.
Days before an ISIS sympathizer attacked a cartoon contest in Garland, Texas, he received a text from an undercover FBI agent. “Tear up Texas,” the agent messaged Elton Simpson days before he opened fire at the Draw Muhammad event, according to an affidavit filed in federal court Thursday. “U know what happened in Paris,” Simpson responded. “So that goes without saying ... No need to be direct.” That revelation comes amidst a national debate about the use of undercover officers and human sources in terrorism cases. The texts were included in the indictment, released Thursday, of Erick Jamal Hendricks. He was charged with conspiring to provide material support to ISIS. [Hendricks] tried to recruit other Americans to form an ISIS cell on secret compounds and introduced an undercover agent to one of the Draw Muhammad attackers, according to the FBI. But Hendricks did more than make a connection. According to the court papers, he asked the undercover officer about the Draw Muhammad event’s security, size, and police presence, during the event, according to an affidavit filed in court. FBI spokeswoman Carol Cratty hung up on The Daily Beast after being asked about the “tear up Texas” text. But shortly after that exchange, Simpson and his accomplice, Nadir Soofi, drove up to the contest and opened fire. Both men were killed in the altercation, but Hendricks would remain free for another year. Every major U.S. attack was linked to FBI investigation before it happened.
Note: The FBI has been stepping up its use of stings in ISIS cases. Read how an FBI mole posing as a potential lover recently convinced a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
Weeks after taking a job as a breeding technician at Eagle Point Farms, an anguished Sharee Santorineos sat down and wrote a three-page whistleblower complaint. "I seen pigs that are pregnant beat with steel bars," said her letter to the Illinois Bureau of Animal Health and Welfare. Santorineos knows about raising animals. At a friend's rural Illinois farmhouse, she grows pigs and poultry that they eventually will have slaughtered. Like other worker allegations about animal abuse in Illinois' 900-plus hog confinement facilities, Santorineos' account went nowhere. The state has regularly discounted or dismissed such worker complaints, a Tribune investigation has found. In the Illinois hog confinements that send 12 million pigs to market annually, the bureau did not find a single animal welfare infraction or violation during the past five years. A lack of inspectors - the bureau has just six - contributes to the scant enforcement, while weak Illinois and federal livestock protection laws do little to safeguard animals. In on-the-record interviews, Santorineos and more than a dozen other Illinois swine-confinement workers told the Tribune they witnessed fellow employees whip pigs with metal rods and gouge them with pliers and ballpoint pens to hurry the animals from one stall to the next or onto the trucks that took them to slaughter. They described employees abusing pigs for amusement and encouraging colleagues to take out their frustrations on the animals.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the food system.
When Ebony Buggs followed the noise of commotion to a vacant unit below her apartment on Chicago’s West Side, she found a group of men beating teens from the neighborhood. One man grabbed her and punched her in the face, according to Buggs, now 26. Buggs’ mother, seeing her daughter lying on the ground, threatened to call the police. “We are the police,” one of the men responded, as he grabbed her phone and threw it. The man who Buggs alleges beat her is Edwin Utreras. He was part of a group of five officers that city residents dubbed the “Skullcap Crew”, who patrolled the city’s South Side public housing communities until they were torn down. The members of this crew – Edwin Utreras, Robert Stegmiller, Christ Savickas, Andrew Schoeff and Joe Seinitz – have together faced at least 128 known official allegations from more than 60 citizen-filed complaints over almost a decade and a half. They have also been named in more than 20 federal lawsuits. Yet over the course of their careers, these officers have received little discipline. Instead, they have won praise from the department, accruing more than 180 commendations. All of them remain on the force except Seinitz, who resigned in 2007. The Citizens Police Data Project, a repository of more than 56,000 official complaints against police, has found that less than 3% of Chicago police misconduct complaints lead to disciplinary action.
Note: Another gang of Chicago police was recently reported to have run a drug dealing and extortion ring with the tacit support of their fellow officers. For more along these lines, see concise summaries of deeply revealing police corruption news articles from reliable major media sources.
The chief executive of the Democratic National Committee and two other top officials have resigned in the wake of an email hack that embarrassed the party on the eve of its presidential nominating convention. CEO Amy Dacey, Chief Finance Officer Brad Marshall and Communications Director Luis Miranda left their jobs on Tuesday, the party said in a statement. The resignations are the latest fallout from the hacked emails, which exposed an apparent lack of neutrality in the primary race between Hillary Clinton and Bernie Sanders, with some party officials disparaging Sanders. Marshall wrote the most explosive email, questioning Sanders' Jewish faith and suggesting he could be portrayed as an atheist. He has apologized for the missive. Earlier, party chairwoman Debbie Wasserman Schultz resigned her position and, after being booed at a pre-convention appearance last week in Philadelphia, chose not to speak from the convention stage. The cache of more than 19,000 messages was made public by the group WikiLeaks just before the convention. Democratic Party officials learned in late April that their systems had been attacked after they discovered malicious software on their computers.
Note: Wikileaks published thousands of documents which exposed significant elections corruption in the US.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.