Government Corruption Media ArticlesExcerpts of Key Government Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Wall Street is one of the biggest sources of funding for presidential campaigns, and many of the Republican Party's potential 2016 contenders are governors. And so, last week, the GOP filed a federal lawsuit aimed at overturning the ... law that bars those governors from raising campaign money from Wall Street executives who manage their states' pension funds. In this case, New York's and Tennessee's Republican parties are represented by two former Bush administration officials, one of whose firms just won the Supreme Court case invalidating campaign contribution limits on large donors. In their complaint, the parties argue that people managing state pension money have a First Amendment right to make large donations to state officials who award those lucrative money management contracts. With the $3 trillion public pension system controlled by elected officials now generating billions of dollars worth of management fees for Wall Street, Securities and Exchange Commission regulators originally passed the rule to make sure retirees' money wasn't being handed out based on politicians' desire to pay back their campaign donors. The suit comes only a few weeks after the SEC issued its first fines under the rule - against a firm whose executives made campaign donations to Pennsylvania Gov. Tom Corbett, a Republican, and Philadelphia Mayor Michael Nutter, a Democrat. In a statement on that case, the SEC promised more enforcement of the pay-to-play rule in the future. The GOP lawsuit aims to stop that promise from becoming a reality.
Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Development of a U.S. counterattack for cyberterrorism that could do more harm than good was one of the final events that drove Edward Snowden to leak government secrets, the former National Security Agency contractor tells Wired magazine. Snowden ... said the MonsterMind program was designed to detect a foreign cyberattack and keep it from entering the country. But it also would automatically fire back. The problem, he said, is malware can be routed through an innocent third-party country. "These attacks can be spoofed," he told Wired. MonsterMind for example ... could accidentally start a war. And it's the ultimate threat to privacy because it requires the NSA to gain access to virtually all private communications coming in from overseas. "The argument is that the only way we can identify these malicious traffic flows and respond to them is if we're analyzing all traffic flows," he said. "And if we're analyzing all traffic flows, that means we have to be intercepting all traffic flows. That means violating the Fourth Amendment, seizing private communications without a warrant, without probable cause or even a suspicion of wrongdoing. For everyone, all the time. You get exposed to a little bit of evil, a little bit of rule-breaking, a little bit of dishonesty, a little bit of deceptiveness, a little bit of disservice to the public interest, and you can brush it off, you can come to justify it," Snowden told Wired. "But if you do that, it creates a slippery slope that just increases over time. And by the time you've been in 15 years, 20 years, 25 years, you've seen it all and it doesn't shock you. And so you see it as normal."
Note: Read the cover story from Wired magazine with a deep inside report on Snowden.
This week's U.S. air strikes in northern Iraq are being accompanied with an undertow of "it's all about oil" talk. Take for example, Columbia School of Journalism Dean Steve Coll's observation in The New Yorker, that "Obama's defense of Erbil (capital of the semiautonomous Kurdish region) is effectively the defense of an undeclared Kurdish oil state." It's no secret that Iraqi Kurdistan has an abundance of oil reserves, nor that U.S. oil companies, like [Chevron] are busy exploring there. Chevron has three "production sharing contracts" with the Kurdish government, covering a combined 444,000 acres, north of Irbil, where it's in the early testing and drilling stage. And it likes what it sees. Asked for an update, a Chevron spokesman said Monday, "We continue monitoring the situation. We remain in regular contact with the Kurdistan Regional Government and are dedicated to supporting the (Kurdistan Region of Iraq) in developing its natural resources." A potentially bigger worry for both Chevron and the Kurds .. could be if Iraq did stabilize and unite, with Kurdistan under its umbrella. For Chevron ... a new arrangement in Iraq could entail the renegotiation of contracts it has with the Kurds, which by the way, Baghdad refused to recognize. Kurdistan's oil pipeline via Turkey continues to pump out oil - 120,000 barrels per day.
Note: For more on this, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
Energy companies are fracking for oil and gas at far shallower depths than widely believed, sometimes through underground sources of drinking water, according to research released [on August 12] by Stanford University scientists. Fracking involves high-pressure injection of millions of gallons of water mixed with sand and chemicals to crack geological formations and tap previously unreachable oil and gas reserves. Fracking fluids contain a host of chemicals, including known carcinogens and neurotoxins. Fears about possible water contamination and air pollution have fed resistance in communities around the country. Fracking into underground drinking water sources is not prohibited by the 2005 Energy Policy Act, which exempted the practice from key provisions of the Safe Drinking Water Act. But the industry has long held that it does not hydraulically fracture into underground sources of drinking water because oil and gas deposits sit far deeper than aquifers. The study, however, found that energy companies used acid stimulation ... and hydraulic fracturing in the Wind River and Fort Union geological formations that make up the Pavillion gas field and that contain both natural gas and sources of drinking water. “Thousands of gallons of diesel fuel and millions of gallons of fluids containing numerous inorganic and organic additives were injected directly into these two formations during hundreds of stimulation events,” concluded Dominic DiGiulio and Robert Jackson of Stanford’s School of Earth Sciences.
Note: For more on this, see concise summaries of deeply revealing corporate corruption news articles from reliable major media sources.
The Federal Aviation Agency has declared a no-fly zone over Ferguson, Missouri as tensions between police and protesters continued after last weekend’s police shooting of Michael Brown. The FAA issued a temporary flight restriction on Tuesday, prohibiting aircraft—including news helicopters—from entering the area. The agency listed the reason as “to provide a safe environment for law enforcement activities.” The extraordinary move comes days after the shooting of Michael Brown. The 18-year-old was shot multiple times and killed by police Aug. 9. Witnesses to the shooting said Brown had his hands up and was surrendering to police. Law enforcement officials, meanwhile, said the shooting occurred after a physical confrontation with Brown and a friend. The shooting and ensuing controversy has led to protests, looting and a strong police response in the St. Louis-area community.
Note: For more on this, see concise summaries of deeply revealing government secrecy news articles from reliable major media sources.
To many Americans, online eavesdropping by the U.S. National Security Agency is an outrage, a threat to privacy and freedom. To some, it's a business opportunity. A small but growing number of companies have introduced Internet and communications services designed to shield users from the government's eyes. A few even advertise their products as "NSA-proof." Many of the companies have been offering encrypted online services for years, scrambling their customers' data and communications in ways that require the right computer-generated "key" to decode. They are at least as concerned with thwarting private hackers and corporate spies as they are with blocking federal agents. But some entrepreneurs in the field found motivation in the NSA, after learning that the agency has been collecting troves of Internet and phone data on ordinary citizens for years. "Privacy and democracy go hand in hand - that's why this is so important," said Jason Stockman, one of the creators of ProtonMail, which began offering an encrypted e-mail service in May. "Our goal is to protect people against mass surveillance." But most companies will quickly admit that if the NSA - or some foreign intelligence service - really wants your data, they can't guarantee protection. Since the NSA conducts its business in secret, its full capabilities remain a matter of speculation. Most companies that invoke the NSA in their marketing focus on encryption.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
[There are many] obstacles and frustrations scientists face in trying to study the medical uses of marijuana. Dating back to 1999, the Department of Health and Human Services has indicated it does not see much potential for developing marijuana in smoked form into an approved prescription drug. In guidelines issued that year for research on medical marijuana, the agency quoted from an accompanying report that stated, “If there is any future for marijuana as a medicine, it lies in its isolated components, the cannabinoids and their synthetic derivatives.” Scientists say this position has had a chilling effect on marijuana research. Though more than one million people are thought to use the drug to treat ailments ranging from cancer to seizures to hepatitis C and chronic pain, there are few rigorous studies showing whether the drug is a fruitful treatment for those or any other conditions. A major reason is this: The federal government categorizes marijuana as a Schedule 1 drug, the most restrictive of five groups established by the Controlled Substances Act of 1970. Drugs in this category — including heroin, LSD, peyote and Ecstasy — are considered to have no accepted medical use in the United States and a high potential for abuse, and are subject to tight restrictions on scientific study. In the case of marijuana, those restrictions are even greater than for other controlled substances. Marijuana remains illegal under federal law, though nearly half the states and the District of Columbia allow its medical use and two, Colorado and Washington, have legalized its recreational use.
Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
It was revealed this week that many government information officers block specific journalists they don't like from accessing information. The news comes as 47 federal inspectors general sent a letter to lawmakers criticizing "serious limitations on access to records" that they say have "impeded" their oversight work. The data about public information officers was compiled over the past few years by Kennesaw State University professor Carolyn Carlson. Her surveys found that 4 in 10 public information officers say "there are specific reporters they will not allow their staff to talk to due to problems with their stories in the past." Carlson has conducted surveys of journalists and public information officers since 2012. In her most recent survey of 445 working journalists, four out of five reported that "their interviews must be approved" by government information officers, and "more than half of the reporters said they had actually been prohibited from interviewing [government] employees at least some of the time by public information officers." The Associated Press reported earlier this year that in 2013 "the government cited national security to withhold information a record 8,496 times — a 57 percent increase over a year earlier and more than double Obama's first year." This week's letter from more than half of the federal government's inspectors general [said] that government agencies' move to hide information from them represents a "potentially serious challenge to the authority of every Inspector General and our ability to conduct our work thoroughly, independently, and in a timely manner."
Note: For more on this, see concise summaries of deeply revealing government secrecy news articles from reliable major media sources.
Nearly 13 years after the 9/11 terrorist attacks, the extent of Saudi involvement in the deaths of almost 3,000 people remains unclear — but according to members of Congress and the families of victims, information about this has been suppressed ever since the publication of a 2002 congressional investigation into the plot. Prior to the release of the final report of the Joint Inquiry into Intelligence Community Activities Before and After the Terrorist Attacks of September 11, 2001, the Bush administration classified a 28-page section in the name of national security. The 28 pages make up part four of the report, a section titled “Finding, Discussion and Narrative Regarding Certain Sensitive National Security Matters.” They are widely believed to implicate Saudi officials or describe support from Saudi intelligence for the hijackers, 15 of whom were Saudi citizens. Former Senator Bob Graham of Florida, who co-chaired the joint Senate-House investigation, dispensed with the equivocation and told VICE News that the redactions are a “cover up.” “I’ve said this since the first classification of the 28 pages,” he remarked. “It’s become more and more inexplicable as to why two administrations have denied the American people information that would help them better understand what happened on 9/11.” Graham said that the 28 pages describe the financing of the attacks. “Follow the money,” he said. “That will illuminate other significant aspects of 9/11.” The Saudi kingdom has always denied any complicity in the attacks.”
Note: Watch a video of Congressman Massie telling how shocked he was to read these 28 pages. Why aren't the major media reporting this important news? For more on this, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources.
The New York Times announced on [August 7] that it will use the word torture to describe the United States' controversial interrogation tactics on terror suspects. "From now on, The Times will use the word “torture” to describe incidents in which we know for sure that interrogators inflicted pain on a prisoner in an effort to get information," said Times executive editor Dean Baquet. In the past, the Times had been sharply criticized for not using the word torture. Instead, [it] had referred to torture as "brutal interrogation," or similar epithets. The Times is hardly the only major media outlet to avoid using the word "torture." Reuters referred to the tactics as "brutal interrogation methods" and the AP has called them "enhanced interrogation techniques." The media have been accused of following along with President Bush's denial that the U.S. does not use torture. Banquet [says] that "while the methods set off a national debate, the Justice Department insisted that the techniques did not rise to the legal definition of 'torture.'” Baquet said that reporters and editors had debated the issue in wake of the Senate Intelligence Committee's torture report, which has yet to be released. Last week, President Obama admitted that the CIA "tortured some folks" in post-9/11 anti-terror efforts.
Note: For more on this, see concise summaries of deeply revealing media cover-ups news articles from reliable major media sources.
The federal government has concluded there's a new leaker exposing national security documents in the aftermath of surveillance disclosures by former NSA contractor Edward Snowden, U.S. officials tell CNN. Proof of the newest leak comes from national security documents that formed the basis of a news story published [August 5] by the Intercept, the news site launched by Glenn Greenwald, who also published Snowden's leaks. The Intercept article focuses on the growth in U.S. government databases of known or suspected terrorist names during the Obama administration. The article cites documents prepared by the National Counterterrorism Center dated August 2013, which is after Snowden left the United States to avoid criminal charges. Government officials have been investigating to find out that identity. In a February interview with CNN's Reliable Sources, Greenwald said: "I definitely think it's fair to say that there are people who have been inspired by Edward Snowden's courage and by the great good and virtue that it has achieved." The biggest database, called the Terrorist Identities Datamart Environment, now has 1 million names, a U.S. official confirmed to CNN. The Intercept first reported the new TIDE database numbers, along with details of other databases. As of November, 2013, there were 700,000 people listed in the Terrorist Screening Database (TSDB), or the "Terrorist Watchlist, according to a U.S. official. The Intercept report said, citing the documents, that 40% on the "Terrorist Watchlist" aren't affiliated with terror groups.
Note: For more on this, see concise summaries of deeply revealing 'terror' manipulation news articles from reliable major media sources.
What should happen if a massive viral outbreak appears out of nowhere and the only possible treatment is an untested drug? And who should receive it? The two American missionaries who contracted the almost-always-fatal virus in West Africa were given access to an experimental drug cocktail called ZMapp. It consists of immune-boosting monoclonal antibodies that were extracted from mice exposed to bits of Ebola DNA. Now in isolation at an Atlanta hospital, they appear to be doing well. It’s an opportunity the 900 Africans who’ve died so far never had. The reasons for different treatment are partly about logistics, partly about economics and, partly about a lack of any standard policy for giving out untested drugs in emergencies. Before this outbreak, ZMapp had only been tested on monkeys. But privileged humans were always going to be the first ones to try it. ZMapp requires a lot of refrigeration and careful handling, plus close monitoring by experienced doctors and scientists—better to try it at a big urban hospital than in rural West Africa, where no such infrastructure exists. And the two Americans who got it in Africa had been infected for more than a week, making its efficacy completely unknown.
Note: For more on this, see concise summaries of deeply revealing health news articles from reliable major media sources.
Three of Britain’s leading Ebola specialists have said experimental treatments for the deadly Ebola virus must be offered to the people of West Africa, after two US aid workers were administered with the “cure” in Liberia. The two missionaries, Dr Kent Brantly and Nancy Writebol, are alive and now being cared for at a specialist isolation unit in Atlanta. Though the pair remain weak – and there is no way of knowing at this stage how much of a help the new drug has actually been – the fact that it was given to the two Americans has resulted in widespread criticism and recriminations in West Africa. Almost 900 people have died from the Ebola virus across Guinea, Liberia and Sierra Leone since the latest outbreak began in February this year. Some strains can have fatality rates of up to 90 per cent, though that of the current crisis appears to be around 60 per cent. Now Peter Piot, who discovered Ebola in 1976, David Heymann, the director of the Chatham House Centre on Global Health Security and Jeremy Farrar from the Wellcome Trust have said there are in fact several drugs and vaccines under study that could be used to combat the disease. Liberia’s assistant health minister, Tolbert Nyenswah, said that the news of Dr Brantly and Ms Writebol’s treatment had “made our job very difficult” as dying patients and their relatives in Africa request the same “cure”. The US aid workers were given ZMapp, a drug made from antibodies produced in a lab that has never gone through human trials or been approved by the US’s FDA Food and Drug Administration. Piot, Farrar and Heymann questioned why Africans were not being given the same chance.
Note: For more on this, see concise summaries of deeply revealing health news articles from reliable major media sources.
Nearly half of the people on the U.S. government’s widely shared database of terrorist suspects are not connected to any known terrorist group, according to classified government documents obtained by The Intercept. Of the 680,000 people caught up in the government’s Terrorist Screening Database—a watchlist of “known or suspected terrorists” that is shared with local law enforcement agencies, private contractors, and foreign governments—more than 40 percent are described by the government as having “no recognized terrorist group affiliation.” The documents, obtained from a source in the intelligence community, also reveal that the Obama Administration has presided over an unprecedented expansion of the terrorist screening system. Since taking office, Obama has boosted the number of people on the no fly list more than ten-fold, to an all-time high of 47,000. “If everything is terrorism, then nothing is terrorism,” says David Gomez, a former senior FBI special agent. The watchlisting system, he adds, is “revving out of control.” The classified documents were prepared by the National Counterterrorism Center, the lead agency for tracking individuals with suspected links to international terrorism. Stamped “SECRET” and “NOFORN” (indicating they are not to be shared with foreign governments), they offer the most complete numerical picture of the watchlisting system to date. The government adds names to its databases, or adds information on existing subjects, at a rate of 900 records each day.
Note: For more on this, see concise summaries of deeply revealing 'terror' manipulation news articles from reliable major media sources.
A man who filmed a New York City police officer use a choke hold on a suspect who later died has been arrested on weapons charges, law enforcement officials said on [August 3]. Ramsey Orta, 22, and a 17-year-old female were spotted on [August 2] outside a known drug location on Staten Island by narcotics officers who saw Orta put a handgun in his companion's waistband, the New York Police Department said. Orta, who has a previous criminal conviction, faces two charges of criminal possession of a weapon. At some point during his arrest, Orta told officers, "You're just mad because I filmed your boy," an NYPD spokeswoman said. The comment was apparently in reference to the July 17 cellphone video shot by Orta during the arrest of Eric Garner, who was placed in a choke hold by a police officer while being detained for peddling illegal cigarettes. Garner later died, and the New York City medical examiner ruled the his death a homicide. Footage of the incident circulated widely on the Internet, triggering outrage and raising questions about police tactics and use of force. The choke hold is banned by the NYPD, which says it is investigating why the maneuver was used.
Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
An internal investigation by the C.I.A. has found that its officers penetrated a computer network used by the Senate Intelligence Committee in preparing its damning report on the C.I.A.’s detention and interrogation program. The report by the agency’s inspector general also found that C.I.A. officers read the emails of the Senate investigators and sent a criminal referral to the Justice Department based on false information. The investigation also discovered that the officers created a false online identity to gain access on more than one occasion to computers used by the committee staff. The inspector general’s account of how the C.I.A. secretly monitored a congressional committee charged with supervising its activities touched off angry criticism from members of the Senate and amounted to vindication for Senator Dianne Feinstein of California, the committee’s Democratic chairwoman, who excoriated the C.I.A. in March when the agency’s monitoring of committee investigators became public. Senator Mark Udall, Democrat of Colorado and another member of the Intelligence Committee, demanded Mr. Brennan’s resignation. “The C.I.A. unconstitutionally spied on Congress by hacking into the Senate Intelligence Committee computers,” he said in a written statement. “This grave misconduct not only is illegal but it violates the U.S. Constitution’s requirement of separation of powers,” he added.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
A U.S. Senate committee report will conclude that the CIA's use of harsh interrogation after the Sept. 11, 2001, attacks yielded no critical intelligence on terrorist plots that could not have been obtained through non-coercive methods, U.S. officials familiar with the document said. [The] report [is] expected to suggest that the "enhanced" techniques were unnecessary and also to accuse some CIA officers of misleading Congress about the effectiveness of the program. Officials said the Senate Intelligence Committee was unlikely to release the report to the public without some additional review. "A preliminary review of the report indicates there have been significant redactions. We need additional time to understand the basis for these redactions and determine their justification. Therefore the report will be held until further notice and released when that process is completed," Democratic Sen. Dianne Feinstein, the committee's chair, said. Committee investigators also concluded that the agency misled other executive branch agencies and Congress by claiming that only by using harsh methods did the agency achieve ... counter-terrorism breakthroughs that otherwise would not have been possible. The report will criticize some CIA officials by name, the officials said.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
The [UK] government [has] announced an inquiry into historical allegations of child sex abuse by leading political figures. The Westminster inquiry will investigate not just the rape and assault of children at group homes going back decades but also accusations that child abuse by politicians and other public figures was deliberately covered up or even facilitated by members of the elite. [The] Parliament has ... spent 30 years failing to catch the pedophiles in its own house. Before the inquiry was even announced, it emerged that 114 files concerning allegations of abuse against children involving senior political figures had mysteriously disappeared. What links all these convicted or alleged predators of children is not background or upbringing. What united them was power and access — and a sense of entitlement, acquired from Britain’s traditional elite, that came from the knowledge that their reputations were too great for them to be held accountable. In many cases, investigation by the authorities was deliberately deflected. Nowhere is this truer than at Britain’s top “public schools,” as the private secondary, usually boarding, schools are known. In these, a culture of bullying and sexualized violence has been understood for more than a century as part of the process of training young men to be leaders. Teachers at 130 of these schools have been implicated; several schools are under criminal investigation by the police. That victims of child abuse often grow up to replicate that abuse, to become bullies or tyrants or covert sexual predators, has long been understood as a human tragedy. Only in Britain does it seem to have been the intrinsic psychology at the dark heart of the governing elite.
Note: For more on this, see concise summaries of deeply revealing sexual abuse scandals news articles from reliable major media sources.
The U.S. has now spent more on the reconstruction of Afghanistan than it spent on the Marshall Plan, which resuscitated Europe after World War II. The Marshall Plan delivered $103 billion in todays dollars to 16 European countries between 1948 and 1952. That has now been topped by congressional appropriations for reconstruction in Afghanistan, which so far have come to $109 billion in todays dollars. The difference: The Marshall Plan helped Europe get back on its feet, while Afghanistan is a chaotic mess. The Marshall Plan comparison is the most striking fact in a depressing, 259-page quarterly report to Congress issued July 30 by John Sopko, the congressionally appointed special inspector general for Afghanistan reconstruction. One recent audit ... raised concerns about the armys ability to account for some 465,000 U.S.-provided small arms. This quarter, Sopkos report says, a local police unit cut the power lines from Kabul ... in retaliation for not being paid for three months. To cut costs, NATO plans to shrink the Afghan National Security Forces to less than 230,000 by 2017. But an independent assessment ... concluded that the forces will require more than 370,000 people. That would cost three times as much as the Afghan governments entire domestic revenue. Afghanistans main exports are carpets and rugs, dried fruits, medicinal plants, opium, and gems. But Sopko observes, opiates are not part of the licit economy, and gems are easy to smuggle, so their contributions to government revenue are limited.
Note: By 2000, the Taliban had mostly stopped heroin production in Afghanistan. But once this country was under US control, illicit drug production surged to record levels and Afghanistan became a narco state. How much "reconstruction" money became the drug cartel money that kept big banks afloat in 2008?
A sweeping [gag] order issued in Australia to block reporting of any bribery allegations involving several international political leaders in the region has been exposed by WikiLeaks. The prohibition emerged from a criminal case in the Australian courts and applies throughout the country. It was issued by the criminal division of the supreme court of Victoria in Melbourne. The Australia-wide [gag] order is a superinjunction, which means it also contains a clause insisting that the terms of the order itself should remain secret. [It] states: "Subject to further order, there [shall] be no disclosure, by publication or otherwise, of any information derived from or prepared for the purposes of these proceedings including the terms of these orders." In a statement published with the leak, Julian Assange, the founder of WikiLeaks, said the gagging order relates to a case that "concerns the subsidiaries of the Australian central bank". He said it was the first blanket suppression order of this nature in Australia since 1995. "With this order, the worst in living memory, the Australian government is not just gagging the Australian press, it is blindfolding the Australian public," said Assange, who is himself Australian. "This is not simply a question of the Australian government failing to give this international corruption case the public scrutiny it is due. Foreign minister Julie Bishop must explain why she is threatening every Australian with imprisonment in an attempt to cover up an embarrassing corruption scandal involving the Australian government".
Note: Very few media were even willing to report on the reasons for this gag order, which were clearly to cover up corruption at the highest levels. See the CNN article for how no mention is even made of what was revealed. It seems that the higher up the corruption goes, the more vehemently courts rule to keep the investigations secret. Could there be a double standard here? For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.