Government Corruption Media ArticlesExcerpts of Key Government Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
US intelligence chiefs have confirmed that the National Security Agency has [performed] warrantless searches on Americans’ communications. The NSA's collection programs are ostensibly targeted at foreigners, but in August the Guardian revealed a secret rule change allowing NSA analysts to search for Americans' details within the databases. Now, in a letter to Senator Ron Wyden, an Oregon Democrat on the intelligence committee, the director of national intelligence, James Clapper, has confirmed the use of this legal authority to search for data related to “US persons”. The legal authority to perform the searches, revealed in top-secret NSA documents provided ... by Edward Snowden, was denounced by Wyden as a “backdoor search loophole.” Many of the NSA's most controversial programs collect information under the law affected by the so-called loophole. These include Prism, which allows the agency to collect data from Google, Apple, Facebook, Yahoo and other tech companies, and the agency's Upstream program – a huge network of internet cable taps. Confirmation that the NSA has searched for Americans’ communications in its phone call and email databases complicates President Barack Obama’s initial defenses of the broad surveillance in June. Wyden and Udall [said] “Today’s admission by the Director of National Intelligence is further proof that meaningful surveillance reform must include closing the back-door searches loophole and requiring the intelligence community to show probable cause before deliberately searching through ... the communications of individual Americans."
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
A Senate intelligence committee investigation found that the Central Intelligence Agency employed brutal interrogation methods that turned out to be largely useless and then lied about their effectiveness. The Senate report contradicts the main defenses of the Bush-era torture program: That harsh methods were needed to produce "actionable results," and that the program itself helped save American lives by foiling terror attacks. Instead, the CIA overstated the effectiveness of the program and concealed the harshness of the methods they used. Intelligence breakthroughs credited to the “enhanced interrogation” program by the CIA were instead gleaned through other means, and then used by the agency to bolster defenses of the program. Conservative media figures incessantly hyped former Bush administration officials’ at times verifiably false claims about the efficacy of the program. The Bush administration’s trip to the “dark side” provided pundits, op-ed columnists, and other media personalities an endless stream of satisfaction from talking like the greased up protagonists of 1980s action films.
Note: For an article explaining how even though this report may be declassified, the public will not have access to most of it, click here. For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
A judge who sentenced a wealthy du Pont heir to probation in the rape of his three-year-old daughter said in court documents that he would "not fare well" in prison. The rape case against Robert H. Richards IV became public this month after his ex-wife reportedly filed a lawsuit seeking damages for the abuse of his daughter. According to a lawsuit filed by his ex-wife, Richards raped his daughter, now 11, in 2005 when she was 3, telling her "to keep what he had done to her a secret." The girl told her grandmother in October 2007, and Richards pleaded guilty in June 2008 to one count of fourth-degree rape to avoid jail time, court records show. The lawsuit also alleged that Richards abused his toddler son. Superior Court Judge Jan Jurden's sentencing order for Richards suggested that he needed treatment instead of prison time and considered unique circumstances when deciding his fate, reports the [News Journal of Delaware]. Attorney General Beau Biden initially indicted Richards on two counts of second-degree rape of a child, punishable by ten years in prison for each count. But as part of a plea agreement days before his 2008 trial, Richards pleaded guilty to fourth-degree rape -- reportedly a Class C violent felony that can bring up to 15 years in prison, though guidelines suggest zero to 2 1/2 years. At Richards' 2009 sentencing, prosecutor Renee Hrivnak recommended probation. Richards, a great-grandson of du Pont patriarch Irenee du Pont, is unemployed and supported by a trust fund, [and] owns a 5,800-square-foot mansion in Greenville and a home in the exclusive North Shores neighborhood near Rehoboth Beach.
Note: For more on sexual abuse scandals, see the deeply revealing reports from reliable major media sources available here.
Secret documents newly disclosed by the German news magazine Der Spiegel ... shed more light on how aggressively the National Security Agency and its British counterpart have targeted Germany for surveillance. A series of classified files from the archive provided to reporters by NSA whistleblower Edward Snowden ... reveal that the NSA appears to have included Merkel in a surveillance database alongside more than 100 other foreign leaders. The documents also confirm for the first time that, in March 2013, the NSA obtained a top-secret court order against Germany as part of U.S. government efforts to monitor communications related to the country. [A] document, dated 2009, indicates that Merkel was targeted in a broader NSA surveillance effort. She appears to have been placed in the NSA’s so-called “Target Knowledge Base“ (TKB), which Der Spiegel described as the central agency database of individual targets. An internal NSA description states that employees can use it to analyze “complete profiles“ of targeted people. But the NSA’s surveillance of Germany has extended far beyond its leader. A separate document from the NSA’s Special Source Operations unit ... shows that the Obama administration obtained a top-secret court order specifically permitting it to monitor communications related to Germany. Special Source Operations is the NSA department that manages what the agency describes as its “corporate partnerships” with major US companies, including AT&T, Verizon, Microsoft, and Google.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Three days after an FBI agent was cleared of wrongdoing in the bizarre killing of an associate of slain Boston bombing suspect Tamerlan Tsarnaev, lawyers for Dzhokhar Tsarnaev, the only surviving bombing suspect, alleged that the FBI attempted to recruit the elder Tsarnaev as an informant. Dzhokhar Tsarnaev’s defense team said that new information suggests the FBI interviewed Tamerlan on several occasions before the attack, and even pressured him to surreptitiously report on the Chechen underworld. The Bureau has continued to emphatically state that it didn’t know the identities of the two suspected bombers until they were fingerprinted, and have denied any involvement with the brothers aside from following up on a tip from a Russian emissary that the elder Tsarnaev may have been seeking jihad. In the case of Ibragim Todashev, who allegedly took part with Tamerlan in a robbery turned triple-homicide in Waltham, in 2011, family members have also stated that FBI pressure may have pushed the 20-something ethnic Chechen and mixed martial arts fighter to the brink of violence. Since the terrorist attacks of 9/11, the Bureau has stepped up surveillance of specific racial, ethnic and religious communities, including the use of informants. The tactics have ... left the Bureau open to charges of entrapment, not to mention assorted Internet conspiracy theories. Part of those post-9/11 tactics are the use of “voluntary interviews … often encouraging interviewees to serve as informants in their communities,” writes the American Civil Liberties Union.
Note: Why didn't the FBI reveal its attempt to recruit the elder Tsarnaev when the bombing happened? Something is quite fishy here.
Nearly half of American adults believe the federal government, corporations or both are involved in at least one conspiracy to cover up health information, a new survey finds. Conspiracy theories on everything from cancer cures to cellphones to vaccines are well known and accepted by sizable segments of the population, according to a research letter published this week in JAMA Internal Medicine. The findings reflect "a very low level of trust" in government and business, especially in pharmaceutical companies, says study co-author Eric Oliver, a professor of political science at the University of Chicago. The online survey of 1,351 adults found: • 37% agree the Food and Drug Administration is keeping "natural cures for cancer and other diseases" away from the public because of "pressure from drug companies." • 20% believe health officials are hiding evidence that cellphones cause cancer. • 20% believe doctors and health officials push child vaccines even though they "know these vaccines cause autism and other psychological disorders." • Smaller numbers endorse theories involving fluoride, genetically modified foods and the deliberate infection of African Americans with HIV. • 49% believe at least one of the theories and 18% believe at least three. The beliefs also go along with certain health behaviors, the survey found. Those who believe at least three health conspiracy theories are less likely to use sunscreen, get flu shots or get check-ups and are more likely to use herbal remedies and eat organic foods.
Note: For an intriguing list of 10 major health cover-ups with evidence to back it up, click here.
The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage. At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.
Note: Though technically it is illegal for the NSA to snoop on Americans without good cause, all they have to do is to share this technology with another country like the UK, and then ask the UK to do the snooping and send the results back to them, thereby circumventing the law. For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.
Lawmakers of both parties are desperately trying to stop the Internal Revenue Service from interfering with the most powerful political invention that ever fell into their laps: the use of non-profit groups as a source of unlimited and anonymous campaign money. An investigation now unfolding in Utah ... exposes in remarkable detail how profoundly the non-profit system can be corrupted for the benefit of a single industry and a single politician. The politician involved was John Swallow, a former lobbyist for an empire of payday-loan and check-cashing companies. When Mr. Swallow ran for Utah Attorney General as a Republican in 2012, his strategist established several social-welfare groups, which don’t have to name their donors, so that the payday-loan industry could support him financially without anyone knowing. The groups collected hundreds of thousands of dollars in secret donations from the industry, and the money was used to run attack ads against Mr. Swallow’s opponent, who wanted to crack down on payday lenders. The ads worked, and Mr. Swallow was elected. When the I.R.S. started looking into the non-profit groups and demanding documentation, ... Congressional Republicans accused the agency (falsely) of singling out conservative non-profit groups. Eventually, a parallel state investigation drove Mr. Swallow from office; he resigned last fall, and last week a state legislative panel accused him of breaching the public trust by hanging “a veritable ‘for sale’ sign on the office door that invited moneyed interests to seek special treatment and favors.”
Note: For more on serious problems with the US electoral system, see the deeply revealing reports from reliable major media sources available here.
China has allowed direct domestic trading of the yuan against the New Zealand dollar to encourage such trading as it internationalizes the Chinese currency. The move ... comes after China doubled the yuan's trading band over the weekend in a milestone step that gives investors more freedom to set the value of the tightly controlled currency. The move was seen as promoting trade between the two countries, which rose 25.2 percent to NZ$18.2 billion ($15.71 billion) in 2013. As part of China's sweeping plans to overhaul its maturing economy and let market forces drive a host of industries, the government wants to gradually relax its hold over the yuan and turn it into a global reserve currency that one day rivals the dollar. The government's wish to promote international use of the yuan is partly driven by its concern that China is too vulnerable to the fluctuating value of the dollar. China is home to the world's largest foreign exchange reserves, worth $3.82 trillion at the end of last year. About a third is invested in U.S. government bonds. To promote international use of the yuan, China has signed a series of currency swaps with foreign governments in order to increase the overseas circulation of the Chinese currency. The New Zealand dollar is the 10th foreign currency that can be directly traded against the yuan in China.
Note: The US dollar's role as a global currency is gradually fading.
Malaysia's prime minister says the disappearance of Malaysia Airlines Flight 370 appears to be "deliberate." The latest evidence suggests the plane didn't experience a catastrophic incident over the South China Sea as was initially suspected. Prime Minister Najib Razak said the investigation has refocused onto the crew and passengers aboard the missing plane. He added that ... all possibilities are still being investigated. A Malaysian government official who is involved in the investigation said investigators have concluded that one of the pilots or someone else with flying experience hijacked the missing Malaysia Airlines jet. The official said that hijacking was no longer a theory. "It is conclusive." A Malaysian official, who also declined to be identified because he is not authorized to brief the media, said only a skilled aviator could navigate the plane the way it was flown after its last confirmed location over the South China Sea. The official said it had been established with a "more than 50 percent" degree of certainty that military radar had picked up the missing plane after it dropped off civilian radar. Malaysian officials have said radar data suggest it may have turned back and crossed back over the Malaysian peninsula westward, after setting out toward the Chinese capital. The flight altered its course more than once after it lost contact with ground control and that it made significant changes in altitude. Investigators say there's further evidence suggesting the jet did not crash immediately after being lost on radar; a transmitter on the plane tried for another four hours to ping satellites.
Note: Why is the military radar 50% certain? How could a transmitter on the plane ping for four hours, yet no one on the plane made a phone call? Remember that after Flight 93 was hijacked on 9/11, many phone calls were made by passengers on the plane. There is an abundance of high strangeness to this airplane's disappearance. For valuable speculation on the missing flight not well covered in the major media, click here. For some very unusual radar evidence of its disappearance, click here.
The authors of a study calling for GM crops to be fast-tracked into Britain’s farms and kitchens all have links to the industry. The report was presented as the work of ‘independent’ scientists and was published on [March 13] by a government advisory body. It was used to support a bid to speed up the development of the controversial crops in the UK, but it has emerged that all five authors have a vested interest in promoting GM crops and food – and some are part-funded by the industry. Critics of GM [have] described the report as ‘biased and downright dangerous’, and accused the biotech giants and the Government of mounting a crude propaganda campaign to overturn public opposition. The academics behind the study were chosen by the Council for Science and Technology, the body that advises the Prime Minister on science policy issues. They include Professor Sir David Baulcombe, from Cambridge University, who works as a consultant for GM firm Syngenta, which gives his department research funding. Syngenta is behind a genetically modified maize or corn, called GA21, which could go into UK farms as early as next spring, making it Britain’s first commercially grown GM crop. Also on the list is Professor Jonathan Jones, of the Sainsbury Laboratory, which is at the centre of Britain’s GM research. It is part-funded by former Labour science minister, Lord Sainsbury, who is one of the country’s biggest supporters of the technology. Another co-author was Professor Jim Dunwell, of the University of Reading. He was a founder member of CropGen, which describes its mission as ‘to make the case for GM crops and foods’
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here. For an excellent summary of the risks and dangers from GMO foods, click here.
Four years after President Obama promised to crack down on mortgage fraud, his administration has quietly made the crime its lowest priority and has closed hundreds of cases after little or no investigation, the Justice Department’s internal watchdog said on [March 13]. The report by the department’s inspector general undercuts the president’s contentions that the government is holding people responsible for the collapse of the financial and housing markets. The administration has been criticized, in particular, for not pursuing large banks and their executives. The inspector general’s report ... shows that the F.B.I. considered mortgage fraud to be its lowest-ranked national criminal priority. In several large cities, including New York and Los Angeles, F.B.I. agents either ranked mortgage fraud as a low priority or did not rank it at all. The F.B.I. received $196 million from the 2009 to 2011 fiscal years to investigate mortgage fraud, the report said, but the number of pending cases and agents investigating them dropped in 2011. Mortgage fraud was one of the causes of the 2008 financial collapse. Mortgage brokers and lenders falsified documents, sometimes to make mortgages look safer, other times to make the property look more valuable.
Note: For more on government collusion with the banking industry, see the deeply revealing reports from reliable major media sources available here.
The US came under sharp criticism at the UN human rights committee in Geneva on [March 13] for a long list of human rights abuses that included everything from detention without charge at Guantánamo, drone strikes and NSA surveillance, to the death penalty, rampant gun violence and endemic racial inequality. The experts raised questions about the National Security Agency’s surveillance of digital communications in the wake of Edward Snowden’s revelations. The committee’s 18 experts [are] charged with upholding the International Covenant on Civil and Political Rights (ICCPR), a UN treaty that the US ratified in 1992. The US came under sustained criticism for its global counter-terrorism tactics, including the use of unmanned drones to kill al-Qaida suspects, and its transfer of detainees to third countries that might practice torture, such as Algeria. Committee members also highlighted the Obama administration’s failure to prosecute any of the officials responsible for permitting waterboarding and other “enhanced interrogation” techniques under the previous administration. Walter Kälin, a Swiss international human rights lawyer who sits on the committee, attacked the US government’s refusal to recognise the convention’s mandate over its actions beyond its own borders. The US has asserted since 1995 that the ICCPR does not apply to US actions beyond its borders - and has used that “extra-territoriality” claim to justify its actions in Guantánamo and in conflict zones.
Note: How sad that it appears this news was not reported in any major US media.
Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic. In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Former NSA contractor Edward Snowden accused Sen. Dianne Feinstein of hypocrisy ... for complaining about alleged CIA spying on U.S. senators while tolerating government spying on private citizens. "It's clear the CIA was trying to play 'keep away' with documents relevant to an investigation by their overseers in Congress, and that's a serious constitutional concern,” said Snowden in a statement to NBC News. “But it's equally if not more concerning that we're seeing another 'Merkel Effect,' where an elected official does not care at all that the rights of millions of ordinary citizens are violated by our spies, but suddenly it's a scandal when a politician finds out the same thing happens to them." Snowden was ... referring to German Chancellor Angela Merkel’s indignation at reports that the U.S. had listened in on her personal conversations, but her failure to condemn the NSA for mass surveillance of communications of German citizens. Both were revealed by the release of documents that Snowden took from NSA computers and distributed to journalists.
Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.
Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.
Senate Intelligence Committee Chair Dianne Feinstein accused the CIA on [March 11] of violating the law and the Constitution of the United States by interfering in a committee investigation into Bush-era torture of terror suspects. Feinstein said the CIA had removed documents provided to the committee through a special, segregated network set up by the agency for the committee to pursue its investigation. Among the documents removed was an internal review of CIA interrogation techniques conducted by then-CIA Director Leon Panetta, which committee members have said corroborated committee findings critical of the agency’s interrogation program. “The CIA just went and searched the committee’s computers,” Feinstein said on the Senate floor. “This was done without the knowledge or approval of committee members or staff, and in violation of our written agreements. Further, this type of behavior would not have been possible had the CIA allowed the committee to conduct the review of documents here in the Senate,” Feinstein said. Feinstein said that the CIA’s activities may have violated the Fourth Amendment, the Computer Fraud and Abuse Act, and executive order 12333, which bars the CIA from conducting domestic surveillance. Feinstein also said the CIA’s activities violated the separation of powers principles in the Constitution by interfering with congressional oversight of the executive branch.
Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
In the tense days after a powerful earthquake and tsunami crippled the Fukushima Daiichi power plant in Japan on March 11, 2011, staff at the U.S. Nuclear Regulatory Commission made a concerted effort to play down the risk of earthquakes and tsunamis to America’s aging nuclear plants, according to thousands of internal emails reviewed by NBC News. The emails, obtained via the Freedom of Information Act, show that the campaign to reassure the public about America’s nuclear industry came as the agency’s own experts were questioning U.S. safety standards and scrambling to determine whether new rules were needed to ensure that the meltdown occurring at the Japanese plant could not occur here. At the end of that long first weekend of the crisis three years ago, NRC Public Affairs Director Eliot Brenner thanked his staff for sticking to the talking points that the team had been distributing to senior officials and the public. "While we know more than these say," Brenner wrote, "we're sticking to this story for now." There are numerous examples in the emails of apparent misdirection or concealment in the initial weeks after the Japanese plant was devastated: When asked to help reporters explain what would happen during the worst-case scenario -- a nuclear meltdown -- the agency declined to address the questions. The emails pull back the curtain on the agency’s efforts to protect the industry it is supposed to regulate. The NRC officials didn't lie, but they didn't always tell the whole truth either. When someone asked about a topic that might reflect negatively on the industry, they changed the subject.
Note: For more on corruption in the nuclear power industry, see the deeply revealing reports from reliable major media sources available here.
The confirmation in December that former CIA Director Leon Panetta let classified information slip to "Zero Dark Thirty" screenwriter Mark Boal during a speech at the agency headquarters should result in a criminal espionage charge if there is any truth to Obama administration claims that it isn't enforcing the Espionage Act only against political opponents. I'm one of the people the Obama administration charged with criminal espionage, one of those whose lives were torn apart by being accused, essentially, of betraying [their] country. The president and the attorney general have used the Espionage Act against more people than all other administrations combined, but not against real traitors and spies. The law has been applied selectively, often against whistle-blowers and others who expose illegal, corrupt government actions. After I blew the whistle on the CIA's waterboarding torture program in 2007, I was the subject of a years-long FBI investigation. In 2012, the Justice Department charged me with "disclosing classified information to journalists, including the name of a covert CIA officer and information revealing the role of another CIA employee in classified activities." I had revealed no more than others who were never charged, about activities ... that were hardly secret. I am serving a 30-month sentence. The Espionage Act, the source of the most serious charges against me, was written and passed during World War I and... is so outdated that it refers only to "national defense information" rather than "classified information," because the classification system had not yet been invented.
Note: The author of this article, John Kiriakou, is a former CIA counter-terrorism officer and former senior investigator on the Senate Foreign Relations Committee. He is incarcerated in the Federal Correctional Institution in Loretto, Pa. You can read about his case at http://www.defendjohnk.com. For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
A top judge campaigned to support a paedophile group that tried to legalise sex with children, a newspaper claims. The Mail on Sunday said Lord Justice Fulford was a founder member of a campaign to defend the Paedophile Information Exchange (PIE). The judge told the BBC he had "no memory" of this, but had in the 1970s been involved with a civil liberties group to which PIE was affiliated. He said he had never supported PIE and child abuse was "wholly wrong". The Daily Mail has run a series of articles questioning the links between PIE and civil liberties group the National Council for Civil Liberties during the 1970s and early 1980s. PIE had called for greater tolerance and paedophile "rights" and campaigned for a lowering of the age of consent to 10. Labour deputy leader Harriet Harman, her husband and fellow Labour MP Jack Dromey and former Labour health secretary Patricia Hewitt were all prominent figures in the NCCL, which granted PIE affiliate status in 1975. Ms Hewitt has apologised for having "got it wrong", while Mr Dromey has accused the Daily Mail of "dirty, gutter journalism". Ms Harman has said she "regrets" the links between the two groups but she has "nothing to apologise for". The Mail on Sunday said its investigation had found that Lord Justice Fulford, a member of the Privy Council, was a founder member of a campaign set up to defend PIE against criminal charges.
Note: If you are ready to see how investigations into a massive child sex abuse ring have led to the highest levels of government, watch the suppressed Discovery Channel documentary "Conspiracy of Silence," available here. For more on sexual abuse scandals, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.