Government Corruption Media ArticlesExcerpts of Key Government Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The authors of a study calling for GM crops to be fast-tracked into Britain’s farms and kitchens all have links to the industry. The report was presented as the work of ‘independent’ scientists and was published on [March 13] by a government advisory body. It was used to support a bid to speed up the development of the controversial crops in the UK, but it has emerged that all five authors have a vested interest in promoting GM crops and food – and some are part-funded by the industry. Critics of GM [have] described the report as ‘biased and downright dangerous’, and accused the biotech giants and the Government of mounting a crude propaganda campaign to overturn public opposition. The academics behind the study were chosen by the Council for Science and Technology, the body that advises the Prime Minister on science policy issues. They include Professor Sir David Baulcombe, from Cambridge University, who works as a consultant for GM firm Syngenta, which gives his department research funding. Syngenta is behind a genetically modified maize or corn, called GA21, which could go into UK farms as early as next spring, making it Britain’s first commercially grown GM crop. Also on the list is Professor Jonathan Jones, of the Sainsbury Laboratory, which is at the centre of Britain’s GM research. It is part-funded by former Labour science minister, Lord Sainsbury, who is one of the country’s biggest supporters of the technology. Another co-author was Professor Jim Dunwell, of the University of Reading. He was a founder member of CropGen, which describes its mission as ‘to make the case for GM crops and foods’
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here. For an excellent summary of the risks and dangers from GMO foods, click here.
Four years after President Obama promised to crack down on mortgage fraud, his administration has quietly made the crime its lowest priority and has closed hundreds of cases after little or no investigation, the Justice Department’s internal watchdog said on [March 13]. The report by the department’s inspector general undercuts the president’s contentions that the government is holding people responsible for the collapse of the financial and housing markets. The administration has been criticized, in particular, for not pursuing large banks and their executives. The inspector general’s report ... shows that the F.B.I. considered mortgage fraud to be its lowest-ranked national criminal priority. In several large cities, including New York and Los Angeles, F.B.I. agents either ranked mortgage fraud as a low priority or did not rank it at all. The F.B.I. received $196 million from the 2009 to 2011 fiscal years to investigate mortgage fraud, the report said, but the number of pending cases and agents investigating them dropped in 2011. Mortgage fraud was one of the causes of the 2008 financial collapse. Mortgage brokers and lenders falsified documents, sometimes to make mortgages look safer, other times to make the property look more valuable.
Note: For more on government collusion with the banking industry, see the deeply revealing reports from reliable major media sources available here.
The US came under sharp criticism at the UN human rights committee in Geneva on [March 13] for a long list of human rights abuses that included everything from detention without charge at Guantánamo, drone strikes and NSA surveillance, to the death penalty, rampant gun violence and endemic racial inequality. The experts raised questions about the National Security Agency’s surveillance of digital communications in the wake of Edward Snowden’s revelations. The committee’s 18 experts [are] charged with upholding the International Covenant on Civil and Political Rights (ICCPR), a UN treaty that the US ratified in 1992. The US came under sustained criticism for its global counter-terrorism tactics, including the use of unmanned drones to kill al-Qaida suspects, and its transfer of detainees to third countries that might practice torture, such as Algeria. Committee members also highlighted the Obama administration’s failure to prosecute any of the officials responsible for permitting waterboarding and other “enhanced interrogation” techniques under the previous administration. Walter Kälin, a Swiss international human rights lawyer who sits on the committee, attacked the US government’s refusal to recognise the convention’s mandate over its actions beyond its own borders. The US has asserted since 1995 that the ICCPR does not apply to US actions beyond its borders - and has used that “extra-territoriality” claim to justify its actions in Guantánamo and in conflict zones.
Note: How sad that it appears this news was not reported in any major US media.
Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic. In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Former NSA contractor Edward Snowden accused Sen. Dianne Feinstein of hypocrisy ... for complaining about alleged CIA spying on U.S. senators while tolerating government spying on private citizens. "It's clear the CIA was trying to play 'keep away' with documents relevant to an investigation by their overseers in Congress, and that's a serious constitutional concern,” said Snowden in a statement to NBC News. “But it's equally if not more concerning that we're seeing another 'Merkel Effect,' where an elected official does not care at all that the rights of millions of ordinary citizens are violated by our spies, but suddenly it's a scandal when a politician finds out the same thing happens to them." Snowden was ... referring to German Chancellor Angela Merkel’s indignation at reports that the U.S. had listened in on her personal conversations, but her failure to condemn the NSA for mass surveillance of communications of German citizens. Both were revealed by the release of documents that Snowden took from NSA computers and distributed to journalists.
Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.
Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.
Senate Intelligence Committee Chair Dianne Feinstein accused the CIA on [March 11] of violating the law and the Constitution of the United States by interfering in a committee investigation into Bush-era torture of terror suspects. Feinstein said the CIA had removed documents provided to the committee through a special, segregated network set up by the agency for the committee to pursue its investigation. Among the documents removed was an internal review of CIA interrogation techniques conducted by then-CIA Director Leon Panetta, which committee members have said corroborated committee findings critical of the agency’s interrogation program. “The CIA just went and searched the committee’s computers,” Feinstein said on the Senate floor. “This was done without the knowledge or approval of committee members or staff, and in violation of our written agreements. Further, this type of behavior would not have been possible had the CIA allowed the committee to conduct the review of documents here in the Senate,” Feinstein said. Feinstein said that the CIA’s activities may have violated the Fourth Amendment, the Computer Fraud and Abuse Act, and executive order 12333, which bars the CIA from conducting domestic surveillance. Feinstein also said the CIA’s activities violated the separation of powers principles in the Constitution by interfering with congressional oversight of the executive branch.
Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
In the tense days after a powerful earthquake and tsunami crippled the Fukushima Daiichi power plant in Japan on March 11, 2011, staff at the U.S. Nuclear Regulatory Commission made a concerted effort to play down the risk of earthquakes and tsunamis to America’s aging nuclear plants, according to thousands of internal emails reviewed by NBC News. The emails, obtained via the Freedom of Information Act, show that the campaign to reassure the public about America’s nuclear industry came as the agency’s own experts were questioning U.S. safety standards and scrambling to determine whether new rules were needed to ensure that the meltdown occurring at the Japanese plant could not occur here. At the end of that long first weekend of the crisis three years ago, NRC Public Affairs Director Eliot Brenner thanked his staff for sticking to the talking points that the team had been distributing to senior officials and the public. "While we know more than these say," Brenner wrote, "we're sticking to this story for now." There are numerous examples in the emails of apparent misdirection or concealment in the initial weeks after the Japanese plant was devastated: When asked to help reporters explain what would happen during the worst-case scenario -- a nuclear meltdown -- the agency declined to address the questions. The emails pull back the curtain on the agency’s efforts to protect the industry it is supposed to regulate. The NRC officials didn't lie, but they didn't always tell the whole truth either. When someone asked about a topic that might reflect negatively on the industry, they changed the subject.
Note: For more on corruption in the nuclear power industry, see the deeply revealing reports from reliable major media sources available here.
The confirmation in December that former CIA Director Leon Panetta let classified information slip to "Zero Dark Thirty" screenwriter Mark Boal during a speech at the agency headquarters should result in a criminal espionage charge if there is any truth to Obama administration claims that it isn't enforcing the Espionage Act only against political opponents. I'm one of the people the Obama administration charged with criminal espionage, one of those whose lives were torn apart by being accused, essentially, of betraying [their] country. The president and the attorney general have used the Espionage Act against more people than all other administrations combined, but not against real traitors and spies. The law has been applied selectively, often against whistle-blowers and others who expose illegal, corrupt government actions. After I blew the whistle on the CIA's waterboarding torture program in 2007, I was the subject of a years-long FBI investigation. In 2012, the Justice Department charged me with "disclosing classified information to journalists, including the name of a covert CIA officer and information revealing the role of another CIA employee in classified activities." I had revealed no more than others who were never charged, about activities ... that were hardly secret. I am serving a 30-month sentence. The Espionage Act, the source of the most serious charges against me, was written and passed during World War I and... is so outdated that it refers only to "national defense information" rather than "classified information," because the classification system had not yet been invented.
Note: The author of this article, John Kiriakou, is a former CIA counter-terrorism officer and former senior investigator on the Senate Foreign Relations Committee. He is incarcerated in the Federal Correctional Institution in Loretto, Pa. You can read about his case at http://www.defendjohnk.com. For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
A top judge campaigned to support a paedophile group that tried to legalise sex with children, a newspaper claims. The Mail on Sunday said Lord Justice Fulford was a founder member of a campaign to defend the Paedophile Information Exchange (PIE). The judge told the BBC he had "no memory" of this, but had in the 1970s been involved with a civil liberties group to which PIE was affiliated. He said he had never supported PIE and child abuse was "wholly wrong". The Daily Mail has run a series of articles questioning the links between PIE and civil liberties group the National Council for Civil Liberties during the 1970s and early 1980s. PIE had called for greater tolerance and paedophile "rights" and campaigned for a lowering of the age of consent to 10. Labour deputy leader Harriet Harman, her husband and fellow Labour MP Jack Dromey and former Labour health secretary Patricia Hewitt were all prominent figures in the NCCL, which granted PIE affiliate status in 1975. Ms Hewitt has apologised for having "got it wrong", while Mr Dromey has accused the Daily Mail of "dirty, gutter journalism". Ms Harman has said she "regrets" the links between the two groups but she has "nothing to apologise for". The Mail on Sunday said its investigation had found that Lord Justice Fulford, a member of the Privy Council, was a founder member of a campaign set up to defend PIE against criminal charges.
Note: If you are ready to see how investigations into a massive child sex abuse ring have led to the highest levels of government, watch the suppressed Discovery Channel documentary "Conspiracy of Silence," available here. For more on sexual abuse scandals, see the deeply revealing reports from reliable major media sources available here.
In mid-February, [reporter Matt] Taibbi announced he was leaving Rolling Stone, where he has worked for almost a decade, to start a digital magazine for First Look Media, the company owned by eBay billionaire Pierre Omidyar. The last few weeks have been consumed with business matters—hiring editorial staff, signing off on designs. Taibbi won’t discuss the exact format of the new venture, nor its name—that’s still being worked out, too—but he sees it focusing, in part, on the same matters of corporate malfeasance he’s been covering for years. What people expect, of course, is the ribald, loudly antagonistic voice of a writer who is, in his own words, “full of outrage.” The guy who compared Goldman Sachs to a “vampire squid wrapped around the face of humanity, relentlessly jamming its blood funnel into anything that smells like money.” None of Taibbi’s anger at the “toothlessness” of the media has dissipated. Taibbi says his decision to leave Rolling Stone was predicated in part on ... his desire to “be on Glenn’s side.” Glenn being Glenn Greenwald, who, along with Laura Poitras and Jeremy Scahill, is currently editing another First Look property, the national-security-centric The Intercept, which has been live since February. “Glenn’s in this position of being a reporter trying to put out material that came from a whistle-blower, and now they’re both essentially in exile. It’s crazy. If the press corps that existed in the ’60s and ’70s had seen this situation, they’d be rising as one and denouncing the government for it,” Taibbi says.
Note: For more on corporate corruption, see the deeply revealing reports from reliable major media sources available here.
It was early December when the Central Intelligence Agency began to suspect it had suffered what it regarded as an embarrassing computer breach. Investigators for the Senate Intelligence Committee, working in the basement of a C.I.A. facility in Northern Virginia, had obtained an internal agency review summarizing thousands of documents related to the agency’s detention and interrogation program. Parts of the C.I.A. report cast a particularly harsh light on the program, the same program the agency was in the midst of defending in a prolonged dispute with the intelligence committee. What the C.I.A. did next opened a new and even more rancorous chapter in the struggle over how the history of the interrogation program will be written. Agency officials began scouring the digital logs of the computer network used by the Senate staff members to try to learn how and where they got the report. Their search not only raised constitutional questions about the propriety of an intelligence agency investigating its congressional overseers, but has also resulted in two parallel inquiries by the Justice Department — one into the C.I.A. and one into the committee. Each side accuses the other of spying on it, with the Justice Department now playing the uneasy role of arbitrator in the bitter dispute. “It’s always been a dicey proposition to be investigating Congress,” said W. George Jameson, a C.I.A. lawyer for decades. “You don’t do it lightly.”
Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
The Senate on [March 6] rejected a ... bill to remove military commanders from decisions over the prosecution of sexual assault cases in the armed forces, delivering a defeat to advocacy groups that argued that wholesale changes are necessary to combat an epidemic of rapes and sexual assaults in the military. The measure, pushed by Senator Kirsten E. Gillibrand, Democrat of New York, received 55 votes — five short of the 60 votes needed. The vote came after a debate on the Senate floor filled with drama and accusations that Ms. Gillibrand and her allies were misguided. The debate pitted the Senate’s 20 women against one another, and seemed bound to leave hard feelings, given that a solid majority of the Senate actually backed Ms. Gillibrand’s proposal. Congress began scrutinizing the sexual assault problem in the military after a recent series of highly publicized cases, including one at the Naval Academy, and after the release of new data from the Pentagon on the issue. On Sept. 30, the end of the last fiscal year, about 1,600 sexual assault cases in the military were awaiting either action from commanders or the completion of criminal investigations. Critics of the military’s handling of such cases say that the official numbers represent a tiny percentage of sexual assault cases, while Ms. Gillibrand said that only one in 10 sexual assaults were reported. She and her supporters argue that forcing victims to go to their commanders to report sexual assaults is similar to forcing a woman to tell her father that her brother has assaulted her.
Note: For more on sexual abuse scandals, see the deeply revealing reports from reliable major media sources available here.
Russia's armed intervention in the Crimea undoubtedly illustrates President Putin's ruthless determination to get his way in Ukraine. But less attention has been paid to the role of the United States in interfering in Ukrainian politics and civil society. Both powers are motivated by the desire to ensure that a geostrategically pivotal country with respect to control of critical energy pipeline routes remains in their own sphere of influence. The reported leak of the recording of an alleged private telephone conversation between US assistant secretary of state Victoria Nuland and US ambassador to Kiev Geoffrey Pyatt ... suggests active US government interference. A recent US State Department-sponsored report notes that "Ukraine's strategic location between the main energy producers (Russia and the Caspian Sea area) and consumers in the Eurasian region ... make the country "a potentially crucial player in European energy transit" - a position that will "grow as Western European demands for Russian and Caspian gas and oil continue to increase." Ukraine is caught hapless in the midst of this accelerating struggle to dominate Eurasia's energy corridors in the last decades of the age of fossil fuels. For those who are pondering whether we face the prospect of a New Cold War, a better question might be - did the Cold War ever really end?
Note: For more along these lines, see concise summaries of deeply revealing news articles from reliable major media sources.
As staff for the Senate Intelligence Committee gathered information to conduct oversight of the CIA, the CIA was secretly monitoring them, according to reports from McClatchy [News] and the New York Times. The committee staff was reviewing documents in a secure room at CIA headquarters as part of its investigation into the CIA's now-defunct detention and interrogation program, but the agency was secretly monitoring their work, according to reports. Complaints about the spying have reportedly prompted the CIA inspector general -- the agency's internal watchdog -- to look into the agency's behavior. Sen. Mark Udall, D-Colo., seemed to reference the surveillance in a letter to President Obama ... in which he urged the president to support the fullest declassification of the committee's CIA report. "As you are aware, the C.I.A. has recently taken unprecedented action against the committee in relation to the internal C.I.A. review, and I find these actions to be incredibly troubling for the committee's oversight responsibilities and for our democracy," Udall wrote. "It is essential that the Committee be able to do its oversight work -- consistent with our constitutional principle of the separation of powers -- without the CIA posing impediments or obstacles as it is today." Sen. Martin Heinrich, D-N.M., another member of the intelligence committee, declared in a statement Wednesday, "The Senate Intelligence Committee oversees the CIA, not the other way around."
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Patients who suffered brain damage as a result of taking a swine flu vaccine are to receive multi-million-pound payouts from the UK government. Following the swine flu outbreak of 2009, about 60 million people, most of them children, received the vaccine. It was subsequently revealed that the vaccine, Pandemrix, can cause narcolepsy and cataplexy in about one in 16,000 people, and many more are expected to come forward with the symptoms. Across Europe, more than 800 children are so far known to have been made ill by the vaccine. The Pandemrix vaccine was manufactured by pharmaceuticals giant Glaxo Smith Kline, which refused to supply governments unless it was indemnified against any claim for damage caused. "There's no doubt in my mind whatsoever that Pandemrix increased the occurrence of narcolepsy onset in children," Emmanuelle Mignot, a specialist in sleep disorder at Stanford University in the United States told Reuters. Among those affected are NHS medical staff, many of whom are now unable to do their jobs because of the symptoms brought on by the vaccine. They will be suing the government for millions in lost earnings. However, the vast majority of patients affected - around 80% - are children. Despite a 2011 warning from the European Medicines Agency against using the vaccine on those under 20 and a study indicating a 13-fold heightened risk of narcolepsy in vaccinated children, GSK has refused to acknowledge a link.
Note: Read about people in other countries who were damaged by the vaccine on this webpage. See powerful media reports suggesting that both the avian flu and swine flu were manipulated to promote fear and boost pharmaceutical sales. And watch a powerful CBS video describing how 4,000 Americans in 1976 sued for neurological damages caused by a swine flu vaccine that they agreed to take after falling for fear mongering about the flu by the government. 300 people allegedly died from the vaccine. For more, see the excellent resources in our Health Information Center.
Should wealthy litigants be able to rent state judges and courthouses to decide cases in private and keep the results secret? The answer should be an easy no, but if the judges of Delaware’s Chancery Court persuade the United States Supreme Court to take their case and reverse lower federal court rulings outlawing that practice, corporations will, in Delaware, be able to do just that. The state has long been a magnet for corporate litigation because of its welcoming tax structures and the court’s business expertise. Yet the State Legislature became concerned that Delaware was losing its “pre-eminence” in corporate litigation to a growing market in private dispute resolution. To compete, Delaware passed a law in 2009 offering new privileges to well-heeled businesses. If litigants had at least $1 million at stake and were willing to pay $12,000 in filing fees and $6,000 a day thereafter, they could use Delaware’s chancery judges and courtrooms for what was called an “arbitration” that produced enforceable legal judgments. Instead of open proceedings, filings would not be docketed, the courtroom would be closed to the public and the outcome would be secret. The Delaware Supreme Court could review judgments, but that court has not indicated whether appeals would also be confidential. A group called the Coalition for Open Government, including news and civic organizations, objected that Delaware’s legislation was unconstitutional. In 2012, a federal judge agreed that the law violated the public’s right of access to civil proceedings under the First Amendment.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal. GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not. In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally. Yahoo ... denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy". Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012. The system, eerily reminiscent of the telescreens evoked in George Orwell's Nineteen Eighty-Four, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs. Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds ... to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
Western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. Today, [The Intercept is] publishing [a document from GCHQ's previously secret unit, JTRIG, the Joint Threat Research Intelligence Group], entitled "The Art of Deception: Training for Online Covert Operations." Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: "false flag operations" (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting "negative information" on various forums. Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House's former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-"independent" advocates to "cognitively infiltrate" online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into "chat rooms, online social networks, or even real-space groups" which spread what he views as false and damaging "conspiracy theories" about the government.
Note: To see a guidebook developed by intelligence agencies full of charts and information on how to infiltrate and deceive the public, click here. The Intercept is a media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for their independence. Note that Greenwald fails to mention that Sunstein's almost exclusive focus was on "conspiracy theories" advocated by the 9/11 truth movement. For more on his call for what amounts to a new COINTELPRO, see David Ray Griffin's book Cognitive Infiltration.
An advisory committee of the Food and Drug Administration is set to begin two days of meetings tomorrow to consider radical biological procedures that, if successful, would produce genetically modified human beings. This is a dangerous step. These techniques would change every cell in the bodies of children born as a result of their use, and these alterations would be passed down to future generations. The F.D.A. calls them mitochondrial manipulation technologies. The procedures involve removing the nuclear material either from the egg or embryo of a woman with inheritable mitochondrial disease and inserting it into a healthy egg or embryo of a donor whose own nuclear material has been discarded. Any offspring would carry genetic material from three people — the nuclear DNA of the mother and father, and the mitochondrial DNA of the donor. Developers of these modification techniques say they are a way for women with mitochondrial disease to give birth to healthy children to whom they are related genetically. Some are also promoting their use for age-related infertility. These procedures are deeply problematic in terms of their medical risks and societal implications. Will the child be born healthy, or will the cellular disruptions created by this eggs-as-Lego-pieces approach lead to problems later on? What about subsequent generations? And how far will we go in our efforts to engineer humans? Unfortunately, there are now worrisome signs that opposition to inheritable genetic modifications, written into law by dozens of countries, according to our count, may be weakening. British regulators are also considering mitochondrial manipulations, and proponents there, like their counterparts in the United States, want to move quickly to clinical trials.
Note: For more on the dangers to society of genetic engineering, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.