Government Corruption Media ArticlesExcerpts of Key Government Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Computers and networks inherently produce data, and our constant interactions with them allow corporations to collect an enormous amount of intensely personal data about us as we go about our daily lives. Sometimes we produce this data inadvertently simply by using our phones, credit cards, computers and other devices. Sometimes we give corporations this data directly on Google, Facebook, [or] Apple’s iCloud ... in exchange for whatever free or cheap service we receive from the Internet in return. The NSA is also in the business of spying on everyone, and it has realized it’s far easier to collect all the data from these corporations rather than from us directly. The result is a corporate-government surveillance partnership, one that allows both the government and corporations to get away with things they couldn’t otherwise. There are two types of laws in the U.S., each designed to constrain a different type of power: constitutional law, which places limitations on government, and regulatory law, which constrains corporations. Historically, these two areas have largely remained separate, but today each group has learned how to use the other’s laws to bypass their own restrictions. The government uses corporations to get around its limits, and corporations use the government to get around their limits. This partnership manifests itself in various ways. The government uses corporations to circumvent its prohibitions against eavesdropping domestically on its citizens. Corporations rely on the government to ensure that they have unfettered use of the data they collect.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
In May this year, a huge company listed on the London Stock Exchange found itself in the midst of controversy about a prison it runs for the government – Thameside, a newly built jail ... in south-east London. Two months later, the same company was the subject of a high- profile report published by the House Of Commons. Again, the verdict was damning: data had been falsified, national standards had not been met, there was a culture of "lying and cheating", and the service offered to the public was simply "not good enough". Three weeks ago, there came grimmer news. The company ... was one of two contractors that had somehow overcharged the government for its services, possibly by as much as Ł50m; The firm that links these three stories together is Serco. Its range of activities, here and abroad, is truly mind-boggling. As a private firm it's not open to Freedom of Information requests, so looking into the details of what it does is fraught with difficulty. But the basic facts are plain enough. As well as five British prisons and the tags attached to over 8,000 English and Welsh offenders, Serco sees to two immigration removal centres. You'll also see its logo on the Docklands Light Railway and Woolwich ferry. But even this is only a fraction of the story. Serco is responsible for air traffic control in the United Arab Emirates, parking-meter services in Chicago, driving tests in Ontario, and an immigration detention centre on Christmas Island.
Note: Serco is possibly the largest company you've never heard of. Did you know that the Obama administration awarded Serco a $1.25 billion contract to help implement online health insurance exchanges under Obamacare, as reported in this Reuters article? Watch this video to see just how powerful and pervasive they are.
Glenn Greenwald – the reporter who broke the story about the National Security Agency’s surveillance programs – claimed that those NSA programs allowed even low-level analysts to search the private emails and phone calls of Americans. “The NSA has trillions of telephone calls and emails in their databases that they’ve collected over the last several years,” Greenwald told ABC News’ George Stephanopoulos. “All an analyst has to do is enter an email address or an IP address, and [the program] searches that database and lets them listen to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you’ve entered.” Greenwald explained that ... these programs still allow analysts to search through data with little court approval or supervision. Greenwald said "these systems allow analysts to listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it’s all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst,” he added. Greenwald said the existence of these analyst search programs are in line with the claims of Edward Snowden, who first leaked details of the NSA’s surveillance programs last month. “It’s an incredibly powerful and invasive tool, exactly of the type that Mr. Snowden described,” Greenwald said. “NSA officials are going to be testifying before the Senate on Wednesday, and I defy them to deny that these programs work exactly as I just said,” Greenwald said.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
A former CIA officer has broken the U.S. silence around the 2003 abduction of a radical Islamist cleric in Italy, charging that the agency inflated the threat the preacher posed and that the United States then allowed Italy to prosecute her and other Americans to shield President George W. Bush and other U.S. officials from responsibility for approving the operation. Confirming for the first time that she worked undercover for the CIA in Milan when the operation took place, Sabrina De Sousa provided new details about the “extraordinary rendition” that led to the only criminal prosecution stemming from the secret Bush administration rendition and detention program launched after the Sept. 11, 2001, attacks. The cleric, Osama Mustapha Hassan Nasr, was snatched from a Milan street by a team of CIA operatives and flown to Egypt, where he was held for the better part of four years without charges and allegedly tortured. An Egyptian court in 2007 ruled that his imprisonment was “unfounded” and ordered him released. Among the allegations made by De Sousa in a series of interviews with McClatchy: – The former CIA station chief in Rome, Jeffrey Castelli, whom she called the mastermind of the operation, exaggerated Nasr's terrorist threat to win approval for the rendition and misled his superiors [to believe] that Italian military intelligence had agreed to the operation. – Senior CIA officials, including then-CIA Director George Tenet, approved the operation even though Nasr wasn’t wanted in Egypt and wasn’t on the U.S. list of top al Qaida terrorists. – Condoleezza Rice, then the White House national security adviser, ... agreed to it and recommended that Bush approve the abduction.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
As the 50th anniversary of the 1963 March on Washington approaches ... where Martin Luther King Jr gave his famous "I have a dream" speech, it is important to recall the extent to which King was targeted by the government. The FBI operation against King is one of the most shameful episodes in the long history of our government's persecution of dissenters. In a heavily redacted, classified FBI memo dated 4 January 1956 – just a little more than a month after Rosa Parks was arrested for refusing to give up her seat on a bus to a white passenger – stated that an agent "had been assigned ... to find out all he could about Reverend Martin L King, colored minister in Montgomery and leader in the bus boycott … to uncover all the derogatory information he could about King." [FBI] director, J Edgar Hoover ... was deploying the vast resources he controlled against any and all perceived critics of the United States. The far-reaching clandestine surveillance, infiltration and disruption operation Hoover ran was dubbed "COINTELPRO", for counterintelligence program. The FBI's COINTELPRO activities ... were thoroughly investigated in 1975 by the Church Committee, [which] reported that the FBI "conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of first amendment rights of speech and association." Among COINTELPRO's perverse activities was an FBI effort to threaten Martin Luther King Jr with exposure of an alleged extramarital affair, including the suggestion, made by the FBI to King, that he avoid embarrassment by killing himself. Deeply concerned about the crackdown on dissent happening under Obama, scholar Cornel West ... wondered if [King] "would not be invited to the very march in his name."
Note: This article fails to mention a key fact. At a 1999 court trial held in Memphis, the family of Rev. King accused elements of the U.S. government of complicity in King's death. After one month of hearings from 70 witnesses, a jury composed of six white and six black jurors took only one hour to find the U.S. government, the state of Tennessee, the city of Memphis, the Memphis police, and several individuals guilty of murdering King. Yet the mainstream media completely boycotted this trial. Thankfully, CBC (Canada's PBS) gave it some coverage. To see a six-minute CBC clip of this highly revealing trial, click here.
When it comes to foreign policy, war, assassinations, drones, surveillance, secrecy, and civil liberties, President Obama's most stalwart, enthusiastic defenders are often found among the most radical precincts of the Republican Party. The extraordinary events that took place in the House of Representatives [on July 24] are perhaps the most vivid illustration yet of this dynamic. The House voted on an amendment sponsored by Justin Amash, the young Michigan lawyer elected in 2010 as a Tea Party candidate, and co-sponsored by John Conyers, the 24-term senior Democrat on the House Judiciary Committee. The amendment was simple. It would de-fund one single NSA program: the agency's bulk collection of the telephone records of all Americans. The amendment yesterday was defeated. A majority of House Democrats supported the Amash/Conyers amendment, while a majority of Republicans voted against it. As the New York Times put it in its account of yesterday's vote: "Conservative Republicans leery of what they see as Obama administration abuses of power teamed up with liberal Democrats long opposed to intrusive intelligence programs. The Obama administration made common cause with the House Republican leadership to try to block it." The fate of the amendment was sealed when the Obama White House ... announced its vehement opposition to it, and then sent NSA officials to the House to scare members that barring the NSA from collecting all phone records of all Americans would "Help The Terrorists."
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Sharp disagreement over the future of the Guantanamo Bay detention camp dominated the first Senate hearing on the issue in four years. The meeting [on July 24] of a Senate Judiciary Committee subcommittee, held in the wake of a high-profile hunger strike by inmates ... made clear that deep partisan divisions remain over whether keeping the prison open is a threat to national security or a necessity. Opened at a U.S. Navy base in Cuba in the months after the Sept. 11, 2001, terrorist attack, Guantanamo was established by President George W. Bush to hold detainees suspected of connections to global terrorism organizations. Allegations of abuse and torture of inmates have led to repeated calls for Guantanamo's closure, and Obama has campaigned twice on the issue, though Congress has passed repeated measures to keep the prison open. Sen. Richard J. Durbin (D-Ill.), who is chairman of the panel, urged Congress to support Obama's efforts, which would end the indefinite detention of prisoners without trial and either release them or charge them in American courts. "The risk of keeping it open far outranks the risk of closing it." Retired Army Maj. Gen. Paul D. Eaton, who trained the Iraqi armed forces from 2003 to 2004, testified that by continuing to violate human rights and American law, the practices at Guantanamo proved more harmful to the U.S. national security interests. "Guantanamo is a terrorist-creating organization," he said to a reporter after the hearing. "It's a terrific recruiting tool."
Note: Whether or not detainees were truly terrorists before they were imprisoned at Guantanamo, how do you think they feel about the US government after years there? You have to wonder if this isn't being done to create terrorists, just as many prisons become training grounds for criminals.
[There is] a growing debate over a little-known but increasingly important piece of equipment buried deep inside a car: the event data recorder, more commonly known as the black box. About 96 percent of all new vehicles sold in the United States have the boxes, and in September 2014, if the National Highway Traffic Safety Administration has its way, all will have them. Data stored in the devices is increasingly being used to identify safety problems in cars and as evidence in traffic accidents and criminal cases. And the trove of data inside the boxes has raised privacy concerns, including questions about who owns the information, and what it can be used for, even as critics have raised questions about its reliability. To consumer advocates, the data is only the latest example of governments and companies having too much access to private information. Once gathered, they say, the data can be used against car owners, to find fault in accidents or in criminal investigations. “These cars are equipped with computers that collect massive amounts of data,” said Khaliah Barnes of the Electronic Privacy Information Center, a Washington-based consumer group. “Without protections, it can lead to all kinds of abuse.” In [14] states, lawyers may subpoena the data for criminal investigations and civil lawsuits, making the information accessible to third parties, including law enforcement or insurance companies that could cancel a driver’s policy or raise a driver’s premium based on the recorder’s data.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The American Civil Liberties Union is warning that law enforcement officials are using license plate scanners to amass massive and unregulated databases that can be used to track law-abiding citizens as their go about their daily lives. In a new report, "You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements," the ACLU discusses the data culled from license plate scanners - cameras mounted on patrol cars, overpasses and elsewhere to record your license plate number and location at a given time. There are tens of thousands such cameras now in operation, according to the group, with the data in some cases being stored indefinitely. The ACLU report is the result of an analysis of 26,000 pages of documents from police departments around the country, obtained through nearly 600 [FOIA] requests. It finds that while some jurisdictions keep the information gleaned from the scanners for a short time ... many hold onto the data for years. The organization complains that there are "virtually no rules in place" to keep officials from tracking "everybody all the time." The ACLU also warns that the data is being fed into larger databases, with the private National Vehicle Location Service now holding more than 800 million license plate records. The group's database is used by more than 2,200 law enforcement customers. The [ACLU] report warns that the data can be used in an official capacity to spy on protesters or target communities based on their religious beliefs, or unofficially by a police officer who wants to keep an eye on a romantic rival.
Note: For more on privacy, see the deeply revealing reports from reliable major media sources available here.
Dozens of companies, non-profits and trade organizations including Apple, Google, and Facebook sent a letter [on July 18] pushing the Obama administration and Congress for more disclosures on the government's national security-related requests for user data. Together with LinkedIn, Yahoo!, Microsoft, Twitter and many others, the companies asked for more transparency of secret data gathering in the letter. Tech companies have been scrambling to assert their independence after documents leaked last month by former U.S. security contractor Edward Snowden suggested they had given the government direct access to their computers as part of the NSA's secret surveillance program called Prism. The classified nature of the data gathering has barred the participating companies from disclosing even their involvement, let alone the content of the requests. Some companies, including Facebook and Apple, in June struck an agreement with the government to release some information about the number of surveillance requests they receive. But they were limited to disclosing aggregate government requests for data without showing the split between surveillance and criminal requests, and only for a six-month period.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The [UK] Government has issued more than 3,000 export licences for military and intelligence equipment worth a total of Ł12.3bn to countries which are on its own official list for human rights abuses. The existence of one licence to Israel and the Occupied Territories [is] worth Ł7.7bn. The scale and detail of the deals emerged after a forensic investigation by a committee of MPs, who also discovered that strategically controlled items have been sent to Iran, China, Sri Lanka, Russia, Belarus and Zimbabwe – all of which feature prominently on the Foreign Office’s list of states with worrying civil rights records. There are even three existing contracts for Syria, notwithstanding the fact that the UK is sending equipment to rebels fighting the Assad regime and is considering arming them. There are also 57 for Argentina, which is not on the list, but which remains in confrontation with Britain over the Falklands. The Government had stated that it would not issue export licences for goods “which might be used to facilitate internal repression” or “might provoke or prolong regional or internal conflicts”. However, the report by the Committees on Arms Export Controls found there were 62 licences for selling to Iran, ... overwhelmingly cryptographic equipment. This also features heavily in the 271 licences for Russia, along with biotechnology equipment, sniper rifles, laser weapons systems, weapon sights and unmanned air vehicles (drones).
Note: For more on war profiteering, see the deeply revealing reports from reliable major media sources available here.
A Florida medical examiner’s office said [on July 16] that the FBI has ordered the office not to release its autopsy report of a Chechen man fatally shot by a Boston FBI agent in May. The medical examiner’s office said it completed the autopsy report on Ibragim Todashev, a friend of [a] suspected Boston Marathon bomber, on July 8 and that the report was “ready for release.” The agent shot and killed Todashev on May 22 in his Orlando apartment during an interrogation related to the Boston Marathon bombings. Critics have called for an independent inquiry, questioning the blanket of secrecy surrounding the case. The FBI and the Massachusetts State Police sought out Todashev after the Marathon bombings, but have refused to release details of the shooting. Media reports have provided conflicting accounts: Some said Todashev attacked the agent with a blade during an interrogation, while others said Todashev was unarmed. Another said he lunged at the agent with a metal pole or a broomstick. The agent shot Todashev multiple times, according to family members who released photos of Todashev’s dead body as part of their call for an inquiry into his death. Family members and advocacy groups have questioned the media accounts, pointing out that Todashev had repeatedly cooperated with the FBI. The Council on American-Islamic Relations and the ACLU have called for independent inquiries into the shooting. According to CAIR in Florida, which is conducting its own investigation into Todashev’s slaying, Todashev had spoken to the FBI at least three times at their offices after the Marathon bombings.
Note: What are they hiding here?
For decades, a so-called anti-propaganda law prevented the U.S. government’s mammoth broadcasting arm from delivering programming to American audiences. That came silently to an end with the implementation of a new reform passed in January. The result: an unleashing of thousands of hours per week of government-funded radio and TV programs for domestic U.S. consumption in a reform initially criticized as a green light for U.S. domestic propaganda efforts. So what just happened? Until this month, a vast ocean of U.S. programming produced by the Broadcasting Board of Governors such as Voice of America, Radio Free Europe/Radio Liberty, and the Middle East Broadcasting Networks could only be viewed or listened to at broadcast quality in foreign countries. The programming [is] viewed in more than 100 countries in 61 languages. The restriction of these broadcasts was [lifted with] the Smith-Mundt Modernization Act of 2012, which passed as part of the 2013 National Defense Authorization Act. But if anyone needed a reminder of the dangers of domestic propaganda efforts, the past 12 months provided ample reasons. Last year, two USA Today journalists were ensnared in a propaganda campaign after reporting about millions of dollars in back taxes owed by the Pentagon’s top propaganda contractor in Afghanistan. The firm [created] phony websites and Twitter accounts to smear the journalists anonymously.
Note: For more along these lines, see concise summaries of deeply revealing media manipulation news articles.
This Reuters article ... purports to summarize an interview I gave to the daily newspaper La Nacion of Argentina. Like everything in the matter of these NSA leaks, this interview is being wildly distorted to attract attention away from the revelations themselves. I made three points in this La Nacion interview, all of which are true: 1) The oft-repeated claim that Snowden's intent is to harm the US is completely negated by the reality that he has all sorts of documents that could quickly and seriously harm the US if disclosed, yet he has published none of those. When he gave us the documents he provided, he repeatedly insisted that we exercise rigorous journalistic judgment in deciding which documents should be published in the public interest and which ones should be concealed on the ground that the harm of publication outweighs the public value. 2) The US government has acted with wild irrationality. The current criticism of Snowden is that he's in Russia. But the reason he's in Russia isn't that he chose to be there. It's because the US blocked him from leaving: first by revoking his passport (with no due process or trial), then by pressuring its allies to deny airspace rights to any plane they thought might be carrying him to asylum (even one carrying the democratically elected president of a sovereign state), then by bullying small countries out of letting him land for re-fueling. 3) I said that [forcing his plane down] would be completely counter-productive given that ... such an attack could easily result in far more disclosures than allowing us as journalists to vet and responsibly report them, as we've [been] doing.
Note: The above article was written by brave journalist Glenn Greenwald, who broke the Snowden story. For more on the NSA surveillance scandal, see the deeply revealing reports from reliable major media sources available here.
In the era of intense government surveillance and secret court orders, a murky multimillion-dollar market has emerged. Paid for by U.S. tax dollars, but with little public scrutiny, surveillance fees charged in secret by technology and phone companies can vary wildly. AT&T, for example, imposes a $325 "activation fee" for each wiretap and $10 a day to maintain it. Smaller carriers Cricket and U.S. Cellular charge only about $250 per wiretap. But snoop on a Verizon customer? That costs the government $775 for the first month and $500 each month after that. Regardless of price, the surveillance business is growing. The U.S. government long has enjoyed access to phone networks and high-speed Internet traffic under the U.S. Communications Assistance for Law Enforcement Act to catch suspected criminals and terrorists. More recently, the FBI has pushed technology companies like Google and Skype to guarantee access to real-time communications on their services. As the number of law enforcement requests for data grew and carriers upgraded their technology, the cost of accommodating government surveillance requests increased. AT&T, for example, said it devotes roughly 100 employees to review each request and hand over data. Likewise, Verizon said its team of 70 employees works around the clock, seven days a week to handle the quarter-million requests it gets each year.
Note: For more on government and corporate attacks on privacy, see the deeply revealing reports from reliable major media sources available here.
Members of a congressional committee [on July 10] accused the FBI of stalling an inquiry into the Boston Marathon bombings, saying the bureau had no grounds for withholding what it knew about Tamerlan Tsarnaev prior to the attacks. “The information requested by this committee belongs to the American people,’’ said Representative Michael McCaul, a Texas Republican who chairs the House Homeland Security Committee. “It does not belong solely to the FBI.” The frustrations, aired publicly after FBI officials rebuffed an invitation to appear before the committee, stemmed from the FBI’s unwillingness to detail how it handled a security review of Tsarnaev nearly two years before the Marathon bombings. “The FBI continues to refuse this committee’s appropriate requests for information and documents crucial to our investigation into what happened in Boston,” McCaul declared as he opened a committee hearing. Tsarnaev died after a firefight with police in Watertown within hours of being identified as a suspect. Members were particularly frustrated by a July 3 letter to the committee from the FBI. The letter, reviewed by the Globe, said the bureau would not be responding to all the committee’s requests for information. “The fact that the FBI is not sharing information with this committee with jurisdiction over homeland security I think is just totally unacceptable,” said Representative Peter King, a New York Republican.
Note: For more strangeness around the Boston bombing with a key witness being deported, click here. For more on the realities of intelligence agency manipulations, see the deeply revealing reports from reliable major media sources available here.
A professor at an Indiana college says he has found film footage showing President Franklin Delano Roosevelt being pushed in his wheelchair, depicting a secret that was hidden from the public until after his death. Ray Begovich, a journalism professor at Franklin College south of Indianapolis, said ... he found the eight-second clip while conducting unrelated research in the National Archives in College Park, Md. Roosevelt contracted polio in 1921 at age 39 and was unable to walk without leg braces or assistance. During his four terms as president, Roosevelt often used a wheelchair in private, but not for public appearances. News photographers cooperated in concealing Roosevelt's disability, and those who did not found their camera views blocked by Secret Service agents. "This raw film clip may be the first motion picture images of the president in his wheelchair, and it was never meant to be shown to the world," Begovich said. The film shows Roosevelt visiting the U.S.S. Baltimore at Pearl Harbor in July 1944. Roosevelt's disability was virtually a state secret during his presidency, which spanned the Great Depression and most of World War II.
Note: To watch this historic video, click here. Isn't it amazing that Roosevelt was U.S. president for 12 years, yet thanks to collusion of the press, his use of a wheelchair and disability was kept a secret from the public the entire time? Politicians know that public perception makes all the difference, so that perception management and manipulation has become a huge industry. For excellent information and resources along these lines, see this link.
On [July 10] the Washington Post published an article by its long-time reporter Walter Pincus. The article concocted a frenzied and inane conspiracy theory: that it was WikiLeaks and Julian Assange, working in secret with myself [Glenn Greenwald] and Laura Poitras, who masterminded the Snowden leaks ahead of time and directed Snowden's behavior. To peddle this tale, Pincus, in lieu of any evidence, spouted all sorts of accusatory innuendo masquerading as questions ... and invoked classic guilt-by association techniques. See the email I sent Pincus for the conclusive evidence of those factual falsehoods and the other distortions peddled by the Post. Apparently, the Washington Post has decided to weigh in on the ongoing debate over "what is journalism?" with this answer: you fill up articles on topics ... with nothing but idle speculation, rank innuendo, and evidence-free accusations, all under the guise of "just asking questions". You then strongly imply that other journalists who have actually broken a big story are involved in a rampant criminal conspiracy. What was far worse was that Pincus' wild conspiracy theorizing was accomplished only by asserting blatant, easily demonstrated falsehoods. The Post allowed the falsehoods to stand uncorrected all day. More than 8 hours after I first publicized his errors - Pincus emailed me back ... and vowed that a correction would be published. 36 hours after the Post published these falsehoods, 24 hours after I publicized them, and 15 hours after the author of this article acknowledged one of those errors and vowed a correction, the Post article still sits on the internet: uncorrected.
Note: For more on mass media corruption, see the deeply revealing reports from reliable major media sources available here.
Pop quiz: Name a state residential school where children were enrolled in medical experiments over an almost 20-year period, in which they were unknowingly fed a steady diet of radioactive isotopes, subjected to regular blood draws, and placed in solitary confinement if they refused to cooperate. Answer: the Walter E. Fernald State School in Waltham [Mass.} during the mid 20th century. Unfortunately, as Allen Hornblum, Judith Newman, and Gregory Dober painfully describe in their chilling new book, Against Their Will: The Secret History of Medical Experimentation on Children in Cold War America, Fernald was not the only institution in the country, or even in the state, where children were conscripted into sometimes deadly medical experiments. These were conducted by ambitious physicians and scientists whose belief in what they were trying to accomplish often blinded them to the potentially horrific consequences of their actions. “Against Their Will’’ opens with an overview of the eugenics movement in the United States, which found sympathizers among many luminaries of American medicine in the 19th and early 20th centuries. With its disdain for the disabled, who were considered genetically inferior, the movement paved the way for use of “defective’’ children in research. The book then provides multiple examples of medical experiments perpetrated on developmentally delayed and physically disabled children at multiple institutions across the country over the course of decades, often reading like case studies straight out of the 1947 Nazi doctors’ trial.
Note: For a long list of verifiable incidents where unknowing citizens were used as guinea pigs on a massive scale, click here.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.