Government Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Twelve years after the 9/11 attacks that included three hijacker pilots trained in Venice [FL], the terrorists' alleged interaction with a high-echelon Saudi family that lived in Sarasota remains shrouded in secrecy. But Sunshine law and Freedom of Information Act requests filed by an independent South Florida news organization have chipped away at the FBI's position that information related to the family remain secret. Broward Bulldog editor Dan Christensen and former U.S. Sen. Bob Graham say the documents could shed light on how the locally trained terrorists were managed and supported. Graham, former Florida governor and a co-chair of [the] Congressional body that investigated the attacks, believes the FBI has covered up Saudi support of the terrorists. The former senator wants more disclosure about what happened in Sarasota because he feels it may add to a bigger, largely censored subject: Who financed and supported the 9/11 terror attacks? "The FBI is aggressively resisting the release of any additional documents," he said. "The question is, why are they doing this? What interest does the FBI have in denying the existence of its own documents? Beyond that, they have thrown a blanket of national security over virtually everything, and why are they doing that for an event that occurred, soon to be, 12 years ago?" At the time of the 9/11 attacks, President George W. Bush was visiting a school in Sarasota. Then came the revelation that three of the hijackers learned to fly at Venice Airport.
Note: For lots more reliable information suggesting a major cover-up around the events of 9/11, click here and here.
US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves. Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software. "Backdoors are fundamentally in conflict with good security," said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. "Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise."
Note: For an excellent article in the New York Times on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.
Investigative journalist Greg Palast has obtained a secret memo authored by then deputy Treasury secretary Larry Summers and his protégé Timothy Geithner detailing their plans to roll back financial regulation. In the piece, titled "The Confidential Memo at the Heart of the Global Financial Crisis", [Palast] writes: "The Memo confirmed every conspiracy freak's fantasy: that in the late 1990s, the top U.S. Treasury officials secretly conspired with a small cabal of banker big-shots to rip apart financial regulation across the planet. When you see 26.3 percent unemployment in Spain, desperation and hunger in Greece, riots in Indonesia and Detroit in bankruptcy, go back to this End Game memo, the genesis of the blood and tears." [Palast:] This is really important right now because Larry Summers is President Obama's top choice to become head of a Federal Reserve Board. He would take Ben Bernanke's place. And what this memo is--they call it the "end game memo". Geithner calls it the "end game". And what's the game being played? The memo asks Summers to get back to the five biggest, most powerful bankers in the United States to act on and determine what our policy should be for world governance of the banking system. Basically, there were secret calls going between Larry Summers and the head of Bank of America, the head of Goldman Sachs, the head of Citibank and Merrill, the five big boys, to find out what should happen to the world financial policing order. And the answer was: smash it. Summers was holding secret meetings with the big bankers to come up with a scheme to eliminate financial regulation across the planet.
Note: Greg Palast is a New York Times-bestselling author and a freelance journalist for the British Broadcasting Corporation as well as the British newspaper The Observer. He is one of the few journalists uncovering the deepest layers of secrecy in our world. For a key past report of his on elections corruption, click here.
U.S. spy agencies have built an intelligence-gathering colossus since the attacks of Sept. 11, 2001, but remain unable to provide critical information to the president on a range of national security threats, according to the government’s top-secret budget. The $52.6 billion “black budget” for fiscal 2013, obtained by The Washington Post from former intelligence contractor Edward Snowden, maps a bureaucratic and operational landscape that has never been subject to public scrutiny. Although the government has annually released its overall level of intelligence spending since 2007, it has not divulged how it uses the money or how it performs against the goals set by the president and Congress. The 178-page budget summary for the National Intelligence Program details the successes, failures and objectives of the 16 spy agencies that make up the U.S. intelligence community, which has 107,035 employees. Among the notable revelations in the budget summary: Spending by the CIA has surged past that of every other spy agency, with $14.7 billion in requested funding for 2013. The figure vastly exceeds outside estimates and is nearly 50 percent above that of the National Security Agency, which conducts eavesdropping operations and has long been considered the behemoth of the community. The CIA and the NSA have begun aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as “offensive cyber operations.”
Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.
The New York Police Department has secretly labeled entire mosques as terrorism organizations, a designation that allows police to use informants to record sermons and spy on imams, often without specific evidence of criminal wrongdoing. Designating an entire mosque as a terrorism enterprise means that anyone who attends prayer services there is a potential subject of an investigation and fair game for surveillance. Since the 9/11 attacks, the NYPD has opened at least a dozen "terrorism enterprise investigations" into mosques, according to interviews and confidential police documents. Many TEIs stretch for years, allowing surveillance to continue even though the NYPD has never criminally charged a mosque or Islamic organization with operating as a terrorism enterprise. The documents show in detail how, in its hunt for terrorists, the NYPD investigated countless innocent New York Muslims and put information about them in secret police files. As a tactic, opening an enterprise investigation on a mosque is so potentially invasive that while the NYPD conducted at least a dozen, the FBI never did one, according to interviews with federal law enforcement officials. The revelations about the NYPD's massive spying operations are in documents recently obtained by The Associated Press and part of a new book, Enemies Within: Inside the NYPD's Secret Spying Unit... The book ... is based on hundreds of previously unpublished police files and interviews with current and former NYPD, CIA and FBI officials.
Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.
It is one of the most common components of emergency medicine: an intravenous bag of sterile saltwater. Luckily for anyone who has ever needed an IV bag to replenish lost fluids or to receive medication, it is also one of the least expensive. The average manufacturer’s price, according to government data, has fluctuated in recent years from 44 cents to $1. Yet there is nothing either cheap or simple about its ultimate cost, as [revealed by] the commercial path of IV bags from the factory to the veins of more than 100 patients struck by a May 2012 outbreak of food poisoning in upstate New York. Some of the patients’ bills would later include markups of 100 to 200 times the manufacturer’s price, not counting separate charges for “IV administration.” And on other bills, a bundled charge for “IV therapy” was almost 1,000 times the official cost of the solution. At every step from manufacturer to patient, there are confidential deals among the major players, including drug companies, purchasing organizations and distributors, and insurers. These deals so obscure prices and profits that even participants cannot say what the simplest component of care actually costs, let alone what it should cost. And that leaves taxpayers and patients alike with an inflated bottom line and little or no way to challenge it. The real cost of a bag of normal saline, like the true cost of medical supplies from gauze to heart implants, disappears into an opaque realm of byzantine contracts, confidential rebates and fees that would be considered illegal kickbacks in many other industries.
Note: For more on this, see concise summaries of deeply revealing medical corruption news articles from reliable major media sources.
Newly declassified documents obtained [by] Judicial Watch, are raising questions over the U.S. government's handling of Anwar al-Awlaki, and whether it [recruited] the radical American cleric as an intelligence source in 2002. Director Robert Mueller did not dismiss the possibility. "I am not personally familiar with any effort to recruit Anwar al-Awlaki as an asset -- that does not mean to say there was not an effort at some level of the Bureau (FBI) or another agency to do so," Mueller said. Fox's ongoing reporting ... shows that in 2002 he was released from custody at JFK international airport -- despite an active warrant for his arrest -- with the okay of FBI Agent Wade Ammerman. Within days of his re-entry, al-Awlaki showed up in Ammerman's counter-terrorism investigation in Virginia into Ali al-Timimi, who is now serving a life sentence on non-terrorism charges. None of the information about al-Awlaki's release from federal custody at JFK, a sudden decision by the Justice Department in October 2002 to rescind an arrest warrant for the cleric, nor the cleric's connection to Ammerman was provided to the defense during Timimi’s 2005 trial. Documents ... show the FBI Director was more deeply involved in the post-9/11 handling of al-Awlaki than previously known. One memo from Mueller to then-Attorney General John Ashcroft on Oct. 3, 2002 -- seven days before the cleric re-entered the U.S. and was detained at JFK -- is marked "Secret" and titled "Anwar Aulaqi: IT-UBL/AL-QAEDA." "Why would al-Awlaki get the attention of the FBI Director? Why would a warrant for his arrest be pulled when he's trying to reenter the country?" asked Judicial Watch President Tom Fitton.
Note: Al-Awlaki, who was born in New Mexico and was a US citizen, died in a U.S. drone attack in Yemen nearly two years ago, the first American targeted for death by the CIA, by its own admission. With the confirmation that he had been an intelligence asset for the US government as early as 2002, his assassination takes on new significance. For more on the murky background of Al-Awlaki, click here and here.
It has been an infuriating few days for anyone who values the freedom of the press, as authorities in the United Kingdom resorted to the tactics of tyrants and thugs to squelch reporting that they simply don't like. In acts clearly calibrated for optimal intimidation, they have detained the partner of a journalist, threatened to shut down a reporting operation that has prompted a critical public debate over government spying and forced the destruction of a major publication's hard drives. It's breathtaking in its audacity - and if it comes to light that the U.S. government took any part in organizing, encouraging or supporting these acts, it will warrant immediate congressional investigation. As it is, the accelerating assaults on investigative journalism [indicate the need for] stronger protections for journalists and their sources. Using laws designed to ferret out suspected terrorists to detain a person aiding acts of journalism is a cut-and-dried abuse of government power, an act of intimidation that may well be illegal - and certainly should be. It gives the lie to the naive but oft-repeated notion that if you've done no wrong, you have nothing to fear. Such attacks on investigative journalism here and abroad appear to be escalating. The Justice Department has been caught spying on reporters at the Associated Press, and named a Fox News reporter a "co-conspirator" in a leak inquiry. Judges have threatened reporters at both the New York Times and Fox News with jail time for refusing to disclose their sources.
Note: For more on government attacks on civil liberties, see the deeply revealing reports from reliable major media sources available here.
Five decades after President John F. Kennedy was fatally shot and long after official inquiries ended, thousands of pages of investigative documents remain withheld from public view. The contents of these files are partially known — and intriguing — and conspiracy buffs are not the only ones seeking to open them for a closer look. Some serious researchers believe the off-limits files could shed valuable new light on nagging mysteries of the assassination — including what U.S. intelligence agencies knew about accused assassin Lee Harvey Oswald before Nov. 22, 1963. It turns out that several hundred of the still-classified pages concern a deceased CIA agent, George Joannides, whose activities just before the assassination and, fascinatingly, during a government investigation years later, have tantalized researchers for years. "This is not about conspiracy, this is about transparency," said Jefferson Morley, a former Washington Post reporter and author embroiled in a decade-long lawsuit against the CIA, seeking release of the closed documents. "I think the CIA should obey the law. I don't think most people think that's a crazy idea." But so far, the Joannides files and thousands more pages primarily from the CIA remain off-limits at a National Archives center in College Park, Md. Anthony Summers, a British author whose sequel to his JFK book Not In Your Lifetime will be released this year, [said] "By withholding Joannides material, the agency continues to encourage the public to believe they're covering up something more sinister."
Note: For more on the strange secrecy around Joannides and his checkered past, see the New York Times article summarized here. For more on political assassinations, see the deeply revealing reports from reliable major media sources available here.
A Texas-based encrypted email service recently revealed to be used by Edward Snowden - Lavabit - announced yesterday it was shutting itself down in order to avoid complying with what it perceives as unjust secret US court orders to provide government access to its users' content. "After significant soul searching, I have decided to suspend operations," the company's founder, Ladar Levinson, wrote in a statement to users posted on the front page of its website. He said the US directive forced on his company "a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit." He chose the latter. CNET's Declan McCullagh ... speculates that Lavabit was served "with [a] federal court order to intercept users' passwords" to allow ongoing monitoring of emails; specifically: "the order can also be to install FedGov-created malware." After challenging the order in district court and losing - all in a secret court proceeding, naturally - Lavabit shut itself down to avoid compliance while it appeals to the Fourth Circuit. What is particularly creepy about the Lavabit self-shutdown is that the company is gagged by law even from discussing the legal challenges it has mounted and the court proceeding it has engaged. In other words, the American owner of the company believes his Constitutional rights and those of his customers are being violated by the US Government, but he is not allowed to talk about it. Lavabit has been told that they would face serious criminal sanctions if they publicly discuss what is being done to their company.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
In ... the Journal of Law, Medicine and Ethics (JLME), Donald W. Light of the School of Public Health, University of Medicine & Dentistry of NJ, wrote an article entitled “Risky Drugs: Why The FDA Cannot Be Trusted”. The bulk of his essay focuses not on his views about pharma’s competence but rather on his issues with the FDA. While I found a number of his comments troubling, the following stood out. “The ... article in JLME also presents systematic, quantitative evidence that since the industry started making large contributions to the FDA for reviewing its drugs, as it makes large contributions to Congressmen ... drugs approved are significantly more likely to cause serious harm, hospitalizations, and deaths.” This is a pretty damning comment. Basically, Light is saying that pharma paid congressmen to sponsor legislation that results in the FDA being beholden to pharma for funding for its work. Implicit in this is that, as a result of these large “contributions”, the grateful FDA is rapidly approving medicines that are harmful.
Note: For more along these lines, see concise summaries of deeply revealing news articles about big pharma profiteers and government corruption.
The CIA has been subjecting operatives to monthly polygraph tests in an attempt to suppress details of a reported US arms smuggling operation in Benghazi that was ongoing when its ambassador was killed by a mob in the city last year, according to reports. Up to 35 CIA operatives were working in the city during the attack last September on the US consulate that resulted in the death of Ambassador Chris Stevens and three other Americans, according to CNN. The television network said that a CIA team was working in an annex near the consulate on a project to supply missiles from Libyan armouries to Syrian rebels. Sources said that more Americans were hurt in the assault ... than had been previously reported. CIA chiefs were actively working to ensure the real nature of its operations in the city did not get out. So only the losses suffered by the State Department in the city had been reported to Congress. Frank Wolf, a US congressman who represents the district that contains CIA headquarters in Langley, Virginia, is one of 150 members of Congress for a new investigation into the failures in Benghazi. "I think it is a form of a cover-up, and I think it's an attempt to push it under the rug," he said. "We should have the people who were on the scene come in, testify under oath, do it publicly, and lay it out. And there really isn't any national security issue involved with regards to that."
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Computers and networks inherently produce data, and our constant interactions with them allow corporations to collect an enormous amount of intensely personal data about us as we go about our daily lives. Sometimes we produce this data inadvertently simply by using our phones, credit cards, computers and other devices. Sometimes we give corporations this data directly on Google, Facebook, [or] Apple’s iCloud ... in exchange for whatever free or cheap service we receive from the Internet in return. The NSA is also in the business of spying on everyone, and it has realized it’s far easier to collect all the data from these corporations rather than from us directly. The result is a corporate-government surveillance partnership, one that allows both the government and corporations to get away with things they couldn’t otherwise. There are two types of laws in the U.S., each designed to constrain a different type of power: constitutional law, which places limitations on government, and regulatory law, which constrains corporations. Historically, these two areas have largely remained separate, but today each group has learned how to use the other’s laws to bypass their own restrictions. The government uses corporations to get around its limits, and corporations use the government to get around their limits. This partnership manifests itself in various ways. The government uses corporations to circumvent its prohibitions against eavesdropping domestically on its citizens. Corporations rely on the government to ensure that they have unfettered use of the data they collect.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Pop quiz: Name a state residential school where children were enrolled in medical experiments over an almost 20-year period, in which they were unknowingly fed a steady diet of radioactive isotopes, subjected to regular blood draws, and placed in solitary confinement if they refused to cooperate. Answer: the Walter E. Fernald State School in Waltham [Mass.} during the mid 20th century. Unfortunately, as Allen Hornblum, Judith Newman, and Gregory Dober painfully describe in their chilling new book, Against Their Will: The Secret History of Medical Experimentation on Children in Cold War America, Fernald was not the only institution in the country, or even in the state, where children were conscripted into sometimes deadly medical experiments. These were conducted by ambitious physicians and scientists whose belief in what they were trying to accomplish often blinded them to the potentially horrific consequences of their actions. “Against Their Will’’ opens with an overview of the eugenics movement in the United States, which found sympathizers among many luminaries of American medicine in the 19th and early 20th centuries. With its disdain for the disabled, who were considered genetically inferior, the movement paved the way for use of “defective’’ children in research. The book then provides multiple examples of medical experiments perpetrated on developmentally delayed and physically disabled children at multiple institutions across the country over the course of decades, often reading like case studies straight out of the 1947 Nazi doctors’ trial.
Note: For a long list of verifiable incidents where unknowing citizens were used as guinea pigs on a massive scale, click here.
The top U.S. special operations commander, Adm. William McRaven, ordered military files about the Navy SEAL raid on Osama bin Laden's hideout to be purged from Defense Department computers and sent to the CIA, where they could be more easily shielded from ever being made public. The secret move, described briefly in a draft report by the Pentagon's inspector general, set off no alarms within the Obama administration even though it appears to have sidestepped federal rules and perhaps also the U.S. Freedom of Information Act. The CIA, noting that the bin Laden mission was overseen by then-CIA Director Leon Panetta before he became defense secretary, said that the SEALs were effectively assigned to work temporarily for the CIA, which has presidential authority to conduct covert operations. The records transfer was part of an effort by McRaven to protect the names of the personnel involved in the raid, according to the inspector general's draft report. But secretly moving the records allowed the Pentagon to tell The Associated Press that it couldn't find any documents inside the Defense Department that AP had requested more than two years ago, and would represent a new strategy for the U.S. government to shield even its most sensitive activities from public scrutiny. "Welcome to the shell game in place of open government," said Thomas Blanton, director of the National Security Archive, a private research institute at George Washington University. "Guess which shell the records are under. If you guess the right shell, we might show them to you. It's ridiculous."
Note: For a powerful analysis of the strong evidence that Osama bin Laden most likely died in Afghanistan in December 2001, long before he was "killed" by the SEALs raid in Pakistan, read David Ray Griffin's Osama bin Laden: Dead or Alive? For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
CNBC’s BRIAN SULLIVAN: Is there anyone else in the Senate that is a professor? ELIZABETH WARREN: I don't think so. ... We had the big crash in 2008. What does everyone say about it? They say too much concentration in financial services creates too big to fail. It puts us at bigger risk. And what's happened since 2008? The four biggest financial institutions are now 30% bigger than they were in 2008. The central premise behind a 21st century Glass-Steagall is to say if you want to get out there and take risks, go ahead and do it. But ... you can't get access to FDIC insured deposits when you do. That way ... at least one portion of our banking sector stays safe. From 1797 to 1933, the American banking system crashed about every 15 years. In 1933, we put good reforms in place, for which Glass-Steagall was the centerpiece, and from 1933 to the early 1980s, that’s a 50 year period, we didn’t have any of that – none. We kept the system steady and secure. And it was only as we started deregulating, [you hit] the S&L crisis, and what did we do? We deregulated some more. And then you hit long-term capital management at the end of the 90s, and what did we do as a country? This country continued to deregulate more. And then we hit the big crash in 2008. You are not going to defend the proposition that regulation can never work, it did work. SULLIVAN: I didn’t say regulation never worked, Senator. By far and away, and I agree, there were fewer bank failures in that time after Glass-Steagall. ELIZABETH WARREN: “Fewer,” as in, of the big ones, zero.
Note: Sen. Warren is one of the few bright lights in Congress. Watch this interview to see why. To read about later censorship of this interview by NBC, click here.
In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans. The rulings, some nearly 100 pages long, reveal that the court has taken on a much more expansive role by regularly assessing broad constitutional questions and establishing important judicial precedents, with almost no public scrutiny. The 11-member Foreign Intelligence Surveillance Court, known as the FISA court, was once mostly focused on approving case-by-case wiretapping orders. But since major changes in legislation and greater judicial oversight of intelligence operations were instituted six years ago, it has quietly become almost a parallel Supreme Court, serving as the ultimate arbiter on surveillance issues and delivering opinions that will most likely shape intelligence practices for years to come. In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures. Unlike the Supreme Court, the FISA court hears from only one side in the case — the government — and its findings are almost never made public.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Leslie James Pickering noticed something odd in his mail last September: a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home. “Show all mail to supv” — supervisor — “for copying prior to going out on the street,” read the card. It included Mr. Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green. “It was a bit of a shock to see it,” said Mr. Pickering, who with his wife owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service. Mr. Pickering was targeted by a longtime surveillance system called mail covers, a forerunner of a vastly more expansive effort, the Mail Isolation Control and Tracking program, in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year. It is not known how long the government saves the images. The Mail Isolation Control and Tracking program was created after the anthrax attacks in late 2001. It enables the Postal Service to retrace the path of mail at the request of law enforcement. No one disputes that it is sweeping.
Note: The exposure by whistleblower Edward Snowden of the NSA's massive domestic and global spying operations seems to have triggered a series of other revelations about surveillance of the US population, like this report on the US Postal Service's photographing all mail. Hardly a week goes by without another major revelation, such as a new digital photo-ID database utilized by the FBI and police forces, and the development by US police of a national DNA database on all "potential suspects". Since very few US citizens are terrorists, what is the real purpose behind this total surveillance?
HSBC Holdings Plcs $1.9 billion agreement with the U.S. to resolve charges it enabled Latin American drug cartels to launder billions of dollars was approved by a federal judge. U.S. District Judge John Gleeson in Brooklyn, New York, signed off yesterday on a deferred-prosecution agreement. HSBC was accused of failing to monitor more than $670 billion in wire transfers and more than $9.4 billion in purchases of U.S. currency from HSBC Mexico, allowing for money laundering, prosecutors said. The bank also violated U.S. economic sanctions against Iran, Libya, Sudan, Burma and Cuba, according to a criminal information filed in the case. The bank, Europes largest, agreed to pay a $1.25 billion forfeiture and $665 million in civil penalties under the settlement, prosecutors announced in December. At a hearing the same month, Gleeson told prosecutors there had been publicized criticism of the agreement, which lets the bank and management avoid further criminal proceedings over the charges. Lack of proper controls allowed the Sinaloa drug cartel in Mexico and the Norte del Valle cartel in Colombia to move more than $881 million through HSBCs U.S. unit from 2006 to 2010, the government alleged in the case. The bank also cut resources for its anti-money-laundering programs to cut costs and increase profits, the government said in court filings. Under a deferred prosecution agreement, the U.S. allows a target to avoid charges.
Note: HSBC was founded to service the international drug trade, and is considered too big to criminally prosecute. Big bank settlements often amount to "cash for secrecy" deals that are ultimately profitable for banks. For more along these lines, see concise summaries of deeply revealing news articles about financial industry corruption.
The Army is blocking all access to The Guardian newspaper's reports about the National Security Agency's sweeping collection of data about Americans' email and phone communications, an Army spokesman said Thursday. The Monterey (Calif.) Herald reported that employees at the Presidio of Monterey, an Army public affairs base about 100 miles south of San Francisco, were unable to gain access to The Guardian's articles on former NSA contractor Edward Snowden and his professed leaks of classified information about the intelligence programs. Late Thursday, an Army spokesman told The Herald by email that the newspaper's NSA reports were, in fact, being blocked across the entire Army. He wrote that it's routine for the Defense Department to take "network hygiene" action to prevent disclosure of classified information, The Herald reported. "We make every effort to balance the need to preserve information access with operational security," the newspaper quoted the spokesman as saying. "However there are strict policies and directives in place regarding protecting and handling classified information."
Note: To read the full story in the Monterey Herald, click here. For the Guardian's coverage of this, click here. Does the military have the right to censor its members' access to information?
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.