Government Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
The New York Police Department has secretly labeled entire mosques as terrorism organizations, a designation that allows police to use informants to record sermons and spy on imams, often without specific evidence of criminal wrongdoing. Designating an entire mosque as a terrorism enterprise means that anyone who attends prayer services there is a potential subject of an investigation and fair game for surveillance. Since the 9/11 attacks, the NYPD has opened at least a dozen "terrorism enterprise investigations" into mosques, according to interviews and confidential police documents. Many TEIs stretch for years, allowing surveillance to continue even though the NYPD has never criminally charged a mosque or Islamic organization with operating as a terrorism enterprise. The documents show in detail how, in its hunt for terrorists, the NYPD investigated countless innocent New York Muslims and put information about them in secret police files. As a tactic, opening an enterprise investigation on a mosque is so potentially invasive that while the NYPD conducted at least a dozen, the FBI never did one, according to interviews with federal law enforcement officials. The revelations about the NYPD's massive spying operations are in documents recently obtained by The Associated Press and part of a new book, Enemies Within: Inside the NYPD's Secret Spying Unit... The book ... is based on hundreds of previously unpublished police files and interviews with current and former NYPD, CIA and FBI officials.
Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.
It is one of the most common components of emergency medicine: an intravenous bag of sterile saltwater. Luckily for anyone who has ever needed an IV bag to replenish lost fluids or to receive medication, it is also one of the least expensive. The average manufacturer’s price, according to government data, has fluctuated in recent years from 44 cents to $1. Yet there is nothing either cheap or simple about its ultimate cost, as [revealed by] the commercial path of IV bags from the factory to the veins of more than 100 patients struck by a May 2012 outbreak of food poisoning in upstate New York. Some of the patients’ bills would later include markups of 100 to 200 times the manufacturer’s price, not counting separate charges for “IV administration.” And on other bills, a bundled charge for “IV therapy” was almost 1,000 times the official cost of the solution. At every step from manufacturer to patient, there are confidential deals among the major players, including drug companies, purchasing organizations and distributors, and insurers. These deals so obscure prices and profits that even participants cannot say what the simplest component of care actually costs, let alone what it should cost. And that leaves taxpayers and patients alike with an inflated bottom line and little or no way to challenge it. The real cost of a bag of normal saline, like the true cost of medical supplies from gauze to heart implants, disappears into an opaque realm of byzantine contracts, confidential rebates and fees that would be considered illegal kickbacks in many other industries.
Note: For more on this, see concise summaries of deeply revealing medical corruption news articles from reliable major media sources.
Newly declassified documents obtained [by] Judicial Watch, are raising questions over the U.S. government's handling of Anwar al-Awlaki, and whether it [recruited] the radical American cleric as an intelligence source in 2002. Director Robert Mueller did not dismiss the possibility. "I am not personally familiar with any effort to recruit Anwar al-Awlaki as an asset -- that does not mean to say there was not an effort at some level of the Bureau (FBI) or another agency to do so," Mueller said. Fox's ongoing reporting ... shows that in 2002 he was released from custody at JFK international airport -- despite an active warrant for his arrest -- with the okay of FBI Agent Wade Ammerman. Within days of his re-entry, al-Awlaki showed up in Ammerman's counter-terrorism investigation in Virginia into Ali al-Timimi, who is now serving a life sentence on non-terrorism charges. None of the information about al-Awlaki's release from federal custody at JFK, a sudden decision by the Justice Department in October 2002 to rescind an arrest warrant for the cleric, nor the cleric's connection to Ammerman was provided to the defense during Timimi’s 2005 trial. Documents ... show the FBI Director was more deeply involved in the post-9/11 handling of al-Awlaki than previously known. One memo from Mueller to then-Attorney General John Ashcroft on Oct. 3, 2002 -- seven days before the cleric re-entered the U.S. and was detained at JFK -- is marked "Secret" and titled "Anwar Aulaqi: IT-UBL/AL-QAEDA." "Why would al-Awlaki get the attention of the FBI Director? Why would a warrant for his arrest be pulled when he's trying to reenter the country?" asked Judicial Watch President Tom Fitton.
Note: Al-Awlaki, who was born in New Mexico and was a US citizen, died in a U.S. drone attack in Yemen nearly two years ago, the first American targeted for death by the CIA, by its own admission. With the confirmation that he had been an intelligence asset for the US government as early as 2002, his assassination takes on new significance. For more on the murky background of Al-Awlaki, click here and here.
It has been an infuriating few days for anyone who values the freedom of the press, as authorities in the United Kingdom resorted to the tactics of tyrants and thugs to squelch reporting that they simply don't like. In acts clearly calibrated for optimal intimidation, they have detained the partner of a journalist, threatened to shut down a reporting operation that has prompted a critical public debate over government spying and forced the destruction of a major publication's hard drives. It's breathtaking in its audacity - and if it comes to light that the U.S. government took any part in organizing, encouraging or supporting these acts, it will warrant immediate congressional investigation. As it is, the accelerating assaults on investigative journalism [indicate the need for] stronger protections for journalists and their sources. Using laws designed to ferret out suspected terrorists to detain a person aiding acts of journalism is a cut-and-dried abuse of government power, an act of intimidation that may well be illegal - and certainly should be. It gives the lie to the naive but oft-repeated notion that if you've done no wrong, you have nothing to fear. Such attacks on investigative journalism here and abroad appear to be escalating. The Justice Department has been caught spying on reporters at the Associated Press, and named a Fox News reporter a "co-conspirator" in a leak inquiry. Judges have threatened reporters at both the New York Times and Fox News with jail time for refusing to disclose their sources.
Note: For more on government attacks on civil liberties, see the deeply revealing reports from reliable major media sources available here.
Five decades after President John F. Kennedy was fatally shot and long after official inquiries ended, thousands of pages of investigative documents remain withheld from public view. The contents of these files are partially known — and intriguing — and conspiracy buffs are not the only ones seeking to open them for a closer look. Some serious researchers believe the off-limits files could shed valuable new light on nagging mysteries of the assassination — including what U.S. intelligence agencies knew about accused assassin Lee Harvey Oswald before Nov. 22, 1963. It turns out that several hundred of the still-classified pages concern a deceased CIA agent, George Joannides, whose activities just before the assassination and, fascinatingly, during a government investigation years later, have tantalized researchers for years. "This is not about conspiracy, this is about transparency," said Jefferson Morley, a former Washington Post reporter and author embroiled in a decade-long lawsuit against the CIA, seeking release of the closed documents. "I think the CIA should obey the law. I don't think most people think that's a crazy idea." But so far, the Joannides files and thousands more pages primarily from the CIA remain off-limits at a National Archives center in College Park, Md. Anthony Summers, a British author whose sequel to his JFK book Not In Your Lifetime will be released this year, [said] "By withholding Joannides material, the agency continues to encourage the public to believe they're covering up something more sinister."
Note: For more on the strange secrecy around Joannides and his checkered past, see the New York Times article summarized here. For more on political assassinations, see the deeply revealing reports from reliable major media sources available here.
A Texas-based encrypted email service recently revealed to be used by Edward Snowden - Lavabit - announced yesterday it was shutting itself down in order to avoid complying with what it perceives as unjust secret US court orders to provide government access to its users' content. "After significant soul searching, I have decided to suspend operations," the company's founder, Ladar Levinson, wrote in a statement to users posted on the front page of its website. He said the US directive forced on his company "a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit." He chose the latter. CNET's Declan McCullagh ... speculates that Lavabit was served "with [a] federal court order to intercept users' passwords" to allow ongoing monitoring of emails; specifically: "the order can also be to install FedGov-created malware." After challenging the order in district court and losing - all in a secret court proceeding, naturally - Lavabit shut itself down to avoid compliance while it appeals to the Fourth Circuit. What is particularly creepy about the Lavabit self-shutdown is that the company is gagged by law even from discussing the legal challenges it has mounted and the court proceeding it has engaged. In other words, the American owner of the company believes his Constitutional rights and those of his customers are being violated by the US Government, but he is not allowed to talk about it. Lavabit has been told that they would face serious criminal sanctions if they publicly discuss what is being done to their company.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
In ... the Journal of Law, Medicine and Ethics (JLME), Donald W. Light of the School of Public Health, University of Medicine & Dentistry of NJ, wrote an article entitled “Risky Drugs: Why The FDA Cannot Be Trusted”. The bulk of his essay focuses not on his views about pharma’s competence but rather on his issues with the FDA. While I found a number of his comments troubling, the following stood out. “The ... article in JLME also presents systematic, quantitative evidence that since the industry started making large contributions to the FDA for reviewing its drugs, as it makes large contributions to Congressmen ... drugs approved are significantly more likely to cause serious harm, hospitalizations, and deaths.” This is a pretty damning comment. Basically, Light is saying that pharma paid congressmen to sponsor legislation that results in the FDA being beholden to pharma for funding for its work. Implicit in this is that, as a result of these large “contributions”, the grateful FDA is rapidly approving medicines that are harmful.
Note: For more along these lines, see concise summaries of deeply revealing news articles about big pharma profiteers and government corruption.
The CIA has been subjecting operatives to monthly polygraph tests in an attempt to suppress details of a reported US arms smuggling operation in Benghazi that was ongoing when its ambassador was killed by a mob in the city last year, according to reports. Up to 35 CIA operatives were working in the city during the attack last September on the US consulate that resulted in the death of Ambassador Chris Stevens and three other Americans, according to CNN. The television network said that a CIA team was working in an annex near the consulate on a project to supply missiles from Libyan armouries to Syrian rebels. Sources said that more Americans were hurt in the assault ... than had been previously reported. CIA chiefs were actively working to ensure the real nature of its operations in the city did not get out. So only the losses suffered by the State Department in the city had been reported to Congress. Frank Wolf, a US congressman who represents the district that contains CIA headquarters in Langley, Virginia, is one of 150 members of Congress for a new investigation into the failures in Benghazi. "I think it is a form of a cover-up, and I think it's an attempt to push it under the rug," he said. "We should have the people who were on the scene come in, testify under oath, do it publicly, and lay it out. And there really isn't any national security issue involved with regards to that."
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Computers and networks inherently produce data, and our constant interactions with them allow corporations to collect an enormous amount of intensely personal data about us as we go about our daily lives. Sometimes we produce this data inadvertently simply by using our phones, credit cards, computers and other devices. Sometimes we give corporations this data directly on Google, Facebook, [or] Apple’s iCloud ... in exchange for whatever free or cheap service we receive from the Internet in return. The NSA is also in the business of spying on everyone, and it has realized it’s far easier to collect all the data from these corporations rather than from us directly. The result is a corporate-government surveillance partnership, one that allows both the government and corporations to get away with things they couldn’t otherwise. There are two types of laws in the U.S., each designed to constrain a different type of power: constitutional law, which places limitations on government, and regulatory law, which constrains corporations. Historically, these two areas have largely remained separate, but today each group has learned how to use the other’s laws to bypass their own restrictions. The government uses corporations to get around its limits, and corporations use the government to get around their limits. This partnership manifests itself in various ways. The government uses corporations to circumvent its prohibitions against eavesdropping domestically on its citizens. Corporations rely on the government to ensure that they have unfettered use of the data they collect.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Pop quiz: Name a state residential school where children were enrolled in medical experiments over an almost 20-year period, in which they were unknowingly fed a steady diet of radioactive isotopes, subjected to regular blood draws, and placed in solitary confinement if they refused to cooperate. Answer: the Walter E. Fernald State School in Waltham [Mass.} during the mid 20th century. Unfortunately, as Allen Hornblum, Judith Newman, and Gregory Dober painfully describe in their chilling new book, Against Their Will: The Secret History of Medical Experimentation on Children in Cold War America, Fernald was not the only institution in the country, or even in the state, where children were conscripted into sometimes deadly medical experiments. These were conducted by ambitious physicians and scientists whose belief in what they were trying to accomplish often blinded them to the potentially horrific consequences of their actions. “Against Their Will’’ opens with an overview of the eugenics movement in the United States, which found sympathizers among many luminaries of American medicine in the 19th and early 20th centuries. With its disdain for the disabled, who were considered genetically inferior, the movement paved the way for use of “defective’’ children in research. The book then provides multiple examples of medical experiments perpetrated on developmentally delayed and physically disabled children at multiple institutions across the country over the course of decades, often reading like case studies straight out of the 1947 Nazi doctors’ trial.
Note: For a long list of verifiable incidents where unknowing citizens were used as guinea pigs on a massive scale, click here.
The top U.S. special operations commander, Adm. William McRaven, ordered military files about the Navy SEAL raid on Osama bin Laden's hideout to be purged from Defense Department computers and sent to the CIA, where they could be more easily shielded from ever being made public. The secret move, described briefly in a draft report by the Pentagon's inspector general, set off no alarms within the Obama administration even though it appears to have sidestepped federal rules and perhaps also the U.S. Freedom of Information Act. The CIA, noting that the bin Laden mission was overseen by then-CIA Director Leon Panetta before he became defense secretary, said that the SEALs were effectively assigned to work temporarily for the CIA, which has presidential authority to conduct covert operations. The records transfer was part of an effort by McRaven to protect the names of the personnel involved in the raid, according to the inspector general's draft report. But secretly moving the records allowed the Pentagon to tell The Associated Press that it couldn't find any documents inside the Defense Department that AP had requested more than two years ago, and would represent a new strategy for the U.S. government to shield even its most sensitive activities from public scrutiny. "Welcome to the shell game in place of open government," said Thomas Blanton, director of the National Security Archive, a private research institute at George Washington University. "Guess which shell the records are under. If you guess the right shell, we might show them to you. It's ridiculous."
Note: For a powerful analysis of the strong evidence that Osama bin Laden most likely died in Afghanistan in December 2001, long before he was "killed" by the SEALs raid in Pakistan, read David Ray Griffin's Osama bin Laden: Dead or Alive? For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
CNBC’s BRIAN SULLIVAN: Is there anyone else in the Senate that is a professor? ELIZABETH WARREN: I don't think so. ... We had the big crash in 2008. What does everyone say about it? They say too much concentration in financial services creates too big to fail. It puts us at bigger risk. And what's happened since 2008? The four biggest financial institutions are now 30% bigger than they were in 2008. The central premise behind a 21st century Glass-Steagall is to say if you want to get out there and take risks, go ahead and do it. But ... you can't get access to FDIC insured deposits when you do. That way ... at least one portion of our banking sector stays safe. From 1797 to 1933, the American banking system crashed about every 15 years. In 1933, we put good reforms in place, for which Glass-Steagall was the centerpiece, and from 1933 to the early 1980s, that’s a 50 year period, we didn’t have any of that – none. We kept the system steady and secure. And it was only as we started deregulating, [you hit] the S&L crisis, and what did we do? We deregulated some more. And then you hit long-term capital management at the end of the 90s, and what did we do as a country? This country continued to deregulate more. And then we hit the big crash in 2008. You are not going to defend the proposition that regulation can never work, it did work. SULLIVAN: I didn’t say regulation never worked, Senator. By far and away, and I agree, there were fewer bank failures in that time after Glass-Steagall. ELIZABETH WARREN: “Fewer,” as in, of the big ones, zero.
Note: Sen. Warren is one of the few bright lights in Congress. Watch this interview to see why. To read about later censorship of this interview by NBC, click here.
In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans. The rulings, some nearly 100 pages long, reveal that the court has taken on a much more expansive role by regularly assessing broad constitutional questions and establishing important judicial precedents, with almost no public scrutiny. The 11-member Foreign Intelligence Surveillance Court, known as the FISA court, was once mostly focused on approving case-by-case wiretapping orders. But since major changes in legislation and greater judicial oversight of intelligence operations were instituted six years ago, it has quietly become almost a parallel Supreme Court, serving as the ultimate arbiter on surveillance issues and delivering opinions that will most likely shape intelligence practices for years to come. In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures. Unlike the Supreme Court, the FISA court hears from only one side in the case — the government — and its findings are almost never made public.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Leslie James Pickering noticed something odd in his mail last September: a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home. “Show all mail to supv” — supervisor — “for copying prior to going out on the street,” read the card. It included Mr. Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green. “It was a bit of a shock to see it,” said Mr. Pickering, who with his wife owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service. Mr. Pickering was targeted by a longtime surveillance system called mail covers, a forerunner of a vastly more expansive effort, the Mail Isolation Control and Tracking program, in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year. It is not known how long the government saves the images. The Mail Isolation Control and Tracking program was created after the anthrax attacks in late 2001. It enables the Postal Service to retrace the path of mail at the request of law enforcement. No one disputes that it is sweeping.
Note: The exposure by whistleblower Edward Snowden of the NSA's massive domestic and global spying operations seems to have triggered a series of other revelations about surveillance of the US population, like this report on the US Postal Service's photographing all mail. Hardly a week goes by without another major revelation, such as a new digital photo-ID database utilized by the FBI and police forces, and the development by US police of a national DNA database on all "potential suspects". Since very few US citizens are terrorists, what is the real purpose behind this total surveillance?
HSBC Holdings Plcs $1.9 billion agreement with the U.S. to resolve charges it enabled Latin American drug cartels to launder billions of dollars was approved by a federal judge. U.S. District Judge John Gleeson in Brooklyn, New York, signed off yesterday on a deferred-prosecution agreement. HSBC was accused of failing to monitor more than $670 billion in wire transfers and more than $9.4 billion in purchases of U.S. currency from HSBC Mexico, allowing for money laundering, prosecutors said. The bank also violated U.S. economic sanctions against Iran, Libya, Sudan, Burma and Cuba, according to a criminal information filed in the case. The bank, Europes largest, agreed to pay a $1.25 billion forfeiture and $665 million in civil penalties under the settlement, prosecutors announced in December. At a hearing the same month, Gleeson told prosecutors there had been publicized criticism of the agreement, which lets the bank and management avoid further criminal proceedings over the charges. Lack of proper controls allowed the Sinaloa drug cartel in Mexico and the Norte del Valle cartel in Colombia to move more than $881 million through HSBCs U.S. unit from 2006 to 2010, the government alleged in the case. The bank also cut resources for its anti-money-laundering programs to cut costs and increase profits, the government said in court filings. Under a deferred prosecution agreement, the U.S. allows a target to avoid charges.
Note: HSBC was founded to service the international drug trade, and is considered too big to criminally prosecute. Big bank settlements often amount to "cash for secrecy" deals that are ultimately profitable for banks. For more along these lines, see concise summaries of deeply revealing news articles about financial industry corruption.
The Army is blocking all access to The Guardian newspaper's reports about the National Security Agency's sweeping collection of data about Americans' email and phone communications, an Army spokesman said Thursday. The Monterey (Calif.) Herald reported that employees at the Presidio of Monterey, an Army public affairs base about 100 miles south of San Francisco, were unable to gain access to The Guardian's articles on former NSA contractor Edward Snowden and his professed leaks of classified information about the intelligence programs. Late Thursday, an Army spokesman told The Herald by email that the newspaper's NSA reports were, in fact, being blocked across the entire Army. He wrote that it's routine for the Defense Department to take "network hygiene" action to prevent disclosure of classified information, The Herald reported. "We make every effort to balance the need to preserve information access with operational security," the newspaper quoted the spokesman as saying. "However there are strict policies and directives in place regarding protecting and handling classified information."
Note: To read the full story in the Monterey Herald, click here. For the Guardian's coverage of this, click here. Does the military have the right to censor its members' access to information?
A cadre of six government and non-government experts who served the National Transportation Safety Board when that independent federal agency investigated the explosion of a Boeing 747 off the coast of Long Island in July 1996 ... are the protagonists of a new documentary, "TWA Flight 800". After four years of investigation, the NTSB claimed the cause of Flight 800's explosion was a mechanical defect, but the new documentary, written and directed by journalist Kristina Borjesson, claims the FBI, NTSB and other government agencies may have covered up that the plane was brought down by a missile strike. Participants in the film have called on the NTSB to reopen the case based on altered physical evidence, suppressed data, and unexamined testimony from hundreds of eyewitnesses. [The] book Attention All Passengers: The Airlines’ Dangerous Descent—and How to Reclaim Our Skies ... published last year ... thanked “the brave men and women who are Federal Aviation Administration, Transportation Security Administration, and airline whistleblowers.” These whistleblowers confirmed such problems as defective airline maintenance outsourcing, FAA oversight failures, TSA waste, and many other important findings. After watching the documentary, I believe there are enough smoking guns to warrant an unbiased reexamination. Last week one major news site was in near hysterics about the documentary, employing the term “conspiracy” ten times. Kristina Borjesson ... wasn’t surprised, noting that reexamining hot topics “discredits previous reporting.”
Note: Kristina Borjesson is a long-time supporter of WantToKnow.info who has written a great piece on Flight 800, which we have posted at this link. She's also the editor of what may be the best book ever on media corruption and manipulation, Into the Buzzsaw. You can find an excellent two-page summary of the book at this link. For the engaging trailer to this film, click here.
Russ Tice, a former intelligence analyst and Bush-era NSA whistleblower, claimed Wednesday that the intelligence community has ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats. “They went after – and I know this because I had my hands literally on the paperwork for these sort of things – they went after high-ranking military officers. They went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees," [said] Tice. “But they went after other ones, too. They went after lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House.” Then Tice dropped the bombshell about Obama. "In summer of 2004, one of the papers that I held in my hand was to wiretap a bunch of numbers associated with a 40-something-year-old wannabe senator for Illinois ... that’s the president of the United States now.” FBI whistleblower Sibel Edmonds and Tice agreed that such wide-ranging surveillance of officials could provide the intelligence agencies with unthinkable power to blackmail their opponents. “I was worried that the intelligence community now has sway over what is going on,” Tice said. Tice first blew the whistle on ... domestic spying across multiple agencies in 2005.
Note: Listen to Tice's shocking revelations in this interview. For more along these lines, see concise summaries of deeply revealing news articles about corruption in government and throughout intelligence agencies.
The probe of Libor manipulation is proving to be the tip of the iceberg as inquiries into assets from derivatives to foreign exchange show that if there’s a chance to rig benchmark rates in world markets, someone is usually willing to try. Singapore’s monetary authority last week censured 20 banks for attempting to fix interest rate levels in the island state and ordered them to set aside as much as $9.6 billion. Britain’s markets regulator is looking into the $4.7 trillion-a-day currency market after Bloomberg News reported that traders have manipulated key rates for more than a decade, citing five dealers. “It’s happened time and again: all of these markets have been influenced by major market-makers, which is a polite way of saying they’ve been rigged,” Charles Geisst, a finance professor at Manhattan College in Riverdale, New York, said. While the indexes under scrutiny are little known to the public, their influence extends to trillions of dollars in securities and derivatives. Barclays, UBS and Royal Bank of Scotland have been fined about $2.5 billion in the past year for distorting the London interbank offered rate, which is tied to $300 trillion worth of securities. Regulators are also probing ISDAfix, a measure used in the $370 trillion interest-rate swaps market, as well as how some oil products prices are set. Inquiries are broadening into the transparency of benchmarks whose levels can be determined by the same people whose income they affect. In the case of Libor, traders who stood to profit worked with bank employees responsible for submissions for the benchmark to rig the price.
Note: To read highly revealing major media articles showing just how crazy and unregulated the derivatives market is, click here. For deeply revealing reports from reliable major media sources on financial corruption, click here.
Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.
Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

