Government Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Mainstream media, cued by corporate press releases, routinely claim that America’s schools are markedly inferior to schools in other developed nations. The claim is part of an organized, long-running, generously funded campaign to undermine confidence in public schools to “prove” the need to privatize them. Educators have been handicapped for more than a century by a curriculum adopted to serve a too-narrow purpose—admission to college—and failure to address that curriculum’s problems has made the institution vulnerable to destructive corporate and political manipulation. Below are brief descriptions of some of the more obvious of those problems. 1. The standard core curriculum is stuck in the past. Adopted in the late 19th Century, the curriculum now shaping America’s schools reflects the “big idea” of that earlier era—the factory system, standardization of parts, mass production, centralized decision making, and passive worker compliance. None of those fit the present era. 2. The standard core curriculum is so inefficient it leaves little or no time for apprenticeships, internships, co-op programs, projects, and other ways of “learning by doing” (which is how most of us learned most of what we know). 3. The standard core curriculum gives thought processes other than recall short shrift, or no attention at all. The ability to remember is, of course, important, but the main educational challenge—making better sense of real-world experience—requires the ability not merely to recall but to infer, generalize, hypothesize, relate, synthesize, value, and so on. 4. The standard core curriculum ignores vast and important fields of knowledge.
In 2009, when Robert H Richard IV, an unemployed heir to the DuPont family fortune, pled guilty to fourth-degree rape of his three-year-old daughter, a judge spared him a justifiable sentence – indeed, only put Richard on probation – because she figured this 1-percenter would "not fare well" in a prison setting. Richard’s ex-wife filed a new lawsuit accusing him of also sexually abusing their son. Since then, the original verdict has been fueling some angry speculation ... that the defendant's wealth and status may have played a role in his lenient sentencing. Inequality defines our criminal justice system just as it defines our society. It always has and it always will until we do something about it. America incarcerates more people than any other country on the planet, with over 2m currently in prison and more than 7m under some form of correctional supervision. More than 60% are racial and ethnic minorities, and the vast majority are poor. There is an abundance of evidence ... that both conscious and unconscious bias permeate every aspect of the criminal justice system, from arrests to sentencing and beyond. Unsurprisingly, this bias works in favor of wealthy (and white) defendants, while poor minorities routinely suffer. In August of last year the Sentencing Project, a non-profit devoted to criminal justice reform, released a comprehensive report on bias in the system. This is the sentence you need to remember: "The United States in effect operates two distinct criminal justice systems: one for wealthy people and another for poor people and minorities."
Note: For more on systemic injustice within the US prison/industrial complex, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.
Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.
A top judge campaigned to support a paedophile group that tried to legalise sex with children, a newspaper claims. The Mail on Sunday said Lord Justice Fulford was a founder member of a campaign to defend the Paedophile Information Exchange (PIE). The judge told the BBC he had "no memory" of this, but had in the 1970s been involved with a civil liberties group to which PIE was affiliated. He said he had never supported PIE and child abuse was "wholly wrong". The Daily Mail has run a series of articles questioning the links between PIE and civil liberties group the National Council for Civil Liberties during the 1970s and early 1980s. PIE had called for greater tolerance and paedophile "rights" and campaigned for a lowering of the age of consent to 10. Labour deputy leader Harriet Harman, her husband and fellow Labour MP Jack Dromey and former Labour health secretary Patricia Hewitt were all prominent figures in the NCCL, which granted PIE affiliate status in 1975. Ms Hewitt has apologised for having "got it wrong", while Mr Dromey has accused the Daily Mail of "dirty, gutter journalism". Ms Harman has said she "regrets" the links between the two groups but she has "nothing to apologise for". The Mail on Sunday said its investigation had found that Lord Justice Fulford, a member of the Privy Council, was a founder member of a campaign set up to defend PIE against criminal charges.
Note: If you are ready to see how investigations into a massive child sex abuse ring have led to the highest levels of government, watch the suppressed Discovery Channel documentary "Conspiracy of Silence," available here. For more on sexual abuse scandals, see the deeply revealing reports from reliable major media sources available here.
It was early December when the Central Intelligence Agency began to suspect it had suffered what it regarded as an embarrassing computer breach. Investigators for the Senate Intelligence Committee, working in the basement of a C.I.A. facility in Northern Virginia, had obtained an internal agency review summarizing thousands of documents related to the agency’s detention and interrogation program. Parts of the C.I.A. report cast a particularly harsh light on the program, the same program the agency was in the midst of defending in a prolonged dispute with the intelligence committee. What the C.I.A. did next opened a new and even more rancorous chapter in the struggle over how the history of the interrogation program will be written. Agency officials began scouring the digital logs of the computer network used by the Senate staff members to try to learn how and where they got the report. Their search not only raised constitutional questions about the propriety of an intelligence agency investigating its congressional overseers, but has also resulted in two parallel inquiries by the Justice Department — one into the C.I.A. and one into the committee. Each side accuses the other of spying on it, with the Justice Department now playing the uneasy role of arbitrator in the bitter dispute. “It’s always been a dicey proposition to be investigating Congress,” said W. George Jameson, a C.I.A. lawyer for decades. “You don’t do it lightly.”
Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
Should wealthy litigants be able to rent state judges and courthouses to decide cases in private and keep the results secret? The answer should be an easy no, but if the judges of Delaware’s Chancery Court persuade the United States Supreme Court to take their case and reverse lower federal court rulings outlawing that practice, corporations will, in Delaware, be able to do just that. The state has long been a magnet for corporate litigation because of its welcoming tax structures and the court’s business expertise. Yet the State Legislature became concerned that Delaware was losing its “pre-eminence” in corporate litigation to a growing market in private dispute resolution. To compete, Delaware passed a law in 2009 offering new privileges to well-heeled businesses. If litigants had at least $1 million at stake and were willing to pay $12,000 in filing fees and $6,000 a day thereafter, they could use Delaware’s chancery judges and courtrooms for what was called an “arbitration” that produced enforceable legal judgments. Instead of open proceedings, filings would not be docketed, the courtroom would be closed to the public and the outcome would be secret. The Delaware Supreme Court could review judgments, but that court has not indicated whether appeals would also be confidential. A group called the Coalition for Open Government, including news and civic organizations, objected that Delaware’s legislation was unconstitutional. In 2012, a federal judge agreed that the law violated the public’s right of access to civil proceedings under the First Amendment.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
A federal judge in Newark has thrown out a lawsuit against the New York Police Department for spying on New Jersey Muslims, saying if anyone was at fault, it was the Associated Press for telling people about it. In his ruling ... U.S. District Court Judge William J. Martini simultaneously demonstrated the willingness of the judiciary to give law enforcement alarming latitude in the name of fighting terror, greenlighted the targeting of Muslims based solely on their religious beliefs, and blamed the media for upsetting people by telling them what their government was doing. The NYPD’s clandestine spying on daily life in Muslim communities in the region — with no probable cause, and nothing to show for it — was exposed in a Pulitzer-Prize winning series of stories by the AP. The stories described infiltration and surveillance of at least 20 mosques, 14 restaurants, 11 retail stores, two grade schools, and two Muslim student associations in New Jersey alone. In a cursory, 10-page ruling issued before even hearing oral arguments, Martini essentially said that what the targets didn’t know didn’t hurt them: "None of the Plaintiffs’ injuries arose until after the Associated Press released unredacted, confidential NYPD documents and articles expressing its own interpretation of those documents. Nowhere in the Complaint do Plaintiffs allege that they suffered harm prior to the unauthorized release of the documents by the Associated Press. This confirms that Plaintiffs’ alleged injuries flow from the Associated Press’s unauthorized disclosure of the documents. The harms are not “fairly traceable” to any act of surveillance."
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
At a motel in the town of Hirono, just outside a restricted zone in Fukushima Prefecture, [the] residents were all men, all apparently working on the cleanup of the Fukushima Dai-ichi nuclear plant, where three reactors melted down and a fourth caught on fire after a quake and tsunami in 2011. The plant's operator is mostly using subcontractors to supply labor, which drives down the pay and tends to leave the poorest workers living in crowded dormitories. Workers and labor activists say that Tokyo Electric Power Company, or TEPCO, is subcontracting the work out to avoid taking direct responsibility — financial and otherwise — for the dangers the workers face each day at the plant. Recent days and weeks have brought embarrassing news for Tepco, including that levels of radioactive strontium in wells in the plant were reported months late, and were 10 times lower than the actual amount. TEPCO says it was a measurement error. Some critics say that TEPCO can't be trusted and that the world's largest nuclear accident is still waiting to happen at Fukushima, such as an accidental nuclear reaction that releases large amounts of harmful radiation into the air. TEPCO dismisses predictions like this as alarmist. Japanese themselves are highly divided on the issue, just as they are about whether or not their country should continue to rely on nuclear power, which previously supplied up to a third of their electricity. One thing that seems certain is that the work of cleaning up and shutting down the Fukushima Daiichi nuclear plant will go on for a long time. TEPCO predicts it could last 30 or 40 years. Others say that estimate is blindly optimistic.
Note: Why is this critical news getting so little coverage? For more on deception and corruption around nuclear power, see the deeply revealing reports from reliable major media sources available here.
The United States did not live up to the promise of the First Amendment last year, “far from it,” sinking to 46th in global press freedom rankings, a respected international nonprofit group said. The U.S. plummeted 13 slots to 46th overall “amid increased efforts to track down whistle-blowers and the sources of leaks,” Reporters Without Borders warned in an annual report. “The trial and conviction of Private Bradley Manning and the pursuit of NSA analyst Edward Snowden were warnings to all those thinking of assisting in the disclosure of sensitive information that would clearly be in the public interest,” the organization said. The group ... also cited the Department of Justice’s seizure of Associated Press telephone records and a court’s pressure on New York Times reporter James Risen to testify against a CIA staffer accused of leaking classified information. “The whistle-blower is clearly the enemy in the U.S.,” Delphine Halgand, who heads the RSF outpost in Washington, told Yahoo News. “Eight whistle-blowers have been charged under the Obama administration, the highest number of any administration, of all other administrations combined.” Overall, RSF said in its report, “countries that pride themselves on being democracies and respecting the rule of law have not set an example, far from it.” “Freedom of information is too often sacrificed to an overly broad and abusive interpretation of national security needs, marking a disturbing retreat from democratic practices. Investigative journalism often suffers as a result,” the group said.
Note: As if to underscore the sad state of US press freedom, we couldn't find any major media who reported this sad news, other than a Washington Post blog at this link, which simply downplays the news and tries to explain it away. To read how the media censors some of the biggest stories never reported, click here.
The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone. The former JSOC drone operator ... states that innocent people have “absolutely” been killed as a result. Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. The Obama administration has repeatedly insisted that its operations kill terrorists with the utmost precision. Within the NSA ... a motto quickly caught on at Geo Cell: ‘We Track ’Em, You Whack ’Em.’” In December 2009, utilizing the NSA’s metadata collection programs, the Obama administration dramatically escalated U.S. drone and cruise missile strikes in Yemen. The first strike in the country known to be authorized by Obama targeted an alleged Al Qaeda camp in the southern village of al-Majala. The strike, which included the use of cluster bombs, resulted in the deaths of 14 women and 21 children.
Note: For an in-depth interview on this important topic, click here. Would anyone in a developed country tolerate their citizens being killed by the drones of a foreign government? Note also that The Intercept is the new media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for the their independence.
New York state’s top financial regulator has demanded documents from more than a dozen banks including Barclays, Deutsche, Goldman Sachs and RBS as a probe widened into trading practices in the $5.3tn-a-day global foreign exchange markets. Benjamin Lawsky, New York's financial services superintendent, made the move following the banks’ decision to fire or suspend at least 20 traders following reports that employees at some firms had shared information about their currency positions with counterparts at other companies. Lawsky’s move marks the latest escalation in a global investigation by regulators into the manipulation of benchmark rates. The currency probe comes as regulators are still investigating the manipulation of the Libor lending rate by traders at some of the world’s biggest banks. The Wall Street Journal reported that Goldman Sachs’ Steven Cho, formerly global head of spot and forward foreign exchange trading for major currencies, was retiring from the bank. His departure came a day after Citigroup announced that Anil Prasad, its global head of foreign exchange, was leaving the company. It is not know if his retirement is in any way linked to any investigation. Prasad’s exit comes a month after Rohan Ramchandani, formerly Citi’s head of European spot foreign exchange trading, was fired. Ramchandani had been a member of the Bank of England’s foreign exchange joint standing committee.
Note: For more on financial corruption, see the deeply revealing reports from reliable major media sources available here.
U.S. Sen. Elizabeth Warren said ... she is shocked that the federal government is earning an estimated $66 billion in profits from student loans originated between 2007 and 2012. [She] was reacting to a Government Accountability Office report [issued on January 31]. A previous Congressional Budget Office report estimated that the government will pocket an additional $185 billion in profits on new student loans made over the next 10 years. ‘‘This is obscene. The government should not be making $66 billion in profits off the backs of our students,’’ Warren said in a statement. ‘‘This report reinforces what we already knew — instead of investing in our children and their futures, the government is squeezing profits out of our young people and adding to the mountain of debt they will spend their lives struggling to repay.’’ Warren and eight other U.S. senators committed to wring government profits out of student loans and address [the] $1.2 trillion in outstanding student loan debt they say is crushing families and putting a strain on the economy. ‘‘We cannot bury our heads in the sand and pretend the profits don’t exist, or use accounting tricks to make them disappear,’’ Warren said. ‘‘It’s time to end the practice of profiting from young people who are trying to get an education and refinance existing loans.’’ Warren has [introduced a bill] that tries to pressure colleges to keep costs down for students and ensure they get a meaningful diploma when they graduate.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
Vera Scroggins, an outspoken opponent of fracking, is legally barred from the new county hospital. Also off-limits, unless Scroggins wants to risk fines and arrest, are the Chinese restaurant where she takes her grandchildren, the supermarkets and drug stores where she shops, the animal shelter where she adopted her Yorkshire terrier, bowling alley, recycling centre, golf club, and lake shore. In total, 312.5 sq miles are no-go areas for Scroggins under a sweeping court order granted by a local judge that bars her from any properties owned or leased by one of the biggest drillers in the Pennsylvania natural gas rush, Cabot Oil & Gas Corporation. The ban represents one of the most extreme measures taken by the oil and gas industry to date against protesters like Scroggins, who has operated peacefully and within the law including taking Yoko Ono to frack sites in her bid to elevate public concerns about fracking. It was always going to be an unequal fight when Scroggins, now 63, made it her self-appointed mission five years ago to stop fracking in this, the richest part of the Marcellus Shale. The judge [granted] Cabot a temporary injunction barring Scroggins from all property owned or leased by the company. In court filings, Cabot said it holds leases on 200,000 acres of land, equivalent to 312.5 sq miles. That amounts to nearly 40% of the largely rural county in north-eastern Pennsylvania where Scroggins lives and where Cabot does most of its drilling.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
After a tumultuous year at the war-on-terror detention center in Guantanamo Bay, Cuba, where the U.S. military's motto is "Safe, Humane, Legal, Transparent," operations are cloaked in secrecy. The prison approaches the start of its 13th year next week with a new reclusive regime that no longer discloses what was once routinely released information. The daily tally of hunger striking detainees — the protest that engulfed more than 100 prisoners at its peak this summer — stopped in December. Guards and other prison camp troops are under orders to withhold their names when talking to reporters. On the witness stand in the war court recently, a lawyer in the uniform of an Air Force officer gave sworn testimony under a curious, unexplained fake name — "Major Krueger." Guantanamo is remote, and what is happening there in this new era has mostly gone unnoticed. The government controls access to everything pertaining to Guantanamo. Journalists have to get the military's permission to go there, navigate censorship of their pictures, wait 40 seconds to hear what happens in court and then wait weeks to see court filings. The current crackdown on information can range from the mildly curious to the outright comedic. At times it seems to signify a gratuitous use of power by troops on rotation with sudden power to [wield] a censor's scissors. At times, it suggests a government bureaucracy whose default is knee-jerk secrecy.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Sigurdur "Siggi" Thordarson, [is a] cherubic, blond 21-year-old who has been called everything in the [Icelandic] press from "attention seeker" to "traitor" to "psychopath". Four years ago, just as WikiLeaks was winning international notoriety, the then-17-year-old hacking prodigy became Assange's youngest and most trusted sidekick. But as Assange became more embattled and besieged, the protégé turned on his mentor in the most shocking of ways: becoming the first FBI informant inside the group. His tale reveals not only the paranoia and strife within WikiLeaks, but just how far the feds were willing to go to get Assange. The revelation of Siggi's role as an FBI snitch has polarized WikiLeaks insiders. WikiLeaks spokesman Kristinn Hrafnsson [dismissed] Siggi as "a pathological liar." While other WikiLeaks insiders also question Siggi's credibility, they insist that his story can't be discounted, and there's more to it than the organization is letting on. The truth, it seems, may be held in the leaks. Siggi has provided Rolling Stone with more than a terabyte of secret files he claims to have taken from WikiLeaks before he left in November 2011 and gave to the FBI: thousands of pages of chat logs, videos, tapped phone calls, government documents and more than a few bombshells from the organization's most heated years. Whatever their origins, the SiggiLeaks are a deep and revealing portal into one of the most guarded and influential organizations of the 21st century – and the extreme measures its embattled leader is willing to take.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Despite the hoopla over the approval of the Volcker rule, which restricts banks from making certain types of speculative investments, our financial system isn't much safer than it was before 2008. A major reason for the continued complexity and risk in the financial system is lobbying power. The Volcker rule as it stands now has been turned into Swiss cheese by bank lobbyists, who represent the second biggest corporate special-interest bloc after the health care complex, spending nearly half a billion dollars a year on lobbying, according to the nonprofit, nonpartisan Center for Responsive Politics. So while the rule limits federally insured banks from trading for its own sake, they are still allowed to hedge their portfolios, which opens up a lot of gray territory for trading. Certainly having more lenders rather than fewer would help other kinds of businesses, and having trading walled off from lending would encourage that. The fact that the five largest U.S. financial holding companies control 55% of industry assets--compared with 20% in 1990--keeps competition low and credit constrained. In the next two to five years, there will likely be another crisis or trading loss of the kind that reignites the debate over closing trading loopholes and creating a truly safer financial system. Right now, banks complain about rules that would require them to hold a mere 5% of their assets in high-quality, low-risk capital (known as Tier 1 capital), despite the fact that in any other industry, doing business with less than 50% of your own cash would be considered extreme.
Note: For more on government collusion with the biggest banks, see the deeply revealing reports from reliable major media sources available here.
Whenever I read comments by politicians defending the Unmanned Aerial Vehicle Predator and Reaper program – aka drones – I wish I could ask them a few questions. I'd start with: "How many women and children have you seen incinerated by a Hellfire missile?" Few of these politicians who so brazenly proclaim the benefits of drones have a real clue of what actually goes on. I, on the other hand, have seen these awful sights first hand. What the public needs to understand is that the video provided by a drone is not usually clear enough to detect someone carrying a weapon, even on a crystal-clear day. This makes it incredibly difficult for the best analysts to identify if someone has weapons for sure. One example comes to mind: "The feed is so pixelated, what if it's a shovel, and not a weapon?" I felt this confusion constantly, as did my fellow UAV analysts. We always wonder if ... we destroyed an innocent civilian's life all because of a bad image or angle. I know the feeling you experience when you see someone die. Horrifying barely covers it. When you are exposed to it over and over again it becomes like a small video, embedded in your head, forever on repeat, causing psychological pain and suffering. UAV troops are victim to not only the haunting memories of this work that they carry with them, but also the guilt of always being a little unsure of how accurate their confirmations of weapons or identification of hostile individuals were. The UAVs in the Middle East are used as a weapon, not as protection, and as long as our public remains ignorant to this, this serious threat to the sanctity of human life – at home and abroad – will continue.
Note: For more on war crimes committed by the US and UK in the illegal "global war on terror", see the deeply revealing reports from reliable major media sources available here.
National Security Agency leaker Edward Snowden wrote in a lengthy “open letter to the people of Brazil” that he has been inspired by the global debate ignited by his release of thousands of documents and that the NSA’s culture of indiscriminate global espionage “is collapsing.” In the letter, Snowden commended the Brazilian government for its strong stand against U.S. spying. He wrote that he would be willing to help the South American nation investigate NSA spying on its soil but could not fully participate in doing so without being granted political asylum, because the U.S. “government will continue to interfere with my ability to speak.” The documents revealed that Brazil is the top NSA target in Latin America, in spying that has included the monitoring of Brazilian President Dilma Rousseff’s cellphone and hacking into the internal network of the state-run oil company Petrobras. In his letter, Snowden dismissed U.S. explanations to the Brazilian government and others that the bulk metadata gathered on billions of e-mails and calls was more “data collection” than surveillance. “There is a huge difference between legal programs, legitimate spying ... and these programs of dragnet mass surveillance that put entire populations under an all-seeing eye and save copies forever,” he wrote. “These programs were never about terrorism: they’re about economic spying, social control, and diplomatic manipulation. They’re about power.” Brazilian senators have asked for Snowden’s help during hearings about the NSA’s targeting of Brazil, an important transit hub for transatlantic fiber-optic cables that are hacked.
Note: To read Snowden's full, inspiring letter, click here.
The battle between the U.S. and the Soviet Union during the Cold War, for technological and scientific one-upmanship, included a costly effort that involved the two superpowers' attempts to develop mind-control weapons, according to a new study. A blog post at the Physics arXiv Blog, citing a new paper by researcher Serge Kernbach, said that both the U.S. and the Soviet Union experimented with parapsychology, mind control and remote influence. And, while some of the work conducted by the U.S. on these topics is now public, much less is known about the Soviet body of knowledge, which reportedly cost about a billion dollars to gather. “The Soviets had a similar program. This included experiments in parapsychology, which the Soviets called psychotronics,” the blogpost said. “The work built on a long-standing idea in Soviet science that the human brain could receive and transmit a certain kind of high frequency electromagnetic radiation and that this could influence other objects too.” Kernbach provided an overview of the Soviet Union’s efforts in unconventional research between 1917 and 2003, [based] on publications in Russian technical journals and recently declassified documents. The U.S. developed a 20-year CIA program, called Project MKULTRA, which began in the early 1950s to study ways of manipulating people’s minds and altering their brain functions. The Soviets too focused on a similar program and developed a device called a "cerpan" that could generate and store high-frequency electromagnetic radiation produced by the human brain in hopes of influencing other objects.
Note: For an excellent two-page summary of reliable information on secret government mind control programs, click here. For more on mind control research and operations by the CIA, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.