Government Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
The Pentagon has failed to maintain a complete database of generals and other high-ranking officials who consider joining defense contracting firms after leaving the military. The database was required under a 2008 law passed by Congress because of concerns about a “revolving door” between the Defense Department and private industry. Despite that mandate, the Pentagon’s database remains “of marginal value,” according to [a] report released by the Defense Department’s Office of Inspector General, which concludes that the Pentagon “may not have fully complied with the intent of this law.” The report marks the second time that the IG has raised questions about compliance. In 2008, the Government Accountability Office found that 52 of the biggest defense contractors employed 2,435 former generals, senior executives and acquisition officers. Of those, 422 were in a position to work on defense contracts directly related to their former agencies and at least nine may have been working on the same contracts they previously oversaw. Top Pentagon officials involved in procurements that exceed $10 million are required to seek an ethics opinion from government attorneys before going to work for a defense contractor. Under the 2008 law, the Pentagon is supposed to keep those opinions for five years in a central database. Investigators found that some agencies were not uploading requests for ethics advice to the database. And a review of what was in the system revealed all sorts of problems.
Note: For more along these lines, see concise summaries of deeply revealing news articles about corruption in the military and in the corporate world.
The Medicare program is the source of a small fortune for many U.S. doctors, according to a trove of government records that reveal unprecedented details about physician billing practices nationwide. The government insurance program for older people paid nearly 4,000 physicians in excess of $1 million each in 2012, according to the new data. The release of the information gives the public access for the first time to the billing practices of individual doctors nationwide. Consumer groups and news outlets have pressured Medicare to release the data for years. The American Medical Association and other physician groups have resisted the data release, arguing that the information violates doctor privacy and that the public may misconstrue details about individual doctors. Among the highest billers were: a cardiologist in Ocala, Fla., who took in $18.1 million, mainly putting in stents; a New Jersey pathologist who received $12.6 million performing tissue exams and other tests; and a Michigan vascular surgeon who got $10.1 million. In some instances, the extremely high billing totals could signal fraudulent doctor behavior, as government inspectors have previously found. Indeed, three of the top 10 earners already had drawn scrutiny from the federal government, and one of them is awaiting trial on federal fraud charges. The greatest tallies also may signal that the Medicare payments for some procedures are too high for the amount of work involved or that perverse incentives lead doctors to overuse a procedure. The specialties most common at the top ranks of the Medicare payments were ophthalmologists, oncologists and pathologists.
Note: For more on medical corruption, see the deeply revealing reports from reliable major media sources available here.
This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. This sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda. Those programs, carried out in secrecy and with little accountability ... threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
America is not yet an oligarchy, but that's where Charles and David Koch and a few other billionaires are taking us. Around a quarter century ago, as income and wealth began concentrating at the top, the Republican and Democratic parties started to morph into mechanisms for extracting money, mostly from wealthy people. Finally, after the Supreme Court's Citizens United decision in 2010, billionaires began creating their own political mechanisms, separate from the political parties. They now give big money directly to political candidates of their choice, and mount their own media campaigns to sway public opinion toward their own views. So far in the 2014 election cycle, Americans for Prosperity, the Koch brothers' political front group, has aired more than 17,000 broadcast TV commercials, compared with only 2,100 aired by Republican Party groups. Americans for Prosperity has also been outspending top Democratic super PACs in nearly all of the Senate races Republicans are targeting this year. In seven of the nine races, the difference in total spending is at least 2-to-1, and Democratic super PACs have had virtually no air presence in five of the nine states. Four of the top five contributors to 2014 super PACs are now giving money to political operations they themselves created, according to the Center for Responsive Politics. Billionaires squaring off against each other isn't remotely a democracy. When billionaires supplant political parties, candidates are beholden directly to the billionaires. And if and when those candidates win election, the billionaires will be completely in charge.
Note: For more on the systemic control of money in US elections, see the deeply revealing reports from reliable major media sources available here.
Mainstream media, cued by corporate press releases, routinely claim that America’s schools are markedly inferior to schools in other developed nations. The claim is part of an organized, long-running, generously funded campaign to undermine confidence in public schools to “prove” the need to privatize them. Educators have been handicapped for more than a century by a curriculum adopted to serve a too-narrow purpose—admission to college—and failure to address that curriculum’s problems has made the institution vulnerable to destructive corporate and political manipulation. Below are brief descriptions of some of the more obvious of those problems. 1. The standard core curriculum is stuck in the past. Adopted in the late 19th Century, the curriculum now shaping America’s schools reflects the “big idea” of that earlier era—the factory system, standardization of parts, mass production, centralized decision making, and passive worker compliance. None of those fit the present era. 2. The standard core curriculum is so inefficient it leaves little or no time for apprenticeships, internships, co-op programs, projects, and other ways of “learning by doing” (which is how most of us learned most of what we know). 3. The standard core curriculum gives thought processes other than recall short shrift, or no attention at all. The ability to remember is, of course, important, but the main educational challenge—making better sense of real-world experience—requires the ability not merely to recall but to infer, generalize, hypothesize, relate, synthesize, value, and so on. 4. The standard core curriculum ignores vast and important fields of knowledge.
In 2009, when Robert H Richard IV, an unemployed heir to the DuPont family fortune, pled guilty to fourth-degree rape of his three-year-old daughter, a judge spared him a justifiable sentence – indeed, only put Richard on probation – because she figured this 1-percenter would "not fare well" in a prison setting. Richard’s ex-wife filed a new lawsuit accusing him of also sexually abusing their son. Since then, the original verdict has been fueling some angry speculation ... that the defendant's wealth and status may have played a role in his lenient sentencing. Inequality defines our criminal justice system just as it defines our society. It always has and it always will until we do something about it. America incarcerates more people than any other country on the planet, with over 2m currently in prison and more than 7m under some form of correctional supervision. More than 60% are racial and ethnic minorities, and the vast majority are poor. There is an abundance of evidence ... that both conscious and unconscious bias permeate every aspect of the criminal justice system, from arrests to sentencing and beyond. Unsurprisingly, this bias works in favor of wealthy (and white) defendants, while poor minorities routinely suffer. In August of last year the Sentencing Project, a non-profit devoted to criminal justice reform, released a comprehensive report on bias in the system. This is the sentence you need to remember: "The United States in effect operates two distinct criminal justice systems: one for wealthy people and another for poor people and minorities."
Note: For more on systemic injustice within the US prison/industrial complex, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has reportedly used automated systems to infect user computers with malware since 2010. At times the agency pretended to be Facebook to install its malware. The NSA has been using a program codenamed TURBINE to contaminate computers and networks with malware "implants" capable of spying on users, according to the Intercept, which cited documents provided by whistleblower Edward Snowden. Between 85,000 and 100,000 of these implants have been deployed worldwide thus far. To infect computers with malware, the NSA has relied on various tactics, including posing as Facebook. The federal agency performed what is known as a "man-on-the-side" attack in which it tricked users computers into thinking that they were accessing real Facebook servers. Once the user had been fooled, the NSA hacked into the user's computer and extracted data from their hard drive. Facebook said it had no knowledge of the NSA"s TURBINE program. However, [Facebook] said it is no longer possible for the NSA or hackers to attack users that way, but Facebook warned that other websites and social networks may still be vulnerable to those types of attacks. "This method of network level disruption does not work for traffic carried over HTTPS, which Facebook finished integrating by default last year," Facebook told the National Journal.
Note: For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.
A top judge campaigned to support a paedophile group that tried to legalise sex with children, a newspaper claims. The Mail on Sunday said Lord Justice Fulford was a founder member of a campaign to defend the Paedophile Information Exchange (PIE). The judge told the BBC he had "no memory" of this, but had in the 1970s been involved with a civil liberties group to which PIE was affiliated. He said he had never supported PIE and child abuse was "wholly wrong". The Daily Mail has run a series of articles questioning the links between PIE and civil liberties group the National Council for Civil Liberties during the 1970s and early 1980s. PIE had called for greater tolerance and paedophile "rights" and campaigned for a lowering of the age of consent to 10. Labour deputy leader Harriet Harman, her husband and fellow Labour MP Jack Dromey and former Labour health secretary Patricia Hewitt were all prominent figures in the NCCL, which granted PIE affiliate status in 1975. Ms Hewitt has apologised for having "got it wrong", while Mr Dromey has accused the Daily Mail of "dirty, gutter journalism". Ms Harman has said she "regrets" the links between the two groups but she has "nothing to apologise for". The Mail on Sunday said its investigation had found that Lord Justice Fulford, a member of the Privy Council, was a founder member of a campaign set up to defend PIE against criminal charges.
Note: If you are ready to see how investigations into a massive child sex abuse ring have led to the highest levels of government, watch the suppressed Discovery Channel documentary "Conspiracy of Silence," available here. For more on sexual abuse scandals, see the deeply revealing reports from reliable major media sources available here.
It was early December when the Central Intelligence Agency began to suspect it had suffered what it regarded as an embarrassing computer breach. Investigators for the Senate Intelligence Committee, working in the basement of a C.I.A. facility in Northern Virginia, had obtained an internal agency review summarizing thousands of documents related to the agency’s detention and interrogation program. Parts of the C.I.A. report cast a particularly harsh light on the program, the same program the agency was in the midst of defending in a prolonged dispute with the intelligence committee. What the C.I.A. did next opened a new and even more rancorous chapter in the struggle over how the history of the interrogation program will be written. Agency officials began scouring the digital logs of the computer network used by the Senate staff members to try to learn how and where they got the report. Their search not only raised constitutional questions about the propriety of an intelligence agency investigating its congressional overseers, but has also resulted in two parallel inquiries by the Justice Department — one into the C.I.A. and one into the committee. Each side accuses the other of spying on it, with the Justice Department now playing the uneasy role of arbitrator in the bitter dispute. “It’s always been a dicey proposition to be investigating Congress,” said W. George Jameson, a C.I.A. lawyer for decades. “You don’t do it lightly.”
Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
Should wealthy litigants be able to rent state judges and courthouses to decide cases in private and keep the results secret? The answer should be an easy no, but if the judges of Delaware’s Chancery Court persuade the United States Supreme Court to take their case and reverse lower federal court rulings outlawing that practice, corporations will, in Delaware, be able to do just that. The state has long been a magnet for corporate litigation because of its welcoming tax structures and the court’s business expertise. Yet the State Legislature became concerned that Delaware was losing its “pre-eminence” in corporate litigation to a growing market in private dispute resolution. To compete, Delaware passed a law in 2009 offering new privileges to well-heeled businesses. If litigants had at least $1 million at stake and were willing to pay $12,000 in filing fees and $6,000 a day thereafter, they could use Delaware’s chancery judges and courtrooms for what was called an “arbitration” that produced enforceable legal judgments. Instead of open proceedings, filings would not be docketed, the courtroom would be closed to the public and the outcome would be secret. The Delaware Supreme Court could review judgments, but that court has not indicated whether appeals would also be confidential. A group called the Coalition for Open Government, including news and civic organizations, objected that Delaware’s legislation was unconstitutional. In 2012, a federal judge agreed that the law violated the public’s right of access to civil proceedings under the First Amendment.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
A federal judge in Newark has thrown out a lawsuit against the New York Police Department for spying on New Jersey Muslims, saying if anyone was at fault, it was the Associated Press for telling people about it. In his ruling ... U.S. District Court Judge William J. Martini simultaneously demonstrated the willingness of the judiciary to give law enforcement alarming latitude in the name of fighting terror, greenlighted the targeting of Muslims based solely on their religious beliefs, and blamed the media for upsetting people by telling them what their government was doing. The NYPD’s clandestine spying on daily life in Muslim communities in the region — with no probable cause, and nothing to show for it — was exposed in a Pulitzer-Prize winning series of stories by the AP. The stories described infiltration and surveillance of at least 20 mosques, 14 restaurants, 11 retail stores, two grade schools, and two Muslim student associations in New Jersey alone. In a cursory, 10-page ruling issued before even hearing oral arguments, Martini essentially said that what the targets didn’t know didn’t hurt them: "None of the Plaintiffs’ injuries arose until after the Associated Press released unredacted, confidential NYPD documents and articles expressing its own interpretation of those documents. Nowhere in the Complaint do Plaintiffs allege that they suffered harm prior to the unauthorized release of the documents by the Associated Press. This confirms that Plaintiffs’ alleged injuries flow from the Associated Press’s unauthorized disclosure of the documents. The harms are not “fairly traceable” to any act of surveillance."
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
At a motel in the town of Hirono, just outside a restricted zone in Fukushima Prefecture, [the] residents were all men, all apparently working on the cleanup of the Fukushima Dai-ichi nuclear plant, where three reactors melted down and a fourth caught on fire after a quake and tsunami in 2011. The plant's operator is mostly using subcontractors to supply labor, which drives down the pay and tends to leave the poorest workers living in crowded dormitories. Workers and labor activists say that Tokyo Electric Power Company, or TEPCO, is subcontracting the work out to avoid taking direct responsibility — financial and otherwise — for the dangers the workers face each day at the plant. Recent days and weeks have brought embarrassing news for Tepco, including that levels of radioactive strontium in wells in the plant were reported months late, and were 10 times lower than the actual amount. TEPCO says it was a measurement error. Some critics say that TEPCO can't be trusted and that the world's largest nuclear accident is still waiting to happen at Fukushima, such as an accidental nuclear reaction that releases large amounts of harmful radiation into the air. TEPCO dismisses predictions like this as alarmist. Japanese themselves are highly divided on the issue, just as they are about whether or not their country should continue to rely on nuclear power, which previously supplied up to a third of their electricity. One thing that seems certain is that the work of cleaning up and shutting down the Fukushima Daiichi nuclear plant will go on for a long time. TEPCO predicts it could last 30 or 40 years. Others say that estimate is blindly optimistic.
Note: Why is this critical news getting so little coverage? For more on deception and corruption around nuclear power, see the deeply revealing reports from reliable major media sources available here.
The United States did not live up to the promise of the First Amendment last year, “far from it,” sinking to 46th in global press freedom rankings, a respected international nonprofit group said. The U.S. plummeted 13 slots to 46th overall “amid increased efforts to track down whistle-blowers and the sources of leaks,” Reporters Without Borders warned in an annual report. “The trial and conviction of Private Bradley Manning and the pursuit of NSA analyst Edward Snowden were warnings to all those thinking of assisting in the disclosure of sensitive information that would clearly be in the public interest,” the organization said. The group ... also cited the Department of Justice’s seizure of Associated Press telephone records and a court’s pressure on New York Times reporter James Risen to testify against a CIA staffer accused of leaking classified information. “The whistle-blower is clearly the enemy in the U.S.,” Delphine Halgand, who heads the RSF outpost in Washington, told Yahoo News. “Eight whistle-blowers have been charged under the Obama administration, the highest number of any administration, of all other administrations combined.” Overall, RSF said in its report, “countries that pride themselves on being democracies and respecting the rule of law have not set an example, far from it.” “Freedom of information is too often sacrificed to an overly broad and abusive interpretation of national security needs, marking a disturbing retreat from democratic practices. Investigative journalism often suffers as a result,” the group said.
Note: As if to underscore the sad state of US press freedom, we couldn't find any major media who reported this sad news, other than a Washington Post blog at this link, which simply downplays the news and tries to explain it away. To read how the media censors some of the biggest stories never reported, click here.
The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone. The former JSOC drone operator ... states that innocent people have “absolutely” been killed as a result. Some top Taliban leaders, knowing of the NSA’s targeting method, have purposely and randomly distributed SIM cards among their units in order to elude their trackers. As a result, even when the agency correctly identifies and targets a SIM card belonging to a terror suspect, the phone may actually be carried by someone else, who is then killed in a strike. The Obama administration has repeatedly insisted that its operations kill terrorists with the utmost precision. Within the NSA ... a motto quickly caught on at Geo Cell: ‘We Track ’Em, You Whack ’Em.’” In December 2009, utilizing the NSA’s metadata collection programs, the Obama administration dramatically escalated U.S. drone and cruise missile strikes in Yemen. The first strike in the country known to be authorized by Obama targeted an alleged Al Qaeda camp in the southern village of al-Majala. The strike, which included the use of cluster bombs, resulted in the deaths of 14 women and 21 children.
Note: For an in-depth interview on this important topic, click here. Would anyone in a developed country tolerate their citizens being killed by the drones of a foreign government? Note also that The Intercept is the new media source being funded by Pierre Omidyar and featuring Glenn Greenwald and other top reporters known for the their independence.
New York state’s top financial regulator has demanded documents from more than a dozen banks including Barclays, Deutsche, Goldman Sachs and RBS as a probe widened into trading practices in the $5.3tn-a-day global foreign exchange markets. Benjamin Lawsky, New York's financial services superintendent, made the move following the banks’ decision to fire or suspend at least 20 traders following reports that employees at some firms had shared information about their currency positions with counterparts at other companies. Lawsky’s move marks the latest escalation in a global investigation by regulators into the manipulation of benchmark rates. The currency probe comes as regulators are still investigating the manipulation of the Libor lending rate by traders at some of the world’s biggest banks. The Wall Street Journal reported that Goldman Sachs’ Steven Cho, formerly global head of spot and forward foreign exchange trading for major currencies, was retiring from the bank. His departure came a day after Citigroup announced that Anil Prasad, its global head of foreign exchange, was leaving the company. It is not know if his retirement is in any way linked to any investigation. Prasad’s exit comes a month after Rohan Ramchandani, formerly Citi’s head of European spot foreign exchange trading, was fired. Ramchandani had been a member of the Bank of England’s foreign exchange joint standing committee.
Note: For more on financial corruption, see the deeply revealing reports from reliable major media sources available here.
U.S. Sen. Elizabeth Warren said ... she is shocked that the federal government is earning an estimated $66 billion in profits from student loans originated between 2007 and 2012. [She] was reacting to a Government Accountability Office report [issued on January 31]. A previous Congressional Budget Office report estimated that the government will pocket an additional $185 billion in profits on new student loans made over the next 10 years. ‘‘This is obscene. The government should not be making $66 billion in profits off the backs of our students,’’ Warren said in a statement. ‘‘This report reinforces what we already knew — instead of investing in our children and their futures, the government is squeezing profits out of our young people and adding to the mountain of debt they will spend their lives struggling to repay.’’ Warren and eight other U.S. senators committed to wring government profits out of student loans and address [the] $1.2 trillion in outstanding student loan debt they say is crushing families and putting a strain on the economy. ‘‘We cannot bury our heads in the sand and pretend the profits don’t exist, or use accounting tricks to make them disappear,’’ Warren said. ‘‘It’s time to end the practice of profiting from young people who are trying to get an education and refinance existing loans.’’ Warren has [introduced a bill] that tries to pressure colleges to keep costs down for students and ensure they get a meaningful diploma when they graduate.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
Vera Scroggins, an outspoken opponent of fracking, is legally barred from the new county hospital. Also off-limits, unless Scroggins wants to risk fines and arrest, are the Chinese restaurant where she takes her grandchildren, the supermarkets and drug stores where she shops, the animal shelter where she adopted her Yorkshire terrier, bowling alley, recycling centre, golf club, and lake shore. In total, 312.5 sq miles are no-go areas for Scroggins under a sweeping court order granted by a local judge that bars her from any properties owned or leased by one of the biggest drillers in the Pennsylvania natural gas rush, Cabot Oil & Gas Corporation. The ban represents one of the most extreme measures taken by the oil and gas industry to date against protesters like Scroggins, who has operated peacefully and within the law including taking Yoko Ono to frack sites in her bid to elevate public concerns about fracking. It was always going to be an unequal fight when Scroggins, now 63, made it her self-appointed mission five years ago to stop fracking in this, the richest part of the Marcellus Shale. The judge [granted] Cabot a temporary injunction barring Scroggins from all property owned or leased by the company. In court filings, Cabot said it holds leases on 200,000 acres of land, equivalent to 312.5 sq miles. That amounts to nearly 40% of the largely rural county in north-eastern Pennsylvania where Scroggins lives and where Cabot does most of its drilling.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials. The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user. Among the most frequent targets of the N.S.A. and its Pentagon partner, United States Cyber Command, have been units of the Chinese Army, which the United States has accused of launching regular digital probes and attacks on American industrial and military targets, usually to steal secrets or intellectual property. But the program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
After a tumultuous year at the war-on-terror detention center in Guantanamo Bay, Cuba, where the U.S. military's motto is "Safe, Humane, Legal, Transparent," operations are cloaked in secrecy. The prison approaches the start of its 13th year next week with a new reclusive regime that no longer discloses what was once routinely released information. The daily tally of hunger striking detainees — the protest that engulfed more than 100 prisoners at its peak this summer — stopped in December. Guards and other prison camp troops are under orders to withhold their names when talking to reporters. On the witness stand in the war court recently, a lawyer in the uniform of an Air Force officer gave sworn testimony under a curious, unexplained fake name — "Major Krueger." Guantanamo is remote, and what is happening there in this new era has mostly gone unnoticed. The government controls access to everything pertaining to Guantanamo. Journalists have to get the military's permission to go there, navigate censorship of their pictures, wait 40 seconds to hear what happens in court and then wait weeks to see court filings. The current crackdown on information can range from the mildly curious to the outright comedic. At times it seems to signify a gratuitous use of power by troops on rotation with sudden power to [wield] a censor's scissors. At times, it suggests a government bureaucracy whose default is knee-jerk secrecy.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Sigurdur "Siggi" Thordarson, [is a] cherubic, blond 21-year-old who has been called everything in the [Icelandic] press from "attention seeker" to "traitor" to "psychopath". Four years ago, just as WikiLeaks was winning international notoriety, the then-17-year-old hacking prodigy became Assange's youngest and most trusted sidekick. But as Assange became more embattled and besieged, the protégé turned on his mentor in the most shocking of ways: becoming the first FBI informant inside the group. His tale reveals not only the paranoia and strife within WikiLeaks, but just how far the feds were willing to go to get Assange. The revelation of Siggi's role as an FBI snitch has polarized WikiLeaks insiders. WikiLeaks spokesman Kristinn Hrafnsson [dismissed] Siggi as "a pathological liar." While other WikiLeaks insiders also question Siggi's credibility, they insist that his story can't be discounted, and there's more to it than the organization is letting on. The truth, it seems, may be held in the leaks. Siggi has provided Rolling Stone with more than a terabyte of secret files he claims to have taken from WikiLeaks before he left in November 2011 and gave to the FBI: thousands of pages of chat logs, videos, tapped phone calls, government documents and more than a few bombshells from the organization's most heated years. Whatever their origins, the SiggiLeaks are a deep and revealing portal into one of the most guarded and influential organizations of the 21st century – and the extreme measures its embattled leader is willing to take.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.