Government Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Senate Intelligence Committee Chair Dianne Feinstein accused the CIA on [March 11] of violating the law and the Constitution of the United States by interfering in a committee investigation into Bush-era torture of terror suspects. Feinstein said the CIA had removed documents provided to the committee through a special, segregated network set up by the agency for the committee to pursue its investigation. Among the documents removed was an internal review of CIA interrogation techniques conducted by then-CIA Director Leon Panetta, which committee members have said corroborated committee findings critical of the agency’s interrogation program. “The CIA just went and searched the committee’s computers,” Feinstein said on the Senate floor. “This was done without the knowledge or approval of committee members or staff, and in violation of our written agreements. Further, this type of behavior would not have been possible had the CIA allowed the committee to conduct the review of documents here in the Senate,” Feinstein said. Feinstein said that the CIA’s activities may have violated the Fourth Amendment, the Computer Fraud and Abuse Act, and executive order 12333, which bars the CIA from conducting domestic surveillance. Feinstein also said the CIA’s activities violated the separation of powers principles in the Constitution by interfering with congressional oversight of the executive branch.
Note: For more on the out-of-control activities of intelligence agencies, see the deeply revealing reports from reliable major media sources available here.
Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal. GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not. In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally. Yahoo ... denied any prior knowledge of the program, accusing the agencies of "a whole new level of violation of our users' privacy". Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012. The system, eerily reminiscent of the telescreens evoked in George Orwell's Nineteen Eighty-Four, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs. Rather than collecting webcam chats in their entirety, the program saved one image every five minutes from the users' feeds ... to avoid overloading GCHQ's servers. The documents describe these users as "unselected" – intelligence agency parlance for bulk rather than targeted collection.
Note: For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
An advisory committee of the Food and Drug Administration is set to begin two days of meetings tomorrow to consider radical biological procedures that, if successful, would produce genetically modified human beings. This is a dangerous step. These techniques would change every cell in the bodies of children born as a result of their use, and these alterations would be passed down to future generations. The F.D.A. calls them mitochondrial manipulation technologies. The procedures involve removing the nuclear material either from the egg or embryo of a woman with inheritable mitochondrial disease and inserting it into a healthy egg or embryo of a donor whose own nuclear material has been discarded. Any offspring would carry genetic material from three people — the nuclear DNA of the mother and father, and the mitochondrial DNA of the donor. Developers of these modification techniques say they are a way for women with mitochondrial disease to give birth to healthy children to whom they are related genetically. Some are also promoting their use for age-related infertility. These procedures are deeply problematic in terms of their medical risks and societal implications. Will the child be born healthy, or will the cellular disruptions created by this eggs-as-Lego-pieces approach lead to problems later on? What about subsequent generations? And how far will we go in our efforts to engineer humans? Unfortunately, there are now worrisome signs that opposition to inheritable genetic modifications, written into law by dozens of countries, according to our count, may be weakening. British regulators are also considering mitochondrial manipulations, and proponents there, like their counterparts in the United States, want to move quickly to clinical trials.
Note: For more on the dangers to society of genetic engineering, see the deeply revealing reports from reliable major media sources available here.
It's 1999, the tail end of the Clinton years. Most observers on the Hill thought the Financial Services Modernization Act of 1999 – also known as the Gramm-Leach-Bliley Act – was just the latest and boldest in a long line of deregulatory handouts to Wall Street that had begun in the Reagan years. Wall Street had spent much of that era arguing that America's banks needed to become bigger and badder, in order to compete globally with the German and Japanese-style financial giants. Bank lobbyists were pushing a new law designed to wipe out 60-plus years of bedrock financial regulation. The key was repealing – or "modifying," as bill proponents put it – the famed Glass-Steagall Act separating bankers and broker. Now, commercial banks would be allowed to merge with investment banks and insurance companies, creating financial megafirms potentially far more powerful than had ever existed in America. The [bill] additionally legalized new forms of monopoly, allowing banks to merge with heavy industry. A tiny provision in the bill also permitted commercial banks to delve into any activity that is "complementary to a financial activity and does not pose a substantial risk to the safety or soundness of depository institutions or the financial system generally." Today, banks like Morgan Stanley, JPMorgan Chase and Goldman Sachs own oil tankers, run airports and control huge quantities of coal, natural gas, heating oil, electric power and precious metals. They likewise can now be found exerting direct control over the supply of a whole galaxy of raw materials crucial to world industry and to society in general, including everything from food products to metals like zinc, copper, tin, nickel and ... aluminum.
Note: For more on government collusion with the biggest banks, see the deeply revealing reports from reliable major media sources available here.
In the years after the end of WWII, CIA and US intelligence operatives tested LSD and other interrogation techniques on captured Soviet spies—all with the help of former Nazi doctors. It was 1946. The Joint Chiefs of Staff were preparing for ‘total war’ with the Soviets. They even set an estimated start date of 1952. U.S. military officers had been capturing and then hiring Hitler’s weapons makers in a Top Secret program that would become known as Operation Paperclip. Soon, more than 1,600 of these men and their families would be living the American dream, right here in the United States. In 1948, Operation Paperclip’s Brigadier General Charles E. Loucks ... was working with Hitler’s former chemists when one of the scientists [shared] information about a drug with military potential ... LSD. Documents obtained through the Freedom of Information Act (FOIA) reveal that the U.S. developed its post-war enhanced interrogation techniques ... under the CIA code name Operation Bluebird. The CIA teamed up with the Army Chemical Corps at Camp Detrick, in Maryland, to conduct further research and development on the chemistry of mind-altering drugs. One [Detrick agent was] Dr. Frank Olson, a former army officer and bacteriologist turned agency operative whose sudden demise—by covert LSD poisoning—in 1953 would nearly bring down the CIA. In one of the rare, surviving official documents from the program, Deputy Director of Central Intelligence Allen Dulles sent a secret memo to Richard Helms: “In our conversation of 9 February 1951, I outlined to you the possibilities of augmenting the usual interrogation methods by the use of drugs, hypnosis, shock, etc., and emphasized the defensive aspects as well as the offensive opportunities.”
Note: To read excerpts from incredibly revealing declassified CIA documents on these programs, click here. For more on secret government mind control programs which have had a powerful hidden influence on global politics, see our Mind Control Information Center available here.
James Clapper is very worried. It's not the first time. Last week the man who serves as America's Director of National Intelligence [told] assembled members of the Senate Select Intelligence Committee that the annual worldwide threat assessment ... has filled him with dread. Last year he appeared before Congress for a similar purpose. He was very, very concerned then too. [And the same] in 2012. Of course, one must consider the possibility that over the past five decades the world has never been as dangerous, complex and challenging as it's been over the past three years, [even though the] whole "threat of nuclear holocaust" ... defined much of the 60s, 70s and 80s. Clapper's alarmist tone is hardly matched by the threats he cites. Significantly more Americans die each year from falling furniture [than from terrorist acts]. To listen to Clapper and others in the intelligence community one might never know that inter-state war has largely disappeared and that wars in general are in the midst of a multi-decade decline. 2013 was a landmark year for non-proliferation with important progress made in slowing down Iran's nuclear aspirations and enforcing the norm on chemical weapons usage. There are real threats to the US, but Clapper should be able to talk about them in sober, evidence-based, non-hysterical terms. It's almost as if Clapper and the intelligence community that he helms are playing up foreign threats in order to justify bloated post-9/11 budgets. [Remember that] he allegedly lied to Congress over the extent to which the National Security Agency was collecting phone and e-mail records of individual Americans. [Sadly,] threat mongering and exaggeration is the norm rather than the exception.
Note: For a dramatic BBC documentary showing how many politicians literally promote fear for their own self benefit, watch Power of Nightmares at this link. For more on intense deception perpetrated by the intelligence community, see the deeply revealing reports from reliable major media sources available here.
The U.S. National Security Agency is involved in industrial espionage and will grab any intelligence it can get its hands on regardless of its value to national security, former NSA contractor Edward Snowden told a German TV network. ARD TV quoted Snowden saying the NSA does not limit its espionage to issues of national security and he cited German engineering firm, Siemens as one target. "If there's information at Siemens that's beneficial to U.S. national interests - even if it doesn't have anything to do with national security - then they'll take that information nevertheless," Snowden said. Snowden's claim the NSA is engaged in industrial espionage follows a New York Times report earlier this month that the NSA put software in almost 100,000 computers around the world, allowing it to carry out surveillance on those devices and could provide a digital highway for cyberattacks. The NSA planted most of the software after gaining access to computer networks, but has also used a secret technology that allows it entry even to computers not connected to the Internet, the newspaper said, citing U.S. officials, computer experts and documents leaked by Snowden. Frequent targets of the programme, code-named Quantum, included units of the Chinese military and industrial targets.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
In what may be the biggest such scandal in Air Force history, 34 officers entrusted with land-based nuclear missiles have been pulled off the job for alleged involvement in a cheating ring that officials say was uncovered during a drug probe. The 34 are suspected of cheating several months ago on a routine proficiency test that includes checking missile launch officers' knowledge of how to handle an "emergency war order," which is the term for the authorization required to launch a nuclear weapon. The cheating scandal is the latest in a series of Air Force nuclear stumbles ... including deliberate violations of safety rules, failures of inspections, breakdowns in training and evidence that the men and women who operate the missiles from underground command posts are suffering burnout. In October the general who commands the nuclear missile force was fired for engaging in embarrassing behavior, including drunkenness, while leading a U.S. delegation to a nuclear exercise in Russia. The AP disclosed in May an internal Air Force email in which a missile operations officer complained that his force was infested with "rot" bad attitudes and disregard for discipline. The Air Force's nuclear mission includes operation of 450 Minuteman 3 intercontinental ballistic missiles. The Malmstrom unit failed a nuclear safety and security inspection in August but succeeded on a redo in October.
Note: Some are speculating about a purge of high-level U.S. military officers. For evidence of this, click here. And is it just a coincidence that the Malmstrom unit is mentioned? That is the base where several officers testified that a UFO shut down all nuclear warheads several decades ago. For more, click here. And for more on military corruption, see the deeply revealing reports from reliable major media sources available here.
The White House's expert NSA panel may have made headlines ... for telling President Barack Obama to knock off the collection of Americans' meta-data, but surveillance experts said they were surprised that the panel also took to task some controversial non-NSA-related spy tactics as well. One recommendation was to impose much stricter oversight on the FBI's ability to issue National Security Letters (NSLs), which have been used to obtain telephone call records and credit reports in terrorism and espionage cases. Another even more peculiar recommendation by the five national security experts ... was their advice that "governments" shouldn't hack into bank accounts and drain funds. "Governments should not use their offensive cyber capabilities to change the amounts held in financial accounts or otherwise manipulate the financial systems," the unanimous Review Group on Intelligence and Communications Technologies report warned Obama. "That was a strangely specific recommendation for something nobody was talking about," Kel McClanahan, executive director of government transparency group National Security Counselors, told ABC News. Michelle Richardson, the American Civil Liberties Union's legislative council in Washington, also said the findings on "NSLs" and government hacking were unexpected -- but welcomed.
Note: The fact that this expert panel would even mention governments manipulating financial accounts suggests that if it hasn't already happened, some were seriously considering this. For lots more on this strange news, click here. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
British and American intelligence agencies had a comprehensive list of surveillance targets that included the EU's competition commissioner, German government buildings in Berlin and overseas, and the heads of institutions that provide humanitarian and financial help to Africa, top-secret documents reveal. The papers show GCHQ [and the NSA were] targeting organisations such as the United Nations development programme, the UN's children's charity Unicef and Médecins du Monde, a French organisation that provides doctors and medical volunteers to conflict zones. The head of the Economic Community of West African States (Ecowas) also appears in the documents, along with text messages he sent to colleagues. One GCHQ document, drafted in January 2009, makes clear that the agencies were targeting an email address listed as belonging to another important American ally – the "Israeli prime minister". Ehud Olmert was in office at the time. Three further Israeli targets appeared on GCHQ documents, including another email address understood to have been used to send messages between the then Israeli defence minister, Ehud Barak, and his chief of staff, Yoni Koren. The names and details are the latest revelations to come from documents leaked by the whistleblower Edward Snowden. They provoked a furious reaction. The disclosures reflect the breadth of targets sought by the agencies, which goes far beyond the desire to intercept the communications of potential terrorists and criminals, or diplomats and officials from hostile countries.
Note: Later reports revealed that GHCQ also targeted the global human rights organization Amnesty International. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
If anyone could claim to be leading by example in an age of austerity, it is Jos Mujica, Uruguay's president, who has forsworn a state palace in favour of a farmhouse, donates the vast bulk of his salary to social projects, flies economy class and drives an old Volkswagen Beetle. But the former guerrilla fighter is clearly disgruntled by those who tag him "the world's poorest president" and much as he would like others to adopt a more sober lifestyle the 78-year-old has been in politics long enough to recognise the folly of claiming to be a model for anyone. "If I asked people to live as I live, they would kill me," Mujica said during an interview in his small but cosy one-bedroom home set amid chrysanthemum fields outside Montevideo. The president is a former member of the Tupamaros guerrilla group, which was notorious in the early 1970s for bank robberies, kidnappings and distributing stolen food and money among the poor. He was shot by police six times and spent 14 years in a military prison, much of it in dungeon-like conditions. Since becoming leader of Uruguay in 2010, however, he has won plaudits worldwide for living within his means, decrying excessive consumption and pushing ahead with policies on same-sex marriage, abortion and cannabis legalisation that have reaffirmed Uruguay as the most socially liberal country in Latin America. But the man who is best known as Pepe says those who consider him poor fail to understand the meaning of wealth. "I'm not the poorest president. The poorest is the one who needs a lot to live," he said. "My lifestyle is a consequence of my wounds. I'm the son of my history."
Note: For a treasure trove of great news articles which will inspire you to make a difference, click here.
It’s not just the NSA that has been caught spying on Americans. Some of our nation’s largest corporations have been conducting espionage as well, against civic groups. That’s the lesson of a new report on corporate espionage against nonprofit organizations by ... Essential Information. The title of the report is Spooky Business, and it is apt. Spooky Business is like a Canterbury Tales of corporate snoopery: Hiring investigators to pose as volunteers and journalists. Hacking. Wiretapping. Information warfare. Physical intrusion. Investigating the private lives of nonprofit leaders. Dumpster diving using an active duty police officer to gain access to trash receptacles. Electronic surveillance. Many different types of nonprofit civic organizations have been targeted by corporate spies: environmental, public interest, consumer, food safety, animal rights, pesticide reform, nursing home reform, gun control and social justice. A diverse constellation of corporations has planned or executed corporate espionage against these nonprofit civic organizations. Food companies like Kraft, Coca-Cola, Burger King, McDonald’s and Monsanto. Oil companies like Shell, BP and Chevron. Chemical companies like Dow and Sasol. Also involved are the retailers (Wal-Mart), banks (Bank of America), and, of course, the nation’s most powerful trade association: the U.S. Chamber of Commerce. Plenty of mercenary spooks have joined up to abet them, including former officials at the FBI, CIA, NSA, Secret Service and U.S. military. Sometimes even government contractors are part of the snooping.
Note: For more on corporate corruption, see the deeply revealing reports from reliable major media sources available here.
Linda Woodford spent the last 15 years of her career inserting phony numbers in the U.S. Department of Defense's accounts. Woodford and her fellow [accountants] set about preparing monthly reports to square the Navy's books with the U.S. Treasury's. And every month ... numbers were missing. Numbers were clearly wrong. Woodford and her colleagues were told by superiors to ... enter false numbers, commonly called "plugs," to make the Navy's totals match the Treasury's. Fudging the accounts with false entries is standard operating procedure. Former military service officials say record-keeping at the operational level throughout the services is rife with made-up numbers to cover lost or missing information. Plugs also are symptomatic of one very large problem: the Pentagon's chronic failure to keep track of its money—how much it has, how much it pays out and how much is wasted or stolen. The Defense Department's 2012 budget totaled $565.8 billion, more than the annual defense budgets of the 10 next largest military spenders combined, including Russia and China. How much of that money is spent as intended is impossible to determine. The Pentagon is largely incapable of keeping track of its vast stores of weapons, ammunition and other supplies. It has amassed a backlog of more than half a trillion dollars in unaudited contracts with outside vendors. [It] also has systematically ignored warnings about its accounting practices. The Pentagon is the only federal agency that has not complied with a law that requires annual audits of all government departments. That means that the $8.5 trillion in taxpayer money doled out by Congress to the Pentagon since 1996 ... has never been accounted for. That sum exceeds the value of China's economic output last year. A single [military accounting] office in Columbus, Ohio, made at least $1.59 trillion - yes, trillion - in errors, including $538 billion in plugs.
Note: This article sadly fails to state the obvious: Many military officers illegally rake in tons of money with false contracts which benefit those officers and contracting companies. They obviously don't want their accounts to be properly audited. For a revealing essay by a top U.S. general exposing major war manipulations, click here. For more on military corruption, see the deeply revealing reports from reliable major media sources available here.
“The Brothers” is a riveting chronicle of government-sanctioned murder, casual elimination of “inconvenient” regimes, relentless prioritization of American corporate interests and cynical arrogance on the part of two men. John Foster Dulles and his brother, Allen, were ... lawyers, partners in the immensely powerful firm of Sullivan & Cromwell. John Foster Dulles served as secretary of state from 1953 to 1959; his brother ran the C.I.A. from 1953 to 1961. In his detailed, wellconstructed and highly readable book, Stephen Kinzer ... shows how the brothers drove America’s interventionist foreign policy. Kinzer highlights John Foster Dulles’s central role in channeling funds from the United States to Nazi Germany in the 1930s. Sullivan & Cromwell floated bonds for Krupp A. G., the arms manufacturer, and also worked for I. G. Farben, the chemicals conglomerate that later manufactured Zyklon B, the gas used to murder millions of Jews. For the Dulles brothers, and for much of the American government, threats to corporate interests were categorized as support for communism. There are also reminders in Kinzer’s book of dark events in the history of American intelligence. Sixty years ago, Frank Olson, a C.I.A. officer, was reported to have jumped to his death during mind-control experiments “in which psychoactive drugs were administered to unknowing victims.” But last year, Kinzer reports, Olson’s family filed suit, claiming he had actually been murdered after visiting secret C.I.A. prisons in Europe.
Note: For more along these lines, see concise summaries of deeply revealing intelligence agency corruption news articles from reliable major media sources.
When Ban Ki-moon, the United Nations secretary general, sat down with President Obama at the White House in April to discuss Syrian chemical weapons, Israeli-Palestinian peace talks and climate change, it was a cordial, routine exchange. The National Security Agency nonetheless went to work in advance and intercepted Mr. Ban’s talking points for the meeting, a feat the agency later reported as an “operational highlight” in a weekly internal brag sheet. It was emblematic of an agency that for decades has operated on the principle that any eavesdropping that can be done on a foreign target of any conceivable interest — now or in the future — should be done. After all, American intelligence officials reasoned, who’s going to find out? From thousands of classified documents, the National Security Agency emerges as an electronic omnivore of staggering capabilities, eavesdropping and hacking its way around the world to strip governments and other targets of their secrets, all the while enforcing the utmost secrecy about its own operations. It spies routinely on friends as well as foes, as has become obvious in recent weeks; the agency’s official mission list includes using its surveillance powers to achieve “diplomatic advantage” over such allies as France and Germany and “economic advantage” over Japan and Brazil, among other countries. The scale of eavesdropping by the N.S.A., with 35,000 workers and $10.8 billion a year, sets it apart.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency monitored the phone conversations of 35 world leaders after being given the numbers by an official in another US government department, according to a classified document provided by whistleblower Edward Snowden. The confidential memo reveals that the NSA encourages senior officials in its "customer" departments, such as the White House, State and the Pentagon, to share their "Rolodexes" so the agency can add the phone numbers of leading foreign politicians to their surveillance systems. The document notes that one unnamed US official handed over 200 numbers, including those of the 35 world leaders, none of whom is named. These were immediately "tasked" for monitoring by the NSA. The revelation is set to add to mounting diplomatic tensions between the US and its allies, after the German chancellor Angela Merkel ... accused the US of tapping her mobile phone. The NSA memo obtained by the Guardian suggests that such surveillance was not isolated, as the agency routinely monitors the phone numbers of world leaders – and even asks for the assistance of other US officials to do so. The memo, dated October 2006 and which was issued to staff in the agency's Signals Intelligence Directorate (SID), was titled "Customers Can Help SID Obtain Targetable Phone Numbers". In the wake of the Merkel row, the US is facing growing international criticism that any intelligence benefit from spying on friendly governments is far outweighed by the potential diplomatic damage.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
A former police officer has spoken about some of his colleagues' attitude to Jimmy Savile in the 1960s - saying that everyone in the force knew "Jimmy liked them young". The ex-officer ... was with Leeds City Police in the 1960s. He used to patrol areas of the city where Savile was well known. Late one night, just before midnight, he noticed Jimmy Savile's Rolls Royce parked in a secluded spot on the edge of Roundhay Park. "As I went past I saw the interior lights were on," he said. "He was sat in the driver's seat and was talking to a young lady in the passenger seat. She looked ... perhaps 15 or 16. "I said, 'What's the matter, Jimmy - what are you doing up here?' "He said, 'Yeah, we're fine, aren't we?' And she smiled. Then he said, 'We're waiting for 12 o'clock, son.' "Why?" I asked. 'Because it's her birthday tomorrow, she's 16.' And he winked at me. "I asked the girl, 'Are you ok?' "She smiled - there was no impression she was being forced to be there. "Jimmy then said, 'Now get back on your bike before you lose your job.'" The former officer said today that the attitudes of the time were "different" and accepts that such actions today would be unthinkable. "Leeds City Police ... turned a blind eye to 15-year-olds but never considered that as paedophilia. The officer ... believes that attitude of the police towards Savile lasted for years afterwards, [and] that police may have informally talked to Savile about the age of his girlfriends in the 1960s. Jimmy Savile, a former TV presenter and radio DJ ... is believed to have abused hundreds.
Note: Watch an excellent segment by Australia's "60-Minutes" team titled "Spies, Lords and Predators" on a pedophile ring in the UK which leads directly to the highest levels of government. A second suppressed documentary, "Conspiracy of Silence," goes even deeper into this sad subject. For more along these lines, see concise summaries of deeply revealing sexual abuse scandal news articles from reliable major media sources.
[Banks] have rigged LIBOR, an interest rate used to peg contracts worth trillions. Its equivalent in the world of derivatives, ISDAfix, has also come under question. Commodities prices from crude oil to platinum have been the subject of allegations and inquiries. Now prices in global currency markets, where turnover is $5 trillion a day, are being scrutinised by authorities, who suspect bankers have tampered with those too. Switzerland’s financial watchdog announced on October 4th that it was investigating a slew of banks it thinks have manipulated currencies. Britain and the European Union also have probes under way. Concerns reportedly centre around abnormal movements ahead of a widely-used daily snapshot of exchange rates, known as the 4pm “London fix”. It represents the average of prices agreed during 60 seconds’ trading, and is used as a reference rate to execute a much larger set of currency deals. Bankers, who are big participants in the market, have huge incentives to nudge the price of a given currency pairing ahead of the fix. With billions of dollars changing hands, a difference of a fraction of a cent can add a tidy sum to the bonus pool. If proven, the charge would amount to banks fleecing their clients. Banks know the big trades they are about to execute on others’ behalf, and are often themselves the counterparty. By moving the markets ahead of the fix, they could alter the rate to their profit and their clients’ loss. One suspected method is “banging the close”: submitting a quick succession of orders just as the benchmark is set, to distort its value.
Note: For more on financial corruption, see the deeply revealing reports from reliable major media sources available here.
The problem and the risk [with surveillance by GCHQ] comes in the area of mass capture of data, or strategic surveillance. This is the kind of intelligence gathering that sucks in data from everyone, everywhere: from phones, internet use from email to website visits, social networking, instant messaging and video calls, and even areas such as video gaming; in short, everything digital. In the US, the Prism programme may have given the NSA access to the servers of companies such as Google and Facebook; in the UK, GCHQ has gained a similar degree of access via its Tempora programme, and the two of them together have a cable- and network-tapping capabilities collectively called Upstream, which have the ability to intercept anything that travels over the internet. This data is fed into a database called XKeyscore, which allows analysts to extract information "in real time", ie immediately. What this adds up to is a new thing in human history: with a couple of clicks of a mouse, an agent of the state can target your home phone, or your mobile, or your email, or your passport number, or any of your credit card numbers, or your address, or any of your log-ins to a web service. Using that "selector", the state can get access to all the content of your communications, via any of those channels; can gather information about anyone you communicate with, can get a full picture of all your internet use, can track your location online and offline. It can, in essence, know everything about you, including – thanks to the ability to look at your internet searches – what's on your mind.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The owner of the e-mail service [Lavabit, Ladar Levison,] said he closed it down after the government, in pursuit of Edward J. Snowden, sought untrammeled access to the protected messages of all his customers. Mr. Levison was willing to allow investigators with a court order to tap Mr. Snowden’s e-mail account; he had complied with similar narrowly targeted requests involving other customers about two dozen times. But they wanted more, he said: the passwords, encryption keys and computer code that would essentially allow the government untrammeled access to the protected messages of all his customers. That, he said, was too much. On Aug. 8, Mr. Levison closed Lavabit rather than, in his view, betray his promise of secure e-mail to his customers. On [October 2], a federal judge unsealed documents in the case, allowing the tech entrepreneur to speak candidly for the first time about his experiences. He had been summoned to testify to a grand jury in Virginia; forbidden to discuss his case; held in contempt of court and fined $10,000 for handing over his private encryption keys on paper and not in digital form; and, finally, threatened with arrest for saying too much when he shuttered his business. While Mr. Levison’s struggles have been with the F.B.I., hovering in the background is the N.S.A., which has worked secretly for years to undermine or bypass encrypted services like Lavabit so that their electronic message scrambling cannot obstruct the agency’s spying. Mr. Levison’s case shows how law enforcement officials can use legal tools to pry open messages, no matter how well protected.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.