Government Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Former FBI supervisor John Morris thought he had left his sordid relationship with James "Whitey" Bulger back in Boston along with the envelopes of money, the cases of expensive wine, the home-cooked meals he had prepared for the accused mob boss. Then the phone rang one night. It was 1995 and Bulger had become a fugitive from justice. It was Bulger on the phone. And he was livid. A Boston newspaper had reported that Bulger was a longtime FBI informant, and Bulger wanted Morris to have the story retracted. "He said if he was going to jail ... I was going with him." Morris testified in the trial of Bulger, 83, who is accused of a string of crimes, including 19 murders. Testimony during the trial has stated Bulger ran a criminal enterprise with the help of corrupt FBI agents [John] Connolly and Morris, and that Bulger was an FBI informant concerning his criminal rivals. Morris' testimony put a spotlight on a staggering amount of corruption in the Boston FBI field office that included cash bribes and tip-offs to wiretaps. Connolly's relationship with Bulger extended into the Massachusetts State House, Morris testified. His friendship with Bulger's brother, then Senate President William Bulger, [could] land him a job as the Boston police commissioner upon his retirement from the bureau. Connolly's behavior did not raise any eyebrows with the Special Agents in Charge of the Boston FBI field office, Morris told the court. In fact it was quite the opposite. FBI bosses sought Connolly's friendship, Morris testified. "He had tremendous access across the board to everything including sports events, political figures," Morris testified.
Note: For more on major corruption within the FBI and other intelligence services, see the deeply revealing reports from reliable major media sources available here.
The peculiar circumstances of journalist Michael Hastings' death in Los Angeles last week have unleashed a wave of conspiracy theories. Now there's another theory to contribute to the paranoia: According to a prominent security analyst, technology exists that could [have] allowed someone to hack his car. Former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarke [said] that what is known about the single-vehicle crash is "consistent with a car cyber attack." Clarke said, "There is reason to believe that intelligence agencies for major powers" -- including the United States -- know how to remotely seize control of a car. "It's relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn't want acceleration, to throw on the brakes when the driver doesn't want the brakes on, to launch an air bag," Clarke told The Huffington Post. Hastings was driving a 2013 Mercedes C250 coupe when he crashed into a tree on Highland Ave. in Los Angeles at approximately 4:30 am on June 18. Video posted online showed the car in flames, and one neighbor told a local news crew she heard a sound like an explosion. Another eyewitness said the car's engine had been thrown 50 to 60 yards from the car. There were no other vehicles involved in the accident. The fire was so all-consuming that it took the Los Angeles County coroner's office two days to identify Hastings' body, but Clarke said a cyber attack on the vehicle would have been nearly impossible to trace "even if the dozen or so computers on board hadn't melted."
Note: For a video of a DARPA specialist talking about how any computerized function of a car can be taken over, click here. This news article shows how a university test proved a car's onboard computer can be hacked. For an excellent video presenting powerful evidence that Hastings' death was anything but suicide, click here. For a Fox News video showing other evidence of premeditated murder, click here. In this video, a good friend states he had just received an email from Hastings that he had a story on the CIA that would be the biggest story yet. A later email then said he was worried as he was now under FBI investigation.
[Barrett] Brown is not a household name like Edward Snowden or Bradley Manning. But after helping expose a dirty tricks plot, he faces jail. Brown made a splash in February 2011 by helping to uncover "Team Themis", a project by intelligence contractors retained by Bank of America to demolish the hacker society known as Anonymous. The Team Themis story began in late 2010, when Julian Assange warned WikiLeaks would release documents outlining an "ecosystem of corruption [that] could take down a bank or two." Bank of America went into damage-control mode and, as the New York Times reported, assembled "a team of 15 to 20 top Bank of America officials … scouring thousands of documents in the event that they become public." Days later, Bank of America retained the well-connected law firm of Hunton & Williams [which] "proposed various schemes to attack" WikiLeaks. Its partners suggested creating false documents and fake personas to damage progressive organizations. The tech companies' emails – which Anonymous hacked and Barrett Brown helped publicize – listed planned tactics: "Feed[ing] the fuel between the feuding groups. Disinformation. Create messages around actions to sabotage or discredit the opposing organization. Submit fake documents and then call out the error." Brown [has] been cooling his heels in a jail outside Dallas ... awaiting two separate trials that could put him on ice for more than 100 years. In contrast to the FBI's aggressive pursuit of Brown, no probe of the Team Themis project was launched – despite a call from 17 US House representatives to investigate a possible conspiracy to violate federal laws.
Note: With the wide focus on the privatized national security state by the leaks from Edward Snowden, there is renewed interest in Brown's plight and the campaign for justice in his case. For more on this and to support Barret Brown, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.
Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA). The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate. One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects. This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets. The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden. Britain's technical capacity to tap into the cables that carry the world's communications ... has made GCHQ an intelligence superpower. A total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.
Note: For solid evidence spy agencies targeted even top politicians, click here. For more on intelligence agency corruption, see the deeply revealing reports from reliable major media sources available here.
Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic. The disclosure raises new questions about the boundaries of surveillance by GCHQ [Government Communications Headquarters] and its American sister organisation, the National Security Agency [NSA], whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. They reveal that during G20 meetings in April and September 2009 GCHQ used what one document calls "ground-breaking intelligence capabilities" to intercept the communications of visiting delegations. This included: • Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates' use of computers; • Penetrating the security on delegates' BlackBerrys to monitor their email messages and phone calls; • Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit.
Note: For deeply revealing reports from reliable major media sources on the hidden realities of intelligence agencies, click here
Privatization [of government functions] often comes with a lack of oversight and a series of abuses. One particularly stunning example is the American prison system, the realities of which should be a national disgrace. Some of those realities are highlighted in a recent lawsuit filed by the American Civil Liberties Union on behalf of prisoners at the East Mississippi Correctional Facility (EMCF). EMCF houses severely mentally ill prisoners, with the supposed intent of providing both incarceration and treatment. Instead, the ACLU contends, the facility, which is operated by private contractors, is rife with horrific abuses. The complaint lists a litany of such horrors, [including]: Rampant rapes. Placing prisoners in solitary confinement for weeks, months or even years at a time. Rat infestations so bad that vermin crawl over prisoners. Many suicide attempts, some successful. Denying or delaying treatment for infections and even cancer. Stabbings, beatings and other acts of violence. Malnourishment and chronic hunger. Officers who deal with prisoners by using physical violence. The [US] prison system is increasingly built and run by for-profit corporations, who have a financial interest in increasing the number of people in prison while decreasing the amount of money it costs to house them. Since 1980, the US prison population has grown by 790%. We have the largest prison population of any nation in the history of the world.
Note: For deeply revealing reports from reliable major media sources on corruption and human rights abuses in prisons, click here.
Since 9/11, there has been, at first secretly but increasingly openly, a revocation of the bill of rights for which this country fought over 200 years ago. In particular, the fourth and fifth amendments of the US constitution, which safeguard citizens from unwarranted intrusion by the government into their private lives, have been virtually suspended. The United States is not now a police state. But given the extent of this invasion of people's privacy, we do have the full electronic and legislative infrastructure of such a state. These powers are extremely dangerous. There are legitimate reasons for ... secrecy about communications intelligence. But what is not legitimate is to use a secrecy system to hide programs that are blatantly unconstitutional. In 1975, Senator Frank Church spoke of the National Security Agency in these terms: "I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return." The dangerous prospect of which he warned was that America's intelligence gathering capability – which is today beyond any comparison with what existed in his pre-digital era – "at any time could be turned around on the American people and no American would have any privacy left." That has now happened. That is what [Edward] Snowden has exposed, with official, secret documents. We have fallen into Senator Church's abyss.
Note: The above was written by Daniel Ellsberg, a former US military analyst who in 1971 leaked the Pentagon Papers, showing how the US public had been misled about the Vietnam war. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs. The program, code-named PRISM, has not been made public until now. It may be the first of its kind. Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” GCHQ, Britain’s equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority. Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.
Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.
Former U.S. Sen. Bob Graham has accused the FBI in court papers of having impeded Congress’s Joint Inquiry into 9/11 by withholding information about a Florida connection to the ... attacks that killed nearly 3,000 people. The information ... includes a recently declassified FBI report that ties a Saudi family who once lived in Sarasota “to individuals associated with the terrorist attacks on 9/11/2001.” “The FBI’s failure to call (to the Joint Inquiry’s attention) documents finding ‘many connections’ between Saudis living in the United States and individuals associated with the terrorist attack(s) … interfered with the Inquiry’s ability to complete its mission,” said Graham, co-chairman of the Joint Inquiry. Graham said the FBI kept the 9/11 Commission in the dark, too. He said co-chairmen Thomas Kean and Lee Hamilton and executive director Philip Zelikow all told him they were unaware of the FBI’s Sarasota investigation. Moreover, Graham stated that Deputy FBI Director Sean Joyce, the Bureau’s second in command, personally intervened to block him from speaking with the special agent-in-charge of the Sarasota investigation. “I am troubled by what appears to me to be a persistent effort by the FBI to conceal from the American people information concerning possible Saudi support of the Sept. 11 attacks,” Florida’s former governor said.
Note: For deeply revealing reports from reliable major media sources on the 9/11 attacks, click here.
Toward the end of a May 27 article in The Times about President Obamas speech in which, among other things, he mentioned setting new standards for ordering drone strikes against non-Americans, there was this rather disturbing paragraph: Even as he set new standards, a debate broke out about what they actually meant and what would actually change. For now, officials said, signature strikes targeting groups of unidentified armed men presumed to be extremists will continue in the Pakistani tribal areas. As Glenn Greenwald has pointed out, those two sentences seem to contradict the entire tenor of Mr. Obamas speech, and of a letter to Congress from Attorney General Eric Holder. Both men seemed to be saying that the administration would stop using unmanned drones to kill targets merely suspected, due to their location or their actions, of a link to Al Qaeda or another terrorist organization. Those strikes have resulted in untold civilian casualties that have poisoned Americas relationship with Yemen and Pakistan. Mr. Obama talked at some length about civilian casualties, and also said that the need to use drone strikes against forces that are massing to support attacks on coalition forces will disappear once American forces withdraw from Afghanistan at the end of 2014. But so what to make of that paragraph in the May 27 article? I asked the White House. What I got in response was part of a background briefing given after the presidents speech that repeated the language about how the need for signature strikes will fade.
Note: Drone strikes often miss their intended targets and reportedly create more terrorists than they kill. Casualties of war whose identities are unknown are frequently mis-reported to be "militants". For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
U.S. taxpayers are footing the bill for overseas lobbying that promotes controversial biotech crops developed by U.S.-based Monsanto Co and other seed makers, a report issued on [May 14] said. A review of 926 diplomatic cables of correspondence to and from the U.S. State Department and embassies in more than 100 countries found that State Department officials actively promoted the commercialization of specific biotech seeds, according to the report issued by Food & Water Watch, a nonprofit consumer protection group. The officials tried to quash public criticism of particular companies and facilitated negotiations between foreign governments and seed companies such as Monsanto over issues like patents and intellectual property, the report said. The cables show U.S. diplomats supporting Monsanto, the world's largest seed company, in foreign countries even after it paid $1.5 million in fines after being charged with bribing an Indonesian official and violating the Foreign Corrupt Practices Act in 2005. One 2009 cable shows the embassy in Spain seeking "high-level U.S. government intervention" at the "urgent request" of Monsanto to combat biotech crop opponents there. The report covered cables from 2005-2009 that were released by Wikileaks in 2010. "It really goes beyond promoting the U.S.'s biotech industry and agriculture," said Wenonah Hauter, executive director of Food & Water Watch. "It really gets down to twisting the arms of countries and working to undermine local democratic movements that may be opposed to biotech crops."
Note: For deeply revealing reports from reliable major media sources on government corruption, click here.
Senior Internal Revenue Service officials knew agents were targeting Tea Party groups as early as 2011, according to a draft of an inspector general’s report obtained by The Associated Press that seemingly contradicts public statements by the IRS commissioner. The IRS apologized [on May 10] for what it acknowledged was “inappropriate” targeting of conservative political groups during the 2012 election to see if they were violating their tax-exempt status. The agency blamed low-level employees, saying no high-level officials were aware. But on June 29, 2011, Lois G. Lerner, who heads the IRS division that oversees tax-exempt organizations, learned at a meeting that groups were being targeted, according to the watchdog’s report. At the meeting, she was told that groups with “Tea Party,” ‘’Patriot” or “9/12 Project” in their names were being flagged for additional and often burdensome scrutiny, the report says. The 9-12 Project is a group started by conservative TV personality Glenn Beck. Lerner instructed agents to change the criteria for flagging groups “immediately,” the report says. ” On Jan, 25, 2012, the criteria for flagging suspect groups was changed to, “political action type organizations involved in limiting/expanding Government, educating on the Constitution and Bill of Rights, social economic reform/movement,” the report says.
Note: For deeply revealing reports from reliable major media sources on government corruption, click here.
A dozen years after the terrorist attacks of Sept. 11, 2001, an independent, nonpartisan panel’s examination of the interrogation and detention programs carried out in their aftermath by the Bush administration ... provides a valuable, even necessary reckoning. The work of the [11-member task force convened by the Constitution Project, a legal research and advocacy group] is informed by interviews with dozens of former American and foreign officials, as well as with former prisoners. It is the fullest independent effort so far to assess the treatment of detainees at Guantánamo Bay, in Afghanistan and Iraq, and at the C.I.A.’s secret prisons. The report’s authoritative conclusion that “the United States engaged in the practice of torture” is impossible to dismiss. The report found that those methods violated international legal obligations with “no firm or persuasive evidence” that they produced valuable information that could not have been obtained by other means. The task force found that using torture — like waterboarding, slamming prisoners into walls, and chaining them in uncomfortable stress position for hours — had “no justification”. And in engineering “enforced disappearances” and secret detentions, the United States violated its international treaty obligations. As the panel notes, there never was before “the kind of considered and detailed discussions that occurred after 9/11 directly involving a president and his top advisers on the wisdom, propriety and legality of inflicting pain and torment on some detainees in our custody.”
Note: For another informative article on this from the Times, click here.
All 104 nuclear power reactors now in operation in the United States have a safety problem that cannot be fixed and they should be replaced with newer technology, the former chairman of the Nuclear Regulatory Commission said on [April 8]. Shutting them all down at once is not practical, he said, but he supports phasing them out rather than trying to extend their lives. The position of the former chairman, Gregory B. Jaczko, is not unusual in that various anti-nuclear groups take the same stance. But it is highly unusual for a former head of the nuclear commission to so bluntly criticize an industry whose safety he was previously in charge of ensuring. Dr. Jaczko made his remarks at the Carnegie International Nuclear Policy Conference in Washington in a session about the Fukushima accident. Dr. Jaczko said that many American reactors that had received permission from the nuclear commission to operate for 20 years beyond their initial 40-year licenses probably would not last that long. He also rejected as unfeasible changes proposed by the commission that would allow reactor owners to apply for a second 20-year extension, meaning that some reactors would run for a total of 80 years. Dr. Jaczko resigned as chairman last summer after months of conflict with his four colleagues on the commission. He often voted in the minority on various safety questions, advocated more vigorous safety improvements, and was regarded with deep suspicion by the nuclear industry.
Note: For deeply revealing reports from reliable major media sources on grave risks caused by corruption in the nuclear power industry, click here.
On December 7, 1941, Japanese war planes bombed the U.S. naval base at Pearl Harbor, Hawaii. Six decades later, Al Qaeda terrorists flew hijacked airplanes into the World Trade Center and the Pentagon. Neither President Franklin Roosevelt nor President George W. Bush targeted and killed Americans on U.S. soil in the aftermath of those attacks. Doing so wouldn't have made any sense. How strange, then, that Attorney General Eric Holder invoked those very attacks in a letter confirming that President Obama believes there are circumstances in which he could order Americans targeted and killed on U.S. soil. "It is possible ... for the President to authorize the military to use lethal force within the territory of the United States," he wrote. "The President could conceivably have no choice but to authorize the military to use such force if necessary to protect the homeland in the circumstances of a catastrophic attack like the ones suffered on December 7, 1941 and on September 11, 2001." The very scenario to be guarded against is a president using the pretext of a terrorist attack to seize extraordinary powers. Isn't that among the most likely scenarios for the United States turning into an authoritarian security state?
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
The Government has secretly ramped up a controversial programme that strips people of their British citizenship on national security grounds with two of the men subsequently killed by American drone attacks. Since 2010, the Home Secretary, Theresa May, has revoked the passports of 16 individuals, many of whom are alleged to have had links to militant or terrorist groups. Critics of the programme warn that it allows ministers to wash their hands of British nationals suspected of terrorism who could be subject to torture and illegal detention abroad. They add that it also allows those stripped of their citizenship to be killed or rendered without any onus on the British Government to intervene. At least five of those deprived of their UK nationality ... were born in Britain, and one man had lived in the country for almost 50 years. Those affected have their passports cancelled, and lose their right to enter the UK making it very difficult to appeal. The leading human rights lawyer Gareth Peirce said the present situation smacked of mediaeval exile, just as cruel and just as arbitrary. Ian Macdonald QC, the president of the Immigration Law Practitioners Association, described the citizenship orders as sinister. Its not open government; its closed, and it needs to be exposed. Government officials act when people are out of the country on two occasions while on holiday before cancelling passports and revoking citizenships.
Note: For deeply revealing reports from reliable major media sources on crimes committed in wars of aggression, click here.
The Texas Medical Center [is] a nearly 1,300-acre, 280-building complex of hospitals and related medical facilities, of which MD Anderson is the lead brand name. Medicine had obviously become a huge business. In fact, of Houston’s top 10 employers, five are hospitals, including MD Anderson with 19,000 employees. How did that happen? Where’s all that money coming from? And where is it going? I have spent the past seven months trying to find out by analyzing a variety of bills from hospitals like MD Anderson, doctors, drug companies and every other player in the American health care ecosystem. When you look behind the bills that ... patients receive, you see nothing rational — no rhyme or reason — about the costs they faced in a marketplace they enter through no choice of their own. The only constant is the sticker shock for the patients who are asked to pay. Yet those who work in the health care industry and those who argue over health care policy seem inured to the shock. Why exactly are the bills so high? What are the reasons ... that cancer means a half-million- or million-dollar tab? Why should a trip to the emergency room for chest pains that turn out to be indigestion bring a bill that can exceed the cost of a semester of college? What makes a single dose of even the most wonderful wonder drug cost thousands of dollars? Why does simple lab work done during a few days in a hospital cost more than a car? And what is so different about the medical ecosystem that causes technology advances to drive bills up instead of down?
Note: For the amazing answers to all these questions, read this detailed investigative report in its entirety at the link above. For more on corruption in the medical industry, click here.
Jaime Rosenthal, a senior at Washington University in St. Louis, called more than 100 hospitals in every state last summer, seeking prices for a hip replacement for a 62-year-old grandmother who was uninsured but had the means to pay herself. Only about half of the hospitals, including top-ranked orthopedic centers and community hospitals, could provide any sort of price estimate, despite repeated calls. Those that could gave quotes that varied by a factor of more than 10, from $11,100 to $125,798. Rosenthal's grandmother was fictitious, created for a summer research project on health care costs. But the findings, which form the basis of a paper released Monday by JAMA Internal Medicine, [highlight] the unsustainable growth of U.S. health care costs and an opaque medical system in which prices are often hidden from consumers. Although many experts have said that Americans must become more discerning consumers to help rein in health care costs, the study illustrates how hard that can be. Researchers emphasized that studies have found little consistent correlation between higher prices and better quality in U.S. health care. Cram said there was no data that "Mercedes" hip implants were better than cheaper options, for example. Jamie Court, the president of Consumer Watchdog in Santa Monica, said: "If one hospital can put in a hip for $12,000, then every hospital should be able to do it." With such immense variation in prices, he said, "There is no real price. It's about profit."
Note: For deeply revealing reports from reliable major media sources on corruption in the health care industry, click here.
With studies suggesting that long lines at the polls cost Democrats hundreds of thousands of votes in November, party leaders are beginning a push to make voting and voter registration easier, setting up a likely new conflict with Republicans over a deeply polarizing issue. Democrats in the House and Senate have already introduced bills that would require states to provide online voter registration and allow at least 15 days of early voting, among other things. Fourteen states are also considering whether to expand early voting, including the battlegrounds of Florida, Ohio and Virginia, according to FairVote, a nonprofit group that advocates electoral change. Several recent polls and studies suggest that long waiting times in some places depressed turnout in 2012 and that lines were longest in cities, where Democrats outnumber Republicans. In a New York Times/CBS News poll taken shortly after Election Day, 18 percent of Democrats said they waited at least a half-hour to vote, compared with 11 percent of independents and 9 percent of Republicans. A Massachusetts Institute of Technology analysis determined that blacks and Hispanics waited nearly twice as long in line to vote on average than whites. Florida had the nation’s longest lines, at 45 minutes, followed by the District of Columbia, Maryland, South Carolina and Virginia, according to Charles Stewart III, the political science professor who conducted the analysis. A separate analysis, by an Ohio State University professor and The Orlando Sentinel, concluded that more than 200,000 voters in Florida “gave up in frustration” without voting.
Note: For deeply revealing reports from reliable major media sources on major inadequacies in US electoral procedures, click here.
The president has a clandestine network targeting a 'kill list' justified by secret laws. How is that different than a death squad? The film Dirty Wars, which premiered at Sundance ... tracks the Joint Special Operations Command (JSOC), a network of highly-trained, completely unaccountable US assassins, armed with ever-expanding "kill lists". [Narrator Jeremy] Scahill and [director Rick] Rowley track this new model of US warfare that strikes at civilians and insurgents alike – in 70 countries. They interview former JSOC assassins, who are shell-shocked at how the "kill lists" they are given keep expanding, even as they eliminate more and more people. Our conventional forces are subject to international laws of war: they are accountable for crimes in courts martial; and they run according to a clear chain of command. As much as the US military may fall short of these standards at times, it is a model of lawfulness compared with JSOC, which has far greater scope to undertake the commission of extra-legal operations – and unimaginable crimes. JSOC morphs the secretive, unaccountable mercenary model of private military contracting, which Scahill identified in Blackwater: The Rise of the World's Most Powerful Mercenary Army, into a hybrid with the firepower and intelligence backup of our full state resources. JSOC operates outside the traditional chain of command; it reports directly to the president of the United States. What does it means for the president to have an unaccountable paramilitary force, which can assassinate anyone anywhere in the world?
Note: For more on JSOC, click here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.