Government Corruption News StoriesExcerpts of Key Government Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Omar Abdulaziz hit record on his phone and slipped it into the breast pocket of his jacket, he recalled, taking a seat in a Montreal cafe to wait for two men who said they were carrying a personal message from Saudi Crown Prince Mohammed bin Salman. When they arrived, Abdulaziz, a 27-year-old Saudi opposition activist, asked why they had come all the way to Canada to see him. “There are two scenarios,” one of the emissaries said, speaking of Abdulaziz in the third person. In the first, he can go back home to Saudi Arabia, to his friends and family. In the second: “Omar goes to prison.” To drive home what was at stake, the visitors brought one of Abdulaziz’s younger brothers from Saudi Arabia to the meeting. The clandestine recordings - more than 10 hours of conversation - were provided to The Washington Post by Abdulaziz, a close associate of the missing Saudi journalist Jamal Khashoggi. They offer a chilling depiction of how Saudi Arabia tries to lure opposition figures back to the kingdom with promises of money and safety. These efforts have sharply escalated since Mohammed became crown prince last year. Khashoggi’s friends said that senior Saudi officials close to the crown prince had contacted him in recent months, even offering him a high-level job ... if he returned to the kingdom. He didn’t trust the offer, fearing it was a ruse. Khashoggi has not been heard from since he visited the Saudi Consulate in Istanbul on Oct. 2. Turkish investigators have concluded he was killed ... and then dismembered.
Note: There is much more than meets the eye on this Khashoggi case. Read this fascinating article for a taste. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the manipulation of public perception.
This summer, Saudi Arabia promised the Trump administration $100 million for American efforts to stabilize areas in Syria. That money landed in American accounts on Tuesday, the same day that Secretary of State Mike Pompeo landed in the Saudi capital, Riyadh, for discussions with the kingdom’s leaders about the fate of a missing Saudi dissident. The timing of the money’s arrival raised eyebrows even among some of the bureaucrats whose programs will benefit from the influx of cash. “The timing of this is no coincidence,” said an American official involved in Syria policy who spoke on condition of anonymity. The disappearance of the Saudi journalist, Jamal Khashoggi, has battered the image of Saudi Arabia and of its powerful crown prince, Mohammed bin Salman, a key player in many of the Trump administration’s ambitions for the Middle East. Turkish officials say that Mr. Khashoggi was slain inside the Saudi consulate in Istanbul by Saudi agents on Oct. 2 while he was trying to secure a document he needed to get married. Saudi leaders have denied harming Mr. Khashoggi, but have not provided a credible explanation of what happened to him. Mr. Trump threatened “severe punishment” if it was confirmed that Saudi Arabia killed Mr. Khashoggi. But after speaking with King Salman of Saudi Arabia on Monday, he suggested that “rogue killers” could have been responsible and dispatched Mr. Pompeo to Riyadh to see the Saudi king.
Note: There is much more than meets the eye on this Khashoggi case. Read this fascinating article for a taste. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the manipulation of public perception.
The disappearance, and possible murder, of Jamal Khashoggi, a high-profile critic of the Saudi regime, is the latest, disturbing addition to the rising toll of state-directed, extra-territorial kidnappings, abductions and killings around the world. So here’s the question: why do more and more governments think they can get away with murder, figuratively if not literally? It’s a problem that should concern everybody – because everybody is at risk. It’s tempting to blame the US, a country that ... has come to epitomise the problem. In January 1986, worried about American hostages in Lebanon, Ronald Reagan signed a top-secret covert action directive. The presidential “finding” authorized the CIA to kidnap suspected terrorists anywhere, any place. Reagan’s “snatch and grab” operations inaugurated the modern-day practice of state abduction, leading ineluctably to extraordinary rendition. They set a fateful precedent. George W Bush massively expanded rendition after the 2001 terror attacks. Although the UN classifies one country’s abduction of another country’s citizens as a crime against humanity ... the US and its accomplices have in practice faced no substantive sanction or penalty to date. This grim lesson in impunity has been absorbed and digested by governments everywhere. The Khashoggi disappearance, almost certainly ordered and planned in Riyadh, is the very sort of illegal action that has been normalised ... by very recent American practice from Afghanistan and Iraq to Libya and Cuba.
Note: For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The Trump Administration has now indicted at least five journalists’ sources in less than two years’ time—a pace that, if maintained through the end of Trump’s term, would obliterate the already-record number of leakers and whistleblowers prosecuted under eight years of the Obama administration. The latest case, which broke on Wednesday, shows the administration taking advantage of a new avenue to go after a potential whistleblower. Instead of using the archaic Espionage Act - the 100-year-old law meant for spies, not sources - prosecutors are pursuing the latest alleged leaker using financial laws. A senior Treasury official named Natalie Mayflower Sours Edwards has been arrested and charged ... for allegedly sharing “Suspicious Activity Reports” (SARs) about financial red flags with a news organization and its journalist for a series of stories related to the Russia investigation in 2017 and 2018. The complaint contains an interesting allegation, albeit one buried in a footnote: Edwards, according to prosecutors, told investigators she considered herself a “whistleblower.” The government also admitted she had filed a whistleblower complaint within her agency and had talked to Congressional staffers about the issue as well. The Justice Department reportedly has dozens of other [leak] investigations open, and we don’t know who will be next.
Note: This leak prosecution follows the sentencing of Reality Winner to five years in prison for providing evidence of high-level interference in a US election to the media. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the manipulation of public perception.
A Trump administration proposal to limit protests at the White House and the National Mall, including by potentially charging fees for demonstrations, is meeting stiff resistance from civil rights groups who say the idea is unconstitutional. The National Park Service is considering a plan to push back a security perimeter so that it would include most of the walkway north of the White House, a spot closed to traffic since 1995 that has become a regular venue for demonstrations. The proposal also floats the idea of allowing the agency to charge a fee for protests. Though the ideas were proposed earlier this year, they are facing renewed attention given President Donald Trump's recent comments on protests following the confirmation of Supreme Court Associate Justice Brett Kavanaugh. Trump called the protesters "screamers." The proposals "harken back to the era in which the courts had to be called upon to protect the right to dissent in the nation’s capital," the American Civil Liberties Union wrote in a public comment letter to the National Park Service. "Many of the proposed amendments would be unconstitutional if adopted." ACLU attorneys wrote that if a "cost recovery" fee for demonstrations had been in place in 1963, the historic March on Washington – in which the Rev. Martin Luther King, Jr., delivered his “I Have a Dream” speech – probably "couldn't have happened."
Note: For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
Tens of thousands of Belgians gathered in the heart of Brussels today, waving white balloons and white flowers in a popular outpouring of anger and frustration over a widening child sex scandal. The "White March," as it was called by organizers, was one of the largest in the country's recent history, drawing some 275,000 Belgians. It capped a week of spontaneous protests that erupted after Belgium's highest court removed a magistrate widely seen as a hero in the scandal, Jean-Marc Connerotte, from investigations into a pedophile and child pornography ring. So far, 13 people have been charged in the case, which involves the kidnapping, sexual abuse and killing of several children, with at least seven young girls still missing. The court ruled that Mr. Connerotte had compromised his impartiality by accepting a free dinner at a fund-raiser for the parents of missing children. The ruling prompted the public ... to take to the streets. The dismissal also followed press reports that Mr. Connerotte was on the verge of disclosing the names of senior government officials who had been recognized on confiscated videotapes, and during allegations of a high-level cover-up. The march was intended not only as a protest ... but also as an expression of sympathy with the victims of a gang reportedly led by a convicted child rapist, Marc Dutroux, one of the 13 charged. He was released 10 years early in 1992 from a 13-year sentence for multiple child rape. Scores of videos with child pornography were seized along with him.
Note: For an abundance of solid information on this major cover-up of child sex trafficking rings leading to high levels in government, don't miss the most excellent documentary Imperium, which provides reliable, verifiable information on all that is going on. For more along these lines, see concise summaries of deeply revealing sexual abuse scandal news articles from reliable major media sources.
Three days before the Dec. 7, 1941 Japanese attack on Pearl Harbor, President Roosevelt was warned in a memo from naval intelligence that Tokyo's military and spy network was focused on Hawaii. In the newly revealed 20-page memo from FDR's declassified FBI file, the Office of Naval Intelligence on December 4 warned, "In anticipation of open conflict with this country, Japan is vigorously utilizing every available agency to secure military, naval and commercial information, paying particular attention to the West Coast, the Panama Canal and the Territory of Hawaii." The memo, published in the new book December 1941: 31 Days that Changed America and Saved the World went on to say that the Japanese were collecting "detailed technical information" that would be specifically used by its navy. To collect and analyze information, they were building a network of spies through their U.S. embassies and consulates. Historian and acclaimed Reagan biographer Craig Shirley, author of the just released December 1941, doesn't blame FDR for blowing it, but instead [said] that it "does suggest that there were more pieces to the puzzle" that the administration missed. He compares the missed signals leading up to Japan's attack to 9/11, which government investigations also show that the Clinton and Bush administrations missed clear signals that an attack was coming. "So many mistakes through so many levels of Washington," said Shirley. "Some things never change."
Note: Explore powerful evidence that US president Franklin Roosevelt was baiting Japan into an attack on Pearl Harbor. For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
It's plainly wrong for a member of Congress to collaborate with a public relations firm to produce knowingly deceptive testimony on an important issue. Yet Representative Tom Lantos of California has been caught doing exactly that. Mr. Lantos is co-chairman of the Congressional Human Rights Caucus. An article last week on The Times's Op-Ed page by John MacArthur, the publisher of Harper's magazine, revealed the identity of a 15-year-old Kuwaiti girl who told the caucus that Iraqi soldiers had removed scores of babies from incubators and left them to die. The girl, whose testimony helped build support for the Persian Gulf war, was identified only as "Nayirah." She is not just some Kuwaiti but the daughter of the Kuwaiti Ambassador to the U.S.. Saddam Hussein committed plenty of atrocities, but not, apparently, this one. The teen-ager's accusation, at first verified by Amnesty International, was later refuted by that group as well as by other independent human rights monitors. But the issue is not so much the accuracy of the testimony as the identity and undisclosed bias of the witness. How did the girl's testimony come about? It was arranged by the big public relations firm of Hill & Knowlton on behalf of a client, the Kuwaiti-sponsored Citizens for a Free Kuwait, which was then pressing Congress for military intervention. Mr. Lantos knew the girl's identity but concealed it from the public and from the other caucus co-chairman, Representative John E. Porter of Illinois.
Note: Read more about this fabricated story used to push a pro-war agenda in this article. For more along these lines, see concise summaries of deeply revealing news articles on war and the manipulation of public perception.
In the summer of 2015, as Memphis exploded with protests over the police killing of a 19-year-old man, activists began hearing on Facebook from someone called Bob Smith. His profile picture [was] a Guy Fawkes mask, the symbol of anti-government dissent. Smith acted as if he supported the protesters. Over the next three years, dozens of them accepted his friend requests, allowing him to observe private discussions. He described himself as a far-left Democrat, a “fellow protester” and a “man of color.” But Smith was not real. He was the creation of a white detective in the Memphis Police Department’s Office of Homeland Security whose job was to keep tabs on local activists. The detective, Tim Reynolds, outed himself in August under questioning by the American Civil Liberties Union of Tennessee, which sued the police department for allegedly violating a 1978 agreement that prohibited police from conducting surveillance of lawful protests. The revelation validated many activists’ distrust of local authorities. It also provided a rare look into the ways American law enforcement operates online. Social media monitoring - including the use of software to crunch data about people’s online activity - illustrates a policing “revolution” that has allowed authorities to not only track people but also map out their networks, said Rachel Levinson-Waldman, senior counsel at [the] Brennan Center for Justice. But there are few laws governing this kind of monitoring.
Note: Memphis police were recently reported to have systematically spied on community activists. For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the erosion of civil liberties.
Passwords that took seconds to guess, or were never changed from their factory settings. Cyber vulnerabilities that were known, but never fixed. Those are two common problems plaguing some of the Department of Defense's newest weapons systems, according to the Government Accountability Office. The flaws are highlighted in a new GAO report, which found the Pentagon is "just beginning to grapple" with the scale of vulnerabilities in its weapons systems. Drawing data from cybersecurity tests conducted on Department of Defense weapons systems from 2012 to 2017, the report says that by using "relatively simple tools and techniques, testers were able to take control of systems and largely operate undetected" because of basic security vulnerabilities. The GAO says the problems were widespread: "DOD testers routinely found mission critical cyber vulnerabilities in nearly all weapon systems that were under development." The Pentagon has only recently made it a priority to ensure the cybersecurity of its weapons systems. It's still determining how to achieve that goal - and at this point, the report states, "DOD does not know the full scale of its weapon system vulnerabilities." Part of the reason for the ongoing uncertainty ... is that the Defense Department's hacking and cyber tests have been "limited in scope and sophistication." When problems were identified, they were often left unresolved. The GAO cites a test report in which only one of 20 vulnerabilities that were previously found had been addressed.
Note: For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
A major U.S. telecommunications company discovered manipulated hardware from Super Micro Computer Inc. in its network and removed it in August, fresh evidence of tampering in China of critical technology components bound for the U.S., according to a security expert working for the telecom company. The security expert, Yossi Appleboum, provided ... evidence of the discovery following the publication of an investigative report in Bloomberg Businessweek that detailed how China’s intelligence services had ordered subcontractors to plant malicious chips in Supermicro server motherboards over a two-year period ending in 2015. [Appleboum’s company] was hired to scan several large data centers belonging to the telecommunications company. Unusual communications from a Supermicro server and a subsequent physical inspection revealed an implant built into the server’s Ethernet connector. The executive said he has seen similar manipulations of different vendors' computer hardware made by contractors in China, not just products from Supermicro. “Supermicro is a victim - so is everyone else,” he said. There are countless points in the supply chain in China where manipulations can be introduced, and deducing them can in many cases be impossible. The manipulation of the Ethernet connector appeared to be similar to a method also used by the U.S. National Security Agency, details of which were leaked in 2013.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Not all stops are created equal. Sometimes the police pull people over for traffic-safety reasons – for speeding or running a red light, for example. More nefariously, recent reports ... have shown that police departments ... have used traffic enforcement to generate fines to fund local government. But [another] kind of stop – an investigatory or pretext stop – uses the traffic laws to uncover more serious crime. Such stops (and subsequent searches) exploded in popularity in the 1990s. Pretext stops are responsible for most of the racial disparity in traffic stops in the US. Political scientist Charles Epp found that when the police are actually enforcing traffic safety laws, they tend to do so without regard to race. But when they are carrying out investigatory or pretext stops, they are much more likely to stop black and other minority drivers: black people are about two-and-a-half times more likely to be pulled over for pretext stops. The damage from a pretext stop – of a driver, a pedestrian, a loiterer – doesn’t end with the stop itself. The pretext-stop regime ... propels disparities in the rest of the criminal justice system. By ... 2000, we had been steadily, incrementally, building the punitive criminal justice system we still live with today. Most of the pieces – the aggressive prosecutions and policing, longer sentences, prison-building, collateral consequences of convictions such as losing the right to vote or the chance to live in public housing – had been put in place. The years since [have] been primarily dedicated to maintaining ... that basic architecture.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in policing and in the judicial system.
Marsha Appling-Nunez was showing the college students she teaches how to check online if they're registered to vote when she made a troubling discovery. Despite being an active Georgia voter who had cast ballots in recent elections, she was no longer registered. She tried re-registering, but with about one month left before a November election ... Appling-Nunez's application is one of over 53,000 sitting on hold with Georgia Secretary of State Brian Kemp's office. Kemp, who's also the Republican candidate for governor, is in charge of elections and voter registration in Georgia. His Democratic opponent, former state Rep. Stacey Abrams, and voting rights advocacy groups charge that Kemp is systematically using his office to suppress votes and tilt the election, and that his policies disproportionately affect black and minority voters. Through a process that Kemp calls voter roll maintenance and his opponents call voter roll purges, Kemp's office has cancelled over 1.4 million voter registrations since 2012. Nearly 670,000 registrations were cancelled in 2017 alone. According to records obtained from Kemp's office through a public records request, Appling-Nunez's application - like many of the 53,000 registrations on hold with Kemp's office - was flagged because it ran afoul of the state's "exact match" verification process. An analysis of the records obtained by The Associated Press reveals racial disparity in the process. Georgia's population is approximately 32 percent black, according to the U.S. Census, but the list of voter registrations on hold with Kemp's office is nearly 70 percent black.
Note: More on this is available in this MSNBC article. For more along these lines, see concise summaries of deeply revealing elections news articles from reliable major media sources.
Iraq invaded Kuwait in August of 1990. The Kuwait government had to find a way to "sell the war" to the American public. The Kuwait government in exile [hired] the American PR firm Hill & Knowlton ... for $10.7 million to devise a campaign to win American support for the war. It's wasn't an easy sell. The Sept. 5 edition of the London Daily Telegraph ... ran a claim by the exiled Kuwait housing minister that, "babies in the premature unit of one of the hospitals had been removed from their incubators." The Hill & Knowlton people jumped on the story. On October 10 ... a young woman named Nayirah [told a congressional] committee, "I saw the Iraqi soldiers come into the hospital with guns. They took the babies out of the incubators, took the incubators and left the babies on the cold floor to die." Hill & Knowlton immediately faxed details of her speech to newsrooms across the country. The babies in incubator stories became a lead item in newspapers, and on radio and TV. The young woman ... was the daughter of Kuwait's ambassador to the United States, and actually hadn't seen the "atrocities" she described. Similar unsubstantiated stories appeared at the UN a few weeks later, where a team of "witnesses," coached by Hill & Knowlton, gave "testimony" ... about atrocities in Iraq. Seven witnesses used false names. On November 29, 1990, the UN authorized use of "all means necessary" to eject Iraq from Kuwait. On January 12, 1991, Congress authorized the use of force. The story was later discredited.
Note: For more along these lines, see concise summaries of deeply revealing news articles on war and the manipulation of public perception.
The Federal Bureau of Investigation acknowledged today that its agents plotted in 1970 to besmirch the reputation of Jean Seberg, the actress who committed suicide last week, by planting a rumor with news organizations that she was pregnant by [a] high-ranking member of the Black Panther Party. The action against Miss Seberg, part of the F.B.I.'s counterintelligence program COINTELPRO, was intended to discredit her support of the black nationalist movement. According to a document dated April 27, 1970, the Los Angeles office of the F.B.I. requested permission from J. Edgar Hoover, then Director of the bureau, to publicize Miss Seberg's pregnancy, saying it was “felt the possible publication of Seberg's plight could cause her embarrassment and serve to cheapen her image with the general public.” Romain Gary, the prominent French author and diplomat who was Miss Seberg's husband in 1970, said at a news conference in Paris last week that the baby was his and that the F.B.I. had destroyed the actress's life. The bureau could not say today how many celebrities or others had been harassed or otherwise adversely affected by COINTELPRO activities similar to those directed at Miss Seberg. However, the bureau's animus toward the Rev. Dr. Martin Luther King Jr. and its activities against him are well documented. As with all documents released by the F.B.I., those relating to Miss Seberg were issued with names of all other living persons deleted.
Note: Read more on te FBI's COINTELPRO program. For more along these lines, see concise summaries of deeply revealing civil liberties news articles from reliable major media sources.
Within the Defense Department, one agency’s recent project sounds futuristic: millions of insects carrying viruses descend upon crops and then genetically modify them to withstand droughts, floods and foreign attacks. But in a warning published Thursday in the journal Science, a group of independent scientists and lawyers objected. They argue that the endeavor is not so different from designing biological weapons - banned under international law since 1975 - that could swarm and destroy acres of crops. “Once you engineer a virus that spreads by insect, it is hard to imagine how you would ever control it,” said Guy Reeves, a researcher ... who contributed to the critique. “You haven’t just released a transmissible virus - you’ve released a disease,” he added. The Defense Advanced Research Projects Agency, or Darpa ... launched the Insect Allies research program in 2016, budgeting $45 million over four years to transform agricultural pests into vectors that can transfer protective genes into plants within one growing season. The critics said publishing the new research findings could establish “preliminary instruction manuals” for developing offensive biological weapons. Foreign military programs are often “driven by perception of competitors’ activities,” the critics warn, and “the mere announcement of this program may motivate other countries to develop their own capabilities in this arena — indeed, it may have already done so.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on food system corruption and GMOs.
Crystal Mason, the woman who became the poster child for voter suppression when she was sentenced to five years for casting a ballot in Texas, has gone into federal prison. Mason’s crime was to cast a ballot in the 2016 presidential election. An African American woman, she had been encouraged by her mother to do her civic duty and vote. When she turned up to the polling station her name was not on the register, so she cast a provisional ballot that was never counted. She did not read the small print of the form that said that anyone who has been convicted of a felony – as she had, having previously been convicted of tax fraud – was prohibited from voting under Texas law. For casting a vote that was not counted, she will now serve 10 months in the federal system. While locked up it is likely that her final appeals in state court will be exhausted, which means she could be passed at the end of the 10 months directly to state custody for a further five years. Her lawyer, Alison Grinter, said she was dismayed to see Mason ripped from her family. “This is an act of voter intimidation, not the will of a free people.” Grinter added: Texas ... has one of the most strict voter ID laws in the country. Fort Worth ... has been particularly hardline, not only prosecuting Mason but also going after a Hispanic woman, Rosa Ortega, for mistakenly voting as a non-US citizen. Ortega, 37, who had permanent resident status in the US having come to the country as an infant, was sentenced to eight years in prison to be followed by deportation.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in elections and in the judicial system.
The Department of Justice said it is filing a lawsuit against the state of California over its new net neutrality protections, hours after Gov. Jerry Brown signed the bill into law on Sunday. The California law would be the strictest net neutrality protections in the country, and could serve as a blueprint for other states. Under the law, internet service providers will not be allowed to block or slow specific types of content or applications, or charge apps or companies fees for faster access to customers. The Department of Justice says the California law is illegal and that the state is "attempting to subvert the Federal Government's deregulatory approach" to the internet. Barbara van Schewick, a professor at Stanford Law School, says the California bill is on solid legal ground and that California is within its legal rights. California is the third state to pass its own net neutrality regulations, following Washington and Oregon. However, it is the first to match the thorough level of protections that had been provided by the Obama-era federal net neutrality regulations repealed by the Federal Communications Commission in June. At least some other states are expected to model future net neutrality laws on California's. The original FCC rules included a two page summary and more than 300 additional pages with additional protections and clarifications on how they worked. While other states mostly replicated the two-page summary, California took longer crafting its law in order to match the details in the hundreds of supporting pages.
Note: Read how the Federal Communications Commission's net-neutrality policymaking process was heavily manipulated. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
There were dozens of witnesses when a gunfight broke out on a street corner in Buffalo on Aug. 10, 1991. Torriano Jackson, 17, was killed. Valentino Dixon, then 21, was at the scene. Hours later, he was arrested. And in 1992, he was convicted of murder and sentenced to almost 40 years to life in prison. For years, Mr. Dixon fought that conviction from behind bars, insisting on his innocence. No physical evidence had ever connected him to the murder, and another man had confessed to it more than once. His murder conviction was vacated on Wednesday, and Mr. Dixon, 48, walked free. As he struggled to get his conviction overturned, Mr. Dixon got help from ... Martin Tankleff, who was imprisoned for 17 years after being wrongly convicted of murdering his parents. In prison, [Dixon] liked to draw detailed landscapes in colored pencil. Golf courses were a frequent subject. That caught the interest of journalists at Golf Digest, and the magazine profiled Mr. Dixon. In 2017, a new district attorney, John Flynn, took office in Erie County. And in 2018, a course called the Prison Reform Project was offered for the first time at Georgetown University ... with Mr. Tankleff [serving] as an adjunct professor. Three students chose Mr. Dixon’s case and gathered evidence. Their work helped Donald M. Thompson, a lawyer for Mr. Dixon, make his case to the district attorney’s office. Mr. Flynn, the district attorney, said the newly discovered evidence from various witnesses attesting to Mr. Dixon’s innocence was deemed credible.
Note: Read the Golf Digest profile featuring Mr. Dixon's artwork which brought much-needed attention to his wrongful incarceration. Explore a treasure trove of concise summaries of incredibly inspiring news articles which will inspire you to make a difference.
As the 2018 elections approach, the American intelligence community is issuing increasingly dire warnings about potential interference from Russia and other countries. D.H.S. has now conducted remote-scanning and on-site assessments of state and county election systems. These [measures] don't address core vulnerabilities in voting machines or the systems used to program them. And they ignore the fact that many voting machines that elections officials insist are disconnected from the internet – and therefore beyond the reach of hackers – are in fact accessible by way of the modems they use to transmit vote totals on election night. Add to this the fact that states don't conduct robust postelection audits ... and there's a good chance we simply won't know if someone has altered the digital votes in the next election. How did our election system get so vulnerable, and why haven't officials tried harder to fix it? The answer, ultimately, comes down to politics and money: The voting machines are made by well-connected private companies that wield immense control over their proprietary software, often fighting vigorously in court to prevent anyone from examining it when things go awry. The stakes are high. But the focus on Russia, or any would-be election manipulators, ignores the underlying issue – the myriad vulnerabilities that riddle the system and the ill-considered decisions that got us here.
Note: Why is it that the U.S. government is not allowed to have oversight over the companies that build and maintain voting machines and databases? What if one or more of them is bought off by a foreign or event domestic interest? Isn't this crazy? The major media have severely neglected reporting on elections manipulations that have been going on for many decades. For undeniable evidence of this, see our Elections Information Center.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.