Government Corruption News StoriesExcerpts of Key Government Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The first hearing in the Scottish child abuse inquiry has heard apologies from organisations which ran children's homes around the country. More than 60 institutions, including several top private schools and church bodies, are being investigated. The inquiry, which is being chaired by Lady Smith, is looking in detail at historical abuse of children in residential care. It is expected to report in late 2019 - four years after it was set up. The opening session in Edinburgh heard apologies from groups who said they "deplored that physical sexual abuses could occur". The High Court judge revealed the number of survivors who had already spoken to the inquiry team was "very far in excess" of 200. The inquiry states its purpose as being "to investigate the nature and extent of abuse of children whilst in care in Scotland", while considering "the extent to which institutions and bodies with legal responsibility for the care of children failed in their duty", in particular seeking any "systemic failures". The inquiry has been plagued by problems since it was set up in October 2015. Around Ł6m has been spent on it during this period. Its original chairwoman, Susan O'Brien QC, resigned from her post in July 2016, citing government interference. A second panel member, Prof Michael Lamb, also resigned, claiming the inquiry was "doomed".
Note: Watch an excellent segment by Australia's "60-Minutes" team "Spies, Lords and Predators" on a pedophile ring in the UK which leads directly to the highest levels of government. A second suppressed documentary, "Conspiracy of Silence," goes even deeper into this topic in the US. For more, see concise summaries of sexual abuse scandal news articles.
A shadowy international mercenary and security firm known as TigerSwan targeted the movement opposed to the Dakota Access Pipeline with military-style counterterrorism measures, collaborating closely with police in at least five states. TigerSwan, [working] at the behest of its client Energy Transfer Partners, the company building the Dakota Access Pipeline, [described] the movement as “an ideologically driven insurgency with a strong religious component” and [compared] the anti-pipeline water protectors to jihadist fighters. “Daily intelligence updates” developed by TigerSwan ... were shared with law enforcement officers, thus contributing to a broad public-private intelligence dragnet. [Leaked] documents ... also reveal a widespread and sustained campaign of infiltration of protest camps and activist circles. TigerSwan agents using false names and identities regularly sought to obtain the trust of protesters, which they used to gather information they reported back to their employer. In an October 3 report, TigerSwan discusses how to use its knowledge of internal camp dynamics: “Exploitation of ongoing native versus non-native rifts, and tribal rifts between peaceful and violent elements is critical in our effort to delegitimize the anti-DAPL movement.” The way TigerSwan discusses protesters as “terrorists,” their direct actions as “attacks,” and the camps as a “battlefield,” reveals how the protesters’ dissent was not only criminalized but treated as a national security threat.
Note: The above article is part of an in-depth series, and includes many original source documents. Standing Rock activists were also targeted for investigation by the FBI’s joint terrorism taskforce. For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the erosion of civil liberties.
They wanted to kill landmark privacy regulations that would soon ban Internet providers, such as Comcast and AT&T, from storing and selling customers’ browsing histories without their express consent. While the nation was distracted by the House’s pending vote to repeal Obamacare, Senate Republicans would schedule a vote to wipe out the new privacy protections. On March 23, the measure passed on a straight party-line vote, 50 to 48. President Trump signed the bill in early April without ceremony or public comment. “While everyone was focused on the latest headline crisis coming out of the White House, Congress was able to roll back privacy,” said former Federal Communications Commission chairman Tom Wheeler, who worked for nearly two years to pass the rules. The process to eliminate them took only a matter of weeks. The Internet privacy rules were adopted ... after an intense battle that pitted large Internet service providers, the advertising industry and tech giants against consumer advocates and civil rights groups. The rules required Internet service providers to get explicit consent before they gather their customers’ data - their browsing histories, the locations of businesses they physically visit and the mobile applications they use - and sell it to third parties. The requirements were modeled after a law passed decades ago by Congress that prohibited telephone companies from collecting customers’ calling histories and selling the information to third parties.
Note: For more along these lines, see concise summaries of deeply revealing news articles about government corruption and the disappearance of privacy.
The White House disclosed Wednesday evening that it has granted ethics waivers to 17 specific appointees who work for President Donald Trump and Vice President Mike Pence, including four former lobbyists. The waivers exempt the appointees from certain portions of ethics rules aimed at barring potential conflicts of interest. In addition, a blanket waiver was given to all executive office appointees to interact with news organisations. Three of the former lobbyists given waivers to work in the White House serve as staffers to the National Economic Council, headed by former Goldman Sachs executive Gary Cohn. (Cohn himself did not need a waiver because he recuses himself from participating in matters specific to Goldman Sachs, according to a White House official.) His aides that received ethics exemptions include Michael Catanzaro, a domestic energy and environmental policy adviser. Catanzaro was granted permission to work on ... matters of interest to his former energy sector clients, including emissions regulations, clear air standards and renewable fuel standards. Shahira Knight, a White House adviser on tax and retirement policy, received a waiver to participate in a range of tax and financial policy matters. Knight, a former tax lobbyist, served as vice president of Fidelity Investments' public affairs and policy group. Trump's predecessors also issued ethics waivers to appointees who had potential conflicts of interest. The Obama administration handed out at least 66 such exemptions.
Note: Despite the White House's assurances to the contrary, the NEC's Gary Cohn is reportedly spearheading a plan to sell US infrastructure to large financial firms, including his former employer Goldman Sachs. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The controversy surrounding Adolf Hitler's skull fragments is a little embarrassing for the Russian secret services. In 2000 they presented a skull fragment and a piece of jawbone that they claimed were the remains of the Nazi leader. It was an attempt to quash ... rumors that he had escaped alive at the end of World War II. But in October US researchers presented the results of DNA tests on the skull and said it definitely didn't belong to the dictator. "The bone ... corresponds to a woman between the ages of 20 and 40," said Nick Bellantoni of the University of Connecticut. Russia's FSB intelligence service, the successor to the KGB, has now rejected the doubts. The bones are definitely Hitler's, Vasily Khristoforov, the director of the FSB archives, told the newspaper Izvestiya. Moscow is the only place with the mortal remains of Hitler, Khristoforov said. However, Bellantoni said he was allowed to work on the skull for an hour. When he flew home from Moscow he had two samples in his luggage: a sample from the skull fragment and one sample of blood from the sofa on which Hitler is said to have shot himself. Bellantoni was able to compare the bloodstains on the blood-stained fabric with photos the Soviets took after they seized Hitler's bunker in Berlin. The stains had matched those in the photos. The research showed that the sofa blood DNA did not match the skull DNA. The sofa blood was male and the skull belonged to a woman.
Note: Some believe that Hitler's death was faked. His remains were reportedly sent to Russia. This report is evidence in support of that. Another top Nazi killer, Dr. Aribert Heim, was captured, but very strangely never prosecuted, as reported in this ABC News article. For the deeper story behind the allowing of top Nazi doctors to escape, see this well researched piece.
The U.S. Army failed to properly monitor more than $1 billion worth of arms transfers in Iraq and Kuwait, according to a declassified government audit obtained by Amnesty International. Amnesty obtained the documents through Freedom of Information law requests. The groups research documents lax controls and record-keeping ... which has resulted in arms manufactured in the U.S. and other countries winding up in the hands of armed groups known to be committing war crimes and other atrocities, such as the Islamic State militant group (ISIS). The U.S. Department of Defense audit from September 2016 shows that the DoD did not have accurate, up-to-date records on the quantity and location of ... tens of thousands of assault rifles (worth $28 million), hundreds of mortar rounds and hundreds of Humvee armored vehicles destined for use by the central Iraqi Army. A previous DoD audit, in 2015, pointed to even less rigorous stockpile monitoring procedures being enforced by the Iraqi armed forces. Meanwhile, the Pentagon has overbilled the U.S. military for fuel by almost $6 billion over the past seven years, and then used the money to bolster underfunded or mismanaged defense programs, according to a report in The Washington Post on Saturday. Earlier, the federal Government Accountability Office criticized the U.S. for failing to account for thousands of rifles issued to Afghan security forces. The 2009 report said some weapons were documented to be in the hands of insurgents.
Note: Since 1996, approximately $10 trillion in taxpayer money has gone unaccounted for at the US Dept. of Defense. Read a verifiable and carefully researched report on the covert origins of ISIS. For more along these lines, see concise summaries of deeply revealing military corruption news articles from reliable major media sources.
Several officers of the U.S. Customs and Border Protection Agency have come forward with bombshell allegations against their colleagues at Newark Airport in New Jersey. Three officers told NBC New York they were sexually assaulted as part of disturbing rituals that involved being duct-taped to a table other officers called the “rape table.” While no one ever removed their clothes, other officers would forcibly rub their genital areas on the victims strapped to the table, as well as grab them. This practice has been happening for years. “Hazing wouldn’t do this justice,” CBP officer Vito Degironimo told NBC. “This is complete assault. They take you in a room and your fellow officers are all watching as officers grab you.” Diana Cifuentes and Dan Arencibia told the station they managed to avoid the table, but experienced other horrific harassment from colleagues. At one point, Cifuentes said, someone pointed a gun at her in the office. CBP agent [Charlie Smith] corroborated the trio’s allegations in an interview with the Daily Beast, saying he’s heard stories of 17 similar assaults. Smith, who began working at Newark in 2015, said he was “recently” transferred out for his own protection after he reported the assault against Degironimo to whistleblower hotlines. He also [said] that Degironimo had already reported the attack to his own supervisors, but instead of launching an internal investigation, management simply removed the table.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and sexual abuse scandals.
President Donald Trump's administration this week touted an infrastructure plan that would sell off public assets to private financial firms. Leading the White House privatization initiative is Gary Cohn, the former president of Goldman Sachs, who received a $285 million dollar payout upon ... taking a job as the director of Trump’s National Economic Council. As Cohn has led the infrastructure privatization initiative from that perch, Goldman Sachs declared that it continues to look at “new business initiatives” that revolve around taking ownership of public assets, according to Securities and Exchange Commission documents. Cohn is spearheading the administration’s infrastructure policy despite a White House official telling Bloomberg News in February that he “will recuse himself from participating in any matter directly involving his former employer.” That pledge seemed at the time to show that Cohn was following ethics rules ... enacted in January. Those rules require federal officials to sign an ethics pledge in which they agree to wait two years before they “participate in any particular matter involving specific parties that is directly and substantially related to my former employer.” Those rules, however, empower Trump to waive the restrictions whenever he wants. Whether or not Cohn has received such a waiver remains secret: the administration has not released a list of waivers, and has moved to block federal agencies from disclosing such waivers to federal ethics regulators.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the financial industry.
On the sixth anniversary of the first infamous "Cablegate" by WikiLeaks ... it has expanded its Public Library of US Diplomacy (PLUSD) with 531,525 new diplomatic cables from 1979. In a statement to coincide with the release of the cables, known as "Carter Cables III", Mr Assange explained how events which unfolded in 1979 had begun a series of events that led to the rise of ISIS: "The Iranian revolution, the Saudi Islamic uprising and the Egypt-Israel Camp David Accords led not only to the present regional power dynamic but decisively changed the relationship between oil, militant Islam and the world. "The uprising at Mecca permanently shifted Saudi Arabia towards Wahhabism, leading to the transnational spread of Islamic fundamentalism and the US-Saudi destabilisation of Afghanistan." He said at this point Osama bin Laden left his native Saudi Arabia for Pakistan to support the Afghan Mujahideen. He added: "The invasion of Afghanistan by the USSR would see Saudi Arabia and the CIA push billions of dollars to Mujahideen fighters as part of Operation Cyclone, fomenting the rise of al-Qaeda and the eventual collapse of the Soviet Union." The rise of al-Qaeda eventually bore the September 11, 2001 attacks in the United States, enabling the US invasion of Afghanistan and Iraq and over a decade of war, leaving, at its end, the ideological, financial and geographic basis for ISIS."
Note: Read a well-researched essay from the profound online book Lifting the Veil suggesting the War on Terror is a fraud. For more along these lines, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
A federal appeals court on Tuesday revived a high-profile challenge to the National Security Agency’s warrantless surveillance of internet communications. The ruling ... increases the chances that the Supreme Court may someday scrutinize whether the N.S.A.’s so-called upstream system for internet surveillance complies with Fourth Amendment privacy rights. The ruling reversed a Federal District Court judge’s decision to throw out the case. The district judge had ruled that the plaintiffs - including the Wikimedia Foundation - lacked standing to sue because they could not prove that their messages had been intercepted. Because of how the internet works, surveillance of communications crossing network switches is different from traditional circuit-based phone wiretapping. While the government can target a specific phone call without touching anyone else’s communications, it cannot simply intercept a surveillance target’s email. Instead ... to find such emails it is necessary first to systematically copy data packets crossing a network switch and sift them in search of components from any messages involving a target. Documents provided by [Edward] Snowden and declassified by the government have shown that this system works through equipment installed at the facilities of companies, like AT&T, that [connect] the American internet to the rest of the world. Privacy advocates contend that the initial copying and searching of all those data packets ... violates Fourth Amendment protections against government search and seizure.
Note: For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
President Donald Trump struck a series of deals with Saudi Arabia on his two-day visit but the kingdom is still anxiously waiting for him to deliver on something else: the repeal of a contentious 2016 law that allows relatives of 9/11 victims to sue the kingdom for their deaths. Saudi officials have been quietly lobbying the administration and Congress to overturn the Justice Against Sponsors of Terrorism Act, which led more than 800 families to file suit. Trump supported the bill and can’t do much to change it. Still, Saudis are convinced the man they consider the ultimate salesman will make a deal. Saudi Arabia’s energy minister, Khalid al Falih, said in an interview in March that his nation believed that the new administration and Congress would eventually reverse course. “If Trump supports the JASTA, he will lose the relationship with Saudi Arabia,” Mohammed Alhamza, a social researcher and writer, said bluntly through a translator. “Do you expect Trump will pass JASTA after (billions of) Saudi riyals went to the United States?” Alhamza asked, a reference to a series of agreements Trump and Saudi King Salman had signed totaling $360 billion in weapons sales and economic development. Congress passed [JASTA] last September ... after the release of a long-withheld 28-page section of the first U.S. report on the Sept. 11, 2001, terror attacks outlining possible links between the hijackers and Saudi officials. Saudi Arabia organized a massive lobbying to stop the legislation.
Note: An Obama-era presidential veto did not stop JASTA from moving forward. Neither did Saudi Arabia's influential charm offensive, or its $750 billion threat. For more along these lines, see concise summaries of deeply revealing 9/11 news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our 9/11 Information Center.
The High Plains dairy complex reflects the new scale of the U.S. organic industry: It is big. The complex is home to more than 15,000 cows, making it more than 100 times the size of a typical organic herd. It is the main facility of Aurora Organic Dairy, a company that produces enough milk to supply the house brands of Walmart, Costco and other major retailers. But a closer look at Aurora and other large operations highlights critical weaknesses in the unorthodox inspection system that the Agriculture Department uses to ensure that “organic” food is really organic. The critical issue is grazing. Organic dairies are required to allow the cows to graze daily throughout the growing season. The cows are supposed to be grass-fed, not confined to barns and feedlots. But during visits by The Washington Post to Aurora’s High Plains complex across eight days last year, signs of grazing were sparse, at best. During most Post visits the number of cows seen on pasture numbered only in the hundreds. The milk from Aurora also indicates that its cows may not graze as required by organic rules. Testing ... by Virginia Tech scientists shows that on a key indicator of grass-feeding, the Aurora milk matched conventional milk, not organic. The inspectors who visited Aurora’s High Plains dairy and certified it as “USDA Organic” ... conducted the annual audit well after grazing season, [and] would not have seen whether the cows were grazing as required, a breach of USDA inspection policy.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in the food system and in the corporate world.
A decade-old internet scourge called ransomware went mainstream on Friday when cybercriminals seized control of computers around the world, from the delivery giant FedEx in the United States to Britain’s public health system, universities in China and even Russia’s powerful Interior Ministry. Ransomware is nothing new. For years, there have been stories of individuals or companies horrified that they have been locked out of their computers and that the only way back in is to pay a ransom to someone, somewhere who has managed to take control. But computer criminals are discovering that ransomware is the most effective way to make money in the shortest amount of time. Friday’s attacks were a powerful escalation of earlier, much smaller episodes. Hackers exploited a vulnerability in Microsoft servers that was first discovered by the National Security Agency and then leaked online. It allowed the ransomware to spread [to] more than 70,000 organizations. There is even now a concept of “ransomware as a service” - a play on the Silicon Valley jargon “software as a service,” which describes the delivery of software over the internet. Now anyone can visit a web page, generate a ransomware file with the click of a mouse, encrypt someone’s systems and demand a ransom to restore access to the files. If the victim pays, the ransomware provider takes a cut of the payment. Ransomware criminals also have customer service lines that victims can call to get help paying a ransom.
Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
A handful of military personnel from the 4th Psychological Operations Group, based at Fort Bragg, NC, have until recently been working in CNN's headquarters in Atlanta. [A] Dutch journalist named Abe de Vries came up with this important story ... and remains properly astounded that no mainstream news medium in the US has evinced any interest in it. De Vries ... originally [came] upon the story [following] a military symposium in Arlington, VA that discussed the use of the press in military operations. De Vries saw a good story, picked up the phone, and finally reached Maj. Thomas Collins of the US Army Information Service, who duly confirmed the presence of these Army psy-ops experts at CNN. "Psy-ops personnel, soldiers, and officers," De Vries quoted Collins as telling him, "have been working in CNN's headquarters ... through our program, training with industry. They helped in the production of news." Eason Jordan, who identified himself as CNN's president of news-gathering and international networks, [confirmed] that CNN had hosted a total of five interns from US Army psy-ops. Jordan said the program began ... just before the end of the war against Serbia and only recently terminated. Executives at CNN now describe the Army psy-ops intern tours at CNN as having been insignificant. The commanding officer of the psy-ops group certainly thought them of sufficient significance to mention at that high-level Pentagon powwow in Arlington about propaganda and psychological warfare.
Note: This article strangely has been removed from the Los Angeles Times archives. The link above shows a scanned image of the actual newspaper. The article was first published in the San Jose Mercury News on March 23, 2000, though the article is also strangely not available in their archives. U.S. Congressional testimony in the 1970s revealed that the CIA paid employees of major media networks to influence public opinion. The CIA's Operation Mockingbird revealed blatant efforts by the CIA to manipulate public opinion in the U.S., thus violating its charter.
A cybersecurity taskforce chief turned child pornography collector seems poised to dodge prison. Before agents arrived at his house across from Ballard’s West Woodland Elementary School ... Brian Haller led the Seattle chapter of an FBI/private-sector group tasked with fighting computer crime. Haller had access to a secure FBI online platform and email system, though he is not alleged to have used either to collect child porn. Haller was one of the smaller fish caught in an expansive FBI sting last year. Agents found the law enforcement insider used a “dark web” service – a Tor network site – to collect 600 files capturing the sexual abuse and exploitation of countless children. Usually, Haller’s crimes could carry a five-year prison term. Instead, federal prosecutors have asked that Haller, 40, be spared even jail time when he is sentenced Friday for possession of child pornography. The standard sentencing range for a defendant like Haller is four to five years in federal prison. [Haller] was identified through a wide-ranging, controversial sting operation [that] has prompted charges against more than 130 others, including a Vancouver special education worker and a Fort Lewis soldier.
Note: It was reported in 2012 that two US states appeared to be "running state-protected child trafficking rings, with evidence of cops, judges, lawyers, clergy and government employees covering for each other." Watch an excellent segment by Australia's "60-Minutes" team "Spies, Lords and Predators" on a pedophile ring in the UK which leads directly to the highest levels of government. A second suppressed documentary, "Conspiracy of Silence," goes even deeper into this topic in the US. For more, see concise summaries of sexual abuse scandal news articles.
More than 20 states have proposed bills that would crack down on protests and demonstrations since Donald Trump was elected, in a move that UN experts have branded “incompatible with US obligations under international human rights law”. The proposed laws would variously increase the penalties for protesting in large groups, ban protesters from wearing masks during demonstrations and, in some states, protect drivers from liability if they strike someone taking part in a protest. The ACLU and the National Lawyers Guild have said many of the bills are likely unconstitutional. The flurry of legislation has prompted UN experts to intervene, with two special rapporteurs from the UN’s Office of the High Commissioner for Human Rights – the UN body which works to promote and protect human rights – to complain to the US state department at the end of March. In a recent letter to the government, David Kaye and Maina Kiai, from the Office of the High Commissioner for Human Rights (OHCHR), listed specific pieces of legislation which they said were “criminalizing peaceful protests”. Kaye and Kiai ... said the bills represent “a worrying trend that could result in a detrimental impact on the rights to freedom of peaceful assembly and freedom of expression in the country”.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
A US Central Command investigation found that a March US airstrike in northern Syria did in fact strike a building that was part of a "mosque complex." For days following the March 16 strike, the Pentagon adamantly rejected the notion that a mosque was hit and that there were civilian casualties - even as numerous social media reports showed images of bodies being taken out of the rubble. Instead, in the initial hours following the strike by US drones and aircraft, the Pentagon insisted that it hit only a building some 40 feet away from the mosque, where it said al Qaeda members were holding a meeting. Typically any religious structure would be on a so-called no-strike list, along with hospitals and schools. There are procedures to move structures off the no-strike list if it is clear they have lost their protected status because terrorists are using them and there are no civilians present. It is ... not clear if the building was listed as a religious site on a database that the mission planners were unaware of. One official said the investigation found that "religious use" was a primary function of the building at times. The day after the strike, Pentagon spokesman Capt. Jeff Davis told reporters: "We do not currently assess there were any civilian casualties."
Note: Record numbers of civilians have reportedly been killed by US-led strikes in recent months. Casualties of war whose identities are unknown are frequently misreported to be "militants". For more along these lines, see concise summaries of deeply revealing war news articles from reliable major media sources.
Decades later, it's hard to grasp what the federal government did to hundreds of black men in rural Alabama. For 40 years starting in 1932, medical workers in the segregated South withheld treatment for unsuspecting men infected with a sexually transmitted disease simply so doctors could track the ravages of the horrid illness and dissect their bodies afterward. Finally exposed in 1972, the study ended and the men sued, resulting in a $9 million settlement. Twenty years ago this May, then President Bill Clinton apologized for the U.S. government. But it did not mark the end of the study's ugly legacy. Relatives of the men still struggle with the stigma of being linked to the experiment, what's commonly known as the "Tuskegee Syphilis Study." In 1929, government doctors ... recruited 600 black men into a health program with the promise of free medical checks, free food, free transportation and burial insurance. Health workers told syphilitic fathers, grandfathers, sons, brothers and uncles only that they had "bad blood." None of the men was asked to consent to take part in a medical study, [or] told that "bad blood" actually was a euphemism for syphilis. Instead, doctors purposely hid the study's purpose from the men, subjecting them ... to painful spinal taps and blood tests. Medical workers periodically provided men with pills and tonic that made them believe they were being treated, but they weren't. And doctors never provided them with penicillin after it became the standard treatment for syphilis in the mid-1940s.
Note: The "Tuskegee Syphilis Study" is one of many known cases of humans being used as guinea pigs by corrupt scientists.
The story of Cambridge Analytica is one of the most profoundly unsettling of our time. SCL/Cambridge Analytica [is] effectively part of the ... defence establishment. This is not just a story about social psychology and data analytics. It has to be understood in terms of a military contractor using military strategies on a civilian population. David Miller, a professor of sociology ... and an authority in psyops and propaganda, says it is “an extraordinary scandal that this should be anywhere near a democracy.” David, [an] ex-Cambridge Analytica employee, [was] working at the firm when it introduced mass data-harvesting to its psychological warfare techniques. “It brought psychology, propaganda and technology together in this powerful new way,” David [said]. Facebook was the source of the psychological insights that enabled Cambridge Analytica to target individuals. The company ... bought consumer datasets – on everything from magazine subscriptions to airline travel – and uniquely it appended these with the psych data to voter files. “The goal is to capture every single aspect of every voter’s information environment,” said David. “And the personality data enabled Cambridge Analytica to craft individual messages.” Cambridge Analytica could target people high in neuroticism, for example, with images of immigrants “swamping” the country. Brexit came down to ... just over 1% of registered voters. It’s not a stretch to believe that ... the global 1% found a way to influence this crucial 1% of British voters.
Note: Another Guardian article recently exposed how billionaire Robert Mercer used new technology to build a corporate empire capable of swinging elections. The above article further details how mass media is being combined with Big Data to produce powerful new forms of mind control.
[The CIA] has since 1945 succeeded in deposing or killing a string of leaders, but was forced to cut back after a Senate investigation in the 1970s. Some of the most notorious of the CIAs operations to kill world leaders were those targeting the late Cuban president, Fidel Castro. Attempts ranged from snipers to imaginative plots worthy of spy movie fantasies. But although the CIA attempts proved fruitless in the case of Castro, the US intelligence agency has ... succeeded in deposing or killing a string of leaders elsewhere around the world either directly or, more often, using sympathetic local military, locally hired criminals or pliant dissidents. On Friday, [North Korea accused] the CIA and South Koreas intelligence service of being behind an alleged recent assassination attempt on its leader Kim Jong-un. Such a claim cannot be dismissed as totally outlandish given the long list of US involvement in coups and assassinations worldwide. The agency was forced to cut back on such killings after ... then president Gerald Ford signed in 1976 an executive order stating: No employee of the United States government shall engage in, or conspire in, political assassination. In spite of this, the US never totally abandoned the strategy, simply changing the terminology from assassination to targeted killings. A leaked document obtained by WikiLeaks and released earlier this year showed the CIA in October 2014 looking at hacking into car control systems, [potentially allowing] an agent to stage a car crash.
Note: Strong evidence suggests that courageous journalist Michael Hastings was killed when his car controls were hacked causing him to crash head on into a tree. For more along these lines, see concise summaries of deeply revealing news articles on verified or suspected assassinations from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.