Government Corruption News StoriesExcerpts of Key Government Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. This sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.” One previously undisclosed top-secret document–prepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda. Those programs, carried out in secrecy and with little accountability ... threaten the integrity of the internet itself, as state-disseminated propaganda masquerades as free online speech and organizing. There is thus little or no ability for an internet user to know when they are being covertly propagandized by their government, which is precisely what makes it so appealing to intelligence agencies, so powerful, and so dangerous.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Since [the days of Al Capone,] Chicago officials have awarded "Public Enemy No 1" status to only one other person: cartel billionaire Joaqun Guzmn Loera, better known now to the world over as "El Chapo". But nearly seven weeks before [his February] capture at a beach resort, the Mexican newspaper El Universal reported how US agencies had armed and financed El Chapo's Sinaloa criminal empire for at least 12 years. That link has been substantiated by DEA and Justice Department court testimonies, and even US agents confirmed the financing had been approved by high-ranking officials and federal prosecutors. But the American media barely reported how entrenched the American government has become in the Mexican drug trade. The latest installment of the "war on drugs" has killed 100,000 people since its official declaration by Mexican President Filipe Calderon and US President George W Bush in 2006. During this period, the US-El Chapo partnership was reportedly never closer: under the deal, Washington allowed El Chapo's Sinaloa cartel to carry on business as usual while top Sinaola members, for their part, provided information on their rivals. DEA agents met with their informants more than 50 times, El Universal reported, as the agents offered their whisperers immunity. American patronage goes well beyond stoking the largest and most powerful of the Mexican cartels (Sinaloa), as well as the most heinous (Golfo and Los Zetas). Drug arrests of cartel associates amounted to less than 2% of over 50,000 arrests made in the first four years of the Bush-Calderon partnership.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
A big puzzle looms over the U.S. economy: Only 63.2% of Americans 16 or older are participating in the labor force, which ... is down substantially since 2000. As recently as the late 1990s, the U.S. was a nation in which employment, job creation and labor force participation went hand in hand. That is no longer the case. The unemployment rate, the figure that dominates reporting on the economy, is the fraction of the labor force (those working or seeking work) that is unemployed. This rate has declined slowly since the end of the Great Recession. What hasn't recovered over that same period is the labor force participation rate, which today stands roughly where it did in 1977. Labor force participation rates increased from the mid-1960s through the 1990s, driven by more women entering the workforce, baby boomers entering prime working years in the 1970s and 1980s, and increasing pay for skilled laborers. But over the past decade, these trends have leveled off. At the same time, the participation rate has fallen, particularly in the aftermath of the recession. The drop is a function of various factors, including simple discouragement, poor work incentives created by public policies, inadequate schooling and training, and a greater propensity to seek disability insurance. Globalization and technological change have also reduced employment and wage growth for low-skilled workers—which raises questions about whether current policy is focused enough on helping workers to achieve the skills necessary to work productively and earn decent incomes.
Note: For more on the devastating impact of financial power and government policy on US workers, see the deeply revealing reports from reliable major media sources available here.
Mainstream media, cued by corporate press releases, routinely claim that America’s schools are markedly inferior to schools in other developed nations. The claim is part of an organized, long-running, generously funded campaign to undermine confidence in public schools to “prove” the need to privatize them. Educators have been handicapped for more than a century by a curriculum adopted to serve a too-narrow purpose—admission to college—and failure to address that curriculum’s problems has made the institution vulnerable to destructive corporate and political manipulation. Below are brief descriptions of some of the more obvious of those problems. 1. The standard core curriculum is stuck in the past. Adopted in the late 19th Century, the curriculum now shaping America’s schools reflects the “big idea” of that earlier era—the factory system, standardization of parts, mass production, centralized decision making, and passive worker compliance. None of those fit the present era. 2. The standard core curriculum is so inefficient it leaves little or no time for apprenticeships, internships, co-op programs, projects, and other ways of “learning by doing” (which is how most of us learned most of what we know). 3. The standard core curriculum gives thought processes other than recall short shrift, or no attention at all. The ability to remember is, of course, important, but the main educational challenge—making better sense of real-world experience—requires the ability not merely to recall but to infer, generalize, hypothesize, relate, synthesize, value, and so on. 4. The standard core curriculum ignores vast and important fields of knowledge.
Last week, Stanford University and New York University released a major study about the use of drones in the ever-evolving but never-ending war on terror. Drones are terrorizing an entire civilian population. [We] spent weeks in Pakistan interviewing more than 60 people from North Waziristan. Many were survivors of strikes. Others had lost loved ones and family members. All of them live under the constant threat of annihilation. What my colleagues and I learned from these unnamed and unknown victims of America's drone warfare gave the report its title: "Living Under Drones." Drones are a constant presence in the skies above the North Waziristan tribal area in Pakistan, with as many as six hovering over villages at any one time. People hear them day and night. They are an inescapable presence, the looming specter of death from above. And that presence is steadily destroying a community twice the size of Rhode Island. The routines of daily life have been ripped to shreds. Indisputably innocent people cower in their homes, afraid to assemble on the streets. "Double taps," or secondary strikes on the same target, have stopped residents from aiding those who have been injured. A leading humanitarian agency now delays assistance by an astonishing six hours. What makes this situation even worse is that no one can tell people in these communities what they can do to make themselves safe. No one knows who is on the American kill list, no one knows how they got there and no one knows what they can do to get themselves off. It's all terrifyingly random. Suddenly, and without warning, a missile launches and obliterates everyone within a 16-yard radius.
Note: The author of this report, Jennifer Gibson, is a staff attorney with Reprieve, a London-based legal charity that represents dozens of Pakistani drone victims. For an excellent, seven-minute video by professors exploring the tragic reality of drone strikes in Pakistan, click here. For the "Living Under Drones" website where you can read a summary and download this report by Stanford University and the New York Times, click here. To learn about a beautiful movement to place large photos of children's faces in target areas to stop drone operators from killing innocents, click here.
At the height of the Cold War, the CIA conducted covert, illegal scientific research on human subjects. Known as Project MK-ULTRA, the program subjected humans to experiments with drugs such as LSD and barbiturates, hypnosis and (some reports indicate) radiological and biological agents. In 1973, CIA Director Richard Helms ordered all documents from Project MK-ULTRA destroyed. Nevertheless, late the following year, the New York Times reported on the illegal activities. In 1975, the Church Committee, headed by Senator Frank Church, and a commission headed by Vice President Nelson Rockefeller investigated the project. They found that over more than two decades, the CIA spent nearly $20 million, enlisted the services of researchers at more than 30 universities and conducted experiments on subjects without their knowledge. Some of the research was performed in Canada. Some historians argue that the goal of the program was to create a mind-control system by which the CIA could program people to conduct assassinations. In 1953, Richard Condon dramatized the idea in the thriller The Manchurian Candidate, which was adapted into a film starring Frank Sinatra. Such ultimately wacky ideas were also dramatized in the recent George Clooney film The Men Who Stare at Goats.
Note: For more on CIA mind control experiments, see the extensive documentation available here.
Secret documents newly disclosed by the German news magazine Der Spiegel ... shed more light on how aggressively the National Security Agency and its British counterpart have targeted Germany for surveillance. A series of classified files from the archive provided to reporters by NSA whistleblower Edward Snowden ... reveal that the NSA appears to have included Merkel in a surveillance database alongside more than 100 other foreign leaders. The documents also confirm for the first time that, in March 2013, the NSA obtained a top-secret court order against Germany as part of U.S. government efforts to monitor communications related to the country. [A] document, dated 2009, indicates that Merkel was targeted in a broader NSA surveillance effort. She appears to have been placed in the NSA’s so-called “Target Knowledge Base“ (TKB), which Der Spiegel described as the central agency database of individual targets. An internal NSA description states that employees can use it to analyze “complete profiles“ of targeted people. But the NSA’s surveillance of Germany has extended far beyond its leader. A separate document from the NSA’s Special Source Operations unit ... shows that the Obama administration obtained a top-secret court order specifically permitting it to monitor communications related to Germany. Special Source Operations is the NSA department that manages what the agency describes as its “corporate partnerships” with major US companies, including AT&T, Verizon, Microsoft, and Google.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
US intelligence chiefs have confirmed that the National Security Agency has [performed] warrantless searches on Americans’ communications. The NSA's collection programs are ostensibly targeted at foreigners, but in August the Guardian revealed a secret rule change allowing NSA analysts to search for Americans' details within the databases. Now, in a letter to Senator Ron Wyden, an Oregon Democrat on the intelligence committee, the director of national intelligence, James Clapper, has confirmed the use of this legal authority to search for data related to “US persons”. The legal authority to perform the searches, revealed in top-secret NSA documents provided ... by Edward Snowden, was denounced by Wyden as a “backdoor search loophole.” Many of the NSA's most controversial programs collect information under the law affected by the so-called loophole. These include Prism, which allows the agency to collect data from Google, Apple, Facebook, Yahoo and other tech companies, and the agency's Upstream program – a huge network of internet cable taps. Confirmation that the NSA has searched for Americans’ communications in its phone call and email databases complicates President Barack Obama’s initial defenses of the broad surveillance in June. Wyden and Udall [said] “Today’s admission by the Director of National Intelligence is further proof that meaningful surveillance reform must include closing the back-door searches loophole and requiring the intelligence community to show probable cause before deliberately searching through ... the communications of individual Americans."
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The Obama administration on [April 3] defended its creation of a Twitter-like Cuban communications network [called ZunZuneo] to undermine the Communist government, declaring the secret program was "invested and debated" by Congress and wasn't a covert operation that required White House approval. But two senior Democrats on congressional intelligence and judiciary committees said they had known nothing about the effort. An Associated Press investigation found that the network was built with secret shell companies and financed through a foreign bank. The project, which lasted more than two years and drew tens of thousands of subscribers, sought to evade Cuba's stranglehold on the Internet with a primitive social media platform. First, the network was to build a Cuban audience, mostly young people. Then, the plan was to push them toward dissent. Yet its users were neither aware it was created by [USAID, the U.S. Agency for International Development] with ties to the State Department, nor that American contractors were gathering personal data about them, in the hope that the information might be used someday for political purposes. Josefina Vidal, director of U.S. affairs at Cuba's Foreign Ministry, said ... that the ZunZuneo program "shows once again that the United States government has not renounced its plans of subversion against Cuba, which have as their aim the creation of situations of destabilization in our country to create changes in the public order and toward which it continues to devote multimillion-dollar budgets each year."
Note: If any other country did this to the U.S., how do you think the U.S. government would respond?
Three days after an FBI agent was cleared of wrongdoing in the bizarre killing of an associate of slain Boston bombing suspect Tamerlan Tsarnaev, lawyers for Dzhokhar Tsarnaev, the only surviving bombing suspect, alleged that the FBI attempted to recruit the elder Tsarnaev as an informant. Dzhokhar Tsarnaev’s defense team said that new information suggests the FBI interviewed Tamerlan on several occasions before the attack, and even pressured him to surreptitiously report on the Chechen underworld. The Bureau has continued to emphatically state that it didn’t know the identities of the two suspected bombers until they were fingerprinted, and have denied any involvement with the brothers aside from following up on a tip from a Russian emissary that the elder Tsarnaev may have been seeking jihad. In the case of Ibragim Todashev, who allegedly took part with Tamerlan in a robbery turned triple-homicide in Waltham, in 2011, family members have also stated that FBI pressure may have pushed the 20-something ethnic Chechen and mixed martial arts fighter to the brink of violence. Since the terrorist attacks of 9/11, the Bureau has stepped up surveillance of specific racial, ethnic and religious communities, including the use of informants. The tactics have ... left the Bureau open to charges of entrapment, not to mention assorted Internet conspiracy theories. Part of those post-9/11 tactics are the use of “voluntary interviews … often encouraging interviewees to serve as informants in their communities,” writes the American Civil Liberties Union.
Note: Why didn't the FBI reveal its attempt to recruit the elder Tsarnaev when the bombing happened? Something is quite fishy here.
As constitutional scholars digest the [Supreme Court’s latest decision freeing donors to spend more money on campaigns], it has already set off a bipartisan scramble for campaign cash, thrusting party leaders, lawmakers with leadership PACs, and candidates into a fierce competition. The ruling allows donors to make the maximum contribution to an unlimited number of campaigns, freeing donors from caps that required them to pick and prioritize from among each party’s candidates and national committees. And while the decision could inject tens of millions of additional dollars into the 2014 races, it has also left some candidates and party leaders with a new concern: that the biggest donors will get tired of writing new checks. Fund-raisers and donors in both parties said they had begun to get a wave of tentative and not-so-tentative requests for new checks or future commitments, as the leaders of the parties’ congressional wings compete with each other and with the Republican and Democratic National Committees. All are focusing on a relatively limited group of donors in both parties who appeared to have given the maximum allowed or come close to the old cap — the people most likely to write additional checks after [the court’s] decision.
Note: For more on corruption in the US electoral process, see the deeply revealing reports from reliable major media sources available here.
A Senate intelligence committee investigation found that the Central Intelligence Agency employed brutal interrogation methods that turned out to be largely useless and then lied about their effectiveness. The Senate report contradicts the main defenses of the Bush-era torture program: That harsh methods were needed to produce "actionable results," and that the program itself helped save American lives by foiling terror attacks. Instead, the CIA overstated the effectiveness of the program and concealed the harshness of the methods they used. Intelligence breakthroughs credited to the “enhanced interrogation” program by the CIA were instead gleaned through other means, and then used by the agency to bolster defenses of the program. Conservative media figures incessantly hyped former Bush administration officials’ at times verifiably false claims about the efficacy of the program. The Bush administration’s trip to the “dark side” provided pundits, op-ed columnists, and other media personalities an endless stream of satisfaction from talking like the greased up protagonists of 1980s action films.
Note: For an article explaining how even though this report may be declassified, the public will not have access to most of it, click here. For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
A judge who sentenced a wealthy du Pont heir to probation in the rape of his three-year-old daughter said in court documents that he would "not fare well" in prison. The rape case against Robert H. Richards IV became public this month after his ex-wife reportedly filed a lawsuit seeking damages for the abuse of his daughter. According to a lawsuit filed by his ex-wife, Richards raped his daughter, now 11, in 2005 when she was 3, telling her "to keep what he had done to her a secret." The girl told her grandmother in October 2007, and Richards pleaded guilty in June 2008 to one count of fourth-degree rape to avoid jail time, court records show. The lawsuit also alleged that Richards abused his toddler son. Superior Court Judge Jan Jurden's sentencing order for Richards suggested that he needed treatment instead of prison time and considered unique circumstances when deciding his fate, reports the [News Journal of Delaware]. Attorney General Beau Biden initially indicted Richards on two counts of second-degree rape of a child, punishable by ten years in prison for each count. But as part of a plea agreement days before his 2008 trial, Richards pleaded guilty to fourth-degree rape -- reportedly a Class C violent felony that can bring up to 15 years in prison, though guidelines suggest zero to 2 1/2 years. At Richards' 2009 sentencing, prosecutor Renee Hrivnak recommended probation. Richards, a great-grandson of du Pont patriarch Irenee du Pont, is unemployed and supported by a trust fund, [and] owns a 5,800-square-foot mansion in Greenville and a home in the exclusive North Shores neighborhood near Rehoboth Beach.
Note: For more on sexual abuse scandals, see the deeply revealing reports from reliable major media sources available here.
In 2009, when Robert H Richard IV, an unemployed heir to the DuPont family fortune, pled guilty to fourth-degree rape of his three-year-old daughter, a judge spared him a justifiable sentence – indeed, only put Richard on probation – because she figured this 1-percenter would "not fare well" in a prison setting. Richard’s ex-wife filed a new lawsuit accusing him of also sexually abusing their son. Since then, the original verdict has been fueling some angry speculation ... that the defendant's wealth and status may have played a role in his lenient sentencing. Inequality defines our criminal justice system just as it defines our society. It always has and it always will until we do something about it. America incarcerates more people than any other country on the planet, with over 2m currently in prison and more than 7m under some form of correctional supervision. More than 60% are racial and ethnic minorities, and the vast majority are poor. There is an abundance of evidence ... that both conscious and unconscious bias permeate every aspect of the criminal justice system, from arrests to sentencing and beyond. Unsurprisingly, this bias works in favor of wealthy (and white) defendants, while poor minorities routinely suffer. In August of last year the Sentencing Project, a non-profit devoted to criminal justice reform, released a comprehensive report on bias in the system. This is the sentence you need to remember: "The United States in effect operates two distinct criminal justice systems: one for wealthy people and another for poor people and minorities."
Note: For more on systemic injustice within the US prison/industrial complex, see the deeply revealing reports from reliable major media sources available here.
Venezuelans ... have built a participatory democratic movement from the grass roots that has ensured that both power and resources are equitably distributed among our people. According to the United Nations, Venezuela has consistently reduced inequality: It now has the lowest income inequality in the region. We have reduced poverty enormously — to 25.4 percent in 2012, on the World Bank’s data, from 49 percent in 1998; in the same period, according to government statistics, extreme poverty diminished to 6 percent from 21 percent. We have created flagship universal health care and education programs, free to our citizens nationwide. We have achieved these feats in large part by using revenue from Venezuelan oil. Since 1998, the movement founded by Hugo Chávez has won more than a dozen presidential, parliamentary and local elections through an electoral process that former American President Jimmy Carter has called “the best in the world.” Recently, the United Socialist Party received an overwhelming mandate in mayoral elections in December 2013, winning 255 out of 337 municipalities. Popular participation in politics in Venezuela has increased dramatically over the past decade. The claims that Venezuela has a deficient democracy and that current protests represent mainstream sentiment are belied by the facts. The antigovernment protests are being carried out by people in the wealthier segments of society who seek to reverse the gains of the democratic process that have benefited the vast majority of the people.
Note: This article was written by Nicolás Maduro, the president of Venezuela. We have long observed a strong media bias against Venezuela. Thanks to the New York Times for finally printing an article in support of this country which, despite its problems, has made remarkable strides in recent years.
China has allowed direct domestic trading of the yuan against the New Zealand dollar to encourage such trading as it internationalizes the Chinese currency. The move ... comes after China doubled the yuan's trading band over the weekend in a milestone step that gives investors more freedom to set the value of the tightly controlled currency. The move was seen as promoting trade between the two countries, which rose 25.2 percent to NZ$18.2 billion ($15.71 billion) in 2013. As part of China's sweeping plans to overhaul its maturing economy and let market forces drive a host of industries, the government wants to gradually relax its hold over the yuan and turn it into a global reserve currency that one day rivals the dollar. The government's wish to promote international use of the yuan is partly driven by its concern that China is too vulnerable to the fluctuating value of the dollar. China is home to the world's largest foreign exchange reserves, worth $3.82 trillion at the end of last year. About a third is invested in U.S. government bonds. To promote international use of the yuan, China has signed a series of currency swaps with foreign governments in order to increase the overseas circulation of the Chinese currency. The New Zealand dollar is the 10th foreign currency that can be directly traded against the yuan in China.
Note: The US dollar's role as a global currency is gradually fading.
Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process. The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks. The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic. In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
Note: For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
In mid-February, [reporter Matt] Taibbi announced he was leaving Rolling Stone, where he has worked for almost a decade, to start a digital magazine for First Look Media, the company owned by eBay billionaire Pierre Omidyar. The last few weeks have been consumed with business matters—hiring editorial staff, signing off on designs. Taibbi won’t discuss the exact format of the new venture, nor its name—that’s still being worked out, too—but he sees it focusing, in part, on the same matters of corporate malfeasance he’s been covering for years. What people expect, of course, is the ribald, loudly antagonistic voice of a writer who is, in his own words, “full of outrage.” The guy who compared Goldman Sachs to a “vampire squid wrapped around the face of humanity, relentlessly jamming its blood funnel into anything that smells like money.” None of Taibbi’s anger at the “toothlessness” of the media has dissipated. Taibbi says his decision to leave Rolling Stone was predicated in part on ... his desire to “be on Glenn’s side.” Glenn being Glenn Greenwald, who, along with Laura Poitras and Jeremy Scahill, is currently editing another First Look property, the national-security-centric The Intercept, which has been live since February. “Glenn’s in this position of being a reporter trying to put out material that came from a whistle-blower, and now they’re both essentially in exile. It’s crazy. If the press corps that existed in the ’60s and ’70s had seen this situation, they’d be rising as one and denouncing the government for it,” Taibbi says.
Note: For more on corporate corruption, see the deeply revealing reports from reliable major media sources available here.
Nearly half of American adults believe the federal government, corporations or both are involved in at least one conspiracy to cover up health information, a new survey finds. Conspiracy theories on everything from cancer cures to cellphones to vaccines are well known and accepted by sizable segments of the population, according to a research letter published this week in JAMA Internal Medicine. The findings reflect "a very low level of trust" in government and business, especially in pharmaceutical companies, says study co-author Eric Oliver, a professor of political science at the University of Chicago. The online survey of 1,351 adults found: • 37% agree the Food and Drug Administration is keeping "natural cures for cancer and other diseases" away from the public because of "pressure from drug companies." • 20% believe health officials are hiding evidence that cellphones cause cancer. • 20% believe doctors and health officials push child vaccines even though they "know these vaccines cause autism and other psychological disorders." • Smaller numbers endorse theories involving fluoride, genetically modified foods and the deliberate infection of African Americans with HIV. • 49% believe at least one of the theories and 18% believe at least three. The beliefs also go along with certain health behaviors, the survey found. Those who believe at least three health conspiracy theories are less likely to use sunscreen, get flu shots or get check-ups and are more likely to use herbal remedies and eat organic foods.
Note: For an intriguing list of 10 major health cover-ups with evidence to back it up, click here.
The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden. A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere. In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary. Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage. At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.
Note: Though technically it is illegal for the NSA to snoop on Americans without good cause, all they have to do is to share this technology with another country like the UK, and then ask the UK to do the snooping and send the results back to them, thereby circumventing the law. For more on NSA surveillance, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.