Government Corruption News StoriesExcerpts of Key Government Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Sharp disagreement over the future of the Guantanamo Bay detention camp dominated the first Senate hearing on the issue in four years. The meeting [on July 24] of a Senate Judiciary Committee subcommittee, held in the wake of a high-profile hunger strike by inmates ... made clear that deep partisan divisions remain over whether keeping the prison open is a threat to national security or a necessity. Opened at a U.S. Navy base in Cuba in the months after the Sept. 11, 2001, terrorist attack, Guantanamo was established by President George W. Bush to hold detainees suspected of connections to global terrorism organizations. Allegations of abuse and torture of inmates have led to repeated calls for Guantanamo's closure, and Obama has campaigned twice on the issue, though Congress has passed repeated measures to keep the prison open. Sen. Richard J. Durbin (D-Ill.), who is chairman of the panel, urged Congress to support Obama's efforts, which would end the indefinite detention of prisoners without trial and either release them or charge them in American courts. "The risk of keeping it open far outranks the risk of closing it." Retired Army Maj. Gen. Paul D. Eaton, who trained the Iraqi armed forces from 2003 to 2004, testified that by continuing to violate human rights and American law, the practices at Guantanamo proved more harmful to the U.S. national security interests. "Guantanamo is a terrorist-creating organization," he said to a reporter after the hearing. "It's a terrific recruiting tool."
Note: Whether or not detainees were truly terrorists before they were imprisoned at Guantanamo, how do you think they feel about the US government after years there? You have to wonder if this isn't being done to create terrorists, just as many prisons become training grounds for criminals.
Pop quiz: Name a state residential school where children were enrolled in medical experiments over an almost 20-year period, in which they were unknowingly fed a steady diet of radioactive isotopes, subjected to regular blood draws, and placed in solitary confinement if they refused to cooperate. Answer: the Walter E. Fernald State School in Waltham [Mass.} during the mid 20th century. Unfortunately, as Allen Hornblum, Judith Newman, and Gregory Dober painfully describe in their chilling new book, Against Their Will: The Secret History of Medical Experimentation on Children in Cold War America, Fernald was not the only institution in the country, or even in the state, where children were conscripted into sometimes deadly medical experiments. These were conducted by ambitious physicians and scientists whose belief in what they were trying to accomplish often blinded them to the potentially horrific consequences of their actions. “Against Their Will’’ opens with an overview of the eugenics movement in the United States, which found sympathizers among many luminaries of American medicine in the 19th and early 20th centuries. With its disdain for the disabled, who were considered genetically inferior, the movement paved the way for use of “defective’’ children in research. The book then provides multiple examples of medical experiments perpetrated on developmentally delayed and physically disabled children at multiple institutions across the country over the course of decades, often reading like case studies straight out of the 1947 Nazi doctors’ trial.
Note: For a long list of verifiable incidents where unknowing citizens were used as guinea pigs on a massive scale, click here.
The American Civil Liberties Union is warning that law enforcement officials are using license plate scanners to amass massive and unregulated databases that can be used to track law-abiding citizens as their go about their daily lives. In a new report, "You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements," the ACLU discusses the data culled from license plate scanners - cameras mounted on patrol cars, overpasses and elsewhere to record your license plate number and location at a given time. There are tens of thousands such cameras now in operation, according to the group, with the data in some cases being stored indefinitely. The ACLU report is the result of an analysis of 26,000 pages of documents from police departments around the country, obtained through nearly 600 [FOIA] requests. It finds that while some jurisdictions keep the information gleaned from the scanners for a short time ... many hold onto the data for years. The organization complains that there are "virtually no rules in place" to keep officials from tracking "everybody all the time." The ACLU also warns that the data is being fed into larger databases, with the private National Vehicle Location Service now holding more than 800 million license plate records. The group's database is used by more than 2,200 law enforcement customers. The [ACLU] report warns that the data can be used in an official capacity to spy on protesters or target communities based on their religious beliefs, or unofficially by a police officer who wants to keep an eye on a romantic rival.
Note: For more on privacy, see the deeply revealing reports from reliable major media sources available here.
A Florida medical examiner’s office said [on July 16] that the FBI has ordered the office not to release its autopsy report of a Chechen man fatally shot by a Boston FBI agent in May. The medical examiner’s office said it completed the autopsy report on Ibragim Todashev, a friend of [a] suspected Boston Marathon bomber, on July 8 and that the report was “ready for release.” The agent shot and killed Todashev on May 22 in his Orlando apartment during an interrogation related to the Boston Marathon bombings. Critics have called for an independent inquiry, questioning the blanket of secrecy surrounding the case. The FBI and the Massachusetts State Police sought out Todashev after the Marathon bombings, but have refused to release details of the shooting. Media reports have provided conflicting accounts: Some said Todashev attacked the agent with a blade during an interrogation, while others said Todashev was unarmed. Another said he lunged at the agent with a metal pole or a broomstick. The agent shot Todashev multiple times, according to family members who released photos of Todashev’s dead body as part of their call for an inquiry into his death. Family members and advocacy groups have questioned the media accounts, pointing out that Todashev had repeatedly cooperated with the FBI. The Council on American-Islamic Relations and the ACLU have called for independent inquiries into the shooting. According to CAIR in Florida, which is conducting its own investigation into Todashev’s slaying, Todashev had spoken to the FBI at least three times at their offices after the Marathon bombings.
Note: What are they hiding here?
A cadre of six government and non-government experts who served the National Transportation Safety Board when that independent federal agency investigated the explosion of a Boeing 747 off the coast of Long Island in July 1996 ... are the protagonists of a new documentary, "TWA Flight 800". After four years of investigation, the NTSB claimed the cause of Flight 800's explosion was a mechanical defect, but the new documentary, written and directed by journalist Kristina Borjesson, claims the FBI, NTSB and other government agencies may have covered up that the plane was brought down by a missile strike. Participants in the film have called on the NTSB to reopen the case based on altered physical evidence, suppressed data, and unexamined testimony from hundreds of eyewitnesses. [The] book Attention All Passengers: The Airlines’ Dangerous Descent—and How to Reclaim Our Skies ... published last year ... thanked “the brave men and women who are Federal Aviation Administration, Transportation Security Administration, and airline whistleblowers.” These whistleblowers confirmed such problems as defective airline maintenance outsourcing, FAA oversight failures, TSA waste, and many other important findings. After watching the documentary, I believe there are enough smoking guns to warrant an unbiased reexamination. Last week one major news site was in near hysterics about the documentary, employing the term “conspiracy” ten times. Kristina Borjesson ... wasn’t surprised, noting that reexamining hot topics “discredits previous reporting.”
Note: Kristina Borjesson is a long-time supporter of WantToKnow.info who has written a great piece on Flight 800, which we have posted at this link. She's also the editor of what may be the best book ever on media corruption and manipulation, Into the Buzzsaw. You can find an excellent two-page summary of the book at this link. For the engaging trailer to this film, click here.
This Reuters article ... purports to summarize an interview I gave to the daily newspaper La Nacion of Argentina. Like everything in the matter of these NSA leaks, this interview is being wildly distorted to attract attention away from the revelations themselves. I made three points in this La Nacion interview, all of which are true: 1) The oft-repeated claim that Snowden's intent is to harm the US is completely negated by the reality that he has all sorts of documents that could quickly and seriously harm the US if disclosed, yet he has published none of those. When he gave us the documents he provided, he repeatedly insisted that we exercise rigorous journalistic judgment in deciding which documents should be published in the public interest and which ones should be concealed on the ground that the harm of publication outweighs the public value. 2) The US government has acted with wild irrationality. The current criticism of Snowden is that he's in Russia. But the reason he's in Russia isn't that he chose to be there. It's because the US blocked him from leaving: first by revoking his passport (with no due process or trial), then by pressuring its allies to deny airspace rights to any plane they thought might be carrying him to asylum (even one carrying the democratically elected president of a sovereign state), then by bullying small countries out of letting him land for re-fueling. 3) I said that [forcing his plane down] would be completely counter-productive given that ... such an attack could easily result in far more disclosures than allowing us as journalists to vet and responsibly report them, as we've [been] doing.
Note: The above article was written by brave journalist Glenn Greenwald, who broke the Snowden story. For more on the NSA surveillance scandal, see the deeply revealing reports from reliable major media sources available here.
The [UK] Government has issued more than 3,000 export licences for military and intelligence equipment worth a total of Ł12.3bn to countries which are on its own official list for human rights abuses. The existence of one licence to Israel and the Occupied Territories [is] worth Ł7.7bn. The scale and detail of the deals emerged after a forensic investigation by a committee of MPs, who also discovered that strategically controlled items have been sent to Iran, China, Sri Lanka, Russia, Belarus and Zimbabwe – all of which feature prominently on the Foreign Office’s list of states with worrying civil rights records. There are even three existing contracts for Syria, notwithstanding the fact that the UK is sending equipment to rebels fighting the Assad regime and is considering arming them. There are also 57 for Argentina, which is not on the list, but which remains in confrontation with Britain over the Falklands. The Government had stated that it would not issue export licences for goods “which might be used to facilitate internal repression” or “might provoke or prolong regional or internal conflicts”. However, the report by the Committees on Arms Export Controls found there were 62 licences for selling to Iran, ... overwhelmingly cryptographic equipment. This also features heavily in the 271 licences for Russia, along with biotechnology equipment, sniper rifles, laser weapons systems, weapon sights and unmanned air vehicles (drones).
Note: For more on war profiteering, see the deeply revealing reports from reliable major media sources available here.
A simian virus known as SV40 has been associated with a number of rare human cancers. This same virus contaminated the polio vaccine administered to 98 million Americans from 1955 to 1963. Federal health officials see little reason for concern. A growing cadre of medical researchers disagree. A breakthrough in the war against polio had come in the early 1950s, when Jonas Salk took advantage of a new discovery: monkey kidneys could be used to culture the abundant quantities of polio virus necessary to mass-produce a vaccine. But there were problems with the monkey kidneys. In 1960 Bernice Eddy, a government researcher, discovered that when she injected hamsters with the kidney mixture on which the vaccine was cultured, they developed tumors. Eddy's superiors tried to keep the discovery quiet, but Eddy presented her data at a cancer conference in New York. She was eventually demoted, and lost her laboratory. The cancer-causing virus was soon isolated by other scientists and dubbed SV40, because it was the fortieth simian virus discovered. Alarm spread through the scientific community as researchers realized that nearly every dose of the vaccine had been contaminated. In 1961 federal health officials ordered vaccine manufacturers to screen for the virus and eliminate it from the vaccine. Worried about creating a panic, they kept the discovery of SV40 under wraps and never recalled existing stocks. For two more years millions of additional people were needlessly exposed -- bringing the total to 98 million Americans from 1955 to 1963.
Note: This fascinating report on modern research into SV40's role in human cancers is well worth reading in its entirety at the link above. It is most strange that the CDC posted a webpage stating "it has been estimated that 10–30 million Americans could have received an SV40 contaminated dose of vaccine" and much more, but the webpage was then taken down. Using the Internet Archive, you can still see the revealing page that has been removed at this link.
Members of a congressional committee [on July 10] accused the FBI of stalling an inquiry into the Boston Marathon bombings, saying the bureau had no grounds for withholding what it knew about Tamerlan Tsarnaev prior to the attacks. “The information requested by this committee belongs to the American people,’’ said Representative Michael McCaul, a Texas Republican who chairs the House Homeland Security Committee. “It does not belong solely to the FBI.” The frustrations, aired publicly after FBI officials rebuffed an invitation to appear before the committee, stemmed from the FBI’s unwillingness to detail how it handled a security review of Tsarnaev nearly two years before the Marathon bombings. “The FBI continues to refuse this committee’s appropriate requests for information and documents crucial to our investigation into what happened in Boston,” McCaul declared as he opened a committee hearing. Tsarnaev died after a firefight with police in Watertown within hours of being identified as a suspect. Members were particularly frustrated by a July 3 letter to the committee from the FBI. The letter, reviewed by the Globe, said the bureau would not be responding to all the committee’s requests for information. “The fact that the FBI is not sharing information with this committee with jurisdiction over homeland security I think is just totally unacceptable,” said Representative Peter King, a New York Republican.
Note: For more strangeness around the Boston bombing with a key witness being deported, click here. For more on the realities of intelligence agency manipulations, see the deeply revealing reports from reliable major media sources available here.
The top U.S. special operations commander, Adm. William McRaven, ordered military files about the Navy SEAL raid on Osama bin Laden's hideout to be purged from Defense Department computers and sent to the CIA, where they could be more easily shielded from ever being made public. The secret move, described briefly in a draft report by the Pentagon's inspector general, set off no alarms within the Obama administration even though it appears to have sidestepped federal rules and perhaps also the U.S. Freedom of Information Act. The CIA, noting that the bin Laden mission was overseen by then-CIA Director Leon Panetta before he became defense secretary, said that the SEALs were effectively assigned to work temporarily for the CIA, which has presidential authority to conduct covert operations. The records transfer was part of an effort by McRaven to protect the names of the personnel involved in the raid, according to the inspector general's draft report. But secretly moving the records allowed the Pentagon to tell The Associated Press that it couldn't find any documents inside the Defense Department that AP had requested more than two years ago, and would represent a new strategy for the U.S. government to shield even its most sensitive activities from public scrutiny. "Welcome to the shell game in place of open government," said Thomas Blanton, director of the National Security Archive, a private research institute at George Washington University. "Guess which shell the records are under. If you guess the right shell, we might show them to you. It's ridiculous."
Note: For a powerful analysis of the strong evidence that Osama bin Laden most likely died in Afghanistan in December 2001, long before he was "killed" by the SEALs raid in Pakistan, read David Ray Griffin's Osama bin Laden: Dead or Alive? For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
A professor at an Indiana college says he has found film footage showing President Franklin Delano Roosevelt being pushed in his wheelchair, depicting a secret that was hidden from the public until after his death. Ray Begovich, a journalism professor at Franklin College south of Indianapolis, said ... he found the eight-second clip while conducting unrelated research in the National Archives in College Park, Md. Roosevelt contracted polio in 1921 at age 39 and was unable to walk without leg braces or assistance. During his four terms as president, Roosevelt often used a wheelchair in private, but not for public appearances. News photographers cooperated in concealing Roosevelt's disability, and those who did not found their camera views blocked by Secret Service agents. "This raw film clip may be the first motion picture images of the president in his wheelchair, and it was never meant to be shown to the world," Begovich said. The film shows Roosevelt visiting the U.S.S. Baltimore at Pearl Harbor in July 1944. Roosevelt's disability was virtually a state secret during his presidency, which spanned the Great Depression and most of World War II.
Note: To watch this historic video, click here. Isn't it amazing that Roosevelt was U.S. president for 12 years, yet thanks to collusion of the press, his use of a wheelchair and disability was kept a secret from the public the entire time? Politicians know that public perception makes all the difference, so that perception management and manipulation has become a huge industry. For excellent information and resources along these lines, see this link.
Thousands of Guatemalans were intentionally infected with [sexually-transmitted diseases] in the 1940s by US public health researchers. An appeal on their case against the US government was dismissed this week. Thousands of Guatemalans ... were unwittingly subjected to secret human experiments led by US doctors. Nearly three years after beginning the legal battle in US courts, attorneys representing an estimated 5,000 Guatemalan victims used as guinea pigs and infected with sexually transmitted diseases in the 1940s by US public health researchers withdrew their appeal earlier this week. The alleged victims include soldiers, inmates, sex workers, mental health patients, and schoolchildren. Dr. John Cutler ... led the experiments in Guatemala from 1946 to 1948. Under a grant by the National Institute of Health, Dr. Cutler and US researchers gave antibiotic penicillin to test its ability to cure and prevent syphilis. But, his team also infected test subjects without their consent. Some 1,300 were deliberately infected with syphilis and other sexually transmitted diseases. Researchers would expose inmates to infected prostitutes brought into jails. In other cases, they would first infect patients in mental hospitals before testing the effects of the medication. The American team studied and performed experiments on more than 5,000 subjects – including orphans as young as 6 years old.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans. The rulings, some nearly 100 pages long, reveal that the court has taken on a much more expansive role by regularly assessing broad constitutional questions and establishing important judicial precedents, with almost no public scrutiny. The 11-member Foreign Intelligence Surveillance Court, known as the FISA court, was once mostly focused on approving case-by-case wiretapping orders. But since major changes in legislation and greater judicial oversight of intelligence operations were instituted six years ago, it has quietly become almost a parallel Supreme Court, serving as the ultimate arbiter on surveillance issues and delivering opinions that will most likely shape intelligence practices for years to come. In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures. Unlike the Supreme Court, the FISA court hears from only one side in the case — the government — and its findings are almost never made public.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
In the era of intense government surveillance and secret court orders, a murky multimillion-dollar market has emerged. Paid for by U.S. tax dollars, but with little public scrutiny, surveillance fees charged in secret by technology and phone companies can vary wildly. AT&T, for example, imposes a $325 "activation fee" for each wiretap and $10 a day to maintain it. Smaller carriers Cricket and U.S. Cellular charge only about $250 per wiretap. But snoop on a Verizon customer? That costs the government $775 for the first month and $500 each month after that. Regardless of price, the surveillance business is growing. The U.S. government long has enjoyed access to phone networks and high-speed Internet traffic under the U.S. Communications Assistance for Law Enforcement Act to catch suspected criminals and terrorists. More recently, the FBI has pushed technology companies like Google and Skype to guarantee access to real-time communications on their services. As the number of law enforcement requests for data grew and carriers upgraded their technology, the cost of accommodating government surveillance requests increased. AT&T, for example, said it devotes roughly 100 employees to review each request and hand over data. Likewise, Verizon said its team of 70 employees works around the clock, seven days a week to handle the quarter-million requests it gets each year.
Note: For more on government and corporate attacks on privacy, see the deeply revealing reports from reliable major media sources available here.
The faces of more than 120 million people are in searchable photo databases that state officials assembled to prevent driver’s-license fraud but that increasingly are used by police to identify suspects, accomplices and even innocent bystanders in a wide range of criminal investigations. The facial databases have grown rapidly in recent years and generally operate with few legal safeguards beyond the requirement that searches are conducted for “law enforcement purposes.” The most widely used systems were honed on the battlefields of Afghanistan and Iraq as soldiers sought to identify insurgents. The increasingly widespread deployment of the technology in the United States has helped police [identify people who] leave behind images on surveillance videos or social-media sites that can be compared against official photo databases. But law enforcement use of such facial searches is blurring the traditional boundaries between criminal and non-criminal databases, putting images of people never arrested in what amount to perpetual digital lineups. Though not yet as reliable as fingerprints, these technologies can help determine identity through individual variations in irises, skin textures, vein patterns, palm prints and a person’s gait while walking. Facial-recognition systems ... can be deployed remotely, without subjects knowing that their faces have been captured.
Note: For deeply revealing reports from reliable major media sources on government assaults on privacy, click here.
A divided Supreme Court ruled [on June 3] that police may take DNA samples when booking those arrested for serious crimes, narrowly upholding a Maryland law and opening the door to more widespread collection of DNA by law enforcement. The court ruled 5 to 4 that government has a legitimate interest in collecting DNA from arrestees ... to establish the identity of the person in custody. Conservative Justice Antonin Scalia ... amplified his displeasure by reading a summary of his dissent from the bench. “The court has cast aside a bedrock rule of our Fourth Amendment law: that the government may not search its citizens for evidence of crime unless there is a reasonable cause to believe that such evidence will be found,” Scalia said from the bench. He added, “Make no mistake about it: As an entirely predictable consequence of today’s decision, your DNA can be taken and entered into a national DNA database if you are ever arrested, rightly or wrongly, and for whatever reason.” Steven R. Shapiro, legal director of the American Civil Liberties Union said the decision “creates a gaping new exception to the Fourth Amendment” and violates a long-established understanding that “police cannot search for evidence of a crime ... without individualized suspicion.”
Note: For deeply revealing reports from reliable major media sources on government assaults on privacy, click here.
On [July 10] the Washington Post published an article by its long-time reporter Walter Pincus. The article concocted a frenzied and inane conspiracy theory: that it was WikiLeaks and Julian Assange, working in secret with myself [Glenn Greenwald] and Laura Poitras, who masterminded the Snowden leaks ahead of time and directed Snowden's behavior. To peddle this tale, Pincus, in lieu of any evidence, spouted all sorts of accusatory innuendo masquerading as questions ... and invoked classic guilt-by association techniques. See the email I sent Pincus for the conclusive evidence of those factual falsehoods and the other distortions peddled by the Post. Apparently, the Washington Post has decided to weigh in on the ongoing debate over "what is journalism?" with this answer: you fill up articles on topics ... with nothing but idle speculation, rank innuendo, and evidence-free accusations, all under the guise of "just asking questions". You then strongly imply that other journalists who have actually broken a big story are involved in a rampant criminal conspiracy. What was far worse was that Pincus' wild conspiracy theorizing was accomplished only by asserting blatant, easily demonstrated falsehoods. The Post allowed the falsehoods to stand uncorrected all day. More than 8 hours after I first publicized his errors - Pincus emailed me back ... and vowed that a correction would be published. 36 hours after the Post published these falsehoods, 24 hours after I publicized them, and 15 hours after the author of this article acknowledged one of those errors and vowed a correction, the Post article still sits on the internet: uncorrected.
Note: For more on mass media corruption, see the deeply revealing reports from reliable major media sources available here.
It's been revealed that the United States and New Zealand conducted secret tests in the 1940s of a 'tsunami bomb' designed to inundate coastal cities. Thousands of underwater tests were carried out near Auckland during the Second World War and showed such a weapon was feasible. The top-secret operation code-named, ''Project Seal'', was shelved just months before the atomic bomb was used on Japan in 1945. The secret plans have been uncovered during research by a New Zealand author and filmmaker, Ray Waru. EMILY BOURKE: Where were these tests carried out? RAY WARU: They were carried out at one of ... New Zealand's most well-known holiday spots, the Whangaparaoa Peninsula just north of Auckland. Over a period of several months they carried out almost 4,000 test explosions to kind of calibrate the size of the explosions, the number of explosions and the depth of the explosion in the water would need to be in order to create a tsunami effect. EMILY BOURKE: Was there any damage that occurred as a result of the research and those tests? RAY WARU: No. They never actually produced a tidal wave. They decided at the end if there were 2 million kilograms and they were detonated in an array a specific number of kilometres from the shore that they would produce a wave ... about ten or 12 ... metres in height. That would have been enough to wash out a shore installation. EMILY BOURKE: Were these tests carried out at the behest of the United States? Did the United States fund it? RAY WARU: Yes they were [and] they were carried out with the full cooperation of the New Zealand government.
Note: This article was published on the website of Australian Broadcasting Corporation, Australia's equivalent of the BBC. A 1999 article in New Zealand's leading newspaper at this link also discusses this secret tsunami bomb. For a very well researched webpage on HAARP, a secret weapon allegedly used for weather control and much more, click here.
Leslie James Pickering noticed something odd in his mail last September: a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home. “Show all mail to supv” — supervisor — “for copying prior to going out on the street,” read the card. It included Mr. Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green. “It was a bit of a shock to see it,” said Mr. Pickering, who with his wife owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service. Mr. Pickering was targeted by a longtime surveillance system called mail covers, a forerunner of a vastly more expansive effort, the Mail Isolation Control and Tracking program, in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year. It is not known how long the government saves the images. The Mail Isolation Control and Tracking program was created after the anthrax attacks in late 2001. It enables the Postal Service to retrace the path of mail at the request of law enforcement. No one disputes that it is sweeping.
Note: The exposure by whistleblower Edward Snowden of the NSA's massive domestic and global spying operations seems to have triggered a series of other revelations about surveillance of the US population, like this report on the US Postal Service's photographing all mail. Hardly a week goes by without another major revelation, such as a new digital photo-ID database utilized by the FBI and police forces, and the development by US police of a national DNA database on all "potential suspects". Since very few US citizens are terrorists, what is the real purpose behind this total surveillance?
The peculiar circumstances of journalist Michael Hastings' death in Los Angeles last week have unleashed a wave of conspiracy theories. Now there's another theory to contribute to the paranoia: According to a prominent security analyst, technology exists that could [have] allowed someone to hack his car. Former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarke [said] that what is known about the single-vehicle crash is "consistent with a car cyber attack." Clarke said, "There is reason to believe that intelligence agencies for major powers" -- including the United States -- know how to remotely seize control of a car. "It's relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn't want acceleration, to throw on the brakes when the driver doesn't want the brakes on, to launch an air bag," Clarke told The Huffington Post. Hastings was driving a 2013 Mercedes C250 coupe when he crashed into a tree on Highland Ave. in Los Angeles at approximately 4:30 am on June 18. Video posted online showed the car in flames, and one neighbor told a local news crew she heard a sound like an explosion. Another eyewitness said the car's engine had been thrown 50 to 60 yards from the car. There were no other vehicles involved in the accident. The fire was so all-consuming that it took the Los Angeles County coroner's office two days to identify Hastings' body, but Clarke said a cyber attack on the vehicle would have been nearly impossible to trace "even if the dozen or so computers on board hadn't melted."
Note: For a video of a DARPA specialist talking about how any computerized function of a car can be taken over, click here. This news article shows how a university test proved a car's onboard computer can be hacked. For an excellent video presenting powerful evidence that Hastings' death was anything but suicide, click here. For a Fox News video showing other evidence of premeditated murder, click here. In this video, a good friend states he had just received an email from Hastings that he had a story on the CIA that would be the biggest story yet. A later email then said he was worried as he was now under FBI investigation.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.