Government Corruption News StoriesExcerpts of Key Government Corruption News Stories in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
For years, the ratings agencies have contended that the grades they assign debt securities are independent opinions and therefore entitled to First Amendment protections, like those afforded journalists. But newly released documents in a class-action case ... cast doubt on the independence of the two largest agencies, Moody’s Investors Service and Standard & Poor’s. The case, filed in 2008 by a group of 15 institutional investors against Morgan Stanley and the two agencies, involves a British-based debt issuer called Cheyne Finance. Cheyne collapsed in August 2007 under a load of troubled mortgage securities. Even though Cheyne’s portfolio was bulging with residential mortgage securities, some of its debt received the agencies’ highest ratings, a grade equal to that assigned to United States Treasury securities. When the primary analyst at S.& P. notified Morgan Stanley that some of the Cheyne securities would most likely receive a BBB rating, not the A grade that the firm had wanted, the agency received a blistering e-mail from a Morgan Stanley executive. S.& P. subsequently raised the grade to A. After the institutions that bought Cheyne’s debt sued Morgan Stanley and the ratings agencies, Moody’s and S.& P. immediately mounted a First Amendment defense. But Shira A. Scheindlin, the federal judge overseeing the matter ... argued that the ratings were not opinions but were misrepresentations that were possibly a result of fraud or negligence.
Note: For deeply revealing reports from reliable major media sources on financial corruption, click here.
Google asked the secretive Foreign Intelligence Surveillance Court on [June 18] to ease long-standing gag orders over data requests the court makes, arguing that the company has a constitutional right to speak about information it is forced to give the government. The legal filing, which invokes the First Amendment’s guarantee of free speech, is the latest move by the California-based tech giant to protect its reputation in the aftermath of news reports about broad National Security Agency surveillance of Internet traffic. Revelations about the program, called PRISM, have opened fissures between U.S. officials and the involved companies, which have scrambled to reassure their users without violating strict rules against disclosing information that the government has classified as top secret. A high-profile legal showdown might help Google’s efforts to portray itself as aggressively resisting government surveillance, and a victory could bolster the company’s campaign to portray government surveillance requests as targeted narrowly and affecting only a small number of users. [The] unusual legal move came after days of intense talks between federal officials and several of the technology companies, including Google, over what details can be released. It also comes as the firms increasingly show signs of wanting to outdo each other in demonstrating their commitment to protecting user privacy. Facebook, Microsoft and Yahoo in recent days have won federal government permission to include requests from the court as part of the overall number of data requests they receive from federal, state and local officials.
Note: For deeply revealing reports from reliable major media sources on government assaults on privacy, click here.
Edward Snowden, the whistle-blower shining spotlights on federal surveillance practices, made a rhetorical - and volatile - point during an online question-and-answer session Monday. "If Facebook, Google, Microsoft and Apple refused to provide this cooperation with the intelligence community, what do you think the government would do? Shut them down?" he asked. Snowden's point implies that tech companies should push back on all government requests for data on their users. Prosecuting these much-used companies for noncompliance would only shed light on the extent of the programs they aimed to keep secret in the first place. Whether a tech company dares go that far remains to be seen. But in the past week a number of household names in Silicon Valley have at least started demanding more freedom to disclose what the government wants to know about their users. As the tech companies associated with Snowden's leaked materials scramble to comply with government requests, they're also scrambling to save face with customers. It's still not clear what exact technical mechanism the government used to acquire information about users of Facebook, Google, Microsoft, Yahoo and Apple, among others. But it is clear that some Internet users have come to view these tech giants as proxy spies as a result of their assumed compliance. The companies say they would like nothing better than to clear their names, but they simply aren't allowed to release details about government requests.
Note: For deeply revealing reports from reliable major media sources on government assaults on privacy, click here.
Former investigators of the 1996 TWA Flight 800 crash are urging the National Transportation Safety Board to reopen its review of the nearly 17-year-old case. In a new documentary about the crash that is scheduled to air next month, several former investigators on the case suggest that missiles brought down the New York-to-Paris plane, killing 230 people when it exploded near Long Island just minutes after it took off. This new evidence could resurrect conspiracy theories that began circulating within days of the crash. However, the NTSB concluded after four years investigating the crash that the plane's center fuel tank exploded "most likely" from a short circuit, ruling out the possibility of a missile, according to the board's report. But the retired investigators claim that those findings were "falsified." "Early on in the investigation there was indication that the evidence was being tampered with," said Hank Hughes, a former senior accident investigator with NTSB, during a conference call with reporters. Hughes and others cited possible missing parts of the plane, possible explosive material and other findings that could corroborate their theory that a missile came from the north. The documentary's co-producer Tom Stalcup told CNN that the film offers "solid proof that there was an external detonation," and that a number of people have come forward confirming these claims.
Note: For powerful evidence from an Emmy-award winning journalist that this investigation was manipulated, click here. To watch the powerful documentary Shadows of Liberty on major media manipulation, including that of TWA flight 800 (minute 14) at this link.
Bolstered by eyewitness accounts and the Internet, the explosion of TWA Flight 800 off the coast of New York 10 years ago spawned a slew of sinister conspiracy theories, most notably the belief that a missile from a U.S. Navy ship was responsible. So prevalent were these theories that the term "Pierre Salinger Syndrome" -- the belief that everything on the Internet is true -- entered the lexicon. Some witness accounts seemed to support the missile theory. It quickly became a hot topic on the young but quickly growing Internet. It might have stayed simply an Internet conspiracy had it not been for Pierre Salinger, President Kennedy's press secretary who had worked as a network news correspondent for a time. Three months after the TWA tragedy, while working as a freelance public relations director, he claimed to have verified the friendly fire cover-up. "It's a document I got about five weeks ago -- came from ... an intelligence agent of France. He had been given this document from an American Secret Service agent based in France," Salinger said at the time. "He had been doing an inquiry and had some contacts with the U.S. Navy." Salinger took to the news airwaves, including CNN, touting his theory. But as baseless as it sounded, Salinger could not be ignored. His accusations gave conspiracy theorists a voice of distinction and credibility.
Note: For powerful evidence from an Emmy-award winning journalist that this investigation was manipulated, click here. To watch the powerful documentary Shadows of Liberty on major media manipulation, including that of TWA flight 800 (minute 14) at this link.
An enormous trove of leaked records about secret companies and accounts is being opened to the public in hope it will shed light on the murky world of offshore finance. The information, contained in a new online database released [on June 14], has the names of more than 100,000 offshore entities — mainly companies and trusts set up in locales such as the British Virgin Islands and Cook Islands — and the people associated with them. Media outlets worldwide have been reporting on the information leak since it came to light in early April, with far-reaching global repercussions. The online names database was released ... by the International Consortium of Investigative Journalists, and contains a basic subset of the 260 gigabytes of leaked tax-haven files that the Washington-based group obtained and shared with global news organizations. "What we're doing for the British Virgin Islands, the Cook Islands, and other offshore havens is what's routinely done in many countries around the world — making the control and ownership of companies a matter of public record," said Michael Hudson, a senior editor at the journalism consortium. The newly released database shows the names and, where available, the shareholders and directors of offshore companies, and visually maps out links between them. [ICIJ] said it hopes people will browse the names and tip off reporters to new revelations about people and companies doing business offshore.
Note: For deeply revealing reports from reliable major media sources on corporate corruption, click here.
Privatization [of government functions] often comes with a lack of oversight and a series of abuses. One particularly stunning example is the American prison system, the realities of which should be a national disgrace. Some of those realities are highlighted in a recent lawsuit filed by the American Civil Liberties Union on behalf of prisoners at the East Mississippi Correctional Facility (EMCF). EMCF houses severely mentally ill prisoners, with the supposed intent of providing both incarceration and treatment. Instead, the ACLU contends, the facility, which is operated by private contractors, is rife with horrific abuses. The complaint lists a litany of such horrors, [including]: Rampant rapes. Placing prisoners in solitary confinement for weeks, months or even years at a time. Rat infestations so bad that vermin crawl over prisoners. Many suicide attempts, some successful. Denying or delaying treatment for infections and even cancer. Stabbings, beatings and other acts of violence. Malnourishment and chronic hunger. Officers who deal with prisoners by using physical violence. The [US] prison system is increasingly built and run by for-profit corporations, who have a financial interest in increasing the number of people in prison while decreasing the amount of money it costs to house them. Since 1980, the US prison population has grown by 790%. We have the largest prison population of any nation in the history of the world.
Note: For deeply revealing reports from reliable major media sources on corruption and human rights abuses in prisons, click here.
Lawyers and intelligence experts with direct knowledge of two intercepted terrorist plots that the Obama administration says confirm the value of the NSA's vast data-mining activities have questioned whether the surveillance sweeps played a significant role, if any, in foiling the attacks. The defence of the controversial data collection operations ... has been led by Dianne Feinstein, chairwoman of the Senate intelligence committee, and her equivalent in the House, Mike Rogers. The two politicians have attempted to justify the NSA's use of vast data sweeps such as Prism and Boundless Informant by pointing to the arrests and convictions of would-be New York subway bomber Najibullah Zazi in 2009 and David Headley, who is serving a 35-year prison sentence for his role in the 2008 Mumbai attacks. But court documents lodged in the US and UK, as well as interviews with involved parties, suggest that data-mining through Prism and other NSA programmes played a relatively minor role in the interception of the two plots. Conventional surveillance techniques, in both cases including old-fashioned tip-offs from intelligence services in Britain, appear to have initiated the investigations. The Headley case is a peculiar choice for the administration to highlight as an example of the virtues of data-mining. The fact that the Mumbai attacks occurred, with such devastating effect, in itself suggests that the NSA's secret programmes were limited in their value as he was captured only after the event. Headley ... had been an informant working for the Drug Enforcement Administration perhaps as recently as 2005. There are suggestions that he might have then worked in some capacity for the FBI or CIA.
Note: For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
[Daniel] Ellsberg is one of the most outspoken critics of the Obama administration’s prosecution of leakers. Under President Obama’s tenure, the government has prosecuted six individuals for releasing classified information to media organizations. Ellsberg is particularly fierce in his support of Bradley Manning, a young soldier who released a large amount of classified information to WikiLeaks. Manning was arrested in 2010, and his military court-martial began this week. Ellsberg considers Manning a hero, and he argues that there is little difference between what Manning did in 2010 and what Ellsberg did four decades earlier. [Q.}: In a 1973 interview, you said that a “secondary objective” of releasing the Pentagon Papers was “the hope of changing the tolerance of Executive secrecy that had grown up over the last quarter of a century both in Congress and the courts and in the public at large.” How has that “tolerance of secrecy” changed over the last four decades? DE: There’s been very great tolerance that if the magic words “national security,” or the new words “homeland security” are invoked, Congress has given the president virtually a free hand in deciding what information they will know as well as the public. I wouldn’t count on the current court with its current makeup making the same ruling with the Pentagon Papers as they did 40 years ago. I’m sure that President Obama would have sought a life sentence in my case. Various things that were counted as unconstitutional then have been put in the president’s hands now. He’s become an elected monarch. Nixon’s slogan, “when the president does it, it’s not illegal,” is pretty much endorsed now.
Note: To see key quotes showing the amazing courage and dedication of Snowden, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
Long before Edward Snowden walked out of the NSA with his trove of documents, whistleblowers there had been trying for years to bring attention to the massive turn toward domestic spying that the agency was making. Last year in my Wired cover story on the enormous new NSA data center in Utah, Bill Binney, the man who largely designed the agency’s worldwide eavesdropping system, warned of the secret, nationwide surveillance. He told how the NSA had gained access to billions of billing records not only from AT&T but also from Verizon. I also wrote about Adrienne J. Kinne, an NSA intercept operator who attempted to blow the whistle on the NSA’s illegal eavesdropping on Americans following the 9/11 attacks. She [attempted and failed] to end the illegal activity with appeals all the way up the chain of command to Major General Keith Alexander. The deception by General Alexander is especially troubling. In my new cover story for Wired’s July issue ...I show how he has become the most powerful intelligence chief in the nation’s history. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the U.S. Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.
Note: James Bamford, the author of this article, was the ABC producer responsible for breaking the story on Operation Northwoods, which proved a level of deception almost beyond belief at the very highest levels of the Pentagon. For more on this, click here. For deeply revealing reports from reliable major media sources on the realities of intelligence agency activity, click here.
Jack Abramoff had just delivered a primer on the corruption of Congress when a University of San Francisco graduate student in public affairs posed the question: Does ethical lobbying exist, or is the cutting of moral corners just part of the job description? Abramoff, whose mastery of capital sleaze earned him a fortune and then a prison term, estimated that 95 percent of the thousands of lobbyists who populate Washington are ethical. He was, by his own admission, among the 5 percent. "The problem is, when you're one of those (unethical) lobbyists, you will be able to crush the other lobbyists," said Abramoff, now 55, repentant after 43 months in federal prison and on a crusade to reform the system he exploited so adroitly. Abramoff's reform plan ... would expand the definition of lobbyist to anyone (person or corporation) that tries to influence legislation, impose a limit on campaign contributions to $500 per election cycle and prohibit legislators, staffers and administration decisionmakers from lobbying activity for 10 years after leaving government. In Abramoff's eyes, well-directed money is the only way to overcome the corrosive influence of strategically distributed money in Washington. He has written a book, Capitol Punishment: The Hard Truth About Washington Corruption From America's Most Notorious Lobbyist, and become an advocate of political reform. He still owes nearly $44 million in restitution for defrauding his tribal clients.
Note: Abramoff, who manipulated tens of millions of dollars, was sentenced to a total of 10 years in jail, yet was released after less than four years. At the same time petty thieves caught three times in many US states are sentenced to life in prison. Where's the justice? For deeply revealing reports from reliable major media sources on government corruption, click here.
Gunmen shot to death the Pakistani government’s top prosecutor ... in a case that accuses former military ruler Pervez Musharraf of involvement in the 2007 assassination of ex-Prime Minister Benazir Bhutto, police said. The gunmen opened fire on Chaudhry Zulfikar’s car as he was leaving his home. The assailants escaped. Chaudhry Zulfikar was involved in a number of high-profile cases. Zulfikar’s slaying was a rare episode of violence in the capital, which has so far seen none of the bombings or other attacks launched by the Taliban against secular politicians. Musharraf, who ruled Pakistan for nine years before going into self-exile in 2008, returned in March in an ultimately futile bid to run for prime minister. He has been under house arrest for more than two weeks, facing allegations in various cases linked to his tenure. In the case unfolding in Rawalpindi, prosecutors allege that Musharraf was culpable for Bhutto’s murder for not providing her with enough security. He has denied the allegations. Bhutto’s son, Bilawal, who now leads the Pakistan People’s Party, has alleged that Musharraf was behind it. Proceedings in the case have been bogged down for years, and resumed only recently with Musharraf’s return. Speculation was rife ... that Zulfikar was killed to disrupt that case.
Note: It is interesting to note that only weeks before her death in 2007, Benazir Bhutto said in a BBC interview that Osama bin Laden had already been killed. To read quotes from this BBC interview, click here. For a CNN article revealing the Bhutto was planning to give US lawmakers a report on vote rigging on the day she was assassinated, click here. Could it be that the prosecutor in the article above was killed because he knew too much?
On [June 6], a heady mix of politicians, bank bosses, billionaires, chief executives and European royalty will swoop up the elegant drive of the Grove hotel, north of Watford, to begin the annual Bilderberg conference. The CEO of Royal Dutch Shell will hop from his limo, delighted to be spending three solid days in policy talks with the head of HSBC, the president of Dow Chemical, his favourite European finance ministers and US intelligence chiefs. The conference is the highlight of every plutocrat's year and has been since 1954. The only time Bilderberg skipped a year was 1976, after the group's founding chairman, Prince Bernhard of the Netherlands, was caught taking bribes from Lockheed Martin. It may seem odd, as our own lobbying scandal unfolds, amid calls for a statutory register of lobbyists, that a bunch of our senior politicians will be holed up for three days in luxurious privacy with the chairmen and CEOs of hedge funds, tech corporations and vast multinational holding companies, with zero press oversight. Michael Meacher, MP ... describes the conference as "an anti-democratic cabal of the leaders of western market capitalism meeting in private to maintain their own power and influence outside the reach of public scrutiny". The Bilderberg conference is paid for, in the UK, by an officially registered charity: the Bilderberg Association (charity number 272706). The charity receives regular five-figure sums from two kindly supporters of its benevolent aims: Goldman Sachs and BP. The most recent documentary proof of this is from 2008, since when the charity has omitted its donors' names from its accounts.
Note: For a list of this year's Bilderberg participants, which include 90-year-old Henry Kissinger, click here. For lots more on secret societies from reliable sources, click here.
The auditorium grew hushed as a senior Watford borough councillor took to his feet. Now it was the turn of the people of Watford to speak. What would they make of this international three-day policy summit, with its heavyweight delegate list bulging with billionaire financiers, party leaders and media moguls, protected by the biggest security operation Watford has ever seen? At one point in the meeting, during a tense exchange about contingency plans for dog-walkers, [Chief Inspector] Rhodes let slip that Operation Discuss (the codename for the Bilderberg security operation) had been up and running for 18 months. Residents and journalists shared an intake of breath. "Eighteen months?" The reason for all the secrecy? "Terrorism". After 59 years of Bilderberg guests scuttling about in the shadows, ducking lenses and dodging the news, that's the rationale we're given? The same rationale, presumably, is behind the Great Wall of Watford, a concrete-and-wire security fence encircling the hotel. As ugly as it is unnecessary, it looks like the kind of thing you throw yourself against in a stalag before being machine-gunned from a watchtower. Appropriately fascistic, you might say, if you regard fascism as "the merger of corporate and government power", as Mussolini put it. The same threat of "terrorism" was used to justify the no-pedestrian, no-stopping zones near the venue. The police laid out their logic: they had "no specific intelligence" regarding a terror threat. However, in recent incidents, such as Boston and Woolwich, there had been no intelligence prior to the attack. Therefore the lack of any threat of a terror attack fitted exactly the profile of a terror attack. The lack of a threat was a threat. Welcome to 1984.
Note: For a list of this year's Bilderberg participants, which include 90-year-old Henry Kissinger, click here. For lots more on secret societies from reliable sources, click here.
The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs. The program, code-named PRISM, has not been made public until now. It may be the first of its kind. Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” GCHQ, Britain’s equivalent of the NSA, also has been secretly gathering intelligence from the same internet companies through an operation set up by the NSA. PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority. Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.
Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.
The Guardian [has] released a classified court order requiring Verizon to turn over records of all domestic phone calls to the National Security Agency. The revelation has led to a renewed debate over the legality and policy merits of indiscriminate government surveillance of Americans. The court order, issued by the secret Foreign Intelligence Surveillance court, only sought metadata — a fancy word for information like what numbers you called, what time you made the calls, and how long the calls were. The order does not seek the audio of calls. Of course, it’s possible the NSA has other programs collecting the contents of calls. In 2006 a whistleblower reported the existence of a secret, NSA-controlled room in an AT&T switching facility in San Francisco. So it’s possible the NSA is using rooms like that to listen to everyone’s phone calls. But all we know for sure is that the NSA has been requesting information about our phone calls. We only have proof of spying on Verizon customers, but it’s hard to imagine the NSA limiting its surveillance program to one company. There are probably similar orders in effect for AT&T and CenturyLink, the other major telephone companies. The order includes hints that the NSA is also collecting information from cellular customers. In addition to phone numbers and call times, the order seeks information about the specific cell phone tower the customer used to connect to the network during each call. Cellphones make calls using the closest tower. So if the NSA knows you made a call using a specific tower, they can safely assume you were near that tower at the time of the call.
Note: For graphs and lots more on the Prism program, see the Guardian article at this link. Technically, U.S. officials are not allowed to mine personal data from U.S. citizens. Yet if U.K. authorities mine data on U.S. citizens, they can share it freely with officials in the U.S. and vice versa. There is evidence that this happens quite frequently, thus circumventing privacy protections. For an excellent article which goes deep into this issue, click here.
Former U.S. Sen. Bob Graham has accused the FBI in court papers of having impeded Congress’s Joint Inquiry into 9/11 by withholding information about a Florida connection to the ... attacks that killed nearly 3,000 people. The information ... includes a recently declassified FBI report that ties a Saudi family who once lived in Sarasota “to individuals associated with the terrorist attacks on 9/11/2001.” “The FBI’s failure to call (to the Joint Inquiry’s attention) documents finding ‘many connections’ between Saudis living in the United States and individuals associated with the terrorist attack(s) … interfered with the Inquiry’s ability to complete its mission,” said Graham, co-chairman of the Joint Inquiry. Graham said the FBI kept the 9/11 Commission in the dark, too. He said co-chairmen Thomas Kean and Lee Hamilton and executive director Philip Zelikow all told him they were unaware of the FBI’s Sarasota investigation. Moreover, Graham stated that Deputy FBI Director Sean Joyce, the Bureau’s second in command, personally intervened to block him from speaking with the special agent-in-charge of the Sarasota investigation. “I am troubled by what appears to me to be a persistent effort by the FBI to conceal from the American people information concerning possible Saudi support of the Sept. 11 attacks,” Florida’s former governor said.
Note: For deeply revealing reports from reliable major media sources on the 9/11 attacks, click here.
An estimated $750 million is missing from Angola's treasury [after] a deal with Russia facilitated by a Swiss bank and a shell company registered in Britain's Isle of Man, a report by a corruption watchdog group said. Russian and French arms dealers got away with $263 million, Angola's president reportedly stashed away more than $36 million, and three Angolan officials and a former Russian legislator got away with smaller amounts. Another $400 million is unaccounted for, according to Corruption Watch UK. The Angolan exposé is the latest of a slew of reports on corruption, its cost to development, and how it is aided by bankers and shell companies that keep secret the identities of owners. Angola has long been accused of siphoning off payments from its massive oil production, worth about $40 billion in 2011 according to Revenue Watch. They enrich a small coterie surrounding President Jose Eduardo dos Santos, while nearly half the population lives below the poverty line. Dos Santos has ruled Angola for 33 years. The $750 million that disappeared from Angola was supposed to repay a $1.5 billion debt to Russia for help in its 27-year civil war. Angola paid with promissory notes on future oil shipments, but those notes went through shell companies that milked much of the money, the report said. Russian and French arms dealers took most of the money owed to Russia, the report said. The illegal transfer of capital from Africa has surpassed $50 billion a year.
Note: Global arms dealers work feverishly behind the scenes to enflame wars so that their huge profits keep rolling. Yet governments around the world seem reluctant to try to stop or even monitor this lucrative trade. Do you think there might be any collusion here?
If it weren't for Deric Lostutter (aka KYAnonymous), the Steubenville High School rape scandal may not have received the national attention it did. Lostutter is responsible for exposing the suspects' tweets, videos and Instagram photos that had bragged about the incident and were circulated among other students. But due to his ties to other hackers who (he claims) compromised the school's football team fan page, the FBI raided his home. If convicted for the hacking, Lostutter could face up to 10 years behind bars. The football players found guilty of raping the 16-year-old victim? One player received a year in jail, the other received two years.
Note: For the full, revealing story on this, click here.
The World Bank is a place where whistle-blowers are shunned, persecuted and booted–not always in that order. Consider John Kim, a top staffer in the bank’s IT department, who in 2007 leaked damaging documents ... after he determined that there were no internal institutional avenues to honestly deal with wrongdoing. “Sometimes you have to betray your country in order to save it,” Kim says. In return bank investigators probed his phone records and e-mails, and allegedly hacked into his personal AOL account. After determining he was behind the leaks the bank put him on administrative leave for two years before firing him on Christmas Eve 2010. With nowhere to turn Kim was guided into the offices of the Washington, D.C.-based Government Accountability Project–the only game in town for public-sector leakers. [They] helped Kim file an internal case for wrongful termination (World Bank staffers have no recourse to U.S. courts) and in a landmark ruling a five-judge tribunal eventually ordered the bank to reinstate him last May. Despite the decision, the bank retired him in September after 29 years of service.
Note: For the video of another major World Bank whistleblower, Karen Hudes, click here. For deeply revealing reports from reliable major media sources on financial corruption, click here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.