Please donate here to support this vital work.
Revealing News For a Better World

Media Articles
Excerpts of Key Media Articles in Major Media


Below are key excerpts of highly revealing media articles from the major media. Links are provided to the full articles on their media websites. If any link fails to function, read this webpage. These media articles are listed in reverse date order. You can also explore the articles listed by order of importance or by date posted. By choosing to educate ourselves and to spread the word, we can build a brighter future.

Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.


In 21st century America, Samsung TV watches YOU!
2013-08-05, Houston Chronicle (Houston's leading newspaper)
http://blog.chron.com/techblog/2013/08/in-21st-century-america-samsung-tv-wat...

During last week’s Black Hat computer security conference in Las Vegas, researchers from iSEC Partners demonstrated a vulnerability in 2012 models of Samsung’s line of Smart TVs, particularly the ones with that come with cameras designed for teleconferencing. The problem with the Samsung TVs highlights a much larger issue: The number of devices connected to the Internet is growing exponentially, and many of them have little or no security in place. Flaws may be found in almost any application on an Internet-connected platform that, if exploited, could allow access to the entire device, and then the user’s full network. Many of these unsecured devices can be found with a simple search. In fact, there’s a search engine devoted just to scouring the so-called “Internet of things” called Shadon. Playing around with it is an eye-opener. For example, in late July a writer for Forbes discovered an entire home automation product line with Internet-connected features that could be set up without a default password, and were visible to search engines. This would enable a hacker to search and find these systems on the Net, then access them at will. To prove her point, Kashmir Hill breached the home automation systems of random strangers, called them on the phone and demonstrated the vulnerability by turning their lights on and off.

Note: For more on corporate and government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


US directs agents to cover up program used to investigate Americans
2013-08-05, CNBC/Reuters
http://www.cnbc.com/id/100938530

A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin—not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence—information that could reveal entrapment, mistakes or biased witnesses. "I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers. "It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


Children given lifelong ban on talking about fracking
2013-08-05, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/environment/2013/aug/05/children-ban-talking-about...

Two young children in Pennsylvania were banned from talking about fracking for the rest of their lives under a gag order imposed under a settlement reached by their parents with ... a leading oil and gas driller. The settlement, reached in 2011 but unsealed only last week, barred the Hallowichs' son and daughter, who were then aged 10 and seven, from ever discussing fracking or the Marcellus Shale, a leading producer in America's shale gas boom. The Hallowich family had earlier accused oil and gas companies of destroying their 10-acre farm in Mount Pleasant, Pennsylvania and putting their children's health in danger. Their property was adjacent to major industrial operations ... which the Hallowich family said contaminated their water supply and caused burning eyes, sore throats and headaches. The family gag order was a condition of the settlement. The couple told the court they agreed because they wanted to move to a new home away from the gas fields, and to raise their children in a safer environment. "We need to get the children out of there for their health and safety," the children's mother, Stephanie Hallowich, told the court. She was still troubled by the gag order, however. "I'm not quite sure I fully understand. We know we're signing for silence forever but ... my daughter is turning seven today, my son is 10." The court transcripts were released in response to an open records request by the Pittsburgh Post Gazette, which first reported on the children's lifetime gag order.

Note: Why isn't the US major media giving more coverage this craziness? The fracking industry poisons drinking water, causes earthquakes and yet remains shrouded in secrecy.


Banks hate Richmond homeowners' bailout plan
2013-08-05, San Francisco Chronicle (SF's leading newspaper)
http://www.sfchronicle.com/bayarea/johnson/article/Banks-hate-Richmond-homeow...

Richmond [CA] city officials took a giant leap forward for everyday people last week when they announced a program to purchase ailing residential mortgages and refinance them through a financial partnership and a bold new initiative that's already begun. To accomplish the task, the city said it will use its eminent domain powers in reverse: To save a home instead of condemn it. Much to the displeasure of the banking industry, the city sent offer letters to more than 600 homeowners whose mortgages are held by nongovernment lending institutions. The program offers to pay lenders the current market value of the property, not the higher value of the mortgage. Under the Richmond program, a bank that approved a $500,000 mortgage would be paid roughly 80 percent of its investment. Already, some lenders contend that such a law violates constitutionally protected property rights and sets a precedent that could open the floodgates for other cities in the same predicament. The mere exploration of similar programs in a half-dozen California cities and counties provoked a strong reaction from the banking industry. Financial experts have warned that the Richmond policy is certain to spawn legal challenges and a backlash from lenders who recalculate higher mortgages in Richmond to offset the risk of the city using a local law to claim a foreclosed property. That's interesting, because no measure was too extreme, no taxpayer sacrifice too great to come up with and fund a new financial model to bail out the bankers and brokerage firms in 2008. But that's what the federal government - and American taxpayers did.

Note: For more on financial corruption, see the deeply revealing reports from reliable major media sources available here.


Exclusive: FBI allowed informants to commit 5,600 crimes
2013-08-04, USA Today
http://www.usatoday.com/story/news/nation/2013/08/04/fbi-informant-crimes-rep...

The FBI gave its informants permission to break the law at least 5,658 times in a single year, according to newly disclosed documents that show just how often the nation's top law enforcement agency enlists criminals to help it battle crime. The U.S. Justice Department ordered the FBI to begin tracking crimes by its informants more than a decade ago, after the agency admitted that its agents had allowed Boston mobster James "Whitey" Bulger to operate a brutal crime ring in exchange for information about the Mafia. The FBI submits that tally to top Justice Department officials each year, but has never before made it public. Agents authorized 15 crimes a day, on average, including everything from buying and selling illegal drugs to bribing government officials and plotting robberies. FBI officials have said in the past that permitting their informants — who are often criminals themselves — to break the law is an indispensable, if sometimes distasteful, part of investigating criminal organizations. USA TODAY obtained a copy of the FBI's 2011 report under the Freedom of Information Act. The report does not spell out what types of crimes its agents authorized, or how serious they were. It also did not include any information about crimes the bureau's sources were known to have committed without the government's permission. Crimes authorized by the FBI almost certainly make up a tiny fraction of the total number of offenses committed by informants for local, state and federal agencies each year.

Note: As reported in this USA Today article, the DEA and ATF don't even track crimes committed by their informants. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.


Is your television watching you?
2013-08-03, CNN
http://transcripts.cnn.com/TRANSCRIPTS/1308/03/cnnitm.02.html

When you're watching TV ... you probably don't think someone could be on the other side watching you back. An alarming security flaw in Samsung's Smart-TVs makes this scenario possible. LAURIE SEGALL [CNN Money/Technology Correspondent]: We've spoken to a lot of folks and they're saying there are major vulnerabilities. YAVOR: One of the things we were able to do with the Smart-TV platform was abuse the browser so that we could actually gain access to the camera that's built into the TV. What we can prove here is that with a little bit of extra code, we can turn the camera on in your browser. This is something we can do invisibly and actually have it run behind the web page you're looking at. I could be sitting at a laptop in a cafe in Paris, and as long as I have a web connection, I would be able to get into your TV and access your camera. AARON GRATTAFIORI [security consultant]: The scary thing about it is that it doesn't give an indication that the camera is on and there is no LED that shows up when the camera is on. So they could actually be watching you and you would never even know. SEGALL: What is a Smart-TV, and why is it a playground, essentially, for hackers? GRATTAFIORI: It's a computer. So instead of being a tube and some other electronics, now it has a web browser and it has a lot of devices running Linux.

Note: To watch this video clip on CNN News, click here.


CIA 'running arms smuggling team in Benghazi when consulate was attacked'
2013-08-02, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/news/worldnews/africaandindianocean/libya/10218288...

The CIA has been subjecting operatives to monthly polygraph tests in an attempt to suppress details of a reported US arms smuggling operation in Benghazi that was ongoing when its ambassador was killed by a mob in the city last year, according to reports. Up to 35 CIA operatives were working in the city during the attack last September on the US consulate that resulted in the death of Ambassador Chris Stevens and three other Americans, according to CNN. The television network said that a CIA team was working in an annex near the consulate on a project to supply missiles from Libyan armouries to Syrian rebels. Sources said that more Americans were hurt in the assault ... than had been previously reported. CIA chiefs were actively working to ensure the real nature of its operations in the city did not get out. So only the losses suffered by the State Department in the city had been reported to Congress. Frank Wolf, a US congressman who represents the district that contains CIA headquarters in Langley, Virginia, is one of 150 members of Congress for a new investigation into the failures in Benghazi. "I think it is a form of a cover-up, and I think it's an attempt to push it under the rug," he said. "We should have the people who were on the scene come in, testify under oath, do it publicly, and lay it out. And there really isn't any national security issue involved with regards to that."

Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.


Selfish traits not favoured by evolution, study shows
2013-08-02, BBC News
http://www.bbc.co.uk/news/science-environment-23529849

Evolution does not favour selfish people, according to new research. This challenges a previous theory which suggested it was preferable to put yourself first. Instead, it pays to be co-operative, shown in a model of "the prisoner's dilemma", a scenario of game theory - the study of strategic decision-making. Published in Nature Communications, the team says their work shows that exhibiting only selfish traits would have made us become extinct. The eminent mathematician John Nash showed that the optimum strategy was not to co-operate in the prisoner's dilemma game. "For many years, people have asked that if he [Nash] is right, then why do we see co-operation in the animal kingdom, in the microbial world and in humans," said lead author Christoph Adami of Michigan State University. The answer, he explained, was that communication was not previously taken into account. Prof Andrew Coleman from Leicester University explains that this new work suggests that co-operation helps a group evolve. "The two prisoners that are interrogated are not allowed to talk to each other. If they did they would make a pact and be free within a month. But if they were not talking to each other, the temptation would be to rat the other out. Being mean can give you an advantage on a short timescale but certainly not in the long run - you would go extinct." Crucially, in an evolutionary environment, knowing your opponent's decision would not be advantageous for long because your opponent would evolve the same recognition mechanism to also know you, Dr Adami explained. This is exactly what his team found, that any advantage from [selfishness] was short-lived.

Note: For a treasure trove of great news articles which will inspire you to make a difference, click here.


New York photographer turns strangers into friends
2013-08-02, CBS News
http://www.cbsnews.com/8301-18563_162-57596845/

Forty-five-year-old Richard Renaldi is looking for someone -- two someones, actually. Two total strangers who were meant to be together, if only for a moment. Richard is a New York photographer working on a series of portraits. For each shot he grabs strangers off the street -- like Jenny Wood, an airline employee from Virginia, and Dominek Tucker, a college student from Brooklyn -- and poses them like adoring family. Richard calls the project "Touching Strangers." He started shooting it six years ago and now has hundreds of portraits of these unlikely intimates. Richard puts the people in these poses, but the sentiment that seems to shine through is real -- at least so say the subjects. At first, Brian Sneeden, a poetry teacher, saw no rhyme or reason for posing with 95-year-old retried fashion designer Reiko Ehrman, but eventually he, too, felt a change. "I felt like I cared for her," Brian says. "I felt like it brought down a lot of barriers." Pretty much everyone shared that same sentiment. "Everyone seems to come away with kind of a good feeling," Richard says. "It's kind of lovely. It's lovely." Most photographers capture life as it is, but in these strangers, Richard Renaldi has captured something much more ethereal and elusive. He shows us humanity as it could be -- as most of us wish it would be -- and as it was, at least for those one fleeting moments in time.

Note: For a treasure trove of great news articles which will inspire you to make a difference, click here.


Your TV might be watching you
2013-08-01, CNN
http://money.cnn.com/2013/08/01/technology/security/tv-hack/index.html

Today's high-end televisions are almost all equipped with "smart" PC-like features, including Internet connectivity, apps, microphones and cameras. But a recently discovered security hole in some Samsung Smart TVs shows that many of those bells and whistles aren't ready for prime time. The flaws in Samsung Smart TVs, which have now been patched, enabled hackers to remotely turn on the TVs' built-in cameras without leaving any trace of it on the screen. While you're watching TV, a hacker anywhere around the world could have been watching you. Hackers also could have easily rerouted an unsuspecting user to a malicious website to steal bank account information. Samsung quickly fixed the problem after security researchers at iSEC Partners informed the company about the bugs. Samsung sent a software update to all affected TVs. But the glitches speak to a larger problem of gadgets that connect to the Internet but have virtually no security to speak of. Security cameras, lights, heating control systems and even door locks and windows are now increasingly coming with features that allow users to control them remotely. Without proper security controls, there's little to stop hackers from invading users' privacy, stealing personal information or spying on people. In the case of Samsung Smart TVs, iSEC researchers found that they could tap into the TV's Web browser with ease, according to iSEC security analyst Josh Yavor. That gave hackers access to all the functions controlled by the browser, including the TV's built-in camera. "If there's a vulnerability in any application, there's a vulnerability in the entire TV," said Aaron Grattafiori, also an analyst at iSEC.

Note: For how deep this problem goes, read this article. For more on corporate and government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


Americans pay GCHQ Ł100m to spy for them, leaked papers claim
2013-08-01, The Telegraph (One of the UK's leading newspapers)
http://www.telegraph.co.uk/news/uknews/defence/10217280/Americans-pay-GCHQ-10...

GCHQ has received at least Ł100 million from the US to help fund intelligence gathering, raising questions over American influence on the British agencies. The money was paid across a range of projects over three years and resulted in GCHQ spying on behalf of America, according to leaked documents. It also emerged that the intelligence agency wants the ability to “exploit any phone, anywhere, any time” and that some staff have raised concerns over the “morality and ethics” of their operational work. The payments from the US National Security Agency (NSA) are detailed in GCHQ’s annual “investment portfolios”, leaked by Mr Snowden to The Guardian. The NSA paid GCHQ Ł22.9 million in 2009, Ł39.9 million in 2010 and Ł34.7 million in 2011/12. The 2010 funding included ... Ł17.2 million for the agency’s “Mastering the Internet” project, which gathers “raw” information from the web to be analysed. In return, GCHQ has to have the American view in mind when prioritising work, the papers claim. One strategy briefing disclosed the pressure on GCHQ to meet NSA demands, saying: “GCHQ must pull its weight and be seen to pull its weight.” In another document, from 2010, GCHQ apparently acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”.

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


California duped on energy buys again
2013-08-01, San Francisco Chronicle (SF's leading newspaper)
http://www.sfchronicle.com/opinion/editorials/article/California-duped-on-ene...

JPMorgan Chase & Co. has agreed to pay federal regulators $410 million to settle allegations that the giant bank manipulated energy markets in California and Michigan. About $285 million of the settlement will go to the U.S. Treasury for civil penalties, and about $124 million will be refunded to California ratepayers. The remainder will be refunded to Michigan ratepayers. If this story sounds familiar, that's because it is. Californians who remember the Enron energy debacle of 2000-01 won't be surprised to learn that JPMorgan's traders have been accused of fraudulent behavior. Once again, the fraud was performed by manipulating the auction system that was developed by a quasi-state agency, the California Independent System Operator, to handle California's electricity needs. The Federal Energy Regulatory Commission found that JPMorgan engaged in 12 manipulative bidding strategies, which wound up forcing ratepayers to pay higher amounts than they should have - all because the bank wanted to find a cheap way to profit off of aging power plants in Southern California. JPMorgan used a variety of bait-and-switch strategies - duping Cal-ISO into paying exorbitant fees for running the plants at a low level, for instance, or manipulating the bidding system so that Cal-ISO was forced to pay rates that were many times higher than market rate. The fact that this kind of manipulation is still happening is upsetting. And while $410 million is a record settlement for the FERC, it's a drop in the bucket to JPMorgan, which reported $6.5 billion in quarterly profits this month.

Note: Remember Enron, which scammed millions and then went bankrupt, wiping out pensions of its many employees? To read CBS reports on how Enron purposely shut down power plants so they could cause and then cash in on the energy crisis, click here.


Researchers developing communication app for children with autism
2013-08-01, CBS News/Associated Press
http://www.cbsnews.com/news/researchers-developing-communication-app-for-chil...

University of Kansas researchers have received a $1.2 million grant to test whether an iPad voice output application can help children with autism. Similar apps have previously been developed for adults with autism. In June 2012, 60 Minutes interviewed a 27-year-old man with autism who uses the keypad on the iPad to type out letters, words and phrases. A robotic voice then reads the words on the screen, giving a voice to an intelligent young man who previously struggled to communicate. Other researchers have developed apps to test vocabulary and math skills of autistic children. They are finding that the apps reveal a greater level of intelligence than previously expected in many of the children. Lead researcher Kathy Thiemann-Bourque says many young children with autism have complex communication needs but do not develop functional speech. In previous research, she has examined both peer training and direct teaching strategies to increase social communication between children with autism and their classmates without disabilities.

Note: For an amazing eight-minute clip showing how a non-verbal autistic woman uses her computer to eloquently invite people into her world, click here. The amazing writing starts at 3:15. For a treasure trove of great news articles which will inspire you to make a difference, click here.


The Stench of the Potomac
2013-08-01, New York Magazine
http://nymag.com/news/frank-rich/this-town-washington-lobbyists-2013-8/

The tale of how the Obama economic team was recruited en masse from Robert Rubin acolytes who either facilitated Wall Street’s pre-crash recklessness while in the Clinton administration or cashed in on it later (or, like Rubin, did both) never loses its power to shock. Michael Froman, Rubin’s chief of staff as Clinton Treasury secretary, not only served as the Obama transition team’s personnel director but moonlighted as a Citigroup managing director while doing so. “Obama essentially entrusted the repairing of the china shop to the bulls who’d helped ransack it,” [Jeff] Connaughton writes [in The Payoff: Why Wall Street Always Wins]. [In This Town Mark] Leibovich updates the story of the tacky prehistory of the Obama White House with its aftermath—the steady parade of Obama alumni who traded change we can believe in for cash on the barrelhead as soon as they left public service. The starry list includes, among many others, Peter Orszag (director of the White House’s Office of Management and Budget, now at Citi), Jake Siewert (the Treasury Department counselor turned chief flack for Goldman Sachs), and David Plouffe (the campaign manager and senior presidential adviser who did consulting for Boeing and General Electric). “When I am president,” Obama had said in 2008, “I will start by closing the revolving door in the White House that’s allowed people to use their administration job as a stepping-stone to further their lobbying careers.” Puzzling over how so many colleagues have strayed from this credo, the former press secretary Robert Gibbs has theorized that either “somehow we have all changed” or, alternatively, “maybe Washington changed us.”

Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.


XKeyscore: NSA tool collects 'nearly everything a user does on the internet'
2013-07-31, The Guardian (One of the UK's leading newspapers)
http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.


The Public-Private Surveillance Partnership
2013-07-31, Bloomberg News
http://www.bloomberg.com/news/2013-07-31/the-public-private-surveillance-part...

Computers and networks inherently produce data, and our constant interactions with them allow corporations to collect an enormous amount of intensely personal data about us as we go about our daily lives. Sometimes we produce this data inadvertently simply by using our phones, credit cards, computers and other devices. Sometimes we give corporations this data directly on Google, Facebook, [or] Apple’s iCloud ... in exchange for whatever free or cheap service we receive from the Internet in return. The NSA is also in the business of spying on everyone, and it has realized it’s far easier to collect all the data from these corporations rather than from us directly. The result is a corporate-government surveillance partnership, one that allows both the government and corporations to get away with things they couldn’t otherwise. There are two types of laws in the U.S., each designed to constrain a different type of power: constitutional law, which places limitations on government, and regulatory law, which constrains corporations. Historically, these two areas have largely remained separate, but today each group has learned how to use the other’s laws to bypass their own restrictions. The government uses corporations to get around its limits, and corporations use the government to get around their limits. This partnership manifests itself in various ways. The government uses corporations to circumvent its prohibitions against eavesdropping domestically on its citizens. Corporations rely on the government to ensure that they have unfettered use of the data they collect.

Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.


EDF exits US nuclear, focuses on renewables
2013-07-31, Business Spectator/Reuters
http://www.businessspectator.com.au/news/2013/7/31/renewable-energy/edf-exits...

French utility EDF, the world's biggest operator of nuclear plants, is pulling out of nuclear energy in the United States, bowing to the realities of a market that has been transformed by cheap shale gas. Several nuclear reactors in the US have been closed or are being shuttered as utilities baulk at the big investments needed to extend their lifetimes now that nuclear power has been so decisively undercut by electricity generated from shale gas. "The spectacular fall of the price of gas in the US, which was unimaginable a few years ago, has made this form of energy ultra competitive vis a vis all other forms of energy," EDF Chief Executive Henri Proglio told a news conference. EDF agreed with its partner Exelon on an exit from their Constellation Energy Nuclear Group (CENG) joint venture, which operates five nuclear plants in the United States with a total capacity of 3.9 gigawatts. "Circumstances for the development of nuclear in the US are not favourable at the moment," Proglio said. International Energy Agency analyst Dennis Volk said CENG's eastern US power plants were located in some of the most competitive power markets in the country, with high price competition, growing wind capacity and cheap gas. "It is simply not easy to invest in nuclear and recover your money there," Volk said. Proglio said EDF would now focus on renewable energy in the United States. EDF employs 860 people in US solar and wind, and since 2010 its generating capacity has doubled to 2.3 gigawatts.

Note: For more on encouraging energy developments, see the deeply revealing reports from reliable major media sources available here.


Volkswagen stops academics from revealing car hack
2013-07-30, NBC News/Associated Press
http://www.nbcnews.com/id/52620905#.Uf0oE6zfKSo

A British university is delaying the release of an academic paper on how the anti-theft systems of millions of Volkswagen vehicles are at risk of being hacked after the German carmaker took legal action against it. In a statement, the University of Birmingham said it would "defer publication" of the paper — which explains how researchers were able to subvert Volkswagen's security system — after an interim injunction issued by England's High Court. It said it was "disappointed with the judgment which did not uphold the defense of academic freedom and public interest, but respects the decision." The paper ... revealed three ways to bypass a brand of computer chip used by several auto manufacturers to fight vehicle theft. Often referred to as immobilizers, such chips use a secret algorithm to ensure that a car can only be started with the right key, and they've been a mandatory in all new vehicles sold in Britain over the past 15 years. Crucially, the researchers planned to reveal how they were able to reverse-engineer the algorithm — and publish a copy of it in their paper. Volkswagen said that publishing the formula would be "highly damaging" and "facilitate theft of cars," according to a ruling handed down last month by High Court Justice Colin Birss. The judge said that millions of Volkswagen vehicles were issued with the chip, including high-end cars such as Porsches, Audis, Bentleys, and Lamborghinis. The researchers countered that Volkswagen's claim that the paper would be a boon to car thieves was overblown, that they had warned the chip's manufacturer about the vulnerability six months ago, and that a gag order would interfere with their legitimate academic work.

Note: For more on corporate corruption, see the deeply revealing reports from reliable major media sources available here.


Mutilated Cows Found at Missouri Farm, Police Not Ruling Out the Possibility of Aliens
2013-07-30, KMOX-TV (St. Louis CBS affiliate)
http://stlouis.cbslocal.com/2013/07/30/mutilated-cows-missouri-aliens/

Who would cut the tongues and take the reproductive organs from several cows? That’s the mystery police in a small town 90 miles away from Kansas City are dealing with. Robert Hills, Henry County Sheriff’s Chief Deputy, says the first cow was discovered in December of 2011, the second and third this summer. All were female cows and were owned by rancher Lyn Mitchell. “We couldn’t see any signs of trauma, and it doesn’t appear that there was any type of wild animal, such as coyotes, that were involved,” Hills told KMOX. The first cow discovered on Mitchell’s ranch had her tongue and ear removed. The next two discovered on July 9th and 19th of this year had their tongues removed along with their udders, anus, reproductive organs, and ears. A veterinarian wasn’t called to examine the first two cows. But one did examine the third one. Mitchell said the veterinarian told her the cuts to the cow were precise and surgical. Also what seems to be the common denominator of all these incidents is the lack of blood and other bodily fluids surrounding the area and inside the animal. Mitchell told the Mutual UFO Network (MUFON) that the third cow’s heart was removed and exposed, but was not taken. She believes that maybe whoever did this was interrupted and she does not rule out the possibility of aliens. “We’re having to look at this from two sides,” says Hills. “Some people believe that there are aliens that are involved in this or the possibility of the occult; going to the other end of the spectrum, we’ve talked to other people that say that just when cows die that’s what happens to their bodies. We’re just not able to determine what the cause of death is at this point,” Hills says.

Note: For more on UFOs, see the deeply revealing reports from reliable major media sources available here.


“Renegade Gardener” Plots World Domination Through Home-Grown Veggies
2013-07-30, Yes! Magazine
http://www.yesmagazine.org/people-power/gardening-is-gangsta-an-interview-wit...

Ron Finley grew up in South Central Los Angeles, a "food desert" where nutritious eats are chronically unavailable. But when the fashion designer [and] father got tired of driving 45 minutes to buy an organic tomato, he decided to grow his own. In the fall of 2010, he planted a "demonstration garden" on the strip of land between the curb and the sidewalk in front of his house in South Central Los Angeles, a neighborhood where he has lived all his life. He says he was tired of living in the "food prison"—where the lack of access to healthy foods was causing diabetes, obesity, and other health problems. "If you look at the statistics, the drive thrus literally are killing more people than the drive-bys," Finley says. Finley encouraged people to take what they needed from the garden. He shared tomatoes, peppers, melons, eggplant, pumpkins, and more with anyone who passed by his home, often people with few financial resources and little access to vegetables. In May of 2011, however, Finley received a citation from the city, which considered his plants "obstructions." They asked him to pay $400 for a permit or remove the garden. After getting 500 signatures on a petition posted on change.org and gaining the confidence of a city councilman, Finley received a permit for free and eventually provoked the city to relax its laws on curb strip usage. Since then, Finley has created the organization LA Green Grounds, which plants vegetable gardens in South Central yards free of charge and has installed public gardens in curb strips, homeless shelters, abandoned lots, and traffic medians. The all-volunteer organization has installed over 30 gardens.

Note: For an inspiring 10-minute TED talk given by Mr. Finley, click here. For a treasure trove of great news articles which will inspire you to make a difference, click here.


Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"