News ArticlesExcerpts of Key News Articles in Major Media
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
The owner of the e-mail service [Lavabit, Ladar Levison,] said he closed it down after the government, in pursuit of Edward J. Snowden, sought untrammeled access to the protected messages of all his customers. Mr. Levison was willing to allow investigators with a court order to tap Mr. Snowden’s e-mail account; he had complied with similar narrowly targeted requests involving other customers about two dozen times. But they wanted more, he said: the passwords, encryption keys and computer code that would essentially allow the government untrammeled access to the protected messages of all his customers. That, he said, was too much. On Aug. 8, Mr. Levison closed Lavabit rather than, in his view, betray his promise of secure e-mail to his customers. On [October 2], a federal judge unsealed documents in the case, allowing the tech entrepreneur to speak candidly for the first time about his experiences. He had been summoned to testify to a grand jury in Virginia; forbidden to discuss his case; held in contempt of court and fined $10,000 for handing over his private encryption keys on paper and not in digital form; and, finally, threatened with arrest for saying too much when he shuttered his business. While Mr. Levison’s struggles have been with the F.B.I., hovering in the background is the N.S.A., which has worked secretly for years to undermine or bypass encrypted services like Lavabit so that their electronic message scrambling cannot obstruct the agency’s spying. Mr. Levison’s case shows how law enforcement officials can use legal tools to pry open messages, no matter how well protected.
Note: For an excellent 15-minute BBC Newsnight interview with Glenn Greenwald defending Edward Snowden's release of secret documents, click here. For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Physical activity may be as effective as drugs in treating heart disease and should be included as a comparison in the development of new medicines, according to a review published today in the British Medical Journal. No statistically detectable differences were evident between exercise and drug treatment for patients with coronary heart disease or prediabetes, and exercise was more effective among patients recovering from a stroke, according to a review of 16 meta-analyses that included 305 studies involving 339,274 participants. The analysis adds to evidence showing the benefit of non-medical approaches to disease through behavior and lifestyle changes. Given the cost of drug treatment, regulators should consider requiring pharmaceutical companies to include exercise as a comparator in clinical trials of new medicines, according to authors Huseyin Naci of Harvard and John Ioannidis of Stanford. “Patients deserve to understand the relative impact that physical activity might have on their condition,” Naci and Ioannidis said in the published paper. In the meantime, “exercise interventions should therefore be considered as a viable alternative to, or, alongside, drug therapy.” A landmark study by Dean Ornish, founder of the Preventive Medicine Research Institute, found that a low-fat vegetarian diet, increased exercise and stress management can reduce heart disease more than standard medical care. Patients who receive training from medical professionals on Ornish’s program for reversing heart disease have been reimbursed by Medicare since January 2011.
Note: For more inspiring ideas on replacing drugs with exercise, see Dr. Mercola's article at this link. For more on important health issues, see the deeply revealing reports from reliable major media sources available here.
The US National Security Agency spied on civil rights leader Martin Luther King and boxer Muhammad Ali during the height of the Vietnam War protests, declassified documents reveal. The documents show the NSA also tracked journalists from the New York Times and the Washington Post and two senators. Some NSA officials later described the programme as "disreputable if not outright illegal", the documents show. The operation, dubbed "Minaret", was originally exposed in the 1970s. However, the names of those on the phone-tapping "watch list" had been kept secret until now. The secret papers were published after a government panel ruled in favour of researchers at George Washington University. The university's National Security Archive - a research institute that seeks to check government secrecy - described the names on the NSA's watch-list as "eye-popping". The agency eavesdropped on civil rights leaders Martin Luther King and Whitney Young as well as boxing champion Muhammad Ali, New York Times journalist Tom Wicker and Washington Post columnist Art Buchwald. The NSA also monitored the overseas phone calls of two prominent US senators - Democrat Frank Church and Republican Howard Baker. In 1967 the strength of the anti-war campaign led President Lyndon Johnson to ask US intelligence agencies to find out if some protests were being stoked by foreign governments. Many of those targeted were considered to be critics of US involvement in the Vietnam War. The NSA worked with other spy agencies to draw up the "watch lists" of anti-war critics, tapping their phone calls. The programme continued after Richard Nixon entered the White House in 1969.
Note: These names were kept secret until now allegedly for reason of "national security." Note how this term is repeatedly used to cover up illegal government activity solely to protect those who commit these crimes. For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
One of the most overlooked aspects of the NSA reporting in the US has been just how global of a story this has become. Last week it was revealed that Belgium's largest telecom, Belgacom, was the victim of a massive hacking attack which systematically compromised its system for as long as two years. Last week, using documents obtained from NSA whistleblower Edward Snowden, Laura Poitras and other Der Spiegel journalists reported in that paper that it was the GCHQ, Britain's intelligence agency, that was behind the attack. According to that report, the attack was carried out by targeting individual engineers at the telecom with malware that allowed GCHQ agents to "own" their computer and thus exploit their access to the telecommunications system. As the US and UK run around the world protesting the hacking activities of others and warning of the dangers of cyber-attacks, that duo is one of the most aggressive and malicious, if not the most aggressive and malicious, perpetrators of those attacks of anyone on the planet. Nobody hacks as prolifically and aggressively as the two countries who most vocally warn of the dangers of hacking. A coalition called Stop Watching Us has been formed by privacy and civil liberties groups from across the political spectrum. On October 26, the 12th anniversary of the enactment of the Patriot Act, they will hold an anti-surveillance rally in Washington DC.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Americans throw away 40 percent of the food they buy, often because of misleading expiration dates that have nothing to do with safety, said a study released [on September 18] by Harvard University Law School and the Natural Resources Defense Council, an environmental group. The report said 90 percent of Americans toss good food into the garbage because they mistakenly think that "sell by," "best before," "use by" or "packed on" dates on food containers indicate safety. One-fifth of consumers, the report said, "always" throw away food based on package dates. In fact, "sell by" dates are used by retailers for inventory control. "Best before" or "use by" dates usually reflect manufacturer estimates of peak quality. While some labels are intended to indicate freshness, none of them reflects edibility or safety, said Ted Labuza, a food science professor at the University of Minnesota who collaborated with the authors. "If food looks rotten and smells bad, throw it away, but just because it reaches a certain date does not mean the food is unsafe," Labuza said. "I don't know of any food poisoning outbreak that came from people eating food that was past its shelf-life date." The report estimated the value of food tossed away at $165 billion a year. Food waste is a big source of greenhouse gases. Wasting food also squanders vast quantities of water, land, fertilizers, petroleum, packaging and other resources that go into producing it. About a quarter of all fresh water used in the United States goes into the making of food that is thrown away, the report said.
Israel has 80 nuclear warheads and the potential to double that number, according to a new report by U.S. experts. In the Global Nuclear Weapons Inventories, recently published in the Bulletin of the Atomic Scientists, proliferation experts Hans M. Kristensen and Robert S. Norris write that Israel stopped production of nuclear warheads in 2004. But the country has enough fissile material for an additional 115 to 190 warheads, according to the report, meaning it could as much as double its arsenal. Previous estimates have been higher but the new figures agree with the 2013 Stockholm International Peace Research Institute yearbook on armament and international security. The yearbook estimated 50 of Israel's nuclear warheads were for medium-range ballistic missiles and 30 were for for bombs carried by aircraft. Although widely assumed a nuclear power, Israel has never acknowledged possessing nuclear weapons or capabilities and continues to maintain its decades-old "strategic ambiguity" policy on the matter, neither confirming nor denying foreign reports on the issue. In 1986, Mordechai Vanunu, an Israeli nuclear technician, leaked the country's alleged nuclear secrets to a British newspaper, and said Israel had at least 100 nuclear weapons. Vanunu was later convicted of espionage and treason and was released from jail in 2004 after serving 17 years. Israel continued to adhere to its vagueness policy after comments made by then-Prime Minister Ehud Olmert in 2006 were interpreted by many as an inadvertent confirmation that Israel had nuclear weapons.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
A man slips behind someone else into a packed elementary school with an AK-47-type weapon. He goes into the office and shoots at the ground, then darts between there and outside to fire at approaching police. So what do you do? If you're Antoinette Tuff, who works in the front office at Ronald E. McNair Discovery Learning Academy just outside Atlanta, you don't run. You talk. You divulge your personal struggles to the gunman, you tell him you love him, you even proactively offer to walk outside with him to surrender so police won't shoot. And then the nightmare ends with the suspect, later identified as Michael Brandon Hill, taken into custody and no one inside or outside the Decatur school even hurt, despite the gunfire. By the end -- with police themselves having never directly talked to him -- Tuff and the gunman were talking about where he would put his weapon, how he'd empty his pockets and where he'd lie down before authorities could get him. "It's going to be all right, sweetie," she tells Hill at one point [audible in the 911 call]. "I just want you to know I love you, though, OK? And I'm proud of you. That's a good thing that you're just giving up and don't worry about it. We all go through something in life." Tuff then let the gunman know that she'd been down before herself, but she'd picked herself up. He could, too. "I thought the same thing, you know, I tried to commit suicide last year after my husband left me," she said. "But look at me now. I'm still working and everything is OK." That day, for everyone at that school, everything did turn out OK. Shots were fired, but no one got hurt. The gunman never made it to the classroom area, deciding instead to give up and lay down.
Note: For a treasure trove of great news articles which will inspire you to make a difference, click here.
In just a decade, and using a deceptively simple approach, Kaiser Permanente doubled the percentage of Northern California patients whose blood pressures were brought down to healthy levels. The Kaiser program relied on close monitoring by a team of health care workers and the use of cheaper, more efficient drugs to treat high blood pressure. Over the course of an eight-year study, the percentage of patients with high blood pressure who had it under control increased from 44 percent in 2001 to 80 percent in 2009. The rate continued to climb after the study ended, and as of 2011, 87 percent of patients had lowered their high blood pressure to a healthy level. The results are intriguing because high blood pressure ... is treatable with medication and lifestyle changes, but has remained stubbornly difficult to control in most patients, Kaiser doctors said. During the years of the Kaiser study, the number of heart attacks and strokes fell substantially. Dr. Don Conkling, a 63-year-old Kaiser member who was part of the study, managed to get his blood pressure into a normal, healthy range for the first time since his early 40s. He lost about 60 pounds, cut out sugar and meat from his diet, and started walking several times a day, often for miles at a time, with his dog Sophie. Conkling, a veterinarian in San Bruno, also meditates every day for 45 minutes or longer to help reduce stress from his job. Not all patients have to make such drastic lifestyle changes to lower their blood pressure, Conkling said.
Note: For a treasure trove of great news articles which will inspire you to make a difference, click here.
Don't be fooled by terror alerts and dire warnings: the world in general is a safer place than ever. Don't believe me? Check out what Michael Morell, the No. 2 man at the CIA, had to say about the threats facing America in this recent interview with the Wall Street Journal. If anyone knows about foreign threats, it's gotta be this guy, right? He gets to see everything [at the CIA]. The fact is, none of what Morell describes as a threat actually is a significant threat. And while national security elites – from the secretary of defense to prominent think tank denizens like to describe the world today as a "dangerous" place, it simply isn't true. There were six wars last year (just six!). This follows a consistent trend of declining violence that dates back decades. When wars do occur, they pretty much never occur between states. Since the Gulf war of 1991, territorial conquest has gone the way of the dodo. Indeed, when the US fights a major war these days, it is generally because they've started it – with consistently disastrous results. What is most striking about Morell's warnings is, in fact, the stunning hollowness of the threats he describes. If Syria, North Korea and Iran are truly what threaten us, then truly, we have little to fear from the world outside our borders. That this grab-bag of minor threats is used to justify a defense budget in the range of $600bn, an active and reserve force of 1 million troops and a far-flung empire of military bases and partners – not to mention, a rather effective navy and air force, and thousands of nuclear weapons – is astounding. If this is best the CIA can do, they really need to pick up their game. So, rest easy, America. It's not so bad out there.
Note: Read the powerful words of a top US general showing that war is a racket resulting from greed and propaganda put out by banks and major corporations at this link. To watch the BBC's powerful documentary "Power of Nightmares", showing that "Al Qaeda" was likely fabricated and is in fact little more than a US/UK psychological operation to enable the Global War on Terror, click here.
Over the last year, I [CNN Chief Medical Correspondent Dr. Sanjay Gupta] have been working on a new documentary called "Weed." The title "Weed" may sound cavalier, but the content is not. I traveled around the world to interview medical leaders, experts, growers and patients. I spoke candidly to them, asking tough questions. What I found was stunning. Long before I began this project, I had steadily reviewed the scientific literature on medical marijuana from the United States and thought it was fairly unimpressive. Reading these papers five years ago, it was hard to make a case for medicinal marijuana. I even wrote about this in a TIME magazine article, back in 2009, titled "Why I would Vote No on Pot." Well, I am here to apologize. I apologize because I didn't look hard enough, until now. I didn't look far enough. I didn't review papers from smaller labs in other countries doing some remarkable research, and I was too dismissive of the loud chorus of legitimate patients whose symptoms improved on cannabis. I mistakenly believed the Drug Enforcement Agency listed marijuana as a schedule 1 substance because of sound scientific proof. Surely, they must have quality reasoning as to why marijuana is in the category of the most dangerous drugs that have "no accepted medicinal use and a high potential for abuse." They didn't have the science to support that claim, and I now know that when it comes to marijuana neither of those things are true. It doesn't have a high potential for abuse, and there are very legitimate medical applications. In fact, sometimes marijuana is the only thing that works.
Note: This article was authored by CNN's Chief Medical Correspondent, Dr. Sanjay Gupta. For more on the proven benefits from many mind-altering drugs, see the deeply revealing reports from reliable major media sources available here.
Today's high-end televisions are almost all equipped with "smart" PC-like features, including Internet connectivity, apps, microphones and cameras. But a recently discovered security hole in some Samsung Smart TVs shows that many of those bells and whistles aren't ready for prime time. The flaws in Samsung Smart TVs, which have now been patched, enabled hackers to remotely turn on the TVs' built-in cameras without leaving any trace of it on the screen. While you're watching TV, a hacker anywhere around the world could have been watching you. Hackers also could have easily rerouted an unsuspecting user to a malicious website to steal bank account information. Samsung quickly fixed the problem after security researchers at iSEC Partners informed the company about the bugs. Samsung sent a software update to all affected TVs. But the glitches speak to a larger problem of gadgets that connect to the Internet but have virtually no security to speak of. Security cameras, lights, heating control systems and even door locks and windows are now increasingly coming with features that allow users to control them remotely. Without proper security controls, there's little to stop hackers from invading users' privacy, stealing personal information or spying on people. In the case of Samsung Smart TVs, iSEC researchers found that they could tap into the TV's Web browser with ease, according to iSEC security analyst Josh Yavor. That gave hackers access to all the functions controlled by the browser, including the TV's built-in camera. "If there's a vulnerability in any application, there's a vulnerability in the entire TV," said Aaron Grattafiori, also an analyst at iSEC.
Note: For how deep this problem goes, read this article. For more on corporate and government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
GCHQ has received at least Ł100 million from the US to help fund intelligence gathering, raising questions over American influence on the British agencies. The money was paid across a range of projects over three years and resulted in GCHQ spying on behalf of America, according to leaked documents. It also emerged that the intelligence agency wants the ability to “exploit any phone, anywhere, any time” and that some staff have raised concerns over the “morality and ethics” of their operational work. The payments from the US National Security Agency (NSA) are detailed in GCHQ’s annual “investment portfolios”, leaked by Mr Snowden to The Guardian. The NSA paid GCHQ Ł22.9 million in 2009, Ł39.9 million in 2010 and Ł34.7 million in 2011/12. The 2010 funding included ... Ł17.2 million for the agency’s “Mastering the Internet” project, which gathers “raw” information from the web to be analysed. In return, GCHQ has to have the American view in mind when prioritising work, the papers claim. One strategy briefing disclosed the pressure on GCHQ to meet NSA demands, saying: “GCHQ must pull its weight and be seen to pull its weight.” In another document, from 2010, GCHQ apparently acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
A woman who wore a meat dress was never going to be massively phased by even the most ghoulish piece of performance art. But still, there was an incredible nonchalance about Lady Gaga as she scooped fake blood sauce from a woman's naked body at the 20th annual benefit for the Watermill Center. Gaga arrived with performance artist Marina Abramovic and the center’s director Robert Wilson then mingled with stars like Hugh Jackman and Winona Ryder. The 27-year-old then caused even more of a commotion by bidding $60,000 to buy an Abramovic work, a wall-mounted quartz brick. After the dinner and auction, hosted by Alan Cumming, guests danced with several women wearing nothing but body paint. Gaga, then spotted the woman covered in blood, an onlooker told the NY Post: 'There was a casket with a totally naked woman laying in what looked like a pool of blood. On a table nearby there was a row of little spoons — no one had touched them, because no one knew what they were for. [Wilson] gave two spoons to Gaga and Marina . . . and Gaga dipped the spoon right between the artist’s legs, and took a sip.' She then, 'proceeded to lick the spoon.'
Note: See how this is related to the Pizzagate case in our thoroughly research essay on this topic.
Using techniques of exquisite sensitivity and technological finesse, astronomers have spent the past two decades on an astonishing voyage of cosmic discovery. They have found that the universe is full of planets: cold, small, and dark next to their large and glaring suns, these worlds have previously been hidden from us. To spot them represents a challenge that has been compared to looking across thousands of miles to see a firefly buzzing around a brilliant searchlight. They exert a gravitational pull, tugging their parent stars into a gently wobbling motion that we can now detect. We now have firm evidence for thousands of planets, around thousands of stars. We also know something about these worlds, their sizes, their orbits, often their ages. In a handful of cases ... we have even measured the temperature of their upper atmospheres and [determined] their gaseous chemistry, finding substances like sodium, methane and water. No matter how conservative or optimistic we are, the statistics tell us that something like an astonishing one out of every seven stars must harbor a planet similar in size to the Earth, and at roughly the right orbital distance to allow for the possibility of a temperate surface environment. In other words, roughly 15 percent of all suns could, in principle, be hosting a place suitable for life as we know it. Since our galaxy contains at least 200 billion stars, this implies a vast arena for the universe’s ubiquitous carbon chemistry to play in — a process that, as here on Earth, might lead to the complex machinery of life. Indeed, there is a 95-percent confidence — give or take a few percent — that one of these worlds could be within a mere 16 light years of us.
Note: For fascinating testimony from top military and government officials revealing a major cover-up of the existence of UFOs and ETs, click here. For more on the nature of reality, see the deeply revealing reports from reliable major media sources available here.
[On July 17 Delaware] Gov. Jack Markell is scheduled to sign a law creating a new “public benefit corporation” where directors must balance the interests of the owners with those of employees, the general public and the environment. Delaware becomes the 19th state to pass such a law, but it may be the most important one since it is home to half of all publicly traded U.S. companies. Not that Ford Motor Co. or Intel are likely to avail themselves of this new corporate structure. Under the Delaware law, 90% of shareholders must approve a shift to benefit status. The law will likely be more popular with closely held firms like Etsy, the online marketplace for handmade products with more than $500 million a year in sales. It gives them a chance to declare a broader set of objectives than profit alone, and a legal structure to pursue them without risking lawsuits by disgruntled shareholders who might prefer a fatter dividend, say, than the comfort of knowing no endangered species were wiped out by their company’s logging operations. Under the new Delaware law, the purpose of a public benefit corporation is to operate in a “responsible and sustainable manner.” Directors can’t be sued for pursuing objectives that advance “artistic, charitable, cultural …scientific or technological” goals. The benefit corporation movement has even formed the Sustainability Accounting Standards Board to come up with the equivalent of GAAP for the Birkenstock-wearing set.
Note: For more on this exciting development, see the Huffington Post article written by Delaware's governor at this link.
In the era of intense government surveillance and secret court orders, a murky multimillion-dollar market has emerged. Paid for by U.S. tax dollars, but with little public scrutiny, surveillance fees charged in secret by technology and phone companies can vary wildly. AT&T, for example, imposes a $325 "activation fee" for each wiretap and $10 a day to maintain it. Smaller carriers Cricket and U.S. Cellular charge only about $250 per wiretap. But snoop on a Verizon customer? That costs the government $775 for the first month and $500 each month after that. Regardless of price, the surveillance business is growing. The U.S. government long has enjoyed access to phone networks and high-speed Internet traffic under the U.S. Communications Assistance for Law Enforcement Act to catch suspected criminals and terrorists. More recently, the FBI has pushed technology companies like Google and Skype to guarantee access to real-time communications on their services. As the number of law enforcement requests for data grew and carriers upgraded their technology, the cost of accommodating government surveillance requests increased. AT&T, for example, said it devotes roughly 100 employees to review each request and hand over data. Likewise, Verizon said its team of 70 employees works around the clock, seven days a week to handle the quarter-million requests it gets each year.
Note: For more on government and corporate attacks on privacy, see the deeply revealing reports from reliable major media sources available here.
Peter Doshi ... is one of the most influential voices in medical research today. Dr. Doshi’s renown comes not from solving the puzzles of cancer or discovering the next blockbuster drug, but from pushing the world’s biggest pharmaceutical companies to open their records to outsiders. Together with a band of far-flung researchers and activists, he is trying to unearth data from clinical trials — complex studies that last for years and often involve thousands of patients across many countries — and make it public. The current system, the activists say, is one in which the meager details of clinical trials published in medical journals, often by authors with financial ties to the companies whose drugs they are writing about, is insufficient to the point of being misleading. For years, researchers have talked about the problem of publication bias, or selectively publishing results of trials. Concern about such bias gathered force in the 1990s and early 2000s, when researchers documented how, time and again, positive results were published while negative ones were not. Taken together, studies have shown that results of only about half of clinical trials make their way into medical journals. In 2009, Dr. Doshi and his colleagues set out to answer a simple question about the anti-flu drug Tamiflu: Does it work? Resolving that question has been far harder than they ever envisioned, and, four years later, there is still no definitive answer.
Note: If the public is going to be taking these drugs, shouldn't all safety studies be publicly available? What are the drug companies hiding? For more on corruption in the pharmaceutical industry, see the deeply revealing reports from reliable major media sources available here.
Former FBI supervisor John Morris thought he had left his sordid relationship with James "Whitey" Bulger back in Boston along with the envelopes of money, the cases of expensive wine, the home-cooked meals he had prepared for the accused mob boss. Then the phone rang one night. It was 1995 and Bulger had become a fugitive from justice. It was Bulger on the phone. And he was livid. A Boston newspaper had reported that Bulger was a longtime FBI informant, and Bulger wanted Morris to have the story retracted. "He said if he was going to jail ... I was going with him." Morris testified in the trial of Bulger, 83, who is accused of a string of crimes, including 19 murders. Testimony during the trial has stated Bulger ran a criminal enterprise with the help of corrupt FBI agents [John] Connolly and Morris, and that Bulger was an FBI informant concerning his criminal rivals. Morris' testimony put a spotlight on a staggering amount of corruption in the Boston FBI field office that included cash bribes and tip-offs to wiretaps. Connolly's relationship with Bulger extended into the Massachusetts State House, Morris testified. His friendship with Bulger's brother, then Senate President William Bulger, [could] land him a job as the Boston police commissioner upon his retirement from the bureau. Connolly's behavior did not raise any eyebrows with the Special Agents in Charge of the Boston FBI field office, Morris told the court. In fact it was quite the opposite. FBI bosses sought Connolly's friendship, Morris testified. "He had tremendous access across the board to everything including sports events, political figures," Morris testified.
Note: For more on major corruption within the FBI and other intelligence services, see the deeply revealing reports from reliable major media sources available here.
The peculiar circumstances of journalist Michael Hastings' death in Los Angeles last week have unleashed a wave of conspiracy theories. Now there's another theory to contribute to the paranoia: According to a prominent security analyst, technology exists that could [have] allowed someone to hack his car. Former U.S. National Coordinator for Security, Infrastructure Protection, and Counter-terrorism Richard Clarke [said] that what is known about the single-vehicle crash is "consistent with a car cyber attack." Clarke said, "There is reason to believe that intelligence agencies for major powers" -- including the United States -- know how to remotely seize control of a car. "It's relatively easy to hack your way into the control system of a car, and to do such things as cause acceleration when the driver doesn't want acceleration, to throw on the brakes when the driver doesn't want the brakes on, to launch an air bag," Clarke told The Huffington Post. Hastings was driving a 2013 Mercedes C250 coupe when he crashed into a tree on Highland Ave. in Los Angeles at approximately 4:30 am on June 18. Video posted online showed the car in flames, and one neighbor told a local news crew she heard a sound like an explosion. Another eyewitness said the car's engine had been thrown 50 to 60 yards from the car. There were no other vehicles involved in the accident. The fire was so all-consuming that it took the Los Angeles County coroner's office two days to identify Hastings' body, but Clarke said a cyber attack on the vehicle would have been nearly impossible to trace "even if the dozen or so computers on board hadn't melted."
Note: For a video of a DARPA specialist talking about how any computerized function of a car can be taken over, click here. This news article shows how a university test proved a car's onboard computer can be hacked. For an excellent video presenting powerful evidence that Hastings' death was anything but suicide, click here. For a Fox News video showing other evidence of premeditated murder, click here. In this video, a good friend states he had just received an email from Hastings that he had a story on the CIA that would be the biggest story yet. A later email then said he was worried as he was now under FBI investigation.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.