News ArticlesExcerpts of Key News Articles in Major Media
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
It has been an infuriating few days for anyone who values the freedom of the press, as authorities in the United Kingdom resorted to the tactics of tyrants and thugs to squelch reporting that they simply don't like. In acts clearly calibrated for optimal intimidation, they have detained the partner of a journalist, threatened to shut down a reporting operation that has prompted a critical public debate over government spying and forced the destruction of a major publication's hard drives. It's breathtaking in its audacity - and if it comes to light that the U.S. government took any part in organizing, encouraging or supporting these acts, it will warrant immediate congressional investigation. As it is, the accelerating assaults on investigative journalism [indicate the need for] stronger protections for journalists and their sources. Using laws designed to ferret out suspected terrorists to detain a person aiding acts of journalism is a cut-and-dried abuse of government power, an act of intimidation that may well be illegal - and certainly should be. It gives the lie to the naive but oft-repeated notion that if you've done no wrong, you have nothing to fear. Such attacks on investigative journalism here and abroad appear to be escalating. The Justice Department has been caught spying on reporters at the Associated Press, and named a Fox News reporter a "co-conspirator" in a leak inquiry. Judges have threatened reporters at both the New York Times and Fox News with jail time for refusing to disclose their sources.
Note: For more on government attacks on civil liberties, see the deeply revealing reports from reliable major media sources available here.
Five decades after President John F. Kennedy was fatally shot and long after official inquiries ended, thousands of pages of investigative documents remain withheld from public view. The contents of these files are partially known — and intriguing — and conspiracy buffs are not the only ones seeking to open them for a closer look. Some serious researchers believe the off-limits files could shed valuable new light on nagging mysteries of the assassination — including what U.S. intelligence agencies knew about accused assassin Lee Harvey Oswald before Nov. 22, 1963. It turns out that several hundred of the still-classified pages concern a deceased CIA agent, George Joannides, whose activities just before the assassination and, fascinatingly, during a government investigation years later, have tantalized researchers for years. "This is not about conspiracy, this is about transparency," said Jefferson Morley, a former Washington Post reporter and author embroiled in a decade-long lawsuit against the CIA, seeking release of the closed documents. "I think the CIA should obey the law. I don't think most people think that's a crazy idea." But so far, the Joannides files and thousands more pages primarily from the CIA remain off-limits at a National Archives center in College Park, Md. Anthony Summers, a British author whose sequel to his JFK book Not In Your Lifetime will be released this year, [said] "By withholding Joannides material, the agency continues to encourage the public to believe they're covering up something more sinister."
Note: For more on the strange secrecy around Joannides and his checkered past, see the New York Times article summarized here. For more on political assassinations, see the deeply revealing reports from reliable major media sources available here.
For reasons unknown, the government finally has admitted that Area 51 — the Shangri-La of alien hunters and a sturdy trope of science-fiction movies — is a real place in the Mojave Desert about 100 miles north of Las Vegas. Area 51 is confirmed in declassified CIA documents posted online [by] the National Security Archive at George Washington University. A dogged researcher pried from the CIA a report on the history of the U-2 spy plane, which was tested and operated at Area 51. The military, which runs the base, always denied that Area 51 was called by its famous moniker. “Your honor, there is no name,” an Air Force attorney told a federal judge in 1995. “There is no name for the operating location near Groom Lake.” The hearing was part of an environmental poisoning case brought by Area 51 workers who said that they had been sickened by exposure to toxic chemicals ... burned in open pits on the base. The men could tell no one what they did; they had signed national-security oaths barring any disclosures about the black-budget facility, where the stealth bomber also was tested. National Security Archive fellow Jeffrey Richelson [filed a FOIA] request in 2005 and the documents arrived about a month ago. Therein, the first-ever reference to Area 51. Why was the veil finally lifted? “It is something we do not know the answer to,” Richelson said. “One of the things I want to find out is the genesis of this decision: Why did they not redact it?” The secrecy surrounding Area 51 amplified conspiracy theories claiming it was infested with extraterrestrials — a notion popularized in movies such as “Independence Day” and, more recently, “Super 8.”
Note: After denying its existence for so many years, the government admits it was lying all along. What else aren't they telling us? For powerful, reliable information suggesting a major cover-up around UFOs, click here.
Josh del Sol got curious in the summer of 2011 after a friend linked a serious illness to the recent installation of a "smart meter." Del Sol subsequently learned that electrical utilities across North America had been quietly installing "smart grids" that ... monitor Internet-connected meters and appliances in homes and businesses. Now, del Sol is on the verge of premiering a feature-length documentary ... titled Take Back Your Power, disclosing questionable industry practices in support of implementing networked control systems for power plants. The film links billing mistakes, invasive monitoring, even human illnesses to the rising use of smart grids in the U.S. and Europe. "Take Back Your Power delivers an ominous, powerful message about the energy industry's shift to closely watching how customers use energy in their home in an invasive, controversial manner," says Lee Waterworth, president of Yekra, a video-on-demand company. Del Sol says access to industry sources was tough. "We had a difficult time getting anyone in the industry to talk to us on camera once they found out that we were wanting to get to the bottom of some of these concerns," he says. The filmmaker was surprised by the contrast between the views of industry officials and those of ordinary citizens trying to get to the bottom of safety, privacy and health concerns. Del Sol hopes the documentary helps to prompt the electricity industry "to provide more transparency, accountability and clarity on the issues we explore in the film."
Note: You can find this documentary on the Internet. For more, read how solar providers are using "smart" systems to help their customers save money while traditional utilities use these systems only to cut their own costs. Meanwhile, concerns about the health impacts of wireless tech and the ongoing erosion of privacy rights continue to grow.
A Texas-based encrypted email service recently revealed to be used by Edward Snowden - Lavabit - announced yesterday it was shutting itself down in order to avoid complying with what it perceives as unjust secret US court orders to provide government access to its users' content. "After significant soul searching, I have decided to suspend operations," the company's founder, Ladar Levinson, wrote in a statement to users posted on the front page of its website. He said the US directive forced on his company "a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit." He chose the latter. CNET's Declan McCullagh ... speculates that Lavabit was served "with [a] federal court order to intercept users' passwords" to allow ongoing monitoring of emails; specifically: "the order can also be to install FedGov-created malware." After challenging the order in district court and losing - all in a secret court proceeding, naturally - Lavabit shut itself down to avoid compliance while it appeals to the Fourth Circuit. What is particularly creepy about the Lavabit self-shutdown is that the company is gagged by law even from discussing the legal challenges it has mounted and the court proceeding it has engaged. In other words, the American owner of the company believes his Constitutional rights and those of his customers are being violated by the US Government, but he is not allowed to talk about it. Lavabit has been told that they would face serious criminal sanctions if they publicly discuss what is being done to their company.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
In ... the Journal of Law, Medicine and Ethics (JLME), Donald W. Light of the School of Public Health, University of Medicine & Dentistry of NJ, wrote an article entitled “Risky Drugs: Why The FDA Cannot Be Trusted”. The bulk of his essay focuses not on his views about pharma’s competence but rather on his issues with the FDA. While I found a number of his comments troubling, the following stood out. “The ... article in JLME also presents systematic, quantitative evidence that since the industry started making large contributions to the FDA for reviewing its drugs, as it makes large contributions to Congressmen ... drugs approved are significantly more likely to cause serious harm, hospitalizations, and deaths.” This is a pretty damning comment. Basically, Light is saying that pharma paid congressmen to sponsor legislation that results in the FDA being beholden to pharma for funding for its work. Implicit in this is that, as a result of these large “contributions”, the grateful FDA is rapidly approving medicines that are harmful.
Note: For more along these lines, see concise summaries of deeply revealing news articles about big pharma profiteers and government corruption.
During last week’s Black Hat computer security conference in Las Vegas, researchers from iSEC Partners demonstrated a vulnerability in 2012 models of Samsung’s line of Smart TVs, particularly the ones with that come with cameras designed for teleconferencing. The problem with the Samsung TVs highlights a much larger issue: The number of devices connected to the Internet is growing exponentially, and many of them have little or no security in place. Flaws may be found in almost any application on an Internet-connected platform that, if exploited, could allow access to the entire device, and then the user’s full network. Many of these unsecured devices can be found with a simple search. In fact, there’s a search engine devoted just to scouring the so-called “Internet of things” called Shadon. Playing around with it is an eye-opener. For example, in late July a writer for Forbes discovered an entire home automation product line with Internet-connected features that could be set up without a default password, and were visible to search engines. This would enable a hacker to search and find these systems on the Net, then access them at will. To prove her point, Kashmir Hill breached the home automation systems of random strangers, called them on the phone and demonstrated the vulnerability by turning their lights on and off.
Note: For more on corporate and government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
When you're watching TV ... you probably don't think someone could be on the other side watching you back. An alarming security flaw in Samsung's Smart-TVs makes this scenario possible. LAURIE SEGALL [CNN Money/Technology Correspondent]: We've spoken to a lot of folks and they're saying there are major vulnerabilities. YAVOR: One of the things we were able to do with the Smart-TV platform was abuse the browser so that we could actually gain access to the camera that's built into the TV. What we can prove here is that with a little bit of extra code, we can turn the camera on in your browser. This is something we can do invisibly and actually have it run behind the web page you're looking at. I could be sitting at a laptop in a cafe in Paris, and as long as I have a web connection, I would be able to get into your TV and access your camera. AARON GRATTAFIORI [security consultant]: The scary thing about it is that it doesn't give an indication that the camera is on and there is no LED that shows up when the camera is on. So they could actually be watching you and you would never even know. SEGALL: What is a Smart-TV, and why is it a playground, essentially, for hackers? GRATTAFIORI: It's a computer. So instead of being a tube and some other electronics, now it has a web browser and it has a lot of devices running Linux.
Note: To watch this video clip on CNN News, click here.
The CIA has been subjecting operatives to monthly polygraph tests in an attempt to suppress details of a reported US arms smuggling operation in Benghazi that was ongoing when its ambassador was killed by a mob in the city last year, according to reports. Up to 35 CIA operatives were working in the city during the attack last September on the US consulate that resulted in the death of Ambassador Chris Stevens and three other Americans, according to CNN. The television network said that a CIA team was working in an annex near the consulate on a project to supply missiles from Libyan armouries to Syrian rebels. Sources said that more Americans were hurt in the assault ... than had been previously reported. CIA chiefs were actively working to ensure the real nature of its operations in the city did not get out. So only the losses suffered by the State Department in the city had been reported to Congress. Frank Wolf, a US congressman who represents the district that contains CIA headquarters in Langley, Virginia, is one of 150 members of Congress for a new investigation into the failures in Benghazi. "I think it is a form of a cover-up, and I think it's an attempt to push it under the rug," he said. "We should have the people who were on the scene come in, testify under oath, do it publicly, and lay it out. And there really isn't any national security issue involved with regards to that."
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
JPMorgan Chase & Co. has agreed to pay federal regulators $410 million to settle allegations that the giant bank manipulated energy markets in California and Michigan. About $285 million of the settlement will go to the U.S. Treasury for civil penalties, and about $124 million will be refunded to California ratepayers. The remainder will be refunded to Michigan ratepayers. If this story sounds familiar, that's because it is. Californians who remember the Enron energy debacle of 2000-01 won't be surprised to learn that JPMorgan's traders have been accused of fraudulent behavior. Once again, the fraud was performed by manipulating the auction system that was developed by a quasi-state agency, the California Independent System Operator, to handle California's electricity needs. The Federal Energy Regulatory Commission found that JPMorgan engaged in 12 manipulative bidding strategies, which wound up forcing ratepayers to pay higher amounts than they should have - all because the bank wanted to find a cheap way to profit off of aging power plants in Southern California. JPMorgan used a variety of bait-and-switch strategies - duping Cal-ISO into paying exorbitant fees for running the plants at a low level, for instance, or manipulating the bidding system so that Cal-ISO was forced to pay rates that were many times higher than market rate. The fact that this kind of manipulation is still happening is upsetting. And while $410 million is a record settlement for the FERC, it's a drop in the bucket to JPMorgan, which reported $6.5 billion in quarterly profits this month.
Note: Remember Enron, which scammed millions and then went bankrupt, wiping out pensions of its many employees? To read CBS reports on how Enron purposely shut down power plants so they could cause and then cash in on the energy crisis, click here.
Computers and networks inherently produce data, and our constant interactions with them allow corporations to collect an enormous amount of intensely personal data about us as we go about our daily lives. Sometimes we produce this data inadvertently simply by using our phones, credit cards, computers and other devices. Sometimes we give corporations this data directly on Google, Facebook, [or] Apple’s iCloud ... in exchange for whatever free or cheap service we receive from the Internet in return. The NSA is also in the business of spying on everyone, and it has realized it’s far easier to collect all the data from these corporations rather than from us directly. The result is a corporate-government surveillance partnership, one that allows both the government and corporations to get away with things they couldn’t otherwise. There are two types of laws in the U.S., each designed to constrain a different type of power: constitutional law, which places limitations on government, and regulatory law, which constrains corporations. Historically, these two areas have largely remained separate, but today each group has learned how to use the other’s laws to bypass their own restrictions. The government uses corporations to get around its limits, and corporations use the government to get around their limits. This partnership manifests itself in various ways. The government uses corporations to circumvent its prohibitions against eavesdropping domestically on its citizens. Corporations rely on the government to ensure that they have unfettered use of the data they collect.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
A group of experts advising the nation’s premier cancer research institution has recommended changing the definition of cancer and eliminating the word from some common diagnoses as part of sweeping changes in the nation’s approach to cancer detection and treatment. The recommendations, from a working group of the National Cancer Institute, were published [in] The Journal of the American Medical Association. They say, for instance, that some premalignant conditions, like one that affects the breast called ductal carcinoma in situ, which many doctors agree is not cancer, should be renamed to exclude the word carcinoma so that patients are less frightened and less likely to seek what may be unneeded and potentially harmful treatments that can include the surgical removal of the breast. The group, which includes some of the top scientists in cancer research, also suggested that many lesions detected during breast, prostate, thyroid, lung and other cancer screenings should not be called cancer at all but should instead be reclassified as IDLE conditions, which stands for “indolent lesions of epithelial origin.” The impetus behind the call for change is a growing concern among doctors, scientists and patient advocates that hundreds of thousands of men and women are undergoing needless and sometimes disfiguring and harmful treatments for premalignant and cancerous lesions that are so slow growing they are unlikely to ever cause harm. Once doctors and patients are aware a lesion exists, they typically feel compelled to biopsy, treat and remove it, often at great physical and psychological pain and risk to the patient.
Note: Isn't it interesting that a diagnosis which might not even be accurate can so change a person's life? For more on promising cancer cures which are being suppressed by the medical-industrial complex, see the deeply revealing reports from reliable major media sources available here.
Last year when American Paradigm Schools took over Philadelphia's infamous, failing John Paul Jones Middle School, they did something a lot of people would find inconceivable. The school was known as "Jones Jail" for its reputation of violence and disorder, and because the building physically resembled a youth correctional facility. Situated in the Kensington section of the city, it drew students from the heart of a desperately poor hub of injection drug users and street level prostitution where gun violence rates are off the charts. But rather than beef up the already heavy security to ensure safety and restore order, American Paradigm stripped it away. During renovations, they removed the metal detectors and barred windows. The police predicted chaos. But instead, new numbers seem to show that in a single year, the number of serious incidents fell by 90%. The school says it wasn't just the humanizing physical makeover of the facility that helped. Memphis Street Academy also credits the Alternatives to Violence Project (AVP), a noncoercive, nonviolent conflict resolution regimen originally used in prison settings that was later adapted to violent schools. AVP, when tailored to school settings, emphasizes student empowerment, relationship building and anger management over institutional control and surveillance. There are no aggressive security guards in schools using the AVP model; instead they have engagement coaches, who provide support, encouragement, and a sense of safety.
Note: For a treasure trove of great news articles which will inspire you to make a difference, click here.
On Feb. 5, 1971, Edgar Mitchell became the sixth of only 12 men to step on the moon. Of that elite dozen, ... Mitchell is the only one to go on record about his controversial belief in extraterrestrial UFOs -- and of a possible government cover-up. While on active duty as a test pilot for the U.S. Navy, he completed an M.S. in aeronautical engineering at the U.S. Naval Postgraduate School and a doctorate in aeronautics at the Massachusetts Institute of Technology. Mitchell also served in combat during the Korean War as a fighter pilot. In 1970, he was awarded the Presidential Medal of Freedom. After retiring from NASA in 1972, he founded the Institute of Noetic Sciences. [Q]: You’re ... known for your views on UFOs. What’s your experience regarding the Roswell, New Mexico, incident of 1947? Mitchell: After my space flight, I was contacted by descendants of the original Roswell observers, including the person who delivered the child-sized coffins to the Air Force [alleged] to contain alien bodies. They all seemed credible with their stories that the bodies found were alien. [Q.]: If that’s the case, why has it been hushed up? Mitchell: Initially I think there was justification in that leadership officials thought people weren’t ready to handle it. But we are well past that now. But it’s not just military. It’s a cabal of organizations primarily for a profit motive. Think of what that could mean in terms of space travel with control of UFO machinery, technology. There’s a lot of money involved.
Note: For Mercury and Gemini astronaut Gordon Cooper on his personal experience with UFOs, click here. Edgar Mitchell wrote The Way of the Explorer to document his experiences with mysticism and space. For a more detailed description of his thoughts on UFOs, click here and here. For other reliable information on UFOs and the related cover-up, see our UFO Information Center available here.
Seventeen years ago, a nervous-sounding woman rang and asked me to publicise a top-secret report. She was not the whistleblower, she explained, but a go-between. She would not give me her name: “It’s safer if you don’t know.” That secret report revealed the extensive rape and savage beating of countless children in North Wales children’s homes. It was titled “Child Abuse: An independent investigation commissioned by Clwyd County Council, period 1974-1995”. Last week, John Jillings’ report on the Clwyd scandal was finally published. But Flintshire county council – successor to Clwyd – has heavily censored it. I dug out the original and discovered, unsurprisingly, that the cover-up continues. At least one paper and a news channel independently acquired the report: clearly, others whistle-blew. The coverage was widespread, and the whistleblowers’ drip-feed strategy worked: no one was arrested or sued. Clamour mounted, and the Government announced a public inquiry. The late judge, Sir Ronald Waterhouse, took evidence over three years, and in 2000 produced a report, “Lost in Care”. His tribunal had cost millions and ultimately achieved little, other than fat fees for lawyers. It amplified the horrors described by Jillings but it did not lead to arrests or managers being disciplined or struck off. The authorities had issued such stern libel threats to Jillings’s panel that it only named a few of the accused staff who were allowed to resign unpunished. But he exposed the excuses of the jobsworths who allowed sadists to control these terrible homes. This is the real censored dynamite in the report.
Note: For more on sex abuse scandals, see the deeply revealing reports from reliable major media sources available here.
Pop quiz: Name a state residential school where children were enrolled in medical experiments over an almost 20-year period, in which they were unknowingly fed a steady diet of radioactive isotopes, subjected to regular blood draws, and placed in solitary confinement if they refused to cooperate. Answer: the Walter E. Fernald State School in Waltham [Mass.} during the mid 20th century. Unfortunately, as Allen Hornblum, Judith Newman, and Gregory Dober painfully describe in their chilling new book, Against Their Will: The Secret History of Medical Experimentation on Children in Cold War America, Fernald was not the only institution in the country, or even in the state, where children were conscripted into sometimes deadly medical experiments. These were conducted by ambitious physicians and scientists whose belief in what they were trying to accomplish often blinded them to the potentially horrific consequences of their actions. “Against Their Will’’ opens with an overview of the eugenics movement in the United States, which found sympathizers among many luminaries of American medicine in the 19th and early 20th centuries. With its disdain for the disabled, who were considered genetically inferior, the movement paved the way for use of “defective’’ children in research. The book then provides multiple examples of medical experiments perpetrated on developmentally delayed and physically disabled children at multiple institutions across the country over the course of decades, often reading like case studies straight out of the 1947 Nazi doctors’ trial.
Note: For a long list of verifiable incidents where unknowing citizens were used as guinea pigs on a massive scale, click here.
The top U.S. special operations commander, Adm. William McRaven, ordered military files about the Navy SEAL raid on Osama bin Laden's hideout to be purged from Defense Department computers and sent to the CIA, where they could be more easily shielded from ever being made public. The secret move, described briefly in a draft report by the Pentagon's inspector general, set off no alarms within the Obama administration even though it appears to have sidestepped federal rules and perhaps also the U.S. Freedom of Information Act. The CIA, noting that the bin Laden mission was overseen by then-CIA Director Leon Panetta before he became defense secretary, said that the SEALs were effectively assigned to work temporarily for the CIA, which has presidential authority to conduct covert operations. The records transfer was part of an effort by McRaven to protect the names of the personnel involved in the raid, according to the inspector general's draft report. But secretly moving the records allowed the Pentagon to tell The Associated Press that it couldn't find any documents inside the Defense Department that AP had requested more than two years ago, and would represent a new strategy for the U.S. government to shield even its most sensitive activities from public scrutiny. "Welcome to the shell game in place of open government," said Thomas Blanton, director of the National Security Archive, a private research institute at George Washington University. "Guess which shell the records are under. If you guess the right shell, we might show them to you. It's ridiculous."
Note: For a powerful analysis of the strong evidence that Osama bin Laden most likely died in Afghanistan in December 2001, long before he was "killed" by the SEALs raid in Pakistan, read David Ray Griffin's Osama bin Laden: Dead or Alive? For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
CNBC’s BRIAN SULLIVAN: Is there anyone else in the Senate that is a professor? ELIZABETH WARREN: I don't think so. ... We had the big crash in 2008. What does everyone say about it? They say too much concentration in financial services creates too big to fail. It puts us at bigger risk. And what's happened since 2008? The four biggest financial institutions are now 30% bigger than they were in 2008. The central premise behind a 21st century Glass-Steagall is to say if you want to get out there and take risks, go ahead and do it. But ... you can't get access to FDIC insured deposits when you do. That way ... at least one portion of our banking sector stays safe. From 1797 to 1933, the American banking system crashed about every 15 years. In 1933, we put good reforms in place, for which Glass-Steagall was the centerpiece, and from 1933 to the early 1980s, that’s a 50 year period, we didn’t have any of that – none. We kept the system steady and secure. And it was only as we started deregulating, [you hit] the S&L crisis, and what did we do? We deregulated some more. And then you hit long-term capital management at the end of the 90s, and what did we do as a country? This country continued to deregulate more. And then we hit the big crash in 2008. You are not going to defend the proposition that regulation can never work, it did work. SULLIVAN: I didn’t say regulation never worked, Senator. By far and away, and I agree, there were fewer bank failures in that time after Glass-Steagall. ELIZABETH WARREN: “Fewer,” as in, of the big ones, zero.
Note: Sen. Warren is one of the few bright lights in Congress. Watch this interview to see why. To read about later censorship of this interview by NBC, click here.
In more than a dozen classified rulings, the nation’s surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans. The rulings, some nearly 100 pages long, reveal that the court has taken on a much more expansive role by regularly assessing broad constitutional questions and establishing important judicial precedents, with almost no public scrutiny. The 11-member Foreign Intelligence Surveillance Court, known as the FISA court, was once mostly focused on approving case-by-case wiretapping orders. But since major changes in legislation and greater judicial oversight of intelligence operations were instituted six years ago, it has quietly become almost a parallel Supreme Court, serving as the ultimate arbiter on surveillance issues and delivering opinions that will most likely shape intelligence practices for years to come. In one of the court’s most important decisions, the judges have expanded the use in terrorism cases of a legal principle known as the “special needs” doctrine and carved out an exception to the Fourth Amendment’s requirement of a warrant for searches and seizures. Unlike the Supreme Court, the FISA court hears from only one side in the case — the government — and its findings are almost never made public.
Note: For more on government secrecy, see the deeply revealing reports from reliable major media sources available here.
Leslie James Pickering noticed something odd in his mail last September: a handwritten card, apparently delivered by mistake, with instructions for postal workers to pay special attention to the letters and packages sent to his home. “Show all mail to supv” — supervisor — “for copying prior to going out on the street,” read the card. It included Mr. Pickering’s name, address and the type of mail that needed to be monitored. The word “confidential” was highlighted in green. “It was a bit of a shock to see it,” said Mr. Pickering, who with his wife owns a small bookstore in Buffalo. More than a decade ago, he was a spokesman for the Earth Liberation Front, a radical environmental group labeled eco-terrorists by the Federal Bureau of Investigation. As the world focuses on the high-tech spying of the National Security Agency, the misplaced card offers a rare glimpse inside the seemingly low-tech but prevalent snooping of the United States Postal Service. Mr. Pickering was targeted by a longtime surveillance system called mail covers, a forerunner of a vastly more expansive effort, the Mail Isolation Control and Tracking program, in which Postal Service computers photograph the exterior of every piece of paper mail that is processed in the United States — about 160 billion pieces last year. It is not known how long the government saves the images. The Mail Isolation Control and Tracking program was created after the anthrax attacks in late 2001. It enables the Postal Service to retrace the path of mail at the request of law enforcement. No one disputes that it is sweeping.
Note: The exposure by whistleblower Edward Snowden of the NSA's massive domestic and global spying operations seems to have triggered a series of other revelations about surveillance of the US population, like this report on the US Postal Service's photographing all mail. Hardly a week goes by without another major revelation, such as a new digital photo-ID database utilized by the FBI and police forces, and the development by US police of a national DNA database on all "potential suspects". Since very few US citizens are terrorists, what is the real purpose behind this total surveillance?
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.