News ArticlesExcerpts of Key News Articles in Major Media
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
The FBI has launched an investigation of the Corrections Corporation of America over the company's running of an Idaho prison with a reputation so violent that inmates dubbed it "Gladiator School." CCA has operated Idaho's largest prison for more than a decade, but last year, CCA officials acknowledged it had understaffed the Idaho Correctional Center by thousands of hours in violation of the state contract. CCA also said employees falsified reports to cover up the vacancies. The announcement came after an Associated Press investigation showed CCA sometimes listed guards as working 48 hours straight to meet minimum staffing requirements. The understaffing has been the subject of federal lawsuits and a contempt of court action against CCA. The ACLU sued on behalf of inmates at the Idaho Correctional Center in 2010, saying the facility was so violent that inmates called it "Gladiator School" and that understaffing contributed to the high levels of violence there. In 2012, a Boise law firm sued on behalf of inmates contending that CCA had ceded control to prison gangs so that they could understaff the prison and save money on employee wages, and that the understaffing led to an attack by one prison gang on another group of inmates that left some of them badly injured.
Note: If the above link fails, use this one for the same Associated Press article covering prisons corruption on the website of the UK's Guardian. For more on corruption in the prison-industrial complex, see the deeply revealing reports from reliable major media sources available here.
British spies have developed "dirty tricks" ... that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into "honey traps." Documents taken from the National Security Agency by Edward Snowden ... describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG). According to the documents ... the agency's goal was to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications. The propaganda campaigns use deception, mass messaging and "pushing stories" via Twitter, Flickr, Facebook and YouTube. JTRIG also uses "false flag" operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain's adversaries. Other documents ... show that JTRIG ... used a DDOS attack to shut down Internet chat rooms used by members of the hacktivist group known as Anonymous. A computer virus called Ambassadors Reception was "used in a variety of different areas" and was "very effective." When sent to adversaries ... the virus will "encrypt itself, delete all emails ... and block the computer user from logging on. Spies have long used sexual "honey traps" to snare, blackmail and influence targets. Most often, a male target is led to believe he has an opportunity for a romantic relationship or a sexual liaison with a woman, only to find that the woman is actually an intelligence operative.
Note: You can read the documents released by Snowden at this link and this one. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
Consumers are being sold food including mozzarella that is less than half real cheese, ham on pizzas that is either poultry or "meat emulsion", and frozen prawns that are 50% water, according to tests by a public laboratory. The checks on hundreds of food samples, which were taken in West Yorkshire, revealed that more than a third were not what they claimed to be, or were mislabelled in some way. Testers also discovered beef mince adulterated with pork or poultry, and even a herbal slimming tea that was neither herb nor tea but glucose powder laced with a withdrawn prescription drug for obesity at 13 times the normal dose. A third of fruit juices sampled were not what they claimed or had labelling errors. Two contained additives that are not permitted in the EU, including brominated vegetable oil, which is designed for use in flame retardants and linked to behavioural problems in rats at high doses. Experts said they fear the alarming findings from 38% of 900 sample tests by West Yorkshire councils were representative of the picture nationally, with the public at increasing risk as budgets to detect fake or mislabelled foods plummet. In one case, tests revealed that the "vodka" had been made not from alcohol derived from agricultural produce, as required, but from isopropanol, used in antifreeze and as an industrial solvent. Many of the samples were collected from fast-food restaurants, independent retailers and wholesalers; some were from larger stores and manufacturers.
Note: For more on corporate corruption, see the deeply revealing reports from reliable major media sources available here.
The British government can tap into the cables carrying the world’s web traffic at will and spy on what people are doing on some of the world’s most popular social media sites ... without the knowledge or consent of the companies. Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated a pilot program to their U.S. partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter. Called “Psychology A New Kind of SIGDEV" (Signals Development), the presentation includes a section that spells out “Broad real-time monitoring of online activity” of YouTube videos, URLs “liked” on Facebook, and Blogspot/Blogger visits. The monitoring program is called “Squeaky Dolphin.” Experts told NBC News the documents show the British had to have been either physically able to tap the cables carrying the world’s web traffic or able to use a third party to gain physical access to the massive stream of data. Representatives of Facebook and Google, which owns YouTube, said they ... were unaware the collection had occurred. The NSA does analysis of social media similar to that in the GCHQ demonstration. In 2010 ... GCHQ exploited unencrypted data from Twitter to identify specific users around the world and target them with propaganda.
Note: Read an article diving deeper and showing how online reputations are ruthlessly destroyed by powerful groups. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
Papers documenting allegation of sexual abuse by priests in the Chicago Archdiocese were released to the public today by victims' attorneys. The documents cover only 30 of at least 65 priests for whom the Chicago church says it has substantiated claims of child abuse. The papers, put online, were made available through settlements between Church and victims' lawyers. Church officials said most of the abuse occurred before 1988, none after 1996. The documents tell one heartbreaking story after another - 6,000 pages detailing not just how children and adult victims were abused by trusted priests, but also how church officials often bungled their responses, failing to turn sexual predators over to criminal authorities and often shuttling the offending priests from parish to parish, where they abused again. That deception ... came from the cardinal on down. Not only were the victims and their families deceived, but so too were parishioners where offending priests were transferred, as well as the police and the public at large. In one case in 1979, a priest raped a 13-year old boy and later warned him at gunpoint not to tell anyone. The documents show the boy's parents were assured that the priest would get treatment and would be kept away from minors, but he wasn't. Within a year, that priest was returned to ministry in another parish where he abused again. In another case, the late Cardinal John Cody tells a priest accused of sexually abusing a girl that the allegations, quote, "should just be forgotten." That priest later abused again.
Note: For more on sexual abuse of children, see the deeply revealing reports from reliable major media sources available here.
On a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludgeoned each other over 15 rounds in a televised title bout viewed by millions around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with nearly every document inside. They were never caught, and the stolen documents that they mailed anonymously to newspaper reporters ... would become a flood of revelations about extensive spying and dirty-tricks operations by the F.B.I. against dissident groups. Perhaps the most damning document from the cache [was] a 1970 memorandum that ... urged agents to step up their interviews of antiwar activists and members of dissident student groups. “It will enhance the paranoia endemic in these circles and will further serve to get the point across there is an F.B.I. agent behind every mailbox.” Another document, signed by Hoover himself, revealed widespread F.B.I. surveillance of black student groups on college campuses. But the document that would have the biggest impact on reining in the F.B.I.’s domestic spying activities [included] a mysterious word: Cointelpro ... shorthand for Counterintelligence Program. Since 1956, the F.B.I. had carried out an expansive campaign to spy on civil rights leaders, political organizers and suspected Communists, and had tried to sow distrust among protest groups. Among the grim litany of revelations was a blackmail letter F.B.I. agents had sent anonymously to the Rev. Dr. Martin Luther King Jr., threatening to expose his extramarital affairs if he did not commit suicide. The intent of Cointelpro was to destroy lives and ruin reputations.
Note: To learn about the brave citizen burglars who have now revealed themselves and watch the engaging video covering this story, click on the link given above. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
On Dec. 23, 1913, President Woodrow Wilson signed the Owen Glass Act, creating the Federal Reserve. As we note its centennial, what has the Fed accomplished during the last 100 years? The stated original purposes were to protect the soundness of the dollar and banks and also to lessen the jarring ups and downs of the business cycle. Oops. Under the Fed’s supervision, boom and bust cycles have continued. Three of them have been severe: the Great Depression, the stagflationary period of 1974-82, and the current “Great Recession.” Bank failures have occurred in alarmingly high numbers. Depending on what measurements are used, the dollar has lost between 95 and 98 percent of its purchasing power. (Amazingly, the Fed’s official position today is that inflation is not high enough, so the erosion of the dollar continues as a matter of policy.) Having failed to achieve its original goals, the Fed also has had a miserable record in accomplishing later goals. The 1970 amendments to the Federal Reserve Act stipulated that the Fed should “promote effectively the goals of maximum employment, stable prices, and moderate long-term interest rates.” In baseball parlance, the Fed has been “0-for-three.” So, what has the Fed accomplished during its century of existence? Well, it has become adept at bailing out mismanaged banks. In the aftermath of the 2008 financial crisis, the Fed orchestrated the big bailout of Wall Street. Politically, the Fed is repugnant. Its chairman is commonly referred to as the second most powerful person in the country. In a democratic republic, should the second most powerful policymaker be unelected?
Note: How remarkable for Forbes to publish an article chastising the Fed! The times are a changin'! For an essay by noted financial researcher Ellen Brown on this occasion, click here. For more on the collusion between government and the biggest banks, see the deeply revealing reports from reliable major media sources available here.
When Canadian journalist ... Frank Koller published his book Spark: How Old-Fashioned Values Drive a Twenty-First-Century Corporation: Lessons from Lincoln Electric's U, about the profit-sharing model pioneered at Cleveland’s Lincoln Electric, it encouraged Making Sense to return to the manufacturer after first reporting on them back in 1992. Two years later, Koller now updates us on yet another profitable year for Lincoln. Frank Koller: Here are the latest numbers for the Ohio-based multinational welding manufacturer, now 118 years old. 80: uninterrupted years of paying an employee bonus (i.e. profitable every year since 1934). $33,029: average 2013 bonus per U.S. employee (roughly 3,000 employees). $81,366: average 2013 total earnings per U.S. employee (wages or salary + bonus). $100.7 million: total pre-tax profit shared with employees, Lincoln’s largest bonus pool ever. 0: number of layoffs in 2013 (that makes 65 years without any layoffs) #1: Lincoln Electric remains number one in the global marketplace in its industry. These figures once again provide convincing and reassuring evidence that with an unwavering commitment to respecting employees by offering the opportunity to significantly share in the profits of the firm, while demanding their very best, it is possible to run a very profitable, very large, technologically superior multinational business based in North America while also honoring a firm’s obligations to its customers, investors and society at large.
Note: For a treasure trove of great news articles which will inspire you to make a difference, click here.
Officials in North Carolina are investigating how a teen allegedly shot himself in the head while handcuffed in the back of a police cruiser. Durham Police Chief Jose Lopez said ... at a news conference that Jesus Huerta, 17, died of a self-inflicted gunshot [wound] to the head in November. Lopez said a handgun was found in the car and that Huerta was still handcuffed from behind, according to the station. "The medical examiner's office has confirmed that Jesus Huerta died from a gunshot wound to his head," Lopez said. "Whether that wound was accidental or intentional is unknown at this time." Huerta [had been] picked up early on Nov. 19 on a trespassing warrant stemming from a July incident, after family members reported concerns for his safety in a 911 call. Chief Lopez said Huerta was searched by police prior to the shooting incident and the weapon was not detected. "I know that it is hard for people not in law enforcement to understand how someone could be capable of shooting themselves while handcuffed behind the back," Lopez said. "While incidents like this are not common, they unfortunately have happened in other jurisdictions in the past." Huerta’s family released a statement following the news conference. "How did Jesus end up dead in the parking lot at police headquarters in these circumstances? Searched. Handcuffed behind the back. How is it even possible to shoot oneself?" the statement reads.
Note: If, as the police chief states, other incidents of people shooting themselves while handcuffed behind the back have happened, maybe it's time for a thorough investigation of these police forces. For more on the deadly corruption in the government-prison-industrial complex, see the deeply revealing reports from reliable major media sources available here.
The whooping cough vaccines now in use were introduced in the 1990s after an older version, which offered longer-lasting protection, was found to have side effects. But over the years, scientists have determined that the new vaccines began to lose effectiveness after about five years, a significant problem that many researchers believe has contributed to the significant rise in whooping cough cases. The new study, published on Monday in Proceedings of the National Academy of Sciences, offers another explanation. Using baboons, the researchers found that recently vaccinated animals continued to carry the infection in their throats. Even though those baboons did not get sick from it, they spread the infection to others that were not vaccinated. "When you're newly vaccinated you are an asymptomatic carrier, which is good for you, but not for the population," said Tod J. Merkel, the lead author of the study, who is a researcher in the Office of Vaccines Research and Review in the Food and Drug Administration. The current whooping cough vaccines were developed after a surge in concerns from parents that their children were getting fevers and having seizures after receiving the old vaccine. The new finding [suggest that] people recently vaccinated may be continuing to spread the infection without getting sick.
Note: So a vaccine was replaced because of side effects. Hmmmmm. How often do your hear any talk of side effects in the vaccine debate? And vaccinated animals can still spread the disease. Do you think there is any hype going on with the recent measles scare? And this US government webpage states, "Since the first National Vaccine Injury Compensation (VICP) claims were filed in 1989, 3,981 compensation awards have been made. More than $2.8 billion in compensation awards has been paid to petitioners."
My first year on Wall Street, 1993, I was paid 14 times more than I earned the prior year and three times more than my father's best year. For that money, I helped my company create financial products that were disguised to look simple, but which required complex math to properly understand. That first year I was roundly applauded by my bosses, who told me I was clever, and to my surprise they gave me $20,000 bonus beyond my salary. When I did ask, rather naively, if this was all kosher, I would be assured multiple times that multiple lawyers and multiple managers had approved the sales. One senior trader, consoling me late at night, reminded me, “You are playing in the big leagues now. If a customer wants a red suit, you sell them a red suit. If that customer is Japanese, you charge him twice what it costs. ”Being paid very well also helped ease any of my concerns. Feeling guilty, kid? Here take a big check. I was, for the first time in my life, feeling valued for my math skills. Ego and money are nice salves for any potential feeling of guilt. After a few years on Wall Street it was clear to me: you could make money by gaming anyone and everything. The more clever you were, the more ingenious your ability to exploit a flaw in a law or regulation, the more lauded and celebrated you became. Nobody seemed to be getting called out. No move was too audacious. Traders got more and more audacious, and corruption became more and more diffused through the system. By 2006 you could open up almost any major business, look at its inside workings, and find some wrongdoing.
Note: For more on financial corruption, see the deeply revealing reports from reliable major media sources available here.
Why do people think about someone right before they call, for example, or have a feeling something is about to happen before it does? It may be due to something called collective consciousness - a term used by certain scientists to describe the practice of humans, and animals, sharing behaviours and ideas with each other telepathically. The "Hundredth Monkey Phenomenon", for example, was an idea put forward by South African zoologist and ethologist Lyall Watson and his scientific author colleague Lawrence Blair in 1975. During the 1950s, macaques on the island of Koshima learned to wash sweet potatoes and explicitly passed this skill onto younger members of the group. This behaviour then spread and was observed on neighbouring islands among groups of macaques who had never [come] into contact with each other. [Watson and Blair] chalked this up to the monkeys sharing a collective consciousness, often referred to as a shared mind or hive mind, in which the practices were shared telepathically. More recently ... blue tits ... taught themselves [to] break into milk bottles and drink the cream from the top. Similar groups of the same [non-migratory] species [later] exhibited the same skills in other countries throughout Europe and Asia. A science journal in 2010 published [the results of experiments] by Professor Daryl Bem, a physicist from Cornell University, that [indicated] humans have similar psychic abilities supposedly seen in the birds and monkeys. Professor Bem carried out nine different experiments involving more than 1,000 volunteers and all but one came down on the side of these so-called psychic theories.
Note: For a most astounding and moving documentary on a woman named Anna Breytenbach who communicates directly with animals, click here, or watch the three-minute trailer at this link. For a treasure trove of great news articles which will inspire you to make a difference, click here.
Recently, the US House of Representatives voted on an amendment ... that would have curbed the NSA's omnipresent and inescapable [spying] tactics. Despite furious lobbying by the intelligence industrial complex and its allies, and four hours of frantic and overwrought briefings by the NSA's General Keith Alexander, 205 of 422 Representatives voted for the amendment. The vote signaled a clear message to the NSA: we do not trust you. The vote also conveyed another, more subtle message: members of Congress do not trust that the House Intelligence Committee is providing the necessary oversight. On the contrary, "oversight" has become "overlook". Despite being a member of Congress possessing security clearance, I've learned far more about government spying on me and my fellow citizens from reading media reports than I have from "intelligence" briefings. My colleagues feel the same way. In fact, one long-serving conservative Republican told me that he doesn't attend such briefings anymore, because, "they always lie". Many of us worry that Congressional Intelligence Committees are more loyal to the "intelligence community" that they are tasked with policing, than to the Constitution. And the House Intelligence Committee isn't doing anything to assuage our concerns. Supporters of the NSA's vast ubiquitous domestic spying operation assure the public that members of Congress can be briefed on these activities whenever they want. Senator Saxby Chambliss says all a member of Congress needs to do is ask for information, and he'll get it. Well I did ask, and the House Intelligence Committee said "no", repeatedly. And virtually every other member not on the Intelligence Committee gets the same treatment.
Note: The above article was written by courageous U.S. Congressman Alan Grayson. For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
A simple idea underpins science: “trust, but verify”. Results should always be subject to challenge from experiment. [But] modern scientists are doing too much trusting and not enough verifying—to the detriment of the whole of science, and of humanity. Too many of the findings that fill the academic ether are the result of shoddy experiments or poor analysis. A rule of thumb among biotechnology venture-capitalists is that half of published research cannot be replicated. A leading computer scientist frets that three-quarters of papers in his subfield are bunk. In [2010] roughly 80,000 patients took part in clinical trials based on research that was later retracted because of mistakes or improprieties. One reason is the competitiveness of science. As their ranks have swelled, to 6m-7m active researchers on the latest reckoning, scientists have lost their taste for self-policing and quality control. The obligation to “publish or perish” has come to rule over academic life. Competition for jobs is cut-throat. Every year six freshly minted PhDs vie for every academic post. Nowadays verification (the replication of other people’s results) does little to advance a researcher’s career. And without verification, dubious findings live on to mislead. Careerism also encourages exaggeration and the cherry-picking of results. Failures to prove a hypothesis are rarely even offered for publication, let alone accepted. “Negative results” now account for only 14% of published papers, down from 30% in 1990. Yet knowing what is false is as important to science as knowing what is true.
Note: For more on corruption in science, see the deeply revealing reports from reliable major media sources available here.
An essential part of the scientific process is the critical analysis of research results by scientists with expertise in the discipline. Because of this peer-review process, mistakes are supposed to be caught before they propagate in the literature. Yet despite careful pre-publication scrutiny, some reports are later retracted or, worse, widely suspected to be erroneous but never corrected. One recent examination of 53 landmark medical studies found that further research was unable to replicate all but six of them. How can the scientific community do better at avoiding published errors and correcting them more quickly when they are discovered? A growing group of scientists are addressing this question. They suggest incentives that will reward scientists to a greater degree for producing solid, trustworthy research that others are able to replicate successfully and then extend. Paradoxically, the same qualities – trust and teamwork – that are key to a productive and harmonious laboratory environment are the same ones that can lead to an informality that allows errors to be propagated. Despite the importance of retractions in correcting the scientific record, there are few guidelines as to how they should be handled or how fast self-correction should occur. To this end medical journalists Ivan Oransky and Adam Marcus created the web log Retraction Watch, which catalogs retractions as a window into the scientific process and explores the causes of each one; it has been called “one of most important recent developments in science journalism” by former Scientific American editor in chief John Rennie.
Note: For a powerful article showing how the author of the above article, Pamela Ronald, has not been truthful in her own studies, click here. For more on corruption in science, see the deeply revealing reports from reliable major media sources available here.
A little over 50 years ago a South Carolina doctor ... treated a family for injuries sustained when a sudden, inexplicable explosion tore through their backyard. The object in the 50-foot crater left behind their house was an atomic bomb that had fallen from a passing Air Force plane. The bomb had not been armed with its nuclear core; the blast came from the explosives intended to trigger a chain reaction. The crater can still be seen today. That incident, which led to an anti-nuclear movement in Britain, where the plane was bound, is one of many stories Eric Schlosser ... tells in Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety. During the cold war, nuclear bombs fell out of the sky, burned up in plane crashes and were lost at sea. In the incident Schlosser describes in greatest detail, the Damascus accident of Sept. 18, 1980, the warhead from a Titan II missile was ejected after a series of mishaps that began when a repairman dropped a socket wrench and pierced a fuel tank. Tactical nuclear weapons scattered across Europe had minimal security; misplaced tools and failed repairs triggered serious accidents; inadequate safety procedures and poor oversight led to dozens of close brushes with nuclear explosions. Schlossers readers (and he deserves a great many) will be struck by how frequently the people he cites attribute the absence of accidental explosions and nuclear war to divine intervention or sheer luck rather than to human wisdom and skill.
Note: For more on this highly revealing book, click here. For details of Schlosser's amazing story of the two H-bombs that fell on North Carolina in 1961, click here. For more on the grave risks of nuclear technologies, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show. Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth. The agency ... deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products [called "backdoors"].
Note: For an excellent article in the UK's respected Guardian on this, click here. For a guide from the Guardian on "How to remain secure against NSA surveillance", click here.
[The] fact that a car is not a simple machine of glass and steel but a hackable network of computers, is what [Charlie Miller and Chris Valasek] have spent the last year trying to demonstrate. Miller, a 40-year-old security engineer at Twitter, and Valasek, the 31-year-old director of security intelligence at the Seattle consultancy IOActive, received an $80,000-plus grant last fall from [the] Defense Advanced Research Projects Agency to root out security vulnerabilities in automobiles. The need for scrutiny is growing as cars are increasingly automated and connected to the Internet. Practically every American carmaker now offers a cellular service or Wi-Fi network like General Motors’ OnStar, Toyota’s Safety Connect and Ford’s SYNC. Without better security it’s all potentially vulnerable, and automakers are remaining mum or downplaying the issue. As I drove their vehicles for more than an hour, Miller and Valasek showed that they’ve reverse-engineered enough of the software of the [Ford] Escape and the Toyota Prius (both the 2010 model) to demonstrate a range of nasty surprises: everything from annoyances like uncontrollably blasting the horn to serious hazards like slamming on the Prius’ brakes at high speeds. They sent commands from their laptops that killed power steering, spoofed the GPS and made pathological liars out of speedometers and odometers. Finally they directed me out to a country road, where Valasek showed that he could violently jerk the Prius’ steering at any speed, threatening to send us into a cornfield or a head-on collision.
Note: Don't miss the unbelievable video at the above link which shows how a good hacker can take control of your car's steering, brakes, and much more. For more on the OnStar system in most GM cars now and how it allows spying on you, read the CNN article titled "OnStar's 'brazen' data tracking comes under fire" at this link. For more on government and corporate digital security invasions, see the deeply revealing reports from reliable major media sources available here.
Charlotte and Chase were born October 18, 2006. They were healthy. Everything was normal. The twins were 3 months old when the Figis' lives changed forever. [Charlotte had a] seizure [which] lasted about 30 minutes. Her parents rushed her to the hospital. They did a million-dollar work-up ... and found nothing. A week later, Charlotte had another seizure. Over the next few months, Charlotte ... had frequent seizures lasting two to four hours, and she was hospitalized repeatedly. She was [put] on seven drugs -- some of them heavy-duty, addictive ones such as barbiturates and benzodiazepines. They'd work for a while, but the seizures always came back with a vengeance. At 2, she really started to decline cognitively. In November 2000, Colorado voters approved Amendment 20, which required the state to set up a medical marijuana registry program. [Then Charlotte's father Matt] found a video online of a California boy whose [seizures were] being successfully treated with cannabis. [Her parents started] Charlotte out on a small dose. By then Charlotte had lost the ability to walk, talk and eat. She was having 300 grand mal seizures a week. The results were stunning. The seizures stopped for ... seven days. [Now] Charlotte gets a dose of the cannabis oil twice a day. [It has] stopped the seizures. Today, Charlotte, 6, is thriving. Not only is she walking, she can ride her bicycle.
Note: There have been plentiful stories of miraculous healing from marijuana, but this may be the first time the major media is reporting it (see links at the bottom of this article for more). That's exciting! We may be seeing a major change here. For a treasure trove of great news articles which will inspire you to make a difference, click here.
Tons of contaminated groundwater from the stricken Fukushima nuclear plant have overwhelmed an underground barrier and are emptying daily into the Pacific, creating what a top regulator has called a crisis. The water contains strontium and cesium, as well as tritium. The plant was already struggling to store hundreds of thousands of tons of contaminated water that flowed through the buildings housing three reactors where [three] meltdowns occurred in 2011. But the contamination in this new groundwater problem is from different sources, Tepco said. The company has admitted that it failed to respond quickly enough to the latest groundwater contamination, saying it was preoccupied with more pressing issues like cooling the damaged reactors. “Tepco appears overwhelmed in dealing with what is a very serious problem,” said Akio Yamamoto, a professor of nuclear engineering at Nagoya University, who serves as outside expert for the Nuclear Regulation Authority, Japan’s nuclear watchdog. Critics contend that the plant has emitted far more radioactive materials than it is saying, based in part on levels of contaminants discovered in the harbor, which are well above safe levels in some places. The contamination appears to be spreading, with tests last month by Tepco showing high levels of tritium and other radioactive elements like strontium starting at other locations near the two other crippled reactors.
Note: Declaring the situation an "emergency", the Japanese government has stepped in to take over control of the response from Tepco. For more on this, click here. For a National Geographic article on what you need to know about the radioactive contamination of the Pacific Ocean by the Fukushima disaster, click here. It reports that scientists have estimated that contaminated seawater could reach the West Coast of the United States in five years or less. For more on the environmental devastation of nuclear power, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.