News StoriesExcerpts of Key News Stories in Major Media
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Government researchers in Brazil are set to explore the country's peculiar distribution of Zika-linked microcephaly - babies born with abnormally small heads. Zika virus has spread throughout Brazil, but extremely high rates of microcephaly have been reported only in the country's northeast. Although evidence suggests that Zika can cause microcephaly, the clustering pattern hints that other environmental, socio-economic or biological factors could be at play. “We suspect that something more than Zika virus is causing the high intensity and severity of cases,” says Fatima Marinho, director of information and health analysis at Brazil’s ministry of health. If that turns out to be true, it could change researchers' assessment of the risk that Zika poses. Zika was discovered in 1947 and hadn’t been implicated in birth defects until now. The northeast was where the first reported surge in microcephaly cases in Brazil began a year ago. Health officials had expected that they would later see the same high rates in other parts of the country. But as of 20 July, almost 90% of the 1,709 confirmed cases of congenital microcephaly or birth defects of the central nervous system reported in Brazil since last November were in a relatively small area ... about the size of the United Kingdom, whereas Brazil is almost as large as the United States. There are many hypotheses about what might be going on. Marinho says that her team's data, submitted for publication, hint that socio-economic factors might be involved.
Note: The cluster of microcephaly cases in Brazil was reported in February to predate the latest Zika outbreak. For more along these lines, see concise summaries of deeply revealing Zika virus news articles from reliable major media sources.
The large-scale, long-term decline in wild bees across England has been linked to the use of neonicotinoid insecticides by a new study. Over 18 years, researchers analysed bees who forage heavily on oilseed rape, a crop widely treated with "neonics". The scientists attribute half of the total decline in wild bees to the use of these chemicals. Several studies, conducted in the lab and in the field, have identified a negative effect on honey bees and bumble bees from the use of neonics. But few researchers have looked at the long term impacts of these substances. This new paper examined the impacts on populations of 62 species of wild bees across England over the period from 1994-2011. The team ... used distribution data on wild bees, excluding honey and bumblebees collected by the bees, ants and wasps recording scheme. They were able to compare the locations of these bees and their changing populations with growing patterns of oilseed rape across England over 18 years. The amount of this crop being sown has increased significantly over the period of the study, from around 500,000 hectares in 1994 to over 700,000 in 2011. A key innovation was the commercial licensing of neonicotinoid insecticides for the crop in the UK in 2002. Seeds are coated with the chemical and every part of the plant becomes toxic. The European Food Safety Authority is currently conducting a review of the scientific evidence about neonicotinoids. An EU-wide moratorium on their use was implemented in 2013 and is still in place.
Note: Bayer, a major manufacturer of this pesticide, attempted to cover up the connection between its products and the massive die off of bees. For more along these lines, see concise summaries of deeply revealing food system corruption news articles from reliable major media sources.
A specialist unit created by the British domestic counterintelligence and security agency MI5 to “get inside the heads” of terrorists has helped foil seven attacks in the past year. The Behavioural Science Unit at Thames House, the headquarters of MI5 [establishes] whether people flagged as potential threats are "talkers" or "walkers" - those who simply boast or those who are preparing to act. Research by MI5 shows that more than 60 per cent of so-called lone wolves unwittingly provide clues that they are preparing to strike. The BSU’s work involves picking up signs of such changing behaviour. Neil, an Arabic and Norwegian speaker who has worked for the unit for six years, said ... his team is passed intelligence by officers that is gleaned from a network of informants and the public. The BSU then looks for signs of unusual activity. The BSU team pays close attention to “lone-actor” terrorists. The number of experts working in the BSU, which was created in 2004, has more than doubled since ... 2013. “We deal with probabilities and that is the nature of our work,” said Neil, [adding that] some of those they profiled lied to themselves about their intention and the ultimate aim was to persuade them to abandon their radical ideology. He said the assumption that many extremists had mental health problems was wrong. “Only 2 per cent of members of terrorist organisations suffer from mental health problems, compared with an average of up to 30 per cent of members of the public,” Neil said.
Note: See the full text of this article on this webpage. If this article is accurate, MI5 is using very different tactics than those used by the FBI to fight the war on terror.
The Merchant Marine Academy has the highest rate of sexual assault and harassment of any U.S. military school. While the school received just one report of sexual assault in the 2014-2015 academic year, student surveys taken by the government reveal that 63 percent of women and 11 percent of men experienced unwanted advances or other sexual harassment. And 17 percent of women and 2 percent of men endured some kind of sexual assault, defined as unwanted contact, from groping to rape. Those numbers exceed the combined rates at the U.S. Military Academy at West Point and the Naval, Air Force and Coast Guard academies, where 48 percent of women and 10 percent of men described sexual harassment in similar surveys. Under pressure from Congress, Kings Point hired its first sexual assault coordinator four years ago and beefed up online and face-to-face prevention training. But officials were shocked to find so few victims reporting when surveys told them otherwise. The Middle States Commission on Higher Education - which does 10-year accreditation reviews for the U.S. Education Department - placed the Merchant Marine Academy on warning in June. The commission described a “campus climate and incidence of sexual harassment and sexual assault that have been a serious and recognized problem for over 10 years. The report [criticized] the academy’s efforts to prevent misconduct as “insufficient and ineffective.”
Note: For more along these lines, see concise summaries of deeply revealing news articles on sexual abuse scandals and military corruption.
Russia was behind the hacks into the Democratic National Committee’s computer network that led to the release of thousands of internal emails just before the party’s convention began, U.S. intelligence agencies have reportedly concluded. The FBI is investigating. WikiLeaks promises there is more data to come. The political nature of this cyberattack means that Democrats and Republicans are trying to spin this as much as possible. Even so, we have to accept that someone is attacking our nation’s computer systems in an apparent attempt to influence a presidential election. This kind of cyberattack targets the very core of our democratic process. And it points to the possibility of an even worse problem in November. Over the years, more and more states have moved to electronic voting machines and have flirted with Internet voting. These systems are insecure and vulnerable to attack. But while computer security experts ... have sounded the alarm for many years, states have largely ignored the threat, and the machine manufacturers have thrown up enough obfuscating babble that election officials are largely mollified. Government interference with foreign elections isn’t new, and in fact, that’s something the United States itself has repeatedly done in recent history. But what is new is a foreign government interfering with a U.S. national election on a large scale. Our democracy cannot tolerate it, and we as citizens cannot accept it.
Note: For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our Elections Information Center.
Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days. A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate. The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO). The exploits are not run-of-the-mill tools to target everyday individuals. They are expensive software used to take over firewalls, such as Cisco and Fortinet, that are used “in the largest and most critical commercial, educational and government agencies around the world,” said [former TAO operator] Blake Darche. Some former agency employees suspect that the leak was the result of a mistake by an NSA operator, rather than a successful hack by a foreign government of the agency’s infrastructure. It is not unprecedented for a TAO operator to accidentally upload a large file of tools ... one of the former employees said. “What’s unprecedented is to not realize you made a mistake,” he said. “You would recognize, ‘Oops, I uploaded that set’ and delete it.” Critics of the NSA have suspected that the agency, when it discovers a software vulnerability, frequently does not disclose it, thereby putting at risk the cybersecurity of anyone using that product.
Note: Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
A group of computer security experts say they figured out how to hack the keyless entry systems used on millions of cars, meaning that thieves could in theory break and steal items without leaving a broken window. Remote entry systems on millions of cars made by Volkswagen since 1995 can be cloned to permit unauthorized access to the car's interior. Another system used by other brands including Ford, General Motor's Opel and Chevrolet and Renault can also be defeated. In a paper to be delivered Friday at the Usenix security conference in Austin, Texas, the authors say a thief could use commonly available equipment to intercept entry codes as they are transmitted by radio frequency, and then use that information to clone another remote so the car could be opened. The paper leaves out key details on how to perform the hack but says the codes can be intercepted with commercially available equipment. "It is unclear whether such attacks ... are currently carried out in the wild by criminals," the report says. "However, there have been various media reports about unexplained theft from locked vehicles in the last years." The report did not establish the exact number of cars that use the vulnerable systems. The report authors said that insurance companies might have to accept that car theft scenarios that would otherwise be considered insurance fraud have a higher probability of being genuine. The only surefire countermeasure, they said, would be to stop using the remote and fall back on the mechanical lock using the conventional metal key.
Note: In 2013, Volkswagen blocked the release of an academic paper describing the vulnerability of its ignition systems to hacking. For more along these lines, see concise summaries of deeply revealing corporate news articles from reliable major media sources.
A lawsuit filed in a US district court claims that American aid to Israel is illegal under a law passed in the 1970s that prohibits aid to nuclear powers who don’t sign the Nuclear Non-Proliferation Treaty. Grant Smith, director of the Institute for Research: Middle Eastern Policy, who filed the lawsuit ... said the United States has given Israel an estimated $234 billion in foreign aid since Congress in 1976 passed the International Security Assistance and Arms Export Control Act, with its stipulation regarding countries that did not sign the NPT. Though Israel is not a signatory to the Nuclear Non-Proliferation Treaty, Smith noted that it is a known nuclear power and recipient of US aid. Israel ... is widely believed to possess dozens, if not hundreds of nuclear warheads. Smith’s lawsuit comes on the eve of an aid deal that would boost US assistance to the country. Israel already gets $3 billion a year in US aid. To sustain a policy of “nuclear ambiguity” on Israel’s weapons program, Smith says the government uses improper classification and threatens federal employees and researchers with prosecution, fines and imprisonment. The gag is driven ... by a Department of Energy directive known as WNP-136, Foreign Nuclear Capabilities. “This is an Energy Department directive that demands imprisonment for any federal official or contractor who even mentions that Israel might have a nuclear weapons program,” Smith said. Foreign aid to Israel violates two amendments of the 1961 Foreign Aid Act ... which ban aid to clandestine nuclear powers.
Note: How interesting the the US press is not covering this. Consider also that $3 billion in US aid divided by Israel's population of 8.5 million means Israel receives the equivalent of about $350 in aid per person per year, far greater than any other country. Watch a good interview with Miko Peled, a former member of Israeli special forces, on this topic. For more along these lines, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
Half a century ago, cold war tensions nearly came to a head over a couple of sunspots. On May 23, 1967, the US Air Force was preparing its nuclear-armed aircraft for takeoff. The Soviet Union had jammed US surveillance radars, military officials believed, which was considered an act of war. But according to a new study ... scientists arrived just in time to defuse the situation: it was actually a solar storm, not a Soviet military operation, that jammed the radars. Earlier that month, researchers had noticed a large group of magnetically charged sunspots on the solar surface. These cool, dark sunspots are known to launch bursts of solar radiation, called solar flares, as well as plasma eruptions called coronal mass ejections (CMEs). On May 23, they recorded a solar flare so intense that it was visible by the naked eye. The same day, US military officials found that three of its Ballistic Missile Early Warning System radar sites appeared to be jammed. The Air Force prepared aircraft with nuclear weapons, ready to scramble in retaliation. Solar forecasters from the North American Aerospace Defense Command (NORAD) intervened in time to stop the launch. When convention and science don’t offer satisfactory answers, we often turn to the fantastic. Last month, an unidentified blip was spotted in the corner of an International Space Station video feed. But just as the object approached Earth’s atmosphere, the feed cut off, prompting that rumors NASA was covering up evidence of UFOs.
Note: A solar storm in 1859 was powerful enough to cause sparks to leap from telegraph equipment. A similar storm today would likely decimate communications systems around the world. For more along these lines, see concise summaries of deeply revealing news articles on the mysterious nature of reality.
Privately operated government prisons, which mostly detain migrants convicted of immigration offenses, are drastically more unsafe and punitive than other prisons in the federal system, a stinging investigation by the US Department of Justice’s inspector general has found. Inmates at these 14 contract prisons, the only centers in the federal prison system that are privately operated, were nine times more likely to be placed on lockdown than inmates at other federal prisons and were frequently subjected to arbitrary solitary confinement. In two of the three contract prisons investigators routinely visited, new inmates were automatically placed in solitary confinement as a way of combating overcrowding. The review also found that contract prison inmates were more likely to complain about medical care, treatment by prison staff and about the quality of food. These facilities house around 22,000 individuals, mostly deemed “low risk”, at an annual cost of $600m. They are operated by three private companies: Geo Group, Corrections Corporation of America (CCA), and Management and Training Corporation (MTC). These facilities were also more dangerous than others in the federal system. For example, the report found that inmate on inmate assaults were 28% higher in contract prisons. “This is the latest in a whole series of reports and investigations that have found very serious issues with Bureau of Prisons shadow systems of private prisons,” said Carl Takei, a staff attorney with the ACLU.
Note: Immediately following this inspector general's investigation, the US Justice Department announced plans to phase out private federal prisons. For more along these lines, see concise summaries of deeply revealing prison system corruption news articles.
Sister Madonna Buder stood on the shore of Peoples Pond at Irene Rinehart Riverfront Park on Saturday morning. She made the sign of the cross and said a small prayer just before diving in head first. Her journey sent her through one mile of water, 24 miles on a bike and six miles on foot. But this was not new to her. The Ellensburg Olympic Triathlon was not her first race. Buder ... did not develop a passion for running until she was 48 years old. By then she was heavily involved in the Catholic church after becoming a nun at the age of 23. Since she started training, she has competed in many events including the 1982 Boston Marathon and her first triathlon in Banbridge, Ireland. In 2006 she was the oldest woman ever to complete the Hawaiian Ironman and in 2014 was inducted into the USA Triathlon Hall of Fame. Having raced more than 325 triathlons, people are still amazed at her accomplishments. She is an extraordinary accomplished person in general fitness, said fellow Olympic Triathlon participant Vince Nethery. She finished and was able to take care of business. Buder has not only seen victories but also had to climb over some obstacles during her career. Over her 39 years of competing she has fractured her pelvis, torn her meniscus and broke her femur. Buder just celebrated her birthday on Sunday, and although she completed one more triathlon, she still wonders how she is still completing triathlons. I dont know, Buder said. Youll have to ask God.
Note: Watch a great, one-minute video on this amazing woman. Explore a treasure trove of concise summaries of incredibly inspiring news articles which will inspire you to make a difference.
The incurable Alzheimer’s disease may now have a cure. New research by the University of Manchester shows that the most common form of dementia can be fully cured with an anti-inflammatory drug, commonly used for period pain. Almost 7.5 million new cases of Alzheimer’s - a disease that causes acute problems with memory, thinking ability and behavior - diagnosed around the world every year. The [research] team, led by Dr. David Brough, worked with mice to find that a common Non-Steroidal Anti Inflammatory Drug (NSAID) routinely used to relieve menstrual pain - mefenamic acid - completely reversed the inflammation of the brain and lost memory in the specimen. Mefenamic acid is available as a generic drug and is sold under a variety of brand names. For the study, 20 mice were genetically altered to exhibit symptoms of Alzheimer’s. Ten of these were treated with mefenamic acid by using a mini-pump under their skin for one month, while the other 10 mice were treated in the same way with a placebo. Researchers found that the mice treated with mefenamic acid saw a complete reversal of memory loss, while the placebo group’s condition remained unchanged. “There is experimental evidence now to strongly suggest that inflammation in the brain makes Alzheimer’s disease worse,” Brough said in a statement. However, trials on animals are not the same as human trials and may yield different results. If the proposed human trials prove to be promising, it won’t be long before the treatment reaches patients.
Note: Explore a treasure trove of concise summaries of incredibly inspiring news articles which will inspire you to make a difference.
When Anna Pesce was visiting her children in Wagener, SC, in November 2014, the then-85-year-old Orangeburg, NY, native almost collapsed trying to climb a set of stairs. I had this horrible pain shooting up my back, Pesce [said]. I had to be carried up the stairs and put into a wheelchair for the rest of my stay. For the past few decades, Pesce suffered from hunchbacklike posture - the result of a herniated disc, scoliosis and osteoporosis, which weakens the bones and can lead to curvature of the spine. Three months after her South Carolina visit, she began working with certified yoga instructor Rachel Jesien, [who] visited Pesce in her home once a week, teaching her restorative poses and stretches. After one month of sessions, Pesce was able to walk again. Yoga, done with the guidance of a back-care specialist, can strengthen bone density and muscles and alleviate back pain caused by osteoporosis, osteoarthritis and other conditions that affect the elderly. Dr. Houman Danesh, director of integrative pain management at Mount Sinai Hospital, agrees that doing yoga poses can help some people manage painful back conditions. While Danesh recommends that people go to a physical therapist first for a proper diagnosis, he stresses that one-on-one care with a specialist is key. While older people may feel intimidated by yoga, Jesien says its worth seeking out a certified back-care instructor, and Pesce agrees. I feel wonderful now because I can drive by myself and do the things I wasnt able to do before, Pesce says.
Note: Explore a treasure trove of concise summaries of incredibly inspiring news articles which will inspire you to make a difference.
Costco and organics seem increasingly intertwined these days. The Issaquah-based warehouse giant in recent years has become a dominant seller of organic produce. And now Costco’s co-founder and a top executive are investing in a planned restaurant chain ... that bills itself as the first fast-food restaurant to qualify as Certified Organic under U.S. Department of Agriculture rules. Costco co-founder and former CEO Jim Sinegal, along with Chief Financial Officer Richard Galanti, are among the investors in The Organic Coup, which opened its first restaurant in November and has two locations in the San Francisco Bay Area. The Organic Coup ... was founded by former Costco execs Erica Welton and Dennis Hoover. The investment, as noted by Business Insider, will allow the chain to expand. Hoover said the plan is to open up to 10 locations this year, then decide how many to open next year. A location in the Seattle area is “on our target,” he said. The USDA itself does not certify restaurants as organic. But restaurants may apply to private or public certification agents to become USDA Organic-certified “handlers,” as Organic Coup is. Such handler certification means products sold as organic must have at least 95 percent certified organic content, and that the restaurant must prevent the mingling of organic with nonorganic products, and protect organic products from contact with prohibited substances.
Note: Explore a treasure trove of concise summaries of incredibly inspiring news articles which will inspire you to make a difference.
A controversial scientist who carried out provocative research on making influenza viruses more infectious has completed his most dangerous experiment to date by deliberately creating a pandemic strain of flu that can evade the human immune system. Yoshihiro Kawaoka of the University of Wisconsin-Madison has genetically manipulated the 2009 strain of pandemic flu in order for it to “escape” the control of the immune system’s neutralising antibodies, effectively making the human population defenceless against its reemergence. Most of the world today has developed some level of immunity to the 2009 pandemic flu virus. However ... Professor Kawaoka intentionally set out to see if it was possible to convert it to a pre-pandemic state in order to analyse the genetic changes involved. Professor Kawaoka’s work had been cleared by Wisconsin’s Institutional Biosafety Committee, but some members of the committee were not informed about details of the antibody study ... and have voiced concerns about the direction, oversight and safety of his overall research on flu viruses. “I have met Professor Kawaoka in committee and have heard his research presentations and honestly it was not re-assuring,” said Professor Tom Jeffries, a dissenting member of the 17-person biosafety committee. This is the first time that someone has taken a strain of influenza virus, called H1N1, known to have caused a global epidemic, in other words a “pandemic”, and deliberately mutated it many times over.
Princeton professor Andrew Appel decided to hack into a voting machine. He bought one online. Appel parted with $82 and became the owner of ...the Sequoia AVC Advantage, one of the oldest and vulnerable, electronic voting machines in the United States. He summoned a graduate student named Alex Halderman, who could pick the machine’s lock in seven seconds. Clutching a screwdriver, [Appel then] deftly wedged out the four ROM chips - they weren’t soldered into the circuit board, as sense might dictate - making it simple to replace them with one of his own: A version of modified firmware that could throw off the machine’s results, subtly altering the tally of votes, never to betray a hint to the voter. The attack was concluded in minutes. Elections could be vulnerable at myriad strike points, among them the software that aggregates the precinct vote totals, and the voter registration rolls that are increasingly digitized. But the threat, the cyber experts say, starts with the machines that tally the votes and crucially keep a record of them - or, in some cases, don't. It’s not just the voting machines themselves - it’s the desktop and laptop computers that election officials use. And the computers that aggregate the results together from all of the optical scans. If any of those get hacked, it could could significantly disrupt the election. Hackers this year have [already] targeted voter registration rolls in Illinois and possibly Arizona, another attack highlighted by the Princeton alums.
Note: For the text of the video at the above link and more, see this webpage. For more along these lines, see concise summaries of deeply revealing elections corruption news articles from reliable major media sources. Then explore the excellent, reliable resources provided in our Elections Information Center.
Federal drug agents regularly mine Americans’ travel information to profile people who might be ferrying money for narcotics traffickers - though they almost never use what they learn to make arrests or build criminal cases. Instead, that targeting has helped the Drug Enforcement Administration seize a small fortune in cash. The DEA surveillance is separate from the vast and widely-known anti-terrorism apparatus. DEA units assigned to patrol 15 of the nation’s busiest airports seized more than $209 million in cash from at least 5,200 people over the past decade “They count on this as part of the budget,” said Louis Weiss, a former [DEA group] supervisor. “Basically, you’ve got to feed the monster.” Federal law gives the government broad powers to seize cash and other assets if agents have evidence that they are linked to crime. That process, commonly known as asset forfeiture, has come under fire ... after complaints that police were using the law as a way to raise money rather than to protect the public or prevent crime. Court records show agents and informants flagged travelers for questioning based on whether they were traveling with one-way tickets, had paid in cash, had listed a non-working phone number on the reservation or had checked luggage. Agents said Zane Young fit that profile when they ... seized $36,000 from his bags. Young’s lawyer, Thomas Baker, said in a court filing that the drug agency’s profile was “vague, ambiguous, overbroad, and can be manipulated to include just about anyone.”
Note: Read about how the DEA stole a young man's life savings without ever charging him with a crime. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties.
Days before an ISIS sympathizer attacked a cartoon contest in Garland, Texas, he received a text from an undercover FBI agent. “Tear up Texas,” the agent messaged Elton Simpson days before he opened fire at the Draw Muhammad event, according to an affidavit filed in federal court Thursday. “U know what happened in Paris,” Simpson responded. “So that goes without saying ... No need to be direct.” That revelation comes amidst a national debate about the use of undercover officers and human sources in terrorism cases. The texts were included in the indictment, released Thursday, of Erick Jamal Hendricks. He was charged with conspiring to provide material support to ISIS. [Hendricks] tried to recruit other Americans to form an ISIS cell on secret compounds and introduced an undercover agent to one of the Draw Muhammad attackers, according to the FBI. But Hendricks did more than make a connection. According to the court papers, he asked the undercover officer about the Draw Muhammad event’s security, size, and police presence, during the event, according to an affidavit filed in court. FBI spokeswoman Carol Cratty hung up on The Daily Beast after being asked about the “tear up Texas” text. But shortly after that exchange, Simpson and his accomplice, Nadir Soofi, drove up to the contest and opened fire. Both men were killed in the altercation, but Hendricks would remain free for another year. Every major U.S. attack was linked to FBI investigation before it happened.
Note: The FBI has been stepping up its use of stings in ISIS cases. Read how an FBI mole posing as a potential lover recently convinced a man to become a terrorist. If terrorism is such a grave threat in the US, why does the FBI have to manufacture "terrorist" plots and then exaggerate its anti-terrorism success?
For more than a decade, professional snoops have been able to search troves of ... addresses, DMV records, photographs of a person’s car - and condense them into comprehensive reports costing as little as $10. Now they can combine that information with the kinds of things marketers know about you, such as which politicians you donate to, what you spend on groceries, and whether it’s weird that you ate in last night, to create a portrait of your life and predict your behavior. IDI, a year-old company in the so-called data-fusion business, is the first to centralize and weaponize all that information for its customers. Chief Executive Officer Derek Dubner says the system isn’t waiting for requests from clients - it’s already built a profile on every American adult, including young people who wouldn’t be swept up in conventional databases, which only index transactions. These personal profiles include all known addresses, phone numbers, and e-mail addresses; every piece of property ever bought or sold, plus related mortgages; past and present vehicles owned; criminal citations, from speeding tickets on up; voter registration; hunting permits; and names and phone numbers of neighbors. The reports also include photos of cars taken by private companies using automated license plate readers - billions of snapshots tagged with GPS coordinates and time stamps to help PIs surveil people or bust alibis. IDI also runs two coupon websites ... that collect purchasing and behavioral data.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the erosion of privacy.
Weeks after taking a job as a breeding technician at Eagle Point Farms, an anguished Sharee Santorineos sat down and wrote a three-page whistleblower complaint. "I seen pigs that are pregnant beat with steel bars," said her letter to the Illinois Bureau of Animal Health and Welfare. Santorineos knows about raising animals. At a friend's rural Illinois farmhouse, she grows pigs and poultry that they eventually will have slaughtered. Like other worker allegations about animal abuse in Illinois' 900-plus hog confinement facilities, Santorineos' account went nowhere. The state has regularly discounted or dismissed such worker complaints, a Tribune investigation has found. In the Illinois hog confinements that send 12 million pigs to market annually, the bureau did not find a single animal welfare infraction or violation during the past five years. A lack of inspectors - the bureau has just six - contributes to the scant enforcement, while weak Illinois and federal livestock protection laws do little to safeguard animals. In on-the-record interviews, Santorineos and more than a dozen other Illinois swine-confinement workers told the Tribune they witnessed fellow employees whip pigs with metal rods and gouge them with pliers and ballpoint pens to hurry the animals from one stall to the next or onto the trucks that took them to slaughter. They described employees abusing pigs for amusement and encouraging colleagues to take out their frustrations on the animals.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corruption in government and in the food system.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.