Government Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
The intelligence community is about to get the equivalent of an adrenaline shot to the chest. This summer, a $600 million computing cloud developed by Amazon Web Services for the Central Intelligence Agency over the past year will begin servicing all 17 agencies that make up the intelligence community. If the technology plays out as officials envision, it will usher in a new era of cooperation and coordination, allowing agencies to share information and services much more easily and avoid the kind of intelligence gaps that preceded the Sept. 11, 2001, terrorist attacks. For the first time, agencies within the intelligence community will be able to order a variety of on-demand computing and analytic services from the CIA and National Security Agency. What's more, they'll only pay for what they use. For the risk-averse intelligence community, the decision to go with a commercial cloud vendor is a radical departure from business as usual. It is difficult to underestimate the cloud contract's importance. In a recent public appearance, CIA Chief Information Officer Douglas Wolfe called it "one of the most important technology procurements in recent history," with ramifications far outside the realm of technology. The importance of the cloud capabilities the CIA gets through leveraging Amazon Web Services' horsepower is best exemplified in computing intelligence data. Instead of each agency building out its own systems, select agencies ... are responsible for governing its major components.
Note: The CIA tries to "collect everything and hold on to it forever." For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
When Australia's Susie O'Neill claimed the gold medal at the 1996 Atlanta Olympics, she dedicated her victory to Scott Volkers, the swimming coach who had taken over her training two years earlier. By this time, three women who had been Volkers' students were losing belief in themselves and the swimming community. Julie Gilbert, Kylie Rogers and Simone Boyce took the stand at the royal commission into child abuse in Sydney this week to describe their mental breakdowns, eating disorders, anxiety and isolation from a swimming hierarchy that refused to believe them or failed to explore the possibility that Volkers molested them – as girls aged 12 to 18 – in the 1980s. Volkers remained on the payroll of elite Australian swimming institutions until 2010, when he was finally forced to move to Brazil, where he still works as a leading coach. Was it Australia's win-at-all-costs swimming culture that kept him in the presence of young athletes? An exasperated Andrew Boe, the lawyer representing Gilbert, Rogers and Boyce, pointed out: "This is not an examination of whether he was a good swimming coach or not." Nor is it an examination of the guilt or innocence of Volkers – against whom charges concerning these three alleged victims were dropped in 2002 – or other swimming coaches. It is an inquiry into the institutional responses to abuse. Swimming Australia's association with Volkers [ended] in 2005, when the coach's fourth accuser came forward with claims that Volkers had groped her breasts and attempted to stimulate her vagina in the late 1990s, when she was 15. The allegations were very similar to the earlier cases.
Note: For more on this, see concise summaries of deeply revealing sexual abuse scandals news articles from reliable major media sources.
A former cabinet minister has said there "may well have been" a political cover-up of child sex abuse in the 1980s. Lord Tebbit told the Andrew Marr Show the culture at the time was to protect "the establishment" rather than delving "too far" into such claims. His comments come after it emerged that the Home Office could not locate 114 potentially relevant files. Current MP Keith Vaz said files had been lost "on an industrial scale". The government has rejected calls for an over-arching public inquiry into the various allegations of child abuse from that era. Lord Tebbit, who served in various ministerial roles under Margaret Thatcher in the 1980s, said at the time people had an "almost unconscious" tendency to protect "the system". "And if a few things had gone wrong here and there that it was more important to protect the system than to delve too far into them," he said. "That view was wrong." Labour MP Margaret Hodge, who chairs the Public Accounts Committee, said there had been a "veil of secrecy over the establishment" for far too long. The Home Office's 2013 review found 527 potentially relevant files which it had kept, but a further 114 were missing, destroyed or "not found". Mr Vaz, chair of the Home Affairs Committee, said this represented loss of files "on an industrial scale" and it was "a huge surprise" that so much potential evidence had gone missing.
Note: The truth is gradually coming out. To learn how child sex abuse rings lead to the highest levels of government, watch this highly revealing Discovery Channel documentary.
The home of an MP who compiled a dossier alleging paedophile activity within Westminster was burgled twice in suspicious circumstances around the time he took it to the authorities, his son has said. Barry Dickens said nothing was taken in what appeared to be two "very professional" intrusions into his father Geoffrey's home in 1983, leading to suspicions they may have been related to his attempt to expose alleged abuse. He said he did not know what had happened to an apparent second copy of the dossier after the Home Office admitted one which it received for investigation at the time appeared to have been destroyed. "My parents had two burglaries at the time close to it without anything being taken, which seemed a very professional job the way they were carried out," Mr Dickens – whose father died in 1995 – [said]. He said the dossier contained concerns and worries expressed to the MP about the behaviour of ''those with a high profile, in an office or high status'' and questioned its subsequent disappearance. He said his father had been motivated to take on the cause of vulnerable young people by his own difficult childhood in a succession of foster homes and that he would be pleased that the case had become public now. Backing a public inquiry, [he] added: "A lot of people came forward with facts. I think it does need doing and finishing."
Note: See powerful evidence from a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government
A former Downing Street adviser has been charged with making and possessing indecent images of children. Patrick Rock ... was involved in Government policy on filtering online child abuse images. The 63-year-old has had a glittering career as a Conservative Party adviser spanning 30 years. On Friday, he was charged with three offences of making indecent images of children and one offence of possession of 59 indecent images of children. [He] resigned shortly before his arrest in February. Mr Rock has been an influential figure behind the scenes in the Conservative Party for decades and unsuccessfully stood as an MP three times. He met David Cameron when they were fellow advisers to the then Home Secretary, Michael Howard, in the 1990s and the Prime Minister brought him into the Downing Street policy unit in 2011. Judith Reed, a senior lawyer with the Crown Prosecution Service's organised crime division, said: “We have determined that there is sufficient evidence for a realistic prospect of conviction and that a prosecution is in the public interest.” Mr Rock has been bailed to appear at Westminster Magistrates' Court on 3 July.
Note: Why is it mentioned so casually that this man was involved in setting policy on child abuse images? For more on this, see concise summaries of deeply revealing sex abuse scandals news articles from reliable major media sources.
In 2013, Internet activist and Reddit co-founder Aaron Swartz ended his life while facing up to 35 years in prison for hacking. Swartz faced multiple charges for breaking and entering into an MIT wiring closet and downloading academic journals, including two counts of wire fraud and 11 counts of violating the Computer Fraud and Abuse Act. Swartz, who was battling the court, also battled with depression. Prosecutors dropped the charges after his death. I first met Swartz's father, Robert, last year as he explained his mission to fight for his son's memory by helping to change outdated laws. He wanted answers about why he lost his son. His son's story is now the subject of a new documentary called "The Internet's Own Boy: The story of Aaron Swartz." "He was someone who tried to understand technology and use it as a force for good," [said Robert Swartz]. "He came up with the notion of Wikipedia before Wikipedia started. It was very clear that he felt that putting academic research behind a pay wall was wrong and that it limited the diffusion of knowledge. After he was arrested ... he was worried about his phone being tapped. He couldn't go to MIT, he couldn't go to Harvard. He couldn't leave the country because they took his passport. The prosecutor was cruel and vindictive and bordered ... on sadism. They strip-searched him and they left him in solitary confinement ... with the goal of attempting to break him. This is not a system in which people are treated fairly or reasonably. They're bullied and destroyed. "
Note: What this article completely fails to mention is that Swartz's father believes it was not suicide, but that he was killed by the government, as made clear in this article in the Daily Mail. His father had been quite public about this. Why would CNN fail to mention this important fact? Could it have been an obvious message to other hackers of what might happen to them? For more along these lines, see concise summaries of deeply revealing news articles on government corruption from reliable major media sources.
A few years ago, the police chief in Keene, New Hampshire (population: 23,000) announced plans to patrol the [town's] "Pumpkin Festival and other dangerous situations" with a 19,000-pound armored vehicle called the BearCat (price tag: $285,933, courtesy of a federal Homeland Security grant). "The police are already pretty brutal," said one resident. "The last thing they need is this big piece of military equipment to make them think they're soldiers." What many other communities across America have learned since is that we're living in what the writer Radley Balko calls the age of the "warrior cop". And when warrior cops want a straight-outta-Baghdad toy, it's increasingly and unnecessarily simple for them to use a federally enabled slush-fund to wreak havoc – particularly against minorities. "Before another small town's police force gets a $700,000 gift from the Defense Department that it can't maintain or manage," Rep Hank Johnson of Georgia [said] this week, "we need to press pause and revisit the merits of a militarized America." The ACLU released a devastating report this week examining more than 800 incidents of SWAT team deployments conducted by 20 law enforcement agencies between 2010 and 2013. It's a small sample of the estimated 45,000 deployments that occur in the US each year. According to the ACLU study, 79% of the incidents surveyed involved a SWAT team searching a person's home, and more than 62% of the cases involved searches for drugs. That's not what SWAT teams were made for.
Note: For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
As part of the American Civil Liberties Union’s recent report on police militarization, the Massachusetts chapter of the organization sent open records requests to SWAT teams across that state. A number of SWAT teams in [Massachusetts] are operated by what are called law enforcement councils, or LECs. LECs are funded by several police agencies in a given geographic area and overseen by an executive board, which is usually made up of police chiefs from member police departments. Some of these LECs have also apparently incorporated as 501(c)(3) organizations. And it’s here that we run into problems. According to the ACLU, the LECs are claiming that the 501(c)(3) status means that they’re private corporations, not government agencies. And therefore, they say they’re immune from open records requests. Let’s be clear. These agencies oversee police activities. They employ cops who carry guns, wear badges, collect paychecks provided by taxpayers and have the power to detain, arrest, injure and kill. They operate SWAT teams, which conduct raids on private residences. And yet they say that because they’ve incorporated, they’re immune to Massachusetts open records laws. The state’s residents aren’t permitted to know how often the SWAT teams are used, what they’re used for, what sort of training they get or who they’re primarily used against. From the ACLU of Massachusetts’s report on police militarization in that state: "Due to the weakness of Massachusetts public records law and the culture of secrecy that has infected local police departments and Law Enforcement Councils, procuring empirical records from police departments and regional SWAT teams in Massachusetts about police militarization was universally difficult and, in most instances, impossible."
Note: The author of this article, Radley Balko, is the author of the book Rise of the Warrior Cop: The Militarization of America's Police Forces. For more on this topic, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
The American Civil Liberties Union has released the results of its year-long study of police militarization. The study looked at 800 deployments of SWAT teams among 20 local, state and federal police agencies in 2011-2012. Among the notable findings: 62 percent of the SWAT raids surveyed were to conduct searches for drugs. Just 7 percent of SWAT raids were “for hostage, barricade, or active shooter scenarios.” In at least 36 percent of the SWAT raids studied, no contraband of any kind was found. This figure could be as high as 65 percent. SWAT tactics are disproportionately used on people of color. 65 percent of SWAT deployments resulted in some sort of forced entry into a private home. In over half those raids, the police failed to find any sort of weapon, the presence of which was cited as the reason for the violent tactics. SWAT teams today are overwhelmingly used to investigate people who are still only suspected of committing nonviolent consensual crimes. And because these raids often involve forced entry into homes, often at night, they’re actually creating violence and confrontation where there was none before. In short, we have police departments that are increasingly using violent, confrontational tactics to break into private homes for increasingly low-level crimes, and they seem to believe that the public has no right to know the specifics of when, how and why those tactics are being used.
Note: For more along these lines, see this deeply revealing NPR report about The Pentagon's massive Program 1033 to widely distribute military hardware to domestic police forces.
WikiLeaks has published what it calls "the secret draft text for the Trade in Services Agreement (TISA) Financial Services Annex," apparently covering 50 countries and most of the world's trade in services. "The draft Financial Services Annex sets rules which would assist the expansion of financial multinationals — mainly headquartered in New York, London, Paris and Frankfurt — into other nations by preventing regulatory barriers," the website says in a statement. The draft deal is seen as a way to prevent more regulation of financial services, despite calls for tighter regulatory measures that followed the 2007-08 world financial crisis. That market meltdown set the world's biggest banks up against critics who said governments needed to rein them in. The last round of TISA talks took place April 28 to May 2 in Geneva. WikiLeaks also [stated] that the U.S. is "particularly keen on boosting cross-border data flow" and that this would include personal and financial data. During his teleconference, [Assange] urged U.S. Attorney General Eric Holder to end a four-year-long grand jury investigation of Assange and WikiLeaks. "National security reporters are required by their profession to have intimate interactions in order to assess and verify and investigate the nature of the material that they are dealing with," he said. "So I call on Eric Holder today to immediately drop the ongoing national security investigation against WikiLeaks or resign."
Note: Why is this important release getting so little news coverage? For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
It’s not enough, apparently, that some of the wealthiest Americans spend millions to elect their candidates to Congress. Now they are using their fortunes to lobby Congress against any limits on their ability to buy elections. Koch Companies Public Sector, part of the industrial group owned by a well-known pair of conservative brothers, has hired a big-name firm to lobby Congress on campaign-finance issues, according to a registration form filed a few weeks ago. The form doesn’t say what those issues are, but there are several bills in the House that would reduce the role of anonymous big money in campaigns, and restrict the kinds of super PACs and nonprofit groups that the Koch brothers and others have inflated with cash. Clearly, it’s vital to the Kochs and others like them to prevent such limits from being enacted; their network raised $400 million in 2012, and it has been extremely active again this year. To that end, they have done something ordinary citizens cannot do: They hired the lobbying firm of a well-known former senator, Don Nickles, Republican of Oklahoma, to press their interests. Mr. Nickles started his firm a few months after leaving the Senate in 2005, and he takes in up to $8 million a year from big firms like Exxon Mobil, General Motors and Walmart. This is a perfect illustration of the cumulative power of cash in today’s Washington. Members of Congress get elected with substantial help from check writers like the Kochs and others. Once there, they do the bidding of former members paid by the Kochs to preserve their business interests and fight off campaign-finance reforms.
Note: For more on this, see concise summaries of deeply revealing elections news articles from reliable major media sources.
The deputy described beating inmates unprovoked, slapping them, shooting them with a Taser gun and aggressively searching them to pick a fight — something he learned "on the job." He would huddle with other jail guards to get their stories straight and write up reports with bogus scenarios justifying the brutality. If the inmate had no visible injuries, he wouldn't report the use of force, period. He did all this with impunity, former Los Angeles County Sheriff's Deputy Gilbert Michel testified ..., knowing that even if inmates reported the abuse it "wouldn't go anywhere." If they were to put it in writing and drop it in a complaint box, it was his fellow deputies who opened that box too. Michel, 40, took the stand at the obstruction of justice trial of six sheriff's officials accused of impeding a federal civil rights investigation into allegations of excessive force at L.A. County jails. Michel, the first sheriff's deputy to be charged in the wide-reaching, ongoing investigation, faces a maximum of 10 years in prison after pleading guilty in 2012 to a count of bribery and agreeing to cooperate with federal prosecutors. Michel ... described a culture among deputies guarding the high-security floors of the jails that led to excessive force and frequent coverups. He matter-of-factly recounted incidents in which he said he and at least five other sheriff's employees brutalized inmates on the third, or "3000," floor of Men's Central Jail, then falsified reports to legitimize their actions.
Note: For more on this, see concise summaries of deeply revealing prison corruption news articles from reliable major media sources.
The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents. The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed. The agency intercepts “millions of images per day” — including about 55,000 “facial recognition quality images” — which translate into “tremendous untapped potential,” according to 2011 documents obtained from the former agency contractor Edward J. Snowden. It is not clear how many people around the world, and how many Americans, might have been caught up in the effort. Neither federal privacy laws nor the nation’s surveillance laws provide specific protections for facial images. Civil-liberties advocates and other critics are concerned that the power of the improving technology, used by government and industry, could erode privacy. “Facial recognition can be very invasive,” said Alessandro Acquisti, a researcher on facial recognition technology at Carnegie Mellon University.
Note: For another New York Times article showing how the NSA is using mobile phone apps to "snatch data revealing the player’s location, age, sex and other personal information," see this article.
A new book by Gareth Porter, an American historian and researcher specializing in U.S. national security, shows how the actual state of the Iranian nuclear program does not match the Iranian threat narrative. Manufactured Crisis: The Untold Story of the Nuclear Scare ... is a highly detailed and well-documented book for all interested in understanding how we arrived at the Iranian nuclear crisis, and the “attack scenarios” and invented facts and intelligence reports. The story begins with U.S. support for the Iraqis during the 1980s Iraq-Iran war. The critical point [came] with the collapse of the Soviet empire. According to Porter, that event and the end of the Cold War pulled out the rug from under the CIA’s raison d’ętre. The solution the Americans found to continue providing the [CIA] with a tremendous budget was the invention of a new threat – the merging of weapons of mass destruction (an ambiguous term in itself) and terror. Iran ... provided the threat that “saved” the CIA. Running through Porter’s book is the well-substantiated claim that U.S. and Israeli policies on Iran derived from their political and organizational interests, and not necessarily from careful factual analysis of the Iranian nuclear program, which was subject to IAEA monitoring, or of the intentions of the Iranian leadership. According to Porter, no systematic analysis was made of the goals of the Iranian nuclear program, and neither U.S. nor Israeli policy makers devoted any thought to why all of Iran’s official declarations on the subject were in line with the Treaty on the Non-Proliferation of Nuclear Weapons.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
A group of mothers, scientists and environmentalists met with U.S. Environmental Protection Agency regulators on [May 27] over concerns that residues of Roundup, the world's most popular herbicide, had been found in breast milk. The meeting ... followed a five-day phone call blitz of EPA offices by a group called Moms Across America demanding that the EPA pay attention to their demands for a recall of Roundup. "This is a poison and it's in our food. And now they've found it in breast milk," said Zen Honeycutt, founder of Moms Across America. "Numerous studies show serious harm to mammals. We want this toxic treadmill of chemical cocktails in our food to stop." Roundup is an herbicide developed and sold by Monsanto Co. since the 1970s, and used in agriculture and home lawns and gardens. The chief ingredient, glyphosate, is under a standard registration review by the EPA. The agency has set a deadline of 2015 for determining if glyphosate use should continue as is, be limited or halted. Environmentalists, consumer groups and plant scientists from several countries have said in recent years that heavy use of glyphosate is causing problems for plants, people and animals. They say some tests have raised alarms about glyphosate levels found in urine samples and breast milk. In 2011, U.S. government scientists said they detected significant levels of glyphosate in air and water samples. Glyphosate is sprayed on most of the corn and soybean crops in the United States, as well as over sugar beets, canola and other crops.
Note: For further studies showing the grave dangers of Roundup and Glyphosate, see this article.
The Supreme Court has been quietly revising its decisions years after they were issued, altering the law of the land without public notice. The revisions include “truly substantive changes in factual statements and legal reasoning,” said Richard J. Lazarus, a law professor at Harvard and the author of a new study examining the phenomenon. The court’s secretive editing process has led judges and law professors astray, causing them to rely on passages that were later scrubbed from the official record. The widening public access to online versions of the court’s decisions, some of which do not reflect the final wording, has made the longstanding problem more pronounced. Unannounced changes have not reversed decisions outright, but they have withdrawn conclusions on significant points of law. The larger point, said Jeffrey L. Fisher, a law professor at Stanford, is that Supreme Court decisions are parsed by judges and scholars with exceptional care. “In Supreme Court opinions, every word matters,” he said. “When they’re changing the wording of opinions, they’re basically rewriting the law.” The court does warn readers that early versions of its decisions, available at the courthouse and on the court’s website, are works in progress. A small-print notice says that “this opinion is subject to formal revision before publication,” and it asks readers to notify the court of “any typographical or other formal errors.” But ... the court almost never notes when a change has been made, much less specifies what it was. And many changes do not seem merely typographical or formal.
Note: Read about a new app which tracks these changes. For more on this, see concise summaries of deeply revealing government corruption news articles from reliable major media sources.
A year after Obama laid out new conditions for drone attacks around the world, U.S. forces are failing to comply fully with the rules he set for them: to strike only when there is an imminent threat to Americans and when there is virtually no danger of taking innocent lives. Although Obama promised greater transparency in his speech at the National Defense University, U.S. lawmakers are increasingly critical of the secrecy surrounding the operations. There are growing concerns in Washington that the net effect of the targeted-killing program may be counterproductive. [Obama] is showing no sign of relinquishing what has become his counterterrorism weapon of choice since he took office in 2009. Drones are spreading to new areas ... in far-flung places like Somalia and in Nigeria. "Here we are, a year later, asking 'what has really changed?'" said University of Notre Dame law professor Mary Ellen O'Connell, a leading expert on extrajudicial killings who has testified before U.S. congressional committees. "The drones are still flying and the president still sees the attractiveness of this cold and antiseptic means of killing." Obama's vision of shifting control of the drone program from the shadowy paramilitary arm of the Central Intelligence Agency to the more publicly accountable Pentagon is moving at what one national security source described as a "glacial pace." The Pentagon's Joint Special Operations Command is widely believed to have been behind the December 12 drone strike in a remote part of Yemen that hit a convoy later identified as a wedding procession, killing 15 people.
Note: For more on the expansion of drones in skies worldwide, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas. According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. SOMALGET is part of a broader NSA program called MYSTIC, which ... is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country. The program raises profound questions about the nature and extent of American surveillance abroad. The U.S. intelligence community routinely justifies its massive spying efforts by citing the threats to national security posed by global terrorism and unpredictable rival nations like Russia and Iran. But the NSA documents indicate that SOMALGET has been deployed in the Bahamas to locate “international narcotics traffickers and special-interest alien smugglers” – traditional law-enforcement concerns, but a far cry from derailing terror plots or intercepting weapons of mass destruction.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
Dr. Andres Carrasco, an Argentine neuroscientist who challenged pesticide regulators to re-examine one of the world’s most widely used weed killers, has died. He was 67. Dr. Carrasco, a molecular biologist at the University of Buenos Aires and past-president of Argentina’s CONICET science council, was a widely published expert in embryonic development. His 2010 study on glyphosate [became] a major public relations challenge for the ... Monsanto Company. Glyphosate is the key ingredient in Monsanto’s Roundup brand of pesticides, which have combined with genetically modified “Roundup-Ready” plants to dramatically increase the spread of industrial agriculture around the world. [The technology's] spread has increasingly exposed people to glyphosate and other chemicals. Dr. Carrasco, principal investigator at his university’s Cellular Biology and Neuroscience Institute, told The Associated Press in a 2013 interview that he had heard reports of increasing birth defects in farming communities after genetically modified crops were approved for use in Argentina, and so decided to test the impact of glyphosate on frog and chicken embryos in his laboratory. His team’s study, published in the peer-reviewed Chemical Research in Toxicology journal, found that injecting very low doses of glyphosate into embryos can change levels of retinoic acid, causing the same sort of spinal defects that doctors are increasingly registering in communities where farm chemicals are ubiquitous. “If it’s possible to reproduce this in a laboratory, surely what is happening in the field is much worse,” Dr. Carrasco told the AP.
Note: For further studies showing the grave dangers of Roundup and Glyphosate, see this article.
The opportunity those in power have to characterise political opponents as "national security threats" or even "terrorists" has repeatedly proven irresistible. In the past decade, the government ... has formally so designated environmental activists, broad swaths of anti-government rightwing groups, anti-war activists, and associations organised around Palestinian rights. One document from the Snowden files, dated 3 October 2012, chillingly underscores the point. It revealed that the agency has been monitoring the online activities of individuals it believes express "radical" ideas and who have a "radicalising" influence on others. Among the information collected about the individuals, at least one of whom is a "US person", are details of their online sex activities and "online promiscuity." The agency discusses ways to exploit this information to destroy their reputations and credibility. The record is suffused with examples of groups and individuals being placed under government surveillance by virtue of their dissenting views and activism – Martin Luther King, the civil rights movement, anti-war activists, environmentalists. The NSA's treatment of Anonymous ... is especially troubling and extreme. Gabriella Coleman, a specialist on Anonymous at McGill University, said that [Anonymous] "is not a defined" entity but rather "an idea that mobilises activists to take collective action and voice political discontent. It is a broad-based global social movement with no centralised or official organised leadership structure. Some have rallied around the name to engage in digital civil disobedience, but nothing remotely resembling terrorism."
Note: This excerpt is from the new book No Place to Hide by Glenn Greenwald. For more on government surveillance, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.