Government Corruption News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
While nobody has offered hard evidence that intelligence agencies, and in particular the CIA or Mossad, were directly involved in Epstein and [Ghislaine] Maxwell's blackmailing of public figures, many of the journalists who investigated the Epstein case have concluded that they were running what is known in the intelligence community as a "honeypot" or "honeytrap" aimed at using sex to blackmail people. The current director of the Central Intelligence Agency, William Burns, had scheduled three meetings with Epstein in 2014. Epstein's private calendar showed that he had dozens of meetings with Kathryn Ruemmler, a former White House counsel under President Barack Obama. Meetings with many other wealthy, well-connected individuals occurred years after Epstein became a convicted sex offender. Reporter Vicky Ward ... wrote a story about the Justice Department's 2007 "non-prosecution agreement" with Epstein. Alexander Acosta was the U.S. Attorney for South Florida who arranged the lenient sentence. "I was told Epstein 'belonged to intelligence' and to leave it alone," Acosta said. In addition to his possible ties to American intelligence, Epstein may have also been connected to the Israeli Mossad. A former Israeli spy, Ari Ben-Menashe, said he was Robert Maxwell's "handler" and claimed to have introduced Epstein to Mossad. "They were agents of the Israeli Intelligence Services," said Ben-Menashe. The CIA has a long record of using sexual blackmail. In 1975, the Washington Post reported that for years, the CIA had "operated love traps in New York City and San Francisco, where foreign diplomats were lured by prostitutes in the pay of the CIA ...Through hidden one-way mirrors, CIA agents filmed the sexual adventures and later tried to blackmail the victims into becoming informants."
Note: Read more about former Israeli spy Ari Ben-Menashe's claims that Epstein was running a sexual blackmail operation on behalf of Israeli military intelligence. For more along these lines, see concise summaries of deeply revealing news articles on Jeffrey Epstein and intelligence agency corruption from reliable major media sources.
A whistleblower has come forward with an explosive new trove of documents. They describe the activities of an "anti-disinformation" group called the Cyber Threat Intelligence League, or CTIL, that officially began as the volunteer project of data scientists and defense and intelligence veterans but whose tactics over time appear to have been absorbed into ... those of the Department of Homeland Security (DHS). In 2019, US and UK military and intelligence contractors ... developed the sweeping censorship framework. CTIL ... partnered with [Cybersecurity and Infrastructure Security Agency] (CISA) in the spring of 2020. CTIL's approach to "disinformation" went far beyond censorship. The group engaged in offensive operations to influence public opinion, discussing ways to promote "counter-messaging," co-opt hashtags, dilute disfavored messaging, create sock puppet accounts, and infiltrate private invite-only groups. The ambitions of the 2020 pioneers of the Censorship Industrial Complex went far beyond simply urging Twitter to slap a warning label on Tweets, or to put individuals on blacklists. The [Adversarial Misinformation and Influence Tactics and Techniques] framework calls for discrediting individuals as a necessary prerequisite of demanding censorship against them. It calls for training influencers to spread messages. And it calls for trying to get banks to cut off financial services to individuals who organize rallies or events. [CTIL] laments that governments and corporate media no longer have full control of information. "For a long time, the ability to reach mass audiences belonged to the nation-state (e.g. in the USA via broadcast licensing through ABC, CBS and NBC). Now, however, control of informational instruments has been allowed to devolve to large technology companies who have been blissfully complacent and complicit in facilitating access to the public for information operators at a fraction of what it would have cost them by other means."
Note: The extensive collusion between Big Tech and government officials to censor COVID information is barely beginning to come to light. For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
Silicon Valley techies are pretty sanguine about commercial surveillance. But they are much less cool about government spying. Government employees and contractors are pretty cool with state surveillance. But they are far less cool with commercial surveillance. What are they both missing? That American surveillance is a public-private partnership: a symbiosis between a concentrated tech sector that has the means, motive, and opportunity to spy on every person in the world and a state that loves surveillance as much as it hates checks and balances. The tech sector has powerful allies in government: cops and spies. No government agency could ever hope to match the efficiency and scale of commercial surveillance. Meanwhile, the private sector relies on cops and spies to go to bat for them, lobbying against new privacy laws and for lax enforcement of existing ones. Think of Amazon's Ring cameras, which have blanketed entire neighborhoods in CCTV surveillance, which Ring shares with law enforcement agencies, sometimes without the consent or knowledge of the cameras' owners. Ring marketing recruits cops as street teams, showering them with freebies to distribute to local homeowners. Google ... has managed to play both sides of the culture war with its location surveillance, thanks to the "reverse warrants" that cops have used to identify all the participants at both Black Lives Matter protests and the January 6 coup. Distinguishing between state and private surveillance is a fool's errand.
Note: For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.
On April 27, 2021, then-director of the CDC, Rochelle Walensky stated, "we have not seen any reports" of post-vaccination myocarditis, but this was a false statement. When Walensky claimed to have "not seen any reports," there were dozens of reports in the US Vaccine Adverse Event Reporting System (VAERS). "The CDC," notes [journalist Zachary] Stieber, "was warned by Israel on Feb. 28, 2021, about a â€large number' of myocarditis cases after Pfizer COVID-19 vaccination. Internally, the warning was designated as â€high' importance and set off a review of US data." The Israeli Ministry of Health requested a joint meeting with the Food and Drug Administration (FDA) and the CDC to respond to this trend. "The Israeli National Focal Point is noticing a large number of reports of myocarditis, particularly in young people, following the administration of the Pfizer vaccines," the email stated. Even when more information about myocarditis became public, [Walensky's] agency continued to downplay the risks. Stieber also found that the CDC's V-Safe self-reporting system did not include a category for myocarditis reports. To this day, the CDC has not released complete, updated data on myocarditis. The agency's cover-up of adverse cardiac events has had profound consequences and represents a major breach of trust and abuse of authority. Due to the higher risks of myocarditis after Moderna, Sweden, Norway, Finland, Germany, and France suspended the use of the Moderna vaccine for people under 30 two years ago.
Note: When current and former FDA advisers and academics asked the FDA to improve COVID vaccine labeling given the significant risk of severe vaccine injuries, the agency denied almost every single request. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and coronavirus vaccines from reliable major media sources.
From Virginia to Florida, law enforcement all over the US are increasingly using tools called reverse search warrants – including geofence location warrants and keyword search warrants – to come up with a list of suspects who may have committed particular crimes. While the former is used by law enforcement to get tech companies to identify all the devices that were near a certain place at a certain time, the latter is used to get information on everyone who's searched for a particular keyword or phrase. It's a practice public defenders, privacy advocates and many lawmakers have criticised, arguing it violates fourth amendment protections against unreasonable searches. Unlike reverse search warrants, other warrants and subpoenas target a specific person that law enforcement has established there is probable cause to believe has committed a specific crime. But geofence warrants are sweeping in nature and are often used to compile a suspect list to further investigate. Google broke out how many geofence warrants it received for the first time in 2021. The company revealed it received nearly 21,000 geofence warrants between 2018 and 2020. The tech giant did not specify how many of those requests it complied with but did share that in the second half of 2020, it responded to 82% of all government requests for data in the US with some level of information. Apple has taken steps to publish its own numbers. In the first half of 2022 the company fielded a total of 13 geofence warrants and complied with none.
Note: The legal world is struggling to keep up with the rise of tech firms building ever more sophisticated means of surveilling people and their devices. For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy from reliable major media sources.
He still remembers the first gunshot. Now, 60 years later, Paul Landis, one of the Secret Service agents just feet away from President John F. Kennedy on that fateful day in Dallas, is telling his story in full for the first time. His account differs from the official version. At age 88, he said, all he wants is to tell what he saw and what he did. He will leave it to everyone else to draw conclusions. What it comes down to is a copper-jacketed 6.5-millimeter projectile. The Warren Commission decided that one of the bullets fired that day struck the president from behind, exited from the front of his throat and continued on to hit Mr. Connally, somehow managing to injure his back, chest, wrist and thigh. It seemed incredible that a single bullet could do all that, so skeptics called it the magic bullet theory. Investigators came to that conclusion partly because the bullet was found on a stretcher believed to have held Mr. Connally at Parkland Memorial Hospital. In fact, [Mr. Landis] said, he was the one who found the bullet – and he found it not in the hospital near Mr. Connally but in the presidential limousine lodged in the back of the seat behind where Kennedy was sitting. "If what he says is true, which I tend to believe, it is likely to reopen the question of a second shooter, if not even more," [Historian James] Robenalt said. "If the bullet we know as the magic or pristine bullet stopped in President Kennedy's back, it means that the central thesis of the Warren Report, the single-bullet theory, is wrong."
Note: For more along these lines, see concise summaries of revealing news articles on the Kennedy assassination from reliable major media sources. For deeper exploration, check out our comprehensive Information Center on John F. Kennedy's assassination, which challenge mainstream narratives about his assassination and the events leading up to it.
Missouri and Louisiana, joined by scientists and conservatives whose posts were censored, sued to protect their First Amendment rights. The issue in Missouri v. Biden [is] whether government officials can be held responsible for their censorship. Judge Terry Doughty ruled they can and his 155-page opinion describes disturbing coordination between the government and tech firms to suppress unpopular views, especially on Covid-19. White House officials and public-health agency leaders held biweekly meetings with tech companies over how to curb the spread of misinformation. Former White House director of digital strategy Rob Flaherty and Covid-19 adviser Andy Slavitt were in constant contact with social-media executives. Officials weren't merely flagging false statements. They were bullying companies to censor anything contradicting government guidance. On July 16, 2021, the President accused social-media companies of "killing people." Judge Doughty concludes from all this that "the public and private pressure from the White House apparently had its intended effect." All 12 people dubbed the "Disinformation Dozen" by the Center for Countering Digital Hate were censored, and pages, groups and accounts linked to them were removed. Some Covid claims flagged by the White House were ... scientifically debatable–for instance, that vaccines can cause Bell's palsy and multisystem inflammatory syndrome in children, and that Covid had a 99.96% survival rate.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
Current Food and Drug Administration (FDA)-approved labels for the Pfizer and Moderna COVID-19 vaccines are obsolete, misleading and out of touch with regulators elsewhere. Take the ongoing uncertainty over whether vaccines reduce viral transmission. We asked the FDA to clarify in labeling that there isn't substantial evidence that mRNA vaccines reduce viral transmission. The FDA also failed to warn about the documented risk of sudden death, even though myocarditis is now a well-recognized side effect, particularly among young men. To support adding "sudden death" to product labeling, we pointed to multiple autopsy studies on lethal vaccination-associated myocarditis. We asked the FDA to add seven adverse event types to product labeling: multi system inflammatory syndrome in children (MIS-C), pulmonary embolism, sudden cardiac death, neuropathology and autonomic disorders, decreased sperm concentration, heavy menstrual bleeding and detection of vaccine mRNA in breast milk. Current and former FDA advisers and academics from around the country ... tried to fix this problem by asking the FDA to make critical changes to official product labels. But four months later, in a 33-page response letter, the agency denied almost every single request. In doing so, the FDA failed to follow the lead of regulators elsewhere. We cited the European regulator's addition of heavy menstrual bleeding to product information as a potential vaccine adverse reaction. The FDA's response was a sophisticated version of "who cares!"
Note: Explore a deeper look into why medical experts are calling for more accurate COVID-19 vaccine labeling. For more along these lines, see concise summaries of deeply revealing news articles on government corruption and coronavirus vaccines from reliable major media sources.
Between 1955 and 1963, federal agents ran a hidden brothel in one of San Francisco's poshest neighborhoods and tested LSD on unsuspecting Bay Area residents. The apartment building is still there, although it has been converted from a CIA brothel into a four-story mansion. At the center of this wildly unethical program was George Hunter White ... who became one of the biggest crusaders of America's early war on drugs. In public, he railed against drug use and ruthlessly investigated jazz legends like Billie Holiday. Privately, however, he drank martinis by the pitcher and even used drugs like LSD and marijuana. White was the federal agent responsible for a top-secret CIA program called "Operation Midnight Climax." The CIA thought it could use hallucinogenic drugs like LSD as weapons of war against its enemies. To find out, the agency got Bay Area residents high without their consent. White outfitted rooms inside a Telegraph Hill apartment building, at 225 Chestnut St., into a safe house for testing LSD. He gave sex workers get-out-of-jail-free cards in exchange for luring unsuspecting johns to the apartment, where the men were dosed with acid while White watched from the other side of a one-way mirror. According to a letter unearthed by John Marks in his 1979 book "The Search for the 'Manchurian Candidate,'" it was nothing but "fun, fun, fun." "Where else could a red-blooded American boy lie, kill, cheat, steal, rape, and pillage with the sanction and blessing of the All-Highest?" White asked.
Note: Read more about Operation Midnight Climax and the larger MK-ULTRA project it was a part of. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and mind control from reliable major media sources.
Florida's statewide prosecutor Thursday explicitly accused federal immigration authorities of "human trafficking" in their oversight of unaccompanied migrant children in the state. The Statewide Prosecutors' Office released an acerbic, 46-page grand jury report that denounces the federal Department of Homeland Security's Office of Refugee Resettlement (ORR), for leaving vulnerable migrant children with unvetted caregivers, or "sponsors" – and then abdicating all oversight of their welfare. The report suggests the policy amounts to criminal child neglect. The Statewide Grand Jury, which is an arm of Attorney General Ashley Moody's office, also accuses the federal government of covering up its alleged misdeeds. [Gov. Ron] DeSantis asked the state Supreme Court to empanel a statewide grand jury to investigate undocumented migrants last June. "The purpose of the grand jury will be to investigate individuals and organizations that are actively working with foreign nationals, drug cartels and coyotes to illegally smuggle minors, some as young as 2 years old, across the border," DeSantis said. By "incentivizing" illegal migration, the grand jury wrote, the Biden administration has encouraged children "to undertake and/or be subjected to a harrowing trek to our border. "This process exposes children to horrifying health conditions, constant criminal threat, labor and sex trafficking, robbery, rape, and other experiences not done justice by mere words," grand jurors added.
Note: A Department of Homeland Security whistleblower Aaron Stevenson is trying to stop the facilitation of child trafficking at the US border. Watch a 23-min video of his experience with this deeply concerning issue, including his investigation into a common pattern of criminals (many of them sex traffickers) across the world who become sponsors for unaccompanied children. Worst off, when he tried to track down who was monitoring and vetting the sponsors, he couldn't find any information about it. According to a report by The Center for Public Integrity, thousands have disappeared from sponsors' homes after the federal government placed them there. Why is this not being talked about on a mainstream level? For more along these lines, see concise summaries of deeply revealing news articles on government corruption and sexual abuse scandals from reliable major media sources.
Recent reports about the Secret Service and Immigration and Customs Enforcement playing fast and loose with rules regarding cellphone tracking and the FBI purchasing phone location data from commercial sources constitute an important wake-up call. They remind us that those handy mobile devices many people tote around are the most cost-effective surveillance system ever invented. "The United States Secret Service and U.S. Immigration and Customs Enforcement, Homeland Security Investigations (ICE HSI) did not always adhere to Federal statute and cellsite simulator (CSS) policies when using CSS during criminal investigations," the Department of Homeland Security's Office of the Inspector General reported last month. "Separately, ICE HSI did not adhere to Department privacy policies and the applicable Federal privacy statute when using CSS." The OIG report referred to the use of what is commonly called "stingray" technology–devices that simulate cellphone towers and trick phones within range into connecting and revealing their location. "They also gather information about the phones of countless bystanders who happen to be nearby," the ACLU warns. Even the most precise phone company location data remains available with court approval. The courts are currently mulling multiple cases involving "geofence warrants" whereby law enforcement seeks data not on individuals, but on whoever was carrying a device in a designated area at a specified time.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
In the month since veteran journalist Seymour Hersh published his bombshell report alleging that President Joe Biden personally authorized a covert action to bomb the Nord Stream pipelines, we've seen a frenzy of speculation, detailed dissection of Hersh's specific assertions, and the emergence of competing narratives both supporting and denouncing the report. On March 7, the New York Times and the German newspaper Die Zeit both published stories that thicken the plot. The Times story was based on a narrative clearly being pushed by U.S. intelligence sources that "a pro-Ukrainian group carried out the attack." If the bombing of the Nord Stream pipelines was, as Hersh alleges, directed by the U.S., then the leaked suggestion that the culprits were a "pro-Ukrainian group" could indicate a nascent effort at floating a cover story. No one has claimed responsibility for this attack, but there are recent precedents for foreign actors taking credit for U.S. operations to conceal Washington's involvement. Military officials have lied or misled the public ... throughout U.S. history. There is no U.S. law or rule prohibiting the government from promoting a false alternative explanation to conceal an operation. "This is an established practice in military operations and intelligence activities where it is often known as â€cover and deception,'" [said former Government Secrecy Project director Steven Aftergood]. "Sometimes, in order to maintain the operational security of X, you have to declare that it is actually Y."
Note: For more along these lines, see concise summaries of deeply revealing news articles on military corruption and media manipulation from reliable sources.
[Former UK Health Secretary] Matt Hancock wanted to "deploy" a new Covid variant to "frighten the pants off" the public and ensure they complied with lockdown, leaked messages seen by The Telegraph have revealed. The Lockdown Files – more than 100,000 WhatsApp messages sent between ministers, officials and others – show how the Government used scare tactics to force compliance and push through lockdowns. Hancock ... appeared to suggest in one message that a new strain of Covid that had recently emerged would be helpful in preparing the ground for the looming lockdown, by scaring people into compliance. In a WhatsApp conversation on Dec 13 ... Damon Poole - one of Mr Hancock's media advisers - informed his boss that Tory MPs were "furious already about the prospect" of stricter Covid measures and suggested "we can roll pitch with the new strain". The comment suggested that they believed the strain could be helpful in preparing the ground for a future lockdown and tougher restrictions in the run-up to Christmas 2020. Mr Hancock then replied: "We frighten the pants off everyone with the new strain." Mr Poole agreed, saying: "Yep that's what will get proper behaviour [sic] change." Mr Hancock expressed his worry that talks over Brexit would dominate headlines and reduce the impact, and probed Mr Poole for his media advice. "When do we deploy the new variant," asked Mr Hancock. During the pandemic, the Government was accused of scaremongering but it was denied.
Note: This article is available for free viewing on this webpage. For more along these lines, see concise summaries of deeply revealing news articles on the coronavirus and media manipulation from reliable sources.
The "Twitter files" revealed an FBI operation to monitor and censor social media content. Dozens of FBI employees worked on the identification and removal of material on a wide range of subjects and that Twitter largely carried out their requests. Nor was it just the FBI, apparently. Emails reveal FBI figures like a San Francisco assistant special agent in charge asking Twitter executives to "invite an OGA" (or "Other Government Organization") to an upcoming meeting. A week later, Stacia Cardille, a senior Twitter legal executive, indicated the OGA was the CIA, an agency under strict limits regarding domestic activities. Twitter's own ranks included dozens of ex-FBI agents and executives. The dozens of disclosed emails ... do not include still-undisclosed but apparent government coordination with Facebook and other social media companies. Much of that work apparently was done through the multi-agency Foreign Influence Task Force (FITF), which operated secretly it seems to censor citizens. This is a First Amendment violation. The Twitter files have substantiated long-standing concerns over "censorship by surrogate" or proxy. As with other amendments like the Fourth Amendment, which protects against unreasonable searches or seizures, the government cannot use private agents to do indirectly what it cannot do directly. Just as a police officer cannot direct a security guard to break into an apartment and conduct a search, the FBI cannot use Twitter to censor Americans.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and media manipulation from reliable sources.
The U.S. Centers for Disease Control and Prevention, facing a Freedom of Information Act lawsuit seeking a vast trove of data about the safety and side-effects of the COVID-19 vaccines, made a pledge in August. The agency in court papers said that on or before Sept. 30, it would post on its website a "public use" set of data from about 10 million people who signed up for its "v-safe" program -- a smartphone-based system that periodically sends people text messages and web surveys to monitor potential side effects from the Pfizer, Moderna and Johnson & Johnson COVID-19 vaccines. But the CDC missed its deadline. In the meantime, the CDC handed over the v-safe data (minus personal identifying information) to the plaintiff in the FOIA case, the Informed Consent Action Network, or ICAN, a Texas-based nonprofit. ICAN crunched the numbers on its own and came up with some statistics that its lawyer says appear to be "alarming." According to ICAN, 7.7% of the v-safe users - 782,913 people - reported seeking medical attention via a telehealth appointment, urgent care clinic, emergency room intervention or hospitalization following a COVID-19 vaccine. About 25% of v-safe users said they experienced symptoms that required them to miss school or work or prevented them from doing other normal activities, according to ICAN's "dashboard" that summarizes the results. In addition to the dashboard summary, ICAN on its website has made the underlying dataset available for public download.
Note: These are very significant numbers, yet other than this Reuters report, the media is largely silent about this very important data. For lots more on this important development with access to the data, see this webpage. For more along these lines, see concise summaries of deeply revealing news articles on coronavirus vaccines from reliable major media sources.
Wikipedia is part of the very internet developed by the military with public money in the 1950s-60s, then called ARPANET. Generally speaking, corporations hope that the systems developed in the military that evolve in the public-corporate realm–satellites, computers, data analysis, etc.–will inspire new military-intelligence innovations in a permanent feedback loop. The overarching "values" [of Wikipedia] and its contributors–mainly young, white, middle-class liberals–will reflect those "values". They include progressive slogans but reactionary policies, humanitarianism but pro-war positions, and conformity to consensus opinion even when the consensus is wrong (e.g., "regime change" in Libya and Syria). By 2006, the Intelligence Community had developed its own Intellipedia. A Top Secret report released under a FOIA request instructed intelligence officers how to edit Wikipedia's entry on MK-ULTRA, the CIA's mind control program (1953-circa 1970s), for Intellipedia. Funded by weapons contractors like BAE Systems and Boeing, and until recently led by people like Katherine Maher, ex-World Banker and Fellow of the Truman National Security Project, which exists to promote "US values" at home and abroad, the Wikimedia Foundation that enables Wikipedia does not exist in a vacuum. Wikipedia does not present unbiased, scholarly encyclopedia entries. It is as much part of the military-industrial-complex as mainstream corporate media.
Note: Some Wikipedia entries have been professionally manipulated. Watch a fascinating video with Larry Sanger, the co-founder of Wikipedia, who now says he no longer trusts the website he's helped created. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and media manipulation from reliable sources.
Facial recognition has become a security feature of choice for phones, laptops, passports, and payment apps. Yet it is also, increasingly, a tool of state oppression and corporate surveillance. Immigration and Customs Enforcement and the FBI have deployed the technology as a digital dragnet, searching for suspects among millions of faces in state driver's license databases, sometimes without first seeking a court order. In early 1963, [Woody Bledsoe] proposed to conduct "a study to determine the feasibility of a simplified facial recognition machine." A recently declassified history of the CIA's Office of Research and Development mentions just such a project in 1965; that same year, Woody sent a letter on facial recognition to John W. Kuipers, the division's chief of analysis. In 1967 ... Woody took on one last assignment that involved recognizing patterns in the human face. The purpose of the experiment was to help law enforcement agencies quickly sift through databases of mug shots and portraits, looking for matches. As before, funding for the project appears to have come from the US government. A 1967 document declassified by the CIA in 2005 mentions an "external contract" for a facial-recognition system that would reduce search time by a hundredfold. Woody's work set an ethical tone for research on facial recognition that has been enduring and problematic. The potential abuses of facial-recognition technology were apparent almost from its birth.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Working on nuclear issues on Capitol Hill in 1999 as an aide to Democratic lawmakers, the risks from human-caused global warming seemed to outweigh the dangers of nuclear power. By 2005 ... I was serving on the Nuclear Regulatory Commission, where I saw that nuclear power ... was a powerful business as well as an impressive feat of science. In 2009, President Barack Obama named me the agency’s chairman. Two years into my term, an earthquake and tsunami destroyed four nuclear reactors in Japan. I spent months reassuring the American public that nuclear energy, and the U.S. nuclear industry in particular, was safe. But by then, I was starting to doubt those claims myself. I now believe that nuclear power’s benefits are no longer enough to risk the welfare of people living near these plants. The current and potential costs - in lives and dollars - are just too high. For years, my concerns about nuclear energy’s cost and safety were always tempered by a growing fear of climate catastrophe. But Fukushima provided a good test of just how important nuclear power was to slowing climate change: After the accident, all nuclear reactors in Japan were shuttered indefinitely, eliminating production of almost all of the country’s carbon-free electricity and about 30 percent of its total electricity production. Fewer than 10 of Japan’s 50 reactors have resumed operations, yet the country’s carbon emissions have dropped below their levels before the accident. How? Energy efficiency and solar power.
Note: The above was written by Gregory Jazcko, former head of the U.S. Nuclear Regulatory Commission. For more along these lines, see concise summaries of deeply revealing news articles on the risks and dangers of nuclear power.
[Jeffrey] Epstein, a multimillionaire hedge fund manager whose friends included a constellation of entertainers, politicians, business titans and royalty, for years lured teenage girls to his Palm Beach mansion as part of a cult-like sex pyramid scheme, police in the town of Palm Beach found. In 2007, despite ample [evidence], federal prosecutors and Epstein’s lawyers quietly put together a remarkable deal for Epstein. He and his accomplices received immunity from federal sex-trafficking charges. After the FBI case was closed in 2008, witnesses and alleged victims testified in civil court that there were hundreds of girls who were brought to Epstein’s homes, including girls from Europe, Latin America and former Soviet Republic countries. There were really just two people willing to risk their careers to go after Epstein: Palm Beach Police Chief Michael Reiter and Detective Joseph Recarey. In their first media interviews about the case, Reiter and Recarey revealed [how they were] pressured by then-Palm Beach State Attorney Barry Krischer to downgrade the case to a misdemeanor or drop it altogether. Police reports show that Epstein’s private investigators attempted to conduct interviews while posing as cops; that they picked through Reiter’s trash in search of dirt to discredit him; and that the private investigators were accused of following the girls and their families. “It became apparent to me that some of our evidence was being leaked to Epstein’s lawyers,” Reiter said.
Note: Learn about how the Miami Herald broke this vitally important story in this article. Read a collection of major media reports on billionaire Jeffrey Epstein's child sex ring which directly implicate Donald Trump, Bill Clinton, and other world leaders. For more along these lines, see concise summaries of deeply revealing sexual abuse scandal news articles from reliable major media sources.
As the 2018 elections approach, the American intelligence community is issuing increasingly dire warnings about potential interference from Russia and other countries. D.H.S. has now conducted remote-scanning and on-site assessments of state and county election systems. These [measures] don't address core vulnerabilities in voting machines or the systems used to program them. And they ignore the fact that many voting machines that elections officials insist are disconnected from the internet – and therefore beyond the reach of hackers – are in fact accessible by way of the modems they use to transmit vote totals on election night. Add to this the fact that states don't conduct robust postelection audits ... and there's a good chance we simply won't know if someone has altered the digital votes in the next election. How did our election system get so vulnerable, and why haven't officials tried harder to fix it? The answer, ultimately, comes down to politics and money: The voting machines are made by well-connected private companies that wield immense control over their proprietary software, often fighting vigorously in court to prevent anyone from examining it when things go awry. The stakes are high. But the focus on Russia, or any would-be election manipulators, ignores the underlying issue – the myriad vulnerabilities that riddle the system and the ill-considered decisions that got us here.
Note: Why is it that the U.S. government is not allowed to have oversight over the companies that build and maintain voting machines and databases? What if one or more of them is bought off by a foreign or event domestic interest? Isn't this crazy? The major media have severely neglected reporting on elections manipulations that have been going on for many decades. For undeniable evidence of this, see our Elections Information Center.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.