Media ArticlesExcerpts of Key Media Articles in Major Media
Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
While teaching in Uganda in 2010, American college student Kathy Ku noticed that both she and her host family were getting sick a lot from drinking the water. She kept thinking about the problem even after she was back in school at Harvard University, designing a ceramic water filter and getting other students involved. She [then] took a year off to pursue the idea in earnest. Ku wasn’t aiming just to bring water filters into Uganda. She wanted to actually make them there, sourcing the needed clay and sawdust locally. Now, five years after that exploratory visit during her year off, Ku and co-founder John Kye have a full-fledged water filter factory near Kampala. Their organization, Spouts, has grown to more than 40 staffers and distributed about 14,000 ceramic filters, which remove 99.9 percent of bacteria. "There’s this method of cleaning your drinking water by leaving it out in clear plastic bottles in the sun. So I figured, OK, let me try that. I took a swig of the water and essentially spit it back out because it tasted like burnt plastic, and it was really warm," [said Kathy]. "I thought there had to be a better solution that people would actually like to use." Our [new] factory has the capacity to make 10,000 filters a month. We’re closer to 1,500 to 2,000 filters a month now, but ... it has the machinery and the capacity to do a lot more."
Note: Don't miss the National Geographic footage of this amazing project at the link above. Explore a treasure trove of concise summaries of incredibly inspiring news articles which will inspire you to make a difference.
A new federal lawsuit against Baylor University accuses football players of drugging and gang-raping young women as part of a hazing or bonding ritual - and the university of failing to investigate the pervasive sexual assault. The suit ... was filed by "Jane Doe," who says she was raped by four to eight Baylor players in February 2012. Her Title IX suit says the school's "deliberately indifferent response" effectively denied her educational opportunities. The alleged assaults and other criminal activities took place during former head football coach Art Briles' tenure at the school in Waco, Texas. Briles and former university President Ken Starr were both removed from their posts last year after a wave of sexual assault allegations against Baylor players. Earlier this year, a lawsuit by "Elizabeth Doe" alleged that ... at least 52 rapes and at least five gang rapes were carried out by more than 30 Baylor players. The suit also describes a culture of sexual assault woven into hazing rituals: "Members of the Baylor football team ... developed a system of hazing their freshman recruits by having them bring or invite freshman females to house parties hosted by members of the football team. At these parties, the girls would be drugged and gang raped. "The gang rapes were considered a 'bonding' experience for the football players. "Photographs and videotapes of the semi-conscious girls would be taken during the gang rapes and circulated amongst the football players."
A shadowy international mercenary and security firm known as TigerSwan targeted the movement opposed to the Dakota Access Pipeline with military-style counterterrorism measures, collaborating closely with police in at least five states. TigerSwan, [working] at the behest of its client Energy Transfer Partners, the company building the Dakota Access Pipeline, [described] the movement as “an ideologically driven insurgency with a strong religious component” and [compared] the anti-pipeline water protectors to jihadist fighters. “Daily intelligence updates” developed by TigerSwan ... were shared with law enforcement officers, thus contributing to a broad public-private intelligence dragnet. [Leaked] documents ... also reveal a widespread and sustained campaign of infiltration of protest camps and activist circles. TigerSwan agents using false names and identities regularly sought to obtain the trust of protesters, which they used to gather information they reported back to their employer. In an October 3 report, TigerSwan discusses how to use its knowledge of internal camp dynamics: “Exploitation of ongoing native versus non-native rifts, and tribal rifts between peaceful and violent elements is critical in our effort to delegitimize the anti-DAPL movement.” The way TigerSwan discusses protesters as “terrorists,” their direct actions as “attacks,” and the camps as a “battlefield,” reveals how the protesters’ dissent was not only criminalized but treated as a national security threat.
Note: The above article is part of an in-depth series, and includes many original source documents. Standing Rock activists were also targeted for investigation by the FBI’s joint terrorism taskforce. For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the erosion of civil liberties.
Your perceptions of the outside world arise through brain activity. Scientists in China have managed to reverse-engineer this process, using brain activity to guess what people are looking at. Their algorithm, which analyses functional MRI brain scans collected while volunteers gaze at digits and letters, is able to furnish uncannily clear depictions of the original images. It has been termed a mind-reading algorithm; a more accurate, though less catchy, description would be a “reconstruction of visual field” algorithm. The algorithm, called the Deep Generative Multiview Model, was highlighted this month by MIT Technology Review as an emerging technology to watch. What is true for the visual cortex is also true for our auditory systems: if you hear a song, the auditory part of your brain whirrs into action. Scientists in the US have developed a programme that can turn the associated firing of neurons back into real sounds. These technologies are turning thoughts into pictures and sounds. In short, science is coming remarkably close to being able to access what is inside our heads. If such algorithms were to find their way into advertising, we may find ourselves digitally stalked not only by images of hotels and consumer goods that we once clicked on, but also by pictures we glanced at or by songs that we streamed. This requires access to brain signals, but who would bet against such a future? Millions of people, by wearing fitness bands, sign up to having their physiological signals charted round the clock.
Note: Software breakthroughs like this have many potential benefits. But these new technologies may also be used for electronic harassment or mind control. And a 2008 US Defense Intelligence Agency report described the brain as the "battlefield of future".
The federal government sued UnitedHealth Group on Tuesday alleging the Minnetonka-based health care company wrongly received from Medicare at least $1 billion in “risk adjustment” payments based on inaccurate data submissions. The federal government’s civil fraud action comes in a whistleblower case first brought by a former UnitedHealth Group employee. Earlier this year, the federal government disclosed it had ongoing investigations about risk adjustment practices at four other carriers including Aetna and a division of Cigna. In Medicare Advantage plans, the government pays health insurers a per-member per-month payment for enrollees. The government says the fees can be increased when health plans submit information about an enrollee’s health that justifies a higher “risk score” for the patient. The federal lawsuit filed Tuesday highlighted UnitedHealth’s program to review charts, calling it a “one-sided revenue-generating program.” The insurer collected “millions of medical records” and employed chart reviewers “in order to mine for diagnoses that the providers themselves did not report to United for their patients,” the lawsuit states. “United used the results of the chart reviews to only increase government payments ... while in bad faith systematically ignoring other information from the chart reviews which would have led to decreased payments.”
Cybersecurity experts were shocked Tuesday when a sixth grader showed them just how easy it would be to hack their mobile devices and weaponize a seemingly innocuous item - in this case, his smart teddy bear. At a cyber safety conference in the Hague, Netherlands, 11-year-old prodigy Reuben Paul used a small computer called a "raspberry pi" to hack into audience members' bluetooth devices and download phone numbers. Paul then reportedly used one of the numbers to hack into the teddy bear, which connects to the Internet via Bluetooth or WiFi, and used the toy to record a message from the audience by using a computer language program called Python. "I basically showed how I could connect to [a remote Internet-connected device], and send commands to it," Paul told AFP. He warned that Internet-enabled everyday objects "can be used and weaponized to spy on us or harm us," for example by scraping private information like passwords. Toys could even be programmed to say "meet me at this location and I will pick you up," he added. Though not yet a teenager, Paul is already well known among his community in Austin, Texas, and beyond. In 2014, the wunderkind founded his own company, an educational gaming website called PrudentGames. Paul is now the company's CEO.
Note: An internet-connected toy doll was recently banned in Germany because it operates "as an espionage device". A 2015 New York Times article called "smart objects" a "train wreck in privacy and security". For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy.
Founder and principal of San Francisco’s Life Learning Academy, Dr. Teri Delane says that the success of the school that serves the city’s highest-risk, highest-need students can be replicated. The school tracks a 99% graduation rate with 85% of the students going on to college. The kids that do so well here [have] histories of school failure, truancy, arrest and substance abuse. The ones that traditional school settings can’t provide for. [Life Learning Academy] has it roots in the Delancey Street Foundation, a well-known San Francisco-based self-help program for drug addicts and ex-offenders. Delane ... has first hand experience of the Delancey Street program - entering the program as an addict herself. Delane incorporated practices of the program that would could be integrated into a school environment: creating community, engagement, leadership, dress code and working toward rewards. And woven through it all is Delane’s philosophy. “What we do at the school is a circle around the kids with a number of things that have to be included in their lives in order for them to have a full life: education, a job, having money and ... learning how to give back,” she said. “I teach that the way you get is by giving. Not by sitting around talking about your problems. We don’t stay stuck in our past.” All the students know Delane’s background, see what she has accomplished and witness her giving back every day.
Several officers of the U.S. Customs and Border Protection Agency have come forward with bombshell allegations against their colleagues at Newark Airport in New Jersey. Three officers told NBC New York they were sexually assaulted as part of disturbing rituals that involved being duct-taped to a table other officers called the “rape table.” While no one ever removed their clothes, other officers would forcibly rub their genital areas on the victims strapped to the table, as well as grab them. This practice has been happening for years. “Hazing wouldn’t do this justice,” CBP officer Vito Degironimo told NBC. “This is complete assault. They take you in a room and your fellow officers are all watching as officers grab you.” Diana Cifuentes and Dan Arencibia told the station they managed to avoid the table, but experienced other horrific harassment from colleagues. At one point, Cifuentes said, someone pointed a gun at her in the office. CBP agent [Charlie Smith] corroborated the trio’s allegations in an interview with the Daily Beast, saying he’s heard stories of 17 similar assaults. Smith, who began working at Newark in 2015, said he was “recently” transferred out for his own protection after he reported the assault against Degironimo to whistleblower hotlines. He also [said] that Degironimo had already reported the attack to his own supervisors, but instead of launching an internal investigation, management simply removed the table.
A decade-old internet scourge called ransomware went mainstream on Friday when cybercriminals seized control of computers around the world, from the delivery giant FedEx in the United States to Britain’s public health system, universities in China and even Russia’s powerful Interior Ministry. Ransomware is nothing new. For years, there have been stories of individuals or companies horrified that they have been locked out of their computers and that the only way back in is to pay a ransom to someone, somewhere who has managed to take control. But computer criminals are discovering that ransomware is the most effective way to make money in the shortest amount of time. Friday’s attacks were a powerful escalation of earlier, much smaller episodes. Hackers exploited a vulnerability in Microsoft servers that was first discovered by the National Security Agency and then leaked online. It allowed the ransomware to spread [to] more than 70,000 organizations. There is even now a concept of “ransomware as a service” - a play on the Silicon Valley jargon “software as a service,” which describes the delivery of software over the internet. Now anyone can visit a web page, generate a ransomware file with the click of a mouse, encrypt someone’s systems and demand a ransom to restore access to the files. If the victim pays, the ransomware provider takes a cut of the payment. Ransomware criminals also have customer service lines that victims can call to get help paying a ransom.
Note: In 2014, it was reported that the NSA was developing tools to make it relatively easy to hack millions of computers at once. Two years later, a large collection of NSA hacking tools was leaked. Now, these tools are being used by criminals against people all over the world. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
A shipment of 36 million pounds of soybeans sailed late last year from Ukraine to Turkey to California. Along the way, it underwent a remarkable transformation. The cargo began as ordinary soybeans. They were fumigated with a pesticide [and] priced like ordinary soybeans. But by the time the 600-foot cargo ship carrying them to Stockton, Calif., arrived in December, the soybeans had been labeled “organic,” according to receipts, invoices and other shipping records. That switch - the addition of the “USDA Organic” designation - boosted their value by approximately $4 million, creating a windfall for at least one company in the supply chain. About 21 million pounds of the soybeans have already been distributed to customers. The multimillion-dollar metamorphosis of the soybeans, as well as two other similar grain shipments in the past year examined by The Post, demonstrate weaknesses in the way that the United States ensures that what is sold as “USDA Organic” is really organic. The three shipments, each involving millions of pounds of “organic” corn or soybeans, were large enough to constitute a meaningful proportion of the U.S. supply of those commodities. All three were presented as organic, despite evidence to the contrary. USDA officials say that their system for guarding against fraud is robust. The system suffers from multiple weaknesses: Farmers hire their own inspection companies; most inspections ... lack the element of surprise; and testing for pesticides is the exception rather than the rule.
Note: Sign an online petition to stop an Oregon county from forcing a well-established organic farm to spray their gardens with Monsanto's poisonous Roundup. For more along these lines, see concise summaries of deeply revealing news articles on corruption in the food system and in the corporate world.
The suspected pedophile could see people banging on his front door. The Philippines National Bureau of Investigation smashed their way [in]. Children's underwear, toddler shoes, cameras, bondage cuffs, fetish ropes, meth pipes and stacks of hard drives and photo albums cluttered [David Timothy Deakin's] townhouse. In his computer were videos and images of young boys and girls engaged in sex acts. Deakin's arrest ... reveals one of the darkest corners of the internet, where pedophiles in the U.S., Canada, Europe and Australia pay facilitators on the other side of the world to sexually abuse children, even babies, directing their moves through online livestreaming services. Webcam sex tourism is spreading rapidly. The FBI says ... that at any given moment, 750,000 child predators are online. Almost every case stems from the Philippines, where good English speakers, increased internet connections and widespread international cash transfer systems combine with widespread poverty and easy access to vulnerable kids. There have been as many as three busts a week there this spring. The youngest victim ... was an infant, two months old. Most are under 12. Because it's a newer crime, legal systems grapple with how to prosecute. In the U.S., the buyers are typically charged with possessing, distributing or producing child pornography. In the Philippines, it's a human trafficking crime. Deakin's bust turned out to be one of the largest seizures of its kind in the Philippines.
Note: A recent University of Portsmouth study found that sites with paedophile material account for 83% of all "Dark Web" traffic. Watch an excellent segment by Australia's "60-Minutes" team "Spies, Lords and Predators" on a pedophile ring in the UK which leads directly to the highest levels of government. A second suppressed documentary, "Conspiracy of Silence," goes even deeper into this topic in the US. For more, see concise summaries of sexual abuse scandal news articles.
Decades later, it's hard to grasp what the federal government did to hundreds of black men in rural Alabama. For 40 years starting in 1932, medical workers in the segregated South withheld treatment for unsuspecting men infected with a sexually transmitted disease simply so doctors could track the ravages of the horrid illness and dissect their bodies afterward. Finally exposed in 1972, the study ended and the men sued, resulting in a $9 million settlement. Twenty years ago this May, then President Bill Clinton apologized for the U.S. government. But it did not mark the end of the study's ugly legacy. Relatives of the men still struggle with the stigma of being linked to the experiment, what's commonly known as the "Tuskegee Syphilis Study." In 1929, government doctors ... recruited 600 black men into a health program with the promise of free medical checks, free food, free transportation and burial insurance. Health workers told syphilitic fathers, grandfathers, sons, brothers and uncles only that they had "bad blood." None of the men was asked to consent to take part in a medical study, [or] told that "bad blood" actually was a euphemism for syphilis. Instead, doctors purposely hid the study's purpose from the men, subjecting them ... to painful spinal taps and blood tests. Medical workers periodically provided men with pills and tonic that made them believe they were being treated, but they weren't. And doctors never provided them with penicillin after it became the standard treatment for syphilis in the mid-1940s.
Tiny houses are closer than ever to being a reality in Atlanta. Last week, the Atlanta City Council voted on and approved an amendment to city zoning laws allowing “accessory dwelling units.” Local advocacy group Tiny House Atlanta called it “a great step in the right direction.” The language in the amendment ... carves out space for accessory dwelling units of larger main structures. A tiny house counts as one of these secondary units if it is less than 750 square feet and has its own kitchen. The amendment also allows “accessory dwelling units without off-street parking on parcels without a curbcut or parcels without off-street parking,” making the affected areas more attractive to car-less Atlantans. While the change sets out possibilities for tiny houses that are satellites of existing homes, it does not allow for standalone tiny homes on their own lots. The new language specifically prohibits subdividing accessory units from the primary house. It also says nothing about tiny homes on wheels. Many tiny home owners make their homes into RVs, which subject them to a whole separate set of rules. Still, tiny house advocates said they are happy with the changes. “The sky’s the limit to what’s possible,” Atlanta city councilman Kwanza Hall, the bill’s sponsor, [said]. “It’s just up to us as a community to figure out what we want to do, what we envision in the future, and opening up as many possibilities as we can dream up.”
Note: Explore a treasure trove of concise summaries of incredibly inspiring news articles which will inspire you to make a difference.
Your average life expectancy now varies by more than 20 years depending on where you live in the United States, according to an in-depth study by the University of Washington. America’s “life expectancy gap” is also predicted to grow even wider in future, with 11.5% of US counties having experienced an increase in the risk of death for residents aged 25–45 over the period studied (1980-2014). No previous study has put the disparity at even close to 20 years. “This is way worse than any of us had assumed,” said [study author] Ali Mokdad. The researchers found that while residents of certain affluent counties in central Colorado had the highest life expectancy at 87 years, people in several counties of North and South Dakota, typically those with Native American reservations, could expect to die far younger, at only 66. “Inequalities will only increase further if recent trends are allowed to continue uncontested,” the report states. If the figures are surprising, the factors cited in the study to explain the “large and increasing” geographic inequalities perhaps are not. The authors point the finger at differences in socioeconomic and race/ethnicity factors, the availability of – and access to – quality healthcare and insurance, and “preventable risk factors” such as smoking, drinking and physical inactivity. “You expect disparities in any country, but you don’t expect the disparities to be increasing in a country with our wealth and might,” Mokdad said.
More than 20 states have proposed bills that would crack down on protests and demonstrations since Donald Trump was elected, in a move that UN experts have branded “incompatible with US obligations under international human rights law”. The proposed laws would variously increase the penalties for protesting in large groups, ban protesters from wearing masks during demonstrations and, in some states, protect drivers from liability if they strike someone taking part in a protest. The ACLU and the National Lawyers Guild have said many of the bills are likely unconstitutional. The flurry of legislation has prompted UN experts to intervene, with two special rapporteurs from the UN’s Office of the High Commissioner for Human Rights – the UN body which works to promote and protect human rights – to complain to the US state department at the end of March. In a recent letter to the government, David Kaye and Maina Kiai, from the Office of the High Commissioner for Human Rights (OHCHR), listed specific pieces of legislation which they said were “criminalizing peaceful protests”. Kaye and Kiai ... said the bills represent “a worrying trend that could result in a detrimental impact on the rights to freedom of peaceful assembly and freedom of expression in the country”.
Dutch officials have opened what is being billed as one of the world’s largest offshore wind farms, with 150 turbines spinning far out in the North Sea. Over the next 15 years the Gemini windpark ... will meet the energy needs of about 1.5 million people. At full tilt the windpark has a generating capacity of 600 megawatts and will help supply 785,000 Dutch households with renewable energy, according to the company. “We are now officially in the operational stage,” the company’s managing director Matthias Haag said, celebrating the completion of a project first conceived in 2010. The €2.8bn ($3bn) project is a collaboration between the Canadian independent renewable energy company Northland Power, wind turbine manufacturer Siemens Wind Power, Dutch maritime contractor Van Oord and waste processing company HVC. Gemini would contribute about 13% of the country’s total renewable energy supply and about 25% of its wind power. The Netherlands remains dependant on fossil fuels which still make up about 95% of its energy supply, according to a 2016 report from the ministry of economics affairs. The Dutch government has committed to ensuring 14% of its energy comes from renewable sources such as wind and solar power by 2020, and 16% by 2023, with the aim of being carbon neutral by 2050. Gemini “is seen as a stepping stone” in the Netherlands and has “shown that a very large project can be built on time, and in a very safe environment”, Haag said.
Note: Explore a treasure trove of concise summaries of incredibly inspiring news articles which will inspire you to make a difference.
As the solar industry continues to grow, so do its job opportunities. It's no surprise then that the fastest-growing job in the U.S. between 2012 and 2016 was for a solar photovoltaic installers or someone who assembles solar panels on roofs. The job pays about $42,500 a year. Overall, the U.S. added 211,000 jobs in April, MarketWatch reports. This is an overall increase in employment, but some states and industries performed better than others. The second fastest-growing field was for mathematics and computer jobs, two of the fields that fall under STEM. Out of all 50 states, Michigan performed the best in this field—boasting a 200% increase in computer and information research scientists between 2012 and 2016. Other industries also saw growth - namely personal care jobs and skincare specialist occupations. For example, in Utah, the number of personal care aids increased 313% to 6,780 jobs. But the salary isn't great: MarketWatch reports those positions only pay $21,890 per year. Meanwhile, in North Carolina, the number of skincare specialist grew 187% to 890 positions. The average salary is $33,760.
Note: The above article does not mention that the solar power industry in the US now employs more workers than the coal, oil and natural gas industries combined.
A global child sexual exploitation ring has been taken down by the FBI and Europol, leading to the arrest of hundreds of suspected paedophiles. Florida man Steven W Chase, 58, was sentenced to 30 years in prison for creating what is believed to have been “the world’s largest child pornography website” with more than 150,000 users. In total some 870 people were arrested or convicted worldwide, including 368 in Europe alone, and so far at least 259 sexually abused children have been identified or rescued from abusers outside the US. Chase created the website, called 'Playpen', in August 2014 on the Dark Web network Tor, where people can communicate and access material anonymously through "hidden service" websites. Special Agent Dan Alfin ... pointed out the initial difficulty in investigating the case. “Given the nature of how Tor hidden services work, there was not much we could do about it," he said. However, in December 2014, Chase accidently revealed Playpen’s IP address in Florida, prompting a foreign law enforcement agency to contact the FBI. A copy of the website was seized by US law enforcement; search warrants were issued for email accounts and eventually, said Mr Alfin, “everything led back to Steven Chase”. One month later the FBI, along with support from European and local law enforcement, launched Operation Pacifier to find Playpen’s thousands of members.
Note: A recent University of Portsmouth study found that sites with paedophile material represent just 2% of the estimated 45,000 hidden services websites online at any one time, but account for 83% of all "Dark Web" traffic. Watch an excellent segment by Australia's "60-Minutes" team "Spies, Lords and Predators" on a pedophile ring in the UK which leads directly to the highest levels of government. A second suppressed documentary, "Conspiracy of Silence," goes even deeper into this topic in the US. For more, see concise summaries of sexual abuse scandal news articles.
The story of Cambridge Analytica is one of the most profoundly unsettling of our time. SCL/Cambridge Analytica [is] effectively part of the ... defence establishment. This is not just a story about social psychology and data analytics. It has to be understood in terms of a military contractor using military strategies on a civilian population. David Miller, a professor of sociology ... and an authority in psyops and propaganda, says it is “an extraordinary scandal that this should be anywhere near a democracy.” David, [an] ex-Cambridge Analytica employee, [was] working at the firm when it introduced mass data-harvesting to its psychological warfare techniques. “It brought psychology, propaganda and technology together in this powerful new way,” David [said]. Facebook was the source of the psychological insights that enabled Cambridge Analytica to target individuals. The company ... bought consumer datasets – on everything from magazine subscriptions to airline travel – and uniquely it appended these with the psych data to voter files. “The goal is to capture every single aspect of every voter’s information environment,” said David. “And the personality data enabled Cambridge Analytica to craft individual messages.” Cambridge Analytica could target people high in neuroticism, for example, with images of immigrants “swamping” the country. Brexit came down to ... just over 1% of registered voters. It’s not a stretch to believe that ... the global 1% found a way to influence this crucial 1% of British voters.
Note: Another Guardian article recently exposed how billionaire Robert Mercer used new technology to build a corporate empire capable of swinging elections. The above article further details how mass media is being combined with Big Data to produce powerful new forms of mind control.
[The CIA] has since 1945 succeeded in deposing or killing a string of leaders, but was forced to cut back after a Senate investigation in the 1970s. Some of the most notorious of the CIA’s operations to kill world leaders were those targeting the late Cuban president, Fidel Castro. Attempts ranged from snipers to imaginative plots worthy of spy movie fantasies. But although the CIA attempts proved fruitless in the case of Castro, the US intelligence agency has ... succeeded in deposing or killing a string of leaders elsewhere around the world – either directly or, more often, using sympathetic local military, locally hired criminals or pliant dissidents. On Friday, [North Korea accused] the CIA and South Korea’s intelligence service of being behind an alleged recent assassination attempt on its leader Kim Jong-un. Such a claim cannot be dismissed as totally outlandish – given the long list of US involvement in coups and assassinations worldwide. The agency was forced to cut back on such killings after ... then president Gerald Ford signed in 1976 an executive order stating: “No employee of the United States government shall engage in, or conspire in, political assassination.” In spite of this, the US never totally abandoned the strategy, simply changing the terminology from assassination to targeted killings. A leaked document obtained by WikiLeaks and released earlier this year showed the CIA in October 2014 looking at hacking into car control systems, [potentially allowing] an agent to stage a car crash.
Note: Strong evidence suggests that courageous journalist Michael Hastings was killed when his car controls were hacked causing him to crash head on into a tree. For more along these lines, see concise summaries of deeply revealing news articles on verified or suspected assassinations from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.