Government Corruption News ArticlesExcerpts of key news articles on government corruption
A system intended to speed help to vaccine-injured Americans has instead heaped additional suffering on thousands of families. To investigate vaccine court in depth, the AP read hundreds of decisions, conducted more than 100 interviews, and analyzed a database of more than 14,500 cases. Among the AP's findings: * Prominent attorneys have enlisted expert witnesses whose own work has been widely discredited, including one who treated autism with a potent drug used to chemically castrate serial rapists. Some of the most prominent experts set up nonprofits questioning vaccine safety. Many doctors hired by the government to defend vaccine safety in court have ties to the pharmaceutical industry. * The government fights legitimate claims ... worried that if they concede a vaccine caused harm, the public will react by skipping shots. If government doctors had their way ... 1,600 families would not have gotten more than $1.1 billion in cash and future medical care between the court's opening in 1988 and then end of 2012. * Cases are supposed to be resolved within 240 days. Less than 7 percent of 7,876 claims not involving autism met the 240-day target. Most non-autism cases take at least two and a half years. Hundreds have surpassed the decade mark. Several people died before getting any money. "The system is not working," said Richard Topping, a former U.S. Department of Justice attorney who handled vaccine injury claims but resigned after concluding his bosses had no desire to fix the major flaws he saw.
Note: Read the entire article to see how the vaccine court is deeply flawed in may ways. Then read an article showing how the government removed data from it's website which showed an increase in court victories by those claiming harm from vaccines. For more along these lines, see concise summaries of deeply revealing vaccine news articles from reliable major media sources. See also the excellent, reliable resources provided in our Health Information Center.
Police are investigating claims that up to five paedophile rings operated at the heart of Westminster with the involvement of “highly influential” politicians. A Labour MP who has handed a dossier of evidence to Scotland Yard said he now believed the complexity of child abuse networks at the heart of government in the Seventies and Eighties had been seriously underestimated. John Mann, MP for Bassetlaw, said it was “inconceivable” that police would not now arrest and interview some of the politicians he has named in a list handed to detectives. Mr Mann, who has spent months sifting evidence from members of the public, met Scotland Yard and handed over evidence on 22 politicians, including three serving MPs and three members of the House of Lords. “There are at least five paedophile rings which involved MPs,” he said. “Each of them involved at least one MP, some involved more, and these were groups of people who knew about the activities of one another. “In some cases I believe they committed abuse together.” Thirteen former ministers were among the list. Mr Mann handed his dossier to detectives from Operation Trinity, the Metropolitan Police’s investigation into alleged abuse in children’s homes in Lambeth, south London. A range of other inquiries have also been launched including Operation Midland, looking at allegations of child sex abuse focusing on Westminster.
Note: A further article states that a member of Parliament is calling for an investigation into the suspicious deaths of two people who were revealing information on the pedophile rings which go to the highest levels of government. Watch powerful evidence in a suppressed Discovery Channel documentary showing that child sexual abuse scandals reach to the highest levels of government.
The Securities and Exchange Act of 1934 banned insider trading but left it up to the Securities and Exchange Commission and the courts to define it. Which they have -- in recent decades so broadly that confidential information [is now Wall Street's] "coin of the realm." If a CEO tells his golf buddy that his company is being taken over, and his buddy makes a killing on that information, no problem. If his buddy leaks the information to a hedge fund manager and doesn't say where it came from, the hedge fund manager can also use the information to make a bundle. CEOs and other top executives ... routinely use their own inside knowledge of when their companies will buy back large numbers of shares from the public -- thereby pumping up share prices -- in order to time their own personal stock transactions. That didn't used to be legal. Until 1981, the Securities and Exchange Commission required companies to publicly disclose the amount and timing of their buybacks. But Ronald Reagan's SEC removed those restrictions. Then, George W. Bush's SEC allowed top executives, even though technically company "insiders" ... to quietly cash in their stock options without public disclosure. Now it's normal practice. Many CEOs are making vast fortunes not because they're good at managing their corporations but because they're good at using insider information.
Note: Is the trend to relax the rules on insider trading related to the revolving door between big banks and government? For more along these lines, see these concise summaries of deeply revealing articles about widespread corruption in government and banking and finance.
The security services are facing questions over the cover-up of a Westminster paedophile ring as it emerged that files relating to official requests for media blackouts in the early 1980s were destroyed. Two newspaper executives have told the Observer that their publications were issued with D-notices – warnings not to publish intelligence that might damage national security – when they sought to report on allegations of a powerful group of men engaging in child sex abuse in 1984. One executive said he had been accosted in his office by 15 uniformed and two non-uniformed police over a dossier on Westminster paedophiles passed to him by the former Labour cabinet minister Barbara Castle. The other said that his newspaper had received a D-notice when a reporter sought to write about a police investigation into Elm Guest House, in southwest London, where a group of high-profile paedophiles was said to have operated. Theresa May, home secretary, this month told the Commons that an official review into whether there had been a cover-up of the Home Office’s handling of child-abuse allegations in the 1980s ... was prompted by the discovery that 114 Home Office files related to child abuse in the 1980s had gone missing. The two journalists, Don Hale, the former editor of the Bury Messenger, and Hilton Tims, news editor of the Surrey Comet between 1980 and 1988, both recall their publications being issued with D-notices around 1984.
Note: Explore powerful evidence from a suppressed Discovery Channel documentary showing that child sexual abuse scandals also reach to the highest levels of government in the US. For more along these lines, see these concise summaries of deeply revealing government corruption and sex abuse scandal news articles from reliable sources.
Civil asset forfeiture ... allows the government, without ever securing a conviction or even filing a criminal charge, to seize property. The practice ... has become a staple of law enforcement agencies because it helps finance their work. Under a Justice Department program, the value of assets seized has ballooned to $4.3 billion in the 2012 fiscal year from $407 million in 2001. From Orange County, N.Y., to Rio Rancho, N.M., forfeiture operations are being established or expanded. Much of the nuts-and-bolts how-to of civil forfeiture is passed on in continuing education seminars for local prosecutors and law enforcement officials, some of which have been captured on video. In the sessions, officials ... offered advice on dealing with skeptical judges, mocked Hispanics whose cars were seized, and ... gave weight to the argument that civil forfeiture encourages decisions based on the value of the assets to be seized rather than public safety. Prosecutors boasted in the sessions that seizure cases were rarely contested or appealed. Civil forfeiture places the burden on owners, who must pay court fees and legal costs. And often the first hearing is presided over not by a judge but by the prosecutor whose office benefits from the proceeds. Mr. McMurtry [chief of the forfeiture unit in the Mercer County, N.J., prosecutor’s office] said his handling of a case is sometimes determined by department wish lists. “If you want the car, and you really want to put it in your fleet, let me know — I’ll fight for it.”
Note: Watch the video at the link above showing a trainer teaching cops how to steal a car that a cop might want legally. For more along these lines, see these concise summaries of deeply revealing government corruption and civil liberties news articles from reliable sources.
The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed [on September 11] that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program. The documents ... outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online communications by users of Yahoo and other U.S.-based technology firms. The ruling by the Foreign Intelligence Surveillance Court of Review became a key moment in the development of PRISM, helping government officials to convince other Silicon Valley companies that unprecedented data demands had been tested in the courts and found constitutionally sound. Eventually, most major U.S. tech companies, including Google, Facebook, Apple and AOL, complied. Microsoft had joined earlier, before the ruling, NSA documents have shown. PRISM was first revealed by former NSA contractor Edward Snowden last year. Documents made it clear that the program allowed the NSA to order U.S.-based tech companies to turn over e-mails and other communications to or from foreign targets without search warrants for each of those targets. Other NSA programs gave even more wide-ranging access to personal information of people worldwide, by collecting data directly from fiber-optic connections.
Note: For more on this, see concise summaries of deeply revealing government surveillance news articles from reliable major media sources.
The US government’s web of surveillance is vast and interconnected. You can be pulled into the National Security Agency’s database quietly and quickly. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors. The watchlist [is] based on [low] standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist. Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists. The US [government uses] a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted. ["Reasonable suspicion"] requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.
Note: For more on this, see concise summaries of deeply revealing terrorism news articles from reliable major media sources.
A century has passed since the start of World War I, which many people at the time declared was “the war to end all wars.” Unfortunately, wars just kept happening. In influential research sponsored by the World Bank, the Oxford economist Paul Collier has shown that the best predictor of civil war, which is all too common in poor countries, is the availability of lootable resources like diamonds. Whatever other reasons rebels cite for their actions seem to be mainly after-the-fact rationalizations. If you’re a modern, wealthy nation, however, war — even easy, victorious war — doesn’t pay. And this has been true for a long time. In his famous 1910 book The Great Illusion, the British journalist Norman Angell argued that “military power is socially and economically futile.” As he pointed out, in an interdependent world (which already existed in the age of steamships, railroads, and the telegraph), war would necessarily inflict severe economic harm even on the victor. Modern nations can’t enrich themselves by waging war. Yet wars keep happening. Why? Governments all too often gain politically from war, even if the war in question makes no sense in terms of national interests. Nations almost always rally around their leaders in times of war, no matter how foolish the war or how awful the leaders. Argentina’s junta briefly became extremely popular during the Falklands war. For a time, the “war on terror” took President George W. Bush’s approval to dizzying heights, and Iraq probably won him the 2004 election. True to form, Mr. Putin’s approval ratings have soared since the Ukraine crisis began.
Note: For more on this, see this concise summary of War Is A Racket, a powerful book written by one of the most highly decorated US generals ever.
An internal investigation by the C.I.A. has found that its officers penetrated a computer network used by the Senate Intelligence Committee in preparing its damning report on the C.I.A.’s detention and interrogation program. The report by the agency’s inspector general also found that C.I.A. officers read the emails of the Senate investigators and sent a criminal referral to the Justice Department based on false information. The investigation also discovered that the officers created a false online identity to gain access on more than one occasion to computers used by the committee staff. The inspector general’s account of how the C.I.A. secretly monitored a congressional committee charged with supervising its activities touched off angry criticism from members of the Senate and amounted to vindication for Senator Dianne Feinstein of California, the committee’s Democratic chairwoman, who excoriated the C.I.A. in March when the agency’s monitoring of committee investigators became public. Senator Mark Udall, Democrat of Colorado and another member of the Intelligence Committee, demanded Mr. Brennan’s resignation. “The C.I.A. unconstitutionally spied on Congress by hacking into the Senate Intelligence Committee computers,” he said in a written statement. “This grave misconduct not only is illegal but it violates the U.S. Constitution’s requirement of separation of powers,” he added.
Note: For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
Nearly all of the highest-profile domestic terrorism plots in the United States since 9/11 featured the "direct involvement" of government agents or informants, a new report says. Some of the controversial "sting" operations "were proposed or led by informants", bordering on entrapment by law enforcement. Yet the courtroom obstacles to proving entrapment are significant, one of the reasons the stings persist. The lengthy report, released on [July 21] by Human Rights Watch, raises questions about the US criminal justice system's [respect for] civil rights and due process in post-9/11 terrorism cases. [The report] portrays a system that features not just the sting operations but secret evidence, anonymous juries, extensive pretrial detentions and convictions significantly removed from actual plots. "In some cases the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act," the report alleges. Out of the 494 cases related to terrorism the US has tried since 9/11, the plurality of convictions ... are not for thwarted plots but for "material support" charges, a broad category expanded further by the 2001 Patriot Act that permits prosecutors to pursue charges with tenuous connections to a terrorist act or group. Several cases featured years-long solitary confinement for accused terrorists before their trials. Some defendants displayed signs of mental incapacity. Jurors for the 2007 plot to attack the Fort Dix army base, itself influenced by government informants, were anonymous, limiting defense counsel's ability to screen out bias.
Note: Why was this important news not picked up by any major US media? For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
The former National Security Agency contractor Edward J. Snowden said in a wide-ranging interview ... that the oversight of surveillance programs was so weak that members of the United States military working at the spy agency sometimes shared sexually explicit photos they intercepted. He also said the British government often pioneered the most invasive surveillance programs because its intelligence services operate with fewer restrictions intended to protect individual privacy than its counterparts in the United States and other allies. “In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive,” he said. “So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: ‘Oh, hey, that’s great. Send that to Bill down the way.’ ” Mr. Snowden said that type of sharing ... was “seen as the fringe benefits of surveillance positions.” He said that this was never reported and that the system for auditing surveillance programs was “incredibly weak.” Mr. Snowden had particularly stark criticism for the British government’s surveillance programs, because in Britain the respect for individual privacy, he said, “is not strongly encoded in law or policy.” Because it has fewer restrictions, British intelligence platforms “are used as a testing ground” for programs of all five intelligence partners, a group referred to as “Five Eyes,” which includes Britain, Canada, Australia, New Zealand and the United States.”
Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.
Most everyone remembers Cyril Smith. The member of Parliament had a personal touch. He sang. He went on pal Jimmy Savile’s BBC show. He also, according to hundreds of allegations since his 2010 death, was a pedophile of historic proportions. That fact was one of many in a dossier prepared 30 years ago by a crusading member of Parliament who warned of a powerful pedophile ring of “big, big names.” The man told his family the allegations were “explosive.” It would, he told his son, “blow the lid off” of the pedophile ring and perhaps take down powerful, famous sex abusers who had infiltrated the highest reaches of British life. The allegations ... weren’t aggressively pursued and no arrests or prosecutions followed. “My father [Geoffrey Dickens] thought that the dossier at the time was the most powerful thing that had ever been produced,” son Barry told the BBC ... after it emerged that the document has since gone missing. As its disappearance ballooned into a national scandal, the Guardian reported [that] an additional 114 documents relevant to allegations involving the ring are also missing — a revelation sparking suspicion that Margaret Thatcher’s government orchestrated a cover-up. Norman Tebbit, a former cabinet minister who served under Thatcher, [said] the inclination at the time may have been to protect “the system” rather than delving “too far” into the claims. Asked if there had been a “big political cover-up,” Tebbit conceded “there may well have been.”
Note: Why have we heard nothing further on this case? For more along these lines, see concise summaries of deeply revealing sexual abuse scandal news articles from reliable major media sources.
[The] horrors of the Jimmy Savile child abuse scandal that saw the BBC accused of cover up and culture of secrecy to protect itself, ... opened the door on a potentially even more explosive scandal – the claims of a VIP Westminster paedophile ring operating from the heart of the British Establishment from the 1960s onwards. It has led to allegations of a massive cover up across Whitehall spanning decades, pressure on the police and prosecutors not to pursue cases and the apparent disappearance of key dossiers and files detailing claims of child abuse and alleged attackers. The story begins with Cyril Smith, the late Liberal Democrat MP, who was exposed as an alleged paedophile in 2012, two years after his death, aged 82. As early as the 1960s, he allegedly routinely assaulted young boys, especially in children’s homes and special schools in his home town, where he was MP from 1972 to 1992. He was also said to have been a visitor to the notorious Elm Guest house in South-west London, now the focus of a Scotland Yard investigation into an alleged VIP paedophile ring. Smith was only one of a number of alleged high profile child abusers within Westminster said to have been named in a 40-page dossier submitted to the Home Office by the late campaigning Tory MP Geoffrey Dickens in 1983. Mr Dickens told his family at the time that it named leading public figures, including senior politicians, and was going to “blow it all apart”. But the time bomb never exploded.
Note: The truth is slowly coming out. To learn how child sex abuse rings lead to the highest levels of government, watch this highly revealing Discovery Channel documentary. If you want to know more about cults involved in sexual abuse, read a professor's speech and a survivor's account.
Just weeks before Blackwater guards fatally shot 17 civilians at Baghdad’s Nisour Square in 2007, the State Department began investigating the security contractor’s operations in Iraq. But the inquiry was abandoned after Blackwater’s top manager there issued a threat: “that he could kill” the government’s chief investigator and “no one could or would do anything about it as we were in Iraq.” American Embassy officials in Baghdad sided with Blackwater rather than the State Department investigators as a dispute over the probe escalated in August 2007, the previously undisclosed documents show. The officials told the investigators that they had disrupted the embassy’s relationship with the security contractor and ordered them to leave the country. After returning to Washington, the chief investigator wrote a scathing report to State Department officials documenting misconduct by Blackwater employees and warning that lax oversight of the company, which had a contract worth more than $1 billion to protect American diplomats, had created “an environment full of liability and negligence.” “The management structures in place to manage and monitor our contracts in Iraq have become subservient to the contractors themselves,” the investigator, Jean C. Richter, wrote in an Aug. 31, 2007, memo to State Department officials. “Blackwater contractors saw themselves as above the law,” he said, adding that the “hands off” management resulted in a situation in which “the contractors, instead of Department officials, are in command and in control.”
Note: For more on this, see concise summaries of deeply revealing war crimes news articles from reliable major media sources.
Just months after U.S. Congressman Bill Posey compared the Center for Disease Control (CDC)'s vaccine safety studies to the SEC's Bernie Madoff scandal, malfeasance in the CDC's studies of thimerosal-containing vaccines has, for the first time, been documented in peer-reviewed scientific literature. The journal BioMed Research International now provides direct evidence that the CDC's safety assurances about the mercury-containing preservative are not fact-based, according to the article's lead author, Brian Hooker. The paper [cites] over 165 studies that have found thimerosal to be harmful, including 16 studies that had reported [serious detrimental] outcomes in human infants and children. "Substantial scientific evidence exists and has existed for many years that the vaccine ingredient thimerosal is a developmental neurotoxin" says George Lucier, former Associate Director of the National Toxicology Program. Studies showing harm from thimerosal sharply contradict published outcomes of six CDC coauthored and sponsored papers – the very studies that CDC relies upon to declare that thimerosal is "safe" for use in infant and maternal vaccines. Dr. Hooker ... said of the six CDC studies, "Each of these papers is fatally flawed from a statistics standpoint and several of the papers represent issues of scientific malfeasance. For example, important data showing a relationship between thimerosal exposure and autism are withheld from three of the publications. This type of cherry-picking of data by the CDC in order to change the results of important research studies to support flawed and dangerous vaccination policies should not be tolerated."
Note: A Reuters article reports that the former head of the US's CDC was later named president of Merck's vaccine division with accompanying high salary. Could this be payoff for her support in suppressing studies that cast doubt on vaccines? For more on this, see concise summaries of deeply revealing vaccines news articles from reliable major media sources.
Nearly half of American adults believe the federal government, corporations or both are involved in at least one conspiracy to cover up health information, a new survey finds. Conspiracy theories on everything from cancer cures to cellphones to vaccines are well known and accepted by sizable segments of the population, according to a research letter published this week in JAMA Internal Medicine. The findings reflect "a very low level of trust" in government and business, especially in pharmaceutical companies, says study co-author Eric Oliver, a professor of political science at the University of Chicago. The online survey of 1,351 adults found: • 37% agree the Food and Drug Administration is keeping "natural cures for cancer and other diseases" away from the public because of "pressure from drug companies." • 20% believe health officials are hiding evidence that cellphones cause cancer. • 20% believe doctors and health officials push child vaccines even though they "know these vaccines cause autism and other psychological disorders." • Smaller numbers endorse theories involving fluoride, genetically modified foods and the deliberate infection of African Americans with HIV. • 49% believe at least one of the theories and 18% believe at least three. The beliefs also go along with certain health behaviors, the survey found. Those who believe at least three health conspiracy theories are less likely to use sunscreen, get flu shots or get check-ups and are more likely to use herbal remedies and eat organic foods.
Note: For an intriguing list of 10 major health cover-ups with evidence to back it up, click here.
British spies have developed "dirty tricks" ... that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into "honey traps." Documents taken from the National Security Agency by Edward Snowden ... describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG). According to the documents ... the agency's goal was to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications. The propaganda campaigns use deception, mass messaging and "pushing stories" via Twitter, Flickr, Facebook and YouTube. JTRIG also uses "false flag" operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain's adversaries. Other documents ... show that JTRIG ... used a DDOS attack to shut down Internet chat rooms used by members of the hacktivist group known as Anonymous. A computer virus called Ambassadors Reception was "used in a variety of different areas" and was "very effective." When sent to adversaries ... the virus will "encrypt itself, delete all emails ... and block the computer user from logging on. Spies have long used sexual "honey traps" to snare, blackmail and influence targets. Most often, a male target is led to believe he has an opportunity for a romantic relationship or a sexual liaison with a woman, only to find that the woman is actually an intelligence operative.
Note: You can read the documents released by Snowden at this link and this one. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The British government can tap into the cables carrying the world’s web traffic at will and spy on what people are doing on some of the world’s most popular social media sites ... without the knowledge or consent of the companies. Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated a pilot program to their U.S. partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter. Called “Psychology A New Kind of SIGDEV" (Signals Development), the presentation includes a section that spells out “Broad real-time monitoring of online activity” of YouTube videos, URLs “liked” on Facebook, and Blogspot/Blogger visits. The monitoring program is called “Squeaky Dolphin.” Experts told NBC News the documents show the British had to have been either physically able to tap the cables carrying the world’s web traffic or able to use a third party to gain physical access to the massive stream of data. Representatives of Facebook and Google, which owns YouTube, said they ... were unaware the collection had occurred. The NSA does analysis of social media similar to that in the GCHQ demonstration. In 2010 ... GCHQ exploited unencrypted data from Twitter to identify specific users around the world and target them with propaganda.
Note: Read an article diving deeper and showing how online reputations are ruthlessly destroyed by powerful groups. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
On a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludgeoned each other over 15 rounds in a televised title bout viewed by millions around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with nearly every document inside. They were never caught, and the stolen documents that they mailed anonymously to newspaper reporters ... would become a flood of revelations about extensive spying and dirty-tricks operations by the F.B.I. against dissident groups. Perhaps the most damning document from the cache [was] a 1970 memorandum that ... urged agents to step up their interviews of antiwar activists and members of dissident student groups. “It will enhance the paranoia endemic in these circles and will further serve to get the point across there is an F.B.I. agent behind every mailbox.” Another document, signed by Hoover himself, revealed widespread F.B.I. surveillance of black student groups on college campuses. But the document that would have the biggest impact on reining in the F.B.I.’s domestic spying activities [included] a mysterious word: Cointelpro ... shorthand for Counterintelligence Program. Since 1956, the F.B.I. had carried out an expansive campaign to spy on civil rights leaders, political organizers and suspected Communists, and had tried to sow distrust among protest groups. Among the grim litany of revelations was a blackmail letter F.B.I. agents had sent anonymously to the Rev. Dr. Martin Luther King Jr., threatening to expose his extramarital affairs if he did not commit suicide. The intent of Cointelpro was to destroy lives and ruin reputations.
Note: To learn about the brave citizen burglars who have now revealed themselves and watch the engaging video covering this story, click on the link given above. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
On Dec. 23, 1913, President Woodrow Wilson signed the Owen Glass Act, creating the Federal Reserve. As we note its centennial, what has the Fed accomplished during the last 100 years? The stated original purposes were to protect the soundness of the dollar and banks and also to lessen the jarring ups and downs of the business cycle. Oops. Under the Fed’s supervision, boom and bust cycles have continued. Three of them have been severe: the Great Depression, the stagflationary period of 1974-82, and the current “Great Recession.” Bank failures have occurred in alarmingly high numbers. Depending on what measurements are used, the dollar has lost between 95 and 98 percent of its purchasing power. (Amazingly, the Fed’s official position today is that inflation is not high enough, so the erosion of the dollar continues as a matter of policy.) Having failed to achieve its original goals, the Fed also has had a miserable record in accomplishing later goals. The 1970 amendments to the Federal Reserve Act stipulated that the Fed should “promote effectively the goals of maximum employment, stable prices, and moderate long-term interest rates.” In baseball parlance, the Fed has been “0-for-three.” So, what has the Fed accomplished during its century of existence? Well, it has become adept at bailing out mismanaged banks. In the aftermath of the 2008 financial crisis, the Fed orchestrated the big bailout of Wall Street. Politically, the Fed is repugnant. Its chairman is commonly referred to as the second most powerful person in the country. In a democratic republic, should the second most powerful policymaker be unelected?
Note: How remarkable for Forbes to publish an article chastising the Fed! The times are a changin'! For an essay by noted financial researcher Ellen Brown on this occasion, click here. For more on the collusion between government and the biggest banks, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.