Government Corruption News ArticlesExcerpts of key news articles on government corruption
Nearly all of the highest-profile domestic terrorism plots in the United States since 9/11 featured the "direct involvement" of government agents or informants, a new report says. Some of the controversial "sting" operations "were proposed or led by informants", bordering on entrapment by law enforcement. Yet the courtroom obstacles to proving entrapment are significant, one of the reasons the stings persist. The lengthy report, released on [July 21] by Human Rights Watch, raises questions about the US criminal justice system's [respect for] civil rights and due process in post-9/11 terrorism cases. [The report] portrays a system that features not just the sting operations but secret evidence, anonymous juries, extensive pretrial detentions and convictions significantly removed from actual plots. "In some cases the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act," the report alleges. Out of the 494 cases related to terrorism the US has tried since 9/11, the plurality of convictions ... are not for thwarted plots but for "material support" charges, a broad category expanded further by the 2001 Patriot Act that permits prosecutors to pursue charges with tenuous connections to a terrorist act or group. Several cases featured years-long solitary confinement for accused terrorists before their trials. Some defendants displayed signs of mental incapacity. Jurors for the 2007 plot to attack the Fort Dix army base, itself influenced by government informants, were anonymous, limiting defense counsel's ability to screen out bias.
Note: Why was this important news not picked up by any major US media? For more on this, see concise summaries of deeply revealing intelligence agency operations news articles from reliable major media sources.
The former National Security Agency contractor Edward J. Snowden said in a wide-ranging interview ... that the oversight of surveillance programs was so weak that members of the United States military working at the spy agency sometimes shared sexually explicit photos they intercepted. He also said the British government often pioneered the most invasive surveillance programs because its intelligence services operate with fewer restrictions intended to protect individual privacy than its counterparts in the United States and other allies. “In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive,” he said. “So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: ‘Oh, hey, that’s great. Send that to Bill down the way.’ ” Mr. Snowden said that type of sharing ... was “seen as the fringe benefits of surveillance positions.” He said that this was never reported and that the system for auditing surveillance programs was “incredibly weak.” Mr. Snowden had particularly stark criticism for the British government’s surveillance programs, because in Britain the respect for individual privacy, he said, “is not strongly encoded in law or policy.” Because it has fewer restrictions, British intelligence platforms “are used as a testing ground” for programs of all five intelligence partners, a group referred to as “Five Eyes,” which includes Britain, Canada, Australia, New Zealand and the United States.”
Note: For more on this, see concise summaries of deeply revealing privacy news articles from reliable major media sources.
Most everyone remembers Cyril Smith. The member of Parliament had a personal touch. He sang. He went on pal Jimmy Savile’s BBC show. He also, according to hundreds of allegations since his 2010 death, was a pedophile of historic proportions. That fact was one of many in a dossier prepared 30 years ago by a crusading member of Parliament who warned of a powerful pedophile ring of “big, big names.” The man told his family the allegations were “explosive.” It would, he told his son, “blow the lid off” of the pedophile ring and perhaps take down powerful, famous sex abusers who had infiltrated the highest reaches of British life. The allegations ... weren’t aggressively pursued and no arrests or prosecutions followed. “My father [Geoffrey Dickens] thought that the dossier at the time was the most powerful thing that had ever been produced,” son Barry told the BBC ... after it emerged that the document has since gone missing. As its disappearance ballooned into a national scandal, the Guardian reported [that] an additional 114 documents relevant to allegations involving the ring are also missing — a revelation sparking suspicion that Margaret Thatcher’s government orchestrated a cover-up. Norman Tebbit, a former cabinet minister who served under Thatcher, [said] the inclination at the time may have been to protect “the system” rather than delving “too far” into the claims. Asked if there had been a “big political cover-up,” Tebbit conceded “there may well have been.”
Note: Why have we heard nothing further on this case? For more along these lines, see concise summaries of deeply revealing sexual abuse scandal news articles from reliable major media sources.
[The] horrors of the Jimmy Savile child abuse scandal that saw the BBC accused of cover up and culture of secrecy to protect itself, ... opened the door on a potentially even more explosive scandal – the claims of a VIP Westminster paedophile ring operating from the heart of the British Establishment from the 1960s onwards. It has led to allegations of a massive cover up across Whitehall spanning decades, pressure on the police and prosecutors not to pursue cases and the apparent disappearance of key dossiers and files detailing claims of child abuse and alleged attackers. The story begins with Cyril Smith, the late Liberal Democrat MP, who was exposed as an alleged paedophile in 2012, two years after his death, aged 82. As early as the 1960s, he allegedly routinely assaulted young boys, especially in children’s homes and special schools in his home town, where he was MP from 1972 to 1992. He was also said to have been a visitor to the notorious Elm Guest house in South-west London, now the focus of a Scotland Yard investigation into an alleged VIP paedophile ring. Smith was only one of a number of alleged high profile child abusers within Westminster said to have been named in a 40-page dossier submitted to the Home Office by the late campaigning Tory MP Geoffrey Dickens in 1983. Mr Dickens told his family at the time that it named leading public figures, including senior politicians, and was going to “blow it all apart”. But the time bomb never exploded.
Note: The truth is slowly coming out. To learn how child sex abuse rings lead to the highest levels of government, watch this highly revealing Discovery Channel documentary. If you want to know more about cults involved in sexual abuse, read a professor's speech and a survivor's account.
Just weeks before Blackwater guards fatally shot 17 civilians at Baghdad’s Nisour Square in 2007, the State Department began investigating the security contractor’s operations in Iraq. But the inquiry was abandoned after Blackwater’s top manager there issued a threat: “that he could kill” the government’s chief investigator and “no one could or would do anything about it as we were in Iraq.” American Embassy officials in Baghdad sided with Blackwater rather than the State Department investigators as a dispute over the probe escalated in August 2007, the previously undisclosed documents show. The officials told the investigators that they had disrupted the embassy’s relationship with the security contractor and ordered them to leave the country. After returning to Washington, the chief investigator wrote a scathing report to State Department officials documenting misconduct by Blackwater employees and warning that lax oversight of the company, which had a contract worth more than $1 billion to protect American diplomats, had created “an environment full of liability and negligence.” “The management structures in place to manage and monitor our contracts in Iraq have become subservient to the contractors themselves,” the investigator, Jean C. Richter, wrote in an Aug. 31, 2007, memo to State Department officials. “Blackwater contractors saw themselves as above the law,” he said, adding that the “hands off” management resulted in a situation in which “the contractors, instead of Department officials, are in command and in control.”
Note: For more on this, see concise summaries of deeply revealing war crimes news articles from reliable major media sources.
Just months after U.S. Congressman Bill Posey compared the Center for Disease Control (CDC)'s vaccine safety studies to the SEC's Bernie Madoff scandal, malfeasance in the CDC's studies of thimerosal-containing vaccines has, for the first time, been documented in peer-reviewed scientific literature. The journal BioMed Research International now provides direct evidence that the CDC's safety assurances about the mercury-containing preservative are not fact-based, according to the article's lead author, Brian Hooker. The paper [cites] over 165 studies that have found thimerosal to be harmful, including 16 studies that had reported [serious detrimental] outcomes in human infants and children. "Substantial scientific evidence exists and has existed for many years that the vaccine ingredient thimerosal is a developmental neurotoxin" says George Lucier, former Associate Director of the National Toxicology Program. Studies showing harm from thimerosal sharply contradict published outcomes of six CDC coauthored and sponsored papers – the very studies that CDC relies upon to declare that thimerosal is "safe" for use in infant and maternal vaccines. Dr. Hooker ... said of the six CDC studies, "Each of these papers is fatally flawed from a statistics standpoint and several of the papers represent issues of scientific malfeasance. For example, important data showing a relationship between thimerosal exposure and autism are withheld from three of the publications. This type of cherry-picking of data by the CDC in order to change the results of important research studies to support flawed and dangerous vaccination policies should not be tolerated."
Note: A Reuters article reports that the former head of the US's CDC was later named president of Merck's vaccine division with accompanying high salary. Could this be payoff for her support in suppressing studies that cast doubt on vaccines? For more on this, see concise summaries of deeply revealing vaccines news articles from reliable major media sources.
As many as 300 people who were sentenced to death in the United States over a three-decade period were likely innocent. Dozens of defendants sentenced to death in recent years have been exonerated before their sentences could be carried out, but many more were probably falsely convicted, said University of Michigan professor Samuel Gross, the study's lead author. "Our research adds the disturbing news that most innocent defendants who have been sentenced to death have not been exonerated," Gross wrote in the study, published in the Proceedings of the National Academy of Sciences. In their research, Gross and his colleagues examined the 7,482 U.S. death sentence convictions between 1973 and 2004. Of those, 117 had been exonerated in recent years, thanks to the efforts of numerous groups and a tide of public attention to issues surrounding the death penalty. Gross and his co-authors ... estimated that about 4 percent of those sentenced to death were actually innocent, nearly three times the number exonerated during that period. Once inmates' sentences are commuted to life, they are far less likely to be exonerated, mostly because there are fewer legal resources given to their cases, Gross said. "If you were never sentenced to death, you never had the benefit - if you call it a benefit - of that process," he said. Although the study focuses on a period ending 10 years ago, the percentage of false death sentence convictions likely holds true today, Gross said.
Note: For more on the terrible injustices within the corrupt prison-industrial complex, see the deeply revealing reports from reliable major media sources available here.
Nearly half of American adults believe the federal government, corporations or both are involved in at least one conspiracy to cover up health information, a new survey finds. Conspiracy theories on everything from cancer cures to cellphones to vaccines are well known and accepted by sizable segments of the population, according to a research letter published this week in JAMA Internal Medicine. The findings reflect "a very low level of trust" in government and business, especially in pharmaceutical companies, says study co-author Eric Oliver, a professor of political science at the University of Chicago. The online survey of 1,351 adults found: • 37% agree the Food and Drug Administration is keeping "natural cures for cancer and other diseases" away from the public because of "pressure from drug companies." • 20% believe health officials are hiding evidence that cellphones cause cancer. • 20% believe doctors and health officials push child vaccines even though they "know these vaccines cause autism and other psychological disorders." • Smaller numbers endorse theories involving fluoride, genetically modified foods and the deliberate infection of African Americans with HIV. • 49% believe at least one of the theories and 18% believe at least three. The beliefs also go along with certain health behaviors, the survey found. Those who believe at least three health conspiracy theories are less likely to use sunscreen, get flu shots or get check-ups and are more likely to use herbal remedies and eat organic foods.
Note: For an intriguing list of 10 major health cover-ups with evidence to back it up, click here.
British spies have developed "dirty tricks" ... that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into "honey traps." Documents taken from the National Security Agency by Edward Snowden ... describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG). According to the documents ... the agency's goal was to "destroy, deny, degrade [and] disrupt" enemies by "discrediting" them, planting misinformation and shutting down their communications. The propaganda campaigns use deception, mass messaging and "pushing stories" via Twitter, Flickr, Facebook and YouTube. JTRIG also uses "false flag" operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain's adversaries. Other documents ... show that JTRIG ... used a DDOS attack to shut down Internet chat rooms used by members of the hacktivist group known as Anonymous. A computer virus called Ambassadors Reception was "used in a variety of different areas" and was "very effective." When sent to adversaries ... the virus will "encrypt itself, delete all emails ... and block the computer user from logging on. Spies have long used sexual "honey traps" to snare, blackmail and influence targets. Most often, a male target is led to believe he has an opportunity for a romantic relationship or a sexual liaison with a woman, only to find that the woman is actually an intelligence operative.
Note: You can read the documents released by Snowden at this link and this one. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption from reliable major media sources.
The British government can tap into the cables carrying the world’s web traffic at will and spy on what people are doing on some of the world’s most popular social media sites ... without the knowledge or consent of the companies. Documents taken from the National Security Agency by Edward Snowden and obtained by NBC News detail how British cyber spies demonstrated a pilot program to their U.S. partners in 2012 in which they were able to monitor YouTube in real time and collect addresses from the billions of videos watched daily, as well as some user information, for analysis. At the time the documents were printed, they were also able to spy on Facebook and Twitter. Called “Psychology A New Kind of SIGDEV" (Signals Development), the presentation includes a section that spells out “Broad real-time monitoring of online activity” of YouTube videos, URLs “liked” on Facebook, and Blogspot/Blogger visits. The monitoring program is called “Squeaky Dolphin.” Experts told NBC News the documents show the British had to have been either physically able to tap the cables carrying the world’s web traffic or able to use a third party to gain physical access to the massive stream of data. Representatives of Facebook and Google, which owns YouTube, said they ... were unaware the collection had occurred. The NSA does analysis of social media similar to that in the GCHQ demonstration. In 2010 ... GCHQ exploited unencrypted data from Twitter to identify specific users around the world and target them with propaganda.
Note: Read an article diving deeper and showing how online reputations are ruthlessly destroyed by powerful groups. For more along these lines, see concise summaries of deeply revealing news articles about questionable intelligence agency practices and the erosion of privacy.
On a night nearly 43 years ago, while Muhammad Ali and Joe Frazier bludgeoned each other over 15 rounds in a televised title bout viewed by millions around the world, burglars took a lock pick and a crowbar and broke into a Federal Bureau of Investigation office in a suburb of Philadelphia, making off with nearly every document inside. They were never caught, and the stolen documents that they mailed anonymously to newspaper reporters ... would become a flood of revelations about extensive spying and dirty-tricks operations by the F.B.I. against dissident groups. Perhaps the most damning document from the cache [was] a 1970 memorandum that ... urged agents to step up their interviews of antiwar activists and members of dissident student groups. “It will enhance the paranoia endemic in these circles and will further serve to get the point across there is an F.B.I. agent behind every mailbox.” Another document, signed by Hoover himself, revealed widespread F.B.I. surveillance of black student groups on college campuses. But the document that would have the biggest impact on reining in the F.B.I.’s domestic spying activities [included] a mysterious word: Cointelpro ... shorthand for Counterintelligence Program. Since 1956, the F.B.I. had carried out an expansive campaign to spy on civil rights leaders, political organizers and suspected Communists, and had tried to sow distrust among protest groups. Among the grim litany of revelations was a blackmail letter F.B.I. agents had sent anonymously to the Rev. Dr. Martin Luther King Jr., threatening to expose his extramarital affairs if he did not commit suicide. The intent of Cointelpro was to destroy lives and ruin reputations.
Note: To learn about the brave citizen burglars who have now revealed themselves and watch the engaging video covering this story, click on the link given above. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
On Dec. 23, 1913, President Woodrow Wilson signed the Owen Glass Act, creating the Federal Reserve. As we note its centennial, what has the Fed accomplished during the last 100 years? The stated original purposes were to protect the soundness of the dollar and banks and also to lessen the jarring ups and downs of the business cycle. Oops. Under the Fed’s supervision, boom and bust cycles have continued. Three of them have been severe: the Great Depression, the stagflationary period of 1974-82, and the current “Great Recession.” Bank failures have occurred in alarmingly high numbers. Depending on what measurements are used, the dollar has lost between 95 and 98 percent of its purchasing power. (Amazingly, the Fed’s official position today is that inflation is not high enough, so the erosion of the dollar continues as a matter of policy.) Having failed to achieve its original goals, the Fed also has had a miserable record in accomplishing later goals. The 1970 amendments to the Federal Reserve Act stipulated that the Fed should “promote effectively the goals of maximum employment, stable prices, and moderate long-term interest rates.” In baseball parlance, the Fed has been “0-for-three.” So, what has the Fed accomplished during its century of existence? Well, it has become adept at bailing out mismanaged banks. In the aftermath of the 2008 financial crisis, the Fed orchestrated the big bailout of Wall Street. Politically, the Fed is repugnant. Its chairman is commonly referred to as the second most powerful person in the country. In a democratic republic, should the second most powerful policymaker be unelected?
Note: How remarkable for Forbes to publish an article chastising the Fed! The times are a changin'! For an essay by noted financial researcher Ellen Brown on this occasion, click here. For more on the collusion between government and the biggest banks, see the deeply revealing reports from reliable major media sources available here.
Officials in North Carolina are investigating how a teen allegedly shot himself in the head while handcuffed in the back of a police cruiser. Durham Police Chief Jose Lopez said ... at a news conference that Jesus Huerta, 17, died of a self-inflicted gunshot [wound] to the head in November. Lopez said a handgun was found in the car and that Huerta was still handcuffed from behind, according to the station. "The medical examiner's office has confirmed that Jesus Huerta died from a gunshot wound to his head," Lopez said. "Whether that wound was accidental or intentional is unknown at this time." Huerta [had been] picked up early on Nov. 19 on a trespassing warrant stemming from a July incident, after family members reported concerns for his safety in a 911 call. Chief Lopez said Huerta was searched by police prior to the shooting incident and the weapon was not detected. "I know that it is hard for people not in law enforcement to understand how someone could be capable of shooting themselves while handcuffed behind the back," Lopez said. "While incidents like this are not common, they unfortunately have happened in other jurisdictions in the past." Huerta’s family released a statement following the news conference. "How did Jesus end up dead in the parking lot at police headquarters in these circumstances? Searched. Handcuffed behind the back. How is it even possible to shoot oneself?" the statement reads.
Note: If, as the police chief states, other incidents of people shooting themselves while handcuffed behind the back have happened, maybe it's time for a thorough investigation of these police forces. For more on the deadly corruption in the government-prison-industrial complex, see the deeply revealing reports from reliable major media sources available here.
My first year on Wall Street, 1993, I was paid 14 times more than I earned the prior year and three times more than my father's best year. For that money, I helped my company create financial products that were disguised to look simple, but which required complex math to properly understand. That first year I was roundly applauded by my bosses, who told me I was clever, and to my surprise they gave me $20,000 bonus beyond my salary. When I did ask, rather naively, if this was all kosher, I would be assured multiple times that multiple lawyers and multiple managers had approved the sales. One senior trader, consoling me late at night, reminded me, “You are playing in the big leagues now. If a customer wants a red suit, you sell them a red suit. If that customer is Japanese, you charge him twice what it costs. ”Being paid very well also helped ease any of my concerns. Feeling guilty, kid? Here take a big check. I was, for the first time in my life, feeling valued for my math skills. Ego and money are nice salves for any potential feeling of guilt. After a few years on Wall Street it was clear to me: you could make money by gaming anyone and everything. The more clever you were, the more ingenious your ability to exploit a flaw in a law or regulation, the more lauded and celebrated you became. Nobody seemed to be getting called out. No move was too audacious. Traders got more and more audacious, and corruption became more and more diffused through the system. By 2006 you could open up almost any major business, look at its inside workings, and find some wrongdoing.
Note: For more on financial corruption, see the deeply revealing reports from reliable major media sources available here.
Recently, the US House of Representatives voted on an amendment ... that would have curbed the NSA's omnipresent and inescapable [spying] tactics. Despite furious lobbying by the intelligence industrial complex and its allies, and four hours of frantic and overwrought briefings by the NSA's General Keith Alexander, 205 of 422 Representatives voted for the amendment. The vote signaled a clear message to the NSA: we do not trust you. The vote also conveyed another, more subtle message: members of Congress do not trust that the House Intelligence Committee is providing the necessary oversight. On the contrary, "oversight" has become "overlook". Despite being a member of Congress possessing security clearance, I've learned far more about government spying on me and my fellow citizens from reading media reports than I have from "intelligence" briefings. My colleagues feel the same way. In fact, one long-serving conservative Republican told me that he doesn't attend such briefings anymore, because, "they always lie". Many of us worry that Congressional Intelligence Committees are more loyal to the "intelligence community" that they are tasked with policing, than to the Constitution. And the House Intelligence Committee isn't doing anything to assuage our concerns. Supporters of the NSA's vast ubiquitous domestic spying operation assure the public that members of Congress can be briefed on these activities whenever they want. Senator Saxby Chambliss says all a member of Congress needs to do is ask for information, and he'll get it. Well I did ask, and the House Intelligence Committee said "no", repeatedly. And virtually every other member not on the Intelligence Committee gets the same treatment.
Note: The above article was written by courageous U.S. Congressman Alan Grayson. For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show. Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth. The agency ... deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products [called "backdoors"].
Tons of contaminated groundwater from the stricken Fukushima nuclear plant have overwhelmed an underground barrier and are emptying daily into the Pacific, creating what a top regulator has called a crisis. The water contains strontium and cesium, as well as tritium. The plant was already struggling to store hundreds of thousands of tons of contaminated water that flowed through the buildings housing three reactors where [three] meltdowns occurred in 2011. But the contamination in this new groundwater problem is from different sources, Tepco said. The company has admitted that it failed to respond quickly enough to the latest groundwater contamination, saying it was preoccupied with more pressing issues like cooling the damaged reactors. “Tepco appears overwhelmed in dealing with what is a very serious problem,” said Akio Yamamoto, a professor of nuclear engineering at Nagoya University, who serves as outside expert for the Nuclear Regulation Authority, Japan’s nuclear watchdog. Critics contend that the plant has emitted far more radioactive materials than it is saying, based in part on levels of contaminants discovered in the harbor, which are well above safe levels in some places. The contamination appears to be spreading, with tests last month by Tepco showing high levels of tritium and other radioactive elements like strontium starting at other locations near the two other crippled reactors.
Note: Declaring the situation an "emergency", the Japanese government has stepped in to take over control of the response from Tepco. For more on this, click here. For a National Geographic article on what you need to know about the radioactive contamination of the Pacific Ocean by the Fukushima disaster, click here. It reports that scientists have estimated that contaminated seawater could reach the West Coast of the United States in five years or less. For more on the environmental devastation of nuclear power, see the deeply revealing reports from reliable major media sources available here.
The FBI gave its informants permission to break the law at least 5,658 times in a single year, according to newly disclosed documents that show just how often the nation's top law enforcement agency enlists criminals to help it battle crime. The U.S. Justice Department ordered the FBI to begin tracking crimes by its informants more than a decade ago, after the agency admitted that its agents had allowed Boston mobster James "Whitey" Bulger to operate a brutal crime ring in exchange for information about the Mafia. The FBI submits that tally to top Justice Department officials each year, but has never before made it public. Agents authorized 15 crimes a day, on average, including everything from buying and selling illegal drugs to bribing government officials and plotting robberies. FBI officials have said in the past that permitting their informants — who are often criminals themselves — to break the law is an indispensable, if sometimes distasteful, part of investigating criminal organizations. USA TODAY obtained a copy of the FBI's 2011 report under the Freedom of Information Act. The report does not spell out what types of crimes its agents authorized, or how serious they were. It also did not include any information about crimes the bureau's sources were known to have committed without the government's permission. Crimes authorized by the FBI almost certainly make up a tiny fraction of the total number of offenses committed by informants for local, state and federal agencies each year.
Note: As reported in this USA Today article, the DEA and ATF don't even track crimes committed by their informants. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
It's long been suspected that ratings agencies like Moody's and Standard & Poor's helped trigger the meltdown. A new trove of embarrassing documents shows how they did it. Everybody else got plenty of blame: the greed-fattened banks, the sleeping regulators, the unscrupulous mortgage hucksters. But what about the ratings agencies? Thanks to a mountain of evidence gathered for a pair of major lawsuits by the San Diego-based law firm Robbins Geller Rudman & Dowd, ... we now know that the nation's two top ratings companies, Moody's and S&P, have for many years been shameless tools for the banks, willing to give just about anything a high rating in exchange for cash. In incriminating e-mail after incriminating e-mail, executives and analysts from these companies are caught admitting their entire business model is crooked. Ratings agencies are the glue that ostensibly holds the entire financial industry together. Their primary function is to help define what's safe to buy, and what isn't. But the financial crisis happened because AAA ratings stopped being something that had to be earned and turned into something that could be paid for. The Financial Crisis Inquiry Commission published a case study in 2011 of Moody's in particular and discovered that between 2000 and 2007, the agency gave nearly 45,000 mortgage-backed securities AAA ratings. One year Moody's doled out AAA ratings to 30 mortgage-backed securities every day, 83 percent of which were ultimately downgraded. "This crisis could not have happened without the rating agencies," the commission concluded.
Note: This is another great, well researched article by Rolling Stone's Matt Taibbi. Why isn't the major media coming up with anything near the quality of this man's work? For deeply revealing reports from reliable major media sources on financial corruption, click here.
The 9/11 Consensus Panel now offers four evidence-based points about the alleged phone calls from the 9/11 flights. The famous "let's roll" drama of the passenger revolt on UA 93 was relayed by passenger Todd Beamer's 13-minute unrecorded seat-back call to GTE telephone supervisor Lisa Jefferson, who reported Beamer as strangely tranquil, declining to speak to his wife. Eerily, Beamer's line remained open for 15 minutes after the crash. Oddly, the Verizon wireless record shows that 19 calls were made from Beamer's cell phone long after the crash of UA 93. Initial media reports and FBI interviews detailed more than a dozen cell phone calls from the planes at high elevation. Yet in 2001, a telephone spokesperson stated that sustained mobile calls were not possible above 10,000 feet. During the 2006 Moussaoui Trial, the FBI (under oath) reduced the number of cell phone calls to two calls made from 5,000 feet, and presented evidence of only one (not two) "unconnected" call from Barbara Olson, lasting "0 seconds." In another twist, two other women reported that Caller-ID showed their husband's cell numbers on their answering machines, which while lasting several minutes, had been made from elevations of 25,000 and 35,000 feet. Although the FBI conducted a massive investigation into the calls, none of the telephone billing, nor any of the cell phone location data stored in standard phone company records has been publicly released.
Note: The 9/11 Consensus Panel, consisting of scientists, pilots, professors, attorneys, and journalists, has developed 32 Points of evidence contradicting specific claims made by the official account of 9/11. For many unanswered questions about 9/11 raised by highly credible former government officials and professors, click here and here. For our 9/11 Information Center filled with reliable, verifiable 9/11 resources, click here.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.