Please donate here to support this vital work.
Revealing News For a Better World

Big Brother News Articles
Excerpts of key news articles on


Below are key excerpts of revealing news articles on Big Brother from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.


Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.


High court curbs free-speech rights of public workers on the job
2006-05-31, Chicago Tribune/Los Angeles Times
http://www.chicagotribune.com/news/nationworld/chi-0605310058may31,1,6639785....

The Supreme Court restricted the free-speech rights of the nation's 21 million public employees Tuesday, ruling that the 1st Amendment does not protect them from being punished for complaining to their managers about possible wrongdoing. Although government employees have the same rights as other citizens to speak out on controversies of the day, they do not have the right to speak freely inside their offices on matters related to "their official duties," the Supreme Court said in a 5-4 decision. Lawyers for government whistle-blowers denounced the ruling as a major setback. "In an era of excessive government secrecy, the court has made it easier to engage in a government cover-up by discouraging internal whistle-blowing," said Steven Shapiro, legal director for the American Civil Liberties Union. The decision threw out most of a lawsuit filed by Deputy District Atty. Richard Ceballos, who said he was disciplined after he wrote memos alleging that a police officer may have lied to obtain a search warrant. The 9th U.S. Circuit Court of Appeals agreed he was entitled to a trial on his lawsuit because he had spoken on a "matter of public concern." But the Supreme Court reversed that ruling Tuesday. Because Tuesday's decision interprets the 1st Amendment, it applies to governments at all levels, including federal and states agencies, public hospitals and public schools and colleges.


Bush Has Declared Katrina-Related Emergencies in 40 States
2005-09-15, ABC News
http://abcnews.go.com/US/wireStory?id=1129802

The dire conditions created by Hurricane Katrina may be confined to the Gulf Coast, but on paper the emergency is all over the country. President Bush has declared that Katrina-related emergencies exist in 40 states and the District of Columbia. Some, such as California, Massachusetts and North Dakota, are far removed from Katrina's wrath. Apparently it does not take much to qualify as an emergency.

Note: These "emergencies" also give the president extraordinary powers to curtail civil liberties.


Bush Has Declared Katrina-Related Emergencies in 40 States
2005-09-15, ABC News
http://abcnews.go.com/US/wireStory?id=1129802

The dire conditions created by Hurricane Katrina may be confined to the Gulf Coast, but on paper the emergency is all over the country. President Bush has declared that Katrina-related emergencies exist in 40 states and the District of Columbia. Apparently it does not take much to qualify as an emergency.

Note: These "emergencies" also give the president extraordinary powers to curtail civil liberties.


Apple, Google, Facebook and others urge government surveillance disclosure
2013-07-18, NBC News/Reuters
http://www.nbcnews.com/technology/apple-google-facebook-others-urge-surveilla...

Dozens of companies, non-profits and trade organizations including Apple, Google, and Facebook sent a letter [on July 18] pushing the Obama administration and Congress for more disclosures on the government's national security-related requests for user data. Together with LinkedIn, Yahoo!, Microsoft, Twitter and many others, the companies asked for more transparency of secret data gathering in the letter. Tech companies have been scrambling to assert their independence after documents leaked last month by former U.S. security contractor Edward Snowden suggested they had given the government direct access to their computers as part of the NSA's secret surveillance program called Prism. The classified nature of the data gathering has barred the participating companies from disclosing even their involvement, let alone the content of the requests. Some companies, including Facebook and Apple, in June struck an agreement with the government to release some information about the number of surveillance requests they receive. But they were limited to disclosing aggregate government requests for data without showing the split between surveillance and criminal requests, and only for a six-month period.

Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.


CIA Director Leon Panetta Warns of Possible Cyber-Pearl Harbor
2011-02-11, ABC News
http://abcnews.go.com/News/cia-director-leon-panetta-warns-cyber-pearl-harbor...

Top U.S. intelligence officials have raised concerns about the growing vulnerability the United States faces from cyberwarfare threats and malicious computer activity that CIA Director Leon Panetta said "represents the battleground for the future." "The potential for the next Pearl Harbor could very well be a cyber-attack," he testified on Capitol Hill [on February 10] before the House Permanent Select Committee on Intelligence. Panetta provided a stark assessment for the intelligence committee. "If you have a cyber-attack that brings down our power-grid system, brings down our financial system, brings down our government systems, you could paralyze this country," he said. U.S officials from the National Security Agency, Department of Homeland Security and the FBI have actively been working the emerging cybersecurity threats. The military activated U.S. Cyber Command last year to coordinate the military's cyberspace resources.

Note: For more articles from reliable sources on the construction of a total surveillance state, click here.


U.S. drones to watch entire Mexico border from September 1
2010-08-30, MSNBC/Reuters
http://www.msnbc.msn.com/id/38923040

The U.S. government will have unmanned surveillance aircraft monitoring the whole southwest border with Mexico from September 1, as it ramps up border security in this election year. Homeland Security Secretary Janet Napolitano said U.S. Customs and Border Protection would begin flying a Predator B drone out of Corpus Christi, Texas, on [that date], extending the reach of the agency's unmanned surveillance aircraft across the length of the nearly 2,000 mile border with Mexico. "With the deployment of the Predator in Texas, we will now be able to cover the southwest border from the El Centro sector in California all the way to the Gulf of Mexico in Texas, providing critical aerial surveillance assistance to personnel on the ground," Napolitano said during a conference call. Earlier this month, President Barack Obama signed a $600 million bill that would fund some 1,500 new Border Patrol agents, customs inspectors and other law enforcement officials along the border, as well as paying for two more unmanned drones. The Predator B drones are made by defense contractor General Atomics. They carry equipment including sophisticated day and night vision cameras that operators use to detect drug and human smugglers, and can stay aloft for up to 30 hours at a time.

Note: How long will it be before aerial surveillance drones, now positioned over the southern border of the US, are deployed in other parts of the country?


Intelligence Agencies' Databases Set to Be Linked
2009-01-22, Wall Street Journal
http://online.wsj.com/article/SB123258232280204323.html

U.S. spy agencies' sensitive data should soon be linked by Google-like search systems. Director of National Intelligence Mike McConnell has launched a sweeping technology program to knit together the thousands of databases across all 16 spy agencies. After years of bureaucratic snafus, intelligence analysts will be able to search through secret intelligence files the same way they can search public data on the Internet. Linking up the 16 agencies is the challenge at the heart of the job of director of national intelligence, created after 9/11. The new information program also is designed to include Facebook-like social-networking programs and classified news feeds. It includes enhanced security measures to ensure that only appropriately cleared people can access the network. The price tag is expected to be in the billions of dollars. The impact for analysts, Mr. McConnell says, "will be staggering." Not only will analysts have vastly more data to examine, potentially inaccurate intelligence will stand out more clearly, he said. Today, an analyst's query might scan only 5% of the total intelligence data in the U.S. government, said a senior intelligence official. Even when analysts find documents, they sometimes can't read them without protracted negotiations to gain access. Under the new system, an analyst would likely search about 95% of the data, the official said.

Note: For key reports from reliable sources on the hidden realities of the War on Terror, click here.


Bush Order Expands Network Monitoring
2008-01-26, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/01/25/AR20080125032...

President Bush signed a directive this month that expands the intelligence community's role in monitoring Internet traffic to protect against a rising number of attacks on federal agencies' computer systems. The directive, whose content is classified, authorizes the intelligence agencies, in particular the National Security Agency, to monitor the computer networks of all federal agencies -- including ones they have not previously monitored. The NSA has particular expertise in monitoring a vast, complex array of communications systems -- traditionally overseas. The prospect of aiming that power at domestic networks is raising concerns, just as the NSA's role in the government's warrantless domestic-surveillance program has been controversial. "Agencies designed to gather intelligence on foreign entities should not be in charge of monitoring our computer systems here at home," said Rep. Bennie Thompson (D-Miss.), chairman of the House Homeland Security Committee. The classified joint directive, signed Jan. 8 and called the National Security Presidential Directive 54/Homeland Security Presidential Directive 23, has not been previously disclosed. Allowing a spy agency to monitor domestic networks is worrisome, said James X. Dempsey, policy director of the Center for Democracy and Technology. "We're concerned that the NSA is claiming such a large role over the security of unclassified systems," he said. "They are a spy agency as well as a communications security agency. They operate in total secrecy. That's not necessary and not the most effective way to protect unclassified systems."

Note: For revealing reports from major media sources on the increasing surveillance of all aspects of society by secret government programs, click here.


From Casinos to Counterterrorism
2007-10-22, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2007/10/21/AR20071021015...

[Las Vegas], famous for being America's playground, has also become its security lab. Like nowhere else in the United States, Las Vegas has embraced the twin trends of data mining and high-tech surveillance, with arguably more cameras per square foot than any airport or sports arena in the country. Even the city's cabs and monorail have cameras. Some privacy advocates view the city as a harbinger of things to come. In secret rooms in casinos across Las Vegas, surveillance specialists are busy analyzing information about players and employees. Relying on thousands of cameras in nearly every cranny of the casinos, they evaluate ... behavior. They ping names against databases that share information with other casinos, sometimes using facial-recognition software to validate a match. And in the marketing suites, casino staffers track players' every wager, every win or loss, the better to target high-rollers for special treatment and low- and middle-rollers for promotions. "You could almost look at Vegas as the incubator of a whole host of surveillance technologies," said James X. Dempsey, policy director for the Center for Democracy and Technology. Those technologies, he said, have spread to other commercial venues: malls, stadiums, amusement parks. After Sept. 11, 2001, several airports tested facial-recognition software, with little success. But the government is continuing to invest in biometric technologies. "We often hear of the surveillance technology du jour, but what we're seeing now in America is a collection of surveillance technologies that work together," said Barry Steinhardt, the American Civil Liberties Union's technology and liberty project director. "It isn't just video surveillance or face recognition or license plate readers or RFID chips. It's that all these technologies are converging to create a surveillance society."

Note: For revealing major media reports of privacy risks and invasions, click here.


Down for the Count
2006-09-08, PBS
http://www.pbs.org/now/shows/236/index.html

New election machines, as mandated and funded by federal law, may create a new election debacle instead of correcting the old one. In 2002, Congress passed the Help America Vote Act (HAVA), which allocated $3.6 billion for all 50 states to update their voting systems. Some industry analysts suggest that the government implemented the new technology too quickly to the detriment of not only security and performance of the new machines, but the integrity of our democratic process. Avi Rubin, a computer science professor at John Hopkins University...performed an analysis of voting machines produced by Diebold. But his recommendation that the machines not be used in elections fell on deaf ears. NOW traveled to Oakland County, Michigan on Primary Day, where election workers encountered more than a few frustrating snags, even when demonstrating the machines for us. In one instance, it took five attempts for the machine to accept a ballot. We also checked in on other states. What we found were alarming scenes of computer and human error, poor results validation, nonexistent contingency plans, and extreme vulnerability to tampering. In half of 37 primaries held this year, there were technical problems associated with the new HAVA-mandated technology. These included an extra 100,000 votes recorded but never cast in Texas, which was blamed on a programming error [and] ballot counting malfunctions in Iowa that declared losing candidates as winners.


US 'plans stealth shark spies'
2006-03-02, BBC News
http://news.bbc.co.uk/2/hi/americas/4767428.stm

Pentagon scientists are planning to turn sharks into "stealth spies" capable of tracking vessels undetected, a British magazine has reported. They want to remotely control the sharks by implanting electrodes in their brains, The New Scientist says. It says the aim is "to exploit sharks' natural ability to glide through the water, sense delicate electrical gradients and follow chemical trails". The research is being funded by the Pentagon's Defence Advanced Research Projects Agency (DARPA). It aims to build on latest developments in brain implant technology which has already seen scientists controlling the movements of fish, rats and monkeys. Such devices are already being used by scientists at Boston University to "steer" a spiny dogfish in a fish tank. The next step for the Pentagon scientists will be the release of blue sharks with similar devices into the ocean off the coast of Florida. Remote-controlled sharks...have advantages that robotic underwater surveillance vehicles just cannot match: they are silent, and they power themselves.

Note: This article fails to mention that electronic implants we used over 40 years ago to control the behavior of bulls, as reported on the front page of the New York Times on May 17, 1965. To see the Times article, go to http://www.WantToKnow.info/delgadobullnytimes.pdf. For lots more reliable information on government mind control programs: http://www.WantToKnow.info/mindcontrol


New laws to punish whistle blowers
2006-07-02, London Times
http://www.timesonline.co.uk/article/0,,2087-2252720,00.html

John Reid, the home secretary, is planning a new official secrets law to punish intelligence officers who blow the whistle on government policy by leaking secret information. He wants longer jail sentences and the removal of a key legal defence of 'necessity' for whistleblowers. The crackdown is aimed at preventing cases such as that of Katharine Gun, a former translator at GCHQ, the government's eavesdropping centre, who leaked a memo showing that in the months before the Iraq war in 2003 the Americans wanted GCHQ's help in bugging the homes and offices of UN security council members. The government dropped its case against her after she threatened to use the necessity defence that she broke the law to prevent a greater 'crime' in the form of an invasion of Iraq. Ministers are also concerned at the growing number of leaks of sensitive documents by dissident officials, including those relating to the MI5 investigation into the July 7 bombings. It will be the first change to the official secrets legislation since 1989 when the government removed the right of whistleblowers to claim a defence of public interest.


Homeland Security to be lead in flu crisis
2005-10-11, MSNBC
http://msnbc.msn.com/id/9654456/

If the nightmare of an avian flu pandemic emerges from the dark chapters of doomsday scenarios, it will fall to the Department of the Homeland Security, not the medical establishment, to manage the crisis, according to federal documents and interviews with government officials. Under the National Response Plan, which also plans for actions in case of pandemics, DHS assumes top authority when an “incident of national significance” is declared. The first such “incident of national significance” was declared in August after Hurricane Katrina hit; however, federal coordination among agencies and state and local governments broke down on so many levels that even President Bush was forced to acknowledge that the plan was flawed. Federal officials have been role playing different flu outbreak scenarios for the past several months. Last year’s plan called for closing of schools, restricting travel and...lock-down quarantine measures. Those extreme measures jumped into the spotlight...when President Bush suggested that federal military troops -- not just the National Guard -- may have to be called in to enforce a quarantine.

Note: Isn't it interesting how the government seems to be predicting that the avian flu, which has killed less than 100 people worldwide, is going to mutate and cause massive deaths? How do they know this? Could this be another way of pushing us into fear and giving up our civil liberties?


U.S. May Ease Police Spy Rules
2008-08-16, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/08/15/AR20080815034...

The Justice Department has proposed a new domestic spying measure that would make it easier for state and local police to collect intelligence about Americans, share the sensitive data with federal agencies and retain it for at least 10 years. Law enforcement agencies would be allowed to target groups as well as individuals, and to launch a criminal intelligence investigation based on the suspicion that a target is engaged in terrorism or providing material support to terrorists. They also could share results with a constellation of federal law enforcement and intelligence agencies, and others in many cases. Michael German, policy counsel for the American Civil Liberties Union, said the proposed rule may [permit] police to collect intelligence even when no underlying crime is suspected. German, an FBI agent for 16 years, said easing established limits on intelligence-gathering would lead to abuses against peaceful political dissenters. He pointed to reports in the past six years that undercover New York police officers infiltrated protest groups before the 2004 Republican National Convention; that California state agents eavesdropped on peace, animal rights and labor activists; and that Denver police spied on Amnesty International and others before being discovered. "If police officers no longer see themselves as engaged in protecting their communities from criminals and instead as domestic intelligence agents working on behalf of the CIA, they will be encouraged to collect more information," German said. "It turns police officers into spies on behalf of the federal government."

Note: For many disturbing reports on increasing threats to civil liberties from reliable sources, click here.


National Dragnet Is a Click Away
2008-03-06, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/03/05/AR20080305036...

Several thousand law enforcement agencies are creating the foundation of a domestic intelligence system through computer networks that analyze vast amounts of police information. As federal authorities struggled to meet information-sharing mandates after the Sept. 11, 2001 terrorist attacks, police agencies from Alaska and California to the Washington region poured millions of ... records into shared digital repositories called data warehouses, giving investigators and analysts new power to discern links among people, patterns of behavior and other hidden clues. Those network efforts will begin expanding further this month, as some local and state agencies connect to a fledgling Justice Department system called the National Data Exchange, or N-DEx. The expanding police systems illustrate the prominent roles that private companies play in homeland security and counterterrorism efforts. They also underscore how the use of new data -- and data surveillance -- is evolving faster than the public's understanding or the laws intended to check government power and protect civil liberties. Three decades ago, Congress imposed limits on domestic intelligence activity after revelations that the FBI, Army, local police and others had misused their authority for years to build troves of personal dossiers and monitor political activists and other law-abiding Americans. Since those reforms, police and federal authorities have observed a wall between law enforcement information-gathering, relating to crimes and prosecutions, and more open-ended intelligence that relates to national security and [politics]. That wall is fast eroding following the passage of laws expanding surveillance authorities, the push for information-sharing networks, and the expectation that local and state police will play larger roles.

Note: For many revealing reports from reliable sources of serious threats to civil liberties, click here.


Clarity Sought on Electronics Searches
2008-02-07, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2008/02/06/AR20080206047...

The Electronic Frontier Foundation and Asian Law Caucus, two civil liberties groups in San Francisco, [have filed] a lawsuit to force the government to disclose its policies on border searches, including which rules govern the seizing and copying of the contents of electronic devices. They also want to know the boundaries for asking travelers about their political views, religious practices and other activities potentially protected by the First Amendment. The lawsuit was inspired by two dozen cases, 15 of which involved searches of cellphones, laptops, MP3 players and other electronics. Almost all involved travelers of Muslim, Middle Eastern or South Asian background. "It's one thing to say it's reasonable for government agents to open your luggage," said David D. Cole, a law professor at Georgetown University. "It's another thing to say it's reasonable for them to read your mind and everything you have thought over the last year. What a laptop records is as personal as a diary but much more extensive. It records every Web site you have searched. Every e-mail you have sent. It's as if you're crossing the border with your home in your suitcase." Mark Rasch, a technology security expert with FTI Consulting and a former federal prosecutor, [said] "Your kid can be arrested because they can't prove the songs they downloaded to their iPod were legally downloaded," he said. "Lawyers run the risk of exposing sensitive information about their client. Trade secrets can be exposed to customs agents with no limit on what they can do with it. Journalists can expose sources, all because they have the audacity to cross an invisible line."

Note: For many recent stories on threats to our civil liberties, click here.


C.I.A. Chief Tries Preaching a Culture of More Openness
2007-06-22, New York Times
http://www.nytimes.com/2007/06/23/washington/23hayden.html?ex=1340251200&en=3...

William E. Colby faced an uneasy decision in late 1973 when he took over the Central Intelligence Agency: whether to make public the agency’s internal accounting, then being compiled, of its domestic spying, assassination plots and other misdeeds since its founding nearly three decades earlier. Mr. Colby decided to keep the so-called family jewels a secret, and wrote in his memoir in 1978 that he believed the agency’s already sullied reputation ... could not have withstood a public airing of all its dirty laundry. So why, at a time when the agency has again been besieged by criticism, this time for its program of secret detentions and interrogations since the Sept. 11 attacks, would the current director, Gen. Michael V. Hayden, decide to declassify the same documents that Mr. Colby chose to keep secret? General Hayden said it was essential for the C.I.A. ... to be as open as possible in order to build public trust and dispel myths surrounding its operations. The more that the agency can tell the public, he said, the less chance that misinformation among the public will “fill the vacuum.” It was this outlook that General Hayden, whose public relations skills are well known in Washington, brought to an earlier job. There, as director of the National Security Agency, he tried to overhaul the N.S.A.’s public image — that of the shadowy, menacing organization portrayed in the movie “Enemy of the State” — by inviting reporters to briefings and authorizing its officials to speak to the author James Bamford for his book on the agency, “Body of Secrets.”

Note: For a brief summary of and links to further information about James Bamford's important book on the NSA, Body of Secrets, click here.


CDC Shifts Vaccine-Data Focus
2006-11-01, Washington Post
http://www.washingtonpost.com/wp-dyn/content/article/2006/10/31/AR20061031013...

Federal health officials have decided to forgo gathering detailed data on whether children in 22 big cities are receiving recommended immunizations and instead will survey teenagers, who are the target of several new vaccines. The decision is drawing protests from local health officials, who say the soon-to-be-lost information is essential to their efforts to make sure that infants and toddlers, many from poor families, are protected against childhood infections. Each year, the CDC contracts a polling company to get data on vaccination rates in various age, demographic and income groups nationwide. "We need to know if the new vaccine has helped, or had no change, or hurt [coverage], and we cannot really make those judgments without the NIS data," [one health official] said. CDC officials said they are redirecting about $3 million to survey adolescents. The only way to pay for the 22-city sampling would be to use money now used to help states buy vaccine, they added. The decision comes at a time when the government is spending record amounts on public health. The CDC's budget has risen 42 percent since 2001 and is now $8.73 billion.

Note: This unusual decision makes sense if you consider that the powerful pharmaceutical industry doesn't want tracking on toddler vaccinations, as it may show what they have long denied -- that there is a link between autism and childhood vaccinations. The mercury-derivative Thimerosal was largely taken out of childhood vaccinations just a few years ago. The much-awaited data needed to prove or disprove a link will now be more difficult to obtain.


Bush signings called effort to expand power
2006-10-05, Boston Globe
http://www.boston.com/news/nation/washington/articles/2006/10/05/bush_signing...

President Bush's frequent use of signing statements to assert that he has the power to disobey newly enacted laws is "an integral part" of his "comprehensive strategy to strengthen and expand executive power" at the expense of the legislative branch, according to a report by the non partisan Congressional Research Service. The research service said the Bush administration is using signing statements as a means to slowly condition Congress into accepting the White House's broad conception of presidential power, which includes a presidential right to ignore laws he believes are unconstitutional. The administration has suggested repeatedly that the president has exclusive authority over foreign affairs and has an absolute right to withhold information from Congress. Such assertions are "generally unsupported by established legal principles," the report said. Last week...Bush signed the 2007 military budget bill, but then issued a statement challenging 16 of its provisions. Bush has used signing statements to challenge more than 800 laws that place limits or requirements on the executive branch, saying they intrude on his constitutional powers. The American Bar Association called signing statements "contrary to the rule of law and our constitutional separation of powers." It said presidents cannot sign bills and then declare parts of them unconstitutional because a president has only two choices -- to sign a bill and enforce it as written, or to veto it and give Congress a chance to override the veto.


Beijing secretly fires lasers to disable US satellites
2006-09-26, The Telegraph (One of the U.K.'s top newspapers)
http://www.telegraph.co.uk/news/main.jhtml?xml=/news/2006/09/26/wchina226.xml

China has secretly fired powerful laser weapons designed to disable American spy satellites by "blinding" their sensitive surveillance devices. The hitherto unreported attacks have been kept secret by the Bush administration for fear that it would damage attempts to co-opt China in diplomatic offensives against North Korea and Iran. Sources told the military affairs publication Defense News that there had been a fierce internal battle within Washington over whether to make the attacks public. In the end, the Pentagon's annual assessment of the growing Chinese military build-up barely mentioned the threat. "After a contentious debate, the White House directed the Pentagon to limit its concern to one line," Defense News said. The document said that China could blind American satellites with a ground-based laser firing a beam of light to prevent spy photography as they pass over China. According to senior American officials: "China not only has the capability, but has exercised it." American satellites like the giant Keyhole craft have come under attack "several times" in recent years.

Note: Why are so few major media picking up this important news? A Google news search shows that the New York Sun is the only major media to have reported this news in the U.S.


Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.

Kindly donate here to support this inspiring work.

Subscribe to our free email list of underreported news.

newsarticles.media is a PEERS empowerment website

"Dedicated to the greatest good of all who share our beautiful world"