Civil Liberties News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on the erosion of our civil liberties from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
In a case that raises questions about online journalism and privacy rights, the U.S. Department of Justice sent a formal request to an independent news site ordering it to provide details of all reader visits on a certain day. The grand jury subpoena also required the Philadelphia-based Indymedia.us Web site "not to disclose the existence of this request" unless authorized by the Justice Department, a gag order that presents an unusual quandary for any news organization. Kristina Clair, a 34-year old Linux administrator living in Philadelphia who provides free server space for Indymedia.us, said she was shocked to receive the Justice Department's subpoena. The subpoena ... demanded "all IP traffic to and from www.indymedia.us" on June 25, 2008. It instructed Clair to "include IP addresses, times, and any other identifying information," including e-mail addresses, physical addresses, registered accounts, and Indymedia readers' Social Security Numbers, bank account numbers, [and] credit card numbers. Clair [called] the Electronic Frontier Foundation in San Francisco, which represented her at no cost. Making this investigation more mysterious is that Indymedia.us is an aggregation site, meaning articles that appear on it were published somewhere else first, and there's no hint about what sparked the criminal probe. Clair, the system administrator, says that no IP (Internet Protocol) addresses are recorded for Indymedia.us, and non-IP address logs are kept for a few weeks and then discarded. "This is the first time we've seen them try to get the IP address of everyone who visited a particular site," [EFF's Kevin] Bankston said. "That it was a news organization was an additional troubling fact that implicates First Amendment rights."
Note: For many reports from major media sources of growing government threats to civil liberties, click here.
Newly released FBI data offer evidence of the broad scope and complexity of the nation's terrorist watch list, documenting a daily flood of names nominated for inclusion to the controversial list. During a 12-month period ended in March this year, for example, the U.S. intelligence community suggested on a daily basis that 1,600 people qualified for the list because they presented a "reasonable suspicion," according to data provided to the Senate Judiciary Committee by the FBI in September and made public last week. The ever-churning list is said to contain more than 400,000 unique names and over 1 million entries. Nine percent of those on the terrorism list, the FBI said, are also on the government's "no fly" list. Before the attacks of Sept. 11, 2001, the FBI needed initial information that a person or group was engaged in wrongdoing before it could open a preliminary investigation. Under current practice, no such information is needed. The inquiries can be opened by individual agents "proactively," meaning on his or her own or in response to a lead about a threat.
Note: For lots more from major media sources on the growing government threats to civil liberties, click here.
The man who used a digital camera to record the death of Robert Dziekanski at the Vancouver airport says he feels guilty he didn't try to help the Polish immigrant. Dziekanski, 40, died Oct. 14, 2007, following several shocks from a Taser four RCMP officers used to subdue him after he caused a disturbance. The incident might never have received much attention if Paul Pritchard had not decided to grab his digital camera and start recording the actions of the distraught Dziekanski before police arrived. The release of the 10-minute video, which contradicted the police version of the incident, led to widespread public outrage around the world and diplomatic tensions between Canada and Poland. The 10-minute Pritchard video [showed that] four RCMP officers rushed in and confronted Dziekanski, who backed up toward a counter. Dziekanski then faced the officers with what later turned out to be a stapler in one hand. Immediately, there was a loud crack from a Taser, followed by Dziekanski screaming and convulsing as he stumbled and fell to the floor. Another loud crack can be heard, as an officer appears to fire the Taser at Dziekanski again. Then, as the officers kneel on top of Dziekanski and handcuff him, he continues to scream and convulse on the floor. One officer is heard to say, "Hit him again. Hit him again," and there is another loud cracking sound. Evidence at the inquiry revealed the Taser was eventually fired five times at Dziekanski. After he was subdued, the RCMP left him handcuffed on the floor, where he died before medical help arrived.
Note: If these police would be so brutal in front of the public, imagine what they might have done when no one is looking. And note that the complete text of this article reveals that their brutal actions were covered up at high levels in the police department.
Suppose you're returning home from a vacation in Cancun. A customs agent asks you to open your suitcase so he can check its contents. So far, so good. Now, the agent asks you to log on to your laptop so he can read your e-mails and personal files and examine which Web sites you've visited. He makes a copy of your hard drive so the government can comb through its contents. You've done nothing to give the agent any cause for suspicion. That can't be legal - can it? Until recently, it would not have been allowed. Long-standing customs directives prohibited agents from reading travelers' personal documents unless they reasonably suspected them to be merchandise or evidence of illegal activity. Then the Bush administration changed the rules, allowing agents to "review and analyze" the contents of electronic devices, including laptops, cell phones and BlackBerrys "absent individualized suspicion." Agents also could make copies of the devices' contents and share them with other government agencies. In a Senate Judiciary Committee hearing in May, Secretary of Homeland Security Janet Napolitano promised to review the policy. Homeland Security has now released a new policy - and it is the same as the Bush policy in almost every relevant respect. The government may still search electronic devices without reasonable suspicion, retain copies indefinitely to complete its search and share information with other agencies. Both administrations have cited national security to justify suspicionless searches. There's no evidence, however, that a suspicionless search has ever turned up a security threat.
Note: The author of this op-ed, Elizabeth Goitein, is the director of the Liberty and National Security Project at the Brennan Center for Justice at NYU School of Law. For lots more on how politicians use "national security" as a means to protect their own manipulations at the expense of the public good, click here.
U.S. military troops will begin getting required swine flu shots in the next week to 10 days, with active duty forces deploying to war zones and other critical areas going to the front of the vaccine line. Air Force Gen. Gene Renuart also [said] that as many as 400 troops are ready to go to five regional headquarters around the country to assist federal health and emergency management officials. The Pentagon has bought 2.7 million vaccines, and 1.4 million of those will go to active duty military. National Guard troops on active duty are also required to receive the vaccine, as are civilian Defense Department employees who are in critical jobs. "Because I can compel people to get the shots, larger numbers will have the vaccine," said Renuart, commander of U.S. Northern Command. "They will, as a percentage of the population, be vaccinated more rapidly than many of us. So we may see some objective results, good or not, of the vaccinations." Shots will be doled out on a priority basis, with troops preparing to deploy first, followed by other active duty forces, particularly any who might be needed to quickly respond to a hurricane or other emergency. Inoculating the military is a key requirement of the Pentagon's emergency plan, as a way to ensure that troops are available to protect the nation. They also will be on tap to provide help to states if problems come up as the flu season continues.
Note: It is not made clear by this article precisely how military personnel will "assist" civilian authorities handle a mass swine flue vaccination program. The plans to use the military for this purpose are unprecedented and formerly illegal. For lots more from reliable sources on the dangers of vaccines, click here and here.
A Senate bill would offer President Obama emergency control of the Internet and may give him a "kill switch" to shut down online traffic by seizing private networks -- a move cybersecurity experts worry will choke off industry and civil liberties. Details of a revamped version of the Cybersecurity Act of 2009 emerged late Thursday, months after an initial version authored by Sen. Jay Rockefeller, D-W.V., was blasted in Silicon Valley as dangerous government intrusion. "In the original bill they empowered the president to essentially turn off the Internet in the case of a 'cyber-emergency,' which they didn't define," said Larry Clinton, president of the Internet Security Alliance, which represents the telecommunications industry. The new legislation allows the president to "declare a cybersecurity emergency" relating to "non-governmental" computer networks and make a plan to respond to the danger, according to an excerpt published online -- a broad license that rights experts worry would give the president "amorphous powers" over private users. "As soon as you're saying that the federal government is going to be exercising this kind of power over private networks, it's going to be a really big issue," Lee Tien, a senior staff attorney with the Electronic Frontier Foundation.
Note: For revealing reports from major media sources on threats to civil liberties, click here.
Scientists in Israel have demonstrated that it is possible to fabricate DNA evidence, undermining the credibility of what has been considered the gold standard of proof in criminal cases. The scientists fabricated blood and saliva samples containing DNA from a person other than the donor of the blood and saliva. They also showed that if they had access to a DNA profile in a database, they could construct a sample of DNA to match that profile without obtaining any tissue from that person. “You can just engineer a crime scene,” said Dan Frumkin, lead author of the paper, which has been published online by the journal Forensic Science International: Genetics. “Any biology undergraduate could perform this.” Dr. Frumkin is a founder of Nucleix, a company based in Tel Aviv that has developed a test to distinguish real DNA samples from fake ones that it hopes to sell to forensics laboratories. The planting of fabricated DNA evidence at a crime scene is only one implication of the findings. A potential invasion of personal privacy is another. Using some of the same techniques, it may be possible to scavenge anyone’s DNA from a discarded drinking cup or cigarette butt and turn it into a saliva sample that could be submitted to a genetic testing company that measures ancestry or the risk of getting various diseases. Tania Simoncelli, science adviser to the American Civil Liberties Union, said the findings were worrisome. “DNA is a lot easier to plant at a crime scene than fingerprints,” she said. “We’re creating a criminal justice system that is increasingly relying on this technology.”
Note: For lots more on government threats to civil liberties, click here.
While the Bush administration had defended its program of wiretapping without warrants as a vital tool that saved lives, a new government review released Friday said the program’s effectiveness in fighting terrorism was unclear. Most intelligence officials interviewed “had difficulty citing specific instances” when the National Security Agency’s wiretapping program contributed to successes against terrorists, the report said. The program ... played a limited role in the F.B.I.’s overall counterterrorism efforts,” the report concluded. The Central Intelligence Agency and other intelligence branches ... could not link it directly to counterterrorism successes, presumably arrests or thwarted plots. The report also hinted at political pressure in preparing the so-called threat assessments that helped form the legal basis for continuing the classified program, whose disclosure in 2005 provoked fierce debate about its legality. The initial authorization of the wiretapping program came after a senior C.I.A. official took a threat evaluation, prepared by analysts who knew nothing of the program, and inserted a paragraph provided by a senior White House official that spoke of the prospect of future attacks against the United States. These threat assessments, which provided the justification for President George W. Bush’s reauthorization of the wiretapping program every 45 days, became known among intelligence officials as the “scary memos,” the report said. Intelligence analysts involved in the process eventually realized that “if a threat assessment identified a threat against the United States,” the wiretapping and related surveillance programs were “likely to be renewed,” the report added.
Note: For many illuminating reports from reliable sources on the realities behind the "war on terror", click here.
The National Security Agency intercepted private e-mail messages and phone calls of Americans in recent months on a scale that went beyond the broad legal limits established by Congress last year, government officials said in recent interviews. Several intelligence officials, as well as lawyers briefed about the matter, said the N.S.A. had been engaged in “overcollection” of domestic communications of Americans. They described the practice as significant and systemic. The legal and operational problems surrounding the N.S.A.’s surveillance activities have come under scrutiny from the Obama administration, Congressional intelligence committees and a secret national security court. Congressional investigators say they hope to determine if any violations of Americans’ privacy occurred. It is not clear to what extent the agency may have actively listened in on conversations or read e-mail messages of Americans without proper court authority, rather than simply obtained access to them. While the N.S.A.’s operations in recent months have come under examination, new details are also emerging about earlier domestic-surveillance activities, including the agency’s attempt to wiretap a member of Congress, without court approval, on an overseas trip. After a contentious three-year debate that was set off by the disclosure in 2005 of the program of wiretapping without warrants that President George W. Bush approved after the Sept. 11 attacks, Congress gave the N.S.A. broad new authority to collect, without court-approved warrants, vast streams of international phone and e-mail traffic as it passed through American telecommunications gateways.
Note: For further disturbing reports from reliable sources on government efforts to establish total surveillance systems, click here.
Medical personnel were deeply involved in the abusive interrogation of terrorist suspects held overseas by the Central Intelligence Agency, including torture, and their participation was a “gross breach of medical ethics,” a long-secret report by the International Committee of the Red Cross concluded. Based on statements by 14 prisoners who belonged to Al Qaeda and were moved to Guantánamo Bay, Cuba, in late 2006, Red Cross investigators concluded that medical professionals working for the C.I.A. monitored prisoners undergoing waterboarding, apparently to make sure they did not drown. Medical workers were also present when guards confined prisoners in small boxes, shackled their arms to the ceiling, kept them in frigid cells and slammed them repeatedly into walls, the report said. Facilitating such practices, which the Red Cross described as torture, was a violation of medical ethics even if the medical workers’ intentions had been to prevent death or permanent injury, the report said. But it found that the medical professionals’ role was primarily to support the interrogators, not to protect the prisoners, and that the professionals had “condoned and participated in ill treatment.” At times, according to the detainees’ accounts, medical workers “gave instructions to interrogators to continue, to adjust or to stop particular methods.” The Red Cross report was completed in 2007. It was obtained by Mark Danner, a journalist who has written extensively about torture, and posted Monday night with an article by Mr. Danner on the Web site of The New York Review of Books.
Note: Much of content of the Red Cross report was revealed in a March article by Mr. Danner and in a 2008 book, The Dark Side, by Jane Mayer, but the reporting of the Red Cross investigators’ conclusions on medical ethics and other issues are new.
A federal judge ruled on Thursday that some prisoners held by the United States military in Afghanistan have a right to challenge their imprisonment, dealing a blow to government efforts to detain terrorism suspects for extended periods without court oversight. In a 53-page ruling that rejected a claim of unfettered executive power advanced by both the Bush and Obama administrations, United States District Judge John D. Bates said that three detainees at the United States’ Bagram Air Base had the same legal rights that the Supreme Court last year granted to prisoners held at the American naval base in Guantánamo Bay, Cuba. The three detainees — two Yemenis and a Tunisian — say that they were captured outside Afghanistan and taken to Bagram, and that they have been imprisoned for more than six years without trials. Arguing that they were not enemy combatants, the detainees want a civilian judge to review the evidence against them and order their release, under the constitutional right of habeas corpus. The importance of Bagram as a holding site for terrorism suspects captured outside Afghanistan and Iraq has increased under the Obama administration, which prohibited the Central Intelligence Agency from using its secret prisons for long-term detention and ordered the military prison at Guantánamo closed within a year. The administration had sought to preserve Bagram as a haven where it could detain terrorism suspects beyond the reach of American courts, telling Judge Bates in February that it agreed with the Bush administration’s view that courts had no jurisdiction over detainees there.
Note: For key articles from major media sources on threats to civil liberties, click here.
The Obama administration threw open the curtain on years of Bush-era secrets Monday, revealing anti-terror memos that claimed exceptional search-and-seizure powers and divulging that the CIA destroyed nearly 100 videotapes of interrogations and other treatment of terror suspects. The Justice Department released nine legal opinions showing that, following the Sept. 11, 2001, terrorist attacks, the Bush administration determined that certain constitutional rights would not apply during the coming fight. Within two weeks, government lawyers were already discussing ways to wiretap U.S. conversations without warrants. An October 2001 memo by the Justice Department's John Yoo authorized the use of the U.S. military within the United States in combating terrorists. Yoo defined the 9/11 attacks as "war" and therefore concluded the President could employ the military domestically in a "military action" rather than a police action. Under Posse Comitatus Act, the American armed forces are forbidden from operating domestically. A March 2003 memo gave the President broad powers to transfer captured al Qaeda and Taliban prisoners to third countries. It also stipulated that the torture provisions of the Geneva Convention did not apply, because these prisoners were "non state" enemy combatants and therefore not entitled to Geneva protections. The Obama administration also acknowledged in court documents Monday that the CIA destroyed 92 videos involving terror suspects, including interrogations - far more than had been known.
Note: For key reports from major media sources on the hidden realities of the war on terror, click here.
The Maryland State Police surveillance of advocacy groups was far more extensive than previously acknowledged, with records showing that troopers monitored -- and labeled as terrorists -- activists devoted to such wide-ranging causes as promoting human rights and establishing bike lanes. Intelligence officers created a voluminous file on Norfolk-based People for the Ethical Treatment of Animals, calling the group a "security threat" because of concerns that members would disrupt the circus. Angry consumers fighting a 72 percent electricity rate increase in 2006 were targeted. The DC Anti-War Network, which opposes the Iraq war, was designated a white supremacist group, without explanation. One of the possible "crimes" in the file police opened on Amnesty International, a world-renowned human rights group: "civil rights." The [surveillance] ... confirmed the fears of civil liberties groups that have warned about domestic spying since the Sept. 11, 2001, attacks. "No one was thinking this was al-Qaeda," said Stephen H. Sachs, a former U.S. attorney and state attorney general appointed by Gov. Martin O'Malley (D) to review the case. "But 9/11 created an atmosphere where cutting corners was easier." Maryland has not been alone. The FBI and police departments in several cities, including Denver in 2002 and New York before the 2004 Republican National Convention, also responded to [dissent] by spying on activists.
Note: For wide coverage from reliable sources of disturbing threats to civil liberties, click here.
A bipartisan panel of senators has concluded that former defense secretary Donald H. Rumsfeld and other top Bush administration officials bear direct responsibility for the harsh treatment of detainees at Guantanamo Bay, and that their decisions led to more serious abuses in Iraq and elsewhere. In the most comprehensive critique by Congress of the military's interrogation practices, the Senate Armed Services Committee issued a report yesterday that accuses Rumsfeld and his deputies of being the authors and chief promoters of harsh interrogation policies that disgraced the nation and undermined U.S. security. "The abuse of detainees in U.S. custody cannot simply be attributed to the actions of 'a few bad apples' acting on their own," the report states. "The fact is that senior officials in the United States government solicited information on how to use aggressive techniques, redefined the law to create the appearance of their legality, and authorized their use against detainees." Human rights and constitutional law organizations have urged further action, ranging from an independent commission to prosecutions of those involved in authorizing the interrogations. Michael Ratner, president of the Center for Constitutional Rights, which has helped defend detainees at Guantanamo, said the committee report is valuable because "it's official, it's bipartisan. It's open and explicit, going right to Rumsfeld and having Rice involved," Ratner said. "It breaks new ground in saying that the [torture] techniques basically don't work . . . that they're actually designed to elicit false confessions."
Note: To read the full report, click here. For many key reports from major media sources detailing US torture and war crimes in Iraq and Afghanistan, click here.
To friends in the protest movement, Lucy was an eager 20-something who attended their events and sent encouraging e-mails to support their causes. Only one thing seemed strange. "At one demonstration, I remember her showing up with a laptop computer and typing away," said Mike Stark, who helped lead the anti-death-penalty march in Baltimore that day. "We all thought that was odd." Not really. The woman was an undercover Maryland State Police trooper who between 2005 and 2007 infiltrated more than two dozen rallies and meetings of nonviolent groups. Maryland officials now concede that, based on information gathered by "Lucy" and others, state police wrongly listed at least 53 Americans as terrorists in a criminal intelligence database -- and shared some information about them with half a dozen state and federal agencies, including the National Security Agency. Among those labeled as terrorists: two Catholic nuns, a former Democratic congressional candidate, a lifelong pacifist and a registered lobbyist. One suspect's file warned that she was "involved in puppet making and allows anarchists to utilize her property for meetings." "There wasn't a scintilla of illegal activity" going on, said David Rocah, an attorney for the American Civil Liberties Union, which filed a lawsuit and in July obtained the first surveillance files. State police have released other heavily redacted documents. Investigators, the files show, targeted groups that advocated against abortion, global warming, nuclear arms, military recruiting in high schools and biodefense research, among other issues.
Note: For lots more on increasing threats to civil liberties, click here.
Using technology originally developed for mass disasters, Boston disease trackers are embarking on a novel experiment - one of the first in the country - aimed at eventually creating a citywide registry of everyone who has had a flu vaccination. The resulting vaccination map would allow swift intervention in neighborhoods left vulnerable to the fast-moving respiratory illness. The trial starts this afternoon, when several hundred people are expected to queue up for immunizations at the headquarters of the Boston Public Health Commission. Each of them will get a bracelet printed with a unique identifier code. Information about the vaccine's recipients, and the shot, will be entered into handheld devices similar to those used by delivery truck drivers. Infectious disease specialists in Boston and elsewhere predicted that the registry approach could prove even more useful if something more sinister strikes: a bioterrorism attack or the long-feared arrival of a global flu epidemic. In such crises, the registry could be used to track who received a special vaccine or antidote to a deadly germ. "Anything you can do to better pinpoint who's vaccinated and who's not, that's absolutely vital," said Michael Osterholm, director of the Center for Infectious Disease Research & Policy at the University of Minnesota. "I wish more cities were doing this kind of thing." When people arrive for their shots, they will get an ID bracelet with a barcode. Next, basic information - name, age, gender, address - will be entered into the patient tracking database. There will be electronic records, too, of who gave the vaccine and whether it was injected into the right arm or the left, and time-stamped for that day.
Note: For more on the serious risks and dangers posed by vaccines, click here and here.
Baggage searches are SOOOOOO early-21st century. Homeland Security is now testing the next generation of security screening — a body scanner that can read your mind. Most preventive screening looks for explosives or metals that pose a threat. But a new system called MALINTENT turns the old school approach on its head. This Orwellian-sounding machine detects the person — not the device — set to wreak havoc. MALINTENT, the brainchild of the cutting-edge Human Factors division in Homeland Security's directorate for Science and Technology, searches your body for non-verbal cues that predict whether you mean harm to your fellow passengers. It has a series of sensors and imagers that read your body temperature, heart rate and respiration for unconscious [tell-tale signs] invisible to the naked eye. But this is no polygraph test. Subjects do not get hooked up or strapped down for a careful reading; those sensors do all the work without any actual physical contact. It's like an X-ray for bad intentions. When the sensors identify that something is off, they transmit warning data to analysts, who decide whether to flag passengers for further questioning. The next step involves micro-facial scanning, which involves measuring minute muscle movements in the face for clues to mood and intention. Homeland Security has developed a system to recognize, define and measure seven primary emotions and emotional cues that are reflected in contractions of facial muscles. MALINTENT identifies these emotions and relays the information back to a security screener almost in real time.
Note: For many more major-media reports on threats to civil liberties, click here.
In her important new book, The Dark Side: The Inside Story of How the War on Terror Turned Into a War on American Ideals, Jane Mayer of The New Yorker devotes a great deal of space to David Addington, ... the lead architect of the Bush administration’s legal strategy for the so-called war on terror. In the view of Mr. Addington and his acolytes, anything and everything that the president authorized in the fight against terror — regardless of what the Constitution or Congress or the Geneva Conventions might say — was all right. That included torture, rendition, warrantless wiretapping, the suspension of habeas corpus, you name it. Ms. Mayer wrote: "The legal doctrine that Addington espoused — that the president, as commander in chief, had the authority to disregard virtually all previously known legal boundaries — rested on a reading of the Constitution that few legal scholars shared." Ms. Mayer mentioned a study conducted by attorneys and law students at the Seton Hall University Law School. "After reviewing 517 of the Guantánamo detainees’ cases in depth," she said, "they concluded that only 8 percent were alleged to have associated with Al Qaeda. Fifty-five percent were not alleged to have engaged in any hostile act against the United States at all, and the remainder were charged with dubious wrongdoing, including having tried to flee U.S. bombs. The overwhelming majority — all but 5 percent — had been captured by non-U.S. players, many of whom were bounty hunters." The Dark Side is essential reading for those who think they can stand the truth.
Note: For lots more on the realities behind the "war on terror", click here.
Procurement documents released by the U.S. Air Force give a rare glimpse into Pentagon plans for developing an offensive cyber-war capacity that can infiltrate, steal data from and, if necessary, take down enemy information-technology networks. The Broad Area Announcement, posted ... by the Air Force Research Laboratory's Information Directorate, outlines a two-year, $11 million effort to develop capabilities to "access ... any remotely located open or closed computer information systems," lurk on them "completely undetected," "stealthily exfiltrate information" from them and ultimately "be able to affect computer information systems through Deceive, Deny, Disrupt, Degrade, Destroy (D5) effects." "Of interest," the announcement says, "are any and all techniques to enable user and/or root-level access to both fixed [and] mobile computing platforms ... [and] methodologies to enable access to any and all operating systems, patch levels, applications and hardware." The announcement is the latest stage in the Air Force's effort to develop a cyber-war capability and establish itself as the service that delivers U.S. military power in cyberspace. Last year, the Air Force announced it was setting up a Cyberspace Command ... and was developing military doctrine for the prosecution of cyber-war operations. The developments highlight the murky legal territory on which the cyber-wars of the future will be fought. More important, because of the difficulties in identifying attackers and immediately quantifying damage from a cyber-attack, it can be hard to determine when such attacks constitute an act of war as opposed to crime or even vandalism.
The FBI has withdrawn a secret administrative order seeking the name, address and online activity of a patron of the Internet Archive after the San Francisco-based digital library filed suit to block the action. It is one of only three known instances in which the FBI has backed off from such a data demand, known as a "national security letter," or NSL, which is not subject to judicial approval and whose recipient is barred from disclosing the order's existence. NSLs are served on phone companies, Internet service providers and other electronic communications service providers, but because of the gag order provision, the public has little way to know about them. FBI officials now issue about 50,000 such orders a year. The order against the Internet Archive was served Nov. 26, and the nonprofit challenged it based on a provision of the reauthorized USA Patriot Act, which protects libraries from such requests. The privacy advocacy group Electronic Frontier Foundation represented the archive in the suit, which was joined by the American Civil Liberties Union. The archive also alleged that the gag order that accompanied the data demand violated the Constitution. As part of their settlement, the FBI agreed to drop the gag order and the archive agreed to withdraw the complaint. The case was unsealed Monday. Yesterday, redacted versions of key documents were filed, allowing the parties to discuss the case. "We see this as an unqualified success," said Brewster Kahle, the archive's co-founder and digital librarian. "The goal here was to help other recipients of NSLs to understand that you can push back."
Note: The Internet Archive has now posted excellent information on how to deal with cases like this at http://government.zdnet.com/?p=3795. Three cheers for the Internet Archive!
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.