Civil Liberties News StoriesExcerpts of Key Civil Liberties News Stories in Major Media
Below are key excerpts of revealing news articles on the erosion of our civil liberties from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
In dozens of top-secret talks and meetings in the White House, the most senior Bush administration officials discussed and approved specific details of how high-value al Qaeda suspects would be interrogated by the Central Intelligence Agency, sources tell ABC News. The so-called Principals who participated in the meetings also approved the use of "combined" interrogation techniques -- using different techniques during interrogations, instead of using one method at a time -- on [captives] who proved difficult to break, sources said. The high-level discussions about these "enhanced interrogation techniques" were so detailed, these sources said, some of the interrogation sessions were almost choreographed -- down to the number of times CIA agents could use a specific tactic. The advisers were members of the National Security Council's Principals Committee, a select group of senior officials who met frequently to advise President Bush on issues of national security policy. At the time, the Principals Committee included Vice President Cheney, former National Security Advisor Condoleezza Rice, Defense Secretary Donald Rumsfeld and Secretary of State Colin Powell, as well as CIA Director George Tenet and Attorney General John Ashcroft. Rice chaired the meetings, which took place in the White House Situation Room and were typically attended by most of the principals or their deputies. According to multiple sources, it was members of the Principals Committee that not only discussed specific plans and specific interrogation methods, but approved them. The Principals also approved interrogations that combined different methods, pushing the limits of international law and even the Justice Department's own legal approval in the [infamous] 2002 memo.
The Bush administration said yesterday that it plans to start using the nation's most advanced spy technology for domestic purposes soon, rebuffing challenges by House Democrats over the idea's legal authority. Homeland Security Secretary Michael Chertoff said his department will activate his department's new domestic satellite surveillance office in stages, starting as soon as possible. Sophisticated overhead sensor data will be used for law enforcement once privacy and civil rights concerns are resolved, he said. His statements marked a fresh determination to operate the department's new National Applications Office. But Congress delayed launch of the new office last October. Critics cited its potential to expand the role of military assets in domestic law enforcement, to turn new or as-yet-undeveloped technologies against Americans without adequate public debate, and to divert the existing civilian and scientific focus of some satellite work to security uses. Democrats say Chertoff has not spelled out what federal laws govern the NAO, whose funding and size are classified. Congress barred Homeland Security from funding the office until its investigators could review the office's operating procedures and safeguards. The department submitted answers on Thursday, but some lawmakers promptly said the response was inadequate. [Rep. Bennie G. Thompson (D-Miss.), chairman of the House Homeland Security Committee] said, "We still don't know whether the NAO will pass constitutional muster since no legal framework has been provided."
Note: For many more revealing stories on threats to civil liberties, click here.
Bush administration officials from Vice President Dick Cheney on down signed off on using harsh interrogation techniques against [captives] after asking the Justice Department to endorse their legality, The Associated Press has learned. The officials also took care to insulate President Bush from a series of meetings where CIA interrogation methods, including waterboarding, ... were discussed and ultimately approved. A former senior U.S. intelligence official familiar with the meetings ... spoke on condition of anonymity because he was not authorized to publicly discuss the issue. Between 2002 and 2003, the Justice Department issued several memos from its Office of Legal Counsel that justified using the interrogation tactics, including ones that critics call torture. "If you looked at the timing of the meetings and the memos you'd see a correlation," the former intelligence official said. The meetings were held in the White House Situation Room in the years immediately following the Sept. 11 attacks. Attending the sessions were Cheney, then-Bush aides Attorney General John Ashcroft, Secretary of State Colin Powell, CIA Director George Tenet and National Security Advisor Condoleezza Rice. The American Civil Liberties Union called on Congress to investigate. "With each new revelation, it is beginning to look like the torture operation was managed and directed out of the White House," ACLU legislative director Caroline Fredrickson said. "This is what we suspected all along." The former intelligence official described Cheney and the top national security officials as deeply immersed in developing the CIA's interrogation program during months of discussions over which methods should be used and when."
Thirty pages into a memorandum discussing the legal boundaries of military interrogations in 2003, senior Justice Department lawyer John C. Yoo tackled a question not often asked by American policymakers: Could the president, if he desired, have a prisoner's eyes poked out? Or, for that matter, could he have "scalding water, corrosive acid or caustic substance" thrown on a prisoner? How about slitting an ear, nose or lip, or disabling a tongue or limb? What about biting? These assaults are all mentioned in a U.S. law prohibiting maiming, which Yoo parsed as he clarified the legal outer limits of what could be done to terrorism suspects as detained by U.S. authorities. The specific prohibitions, he said, depended on the circumstances or which "body part the statute specifies." But none of that matters in a time of war, Yoo also said, because federal laws prohibiting assault, maiming and other crimes by military interrogators are trumped by the president's ultimate authority as commander in chief. In the sober language of footnotes, case citations and judicial rulings, the memo explores a wide range of unsavory topics, from the use of mind-altering drugs on captives to the legality of forcing prisoners to squat on their toes in a "frog crouch." It repeats an assertion in another controversial Yoo memo that an interrogation tactic cannot be considered torture unless it would result in "death, organ failure or serious impairment of bodily functions." Yoo, who is now a law professor at the University of California at Berkeley, also uses footnotes to effectively dismiss the Fourth and Fifth amendments to the Constitution, arguing that protections against unreasonable search and seizure and guarantees of due process either do not apply or are irrelevant in a time of war. He frequently cites his previous legal opinions to bolster his case.
When the nation's intelligence agencies wanted a computer network to better share information ... they turned to a big name in the technology industry to supply some of the equipment: Google Inc. The Mountain View company sold the agencies servers for searching documents. Many of the contracts are for search appliances - servers for storing and searching internal documents. Agencies can use the devices to create their own mini-Googles on intranets made up entirely of government data. Additionally, Google has had success licensing a souped-up version of its aerial mapping service, Google Earth. Spy agencies are using Google equipment as the backbone of Intellipedia, a network aimed at helping agents share intelligence. [The system] is maintained by the director of national intelligence and is accessible only to the CIA, FBI, National Security Agency and an alphabet soup of other intelligence agencies and offices. Google supplies the computer servers that support the network, as well as the search software that allows users to sift through messages and data. Because of the complexities of doing business with the government, Google uses resellers to process orders on its behalf. Google takes care of the sales, marketing and management of the accounts. Google is one of many technology vendors vying for government contracts. On occasion, Google is the target of conspiracy theories from bloggers who say it is working with spy agencies more closely than simply selling search equipment.
The Justice Department concluded in October 2001 that military operations combating terrorism inside the United States are not limited by Fourth Amendment protections against unreasonable searches and seizures, in one of several secret memos containing new and controversial assertions of presidential power. The memo, sent on Oct. 23, 2001, to the Defense Department and the White House by the Office of Legal Counsel, focused on the rules governing any deployment of U.S. forces inside the country "in the event of further large-scale terrorist activities." Administration officials declined to detail what domestic military operations were being contemplated at the time. The memo has not been formally withdrawn. The Fourth Amendment assertion is one of several far-reaching legal arguments revealed by the disclosure Tuesday of a 2003 Justice Department memo that authorized harsh military interrogations. In its footnotes, asides and central text, that 81-page memo asserted nearly unlimited presidential powers during a time of war. The document disclosed, for example, that the administration's top lawyers had declared that the president has unfettered power to seize oceangoing ships as commander in chief; that Congress has no ability to pass legislation governing the interrogations of enemy combatants; and that federal laws prohibiting assault and other crimes did not apply to military interrogators. One section discussed to what extent the president might be allowed to legally maim a prisoner, such as through the use of a "scalding, corrosive, or caustic substance." A footnote argued that Fifth Amendment guarantees of due-process rights "do not address actions the Executive takes in conducting a military campaign against the Nation's enemies."
Note: For further disturbing reports on threats to civil liberties, click here.
The Justice Department's newly declassified torture memo outlined the broad legal authority its lawyers gave to the Bush White House on matters of torture and presidential authority during times of war. The March 14, 2003 memorandum ... provided legal "guidance" for military interrogations of "alien unlawful combatants," and concluded that the president's authority during wartime took precedence over the individual rights of enemies captured in the field. The memo ... determined that amendments to the U.S. Constitution, which in part protect rights of individuals charged with crimes, do not apply equally to enemy combatants. "The Fifth Amendment due process clause does not apply to the president's conduct of a war," the memo noted. It also asserted, "The detention of enemy combatants can in no sense be deemed 'punishment' for purposes of the Eighth Amendment," which prohibits "cruel and unusual" forms of punishment. The memo was drafted by John Yoo, who was at the time the deputy assistant attorney general for the Justice Department's Office of Legal Counsel. Former aides to John Ashcroft say the then-attorney general privately dubbed Yoo "Dr. Yes" for being so closely aligned with lawyers at the White House. The memo also provided an argument in defense of government interrogators who used harsh tactics in their line of work. The memo also laid out a defense against the authority of the U.N. Convention Against Torture, or CAT. Jack Goldsmith who headed OLC from October 2003 to July 2004, and worked at the Pentagon before coming to the department ... described the problems he had reviewing and standing by Yoo's work. "My first [reaction] was disbelief that programs of this importance could be supported by legal opinions that were this flawed."
Note: For further disturbing reports on threats to civil liberties, click here.
Intelligence centers run by states across the country have access to personal information about millions of Americans, including unlisted cellphone numbers, insurance claims, driver's license photographs and credit reports, according to a document obtained by The Washington Post. One center also has access to top-secret data systems at the CIA, the document shows, though it's not clear what information those systems contain. Dozens of the organizations known as fusion centers were created after the Sept. 11, 2001, terrorist attacks. The centers use law enforcement analysts and sophisticated computer systems to compile, or fuse, disparate tips and clues and pass along the refined information to other agencies. Though officials have publicly discussed the fusion centers' importance to national security, they have generally declined to elaborate on the centers' activities. But a document that lists resources used by the fusion centers shows how a dozen of the organizations in the northeastern United States rely far more on access to commercial and government databases than had previously been disclosed. The list of information resources was part of a survey conducted last year, officials familiar with the effort said. It shows that, like most police agencies, the fusion centers have subscriptions to private information-broker services that keep records about Americans' locations, financial holdings, associates, relatives, firearms licenses and the like. "Fusion centers have grown, really, off the radar screen of public accountability," said Jim Dempsey, vice president for public policy at the Center for Democracy and Technology, a nonpartisan watchdog group in the District. "Congress and the state legislatures need to get a handle over what is going on at all these fusion centers."
Note: For further disturbing reports on threats to privacy, click here.
The military is using the FBI to skirt legal restrictions on domestic surveillance to obtain private records of Americans' Internet service providers, financial institutions and telephone companies, the ACLU said Tuesday. The American Civil Liberties Union based its conclusion on a review of more than 1,000 documents turned over by the Defense Department after it sued the agency last year for documents related to national security letters. The letters are investigative tools used to compel businesses to turn over customer information without a judge's order or grand jury subpoena. ACLU lawyer Melissa Goodman said the documents the civil rights group studied "make us incredibly concerned that the FBI and DoD might be collaborating to evade limits" placed on the Defense Department's use of the letters. Goodman, a staff attorney with the ACLU National Security Project, said the military is allowed to demand financial and credit records in certain instances but does not have the authority to get e-mail and phone records or lists of Web sites that people have visited. That is the kind of information that the FBI can get by using a national security letter, she said. "That's why we're particularly concerned. The DoD may be accessing the kinds of records they are not allowed to get," she said. Goodman also noted that legal limits are placed on the Defense Department "because the military doing domestic investigations tends to make us leery.
Note: For further disturbing reports on threats to civil liberties, click here.
For 30 years, Lew Ellingson loved being a telephone man. His job splicing phone cables was one that he says gave him “a true sense of accomplishment,” first for Northwestern Bell, then US West and finally Qwest Communications International. But by the time Mr. Ellingson retired from Qwest last year at 52, he had grown angry. An insider trading scandal had damaged the company’s reputation, and the life savings of former colleagues had evaporated in the face of Qwest’s stock troubles. “It was a good place,” he said wistfully. “And then something like this happened.” Now, Mr. Ellingson is the public face of a proposed ballot measure in Colorado that seeks to create what supporters hope will be the nation’s toughest corporate fraud law. Buttressed by local advocacy groups and criticized by a Colorado business organization, the measure would make business executives criminally responsible if their companies run afoul of the law. It would also permit any Colorado resident to sue the executives under such circumstances. Proceeds from successful suits would go to the state. If passed by voters in November, the proposal would leave top business officers [with] unprecedented individual accountability, said Mr. Ellingson. “If nothing else, these folks in charge of the corporations and companies will think twice about cutting corners to make themselves look more profitable than they really are,” he said. The plight of Mr. Ellingson’s former employer, Qwest, based in Denver, was a motivation for the proposal. Last April, a jury in Denver convicted Qwest’s former chief executive, Joseph P. Nacchio, of 19 of 42 counts of insider trading. Mr. Nacchio was sentenced to six years in prison and ordered to pay a fine of $19 million and forfeit $52 million in money he earned from stock sales in 2001.
Note: As reported in the Washington Post, Joseph P. Nacchio, the former Qwest CEO, has claimed that he was singled out for prosecution because he refused to cooperate with the National Security Agency's electronic surveillance of American citizens, which began before 9/11.
When Congress passed the Patriot Act in the aftermath of the 9/11 attacks, law-enforcement agencies hailed it as a powerful tool to help track down the confederates of Osama bin Laden. No one expected it would end up helping to snag the likes of Eliot Spitzer. In the fine print were provisions that gave the Treasury Department authority to demand more information from banks about their customers' financial transactions. But Treasury went further. It issued stringent new regulations that required banks themselves to look for unusual transactions (such as odd patterns of cash withdrawals or wire transfers) and submit SARs—Suspicious Activity Reports—to the government. Facing potentially stiff penalties if they didn't comply, banks and other financial institutions installed sophisticated software to detect anomalies among millions of daily transactions. They began ranking the risk levels of their customers ... based on complex formulas that included ... whether an account holder was a "politically exposed person" [PEP]. At first focused on potentially crooked foreign officials, the PEP lists expanded to include many U.S. politicians and public officials who were conceivably vulnerable to corruption. Federal prosecutors around the country routinely scour the SARs for potential leads. One of those leads led to Spitzer. Last summer New York's North Fork Bank, where Spitzer had an account, filed a SAR about unusual money transfers he had made. The governor called attention to himself by asking the bank to transfer money in someone else's name. The SAR was not itself evidence that Spitzer had committed a crime. But it made the Feds curious enough to follow the money.
Note: This story provides useful information about how the PATRIOT Act has been applied since its passage. The reasons for the investigation of Eliot Spitzer, leading to his resignation, may not have been so simple, however, given his many powerful enemies in government and on Wall Street.
The sad saga of [Eliot] Spitzer should concern every American. The web of snooping in which federal investigators and regulators are now able to ensnare any person who engages in any form of financial transaction has become so complex and pervasive that almost no person anywhere in the world can escape its clutches. The seeds of this modern-day Orwellian financial web were sown in the late 1960s and early 1970s when such expansive federal laws as the Bank Secrecy Act were enacted. Designed as tools to ferret out organized crime figures, major drug traffickers and international money launderers, this family of far-reaching regulatory-cum-criminal laws initially was used largely as intended. Many of the “Suspicious Activity Reports” (or SARs) required by the Bank Secrecy Act of 1970, for example, were largely ignored by investigators and prosecutors, who viewed them as burdensome and difficult to catalog and utilize. Two events have conspired to change all that. First, the advent of digital technology has elevated dramatically the ability of the government to gather, analyze, manipulate, retrieve and disseminate the SAR data. The second factor ... was, of course, the events of 9/11 and the ensuing USA Patriot Act. These two things institutionalized fear as the driving force in virtually all federal policies, including those relating to financial reporting. [A section of] the Patriot Act — has been interpreted by banking examiners to require banks to profile their customers and the full range of their transactions, regardless of amount. These “know your customer” regulations are among the most insidious of this entire class of invasive federal laws and regulations.
Note: This informative article is by former US Congressman Bob Barr, who has become a crusader against the excesses of the PATRIOT Act.
A sheaf of documents that a federal court forced the Treasury Department to release indicate there have been repeated complaints from American consumers who have been falsely linked to terrorism or drug trafficking during routine credit checks, the organization that sought the documents in a lawsuit said Tuesday. The more than 100 pages of documents released Monday to the organization, the Lawyers’ Committee for Civil Rights in San Francisco, include a variety of complaints about the list maintained by the Office of Foreign Asset Control in the Treasury Department, said Philip Hwang, a lawyer for the group. The released documents include e-mail messages and letters from consumers who have been denied cars or home loans or faced difficulties with other financial transactions because their names allegedly appear on the list. Financial institutions are supposed to check clients’ names against the list, which is known officially as the Specially Designated Nationals List. A Federal District Court judge in San Francisco last month ordered the Treasury Department to release all the complaints after a Freedom of Information Act request, Mr. Hwang said. He said his organization believed that what they received was only a small fraction of the complaints filed. Among other indications, he said, was that Henry Paulson Jr., the Treasury secretary, said in Congressional testimony last year that his department fielded up to 90,000 telephone complaints about the list over one year. Mr. Hwang said most consumers discovered the problem only when they asked for a credit report and were shocked to find a notation on it associating them with terrorists or drug traffickers.
Note: For many disturbing reports of increasing threats to civil liberties, click here.
Almost 32 years to the day after President Ford created an independent Intelligence Oversight Board made up of private citizens with top-level clearances to ferret out illegal spying activities, President Bush issued an executive order that stripped the board of much of its authority. The White House did not say why it was necessary to change the rules governing the board when it issued Bush's order [on February 29]. But critics say Bush's order is consistent with a pattern of steps by the administration that have systematically scaled back Watergate-era intelligence reforms. "It's quite clear that the Bush administration officials who were around in the 1970s are settling old scores now," said Tim Sparapani, senior legislative counsel to the American Civil Liberties Union. "Here they are even preventing oversight within the executive branch. They have closed the books on the post-Watergate era." Ford created the board following a 1975-76 investigation by Congress into domestic spying, assassination operations, and other abuses by intelligence agencies. The probe prompted fierce battles between Congress and the Ford administration, whose top officials included Dick Cheney, Donald Rumsfeld, and the current president's father, George H. W. Bush. Some analysts said the order is just the latest example of actions the administration has taken since the 2001 terrorist attacks that have scaled back intelligence reforms enacted in the 1970s. Frederick A. O. Schwarz Jr., the former chief counsel to the Senate committee that undertook the 1975-76 investigation into intelligence abuses, said "It's profoundly disappointing if you understand American history, and it's profoundly harmful to the United States."
Note: For many key articles on government secrecy, click here.
Despite ordering improvements more than two years ago, President Bush has barely made a dent in the huge backlog of unanswered requests under the Freedom of Information Act. At the same time, an audit by the National Security Archive found that Bush has provided citizens someone to talk to about how long it is going to take to get the government records they want or to be turned down. The archive, a private research group at The George Washington University, released its seventh audit ... of the 1967 law that gives people the power to request information from federal government files. The audit of 90 government agencies found mixed results from Bush's executive order on Dec. 14, 2005, to agencies to clear the backlog and be more responsive to requesters. "Behind its ambitious facade, the order lacked both carrot and stick," the audit said, because it provided no additional money to do the job and no way to force agencies to set substantial goals or step up their efforts if they fell short. "Many of the same old scofflaw agencies are still shirking their responsibilities to the public," said Tom Blanton, director of the archive, whose FOIA audits are funded by the John S. and James L. Knight Foundation. The archive found that unanswered requests government-wide dropped just over 2 percent, from 217,000 to 212,000, from the end of 2005 to the end of 2007. Of those agencies with backlogs, 31 percent even saw pending requests rise during the two years, including some agencies that significantly reduced very old unanswered requests but saw gains wiped out by a surge of new requests. The audit particularly criticized the Treasury Department for trying to "wait out the requester."
Note: For many key articles on government secrecy, click here.
The FBI has increasingly used administrative orders to obtain the personal records of U.S. citizens rather than foreigners implicated in terrorism or counterintelligence investigations, and at least once it relied on such orders to obtain records that a special intelligence-gathering court had deemed protected by the First Amendment, according to two government audits released yesterday. The episode was outlined in a Justice Department report that concluded the FBI had abused its intelligence-gathering privileges by issuing inadequately documented "national security letters" from 2003 to 2006. The report makes it clear that the abuses persisted in 2006 and disclosed that 60 percent of the nearly 50,000 security letters issued that year by the FBI targeted Americans. Because U.S. citizens enjoy constitutional protections against unreasonable searches and seizures, judicial warrants are ordinarily required for government surveillance. But national security letters are approved only by FBI officials and are not subject to judicial approval; they routinely demand certain types of personal data, such as telephone, e-mail and financial records, while barring the recipient from disclosing that the information was requested or supplied. "The fact that these are being used against U.S. citizens, and being used so aggressively, should call into question the claim that these powers are about terrorists and not just about collecting information on all kinds of people," said Jameel Jaffer, national security director at the American Civil Liberties Union. "They're basically using national security letters to evade legal requirements that would be enforced if there were judicial oversight."
Note: For many key reports from major media sources on increasing threats to civil liberties, click here.
A California appeals court ruling clamping down on homeschooling by parents without teaching credentials sent shock waves across the state this week, leaving an estimated 166,000 children as possible truants and their parents at risk of prosecution. The homeschooling movement never saw the case coming. "At first, there was a sense of, 'No way,' " said homeschool parent Loren Mavromati, a resident of Redondo Beach (Los Angeles County) who is active with a homeschool association. "Then there was a little bit of fear. I think it has moved now into indignation." The ruling arose from a child welfare dispute between the Los Angeles County Department of Children and Family Services and Philip and Mary Long of Lynwood, who have been homeschooling their eight children. Mary Long is their teacher, but holds no teaching credential. The parents said they also enrolled their children in Sunland Christian School, a private religious academy in Sylmar (Los Angeles County), which considers the Long children part of its independent study program and visits the home about four times a year. The Second District Court of Appeal ruled that California law requires parents to send their children to full-time public or private schools or have them taught by credentialed tutors at home. "California courts have held that ... parents do not have a constitutional right to homeschool their children," Justice H. Walter Croskey said in the 3-0 ruling issued on Feb. 28. "A primary purpose of the educational system is to train school children in good citizenship, patriotism and loyalty to the state and the nation," the judge wrote, quoting from a 1961 case on a similar issue.
Note: To support the ability of parents to teach their children at home and sign a petition with already over 100,000 signatories, click here.
Several thousand law enforcement agencies are creating the foundation of a domestic intelligence system through computer networks that analyze vast amounts of police information. As federal authorities struggled to meet information-sharing mandates after the Sept. 11, 2001 terrorist attacks, police agencies from Alaska and California to the Washington region poured millions of ... records into shared digital repositories called data warehouses, giving investigators and analysts new power to discern links among people, patterns of behavior and other hidden clues. Those network efforts will begin expanding further this month, as some local and state agencies connect to a fledgling Justice Department system called the National Data Exchange, or N-DEx. The expanding police systems illustrate the prominent roles that private companies play in homeland security and counterterrorism efforts. They also underscore how the use of new data -- and data surveillance -- is evolving faster than the public's understanding or the laws intended to check government power and protect civil liberties. Three decades ago, Congress imposed limits on domestic intelligence activity after revelations that the FBI, Army, local police and others had misused their authority for years to build troves of personal dossiers and monitor political activists and other law-abiding Americans. Since those reforms, police and federal authorities have observed a wall between law enforcement information-gathering, relating to crimes and prosecutions, and more open-ended intelligence that relates to national security and [politics]. That wall is fast eroding following the passage of laws expanding surveillance authorities, the push for information-sharing networks, and the expectation that local and state police will play larger roles.
Note: For many revealing reports from reliable sources of serious threats to civil liberties, click here.
More than 1 percent of adult Americans are in jail or prison, an all-time high that is costing state governments nearly $50 billion a year, in addition to more than $5 billion spent by the federal government, according to a report released Thursday. With more than 2.3 million people behind bars at the start of 2008, the United States leads the world in both the number and the percentage of residents it incarcerates, leaving even far more populous China a distant second, noted the report by the nonpartisan Pew Center on the States. The ballooning prison population is largely the result of tougher state and federal sentencing laws enacted since the mid-1980s. Minorities have been hit particularly hard: One in 9 black men age 20 to 34 is behind bars. For black women age 35 to 39, the figure is 1 in 100, compared with 1 in 355 white women in the same age group. When it comes to preventing repeat offenses by nonviolent criminals - who make up about half of the incarcerated population - alternative punishments such as community supervision and mandatory drug counseling that are far less expensive may prove just as or more effective than jail time. About 91 percent of incarcerated adults are under state or local jurisdiction, and the report documents the trade-offs state governments have faced as they have devoted ever larger shares of their budgets to house them. For instance, over the past two decades, state spending on corrections (adjusted for inflation) increased by 127 percent, while spending on higher education rose by 21 percent.
The Army has shut down public access to the largest online collection of its doctrinal publications, a move criticized by open-government advocates as unnecessary secrecy by a runaway bureaucracy. Army officials moved the Reimer Digital Library behind a password-protected firewall on Feb. 6, restricting access to an electronic trove that is popular with researchers for its wealth of field and technical manuals and documents on military operations, education, training and technology. All are unclassified, and most already are approved for public release. "Almost everything connected to the Army is reflected in some way in the Reimer collection," said Steven Aftergood, director of the Project on Government Secrecy at the nonprofit Federation of American Scientists. "It provides the public with an unparalleled window into Army policy. It provides unclassified resources on military planning and doctrine." Aftergood ... said the collection offers specialized military manuscripts that do not appear on the shelves of local libraries. These include documents on the Army's use of unmanned aircraft [and] tactics and techniques for the use of nonlethal weapons. "All of this stuff had been specifically approved for public release," Aftergood said. "I think it's a case of bureaucracy run amok. And it's a familiar impulse to secrecy that needs to be challenged at every turn." In 2006, the National Archives acknowledged that the CIA and other agencies had withdrawn thousands of records from the public shelves ... and inappropriately reclassified many of them. Early in 2002, then-Attorney General John D. Ashcroft issued a memo urging federal agencies to use whatever legal means necessary to reject Freedom of Information Act requests for public documents.
Note: For reliable reports on escalating government secrecy from reliable, verifiable sources, click here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.