Government Corruption Media ArticlesExcerpts of Key Government Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on government corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
A Texas-based encrypted email service recently revealed to be used by Edward Snowden - Lavabit - announced yesterday it was shutting itself down in order to avoid complying with what it perceives as unjust secret US court orders to provide government access to its users' content. "After significant soul searching, I have decided to suspend operations," the company's founder, Ladar Levinson, wrote in a statement to users posted on the front page of its website. He said the US directive forced on his company "a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit." He chose the latter. CNET's Declan McCullagh ... speculates that Lavabit was served "with [a] federal court order to intercept users' passwords" to allow ongoing monitoring of emails; specifically: "the order can also be to install FedGov-created malware." After challenging the order in district court and losing - all in a secret court proceeding, naturally - Lavabit shut itself down to avoid compliance while it appeals to the Fourth Circuit. What is particularly creepy about the Lavabit self-shutdown is that the company is gagged by law even from discussing the legal challenges it has mounted and the court proceeding it has engaged. In other words, the American owner of the company believes his Constitutional rights and those of his customers are being violated by the US Government, but he is not allowed to talk about it. Lavabit has been told that they would face serious criminal sanctions if they publicly discuss what is being done to their company.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Despite his age, 63-year-old Kazuo Niitsuma believes there are many more years of fishing ahead of him. The sea is in his family's blood, he says. His octogenarian father began working on boats when he was 12, and only retired three years ago. But ... Niitsuma knows he may never again get the chance to board his boat and head out into the Pacific in search of sole, whitebait, flounder and greenling. The greatest threat to Niitsuma's livelihood, and that of other fishermen in Hisanohama ... lies just up the coast at the Fukushima Daiichi nuclear power plant. The environment ministry recently announcement that 300 tonnes of contaminated groundwater from Fukushima Daiichi is still seeping over or around barriers into the Pacific every day, more than two years after it was struck by a tsunami in March 2011. Government officials said they suspected the leaks had started soon after the accident. The admission by the ministry, confirmed by Tokyo Electric Power (Tepco), which runs the plant, is likely to keep Hisanohama's 40 fishing boats in port for the foreseeable future. Tepco's failure to handle the contaminated water – and accusations that it tried to cover up the leaks – is a serious setback to attempts to clean up Fukushima Daiichi, 18 months after the government declared it had reached a "safe" state known as cold shutdown. "I haven't been able to fish since the tsunami," Niitsuma said. "People want to be reassured that they are buying fish that is safe to eat, and we can't give them that guarantee at the moment."
Note: Declaring the situation an "emergency", the Japanese government has stepped in to take over control of the response from Tepco. For more on this, click here. For a National Geographic article on what you need to know about the radioactive contamination of the Pacific Ocean by the Fukushima disaster, click here. It reports that scientists have estimated that contaminated seawater could reach the West Coast of the United States in five years or less. For more on the environmental devastation of nuclear power, see the deeply revealing reports from reliable major media sources available here.
Tons of contaminated groundwater from the stricken Fukushima nuclear plant have overwhelmed an underground barrier and are emptying daily into the Pacific, creating what a top regulator has called a crisis. The water contains strontium and cesium, as well as tritium. The plant was already struggling to store hundreds of thousands of tons of contaminated water that flowed through the buildings housing three reactors where [three] meltdowns occurred in 2011. But the contamination in this new groundwater problem is from different sources, Tepco said. The company has admitted that it failed to respond quickly enough to the latest groundwater contamination, saying it was preoccupied with more pressing issues like cooling the damaged reactors. “Tepco appears overwhelmed in dealing with what is a very serious problem,” said Akio Yamamoto, a professor of nuclear engineering at Nagoya University, who serves as outside expert for the Nuclear Regulation Authority, Japan’s nuclear watchdog. Critics contend that the plant has emitted far more radioactive materials than it is saying, based in part on levels of contaminants discovered in the harbor, which are well above safe levels in some places. The contamination appears to be spreading, with tests last month by Tepco showing high levels of tritium and other radioactive elements like strontium starting at other locations near the two other crippled reactors.
Note: Declaring the situation an "emergency", the Japanese government has stepped in to take over control of the response from Tepco. For more on this, click here. For a National Geographic article on what you need to know about the radioactive contamination of the Pacific Ocean by the Fukushima disaster, click here. It reports that scientists have estimated that contaminated seawater could reach the West Coast of the United States in five years or less. For more on the environmental devastation of nuclear power, see the deeply revealing reports from reliable major media sources available here.
In ... the Journal of Law, Medicine and Ethics (JLME), Donald W. Light of the School of Public Health, University of Medicine & Dentistry of NJ, wrote an article entitled “Risky Drugs: Why The FDA Cannot Be Trusted”. The bulk of his essay focuses not on his views about pharma’s competence but rather on his issues with the FDA. While I found a number of his comments troubling, the following stood out. “The ... article in JLME also presents systematic, quantitative evidence that since the industry started making large contributions to the FDA for reviewing its drugs, as it makes large contributions to Congressmen ... drugs approved are significantly more likely to cause serious harm, hospitalizations, and deaths.” This is a pretty damning comment. Basically, Light is saying that pharma paid congressmen to sponsor legislation that results in the FDA being beholden to pharma for funding for its work. Implicit in this is that, as a result of these large “contributions”, the grateful FDA is rapidly approving medicines that are harmful.
Note: For more along these lines, see concise summaries of deeply revealing news articles about big pharma profiteers and government corruption.
There are many horrors that Elizabeth Reed recalls from her time at London’s Royal Waterloo Hospital. ‘It was like being buried alive,’ she says. ‘I was lying there in the dark, hour after hour, and couldn’t move. I wasn’t aware of my body, just my head in this darkness. You could hear people moving around and other people breathing and moaning.’ While Elizabeth is one of only a handful of women prepared to speak out, her story is not unique. Up to 500 women, suffering from conditions such as postnatal depression and anorexia, passed through the Royal Waterloo’s infamous Ward 5 before it shut 40 years ago. Heavily drugged and subjected to horrendous levels of electro-convulsive therapy (ECT) and even lobotomies, the unluckiest were taken to the 'Narcosis Room', where they were put to sleep for weeks at a time. Almost all teenage girls and women in their early 20s, they were treated as little more than guinea pigs by controversial psychiatrist William Sargant as he conducted a bizarre experiment to ‘repattern’ their brains and cure them of depression. Sargant, a founding member of St Thomas’s department of psychological medicine, who advocated the use of drugs to treat mental illness, operated his ‘sleep room’ for ten years until 1973. Four patients are known to have died there and yet no one stepped in to stop him. A Cambridge medical graduate, obsessed with making a name for himself, he used high doses of tranquillisers and administered ECT up to twice a week on Ward 5 and every other day in the Narcosis Room. At the heart of his treatment was his belief that the brain could be ‘repatterned’ to erase bad memories.
Note: We don't usually use the Daily Mail as a reliable source, but as this article is so important and no other major media is reporting it, we decided to include it here. For more on mind-control experimentation on unwitting men, women and children, see the deeply revealing reports from reliable major media sources available here. To learn more about the secret mind control programs of which this was a part, click here.
A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin—not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence—information that could reveal entrapment, mistakes or biased witnesses. "I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers. "It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The FBI gave its informants permission to break the law at least 5,658 times in a single year, according to newly disclosed documents that show just how often the nation's top law enforcement agency enlists criminals to help it battle crime. The U.S. Justice Department ordered the FBI to begin tracking crimes by its informants more than a decade ago, after the agency admitted that its agents had allowed Boston mobster James "Whitey" Bulger to operate a brutal crime ring in exchange for information about the Mafia. The FBI submits that tally to top Justice Department officials each year, but has never before made it public. Agents authorized 15 crimes a day, on average, including everything from buying and selling illegal drugs to bribing government officials and plotting robberies. FBI officials have said in the past that permitting their informants — who are often criminals themselves — to break the law is an indispensable, if sometimes distasteful, part of investigating criminal organizations. USA TODAY obtained a copy of the FBI's 2011 report under the Freedom of Information Act. The report does not spell out what types of crimes its agents authorized, or how serious they were. It also did not include any information about crimes the bureau's sources were known to have committed without the government's permission. Crimes authorized by the FBI almost certainly make up a tiny fraction of the total number of offenses committed by informants for local, state and federal agencies each year.
Note: As reported in this USA Today article, the DEA and ATF don't even track crimes committed by their informants. For more on the realities of intelligence agency activities, see the deeply revealing reports from reliable major media sources available here.
The CIA has been subjecting operatives to monthly polygraph tests in an attempt to suppress details of a reported US arms smuggling operation in Benghazi that was ongoing when its ambassador was killed by a mob in the city last year, according to reports. Up to 35 CIA operatives were working in the city during the attack last September on the US consulate that resulted in the death of Ambassador Chris Stevens and three other Americans, according to CNN. The television network said that a CIA team was working in an annex near the consulate on a project to supply missiles from Libyan armouries to Syrian rebels. Sources said that more Americans were hurt in the assault ... than had been previously reported. CIA chiefs were actively working to ensure the real nature of its operations in the city did not get out. So only the losses suffered by the State Department in the city had been reported to Congress. Frank Wolf, a US congressman who represents the district that contains CIA headquarters in Langley, Virginia, is one of 150 members of Congress for a new investigation into the failures in Benghazi. "I think it is a form of a cover-up, and I think it's an attempt to push it under the rug," he said. "We should have the people who were on the scene come in, testify under oath, do it publicly, and lay it out. And there really isn't any national security issue involved with regards to that."
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
GCHQ has received at least Ł100 million from the US to help fund intelligence gathering, raising questions over American influence on the British agencies. The money was paid across a range of projects over three years and resulted in GCHQ spying on behalf of America, according to leaked documents. It also emerged that the intelligence agency wants the ability to “exploit any phone, anywhere, any time” and that some staff have raised concerns over the “morality and ethics” of their operational work. The payments from the US National Security Agency (NSA) are detailed in GCHQ’s annual “investment portfolios”, leaked by Mr Snowden to The Guardian. The NSA paid GCHQ Ł22.9 million in 2009, Ł39.9 million in 2010 and Ł34.7 million in 2011/12. The 2010 funding included ... Ł17.2 million for the agency’s “Mastering the Internet” project, which gathers “raw” information from the web to be analysed. In return, GCHQ has to have the American view in mind when prioritising work, the papers claim. One strategy briefing disclosed the pressure on GCHQ to meet NSA demands, saying: “GCHQ must pull its weight and be seen to pull its weight.” In another document, from 2010, GCHQ apparently acknowledged that the US had “raised a number of issues with regards to meeting NSA’s minimum expectations”.
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
The tale of how the Obama economic team was recruited en masse from Robert Rubin acolytes who either facilitated Wall Street’s pre-crash recklessness while in the Clinton administration or cashed in on it later (or, like Rubin, did both) never loses its power to shock. Michael Froman, Rubin’s chief of staff as Clinton Treasury secretary, not only served as the Obama transition team’s personnel director but moonlighted as a Citigroup managing director while doing so. “Obama essentially entrusted the repairing of the china shop to the bulls who’d helped ransack it,” [Jeff] Connaughton writes [in The Payoff: Why Wall Street Always Wins]. [In This Town Mark] Leibovich updates the story of the tacky prehistory of the Obama White House with its aftermath—the steady parade of Obama alumni who traded change we can believe in for cash on the barrelhead as soon as they left public service. The starry list includes, among many others, Peter Orszag (director of the White House’s Office of Management and Budget, now at Citi), Jake Siewert (the Treasury Department counselor turned chief flack for Goldman Sachs), and David Plouffe (the campaign manager and senior presidential adviser who did consulting for Boeing and General Electric). “When I am president,” Obama had said in 2008, “I will start by closing the revolving door in the White House that’s allowed people to use their administration job as a stepping-stone to further their lobbying careers.” Puzzling over how so many colleagues have strayed from this credo, the former press secretary Robert Gibbs has theorized that either “somehow we have all changed” or, alternatively, “maybe Washington changed us.”
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". Training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata. Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity. XKeyscore provides the technological capability [to target] US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Computers and networks inherently produce data, and our constant interactions with them allow corporations to collect an enormous amount of intensely personal data about us as we go about our daily lives. Sometimes we produce this data inadvertently simply by using our phones, credit cards, computers and other devices. Sometimes we give corporations this data directly on Google, Facebook, [or] Apple’s iCloud ... in exchange for whatever free or cheap service we receive from the Internet in return. The NSA is also in the business of spying on everyone, and it has realized it’s far easier to collect all the data from these corporations rather than from us directly. The result is a corporate-government surveillance partnership, one that allows both the government and corporations to get away with things they couldn’t otherwise. There are two types of laws in the U.S., each designed to constrain a different type of power: constitutional law, which places limitations on government, and regulatory law, which constrains corporations. Historically, these two areas have largely remained separate, but today each group has learned how to use the other’s laws to bypass their own restrictions. The government uses corporations to get around its limits, and corporations use the government to get around their limits. This partnership manifests itself in various ways. The government uses corporations to circumvent its prohibitions against eavesdropping domestically on its citizens. Corporations rely on the government to ensure that they have unfettered use of the data they collect.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
In May this year, a huge company listed on the London Stock Exchange found itself in the midst of controversy about a prison it runs for the government – Thameside, a newly built jail ... in south-east London. Two months later, the same company was the subject of a high- profile report published by the House Of Commons. Again, the verdict was damning: data had been falsified, national standards had not been met, there was a culture of "lying and cheating", and the service offered to the public was simply "not good enough". Three weeks ago, there came grimmer news. The company ... was one of two contractors that had somehow overcharged the government for its services, possibly by as much as Ł50m; The firm that links these three stories together is Serco. Its range of activities, here and abroad, is truly mind-boggling. As a private firm it's not open to Freedom of Information requests, so looking into the details of what it does is fraught with difficulty. But the basic facts are plain enough. As well as five British prisons and the tags attached to over 8,000 English and Welsh offenders, Serco sees to two immigration removal centres. You'll also see its logo on the Docklands Light Railway and Woolwich ferry. But even this is only a fraction of the story. Serco is responsible for air traffic control in the United Arab Emirates, parking-meter services in Chicago, driving tests in Ontario, and an immigration detention centre on Christmas Island.
Note: Serco is possibly the largest company you've never heard of. Did you know that the Obama administration awarded Serco a $1.25 billion contract to help implement online health insurance exchanges under Obamacare, as reported in this Reuters article? Watch this video to see just how powerful and pervasive they are.
Glenn Greenwald – the reporter who broke the story about the National Security Agency’s surveillance programs – claimed that those NSA programs allowed even low-level analysts to search the private emails and phone calls of Americans. “The NSA has trillions of telephone calls and emails in their databases that they’ve collected over the last several years,” Greenwald told ABC News’ George Stephanopoulos. “All an analyst has to do is enter an email address or an IP address, and [the program] searches that database and lets them listen to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you’ve entered.” Greenwald explained that ... these programs still allow analysts to search through data with little court approval or supervision. Greenwald said "these systems allow analysts to listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents. And it’s all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst,” he added. Greenwald said the existence of these analyst search programs are in line with the claims of Edward Snowden, who first leaked details of the NSA’s surveillance programs last month. “It’s an incredibly powerful and invasive tool, exactly of the type that Mr. Snowden described,” Greenwald said. “NSA officials are going to be testifying before the Senate on Wednesday, and I defy them to deny that these programs work exactly as I just said,” Greenwald said.
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
A former CIA officer has broken the U.S. silence around the 2003 abduction of a radical Islamist cleric in Italy, charging that the agency inflated the threat the preacher posed and that the United States then allowed Italy to prosecute her and other Americans to shield President George W. Bush and other U.S. officials from responsibility for approving the operation. Confirming for the first time that she worked undercover for the CIA in Milan when the operation took place, Sabrina De Sousa provided new details about the “extraordinary rendition” that led to the only criminal prosecution stemming from the secret Bush administration rendition and detention program launched after the Sept. 11, 2001, attacks. The cleric, Osama Mustapha Hassan Nasr, was snatched from a Milan street by a team of CIA operatives and flown to Egypt, where he was held for the better part of four years without charges and allegedly tortured. An Egyptian court in 2007 ruled that his imprisonment was “unfounded” and ordered him released. Among the allegations made by De Sousa in a series of interviews with McClatchy: – The former CIA station chief in Rome, Jeffrey Castelli, whom she called the mastermind of the operation, exaggerated Nasr's terrorist threat to win approval for the rendition and misled his superiors [to believe] that Italian military intelligence had agreed to the operation. – Senior CIA officials, including then-CIA Director George Tenet, approved the operation even though Nasr wasn’t wanted in Egypt and wasn’t on the U.S. list of top al Qaida terrorists. – Condoleezza Rice, then the White House national security adviser, ... agreed to it and recommended that Bush approve the abduction.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
As the 50th anniversary of the 1963 March on Washington approaches ... where Martin Luther King Jr gave his famous "I have a dream" speech, it is important to recall the extent to which King was targeted by the government. The FBI operation against King is one of the most shameful episodes in the long history of our government's persecution of dissenters. In a heavily redacted, classified FBI memo dated 4 January 1956 – just a little more than a month after Rosa Parks was arrested for refusing to give up her seat on a bus to a white passenger – stated that an agent "had been assigned ... to find out all he could about Reverend Martin L King, colored minister in Montgomery and leader in the bus boycott … to uncover all the derogatory information he could about King." [FBI] director, J Edgar Hoover ... was deploying the vast resources he controlled against any and all perceived critics of the United States. The far-reaching clandestine surveillance, infiltration and disruption operation Hoover ran was dubbed "COINTELPRO", for counterintelligence program. The FBI's COINTELPRO activities ... were thoroughly investigated in 1975 by the Church Committee, [which] reported that the FBI "conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of first amendment rights of speech and association." Among COINTELPRO's perverse activities was an FBI effort to threaten Martin Luther King Jr with exposure of an alleged extramarital affair, including the suggestion, made by the FBI to King, that he avoid embarrassment by killing himself. Deeply concerned about the crackdown on dissent happening under Obama, scholar Cornel West ... wondered if [King] "would not be invited to the very march in his name."
Note: This article fails to mention a key fact. At a 1999 court trial held in Memphis, the family of Rev. King accused elements of the U.S. government of complicity in King's death. After one month of hearings from 70 witnesses, a jury composed of six white and six black jurors took only one hour to find the U.S. government, the state of Tennessee, the city of Memphis, the Memphis police, and several individuals guilty of murdering King. Yet the mainstream media completely boycotted this trial. Thankfully, CBC (Canada's PBS) gave it some coverage. To see a six-minute CBC clip of this highly revealing trial, click here.
When it comes to foreign policy, war, assassinations, drones, surveillance, secrecy, and civil liberties, President Obama's most stalwart, enthusiastic defenders are often found among the most radical precincts of the Republican Party. The extraordinary events that took place in the House of Representatives [on July 24] are perhaps the most vivid illustration yet of this dynamic. The House voted on an amendment sponsored by Justin Amash, the young Michigan lawyer elected in 2010 as a Tea Party candidate, and co-sponsored by John Conyers, the 24-term senior Democrat on the House Judiciary Committee. The amendment was simple. It would de-fund one single NSA program: the agency's bulk collection of the telephone records of all Americans. The amendment yesterday was defeated. A majority of House Democrats supported the Amash/Conyers amendment, while a majority of Republicans voted against it. As the New York Times put it in its account of yesterday's vote: "Conservative Republicans leery of what they see as Obama administration abuses of power teamed up with liberal Democrats long opposed to intrusive intelligence programs. The Obama administration made common cause with the House Republican leadership to try to block it." The fate of the amendment was sealed when the Obama White House ... announced its vehement opposition to it, and then sent NSA officials to the House to scare members that barring the NSA from collecting all phone records of all Americans would "Help The Terrorists."
Note: For more on government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
Sharp disagreement over the future of the Guantanamo Bay detention camp dominated the first Senate hearing on the issue in four years. The meeting [on July 24] of a Senate Judiciary Committee subcommittee, held in the wake of a high-profile hunger strike by inmates ... made clear that deep partisan divisions remain over whether keeping the prison open is a threat to national security or a necessity. Opened at a U.S. Navy base in Cuba in the months after the Sept. 11, 2001, terrorist attack, Guantanamo was established by President George W. Bush to hold detainees suspected of connections to global terrorism organizations. Allegations of abuse and torture of inmates have led to repeated calls for Guantanamo's closure, and Obama has campaigned twice on the issue, though Congress has passed repeated measures to keep the prison open. Sen. Richard J. Durbin (D-Ill.), who is chairman of the panel, urged Congress to support Obama's efforts, which would end the indefinite detention of prisoners without trial and either release them or charge them in American courts. "The risk of keeping it open far outranks the risk of closing it." Retired Army Maj. Gen. Paul D. Eaton, who trained the Iraqi armed forces from 2003 to 2004, testified that by continuing to violate human rights and American law, the practices at Guantanamo proved more harmful to the U.S. national security interests. "Guantanamo is a terrorist-creating organization," he said to a reporter after the hearing. "It's a terrific recruiting tool."
Note: Whether or not detainees were truly terrorists before they were imprisoned at Guantanamo, how do you think they feel about the US government after years there? You have to wonder if this isn't being done to create terrorists, just as many prisons become training grounds for criminals.
[There is] a growing debate over a little-known but increasingly important piece of equipment buried deep inside a car: the event data recorder, more commonly known as the black box. About 96 percent of all new vehicles sold in the United States have the boxes, and in September 2014, if the National Highway Traffic Safety Administration has its way, all will have them. Data stored in the devices is increasingly being used to identify safety problems in cars and as evidence in traffic accidents and criminal cases. And the trove of data inside the boxes has raised privacy concerns, including questions about who owns the information, and what it can be used for, even as critics have raised questions about its reliability. To consumer advocates, the data is only the latest example of governments and companies having too much access to private information. Once gathered, they say, the data can be used against car owners, to find fault in accidents or in criminal investigations. “These cars are equipped with computers that collect massive amounts of data,” said Khaliah Barnes of the Electronic Privacy Information Center, a Washington-based consumer group. “Without protections, it can lead to all kinds of abuse.” In [14] states, lawyers may subpoena the data for criminal investigations and civil lawsuits, making the information accessible to third parties, including law enforcement or insurance companies that could cancel a driver’s policy or raise a driver’s premium based on the recorder’s data.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
The American Civil Liberties Union is warning that law enforcement officials are using license plate scanners to amass massive and unregulated databases that can be used to track law-abiding citizens as their go about their daily lives. In a new report, "You Are Being Tracked: How License Plate Readers Are Being Used to Record Americans' Movements," the ACLU discusses the data culled from license plate scanners - cameras mounted on patrol cars, overpasses and elsewhere to record your license plate number and location at a given time. There are tens of thousands such cameras now in operation, according to the group, with the data in some cases being stored indefinitely. The ACLU report is the result of an analysis of 26,000 pages of documents from police departments around the country, obtained through nearly 600 [FOIA] requests. It finds that while some jurisdictions keep the information gleaned from the scanners for a short time ... many hold onto the data for years. The organization complains that there are "virtually no rules in place" to keep officials from tracking "everybody all the time." The ACLU also warns that the data is being fed into larger databases, with the private National Vehicle Location Service now holding more than 800 million license plate records. The group's database is used by more than 2,200 law enforcement customers. The [ACLU] report warns that the data can be used in an official capacity to spy on protesters or target communities based on their religious beliefs, or unofficially by a police officer who wants to keep an eye on a romantic rival.
Note: For more on privacy, see the deeply revealing reports from reliable major media sources available here.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.