Intelligence Agency Corruption Media ArticlesExcerpts of Key Intelligence Agency Corruption Media Articles in Major Media
Below are key excerpts of revealing news articles on intelligence agency corruption from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The Federal Bureau of Investigation has incorrectly kept nearly 24,000 people on a terrorist watch list on the basis of outdated or sometimes irrelevant information. By the beginning of 2009, the report said, this consolidated government watch list comprised about 400,000 people, recorded as 1.1 million names and aliases, an exponential growth from the days before the attacks of Sept. 11, 2001. The new report, by the office of the Justice Department’s inspector general, provides the most authoritative statistical account to date of the problems connected with the list. An earlier report by the inspector general, released in March 2008, looked mainly at flaws in the system, without an emphasis on the number of people caught up in it. The list has long been a target of public criticism, particularly after well-publicized errors in which politicians including Senator Edward M. Kennedy and Representative John Lewis showed up on it. People with names similar to actual terrorists have complained that it can take months to be removed from the list, and civil liberties advocates charge that antiwar protesters, Muslim activists and others have been listed for political reasons. One of the biggest problems identified in the report was the use of outdated information, or material unconnected to terrorism, to keep people on the bureau’s own terror watch list, which is incorporated in the consolidated list. The report, examining nearly 69,000 referrals to the F.B.I. list that were either brought or processed by the bureau, found that 35 percent of those people, both Americans and foreigners, remained on the list despite inadequate justification.
Note: For many detailed reports from reliable sources indicating the "war on terror" isn't really what it's claimed to be, click here.
According to current and former government officials, the CIA's secret waterboarding program was designed and assured to be safe by two well-paid psychologists now working out of an unmarked office building in Spokane, Washington. Bruce Jessen and Jim Mitchell, former military officers, together founded Mitchell Jessen and Associates. Both men declined to speak to ABC News citing non-disclosure agreements with the CIA. But sources say Jessen and Mitchell together designed and implemented the CIA's interrogation program. "It's clear that these psychologists had an important role in developing what became the CIA's torture program," said Jameel Jaffer, an attorney with the American Civil Liberties Union. Former U.S. officials say the two men were essentially the architects of the CIA's 10-step interrogation plan that culminated in waterboarding. Associates say the two made good money doing it, boasting of being paid a $1,000 a day by the CIA to oversee the use of the techniques on top al Qaeda suspects at CIA secret sites. Both Mitchell and Jessen were previously involved in the U.S. military program to train pilots how to survive behind enemy lines and resist brutal tactics if captured. But it turns out neither Mitchell nor Jessen had any experience in conducting actual interrogations before the CIA hired them. The new documents show the CIA later came to learn that the two psychologists' waterboarding "expertise" was probably "misrepresented" and thus, there was no reason to believe it was "medically safe" or effective. The waterboarding used on al Qaeda detainees was far more intense than the brief sessions used on U.S. military personnel in the training classes.
Note: For lots more on CIA torture and other recent government attacks on civil liberties, click here.
An influential Democrat in Congress, California's Jane Harman, is at the center of a national security scandal that's threatening her political career. Harman is fighting mad after reports that her phone conversation was intercepted by a national security agency wiretap ... in 2005 and 2006. Sources say Harman was overheard talking to an investigative target whose conversations were being legally intercepted. Congressional Quarterly and The New York Times report that Harman discussed using her influence to reduce espionage-related charges against two officials of the American Israeli Public Affairs Committee. In return, the person with whom she was speaking would lobby then-House Minority Leader Nancy Pelosi to appoint Harman chair of the House Intelligence Committee. Harman reportedly ended the conversation by saying, "This conversation doesn't exist." [Congressional Quarterly] also reports that after the intercept, the FBI tried to open an investigation of Harman. But Attorney General Alberto Gonzales pulled the plug because he wanted Harman's help defending the controversial domestic warrantless wiretapping program. The former attorney general had no comment.
Note: For lots more from major media sources on the clandestine operations of the FBI and other intelligence agencies, click here.
The Justice Department ... made public detailed memos describing brutal interrogation techniques used by the Central Intelligence Agency, as President Obama sought to reassure the agency that the C.I.A. operatives involved would not be prosecuted. In dozens of pages of dispassionate legal prose, the methods approved by the Bush administration for extracting information from senior operatives of Al Qaeda are spelled out in careful detail — like keeping detainees awake for up to 11 straight days, placing them in a dark, cramped box or putting insects into the box to exploit their fears. The interrogation methods were authorized beginning in 2002, and some were used as late as 2005 in the C.I.A.’s secret overseas prisons. The United States prosecuted some Japanese interrogators at war crimes trials after World War II for waterboarding and other methods detailed in the memos. Together, the four memos give an extraordinarily detailed account of the C.I.A.’s methods and the Justice Department’s long struggle, in the face of graphic descriptions of brutal tactics, to square them with international and domestic law. Passages describing forced nudity, the slamming of detainees into walls, prolonged sleep deprivation and the dousing of detainees with water as cold as 41 degrees alternate with elaborate legal arguments concerning the international Convention Against Torture. The revelations may give new momentum to proposals for a full-blown investigation into Bush administration counterterrorism programs and possible torture prosecutions.
Note: For many revealing reports from major media sources on increasing threats to civil liberties, click here.
Medical personnel were deeply involved in the abusive interrogation of terrorist suspects held overseas by the Central Intelligence Agency, including torture, and their participation was a “gross breach of medical ethics,” a long-secret report by the International Committee of the Red Cross concluded. Based on statements by 14 prisoners who belonged to Al Qaeda and were moved to Guantánamo Bay, Cuba, in late 2006, Red Cross investigators concluded that medical professionals working for the C.I.A. monitored prisoners undergoing waterboarding, apparently to make sure they did not drown. Medical workers were also present when guards confined prisoners in small boxes, shackled their arms to the ceiling, kept them in frigid cells and slammed them repeatedly into walls, the report said. Facilitating such practices, which the Red Cross described as torture, was a violation of medical ethics even if the medical workers’ intentions had been to prevent death or permanent injury, the report said. But it found that the medical professionals’ role was primarily to support the interrogators, not to protect the prisoners, and that the professionals had “condoned and participated in ill treatment.” At times, according to the detainees’ accounts, medical workers “gave instructions to interrogators to continue, to adjust or to stop particular methods.” The Red Cross report was completed in 2007. It was obtained by Mark Danner, a journalist who has written extensively about torture, and posted Monday night with an article by Mr. Danner on the Web site of The New York Review of Books.
Note: Much of content of the Red Cross report was revealed in a March article by Mr. Danner and in a 2008 book, The Dark Side, by Jane Mayer, but the reporting of the Red Cross investigators’ conclusions on medical ethics and other issues are new.
As a novice CIA case officer in the Middle East, Andrew Warren quickly learned the value of sex in recruiting spies. Colleagues say that he made an early habit of taking informants to strip clubs, and that he later began arranging out-of-town visits to brothels for his best recruits. Often Warren would travel with them, according to two colleagues who worked with him for years. His methods earned him promotions and notoriety over a lengthy career, until Warren, 41, became ensnared in a sex scandal. Two Algerian women have accused the Virginia native of drugging and sexually assaulting them, and, in one instance, videotaping the encounter. The episode -- one of three sex-related scandals to shake the CIA this year -- has drawn harsh questions from Congress about whether the agency adequately polices its far-flung workforce or takes sufficient steps to root out corrupt behavior. Former officers say the cases underscore a perennial challenge: guarding against scandal in a workforce -- the size of which is classified but is generally estimated to be 20,000 -- that prides itself on secrecy and deception. "You have an organization of professional liars," said Tyler Drumheller, who oversaw hundreds of officers as chief of the agency's European division. Experienced field managers are needed, he said, because inevitably "some people will try to take advantage of the system . . . and it's a system that can be taken advantage of." The recent string of embarrassing revelations started with the CIA's former No. 3 officer, Kyle "Dusty" Foggo, who was indicted on corruption charges two years ago.
Note: For in-depth analysis of the continuing revelations of a long history of the CIA's use of sex to control people, click here.
President Obama plans to order a sweeping overhaul of the National Security Council, expanding its membership and increasing its authority to set strategy across a wide spectrum of international and domestic issues. The result will be a "dramatically different" NSC from that of the Bush administration or any of its predecessors since the forum was established after World War II ... according to national security adviser James L. Jones, who described the changes in an interview. Jones, a retired Marine general, made it clear that he will run the process and be the primary conduit of national security advice to Obama. The new structure ... will expand the NSC's reach far beyond the range of traditional foreign policy issues. New NSC directorates will deal with such department-spanning 21st-century issues as cybersecurity, energy, climate change, nation-building and infrastructure. Many of the functions of the Homeland Security Council, established as a separate White House entity by President Bush after the terrorist attacks of Sept. 11, 2001, may be subsumed into the expanded NSC, although it is still undetermined whether elements of the HSC will remain as a separate body within the White House. Over the next 50 days, John O. Brennan, a CIA veteran who serves as presidential adviser for counterterrorism and homeland security and is Jones's deputy, will review options for the homeland council, including its responsibility for preparing for and responding to natural and terrorism-related domestic disasters.
OLBERMANN: It has taken less than 24 hours after the Bush presidency ended for a former analyst at the National Security Agency to come forward to reveal new allegations about how this nation was spied on by its own government. Russell Tice [reveals] that under the collar of fighting terrorism, the Bush administration was also targeting specific groups of Americans for surveillance. TICE: The National Security Agency had access to all Americans‘ communications, faxes, phone calls, and their computer communications. They monitored all communications. What was done was a sort of an ability to look at the meta data, the signaling data for communications, and ferret that information to determine what communications would ultimately be collected. Basically, filtering out sort of like sweeping everything with that meta data, and then cutting down ultimately what you are going to look at and what is going to be collected, and in the long run have an analyst look at, you know, needles in a haystack for what might be of interest. OLBERMANN: I mention that you say specific groups were targeted. What group or groups can you tell us about? TICE: [Some of the groups they] collected on were U.S. news organizations and reporters and journalists. The collection ... was 24/7, and you know, 365 days a year, and it made no sense.
Note: To watch this revealing clip on video, click here. For many reports on government surveillance and invasions of privacy, click here.
U.S. spy agencies' sensitive data should soon be linked by Google-like search systems. Director of National Intelligence Mike McConnell has launched a sweeping technology program to knit together the thousands of databases across all 16 spy agencies. After years of bureaucratic snafus, intelligence analysts will be able to search through secret intelligence files the same way they can search public data on the Internet. Linking up the 16 agencies is the challenge at the heart of the job of director of national intelligence, created after 9/11. The new information program also is designed to include Facebook-like social-networking programs and classified news feeds. It includes enhanced security measures to ensure that only appropriately cleared people can access the network. The price tag is expected to be in the billions of dollars. The impact for analysts, Mr. McConnell says, "will be staggering." Not only will analysts have vastly more data to examine, potentially inaccurate intelligence will stand out more clearly, he said. Today, an analyst's query might scan only 5% of the total intelligence data in the U.S. government, said a senior intelligence official. Even when analysts find documents, they sometimes can't read them without protracted negotiations to gain access. Under the new system, an analyst would likely search about 95% of the data, the official said.
Note: For key reports from reliable sources on the hidden realities of the War on Terror, click here.
It was 1968, and Frank Rochelle was 20 years old and fresh out of Army boot camp when he saw notices posted around his base in Virginia asking for volunteers to test uniforms and equipment. That might be a good break after the harsh weeks of boot camp, he thought, and signed up. Instead of equipment testing, though, the Onslow county, North Carolina, native found himself in a bizarre, CIA-funded drug testing and mind-control programme, according to a lawsuit that he and five other veterans and Vietnam Veterans of America filed last week. The suit was filed in federal court in San Francisco against the US department of defence and the CIA. The plaintiffs seek to force the government to contact all the subjects of the experiments and give them proper healthcare. In 2003 the US department of veterans affairs released a pamphlet that said nearly 7,000 soldiers had been involved and more than 250 chemicals used on them, including hallucinogens such as LSD and PCP as well as biological and chemical agents. Lasting from 1950 to 1975, the experiments took place at Edgewood Arsenal in Maryland. According to the lawsuit, some of the volunteers were even implanted with electrical devices in an effort to control their behaviour. Rochelle, 60, [said] there were about two dozen volunteers when he was taken to Edgewood. Once there, they were asked to volunteer a second time, for drug testing. They were told that the experiments were harmless.
Note: For a powerful summary of the decades-long mind control experiment program conducted by the CIA and other US government agencies, click here.
The Maryland State Police surveillance of advocacy groups was far more extensive than previously acknowledged, with records showing that troopers monitored -- and labeled as terrorists -- activists devoted to such wide-ranging causes as promoting human rights and establishing bike lanes. Intelligence officers created a voluminous file on Norfolk-based People for the Ethical Treatment of Animals, calling the group a "security threat" because of concerns that members would disrupt the circus. Angry consumers fighting a 72 percent electricity rate increase in 2006 were targeted. The DC Anti-War Network, which opposes the Iraq war, was designated a white supremacist group, without explanation. One of the possible "crimes" in the file police opened on Amnesty International, a world-renowned human rights group: "civil rights." The [surveillance] ... confirmed the fears of civil liberties groups that have warned about domestic spying since the Sept. 11, 2001, attacks. "No one was thinking this was al-Qaeda," said Stephen H. Sachs, a former U.S. attorney and state attorney general appointed by Gov. Martin O'Malley (D) to review the case. "But 9/11 created an atmosphere where cutting corners was easier." Maryland has not been alone. The FBI and police departments in several cities, including Denver in 2002 and New York before the 2004 Republican National Convention, also responded to [dissent] by spying on activists.
Note: For wide coverage from reliable sources of disturbing threats to civil liberties, click here.
The National Security Agency (NSA) is developing a tool that George Orwell's Thought Police might have found useful: an artificial intelligence system designed to gain insight into what people are thinking. The device will be able to respond almost instantaneously to complex questions posed by intelligence analysts. As more and more data is collectedthrough phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records - it may one day be possible to know not just where people are and what they are doing, but what and how they think. The system is so potentially intrusive that at least one researcher has quit, citing concerns over the dangers in placing such a powerful weapon in the hands of a top-secret agency with little accountability. Known as Aquaint, which stands for "Advanced QUestion Answering for INTelligence," the project was run for many years by John Prange, an NSA scientist at the Advanced Research and Development Activity. A supersmart search engine, capable of answering complex questions ... would be very useful for the public. But that same capability in the hands of an agency like the NSA - absolutely secret, often above the law, resistant to oversight, and with access to petabytes of private information about Americans - could be a privacy and civil liberties nightmare. "We must not forget that the ultimate goal is to transfer research results into operational use," said ... Prange.
Note: Watch a highly revealing PBS Nova documentary providing virtual proof that the NSA could have stopped 9/11 but chose not to. For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy.
Vice President Dick Cheney said Monday that he was directly involved in approving severe interrogation methods used by the CIA, and that the prison at Guantanamo Bay, Cuba, should remain open indefinitely. Cheney's comments ... mark the first time that he has acknowledged playing a central role in clearing the CIA's use of an array of controversial interrogation tactics, including a ... method known as waterboarding. "I was aware of the program, certainly, and involved in helping get the process cleared," Cheney said in an interview with ABC News. Asked whether he still believes it was appropriate to use the waterboarding method on terrorism suspects, Cheney said: "I do." His comments come on the heels of disclosures by a Senate committee showing that high-level officials in the Bush administration were intimately involved in reviewing and approving interrogation methods that have since been explicitly outlawed and that have been condemned internationally as torture. Soon after the Sept. 11 attacks, Cheney said, the CIA "in effect came in and wanted to know what they could and couldn't do. And they talked to me, as well as others, to explain what they wanted to do. And I supported it." Waterboarding involves strapping a prisoner to a tilted surface, covering his face with a towel and dousing it to simulate the sensation of drowning. CIA Director Michael V. Hayden has said that the agency used the technique on three Al Qaeda suspects in 2002 and 2003. Cheney has long defended the technique. But he has not previously disclosed his role in pushing to give the CIA such authority.
Note: For lots more from major media sources on US torture and other war crimes committed in the Iraq and Afghan wars, click here.
With the help of CIA spotters, the Peruvian air force shot down 15 small civilian aircraft suspected of carrying drugs, in many cases without warning and within two to three minutes of being sighted, a U.S. lawmaker said Thursday. It was the first public disclosure of the number of planes shot down between 1995 and 2001 as part of the Airbridge Denial Program, a CIA counternarcotics effort that killed an innocent American missionary, Veronica Bowers, and her infant daughter in 2001. Michigan Rep. Pete Hoekstra, senior Republican on the Intelligence Committee of the House of Representatives, told The Associated Press most of the 15 planes shot down with the help of the CIA crashed in the jungle. The wreckage has not been or could not be examined to ascertain whether narcotics were aboard the aircraft. "The Bowers could have gone in the same category if they had crashed in the jungle," Hoekstra said, speaking of the missionary family from Hoekstra's state, Michigan. The Bowers' plane made an emergency river landing after it was hit. Excerpts from a CIA inspector general's report released in November raised questions about whether the missionaries' plane was the only craft mistakenly suspected of drug smuggling. The CIA report said that in most of the shootdowns, pilots fired on aircraft "without being properly identified, without being given the required warnings to land, and without being given time to respond to such warnings as were given to land."
Note: For many key reports from major media sources on government corruption, click here.
To friends in the protest movement, Lucy was an eager 20-something who attended their events and sent encouraging e-mails to support their causes. Only one thing seemed strange. "At one demonstration, I remember her showing up with a laptop computer and typing away," said Mike Stark, who helped lead the anti-death-penalty march in Baltimore that day. "We all thought that was odd." Not really. The woman was an undercover Maryland State Police trooper who between 2005 and 2007 infiltrated more than two dozen rallies and meetings of nonviolent groups. Maryland officials now concede that, based on information gathered by "Lucy" and others, state police wrongly listed at least 53 Americans as terrorists in a criminal intelligence database -- and shared some information about them with half a dozen state and federal agencies, including the National Security Agency. Among those labeled as terrorists: two Catholic nuns, a former Democratic congressional candidate, a lifelong pacifist and a registered lobbyist. One suspect's file warned that she was "involved in puppet making and allows anarchists to utilize her property for meetings." "There wasn't a scintilla of illegal activity" going on, said David Rocah, an attorney for the American Civil Liberties Union, which filed a lawsuit and in July obtained the first surveillance files. State police have released other heavily redacted documents. Investigators, the files show, targeted groups that advocated against abortion, global warming, nuclear arms, military recruiting in high schools and biodefense research, among other issues.
Note: For lots more on increasing threats to civil liberties, click here.
I should have felt triumphant when I returned from Iraq in August 2006. Instead, I was worried and exhausted. My mind was consumed with the unfinished business of our mission: fixing the deeply flawed, ineffective and un-American way the U.S. military conducts interrogations in Iraq. I'm still alarmed about that today. I'm not some ivory-tower type; I served for 14 years in the U.S. Air Force, began my career as a Special Operations pilot flying helicopters, saw combat in Bosnia and Kosovo, became an Air Force counterintelligence agent, then volunteered to go to Iraq to work as a senior interrogator. What I saw in Iraq still rattles me -- both because it betrays our traditions and because it just doesn't work. What I soon discovered about our methods astonished me. The Army was still conducting interrogations according to the Guantanamo Bay model: Interrogators were nominally using the methods outlined in the U.S. Army Field Manual, the interrogators' bible, but they were pushing in every way possible to bend the rules -- and often break them.These interrogations were based on fear and control; they often resulted in torture and abuse. I refused to participate in such practices, and a month later, I extended that prohibition to the team of interrogators I was assigned to lead. I personally conducted more than 300 interrogations, and I supervised more than 1,000. The methods my team used are not classified ... but the way we used them was, I like to think, unique. We got to know our enemies, we learned to negotiate with them, and we adapted criminal investigative techniques to our work.
Note: For revealing reports from reliable and verifiable sources on the realities of the Iraq and Afghan wars, click here.
Imagine someone watching your every move, hearing everything you say and knowing where you are at every moment. If you have a cell phone, it could happen to you. After four months of harassing phone calls, Courtney Kuykendall was afraid to answer her cell phone. The Tacoma, Washington, teenager was receiving graphic, violent threats at all hours. And when she and her family changed their cell phone numbers and got new phones, the calls continued. Using deep scratchy voices, anonymous stalkers literally took control of the Kuykendall's cell phones, repeatedly threatened Courtney with murder and rape, and began following the family's every move. "They're listening to us and recording us," Courtney's mother, Heather Kuykendall, told NBC's Today Show. "We know that because they will record us and play it back as a voicemail." How is something like this possible? Just take a look on the internet. That's where you'll find the latest spy technology for cell phones. Spyware marketers claim you can tap into someone's calls, read their text messages and track their movements "anywhere, anytime." Security experts say it's no internet hoax."It's real, and it is pretty creepy," said Rick Mislan, a former military intelligence officer who now teaches cyber forensics at Purdue University's Department of Computer and Information Technology. Mislan has examined thousands of cell phones inside Purdue's Cyber Forensics Lab, and he says spy software can now make even the most high-tech cell phone vulnerable. "I think a lot of people think their cell phone calls are very secure but our privacy isn't always what we think it is."
Note: For lots more on increasing corporate and governmental threats to privacy, click here.
President-elect Barack Obama is unlikely to radically overhaul controversial Bush administration intelligence policies, advisers say, an approach that is almost certain to create tension within the Democratic Party. Mr. Obama is being advised largely by a group of intelligence professionals ... who have supported Republicans. The intelligence-transition team is led by former National Counterterrorism Center chief John Brennan and former CIA intelligence-analysis director Jami Miscik, say officials close to the matter. Mr. Brennan is viewed as a potential candidate for a top intelligence post. Ms. Miscik left amid a slew of departures from the CIA under then-Director Porter Goss. Mr. Brennan is a leading contender for one of the two jobs, say some advisers. He declined to comment. Gen. James L. Jones, a former North Atlantic Treaty Organization commander; Thomas Fingar, the chief of analysis for the intelligence director; Joan A. Dempsey, who served in top intelligence and Pentagon posts; former Rep. Tim Roemer of Indiana, who served on the 9/11 Commission; and [Rep. Jane] Harman have also been mentioned. Ms. Harman has also been cited as a potential secretary of homeland security.
Note: According to the New York Times, John O. Brennan, president-elect Obama's intelligence-transition leader and a top candidate for director of national intelligence or the CIA in the Obama administration, "[was] a senior adviser to [CIA Director George] Tenet in 2002 [and] was present at the creation of the C.I.A.’s controversial detention and interrogation program." Jane Harman has been the principal Congressional proponent of the Violent Radicalization and Homegrown Terrorism Prevention Act, with its McCarthyesque provisions for criminalizing political thought. For more on increasing threats to civil liberties from reliable sources, click here.
Internet "black boxes" will be used to collect every email and web visit in the UK under the Government's plans for a giant "big brother" database, The Independent has learnt. Home Office officials have told senior figures from the internet and telecommunications industries that the "black box" technology could automatically retain and store raw data from the web before transferring it to a giant central database controlled by the Government. Plans to create a database holding information about every phone call, email and internet visit made in the UK have provoked a huge public outcry. Richard Thomas, the Information Commissioner, described it as "step too far" and the Government's own terrorism watchdog said that as a "raw idea" it was "awful". News that the Government is already preparing the ground by trying to allay the concerns of the internet industry is bound to raise suspicions about ministers' true intentions. Further details of the database emerged on Monday at a meeting of internet service providers (ISPs) in London where representatives from BT, AOL Europe, O2 and BSkyB were given a PowerPoint presentation of the issues and the technology surrounding the Government's Interception Modernisation Programme (IMP), the name given by the Home Office to the database proposal. "It was clear the 'back box' is the technology the Government will use to hold all the data. But what isn't clear is what the Home Secretary, GCHQ and the security services intend to do with all this information in the future," said a source close to the meeting.
Note: For lots more on threats to privacy from reliable sources, click here.
Interpol is planning to expand its role into the mass screening of passengers moving around the world by creating a face recognition database. Every year more than 800 million international travellers fail to undergo "the most basic scrutiny" to check whether their identity documents have been stolen, the global policing cooperation body has warned. Senior figures want a system that lets immigration officials capture digital images of passengers and immediately cross-check them against a database of pictures of [alleged] terror suspects, international criminals and fugitives. The UK's first automated face recognition gates -- matching passengers to their digital image in the latest generation of passports -- began operating at Manchester airport in August. Mark Branchflower, head of Interpol's fingerprint unit, will this week unveil proposals in London for the creation of biometric identification systems that could be linked to such immigration checks. The civil liberties group No2ID, which campaigns against identity cards, expressed alarm at the plans. "This is a move away from seeking specific persons to GCHQ-style bulk interception of information," warned spokesman Michael Parker. "This is the next step. Law enforcement agencies want the most efficient systems but there has to be a balance between security and privacy."
Note: For many disturbing reports on increasing threats to privacy, click here.
Important Note: Explore our full index to key excerpts of revealing major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.